# EPCIS Event Hash Generator
[![Build Status](https://github.com/RalphTro/epcis-event-hash-generator/workflows/Unit%20Tests/badge.svg?v=42)](https://github.com/RalphTro/epcis-event-hash-generator/actions?query=workflow%3A%22Unit+Tests%22)
[![Linter Status](https://github.com/RalphTro/epcis-event-hash-generator/workflows/Code%20Style/badge.svg)](https://github.com/RalphTro/epcis-event-hash-generator/actions?query=workflow%3A%22Code+Style%22)
![Docker Release Build](https://github.com/RalphTro/epcis-event-hash-generator/workflows/Docker%20Release%20Build/badge.svg)
This is a reference implementation for a method to uniquely identify an EPCIS event as specified in the Core Business Vocabulary (CBV) Standard 2.0.
The *EPCIS Event Hash ID* works syntax-/representation-agnostic and is based on hashing.
This <b>PROTOTYPICAL DEMO SOFTWARE</b> takes an EPCIS Document (either formatted in XML or JSON-LD) and returns the hash value(s) of the contained EPCIS events representing a unique fingerprint thereof.
![EPCIS event hash generator algorithm illustration](docs/epcisEventHashGenerator.png)
## Status of the reference implementation
Working as expected, no known major bugs.
## TL;DR
The implementation provided here is a prototypical reference implementation meant for testing against other implementations, but **not meant for production**. If you discover that this implementation does not conform perfectly to the algorithm description or contains any other bugs, please file an issue at https://github.com/RalphTro/epcis-event-hash-generator/issues .
### Command Line
The Hashing Algorithm described below is implemented as a Python script, including a command line utility which can be run directly.
The package is release on PyPI at https://pypi.org/project/epcis-event-hash-generator/ hence it can be installed via
```
python3 -m pip install epcis_event_hash_generator
```
For usage information run
```
python3 -m epcis_event_hash_generator -h
```
### Web Service
The script also comes wrapped as a web service in a docker image for ease of integration into a testing environment.
You may use
- [the latest release version of the web service container](https://github.com/RalphTro/epcis-event-hash-generator/packages/484860 ). See here for usage.
## Introduction
There are situations in which organisations require to uniquely refer to a specific EPCIS event. For instance, companies may only want to store the <b>hash value of a given EPCIS event on a distributed shared ledger ('blockchain')</b> instead of any actual payload. Digitally signed and in conjunction with a unique timestamp, this is a powerful and effective way to prove the integrity of the underlying event data. Another use case consists to use such an approach to <b>populate the eventID field with values that are intrinsic to the EPCIS event</b> - if an organisation captures an event without an eventID field (which is not required as of the standard) and sends that event to a business partner who needs to assign a unique ID, they can agree that the business partner populates the `eventID` field applying this methodology before storing the event on the server. If the organisation later wants to query for that specific event, it knows how the eventID was created, thus is able to query for it through the eventID value.
EPCIS events have a couple of differences to other electronic documents:
+ They are embedded in an EPCIS document which can contain multiple events
+ As of EPCIS 2.0, it is permitted to capture and share EPCIS data through two different syntaxes (XML and JSON/JSON-LD)
+ EPCIS events provides ample flexibility to include user-specific extensions
+ When expressed in JSON/JSON-LD, the sequence of elements may vary
This is why industry needs to have a consistent, reliable approach to create a hash value that is viable to uniquely identify a specific EPCIS event.
Notice that the algorithm described here provides a way of *hashing* an event. A *signature* scheme can be build using this hash, but the hash by itself does not yield a proof of authenticity/authorship. For example, a man in the middle attack can re-compute the hash after tampering.
## Requirements
For any algorithm that is to be considered a faithful hash of an EPCIS event, we require the following properties:
+ Different (valid) serialisations of the **same event** need to yield the **same hash**.
+ In particular, if serialised in XML, the hash must be independend of irrelevant whitespace, ordering of elements in an unordered list, the name used for namespaces, etc. (see e.g. https://en.wikipedia.org/wiki/XML_Signature#XML_canonicalization for more details on the matter).
+ The same event serialised in JSON/JSON-LD or XML must yield the same hash.
+ Any relevant **change of an event** must lead to a **change of the hash**. In particular, the hash must change if
- any value of any field present in the event is changed.
- a field is added or removed.
## Algorithm
For hashing strings, well-established algorithms such as SHA-256 are available. The focus of this specification is the canonicalization of a *pre-hash string* representation of an EPCIS event, which can be passed to any standard hashing algorithm.
To calculate this pre-hash string, the algorithm requires to extract and concatenate EPCIS event key-value pairs to one string exactly according to the following set of rules:
1. For all EPCIS event types, data elements SHALL be extracted according to the *canonical property order* specified below.
2. All elements SHALL be concatenated without separators between successive elements.
3. If a field contains a value (i.e. is not a parent element), each value SHALL be assigned its key through an equal sign ('=').
4. Data elements SHALL NOT be added if they are omitted in a given EPCIS event or do not apply.
5. Whitespace characters at the beginning or end of values SHALL be truncated.
6. Quantitative values SHALL NOT have trailing zeros. (For example, a quantity of one SHALL be expressed as '1', and SHALL NOT be expressed as '1.0'; 0.3434 SHALL be expressed as 0.3434, with any trailing zeros truncated.)
