Sign In to Follow Application
View All Documents & Correspondence

Unified Access Method Applying Digital Human Code Chain

Abstract: A unified access method applying a digital human code chain comprises: acquiring information corresponding to a first subject, and acquiring information corresponding to at least one other subject via a heterogeneous access path; and identifying an entity encoding medium, and acquiring information corresponding to the first subject: digital human identifier information of a partner corresponding to an industry code server, an item corresponding to the industry code server and an entity corresponding to the item, and information indicating that a partner and/or digital human identifier information thereof is associated with the entity, wherein the entity indicates a right to share a revenue generated from the item. By means of accessing and forwarding a code chain, an offline physical world is linked with an online virtual word in a seamless manner, thereby achieving comprehensive channel management and digitized allocation of a value circulation and transfer system. The entity encoding medium is further usable as a representation format of a digital asset, and uses a special claim as a measurement unit of barter transactions to achieve circulation and trading in various communicated and interconnected industry code servers.

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
19 March 2022
Publication Number
27/2022
Publication Type
INA
Invention Field
COMPUTER SCIENCE
Status
Email
Parent Application

Applicants

XU, Wei
No.8, Lane 118, Yonghe Road, Jingan District Shanghai 200072

Inventors

1. XU, Wei
No.8, Lane 118, Yonghe Road, Jingan District Shanghai 200072

Specification

Invention Title: A Unified Access Method Using Digital Human Code Chain
technical field
[0001]
The present invention relates to a unified access method using digital human code chain.
Background technique
[0002]
With the rapid popularization of smart devices such as smart phones, people's lives are becoming more and more convenient, and the communication between people is becoming more and more convenient. With the emergence of the Internet revolution, a large number of new information transmission methods have emerged. New business models are also established. However, limited by the traditional Internet theory, it is still realized through the mode of interaction between people based on web pages (or APP) and the servers of operators and service providers. The drawback is that the interaction between people and things in daily life has not been fully studied The characteristics, methods and models of human activities are artificially divided into online and offline activities, resulting in the phenomenon that although online and offline activities have the same commercial significance, their data and models are separated.
[0003]
The act of dissemination of information itself has value: take advertising as an example, its essence is the value conversion of information release resources, and high-priced advertisements must be released through resources that can spread information to more people under the same conditions. That is, the more audiences it can reach, the greater its value. In traditional advertising methods, information is only "distributed", and after it is distributed, the subsequent communication process is completely lost.
[0004]
For a commodity, in the process from the advertising information to the final transaction, each dissemination behavior contributes to the final transaction. If any one of the information is missing, then the information cannot reach those who have transaction intentions, and the transaction cannot be established. Therefore, the dissemination of information has value, and those who implement the dissemination behavior should acquire these values ​​as a reward for their behavior. However, this kind of value has not been paid attention to, because there is currently a lack of efficient and universally applicable technical means to trace the effective communication behaviors carried out by various communicators in the whole process, and it is difficult to honor each communicator in the process of communication. value.
[0005]
In the direct selling system, the upstream and downstream relationships of each layer are clear, which is convenient for step-by-step commissions after the transaction is formed. However, the disadvantage of the direct selling system not being able to fully reflect the value of communication is that one must become a member of the direct selling system in order to join the communication network. As a recipient of communication, creating orders and directly earning income has become a profession. Due to the utilitarian nature of this , coupled with the fact that it is impossible for one person to sell everything, objectively narrows the type and scope of dissemination of information (such as commodity information). Moreover, the dissemination behavior and commission distribution under this direct selling system cannot be verified and implemented through technical means.
[0006]
The whole process of information starting from the source of the publisher, until it is finally received and therefore takes a certain action, must be a link through different interpersonal circles, and each intermediate link is at the intersection of two or more interpersonal circles. . The core of the interpersonal network formed by people in society is a complex of multi-layer interpersonal circles (that is, individuals in different community). In addition to peer-to-peer methods such as face-to-face, phone calls, and text messages, the interaction and flow of information in people's social interactions currently relies more on the social networking platform of the Internet.
[0007]
Although enough information can be searched through search engines on the Internet, the information that you are exposed to is not necessarily the information you need. Moreover, for an ordinary consumer who does not care about the Internet or the forefront of e-commerce anytime and anywhere, there is not enough keyword reserve to implement the next search. Therefore, obtaining information in this way has great limitations.
[0008]
The dissemination of information through social networks has the following characteristics: on the one hand, due to the information publishers and disseminators, based on their understanding of the information recipients in the corresponding community, there is a certain prejudgment on whether the other party will receive information or further disseminate information. , which is equivalent to a certain degree of active filtering by the communicator, which makes the information dissemination in the interpersonal circle more directional. On the other hand, in a stable interpersonal circle, everyone usually pays attention to what they say and do so that they do not have the consequences of destroying the current interpersonal relationship. This actually means that social behavior, including dissemination of information, is guaranteed by personal digital evaluation and social credit. Therefore, in the dissemination of information through social networks, especially in the circle of acquaintances, the disseminator will consciously or unconsciously confirm the information and ensure the authenticity of the information as much as possible. On the premise that there is no serial deception, the authenticity and credibility of this kind of communication are very high. However, filtering operations like the above are now judged and implemented by individuals themselves, and there is still no effective technical means to control the authority of the information sender and receiver, and even if authority is set, it is difficult to Matching and verification with the set permissions makes the current information dissemination untargeted and ineffective.
[0009]
In addition, the current information interaction of social networks is based on the Internet, but the Internet has inherent defects: Internet users have non-real names, and they are presented as IP addresses, a "identity identification" that can change at any time. Appears in different roles on the Internet. Even operations performed by non-humans (some animals, intelligent robots, etc.) on the Internet through corresponding terminals cannot be identified. The non-real-name nature of the Internet is the biggest obstacle to commercial operation. Therefore, in various commercial applications, ID number, home address, mobile phone number, fixed phone number, real name, etc. are added to urge users to fill in more detailed information. However, this not only affects the user conversion rate, but also causes personal privacy leakage. and other information security chain reactions.
[0010]
Moreover, as an individual, it is basically impossible to verify the authenticity of information on the Internet, so users consciously or unconsciously hold a skeptical attitude on the Internet. In the Internet-based business model, merchants have already spent huge costs to maintain customer stickiness, and once the problem of product or service quality occurs, no matter whether it is true or false, it will lead to the loss of users and repeated investment in marketing costs. The so-called e-commerce Mode/Internet thinking mode has become a misunderstanding of burning money to buy traffic.
[0011]
The virtual economy led by the Internet era essentially maps the real economy to the virtual space (but cannot map one by one), and uses the convenience of computer terminals and the Internet to expand new means to respond to and explore various consumer needs. However, it is difficult for various Internet business models to closely integrate the virtual world and the real world. The dimensional transformation occurs when one sits in front of the computer and picks up the mouse to start using the Internet, which means that the real physical world is switched to the virtual Internet. This virtual experience ends when you drop the mouse and leave the computer, returning to the real world. This switch is always present when people use the Internet to complete their daily activities. However, due to the above-mentioned defects, the development of the Internet economy is restricted, and it is difficult to cover the Internet technology to traditional industries.
