Abstract: The present disclosure relates to an information processing network based on uniform code issuance, a method for the same, and a sensing access device, wherein a releaser sends a corresponding code issuing request to a core administrator, such that the core administrator or a code issuing agency authorized by the core administrator generates a coding medium; in this way, when an accessing party identifies the coding medium with an equipped sensing access device, it may obtain information that matches the identified coding medium and further obtain the following information provided by the releaser, including: information to be released by the releaser, attribute state of the releaser, attribute state of an interacting party associated with the releaser, and information obtained from identifying other coding medium with the sensing access device equipped to the releaser. The present disclosure enables access based on a sitespecific motif through various kinds of sensing access manners so as to accurately track respective nodes in the information dissemination process and realize circulation-based value quantization and cashing.
FIELD
[0001] The present disclosure relates to an information processing apparatus, a network, and an information processing method therefor, and more particularly relates to an information processing network based on uniform code issuance, a method therefor, and a sensing access device.
BACKGROUND
[0002] The dissemination act of information has its own value: with advertisement as an example, its essence is making information dissemination resources valuable. A high-value advertisement is surely published through a resource that may advertise information to more population under the same conditions. That is, the more audiences the advertisement reaches, the higher its value is. In conventional advertising means, information is only “spread” out; while the spread-out totally loses control of the subsequent dissemination process.
[0003] For a commodity, each dissemination act during the process from information advertising through reaching a final deal contributes to the final deal. With loss of any part of information delivery, the information will not reach a person having intention to deal, and the deal will not be reached. Therefore, the information dissemination act has a value, while a person implements the dissemination act is entitled to obtain the value as a reward for its act. However, this value is always undervalued, because currently, an efficient and universally applicable technical means is unavailable to track effective dissemination acts implemented by respective disseminators during the whole process, such that the values of the respective disseminators during the dissemination process can hardly be cashed.
[0004] In a direct-selling hierarchy, the upstream-downstream relationship at each layer is clear, which is convenient for paying commissions layer by layer after the deal is made. However, the direct-selling hierarchy fails to fully embody the dissemination value; it has a drawback that you have to join in the dissemination network to become a member of the direct-selling hierarchy; it has become an occupant for a subject of the dissemination to create orders and directly get the commissions. Due to this utilitarian nature and a person’s limitation that he/she cannot sell all stuffs, the kinds and scope of information (e.g., commodity information) are objectively narrowed. Further, the dissemination acts and
2
commission payments under this direct-selling hierarchy cannot be verified and implemented through technical means.
[0005] The whole process of information dissemination, from an advertiser as an origin till the information is finally received and a certain act is taken, must be a path passing through different inter-person relationship circles, and each intermediate node is located at a crisscross between two or more inter-person circles. An inter-person network formed by people in the society is a complex of multi-layered inter-person relationship circles formed by social relationships having different close degrees such as blood relationship, diploma, work, interest and hobbies, a core of which is individual-centered (in other words, individuals are located at different social groups). Besides point-to-point manners such as personal meeting, phone call, and SMS, information interaction and circulation occurring in social communications of people currently relay more on Internet-based social networking platforms.
[0006] Although enough information may be found through search engines on the Internet, what have been accessed are not necessarily the information you need. Furthermore, for a common consumer who does not care about the Internet or latest trends of e-Commerce anywhere or anytime, he/she would have no enough keyword reservations for implementing further search. Therefore, to access information in this way has a relatively large limitation.
[0007] Information dissemination over social networks has the following characteristics: an information poster and disseminator has a certain prediction on whether a recipient will receive the information or further disseminate the information based on his/her understanding of the information recipients in a corresponding social group, which corresponds to the disseminator’s active screening behavior to a certain degree, such that information dissemination in the inter-person circle has a stronger directivity. On the other hand, in a stable inter-person circle, each person will be cautious about his/her words and behaviors, such that a consequence of compromising the current inter-person relationships will not occur. This actually means social behaviors including information dissemination are all guaranteed with personal quality appraisals and social credits. Therefore, information dissemination through social networks, particularly circles with familiar people, a disseminator will consciously or unconsciously verify the information so as to ensure the trueness of the information as much as possible. Excluding serial frauds, the trueness and credibility of this dissemination are very high. However, similar screening operations are now determined and
3
implemented by individuals. An effective technical means is unavailable to perform rights control to the situations of information senders and recipients; moreover, even the rights are set, it is still hard to match and verify the actual situations of the information senders and recipients with the set rights, such that the current information dissemination lacks pertinence with a poor effect.
[0008] Additionally, the information interaction for current social networks is Internet-based. However, the Internet has inherent defects: Internet users are not of a real name nature, who are represented by IP addresses, and such an “identity identification” may change at any time, such that a person may appear on the Internet with different roles. Even an operation is performed by a non-human (some animals, intelligent robots, etc.) on the Internet through a corresponding terminal, it cannot be discerned. The non-real name characteristic of the Internet is the largest barrier for business operation. Therefore, various business applications unanimously add ID number, home address, mobile number, phone number, real name and the like to urge subscribers to fill more detailed information. However, this will not only affect user conversion rate, but also will incur chain reactions in the aspect of information security such as personal privacy leakage.
[0009] Moreover, the information credibility on the Internet basically cannot be testified for individuals; therefore, the user will consciously or unconsciously hold a suspicious attitude on the Internet. In an Internet-based business mode, a merchant has spent massively on keeping customer stickiness, while commodity or service quality issues, regardless of their authenticity, will cause customer loss and repeated investment on marketing. The so-called e-Commerce mode/ Internet mental mode will become a misconception of burning cash for traffic.
[0010] The virtual economy ushered by the Internet era substantively maps the real economy to a virtual space, which handles and digs out various consumption demands by extending new means using computer terminals and Internet convenience. However, the various kinds of Internet business modes can hardly closely combine the network virtual world with the real world. When you sit before a computer to pick up the mouse to start using the Internet, dimensional shift occurs, i.e., you shift from the real physical world to the virtual Internet. This virtual experience promptly ends when you put away the mouse to leave the computer, and you return to the real world. When you carry on activities in daily life with the Internet, such shift constantly exists. The various drawbacks above restrict the development of Internet economy and can hardly extend the Internet technologies to traditional industries.
4
[0011] Further, the social nature of people decides that their normal life is in the offline real economic circle, generally within a sensing range not exceeding a certain distance centered with an individual person. A means is urgently needed, which enables on-site experience offline (e.g., at a store) while may find corresponding resources (e.g., commodity information) from the virtual world, thereby associating the activities in the real world with the virtual world anytime and anywhere. However, effective technical means is currently unavailable to address this issue.
[0012] To access the virtual world in the Internet, a link (URL: Uniform Resource Location) may be entered in a browser. A simpler and more direct way is available in the mobile Internet, i.e., two-dimensional barcode. The two-dimensional code is a particular geometric image, which uses a black-and-white image distributed in a two-dimensional direction according to certain rules to record data symbol information. Two-dimensional codes for mobile phones are applications of two-dimensional code technologies on mobile terminals, which enable users to quickly access the Internet in any networked real world.
[0013] Chinese patent application No. 200510033918.7, filed on March 31, 2005, entitled "MOBILE TERMINAL SHOPPING METHOD AND SYSTEM THEREOF," discloses a method and a system for implementing mobile terminal shopping using a two-dimensional code. A mobile terminal photographs a two-dimensional code through a built-in camera and decodes the two-dimensional code; then, the mobile terminal sends a payment request message to a payment subsystem which completes payment.
[0014] Chinese patent No. ZL200480005625.1, filed on March 8, 2004, entitled "METHOD FOR PROVIDING MOBILE SERVICES BY USING CODE GRAPH," discloses a method and a system for providing mobile services using a code graph, specifically a method and a system for providing content providing services, geographical information providing services, product information providing services, taxi call services, personal contact information providing services or payment services using two-dimensional codes. A mobile terminal photographs a two-dimensional code through a built-in camera and decodes the two-dimensional code; then, the mobile terminal sends a service providing request message to a service provider server, the service provider server providing a service to the mobile terminal itself, or the service provider server communicating with another server to provide a service to the mobile terminal.