7. Numeric values SHALL be expressed without single quotes.
8. All timestamps SHALL be expressed in UTC; the zero UTC offset SHALL be expressed with the capital letter 'Z'.
9. All timestamps SHALL be expressed with millisecond precision. If an EPCIS event lacks the latter, the millisecond field SHALL be zero-filled (e.g., YYYY-MM-DDTHH:MM:SS.000Z).
10. Strings SHALL be sorted according to their case-sensitive lexical ordering, considering UTF-8/ASCII code values of each successive character.
11. All child elements as part of a list (e.g. `epc` in `epcList`, `bizTransaction` in `bizTransactionList`, etc.) SHALL be sequenced according to their case-sensitive lexical ordering, considering UTF-8/ASCII code values of each successive character. A field name denoting a list (e.g. `epcList`, `bizTransactionList`, `sensorElementList`) SHALL only appear once in the pre-hash string.
12. If a child element of a list itself comprises one or more key-value pairs itself (e.g. `quantityElement` in `quantityList`, `sensorReport` in `sensorElement`), the latter SHALL be concatenated to a string (similar to the procedure specified above) and, if they belong to the same level, sequenced according to their case-sensitive lexical ordering, considering UTF-8/ASCII code values of each successive character..
13. If an EPCIS field comprises a type attribute (e.g. Business Transaction Type in `bizTransaction` or Source/Destination Type in `source`), the type key-value pair (where the key is 'type' and the value the respective type attribute) SHALL follow the actual key-value before the alphabetical ordering takes place.
14. If present, any URN-based standard vocabulary value (starting with ‘urn:epcglobal:cbv’) SHALL be expressed in its corresponding CBV Web URI term (starting with ‘https://ref.gs1.org’).
Example: ‘urn:epcglobal:cbv:bizstep:receiving’ --> ‘https://ref.gs1.org/cbv/BizStep-receiving’
15. If present, any Compact URI Expression (CURIE) SHALL be expanded to its full URI equivalent. This also holds true for standard CBV values, i.e. with the CURIE prefix expansions ‘gs1’ (https://gs1.org/voc/), ‘epcis’ (https://ref.gs1.org/epcis/) and ‘cbv’ (https://ref.gs1.org/cbv/). Example: ‘gs1:Temperature’ --> ‘https://gs1.org/voc/Temperature’
16. If an EPCIS event is represented in JSON/JSON-LD, standard vocabulary elements are not expressed as URIs, but in bare string notation (i.e. ‘in_transit’ instead of ‘https://ref.gs1.org/cbv/Disp-in_transit’). All standard vocabulary elements expressed in bare string notation SHALL be expanded to their corresponding GS1 Web URI (starting with ‘https://ref.gs1.org/cbv’).
17. If present, EPC URIs (starting with ‘urn:epc:id’), EPC Class URIs (starting with ‘urn:epc:class’) or EPC Pattern URIs (starting with ‘urn:epc:idpat’) SHALL be converted into the corresponding canonical GS1 Digital Link URI (starting with ‘https://id.gs1.org’). Canonical GS1 Digital Link URIs are specified in [GS1 Digital Link: URI Syntax, release 1.2], section 4.11.
18. If a GS1 Digital Link URI is present, it SHALL take the form of a constrained canonical GS1 Digital Link URI. Specifically: (I) A custom domain SHALL be replaced by ‘https://id.gs1.org’. (II) The query string SHALL be stripped off. (III) It SHALL only contain the most fine-granular level of identification, i.e. contain the following GS1 keys/key qualifiers only: `00 / 01 / 01 21 / 01 10 / 01 235 / 253 / 255 / 401 / 402 / 414 / 414 254 / 417 / 8003 / 8004 / 8006 / 8006 21 / 8006 10 / 8010 / 8010 8011 / 8017 / 8018`
19. If an EPCIS event comprises `ILMD` elements, the latter SHALL comprise their key names (full namespace embraced by curly brackets ('{' and '}') and the respective local name), as well as, if present, the contained value, prefixed by an equal sign ('='). The resulting substrings SHALL be sorted according to their case-sensitive lexical ordering, considering UTF-8/ASCII code values of each successive character when they are appended to the pre-hash string.
20. If an EPCIS event comprises user extension elements at event level – irrespective whether they appear at top level or are nested – the latter SHALL comprise their key names (full namespace embraced by curly brackets ('{' and '}') and the respective local name), as well as, if present, the contained value, prefixed by an equal sign ('=').
The resulting substrings SHALL be sorted according to their case-sensitive lexical ordering, considering UTF-8/ASCII code values of each successive character when they are appended to the pre-hash string.
21. If an EPCIS event comprises user extension elements as part of an EPCIS standard field with an extension point (namely `readPoint`, `bizLocation`, `sensorElement`, `sensorMetadata`, and `sensorReport`), they SHALL be added at the end of its enclosing parent’s regular fields. Apart from that, they SHALL be added to the pre-hash string similarly as specified in the previous step.
22. The resulting pre-hash string SHALL be embedded in a 'ni' URI scheme as specified in RFC 6920, as follows:
ni:///{digest algorithm};{digest value}?ver={CBV version}
i.e. characters 'n', 'i', followed by one colon (':'), three slash characters ('/'), the digest algorithm, one semicolon (';'), the digest value, one question mark ('?'), the characters 'v', 'e', 'r', one equal sign ('='), and the version of the EPCIS Event Hash ID algorithm that was used to generate the pre-hash string, indicated by the CBV version.