[0012]
However, the social nature of people determines that their normal life is in the offline real economic circle, usually within a range of perception that does not exceed a certain distance centered on the individual. People urgently need a means to enable them to find corresponding resources (such as commodity information) from the virtual world while performing on-site/physical experience offline (such as a store or scenic spot) or game scene, Activities in the real world are connected to the virtual world anytime, anywhere. However, there is also a lack of effective technical means to solve this problem.
[0013]
At the same time, the value of the Internet economy, such as social networking sites, is actually created by the participation of hundreds of millions of consumers, but consumers do not enjoy the value of the website company. This problem needs to be solved.
[0014]
The way to access the virtual world in the Internet may be to enter a link (URL: Uniform Resource Location) in the browser. In the mobile Internet, there is a simpler and more direct form: dimensional barcode. A two-dimensional code uses a certain geometric figure, a black and white figure distributed in a two-dimensional direction according to a certain rule to record the data symbol information. Mobile phone two-dimensional code is the application of two-dimensional code technology on mobile terminals, which can enable users to quickly access the Internet in any real world connected to the Internet to a certain extent.
[0015]
The application number is 200510033918.7, and the filing date is March 31, 2005. The Chinese patent application entitled "Mobile Terminal Shopping Method and System" discloses a method and system for realizing mobile terminal shopping by using two-dimensional codes. The mobile terminal shoots and decodes the two-dimensional code through the built-in camera, and the mobile terminal sends a payment request message to the payment subsystem and the payment subsystem completes the payment.
[0016]
The patent number is ZL200480005625.1, the application date is March 8, 2004, and the Chinese patent titled "Method for Providing Mobile Services Using Code Maps" discloses a method and system for providing mobile services using code maps. A method and system for providing content provision services, geographic information provision services, product information provision services, taxi calling services, personal contact information provision services or payment services through QR codes. The mobile terminal captures and decodes the two-dimensional code through the built-in camera, and the mobile terminal sends a service provision request message to the service provider server, the service provider server itself provides services to the mobile terminal, or the service provider server communicates with other servers , to provide services to mobile terminals.
[0017]
However, as the main means of on-the-spot perception in the mobile Internet, smart phones cannot overcome the above-mentioned inherent defects of the Internet. Another problem is that the process of sensing the QR code on the smartphone is too complicated: from unlocking the phone screen to opening the QR code scanning function of an APP (application), at least 6-7 clicks are required. Secondly, for a QR code image that they see, the general consumer cannot distinguish the corresponding relationship between the QR code and the mobile phone application, so the scanning is carried out by some public code scanners, and the QR code analysis result is obtained. They are all web links. After clicking, the mobile browser is opened first instead of the mobile APP that can perform the corresponding functions. These problems have a great impact on the user experience. Wearable devices such as Google glasses and smart watches only make the device more portable, but it is still a deformed smartphone, and it is easy to pose a great threat to the privacy of others.
[0018]
At present, it is difficult to effectively associate or verify the user's own identity with the operation performed by the user through a device such as a smartphone, or the real environment of the user through the existing technology, which is not conducive to traceability when, for example, disseminating information. The dissemination and other behaviors implemented by it are also not conducive to the identification of the user's identity by other relatives and friends in the interpersonal circle, and there is also a lack of external regulatory agencies to supervise the information and execution of operations between the user and other users or application servers. effective measures.
[0019]
The traditional Internet is implemented based on IP links; the popularization of mobile terminals enables everyone to have smart devices that are carried with them, and when needed, according to people's instructions (will, social status, social status and social attitude) social attitude) to obtain information and pass it on to the business system.
[0020]
The negative characteristics of the current Internet economy include the existence of Internet monopoly barriers when service providers provide Internet portals, payment services, review services, classification services, social services, and e-commerce platforms. That is, although the Internet is technically flat, due to the explosion of information in the Internet age, users have to rely more on various general services on the Internet to find the services they need, so users not only Lost the ownership of personal data, and have to passively accept the quality and price inequity brought by various monopolized Internet business services: especially the value created by each user to the Internet service company, but enjoy the value added. It's the service company, not everyone who creates value.
[0021]
Traditional companies and agents may not be able to enjoy the benefits of the entire platform;
[0022]
For Internet companies such as Facebook, although all netizens not only browse, disseminate, and participate in creating most of the company's value, but also disclose their privacy to the society, these should theoretically receive consideration, but in addition to obtaining Internet use functions, and Can't share in the value of the entire platform (like a stock market cap worth hundreds of billions of dollars).
[0023]
In recent years, with the development of the mobile Internet, people have begun to use various things around them to access the Internet, and scanning the code brings users the feeling of "what you see is what you get", thereby gradually breaking the information monopoly barriers of Internet service providers and forming A new form of Internet economy characterized by sharing. Due to the flexibility of the sharing economy, the concept of the sharing economy has developed rapidly since its inception, and has spread to thousands of households.
[0024]
For example, due to QR code virus, counterfeit QR code, information tampering, personal information theft, information navy, etc., illegal P2P finance, illegal virtual currency, illegal pyramid selling, illegal information sharing and other problems (especially related to people's lives) Problems in the most fundamental economic activities at work) have brought new challenges to the stability and unity of the country and the harmonious life of the people.
[0025]
With the promotion and popularization of QR code, its application in scanning code payment, bicycle sharing and many other fields has become more and more extensive, which has changed the way of access to a certain extent, and has become one of the foundations when using the Internet of Things to establish a new business model. . However, the use of QR codes is mostly based on smartphone applications, which requires users to find the corresponding APP application according to the nature of the target object, and then start the camera to scan and identify. The whole process has a high degree of human participation, and it is still inconvenient to use.
[0026]
In addition, the data capacity of two-dimensional codes is limited, and the compilation specifications and methods of various two-dimensional codes make the production of code readers and background servers complicated. Another example is WeChat payment and other business processes that rely solely on the "QR code scan" technology, which has fatal flaws: the two-dimensional code can be issued arbitrarily, and the two-dimensional code usually contains a link, which points to the actual service provider. Second server, the user does not realize whether the second server is reliable during the process of scanning the code through programs such as WeChat. In this mode, theft and fraud can be easily achieved by using fake servers and hacking means such as data theft and tampering.
[0027]
The traditional scan code access is only by scanning the QR code generated by a "QR code server" to access the corresponding back-end mall server; that is, based on the same "QR code server", that is, the same "QR code server". The QR code generated by the "QR code server" can only be connected to the "own mall", resulting in the low utilization efficiency of front-end code sticking, and the commercial value of only accessing a specific mall after the value chain is spread cannot be maximized.
[0028]
With the promotion and popularization of QR codes, especially the popularization of small programs, the offline promotion of scanning QR codes and the application scenarios of access become more and more abundant, which is different from the online centralization of traditional Internet e-commerce. Join, but manifest in the real world everywhere, everywhere. The advantage of small program QR code scanning access is that in various scenarios, consumers can directly access merchant services without registering and downloading steps, and they can leave when they are finished.
[0029]
However, since different Mini Programs are based on different manufacturers, their servers are not the same, so that the actual consumption of the same consumer is completed in different transaction servers, which not only brings consumers switching between different servers. Troubles such as points and coupons cannot be used universally, and the delivery address needs to be filled in repeatedly; and the behavior of different merchants' stickers being spread by consumers is a contribution to advertising, and ultimately the purchase transaction is obtained, and the due evaluation and reward are not obtained.
