Sign In to Follow Application
View All Documents & Correspondence

Server And Information Processing Method Based On Unified Code Issuance

Abstract: The present disclosure relates to an information processing network based on uniform code issuance, a method for the same, and a sensing access device, wherein a releaser sends a corresponding code issuing request to a core administrator, such that the core administrator or a code issuing agency authorized by the core administrator generates a coding medium; in this way, when an accessing party identifies the coding medium with an equipped sensing access device, it may obtain information that matches the identified coding medium and further obtain the following information provided by the releaser, including: information to be released by the releaser, attribute state of the releaser, attribute state of an interacting party associated with the releaser, and information obtained from identifying other coding medium with the sensing access device equipped to the releaser. The present disclosure enables access based on a sitespecific motif through various kinds of sensing access manners so as to accurately track respective nodes in the information dissemination process and realize circulation-based value quantization and cashing.

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
11 June 2021
Publication Number
05/2022
Publication Type
INA
Invention Field
ELECTRONICS
Status
Email
mail@lexorbis.com
Parent Application

Applicants

XU, Wei
D, 10F Gold Seat JiuAn Plaza, 258 Tong Ren Road, Jing An District, Shanghai 200040, P.R. China

Inventors

1. XU, Wei
D, 10F Gold Seat JiuAn Plaza, 258 Tong Ren Road, Jing An District, Shanghai 200040, P.R. China

Specification

FIELD
[0001] The present disclosure relates to an information processing apparatus, a network, and
an information processing method therefor, and more particularly relates to an information
processing network based on uniform code issuance, a method therefor, and a sensing access
device.
BACKGROUND
[0002] The dissemination act of information has its own value: with advertisement as an
example, its essence is making information dissemination resources valuable. A high-value
advertisement is surely published through a resource that may advertise information to more
population under the same conditions. That is, the more audiences the advertisement reaches,
the higher its value is. In conventional advertising means, information is only “spread” out;
while the spread-out totally loses control of the subsequent dissemination process.
[0003] For a commodity, each dissemination act during the process from information
advertising through reaching a final deal contributes to the final deal. With loss of any part of
information delivery, the information will not reach a person having intention to deal, and the
deal will not be reached. Therefore, the information dissemination act has a value, while a
person implements the dissemination act is entitled to obtain the value as a reward for its act.
However, this value is always undervalued, because currently, an efficient and universally
applicable technical means is unavailable to track effective dissemination acts implemented
by respective disseminators during the whole process, such that the values of the respective
disseminators during the dissemination process can hardly be cashed.
[0004] In a direct-selling hierarchy, the upstream-downstream relationship at each layer is
clear, which is convenient for paying commissions layer by layer after the deal is made.
However, the direct-selling hierarchy fails to fully embody the dissemination value; it has a
drawback that you have to join in the dissemination network to become a member of the
direct-selling hierarchy; it has become an occupant for a subject of the dissemination to create
orders and directly get the commissions. Due to this utilitarian nature and a person’s
limitation that he/she cannot sell all stuffs, the kinds and scope of information (e.g.,
commodity information) are objectively narrowed. Further, the dissemination acts and
3
commission payments under this direct-selling hierarchy cannot be verified and implemented
through technical means.
[0005] The whole process of information dissemination, from an advertiser as an origin till
the information is finally received and a certain act is taken, must be a path passing through
different inter-person relationship circles, and each intermediate node is located at a crisscross
between two or more inter-person circles. An inter-person network formed by people in the
society is a complex of multi-layered inter-person relationship circles formed by social
relationships having different close degrees such as blood relationship, diploma, work,
interest and hobbies, a core of which is individual-centered (in other words, individuals are
located at different social groups). Besides point-to-point manners such as personal meeting,
phone call, and SMS, information interaction and circulation occurring in social
communications of people currently relay more on Internet-based social networking
platforms.
[0006] Although enough information may be found through search engines on the Internet,
what have been accessed are not necessarily the information you need. Furthermore, for a
common consumer who does not care about the Internet or latest trends of e-Commerce
anywhere or anytime, he/she would have no enough keyword reservations for implementing
further search. Therefore, to access information in this way has a relatively large limitation.
[0007] Information dissemination over social networks has the following characteristics: an
information poster and disseminator has a certain prediction on whether a recipient will
receive the information or further disseminate the information based on his/her understanding
of the information recipients in a corresponding social group, which corresponds to the
disseminator’s active screening behavior to a certain degree, such that information
dissemination in the inter-person circle has a stronger directivity. On the other hand, in a
stable inter-person circle, each person will be cautious about his/her words and behaviors,
such that a consequence of compromising the current inter-person relationships will not occur.
This actually means social behaviors including information dissemination are all guaranteed
with personal quality appraisals and social credits. Therefore, information dissemination
through social networks, particularly circles with familiar people, a disseminator will
consciously or unconsciously verify the information so as to ensure the trueness of the
information as much as possible. Excluding serial frauds, the trueness and credibility of this
dissemination are very high. However, similar screening operations are now determined and
4
implemented by individuals. An effective technical means is unavailable to perform rights
control to the situations of information senders and recipients; moreover, even the rights are
set, it is still hard to match and verify the actual situations of the information senders and
recipients with the set rights, such that the current information dissemination lacks pertinence
with a poor effect.
[0008] Additionally, the information interaction for current social networks is Internet-based.
However, the Internet has inherent defects: Internet users are not of a real name nature, who
are represented by IP addresses, and such an “identity identification” may change at any time,
such that a person may appear on the Internet with different roles. Even an operation is
performed by a non-human (some animals, intelligent robots, etc.) on the Internet through a
corresponding terminal, it cannot be discerned. The non-real name characteristic of the
Internet is the largest barrier for business operation. Therefore, various business applications
unanimously add ID number, home address, mobile number, phone number, real name and the
like to urge subscribers to fill more detailed information. However, this will not only affect
user conversion rate, but also will incur chain reactions in the aspect of information security
such as personal privacy leakage.
[0009] Moreover, the information credibility on the Internet basically cannot be testified for
individuals; therefore, the user will consciously or unconsciously hold a suspicious attitude on
the Internet. In an Internet-based business mode, a merchant has spent massively on keeping
customer stickiness, while commodity or service quality issues, regardless of their authenticity,
will cause customer loss and repeated investment on marketing. The so-called e-Commerce
mode/ Internet mental mode will become a misconception of burning cash for traffic.