23. The digest algorithm SHALL contain one of the hash name string values as listed in the Named Information Hash Algorithm Registry (see https://www.iana.org/assignments/named-information/named-information.xhtml)
24. The CBV version SHALL be indicated as follows: the three characters 'C', 'B', 'V', followed by one or several digits indicating the major release version, one dot character ('.') and one or more digits indicating the minor release version. In addition, it MAY be appended with one dot character ('.') and one or more digits indicating a revision of a given CBV standard release, if applicable (i.e. if a revision of the CBV standard specifies an updated version of the EPCIS Event Hash ID algorithm).
### Canonical property order
Applicable for all EPCIS Event Types, i.e. `ObjectEvent`, `AggregationEvent`, `TransactionEvent`, `TransformationEvent` and `AssociationEvent`.
| Sequence | Data Element |
| -------- | ------------ |
| 1 | `eventType` |
| 2 | `eventTime` |
| 3 | `eventTimeZoneOffset` |
| 4 | `epcList` – `epc` |
| 5 | `parentID` |
| 6 | `inputEPCList` – `epc` |
| 7 | `childEPCs` – `epc` |
| 8 | `quantityList` – `quantityElement` (`epcClass`, `quantity`, `uom`) |
| 9 | `childQuantityList` – `quantityElement` (`epcClass`, `quantity`, `uom`) |
| 10 | `inputQuantityList` – `quantityElement` (`epcClass`, `quantity`, `uom`) |
| 11 | `outputEPCList` – `epc` |
| 12 | `outputQuantityList` – `quantityElement` (`epcClass`, `quantity`, `uom`) |
| 13 | `action` |
| 14 | `transformationID` |
| 15 | `bizStep` |
| 16 | `disposition` |
| 17 | `persistentDisposition` - (`set`, `unset`) |
| 18 | `readPoint` – `id` |
| 19 | `bizLocation` – `id` |
| 20 | `bizTransactionList` – `bizTransaction` (`business transaction identifier`, `business transaction type`) |
| 21 | `sourceList` – `source` (`source ID`, `source type`) |
| 22 | `destinationList` – `destination` (`destination ID`, `destination type`) |
| 23 | `sensorElementList` - `sensorElement` ( |
| | `sensorMetadata` (`time`, `startTime`, `endTime`, `deviceID`, `deviceMetadata`, `rawData`, `dataProcessingMethod`, `bizRules`), |
| | `sensorReport` (`type`, `exception`, `deviceID`, `deviceMetadata`, `rawData`, `dataProcessingMethod`, `time`, `microorganism`, `chemicalSubstance`, `value`, `component`, `stringValue`, `booleanValue`, `hexBinaryValue`, `uriValue`, `minValue`, `maxValue`, `meanValue`, `sDev`, `percRank`, `percValue`, `uom`, `coordinateReferenceSystem`)|
| | ) |
| 24 | `ilmd` – `{ILMD elements}` |
| 25 | `{User extension elements}`|
For better understanding, the following illustrations include the data content of EPCIS events (including a couple of user extensions - all defined under 'https://ns.example.com/epcis'), show the corresponding pre-hash string as well as the canonical hash value of that event.
Example 1:
![Example 1 for EPCIS event pre-hash computation](docs/hashingAlgorithmLogicIllustration_example1.png)
Run `epcis_event_hash_generator/main.py tests/examples/ReferenceEventHashAlgorithm.xml -pj "\n"` to get a similar output of the pre-hash string and `epcis_event_hash_generator/main.py tests/examples/ReferenceEventHashAlgorithm.xml` to verify the hash.
Example 2:
![Example 2 for EPCIS event pre-hash computation ](docs/hashingAlgorithmLogicIllustration_example2.png)
Run `epcis_event_hash_generator/main.py tests/examples/ReferenceEventHashAlgorithm2.xml -pj "\n"` to get a similar output of the pre-hash string and `epcis_event_hash_generator/main.py tests/examples/ReferenceEventHashAlgorithm2.xml` to verify the hash.
Example 3:
![Example 3 for EPCIS event pre-hash computation ](docs/hashingAlgorithmLogicIllustration_example3.png)
The line breaks in the pre-hash string are displayed for readability reasons. The actual pre-hash string does not contain any whitespace (unless specifically used in a value) and the lines displayed in the above picture have to be concatenated (by empty string) in order to get the actual pre-hash string.
## Use Cases and Limitations
This algorithm has *various potential areas of application*:
* Primary Key for EPCIS Events
- populating the eventID field in situations where this is required
- enabling to independently recalculate the eventID value on the basis of an EPCIS event's intrinsic data
- indexing EPCIS events in databases
* Identifying duplicate EPCIS events
* Matching an error declaration to an original event (see EPCIS Standard, section 7.4.1.4)
* Notarisation of EPCIS events (i.e. leveraging digital signatures)
That said, the algorithm has limited applicability when EPCIS events are redacted (meaning that, e.g. for privacy reasons, EPCIS events are not shared entirely, but deliberately omit specific fields or including readPoint IDs with a lesser granularity - see EPCIS and CBV Implementation Guide, section 6.7). In such a case, the content of a redacted EPCIS event will in no case yield to the hash value of the original one.
