Nothing Special   »   [go: up one dir, main page]

CN112819503A - Information propagation method based on grid space - Google Patents

Information propagation method based on grid space Download PDF

Info

Publication number
CN112819503A
CN112819503A CN202011139846.5A CN202011139846A CN112819503A CN 112819503 A CN112819503 A CN 112819503A CN 202011139846 A CN202011139846 A CN 202011139846A CN 112819503 A CN112819503 A CN 112819503A
Authority
CN
China
Prior art keywords
information
server
party
interaction
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011139846.5A
Other languages
Chinese (zh)
Inventor
徐蔚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202011139846.5A priority Critical patent/CN112819503A/en
Publication of CN112819503A publication Critical patent/CN112819503A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/01Social networking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0207Discounts or incentives, e.g. coupons or rebates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/565Conversion or adaptation of application format or content
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/566Grouping or aggregating service requests, e.g. for unified processing

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Development Economics (AREA)
  • General Business, Economics & Management (AREA)
  • Finance (AREA)
  • Economics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Accounting & Taxation (AREA)
  • Marketing (AREA)
  • Theoretical Computer Science (AREA)
  • Signal Processing (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Tourism & Hospitality (AREA)
  • Primary Health Care (AREA)
  • Human Resources & Organizations (AREA)
  • General Health & Medical Sciences (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Health & Medical Sciences (AREA)
  • Game Theory and Decision Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to an information transmission method based on a grid space, which is used for issuing information in the grid space concerned by an issuing party and quantitatively evaluating the transmission effect of the information. The invention can access the specific theme based on the scene through various sensing access modes based on the information processing technology of uniform code sending, accurately trace each node of the information transmission process and realize the value quantification and cashing of the digital currency based on the circulation field.