[0015] However, the smart phone as a main means for on-site sensing in the mobile Internet
5
cannot overcome the inherent drawbacks existing in the Internet. A further problem currently encountered is that the process for the mobile phone to sense the two-dimensional code is too complex: unlocking the mobile phone screen to open an APP’s two-dimensional scanning function, and at least 6~7 times of click operations are needed. Secondly, for a certain two-dimensional image perceived, a typical consumer cannot discern a correspondence relationship between the two-dimensional code and a mobile phone application; therefore, scanning is always performed through some common code scanners; then, the obtained two-dimensional parsing results are all webpage links; after clicking, it is the mobile phone browser that is first opened, instead of the mobile APP that may execute corresponding functions. All of such problems will greatly affect use experience. Further, wearable devices such as Google glasses and smart watches are actually still a transformed smart phone, except being more portable; besides, they pose a great threat to the privacy of other people.
[0016] Currently, it is hard to effectively associate or verify a user’s identity with an operation executed by a device such as a smart mobile phone or a real environment where the user is located through the prior art, which is adverse to for example, track an act like dissemination as implemented in information dissemination, and adverse to identify the user’s identity by other relatives and friends in his/her social circles; besides, effective measures are unavailable for an external supervising and regulating agency to regulate the information interaction between the user and other user or application server and the operations executed.
SUMMARY
[0017] To address the above problems currently existing, the present disclosure provides an information processing network based on uniform code issuance, an information processing method therefor, and a sensing access device applicable thereto.
[0018] In the information processing method based on uniform code issuance provided by the present disclosure, any interacting party in a plurality of interacting parties may act as a releaser to obtain a coding medium matching information provided thereby; any interacting party may act as an accessing party to identify the coding medium through a sensing access device equipped, to thereby obtain information matching the identified coding medium and to further obtain the information provided by the releaser of the identified coding medium.
[0019] In a different example, any interacting party may act only as a releaser, or only as an accessing party, or act both as a releaser and an accessing party in different circumstances. The coding medium identified when any interacting party acts as an accessing party may be a
6
coding medium generated based on the information provided by the interacting party as a releaser, or a coding medium generated based on information provided by other interacting party as the releaser.
[0020] Any releaser sends a corresponding code issuing request to an interacting party as a core administrator in the plurality of interacting parties to require acquiring a coding medium matching the information provided by the releaser; the core administrator receives the corresponding code issuance request such that the core administrator or a code issuing agency authorized thereby generates the coding medium. In a different example, the code issuing agency refers to a coding medium generating unit equipped to the releaser that sends the corresponding code issuing request, or a coding medium generating unit equipped to other interacting party than the releaser, or a third-party coding medium generating device other than the plurality of interacting parties.
[0021] Preferably, because code issuance of the coding medium is obtained by requesting the core administrator and generated by the core administrator, or although the coding medium is generated by the code issuing agency, it must be authorized by the core administrator, the core administrator may uniformly manage generation of the coding medium.
[0022] In a different example, the information provided by the releaser for generating the coding medium includes any or any combination of the following: information to be released by the releaser, attribute state of the releaser, attribute state of an interacting party associated with the releaser, and information obtained from identifying other coding medium using the sensing access device equipped to the releaser. Then, such information corresponding to the coding medium may be known by identifying a certain coding medium using the sensing access device.
[0023] In some examples, the information corresponding to a certain coding medium may only include some information items in the information above; while some other information items therein may be corresponding to another coding medium, which may be either separately sent to any interacting party such as an accessing party or an appointed interacting party, or sent, together with the coding medium either corresponding to the information item or not corresponding to the information item, to the any interacting party such as an accessing party or an appointed interacting party.
[0024] In some examples, service information may be one kind of information that needs to
7
be released, included in the information provided by the releaser for obtaining the coding medium. The service information corresponds to a service provided by an interacting party as a service agency; the service corresponding to the service information is independently provided by one service agency or provided by cooperation from a plurality of service agencies; any interacting party knowing this service information, e.g., an accessing party obtaining the service information by identifying the coding medium, sends a service providing request to the service agency, such that the interacting party (e.g., the accessing party) sending the service providing request or an interacting party appointed thereby may obtain the service corresponding to the service information. Based on different natures of the services provided, the core administrator, the releaser, the interacting party associated with the releaser, the accessing party, and the interacting party associated with the accessing party may respectively act as a service agency to participate in the service providing process, or act as a party obtaining the entirety or a part of the service, respectively.
[0025] In different examples, the service provided by the service agency or the service information corresponding thereto matches an execution situation of a set operation and/or a set attribute state; the set operation includes operations independently executed by appointed on or more interacting parties in the plurality of interacting parties, or operations executed by cooperation from appointed some interacting parties thereamong; and the set attribute state refers to a state of one attribute or a superimposition of states of a plurality of attributes corresponding to one appointed interacting party in the plurality of interacting parties, or a superimposition of respective corresponding attribute states of appointed some interacting parties among the plurality of interacting parties.
[0026] Preferably, specific providing situations of the service information or service may be prescribed in a service providing policy. For example, it may be prescribed that the service agency only provides a service when the set operation is correctly executed by an appointed interacting party, and/or when the attribute state of the appointed interacting party is consistent with the set attribute state; for example, if the service agency has a capability to provide a plurality of different services, it may be prescribed that a certain service therein may be provided when the actual execution situation of the set operation and/or the actual attribute state of the appointed interacting party belongs to a certain situation, while a different service is provided when belonging to another situation. Based on different natures of services, in some examples, an interacting party as the service agency per se may act as an appointed party (one of appointed parties), and whether its operation execution situation and/or attribute
8
state is consistent with a prescribed service providing policy is verified to determine whether to provide a corresponding service.
[0027] Any interacting party has an attribute corresponding thereto. An attribute item and/or a corresponding state of the attribute item may act as one kind of information that needs to be released or may be used to be combined with other information that needs to be released, included in the information provided by the releaser for obtaining the coding medium. Any interacting party may provide such information to other interacting parties by directly sending the attribute state or by releasing a coding medium including information corresponding to the attribute state.
[0028] Preferably, specific situations of attribute adjustment may be prescribed by an attribute adjustment policy. Attributes of an interacting party satisfies any one or any combination of the following: the states of one or some attributes of any interacting party are adjusted based on state changes of another one or some attributes of the any interacting party; states of one or some attributes of any interacting party are adjusted based on state changes of one or some attributes of an interacting party associated with the any interacting party; states of one or some attributes of any interacting party are adjusted based on execution situation changes of a set operation of the any interacting party; and states of one or some attributes of any interacting party are adjusted based on execution situation changes of a set operation of an interacting party associated with the any interacting party.
[0029] The attributes corresponding to the any interacting party are recorded and state adjustment are performed by one attribute management agency independently or by cooperation from a plurality of attribute management agencies; in different cases, the attribute management agency may refer to any one of the following: the any interacting party, an interacting party associated with the any interacting party, the core administrator, and a third-party management device other than the interacting party appointed by the core administrator.
[0030] Any interacting party has one or more identification information corresponding thereto; each identification information of the each interacting party may be used as one kind of information that needs to be released, or may be used to be combined with other information that needs to be released, included in the information provided by the releaser for obtaining the coding medium. Any interacting party may provide such information to other interacting parties by directly sending the identification information or by releasing a coding
9
medium including the identification information. The identification information may act as one attribute of the interacting party and have the characteristic described above regarding the attributes.
[0031] Preferably, the identification information may satisfy any one or any combination of the following: the identification information corresponding to the any interacting party when performing any operation is used for binding the execution situation of the operation with the interacting party; the any interacting party superimposes the identification information of the any interacting party to the information to be released to the outside and then directly releases the superimposed information; the interacting party receiving the released information determines the interacting party that provides the released information by discerning the identification information; when the any interacting party acts as a releaser, after superimposing the identification information of the any interacting party to the information to the released to the outside, provides the information superimposed with the identification information to the core administrator or the code issuing agency authorized by the core administrator to generate a corresponding coding medium, and releases the coding medium; the accessing party identifies the corresponding coding medium to obtain a binding relationship between the coding medium and the releaser.
[0032] In some examples, the identification information of any interacting party may be independently provided or provided together with other attributes or other information. When any interacting party as a releaser sends a corresponding code issuing request during executing an operation set thereto, the information simultaneously provided to the core administrator at least includes the identification information of the interacting party and the information about its executing of the set operation, thereby binding the coding medium generated based on the corresponding code issuing request with the releaser’s execution situation of the set operation, such that the binding relationship may be known by identifying the corresponding coding medium.