## References
* EPCIS Standard, v. 2.0: https://ref.gs1.org/standards/epcis/
* Core Business Vocabulary (CBV) Standard, v. 2.0: https://ref.gs1.org/standards/cbv/
* RFC 6920, Naming Things with Hashes, https://tools.ietf.org/html/rfc6920
* Named Information Hash Algorithm Registry, https://www.iana.org/assignments/named-information/named-information.xhtml
## Acknowledgements
The following table lists, in alphabetical order of their GitHub profile name, all persons who have contributed to this project so far through:
- software development (:computer:)
- maintenance (:construction:)
- submitting issues (:ticket:)
- testing (:microscope:)
- providing advice/feedback/ideas (:bulb:)
All of this was and is both very valuable as well as very much appreciated and we would like to take the opportunity to express our gratitude for all this valuable support.
| GitHub Profile | Link + Image | Name (if revealed) | Primary contribution |
| -------------- | --------------------- | -------------------- | -------------- |
| Aravinda93 | [![](https://github.com/Aravinda93.png?size=50)](https://github.com/Aravinda93) | Aravinda Baliga | :ticket: :bulb: :microscope: |
| clementh59 | [![](https://github.com/clementh59.png?size=50)](https://github.com/clementh59) | Clément | :ticket: :microscope: |
| CraigRe | [![](https://github.com/CraigRe.png?size=50)](https://github.com/CraigRe) | Craig Alan Repec | :bulb: |
| dakbhavesh | [![](https://github.com/dakbhavesh.png?size=50)](https://github.com/dakbhavesh) | Bhavesh Shah | :computer: :construction: :microscope: |
| domguinard | [![](https://github.com/domguinard.png?size=50)](https://github.com/domguinard) | Dominique Guinard | :bulb: |
| Echsecutor | [![](https://github.com/Echsecutor.png?size=50)](https://github.com/Echsecutor) | Sebastian Schmittner | :computer: :construction: :microscope: |
| mgh128 | [![](https://github.com/mgh128.png?size=50)](https://github.com/mgh128) | Mark Harrison | :bulb: |
| RalphTro | [![](https://github.com/RalphTro.png?size=50)](https://github.com/RalphTro) | Ralph Troeger | :microscope: :ticket: :computer: |
| sboeckelmann | [![](https://github.com/sboeckelmann.png?size=50)](https://github.com/sboeckelmann) | Sven Boeckelmann | :bulb: |
| ShaikDayan | [![](https://github.com/ShaikDayan.png?size=50)](https://github.com/ShaikDayan) | Shaik Dayan | :microscope: :ticket: |
| tnahddisttud | [![](https://github.com/tnahddisttud.png?size=50)](https://github.com/tnahddisttud) | Siddhant Pandey | :computer: :construction: |
## License
<img alt="Open Source Initiative" style="border-width:0" src="docs/OSI.jpeg" width="150px;"/><br />
Copyright 2020-2023 | Ralph Tröger <ralph.troeger@gs1.de> and Sebastian Schmittner <schmittner@eecc.info>
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
Raw data
{
"_id": null,
"home_page": "https://github.com/RalphTro/epcis-event-hash-generator",
"name": "epcis-event-hash-generator",
"maintainer": "",
"docs_url": null,
"requires_python": ">=3.6",
"maintainer_email": "",
"keywords": "epcis GS1 hashing traceability",
"author": "Package author: Sebastian Schmittner Code authors: https://github.com/RalphTro/epcis-event-hash-generator/graphs/contributors",
"author_email": "sebastian.schmittner@eecc.de",
"download_url": "https://files.pythonhosted.org/packages/e9/07/93a7ecef4507ad7dbcb33aa72f11ad33dea0cf68a236553dbc634aaee230/epcis-event-hash-generator-1.9.3.tar.gz",
"platform": null,
"description": "# EPCIS Event Hash Generator\n\n[![Build Status](https://github.com/RalphTro/epcis-event-hash-generator/workflows/Unit%20Tests/badge.svg?v=42)](https://github.com/RalphTro/epcis-event-hash-generator/actions?query=workflow%3A%22Unit+Tests%22)\n[![Linter Status](https://github.com/RalphTro/epcis-event-hash-generator/workflows/Code%20Style/badge.svg)](https://github.com/RalphTro/epcis-event-hash-generator/actions?query=workflow%3A%22Code+Style%22)\n![Docker Release Build](https://github.com/RalphTro/epcis-event-hash-generator/workflows/Docker%20Release%20Build/badge.svg)\n\nThis is a reference implementation for a method to uniquely identify an EPCIS event as specified in the Core Business Vocabulary (CBV) Standard 2.0. \nThe *EPCIS Event Hash ID* works syntax-/representation-agnostic and is based on hashing.\nThis <b>PROTOTYPICAL DEMO SOFTWARE</b> takes an EPCIS Document (either formatted in XML or JSON-LD) and returns the hash value(s) of the contained EPCIS events representing a unique fingerprint thereof. \n\n![EPCIS event hash generator algorithm illustration](docs/epcisEventHashGenerator.png)\n\n\n## Status of the reference implementation\n\nWorking as expected, no known major bugs. \n\n\n\n## TL;DR\n\nThe implementation provided here is a prototypical reference implementation meant for testing against other implementations, but **not meant for production**. If you discover that this implementation does not conform perfectly to the algorithm description or contains any other bugs, please file an issue at https://github.com/RalphTro/epcis-event-hash-generator/issues .\n\n### Command Line\n\nThe Hashing Algorithm described below is implemented as a Python script, including a command line utility which can be run directly.