[0030]
The current Internet/Internet of Things-based technologies are all based on IP addresses as the underlying connection, and all supporting networking access devices are also based on IP address management. , that is, machines (including networked computers, mobile phones, driverless cars, airplanes, refrigerators, air conditioners, etc., and even half-human, half-machines with brain-implanted chips) that exist in cyberspace, or anytime, anywhere (multiple location), or does not exist anywhere; however, because it is non-human and detached from human society, it causes all kinds of chaos (hacking, navy, anonymity, etc.), and at the same time, single-phase "peer-to-peer links" cannot Faithful representation of human social characteristics based on socially formed tribal groups.
[0031]
In fact, in the process of information dissemination, more meaning can be given to information through human intervention, but it is difficult to highlight this "value expression" of "human society" based on the above-mentioned existing technologies. Through the chain communication method (which has the characteristics of being people-centered and spreading according to the individual's own relationship network), the information receiver can not only receive the original information, but also obtain the attribute information given by the communicator. Get more relevant information to make more rational decisions and behaviors. From a further extension, these attribute information can not only allow the receiver to obtain the dissemination of the information, but also make judgments on the authenticity, quality and rationality of the connotation of the information itself.
[0032]
However, since the attribute information itself is the superposition of the original information by the communicator, the attribute itself has the following characteristics: 1) Subjectivity: the assignment of attributes has a strong communicator's subjectivity, and it changes with time and the communicator's circumstances and other objective factors have changed. 2) Forgery: It is extremely simple to alter the credibility of the information itself for personal gain. 3) The problem of dissemination efficiency: Due to the limitation of the contact range, the efficiency of chain dissemination is slower and less efficient than using the Internet to publish/forward, which will reduce the probability of use. 4) Cost issue: To maintain the reliability of the information on the dissemination chain, it will inevitably bring about high verification costs, which will lead to a linear increase in the cost of information, which will hinder the scope and frequency of use of the information itself.
[0033]
A typical example is blockchain technology and Bitcoin. As a typical transaction book information circulating on the Internet that requires extremely high reliability, blockchain technology uses cryptographic algorithms and voting models to verify the authenticity of transaction information, and establish a complete set of information on the Internet that contains all The distributed chain database of transaction history, with the passage of time, the difficulty of cryptographic algorithms and the query difficulty of chain database are also increasing exponentially. Obviously, this model can only be maintained by the continuous appreciation of Bitcoin, which is obviously a practice that violates objective laws.
[0034]
Blockchain is called a revolutionary technology because it solves the problem of decentralization of the information network, so that the trusted information of the network consensus can be transmitted by consensus, but its problems are also very obvious: 1) High cost: A large amount of computing power is used in meaningless cryptographic algorithms, which greatly increases the social cost; 2) Anonymity: whether users, service providers and miners are anonymous, it is difficult to avoid anonymous users applying this to illegal activities, It is also impossible to cut off the illegal and fake information dissemination by the information originator on the Internet. The second problem is prominent in that Bitcoin based on blockchain technology is widely used in illegal money laundering and cybercrime. The determination of the value of Bitcoin and the endorsement of its use needs to be verified by a group of robots, that is, a “community” based on IP addresses. Its design is divorced from the basic attributes of human society, resulting in the inability to solve the above problems.
[0035]
disclosure of invention
[0036]
The invention provides a unified access method using a digital human code chain, realizes a unified shopping mall mode of multi-center heterogeneous access, and provides management of all-channel additions and grid codes.
[0037]
The present invention provides an access method, which acquires information corresponding to a first subject, and obtains heterogeneous access information; the heterogeneous access information corresponds to a heterogeneous access approach; and through the heterogeneous access approach, obtains information corresponding to at least information about one other subject.
[0038]
In any optional example of the access method, the information corresponding to the first subject is the first information corresponding to the relevant matters of the first industry code server; the information corresponding to at least one other subject is the information corresponding to at least one other industry. information about the code server.
[0039]
In any optional example of the access method, access the first page corresponding to the first subject, and obtain the first information and heterogeneous access information;
[0040]
Access the second page corresponding to the second subject through the heterogeneous access path corresponding to the heterogeneous access information, and obtain the second information corresponding to the relevant matters of the second industry code server;
[0041]
The first industry code server corresponding to the first body and the second industry code server corresponding to the second body are different industry code servers.
[0042]
In any optional example of the access method, the second information and the heterogeneous access information are obtained on the second page of the access, and the third subject is accessed through the heterogeneous access path corresponding to the heterogeneous access information. On the third page of , obtain the third information corresponding to the relevant matters of the third industry code server, or obtain the third information and heterogeneous access information.
[0043]
In any optional example of the access method, the third subject is a subject other than the second subject; the third industry code server corresponding to the third subject is a different industry code server from the second industry code server;
[0044]
Or, the third body is a body other than the first body and the second body; the third industry code server corresponding to the third body is a different industry from the first industry code server and the second industry code server code server.
[0045]
In any optional example of the access method, from the page corresponding to any one subject, through the heterogeneous access path corresponding to the heterogeneous access information, access to the page corresponding to at least one other subject except the current subject, Or access to a unified page; the unified page includes access paths corresponding to multiple other subjects except the current subject, so as to obtain information corresponding to the multiple other subjects respectively.
[0046]
In any optional example of the access method, the unified page is managed by a unified management server of a core system; the unified management server of the core system is in communication connection with the industry code server corresponding to each subject.
[0047]
In any optional example of the access method, by interacting with any industry code server, access to the page of the subject corresponding to the industry code server, and/or obtain information corresponding to the subject;
[0048]
Or, according to the acquired information corresponding to any subject, interact with the industry code server corresponding to the subject, and/or access the page corresponding to the subject;
[0049]
Or, by accessing a page corresponding to any subject, obtain information corresponding to the subject, and/or interact with the industry code server corresponding to the subject.
[0050]
In any optional example of the access method, there are one or more items related to each industry code server; the item has a corresponding object, and the object represents the sharing of the benefits from the event 's rights.
[0051]
In any optional example of the access method, each industry code server has one or more items related to each item, and each item is associated with one or at least one partner; the partner has an identifier for identifying it.
[0052]
In any optional example of the access method, each matter is associated with one partner, and the information of the subject corresponding to the matter is managed by the partner; or, each matter is associated with multiple partners, which are The information of the subject corresponding to the matter is managed by one of the partners.
[0053]
In any optional example of the access method, the page of each main body corresponds to one or more respective encoded media;
[0054]
By identifying the encoded medium, achieve any one or more of the following:
[0055]
access to the page of the subject corresponding to the identified encoded medium;
[0056]
Or, obtain the information of the corresponding subject and/or obtain the information of the corresponding subject and heterogeneous access information;
[0057]
Or, interact with the industry code server corresponding to the corresponding subject.
[0058]
In any optional example of the access method, the encoded medium is an object encoded medium;
[0059]
Through the successful identification of any object-encoded medium, the following information corresponding to the object-encoded medium is obtained:
[0060]
The digital person identification information of the partner corresponding to the industry code server;
[0061]
Matters corresponding to the industry code server;
[0062]
Information indicating that the partner and/or the partner's digital person identification information is associated with the entity.
[0063]
In any optional example of the access method, the object-encoded medium is propagated online and/or offline;
[0064]
Through the successful identification of the object-encoded medium, one or more of the following information is also obtained:
[0065]
Promotional content, which is related to the corresponding matter of the industry code server or is related to the designated subject of the said matter;
[0066]
Time information corresponding to the partner;
[0067]
Corresponding to the location information of the partner;
[0068]
digital person identification information corresponding to the communicator;
[0069]
Time information corresponding to the communicator;
[0070]
Corresponds to the location information of the communicator.
[0071]
In any optional example of the access method, the access information required to access the corresponding code chain network is obtained through the successful identification of the object encoding medium; the code chain network communicates with the industrial code server or the code chain network. related to its corresponding matters;
[0072]
When accessing the code chain network based on the access information, the industry code server can obtain at least the digital person identification information of the partner corresponding to the physical encoding medium, and can identify the information related to matters, physical properties, rights and interests distribution, partnership Manage data related to people.
[0073]
In any optional example of the access method, when accessing the code chain network based on the access information, the industry code server also acquires any one of the following information or any combination of multiple pieces of information:
[0074]
Time information corresponding to the partner;
[0075]
Corresponding to the location information of the partner;
[0076]
Time information corresponding to the accessor;
[0077]
Corresponding to the location information of the accessor;
[0078]
Corresponds to the digital person identification information of the access person.
[0079]
In any optional example of the access method, the judgment of whether the specified condition is fulfilled is implemented by one or more of the following servers:
[0080]
the first industry code server corresponding to the first subject;
[0081]
Or, the industry code server corresponding to at least one other subject;
[0082]
Or, a unified management server connected to the industry code server corresponding to each subject;
[0083]
or, other third-party servers;
[0084]
The formulation of the specified conditions is realized by one or more of the following servers:
[0085]
the first industry code server corresponding to the first subject;
[0086]
Or, the industry code server corresponding to at least one other subject;
[0087]
Or, a unified management server connected to the industry code server corresponding to each subject;
[0088]
Or, other third-party servers.
[0089]
In any optional example of the access method, whether the specified condition is met, including:
[0090]
Whether any one or each of the accessor, partner, and communicator performs the specified operation;
[0091]
And/or, whether any one or each of the accessor, partner, and disseminator, whether one or more of the corresponding time information, location information, and digital person identification information conforms to the regulations.
[0092]
In any optional example of the access method, when judging that the specified condition related to the accessee is fulfilled, one or more of the following are implemented:
[0093]
allowing the accessor to obtain the information corresponding to the first subject;
[0094]
Or, allow the accessor to obtain heterogeneous access information;
[0095]
Or, the access person is allowed to obtain information corresponding to at least one other subject through a heterogeneous access approach.
[0096]
In any optional example of the access method, the industry code server distributes the income of one or more items corresponding thereto to the partners;
[0097]
The industry code server will count all or part of the income from the corresponding matter as the income that can be distributed to partners;
[0098]
The industry code server distributes the income to the partners when the specified conditions are judged to be fulfilled;
[0099]
The industry code server adjusts the income distributed to the partners when it judges that the specified conditions are met;
[0100]
The industry code server distributes the income equally among the partners or sets weights to distribute them proportionally.
[0101]
In any optional example of the access method, the industry code server corresponds to multiple types of partners, and the income is evenly distributed among each type of partners or the weight is set to distribute proportionally; The partners of the same class are equally distributed or set the weight to be distributed proportionally.
[0102]
In any optional example of the access method, all or part of the income of one of the corresponding items of the industry code server is not distributed to the designated partner, but is invested in another or more of the industry code server. Corresponding matters, in order to obtain the proceeds from the another or more corresponding matters and then distribute them to the designated partners.
[0103]
In any optional example of the access method, the communicator belongs to a partner, or the communicator does not belong to a partner;
[0104]
Several levels of disseminators form a dissemination chain; the industry code server manages the dissemination chain corresponding to its related matters.
[0105]
In any optional example of the access method, the industry code server determines the issued quantity of the item for the item according to the area.
[0106]
In any optional example of the access method, multiple industry code servers correspond to one core server of the unified code issuance management center;
[0107]
The distribution of the physical encoding medium of each industry code server is controlled and managed by the core server.
[0108]
In any optional example of the access method, the physical encoding medium of each industry code server is used as a sub-version;
[0109]
The core server also distributes a global object encoding medium, which corresponds to the respective objects of each industry code server, and is used to share the revenue from the corresponding matters of each industry code server.
[0110]
In any optional example of the access method, the transaction transfer of the physical code medium corresponding to the industrial code server is managed uniformly by a server of a code chain digital asset exchange in the unified code issuance management center; the physical code medium is managed uniformly; Corresponding to the special mentioning right, it is the measurement unit of the smart contract based on the real right.
[0111]
In any optional example of the access method, the items corresponding to the industry code server include a promotion page, and the opening of a mall corresponding to the promotion page; by purchasing goods, or joining as an agent, or having a designated identity, the industry code becomes the industry code. The corresponding partner of the server.
[0112]
In any optional example of the access method, a terminal device that can successfully identify the object-encoded medium, or a terminal that can interact with the industry code server or its authorized back-end server based on the information obtained by successfully identifying the object-encoded medium The device can obtain the data information corresponding to the object encoding medium and matching the user authority of the terminal device.
[0113]
In any optional example of the access method, the terminal device is any one of the following or any combination thereof: a smart phone, a tablet computer, a personal computer, a wearable device, and a smart home appliance; the wearable device includes smart Glasses.
[0114]
In any optional example of the access method, the object encoding medium is generated according to a predetermined encoding rule, and is an optical lattice image that is visible or invisible to the human eye, and has a one-dimensional code, a two-dimensional code, or a multi-dimensional code. The form is static, or changes in light and dark light or frequency;
[0115]
Or, the object encoding medium is a three-dimensional code with a three-dimensional structure formed on the surface according to a predetermined encoding rule; or, the object encoding medium is a digital light wave generated by a specific rule or a specific frequency variation according to a predetermined encoding rule (optical force with the principle of optical tweezers) or sound waves or radio waves or a combination of the above.
[0116]
The present invention provides digital human glasses, which are suitable for the access method described in the present invention and any optional example and application method thereof.
[0117]
The digital human glasses of the present invention photograph and identify objects, access the first background that manages the information of the objects, and provide the first background with the position and time that can be calibrated corresponding to the digital human glasses or the current corresponding users of the objects. , the first basic information of any one or more items of identification information, which is used when the first backend requests the second backend to issue a metacode; the metacode corresponds to the information of the object managed by the first backend , or the information corresponding to the object managed by the first background and the first basic information; (with the optical force sensing capability of the optical tweezers principle);
[0118]