[0033] One attribute of any interacting party is a monetary share of the interacting party, having the characteristics about the attributes described above; an entirety or a portion of the monetary share of the any interacting party may be distributed and adjusted between appointed some interacting parties; the monetary share of the any interacting party is obtained or adjusted according to any one or any combination of the following manners: the any interacting party obtains a matching monetary share by pledging assets to the core
10
administrator or an appointed approval authority or an appointed other interacting party; the any interacting party obtains a monetary share of a corresponding percentage through exchanging by paying a currency of any kind to the core administrator or an appointed approval authority or an appointed other interacting party; the any interacting party obtains a monetary share or the currency exchangeable to the monetary share of a corresponding percentage paid to the any interacting party by the core administrator or an appointed approval authority or an appointed other interacting party; and appointment of the approval authority or other interacting party is implemented by the any interacting party, or the core administrator, or an interacting party associated with the any interacting party. appointment of the interacting party and distribution of the monetary share may be prescribed by an attribute adjustment policy associated with monetary share attribution.
[0034] In some different examples, that the interacting party pays the monetary share is to obtain a service (not limited to obtaining a commodity, content, and rights, etc.) provided by the service agency; or the interacting party obtains a monetary share paid thereto by other interacting party as a reward based on its execution of a certain operation (particularly an operation prescribed by the monetary distribution policy). A preferable currency is a digital currency, which may facilitate share distribution (transfer) between different interacting parties or even may be actually used in replacement of an issued currency in different regions of the real world.
[0035] one of the attributes of the any interacting party refers to association information about an association between the interacting party and other interacting party; and when the any interacting party is executing the set operation and/or adjusting the set attribute state, the attribute management agency may adjust the attribute state of the interacting party associated with the any interacting party. In some examples, an interacting party becomes a registered user of one or some other interacting parties to thereby form an association therebetween; or an interacting party is mutually associated with a peer interacting party when performing a cooperative interaction operation; or, an accessing party is associated with a releaser by identifying a coding medium; or, some interacting parties are appointed as associated interacting parties by a service agency, or a policy stipulation agency, or the core administrator; and so on.
[0036] one of the attributes of the any interacting party refers to a set weight index corresponding to the interacting party; based on the weight index, the attribute management
11
agency may coordinately adjust different attributes of a same interacting party or coordinately adjust a same attribute of different interacting parties. With distribution of monetary share as an example, it may be correspondingly adjusted based on different situations of operation execution of a certain interacting party, which may also be distributed based on respective operation execution situations of different interacting parties.
[0037] one attribute of any interacting party refers to a physical world characteristic corresponding to the interacting party; the physical world characteristic includes, but not limited to, corresponding to any one of the following or any combination thereof of a real environment and/or a virtual environment where the interacting party is currently located: time parameter, location parameter, ambient parameter, and state of another one or some attributes of the interacting party per se. In some examples, although some physical world characteristics per se are not affected by any interacting party (e.g., time), executing of some actions or states by a certain interacting party or its associated interacting party may be used as a start point/ end point of metering or measuring the physical world characteristic, thereby becoming the physical world characteristic corresponding to the interacting party. Based on different application situations, the physical world characteristics may be obtained via various approaches such as from the any interacting party, its associated interacting party, the core administrator, or an external third party, etc. The real environment and/or virtual environment may be divided into a plurality of physical grids based on different physical world characteristics; a physical world characteristic corresponding to a certain interacting party may facilitate respective parties to understand the real environment and/or virtual environment where the interacting party is located and thereby understand the physical grid where the interacting party is located.
[0038] the core administrator stipulates or updates coding rules and decoding rules matching the coding rules, such that the core administrator or a code issuing mechanism authorized thereby may generate corresponding coded information based on uniform coding rules and generate a corresponding coding medium based on the coded information; and a sensing access device based on the matching decoding rules may identify corresponding coded information from the coding medium as well as the information provided by the issuer. Any interacting party as a policy releasing agency stipulates or updates a policy associated with the information provided by the releaser; the policy includes, but not limited to, a service providing policy associated with the information provided by the releaser, and/or the attribute adjustment policy associated with the attribute state provided by the releaser; and policy
12
appointment and update by the policy releasing agency matches the execution condition of the set operation and/or the set attribute state.
[0039] Preferably, in the example, in the policy of the policy releasing agency, execution logic of a set operation of appointed one or more interacting parties among the plurality of interacting parties is set, such that the corresponding coding medium generated based on the coding rules matching the policy includes an instruction that drives the corresponding interacting party to execute the set execution logic; and the sensing access device of the corresponding interacting party obtains the instruction by identifying the coding medium based on the matching decoding rules. Preferably, if an accessing party is a registered user of the releaser of the coding medium or an interacting party associated therewith (e.g., a service agency associated with the releaser), then the accessing party decodes and parses the coding medium based on decoding rules consistent with the coding rules to obtain corresponding instruction or information, for performing information interaction or interactive operation with the appointed releaser or the interacting party associated therewith, thereby capable of forming a closed loop transaction process which cannot be accessed by an external non-appointed interacting party, which provides a higher security.
[0040] Preferably, any information provider or any coding medium releaser may form an interactive network centered about itself, corresponding to voluntarily accessing the interactive network. Besides obtaining corresponding information, any information receiver or any accessing party identifying the coding medium may also be passively accessed to the above-mentioned interactive network.
[0041] In some application examples, when any interacting party as a first releaser is sending a first code issuing request, the information provided at least includes identification information of the first releaser, and a first coding medium generated based on the first code issuing request is obtained; any other interacting party as an accessing party identifies the first coding medium with the equipped sensing access device to at least obtain the identification information of the first releaser, and the information provided when sending a second code issuing request as a second releaser at least includes the identification information of the first releaser and the identification information of the second issuer, to thereby bind the second coding medium generated based on the second coding request with the first issuer and the second issuer, the binding relationship being knowable by identifying the second coding medium.
13
[0042] In some application examples, the first releaser and the interacting party associated therewith constitute a first ad-hoc interactive network centered about the first releaser; the second issuer accesses the first ad-hoc interactive network by identifying the first coding medium, causing the second issuer and the first issuer to be associated, and causing a second ad-hoc interactive network, which is formed by the second issuer and an interacting party associated therewith and centered about the second issuer, to be integrated with the first ad-hoc interactive network; and the second accessing party accesses the second ad-hoc interactive network by identifying the second coding medium and meanwhile accesses the first ad-hoc interactive network to achieve association with the first releaser and the second releaser.
[0043] In some application examples, an interactive network exists between a first interacting party and an interacting party associated therewith; a second interacting party and a third interacting party access to the interactive network, respectively, to be associated with the first interacting party, respectively; information released by the second interacting party to the first interacting party includes any one or any combination thereof: shared information, search request information, and help request information; the first interacting party sends the shared information to the third interacting party in the interactive network; the first interacting party searches, based on the search request information, reply information associated with the search request information in the interactive network, and sorts the reply information to form a search request, and then pushes the search result to the second interacting party; the reply information is provided by the third interacting party to the first interacting party; and the first interacting party sends the help request information to the third interacting party in the interactive network to facilitate the third interacting party to provide the reply information to the first interacting party based on the search request information.
[0044] In some application scenarios, a plurality of first interacting parties are provided, which correspond to a same motif or a plurality of different motifs, respectively; the second interacting party is associated with the first interacting parties having a corresponding motif based on one or more identification information of the first interacting parties; the first interacting party of one motif or a fourth interacting party associated therewith, as the first issuer, issues a first coding medium obtained to the second interacting party; and the second interacting party, after identifying as a first accessing party the information corresponding to the first coding medium, issues as a second issuer a second coding medium generated based on the information provided by the second issuer to the first interacting party (parties) of other
14
motif.
[0045] In some application examples, the first interacting parties of a plurality of motifs adjust, based on a secondary weight index, attribute states under corresponding identification information of the second interacting parties associated with them respectively; and the core administrator receives attribute states under the corresponding identification information of the second interacting parties, which are provided by the respective first interacting parties, and comprehensively adjusts the attribute states under all identification information of the second interacting parties based on a comprehensive weight index.
[0046] In some application scenarios, a plurality of second interacting parties are associated with a same first interacting party, respectively; the first executing party sets the execution logic of an operation; the operation with the execution logic being set includes any one or any combination of the following: independent operation of respective second interacting party, interactive operations between the plurality of second interacting parties, and interactive operations between the second interacting parties and the first interacting party; and the first interacting party provides the execution logic to the core administrator, such that the coding medium generated by the core administrator or the code issuing agency authorized thereby based on the corresponding code issuing request from the first interacting party or the second interacting party includes an instruction that drives the first interacting party and/or the second interacting party to execute a corresponding operation set with the execution logic; the first interacting party or the second interacting party obtains the instruction by identifying the coding medium through their respective sensing access device.