\n\nThe package is release on PyPI at https://pypi.org/project/epcis-event-hash-generator/ hence it can be installed via\n```\npython3 -m pip install epcis_event_hash_generator\n```\n\nFor usage information run\n\n```\npython3 -m epcis_event_hash_generator -h\n```\n\n\n### Web Service\n\nThe script also comes wrapped as a web service in a docker image for ease of integration into a testing environment.\nYou may use \n\n- [the latest release version of the web service container](https://github.com/RalphTro/epcis-event-hash-generator/packages/484860 ). See here for usage.\n\n\n## Introduction \nThere are situations in which organisations require to uniquely refer to a specific EPCIS event. For instance, companies may only want to store the <b>hash value of a given EPCIS event on a distributed shared ledger ('blockchain')</b> instead of any actual payload. Digitally signed and in conjunction with a unique timestamp, this is a powerful and effective way to prove the integrity of the underlying event data. Another use case consists to use such an approach to <b>populate the eventID field with values that are intrinsic to the EPCIS event</b> - if an organisation captures an event without an eventID field (which is not required as of the standard) and sends that event to a business partner who needs to assign a unique ID, they can agree that the business partner populates the `eventID` field applying this methodology before storing the event on the server. If the organisation later wants to query for that specific event, it knows how the eventID was created, thus is able to query for it through the eventID value.\nEPCIS events have a couple of differences to other electronic documents:\n+ They are embedded in an EPCIS document which can contain multiple events \n+ As of EPCIS 2.0, it is permitted to capture and share EPCIS data through two different syntaxes (XML and JSON/JSON-LD)\n+ EPCIS events provides ample flexibility to include user-specific extensions \n+ When expressed in JSON/JSON-LD, the sequence of elements may vary\n\nThis is why industry needs to have a consistent, reliable approach to create a hash value that is viable to uniquely identify a specific EPCIS event. \n\nNotice that the algorithm described here provides a way of *hashing* an event. A *signature* scheme can be build using this hash, but the hash by itself does not yield a proof of authenticity/authorship. For example, a man in the middle attack can re-compute the hash after tampering.\n\n## Requirements\n\nFor any algorithm that is to be considered a faithful hash of an EPCIS event, we require the following properties:\n\n+ Different (valid) serialisations of the **same event** need to yield the **same hash**.\n+ In particular, if serialised in XML, the hash must be independend of irrelevant whitespace, ordering of elements in an unordered list, the name used for namespaces, etc. (see e.g. https://en.wikipedia.org/wiki/XML_Signature#XML_canonicalization for more details on the matter).\n+ The same event serialised in JSON/JSON-LD or XML must yield the same hash.\n+ Any relevant **change of an event** must lead to a **change of the hash**. In particular, the hash must change if\n - any value of any field present in the event is changed.\n - a field is added or removed.\n\n\n## Algorithm\n\nFor hashing strings, well-established algorithms such as SHA-256 are available. The focus of this specification is the canonicalization of a *pre-hash string* representation of an EPCIS event, which can be passed to any standard hashing algorithm. \n\nTo calculate this pre-hash string, the algorithm requires to extract and concatenate EPCIS event key-value pairs to one string exactly according to the following set of rules:\n1. For all EPCIS event types, data elements SHALL be extracted according to the *canonical property order* specified below.\n2. All elements SHALL be concatenated without separators between successive elements.\n3. If a field contains a value (i.e. is not a parent element), each value SHALL be assigned its key through an equal sign ('=').\n4. Data elements SHALL NOT be added if they are omitted in a given EPCIS event or do not apply.\n5. Whitespace characters at the beginning or end of values SHALL be truncated.\n6. Quantitative values SHALL NOT have trailing zeros. (For example, a quantity of one SHALL be expressed as '1', and SHALL NOT be expressed as '1.0'; 0.3434 SHALL be expressed as 0.3434, with any trailing zeros truncated.)\n7. Numeric values SHALL be expressed without single quotes.\n8. All timestamps SHALL be expressed in UTC; the zero UTC offset SHALL be expressed with the capital letter 'Z'. \n9. All timestamps SHALL be expressed with millisecond precision. If an EPCIS event lacks the latter, the millisecond field SHALL be zero-filled (e.g., YYYY-MM-DDTHH:MM:SS.000Z).\n10. Strings SHALL be sorted according to their case-sensitive lexical ordering, considering UTF-8/ASCII code values of each successive character.