Description

Information propagation method based on grid space
The scheme is a divisional application
The name of the original invention is:
information processing network and method based on uniform code sending and sensing access equipment
Original application No.: 201510649977.0
Application date of the original case: 10 months and 09 days 2015
Technical Field
The present invention relates to an information processing apparatus, a network and an information processing method thereof, and more particularly, to an information dissemination method based on a grid space and a related system and apparatus.
Background
The propagation behavior of information itself has value: taking advertisement as an example, the essence of the advertisement is value conversion of information distribution resources, and the high-price advertisement is necessarily distributed through resources capable of spreading information to more people under the same condition. That is, the more audience objects that can be propagated to, the greater its value. In the traditional advertising means, the information is only distributed, and the subsequent distribution process is completely out of control after the information is distributed.
Each act of propagation contributes power to the final transaction from the time the advertising message is propagated to the time the transaction is ultimately formed. If any information is not forwarded, the information cannot reach the person with the transaction intention, and the transaction cannot be established. Therefore, the act of propagating information has value, and the person performing the act of propagating should ideally acquire this value as a return on his own act. However, such value has not been paid attention to, because there is no efficient and generally applicable technical means for tracing the effective propagation behavior implemented by each propagator in the whole process, it is difficult to reconcile the value of each propagator in the propagation process.
In the direct marketing system, the upstream and downstream relation of each layer is clear, so that the transaction can be conveniently carried out step by step after the transaction is formed. However, the direct marketing system does not have the disadvantage of fully embodying the spreading value, and the direct marketing system must become a member of the direct marketing system to join the spreading network, and create an order as a spreading recipient to directly obtain income to become an occupation. Moreover, the propagation behavior and the submission and issuance under the direct marketing system cannot be verified and implemented by technical means.
The whole process of information from the source of the publisher to the final reception and therefore taking some action must be a link passing through different interpersonal circles, each intermediate link being at the intersection of two or more interpersonal circles. The core of the human network formed in the society is a multi-layer human circle complex (i.e., individuals in different communities) formed by social relationships of different degrees of closeness, such as blood relationship, academic calendar, work, hobbies, and the like, centering on individuals. The interaction and the flow of information in social interaction of people are more dependent on a social network platform of the internet at present besides point-to-point modes such as meeting, telephone, short message and the like.
Although a sufficient amount of information can now be searched for on the internet by means of a search engine, the information that is contacted is not necessarily the information that is required by the user. Moreover, for a general consumer who is not concerned about the internet or the dynamic state of the electronic commerce frontier anytime and anywhere, there is not enough keyword reserve to conduct the next search. Thus, obtaining information in this manner has significant limitations.
Information dissemination through social networks has the following characteristics: on one hand, whether the information is received by the opposite party or further transmitted information is judged in advance to a certain extent by the information publisher and the information transmitter based on the understanding degree of the information receiver in the corresponding community, which is equivalent to that the information transmitter carries out active filtering action to a certain extent, so that the information transmission in the interpersonal circle has stronger directivity. On the other hand, in a stable interpersonal circle, each person usually pays attention to his own speech so as not to have the effect of destroying the current interpersonal relationship. This means that social activities, including information dissemination, are all guaranteed by personal qualifications and social credits. Therefore, through information dissemination through a social network, particularly an acquaintance circle, a propagator can verify the information consciously or unconsciously and guarantee the authenticity of the information as much as possible. The truthfulness and the credibility of the propagation are very high on the premise of not generating the chain cheating. However, the filtering operation like the above is judged and implemented by an individual, and an effective technical means for controlling the authority of the information transceiver is not available, and even if the authority is set, it is difficult to match and verify the actual situation of the information transceiver with the set authority, so that the existing information transmission is not targeted and the effect is not good.
In addition, current social networking information interaction is based on the internet, but the internet has inherent drawbacks: the users of the internet are not real-name, and are presented with the identity recognition that the IP address can be changed at any time, and one person can appear in different roles on the internet. Even if a non-human being (some animals, a smart robot, etc.) performs an operation on the internet through a corresponding terminal, it cannot be discriminated. The non-real-name nature of the internet is the biggest obstacle to commercial operation. Therefore, identity card numbers, home addresses, mobile phone numbers, fixed phone numbers, real names and the like are added to various commercial applications to urge users to fill in more detailed data, but the conversion rate of the users is influenced, and chain reactions in information safety aspects such as personal privacy disclosure are caused.
Moreover, the authenticity of information on the internet is basically impossible to prove as a person, so that a user holds a suspicious attitude on the internet by conscious or unconscious. In the internet-based business model, the business has already spent huge cost to maintain the customer stickiness, and the problem of the quality of goods or services, once repeated investment which causes user loss and marketing cost regardless of authenticity occurs, the so-called e-commerce model/internet thinking model becomes a miszone of money burning and buying flow.
The virtual economy introduced in the internet era is essentially mapping the physical economy into a virtual space, and various consumption demands are met and explored by expanding a new means by utilizing the convenience of a computer terminal and the internet. However, in various internet business models, it is difficult to combine the virtual world with the real world, and the secondary transformation occurs when the mouse is held in front of the computer to start using the internet, i.e. the real physical world is switched to the virtual internet. This virtual experience ends immediately when you drop the mouse off the computer, and returns to the real world. This switch is always present when people are currently doing activities in daily life by using the internet. Due to the defects, the development of the internet economy is restricted, and the internet technology is difficult to cover the traditional industry.
However, human societies dictate that their normal lives are within the physical economy of the under-line circle, and are usually done within a range where the perceived range does not exceed a certain distance centered on the individual. There is a need for a means for associating real-world activities with a virtual world at any time and any place while performing on-site experiences in an online manner (e.g., in a certain store) and finding corresponding resources (e.g., commodity information) from the virtual world. However, an effective technical means for solving the problem is also lacking at present.
The way to access the virtual world in the internet may be to enter a link (URL) in the browser. In the mobile internet, there is a more straightforward and straightforward form: two-dimensional code (dimensional barcode). The two-dimensional code records data symbol information by using a certain specific geometric figure and black and white figures distributed in a two-dimensional direction according to a certain rule. The mobile phone two-dimension code is an application of a two-dimension code technology on a mobile terminal, and can enable a user to quickly access the internet in any real world of networking to a certain extent.
The Chinese patent application with the application number of 200510033918.7 and the application date of 31/3/2005, entitled "mobile terminal shopping method and system thereof", discloses a method and system for realizing mobile terminal shopping by using two-dimensional codes. The mobile terminal shoots the two-dimensional code through a built-in camera and decodes the two-dimensional code, and the mobile terminal sends a payment request message to the payment subsystem and the payment subsystem completes payment.
The chinese patent No. ZL200480005625.1, filed for 2004, 3/8/2004, entitled "method for providing mobile service using code map" discloses a method and system for providing mobile service using code map, and more particularly, to a method and system for providing content providing service, geographic information providing service, product information providing service, taxi calling service, personal contact information providing service, or payment service using two-dimensional code. The mobile terminal photographs and decodes the two-dimensional code through a built-in camera, and the mobile terminal transmits a service provision request message to a service provider server, which provides a service to the mobile terminal by itself or communicates with other servers to provide the service to the mobile terminal.
However, the smart phone, as a main means for on-site perception in the mobile internet, cannot overcome the above inherent defects of the internet. Still another problem that faces at present is that the process of perception of the two-dimensional code by the smart phone is too complicated: at least 6-7 click operations are needed from unlocking a mobile phone screen to opening a two-dimensional code scanning function of an APP (application). Secondly, for a certain two-dimensional code image, common consumers cannot distinguish the corresponding relation between the two-dimensional code and the mobile phone application, so scanning is performed through some public bar scanners, the obtained two-dimensional code analysis results are all web page links, a mobile phone browser is opened after clicking instead of a mobile phone APP capable of executing corresponding functions, and the problems have great influence on use experience. Wearable devices such as google glasses and smart watches are only more portable, but are still a deformed smart phone, and are easy to threaten privacy of other people.
At present, it is difficult to effectively associate or verify the identity of a user with the operation executed by a device such as a smart phone or the real environment where the user is located through the prior art, which is not beneficial to tracing the action of the user such as its implementation and other actions during information transmission, and is also not beneficial to other relatives and friends in the human margin to identify the identity of the user, and also lacks effective measures for an external supervision mechanism to supervise the information, execution operation and the like of the interaction between the user and other users or application servers.
Disclosure of Invention
In order to solve the existing problems, the invention provides an information propagation method based on a grid space, which distributes information in the grid space concerned by a publisher and quantitatively evaluates the propagation effect of the information.
The invention provides an information processing network and an information processing method based on uniform code sending, and applicable sensing access equipment.
In the information processing method based on the uniform code sending, any one of a plurality of interaction parties can be used as a publisher to obtain an encoding medium matched with the information provided by the publisher; any one interactive party can be used as an access person, the coded media are identified through the equipped sensing access equipment, information matched with the identified coded media is obtained, and then information provided by a publisher of the identified coded media is obtained.
In different examples, any one of the interacting parties may act as a publisher only, or an accessor only, or both in different cases. The encoded medium identified when any one of the interacting parties is an access party may be an encoded medium generated based on information provided when the interacting party is a distributor, or an encoded medium generated based on information provided when another interacting party is a distributor.
Any publisher requests to obtain an encoding medium matched with the information provided by the publisher by sending a corresponding code sending request to an interactive party serving as a core manager in a plurality of interactive parties; the core manager receives a corresponding code-sending request, and the encoded media is generated by the core manager or its authorized code-sending authority. In different examples, the code sending mechanism is an encoded media generating unit equipped by a publisher sending a corresponding code sending request, or an encoded media generating unit equipped by other interaction parties than the publisher, or an encoded media generating device of a third party other than the plurality of interaction parties.
Preferably, since the code of the encoded media is obtained by a request to a core manager, generated by the core manager, or the encoded media must be authorized by the core manager even if generated by a code-sending organization, the core manager can uniformly manage the generation of the encoded media.
In various examples, the information provided by the publisher to generate the encoded media includes any one or any combination of the following: the information to be issued by the publisher, the attribute state of an interaction party associated with the publisher, and the information obtained by identifying other encoding media through a sensing access device equipped by the publisher. Then, by identifying a certain encoded medium by the sensing access device, the information corresponding to the encoded medium can be known.
In some examples, the information corresponding to a certain encoded medium may contain only some information items among the above-mentioned several information items; and the other information items can be sent to any interaction party or designated interaction party such as the accessor and the like by corresponding to another coded medium or independently or together with the coded medium corresponding to the information items or not corresponding to the information items.
In some examples, the service information may be included in the information provided by the publisher to obtain the encoded media as one of the information to be published. The service information corresponds to a service provided by an interactive party serving as a service mechanism; the service corresponding to the service information is provided by one service mechanism alone or by a plurality of service mechanisms in cooperation; any one of the interacting parties that knows the service information is, for example, an access party that obtains the service information by identifying the encoded medium, and sends a service providing request to the service organization, so that the interacting party (e.g., the access party) that sends the service providing request or a specified interacting party thereof can obtain the service corresponding to the service information. According to different properties of the provided services, the core manager, the publisher, the interactive party associated with the publisher, the accessor, and the interactive party associated with the accessor can be respectively used as service mechanisms to participate in the process of providing the services, and can also be respectively used as a party for obtaining all or part of the services.
In different examples, the service provided by the service organization or the service information corresponding to the service is matched with the execution condition of the setting operation and/or the set attribute state; the setting operation comprises the operations which are specified to be executed by one or more specified interaction parties in the plurality of interaction parties respectively and independently, or the operations which are specified to be executed by some specified interaction parties in cooperation; the set attribute state is the state of an attribute corresponding to a designated interactive party in a plurality of interactive parties or the superposition of the states of a plurality of attributes, or the superposition of the states of the corresponding attributes of some designated interactive parties.
Preferably, the service information or the specific provision situation of the service may be specified by a service provision policy. For example, it may be provided that the service organization provides the service only when the setting operation is correctly performed by the specified interactive party and/or when the attribute state of the specified interactive party is consistent with the set attribute state; for example, if the service organization has the capability to provide several different services, it may be provided that one of the services is provided in one case and a different one of the services is provided in another case depending on the actual set-up operation execution situation and/or the actual attribute status of the specified interacting party. Depending on the nature of the service, in some examples, the interacting party itself as the service organization may act as (one of) the designated interacting party, and verify whether the executed operation condition and/or attribute status of the interacting party is consistent with the provision of the service providing policy, so as to determine whether to provide the corresponding service.
Any one of the interacting parties has attributes corresponding thereto. The items of the attribute and/or the corresponding states of the attribute items may be included in the information provided by the publisher to obtain the encoded media as one of the pieces of information to be published, or may be used in combination with other pieces of information to be published. Any interactive party can provide the information to other interactive parties by directly sending the attribute state or by distributing the coded medium covering the information corresponding to the attribute state.
Preferably, the details of the attribute adjustment may be specified by an attribute adjustment policy. The attribute of the interactive party satisfies any one or any combination of the following items: the state of one or some attributes of any one interactive party is adjusted along with the state change of another or some attributes of any one interactive party; the state of one or some attributes of any one interactive party is adjusted along with the state change of one or some attributes of the interactive party associated with the any one interactive party; the state of one or some attributes of any interactive party is adjusted along with the execution situation change of the setting operation of any interactive party; the state of one or some attributes of any one interactive party is adjusted along with the execution situation of the setting operation of the interactive party associated with the any one interactive party.
The attribute corresponding to any interactive party is independently recorded and state-adjusted by an attribute management mechanism, or is recorded and state-adjusted by the cooperation of a plurality of attribute management mechanisms; in various cases, the attribute authority may be any one of: the system comprises any one interactive party, an interactive party associated with the any one interactive party, a core manager and third party management equipment except the interactive party appointed by the core manager.
Any one interactive party has one or more pieces of identification information corresponding to the interactive party; each identification information of any one interactive party can be taken as one kind of information to be issued, or can be combined with other information to be issued, and is covered in the information provided by the issuer for obtaining the coded medium. Any interactive party can provide the information to other interactive parties by directly sending the identification information or by distributing the coded medium covering the information corresponding to the identification information. The identification information may be one of the attributes of the interacting party, with the properties described above with respect to the attributes.
Preferably, the identification information can satisfy any one of or any combination of the following: the identification information corresponding to any one interactive party when executing any one operation is used for binding the execution condition of the operation with the interactive party; the any interactive party directly issues after the identification information of the any interactive party is superposed on the information to be issued outwards; receiving an interactive party of the release information, and determining the interactive party providing the release information by identifying the identification information; when any interactive party is used as a publisher, the information to be published outwards is superposed with the identification information of any interactive party, and then is provided to a core manager or an authorized code sending mechanism thereof for generating a corresponding coding medium and publishing the coding medium; the accessor knows the binding relationship between the coding medium and the publisher by identifying the corresponding coding medium.
In some examples, the identification information of any one of the interacting parties can be provided alone or with other attributes or other information. When any interactive party is used as a publisher to send a corresponding code sending request during the execution of the set operation, the information provided by the core manager at the same time at least comprises the identification information of the interactive party and the information for executing the set operation, so that the coded media generated according to the corresponding code sending request are bound with the execution condition of the publisher to the set operation, and the binding relationship can be known by identifying the corresponding coded media.
One of the attributes of any one interactive party is the monetary share of that interactive party, which has the properties described above with respect to the attributes; all or a portion of the monetary share of any one of the interacting parties can be apportioned among the designated interacting parties; the monetary share of any one of the interacting parties is obtained or adjusted via any one or any combination of the following: any one interactive party obtains a matched currency share by mortgage the assets to a core manager or a designated approval mechanism or other designated interactive parties; any one interactive party pays any kind of currency to a core manager or a designated approval mechanism or other designated interactive parties, and exchanges the currency with a corresponding proportion to obtain a currency share; the arbitrary one interactive party obtains the currency share paid by the core manager or the appointed approval authority or the appointed other interactive parties or the currency which is paid to the arbitrary one interactive party and can be exchanged for the corresponding proportion currency share; the designation of the approval authority or other interacting parties is performed by the arbitrary one interacting party, or a core manager, or an interacting party associated with the arbitrary one interacting party. The designation of interacting parties, the manner in which the monetary shares are allocated, etc. may be dictated by the attribute tuning policy associated with the monetary share allocation.
In some different examples, the interactive parties pay monetary shares in order to obtain services offered by the service organization (not limited to obtaining goods, content, rights, etc.); alternatively, the interactive party, in case it performs some operation (especially an operation dictated by the money allocation policy), gets as a reward a share of money paid to it by other interactive parties. The preferred currency, digital, can be easily shared (transferred) between different interacting parties, and can even be used in place of french currency in different regions of the real world.
One attribute of any interactive party is the correlation information of the interactive party and other interactive parties; when the arbitrary interactive party executes the setting operation and/or has the set attribute state adjustment, the attribute management mechanism can adjust the attribute state of the interactive party associated with the arbitrary interactive party according to the associated information. In some examples, an interactive party forms an association between two parties by becoming a registered user of one or more other interactive parties; or, a certain interactive party is correlated with the other interactive party when the interactive party executes the cooperative interactive operation; or the accessor is associated with the publisher by identifying the coded medium; alternatively, certain interactive parties are designated as relevant associated interactive parties by a service organization, or a policy making organization, or a core administrator, etc., and so on.
One attribute of any interactive party is a weight index correspondingly set for the interactive party; the attribute management mechanism can perform matching adjustment on different attributes of the same interactive party or perform matching adjustment on the same attribute of different interactive parties according to the weight index. Taking the allocation of currency shares as an example, the allocation can be adjusted accordingly according to different situations of operations executed by certain interaction parties, or can be performed according to respective situations of operations executed by different interaction parties.
One attribute of any interactive party is the physical world trait corresponding to the interactive party; the physical world trait includes, but is not limited to, corresponding to any one or any combination of the following of the real environment and/or virtual environment in which the interacting party is currently located: time parameter, location parameter, environmental parameter, status of one or some other attribute of the interacting party itself. In some examples, some physical world traits, while not affected by any interactive party (e.g., time) themselves, may be the physical world traits corresponding to the interactive party by performing some action or state by the interactive party or its associated interactive party as a starting point and/or an ending point for metering or measuring the physical world traits. The physical world trait may be obtained from any of the interacting parties, their associated interacting parties, a core administrator, external third parties, etc., as appropriate. The real environment and/or the virtual environment can be divided into a plurality of physical grids according to different physical world characteristics; through the physical world characteristics corresponding to certain interactive party, the interactive method can help the interactive parties to know the real environment and/or virtual environment where the interactive parties are located and know the physical grids where the interactive parties are located.
A core manager formulates or updates an encoding rule and a decoding rule matched with the encoding rule, so that the core manager or an authorized code sending mechanism thereof can generate corresponding encoding information according to the consistent encoding rule and generate a corresponding encoding medium according to the encoding information; the sensing access equipment based on the matched decoding rule can identify the corresponding coded information and the information provided by the publisher from the coded medium. Any party is used as an interactive party of a strategy issuing mechanism, and strategies related to information provided by the issuer are formulated or updated; such policies include, but are not limited to: a service providing policy associated with the service information provided by the publisher and/or an attribute adjusting policy associated with the attribute status provided by the publisher; the policy issuing mechanism appoints and updates the policy, and the policy is matched with the execution condition of the set operation and/or the set attribute state.
In a preferred example, in the policy of the policy issuing organization, the execution logic of the setting operation for one or more interaction parties specified in the plurality of interaction parties is set; enabling the corresponding coding media generated according to the coding rules matched with the strategies to contain instructions for driving the corresponding interaction parties to execute the set execution logic; and the sensing access equipment of the corresponding interaction party identifies the coding medium according to the matched decoding rule to obtain the instruction. Preferably, if a certain accessor is a publisher of the encoded media or a registered user of an interacting party (such as a service organization associated with the publisher) associated with the encoded media, the accessor decodes and analyzes the encoded media through a decoding rule consistent with the encoding rule to obtain a corresponding instruction or information, so that when the accessor is used for information interaction or interaction operation with a specified publisher or an associated interacting party, a closed-loop transaction process which cannot be intervened by an unspecified interacting party outside can be formed, and higher security is achieved.
Preferably, any provider of information or any distributor of encoded media may form an interactive network centered on itself, equivalent to active access to the interactive network. Any kind of information receiver or any kind of coded medium identified accessor can passively access to the interactive network except obtaining the corresponding information.
In some application examples, any one interactive party serves as a first publisher, and when a first code-sending request is sent, the provided information at least comprises identification information of the first publisher, and a first encoding medium generated according to the first code-sending request is obtained; and any other interactive party is used as an access person, the first coding medium is identified through the equipped sensing access equipment to at least obtain the identification information of the first publisher, and the information provided when the second publisher sends the second code sending request at least comprises the identification information of the first publisher and the identification information of the second publisher, so that the second coding medium generated according to the second code sending request is bound with the first publisher and the second publisher, and the binding relation can be known through identifying the second coding medium.
In some application examples, a first self-organizing interactive network taking a first publisher as a center is formed between the first publisher and an interactive party associated with the first publisher; the second publisher accesses the first ad hoc interactive network by identifying the first coding medium, so that the second publisher is associated with the first publisher, and the second ad hoc interactive network which is formed between the second publisher and an interactive party associated with the second publisher and takes the second publisher as the center is integrated with the first ad hoc interactive network; and the second accessor accesses the second self-organizing interactive network and simultaneously accesses the first self-organizing interactive network by identifying the second encoding medium, and realizes association with the first publisher and the second publisher.
In some application examples, the first interactive party and the interactive party associated therewith have an interactive network therebetween; the second interactive party and the third interactive party are respectively accessed to the interactive network and are respectively associated with the first interactive party; the information issued by the second interactive party to the first interactive party comprises any one or any combination of the following items: sharing information, searching request information and seeking help request information; the first interaction party sends the sharing information to a third interaction party in the interaction network; the first interaction party searches reply information related to the search request information in the interaction network according to the search request information, and arranges the reply information to form a search result and pushes the search result to the second interaction party; the reply information is provided to the first interactive party by the third interactive party; and the first interactive party sends the help seeking request information to a third interactive party in the interactive network, and prompts the third interactive party to provide reply information to the first interactive party according to the search request information.
In some application examples, there are a plurality of first interacting parties, each corresponding to the same topic or to a plurality of different topics; the second interactive party is associated with the first interactive party of the corresponding subject by one or some identification information which the second interactive party has; the first interactive party of one theme or a fourth interactive party associated with the first interactive party serve as a first publisher, and the obtained first encoding medium is published to a second interactive party; and after the second interactive party is used as a first access party to identify the information corresponding to the first coding medium, the second interactive party is used as a second publisher to publish the second coding medium generated according to the information provided by the second publisher to the first interactive parties of other subjects.
In some application examples, the first interaction parties of the multiple topics adjust attribute states under corresponding identification information of the second interaction parties associated with the first interaction parties according to the secondary weight indexes; and the core manager receives the attribute states of the corresponding identification information of the second interaction party provided by each first interaction party and comprehensively adjusts the attribute states of all the identification information of the second interaction party according to the comprehensive weight index.
In some application examples, a plurality of second interactive parties are respectively associated with the same first interactive party; the first interactive party sets the execution logic of the operation; operations configured to execute logic comprising any one or any combination of the following: independent operation of each second interaction party, interaction operation among a plurality of second interaction parties, and interaction operation between the second interaction parties and the first interaction party; the first interactive party provides the execution logic for the core manager, so that the core manager or an authorized code sending mechanism thereof contains instructions for driving the first interactive party and/or the second interactive party to execute corresponding operations of the set execution logic in the coded medium generated according to the corresponding code sending request of the first interactive party or the second interactive party; the instructions are obtained by the first or second interacting party by identifying the encoded media through the respective sensory access device.
In some application examples, a plurality of first interaction parties are respectively associated with the same third interaction party, and information interaction between the first interaction parties and a core manager is realized by the third interaction parties in a unified manner; the third interactive party sets the execution logic of the operation; operations configured to execute logic comprising any one or any combination of the following: independent operation of each first interactive party or each second interactive party, interactive operation among a plurality of first interactive parties, interactive operation among a plurality of second interactive parties, and interactive operation between the second interactive parties and the first interactive parties; the third interactive party sets corresponding identification information for the operation of the execution logic, and when the corresponding interactive party executes any step of the operation of the execution logic, the identification information of the operation and the identification information of the interactive party executing the operation are provided for the core manager so that the generated coding medium at least comprises the identification information, and therefore any interactive party can know the execution condition of each step in the operation by identifying the coding medium.
Preferably, any one of the above encoded media can be distributed by the distributor to at least one region where the accessor can discover by any one of the following manners or any combination thereof: the publisher sends the corresponding coding medium to the sensing access equipment of the accessor; the publisher comprises means capable of providing said at least one region by which to publish the corresponding encoded media; the publisher sends the corresponding encoded media to a device capable of providing the at least one region, through which the corresponding encoded media is published.
Preferably, according to the information provided by the publisher, the core manager or the authorized code sending organization generates the matched coded medium, or generates the coded medium and the corresponding hyperlink; the coded medium is any one or any combination of the following: a bar code image generated by the coded information in the form of one-dimensional code, two-dimensional code or multi-dimensional code; an optical dot matrix generated by the coded information in the form of light and dark light or refresh frequency variation or in the form of visible light, ultraviolet light, infrared light or polarized light; the digital sound waves are generated by the coded information in a specific rule or a specific frequency change mode; the sensory access device comprises means capable of identifying the respective kind of encoded media and/or hyperlink.
The sensing access equipment provided by the invention can be used for realizing the information processing method based on the uniform code sending and the functions described in the examples. The interacting party using the sensor access device, while acting as a publisher, an accessor, a core manager, a service authority, a policy issuing authority, a code issuing authority, an attribute authority, etc., in each case, follows the corresponding features described in the above method and examples thereof.
The sensing access device, configured by software, hardware, or a combination thereof, enables implementation of any one or a combination of the following examples:
in some examples, the encoded media is identified by the sensing access device, and information matching the identified encoded media is obtained.
In some examples, the coded media is identified through the sensing access device, the interaction party equipped with the sensing access device is used as an accessor, and the accessor is accessed into an ad hoc interaction network which is built by taking a publisher of the coded media as a center, so that the accessor can interact with the publisher in the ad hoc interaction network or other interaction parties related to the publisher through the sensing access device.
In some preferred examples, the interacting party equipped with the sensory access device is a person of an entity.
In some examples, the sensing access device includes:
acquiring means for acquiring a corresponding kind of encoded media; the obtained coded medium can be decoded by a decoding unit of the sensing access equipment or a decoding unit of other interaction parties to obtain coded information; moreover, the coded information obtained by decoding can be analyzed by a coded information analysis unit of the sensing access equipment or a coded information analysis unit of other interaction parties to obtain information matched with the coded information;
The sending/receiving unit is used for enabling an interaction party provided with the sensing access equipment to interact with other interaction parties; such as but not limited to: for obtaining service, the service providing request is sent and/or corresponding service information, service or service providing certificate is obtained, when the service is used as a publisher, the service providing request is sent and/or corresponding service information is obtained, authorization of generated coding media or self-sending codes is received, any information/coding media are sent or received, a policy required by a specified coding rule is sent or received or a coding rule formulated or updated by a core server or a corresponding decoding rule is received, the attribute state of the interacting party or the related interacting party is sent or received, information interaction is carried out with other interacting parties in the accessed interaction network, corresponding information or data is sent to other components in the sensing access equipment or sent to other interacting parties from the components, and the like; the other interaction parties are provided with matched sending/receiving units; through receiving and transmitting the information and further processing the information by a corresponding module of the sensing access equipment, an interaction party equipped with the sensing access equipment can realize corresponding functions;
optionally, the sensing access device may comprise an input unit for inputting input information involved in the interaction; the input unit can have various forms according to different required input information;
Optionally, the sensing access device may comprise a presentation unit for presenting the content identified from the encoded medium and the content involved in the interaction; the content may be visual, auditory or in any other form.
Optionally, the sensing access device may include an encoding medium generating unit, which generates a corresponding encoding medium according to authorization of a core administrator, and superimposes information provided by an interacting party of the sensing access device in the generated encoding medium.
Optionally, different components of one sensing access device are configured in the same interaction device, or are respectively configured in interaction devices connected by a plurality of signals; the interactive device is a mobile terminal, or a fixed terminal, or a wearable device (including a human body implantation device); the interaction equipment is provided with an internal sensor or is in signal connection with an external sensor so as to acquire the attribute state of the interaction party.
In some examples, a decoding rule matching the encoding rule according to which the core manager or its authorized encoding rule generates the encoding medium is set in the client software; the sensing access equipment decodes the coding medium matched with the coding rule through the client software to obtain corresponding coding information, analyzes the corresponding coding information to obtain parameters contained in the coding medium, and automatically introduces the parameters into the automatically started client software; and for the coding media which cannot be identified, the sensing access equipment automatically installs the decoding client software or updates the decoding rules in the decoding client software, or sends out error prompts.
In some examples, the sensing access device is provided with a collecting unit capable of collecting at least some attribute states corresponding to an interacting party equipped with the sensing access device; examples are, but not limited to: physical world traits, identification information, association information, weight indices, monetary shares, user information of physical people, physical status, and the like.
The interactive party taking the entity as a body is provided with one or more pieces of identification information corresponding to the interactive party; each identification information of the interaction party meets any one or any combination of the following items:
the corresponding identification information of the interaction party when executing any operation is used for binding the execution condition of the operation with the interaction party;
the interactive party directly issues after the identification information of the interactive party is superposed on the information to be issued outwards; the interactive party receiving the release information determines the interactive party providing the release information by identifying the identification information;
when the interactive party is used as a second publisher, the information to be published outwards is superposed with the identification information of the interactive party, and then the information is provided to a core manager or an authorized code sending mechanism thereof for generating a corresponding second coding medium and publishing the second coding medium; the binding relationship between the second encoding medium and the interactive party as the second publisher can be known by identifying the second encoding medium.
In some examples, an interactive party with an entity as a human body has one or more identification information corresponding thereto; each identification information of the interaction party meets any one or any combination of the following items:
the corresponding identification information of the interaction party when executing any operation is used for binding the execution condition of the operation with the interaction party;
the interactive party directly issues after the identification information of the interactive party is superposed on the information to be issued outwards; the interactive party receiving the release information determines the interactive party providing the release information by identifying the identification information;
when the interactive party is used as a second publisher, the information to be published outwards is superposed with the identification information of the interactive party, and then the information is provided to a core manager or an authorized code sending mechanism thereof for generating a corresponding second coding medium and publishing the second coding medium; the binding relationship between the second encoding medium and the interactive party as the second publisher can be known by identifying the second encoding medium.
In some examples, a first self-organizing interactive network taking a first publisher as a center is formed between the first publisher and an interactive party associated with the first publisher; taking an interactive party of the entity man-made body as a first accessor, identifying a first coding medium issued by a first publisher through sensing access equipment, and accessing the first coding medium into a first self-organizing interactive network;
The interactive party taking the entity man-made body also serves as a second publisher to publish a second coding medium; and as another interactive party of the second accessor, identifying a second coding medium by being equipped with another sensing access equipment, realizing association with the second publisher, accessing the second accessor to a second ad hoc interactive network which is formed between the second publisher and the interactive party associated with the second publisher and takes the second publisher as the center, and simultaneously accessing the second accessor to the first ad hoc interactive network, so that the second ad hoc interactive network and the first ad hoc interactive network are integrated.
The information processing network based on uniform code sending provided by the invention can be used for realizing the information processing method based on uniform code sending and the functions described in the examples. The information processing network has a plurality of interacting parties, including:
the core manager automatically generates a coding medium matched with the code sending request according to the received code sending request or authorizes the code sending mechanism to generate the coding medium matched with the code sending request after verifying the authority of the code sending mechanism;
any interactive party as a publisher sends a code sending request to a core manager and provides information, and obtains an encoding medium which is generated by the core manager or an authorized code sending mechanism and matched with the provided information;
The method comprises the steps that as any interaction party of an access person, the sensing access equipment is equipped to identify the coded media distributed in at least one area where the access person can find out, information matched with the identified coded media is obtained, and then information provided by the distributor of the identified coded information is obtained.
Preferably, any provider of information or any distributor of encoded media may form an ad hoc interactive network centered on itself, which is equivalent to active access to the ad hoc interactive network. Any kind of information receiver or any kind of coded medium identified accessor, besides obtaining the corresponding information, can also passively access to the self-organizing interactive network.
Wherein any one of the interacting parties, in different cases, when acting as a publisher, an accessor, a core manager, a service organization, a policy issuing organization, a code sending organization, an attribute management organization, etc., follows the corresponding features described in the above method and examples thereof. Wherein, for example, the sensing access device equipped as the interacting party of the accessor can be realized by using the sensing access device described above.
In some examples, any one interactive party contains the necessary components and optional components:
The essential components include: the sending/receiving unit is used for interacting with other interaction parties and interacting with other units of the background server;
the optional components comprise any one or any combination of the following:
a sensing access device;
the built-in or external database stores various information data in the interaction process;
a decoding unit for decoding the encoded medium obtained by the interacting party to obtain encoded information;
the coding information analysis unit is used for analyzing the obtained coding information to obtain information matched with the coding information;
the input unit is used for inputting input information related to interaction;
a presentation unit for outputting the content identified from the encoded media and the content involved in the interaction;
a generation unit of the encoding medium for generating the encoding medium according to the authorization of the core manager;
the sending/receiving unit is used for sending a code sending request to a core manager and receiving a generated coding medium; and further for distributing the obtained encoded media to at least one area discoverable by the accessor;
the sending/receiving unit is used for receiving the authorization which is sent by the core manager and allows the code sending mechanism to generate the coding medium by itself; thereby generating the coded medium by the coded medium generating unit of the code sending mechanism according to the authorization of the core manager;
The necessary components of the interaction party as the policy issuing authority further include: the access definition unit is used for making or updating the strategy related to the information provided by the publisher and sending the strategy to the core manager through the sending/receiving unit of the strategy publisher;
the sending/receiving unit is used as an interactive party of the core server and is used for receiving a code sending request sent by a publisher or sending a generated coding medium to the publisher or a specified interactive party of the publisher; the necessary components of the interactive party as the core server also include: the coded media generating unit is used for generating matched coded media from the information provided by the publisher;
optional components as interaction parties of the core server include any one or any combination of the following:
the verification unit is used for verifying whether a code sending mechanism specified by a code sending request has the authority of generating the coding medium by self according to the code sending request of the publisher; when the appointed code sending mechanism has the authority of generating the coding medium by itself, the sending/receiving unit of the interaction party as the core server sends authorization allowing the appointed code sending mechanism to generate the coding medium by itself;
and the rule management unit is used for making or updating the coding rule and the decoding rule matched with the coding rule according to the strategy provided by the strategy release mechanism.
For example, when any interactive party is a publisher, an access, a core manager, a service organization, a policy issuing organization, a code sending organization, an attribute management organization, etc., its configured components may be disposed in a corresponding server, or disposed in a mobile terminal, or a fixed terminal, or a wearable device (including a human body implanted device), etc.
In some examples, any interactive party can be provided with disclosure rights for any information it receives and/or transmits, the disclosure rights defining conditions when receiving and/or transmitting information; some of the conditions include the attribute status of the arbitrary one interacting party, or the attribute status of the other interacting parties.
In a preferred example of the present invention, the present invention provides a "mobile terminal/wearable device" configured to have access to a "digital people network", which is a social networking hierarchy that contains a corresponding dynamic social status/social prestige index based on nodes under a particular topic, and contains social attitudes/openness (to select which topic to receive, which friends to select open (e.g., a friend, or a friend that allows a friend, or how many friends the social prestige index reaches) to access, no matter how many degrees he is); the other main characteristic is the access of the scene (environment), and the acquisition and uploading of the parameters related to the accessed scene are carried out; the access mode can be various sensing accesses, such as various 'digital signal propagation receiving' modes of light-substituted electricity (one-dimensional codes, two-dimensional codes, multi-dimensional codes, invisible two-dimensional codes and the like), sound waves, Bluetooth, brain waves and the like, and is realized through a generating device and an identifying device which are matched.
In a preferred example of the present invention, the behavior of human (physical person) may have "subjective code scanning access" and "passive code scanning access", that is, perform access behavior by itself or interact with others performing access behavior; the "access" is that no matter what media coded by a certain set rule are seen, heard and received in the real world, the media are identified by a corresponding rule and relevant actions are executed, the effect generated by the "access" does not simply represent the "object itself", but a "specific theme" is generated based on a specific "scene", the theme can be predefined, or triggered based on a certain condition, for example, the "popularity index accessing to socialized search of the accessed person" is included, so as to complete the "judgment" by itself, and a behavior capable of being quantized to generate popularity index change to the propagation chain of the social network is generated, or a behavior to generate the popularity index change to itself is made.
For the digital human network with the characteristics, if a monkey or a robot wears the sensing access equipment, no actual visual effect occurs, because the digital human network is different from a human being which has various human index and social circles capable of generating different access effects based on environment, time, user attributes and the like, and the monkey or the robot does not have the actual visual effect; this is a fundamental distinction between humans and animals as well as robots.
The means of the "sensing access" is not only that the entity person has the digital personal attribute characteristic and can solve the operation action characteristic of the "digital person" by the "configuration of the sensing access equipment", but also that the "equipment" has various "digital person" attributes described above and in the embodiments, even when the human body and the brain are implanted into the "nano organ/nano chip" which can play the role of the sensing access equipment, the "sensing access" means can be further attached with the attribute of the manufacturer so as to have the "personalized attribute" to connect with each interactive party and complete the attribute change, for example, the equipment of one manufacturer, a large affiliated hospital, has the "mental stability/emotional stability personality" and the like, and the equipment of another manufacturer, a university affiliated hospital, has the "personality" intelligence "and the like. This can be used to describe "personality attribute differentiation in the semi-human semi-machine era when a large number of machine organs are formed instead of human organs.
The digital person can recognize the digitally coded signal through a device with sensing access capability to perform sensing access, for example, to scan a two-dimensional code, so that an O2O mode from offline to online is realized, and the digital person is connected to a cloud service background. Superimposing the unique ID of the digital person (and various accessory attribute information) into the newly opened digital person information can generate another new 'digital person information' with the same content but different ID for identification; even if the behavior is not propagated, the behavior can be recorded in the background so as to belong to 'structured big data', and the 'own social attitude' is shown to the world: open message read ".
The digital person can share new digital person information to own friend circle or send point-to-point to friend on the basis of the superposition of own ID, and further express own attitude. The coded information, which is added with the information of the user and sent out again, is communicated with other people who are accessed by the sensor, so that the basis of the value of the human society is formed.
That is, by identifying the digital person ID superimposed on each piece of information (particularly, information that is widely spread many times), it is possible to identify the digital person who performs the operation such as each information sharing, and thus it is possible to trace back to each stage of the spreader in the entire process. And, through the "price scale" that can be quantified digitally, namely "digital currency" that can actually circulate, realize the reward to the propagator. The conventional generation of money such as bitcoin is not based on the labor and value of human society, but only artificially limits the quantity and the mining process, and cannot play the role of digital money. The digital currency is generated based on 'surplus value in the circulation field', belongs to a 'value system of circulation sharing links', has a 'digitalized, detachable, traceable and quantifiable' measuring standard, and can become a 'general equivalent' to serve as an expression form of the value of any commodity.
Just through this kind of mode, can make the value of information dissemination redeem to drive the enthusiasm that people participated in with the benefit, realize real social electricity merchant. The social e-commerce considered by the applicant is a business model which takes an online social network as an information propagation channel, realizes accurate tracing of a propagation process through background processing, and helps publishers to harvest and forward rewards by taking the propagation channel as a basis. In this business model, it is not important what goods to sell, as the value generation comes from the publisher's setting, provided that he thinks the spread can bring benefits to him and he is willing to give a part of the profit. The nature of socializing merchants is not touched by the value created by not using social networks, not transferring the focus to the dissemination itself. In our socialized e-commerce model, the standardized goods can be used as the propagation ontology for services and information which do not belong to the traditional commercial retail, such as member recruitment, hunting recruitment, recruitment and the like. In the social e-commerce mode, the publisher, or the final beneficiary who propagates the information to the demander, can decide whether to pay the price for the propagation behavior forming the transaction according to the expectation value of the mode. By distinguishing the ID of the propagator and knowing the attribute characteristics of the propagator corresponding to the dynamic social status/social hope index adjusted according to the action, the ID is used as a basis for judging the credibility of the propagation information of other people or setting the open attitude of the information to be transmitted and received.
The information is processed through the processes of acquisition, identification, transmission, processing and storage. The method is characterized in that a mobile terminal such as a mobile phone is used for scanning and reading digital coding media such as the two-dimensional code, and the like, so that the method is a simple action which can be completed by a person in the real world at will, and is an instruction for requesting the virtual world to acquire the online resource represented by the two-dimensional code. The smart phone integrates the code reader, the communicator, the processor and the display, can capture the two-dimensional code, acquire and display online information, can continue to be linked with online cloud service to perform subsequent operation interaction, and is equivalent to that the sense organ and the limbs of a person extend into a virtual world.
Digital coding media such as two-dimensional codes can exist as entity marks of merchants, commodities and services, a plurality of offline entity worlds formed by two-dimensional codes marked with certain entity resources in reality and online virtual worlds generally formed by information related to the two-dimensional codes associate scenes and individuals in the real world with data in the virtual worlds through the two-dimensional codes. The two-dimensional code has enough information capacity (can further cover coding information corresponding to complex action execution instructions), replaces webpage links, and becomes a key for entering the virtual world.
An effective means of "sensory access" is "visual and auditory, etc., that a human wears a wearable device including an implanted chip," access in a digital personalized manner with a unique digital ID and through a cloud background service for sensory access, "and does not generally include" analog access through a matching database for biometric identification such as fingerprint identification.
The fundamental difference between wearable devices and human eyes is that there is no need for wearable devices to be able to collect all light signals like eyes. As a bridge for connecting the real world and the virtual world, the function of acquiring the digital coding medium (such as scanning the two-dimensional code) is basically satisfied (that is, the above-mentioned function of realizing "sensing access"). Therefore, the wearable device is mainly used for acquiring the unit module of the coding medium, for example, a camera for scanning the two-dimensional code is arranged on the glasses device, the wearable device can be matched with the sight to patrol all around to quickly capture the visible or invisible two-dimensional code on the entity resource, and the whole process can be completed within 1 second. The two-dimensional code is subsequently transmitted to bound (own) mobile phones and other devices for analysis, and subsequent operations are executed on the mobile phones according to the process described above, so that the speed of people perceiving the virtual world is improved to a degree comparable to that of normal visual perception. Further processing the two-dimension code analysis result by setting a corresponding APP (application) for automatically opening the two-dimension code on the mobile phone; by finding out the characteristic characters associated with a specific APP, the APP is automatically opened or the downloading of the APP is prompted. If can cooperate with the APP trade company, acquire the parameter in the two-dimensional code, can also directly open behind the APP directly import parameter and jump to certain function page, further shorten the processing procedure. Of course, with the development of technology, it will become possible to perceive digitally encoded information in ways other than vision, such as personal portable light screens (optical touch), brain wave holographic helmets, and the like.