[0010] The virtual economy ushered by the Internet era substantively maps the real
economy to a virtual space, which handles and digs out various consumption demands by
extending new means using computer terminals and Internet convenience. However, the
various kinds of Internet business modes can hardly closely combine the network virtual
world with the real world. When you sit before a computer to pick up the mouse to start using
the Internet, dimensional shift occurs, i.e., you shift from the real physical world to the virtual
Internet. This virtual experience promptly ends when you put away the mouse to leave the
computer, and you return to the real world. When you carry on activities in daily life with the
Internet, such shift constantly exists. The various drawbacks above restrict the development of
Internet economy and can hardly extend the Internet technologies to traditional industries.
5
[0011] Further, the social nature of people decides that their normal life is in the offline real
economic circle, generally within a sensing range not exceeding a certain distance centered
with an individual person. A means is urgently needed, which enables on-site experience
offline (e.g., at a store) while may find corresponding resources (e.g., commodity information)
from the virtual world, thereby associating the activities in the real world with the virtual
world anytime and anywhere. However, effective technical means is currently unavailable to
address this issue.
[0012] To access the virtual world in the Internet, a link (URL: Uniform Resource Location)
may be entered in a browser. A simpler and more direct way is available in the mobile Internet,
i.e., two-dimensional barcode. The two-dimensional code is a particular geometric image,
which uses a black-and-white image distributed in a two-dimensional direction according to
certain rules to record data symbol information. Two-dimensional codes for mobile phones
are applications of two-dimensional code technologies on mobile terminals, which enable
users to quickly access the Internet in any networked real world.
[0013] Chinese patent application No. 200510033918.7, filed on March 31, 2005, entitled
"MOBILE TERMINAL SHOPPING METHOD AND SYSTEM THEREOF," discloses a
method and a system for implementing mobile terminal shopping using a two-dimensional
code. A mobile terminal photographs a two-dimensional code through a built-in camera and
decodes the two-dimensional code; then, the mobile terminal sends a payment request
message to a payment subsystem which completes payment.
[0014] Chinese patent No. ZL200480005625.1, filed on March 8, 2004, entitled "METHOD
FOR PROVIDING MOBILE SERVICES BY USING CODE GRAPH," discloses a method
and a system for providing mobile services using a code graph, specifically a method and a
system for providing content providing services, geographical information providing services,
product information providing services, taxi call services, personal contact information
providing services or payment services using two-dimensional codes. A mobile terminal
photographs a two-dimensional code through a built-in camera and decodes the
two-dimensional code; then, the mobile terminal sends a service providing request message to
a service provider server, the service provider server providing a service to the mobile
terminal itself, or the service provider server communicating with another server to provide a
service to the mobile terminal.
[0015] However, the smart phone as a main means for on-site sensing in the mobile Internet
6
cannot overcome the inherent drawbacks existing in the Internet. A further problem currently
encountered is that the process for the mobile phone to sense the two-dimensional code is too
complex: unlocking the mobile phone screen to open an APP’s two-dimensional scanning
function, and at least 6~7 times of click operations are needed. Secondly, for a certain
two-dimensional image perceived, a typical consumer cannot discern a correspondence
relationship between the two-dimensional code and a mobile phone application; therefore,
scanning is always performed through some common code scanners; then, the obtained
two-dimensional parsing results are all webpage links; after clicking, it is the mobile phone
browser that is first opened, instead of the mobile APP that may execute corresponding
functions. All of such problems will greatly affect use experience. Further, wearable devices
such as Google glasses and smart watches are actually still a transformed smart phone, except
being more portable; besides, they pose a great threat to the privacy of other people.
[0016] Currently, it is hard to effectively associate or verify a user’s identity with an
operation executed by a device such as a smart mobile phone or a real environment where the
user is located through the prior art, which is adverse to for example, track an act like
dissemination as implemented in information dissemination, and adverse to identify the user’s
identity by other relatives and friends in his/her social circles; besides, effective measures are
unavailable for an external supervising and regulating agency to regulate the information
interaction between the user and other user or application server and the operations executed.
SUMMARY
[0017] To address the above problems currently existing, the present disclosure provides an
information processing network based on uniform code issuance, an information processing
method therefor, and a sensing access device applicable thereto.
[0018] In the information processing method based on uniform code issuance provided by
the present disclosure, any interacting party in a plurality of interacting parties may act as a
releaser to obtain a coding medium matching information provided thereby; any interacting
party may act as an accessing party to identify the coding medium through a sensing access
device equipped, to thereby obtain information matching the identified coding medium and to
further obtain the information provided by the releaser of the identified coding medium.
[0019] In a different example, any interacting party may act only as a releaser, or only as an
accessing party, or act both as a releaser and an accessing party in different circumstances.
The coding medium identified when any interacting party acts as an accessing party may be a
7
coding medium generated based on the information provided by the interacting party as a
releaser, or a coding medium generated based on information provided by other interacting
party as the releaser.
[0020] Any releaser sends a corresponding code issuing request to an interacting party as a
core administrator in the plurality of interacting parties to require acquiring a coding medium
matching the information provided by the releaser; the core administrator receives the
corresponding code issuance request such that the core administrator or a code issuing agency
authorized thereby generates the coding medium. In a different example, the code issuing
agency refers to a coding medium generating unit equipped to the releaser that sends the
corresponding code issuing request, or a coding medium generating unit equipped to other
interacting party than the releaser, or a third-party coding medium generating device other
than the plurality of interacting parties.
[0021] Preferably, because code issuance of the coding medium is obtained by requesting
the core administrator and generated by the core administrator, or although the coding
medium is generated by the code issuing agency, it must be authorized by the core
administrator, the core administrator may uniformly manage generation of the coding
medium.
[0022] In a different example, the information provided by the releaser for generating the
coding medium includes any or any combination of the following: information to be
released by the releaser, attribute state of the releaser, attribute state of an interacting party
associated with the releaser, and information obtained from identifying other coding medium
using the sensing access device equipped to the releaser. Then, such information
corresponding to the coding medium may be known by identifying a certain coding medium
using the sensing access device.
[0023] In some examples, the information corresponding to a certain coding medium may
only include some information items in the information above; while some other information
items therein may be corresponding to another coding medium, which may be either
separately sent to any interacting party such as an accessing party or an appointed interacting
party, or sent, together with the coding medium either corresponding to the information item
or not corresponding to the information item, to the any interacting party such as an
accessing party or an appointed interacting party.