\n11. All child elements as part of a list (e.g. `epc` in `epcList`, `bizTransaction` in `bizTransactionList`, etc.) SHALL be sequenced according to their case-sensitive lexical ordering, considering UTF-8/ASCII code values of each successive character. A field name denoting a list (e.g. `epcList`, `bizTransactionList`, `sensorElementList`) SHALL only appear once in the pre-hash string.\n12. If a child element of a list itself comprises one or more key-value pairs itself (e.g. `quantityElement` in `quantityList`, `sensorReport` in `sensorElement`), the latter SHALL be concatenated to a string (similar to the procedure specified above) and, if they belong to the same level, sequenced according to their case-sensitive lexical ordering, considering UTF-8/ASCII code values of each successive character..\n13. If an EPCIS field comprises a type attribute (e.g. Business Transaction Type in `bizTransaction` or Source/Destination Type in `source`), the type key-value pair (where the key is 'type' and the value the respective type attribute) SHALL follow the actual key-value before the alphabetical ordering takes place. \n14. If present, any URN-based standard vocabulary value (starting with \u2018urn:epcglobal:cbv\u2019) SHALL be expressed in its corresponding CBV Web URI term (starting with \u2018https://ref.gs1.org\u2019).\nExample: \u2018urn:epcglobal:cbv:bizstep:receiving\u2019 --> \u2018https://ref.gs1.org/cbv/BizStep-receiving\u2019\n15. If present, any Compact URI Expression (CURIE) SHALL be expanded to its full URI equivalent. This also holds true for standard CBV values, i.e. with the CURIE prefix expansions \u2018gs1\u2019 (https://gs1.org/voc/), \u2018epcis\u2019 (https://ref.gs1.org/epcis/) and \u2018cbv\u2019 (https://ref.gs1.org/cbv/). Example: \u2018gs1:Temperature\u2019 --> \u2018https://gs1.org/voc/Temperature\u2019\n16. If an EPCIS event is represented in JSON/JSON-LD, standard vocabulary elements are not expressed as URIs, but in bare string notation (i.e. \u2018in_transit\u2019 instead of \u2018https://ref.gs1.org/cbv/Disp-in_transit\u2019). All standard vocabulary elements expressed in bare string notation SHALL be expanded to their corresponding GS1 Web URI (starting with \u2018https://ref.gs1.org/cbv\u2019).\n17. If present, EPC URIs (starting with \u2018urn:epc:id\u2019), EPC Class URIs (starting with \u2018urn:epc:class\u2019) or EPC Pattern URIs (starting with \u2018urn:epc:idpat\u2019) SHALL be converted into the corresponding canonical GS1 Digital Link URI (starting with \u2018https://id.gs1.org\u2019). Canonical GS1 Digital Link URIs are specified in [GS1 Digital Link: URI Syntax, release 1.2], section 4.11.\n18. If a GS1 Digital Link URI is present, it SHALL take the form of a constrained canonical GS1 Digital Link URI. Specifically: (I) A custom domain SHALL be replaced by \u2018https://id.gs1.org\u2019. (II) The query string SHALL be stripped off. (III) It SHALL only contain the most fine-granular level of identification, i.e. contain the following GS1 keys/key qualifiers only: `00 / 01 / 01 21 / 01 10 / 01 235 / 253 / 255 / 401 / 402 / 414 / 414 254 / 417 / 8003 / 8004 / 8006 / 8006 21 / 8006 10 / 8010 / 8010 8011 / 8017 / 8018`\n19. If an EPCIS event comprises `ILMD` elements, the latter SHALL comprise their key names (full namespace embraced by curly brackets ('{' and '}') and the respective local name), as well as, if present, the contained value, prefixed by an equal sign ('='). The resulting substrings SHALL be sorted according to their case-sensitive lexical ordering, considering UTF-8/ASCII code values of each successive character when they are appended to the pre-hash string.\n20. If an EPCIS event comprises user extension elements at event level \u2013 irrespective whether they appear at top level or are nested \u2013 the latter SHALL comprise their key names (full namespace embraced by curly brackets ('{' and '}') and the respective local name), as well as, if present, the contained value, prefixed by an equal sign ('=').\nThe resulting substrings SHALL be sorted according to their case-sensitive lexical ordering, considering UTF-8/ASCII code values of each successive character when they are appended to the pre-hash string.\n21. If an EPCIS event comprises user extension elements as part of an EPCIS standard field with an extension point (namely `readPoint`, `bizLocation`, `sensorElement`, `sensorMetadata`, and `sensorReport`), they SHALL be added at the end of its enclosing parent\u2019s regular fields. Apart from that, they SHALL be added to the pre-hash string similarly as specified in the previous step.\n22. The resulting pre-hash string SHALL be embedded in a 'ni' URI scheme as specified in RFC 6920, as follows:\nni:///{digest algorithm};{digest value}?ver={CBV version}\ni.e. characters 'n', 'i', followed by one colon (':'), three slash characters ('/'), the digest algorithm, one semicolon (';'), the digest value, one question mark ('?'), the characters 'v', 'e', 'r', one equal sign ('='), and the version of the EPCIS Event Hash ID algorithm that was used to generate the pre-hash string, indicated by the CBV version.