In the invention, because the code sending process of all important coding media is uniformly managed through a core server and the like, the execution flow designed for each party can be controlled firstly; secondly, when each party executes the specific operation specified by the flow, the corresponding unique identification ID is bound, so that the correct execution of the flow can be supervised.
Drawings
Fig. 1 is a schematic flow chart of a unified code sending based information processing method according to a first embodiment of the present invention;
FIG. 2 is a flowchart illustrating a unified code-sending-based information processing method according to a second embodiment of the present invention;
FIG. 3 is a partial flow diagram of another embodiment of the information processing method shown in FIG. 2;
FIG. 4 is a partial flow diagram of yet another embodiment of the information processing method shown in FIG. 2;
FIG. 5 is a flowchart illustrating a unified code-sending-based information processing method according to a third embodiment of the present invention;
FIG. 6 is a flowchart illustrating a unified code-sending-based information processing method according to a fourth embodiment of the present invention;
FIG. 7 is a partial flow diagram of another embodiment of the information processing method of FIG. 6;
fig. 8 is a flowchart illustrating a unified code-sending based information processing method according to a fifth embodiment of the present invention;
Fig. 9 is a flowchart illustrating a unified code-sending-based information processing method according to a sixth embodiment of the present invention;
FIG. 10 is a schematic structural diagram of a unified code-sending based information processing network according to a seventh embodiment of the present invention;
fig. 11 is a schematic structural diagram of an information processing network based on uniform code sending according to an eighth embodiment of the present invention;
fig. 12 is a schematic structural diagram of a unified code-sending based information processing network according to a ninth embodiment of the present invention;
fig. 13 is a diagram showing an exemplary configuration of a mobile terminal of a uniform code transmission based information processing network according to a ninth embodiment of the present invention;
fig. 14 is a diagram showing an exemplary configuration of a backend server in the ninth embodiment of the present invention;
fig. 15 is a schematic diagram of an exemplary structure of a core server in a ninth embodiment of the present invention;
FIG. 16 is a schematic structural diagram of a Unicode-based information processing network according to a tenth embodiment of the present invention;
FIG. 17 is a flowchart illustrating a unified code-sending based information processing method according to an eleventh embodiment of the present invention;
fig. 18 is a schematic structural diagram of a unified code-sending based information processing network according to a thirteenth embodiment of the present invention;
FIG. 19 is a schematic structural diagram of a Unicode-based information processing network according to a fourteenth embodiment of the present invention;
Fig. 20 and 21 are schematic overall structures of a unified code-sending based information processing network according to a fifteenth embodiment of the present invention;
fig. 22 is a schematic diagram of an exemplary flow of a unified code-sending-based information processing method in a fifteenth embodiment of the present invention;
fig. 23 and fig. 24 are schematic flowcharts of a unified code-sending-based information processing method according to a sixteenth embodiment of the present invention;
FIG. 25 is a diagram showing an exemplary structure of a unicode-based information processing method according to a seventeenth embodiment of the present invention;
fig. 26 is a diagram illustrating another exemplary structure of a unicode-based information processing method according to a seventeenth embodiment of the present invention.
Detailed Description
The conception, the specific structure and the technical effects of the present invention will be further described with reference to the accompanying drawings to fully understand the objects, the features and the effects of the present invention.
Example 1
Referring to fig. 1, the present invention mainly relates to interaction among a core server, a background server, and a mobile terminal, and servers of other third parties are configured according to actual application conditions.
In step S101, the background server sends a request to the core server to request to obtain a two-dimensional code corresponding to a service provided by the background server.
In step S102, the core server receives the request, and according to the service provided by the background server, the core server generates corresponding encoding information from the information related to the service according to a predetermined encoding rule, and then generates a corresponding two-dimensional code from the encoding information, and sends the two-dimensional code to the background server.
In step S103, the background server issues the two-dimensional code to a place where the user of the mobile terminal can contact. For example, the two-dimensional code may be distributed on a web page or application software of the internet, such as a microblog, a WeChat, a QQ application, and the like, and may also be distributed on a variety of information platforms such as a sales catalog, a screen for television shopping, building advertising media, posters, walls of a physical store, a show, and the like, or may be directly transmitted to the mobile terminal.
In step S104, the user registers as a registered user of the backend server through the mobile terminal, and the mobile terminal sends registration information to the backend server, where the registration information at least includes information (referred to as unique identification information) capable of uniquely identifying the mobile terminal or uniquely identifying the user.
The unique identification information is, for example, an IMEI number or a SIM card number unique to the mobile terminal, or a physical address of an interface of the mobile terminal, or an identification number, a telephone number, and the like of the user. The registration information may further include other personal information such as user name, password, address, hobbies, QQ number, payment account, etc., or other information required by the background server or the core server.
In step S105, the background server stores the registration information of the user, sends a registration success message to the mobile terminal, and notifies the core server by the background server or the mobile terminal, so that the core server records the associated information indicating that the user becomes a registered user of the background server.
In step S106, the user identifies the two-dimensional code through the mobile terminal and decodes the two-dimensional code to obtain encoded information corresponding to the service information. For example, the two-dimensional code is photographed by a camera provided in the mobile terminal and then decoded. The camera is generally 30 ten thousand pixels or more than 30 ten thousand pixels, and can ensure the definition of the two-dimensional code. When the camera aligns the two-dimensional code and the two-dimensional code is clear enough on the viewing screen, the camera can shoot the two-dimensional code automatically.
In step S107, the mobile terminal parses the encoded information, extracts the stored service information from the backend server, and displays information related to the provided service on a display screen of the mobile terminal for a user to view.
In step S108, the mobile terminal sends a service providing request to the backend server to request the backend server to provide the service. The service providing request includes at least information for uniquely identifying the mobile terminal or the user, which is consistent with or matched with the unique identification information included in the registration information, so that the background server can identify the mobile terminal or the user.
In step S109, the background server provides the corresponding service to the mobile terminal according to the content of the service providing request, and notifies the core server. In another example, it is also possible that the mobile terminal informs the core server about the fact that it has obtained a service.
In step S110, the core server is a background server and its registered user or a mobile terminal of the registered user, and is provided with respective corresponding accounts for performing calculation processing on one or more attributes of the core server. The background server, the registered user or the mobile terminal thereof can inform the core server of recording or adjusting the attribute in the account of any operation which is implemented by the background server, the registered user or the mobile terminal thereof and meets the preset condition.
In this example, the core server may perform an operation of the user, for example, in S107, extracting service-related information from the backend server by decoding and parsing the two-dimensional code through the mobile terminal, and performing attribute adjustment on the account of the user or the mobile terminal thereof. For another example, the core server may perform attribute adjustment on an account of the user or the mobile terminal thereof with respect to an operation of requesting and obtaining a service by the user; or further performing attribute adjustment on the account of the background server for the background server according to the operation of providing the service. Since the core server records the associated information of the background server and the registered user thereof, the attribute of the interaction operation can be adjusted correspondingly according to the notification of any one of the S109. Or, assuming that the core server does not originally record the association information of the two, it is also possible to cover all the related interaction party information (such as the background server and the mobile terminal of the user) in the notification of the core server from a certain party, and the core server performs corresponding adjustment of the attributes of each party according to the interaction party information in the notification.
In different application cases, a change in one or some attributes (e.g., contribution or liveness, etc.) of a user account may be used to affect a change in other attributes (e.g., currency or point balance) of the user; alternatively, the user may obtain different services from the backend server, which are respectively provided for different values, by using different values of a certain attribute in the account, and so on. Each party may send a request to the core server to query the attribute values of itself or related parties (e.g., the background server may query its own attributes or query the values of the attributes of its registered users, the user may query the attributes of itself or other registered users of the background server or the server providing the service, and the right to query the attribute information may be agreed in advance).
According to different preset conditions, in different application examples of step S110, the operation that can be recorded by the core server to adjust the attribute in the account may be an operation performed by the backend server or the registered user, or an interactive operation between the backend server and the core server, the third-party server, another backend server, or another mobile terminal. The core server is informed by any party performing or participating in the operation to make record adjustments in the respective account according to the performed operation.
Which operations can be recorded or the attributes can be adjusted, or which attributes are attributes that can be adjusted, or the adjustment mode or the adjusted value of the attribute corresponding to each operation, or the influence caused by the adjustment of the attribute, or which party has the authority to query the attribute, etc., are specifically specified in the preset conditions. The preset condition may not inform the user or the related parties of the knowledge; the user or the relevant parties can also be informed in advance or during the interaction in various ways: for example, the service related information is directly provided to the user when the user registers, or is distributed together when the two-dimensional code is distributed, or is directly coded into the coded information of the two-dimensional code and is displayed together when the service related information is extracted through decoding or parsing, and the like.
The relevant steps of the above embodiments may be modified to adapt to different applications: for example, in another example of generating the two-dimensional code (as in step S102), when the core server receives a request that the backend server requires to obtain the two-dimensional code, the core server sends a predetermined encoding rule to the backend server through checking the two-dimensional code generation qualification (code sending qualification) of the backend server and authorizes the backend server to generate the two-dimensional code by itself.
The coding rule can be that the core server receives a request for generating the two-dimensional code and then sends the request to the background server; or when the background server registers an account recording attributes at the core server, the background server obtains the current coding rule from the core server and stores the current coding rule in the background server, and generates the two-dimensional code according to the stored coding rule when receiving an authorization instruction that the core server agrees to generate the two-dimensional code by itself after sending the request; or, when the core server sends the authorization instruction, the core server may send the updated encoding rule to the background server to replace the originally stored version, and the background server generates the two-dimensional code according to the updated encoding rule.
The encoding rule is set to be in a read-only mode for the background server, namely the background server can generate the two-dimensional code by using the received encoding rule through authorization, but cannot modify the encoding rule by itself. The operation of formulating and updating the coding rule or issuing the coding rule to an authorized party generating the two-dimensional code can be only carried out by the core server. When the background server needs to change the relevant items (such as the type or content or setting conditions of the provided service, the preset conditions of attribute change, the reward strategy and the like) in the service providing process, the core server is informed to update the encoding rule before the items actually occur, and the two-dimensional code required to be generated in the subsequent operations can be generated according to the updated encoding rule and can be decoded and analyzed only by the decoding rule matched with the update.
Alternatively, in another example of generating the two-dimensional code (for example, in step S102), when the core server receives a request that the backend server requires to generate the two-dimensional code, the core server may send the current latest encoding rule (which may be a predetermined encoding rule or an updated encoding rule) to the third-party generating device, and after authorizing the third-party generating device to generate the two-dimensional code, directly send the two-dimensional code to the backend server or forward the two-dimensional code to the backend server through the core server. The third party generating device is also unable to modify the encoding rules.
In addition, except for the step S102 in which the background server requests generation of the two-dimensional code corresponding to the service provided, in the subsequent steps, both the background server and the mobile terminal can request and obtain the two-dimensional code corresponding to the information to be transmitted, which is generated by the core server or an authorized party thereof according to the current latest encoding rule, from the core server for the information that needs to be transmitted to the external parties, so that the parties can identify the two-dimensional code based on the matched decoding rule to obtain the information transmitted by the background server or the mobile terminal. For example, the registration information and the service providing request sent by the mobile terminal to the background server, the registration success message and the service information sent by the background server to the mobile terminal, and even the specifically provided service content, can request the core server or the authorized party thereof to generate the corresponding two-dimensional code, and then send the two-dimensional code to the corresponding information receiving party. Because the security of two-dimensional code is high, contain the information in the two-dimensional code and transmit, do not need to encrypt and decrypt and can guarantee the security too.
If the background server or the mobile terminal requests the core server to generate the two-dimensional code and obtain the authorization of the core server at the initial stage of a certain interactive process, the background server or the mobile terminal can also encode the related information which is notified to the core server by the background server or the mobile terminal, generate the corresponding two-dimensional code and send the corresponding two-dimensional code to the core server.
If the interaction information that the background server or the mobile terminal needs to send to the outside at a certain time of the process corresponds to the operation performed at the current time (for example, payment information needs to be sent to the outside at the payment stage), when the background server or the mobile terminal requests the core server to obtain the corresponding two-dimensional code or requests to obtain the authorization of sending the self-code, it is equivalent to inform the core server of the operation performed by the core server, so that the core server can conveniently adjust the attribute in the account without sending a notification message to the core server.
When any two-dimension code is generated in the interaction process, a hyperlink can be generated at the same time, so that the information contained in the hyperlink is the same as the information contained in the two-dimension code. And after obtaining the generated two-dimensional code and the corresponding hyperlink, the background server can directly send the two-dimensional code and the corresponding hyperlink to the mobile terminal. The hyperlink and the two-dimensional code can be respectively displayed on the same page sent to the mobile terminal; or the hyperlink is invisible and attached to the two-dimensional code or other media such as characters, pictures, video multimedia and the like. The user can take a picture of the two-dimensional code through the mobile terminal, or click on the hyperlink (or click on the two-dimensional code or the propagation medium attached with the hyperlink) to extract the contained coding information, and then analyze and obtain the information related to the provided service.
The implementation sequence of some steps may not be limited by the implementation sequence described above, for example, the operation of performing user registration in step S104, or the operation of recording the associated information between the user and the background server by the core server in step S105, and the corresponding implementation sequence may be adjusted in different application cases, for example, before any one of steps S101 to S103 is performed, the operation of performing user registration and notifying the core server of recording the associated information may be performed; for another example, the user may be registered and the core server may be notified to perform recording while the relevant request is transmitted to the background server in step S107 or S108.
In addition, the user may also adopt other modes to send the registration information to the background server instead of the mobile terminal, so as to become the registered user of the user. For example, the background server automatically identifies some unique identification information (e.g., unique IMEI number, SIM card number, or physical address of the interface of the mobile terminal) of the mobile terminal when receiving a service providing request or other request sent by the mobile terminal, so as to perform user registration. For another example, the user directly provides the registration information to the operator of the backend server in the form of paper, mail, etc. to perform user registration.
In some examples, the user does not register with the backend server, or after the two-dimensional code is identified, the service or feedback information provided by the backend server is obtained by directly sending a request to the backend server, and the notified core server records or adjusts the attribute of the corresponding operation.
In addition, the backend server, the user or their mobile terminal can register with the core server to become a registered user of the core server in a similar manner as the user registers with the backend server, so that the core server sets an account for each of them to record the attributes. For another example, the core server may also require the background server to send the unique identification information of the background server to verify the identity of the background server, so as to determine whether the background server is a background server meeting the specification; the core server may be set to provide services only to the back-end servers that are compliant with the specification (e.g., an authorization indication to generate the two-dimensional code or to send the two-dimensional code itself, such as to record a change in an attribute, etc.).
Depending on the type of service provided (e.g., in step S109), the backend server may provide the service to the mobile terminal alone, or the backend server may need to cooperate with other backend servers or third-party servers to provide the service to the mobile terminal. For example, if the content is a content providing service, the content providing service can be completed independently as long as the background server has enough content information; if the payment service is adopted, the background server has corresponding functions and can directly complete payment transaction, otherwise, the background server may need to be matched with other payment servers, bank settlement platforms and other third-party servers to complete payment.
Or, depending on the content of the service provided, the object of the service finally obtained from the backend server based on the service providing request sent by the mobile terminal may be not the mobile terminal, but the backend server itself, a third-party server, a core server, another backend server, another mobile terminal, or the like.
When receiving the service providing request, the background server may first determine whether a set condition is satisfied, and provide the service to the mobile terminal only when the condition is satisfied. This step may be optional rather than mandatory, depending on the application. The set condition may be an active condition that can be satisfied after one of the core server, the background server, the user, or the mobile terminal performs the corresponding operation by itself or in cooperation with other parties (for example, the user completes payment of a fee, or a value of a certain attribute of the user meets a requirement, etc.), some external passive conditions that are not affected by the operation of the parties (for example, a certain time and a certain date are reached), or a condition that combines the active condition and the passive condition, etc.
In general, unless the corresponding features are stated to be excluded in the following embodiments, the features described in the present example (including but not limited to user registration, account opening, generation and release of various two-dimensional codes and/or corresponding hyperlinks, service provision, attribute adjustment, and the like) in relation to the definition, the interaction process, and the variant examples thereof may be applied to the following other embodiments.
Example 2
A plurality of examples for purchasing goods with payment based on the information processing method of sending codes in a unified manner are provided below, as shown in fig. 2, the examples mainly relate to interaction among a core server, a background server and a mobile terminal, and servers of other third parties are configured according to actual application conditions.
In step S201, a backend server provides a service for selling goods, and the backend server sends a request to a core server to obtain a two-dimensional code corresponding to the sold goods.
In step S202, the core server, or a backend server or a third-party generating device authorized by the core server encodes the commodity information of the commodity according to the current latest encoding rule, and generates a two-dimensional code corresponding to the commodity information.
The commodity information may include commodity codes, commodity groups, geographical GIS classification information, transaction prices, sales organizations, sales channels, payment methods, payee bank accounts, third party payee accounts, and other commodity-related information.
In step S203, the backend server obtains the two-dimensional code of the commodity and issues the two-dimensional code to various information platforms.
In step S204, the user of the mobile terminal registers as a registered user of the background server, and the background server stores the registration information of the user and sends a registration success message to the mobile terminal; and the core server records the associated information of the mobile terminal and the background server according to the notification of the mobile terminal or the background server so as to carry out attribute adjustment according to the operation meeting the set conditions.
In step S205, the two-dimensional code of the commodity is photographed by a camera in the mobile terminal, and the photographed two-dimensional code is decoded to obtain encoded information corresponding to the commodity information.
In step S206, the encoded information is analyzed to determine whether the two-dimensional code is generated according to a predetermined encoding rule: if the two-dimensional code is generated according to a preset coding rule and indicates that the information in the two-dimensional code corresponds to the commodity information provided by the background server, the subsequent steps of the method are continuously executed. If the two-dimensional code is not generated according to the preset coding rule, namely the two-dimensional code corresponds to goods or services which may be provided by other merchants, an error message is prompted, or a webpage which can be linked to the corresponding webpage of the goods or services of other merchants or the link of the webpage is provided for the mobile terminal, or other set webpages are provided, and then the subsequent steps of the method are not executed continuously.
In step S207, the commodity information is extracted from the background server according to the encoding information and displayed on the display screen of the mobile terminal for the user to view.
In step S208, if the user is satisfied with the goods, a purchase request message is transmitted to the background server through the mobile terminal. The purchase request message includes unique identification information of the mobile terminal (e.g., one or more of a telephone number, an IMEI number of the mobile terminal, a user name, and a physical address of an interface of the mobile terminal), and may also include other user information. The purchase request message also includes transaction information such as purchase amount, payment method, etc.
In step S209, the backend server generates an order from the received purchase request message.
In step S210, the background server sends a payment request message to the payment server of the third party. The payment server may be a payment server of a bank, a payment server of a mobile operator, a payment server of a payment instrument, etc.
In step S211, the payment server processes the payment, completes the payment for the goods, and sends a payment success message to the background server.
In step S212, the background server sends a payment success message to the mobile terminal, and displays the message on the display screen of the mobile terminal to inform the user.
In step S213, the core server performs corresponding attribute adjustment in the account of the background server, the registered user, or the mobile terminal of the registered user according to the payment success message sent thereto by the background server.
Wherein another example of e.g. step S212 is the payment server sending a payment success message directly to the mobile terminal. Another example of e.g. step S213 is sending a payment success message by the mobile terminal or by the payment server to the core server, informing it about the completion of the transaction to make the property adjustments. Also for example, after step S212, the back-office server may also communicate with the server of the manufacturer or warehouse or logistics company, informing it of the delivery address of the user; or, the goods are electronic goods (for example, music, electronic book, etc.) which have been extracted to the backend server in advance, and then the backend server can directly send the electronic goods or the links of the electronic goods to the mobile terminal of the user or other mobile terminals designated by the user after the payment is successful.
In addition, assuming that the backend server has a sufficiently powerful payment processing function, the operation completed by the payment server can be realized by the backend server itself or a plurality of built-in functional modules thereof without interaction with a payment server of a third party.
Alternatively, in another embodiment, the process of performing steps S201 to S209 is substantially the same as that in the above embodiment or its modified example, and the following steps may be implemented:
in step S210', the background server sends a payment request message to the core server; and the core server forwards the payment request information to a payment server of the third party.
In step S211', the payment server processes the payment, completes the payment for the goods, and transmits a payment success message to the core server.
In step S212', the core server transmits a payment success message to the backend server and the mobile terminal, respectively.
In step S213', the core server performs corresponding attribute recording or adjustment in the background server, the registered user, or the account of the mobile terminal of the registered user. Since the core server participates in the relevant interactive process of the payment transaction, the attribute adjustment can be directly carried out without waiting for other devices to notify the core server.
Alternatively, in another embodiment, the process of performing steps S201 to S208 is substantially the same as that in the above embodiment or its modified example, and the following steps may be implemented, as shown in fig. 3:
In step S209 ″, the background server generates an order, and requests the core server to obtain a payment two-dimensional code or obtain an authorization to generate the payment two-dimensional code by itself; the encoded information of the payment two-dimensional code corresponds to a payment request message (e.g., including therein a payment sum, a payment method, account information of each of the user and the merchant, etc.).
In step S210 ″, the background server sends the payment two-dimensional code to a payment server of a third party; or in another example, as shown in fig. 4, the payment two-dimensional code is sent to the mobile terminal for identification, and when a confirmation instruction fed back after the transaction information is checked by the mobile terminal is received, the mobile terminal or the background server sends the payment two-dimensional code to the payment server.
In steps S211 ″ and S212 ″, the payment server identifies the received payment two-dimensional code and obtains a corresponding payment request message to perform payment processing, completes payment for the commodity, and sends a payment success message to one or each of the background server, the core server, and the mobile terminal.
In step S213 ″, the core server performs corresponding attribute adjustment in the account of the background server, the registered user, or the mobile terminal of the registered user, according to the payment success message sent to the core server by the payment server, the background server, or the mobile terminal.
Alternatively, an embodiment may be provided, in which the process of performing steps S201 to S207 is substantially the same as in each of the above embodiments or the modified examples thereof, and in another example of the above method step S208, assuming that the user is satisfied with the goods, the purchase request message may be directly transmitted to the payment server through the mobile terminal. The purchase request message includes unique identification information of the mobile terminal and may also include other user information. The purchase request message also includes transaction information such as the amount purchased, the payment method, the merchant's payment receipt information, and the like. Then, after receiving the purchase request message and completing the related operation of commodity payment (for example, transferring the payment from the user's fund account to the merchant's fund account), the payment server sends a payment success message to each party such as the background server, the core server, the mobile terminal, and the like, so that the background server notifies the merchant or the warehouse or the physical company to ship, and the core server adjusts the attributes in each party's account.
Further, the mobile terminal in this example may send the purchase request message in the form of a payment two-dimensional code, for which the mobile terminal needs to request the core server to obtain the payment two-dimensional code corresponding to the purchase request message, or obtain the authorization for generating the payment two-dimensional code by the mobile terminal itself.
Various embodiments of the present embodiments can provide convenient e-commerce. A user only needs to contact the two-dimensional code corresponding to the commodity information, and a series of subsequent transactions can be triggered by shooting the simple action, so that the complex e-commerce full flow is realized. Due to the extremely wide distribution range of the two-dimensional codes and the mobile flexibility of the mobile terminal, a user can purchase and pay extremely conveniently at any time and any place. And moreover, shopping can be realized by acquiring the two-dimensional codes on each information platform only by serving as a registered user of the background server. Thus, repeated submission of personal information (particularly payment information) to each shopping site can be avoided to avoid risks.
According to the various implementation modes of the embodiment, the information such as orders and payment related information required by transaction management is sent out in the form of the payment two-dimensional code, and a safer payment method is provided. Because the coding information corresponding to the information provided by the two-dimensional code sender, the actual coding information in the two-dimensional code transmitted by each party and the decoding information of the two-dimensional code receiver are matched with each other according to the same specific coding rule, the risk of information leakage such as a payment account and the like can not occur as long as three parties are not infected by the same virus at the same time. In the invention, especially, code sending (or code sending authorization) of all the two-dimensional codes and all the coding rules are uniformly managed by the core server, so that the problems of tampering or intercepting information in the two-dimensional codes by hackers who do not obtain the same specific coding rule can be effectively avoided.
Example 3
The embodiments provide multiple examples of an information processing method based on uniform code sending, and mainly relate to interaction between a core server, a background server, and a mobile terminal having specific physical world characteristics when accessing an interaction process, where servers of other third parties are configured according to actual application conditions.
The physical world characteristics of the mobile terminal when interacting with other parties can refer to any one or any combination of specific time, specific location, specific environment and specific user identity, and are not limited to the mentioned characteristics; the policy set by the backend server is determined according to the actual application situation, and is generally related to the service provided by the backend server. Namely, the background server can provide different targeted services aiming at different physical world characteristics. The background server sends the strategy containing the physical world characteristics and the service association information to the core server in advance or in the interaction process, so that the core server compiles or updates the coding rule for generating the two-dimensional code based on the strategy; the core server can also use the physical world characteristics related to the strategy as one of the reference bases for adjusting the attributes of each party in the interaction.
And the background server acquires and releases the two-dimensional code generated according to the coding rule containing the strategy. The user identifies the two-dimensional code through the mobile terminal to decode and analyze the two-dimensional code, and sends information related to the characteristics of the user or the physical world where the mobile terminal is currently located to the background server, wherein the information related to the characteristics can be sent independently, or can be sent to the background server together with any other interactive information (such as sent registration information, a request for checking service information corresponding to the two-dimensional code, a service providing request and the like) which is sent to the background server by the mobile terminal; or some information in the trait related information does not need to be actively sent by the mobile terminal, but can be obtained by the background server from other information interacted with the mobile terminal or obtained from a third party; the decision can be specifically determined according to the strategy set by the background server.
In different examples, the "current" in the "trait of the current physical world" may refer to a time when the two-dimensional code is identified, a time when the trait related information or other interaction information is sent to the backend server through a mobile terminal or other means, or any other time specified by a policy. To aid understanding, the following provides some examples of "traits of the physical world in which it is currently located", but not by way of limitation: for example, when the mobile terminal recognizes the two-dimensional code, the mobile terminal sends the time for shooting or decoding and analyzing the two-dimensional code to the background server; or, identifying the position information of the real place (such as a certain market and a certain billboard) or the virtual place (such as a certain media advertisement and a certain webpage) where the two-dimensional code is located; or, the inherent characteristics of the user or his mobile terminal itself or the changing characteristics that can be changed to some extent by performing the corresponding operation (for example, a certain bit of the phone number of the mobile terminal is in accordance with a set value, or the user reaches a certain VIP level); or, depending on an external factor (e.g., ambient temperature) that cannot be changed by a user person or a server, etc.
And when the background server receives the relevant information of the 'characteristics of the current physical world' of the mobile terminal, providing corresponding characteristic services for the user based on the characteristics of time, place, environment, user identity and the like covered by the information or a combination of the characteristics. For another example, an example of combining the features is provided in which the backend server may request the mobile terminal to provide the service when the features of the two associated operations meet a set condition, for example, the backend server may provide the sold product to the mobile terminal only when the location of the mobile terminal when scanning the two-dimensional code matches the location of the mobile terminal when sending the product purchase request, and the interval between the time of scanning the two-dimensional code and the time of paying the money meets a set threshold.
In addition, the rules set by the core server for adjusting the attributes may further be made different according to the difference of the "characteristics of the current physical world", that is, the core server performs matching adjustment on the attributes in the accounts of the respective parties according to the information related to the characteristics sent by the mobile terminal or forwarded by the background server.
In addition, each party can also transmit any one of the above-mentioned trait related information in the form of a two-dimensional code, that is, the transmitting party of the information requests the core server to transmit the code and obtains the two-dimensional code generated by the core server or authorized party and corresponding to the trait related information.
A specific example of obtaining a corresponding coupon based on a particular physical world trait is provided below. As shown in fig. 5, in this example, it is assumed that the backend server offers different discounts for the goods sold by the merchants according to different physical world traits, and offers the users coupons of the corresponding discounts.
In step S301, the background server sends a request to the core server to request to obtain a two-dimensional code corresponding to a service provided by the background server;
for this purpose, the backend server may send the association information (policy) of the different services and the different characteristics provided by the backend server to the core server, alone or together with the request, so that the core server compiles or updates the coding rules required for generating the two-dimensional code.
In step S302, a core server (or a background server authorized by the core server or a third-party generating device) generates a two-dimensional code required by the background server according to the current latest encoding rule, where the encoding information of the two-dimensional code corresponds to a service provided by the background server and matching with the corresponding feature.
In step S303, the backend server obtains the two-dimensional code and issues the two-dimensional code to various information platforms.
In step S304, the mobile terminal recognizes the two-dimensional code, and records the system time displayed on the mobile terminal when the two-dimensional code is recognized as the recognition time.
In step S305, the mobile terminal sends request information for obtaining the coupon to the background server according to the information identified from the two-dimensional code, and the request information includes the identification time of the mobile terminal.
In step S306, the background server receives the request message, and compares the identification time of the mobile terminal with the identification time specified in the policy preset by the background server according to the identification time of the mobile terminal; for example, it is defined that coupons of 8 and 9 are provided before 8 and 9 points, respectively, and coupons of 9 and 9 are not provided after the identification time.
In step S307, the background server generates coupon information corresponding to the discount according to the comparison result.
In step S308, the background server adds the coupon information corresponding to the discount to a two-dimensional code generation request sent by the background server to the core server, and requests to obtain a coupon two-dimensional code corresponding to the coupon information.
In step S309, the core server (or a background server or a third-party generating device authorized by the core server) generates the required coupon two-dimensional code according to the current latest encoding rule.
In step S310, the mobile terminal receives the coupon two-dimensional code directly sent by the core server or forwarded by the background server, and identifies the coupon two-dimensional code to extract coupon information including a corresponding discount, and presents the coupon information to the user for viewing.
In step S311, the coupon two-dimensional code may be saved in the mobile terminal; when the user goes to the merchant for consumption, the stored coupon two-dimensional code is read through the mobile terminal and displayed to the merchant through the screen of the mobile terminal.
In step S312, the merchant identifies the two-dimensional code of the coupon on the mobile terminal through the two-dimensional code scanner, another mobile terminal or any other two-dimensional code identification device with similar functions, so as to obtain the corresponding discount in the coupon information, and verify the authenticity of the coupon.
The operation of paying the discount after the user obtains the discount coupon corresponding to the discount to purchase the product can be implemented by referring to the related description of embodiment 2 or other prior arts, and details are not repeated.
Assuming that the user of the mobile terminal does not arrive at the brick-and-mortar store for consumption and the merchant is inconvenient to scan and identify the two-dimension code of the coupon face to face, in another exemplary step S311 'to S312', the user can send the two-dimension code of the coupon to the merchant through the mobile terminal and the two-dimension code identification device of the merchant identifies the two-dimension code.
The merchant may also need to verify the user permission of the coupon two-dimensional code at the same time, and the user with the corresponding permission can obtain the corresponding discount; therefore, when the user sends the coupon two-dimensional code, the user information (for example, the unique identification information of the user or the mobile terminal of the user, or the characteristics of the physical world where the user mobile terminal sends the coupon two-dimensional code, the attribute value of the user of the mobile terminal, and the like) can be sent to the background server together for verification.
Preferably, the coupon information which is analyzed from the coupon two-dimensional code and other required information can be sent to the merchant in the form of the two-dimensional code; then, it can be further realized based on the following procedures:
in step S313', the user requests the core server to obtain the discount two-dimensional code through the mobile terminal, so that the code information of the discount two-dimensional code includes the user information and the coupon information analyzed from the coupon two-dimensional code. And generating a corresponding discount two-dimensional code according to the current latest coding rule through a core server or an authorized party (an authorized background server, a third party generating device or a mobile terminal and the like) of the core server. The analysis of the coupon information can be performed by the mobile terminal, or the coupon information can be obtained by the core server receiving and analyzing the coupon two-dimensional code sent by the mobile terminal.
In another example, the operation related to the generation of the discount two-dimensional code may be combined with the example in which the mobile terminal sends the purchase request message in the form of the payment two-dimensional code in embodiment 2, for example, when the mobile terminal sends the purchase request message to the core server, the mobile terminal sends the analyzed coupon information, user information, and the like to the core server together, so that the generated payment two-dimensional code contains the coupon information in addition to the information necessary for completing the transaction; when the merchant identifies the payment two-dimensional code sent by the mobile terminal, the discount corresponding to the coupon information can be used for settlement for user consumption, and commodity selling is completed.
Assuming that, in another embodiment, the process of performing other steps is substantially the same as in the above-described embodiment or its modified example, steps S304 'to S307' are realized based on the following processes: the mobile terminal recognizes the issued two-dimensional code and sends request information for obtaining the coupon to the background server according to the information recognized from the two-dimensional code. The background server receives the request information; comparing the sending time (or receiving time) of the request information with the time specified by the strategy in the background server, and giving out the coupon information of the corresponding discount; for example, coupons offering 8-fold and 9-fold before 8 o ' clock and 9 o ' clock are defined as the transmission time (or reception time), respectively, and no coupon offering after 9 o ' clock is identified.
Assuming that, in the further embodiment, the process of performing the other steps is basically the same as in the above embodiments or the modified examples thereof, steps S304 "to S307" are realized based on the following processes: the mobile terminal identifies the issued two-dimensional code, obtains the current position information of the mobile terminal through a built-in positioning module or other LBS (Location Based Service) modes, and attaches the position information to the request information which is sent to the background server and requires to obtain the coupon. The background server receives the request information, compares the position information with the position information specified by the strategy in the background server, and gives out the discount coupon information of the corresponding discount; for example, it is specified that the location information indicates that the coupon is to be provided in the case where the mobile terminal is located within the bonded area when recognizing or transmitting the purchase request, and that the coupon is not to be provided in the case where the mobile terminal is not located within the bonded area.
In another example thereof, steps S304 "'-S307"' are implemented based on the following procedure: the mobile terminal recognizes the issued two-dimensional code and sends request information for obtaining the coupon to the background server according to the information recognized from the two-dimensional code. The background server receives the request information, for example, according to a base station used when the mobile terminal sends the request information, the background server interacts with the base station, and the time or the position when the mobile terminal sends the request information is obtained from a third party, so that the background server performs comparison and judgment according to the time or the position information to provide a corresponding coupon.
Example 4
In this embodiment, a plurality of examples of an information processing method based on uniform code sending are provided, as shown in fig. 6, which mainly relate to interaction between a core server, a background server, and at least two mobile terminals, so as to implement commodity recommendation, and other mobile terminals, servers of other third parties, and the like may be configured according to actual application situations.
In step S401, the backend server provides a service for selling goods, and sends a request to the core server to obtain a two-dimensional code corresponding to the sold goods.
In step S402, the core server, or a background server or a third-party generating device authorized by the core server, encodes the commodity information of the commodity according to the current latest encoding rule, and generates a first two-dimensional code corresponding to the commodity information.
In step S403, the backend server obtains the first two-dimensional code of the commodity and issues the first two-dimensional code to various information platforms.
In step S404, the camera of the first mobile terminal photographs the first two-dimensional code, decodes the photographed first two-dimensional code to obtain encoded information corresponding to the commodity information, and can extract the commodity information from the background server according to the encoded information, and display the commodity information on the display screen of the mobile terminal for the user to view.
In step S405, the first mobile terminal, as a recommender of the product, sends a request to the core server, requesting the core server or an authorized party (e.g., a background server, a third-party generating device, or the first mobile terminal itself authorized by the core server) to generate a recommended two-dimensional code (a second two-dimensional code) according to the current latest encoding rule; the content corresponding to the code information of the recommended two-dimensional code includes not only the information of the commodity sold by the backend server, but also the user information of the first mobile terminal (for example, the unique identification information of the first mobile terminal), or may further include any other required information (for example, the evaluation information of the first mobile terminal user on the commodity, the physical world characteristics of the first mobile terminal user, the attribute value of the first mobile terminal user, and the like), so that the condition that the first mobile terminal is used as the recommending party is closely related to the recommended two-dimensional code and can be known by the parties identifying the recommended two-dimensional code as required.
For this reason, the first mobile terminal may send the commodity information obtained by analyzing the first two-dimensional code by itself to the core server, alone or together with the interactive information such as the code sending request; or the first mobile terminal directly sends the first two-dimensional code to the core server, and the core server or the equipment specified by the core server analyzes the first two-dimensional code to obtain commodity information for generating the recommended two-dimensional code. The user information of the first mobile terminal can be provided to the core server by the first mobile terminal alone or together with other interaction information before or during the interaction; or, the core server obtains the user information of the first mobile terminal from other interaction information with the first mobile terminal, or from a background server where the first mobile terminal is registered, or from any other third-party server.
In step S406, the first mobile terminal obtains the generated recommended two-dimensional code and issues the recommended two-dimensional code to a place where the user of the second mobile terminal can contact, that is, the user of the first mobile terminal recommends the product to the user of the second mobile terminal.
For example, a first mobile terminal (or a core server or a background server) issues a recommended two-dimensional code to various information platforms; or the first mobile terminal directly sends the recommended two-dimensional code, or a page or other media (pictures, multimedia and the like) containing the recommended two-dimensional code to the second mobile terminal through various modes such as application tools of various social networks and the like; or the first mobile terminal displays the recommended two-dimensional code on a screen of the first mobile terminal, and a camera of the second mobile terminal directly takes pictures and scans the pictures.
In step S407, the second mobile terminal identifies the recommended two-dimensional code, and obtains encoded information corresponding to the product information and encoded information corresponding to the user information of the first mobile terminal.
In step S408, the second mobile terminal extracts the commodity information from the background server according to the encoding information, and displays the commodity information on a display screen of the second mobile terminal for the user to view. Whether to simultaneously display the user information of the first mobile terminal or other information provided by the user information (such as evaluation information) can be selected as required.
In step S409, if the user of the second mobile terminal is satisfied with the goods recommended by the user of the first mobile terminal, a purchase request message is sent to the background server through the second mobile terminal. The background server completes the operation related to the merchandise sale through the processes described in the foregoing embodiments.
When selling the commodity, the background server can know that the purchaser of the commodity is the second mobile terminal and the recommender of the commodity is the first mobile terminal. In this embodiment, the specific way for the background server to obtain the user information of the first mobile terminal associated with the recommended two-dimensional code is not limited, for example, the user information of the first mobile terminal, which is analyzed from the recommended two-dimensional code by the second mobile terminal, is sent to the background server separately or together with the purchase request information; or the background server receives the recommended two-dimensional code and analyzes the recommended two-dimensional code by itself to obtain the user information of the first mobile terminal; or when the background server processes the purchase request information, inquiring information reserved at the core server for generating the recommended two-dimensional code from the core server, and obtaining user information of the first mobile terminal requesting to generate the recommended two-dimensional code; or, the first mobile terminal provides the user information to the core server for obtaining the recommended two-dimensional code, and the first mobile terminal or the core server provides the user information of the first mobile terminal to the background server at the same time, and so on.
In step S410, according to the fact that the first mobile terminal user recommends a commodity to another user, the background server calculates a recommendation offer according to a preset offer rule, sends an offer message to the first mobile terminal, and displays the offer message on a display screen of the first mobile terminal to inform the user.
In step S411, the core server adjusts the corresponding attribute in the account corresponding to the first mobile terminal or the user thereof (and/or the background server, the second mobile terminal or the user thereof) according to the fact that the first mobile terminal user recommends the product to the other user. The core server completes the attribute adjustment operation performed by the commodity buying and selling department between the second mobile terminal and the background server, which may be referred to the description in the foregoing embodiments.
As another example, the specific operation of the background server for calculating the recommendation for the first mobile terminal may be performed after the attribute adjustment of the first mobile terminal is completed in step S411; for example, the background server queries the attribute state of the first mobile terminal or the user thereof after implementing recommendation and obtaining attribute adjustment from the core server, and calculates a recommendation submission for the first mobile terminal according to the latest attribute state.
According to different set extraction rules, the background server can issue an extraction to the first mobile terminal after the second mobile terminal actually completes a purchase transaction according to the recommendation; the backstage server may issue an offer to the first mobile terminal as long as the first mobile terminal performs the recommended operation (for example, the first mobile terminal sends the recommended two-dimensional code to the second mobile terminal and also notifies the backstage server, or the backstage server learns that the first mobile terminal performs the recommended operation when the second mobile terminal recognizes the recommended two-dimensional code and extracts the commodity information from the backstage server for viewing).
As shown in fig. 7, the first mobile terminal recognizes the first two-dimensional code or the recommended two-dimensional code, and the second mobile terminal recognizes the first two-dimensional code or the recommended two-dimensional code, so as to interact with the backend server to complete commodity transaction, obtain a transaction reward issued by the backend server according to the reward rule, and perform corresponding attribute value adjustment by the core server that receives the notification.
Or, the backstage server sends the rules of reward and withdrawal to the core server previously (for example, when the first two-dimensional code is requested to be generated, or separately), and then the core server calculates the corresponding transaction reward/withdrawal recommendation and delivers the transaction reward/withdrawal recommendation to the corresponding user according to the notification of transaction completion and/or withdrawal operation implementation sent to the backstage server (or the first mobile terminal/the second mobile terminal). The form of transaction reward or recommendation is not limited, and can be digital currency or real currency or any other form of attribute value adjustment or convention; the transaction reward or the recommendation can be used as one attribute of the user, and the core server directly adjusts the attribute in the user account and informs the corresponding user.
The present embodiment is not limited to the case where there is only one recommending party, or where the recommended two-dimensional code is generated only once, or where only one-to-one recommendation is performed. According to different practical application conditions, a plurality of recommenders can exist, each recommender can generate a new recommended two-dimensional code for multiple times, after recommendation is implemented or commodity purchase is successful, a background server respectively calculates a recommendation for each recommender or each recommendation according to a preset recommendation rule, and a core server correspondingly adjusts the attribute. In different examples, according to different rules, the same extraction for each recommendation in multiple times may be set, or the number of recommendations may be further used as a reference item (the number is superimposed in the recommendation two-dimensional code or recorded by a core server, etc.) so as to provide relatively more extractions for the next recommendation of the recommender with more recommendations, and so on.
The method comprises the following steps that the situation that three mobile terminals exist is assumed, wherein a first mobile terminal requests a core server to generate a recommended two-dimensional code and sends the recommended two-dimensional code to a second mobile terminal and a third mobile terminal respectively; the second mobile terminal and the third mobile terminal have different physical world characteristics when recognizing the recommended two-dimensional code, obtain different services from the background server, and according to a preset extraction rule, the background server can provide different services for the situation that the first mobile terminal recommends to the second mobile terminal and the third mobile terminal, and the core server provides attribute adjustment of different values. Or when the first mobile terminal sends the recommended two-dimensional code to the second mobile terminal, the characteristics of the first mobile terminal are different from the characteristics of the first mobile terminal when the first mobile terminal sends the recommended two-dimensional code to the third mobile terminal, and the background server can provide different extracts for the first mobile terminal and provide attribute adjustment of different values for the core server. Or, the user information provided by the first mobile terminal when requesting to generate the first recommended two-dimensional code from the core server includes one characteristic of the first mobile terminal, the user information provided by requesting to generate the second recommended two-dimensional code includes another characteristic of the first mobile terminal, the first recommended two-dimensional code is sent to the second mobile terminal, and the second recommended two-dimensional code is sent to the third mobile terminal, so that the background server can provide different services corresponding to different characteristics for the second and third mobile terminals according to the requirement, also can provide different offerings corresponding to different characteristics for the first mobile terminal, and provides attribute adjustment of different values by the core server. The above various embodiments may further be derived from a case where one recommender (refer to the first mobile terminal) makes multi-party/multi-time recommendations to more than three users.