Claim 1
An information processing method based on unified code issuance, wherein one interactive
party transmits an encoding request requesting acquisition of an encoding medium relating
to the circulation of digital currency, and the core administrative function which has received
the encoding request, the core administrative function or a code issuing mechanism
authorized by the core administrative function provides the encoding medium to the
interactive party that has transmitted the encoding request, and the interactive party
provided with the encoding medium uses the code and the identification information
obtained by identifying the encrypted medium with the sensing access device and the
attribute state of the interactive party are transmitted to the core administrative function,
and the core administrative function adjusts the attribute state of the received interactive
party, wherein the digital currency is circulated among a plurality of fund accounts
designated by the interactive party according to the identification information.
Claim 2
The information processing method of claim 1, wherein the core administrative function
accepts an acquisition request for acquiring the digital currency of the interactive party, and
the real currency held by the interactive party is exchanged with the digital currency by the
core administrative function or a mechanism designated by the core administrator to fund
the interactive party.
Claim 3
The information processing method according to claim 1 or 2, wherein the funding account
is stored in a mobile terminal having a function of the sensing access device.
Claim 4
The information processing method according to claim 1-3, wherein the real currency is
managed by a back-end server of a second interactive party related to a financial institution.
Claim 5
The information processing method according to claim 4, wherein the digital currency is
stored in the back-end server of the second interactive party after being converted into a
real currency at an exchange rate determined by the core administrator or its designated
mechanism.
Claim 6
A digital information processing method based on unified code issuance, wherein one
interactive party transmits an encoding request requesting acquisition of an encoding
medium relating to movement of digital information, the core administrative function which
receives and receives the encoding request, providing to the interactive party that has
generated the encoding medium by the core administrative function or a code issuing
mechanism authorized by the core administrative function and transmitted the encoding
request, and the interactive party provided with the encoding medium is the identification
information obtained by identifying the encoding medium with the sensing access device
and the attribute state of the interactive party are transmitted to the core administrative
function, and the core administrator adjusts the attribute state of the received interactive
party, wherein the digital information is transferred between a plurality of fund accounts
designated by the interactive party according to the identification information.
Claim 7
A server comprising for,
providing to an interactive party that has generated an encoding medium and transmitted
an encoding request in response to the received encoding request for acquisition of the
encoding medium relating to the circulation of the digital currency of the one interactive
party, the encoding medium is generated and provided to the interactive party that has
transmitted the encoding request,
adjusting an attribute state of the interactive party received in association with the
identification information obtained by identifying the encoding medium with the sensing
access device, and of the plurality of funding accounts designated by the interactive party
according to the identification information.
Claim 8
A server comprising for,
providing to an interactive party that has generated the encoding medium according to an
encoding request for requesting acquisition of an encoding medium relating to the
movement of the received digital information of the interactive party,
adjusting the attribute state of the interactive party received in association with the
identification information obtained by identifying the encoding medium with the sensing
access device, and
moving the digital information between a plurality of funding accounts designated by the
interactive party according to the identification information.