[0047] In some application scenarios, the plurality of first interacting parties are associated with a same third-party interacting party, and information interaction between the first interacting party and the core administrator is uniformly implemented by the third interacting party; the third executing party sets the execution logic of an operation; the operation with the execution logic being set includes any one or any combination of the following: independent operation of respective first interacting party or second interacting party, interactive operations between the plurality of second interacting parties, interactive operations between a plurality of second interacting parties, and interactive operations between the second interacting parties and the first interacting party; and when an operation with execution logic being set is set with corresponding identification information and the corresponding interacting party executes any step of the operation with execution logic being set, the third
15
interacting party provides the identification information of the operation and the identification information of the interacting party executing the operation to the core administrator to cause the generated coding medium to at least include the identification information, such that any interacting party may obtain execution conditions of respective steps in the operation by identifying the coding medium.
[0048] Preferably, the any coding medium may be released by the releaser to at least one region identifiable by the accessing party through any one or any combination of the following manners: the releaser sends the corresponding coding medium to the sensing access device of the accessing party; the releaser includes a module that may provide the at least one region, and releases the corresponding coding medium through the module; and the releaser sends the corresponding coding medium to a module that may provide the at least one region and releases the corresponding medium through the module.
[0049] Preferably, based on the information provided by the releaser, the core administrator or the code issuing agency authorized thereby generates a matching coding medium or generates a coding medium and a corresponding hyperlink; and the coding medium refers to any one or any combination thereof: a bar code image where the coded information is generated in a pattern of one-dimensional code, two-dimensional code, or multi-dimensional code; an optical lattice diagram where the coded information is generated in a form of light-shadow ray or refurbishing frequency variation or in a form of visible light or UV or infrared light or polarized light; and a digitalized acoustic wave or radio wave generated with a specific law or a specific frequency variation pattern; and the sensing access device includes a device that may identify a corresponding type of coding medium and/or hyperlink.
[0050] The present disclosure provides a sensing access device that may be adapted to implement the information processing method based on uniform code issuing and the functions described in respective examples. An interacting party using the sensing access device acts as a releaser, an accessing party, a core administrator, a service agency, a policy releasing agency, a code issuing agency, and an attribute management agency in different circumstances, following the method above and the corresponding features described in the examples of the method.
[0051] The sensing access device is configured through software, hardware or a combination thereof, so as to be capable of implementing any one or any combination of the respective examples below:
16
[0052] In some examples, the sensing access device identifies a coding medium to obtain information matching the identified coding medium;
[0053] In some examples, the sensing access device identifies the coding medium to cause an interacting party equipped with the sensing access device as an accessing party to access an ad-hoc interactive network constructed with a releaser of the coding medium as the center, such that the accessing party may interact via the sensing access device with the releaser or other interacting party associated with the releaser in the ad-hoc interactive network.
[0054] In some preferred examples, the interacting party equipped with the sensing access device is an entity person.
[0055] In some examples, the sensing access device comprises:
[0056] an obtaining module configured for obtaining a coding medium of a corresponding type; wherein the obtained coding medium may be decoded by a decoding unit of the sensing access device or a decoding unit of other interacting party to obtain coded information; further, the coded information decoded may be parsed by a coded information decoding unit of the sensing access device or a coded information parsing unit of other interacting party to obtain information matching the coded information;
[0057] a sensing/receiving unit configured for causing the interacting party equipped with the sensing access device to interact with other interacting party; for example, but not limited to: sending a service providing request for obtaining a service and/or obtaining corresponding service information, service or service providing voucher, etc., sending as a releaser a code issuing request to the core administrator and providing information and/or receiving the generated coding medium/ or an authorization for autonomously code issuing, sending or receiving any information/ coding medium, sending or receiving a policy needed by an appointed coding rule or receiving a coding rule or corresponding decoding rule stipulated or updated by the core server, sending or receiving an attribute state of the interacting party or an associated interacting party, performing information interaction with other interacting party accessed to the interactive network sending the corresponding information or data to other parts in the sensing access device or receiving from these parts the information having been sent to other interacting parties, etc.; a sending/ receiving unit equipped to other interacting parties; by sending/ receiving such information and further processing it by a corresponding module of the sensing access device, corresponding functions may be implemented by the interacting party equipped with the sensing access device;
17
[0058] Optionally, the sensing access device may include an input unit for inputting the input information involved in the interaction; different input units based on the required input information may have various forms;
[0059] Optionally, the sensing access device may include an exhibiting unit configured for exhibiting content identified from the coding medium and content involved in interaction; such contents may be visual, audio or any other arbitrary form.
[0060] Optionally, the sensing access device may include a coding medium generating unit, for generating a corresponding coding medium based on authorization of the core administrator, the information provided by the interacting party equipped with the sensing access device being superimposed in the generated coding medium.
[0061] Optionally, different parts of a sensing access device are configured in a same interacting device or separately configured in a plurality of interacting devices that are signal connected; wherein the interacting device is a mobile terminal, or a stationary terminal, or a wearable device (also including human body implants); the interacting device is provided with an internal sensor or signal connected with an external sensor to acquire attribute states of the interacting party.
[0062] In some examples, the decoding rules matching the coding rules based on which the core administrator or an interacting party under its authorization generates the coding medium are set in client software; the sensing access device decodes the coding medium matching the coding rules through the client software to obtain corresponding coded information, parses the corresponding coded information to obtain parameters included in the coding medium, and automatically imports the parameters into the automatically boosted client software; and for an unidentifiable coding medium, the sensing access device automatically installs the decoding client software or updates the decoding rules in the decoding client software or issue an error prompt.
[0063] In some examples, the sensing access device is provided with an acquiring unit adapted to acquire at least some attribute states corresponding to the interacting party equipped with the sensing access device; the attributes states, for example, include, but not limited to: physical world characteristics, identification information, association information, weight index, monetary share, user profile of an entity person, physical state of the entity person, etc.
[0064] the interacting party with the entity person as the body has one or more identification
18
information corresponding thereto; each identification information of the interacting party satisfies any one or any combination of the following:
[0065] corresponding identification information when the interacting party is performing any operation is used for binding an execution situation of the operation to the interacting party;
[0066] the interacting party, after superimposing the identification information of the interacting party to the information to be released to the outside, directly releases the information superimposed with said identification information; and the interacting party receiving the released information determines, by identifying the identification, the interacting party that provides the released information; and
[0067] when the interacting party acts as a second releaser, after superimposing the identification information of the interacting party to the information to be released to the outside, provides the information superimposed with the identification information to the core administrator or the authorized code issuing agency to generate a corresponding second coding medium, and releases the second coding medium; by identifying the second coding medium, a binding relationship between the second coding medium and the interacting party as the second releaser may be known.
[0068] In some examples, an interacting party with the entity person as the body has one or more identification information corresponding thereto; each identification information of the interacting party satisfies any one or any combination of the following:
[0069] corresponding identification information when the interacting party is performing any operation is used for binding an execution situation of the operation to the interacting party;
[0070] the interacting party, after superimposing the identification information of the interacting party to the information to be released to the outside, directly releases the information superimposed with said identification information; and the interacting party receiving the released information determines, by identifying the identification, the interacting party that provides the released information; and
[0071] when the interacting party acts as a second releaser, after superimposing the identification information of the interacting party to the information to be released to the outside, provides the information superimposed with the identification information to the core
19
administrator or the authorized code issuing agency to generate a corresponding second coding medium, and releases the second coding medium; by identifying the second coding medium, a binding relationship between the second coding medium and the interacting party as the second releaser may be known.
[0072] In some examples, the first releaser and an interacting party associated therewith constitute a first ad-hoc interactive network centered about the first releaser; the interacting party with the entity person as the body acting as a first accessing party identifies, through the sensing access device, the first coding medium released by the first releaser and is accessed to the first ad-hoc interactive network; and
[0073] an interacting party with an entity person as the body further acts as a second releaser to release a second coding medium; another interacting party as a second accessing party identifies the second coding medium through another sensing access device equipped to realize association with the second releaser, thereby causing the second accessing party to access to a second ad-hoc interactive network, which is formed by the second releaser and an interacting party associated therewith and centered about the second releaser, and meanwhile access to the first ad-hoc interactive network, such that the second ad-hoc interactive network is integrated with the first ad-hoc interactive network.