And assuming another situation of three mobile terminals, the first mobile terminal requests the core server to generate a first recommended two-dimensional code, wherein the first recommended two-dimensional code contains code information corresponding to the commodity information and the user information of the first mobile terminal, and the first recommended two-dimensional code is sent to the second mobile terminal as a first-level recommender. The second mobile terminal identifies the first recommended two-dimensional code to obtain the corresponding related information, requests the core server to generate a second recommended two-dimensional code and contains code information corresponding to the commodity information and the user information of the first and second mobile terminals; and the second mobile terminal is used as a second-level recommending party and sends the second recommended two-dimensional code to a third mobile terminal. And the third mobile terminal identifies the second recommended two-dimensional code to obtain the corresponding related information (including commodity information and the information of the first and second mobile terminal users), and finally completes the transaction through interaction with the background server. The background server respectively issues different suggestions matched with the recommendation level for the situation that the first mobile terminal and the second mobile terminal implement the recommendation operation; and if the second mobile terminal also completes the transaction with the background server according to the first recommended two-dimensional code, the first mobile terminal can obtain the contribution according to the condition that the first mobile terminal directly recommends to the second mobile terminal and can also obtain the contribution according to the condition that the first mobile terminal indirectly recommends to the third mobile terminal. And, the recommended two-dimensional code at each level can also refer to the operation of performing multi-party/multi-time recommendation.
Of course, since the core server records the user information requesting generation of each level of recommended two-dimensional code, and the backend server and/or the core server also records each step, transaction object, and recommending party of the transaction process, the recommended two-dimensional code may only include information of the recommending party who is directly recommended (for example, the second recommended code may only include commodity information and user information of the second mobile terminal, but not user information of the first mobile terminal), and even the recommended two-dimensional code may not include information of the recommending party, and the backend server obtains the user information of each level of recommending party corresponding to the recommended two-dimensional code according to its own record or the record of the core server, so that the backend server issues an extraction to the directly recommended recommending party (for example, the second mobile terminal) according to a preset extraction rule, or issuing the submission to the recommenders (such as the first and second mobile terminals) which recommend directly and recommend indirectly.
The above various embodiments may further be derived to a case where there are multiple levels of recommenders, that is, each user who learns the service-related information provided by the backend server (for example, learns the service information from the backend server, or learns the service information from the information publishing platform by scanning the two-dimensional code, or obtains the service information by recommending by other users, etc.), can interact with the backend server to obtain the service, or serve as a recommender to request the core server through the mobile terminal to generate a recommended two-dimensional code in which the user information of the recommender itself is superimposed on the service information and publish the service information. The user receiving the recommended two-dimensional code can obtain service through interaction with a background server according to the service information in the recommended two-dimensional code, or the recommended two-dimensional code is used as a next-level recommended direction to request a core server to generate a next-level recommended two-dimensional code which at least comprises the user information of the next-level recommended direction and is superimposed on the service information, and the next-level recommended two-dimensional code is issued outwards for recommendation. For example, each party generating each level of recommended two-dimensional codes, each party issuing each level of recommended two-dimensional codes, each party identifying each level of recommended two-dimensional codes, and each party interacting with the identification party can acquire the condition that each user serves as a certain level of recommended party when needed, and if needed, the information of the previous level of directly recommended user or the information of the previous level of recommended users can be further acquired according to the content contained in the recommended two-dimensional codes or the content recorded by inquiring a core server or a background server, so that the background server can issue corresponding submission to each level of recommended parties. The background server may set a corresponding proportion to proportionally distribute and promote the recommenders at multiple levels involved in a successful transaction.
The core server can acquire the user information of each recommending party in multiple recommendations or multi-level recommendations, the recommendation operation implemented by the core server and the related conditions of whether the transaction is successful or not after direct or indirect recommendation based on a method similar to the issuing and drawing of the background server, and the core server performs corresponding attribute adjustment in accounts of the recommending parties and/or the interactive parties; the core server can set different weight indexes (corresponding examples will be described in detail below) according to recommendation levels of recommendation parties, different recommendation operations, recommendation times, whether a transaction is successful, successful purchase times after recommendation and the like, and perform attribute adjustment matched with the weight indexes; the adjusted attribute state can be further used as one of the reference bases for the background server to issue the submission at this time or the submission at the next time.
The methods of the present embodiment can provide statistical analysis of a brand-new sales channel and corresponding sales status for direct marketing. Anyone, such as a star speaking a commodity, a manager of a microblog, or a general web browser finding a commodity on a web page, only needs to identify the two-dimensional code generated by the commodity once through a mobile terminal or other intelligent devices of the person, generate the two-dimensional code twice through a core server or an authorized party thereof, and widely release the two-dimensional code generated twice for recommendation. For example, various information distribution platforms for distributing the two-dimensional code, other background servers or third-party servers, etc. may also be used as a recommender of one of the platforms, and distribute the two-dimensional code after requesting to generate the two-dimensional code twice so as to obtain recommendation and submission. At least the user information of the recommending party is superposed (or at least corresponds to the storage record of the background server or the core server) in any generated recommending two-dimensional code, so that the recommending two-dimensional code is uniquely bound and corresponds to the user of the recommending party or the mobile terminal of the recommending party. Therefore, after the commodity is purchased by other people, the user information of the recommender is extracted every time of purchase, so that the extraction given to the recommender is calculated, and corresponding attribute adjustment is conveniently carried out.
Example 5
The embodiment provides a plurality of examples of an information processing method based on uniform code sending, which mainly relate to a core server, a first background server for providing related services of sold goods, a second background server for providing related services of a social network platform, a mobile terminal of a first user, and mobile terminals of one or more other users in the social network platform, and realize a scheme of SNS (social network service) search through interaction of the core server, the second background server, the mobile terminals, the first user and the mobile terminals; other mobile terminals, other background servers, servers of other third parties, and the like can be configured according to the actual application situation.
The first background server requests the core server for the goods sold by the first background server to obtain the promotion two-dimensional code corresponding to the information of the goods, and then issues the goods (see the description of the foregoing embodiments for the processes of generating and issuing the promotion two-dimensional code, etc.).
The first user is a registered user of the second background server, so that the information interaction with other registered users of the second background server can be carried out by using the social network platform related service provided by the second background server. Each user in the social network platform can further establish one or more friend circles, and other users in the friend circles can be grouped and can be communicated and interacted with more privately and more pertinently.
The first user identifies the promotion two-dimensional code through the mobile terminal to extract corresponding commodity information for checking, and hopes to further obtain evaluation information of other users on the commodity. For this purpose, the mobile terminal of the first user sends an SNS search request to the second backend server, and the first user submits a topic (for example, including the name and model of the commodity to be searched, and something the user needs to know) to the second backend server through the SNS search request, and requests the second backend server to perform an SNS search in the social network platform.
And the second background server receives the SNS search request, at least searches from information released by other users through the social network platform according to the keywords extracted from the topics, sorts the searched SNS search results and pushes the SNS search results to the mobile terminal of the first user. Displaying the result of the SNS search on a mobile terminal screen of a first user so that the first user can further know the condition of the commodity; then, the first user can interact with the first backend server based on the promotion two-dimensional code, and complete the transaction to obtain the goods sold by the first backend server (for a similar process of interacting with the first backend server, see the description in the above embodiments).
In this example, the other users of the second backend server (called friend users for convenience of description) publish information for SNS search through the social network platform in an unlimited form: the content published when the friend user immediately replies to the topic can be the content originally published by the friend user and stored on the social network platform or stored by the second background server: for example, the content published by the friend user when the friend user originally replies to other similar topics, or the content published by the friend user on the personal homepage of the social network platform, or the message published on the homepage of another person, or the content directly sent to another person by the friend user through the social network platform.
Each user (as a friend user) can send a message to the second background server, and the authority is set according to the disclosure degree or disclosure range of each item of information issued by the user: for example, it is decided whether or not a certain item of information to be published is allowed to be used for an SNS search; or, a certain item of information released by the SNS can be searched for the SNS only in a set range, and the SNS cannot be searched for any more when the SNS exceeds the set range. The form of the setting range is not limited, and some examples are provided as follows for reference: for example, the survival time of the published information is limited, and only the published information which is still in the survival time can be searched by SNS search; for another example, the identity of the user who sends the SNS search request, or the value of an attribute, or the physical world trait, etc. are limited, and only users whose attribute value reaches a certain level or a certain range, or only related users (e.g., users in a circle of friends, users who have had previous interactions), or only users who send the SNS search request from a certain place through a certain device, etc. are searched for, but not other users who send the SNS search request; for another example, topic contents of an SNS search are limited, only published contents are allowed for SNS searches on some of the topics, and searches are not opened to other topics, and so on.
Each user of the second backend server (as the first user initiating the SNS search request) may also set an authority to the range that he wishes to find or the search result that he wishes to receive, for example, limit the time of information publishing, and only use information published for a certain period of time (e.g., within one month, within one year, etc.) as a search source, which can help to eliminate information that is too old; for another example, the identity of the friend user who releases information, the value of the attribute, the physical world trait, or the like is limited, and only the content released by the related user or the friend user who has reached a certain level of the attribute value, only the content released from a certain place or through a certain device, or only the content released by the friend user who meets a set condition (for example, the friend user who has actually purchased the product is certified by providing the certification to the background server) is used as the search source, and is not searched for from the content released by other users.
The setting of the authorities does not influence the original use and propagation of the information issued by the user on the social network platform. And the second background server rejects the search source or the search result which does not conform to the set range according to the authority. The operation of the second backend server for sorting the SNS search results may be to provide the first user with SNS search results according to the matching degree with the keywords, or to further obtain similar keywords through an association method to perform an SNS search and then push the SNS search to the first user when there is no completely matched keyword (for example, when matching content cannot be searched according to a name and a model of a commodity, a search is automatically performed according to a name of a manufacturer of the commodity, a similar model, etc.), or when matching content cannot be searched in a social network platform, the second backend server further performs a search in a wider range on the internet, etc.
The first user may become a registered user of the social network platform of the second background server before or during the interaction according to the manner described in the previous embodiments, so as to send an SNS search request thereto; when the first user is respectively a registered user of the plurality of social network platforms, the first user can select to log in any one of the social network platforms or respectively log in the plurality of social network platforms through the mobile terminal to send an SNS search request to the corresponding background server.
In other examples, the promotion two-dimensional code corresponding to the commodity information and published by the first background server may further include code information of a link address where the second background server receives an SNS search request, so that the mobile terminal of the first user can know the link address after recognizing the promotion two-dimensional code, and the sent SNS search request may also be directly forwarded to the link address, so that the first background server designates a specific social network platform receiving the SNS search request, that is, the operation of the first user sending the SNS search request is bound to the social network platform of the second background server; when the first background server and the second background server belong to the same operator, the first user can be effectively prevented from running off to other social network platforms.
In another example, the first user does not obtain the merchandise information (and/or receive the link address information of the SNS search request) by recognizing the promotion two-dimensional code issued by the first backend server; the related information is obtained by identifying the recommended two-dimensional code issued by other users, and the information of the recommended user is further superimposed on the basis of the corresponding commodity information in the recommended two-dimensional code generated by the request of the recommended user to the core server. Further, it is assumed that the recommended user may be a registered user of a social network platform of the second background server, and the recommended two-dimensional code is sent to the first user based on the social network platform; the recommended two-dimensional code received by the first user may further include corresponding encoding information of a link address where the second background server receives the SNS search request, so that the SNS search request of the first user received by the second background server is specified to be searched in the social network platform of the second background server. The coding information of the link address can be added when a recommending user requests the core server to generate the recommended two-dimensional code, or when the second background server requests the core server to further superimpose the link address on the coding information contained in the first recommended two-dimensional code to form a second recommended two-dimensional code in order to finish the forwarding operation of the recommended two-dimensional code, so that the first user is prevented from running off to other social network platforms.
Under different application conditions, a background server with stronger function can be arranged, and the service of selling goods by the first background server and the service of maintaining the social network platform and realizing SNS search by the second background server can be simultaneously covered. Or when receiving the SNS search request of the first user, the second background server forwards the SNS search request to the third-party server for specific search operation; and the second background server acquires the SNS search result from the third-party server and then pushes the SNS search result to the first user.
In addition, the core server acquires the relevant operations of all parties in the SNS searching process, and corresponding attribute adjustment is respectively carried out in accounts of a second background server for completing the SNS searching, a first user for initiating an SNS searching request, a friend user for publishing information adopted by the SNS searching, a recommended user for publishing a recommended two-dimensional code and the like. The first background server and/or the second background server can provide more targeted services (such as offering a discount when providing services or promoting the level of users in the social network platform) based on the attribute state of the users. And the attribute state of a certain user can also be used as one of the consideration bases of effective SNS search results when others set the receiving authority for the published content of the user during SNS search, or the second background server adopts the published content of the user.
The process of the above embodiment is described below by way of a specific example of ordering at a restaurant site, as shown in FIG. 8:
in step S501, a consumer enters a restaurant, and identifies a two-dimensional code on a table through a mobile phone by himself or under the prompting of a waiter, where coded information corresponding to the two-dimensional code includes information of a first background server and a request instruction for initiating an SNS search query. The two-dimension code is generated by the core server or an authorized party thereof according to a set coding rule.
In step S502, the consumer opens the camera in the mobile phone to take a picture of the two-dimensional code, and obtains the address and the related parameters of the first backend server through the decoder and the encoded information parsing unit built in the mobile phone hardware entity, and thereby connects to the first backend server.
In step S503, it may be determined whether the mobile phone has decoding client software corresponding to the encoding rule of the two-dimensional code installed therein, and if not, the decoding client software is downloaded and installed, and then the parameters included in the parsed two-dimensional code are introduced into the automatically started client software; if the two-dimensional code is installed, parameters contained in the analyzed two-dimensional code are directly introduced into automatically started client software; or directly identifying the service corresponding to the two-dimensional code, if the service is not the two-dimensional code corresponding to the service provided by the first background server, the mobile phone is linked to the set webpage or does not perform any webpage connection (ERROR information can be only prompted on a screen to inform a user that an incorrect two-dimensional code is scanned, the user is asked to scan a correct two-dimensional code, and the like). This step may be an option in different application scenarios.
In step S504, a menu of the restaurant is displayed on the mobile phone of the consumer (by starting the client software), and the menu is encoded according to the set encoding rule of the two-dimensional code and is read and displayed. For each type of menu, a request for SNS search query can be initiated; requesting a second background server to inquire whether friends post comments on dishes/shops of the menu in a friend circle of the social network platform of the consumer; if the search is carried out according to the search source range set by the consumer, if the comment is not issued in the first-layer friend circle (namely the friend directly related to the consumer), searching whether a person in the second-layer friend circle (namely the friend of the consumer friend) issues the comment or not; and searching in a plurality of layers of friend circles by analogy to obtain comment information.
In step S505, when the second backend server sends the found comment to the mobile phone of the consumer, the second backend server may also notify the consumer of an "index of raters" owned by the publisher of the comment, so that the consumer can know the credibility of the comment.
The "rater index" may be calculated by the core server or the second backend server based on the related operations of the criticizing issors or other attributes, and is recorded in the account of the criticizing publishers, as one attribute of the user. The operation of calculating the "rater index" may be performed in various ways or in various combinations according to different set policies or rules: for example, the number of times of menu extraction or order ordering from the first background server by scanning the two-dimensional code by the comment publisher is used to represent the number of times of visiting the restaurant or successful consumption, so that more times can be set to obtain a higher index value correspondingly; for another example, it may be set that the larger the number of times the comment issued by the rater is adopted as a valid SNS search result in a similar topic, the higher the index value may be obtained correspondingly, and so on.
Preferably, the review operation or the screening of the SNS search results may be limited based on Location Based Services (LBS) or other physical world traits, for example, only after the client software on the mobile phone of the rater scans the two-dimensional code in the restaurant or successfully reviews the order based on the two-dimensional code, the review may be made (for example, when the mobile phone of the rater interacts with a corresponding background server, the location information of the mobile phone or the certificate of successful transaction is sent together to determine whether the specified requirements for review can be met). Further, the comment may be associated with the evaluator's cell phone, thereby avoiding a huge number of invalid comments. Based on the index of the evaluator and the setting of the degree and range of the comment which can be disclosed, the comment can be searched by corresponding SNS search; meanwhile, the comment issued by the appraiser can be kept in the personal homepage or the friend circle of the appraiser and can be transmitted based on the original means of the social network platform.
In step S506, after the consumer consults the comment, the consumer can order favorite dishes on the menu, and send ordering information including an order, a table number, time, and the like to the mobile phone of the waiter/service terminal equipment of the restaurant and the like associated with the two-dimensional code; and the service terminal equipment of the waiter mobile phone/restaurant directly receives the ordering information or receives the ordering information forwarded by the first background server through client software or short messages or other modes, so that corresponding service is provided for the consumer.
Preferably, the menu displayed on the mobile phone of the consumer may further include a link for obtaining the coupon by clicking, and after the link is clicked, the coupon two-dimensional code including the coupon information is sent to the mobile phone of the consumer. Further, when a request for obtaining the coupon two-dimensional code is sent, the current time and address are provided by the consumer mobile phone, and the generated coupon two-dimensional code contains discount corresponding to the request time, address and the like; client software of the waiter's cell phone scans and verifies the coupon two-dimensional code in the consumer's cell phone, so that the consumer can consume using the discount provided by the coupon. Of course, the manner in which coupons are received is not so limited, and the invention is not so limited.
In step S507, the consumer may issue a comment through the client software of the mobile phone in a displayed menu or issue a comment through the social network platform in a friend circle or other pages as a new evaluator, and may set a degree and a range to which the comment may be disclosed, so as to determine whether the comment may be used by the second backend server to be displayed to another user initiating an SNS search request.
In step S508, the second backend server calculates, for the consumer who issued the comment, a corresponding rater index as a reference for adopting the comment as a valid SNS search result or as a reference for issuing a reward to the consumer.
The beneficial effects of the embodiment are as follows: the SNS search and quantitative recommendation of the consumers for the dish cognition of the merchants can be realized. Further, as a requester for SNS search, detailed knowledge of services provided by merchants can be obtained based on results found from content published by a circle of friends; the appraiser who posts the comment can not only express own favor, but also help friends through the social network platform, and simultaneously obtain the reward of the merchant, and finally reflect the adjustment of various attribute values such as the personal appraisal index.
Example 6
In the embodiment, a scheme for implementing SNS (social network service) help based on multiple examples of a unified code-sending based information processing method is provided, where configurations related to a core server, a first backend server, a second backend server, a mobile terminal of a first user and a friend user, and the like, can be seen in embodiment 5, and many of the features described in embodiment 5 can be applied to this embodiment, and vice versa; and operations of the user for initiating SNS help seeking and SNS searching are not mutually conflicted. Other mobile terminals, other background servers, servers of other third parties, and the like can be configured according to the actual application situation.
The first background server requests the core server for the sold commodity to obtain the promotion two-dimensional code corresponding to the commodity information and then issues the promotion two-dimensional code outwards. The first user is a registered user of the second background server and can perform information interaction with other registered users of the second background server or friends in a friend circle by using the service related to the social network platform provided by the second background server.
The first user identifies the promotion two-dimensional code corresponding to the commodity information through the mobile terminal, extracts the corresponding commodity information and checks the commodity information, and hopes to further obtain the evaluation information of the commodity of the user (particularly a friend in a friend circle) in the social network platform. For this reason, the mobile terminal of the first user sends an SNS help request to the second backend server, that is, submits a topic (for example, including the name and model of the commodity to be searched, and items that the user needs to know) to the second backend server through the SNS help request, and invites the user (called a friend user for convenience of description) in the social network platform who receives the topic forwarded by the second backend server to reply to the topic. The coded information of the promotion two-dimensional code issued by the first background server can further comprise a link address of a second background server for receiving the SNS help-seeking request, so that the first user can directly send the SNS help-seeking request to the second specified background server.
The evaluation information provided by the friend user who receives the topic for the related commodity can be retrieved, and the evaluation information can be directly sent to the first user or sent to the page of the first user through various propagation modes (private messages, short messages and the like), or the evaluation information is superposed in the feedback information of the SNS help-seeking request by the second background server and sent to the first user. And displaying the SNS help seeking result on a mobile terminal screen of the first user, so that the first user can further know the condition of the commodity. And then, the first user can interact with the first background server based on the popularization two-dimension code, and the transaction is completed to obtain the commodity sold by the first background server. The second background server or the core server calculates corresponding values of attributes such as rater indexes for the friend users who reply the topics, and records the values in the account; the first backend server or the second backend server may query the index to issue a corresponding reward, such as issuing a recommendation offer, etc.
Each user (when being used as a first user for launching the SNS for help), may also send a message to the second backend server, which sets permissions regarding its public level and scope of help, and defines the identity, physical world traits, etc. of the user who wishes to reply to the topic: for example, the second background server is required to inquire the corresponding user state and then send the topic sought for help to all users in an online state, or inquire the friend association condition of the user and then send the topic to only friends in a first-level friend circle to a second-level friend circle, or compare the positioning information of the first-level friend circle and the friend circle and then send the topic to only users whose actual geographic positions do not exceed a set distance from the initiator. In addition, the user can set the authority for the content and the physical world characteristics of the topic fed back by the second background server, for example, the reply content with certain keywords is shielded, the reply content sent later than a certain time is shielded, and the like. And the second background server eliminates the reply result which does not conform to the permission setting range.
In addition, each user (as a friend user) can send a message to the second background server, and the authority is set according to the disclosure degree or disclosure range of whether the user is willing to accept SNS help-seeking requests initiated by others: for example, all SNS help requests may be allowed or masked, or only SNS help requests initiated by an associated user (e.g., a friend of a circle of friends or a friend of a circle of friends of a second level, or an interacted user) may be accepted. The user can respectively limit the identity, the value of certain attribute, the physical world trait and the like of the user who initiates the SNS help request through the authority setting, and can also limit the content of the topic for SNS help, the physical world trait involved in the initiation and the like to receive the SNS help request conforming to the authority setting. The second background server eliminates the help request which does not conform to the permission setting range. If necessary, the user may also request the second backend server to transmit related auxiliary information (for example, user information of a topic initiator, a topic or physical world characteristics related to the topic initiator, and the like) when transmitting the topic of the SNS help request to the second backend server; and after the user checks the auxiliary information, judging whether the received SNS help is required to be replied or not.
The friend user who replies to the topic may be a recommender, and ask the core server or an authorized party thereof to generate a recommended two-dimensional code whose code information includes, for example, the commodity information, the user information of the friend user, and the evaluation information of the commodity that is commented on, and send the recommended two-dimensional code to the first user as a reply to the topic, or issue to other users for commodity recommendation (for a relevant example of commodity recommendation, see the description of the foregoing embodiments).
In another example, the first user obtains the corresponding commodity information and the information of the recommender by identifying the recommended two-dimensional code issued to the first user by others. The first user can directly send an SNS help-seeking request to the recommender based on the recommended two-dimensional code, and the recommended two-dimensional code can further include a link address for receiving the SNS help-seeking request by a second background server of the social network platform where the recommender is located. The SNS help-seeking request received by the second background server further comprises identification information of the recommender, so that the request is accurately sent to the corresponding recommender to reply.
The core server acquires the relevant operations of all parties in the SNS help seeking process, and corresponding attribute adjustment is respectively carried out in accounts of a second background server for completing the SNS help seeking, a first user for initiating an SNS help seeking request, a friend user for replying the SNS help seeking, a recommended user for issuing a recommended two-dimensional code and the like. The first backend server and/or the second backend server can provide more targeted services (e.g., offer a greater discount when providing services, provide reward offers, or promote the ranking of users in the social networking platform) based on the attribute status of the user. And the attribute state of a certain user can also be used as a reference for setting the authority when the SNS help is initiated or received.
As shown in fig. 9, the process of the above embodiment is illustrated as another specific example of a restaurant ordering, after operations similar to steps S501 to S503 are performed, in step S601, a menu of the restaurant is presented through the mobile phone of the first user, and the menu is encoded according to the set encoding rule of the two-dimensional code and is read and presented. For each menu type, SNS help-seeking requests can be initiated; namely, the background server is requested to invite the friends to post comments on the dishes/the shops of the menu in the circles from the first level to the second level of friends of the consumer on the social network platform. In step S602, after the friend user who receives the SNS help request learns the stores or dishes involved in the topic and further checks the information of the initiating user presented to the friend user by the backend server to verify the identity of the initiating user, the friend user provides the comment information on the corresponding stores or dishes and sends the comment information to the backend server. In step S603, when the backstage server forwards the comment replied by the friend user to the mobile phone of the consumer (initiating user), the backstage server may simultaneously notify the consumer of the "rater index" possessed by the friend user or other attributes allowed to be disclosed by the friend user for reference by the consumer.
Then, the consumer may perform a click according to the operation of step S506, issue a comment of the consumer according to the operation of step S507 for others to search for use when initiating an SNS search, or send a recommended two-dimensional code containing information of the store/dish, information of the consumer as a recommender, and the like to recommend to others, or describe, according to step S508, an adjustment record of a corresponding index is performed for the consumer and its friend users by the backend server or the core server. For example, the background server may also record that the consumer has scanned the two-dimensional code or completed a transaction in the restaurant, preferentially search the comment of the consumer or preferentially initiate an invitation to reply to a topic to the consumer when another user initiates an SNS search or an SNS help request in the future, and the like.
The mobile terminal of the consumer submits the request for SNS search and the request for SNS help to the background server of the social network platform in a mutually matched way. For example, the consumer may first perform operations similar to steps S501 to S505, and display the comment result returned after performing an SNS search on a certain dish and the rater index of the comment publisher on the mobile phone of the consumer. The consumer may select several raters having the highest rating index, and further send an SNS help request to the background server requesting to send topics inviting the selected raters to introduce a certain dish in detail. The raters receiving the invitation can release comments on the topic and reply to the consumers, or shield the invitation according to the set authority. Similarly, the consumer can set corresponding keywords from the comment results returned by seeking help in the SNS to form a new topic, and request the background server to perform an SNS search in a wider range of user groups according to the new topic.
In addition, in another example, assuming that a consumer presents a menu through specific client software of a mobile terminal, and initiates an SNS search and/or an SNS help request or makes a click request for a certain dish therein, a certain party (e.g., a background server of other users/social networks/a service terminal device of a restaurant, etc.) receiving the corresponding request learns the attention of the consumer to the dish, and further pushes other goods or services related to the dish to the consumer, for example, a dish paying attention to fat meat, and then pushes insurance that fatty liver is ill to the dish; the pushed content is matched accordingly according to certain physical world traits or combinations of traits of the consumer. The consumer can purchase insurance according to the pushed message or recommend the content related to the insurance to other users, and obtain the recommendation reward based on the condition that any level of recommended persons on the recommendation propagation chain successfully purchase the insurance, and the recommendation index of the consumer is adjusted.
Example 7
In the present embodiment, a plurality of examples of an information processing method based on uniform code sending are provided, as shown in fig. 10, which mainly relate to interaction between a core server, a plurality of background servers each having a different theme, and a mobile terminal of a user having a plurality of Identification (IDs); other mobile terminals, servers of other third parties, etc. may be configured according to the actual application. In the above or the following other embodiments, the above or the following embodiments may refer to one of the backend servers in this embodiment, and/or the interaction of one of the IDs of the user or the mobile terminal thereof in this embodiment.
The user uses one or more IDs to register as a registered user of a background server of a corresponding theme; one mobile terminal of the user can only correspond to one ID of the user, and can also correspond to a plurality of IDs of the user and realize the switching of the IDs according to the needs; an ID of the user may also be logged on to a different mobile terminal to enable interaction with the corresponding backend server. The process that the user interacts with any background server corresponding to any topic through the mobile terminal by using any ID may refer to the description in the above embodiments.
The core server is used for setting an attribute account for each user (for example, a unique identification such as a real name and an identification number may be required to be registered with the core server, so that each user only has one corresponding attribute account; but not limited to a case where one user may have multiple corresponding attribute accounts in other examples). The attribute account correspondingly comprises a plurality of attributes, wherein each attribute in some attributes correspondingly comprises a plurality of theme items, and the theme items correspond to a plurality of themes; the core server learns that one or more IDs of the user are associated with a certain theme, or that one or more IDs are associated with multiple themes respectively (for example, the user or a corresponding backend server notifies the core server of the association), so that operations conforming to the setting conditions of the attribute adjustment can be performed on the user using the mobile terminal with a certain ID (for example, but not limited to, performing an interactive operation with the backend server corresponding to the theme, and/or generating a recommended two-dimensional code overlapping the ID of the user to perform a recommendation operation to other users, replying an SNS search request or an SNS help request, and the like), and the core server performs the adjustment of the attribute value under the corresponding theme item in the attribute account. The core server may set corresponding weight indexes for different theme items (corresponding to different themes) to calculate matching attribute adjustment values. For example, for the same type of operation performed by a user with a certain ID under different topics, the core server may obtain different values for adjusting corresponding attributes after calculating according to the weight index of the topic.
In other examples, in addition to different subjects, corresponding weighting indexes may be set for other things, for example, corresponding weighting indexes may be set for different operations performed by the user, and for example, corresponding weighting indexes may be set for different physical world characteristics when the user performs the same type of operation. The attribute values may be calculated individually from the weight index of an item: for example, different operations performed by the user under the same theme are calculated according to the weight index set for the operation, and then the adjustment value of the corresponding attribute is obtained. The attribute values calculated by the weight indexes of several items may be combined: for example, an operation of a user is calculated according to a first weight index corresponding to different operations, then calculated according to a second weight index corresponding to a physical world trait when the operation is executed, calculated according to a theme corresponding to a user ID when the operation is executed, calculated according to a third weight index corresponding to different themes, and finally an adjustment value for a corresponding attribute is obtained.
A specific example is provided below to illustrate the solution of the present embodiment: a user DM1 is set to have several IDs based on a plurality of specific topics, such as WECHAT1, WEIBO1, and strange ID MOMO 1. Wechat, microblog and strange news maintain different social network platforms through respective background servers, and correspondingly correspond to three different subjects respectively having SNS (social networking services) publishing and propagating functions in the embodiment; the three generate two-dimension codes corresponding to each theme through the core server or an authorized party thereof and publish the two-dimension codes on respective cooperation platforms.
Under different application conditions, the two-dimensional codes of all themes can correspond to different service contents; or, the two-dimensional codes of the respective themes may correspond to the same service content, but simultaneously cover respective features of different themes, for example, the two-dimensional codes have different encoding modes, and only the software matched with a certain theme can identify the two-dimensional codes of the theme to extract the contained service content. The same service contents (commodity information/recommendation contents, etc.) corresponding to the respective topics may be provided by a third party independent of the topics.
The user DM1 recognizes the corresponding two-dimensional code by using different IDs respectively, and completes several actions in the corresponding O2O scene (such as a specific time point, a specific physical location, or other elements of physical world characteristics or combinations thereof, specifically defined by the background server by performing conditions in advance), for example, with ID of theme one, i.e. WECHAT 1:
(Wechat-Activity1,Wechat-Activity2…Wechat-ActivityN);
also with the subject two ID, WEIBO1, several additional behavioral actions are accomplished:
(Weibot-Activity1,Weibo-Activity2…Weibo-ActivityN);
with the ID of topic three, mo1, several other behavioral actions are accomplished:
(Momot-Activity1,Momo-Activity2…Momo-ActivityN)。
for this purpose, the user DM1 obtains the following overall evaluation index or index:
Index1=F(F1(Wechat-Activity1,Wechat-Activity2…Wechat-ActivityN,O2O), F2(Weibot-Activity1,Weibo-Activity2…Weibo-ActivityN,O2O), F3(Momot-Activity1,Momo-Activity2…Momo-ActivityN,O2O),…FN(…))。
the evaluation of the composite rating index, defined as a series of functions F, is performed according to a uniform rule and/or protocol. The set rules and/or protocols, for example, determine which behavior actions of the user under various topics can be evaluated, or whether the behavior actions have different weight indexes; and whether to refer to different O2O scenes when corresponding behavior actions are completed or the weight indexes corresponding to different O2O scenes when corresponding behavior actions are evaluated, and the like. For example, in different application cases, the behavior actions that can be evaluated under each theme can be set to be the same or different, and the behavior actions can be set to have different weight indexes. In order to obtain the evaluation, the behavior and actions of the user under each theme can be the same or different; the user can complete all the set behavior actions under a certain theme to obtain the evaluation index under the theme, and complete some behavior actions in all the settings under another theme to obtain the evaluation index under the other theme. The O2O scenario when the action is completed may further serve as one of the references for evaluation by the background server and/or the core server of each topic.
The background server of the theme I evaluates the behavior action under the theme through a function F1, the background server of the theme II evaluates the behavior action under the theme through a function F2, and the like when more themes exist; and finally, the core server or a background server and a third-party server appointed by the core server comprehensively calculate the evaluation indexes obtained by all the subjects through a function F. The background server of each topic may know a complete evaluation rule (i.e. all functions F, F1-FN in the whole series), or should know at least a part of the evaluation rule corresponding to the topic (i.e. including at least the function FN, N corresponding to the topic); the core server may know the complete evaluation rules (i.e. all functions F, F1 to FN in the whole series), or at least the rules used when the final composite evaluation is performed (i.e. at least including function F).
The rules according to which the background servers of each topic are evaluated can be formulated by each background server respectively, and other background servers, core servers, service providers or users can be informed of the rules if necessary. Or, in another example, the rules according to which the background servers evaluate the topics may also be formulated by the core server, and the core server notifies the background servers respectively, and may be known to the user if necessary. Or, in another example, the rules according to which the background servers evaluate the topics may also be formulated by another third party (such as a merchant serving as a service provider or a reward issuer) independent of the background servers (the social platform corresponding to the topics), and notify the background servers, and notify the core server or the user of the knowledge if necessary.
Similarly, the rule according to which the core server performs the final evaluation may be formulated by the core server, or may be formulated by the third party and notified to the core server; the rules may be notified to background servers or users as necessary. In addition, the background servers of each theme are also provided with respective attribute accounts at the core server, and the core server can evaluate each background server after finishing the behavior action set by the rule and calculate the evaluation index of each background server; reference may be made to the weighting indices of the different behavioral actions and/or what each behavioral action is involved with.
In some examples, the core server may set a corresponding weight index for the evaluation index of each background server, and after receiving the evaluation index of the user under each topic sent by each background server, when the core server performs comprehensive evaluation on the evaluation index, the core server may further refer to the evaluation index of the background server itself under each topic, and perform calculation with the corresponding weight index to obtain a final evaluation index of the user under a certain attribute. The attribute related to the calculation of the comprehensive evaluation index of the user and the attribute of the background server referred to in the calculation can be the same attribute or different attributes, for example, when the credit rating, the credit score or the amount of digital currency of the user are comprehensively evaluated, the core server refers to the credit rating of the background server to evaluate or set the corresponding weight index.
The evaluation index obtained by the user for a certain attribute under a theme can be one of reference bases when other attributes are evaluated under the theme; the comprehensive evaluation index obtained by the user under a certain attribute can be used as one of the references for evaluating other attributes. The comprehensive evaluation index of an attribute of the user or an ID of the user is recorded under an attribute account of the user by the core server; the comprehensive evaluation index can be directly and digitally displayed, and can be consulted by the user himself, other users, the background server, the third-party server and other parties when needed, so that the parties can know the condition of the user, and the comprehensive evaluation index can be used as one of reference bases when considering the authority setting of whether reply information of the user is adopted or not. Of course, the user or the core server may also define, through authority setting, which interaction parties are allowed to refer to the user's comprehensive rating index and/or the rating index that they obtain under each topic.
In addition, when the backend server of a certain topic knows that the same user has multiple IDs, the backend server may first evaluate the behavior actions performed by each ID, and then set a weight index for different IDs (for example, the weight index is set by referring to a certain attribute value (such as user level, activity level, and the like) of each ID), calculate a unified evaluation index for the user under the topic, and send the unified evaluation index to the core server for comprehensive evaluation. Or, in another example, when the backend server knows or does not know a plurality of different IDs of the user, the backend server evaluates the behavior actions performed by each ID separately, and sends evaluation indexes corresponding to the different IDs to the core server; then, assuming that the core server knows that the user has multiple IDs on the same topic, the core server may comprehensively calculate evaluation indexes (e.g., according to a certain weighting index) of the IDs, and then record the evaluation indexes in the attribute account of the user.
The behavior actions that the user may perform may be the actions that the user mentioned in any of the above embodiments performs or interacts with other parties, such as but not limited to: the method comprises the following steps of registering to a background server, identifying the two-dimensional code to obtain service related information from a corresponding background server, recommending (for example, issuing and recommending the two-dimensional code) to other users, completing transaction operation with the background server corresponding to the service contained in the two-dimensional code, replying SNS (social network service) search requests or SNS help-seeking requests of other users, performing other traditional operations on a social network platform maintained by the background server of a certain subject by the user, and the like. The behavior action that each backend server can be evaluated by the core server may be the operation of the backend server itself mentioned in any of the above embodiments, or the interactive operation with the mobile terminal, the core server, the third-party server, and the like, or the operation of evaluating the user described in this embodiment, and the like.
Any party (such as the user and the mobile terminal thereof, the background server of each topic, the server of the third party, and the core server) that interacts needs to send data or information to other parties, including but not limited to: the interactive information, the evaluation index, the rule notification information, the O2O scene information, and the like can be transmitted in the form of a two-dimensional code; the two-dimensional code is generated by a sender of information requesting a core server, and the core server or an authorized party thereof generates a two-dimensional code containing a code corresponding to the information.
One embodiment of the unified two-dimension code encoding rule of the core server is that a two-dimension code generating interface is arranged, and the length of the current two-dimension code short code is adjusted from 8 bits to 12 bits, for examplewww.linkon.cn/ABCDEFGHIJKL_ UVWXYZ. The first 12 digits (A-L) are unique, and comprise a promotion page two-dimensional code and a payment two-dimensional codeThe code returns a short code to the operation server after the operation server calls the interface, and the operation server generates a two-dimensional code picture; promotion page two-dimensional code interface parameters: server ID, merchant ID, object type, object ID, area ID, channel ID, share, user ID, source two-dimensional code, and the like; paying two-dimensional code interface parameters: server ID, merchant ID, administrator ID, amount, remarks, etc.; the interface needs to verify the operating server website, the server ID, the application key, token, etc. Then 6 bits (U-Z) are merchant ID, location, channel management, object ID, object TYPE (CODE TYPE, which can manage various attributes of the object such as showing/promoting recruiters/buying/surveying questionnaires/getting coupons/donations, etc., service obtained by clicking (e.g. in a wechat)/long pressing (e.g. in a wechat two-dimensional CODE)/scanning CODE (e.g. in an environment where the CODE can be scanned)/shaking (in a scene), etc., user ID, source CODE, etc.
Example 8
An example of providing the user recommendation with the reward by performing the weight calculation using the rating index is further provided below, and the embodiment described above may be referred to for the corresponding setting.
Still assume that a certain user DM1 has several IDs based on a number of specific topics. Background servers of the topics (such as WeChat, microblog and strange) maintain different social network platforms, the background servers and the social network platforms have SNS publishing and spreading functions and are connected with the same access server respectively, contents (such as service contents, commodity contents, recommendation contents and the like) provided by a certain business are obtained from the access server, and two-dimensional codes of coded contents and the contents are published on cooperation platforms (such as O2O scenes of the business, the counter, the webpage and the like) corresponding to the topics for popularization.
The SNS publishing and spreading function of the background server of each topic includes but is not limited to supporting a user to perform any one of the following operations: posting or replying a message on a personal homepage or other pages, message transfer between users, performing SNS search/SNS recourse, authority setting for message posting or message acquisition, and the like. The user can send recommended content to other users based on the SNS posting dissemination function. The user may use a form of a recommended two-dimensional code when transmitting recommended content.
In addition, the background server can also obtain the content provided by the merchant from the access server to generate the two-dimensional codes corresponding to the topics; or the background server can directly obtain the original two-dimensional code containing the content from the access server, and further generate the two-dimensional code corresponding to each theme after decoding the related content. For the operation of generating each two-dimensional code, reference may be made to the description of each embodiment described above.
The two-dimensional codes issued by background servers with different themes can be consistent in content and format; or, the coded content corresponding to the two-dimensional code issued by different topics may be superimposed with the identification information or other information unique to the topic or its background server (for example, a link of a social network platform, a web page, client software, etc. related to the topic), in addition to the contents such as service content/commodity content/recommended content provided by a merchant; or, the two-dimensional codes issued by different topics can also have coding forms corresponding to the topics and can only be identified by client software of the corresponding topics, and the like.
The user DM1 recognizes the original two-dimensional code issued by the merchant through the mobile terminal thereof, or recognizes the two-dimensional code issued by the background server of a certain subject, and learns that the merchant sets a reward rule of "recommending a house property for 100 ten thousand total sales and sharing a sharing chain with a spreading value of 1 ten thousand yuan" by extracting the content contained therein. In order to obtain the distributed reward, the user DM1 further superimposes the information of the user or the mobile terminal thereof on the basis of the content corresponding to the two-dimensional code, and requests the core server to obtain a corresponding recommended two-dimensional code. For example, the original two-dimensional code of the merchant, the two-dimensional code issued by the background server of each topic, or the generation, issuance, identification, and the like of the recommended two-dimensional code of the user may be referred to the description in the foregoing embodiments, which is not repeated herein.
The user DM1 may use the same recommended two-dimensional code or use multiple recommended two-dimensional codes with different ID information superimposed thereon, and spread and promote on the social network platform of the same topic or different topics, respectively. For example, the user DM1 presents the recommended content BUY1 to other users under a certain topic in the scene O2O1 (i.e., an element or a combination of elements at a certain time, place or other physical world traits) by using an ID of the certain topic to share a recommended two-dimensional code or in other spreading promotion forms, and the operation is recorded as a behavior action of "SNS recommendation 1 is completed with the ID of WECHAT1_ 1" by a background server (or a core server or a third-party server or an access server, etc.) of the topic; the recommendation BUY1 is delivered to, for example, a friend whose WeChat ID is WECHAT1_2, and is delivered through multi-level recommendation (refer to the description of the foregoing embodiment) to a user whose WeChat ID is WECHAT1_ N, and the delivery of the recommendation BUY1 directly causes the user of WECHAT1_ N +1 to generate an operation of "purchasing" a total of 100 ten thousand properties recommended. The entire "propagation CHAIN" of multi-level recommendations, referred to as "O2O _ CHAIN 1", relates to the fact that the direct recommender WEHCAT1_1, up to the nth level of the direct recommender WECHAT1_ N, which facilitates the completion of the transaction, can share the 1 ten-thousand dollar reward set by the merchant.
Assume that the evaluation RULE employs RULE1, which specifies: the evaluation weight of profit for propagation in the "propagation chain" is 1, 1, 2, 3, 5, 8, 13, 21, 34, 55, 89, and N is 10 "obtained by using the" phenanthreneic number series (N is 10 "), as shown in the following table:
sequence of 1 2 3 4 5 6 7 8 9 10
Order of the order 1 2 3 5 8 13 21 34 55 89
Weight of 0.43% 0.87% 1.30% 2.16% 3.46% 5.63% 9.09% 14.72% 23.81% 38.53%
That is, 10 (sequences) are given different "weights" for each "order" (in this example, the weight is a ratio obtained by dividing the number of the order by the total of the number sequence).
Wherein, WECHAT1_ N, which directly "prompts transaction to complete", will obtain "38.53%" of the above-mentioned level 10 sequence "and" raise "; the calculation method of the extraction is as follows: if the final purchaser of WECHAT1_ N +1 only has an "online recommender," WECHAT1_ N ", WECHAT1_ N obtains a reward of 1 ten thousand yuan × 100% × 38.53% >, 3853 yuan; the corresponding rewards obtained by recommenders at other levels on the "propagation chain" can be analogized.
In another case, the final purchaser is recommended the content by a plurality of users on a certain topic, recommended the content by another plurality of users on another topic, and finally decides to purchase the recommended goods, and then the users share the reward corresponding to the sequence 10 in the table as the directly recommended "online recommenders".
As shown in fig. 11, for example, the "online recommender" of the end purchaser WECHA1_ N +1 may be defined as: the final buyer is recommended by three people, namely, MOTIF1 (WECHAT 10), MOTIF2 and MOTIF3 under a certain theme, and the three people share three pieces of information which are recommendation 1, so that the three people become recommendations of the same theme and become the top three items of the series closest to the traders according to the time sequence. And seven people, MOTIF4, MOTIF5, … MOTIF10, were recommended based on a different theme, and were also direct recommenders of WECHAT _1+ N, then these seven people would constitute the "seven last items in the series".
The aforementioned MOTIF1, MOTIF2 … MOTIF10 become 10 nodes, and the network (digital human network id) of VIP based recommendation 1 bargaining constituting WECHAT1_ N +1 gets distributed rewards. The distribution mode of the reward is as follows: MOTIF1 (i.e., WECHAT1 — 10) is the first recommender to recommend the content to the end purchaser, so he gets a reward of "reward ratio is the sequence 10 and weight is the first indicated 38.53%", i.e., a reward of 1 ten thousand x 100% × 38.53% (reward ratio) × 38.53% (weight) × 1484. The MOTIF2 is the second recommender who recommends the content to the end purchaser, and obtains a reward in accordance with "reward rate is the series 10 and the weight is the second 23.81%", and obtains a reward of 1 ten thousand x 100% × 38.53% (reward rate) × 23.81% (weight) × 917.4 yuan. By analogy, each "node" in the "digital human network" of the deal may receive rewards in accordance with the calculations described above.
Of course, other series may be selected to calculate the prize scale or weighting index depending on the application. In addition, the "first" recommender is obtained by time-ordering in this example, for example, the recommender whose recommendation time is closest to the purchase time, or in other examples, the recommender who recommends earliest may be referred to, and so on, the ranking of the "second" and subsequent recommenders; the invention also does not limit the use of other attribute elements (e.g., distance, high or low score) or combinations of attribute elements (e.g., distance and time) other than time to rank the recommenders.