\n23. The digest algorithm SHALL contain one of the hash name string values as listed in the Named Information Hash Algorithm Registry (see https://www.iana.org/assignments/named-information/named-information.xhtml)\n24. The CBV version SHALL be indicated as follows: the three characters 'C', 'B', 'V', followed by one or several digits indicating the major release version, one dot character ('.') and one or more digits indicating the minor release version. In addition, it MAY be appended with one dot character ('.') and one or more digits indicating a revision of a given CBV standard release, if applicable (i.e. if a revision of the CBV standard specifies an updated version of the EPCIS Event Hash ID algorithm).\n\n### Canonical property order \n\nApplicable for all EPCIS Event Types, i.e. `ObjectEvent`, `AggregationEvent`, `TransactionEvent`, `TransformationEvent` and `AssociationEvent`.\n\n| Sequence | Data Element |\n| -------- | ------------ |\n| 1 | `eventType` |\n| 2 | `eventTime` |\n| 3 | `eventTimeZoneOffset` |\n| 4 | `epcList` \u2013 `epc` |\n| 5 | `parentID` |\n| 6 | `inputEPCList` \u2013 `epc` |\n| 7 | `childEPCs` \u2013 `epc` |\n| 8 | `quantityList` \u2013 `quantityElement` (`epcClass`, `quantity`, `uom`) |\n| 9 | `childQuantityList` \u2013 `quantityElement` (`epcClass`, `quantity`, `uom`) |\n| 10 | `inputQuantityList` \u2013 `quantityElement` (`epcClass`, `quantity`, `uom`) |\n| 11 | `outputEPCList` \u2013 `epc` |\n| 12 | `outputQuantityList` \u2013 `quantityElement` (`epcClass`, `quantity`, `uom`) |\n| 13 | `action` |\n| 14 | `transformationID` |\n| 15 | `bizStep` |\n| 16 | `disposition` |\n| 17 | `persistentDisposition` - (`set`, `unset`) |\n| 18 | `readPoint` \u2013 `id` |\n| 19 | `bizLocation` \u2013 `id` |\n| 20 | `bizTransactionList` \u2013 `bizTransaction` (`business transaction identifier`, `business transaction type`) |\n| 21 | `sourceList` \u2013 `source` (`source ID`, `source type`) |\n| 22 | `destinationList` \u2013 `destination` (`destination ID`, `destination type`) |\n| 23 | `sensorElementList` - `sensorElement` ( |\n| | `sensorMetadata` (`time`, `startTime`, `endTime`, `deviceID`, `deviceMetadata`, `rawData`, `dataProcessingMethod`, `bizRules`), |\n| | `sensorReport` (`type`, `exception`, `deviceID`, `deviceMetadata`, `rawData`, `dataProcessingMethod`, `time`, `microorganism`, `chemicalSubstance`, `value`, `component`, `stringValue`, `booleanValue`, `hexBinaryValue`, `uriValue`, `minValue`, `maxValue`, `meanValue`, `sDev`, `percRank`, `percValue`, `uom`, `coordinateReferenceSystem`)|\n| | ) |\n| 24 | `ilmd` \u2013 `{ILMD elements}` |\n| 25 | `{User extension elements}`|\n\nFor better understanding, the following illustrations include the data content of EPCIS events (including a couple of user extensions - all defined under 'https://ns.example.com/epcis'), show the corresponding pre-hash string as well as the canonical hash value of that event.\n\nExample 1:\n\n![Example 1 for EPCIS event pre-hash computation](docs/hashingAlgorithmLogicIllustration_example1.png)\n\nRun `epcis_event_hash_generator/main.py tests/examples/ReferenceEventHashAlgorithm.xml -pj \"\\n\"` to get a similar output of the pre-hash string and `epcis_event_hash_generator/main.py tests/examples/ReferenceEventHashAlgorithm.xml` to verify the hash.\n\nExample 2:\n\n![Example 2 for EPCIS event pre-hash computation ](docs/hashingAlgorithmLogicIllustration_example2.png)\n\nRun `epcis_event_hash_generator/main.py tests/examples/ReferenceEventHashAlgorithm2.xml -pj \"\\n\"` to get a similar output of the pre-hash string and `epcis_event_hash_generator/main.py tests/examples/ReferenceEventHashAlgorithm2.xml` to verify the hash.\n\nExample 3:\n\n![Example 3 for EPCIS event pre-hash computation ](docs/hashingAlgorithmLogicIllustration_example3.png)\n\nThe line breaks in the pre-hash string are displayed for readability reasons. The actual pre-hash string does not contain any whitespace (unless specifically used in a value) and the lines displayed in the above picture have to be concatenated (by empty string) in order to get the actual pre-hash string.\n\n## Use Cases and Limitations\nThis algorithm has *various potential areas of application*:\n* Primary Key for EPCIS Events\n - populating the eventID field in situations where this is required\n - enabling to independently recalculate the eventID value on the basis of an EPCIS event's intrinsic data\n - indexing EPCIS events in databases\n* Identifying duplicate EPCIS events\n* Matching an error declaration to an original event (see EPCIS Standard, section 7.4.1.4)\n* Notarisation of EPCIS events (i.e. leveraging digital signatures) \n\nThat said, the algorithm has limited applicability when EPCIS events are redacted (meaning that, e.g. for privacy reasons, EPCIS events are not shared entirely, but deliberately omit specific fields or including readPoint IDs with a lesser granularity - see EPCIS and CBV Implementation Guide, section 6.7). In such a case, the content of a redacted EPCIS event will in no case yield to the hash value of the original one.