[0074] The present disclosure provides an information processing network based on uniform code issuing, which may be adapted to implement the information processing method based on uniform code issuing and the functions described in respective examples. the information processing network comprises a plurality of interacting parties, including:
[0075] a core administrator that, based on a received code issuing request, autonomously generates a coding medium matching the code issuing request or authorizes, after verifying rights of a code issuing agency, the code issuing agency to generate a coding medium matching the code issuing request;
[0076] any interacting party as an issuer, which sends the code issuing request and provides information to the core administrator and obtains the coding medium that is generated by the core administrator or an authorized code issuing agency and matches the provided information;
[0077] any interacting party as an accessing party, which identifies, through a sensing access device equipped thereto, the coding medium released to at least one region identifiable by the accessing party, to obtain information matching the identified coding medium and further
20
obtain information provided by the releaser of the identified coded information.
[0078] Preferably, any information provider or any coding medium releaser may form an ad hoc interactive network centered about itself, corresponding to voluntarily accessing the ad-hoc interactive network. Besides obtaining corresponding information, any information receiver or any accessing party identifying the coding medium may also be passively accessed to the above-mentioned ad-hoc interactive network.
[0079] Particularly, any interacting party, when acting as a releaser, an accessing party, a core administrator, a service agency, a policy releasing agency, a code issuing agency, and an attribute management agency in different circumstances, follow the method above and the corresponding features described in the examples of the method. Particularly, a sensing access device equipped to an interacting party acting as an accessing party may be implemented by the sensing access device described above.
[0080] In some examples, any interacting party includes essential parts and optional parts:
[0081] the essential parts include: a sending/ receiving unit configured for interacting with other interacting party and for interacting with other units of a background server; and
[0082] the optional parts include any one or any combination of the following:
[0083] a sensing access device;
[0084] a built-in or external database for storing various information data during an interaction process;
[0085] a decoding unit configured for decoding the coding medium obtained by the interacting party to obtain coded information;
[0086] a coded information parsing unit configured for parsing the obtained coded information to obtain information matching the coded information;
[0087] an input unit configured for inputting input information involved in interaction;
[0088] an exhibiting unit configured for outputting content identified from the coding medium and content involved in interaction;
[0089] a coding medium generating unit configured for generating the coding medium under authorization from the core administrator;
[0090] wherein the sending/ receiving unit included in an interacting party as a releaser is configured for sending a code issuing request to the core administrator and receiving the
21
generated coding medium, and is further configured for releasing the obtained coding medium to at least one region identifiable by the accessing party;
[0091] the sending/ receiving unit included in an interacting party as a code issuing agency is configured for receiving an authorization sent from the core administrator to allow the code issuing agency to autonomously generate the coding medium, such that the coding medium generating unit of the code issuing agency generates the coding medium under the authorization from the core administrator;
[0092] the essential parts of an interacting party as a policy releasing mechanism further includes an access defining unit configured for formulating or updating a policy associated with the information provided by the releaser, and sending the policy to the core administrator through the sending/ receiving unit of the policy releaser; and
[0093] the sending/ receiving unit of an interacting party as a core server is configured for receiving the code issuing request sent from the releaser or releasing the generated coding medium to the releaser or an interacting party appointed by the releaser; essential parts of the interacting party as the core server further include: a coding medium generating unit configured for generating a matching coding medium from the information provided by the releaser;
[0094] optional parts of the interacting party as the core server include any one or any combination of the following:
[0095] a verifying unit configured for verifying, based on the code issuing request from the releaser, whether a code issuing agency appointed by the code issuing request has rights for autonomously generating a coding medium; wherein when the appointed code issuing agency has rights for autonomously generating a coding medium, the sending/ receiving unit of the interacting party as the core server sends, to the appointed code issuing agency, an authorization of allowing the code issuing agency to autonomously generate the coding medium; and
[0096] a rule managing unit configured for formulating or updating the coding rules and the decoding rules matching the coding rules based on the policy provided by the policy releasing agency.
[0097] For example, when any interacting party is acting as a releaser, an accessing party, a core administrator, a service agency, a policy releasing agency, a code issuing agency, or an
22
attribute management agency, etc., the parts configured thereto may be provided in the corresponding server or provided in a mobile terminal, a stationary terminal, or a wearable device (also including human body implants), etc.
[0098] In some examples, any interacting party has disclosure rights set with respect to the information received thereby and/or sent therefrom, the disclosure rights being configured for defining a plurality of conditions for receiving and/or sending information; wherein some conditions include attribute states of the any interacting party, or attribute states of other interacting party.
[0099] In a preferred example of the present disclosure, the present disclosure provides a “mobile terminal/ wearable device” configured to be accessible to a “digital human being network.” The digital human being network refers to a social network hierarchy where respective nodes under a specific motif include corresponding dynamic social statuses/ social reputation indexes, and include social attitudes/ open attitudes (for selecting which motif is received, selecting open to which friends (e.g., casual acquaintance, or allowing friends of friends, or allowing those friends with a certain level of social reputation index to access, irrespective of the acquaintance degree); another one of its main characteristics is a site (environment) access, where parameters related to the scene upon access are acquired and uploaded; the access manner may be various kinds of sensing access, e.g., optical instead of electrical (one-dimensional code, two-dimensional code, and multi-dimensional code, hidden two-dimensional code, etc. ) , acoustic wave, Bluetooth, brain wave, and various kinds of “digital signal propagation and reception” manners, which are implemented by a matching generating module and identification module.
[00100] In a preferred example of the present disclosure, human (entity person) behaviors may include “active code scanning access” and “passive code scanning access,” i.e., making the access behavior voluntarily or interaction with other person that making the access behavior; “access” refers to a relevant action performed by identifying, based on corresponding rules, a medium coded with a certain set rule which is seen, heard, or received in the real world; an effect generated by the “access” does not purely embody the “object itself,” but a “specific motif” generated under a specific “scene” wherein the specific motif may be predefined, or triggered based on a certain condition, e.g., including “moral quality index of social search of the accessing or accessed person,” available for self-performing the “judgment,” thereby generating a quantifiable “behavior generating a moral quality index
23
change for the dissemination chain of the social network” or making “a behavior of changing the self-moral quality index.”
[00101] For a digital human being network with the above characteristics, no “practical visual effect” will be generated if a monkey or a robot wears the sensing access device, because such monkeys or robots do not have a “moral quality index and social circle” that may generate different access effects based on environment, time, and user attributes, etc.; this is a fundamental difference between human and animals as well as robots.
[00102] The means of “sensing access” not only enables an entity person to have a digital human being attributes by “being equipped with a sensing access device,” but also may solve the operation action features of the “digital human being”; besides, it is also embodied that “the device” has various kinds of “digital human being” features described above and in the embodiments below; or even when a “Nano organ/ Nano chip” that may play a role of a sensing access device is implanted in a human body or a human brain, manufacturer attribute may be further attached, so as to be imparted with a “personalized attribute” to connect with respective interacting parties and implement attribute changes. For example, an apparatus provided by a manufacturer, i.e., the ECNU Affiliated Hospital, has “psychologically stable/ emotional stable personality,” and an apparatus provided by another manufacturer, i.e., Fudan Affiliated Hospital has an “intelligent personality,” etc. This may be used to describe “personality attribute distinguishing in a semi-person semi-machine era formed by a large number of machine organs in replacement of human organs.”
[00103] The digital human being may identify digitalized codes with a “module having a sensing access capability” to sensing access, e.g., by “scanning a two-dimensional code,” an O2O mode from offline to online is implemented to access a cloud service background. By superimposing the unique ID (and various kind sof affiliated attribute information) of the digital human being per se to newly opened digital human being information, another new “digital human being information” having a same content but a different ID for identification may be generated; this action may be recorded by the background even it is not disseminated and thus belongs to “structured big data,” which shows the world that it has exhibited “its own social attitude: having opened and read.”
[00104] Based on superimposition of its own ID, the digital human being may “share” the new digital information “to its friend circle” or “point-to-point send it to friends,” further expressing its attitude. This manner of communicating with other person accessed by sensing
24
through the coded information “added with its own information and then sent out” constitutes a basis of the “value” of “human society.”
[00105] That is, by identifying the digital human being ID superimposed in various information (particularly the information having been widely disseminated for multiple times), the digital human beings that execute each time of operation such as information sharing may be identified, and then respective levels of disseminators during the whole process may be traced. Moreover, the disseminators may be rewarded through the digitally quantifiable “price scale,” i.e., a “digital currency” that may be practically circulated. Evolution of existing currencies such as bit coins is not based on “labor and value” in human society, whose “quantity” and “mining process” are only artificially defined; therefore, they cannot play a role of “digital currency.” The digital currency referred to in the present disclosure is generated based on “surplus value in the circulation field,” which belongs to “a value system in the circulation and sharing sector” and has a measurement standard of “being digitizable, being dividable, being traceable, and being quantifiable,” and thus may become a “universal equivalent” to represent a value of any commodity.