The specific calculation rules related to the weight index, the reward proportion, and the like can be formulated by a third party (such as a specific service providing merchant or a reward issuing merchant), and sent to the access server, the core server or background servers of various subjects by an internal server of the third party, so that the rules can be used by each party when generating the two-dimensional code or calculating specific parameters such as the attribute value, the evaluation index, the reward amount, and the like. Alternatively, in another example, the rules may be set by a core server, an access server, or the like in accordance with a request from a third party (a merchant), and the rules may be notified to other parties to perform recording.
The calculation of the related weight index/reward ratio or the calculation of other attribute values according to the weight index/reward ratio (such as a core server, an access server, a background server of each theme and the like) is required to be performed, and then the calculation is requested to a rule making party or a recording party. The merchant's internal server or the merchant-designated backend server/third party server, etc., can also interact with the end purchaser's mobile terminal to complete the transaction as described in reference to the various embodiments described above.
The information related to recommenders on the whole "propagation chain", especially the effect of recommenders from different subjects on the final transaction, can be known by tracing the information of recommenders at all levels in the recommended two-dimensional code, for example. In view of the fact that the recommended two-dimensional codes are generated by the core server or authorized parties after the recommended two-dimensional codes are known by the core server, the core server can know the conditions of recommenders at all levels, and other parties (an internal server of a merchant, an access server, background servers of various subjects and the like) can inquire the conditions of corresponding recommenders to the core server when needed. In different examples, such as a core server, an internal server of a merchant, an access server, a background server of each theme, the specific evaluation index, the prize amount and other various attribute values of the user can be respectively calculated; the attribute values independently calculated by each party can be respectively recorded in a database set by each party or used for calculating other parameters; alternatively, the attribute values calculated independently by the parties may inform the core server to record in the user's attribute account or inform the core server to perform comprehensive calculations, etc.
Besides, besides recommending contents generated or pushed by other servers, an individual user can create digitized contents, such as articles/music/cartoons/videos/games, and the like, for example, generate a two-dimensional code corresponding to the digitized contents or a link address thereof to be transmitted to other users. The user, as a service provider, may set a corresponding usage rule and/or reward policy for the promotion of the digital content: for example, the top 1000 users who obtain the digitized content by identifying the information of the spread two-dimensional code can use the content free of charge, and the 1001 st user starts to charge, each person charges for 1 yuan each time; therefore, the service provider records and judges according to the sequence of the two-dimensional code transmission receiving user sending the request for acquiring the digital content. For another example, a recommender who transmits and shares the digital content is given a 'full-chain transaction promotion reward mechanism', sets different distribution amounts with different charging rules, and assigns different rewards for successful transmission or successful transaction: if each spreading user is added to the spreading chain, 0.1 yuan is rewarded; one paying user per deal, reward 0.2 dollars, etc.
The method comprises the following steps that a user who creates the digital content notifies a core server of the situation, the use rule, the reward strategy and the like of an originator so as to formulate a corresponding coding rule required for generating a propagation two-dimensional code, generating a recommended two-dimensional code in each level of promotion process; according to the convention, any one of a core server/a background server of the social platform/a third-party server storing the digital content and the like issues rewards to the recommenders based on the corresponding strategy. Since the two-dimension code for transmission and the two-dimension code for recommendation are generated by the core server or the authorized party thereof according to the set coding rule, the user information of the original and the recommenders at all levels can be contained in the two-dimension code, and the information of the user who requests the service provider to obtain the digital content by identifying each two-dimension code can be known, so that the user information can be tracked on the whole transmission chain, the recommenders can be issued with rewards, the users can be charged, and the rights and interests of the original can be protected.
Example 9
The embodiment relates to a digital person, a digital person network constructed by the same and a communication method, and is shown in fig. 12.
The digital person defined in the invention is superposed on or attached to the person of the entity, and can be understood as the combination of the person in the real world and the equipment which is provided by the person and can carry out digital sensing access, and the equipment which is digitally sensed and accessed endows the person of the entity with digital attributes, so that the digital person becomes a node in the network. The mobile terminal/client/wearable device of the user and the like described in the embodiments and the modified examples thereof are a device in which digital sensing is accessed; the actions of the user, which are performed by the user itself or interacted with the parties, and the like, as described in the embodiments and the variant examples thereof, can be taken as the actions of the digital person.
The digital person has any one or any combination of the following behavioral patterns: the digital person can know the content corresponding to the encoded information of a certain or some encoded media (such as any one of the two-dimensional codes or corresponding hyperlinks described above, and other encoded media will be described in the following embodiments), or obtain the way of the corresponding content (the content is, for example, a notification message, a digitized product, a predefined operation flow, a condition policy, an operation instruction, and the like, and the obtaining way may be a web page, a link address, identification information, and the like pointing to a content providing organization), access the corresponding information network defined by the encoded information, and communicate with a server of a specific organization defined by the encoded information (to perform information interaction, perform a transaction, obtain a service, and the like).
The digital person has a digital person logo available for identification: in various examples, the digital person identifier may be device information and/or identity information of the user; the identity information of the user can be bound with the equipment information; the digital personal token may be unique within a particular range. Any action performed by the digital person may be identified and recorded by an authorized authority based on the digital person identification available for identification. The mechanism for identifying or recording the digital person information can, for example, screen different digital persons according to the identified digital person information, open different operation authorities matched with the digital persons to the corresponding digital persons, execute different matched operation processes when interacting with the digital persons, provide different matched services, perform attribute recording and numerical value adjustment on the condition of executing operations conforming to the predefined definition, and the like. The digital person provides its own digital person mark for identification and verification when interacting with the corresponding mechanism.
The behavior of the digital person is closely related to the real physical world, when the digital person interacts with the corresponding mechanism, the digital person can provide some special elements or element combinations (time, place, identity, behavior and the like) which can be used for distinguishing the scene of the real physical world where the digital person is located by the other party, and then the corresponding mechanism compares the special elements with elements and the like which are defined in a rule strategy in advance by identifying the special elements, and takes the comparison result as one of the bases for screening/opening corresponding authority/providing matching service/executing corresponding operation/adjusting corresponding numerical values and the like of the digital person.
One of the behaviors of the digital person can be to share and propagate the content to the outside. The shared content may be information that it obtained from the encoded media and allows the digital person's logo and/or the digital person's added information content, etc. to be superimposed thereon as desired. And the corresponding mechanism identifies/records/adjusts the attribute and the like of the sharing operation of the digital people by identifying the mark in the digital people. The digital people can release the shared content outwards in the form of recommending the two-dimensional code, and multiple times of recommendation, multi-level recommendation and the like are performed among a plurality of digital people. Recommending two-dimensional codes or any other two-dimensional codes, wherein the two-dimensional codes or any other two-dimensional codes are generated by a uniform code sending mechanism in the area or an authorized mechanism of the uniform code sending mechanism; the unified code may, for example, effectively trace the propagation path of the shared content after multiple/multiple recommendations in order to identify the degree of contribution of the parties (e.g., in the event of an eventual successful transaction by the referrer) for which to calculate matching attribute values.
The behavior of the digital person may also be to perform the SNS search described in the above embodiments or to publish content for the SNS search, and/or to perform SNS help or reply to SNS help topics of others, and to allow setting of corresponding filtering conditions or disclosure rights, and the like. The digital person logs in one or more social networks to perform actions such as forwarding recommendation/SNS search/SNS recourse and the like based on the corresponding ID information, wherein the ID information of the digital person can be a mark thereof, so that the mechanism for identifying the mark performs corresponding evaluation (provides attribute value recording and adjustment and the like) on the actions of the digital person.
When evaluating the attribute values of the digital person, different weight indexes can be assigned to different subjects (different social networks, different operations, different trait elements, recommendation levels, etc.) when the digital person performs corresponding actions according to predefined rules, so as to calculate corresponding attribute values. Some attribute values (evaluation indexes, special elements and the like) are used as the basis for adjusting other attributes (points, fund limits and the like); some attribute values (rating index, trait elements, etc.) may be queried by other digital people or other organizations when needed; some attribute values may be communicated between the figures or between the figures and accounts of other institutions (e.g., funds, etc.), as described in more detail in various embodiments herein.
The digital person uses the device with the digital sensing access to identify the coding medium, so that the operations required for accessing an interactive network defined by the digital person to obtain information/services or providing services (such as recommendation, information release to SNS search, SNS help topic reply and the like) for other people can be simplified. Based on the uniform coding rules and the matched decoding rules of all parties, the interaction between all the parties and (especially and the digital persons who become registered users of the parties) is closed-loop transaction (not limited to transaction of commodity buying and selling), so that other parties without consistent rules are difficult to invade the closed-loop transaction process, and the information security can be effectively ensured. And the digital human device can simplify corresponding operations by judging and automatically installing client software with corresponding rules.
The system (digital human equipment and corresponding equipment of each interactive party) can execute the closed-loop transaction command, the command triggered by the system is written according to the specific coding rule of the system, and the two-dimensional code and other coding media are generated; for example, a digital person may be required to be a registered user of the mobile phone APP and the background system, as a "member" of the "background system", to perform a "closed loop transaction". The two-dimensional code in this example may encode not only the URL address, but also, for example, O2OBUY12345 (to identify the execution command of the O2OBUY server as O2OBUY 12345).
The method has the advantages that the physical world characteristic elements of the digital person when accessing the interactive network are known, and the method is favorable for judging the grid space (the grid space represents the collection of various properties in the physical world, such as regions, organizations, product groups, sales channels, sales representatives, reward policies, activity ranges and the like) of the digital person in the real world. Whether a digital person can be exposed to the information distributed (e.g., in the form of a coded medium) results from whether the particular grid space of the digital person in the real-world environment of interest to the distributor matches the distribution policy established by the information distributor, such as a particular location, time point, particular circle of friends, particular web browsing, audience for a particular television program, and so forth. Thus, the entity economy is enabled to generate more value access points in the O2O electricity business era; therefore, the real-world attributes are endowed by the behaviors of the digital people, so that enterprises can quantitatively evaluate the input and output of the O2O full channel of the overall advertisement delivery through the propagation attributes and effects of the grid space of the physical world.
It should be noted that "O2O" as used herein refers to Offline to Online, rather than Online to Offline in the conventional sense. That is, the physical world belongs to the Offline world, such as but not limited to: shops, newspapers and magazines, computer pages, screens of mobile terminals, and the like. The digital human equipment has sensing access capability, namely has sensing equipment sensing access such as two-dimensional code scanning, and has the function of interacting with servers of other organizations or other digital people through wireless sensing access of ZIGBEE/IBEACON and the like to an ad hoc network.
By distinguishing the digital person mark, the behavior of the digital person can be identified/recorded/evaluated/rewarded by the corresponding organization, and further, the unique evaluation reward or service can be obtained by combining the physical world characteristic elements and the like related to the performance of the behavior operation. Therefore, there is an incentive for digital people to obtain higher evaluation rewards (such as value increase of attribute values), and to try to perform actions conforming to a predetermined evaluation strategy, such as sharing and spreading in a social network to help other digital people to obtain information/services; and obtaining the promotion reward of the corresponding weight according to the recommendation level and the like to realize interest sharing. A large number of digital people are willing to spread and share contents, which is beneficial to forming virtuous cycle of 'helping people to be happy and people to be my'.
Content sharing and transmission in a social network based on digital person IDs under different topics are effective expansion of interactive networks accessed by digital persons through identification coding media, and initial publishers or other parties of information can conveniently trace each link (namely each shared digital person) on a content transmission and sharing chain in the whole process by means of overlaying digital person marks in shared information. The recommended two-dimensional code is generated by the unified code sending structure or an authorized party thereof, and an effective means for conveniently superposing information such as the digital personal mark and conveniently acquiring the digital personal mark by identifying the recommended two-dimensional code is provided.
The present embodiment provides a digital people network, where an access point is initiated by a service (such as goods, rules, policies, operation flows, etc.) predefined by an initial organization (which may be an enterprise or an individual), and the above-mentioned digital people and digital people behaviors participate in the construction process. The inception organization encodes various defined contents, expresses the contents in the form of various encoding media such as two-dimensional codes, and distributes the encoding media to the real world. The coded media are generated by a uniform code sending mechanism or an authorized party thereof, and can be ensured to be generated by uniform coding rules (corresponding to predefined contents); and a person who identifies the encoded media based on the matching decoding rules can trigger a signal that drives the person and its interacting parties to perform a defined operational procedure.
The real world is virtually divided into O2O square spaces by the digital man network, and becomes an access point for accessing the digital man network to obtain service or provide service; the physical world trait elements involved in digital human access provide an effective means to help interactive parties (e.g., service providers) understand the nature of the O2O grid space to which the digital human belongs. Therefore, the encoding media distributed and matched in different O2O square grids form access points, and the real world has digital access capability of 'all channel O2O'. Therefore, the entity economy which cannot be covered by the Internet can be covered, and meanwhile, the coding media such as the two-dimensional codes and the like are displayed on the Internet webpage, so that the full channel coverage of the Internet (channel 1) and the entity economy (channel 2) for enterprises can be obtained; compared with the 'extra hardware connection of the Internet of things', the method can be taken into account by identifying the coding medium, and can be widely applied without extra hardware laying except for the sensing access equipment (the equipment has universal applicability).
Due to the various scenarios of the channel-wide O2O access points throughout the surrounding world, as well as various SNS recommendations, SNS searches are sporadic and ubiquitous. A digital person can see a certain piece of 'e-commerce information' because the digital person belongs to a 'digital person network based on a certain theme', and information is obtained through access/recommendation/sharing of a traceable mechanism from a real world all-channel; after the digital person identifies the corresponding coding medium, the digital person can know who recommends the digital person to the digital person, which social evaluation indexes are involved, and what mechanism for sharing benefits is obtained by the digital person; on the basis, the digital person takes 'what digital person behaviors' again to access the network or build the own digital person network.
Different from the existing internet centralization and Information Based mode; the digital man network of the invention is decentralized, Based on closed-loop Transaction (Transaction Based), and is an ad-hoc network system taking each digital man as the center. The search of the internet is based on a computer/browser, the invention such as SNS search, SNS help seeking and the like is based on O2O access, and the searched webpage is not cold ice, but obtains ' can help your service ' and ' can help your people based on the social network of digital people.
Through the digital sensing access device and the digital person mark bound, each digital person has the digital attribute on the physical attribute of the real world, which is equivalent to accessing the physical person to the Internet of things. Digital people can be searched as a network node by using the digital people mark thereof to become a part of big data of the whole 'digital people network' system, and any digital person not only can be used as a receiving node (receiving service) of information content, but also can be used as a sending node to release content (providing service, not limited to recommending and sharing information) to other people, so that social influence is generated and value is obtained. The digital human network establishes a mechanism for recording and evaluating whether the digital human behavior meets the predefined quantitative evaluation (such as calculating the evaluation index of the shared content by using a uniform evaluation standard and issuing corresponding rewards) for the behavior executed by the digital human.
Every action of the digital person is the action of 'closed loop transaction with logic ID by executing specific function of background'. That is, the "digital person" can complete "the closed-loop transaction according to the functions defined by the backend server and is realized by log-ID (LOGIN ID), so that each" behavior "(including attention/click/propagation/sharing/action, etc.) is transmitted to the backend for recording after being superimposed with its own ID (dna), thereby realizing the whole-course tracking, realizing the" Pay per Performance P4P (Pay for Performance) mode ", and realizing" much more and less effort "; the behavior pattern of digital people, which contains 'two-dimension code scanning,' and 'turn round with friends', and can be 'SNS search', and the like, based on various social networks, leaves traces which can be queried and evaluated by the social network records, and is significantly different from the information-based mode of the Internet.
That is, each digital person can construct a digital person network centered on his/her own according to different "subjects, social status (evaluation index), open attitudes (who is shared with and seen by, etc.), reward policies", and the like. Each digital person can have multidimensional digital person IDs which are uniquely identified in different circle ranges, so that the digital person ID has the digital characteristics of various personality attributes; based on that each digital person ID can be accessed and propagated in a digital mode, executed behaviors can be tracked and evaluated respectively, and therefore the social network constructed based on a Matrix (Matrix) of a multiple theme (Motif), a Matrix of a social prestige index (also called social status, for propagation path and influence) and a Matrix of open attitude is achieved. The social prestige index is a quantitative evaluation index in a certain time period based on various closed-loop trading behaviors of digital people; not only has influence on other digital persons during the propagation process, but also can be used as a weighting index of performance distribution.
Some examples of digital human network access points are provided below: under the online condition, various two-dimensional codes are distributed in a store of a shopping mall as access points, and the access points can realize 'buying and trading instantly' after being identified, and are also the access points and experience display points of a 'digital human network'; the market service two-dimensional code is distributed around a store of a market to become an adding point of a digital man network; a shop salesman or a member of a family of relatives and friends of the shop salesman becomes a core recommender of a digital human network, and the shop salesman or the member of the family of relatives and friends of the shop salesman is used as an access point of the digital human network by wearing an ornament with a service two-dimensional code; the real world scenes of various offline access points capable of displaying the two-dimensional codes are set with parameters according to the scene O2O, so that the access points can be used for statistical analysis of the propagation effect of various passing people and can also be used as a link for transaction extraction. On the line, for example, the service access two-dimensional code is displayed through various web pages, and becomes an access point of a digital human network. The web page including the access two-dimensional code may be a common internet search target at the same time, or may be a target of an SNS search at the same time.
Therefore, the invention is different from the traditional advertisement/market/marketing/planning, including enterprises with income as the main such as television stations/audience ratings/market research, and the like, and realizes the subversion of a new business mode based on a digital human network; because the enterprise can arrange a 'digital human network' access point such as a full channel O2O two-dimensional code at the place where the potential target customer group is absent, the preference and behavior mode of 'each individual' can be known from the perspective of the whole sample, thereby better formulating the marketing strategy of the enterprise, and the traditional advertising expense is paid to each contributing individual of the 'whole process of propagation' instead, including 'issuing source', 'propagating individual', and 'management platform'. Based on the construction of an O2O full-channel marketing system, acquiring the access benefit right of a channel as a scene; initially constructing a digital human network from an enterprise boss; and the continuous operation comes from 'individual digital people capable of carrying out whole-member marketing', for example, each employee of the company can promote the two-dimensional code corresponding to the commodity information to relatives and friends. A digital human network server is built, a plurality of O2O scenes can be correspondingly managed by one server website, and a comprehensive weighted evaluation mechanism of a multi-ID multi-O2O scene is applied. The server can calculate the return points for each employee and perform statistical analysis on the sales conditions of each channel based on the strategies of the corresponding channel, the sales organization, the sales representative, the sales price, the return point proportion and the like.
The digital man network is accessed by O2O and O2O two-dimensional codes and the like based on a Matrixlink protocol which is downward compatible and replaces an Http protocol. Similar to the principle that the http protocol is an Internet basic protocol, the WWW is an application system using the Internet as a transmission medium, and the most basic transmission unit on the WWW network is a Web page, the MatrixLink protocol is also a basic protocol of a MatrixLink network (digital human network). The working principle mechanism is also based on a mobile client/server calculation model, and is a mechanism formed by a sensing access device of a mobile terminal, such as an NFC chip (an identification NFC reader), and a camera and an identification software unit (which can be preset in the mobile terminal or installed later, and is similar to a Web browser (client) and a Web server (server)); the two can also communicate by using a protocol similar to hypertext transfer protocol Http (but including the coding rule of MATRIXLINK). The MATRIXLINK protocol may also be a protocol based on TCP/IP protocol, an application layer protocol between the mobile terminal and the Web server, and may be a general or customized protocol containing service logic, encryption rules, and operation execution flows.
The principle of action of the MATRIXLINK protocol includes:
(1) connecting: com, which is similar to the Web server, establishes a connection to the backend server by recognition through a mobile terminal code scan and/or image code alignment (display screen, recognized by the mobile terminal camera module through bright spot uv difference of the screen, etc., rather than a human eye recognized image code).
(2) Requesting: similar to a Web browser submitting a request to a Web server via a socket. The MATRIXLINK request typically includes, in addition to establishing a connection, a server pointing to parameters associated with predefined business operations logic and logic.
(3) And (3) response: after submitting a request by a Web browser, the request is transmitted to a Web server through an http protocol, the Web server receives the submission of a matrix link protocol of a mobile client, and then carries out transaction processing according to a predefined rule, and a processing result is transmitted back to the mobile client through the matrix link protocol, so that client software capable of analyzing the predefined coding rule is started at the mobile client, a requested page is displayed and executed according to a predefined processing flow, or only the predefined flow is executed, and the predefined closed-loop transaction processing is realized.
Therefore, a person-to-person and person-to-person connection network called MATRIXLINK network can be constructed through the personal mobile terminal through the MATRIXLINK protocol. All the contents and services of the internet can be "a subset of display (display) under the protocol".
The basic structure of the digital human network comprises a plurality of interconnected background servers which uniformly define an access mode and record various behaviors, O2O access points (namely, a full channel distribution point of a two-dimensional code), and digital humans which respectively have any one type of sensing access equipment, wherein the digital humans become receiving and sending nodes of the network in a similar mode of a wireless sensing ad hoc network (for example, based on a mode of logging in a social network by using a digital human ID) to expand the interaction with other digital humans. Any encoding medium such as a two-dimensional code involved in the digital human network is generated by the core server. Other various third party servers, such as access servers, platform servers, etc., may be configured as desired with reference to various embodiments of the present invention.
In order to implement various embodiments of the present invention, a device equipped with a digital man and having a digital sensing access, such as a mobile terminal, e.g., a smart phone, a Personal Digital Assistant (PDA), a tablet computer, etc., needs to be capable of binding a digital man mark (which may be one-to-one unique, and may be permanently or temporarily bound), and has functions of coded medium identification and networking communication; any other client device with similar functions is also possible. The mobile terminal and the servers of one or more background mechanisms and the servers of a plurality of background mechanisms can be connected through a wireless network or a wired network. The wireless network can be a GPRS network, a G3 network, a G4 network, a WIFI network, a Bluetooth network and the like, and can enable the mobile terminal to communicate with the background server and at a place with a network signal at any time.
Taking the identified encoding medium as a two-dimensional code as an example, as shown in fig. 13, a mobile terminal in a specific embodiment includes the following modules: and the control unit is used for generating signals for controlling other units and controlling other units to realize respective functions. The camera is used for photographing the two-dimensional code. The camera with more than 30 pixels can clearly shoot the two-dimensional code. The decoder is used for decoding the shot two-dimensional code to obtain the coded information. And the coding information analysis unit is used for analyzing the coding information and judging whether the two-dimensional code is generated according to a preset coding rule. And the transmitting/receiving unit is used for interacting information with a background server or a core server or other digital persons, receiving services or providing services and the like if the two-dimensional code is generated according to a preset coding rule. The input unit is used for inputting various input information involved in the interaction process. The display unit is used for displaying the content obtained by identifying the two-dimensional code or various information required to be displayed in the process of interaction with each party such as a background server and the like.
The backend server in a specific example, as shown in fig. 14, includes: and the control unit is used for generating signals for controlling other units and controlling other units to realize respective functions. And the transmitting/receiving unit is used for carrying out information interaction with mechanisms such as digital personal equipment such as a mobile terminal and the like or a core server and the like. The background server may be provided with an access defining unit, configured to define an access rule and the like according to which the digital person accesses the digital person network, for example, information such as an operation flow that needs to be executed by the digital person or a server of another organization, and a reward proposing policy is defined. The background server is provided with a built-in or external database, stores various information data in the interaction process and supports calling at any time.
The core server in one specific example, comprising: and the control unit is used for generating signals for controlling other units and controlling other units to realize respective functions. And the transmitting/receiving unit is used for carrying out information interaction with mechanisms such as digital human equipment such as a mobile terminal and the like or a background server and the like. And the coding information generating unit generates corresponding coding rules and corresponding coding information according to various information such as services provided by the background server, access rules defined by the background server and the like. And a two-dimensional code generation unit for generating a two-dimensional code corresponding to the encoded information.
In some different examples, the mobile terminal itself may not be provided with the aforementioned decoder and/or encoded information parsing unit, but the captured two-dimensional code and the like are sent to a background server with the decoder and encoded information parsing unit, and the information contained in the two-dimensional code is identified by the background server and then sent to the mobile terminal.
If the mobile terminal and the interaction parties are required to execute the closed-loop transaction (that is, the coded information of the two-dimensional code corresponds to a command for executing an operation flow), the mobile terminal needs to send registration information to the background server through the sending/receiving unit, and receive a registration success message from the background server after the registration is successful. If the two-dimensional code is generated according to a preset coding rule, the sending/receiving unit of the mobile terminal is also used for sending a service providing request message to the background server and receiving the service from the background server; the transmitting/receiving unit is also configured to transmit a web page request message to a certain web browser and receive a web page corresponding to the encoded information from the web browser, or output an error prompt on the display unit, or the like, if the two-dimensional code is not generated according to a predetermined encoding rule.
The mobile terminal can obtain client software required for executing the set operation flow by downloading, storing a card or other modes, and after the installation is finished, the mobile terminal communicates with the background server through the client software. The background server also comprises a client software monitoring unit for monitoring whether the mobile terminal is provided with client software matched with the coding rule of the two-dimensional code, and a client software installation unit for automatically providing downloading and installation of the client software for the mobile terminal when the situation that the mobile terminal is not provided with the client software is monitored.
The core server can authorize the mobile terminal or the background server with the two-dimension code generating unit to generate the two-dimension code according to a uniform coding rule (not limited to recommending the two-dimension code). The coding rules are generated by the core server in a unified way and are sent to the mobile terminal or the background server with the authority according to the requirement. In order to execute the closed-loop transaction, all parties involved in the interaction process have unified encoding rules and decoding rules. Such as a trading two-dimensional code, a content promotion two-dimensional code, a recommendation two-dimensional code and the like, are identified and then instructions for executing different behaviors are provided according to different access rules defined in coding rules when the two-dimensional code is generated.
Referring to fig. 14 and 15 in a matching manner, the background server provided with the verification unit may identify the digital person identifier and the executed operation when interacting with each party such as the digital person, and compare the identified information with the predefined rule to provide a matching service for the digital person. The background server can send the recognized digital person mark information and the digital person execution behaviors which accord with the preset rules and the like to the core server through the sending/receiving unit for notification. The core server is provided with an attribute adjusting unit which records and adjusts various attributes under the account of the digital person or the background mechanism stored in a built-in or external database, so as to realize the purposes of issuing rewards, transferring digital money amount and the like. The core server may be provided with a similar authentication unit to identify and authenticate the corresponding logo and operation of the digital person or the backend server. The background server can also record and adjust the attribute and the value of the digital person accessing the digital person network initiated by the background server in a corresponding database by setting an attribute adjusting unit.
The mobile terminal can be provided with a corresponding acquisition unit, acquire physical world characteristic elements of a corresponding scene according to requirements defined in the two-dimensional code and provide the physical world characteristic elements for a background server or a core server during interaction. Then, the verification unit of the background server or the core server may identify the physical world trait elements of the digital person, compare the physical world trait elements with a predetermined policy rule, and the like, and use the identified physical world trait elements as one of the bases for operations such as attribute adjustment. Corresponding unit modules can be configured for the mobile terminal, the background server, the core server and the like according to the functions described in the embodiments of the present invention.
Example 10
The embodiment provides an example of implementing the promotion of the food city by an information processing method based on unified code sending, as shown in fig. 16, mainly relates to a core server and a designated third party organization thereof (responsible for compiling the coding rule of the two-dimensional code, unified generation of the two-dimensional code, auditing and quota issuing of the issued quantity and quota of the digital currency, etc.), a platform server (which is used as a first background server for providing services for users or application servers, etc., and is used for inviting merchants, promoting commercial advertisements, matching and achieving electronic trades, managing related transaction flows, etc.), one or more application servers (which are used as users for the platform server, and are used as second background servers for providing services for consumer terminals, and are used for applying for accounts through corresponding devices, applying for managers, editing and releasing and spreading promotion contents, the method comprises the following steps of achieving transaction, generating a collection two-dimensional code, displaying or issuing the collection two-dimensional code and the like), a customer end or a mobile terminal of a consumer (which can be used as a user of a first background server and/or a second background server, and can access interaction with other parties through identifying the two-dimensional code, obtain service after executing a set operation flow, share the obtained reward with other parties and the like); the interaction process of the corresponding service provider and the user can be seen in the above embodiments.
Firstly, a food city sets a corresponding platform server; the core server or a designated third-party server and the like are provided with corresponding fund accounts for recording the share of the digital currency of the food city and the use change of the digital currency. The food city can obtain the usage amount of the digital currency through any one or the combination of the following ways:
1) and taking tangible or intangible assets (such as real estate, intellectual property rights and the like) as mortgages, sending a request to the core server or a designated auditing agency thereof, and obtaining corresponding digital currency after auditing.
For example, the platform server in the food city issues a request of "mortgage with the property of the food city and request to obtain digital money" to the core server, and the core server or the platform server notifies that the auditor evaluates the value of the mortgage, and the core server determines that the digital money of 20 billion yuan can be issued to the platform server according to the evaluation condition, and transfers the corresponding digital money to the fund account of the platform server.
2) And the payment actual currency is converted into the share of the digital currency from the core server or a designated third party institution thereof, and the share is directly charged into the fund account corresponding to the platform.
For example, the food city sends a request for exchanging digital currency to a server of a designated bank and pays corresponding actual currency, and the server of the bank confirms that the digital currency can be exchanged by 20 billion yuan for example according to a preset exchange ratio; the server of the bank sends out a notice that the corresponding actual currency is received or sends out a notice that the corresponding digital currency can be exchanged, and the core server transfers the corresponding digital currency into the fund account of the platform server according to the notice.
The exchange proportion is set by a core server or other specified mechanisms and is generally exchanged after the platform server confirms the knowledge. The digital currency may be exchanged back to the actual currency according to the same or different exchange rates.
3) And acquiring the digital currency paid to the platform server by the application server or the user terminal, and transferring the corresponding share from the fund account of the application server or the user terminal to the fund account of the platform server. After receiving the corresponding digital currency, the platform server generally needs to provide equivalent services or goods to the application server or the user terminal, and the relevant operations involved in the process can be referred to in the description of the foregoing embodiments.
And (II) each merchant staying in the food city is provided with a corresponding application server. At the core server or platform server or other designated third party server, a corresponding funds account is provided to record the share of digital currency of each merchant and its usage changes. The merchant may obtain digital currency by any one or combination of the following:
1) The payment actual currency is exchanged to obtain digital currency;
for example, the application server sends a request to the core server (or the platform server or a designated third-party institution) and pays the actual currency, and the obtained converted digital currency is directly charged to the corresponding fund account of the merchant. The exchange proportion is set by the core server or the platform server or a third party organization, and the exchange is generally carried out after the application server confirms the knowledge.
2) Executing various operations according with the digital currency reward rule to obtain the rewarded digital currency;
the merchant issues and promotes the two-dimensional code or other forms of recommendation contents issued by the mechanisms such as the platform server or other application servers, and obtains the digital currency awarded by the corresponding mechanisms. For example, the application server may issue a recommended two-dimensional code and obtain a reward of the corresponding digital currency calculated according to the weight index (the operations involved may be as described in the foregoing embodiments). The incentive issuing institution notifies the core server to transfer the digital currency corresponding to the incentive to the merchant's corresponding funds account.
3) The share of the digital currency distributed by the platform server is purchased in either real or digital currency, and the purchased share is transferred from the platform's funding account to the merchant's funding account. The specific interaction operations required by the merchant when purchasing shares can be referred to the corresponding operations in the foregoing embodiments when purchasing commodities.
4) Obtaining digital currency paid to an application server by a user terminal, and transferring the digital currency from a fund account of the user terminal to a fund account of a merchant; after receiving the corresponding digital currency, the application server generally needs to provide equivalent services or goods for the user terminal, and the corresponding interactive operation may also refer to the descriptions of the foregoing embodiments.
And (III) setting a corresponding fund account at a core server (or a platform server or an application server or other designated third-party server) by the consumer to record the digital currency share of the consumer and the use change of the digital currency share. The consumer can obtain digital currency by any one or combination of the following:
1) the payment actual currency is converted into digital currency, and the digital currency is directly added to the fund account of the user.
For example, a client or a mobile terminal of a consumer sends a request to a core server (or a platform server or an application server or a designated third-party institution) and pays the actual currency, and the converted digital currency is obtained and directly charged to a fund account corresponding to the consumer. The exchange proportion is set by a core server or a platform server or an application server or a third-party organization, and the consumer generally confirms the knowledge and then exchanges the information.
2) The distributed share of digital currency is purchased from the food city platform in real or digital currency, or the share of digital currency it is redistributed is purchased from the merchant, and the corresponding share is transferred from the food city platform or the account of the merchant's funds to the consumer's funds account. For specific interaction between the client or the mobile terminal and the platform server or the application server when the consumer purchases the share, reference may be made to the foregoing embodiments when purchasing the commodity.
3) Various operations in compliance with the digital money award rules are performed to obtain the awarded digital money.
For example, the consumer issues a two-dimensional code or other forms of promotional content issued by an application server (or a platform server or other mechanisms) to obtain digital money awarded by the corresponding server or mechanism. The reward of the corresponding digital currency calculated according to the weight index is acquired, for example, by the client or the mobile terminal performing an operation of issuing the recommended two-dimensional code (the operation involved may be as described in the foregoing embodiments). The server or institution issuing the reward notifies the core server to transfer the corresponding digital currency of the reward to the customer's corresponding funding account.
In a specific example, each merchant pays rent to the food city to obtain a service of using the site authority within a set time, becomes a resident merchant of the food city, and follows the use and settlement rules of digital currency. The rent form can be paid in real or digital currency, for example, in the various payment methods described in the previous embodiments, according to the agreement between the cafe platform and the merchant.
Each merchant can make an advertisement promotion strategy, set reward rules in digital currency or other forms, and define value rewards of each circulation link. Codes corresponding to the promotion content, the reward rule and the like are contained in the promotion two-dimensional code issued by the merchant, and the merchant issues the promotion two-dimensional code. The promotion two-dimensional code is generated by the core server or an authorized party thereof.
The consumer identifies the promotion two-dimensional code or the recommended two-dimensional code issued by other users to the consumer through the mobile terminal or receives the link of the promotion content issued by the merchant or other users to the consumer, and the consumer checks the corresponding promotion content, namely, the use ecosystem of the accessed digital currency. The consumer transmits and forwards the promotion two-dimensional code of the merchant or the recommendation two-dimensional code which is newly generated based on the promotion two-dimensional code and overlaps the consumer information, and obtains the reward of the digital currency corresponding to the transaction promotion according to the reward rule set by the merchant.
The consumer's digital currency can be circulated directly among merchants in the food city. The consumer can pay digital currency to an application server of a merchant or a platform server of a food city through the mobile terminal for consumption to obtain service or goods. For this reason, the application server or the platform server of the merchant may request the core server or the authorized party thereof to generate a corresponding payee two-dimensional code according to the receivable item, where the code content of the account information of the corresponding payee is included.
For example, a consumer installs specific client software (such as WeChat payment and the like to replace a bank card) in a mobile terminal, and can recognize a two-dimensional payment code issued by a merchant on site or remotely (to replace a POS machine) to acquire corresponding payment information according to a corresponding decoding rule of a preset coding rule so as to pay corresponding fees to the merchant; and the core server or other third-party mechanisms recording the digital currency account of the consumer completes the operation of transferring the digital currency to the account of the merchant, and sends the settlement information to the consumer and the merchant. After receiving the settlement information, the merchant provides service or goods for the consumer.
In addition, the fund account of the consumer can be realized in the form of a famous or unnamed value-stored card such as a shopping card, the consumer directly pays cash or transfers actual currency or digital currency to obtain the value-stored card issued by the food city platform or the merchant, and the value-stored card is directly consumed by the merchant and is not bound with the account of the consumer. The merchant has a device capable of identifying the amount information of the digital currency in the stored-value card and receiving the corresponding amount. Alternatively, the consumer purchases an anonymous stored-value card and uses the client software to transfer the amount of digital currency in the card to a loyalty card or account that the consumer registers with at the platform or merchant, and pays using the balance of the loyalty card or account.
It will be appreciated that in some other examples, the platform server of the food city may be traded against the merchant's application server: for example, the platform server makes a propagation recommendation on the promotion content issued by the application server to obtain digital currency or other rewards issued by the application server; alternatively, the platform server pays the digital money to the application server to obtain the service or goods provided by the application server. Alternatively, the merchant may also obtain the corresponding digital currency by mortgage of the asset to a core server or audit center, and so on.
In the above embodiments, any generated two-dimensional code, such as a payment two-dimensional code, a promotion two-dimensional code, a recommendation two-dimensional code, or the like, or a hyperlink corresponding to the content of the two-dimensional code, is generated by the core server or after authorization thereof. If the two-dimensional codes are generated according to a specific coding rule and are only analyzed by a matched decoding rule, the protection of the information involved in the two-dimensional codes is more reliable, and the information can be effectively prevented from being stolen.
The issues of digital currency, usage and settlement rules and other management matters in the above embodiments can be separated from the core server, for example, managed by a unified digital currency issuing unit, which realizes operations such as adjustment of the amount of digital currency according to the notification of each party (such as the core server, the auditing agency, the platform server, the application server, the consumer terminal, etc.) in the interactive process; according to the set authority, each interactive party can inquire the digital currency amount of the interactive party or other parties from the digital currency issuing unit. The amount or usage of digital money of a certain party can be recorded by the core server (or platform server or application server or other third-party organization) as a certain attribute item, and used as a reference when adjusting the value of other attributes, or adjusted correspondingly with the value adjustment of other attributes.
In one example, the functions of the core server are deployed in different operation servers to correspond to different operators, and the functions of generating two-dimensional codes and approving the credit limit of the operation servers, which are mainly used by the core server, are integrated into a core system. The digital currency quota of the operator is applied to the core system by each operation server, and the quota is issued to each operation server after the core system passes the audit; in the operation server, the merchant and the user consume the quota when recharging, release the quota when withdrawing the cash, and operate within the quota range. For this purpose, the core system records the information of the identifier ID, name, domain name, application ID, application key, Token and the like of each operation server and the quantity of generated object two-dimensional code payment two-dimensional codes and the like in an operation server list by a built-in or external database; the credit list of the digital currency is set for each operation server, and the credit list records the credit of the digital currency which can be issued by the operation server, the used credit of the digital currency which can be issued to the merchant and the user (the withdrawn part needs to be deducted), and the like.
Example 11
In the present embodiment, an example of implementing crowd funding by an information processing method based on unified code sending is provided, as shown in fig. 17. In the above embodiments, for example, the corresponding settings of each party such as the core server, the auditing mechanism, the platform server, the application server, the consumer terminal, and the digital currency issuing unit can be applied to the present embodiment; other third party servers and the like may be configured as desired.
Assuming that 20 million yuan (corresponding to the first share) is required by the gourmet city in the above case, the crowd-funding server is arranged to split the first share of digital currency into 1 ten thousand yuan (corresponding to the second share) and 20 ten thousand shares in total, and the split digital currency is distributed through the crowd-funding server or the platform server and is offered to other parties (such as resident merchants, consumers, or other investment institutions) for purchase.
Each merchant acquires a plurality of shares of the second share of digital currency from the crowd funding server or the platform server through the application server in the share of the digital currency which is bought and distributed by the actual currency; alternatively, each merchant converts the digital currency that each merchant already has into several shares of the second share of digital currency for distribution in a set proportion (e.g., 8000 yen of digital currency may be used to purchase 1 ten thousand yen of shares of digital currency).
In a similar manner, the consumer can also subscribe to a share of the distributed digital currency in real or digital currency directly from the crowd sourcing server or platform server. Alternatively, the merchant may re-sell the obtained second share of the digital currency to the consumer. For example, a consumer may charge 1000 dollars in actual or digital currency, and may obtain a share of digital currency of 1050 dollars (corresponding to a third share).
The food city platform crowd funds the obtained funds (actual currency, digital currency, etc.), for example, which can be used for further development of the food city. The share of the digital currency purchased by the merchant or the consumer can be circulated and used among the platform server, the application server, the consumer and the like; alternatively, the share of the purchased digital money may be used to ask the gourmet city platform and/or the merchant for value-added return when a certain condition (including but not limited to time, or the scale of the collection, or profit, etc.) reaches a desired setting, or to obtain the provided service or goods directly, or to convert into a certificate for obtaining the service or goods afterwards. The value or the change of the digital currency share is recorded and adjusted in the fund account of each party by the corresponding organization (core server, crowd-funding server or digital currency issuing unit, etc.).
According to the prior convention, the voucher can be used by a subscriber or transferred to other users for use when the set condition is met, and the voucher is exchanged to obtain corresponding services or commodities from a platform server or an application server or a third-party server. The voucher issued by the distributor can be realized in a two-dimensional code form, and the coded information of the voucher two-dimensional code contains contents corresponding to set conditions and what services or goods are acquired, for example; when the voucher is exchanged, the exchange two-dimensional code with the subscriber user information superposed on the corresponding content of the voucher two-dimensional code can be sent so as to distinguish the subscriber and verify the identity of the redeemer. When the voucher is transferred, the transfer two-dimensional code on which the subscriber user information is superposed on the corresponding content of the voucher two-dimensional code can be sent; and when the transferee exchanges, the exchange two-dimensional code which is superposed with the information of the user of the transferee on the basis of the corresponding content of the transfer two-dimensional code is sent so as to distinguish the transferee and verify the identity of the exchanger of the transferee. According to the prior agreement, a transferor or a transferee can inform a platform server or an application server or a third-party server and the like of recording the transfer item when the voucher is transferred; or the verification can be directly carried out according to the corresponding content contained in the redeemed two-dimensional code at the time of redemption without informing at the time of transfer. Each of the two-dimensional codes must be generated by the core server or authorized by the core server.
In addition, the rent or other fees paid by the merchant to the food city platform, for example, through the application server, the food city issues the corresponding electronic bill and/or pays the share of the digital currency with the corresponding proportion, and the share is used as the basis for the merchant to invest in the food city; when the food city invests for profit, the merchant can obtain the dividend according to the electronic bill, or exchange the share of the digital currency back to the actual currency corresponding to the dividend, and the like.
Assuming that a developer in the food city remunerates funds to purchase land and build a house through various manners such as crowd funding or stocking merchant for stocks, the merchant or the consumer who obtains a corresponding digital currency share or certificate or electronic bill and the like during fund funding can require the developer to distribute house sales for profit to obtain value-added returns (in digital currency, real currency or other various forms); alternatively, it is also possible to request a conversion to the property itself, or to a qualification to buy a house in good share, etc.
In the setting conditions for judging the cashing, the physical world characteristics corresponding to the redeemer (a subscription party) and/or the cashing party (such as a platform server or an application server of a distribution or financing party or a designated third party server thereof) can be further agreed; and at the time of cashing, the cashing party further verifies the physical world characteristics of the cashing party provided by the cashing party at the time of subscription or at the time of redemption, and/or the cashing party further verifies the characteristics of the physical world of the cashing party to judge whether the set conditions are met, and further determine whether to issue corresponding benefit increase/provision services or commodities.
The operations such as the propagation recommendation described in the foregoing embodiments may also be combined with the technical solutions related to the digital currency and the setting conditions in the above example to implement a new propagation management mechanism: for example, the movie company's e-commerce website initiates the "movie chairman recommendation" activity; the consumer can view the introduction promotion content of the activity in various ways such as a mobile terminal or a web browser, for example, in a way of identifying a corresponding two-dimensional code or clicking a hyperlink. The consumer can obtain relevant information from the server of the e-commerce website in various modes such as corresponding software installed on a mobile terminal, a corresponding client installed on computer equipment, a web browser and the like, and perform operations such as information interaction and data processing with the server.
In different application cases, through interacting with the server of the e-commerce website, the consumer can choose to pay a subscription fee in real money or in digital money already owned or newly exchanged to obtain the right to buy tickets after showing the movie or obtain the option of share right with one hundred million yuan of total box office profit, and the server pays corresponding certificates after receiving money and pays when the conditions of showing the movie or making box office profit, etc. are satisfied. For another example, a consumer may participate in an event by recommending a movie sponsor to a movie company, obtaining a right to offer 100 tickets after the recommendation sponsor is adopted, which can be distributed to other users in the form of a two-dimensional code (generated by a core server or its authorization) and redeemed by the server when the movie is released; for example, each user searches for tickets from the server based on the same two-dimensional code read-out information, the order of the invoices is determined according to the sequence when ticket searching requests are received, and the ticket searching requests stop when the number of the ticket searching requests exceeds 100, or for example, a consumer generates 100 two-dimensional codes (including different serial numbers) in corresponding number in advance, and other users search for tickets from the server based on the information read out by each two-dimensional code decode. For another example, the consumer superimposes the promotion content of the website activity or the information of the chief role recommended by the consumer with the user information of the consumer, generates a recommended two-dimensional code and a corresponding hyperlink (authorized by the core server or the core server) and issues the recommended two-dimensional code and the corresponding hyperlink to other users; then, the server counts the number of times that the recommended two-dimensional code or the recommended two-dimensional code at the lower level thereof is identified, for example, and when all the propagators in the consumer sharing chain reach ten thousand times, triggers the right of allowing the consumer to give preference to 100 tickets, or further allocates the right of purchasing different tickets to other propagators in the sharing chain according to a set weight index and the like.
Example 12
This embodiment explains a specific application of "digital money" generated based on "remaining value in circulation field" to derive "digital human economics" of "advertising, distribution, and stocks".