The digital human glasses photograph and recognize the meta code, connect to the first background, and provide the first background with any one or more of the position, time, and identification information corresponding to the digital human glasses or the current corresponding user. The second basic information is used when the first background requests the second background to issue a new code; the new code corresponds to the information of the object managed by the first background and the second basic information;
[0119]
Wherein, the meta code or the new code corresponds to the encoding medium in any one of the access methods; the second background corresponds to an industry code server, or corresponds to a core linking with multiple industry code servers Management server.
[0120]
In an optional example, the first background transmits the first basic information provided when the digital human glasses are connected to the second background and requests to issue a meta code;
[0121]
The digital human glasses photograph the identification meta code and access the first background, and when the first background determines that the first basic information complies with the predefined rules, it requests the second background to issue a new code;
[0122]
The second background generates a meta code or a new code correspondingly according to a request for issuing a meta code or a new code sent by the first background, saves it, and transmits it to the first background for saving.
[0123]
In an optional example, when the digital human glasses photograph and identify the object for the first time, it is connected to the first background and provides the first basic information, which is used when the first background requests the second background to issue the meta code;
[0124]
When the digital human glasses photograph or recognize the object again, it connects to the first background, obtains information corresponding to the meta code, and/or provides the second basic information to be used when the first background requests the second background to issue a new code.
[0125]
In an optional example, the second background supports search and query analysis of one or more of the following information: information obtained by photographing and identifying objects, information managed by the first background, first basic information, second basic information, metadata The information corresponding to the code and the information corresponding to the new code.
[0126]
In an optional example, the objects include human faces, objects, and landmarks.
[0127]
In an optional example, the core server of the unified code issuance management center corresponds to a plurality of industry code servers; the distribution of the physical encoding medium of each industry code server is controlled and managed by the core server;
[0128]
The digital human glasses correspond to any terminal device in the access method.
[0129]
The present invention provides an application method of the above access method and any optional example thereof.
[0130]
In the example application method, the accessor obtains information corresponding to the commodity of the first merchant through the mobile terminal, and obtains the heterogeneous access information; the heterogeneous access information corresponds to the heterogeneous access path; access to obtain information corresponding to products of at least one other merchant;
[0131]
The first merchant corresponds to the first industry code server; the at least one other merchant corresponds to at least one other industry code server, and the first industry code server and the at least one other industry code server are connected to a unified management server .
[0132]
In the application method of the example, the access person obtains the access path for acquiring the information of the commodity corresponding to the first merchant through a dissemination chain including several levels of disseminators;
[0133]
The communicator provides a promotion code corresponding to the access path, and the promotion code is a kind of physical encoding medium; the accessor identifies the physical encoding medium through a mobile terminal.
[0134]
In the example application method, each industry code server corresponds to one or more merchants; each merchant corresponds to one item; each item is associated with one or at least one partner;
[0135]
When the specified conditions are met, the industry code server will distribute income to the partners of Wuji, and/or distribute income to the communicators included in the communication chain corresponding to Wuji;
[0136]
Whether the specified conditions are met, including:
[0137]
Whether any or each of the accessor, partner, and communicator performs the specified operation:
[0138]
And/or, whether any one or each of the accessor, partner, and disseminator, whether one or more of the corresponding time information, location information, and digital person identification information conforms to the regulations.
[0139]
The present invention provides a coded medium, preferably an object code coded medium, which is suitable for implementing the access method of the present invention and any optional example and application method thereof.
[0140]
The present invention provides an industry code server, which is suitable for implementing the access method and any optional example and application method of the present invention.
[0141]
The present invention provides a server that interfaces with multiple industry code servers, and cooperates with the industry code servers to implement the access method and any optional example and application method of the present invention.
[0142]
The present invention also provides a system, which includes a plurality of industry code servers and a server docked with the plurality of industry code servers. The system can be used to implement the access method of the present invention and any optional examples and application methods thereof.
[0143]
The present invention also provides another system, which includes a plurality of industry code servers and a server connected with the plurality of industry code servers. The system can be used to implement the access method of the present invention and any optional examples and application methods thereof.
[0144]
The present invention provides a mobile terminal, which is suitable for implementing the access method and any optional example and application method of the present invention. A mobile terminal provided by the present invention can be used to cooperate with any of the above systems to implement the access method and any optional example and application method of the present invention.
[0145]
The present invention also provides digital human glasses to replace the above-mentioned mobile terminal, which can be used to cooperate with any of the above-mentioned systems to implement the access method and any optional example and application method of the present invention. The digital human glasses, mobile terminal, etc. of the present invention can be used by accessors, communicators, partners, operators of various servers, and the like.
[0146]
The present invention also realizes a game through the application of the object, the application of the access method and any optional example and application method of the present invention. The server, mobile terminal, digital human glasses, system, etc. provided by the present invention can be applied to the realization, management, operation and the like of games.
[0147]
The industrial code server of the present invention, the server connected to it, the mobile terminal, the digital human glasses, etc., have suitable software programs and/or hardware devices to realize their respective functions individually or cooperatively, so as to realize the access described in the present invention. method and any of its optional instances and application methods.
[0148]
Like the digital person, the objects described in the present invention are based on the industry code server of a specific theme. The "digital person" can be a partner, an accessor, a disseminator, a consumer, and the owner of a digital asset account at the same time. , one or more of the users.
[0149]
In the example of the present invention, through the construction of the physical code partner system of the code chain server, the seamless connection between products and consumers can be realized, the efficiency can be improved, and the cost can be saved. In the early stage of the construction of the partner system, the "consumer code chain mall purchase consumption" is not only a consumption purchase, but also a decoding chain, but also "becoming a partner", participating in the contribution of the circulation and communication system to share the income of the code chain server platform; partnership; The recruitment of people can be formed by purchasing commodities, joining agents, or issuing to a specific group. The shopping revenue in the traditional way usually ends with each settlement; the mode of the present invention is always in the server, or in the whole system.
[0150]
The formation process of "materiality" can be divided into categories according to regions, attributes, etc., and systematic management, such as consumption and behavior management in a specific region, forms the behavior of a 5W digital human, that is, with location and time identification as the main digital feature , generate new codes, codes and codes form a chain to manage the value chain. Since the digital human is an abstract definition of a four-dimensional space based on subject, social status (state) and social attitude (including whether to open it, to whom it is open, under what scenario, etc.) , it is not necessary to use the private information of the user's three-dimensional world such as name, gender, mobile phone number, ID card, bank card number, etc., but use the digital human ID, that is, the subject-based can uniquely identify the user in the subject server (industry code server). ) identity, and can communicate with them, complete behavior records, and allocate digital asset accounts and use digital assets according to digital human ID; digital human ID can be regarded as the behavior of human beings in the three-dimensional world in the four-dimensional world. The same person can have multiple digital person IDs, because it is based on multiple topics, and there can be no communication with each other; only with the consent of the person and the premise of privacy protection, the mapping from the digital person ID1 to the corresponding back The three-dimensional world is then mapped to another digital person ID2), for example, the mobile phone number of the three-dimensional world, the IMEI number of the mobile phone, the ID of the digital person's glasses, etc., become the intermediate account ID for jointly identifying the digital person.