[00106] It is just through this manner that the value of information dissemination may be cashed, thereby motivating people to participate with benefits, realizing a real socialized e-commerce. According to the applicants, the socialized e-commerce refers to a business mode where accurate tracing of the dissemination process is implemented through background processing with the online social network as an information propagation channel, which is a basis for disseminators to receive the rewards for forwarding, helping the releaser to gain incremental orders. In this business mode, what commodities to sell is not important, because creation of value is originated from the releaser’s setting; the precondition is that he believes that the dissemination may bring him benefits and he would like to give a share of profits. The essence of the socialized e-commerce will not be touched with using the social network to transfer the focus onto the value created by the dissemination per se. Besides the typical commodities, the services that do not belong to traditional commercial retails and even the information per se may act as a body for dissemination in our socialized e-commerce mode, e.g., membership seeking, job recruitment, investment-inviting, etc. In the socialized e-commerce mode, a releaser, who is the final beneficiary for disseminating information to those who need, may voluntarily decide whether to pay the consideration for the dissemination behavior for making a deal based on his expectation of this mode. By identifying the ID of a disseminator, the attribute features corresponding to the disseminator,
25
such as dynamic social status/ social reputation index (which are adjusted based on his actions) may be known, acting as a basis for other person to determine the credibility degree of the information disseminated thereby or as a basis for setting his open attitude for receiving and sending information.
[00107] Information processing shall go through the procedures of obtaining, identifying, transmitting, processing, and storing. Scanning a digitalized coding medium such as a two-dimensional code with a mobile terminal such as a mobile phone is not only a simple action that may be readily performed by a person in the real world, but also an instruction for requesting the virtual world for obtaining an online resource represented by the two-dimensional code. A smart phone integrates a code reader, a communicator, a processor, and a display, which may not only capture the two-dimensional code to obtain and present the online information, but also may be further hooked to the online cloud service for subsequent operation interactions, corresponding to extending human organs and limbs into the virtual world.
[00108] A digitalized coding medium such as a two-dimensional code may be existent as an entity label of a merchant, a commodity, or a service. A plurality of two-dimensional codes labeling a certain entity resources in the reality constitute an offline real world, and information associated with these two-dimensional codes usually constitutes an online virtual world; the two-dimensional codes associate the scenes and individuals in the real world with the data in the virtual world. Besides, the two-dimensional code has enough information capacity (which may further cover coded information corresponding to execution instructions of a complex action), which becomes a key entering the virtual world in replacement of the webpage link.
[00109] An effective means of “sensing access” is visual and audio sense of the “wearable device equipped to a human, including implanted chip,” “having a unique digital ID and may access in a digital human beingalized manner of a cloud background service accessed by sensing”; usually not including “analog access by matching a database through biometric identifications, such as fingerprint identification, facial recognition, etc.”
[00110] A fundamental difference between the wearable device and human eyes is that unlike eyes, the wearable device needn’t collect all light signals. As a bridge linking the real world and the virtual world, with only one function of obtaining the digitalized coding medium (e.g., scanning a two-dimensional code), the basic requirements will be met (i.e., implementing
26
“sensing access” as mentioned above). Therefore, it is essential for a wearable device is to provide a unit module for obtaining a coding medium, e.g., installing a camera that may scan a two-dimensional code on an eyeglass device, which may cooperate with the eyes to cruise all around to quickly capture two-dimensional codes visible or invisible on the entity resources; the whole process may be done in 1 second. Subsequently, the two-dimensional code is transmitted to the bound (its own) mobile phone or other device for parsing; subsequent operations are executed on the mobile phone according to the procedures described above. This may improve the speed of sensing the virtual world to be comparable with usual visual sensing. Moreover, an APP (application) corresponding to the two-dimensional code is automatically opened through setting on the mobile phone, where the parsing result of the two-dimensional code will be further processed; by finding featured characteristics associated with the specific APP, the APP will be automatically opened or it will prompt to download the APP. With cooperation with APP merchants to obtain the parameters in the two-dimensional code, the parameters will be directly imported after opening the APP and a certain function page will be directed to, further shortening the processing process. Of course, with technological development, equipment such as a personal portable optical screen (optical touch screen), a brain wave holographic helmet, etc., which senses the information of digitalized codes in other manners than visual, will also become possible.
[00111] In the present disclosure, because all important code-sending procedures of the coding medium are uniformly managed by the core administrator; firstly, it may control the execution flows designed for respective parties; secondly, because when respective parties are executing their specific operations required by the procedures, their respective identification Ids which for example are unique are bound, correct execution of the procedures may be monitored.
BRIEF DESCRIPTION OF THE DRAWINGS
[00112] Fig. 1 is a flow diagram of an information processing method based on uniform code issuing in a first embodiment of the present disclosure;
[00113] Fig. 2 is a flow diagram of an information processing method based on uniform code issuing in a second embodiment of the present disclosure;
[00114] Fig. 3 is a partial flow diagram of another embodiment of the information processing method shown in Fig. 2;
27
[00115] Fig. 4 is a partial flow diagram of a further embodiment of the information processing method shown in Fig. 2;
[00116] Fig. 5 is a flow diagram of an information processing method based on uniform code issuing in a third embodiment of the present disclosure;
[00117] Fig. 6 is a flow diagram of an information processing method based on uniform code issuing in a fourth embodiment of the present disclosure;
[00118] Fig. 7 is a partial flow diagram of another embodiment of the information processing method shown in Fig. 6;
[00119] Fig. 8 is a flow diagram of an information processing method based on uniform code issuing in a fifth embodiment of the present disclosure;
[00120] Fig. 9 is a flow diagram of an information processing method based on uniform code issuing in a sixth embodiment of the present disclosure;
[00121] Fig. 10 is a structural schematic diagram of an information processing network based on uniform code issuing in a seventh embodiment of the present disclosure;
[00122] Fig. 11 is a structural schematic diagram of an information processing network based on uniform code issuing in an eighth embodiment of the present disclosure;
[00123] Fig. 12 is a structural schematic diagram of an information processing network based on uniform code issuing in a ninth embodiment of the present disclosure;
[00124] Fig. 13 is a schematic diagram of an exemplary structure of a mobile terminal in the information processing network based on uniform code issuing in the ninth embodiment of the present disclosure;
[00125] Fig. 14 is a schematic diagram of an exemplary structure of a background server in the ninth embodiment of the present disclosure;
[00126] Fig. 15 is a schematic diagram of an exemplary structure of a core server in the ninth embodiment of the present disclosure;
[00127] Fig. 16 is a structural schematic diagram of an information processing network based on uniform code issuing in a tenth embodiment of the present disclosure;
[00128] Fig. 17 is a flow diagram of an information processing method based on uniform code issuing in an eleventh embodiment of the present disclosure;
28
[00129] Fig. 18 is a structural schematic diagram of an information processing network based on uniform code issuing in a thirteenth embodiment of the present disclosure;
[00130] Fig. 19 is a structural schematic diagram of an information processing network based on uniform code issuing in a fourteenth embodiment of the present disclosure;
[00131] Fig. 20 and Fig. 21 are structural schematic diagrams of an entirety of an information processing network based on uniform code issuing in a fifteenth embodiment of the present disclosure;
[00132] Fig. 22 is a schematic diagram of an exemplary flow of an information processing method based on uniform code issuing in the fifteenth embodiment of the present disclosure;
[00133] Fig. 23 and Fig. 24 are flow diagrams of an information processing method based on uniform code issuing in a sixteenth embodiment of the present disclosure;
[00134] Fig. 25 is a schematic diagram of an exemplary structure of an information processing method based on uniform code issuing in the seventeenth embodiment of the present disclosure; and
[00135] Fig. 26 is a schematic diagram of another exemplary structure of an information processing method based on uniform code issuing in the seventeenth embodiment of the present disclosure.
DETAILED DESCRIPTION OF EMBODIMENTS
[00136] Hereinafter, the concept, specific structures, and achieved technical effects of the present disclosure will be further illustrated with reference to the accompanying drawings so as to sufficiently understand the objectives, features and effects of the present disclosure.
