The Global Language of Business

6.4 Worldwide federation

A fundamental architecture principle of the GS1 system is that each end user retains control over the data it originates. However, certain types of data are logically aggregated across many different end users. An example is master data in the Global Data Synchronisation Network, where each end user can synchronise master data for trade items identified by their Global Trade Identification Number (GTIN), regardless of the originator.

6.3 Data and service discovery

GS1 standards for business data and communication provide the means for two end users to share business data reliably, once they have identified each other. GS1 standards for data and service discovery exist to help end users identify each other.

In general, there are four ways that one end user might identify sources of data owned or maintained by other end users:

6.2 Communication of business data

GS1 standards offer several methods for communication of Business Data between end users. In summary, the methods are:

Push” methods, where one party unilaterally transfers data to another in the absence of a prior request. Push methods may be further classified as:

Bilateral party-to-party push, where one party transfers data directly to another party

5.1 Automatic Identification & Data Capture (AIDC) architecture

The purpose of AIDC data carriers in the GS1 system is to provide a reliable way to automatically capture a GS1 identification key to link to the data held on computer systems as part of a workflow. In addition to the GS1 identification key, AIDC data (e.g., expiration date, weight, sensory data) may also be a part of the workflow. In a GS1 compliant application of AIDC data carriers, a GS1 identification key must always be present.