[0151]
Completing the value system of circulation and communication, so compared with direct selling and pyramid selling, digital human-based management does not require registration, no payment, and no fixed-level (level based on each behavior) record, so as to achieve each order. More work and more work should be distributed according to work (that is, to obtain shared income, there is no need to join the threshold, breaking the fixed pyramid, and implementing a single settlement); and based on the 5W material grid code, partners can be encouraged to increase the distribution of points in the area where they live , widely disseminated to obtain benefits, it is a new "means of production" (become a "partner" through distribution and meet certain requirements to make ordinary consumers become partners), access through code scanning, as well as heterogeneous links, roaming, etc. A new "relationship of production" can be established. That is, in this system, as long as you use the code link to join and become an access person, your identity is not only an ordinary consumer, but also a communicator, and you can "meet certain requirements" such as consumption reaching a certain amount, communication reaching a certain number of times, etc. , become the "partner" of the industry code server, and establish a new interest distribution relationship.
[0152]
Since the consumer behavior in the mall, including the access point, access method, and source, is recorded in the whole process, the income formed by the consumer's purchase can be accumulated to the consumer's name under the premise of adding value to the platform. Thus accumulated to a certain extent, the consumer's consumption on the platform can continue to be obtained for free. The difference from the usual points is that the points do not enjoy the benefits of the value created by the platform itself, but in the mode of the present invention, since the consumption amount of consumers runs through the value chain system, the contribution value can be quantified, so it can be higher. "Consumption" creates value. Therefore, since the joint participation creates value, the partners of the present invention (including consumers who meet certain conditions become partners) can enjoy the benefits of the entire platform. In traditional companies, agents may not be able to enjoy the benefits of the entire platform; Internet companies such as Facebook, although all netizens not only browse, disseminate, and participate in creating most of the company's value, but also share their own privacy, but in addition to gaining Internet access The value of the entire platform (such as the stock market value of hundreds of billions of dollars) cannot be shared outside of the use of functions.
[0153]
The partners of the "industry code server" can not only obtain the "entrance to the mall" according to the issued physical code, but also share the consumption revenue share of all partners, that is, the entire mall; the corresponding "mall" of the industry code server is the same as the current Internet The difference between malls (such as Tmall Mall) is that the Internet has a centralized entrance, so "the circulation and communication links cannot be recorded, and the effect of distribution according to work cannot be exerted" (although there are Taobao customers, but only one level) ; And the present invention "the entrance of the mall", on the promotion page (can be expressed as a normal web page, but corresponding to the unique promotion page two-dimensional code, the two-dimensional code can be displayed or hidden in the background; when the consumer scans the code/clicks When accessing the promotion page, the industry code system automatically superimposes the digital human DNA, such as the unique identifier of WeChat based on the theme (specific WeChat service number), and generates a new QR code) corresponding to each QR code (this QR code is the same as the The item is associated with the item; the promotion page can be bound to a unified mall, single merchant or multiple merchants, so that the one-time consumption or repeated consumption of consumers who enter through the QR code of the promotion page is associated with the item code, so it can be distribution of income).
[0154]
Under the traditional model, corresponding to the process of commodities, malls, traffic, and consumers, the revenue of malls has nothing to do with consumers, nor with traffic. In the mode of the present invention, it corresponds to the process of commodities, industry code servers (digital human platforms, shopping malls), partner groups of physical code (replacement of traffic), and consumers, and the contribution value of consumers' participation to the entire mall It can be quantified, so it can be counted repeatedly, so that the profit of the mall can not only associate with partners and consumers, but also associate with suppliers and provide an "industrial code server".
[0155]
In addition, the system of the present invention can cycle consumption; compared with the consumption capital theory, which has only a single consumption link (consumption value chain); the value chain of the partner as the circulation communication system, and the value chain of the entire mall service system, can be Quantitative manifestation. Therefore, the present invention forms a digitized "upgraded consumption capital theory" which can include various links through the linking of the code chain.
[0156]
The mode of the present invention enables the platform to complete the accumulation of development funds at a low cost in the initial stage according to the theme (the income of partner shopping is open and transparent, which are all used for business development such as platform research and development, team building, etc., and in the name of the theme, the formation of An industry fund with a specific theme invests in products of this theme, so that the mall can obtain products with higher cost-effectiveness and enter a virtuous circle. Further, the fund can also go to the stock market to acquire industrial listed companies with the same theme to obtain a premium in the capital market; The premium income can also correspond to the income of the partners; thus, it can open a benign model of universal shareholding and capital serving the industry; and avoid the misunderstanding of current listed companies investing the funds raised without any direction, and entering into the misunderstanding of investment and wealth management.
[0157]
The mode of scanning code access based on digital human glasses is code link access. The code chain is an upgraded version of the blockchain. The underlying logic of the code chain is based on the digital human. A chain formed by linking codes, codes and codes can realize the digital management of the behavior-based value system of human society; while the bottom layer of the blockchain is IP, which is a machine and cannot record human behavior, so it is difficult for the real economy. Human social services. Compared with the decentralization of the blockchain, there is a management center in the code chain system (with the function of core server management), which is called "unified code issuance management center" (referred to as code issuance center, code issuance management center; one by one The code chain forms the whole system of circulation and dissemination of a certain product, one by one, the partners of the physical code, build a circulation and communication agency system of "a certain industry code" server; one code chain server (industrial code server for each business) constitutes, The entire economic ecosystem; each server conducts digital asset transactions (tokenized assets) on the code chain through interconnection, using the code of the code chain server as the manifestation of digital assets, and using the "special mentioning right" SGR as the digital asset based on The unit of measurement for the equivalent exchange of things is circulated and exchanged in each code chain server system.
[0158]
Then, a bank that can exchange SGR and fiat currency can be established, which is called a code chain digital bank; the insurance compensation that cannot be converted into the physical object by SGR is a digital insurance compensation (such type of insurance company is called a code chain digital insurance company).
[0159]
All of the above codes can be generated by the code issuing center and have certain management functions (including, for example, the total amount issued by the industry code server, security approval, circulation approval, entry or closure, whether the industry code server is connected to the exchange, and the industry code server. Whether it can be connected to a digital bank, digital insurance, can it be exchanged with SGR, etc.); therefore, the code issuing center can not only have the management function of the Internet root server (in the level of code replacing IP management), but also the central bank's function of issuing and managing currency in circulation (central bank digital currency such as DCEP), and moreover, it also has the function of managing human behavior;
[0160]
At present, the commonly used scanning code access protocol is still the Internet protocol; while the code link access protocol is used in the present invention, that is, based on 5W access, a new digital human network system free from IP can be constructed. Preferably, the device supporting the code linking protocol uses digital human glasses. And the present invention from the whole system of access terminal (smart phone, digital human glasses, etc.), access protocol (code link entry), code link server (replacement website), code issuing management center (replacement of Internet management center), into the Internet The upgrade is backward compatible and seamlessly linked, and the network security construction is completely improved.