\n\n## References\n* EPCIS Standard, v. 2.0: https://ref.gs1.org/standards/epcis/\n* Core Business Vocabulary (CBV) Standard, v. 2.0: https://ref.gs1.org/standards/cbv/\n* RFC 6920, Naming Things with Hashes, https://tools.ietf.org/html/rfc6920\n* Named Information Hash Algorithm Registry, https://www.iana.org/assignments/named-information/named-information.xhtml\n\n## Acknowledgements\n\nThe following table lists, in alphabetical order of their GitHub profile name, all persons who have contributed to this project so far through:\n- software development (:computer:)\n- maintenance (:construction:) \n- submitting issues (:ticket:)\n- testing (:microscope:)\n- providing advice/feedback/ideas (:bulb:) \n\nAll of this was and is both very valuable as well as very much appreciated and we would like to take the opportunity to express our gratitude for all this valuable support. \n\n| GitHub Profile | Link + Image | Name (if revealed) | Primary contribution |\n| -------------- | --------------------- | -------------------- | -------------- |\n| Aravinda93 | [![](https://github.com/Aravinda93.png?size=50)](https://github.com/Aravinda93) | Aravinda Baliga | :ticket: :bulb: :microscope: |\n| clementh59 | [![](https://github.com/clementh59.png?size=50)](https://github.com/clementh59) | Cl\u00e9ment | :ticket: :microscope: |\n| CraigRe | [![](https://github.com/CraigRe.png?size=50)](https://github.com/CraigRe) | Craig Alan Repec | :bulb: |\n| dakbhavesh | [![](https://github.com/dakbhavesh.png?size=50)](https://github.com/dakbhavesh) | Bhavesh Shah | :computer: :construction: :microscope: |\n| domguinard | [![](https://github.com/domguinard.png?size=50)](https://github.com/domguinard) | Dominique Guinard | :bulb: |\n| Echsecutor | [![](https://github.com/Echsecutor.png?size=50)](https://github.com/Echsecutor) | Sebastian Schmittner | :computer: :construction: :microscope: |\n| mgh128 | [![](https://github.com/mgh128.png?size=50)](https://github.com/mgh128) | Mark Harrison | :bulb: |\n| RalphTro | [![](https://github.com/RalphTro.png?size=50)](https://github.com/RalphTro) | Ralph Troeger | :microscope: :ticket: :computer: |\n| sboeckelmann | [![](https://github.com/sboeckelmann.png?size=50)](https://github.com/sboeckelmann) | Sven Boeckelmann | :bulb: |\n| ShaikDayan | [![](https://github.com/ShaikDayan.png?size=50)](https://github.com/ShaikDayan) | Shaik Dayan | :microscope: :ticket: |\n| tnahddisttud | [![](https://github.com/tnahddisttud.png?size=50)](https://github.com/tnahddisttud) | Siddhant Pandey | :computer: :construction: |\n\n## License\n\n<img alt=\"Open Source Initiative\" style=\"border-width:0\" src=\"docs/OSI.jpeg\" width=\"150px;\"/><br />\n\nCopyright 2020-2023 | Ralph Tr\u00f6ger <ralph.troeger@gs1.de> and Sebastian Schmittner <schmittner@eecc.info>\n\nPermission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the \"Software\"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:\n\nThe above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.\n\nTHE SOFTWARE IS PROVIDED \"AS IS\", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.\n",
"bugtrack_url": null,
"license": "MIT",
"summary": "Exemplary implementation of the EPCIS event hash generator algorithm described in the README",
"version": "1.9.3",
"project_urls": {
"Homepage": "https://github.com/RalphTro/epcis-event-hash-generator"
},
"split_keywords": [
"epcis",
"gs1",
"hashing",
"traceability"
],
"urls": [
{
"comment_text": "",
"digests": {
"blake2b_256": "7388413b8b374f2e9f257262af88738730986c6505d60636f35d6f25382cf990",
"md5": "e9625ec4b533e02e41543daf89f239d2",
"sha256": "4448211501039f88eba68e4df23b908e26e8cc47051e4554825e9711aa3cf3e8"
},
"downloads": -1,
"filename": "epcis_event_hash_generator-1.9.3-py3-none-any.whl",
"has_sig": false,
"md5_digest": "e9625ec4b533e02e41543daf89f239d2",
"packagetype": "bdist_wheel",
"python_version": "py3",
"requires_python": ">=3.6",
"size": 38795,
"upload_time": "2023-05-16T20:32:15",
"upload_time_iso_8601": "2023-05-16T20:32:15.352918Z",
"url": "https://files.pythonhosted.org/packages/73/88/413b8b374f2e9f257262af88738730986c6505d60636f35d6f25382cf990/epcis_event_hash_generator-1.9.3-py3-none-any.whl",
"yanked": false,
"yanked_reason": null
},
{
"comment_text": "",
"digests": {
"blake2b_256": "e90793a7ecef4507ad7dbcb33aa72f11ad33dea0cf68a236553dbc634aaee230",
"md5": "06ba76eeb533e6ffb9fbca53573c0bcc",
"sha256": "2f3d92db629a37e4e3befb3bc25199638527820db48a57b928be2e766a23f06d"
},
"downloads": -1,
"filename": "epcis-event-hash-generator-1.9.3.tar.gz",
"has_sig": false,
"md5_digest": "06ba76eeb533e6ffb9fbca53573c0bcc",
"packagetype": "sdist",
"python_version": "source",
"requires_python": ">=3.6",
"size": 42331,
"upload_time": "2023-05-16T20:32:18",
"upload_time_iso_8601": "2023-05-16T20:32:18.015912Z",
"url": "https://files.pythonhosted.org/packages/e9/07/93a7ecef4507ad7dbcb33aa72f11ad33dea0cf68a236553dbc634aaee230/epcis-event-hash-generator-1.9.3.tar.gz",
"yanked": false,
"yanked_reason": null
}
],
"upload_time": "2023-05-16 20:32:18",
"github": true,
"gitlab": false,
"bitbucket": false,
"codeberg": false,
"github_user": "RalphTro",
"github_project": "epcis-event-hash-generator",
"travis_ci": false,
"coveralls": false,
"github_actions": true,
"requirements": [
{
"name": "python_dateutil",
"specs": [
[
">=",
"2.8"
]
]
},
{
"name": "Flask",
"specs": [
[
">=",
"1.1"
]
]
},
{
"name": "PyLD",
"specs": [
[
"==",
"2.0.3"
]
]
}
],
"lcname": "epcis-event-hash-generator"
}