Embodiment 1
[00137] Hereinafter, a plurality of examples of an information processing method based on
uniform code issuing are provided, as shown in Fig. 1, which mainly involve interactions
between a core server, a background server, and a mobile terminal; a third-party server is
configured according to actual application scenarios.
[00138] In step S101, the background server sends a request to the core server to request for a two-dimensional code corresponding to a service provided by the background server.
[00139] In step S102, the core server receives the request and generates, based on the service provided by the background server, corresponding coded information from service-related
29
information based on a predetermined coding rule, then generates a corresponding two-dimensional code from the coded information, and then sends the two-dimensional code to the background server.
[00140] In step S103, the background server releases the two-dimensional code to a place where a user of the mobile terminal is accessible. For example, the two-dimensional code may be released on an Internet webpage or on an application software, e.g., Weibo, WeChat, QQ, etc., which may also be released on a plurality of information platforms such as a sales catalog, a TV shopping screen, a building advertisement media, a poster, a real store wall, an exhibition fair, etc., or directly sent to the mobile terminal.
[00141] In step S104, the user becomes a registered user of the background server by registration on the mobile terminal; the mobile terminal sends registration information to the background server, the registration message at least including information that may uniquely identify the mobile terminal or uniquely identify the user (referred to as unique identification information).
[00142] The unique identification information for example may be the unique IMEI number or SIM card number of the mobile terminal, or a physical address of the mobile terminal interface, or the user’s ID number, phone number, etc. The registration information may further include a username, a password, an address, interests and hobbies, QQ number, payment account, and other personal information, or other information required by the background server or core server.
[00143] In step S105, the background server stores the user’s registration information and sends a registration success message to the mobile terminal; the background server or mobile terminal notify the core server such that the core server records the association information representing “the user becomes a registered user of the background server.”
[00144] In step S106, the user identifies the two-dimensional code through the mobile terminal and decodes it to obtain coded information corresponding to the service information. For example, the two-dimensional code is shot by a camera provided in the mobile terminal and then decoded. The camera generally has 0.3 mega pixels or above, which may guarantee the definiteness of the two-dimensional code. When the camera targets at the two-dimensional code and the two-dimensional code is clear enough on the view-finding screen, the camera may automatically shoot the two-dimensional code.
[00145] In step S107, the mobile terminal parses the coded information, extracts the stored
30
service information from the background server, and presents the information related to the provided service on the display screen of the mobile terminal for the user to view.
I CLAIM:
1. A method of disseminating information based on a grid space, comprising,
releasing information to a grid space of a releaser's interest to quantitatively evaluate a dissemination effect of the information.
2. The method according to claim 1, comprising:
after the quantitative evaluation, further adjusting a dissemination policy formulated by the releaser.
3. The method according to claim 1 or 2, wherein:
the grid space matches the releaser's dissemination policy, such that an interacting party in the grid space accesses the released information.
4. The method according to claim 1, wherein:
the released information is superimposed with the releaser's identification information and/or a state of the releaser's attribute.
5. The method according to claim 1, wherein:
the information is further disseminated by the interacting party in the grid space.
6. The method according to claim 5, wherein:
the disseminated information and the released information have identical contents;
the disseminated information or an information dissemination behavior is bound to or associated with the identification information of a disseminator; and
disseminators include a plurality of interacting parties or a plurality of levels of interacting parties that disseminate the information.
7. The method according to claim 5, wherein:
the disseminated information is superimposed with one or more of the following items
over the released information or bound to or associated with one or more of the following items: identification information of the disseminators, information newly added by the disseminators, and attribute states of the disseminator; wherein the disseminators include a plurality of interacting parties or a plurality of levels of interacting parties which disseminate the information.
8. The method according to claim 5, wherein:
respective interaction nodes in information release and/or dissemination are recorded, or traced, or appraised, or rewarded.
9. The method according to claim 8, wherein:
rewarded objects include: source of information dissemination, individual disseminators, and administration platform.
10. The method according to claim 5, wherein:
the information is released via an offline channel and/or an online channel; and the information is disseminated via an offline channel and/or an online channel; and
11. The method according to claim 5 or 10, wherein:
the released information is in the form of a coding medium; the disseminated information is in the form of a coding medium.
12. The method according to claim 11, wherein:
the coding medium may be presented via a corresponding device, or transmitted between corresponding devices, or presented via a webpage or software, or deployed at a physical object in a real-world scenario, or deployed at a physical object worn by a human body.
13. The method according to claim 11, wherein:
the offline channel and/or online channel that releases or disseminates the coding medium is entitled to rewards.
14. The method according to claim 11, wherein:
the coding medium is deployed at places where potential target client groups gather so as to understand the preferences and behavior patterns of individuals.
15. The method according to claim 11, wherein:
various kinds of passing population are subject to statistical analysis with respect to dissemination effects based on the real-world scenario where the coding medium is located.
16. The method according to claim 11, wherein:
accessing interaction with a designated interacting party by identifying the coding medium;
or, accessing a designated interactive network by identifying the coding medium.
17. The method according to claim 16, wherein:
the released information is associated with a commodity or service;
any interacting party is enabled to transact with the designated interacting party based on the released or disseminated information so as to obtain the commodity or service; the transaction is subjected to statistical analysis to quantitatively evaluate dissemination effect.
18. The method according to claim 17, wherein:
rebates are calculated based on channels, sales organization, sales representative, sales price, rebate percentage, and sales on various channels are subjected to statistical analysis.
19. The method according to claim 1, wherein:
the grid space represents a set of one or more of the following attributes in the physical world: region, organization, product group, sales channel, sales representative, reward policy, and scope of activities.
20. The method according to claim 5 or 11, wherein:
when any interacting party obtaining the released or disseminated information opens the information, the identification information of the interacting party or the identification information and the attribute state is superimposed over the opened information to generate another new information with identical content but different identification information; the behavior is recorded and assigned to the structured big data; and the behavior is configured for expressing the interacting party's social attitude towards opened and read information.
21. The method according to claim 3, wherein:
the releaser's dissemination policy involves specification of one or more of the following items: location, time, friend circle, webpage, user identity.
22. The method according to claim 1, wherein:
the real environment and/or virtual environment are divided into a plurality of grid spaces based on different physical world characteristics; the physical world characteristics corresponding to any interacting party are helpful to other interacting parties to understand or determine the grid space where the interacting party is located and to understand the real environment and/or virtual environment where the interacting party is located.
23. The method according to claim 22, wherein:
the grid space is formed based on one or more of the following items: time parameter, location parameter, environment parameter, and interacting parties' attribute states; wherein the location corresponds to an offline real address or corresponds to an online virtual address.
24. The method according to claim 5, 16, or 22, wherein:
any interacting party, when interacting with another interacting party or accessing an interactive process, provides corresponding physical world characteristics including one or more of the following items: time parameter, location parameter, environment parameter, and the interacting party's identity information; wherein the location corresponds to an offline real address or an online virtual address.
25. The method according to claim 5 or 22, wherein:
any interacting party obtaining the released or disseminated information is enabled to interact with a designated service provider so as to obtain a service; or the interacting party obtains different services based on the physical world characteristics corresponding to the interacting party and/or service provider.
26. The method according to claim 22, wherein:
elements of the physical world characteristics provided by the interacting party are compared or verified against elements predefined in a rule policy, and a comparison or verification result serves as the basis for screening interacting parties, or granting privileges, or providing services, or granting rewards, or adjusting attribute states.
27. The method according to claim 5 or 22, wherein:
the physical world characteristics set by the releaser are configured for setting a limitation with respect to the open degree or open scope of the released information; or the physical world characteristics set by any interacting party are configured for setting a limitation with respect to the scope of source of the information that may be pushed to the interacting party or the scope of source of pushed information.
28. The method according to 4 or 7 or 23, or 26, wherein
the attributes of the interacting party include physical world characteristics; or appraisal index; or credit level; or a weight index set for the interacting party to adjust other attribute states of the interacting party; or proportion of a digital currency that is allocable or adjustable by the interacting party and may be circulated between designated interacting parties; wherein the currency refers to a digital currency or a physical currency.
29. The method according to claim 1, 5 or 22, wherein:
a behavioral operation performed by any interacting party in the grid space where it is located and the physical world characteristics corresponding to the interacting party when
performing the behavioral operation are recordable for retrospect and query.
30. The method according to claim 29, wherein:
by identifying the identification information of the interacting party, the behavioral operation performed by the interacting party can be identified, or recorded, or appraised, or rewarded; and a matched evaluation, or reward, or service is obtained based on the physical world characteristics corresponding to the interacting party or the grid space where the interacting party is located when the behavioral operation is performed.