claims
[Claim 1]
An access method, characterized in that information corresponding to a first subject is obtained, and heterogeneous access information is obtained; the heterogeneous access information corresponds to a heterogeneous access approach; and a heterogeneous access approach is obtained through a heterogeneous access approach. Information on at least one other subject.
[Claim 2]
The access method according to claim 1, wherein the information corresponding to the first subject is the first information corresponding to the relevant matters of the first industry code server; the information corresponding to at least one other subject is corresponding to at least one Information about matters related to one of the other industry code servers.
[Claim 3]
The access method according to claim 1, characterized in that: accessing a first page corresponding to the first subject, obtaining the first information and heterogeneous access information; and using a heterogeneous access path corresponding to the heterogeneous access information , access the second page corresponding to the second subject, and obtain the second information corresponding to the relevant matters of the second industry code server; the first industry code server corresponding to the first subject corresponds to the second subject The secondary industry code server is a different industry code server.
[Claim 4]
The access method according to claim 3, wherein the second information and the heterogeneous access information are obtained on the second page of the access, and the access to the heterogeneous access information corresponding to the heterogeneous access information is accessed through the heterogeneous access path corresponding to the heterogeneous access information. On the third page of the third main body, the third information corresponding to the relevant matters of the third industry code server is obtained, or the third information and the heterogeneous access information are obtained.
[Claim 5]
The access method according to claim 4, wherein the third subject is a subject other than the second subject; the third industry code server corresponding to the third subject is a different industry from the second industry code server or, the third subject is a subject other than the first subject and the second subject; the third industry code server corresponding to the third subject is the same as the first industry code server and the second industry code server Different industry code servers.
[Claim 6]
The access method according to any one of claims 1 to 5, characterized in that, from a page corresponding to any subject, through a heterogeneous access path corresponding to heterogeneous access information, access to a page corresponding to a subject other than the current subject At least one other subject's page other than the current subject, or access to a unified page; the unified page includes access paths corresponding to multiple other subjects except the current subject, so as to obtain information corresponding to the multiple other subjects respectively.
[Claim 7]
The access method according to claim 6, wherein the unified page is managed by a unified management server of a core system; and the unified management server of the core system is in communication connection with the industry code server corresponding to each subject.
[Claim 8]
The access method according to any one of claims 1 to 6, characterized in that, by interacting with any industry code server, access to a page of a subject corresponding to the industry code server, and/or obtain a page corresponding to the industry code server information of the subject; or, according to the acquired information corresponding to any subject, interact with the industry code server corresponding to the subject, and/or access the page corresponding to the subject; The page of any subject, obtains the information corresponding to the subject, and/or interacts with the industry code server corresponding to the subject.
[claim 9]
The access method according to any one of claims 1 to 8, wherein, each industry code server has one or more items related to the item; the item has a corresponding object, and the object represents The right to share in the proceeds from the matter described.
[claim 10]
The access method according to claim 9, wherein, each industry code server has one or more items related to each item, and each item is associated with one or at least one partner; the partner is used to identify it 's identification.
[claim 11]
The access method according to claim 10, characterized in that, each matter is associated with one partner, and the information of the subject corresponding to the matter is managed by the partner; or, each matter is associated with a plurality of partners Person, information on the subject corresponding to the matter, managed by one of the partners.
[claim 12]
The access method according to any one of claims 1 to 11, wherein, the page of each main body corresponds to one or more coded media; and by identifying the coded media, any one or more of the following can be realized Item: access to the page of the subject corresponding to the identified encoding medium; or, obtain the information of the corresponding subject and/or obtain the information of the corresponding subject and heterogeneous access information; or, with the corresponding subject Corresponding industry code server interaction.
[claim 13]
The access method according to claim 12, wherein the coded medium is an object coded medium; and the following information corresponding to the object coded medium is obtained by successfully identifying any object coded medium: Digital person identification information of the partner corresponding to the industry code server; Matters corresponding to the industry code server; Information indicating that the partner and/or the digital person identification information of the partner is associated with the object.
[claim 14]
13. The access method according to claim 13, characterized in that: the object-encoded medium is propagated online and/or offline; and one or more of the following information is also acquired through the successful identification of the object-encoded medium : promotion content, which is related to the corresponding item of the industry code server or related to the designated subject of the said item; corresponding to the time information of the partner; corresponding to the location information of the partner; corresponding to the digital person identification information of the communicator; corresponding Time information for the communicator; location information for the communicator.
[claim 15]
The access method according to claim 13 or 14, characterized in that, through the successful identification of the object encoded medium, the access information required to access the corresponding code chain network is obtained; the code chain network is connected to the The industry code server or its corresponding matters; when accessing the code chain network based on the access information, the industry code server can obtain at least the digital person identification information of the partner corresponding to the object encoding medium , to manage the data information related to matters, properties, rights and interests distribution, and partners.
[claim 16]
The access method according to claim 15, wherein when accessing a code chain network based on the access information, the industry code server further acquires any one of the following information or any combination of multiple pieces of information: time information corresponding to the partner; location information corresponding to the partner; time information corresponding to the accessor; location information corresponding to the accessor; digital person identification information corresponding to the accessor.
[claim 17]
16. The access method according to any one of claims 1 to 16, wherein the judgment of whether the specified condition is fulfilled is realized by cooperation of one or more of the following servers: the first industry corresponding to the first subject or, an industry code server corresponding to at least one other subject; or, a unified management server that is connected to the industry code server corresponding to each subject; or, other third-party servers; One or more of: the first industry code server corresponding to the first subject; or, the industry code server corresponding to at least one other subject; management servers; or, other third-party servers.
[claim 18]
The access method according to claim 17, characterized in that, whether the specified condition is reached, including: whether any one or each of the accessor, partner, and communicator performs a specified operation; and/or, access Whether or not one or more of the corresponding time information, location information, and digital person identification information conform to the regulations for any or each of the publishers, partners, and disseminators.
[claim 19]
The access method according to claim 18, wherein when judging that the specified condition related to the accessee is fulfilled, one or more of the following are implemented: allowing the accessor to obtain the information corresponding to the first subject; or , allowing the accessor to obtain heterogeneous access information; or, allowing the accessor to obtain information corresponding to at least one other subject through a heterogeneous access approach.
[claim 20]
The access method according to any one of claims 13 to 19, characterized in that it includes any combination of any one or more of the following: the industry code server will use the income of one or more items corresponding to it Distribute to partners; The industry code server counts all or part of the income from the corresponding event as income that can be distributed to partners; The industry code server determines that the specified conditions are fulfilled to distribute income to partners; The industry The code server adjusts the income distributed to the partners when the specified conditions are met; the industry code server equally distributes the income among the partners or sets the weights to distribute them proportionally.
[claim 21]
The access method according to claim 20, characterized in that, the industry code server corresponds to multiple types of partners, and the income is evenly distributed among each type of partners or the weight is set to distribute proportionally; the industry code server Divide the income equally among the partners of the same class or set the weights to distribute them proportionally.
[claim 22]
The access method according to claim 20, wherein all or part of the income of one of the corresponding items of the industry code server is not distributed to a designated partner, but is invested in another of the industry code server. or more counterparts, to obtain the proceeds from the other or more counterparts before distributing them to designated partners.
[claim 23]
The access method according to any one of claims 14 to 22, wherein, the communicator belongs to a partner, or the communicator does not belong to a partner; several levels of communicators form a communication chain; the industry code The server manages the propagation chain corresponding to its related matters.
[claim 24]
The access method according to any one of claims 9 to 22, wherein the industry code server determines the number of items to be issued for the item for each area.
[claim 25]
The access method according to claim 24, wherein, a plurality of industry code servers correspond to a core server of a unified code issuing management center; the distribution of the physical encoding medium of each industry code server is performed by the core server control and management.
[claim 26]
The access method according to claim 25, wherein the physical encoding medium of each industry code server is used as a sub-version; the core server further distributes a global physical encoding medium, which is the same as that of each industry code server. The objects correspond to each other, which is used to share the income from the corresponding events of each industry code server.
[claim 27]
The access method according to claim 26, characterized in that, the transaction transfer of the corresponding physical code medium by the industrial code server is managed uniformly by a server of a code chain digital asset exchange in the unified code issuing management center; The lattice-encoded medium corresponds to the special mentioning right and is the unit of measure for the smart contract based on the real right.
[claim 28]
The access method according to any one of claims 9 to 27, wherein the items corresponding to the industry code server include a promotion page, and the opening of a mall corresponding to the promotion page; purchasing goods, or joining an agency, or Possess a designated identity and become a partner corresponding to the industry code server.
[claim 29]
The access method according to any one of claims 12 to 15, characterized in that, the terminal device that can successfully identify the object coded medium, or can communicate with the industry code server or the industry code server based on the information obtained by successfully identifying the object coded medium. The terminal device that interacts with the authorized backend server can obtain data information corresponding to the object encoding medium and matching the user authority of the terminal device.
[claim 30]
The access method according to claim 29, wherein the terminal device is any one of the following or any combination thereof: a smart phone, a tablet computer, a personal computer, a wearable device, and a smart home appliance; the wearable Device contains smart glasses.
[claim 31]
The access method according to any one of claims 12 to 15 or 29 to 30, wherein the object encoding medium is an optical lattice image that is visible or invisible to the human eye, and is generated according to a predetermined encoding rule, It has the form of one-dimensional code, two-dimensional code, or multi-dimensional code, which is static, or changes light and dark light or frequency; or, the object encoding medium is a digital light wave or sound wave or radio wave or a combination of the above-mentioned waves, which is generated according to a predetermined encoding rule with a specific rule or a specific frequency variation.
[claim 32]
A digital human glasses, characterized in that, the digital human glasses photograph and identify objects, access a first background that manages the information of the objects, and provide the first background with a device that can be calibrated corresponding to the digital human glasses or its The first basic information of any one or more of the user's current corresponding location, time, and identification information is used when the first background requests the second background to issue a meta code; the meta code corresponds to the first background information. The information of the object managed, or the information corresponding to the object managed by the first background and the first basic information; the digital human glasses photograph and recognize the meta code, access the first background and send the first background to the first background. Provide the second basic information that can be calibrated to any one or more of the position, time, and identification information corresponding to the digital human glasses or the user's current corresponding position, time, and identification information, which is used when the first background requests the second background to issue a new code ; The new code corresponds to the information of the object managed by the first background and the second basic information; wherein, the meta code or the new code corresponds to the connection described in any one of claims 12 to 29 The encoding medium in the input method; the second background corresponds to an industry code server, or corresponds to a core management server linked with a plurality of industry code servers.
[claim 33]
The digital human glasses according to claim 29, wherein the first background transmits the first basic information provided when the digital human glasses are connected to the second background and requests to issue a meta code; the digital human glasses The identification meta code is photographed and connected to the first backend, and when the first backend determines that the first basic information conforms to the predefined rules, it requests the second backend to issue a new code; the second backend issues the metacode according to the release metacode sent by the first backend Or a new code request, correspondingly generate a meta code or a new code and save it, and transmit it to the first background for saving.
[claim 34]
The digital human glasses according to claim 29, characterized in that, when the digital human glasses photograph and identify the object for the first time, the digital human glasses access the first background, provide the first basic information, and request the second background in the first background It is used when the meta code is issued; when the digital human glasses take pictures or identify the object again, access the first background, obtain information corresponding to the meta code, and/or provide the second basic information to request the second background in the first background Used when a new code is released.
[claim 35]
The digital human glasses according to claim 29, wherein the second background supports searching and querying analysis of one or more of the following information: information obtained by photographing and identifying objects, information managed by the first background, first Basic information, second basic information, information corresponding to the meta code, and information corresponding to the new code.
[claim 36]
The digital human glasses according to claim 29, wherein the objects include human faces, objects, landmarks, and house numbers including store signs.
[claim 37]
The digital human glasses according to claim 29, wherein the core server of the unified code issuing management center corresponds to a plurality of industry code servers; Core server control and management; the digital human glasses correspond to the terminal equipment in the access method of claim 28 or 29.
[claim 38]
A method for applying the access method according to any one of claims 1 to 31, characterized in that, the accessor obtains information corresponding to commodities of the first merchant through a mobile terminal, and obtains heterogeneous access information; The heterogeneous access information corresponds to a heterogeneous access approach; an accessor obtains information corresponding to commodities of at least one other merchant through a heterogeneous access approach; the first merchant corresponds to a first industry code server; the at least one Other merchants correspond to at least one other industry code server, and the first industry code server and the at least one other industry code server are connected to a unified management server.
[claim 39]
The method according to claim 38, characterized in that, the accessor obtains an access path for acquiring information corresponding to the commodities of the first merchant through a dissemination chain including several levels of disseminators; The promotion code corresponding to the access path, the promotion code is a kind of object encoding medium; the accessee identifies the object encoding medium through the mobile terminal.
[claim 40]
The method according to claim 39, wherein, each industry code server corresponds to one or more merchants; each merchant corresponds to a property; each property is associated with one or at least one partner; , the industry code server distributes income to the partners of Wuge, and/or distributes income to the communicators included in the communication chain corresponding to Wuge; whether the specified conditions are met, including: One or each, whether to perform a prescribed operation; and/or, any one or each of the accessor, partner, and disseminator, and one of the corresponding time information, location information, and digital person identification information. or whether the information is in compliance with the regulations.