The current theory states that currency originally originated from simple, individual, occasional exchanges of things. As productivity develops and commercial products expand, an expanding form of value develops. The general form of value forms when the commodity world has separated a commodity that serves exclusively as the equivalent of all commodities. However, the productivity is further developed and the range of commodity exchange is further expanded, which requires that general equivalents be fixed to a particular form of commodity and then money is started to appear. However, whatever form of value, the value of the good must be on another physical good. However, in an era where the popularization of mobile terminals including "endless and ubiquitous" mobile networks caused by wearable devices and the like has led to the growth of "digital money" to serve as an expression form of any commodity.
If the existing theory is described, the 'surplus value' and 'currency exchange' of the 'production link' are completely explained; the 'digital human' network theory proposed by the scheme further explains a value system of a circulation sharing link, and the 'quantifiable' measuring standard of digital tracking can become a 'digital currency', namely a 'general equivalent'. The digital currency is generated from the field of circulation propagation, and the digital currency is used through a two-dimensional code system.
A specific example of implementing a digital currency exchange will be described below. The 'digital human exchange' is the original carrier for stock analysis and spreading promotion page; each party can obtain the spreading two-dimensional code corresponding to the promotion content through accessing the code sending center, and stock purchase can be realized. The e-commerce web site of a car manufacturer or "digital exchange", such as a website that will recruit the propagation and reservation of "new models" to test the market's responses (including the willingness of the investor to purchase new cars as the end consumer, and the willingness of the investor to purchase stocks).
Finally, after acquiring the promotion contents in various modes (such as recognizing and propagating two-dimensional codes, entering an e-commerce website and the like), a customer terminal and a server of the e-commerce website interactively enter a corresponding page to pay money, and real currency or digital currency (digital currency obtained in various modes, particularly currency value generated in a circulation link, such as digital currency rewarded by promoting automobiles) is selected through payment price competition, so that the right of purchasing options of 800 yuan/stock or 20 ten thousand yuan/unit automobile is triggered when the stock price rises to 1000 yuan, the residual value of the propagation link is quantized and fed back to the value of stock of stockholders, and the practice of 'positive feedback theory of Sorpus' is quantized and realized.
For automobile manufacturers or digital human exchanges, the more consumer orders are obtained in the above manner, the larger scale effect is obtained, so that the cost can be reduced, the marginal profit can be increased, and the stock price can be increased. A part (such as 10%) of the total sales amount is used as a reward for spreading and popularizing by an automobile manufacturer, so that payment is realized according to the performance of popularization, and the traditional advertising and propaganda fee can be reduced; in addition, the paid advertising propaganda and spreading promotion reward cost is fed back to the company profit in the mode of the expense of buying stocks or buying automobiles by the rewarded promoters.
In the whole link, the mode of only universal digital currency can be designed: suppose the car is priced as 20 ten thousand digital coins/division; the reward fee for spreading the promotion is 10 percent, namely 2 ten thousand digital currencies/part; the current price of the stock is 400 digital currency/stock, the total stock cost is 10 hundred million shares, namely the market value is 4000 hundred million digital currency; the total sale amount is 10 ten thousand cars, namely the total sale amount is estimated to be 200 hundred million digital currency, the net profit is estimated to be 40 percent, namely 80 hundred million digital currency, the market profit rate is 100 times, and the market value reaches 8000 hundred million digital currency. Then, the remaining value (quantization index) of the circulation propagation link is reflected in three aspects: 1) the reduction of the advertisement propagation fee and the effective delivery can be quantified to a range of a specific percentage of the total sales; 2) the net profit of a company versus how much to convert the reward into stocks (options); 3) the increase in total market value and wealth brought by the increase in stock price.
Therefore, the digital currency has a value scale exceeding the residual value of the traditional economic theory based on the production link, and the quantitative, digital and circulatable value scale metering is carried out in the circulation propagation field (various main circulating commodities such as consumer goods, bulk commodities, raw material minerals and the like are all brought into the system), so that the system of the digital currency is established, and the expansion of the circulation caused by the current currency abuse of each central bank is avoided; in the whole digital human network world, only digital currency is traded, circulated, consumed, used and awarded, and the value scale is hooked to the three value embodiments. When people ' leave the digital human network world ' and return to the real world ', the digital currency can be exchanged into the actual currency through exchange rate setting.
The digital currency has a stable value scale, and is hooked with the residual value in the circulation link, so that the embarrassment of paper currency flooding is avoided; the method has the characteristics of generation in a circulation link, traceability (meeting the supervision requirement) in the whole transaction process, safe payment, convenience and circulation; the requirement that a traditional mode required by the enterprise for expanding reproduction must be funded first is met, but the scheme of the invention can achieve the positive feedback of stock appreciation value increase caused by production fund, effective circulation propagation, advance reservation and sale and profit increase through a crowd funding mode of the digital human world; therefore, the method can meet the requirement that enterprises can rapidly expand reproduction under the condition of not having large-scale production fund on the basis of completing research and development small tests.
Also taking an automobile as an example, if upgrading and small tests of the latest version are to be completed, 10 ten thousand portions are required to be produced in an expanding way, and the sales amount is predicted to be 200 hundred million digital currency; if according to the conventional model, it is necessary to prepare in advance 90 billion digital money, 45% of the capital covering the production and sales costs, 40% of the profit and 15% of the tax. In the scheme of the invention, the automobile takes 10 thousands of sales reservations which are completed by the circulation to reach 200 hundred million sales as the calculation basis, and theoretically takes 10% (namely 20 million) as the residual value scale of the circulation and circulation link to issue the digital currency of 'buying the automobile and the stock' (if the automobile is worried not to have enough credit, the automobile can be required to take part of the stock, and if the stock (option) before the sale is not available as the mortgage, or the production factory, IP intellectual property and the like are mortgage). The code issuing center completes the contract with the automobile manufacturer according to the principles of the above embodiments, and issues digital money related to the automobile step by step as "bonus payout" to be awarded to the propagators (recommenders at all levels).
The manufacturer or the E-commerce website and the like guide the consumer to prepay money to complete fund collection of the expanded reproduction; if the situation of only reaching the preset 1 ten thousand parts is met, the expenditure of the promotion cost is reduced, but the total value of the stocks is also reduced, more stocks are required to be added for mortgage, and the corresponding algorithm can clearly define 'algorithm terms' when signing a contract with a code sending center; the digital people who are the originators can also be added with the expected income of spreading and sharing value as mortgage to reach an agreement with the code sending center, and the agreement is gradually realized and deducted in the future popularization, namely the 'advance quantification of personal credit index and capability is realized'; an example of the algorithm for the personal credit INDEX may refer to the "evaluation INDEX" described above.
In this example, the mode of "production, sales, circulation and stock distribution" is completed in the above manner, which is called "digital stock distribution exchange", and the code-issuing center also has the functions of the digital stock exchange: mortgages from car manufacturers, or stocks used to exchange digital currency, can be considered as stock to be issued (mortgages of stocks are similar to the market maker mechanism, due diligence includes estimates of the marketing of products, validity of the creators' personal indices, and evaluations of product trials, feasibility of expanding reproduction, and reliability evaluations of the production/sales/delivery segments). The consumer may purchase the digital currency in digital currency "in the digital human world, and obtain the digital currency by selling the stock up (in the process of stock up, the value contribution of the circulation propagation link may be quantified or partially quantified). Therefore, in this case, the value of the digital currency is hooked with the value of the circulation and propagation of the automobile, and is indirectly hooked with the market selling price of the automobile, and is further hooked with the stock of the automobile, thereby realizing the value scale of the digital currency.
As more and more enterprises choose the exchange to issue stocks, the more stable the monetary value of digital currency (as a benchmarking scale for a package of currency, to resist the expansion of currency in traditional currencies); the fund obtained by issuing the stock can be monitored in the whole process, so that the disadvantage of being stolen can not occur, and the risk of making a so-called financial statement fake is avoided; the propagation/reservation index is generated in real time and is monitored, automobile stocks can drive the stock index to rise along with the propagation promotion (namely, the propagation index rises), and the stock is published in the example, which can be regarded as a 'published bulletin on the market of an enterprise'; this exchange is the "digital stock exchange".
At present, each financial institution, e-commerce and third-party payment institution successively release respective two-dimensional code payment technical schemes, and besides a plurality of technical problems (such as scene-free payment, identity recognition, safety guarantee and the like) need to be solved, the situation of respective wars and disordered competition in the market in future can be formed, so that consumers are difficult to accept and accept, and national-level big data cannot be formed. The invention realizes top-level planning for the application of the two-dimensional code, solves the problem systematically and reduces the repeated investment. Under the guidance of a system organization framework, a 'digital human network digital currency issuing center', namely an 'area-level two-dimensional code issuing center' and a 'national-level two-dimensional code payment clearing (public) platform' are established, and by uniformly issuing codes, the safety problem caused by the fact that the existing multi-organization alone issues codes are difficult to authenticate is solved, and the multi-organization two-dimensional code payment clearing platform is easier to be approved by consumers; the invention establishes a public settlement platform (such as Unionpay), solves the problem of fair competition, and all financial institutions, e-commerce and third-party payment institutions can share the resources of the national settlement platform by using the two-dimensional code payment technology which is subject to unified certification, thereby obtaining the structural big data of the daily life of people with great strategic significance.
The mode of awarding the reward is 'fan economy', the advertisement putting assets and the purchasing behavior stock are realized, the super virtual digital currency is formed, and the important problem in the current economics is solved as follows: the existing theory explains the 'residual value theory of production link'; however, in the circulation link of the human society, the invention provides a technical means for realizing ' quantification and value evaluation ' of social type circulation propagation evaluation '.
Example 13
In this embodiment, an application case of credit digital currency is provided, as shown in fig. 18, in which a cloud platform, one of a plurality of merchants joining the platform, and a credit approval mechanism of digital currency are involved, and each of the credit approval mechanisms has a corresponding server for data processing and information interaction; a consumer having a device such as a mobile terminal accessing a digital personal network; the two-dimensional code required by each party in the interaction process is generated by a core server of the code sending center based on a set coding rule of a unified standard.
The method comprises the following steps that a merchant accesses a cloud platform and submits a quota application for obtaining digital currency to the cloud platform as a registered merchant; the platform sends information such as the proof of assets provided by the merchant, the credit of the merchant, the enterprise qualification and the like to a server of the approval authority.
The approval institution (such as bank, insurance company, etc.) issues the corresponding amount of the digital currency to transfer to the account of the merchant through asset evaluation, creditor evaluation, share right evaluation, CDM (clean development mechanism) evaluation, BOT (construction-management-transfer) evaluation, PPP (public sector-private enterprise-cooperation) evaluation, etc., and the amount of the digital currency can be divided and tracked, and can be used for carrying out bill endorsement. The digital currency acquired by the merchant is equivalent to an estimate of its assets and credits.
The cloud platform carries out digital transaction management in the whole process of issuing and circulating digital currency, requests of all parties needing to issue the two-dimensional codes in the transaction process are all sent to the cloud platform, and the cloud platform and the code sending center interact to return the two-dimensional codes generated by the two-dimensional codes to all the parties in the transaction process. Considering that all the customers involved in the transaction are registered users of the cloud platform, the cloud platform provides a unique customer two-dimensional code for each customer to correspond to the information of the customer's identity verification and credit evaluation. The customer two-dimensional code can be provided to the approval authority when needed.
In addition, the cloud platform supervises each transaction and extracts the transaction according to the proportion agreed with transaction parties. For supervision, the cloud platform provides a unique transaction two-dimensional code for each transaction document, such as an order bill invoice money order code; for example, a unique two-dimensional code is provided for each commodity/service item, and when the commodity/service item is spread and promoted, the interpretation result of the corresponding coding information of the two-dimensional code can be superimposed on the secondarily generated recommended two-dimensional code. The cloud platform or other parties can read the two-dimensional code based on the preset uniform coding rule to obtain corresponding customer information, transaction information, commodity service information and the like, and can know the condition of multi-stage and multi-time generation of the two-dimensional code to realize traceability. The circulation of digital currency can be realized in forms such as a collection two-dimensional code during transaction, and the collection two-dimensional code is generated by a uniform code sending and has the characteristic of whole-process controllability, so that the fund safety is guaranteed, and the fund cost is reduced.
The merchant, for example, a travel agency, requests and obtains the digital money amount issued by the approval institution through accessing the cloud platform, and the digital money amount can be circulated when the merchant transacts with merchants (not limited to a brick-and-mortar store or an e-commerce) at home and abroad. The tourist becomes a registered member of the travel agency through the mobile terminal thereof, and can purchase and exchange digital money at each store of the travel agency, or recharge an account of his personal digital money by other means. And each store uploads the sales data to a server and a cloud platform of the travel agency, the cloud platform settles the sales data of each store, and corresponding money is uniformly issued to each store at the end of the month.
The tourists can also identify the promotion two-dimensional code related to the information of the travel agency or the information of the travel route displayed at the store through the mobile terminal, indirectly interact with the code sending center through accessing the cloud platform, obtain the secondarily generated recommendation two-dimensional code on which the user information of the tourists is superimposed, and recommend the two-dimensional code to other users based on various ways such as a social network. Based on the condition of recommending the two-dimension code to share and forward, the cloud platform issues rewards (such as various rewards including digital currency or coupons) to the tourists according to a strategy formulated by the merchant. The reward may be further differentiated based on the guest's certain physical world traits; the characteristics can be superposed in certain information interacted with the cloud platform or superposed in certain two-dimensional codes.
The cloud platform provides the transaction based on the social e-commerce to the user through the traceability of the recommended two-dimensional code, can collect relevant data, and provides media channels/regions, target crowd audiences, conditions of interested persons/participants/forwarders/consumers at all levels and the like for the travel agency.
In addition, the tourist does not need to use foreign currencies or credit cards when travelling abroad, in order to complete the payment of the digital currency, the account information of the payee can be known only by scanning a two-dimensional collection code (replacing a POS machine) displayed by a foreign shop through the mobile terminal, and the member information and the payment information are generally uploaded to a member management system arranged on a cloud platform or a travel agency after the payment amount is confirmed; and the shop owner uploads the sales data to a shop management system of the cloud platform, and the shop management system and the member management system perform inter-system settlement to realize transfer of digital money. The guest can exchange the digital currency amount in his member account back to the local currency after returning to the country.
The sales data uploaded by each store may be in various forms such as sales order, order form, invoice form, check-out docking order, and the like. The cloud platform can further collect and arrange the data, provides the data for institutions such as shops, travel agencies, tax-free store managers and government departments to inquire, realizes big data analysis, and has a guiding effect on enterprise operation and government planning.
In some examples, information to be presented by a merchant may be stored in cloud space allocated by the cloud platform for the merchant, and the information is divided into a plurality of information groups such as goods, activities, introductions, and the like; the merchant can request mechanisms such as a cloud platform or a code sending center and the like, and content related to any one information group is made into a two-dimensional code and is issued outwards. After each party scans the two-dimensional code, the party can enter the cloud space to obtain the content of the corresponding information group. When a merchant requests to send a code, the identity of a code scanning party and the operation executed by the code scanning party are allowed to be defined, and the generated code information of the two-dimensional code can contain corresponding verification information; and when the code scanner scans the two-dimensional code to access the cloud space, the identity information and/or elements of physical world characteristics of the code scanner need to be provided for the cloud platform to verify the identity of the code scanner and open corresponding operation permission for the code scanner.
Example 14
This embodiment provides a case of a Supply Chain Management (SCM) platform, as shown in fig. 19, in which an e-commerce network platform, one of a plurality of operators joining the platform, a bank, a consumer product manufacturer, a logistics service provider, each of which has a corresponding server for data processing and information interaction, are involved; a consumer having a device such as a mobile terminal accessing a digital personal network; the two-dimensional code required by each party in the interaction process is generated by a core server of the code sending center based on a set coding rule of a unified standard.
The operator obtains the authority of opening the electronic shop and using the transaction platform and other related services on the platform by paying the shop fee. For this purpose, the operator's server interacts with the platform's server, for example, to pay the platform in the form of identifying the two-dimensional code for payment issued by the platform, and the corresponding digital currency/real currency is transferred to the platform name by the bank, core server, and other mechanisms recording the account information of the operator; and the platform provides corresponding service for the operator according to the notice of completion of the fee collection sent by the institution.
The operator and the manufacturer sign a purchase agreement of the product, send a request for applying for the unsecured loan for the cost required for purchasing the product to the bank, and send the related content related to the product and the payment thereof in the agreement of the operator and the manufacturer to the platform and the server of the bank through the server of the operator or the manufacturer; the operator's server submits the required credit to the platform and bank's server.
The e-commerce network platform provides the bank with service support of small loans, for example, credit record information of the operator on the platform is provided for the bank through a server of the platform, and the operator is helped to obtain loans. The manufacturer enters into an at-risk buyback agreement with the bank. And (4) issuing loans by the bank, and directly transferring funds to the manufacturer to be used as payment for the products purchased by the operator. The platform is used as a fund information platform and provides information such as loan amount, buyback amount, cash flow information and the like for all parties such as banks, manufacturers, operators and the like to inquire when needed.
After the manufacturer obtains the payment, the goods purchased by the operator are sent to the supervisor. That is, the operator registered with the platform takes the goods from the manufacturer based on the agreement, and the goods are directly delivered from the manufacturer to the warehouse of the third-party logistics (3PL) designated by the bank. According to the mode of each embodiment, the operator utilizes the form of two-dimensional code and the like to promote the distributed commodities outwards.
A consumer browses shops on the platform through various clients or knows the goods sold by the consumer through a two-dimensional code issued by an operator; after determining the purchased commodity, the consumer places a purchase order to a server of the operator; the server of the operator sends a transaction instruction to the server of the logistics service provider of the third-party logistics according to the order, and the logistics service provider delivers the corresponding commodity to the consumer.
The platform can interact with a server of a logistics provider to obtain information of varieties, quantity and value of goods purchased and stored by the operator, goods transaction state information under supervision of the logistics provider, warehouse receipt management information and the like, the financial profit and loss of the operator can be analyzed on line based on the information, and the information can be provided for all parties such as banks, manufacturers and operators to inquire if necessary.
The consumer pays for the goods by the client, for example, paying the cost of the purchased goods to the operator (or to the platform or to the bank) by using the mobile payment method based on the two-dimensional code in the previous embodiment. Because the promotion two-dimensional code, the payment two-dimensional code, the recommendation two-dimensional code and the like are generated by the code sending center in a unified way, the platform and the code sending center carry out information interaction, the whole transaction process of an operator and a consumer can be monitored, for example, receivable information of the operator and receivable payment information of the consumer are provided, and the platform can be inquired and obtained by all parties such as banks, manufacturers, operators and consumers when needed. The platform provides customer service, deals with transaction complaints and other matters, and executes the operations of recording credit values for operators, recording evaluator indexes for consumers, issuing rewards and the like.
The goods money is recovered in a designated supervision bank, and the risk mortgage is paid according to the proportion; if the merchant is overdue and has not paid, the manufacturer buys the commodities stored in the logistics service provider according to the risk buyback agreement, and buyback money is directly returned to the supervision bank to avoid the risk. Therefore, when the bank receives the repurchase money of the manufacturer, the bank sends an instruction of transporting goods to a specified place of the manufacturer to a server of the logistics service provider; the logistics service provider performs relevant operations. In addition to the bank, the platform can also lower the credit rating of the operator according to the information that the operator is overdue and has not yet paid, which is sent to the platform by the bank.
In addition, the merchant can also carry out financing and credit granting business on the legally owned goods as the pledge; the bank entrusts a qualified logistics company to carry out whole-course transaction supervision on the goods; after the bank determines the lowest value, the portion that exceeds the bank's determined lowest value is left in its own right.
The e-commerce service platform in the embodiment can solve the existing problems of lack of a reasonable and effective profit mode and weak commodity integrity transaction supervision, provides a high-quality commodity supply and sale value chain platform, charges according to flow and ensures that high-quality products of excellent enterprises enter the market.
Aiming at the problems of difficult fund support, slow fund recovery and lack of all-dimensional logistics service, an operator can obtain the support of small-amount and no-guarantee credit of a bank based on the scheme of the embodiment, quickens the fund withdrawal speed and can obtain the all-dimensional VIP-level high-quality logistics service.
The bank can solve the problems of the logistics supervision risk of the petty loan service and the credit supervision risk of the petty loan service, reduce the risk of the warranty of the logistics supervision policy through the cooperation of the platform and strategic logistics partners, share the credit and fund information through the platform, provide more loans (guarantees) for small and medium enterprises by taking the future cash flow of merchants as the proof, reduce the credit risk and simultaneously expand the business.
For manufacturers, the cost of the original channel is high, the income is influenced, and the electronic commerce channel is difficult to effectively expand; the penetration ability of each operator in the consumer market can be fully utilized through the embodiment, the electronic commerce value chain is easily constructed together with the operators on the basis of platform assistance, the operators can spread and popularize in forms such as two-dimensional codes, and manufacturers can concentrate on products.
The consumer can obtain the high-quality product through the scheme of the embodiment and obtain the high-quality logistics service matched with the high-quality product. The consumer can perform operations conforming to the reward policy described in the above embodiments, for example, secondarily generating the two-dimensional code to recommend to another person, and obtaining the reward issued by the operator or the platform by completing a transaction through interaction with the server of the operator or the platform.
In addition, in this example, the amount of loan, the amount of repurchase, the amount of payment for the purchase of merchandise, etc. are delivered in digital currency approved by each party; the digital currency can be acquired as described in the foregoing embodiments. And parties may exchange digital currency locally to the corresponding real currency, which is particularly useful when parties such as the consumer and the producer do not use the same real currency.
The embodiment provides a novel business mode of win-win in many ways, realizes supervision quality guarantee, logistics service guarantee, unified management of goods storage and distribution, guarantees the loan cooperation agreement between bank supplier business parties, reduces loan risks, and is a safe and convenient payment mode for payment after delivery, and a great trust weight is provided for a buyer user, so that the buyer user is provided with strongest support for creating a top-level VIP shop.
Example 15
The embodiment provides an implementation case of a warranty service based on an information platform. In the conventional warranty service, the related situations such as orders, shipments, acceptance, invoicing, payment between the superior supplier and the core manufacturer/seller, and the like between the core manufacturer/seller and the shop customer are difficult to be grasped by the warranty company or bank. Therefore, due to insufficient information integration and sharing, the information of the sales service is unclear, and effective data support is difficult to provide for the warranty service; the document bills are not uniform, the false document bills are relatively convenient to manufacture, and risks are brought by the classification of an owner and a final repayment person; risk of repeat pledge financing; the mismatching of the warranty service period leads to the problem that money is stolen and the like, and brings huge operation risk for the warranty service.
As shown in fig. 20, in this embodiment, the insurance company or the bank uses an information platform to deeply interface with an enterprise ERP system (enterprise management information platform) of the core manufacturer/vendor to obtain information of sales businesses such as orders, materials, funds, etc. between the core manufacturer/vendor and a superior supplier or a customer, and send the information to the insurance company or the bank to enable the insurance company or the bank to immediately grasp the information, so that the insurance company or the bank provides credit financing service for the whole supply chain.
The information platform is respectively connected with enterprise ERP systems of a plurality of core manufacturers/sellers, and the following interaction operations of all the parties when any one of the core manufacturers/sellers applies for a warranty company or a bank to implement warranty business are all referred to. And the enterprise ERP system sends the request for applying the warranty service and the information agreed by the protocol between the core manufacturer/seller corresponding to the warranty service and the superior supplier and/or the client to the information platform. Information agreed upon by the agreement, such as, but not limited to, the quantity and amount of items identified in the order, the time limit, criteria, etc. involved in each phase of shipping, acceptance, payment, etc., and the actual executives of each phase (e.g., third parties who consigne or consignment for one of the parties to the agreement) are specifically related to various operations.
And the information platform requests the code sending center to obtain a two-dimensional code uniquely corresponding to the warranty service of the core manufacturer/seller based on the obtained application request of the warranty service and the information. When the two-dimension code sent to the insurance company or bank by the identification information platform (or core manufacturer/seller), the related operation of the condition of the core manufacturer/seller and the convention thereof is extracted from the information platform so as to confirm whether the insurance business is accepted. The code sending center can also acquire corresponding service information from the information platform for verification.
In each step of the implementation process of the sales, the information platform can obtain corresponding real-time service information from each party of the agreement or a third party entrusted by the party of the agreement, and add the real-time service information to a record item which is correspondingly set for the core manufacturer/seller or the warranty service by the information platform; and, make the coded content of the two-dimensional code uniquely corresponding to this core manufacturer/seller and this insurance policy business, cover the real-time service information added too.
For example, the two-dimensional code may be the same two-dimensional code generated when originally applying for a request, but (a warranty company, a bank, or other various organizations) identifies the two-dimensional code at different stages, so that the content of the record item corresponding to different stages in the information platform can be acquired. Or after the real-time service information of a certain stage is added, the information platform requests the code sending center to superpose the content of the real-time service information on the basis of the content of the original two-dimensional code to generate a new two-dimensional code, and the corresponding real-time service information is acquired by identifying the new two-dimensional code (for a warranty company, a bank or other various organizations) to verify the warranty service.
Similarly, assuming that each party of the agreement appoints some newly-added related operations to some stages in the sales service of the warranty and notifies the information platform, the information platform can record the information of the newly-added operations in the record item of the stored warranty service, so that the information of the newly-added operations can be obtained by identifying the original two-dimensional code or the newly-generated two-dimensional code.
The acquisition of real-time service information does not rely solely on documents uploaded from information platforms from core manufacturers/vendors and the like. For example, whether the delivery operation is completed or not is judged, and a logistics organization or a warehousing organization in agreement can also access interaction with the information platform through respective equipment, and after confirmation information that delivery has been performed or delivery has been received is sent to the information platform, the information platform records corresponding information that the delivery stage is completed. For example, the logistics organization or the warehousing organization may, on the basis of the information of the warranty service, add the identification information of the organization itself and the confirmation information of the warranty service related stage, request the code sending center to generate a new two-dimensional code, and send the new two-dimensional code to the information platform, so that the information platform updates the real-time service information.
In an example, as shown in fig. 20 and 21, a customer checks and accepts a passing supplier, registers information through a warranty service application platform at the front end of an information platform, and after a core part of the information platform checks the registered information, a code sending center requesting uniform code sending generates a two-dimensional code corresponding to the supplier and the warranty service content applied by the supplier; an SAP system (financial industry solution platform) at the back end of the information platform can generate main data corresponding to the covered content based on the two-dimensional code. If the endorsement is needed to other enterprises, the supplier provides the two-dimension code and the information of the endorsement enterprise to the warranty service application platform, the pre-registration is carried out at the warranty service application platform, and the information platform acquires the authority of the endorsement enterprise registered by the supplier for recording. The enterprise provides the two-dimensional code and the identification information of the enterprise to a warranty service application platform, endorsement registration is carried out at the warranty service application platform, the information platform acquires the information of the enterprise and compares and confirms the authority of the record, and the SAP system is informed to carry out endorsement record when the information is confirmed to be consistent. When the enterprise applies for the warranty service from the warranty company, the warranty company obtains the relevant condition of warranty application through the warranty service application platform based on the information for identifying the two-dimensional code, interacts with the information platform to confirm the authority of the enterprise, and processes the warranty service through the SAP system if the confirmation is correct.
In the example of using the information platform to examine and approve the service flow, on the basis of the SAP system, the information platform is additionally interacted with a supplier, a warranty company and the like to carry out the function settings of quota examination and approval request submission, quota settlement, quota audit and the like. On the basis of finance, cost, purchase, sale and project management originally possessed by the SAP system, the information platform of the embodiment is in butt joint with the original SAP system through an SAP interface, and information interaction is carried out based on a Matrix Link protocol; the frame of the information platform is connected with the application database, and relevant operations of project approval limit accounting management such as main data management, sales support, workflow management, project management, audit management and the like are realized.
As shown in fig. 22, the setting of the business process can be completed by an ERP or SAP system inside the enterprise, for example, completing the approval process and authority setting of "total manager a 1-sales chief administrator a 2-business operator A3" inside the company, or completing the approval processes B1, B2, B3 executed by different company personnel in sequence.
The settings of the business process are provided to the O2O server and may be open to external partners; the O2O server may request the code-sending center to generate a corresponding two-dimensional code based on the setting; the two-dimensional code generated based on the setting defines, for example, a workflow that only a designated person can complete the set business process according to the above-described set workflows a1, a2, A3, B1, B2, and B3.
And a corresponding person scans the two-dimensional code through the client device to access the interaction with the O2O server to acquire a corresponding business process, and the O2O server can verify whether the person has the authority of executing the operation specified by the process or not by submitting the unique identification information of the client during the interaction. The O2O server can also interact with the digital currency amount examination and approval center according to the unique identification information of the client, settle the digital currency amount and complete the related operation of transaction payment related to the business process.
Therefore, the client can complete various specified processes such as 'examination/approval/acceptance/payment' and the like (the execution of some processes needs the interaction and cooperation of other parties) through code scanning, thereby simplifying the operation and improving the network security of the Internet.
Example 16
As shown in fig. 23 and 24, the present embodiment involves the following: the user can scan the two-dimensional code at the client of each network platform, share and recommend related information to others based on the content identified by the two-dimensional code, pay digital coins and the like for shopping, participate in activities and the like. The two-dimension code server supports registration and login of a user, sets a sales organization and a channel, generates a two-dimension code, distributes client access, shares a rebate mechanism and realizes a client function interface. And each PPP platform interface is connected with the two-dimension code server and each EC platform, and develops a quick implementation interface connected with each PPP platform in advance to realize a client function realization interface, a commodity interface, a two-dimension code interface, an order interface and the like. And each PPP platform is in butt joint with each PPP platform interface to realize O2O service, client function realization, commodity main data login, order processing and the like.
The PPP platform creates a project related to a certain commodity, the project is imported into the two-dimensional code server through the PPP project synchronous interface, the two-dimensional code server sets a service range, and a corresponding two-dimensional code is generated and issued outwards. And after scanning the two-dimensional code, the user forwards the two-dimensional code to the two-dimensional code server for analysis, and after the main data of the corresponding commodity is obtained from the PPP platform according to the analysis result and is read by the two-dimensional code server through the commodity inquiry interface, the commodity information is displayed to the client of the user.
The user orders the displayed commodities satisfactorily, the two-dimensional code server records the order of the user, generates two-dimensional codes related to order information, transaction user information and the like, and sends the two-dimensional codes to the PPP platform through the order generation interface to generate the order. And the PPP platform carries out order processing, and feeds back order information to the client of the user through an order query interface of the PPP platform interface and the two-dimensional code server. The PPP platform can also set functions to be executed by the client, and the functions are transmitted through the PPP platform interface and the functional interface of the two-dimensional code server in sequence and are displayed to the client.
A user scans the two-dimensional code through a client and analyzes the two-dimensional code by a two-dimensional code server; and acquiring corresponding commodity main data from the EC platform according to the analysis result, reading the corresponding commodity main data in the two-dimensional code server through a commodity query interface of the EC platform interface, and displaying the commodity main data to a client of a user.
The user requests the two-dimension code server to generate a sharing two-dimension code through the client, the sharing two-dimension code is issued to other users to be shared, and the sharing operation is recorded by the two-dimension code server so as to be convenient for rebate. The actual corresponding functions are only realized on the client and the EC platform, and the EC platform interface is mainly used for information transmission.
In this embodiment, by establishing a PPP platform interface, an EC platform interface, and the like, the corresponding platform can be docked with the two-dimensional code server, so as to expand multiple newly-added service functions based on the two-dimensional code for the platform.
Example 17
Besides the two-dimensional code, in any interaction process of the above embodiments, information sent by a certain party to other parties can also be realized by other forms of coded media; the coding medium can be bar code images such as one-dimensional codes, two-dimensional codes, multi-dimensional codes and the like which can be seen by naked eyes; alternatively, the bar code image, its encoded information, or any other encoded information may be an optical dot pattern expressed in various manners such as drawing with a fluorescent pen, bright and dark light, visible light, ultraviolet light, infrared light, polarized light, refresh frequency, or digitized sound waves expressed in a manner of a specific law/frequency change, so long as the encoded information corresponding to the information to be transmitted can be completely stored in the encoded medium. Although the one-dimensional code has a limited amount of stored information, it is theoretically possible. The optical dot-matrix is generally designed to be invisible or difficult to recognize by the naked eye, and the digitized acoustic waves are generally designed to be difficult to recognize by the human ear, however the present invention is not limited to making them visible/recognizable by the human ear when necessary.
The device for recognizing any one of the above-described encoded media, and acquiring the content/service or the like corresponding to the encoded media based on data processing performed by the recognized content and various communication interaction operations performed with a backend server or the like specified by the encoded media distribution mechanism may be a wearable device, in addition to the mobile terminal (mobile phone, tablet computer), personal computer or the like described in the above-described embodiments. Such wearable devices include, but are not limited to, accessories, glasses, eyeglass holders, headwear, hats, tie clips, brooches, bowties, bracelets, watches, earphones, clothing, and parts of shoes (e.g., to provide a flexible information display and input screen). A certain user may be equipped with one or several wearable devices at the same time.
A wearable device may have all the functional modules of a mobile terminal in the above embodiments to replace the functions of the mobile terminal to implement corresponding operations; or, a certain wearable device may only have a part of the functional modules of the mobile terminal, and must be matched with a smart television, a set-top box, a home intelligent gateway, a mobile terminal, or another wearable device or devices having other functional modules, so as to implement the operation performed by the mobile terminal in the above embodiments. The functional modules include but are not limited to: the acquisition device is used for acquiring the coding medium, for example, a camera is used for photographing a visible bar code image, or an acquisition device of a corresponding type is used for receiving an optical dot matrix image or a digital sound wave, and the like; the decoder is used for decoding the obtained coding medium to obtain coding information; the coding information analysis unit is used for analyzing the coding information and judging whether the coding medium is generated according to a preset coding rule; a transmitting/receiving unit for interacting information with the background server or other parties, receiving service or providing service, etc. if the encoding medium is generated according to the predetermined encoding rule; the input unit is used for inputting input information related in an interaction process; the display unit is used for displaying the identified content or the information required to be displayed in the process of interacting with the background server, and the like. These functional modules may be integrated in the same wearable device, may be distributed among a plurality of wearable devices, or may be distributed among a plurality of apparatuses such as a wearable device and a mobile terminal. Even such as the decoder and/or the encoded information parsing unit, etc., may be disposed in a core server or a backend server or a third-party server, and the wearable device or the mobile terminal, etc. transmits the obtained encoded media to these servers for identification, etc. The communication mechanisms between the mobile terminal and the various servers in the embodiments above are all suitable for communication between the wearable device and the various servers in the embodiment.
Taking a wearable device as an example, the wearable device may include a camera to recognize a barcode image (may further include an indicating unit (such as an indicator lamp) to indicate that photographing or sending the barcode image is successful, and a setting unit to set photographing speed, definition, and the like), and further include a sending unit to perform communication connection with a mobile terminal or another wearable device (such as a smart watch) in a wired manner or a wireless manner such as bluetooth/WIFI. The transmitting unit is used for transmitting the photographed bar code image to the mobile terminal or the watch. After the identification is carried out through a decoder, a coding information analysis unit and the like arranged in the mobile terminal or the watch, the content corresponding to the bar code image is sent back to the glasses, and the content is displayed on a screen arranged on the glasses of the glasses (or the content is displayed on an electronic screen of the mobile terminal or the watch); after the user views the corresponding content, the user sends a service providing request to the background server through operation on the mobile terminal or the watch and receives the provided service (such as completing a transaction of purchasing commodities). Or, in another example of the glasses, the decoder is also included, and the encoded information obtained by decoding is sent to the mobile terminal for analysis; and the information display screen is positioned on the watch and displays the analyzed information independently or synchronously with the mobile terminal. In another example, the glasses themselves can complete all operations from barcode image acquisition, identification until interaction with a background server and service acquisition, and the like, and then can replace the mobile terminal; or further using the mobile terminal to connect with the glasses signal, and synchronously backing up the data processed by the glasses. Of course, the wearable device, the mobile terminal, and the like may also have a plurality of modified embodiments, and it is understood that these modified embodiments are all covered by the scope of the present invention.
In various examples, a wearable device may be designed to recognize one or more of the encoded media described above. When an unidentifiable coded medium (including that a certain barcode image cannot be decoded, or coded information can be decoded and obtained but an operation to be executed according to a rule definition cannot be analyzed) is acquired, for example, an ERROR can be prompted by a wearable device or a mobile terminal connected with the wearable device through a signal, and a code is required to be scanned again; or may connect to other specified web pages; alternatively, no reaction occurs; or, the coding medium which can not be identified is sent to a background server for identification, and the like. And when the coded medium is successfully identified and the operation flow defined by the rule is obtained, the wearable device drives the mobile terminal or other devices to execute corresponding operations.
The wearable device of the present embodiment, which is similar to the mobile terminal of any of the above embodiments, can access a digital personal network through the wearable device (or in cooperation with other device terminals) based on the identification of an explicit or implicit coding medium, and perform the agreed operations described in any of the above embodiments (including but not limited to generating a new coding medium (e.g., a recommended two-dimensional code) through a unified core server/code-sending center or other authorized party to recommend to other users, initiating an SNS search/SNS help request or replying to other people for SNS search or SNS help, completing a transaction, etc.), record the change of the attribute value (e.g., evaluation index) for the user by a corresponding mechanism such as a core server/platform server/background server/third party server, etc., and receive a corresponding reward (e.g., digital currency). Moreover, the user can report some characteristics (time/place/identity, etc.) of the user or the physical world of the user to the backend server or other mechanisms when the user obtains information through the wearable device (or through cooperation with other device terminals) in the process of realizing interaction with each mechanism, for example, when the user requests the backend server to provide services according to the identification coding medium, so as to obtain unique service experiences (such as different benefits) corresponding to different characteristics.
As shown in fig. 25, in one application example, enterprise a prepares for a new product AP to be launched into the market through a backend server. In an enterprise ERP server (including electronic commerce processing), the sales quantity and sales amount of a new product AP are preset, a two-dimensional code is generated by a code sending center according to a predefined rule, and the two-dimensional code is published through a television publishing channel and a shop publishing channel.
In addition, a certain proportion (AP%) of the sales of the product AP is extracted as a promotion charge for marketing promotion, and the promotion charge is signed up and paid (either prepaid or in stages) with the third-party server. The method covers advertisement publishing platforms such as television stations, organizers of multi-level propagation, two-dimensional code creatives and/or technical producers, managers of servers and the like.
The two-dimensional code is issued through a television station, and a consumer wears glasses, earphones or other wearable components when watching a television program. The user can control the camera built in the glasses to shoot the two-dimensional code realized on the screen at any time, and the mobile terminal does not need to be taken out to start the shooting action, so that the convenience of the user is improved.
In addition to the two-dimensional code visible to human eyes, for example, the display frequency is controlled by a set top box of a television, the invisible two-dimensional code can be played on a screen, an optical dot matrix corresponding to the invisible two-dimensional code cannot be recognized by naked eyes but can be recognized by a corresponding acquisition device of glasses, and decoding and analysis can be performed through a decoder embedded with corresponding client software and a coded information analysis module.
The consumer can automatically capture the optical lattice and start the execution flow of the set operations as long as staring at the television picture and watching for a few seconds (can be set to other time periods). The glasses, the watch and the mobile terminal in the example can be embedded with the motion sensing core engine. The sensory core engine is a software/middleware that drives the optical camera to recognize the optical signal of the optical lattice. The read original optical information is classified, identified, corrected, matched, screened and/or converted in signal format by applying a two-dimensional code coding/identifying principle, and then generates operation instructions corresponding to the glasses, the mobile terminal, the background server and the like. The operation instruction is transmitted to the background server through the glasses, the mobile terminal and the like, and further transaction management-based processing is carried out according to corresponding rules, so that functions such as downloading, opening of an APP, electronic commerce, transaction, payment and the like are achieved.
The glasses drive the mobile terminal (or watch, or notebook computer, etc.) connected with the glasses in a wired or wireless mode to communicate with the background server. The introduction of the product AP returned by the viewing backend server is opened by the client software of the consumer's mobile terminal (the product introduction may also be presented on the glasses lens or on the television screen). In addition, the consumer can interact with the background server through the mobile terminal, make comments, answer survey questions, receive coupons and the like, and can also generate the recommended two-dimensional code through the code sending center again and issue the recommended two-dimensional code to other users, so that the mobile terminal becomes a next-level sales representative of the AP two-dimensional code product developed through a television station channel.
The payment two-dimensional code displayed on a television screen or a mobile phone screen is issued (or an order issuing request is sent through a menu displayed on the screen by a set-top box) through scanning of components such as a mobile terminal or glasses, and the coded information is analyzed and verified through a server. After verification is completed, the order is transmitted to an O2O server (enterprise private) to realize functions of television channel management and the like, and then is transmitted to an enterprise ERP server to complete order processing. And feeding back an order processing result to an order processing server, completing rebate calculation by the server, extracting a corresponding proportion from the prepayment by the server, and returning the proportion to corresponding parties such as a mobile terminal (a user of the mobile terminal has a payment/collection account bound with the mobile terminal), a television station, a two-dimensional code technology maker, a third-party server and the like.
As shown in fig. 26, in another example, a system capable of exercise instruction for a user is provided, wherein the user wears a first wearable device (such as glasses), and when watching a fitness video through the glasses lens or through the screen of a television/mobile terminal, as shown in P1, the glasses recognize a two-dimensional code (preferably a two-dimensional code invisible to the naked eye; or alternatively, a digitized sound wave loaded in the video, the sound wave preferably being unrecognizable to the human ear but recognizable through headphones) appearing in the video; the encoding information of the two-dimensional code corresponds to a group of operation flows required to be executed by the relevant equipment.
In view of the fact that devices such as glasses, watches, earphones, mobile terminals, television set-top boxes and the like in the system are connected with each other in a wired or wireless manner or information interaction is achieved through a home intelligent gateway, and when client software of the mobile terminal analyzes an operation flow defined in coding information of a two-dimensional code, the operation flow can be notified to the other devices so that the other devices can know the operation to be executed respectively.
Therefore, after the two-dimensional code is recognized by the glasses or the mobile terminal connected with the glasses, a control signal for driving the sensor in the second wearable device to detect is sent according to the definition process (as shown in P2-1). The second wearable device, for example a smart watch worn by the user, is capable of detecting a heart rate of the user; alternatively, the clothing covers the whole body of the user, and sensors are built in different parts of the body to detect body conditions such as heartbeat, blood pressure, and sweating.
The second wearable device detects the body condition of the user in real time in the process that the user moves along with the video according to the operation flow defined in the code of the two-dimensional code; when the detection result reaches a certain predefined threshold (for example, the heartbeat is too fast), the second wearable device sends a request of 'carrying out intelligent prompting' to the glasses or the mobile terminal.
According to the request, a prompt statement or a prompt video of 'deepening breath and relaxing abdomen' is triggered to be played on a display screen of the glasses or the mobile terminal (or the glasses or the mobile terminal drives the set top box to be on the display screen of the television), or an earphone is driven by the glasses or the mobile terminal to play the prompt statement (such as P3-1) so as to guide the user to adjust the action.
If the second wearable device determines that the detection result of the body of the user is another threshold, the second wearable device may issue an instruction to drive another device to perform a prompt request of another sentence, or issue an instruction to switch to a next video, according to a defined operation. In addition, in addition to issuing an instruction according to the detection result of the user's body, the devices such as the glasses, the smart watch, or the mobile terminal may also detect other physical world characteristics or a combination thereof through a built-in or external sensor (for example, a built-in clock of the mobile terminal displays that the movement time is overtime), send an instruction to other devices in the system (for example, a television set-top box sends a "video off"), or further interact with a mechanism outside the system to send a control instruction or transmit data such as the movement situation of the user this time (for example, the first and second wearable devices or the mobile terminal issues the movement time of the user on a social network platform through interacting with a background server, issues a different reward corresponding to the movement time according to the exercise situation of the user through a server or a core server of the platform, etc.), such as P3-2, p3-3, P3-4 and P3-5.
In some different examples, according to different defined operation flows, the work of judging the collected value and the set threshold value may be performed by the second wearable device, or may be performed by the first wearable device or the mobile terminal. According to the judgment result, the device which is judged to execute or the device which is driven by other devices to execute the subsequent operation specified by the flow, wherein the subsequent operation can be completed by one device or can be completed by interactive cooperation with other devices.
In another example, other sensors may also be driven to detect by recognizing various forms of two-dimensional codes. For example, the two-dimensional code in the form of the optical dot matrix is arranged on intelligent furniture (for example, a refrigerator has a group of light sources on the outer surface, and the optical dot matrix is embodied by light and shade changes according to the coding format of the two-dimensional code). For example, an initial two-dimensional code in the form of an optical dot matrix is displayed, a user wears wearable equipment (such as glasses) to recognize the initial two-dimensional code, and an instruction for driving a refrigerator to detect is sent according to a flow defined by the code content. The refrigerator receives the instruction, detects the storage quantity of different foods in the refrigerator through a built-in sensor (such as P2-1), and generates a second two-dimensional code representing the storage quantity through code sending center authorization, wherein the second two-dimensional code is represented in an optical lattice form. And then, the wearable device continuously scans the two-dimensional code displayed on the refrigerator within a set time, and the second two-dimensional code is identified after being acquired, so that the storage quantity of food in the refrigerator is known. For another example, when the refrigerator detects that the storage amount of a certain food is zero, if the code information of the generated third two-dimensional code includes an instruction for requesting the wearable device to purchase, the wearable device may purchase the food by interacting with the platform or a server of a merchant affiliated with the platform according to a link of the e-commerce platform included in the generated third two-dimensional code after recognizing the two-dimensional code, and the e-commerce platform notifies the server of the logistics enterprise to deliver the food. The functions of the wearable device in this example may also be performed by a mobile terminal or other similar device. The mode of this example can also be applied to the condition that the shop assistant utilizes wearing formula equipment to discerning the two-dimensional code that detects the goods stock.
While the present invention has been described in detail with reference to the preferred embodiments, it should be understood that the above description should not be taken as limiting the invention. Various modifications and alterations to this invention will become apparent to those skilled in the art upon reading the foregoing description. Accordingly, the scope of the invention should be determined from the following claims.