31. The method according to claim 5, wherein:
each interaction node in releasing and/or disseminating the information can be rewarded;
dependent on different physical world characteristics corresponding to the interaction node or different grid spaces where the interacting party is located, the interaction node obtains different rewards or is subject to different reward calculation rules;
and/or, dependent on different physical world characteristics corresponding to the information obtaining party or different grid spaces where the information obtaining party is located, the interaction node obtains different rewards or is subject to different reward calculation rules.
32. The method according to claim 3031, wherein:
the reward includes adjustment to one or more of the following items corresponding to the interacting party:
proportion of currency that may be allocated and adjusted by the interacting party and may be circulated between designated interacting parties; appraisal index; credit point; credit level; and weight index for adjusting other attribute states of the interacting party;
wherein the currency refers to a digital currency or a physical currency.
33. The method according to claim 11, wherein:
the coding medium is uniformly generated by a code issuance center or generated under authorization by the code issuance center;
the coding medium refers to any one or any combination of the following items: a bar code image generated from the coding information in a form of one-dimensional code, two-dimensional code, or multi-dimensional code; an optical lattice diagram generated from the coding information in a form of light-shadow ray or refurbishing frequency variation or in a form of visible light or UV or infrared light or polarized light; and a digitalized acoustic wave or radio wave generated from the coding information according to a specific law or a specific frequency variation pattern.
34. An interacting apparatus, wherein the interacting apparatus is configured to implement the
information disseminating method based on a grid space according to any one of claims
1-33;
the interacting apparatus refers to a mobile terminal or a wearable device of the interacting party, configured to perform one or more of the following items:
identifying a coding medium;
sending a request for generating the coding medium to a core server of a code issuance center to obtain the coding medium generated by the core server or generated by a third party authorized by the core server, or to obtain authorization from the core server;
interacting with another interacting party's server or mobile terminal or wearable device;
transmitting information related to physical world characteristics;
setting or connecting a sensor to acquire information related to the physical world characteristics;
comparing or verifying elements in the physical world characteristics against elements defined in a rule policy; and
using a currency, or setting an account related to the currency, wherein the currency refers to a digital currency or a physical currency.
35. The interacting apparatus according to claim 34, wherein:
device information of the mobile terminal or wearable device serves as identification information of an interacting party or is bound to the identification information of the interacting party.
36. A background server, wherein the background is configured to implement the information disseminating method based on a grid space according to any one of claims 1-33; the background server is configured to formulate or adjust an information dissemination policy, and the background server performs quantitative evaluation on an information dissemination effect independently or in cooperation with other servers.
37. The background server according to claim 36, wherein:
the background server is further configured to perform one or more of the following items:
formulating a corresponding dissemination policy, or providing a corresponding service, or granting a corresponding reward based on the physical world characteristics corresponding to the interacting party to which the background server belongs and/or corresponding to other interacting parties or based on the grid space where the interacting party and/or other interacting parties are located;
screening or sorting the other interacting parties based on the physical world characteristics corresponding to the other interacting parties or based on the grid spaces where the other interacting parties are located;
identifying, or recording, or appraising, or rewarding, or providing services with respect to the behavioral operations performed by the other interacting parties based on the physical world characteristics corresponding to the other interacting parties or based on the grid spaces where the other interacting parties are located;
acquiring, or recording, or tracing, or querying, or transmitting the physical world characteristics corresponding to the interacting party to which the background server belongs and/or corresponding to the other interacting parties;
releasing or forwarding the information to the other interacting parties located in corresponding grid spaces;
interacting with the other interacting parties' servers or mobile terminals or wearable devices;
transmitting a request for generating a coding medium to a core server of a code issuance center to obtain the coding medium generated by the core server or generated by a third party
authorized by the core server, or to obtain authorization from the core server;
comparing or verifying elements in the physical world characteristics against elements defined in a rule policy;
configuring an apparatus for identifying the coding medium;
requesting the code issuance center to issue a currency and obtaining the issued currency;
setting an account associated with the currency, or using, allocating, and exchanging the currency; wherein the currency refers to a digital currency or a physical currency.
38. A core server, wherein the core server is configured to implement the information disseminating method based on a physical world grid space according to any one of claims 1-33; the core server is configured to accept a request for generating a coding medium, generate the coding medium, or authorize a third party to generate the coding medium, or authorize the interacting party sending the request; the interacting party sending the request includes the information releaser which requests for generating a coding medium corresponding to the to-be-released information.
39. The core server according to claim 38, wherein:
the core server is further configured to perform one or more of the following items:
quantitatively evaluating an information dissemination effect independently or in cooperation with other servers;
providing a corresponding service, or granting a corresponding reward based on the physical world characteristics corresponding to the other interacting parties or the grid spaces where the other interacting parties are located;
screening or sorting the other interacting parties based on the physical world characteristics corresponding to the other interacting parties or based on the grid spaces where the other interacting parties are located;
identifying, or recording, or appraising, or rewarding, or providing services to the behavioral operations performed by the other interacting parties based on the physical world characteristics corresponding to the other interacting parties or based on the grid spaces where the other interacting parties are located;
acquiring, or recording, or tracing, or querying, or transmitting the physical world characteristics corresponding to the other interacting party;
interacting with the other interacting parties' server or mobile terminal or wearable device;
comparing or verifying elements in the physical world characteristics against elements defined in a rule policy;
configuring an apparatus for identifying the coding medium;
issuing a currency based on the request;
managing an account associated with the currency, or allocating and exchanging the currency; wherein the currency refers to a digital currency or a physical currency.
| # | Name | Date |
|---|---|---|
| 1 | 202118026154-AbandonedLetter.pdf | 2024-02-19 |
| 1 | 202118026154-TRANSLATIOIN OF PRIOIRTY DOCUMENTS ETC. [11-06-2021(online)].pdf | 2021-06-11 |
| 2 | 202118026154-STATEMENT OF UNDERTAKING (FORM 3) [11-06-2021(online)].pdf | 2021-06-11 |
| 2 | 202118026154-FER.pdf | 2022-06-03 |
| 3 | 202118026154-REQUEST FOR EXAMINATION (FORM-18) [11-06-2021(online)].pdf | 2021-06-11 |
| 3 | 202118026154-FORM 3 [12-11-2021(online)].pdf | 2021-11-12 |
| 4 | 202118026154-POWER OF AUTHORITY [11-06-2021(online)].pdf | 2021-06-11 |
| 4 | 202118026154-COMPLETE SPECIFICATION [11-06-2021(online)].pdf | 2021-06-11 |
| 5 | 202118026154-DECLARATION OF INVENTORSHIP (FORM 5) [11-06-2021(online)].pdf | 2021-06-11 |
| 5 | 202118026154-FORM 18 [11-06-2021(online)].pdf | 2021-06-11 |
| 6 | 202118026154-DRAWINGS [11-06-2021(online)].pdf | 2021-06-11 |
| 6 | 202118026154-FORM 1 [11-06-2021(online)].pdf | 2021-06-11 |
| 7 | 202118026154-DRAWINGS [11-06-2021(online)].pdf | 2021-06-11 |
| 7 | 202118026154-FORM 1 [11-06-2021(online)].pdf | 2021-06-11 |
| 8 | 202118026154-DECLARATION OF INVENTORSHIP (FORM 5) [11-06-2021(online)].pdf | 2021-06-11 |
| 8 | 202118026154-FORM 18 [11-06-2021(online)].pdf | 2021-06-11 |
| 9 | 202118026154-COMPLETE SPECIFICATION [11-06-2021(online)].pdf | 2021-06-11 |
| 9 | 202118026154-POWER OF AUTHORITY [11-06-2021(online)].pdf | 2021-06-11 |
| 10 | 202118026154-REQUEST FOR EXAMINATION (FORM-18) [11-06-2021(online)].pdf | 2021-06-11 |
| 10 | 202118026154-FORM 3 [12-11-2021(online)].pdf | 2021-11-12 |
| 11 | 202118026154-STATEMENT OF UNDERTAKING (FORM 3) [11-06-2021(online)].pdf | 2021-06-11 |
| 11 | 202118026154-FER.pdf | 2022-06-03 |
| 12 | 202118026154-TRANSLATIOIN OF PRIOIRTY DOCUMENTS ETC. [11-06-2021(online)].pdf | 2021-06-11 |
| 12 | 202118026154-AbandonedLetter.pdf | 2024-02-19 |
| 1 | 202118026154E_03-06-2022.pdf |