Documents

Application Documents

# Name Date
1 202217015278.pdf 2022-03-19
2 202217015278-TRANSLATIOIN OF PRIOIRTY DOCUMENTS ETC. [19-03-2022(online)].pdf 2022-03-19
3 202217015278-STATEMENT OF UNDERTAKING (FORM 3) [19-03-2022(online)].pdf 2022-03-19
4 202217015278-REQUEST FOR EXAMINATION (FORM-18) [19-03-2022(online)].pdf 2022-03-19
5 202217015278-NOTIFICATION OF INT. APPLN. NO. & FILING DATE (PCT-RO-105-PCT Pamphlet) [19-03-2022(online)].pdf 2022-03-19
6 202217015278-FORM 18 [19-03-2022(online)].pdf 2022-03-19
7 202217015278-FORM 1 [19-03-2022(online)].pdf 2022-03-19
8 202217015278-DRAWINGS [19-03-2022(online)].pdf 2022-03-19
9 202217015278-DECLARATION OF INVENTORSHIP (FORM 5) [19-03-2022(online)].pdf 2022-03-19
10 202217015278-COMPLETE SPECIFICATION [19-03-2022(online)].pdf 2022-03-19
11 202217015278-FORM-26 [30-05-2022(online)].pdf 2022-05-30
12 202217015278-FORM 3 [05-09-2022(online)].pdf 2022-09-05
13 202217015278-FER.pdf 2023-09-27
14 202217015278-Response to office action [20-11-2023(online)].pdf 2023-11-20
15 202217015278-GPA-211123.pdf 2023-12-09
16 202217015278-Correspondence-211123.pdf 2023-12-09
17 202217015278-certified copy of translation [26-12-2023(online)].pdf 2023-12-26
18 202217015278-Certified Copy of Priority Document [26-12-2023(online)].pdf 2023-12-26

Search Strategy

1 202217015278E_06-03-2023.pdf