Claims (39)

1. An information transmission method based on a grid space is characterized in that,
and releasing the information in a grid space concerned by a releasing party, and quantitatively evaluating the propagation effect of the information.
2. The method of claim 1,
after quantitative evaluation, the propagation strategy formulated by the publisher is further adjusted.
3. The method of claim 1 or 2,
and matching the grid space with a propagation strategy of the issuing party, so that the interacting party in the grid space can acquire the issued information.
4. The method of claim 1,
the published information is superimposed with the identifying information of the publisher and/or the attribute state of the publisher.
5. The method of claim 1,
The information is further propagated by the interacting parties in the grid space.
6. The method of claim 5,
the propagated information and the issued information have the same content;
the propagated information or the behavior for information propagation is bound or associated with the identification information of the propagator;
the propagator contains several interacting parties or several levels of interacting parties that propagate the information.
7. The method of claim 5,
the propagated information is superimposed with, bound to, or otherwise associated with one or more of the following, based on the published information: the identification information of the propagator, the newly added information of the propagator and the attribute state of the propagator; wherein the propagator includes several interacting parties or several levels of interacting parties that propagate information.
8. The method of claim 5,
each interactive link for publishing and/or disseminating information is recorded, or traced, or evaluated, or rewarded.
9. The method of claim 8,
the rewarded objects include the source of the information distribution, the dissemination individuals, and the management platform.
10. The method of claim 5,
information is released through an offline channel and/or an online channel;
information is propagated through off-line channels and/or on-line channels.
11. The method of claim 5 or 10,
the information so distributed is in the form of encoded media;
the information that is propagated is in the form of encoded media.
12. The method of claim 11,
the encoded media can be presented by the respective devices, or transmitted to each other by the respective devices, or presented by a web page or software, or disposed at an object located in a real-world scene, or disposed at an object worn by a human body.
13. The method of claim 11,
off-line channels and/or on-line channels that distribute or propagate the encoded media can receive rewards.
14. The method of claim 11,
the coded media are arranged at the place where the potential target customer group is present, so as to know the preference and the behavior mode of the individual.
15. The method of claim 11,
and according to the real world scene of the coding medium, carrying out statistical analysis on the propagation effects of various passing crowds.
16. The method of claim 11,
the method comprises the following steps that the coded media are identified to be capable of being accessed to interact with a designated interaction party;
alternatively, access to a designated interactive network can be obtained by identifying the encoded media.
17. The method of claim 16,
the issued information is related to the goods or services;
any interactive party can trade with the appointed interactive party according to the issued or transmitted information so as to obtain goods or services; and carrying out statistical analysis on the transaction condition to quantitatively evaluate the transmission effect.
18. The method of claim 17,
and calculating return points based on strategies of channels, sales organizations, sales representatives, sales prices and return point ratios, and performing statistical analysis on the sales conditions of the channels.
19. The method of claim 1,
the grid space represents a collection of one or more of the following properties in the physical world: region, organization, product group, sales channel, sales representative, reward policy, campaign scope.
20. The method of claim 5 or 11,
when any interactive party opening information of the issued or transmitted information is obtained, the identification information of the interactive party, or the identification information and the attribute state are superposed to the opening information to generate another piece of new information which has the same content but different identification information for identification;
This behavior is recorded and attributed to the structured big data;
the behavior is used for expressing the social attitude of the interaction party after opening and reading the information.
21. The method of claim 3,
the propagation strategy of the publisher involves the formulation of one or more of the following items: location, time, circle of friends, web page, user identity.
22. The method of claim 1,
the real environment and/or the virtual environment are divided into a plurality of grid spaces according to different physical world characteristics; the physical world characteristics corresponding to any one interactive party are used for helping other interactive parties to know or judge the grid space where the interactive party is located and to know the real environment and/or the virtual environment where the interactive party is located.
23. The method of claim 22,
the grid space is formed by dividing according to one or more of the following items: time parameter, position parameter, environment parameter, attribute state of interactive party; where the location corresponds to a real location off-line, or to a virtual location on-line.
24. The method of claim 5 or 16 or 22,
any one of the interacting parties provides a corresponding physical world trait when interacting with the other interacting parties or when accessing an interaction process, including one or more of: time parameter, position parameter, environment parameter, identity information of the interactive party; where the location corresponds to a real location off-line, or to a virtual location on-line.
25. The method of claim 5 or 22,
any interactive party obtaining the issued or propagated information can interact with the appointed service providing mechanism to obtain the service; according to different physical world characteristics corresponding to the interaction party and/or the service providing mechanism, the interaction party obtains different services.
26. The method of claim 22,
and comparing or verifying the elements of the physical world traits provided by the interactive party with the elements defined in the rule strategy in advance, and taking the result as a basis for screening the interactive party, opening the authority, providing services, issuing rewards or adjusting the attribute state.
27. The method of claim 5 or 22,
the physical world traits set by the publisher are used for setting the authority for the public degree or the public range of the published information; or the physical world characteristics set by any interactive party are used for setting the authority for the information which can be pushed to the interactive party or the source range of the pushed information.
28. The method of claim 4 or 7 or 23 or 26,
attributes of the interacting party, including physical world traits; or an evaluation index; or an integral; or a credit rating; or the weight index which is set for the interactive party and is used for adjusting the other attribute states of the interactive party; or the interacting parties may allocate monetary shares that are adjusted and can be transferred between the specified interacting parties; the currency is digital currency or physical currency.
29. The method of claim 1 or 5 or 22,
the condition that any interactive party carries out behavior operation in the grid space and the physical world characteristics corresponding to the interactive party when the behavior operation is carried out can be recorded and can be traced or inquired.
30. The method of claim 29,
by identifying the identification information of the interaction party, the condition of the interaction party for performing the behavior operation can be identified or recorded or evaluated or rewarded; and obtaining the matched evaluation or reward or service according to the physical world characteristics or the square grid space corresponding to the interactive party when the behavior operation is implemented.
31. The method of claim 5,
each interactive link for publishing and/or transmitting information can obtain rewards;
according to different physical world characteristics or different grid spaces corresponding to the interaction links, the interaction links obtain different rewards or are applicable to different reward calculation rules;
and/or the interaction link obtains different rewards or is applicable to different reward calculation rules according to different physical world characteristics or different grid spaces corresponding to the information acquisition party.
32. The method of claim 30 or 31,
the reward comprises adjusting one or more of the following items corresponding to the interactive party:
the interacting parties may allocate adjusted monetary shares that may be transferred between the designated interacting parties; an evaluation index; integrating; a credit rating; the weight index is used for adjusting other attribute states of the interaction party;
wherein the currency is digital currency or real currency.
33. The method of claim 11,
the coded media are generated by the code sending center in a unified way or authorized by the code sending center;
the coded medium is any one or any combination of the following: a bar code image generated by the coded information in the form of one-dimensional code, two-dimensional code or multi-dimensional code; an optical dot matrix generated by the coded information in the form of light and dark light or refresh frequency variation or in the form of visible light, ultraviolet light, infrared light or polarized light; the digital sound wave or electric wave generated by the coded information in a specific regular or specific frequency variation mode.
34. An interactive device, which is used for the information dissemination method based on the grid space of any one of claims 1 to 33;
The device for interaction is a mobile terminal or a wearable device possessed by an interaction party, and one or more of the following items are met:
for identifying the encoded media;
the code sending center is used for sending a request for generating the coding medium to a core server of the code sending center, obtaining the core server or the coding medium authorized by the core server and generated by a third party, or obtaining the authorization of the core server;
the server or the mobile terminal or the wearable device is used for interacting with other interaction parties;
for transmitting information relating to physical world traits;
the system is used for arranging or connecting a sensor to collect information related to physical world characteristics;
for comparing or verifying elements of the physical world trait with elements defined in the rule policy;
for using money, or setting an account number related to money; the currency is digital currency or physical currency.
35. The interactive device of claim 34,
and the equipment information of the mobile terminal or the wearable equipment is used as the identification information of the interaction party or is bound with the identification information of the interaction party.
36. A background server, which is used for the information dissemination method based on the grid space of any one of claims 1 to 33; the background server is used for making or adjusting a propagation strategy of the information, and the background server carries out quantitative evaluation on the propagation effect of the information independently or in cooperation with other servers.
37. The backend server of claim 36,
the backend server further conforms to one or more of the following:
the system comprises a background server, a user terminal and a user terminal, wherein the background server is used for formulating a corresponding propagation strategy, providing a corresponding service or issuing a corresponding reward according to physical world characteristics or grid spaces corresponding to an interaction party and/or other interaction parties to which the background server belongs;
the system is used for screening or sequencing other interaction parties according to physical world characteristics or grid spaces corresponding to the other interaction parties;
the system comprises a database, a database server and a plurality of interaction parties, wherein the database is used for carrying out behavior operation on other interaction parties according to physical world characteristics corresponding to the other interaction parties or grid spaces where the other interaction parties are located, and identifying, recording, evaluating, rewarding or providing services for the other interaction parties;
the system is used for acquiring, recording, tracing, inquiring or transmitting the physical world characteristics corresponding to the interaction party and/or other interaction parties to which the background server belongs;
the system is used for publishing or forwarding information to other interaction parties positioned in corresponding grid spaces;
the server or the mobile terminal or the wearable device is used for interacting with other interaction parties;
the code sending center is used for sending a request for generating the coding medium to a core server of the code sending center, obtaining the core server or the coding medium authorized by the core server and generated by a third party, or obtaining the authorization of the core server;
For comparing or verifying elements of the physical world trait with elements defined in the rule policy;
means for configuring an identification of the encoded media;
for requesting the issuing center to issue the money, and obtaining the issued money;
the system is used for setting an account number related to the currency, or using, distributing and exchanging the currency; the currency is digital currency or physical currency.
38. A core server, which is used in the information dissemination method based on the physical world grid space of any one of claims 1 to 33; the core server is used for receiving a request for generating the coding medium, or authorizing a third party to generate the coding medium, or authorizing an interactive party sending the request; the interactive party sending the request comprises the information issuing party which requests to generate the coding medium corresponding to the information to be issued.
39. The core server of claim 38,
the core server further conforms to one or more of the following:
the system is used for quantitatively evaluating the propagation effect of the information alone or in cooperation with other servers;
the system is used for providing corresponding service or issuing corresponding rewards according to physical world characteristics or grid spaces corresponding to other interaction parties;
The system is used for screening or sequencing other interaction parties according to physical world characteristics or grid spaces corresponding to the other interaction parties;
the system comprises a database, a database server and a plurality of interaction parties, wherein the database is used for carrying out behavior operation on other interaction parties according to physical world characteristics corresponding to the other interaction parties or grid spaces where the other interaction parties are located, and identifying, recording, evaluating, rewarding or providing services for the other interaction parties;
the system is used for acquiring, recording, tracing, inquiring or transmitting the physical world characteristics corresponding to other interaction parties;
the server or the mobile terminal or the wearable device is used for interacting with other interaction parties;
for comparing or verifying elements of the physical world trait with elements defined in the rule policy;
means for configuring an identification of the encoded media;
for issuing currency upon request;
the account number is used for managing the account number related to the currency, or distributing and exchanging the currency; the currency is digital currency or physical currency.
CN202011139846.5A 2015-10-09 2015-10-09 Information propagation method based on grid space Pending CN112819503A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011139846.5A CN112819503A (en) 2015-10-09 2015-10-09 Information propagation method based on grid space