Documents

Application Documents

# Name Date
1 202118026156-AbandonedLetter.pdf 2024-02-19
1 202118026156-TRANSLATIOIN OF PRIOIRTY DOCUMENTS ETC. [11-06-2021(online)].pdf 2021-06-11
2 202118026156-STATEMENT OF UNDERTAKING (FORM 3) [11-06-2021(online)].pdf 2021-06-11
2 202118026156-FER.pdf 2022-06-06
3 202118026156-REQUEST FOR EXAMINATION (FORM-18) [11-06-2021(online)].pdf 2021-06-11
3 202118026156-FORM 3 [12-11-2021(online)].pdf 2021-11-12
4 202118026156-POWER OF AUTHORITY [11-06-2021(online)].pdf 2021-06-11
4 202118026156-COMPLETE SPECIFICATION [11-06-2021(online)].pdf 2021-06-11
5 202118026156-DECLARATION OF INVENTORSHIP (FORM 5) [11-06-2021(online)].pdf 2021-06-11
5 202118026156-FORM 18 [11-06-2021(online)].pdf 2021-06-11
6 202118026156-DRAWINGS [11-06-2021(online)].pdf 2021-06-11
6 202118026156-FORM 1 [11-06-2021(online)].pdf 2021-06-11
7 202118026156-DRAWINGS [11-06-2021(online)].pdf 2021-06-11
7 202118026156-FORM 1 [11-06-2021(online)].pdf 2021-06-11
8 202118026156-DECLARATION OF INVENTORSHIP (FORM 5) [11-06-2021(online)].pdf 2021-06-11
8 202118026156-FORM 18 [11-06-2021(online)].pdf 2021-06-11
9 202118026156-COMPLETE SPECIFICATION [11-06-2021(online)].pdf 2021-06-11
9 202118026156-POWER OF AUTHORITY [11-06-2021(online)].pdf 2021-06-11
10 202118026156-REQUEST FOR EXAMINATION (FORM-18) [11-06-2021(online)].pdf 2021-06-11
10 202118026156-FORM 3 [12-11-2021(online)].pdf 2021-11-12
11 202118026156-STATEMENT OF UNDERTAKING (FORM 3) [11-06-2021(online)].pdf 2021-06-11
11 202118026156-FER.pdf 2022-06-06
12 202118026156-TRANSLATIOIN OF PRIOIRTY DOCUMENTS ETC. [11-06-2021(online)].pdf 2021-06-11
12 202118026156-AbandonedLetter.pdf 2024-02-19

Search Strategy

1 202118026154E_06-06-2022.pdf