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202011139846.5A CN112819503A (en) 2015-10-09 2015-10-09 Information propagation method based on grid space
CN201510649977.0A CN105354747B (en) 2015-10-09 2015-10-09 Information processing network and method based on uniform code sending and sensing access equipment

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN201510649977.0A Division CN105354747B (en) 2015-10-09 2015-10-09 Information processing network and method based on uniform code sending and sensing access equipment

Publications (1)

Publication Number Publication Date
CN112819503A true CN112819503A (en) 2021-05-18

Family

ID=55330714

Family Applications (22)

Application Number Title Priority Date Filing Date
CN202011138981.8A Pending CN112488866A (en) 2015-10-09 2015-10-09 Information interaction method based on unified code sending
CN202210101324.9A Pending CN114493874A (en) 2015-10-09 2015-10-09 Data processing method and server for digital transaction management
CN202210110196.4A Pending CN114693338A (en) 2015-10-09 2015-10-09 Interactive network access method and sensing access equipment and server thereof
CN202210104754.6A Pending CN115809937A (en) 2015-10-09 2015-10-09 Information processing method, equipment and server based on social network help seeking
CN202011141604.XA Pending CN112767001A (en) 2015-10-09 2015-10-09 Interaction method based on physical grids
CN202210101212.3A Pending CN114493529A (en) 2015-10-09 2015-10-09 Information interaction method based on warranty service, information platform and server
CN202011138861.8A Pending CN112819450A (en) 2015-10-09 2015-10-09 Digital currency acquisition method and system
CN202210109898.0A Pending CN114782067A (en) 2015-10-09 2015-10-09 Crowd funding-based information processing method, server and equipment
CN202210104908.1A Pending CN115809375A (en) 2015-10-09 2015-10-09 Data processing method, equipment and server based on social network search
CN202011137326.0A Pending CN112508545A (en) 2015-10-09 2015-10-09 Digital currency circulation method and circulation system
CN202210110197.9A Pending CN114677157A (en) 2015-10-09 2015-10-09 Unified code sending method, core server and sensing access equipment
CN202011138816.2A Pending CN112819449A (en) 2015-10-09 2015-10-09 Digital currency acquisition method and system
CN202011139946.8A Pending CN112766941A (en) 2015-10-09 2015-10-09 Digital currency circulation method
CN202011139846.5A Pending CN112819503A (en) 2015-10-09 2015-10-09 Information propagation method based on grid space
CN202210109822.8A Pending CN114782066A (en) 2015-10-09 2015-10-09 Information processing method and server based on unified code sending
CN202011138985.6A Pending CN112819502A (en) 2015-10-09 2015-10-09 Information dissemination method based on commodity circulation, server and mobile terminal
CN202210101349.9A Pending CN114511397A (en) 2015-10-09 2015-10-09 Information processing method and system based on supply chain management
CN202210132964.6A Pending CN114862434A (en) 2015-10-09 2015-10-09 Information processing method and server for attribute adjustment
CN202011138982.2A Pending CN112508598A (en) 2015-10-09 2015-10-09 Information propagation method based on unified code sending
CN202011137323.7A Pending CN112508597A (en) 2015-10-09 2015-10-09 Transaction method and transaction system based on unified code sending
CN201510649977.0A Active CN105354747B (en) 2015-10-09 2015-10-09 Information processing network and method based on uniform code sending and sensing access equipment
CN202210113043.5A Pending CN114757793A (en) 2015-10-09 2015-10-09 Information processing method, server and equipment based on scene access

Family Applications Before (13)

Application Number Title Priority Date Filing Date
CN202011138981.8A Pending CN112488866A (en) 2015-10-09 2015-10-09 Information interaction method based on unified code sending
CN202210101324.9A Pending CN114493874A (en) 2015-10-09 2015-10-09 Data processing method and server for digital transaction management
CN202210110196.4A Pending CN114693338A (en) 2015-10-09 2015-10-09 Interactive network access method and sensing access equipment and server thereof
CN202210104754.6A Pending CN115809937A (en) 2015-10-09 2015-10-09 Information processing method, equipment and server based on social network help seeking
CN202011141604.XA Pending CN112767001A (en) 2015-10-09 2015-10-09 Interaction method based on physical grids
CN202210101212.3A Pending CN114493529A (en) 2015-10-09 2015-10-09 Information interaction method based on warranty service, information platform and server
CN202011138861.8A Pending CN112819450A (en) 2015-10-09 2015-10-09 Digital currency acquisition method and system
CN202210109898.0A Pending CN114782067A (en) 2015-10-09 2015-10-09 Crowd funding-based information processing method, server and equipment
CN202210104908.1A Pending CN115809375A (en) 2015-10-09 2015-10-09 Data processing method, equipment and server based on social network search
CN202011137326.0A Pending CN112508545A (en) 2015-10-09 2015-10-09 Digital currency circulation method and circulation system
CN202210110197.9A Pending CN114677157A (en) 2015-10-09 2015-10-09 Unified code sending method, core server and sensing access equipment
CN202011138816.2A Pending CN112819449A (en) 2015-10-09 2015-10-09 Digital currency acquisition method and system
CN202011139946.8A Pending CN112766941A (en) 2015-10-09 2015-10-09 Digital currency circulation method

Family Applications After (8)

Application Number Title Priority Date Filing Date
CN202210109822.8A Pending CN114782066A (en) 2015-10-09 2015-10-09 Information processing method and server based on unified code sending
CN202011138985.6A Pending CN112819502A (en) 2015-10-09 2015-10-09 Information dissemination method based on commodity circulation, server and mobile terminal
CN202210101349.9A Pending CN114511397A (en) 2015-10-09 2015-10-09 Information processing method and system based on supply chain management
CN202210132964.6A Pending CN114862434A (en) 2015-10-09 2015-10-09 Information processing method and server for attribute adjustment
CN202011138982.2A Pending CN112508598A (en) 2015-10-09 2015-10-09 Information propagation method based on unified code sending
CN202011137323.7A Pending CN112508597A (en) 2015-10-09 2015-10-09 Transaction method and transaction system based on unified code sending
CN201510649977.0A Active CN105354747B (en) 2015-10-09 2015-10-09 Information processing network and method based on uniform code sending and sensing access equipment
CN202210113043.5A Pending CN114757793A (en) 2015-10-09 2015-10-09 Information processing method, server and equipment based on scene access

Country Status (1)

Country Link
CN (22) CN112488866A (en)

Families Citing this family (69)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112488866A (en) * 2015-10-09 2021-03-12 徐蔚 Information interaction method based on unified code sending
SG11201803693VA (en) * 2015-10-09 2018-06-28 Wei Xu Information processing network based on uniform code issuance, method therefor, and sensing access device
CN107153899A (en) * 2016-03-04 2017-09-12 长沙海商网络技术有限公司 A kind of five in one retail shopping center system and its application method
CN105808725B (en) * 2016-03-08 2019-08-13 腾讯科技(深圳)有限公司 A kind for the treatment of method and apparatus of application message
CN107220840A (en) * 2016-03-21 2017-09-29 扬智科技股份有限公司 Electronic coupons sharing method and device
CN105893996B (en) * 2016-03-31 2020-10-27 联想(北京)有限公司 Information processing method and electronic equipment
CN105704243B (en) * 2016-04-08 2019-03-22 四川省亚丁胡杨人力资源集团有限公司 A kind of service system based on geographical location
CN105956836A (en) * 2016-04-25 2016-09-21 何庆怀 Electronic carrier forwarding method
CN105844433A (en) * 2016-05-12 2016-08-10 张满仓 Method and system for increasing information transfer effectiveness via effective path reward offering
CN106101850A (en) * 2016-06-28 2016-11-09 无锡天脉聚源传媒科技有限公司 A kind of method assisting user and TV interaction and robot device
CN107622403A (en) * 2016-07-13 2018-01-23 安徽双轮酒业有限责任公司 A kind of sales promotion information distribution method and promotion terminal
CN106327243A (en) * 2016-08-16 2017-01-11 重庆兴韦度科技有限公司 Multistage access cascading access building method
CN106339907A (en) * 2016-08-29 2017-01-18 曾强 Data tracing interaction method
CN111355776B (en) * 2016-09-20 2023-10-24 徐蔚 Service providing method and device based on multiple application programs and mobile terminal
CN106452784B (en) * 2016-09-28 2019-07-23 苏州超块链信息科技有限公司 A kind of mutual card method of anonymity equity of digital asset primitive attribute
CN106650864A (en) * 2016-10-13 2017-05-10 合肥思盟信息科技有限公司 System and method automatically generating two-dimensional code on basis of image
CN106408354A (en) * 2016-11-04 2017-02-15 北京铭嘉实咨询有限公司 Method and system for providing service for users among different enterprises
CN106773749B (en) * 2016-11-15 2020-05-29 山东大学 Internet of things equipment control method, control end and system
CN107103471B (en) * 2017-03-28 2020-06-30 上海瑞麒维网络科技有限公司 Method and device for determining transaction validity based on block chain
CN107194685B (en) * 2017-04-01 2021-05-28 网联清算有限公司 Multi-payment mechanism bar code unified payment method and system
CN107103463A (en) * 2017-05-23 2017-08-29 微鲸科技有限公司 Method of payment and device
WO2019000248A1 (en) * 2017-06-27 2019-01-03 深圳市秀趣品牌文化传播有限公司 Method for evaluating e-commerce advertising efficiency
CN109214224B (en) * 2017-06-30 2022-05-27 阿里巴巴集团控股有限公司 Risk identification method and device for information coding
CN109214474B (en) * 2017-06-30 2022-05-24 阿里巴巴集团控股有限公司 Behavior analysis and information coding risk analysis method and device based on information coding
CN107491710A (en) * 2017-09-28 2017-12-19 联想(北京)有限公司 Information processing method, device and electronic equipment
CN107741783B (en) * 2017-10-01 2021-06-25 上海量科电子科技有限公司 Electronic transfer method and system
CN109754256A (en) * 2017-11-08 2019-05-14 徐蔚 Model, device, system, methods and applications based on code chain
CN108076295B (en) * 2017-12-15 2020-04-24 北京五特自动化工程有限公司 Machine vision communication system based on multi-dimensional code
CN108171507A (en) * 2017-12-29 2018-06-15 广东汇卡商务服务有限公司 A kind of Quick Response Code payment transaction processing platform
CN108090034B (en) * 2017-12-29 2021-02-26 政采云有限公司 Cluster-based uniform document code coding generation method and system
CN108053142A (en) * 2017-12-29 2018-05-18 金螳螂家装电子商务(苏州)有限公司 A kind of emolument deduction data configuration method applied to house ornamentation business platform
CN110033251A (en) * 2018-01-11 2019-07-19 触信(厦门)智能科技有限公司 A kind of many methods raised and shared of the realization of network TV content
CN108537050B (en) * 2018-03-20 2021-12-14 中国建设银行股份有限公司 Service data transfer method and related device
CN110300144A (en) * 2018-03-21 2019-10-01 小绿草股份有限公司 The message push system of Internet of Things
CN108932785B (en) * 2018-04-17 2021-07-30 北京微卓科技股份有限公司 Method and system for calling lottery micro-service and mobile intelligent terminal
CN108647250A (en) * 2018-04-19 2018-10-12 郑州科技学院 A kind of talent's big data quantization fine matching method based on artificial intelligence
CN108776621A (en) * 2018-05-31 2018-11-09 迈克医疗电子有限公司 Communication means and device in software architecture between level
CN110648225A (en) * 2018-06-26 2020-01-03 玛链(上海)网络技术有限公司 Method for applying digital code chain
CN109064112A (en) * 2018-06-27 2018-12-21 广州闪聘网络科技股份有限公司 Information issuing method, device and server
CA3034721C (en) * 2018-06-29 2021-01-26 Alibaba Group Holding Limited Managing services associated with url-based two-dimensional codes
CN109191123B (en) * 2018-08-10 2022-08-12 中国人民银行数字货币研究所 Digital currency agency issuing limit control system and method
CN109408755A (en) * 2018-09-14 2019-03-01 广州神马移动信息科技有限公司 Data processing method, device, terminal device and computer storage medium
US12125054B2 (en) 2018-09-25 2024-10-22 Valideck International Corporation System, devices, and methods for acquiring and verifying online information
CN111210248B (en) * 2018-11-22 2022-04-12 北京三快在线科技有限公司 Resource configuration data acquisition method and device, electronic equipment and storage medium
CN111242716B (en) * 2018-11-29 2023-09-15 重庆小雨点小额贷款有限公司 Agricultural product transaction data processing method, agricultural product transaction data processing device, server and storage medium
CN109872241A (en) * 2019-01-28 2019-06-11 太仓煜和网络科技有限公司 Dating site data distribution system and distribution method
CN109886673A (en) * 2019-03-01 2019-06-14 广州达安临床检验中心有限公司 Expanding method, device, computer equipment and the storage medium of two dimensional code function
TWI735866B (en) * 2019-04-23 2021-08-11 崑山科技大學 Authentication-type agent-based distribution e-commerce system and method thereof
CN110737721B (en) * 2019-09-25 2023-03-28 中信梧桐港供应链管理有限公司 Receivable account transfer financing method and device based on block chain architecture
CN112669165B (en) * 2019-09-27 2024-06-25 徐蔚 Unified access method applying digital human code chain
CN111428957A (en) * 2019-12-10 2020-07-17 中国市政工程中南设计研究总院有限公司 PPP project performance index system architecture setting method and big data information recording device
CN113781021A (en) * 2020-06-10 2021-12-10 徐蔚 Digital currency model, method, system and device adopting code chain block
CN114202046B (en) * 2020-09-18 2023-12-19 京东方科技集团股份有限公司 Method, device, equipment and medium for generating two-dimension code based on SAP system
CN112463454B (en) * 2020-12-04 2021-11-05 北京深思数盾科技股份有限公司 Data recovery method, server, terminal device and storage medium
CN115222403A (en) * 2021-04-16 2022-10-21 中国人民银行数字货币研究所 Method, device and system for managing digital currency
CN113222581A (en) * 2021-04-19 2021-08-06 深圳市昂捷信息技术股份有限公司 Chain retail POS system
CN113379470A (en) * 2021-07-08 2021-09-10 杭州创客优选云计算有限公司 Marketing fission system and method
CN113779424B (en) * 2021-09-14 2024-05-28 重庆市易平方科技有限公司 Smart screen-based one-key companion finding processing method and device, smart terminal and medium
US11995643B2 (en) * 2022-05-10 2024-05-28 Capital One Services, Llc System and method for providing a temporary virtual payment card
CN114827213B (en) * 2022-06-28 2022-09-13 成都秦川物联网科技股份有限公司 Industrial Internet of things for implementation of production task plan and control method thereof
CN117422454A (en) * 2022-07-11 2024-01-19 中国人民银行数字货币研究所 Prepaid fund management method, device and system based on digital currency
CN115309707B (en) * 2022-08-31 2023-03-24 广州鼎盛商业保理有限公司 Information interaction method based on warranty service
CN115471060B (en) * 2022-09-03 2023-04-25 广州市物码信息科技有限公司 Digital value monitoring system and digital value evaluation method
CN115545692A (en) * 2022-10-17 2022-12-30 广州汇登信息科技有限公司 Cross-border e-commerce platform multi-currency settlement method and system
TWI842278B (en) * 2022-12-15 2024-05-11 合作金庫商業銀行股份有限公司 Comment analyzing system
TWI838160B (en) * 2023-03-09 2024-04-01 百品源國際貿易股份有限公司 Member referral relationship confirmation system for e-commerce platform
CN116702168B (en) * 2023-05-19 2024-01-12 国网物资有限公司 Method, device, electronic equipment and computer readable medium for detecting supply end information
CN116362847B (en) * 2023-05-31 2023-09-01 江苏中创供应链服务有限公司 Cross-border electronic commerce digital purse net based transaction method and system
CN117560527B (en) * 2023-11-22 2024-08-13 北京风平智能科技有限公司 Digital human AIGC video safety anti-counterfeiting method and device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102130949A (en) * 2011-03-10 2011-07-20 肖智刚 User contribution-based method and system for sharing personalized digital resources
CN103414687A (en) * 2013-07-08 2013-11-27 徐蔚 Method for using bar code image to carry out communication, device thereof and wearable part with embedded sensing core engine
CN103500410A (en) * 2013-10-11 2014-01-08 张磊 Intelligent mass extension agent system based on APP (application)

Family Cites Families (30)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU713556B2 (en) * 1996-04-12 1999-12-02 Citibank, N.A. Inside money
KR0182925B1 (en) * 1996-06-29 1999-05-15 김광호 Set history management system using bar-code system
JP4134440B2 (en) * 1999-04-30 2008-08-20 カシオ計算機株式会社 Electronic computing device and storage medium storing program
JP2002042023A (en) * 2000-07-27 2002-02-08 Nec Corp Digital money operating method, digital money operating system and storage medium with digital money operating program recorded thereon
JP2002049872A (en) * 2000-08-01 2002-02-15 E Bank Corp Method and system for providing digital money by using network
AU2001100484A4 (en) * 2000-12-29 2001-11-15 Joseph Raad Incentive scheme
JP3989762B2 (en) * 2002-04-12 2007-10-10 Kddi株式会社 Electronic money payment system
JP2005174310A (en) * 2003-11-20 2005-06-30 Fuji Electric Retail Systems Co Ltd Ic card type digital money system and its method, and program
CN1841425A (en) * 2005-03-31 2006-10-04 华为技术有限公司 Mobile terminal shopping method and system thereof
US7970671B2 (en) * 2005-04-12 2011-06-28 Syncada Llc Automated transaction processing system and approach with currency conversion
JP2007219569A (en) * 2006-02-14 2007-08-30 Isao Matsushima Shopping system
CN101242588B (en) * 2007-02-09 2012-12-12 华为技术有限公司 Control method for session invitation, multi-party communication system, server and originating terminal thereof
CN101751644A (en) * 2008-12-12 2010-06-23 清华大学 Electronic currency information management platform and method
WO2010109271A1 (en) * 2009-03-25 2010-09-30 Nokia Corporation Systems, methods, apparatuses, and computer program products for generation and exchange of digital currency
CN101799902A (en) * 2010-02-10 2010-08-11 陕西西部数通电信资讯有限公司 Binary channel magnetism-free secretive electronic payment system based on voice and Internet and payment method thereof
CN102156943A (en) * 2011-04-18 2011-08-17 徐蔚 Information processing system capable of realizing immediate business transaction through mobile terminals embedded in touched core engine and method thereof
CN102509231A (en) * 2011-10-28 2012-06-20 徐蔚 Information processing system and method for realizing referral commission real-time transaction through mobile terminals embedded with auction software clients
US20130311348A1 (en) * 2012-03-09 2013-11-21 Gideon Samid Fitting digital currency into modern transactional ecosystems
CN103327442B (en) * 2012-03-20 2019-03-01 腾讯科技(深圳)有限公司 Method, server and the system of content information are obtained based on geographical location
CN102663629A (en) * 2012-05-03 2012-09-12 黄洪程 Electronic commerce method utilizing recommendation rule
CN102968549B (en) * 2012-10-17 2016-01-20 北京大学 Based on many people online interaction method and system of intelligent mobile terminal equipment
CN103020816A (en) * 2013-01-21 2013-04-03 孔庆发 Online virtual currency third-party credit method and data processing system thereof
WO2014170741A2 (en) * 2013-04-15 2014-10-23 Pardhasarthy Mahesh Bhupathi Payback payment system and method to facilitate the same
CN104182892A (en) * 2013-05-22 2014-12-03 上海番米网络科技有限公司 Network shopping system based on recommendation
CN103426083A (en) * 2013-09-03 2013-12-04 百视通网络电视技术发展有限责任公司 Television payment method and system based on two-dimensional codes
US20150170112A1 (en) * 2013-10-04 2015-06-18 Erly Dalvo DeCastro Systems and methods for providing multi-currency platforms comprising means for exchanging and interconverting tangible and virtual currencies in various transactions, banking operations, and wealth management scenarios
CN103971229A (en) * 2014-03-11 2014-08-06 马云起 Virtual currency involved transaction payment method
CA2990715A1 (en) * 2014-09-12 2016-03-17 10353744 Canada Ltd. Capital receipt and payment system based on electronic voucher
CN104361510B (en) * 2014-12-01 2018-10-02 北京金和软件股份有限公司 A kind of ad revenue sharing method for promoting code based on registration
CN112488866A (en) * 2015-10-09 2021-03-12 徐蔚 Information interaction method based on unified code sending

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102130949A (en) * 2011-03-10 2011-07-20 肖智刚 User contribution-based method and system for sharing personalized digital resources
CN103414687A (en) * 2013-07-08 2013-11-27 徐蔚 Method for using bar code image to carry out communication, device thereof and wearable part with embedded sensing core engine
CN103500410A (en) * 2013-10-11 2014-01-08 张磊 Intelligent mass extension agent system based on APP (application)

Also Published As

Publication number Publication date
CN105354747A (en) 2016-02-24
CN114862434A (en) 2022-08-05
CN112508597A (en) 2021-03-16
CN114677157A (en) 2022-06-28
CN105354747B (en) 2022-03-01
CN112766941A (en) 2021-05-07
CN114757793A (en) 2022-07-15
CN114493874A (en) 2022-05-13
CN112508598A (en) 2021-03-16
CN115809937A (en) 2023-03-17
CN114782066A (en) 2022-07-22
CN112488866A (en) 2021-03-12
CN114493529A (en) 2022-05-13
CN114511397A (en) 2022-05-17
CN114782067A (en) 2022-07-22
CN112508545A (en) 2021-03-16
CN115809375A (en) 2023-03-17
CN112819449A (en) 2021-05-18
CN114693338A (en) 2022-07-01
CN112767001A (en) 2021-05-07
CN112819450A (en) 2021-05-18
CN112819502A (en) 2021-05-18

Similar Documents

Publication Publication Date Title
CN105354747B (en) Information processing network and method based on uniform code sending and sensing access equipment
US11403276B2 (en) Information processing network based on uniform code issuance, method therefor, and sensing access device
JP2018538639A5 (en)
US20220321578A1 (en) Unified access method applying digital human being codechain
US20220318853A1 (en) System and method for tokenized licensing of content
Nguyen Exploring collaborative consumption business models-case peer-to-peer digital platforms
JP2021007030A (en) Information processing method based on unified code issuance and server device
EA045997B1 (en) INFORMATION PROCESSING NETWORK BASED ON THE RELEASE OF A SINGLE CODE, INFORMATION PROCESSING METHOD AND RECOGNITION DEVICE FOR ACCESS
Jia Analyzing the Chinese online-to-offline business dynamics: Case: Alibaba Group's Alipay
Annex Platform company profiles

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination