Information processing network based on uniform code issuance, method therefor, and sensing access device

ABSTRACT

The present disclosure relates to an information processing network based on uniform code issuance, a method for the same, and a sensing access device, wherein a releaser sends a corresponding code issuing request to a core administrator, such that the core administrator or a code issuing agency authorized by the core administrator generates a coding medium; in this way, when an accessing party identifies the coding medium with an equipped sensing access device, it may obtain information that matches the identified coding medium and further obtain the following information provided by the releaser, including: information to be released by the releaser, attribute state of the releaser, attribute state of an interacting party associated with the releaser, and information obtained from identifying other coding medium with the sensing access device equipped to the releaser. The present disclosure enables access based on a site-specific motif through various kinds of sensing access manners so as to accurately track respective nodes in the information dissemination process and realize circulation-based value quantization and cashing.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a Continuation of U.S. patent application Ser. No.16/983,194, filed Aug. 3, 2020, which is a Continuation of U.S. patentapplication Ser. No. 15/767,062, filed Apr. 9, 2018, now U.S. Pat. No.10,838,945, which is a National Stage Entry of PCT/CN2015/091553, filedOct. 9, 2015, the entire contents of each of which are incorporated byreference herein.

FIELD

The present disclosure relates to an information processing apparatus, anetwork, and an information processing method therefor, and moreparticularly relates to an information processing network based onuniform code issuance, a method therefor, and a sensing access device.

BACKGROUND

The dissemination act of information has its own value: withadvertisement as an example, its essence is making informationdissemination resources valuable. A high-value advertisement is surelypublished through a resource that may advertise information to morepopulation under the same conditions. That is, the more audiences theadvertisement reaches, the higher its value is. In conventionaladvertising means, information is only “spread” out; while thespread-out totally loses control of the subsequent disseminationprocess.

For a commodity, each dissemination act during the process frominformation advertising through reaching a final deal contributes to thefinal deal. With loss of any part of information delivery, theinformation will not reach a person having intention to deal, and thedeal will not be reached. Therefore, the information dissemination acthas a value, while a person implements the dissemination act is entitledto obtain the value as a reward for its act. However, this value isalways undervalued, because currently, an efficient and universallyapplicable technical means is unavailable to track effectivedissemination acts implemented by respective disseminators during thewhole process, such that the values of the respective disseminatorsduring the dissemination process can hardly be cashed.

In a direct-selling hierarchy, the upstream-downstream relationship ateach layer is clear, which is convenient for paying commissions layer bylayer after the deal is made. However, the direct-selling hierarchyfails to fully embody the dissemination value; it has a drawback thatyou have to join in the dissemination network to become a member of thedirect-selling hierarchy; it has become an occupant for a subject of thedissemination to create orders and directly get the commissions. Due tothis utilitarian nature and a person's limitation that he/she cannotsell all stuffs, the kinds and scope of information (e.g., commodityinformation) are objectively narrowed. Further, the dissemination actsand commission payments under this direct-selling hierarchy cannot beverified and implemented through technical means.

The whole process of information dissemination, from an advertiser as anorigin till the information is finally received and a certain act istaken, must be a path passing through different inter-personrelationship circles, and each intermediate node is located at acrisscross between two or more inter-person circles. An inter-personnetwork formed by people in the society is a complex of multi-layeredinter-person relationship circles formed by social relationships havingdifferent close degrees such as blood relationship, diploma, work,interest and hobbies, a core of which is individual-centered (in otherwords, individuals are located at different social groups). Besidespoint-to-point manners such as personal meeting, phone call, and SMS,information interaction and circulation occurring in socialcommunications of people currently relay more on Internet-based socialnetworking platforms.

Although enough information may be found through search engines on theInternet, what have been accessed are not necessarily the informationyou need. Furthermore, for a common consumer who does not care about theInternet or latest trends of e-Commerce anywhere or anytime, he/shewould have no enough keyword reservations for implementing furthersearch. Therefore, to access information in this way has a relativelylarge limitation.

Information dissemination over social networks has the followingcharacteristics: an information poster and disseminator has a certainprediction on whether a recipient will receive the information orfurther disseminate the information based on his/her understanding ofthe information recipients in a corresponding social group, whichcorresponds to the disseminator's active screening behavior to a certaindegree, such that information dissemination in the inter-person circlehas a stronger directivity. On the other hand, in a stable inter-personcircle, each person will be cautious about his/her words and behaviors,such that a consequence of compromising the current inter-personrelationships will not occur. This actually means social behaviorsincluding information dissemination are all guaranteed with personalquality appraisals and social credits. Therefore, informationdissemination through social networks, particularly circles withfamiliar people, a disseminator will consciously or unconsciously verifythe information so as to ensure the trueness of the information as muchas possible. Excluding serial frauds, the trueness and credibility ofthis dissemination are very high. However, similar screening operationsare now determined and implemented by individuals. An effectivetechnical means is unavailable to perform rights control to thesituations of information senders and recipients; moreover, even therights are set, it is still hard to match and verify the actualsituations of the information senders and recipients with the setrights, such that the current information dissemination lacks pertinencewith a poor effect.

Additionally, the information interaction for current social networks isInternet-based. However, the Internet has inherent defects: Internetusers are not of a real name nature, who are represented by IPaddresses, and such an “identity identification” may change at any time,such that a person may appear on the Internet with different roles. Evenan operation is performed by a non-human (some animals, intelligentrobots, etc.) on the Internet through a corresponding terminal, itcannot be discerned. The non-real name characteristic of the Internet isthe largest barrier for business operation. Therefore, various businessapplications unanimously add ID number, home address, mobile number,phone number, real name and the like to urge subscribers to fill moredetailed information. However, this will not only affect user conversionrate, but also will incur chain reactions in the aspect of informationsecurity such as personal privacy leakage.

Moreover, the information credibility on the Internet basically cannotbe testified for individuals; therefore, the user will consciously orunconsciously hold a suspicious attitude on the Internet. In anInternet-based business mode, a merchant has spent massively on keepingcustomer stickiness, while commodity or service quality issues,regardless of their authenticity, will cause customer loss and repeatedinvestment on marketing. The so-called e-Commerce mode/Internet mentalmode will become a misconception of burning cash for traffic.

The virtual economy ushered by the Internet era substantively maps thereal economy to a virtual space, which handles and digs out variousconsumption demands by extending new means using computer terminals andInternet convenience. However, the various kinds of Internet businessmodes can hardly closely combine the network virtual world with the realworld. When you sit before a computer to pick up the mouse to startusing the Internet, dimensional shift occurs, i.e., you shift from thereal physical world to the virtual Internet. This virtual experiencepromptly ends when you put away the mouse to leave the computer, and youreturn to the real world. When you carry on activities in daily lifewith the Internet, such shift constantly exists. The various drawbacksabove restrict the development of Internet economy and can hardly extendthe Internet technologies to traditional industries.

Further, the social nature of people decides that their normal life isin the offline real economic circle, generally within a sensing rangenot exceeding a certain distance centered with an individual person. Ameans is urgently needed, which enables on-site experience offline(e.g., at a store) while may find corresponding resources (e.g.,commodity information) from the virtual world, thereby associating theactivities in the real world with the virtual world anytime andanywhere. However, effective technical means is currently unavailable toaddress this issue.

To access the virtual world in the Internet, a link (URL: UniformResource Location) may be entered in a browser. A simpler and moredirect way is available in the mobile Internet, i.e., two-dimensionalbarcode. The two-dimensional code is a particular geometric image, whichuses a black-and-white image distributed in a two-dimensional directionaccording to certain rules to record data symbol information.Two-dimensional codes for mobile phones are applications oftwo-dimensional code technologies on mobile terminals, which enableusers to quickly access the Internet in any networked real world.

Chinese patent application No. 200510033918.7, filed on Mar. 31, 2005,entitled “MOBILE TERMINAL SHOPPING METHOD AND SYSTEM THEREOF,” disclosesa method and a system for implementing mobile terminal shopping using atwo-dimensional code. A mobile terminal photographs a two-dimensionalcode through a built-in camera and decodes the two-dimensional code;then, the mobile terminal sends a payment request message to a paymentsubsystem which completes payment.

Chinese patent No. ZL200480005625.1, filed on Mar. 8, 2004, entitled“METHOD FOR PROVIDING MOBILE SERVICES BY USING CODE GRAPH,” discloses amethod and a system for providing mobile services using a code graph,specifically a method and a system for providing content providingservices, geographical information providing services, productinformation providing services, taxi call services, personal contactinformation providing services or payment services using two-dimensionalcodes. A mobile terminal photographs a two-dimensional code through abuilt-in camera and decodes the two-dimensional code; then, the mobileterminal sends a service providing request message to a service providerserver, the service provider server providing a service to the mobileterminal itself, or the service provider server communicating withanother server to provide a service to the mobile terminal.

However, the smart phone as a main means for on-site sensing in themobile Internet cannot overcome the inherent drawbacks existing in theInternet. A further problem currently encountered is that the processfor the mobile phone to sense the two-dimensional code is too complex:unlocking the mobile phone screen to open an APP's two-dimensionalscanning function, and at least 6˜7 times of click operations areneeded. Secondly, for a certain two-dimensional image perceived, atypical consumer cannot discern a correspondence relationship betweenthe two-dimensional code and a mobile phone application; therefore,scanning is always performed through some common code scanners; then,the obtained two-dimensional parsing results are all webpage links;after clicking, it is the mobile phone browser that is first opened,instead of the mobile APP that may execute corresponding functions. Allof such problems will greatly affect use experience. Further, wearabledevices such as Google glasses and smart watches are actually still atransformed smart phone, except being more portable; besides, they posea great threat to the privacy of other people.

Currently, it is hard to effectively associate or verify a user'sidentity with an operation executed by a device such as a smart mobilephone or a real environment where the user is located through the priorart, which is adverse to for example, track an act like dissemination asimplemented in information dissemination, and adverse to identify theuser's identity by other relatives and friends in his/her socialcircles; besides, effective measures are unavailable for an externalsupervising and regulating agency to regulate the informationinteraction between the user and other user or application server andthe operations executed.

SUMMARY

To address the above problems currently existing, the present disclosureprovides an information processing network based on uniform codeissuance, an information processing method therefor, and a sensingaccess device applicable thereto.

In the information processing method based on uniform code issuanceprovided by the present disclosure, any interacting party in a pluralityof interacting parties may act as a releaser to obtain a coding mediummatching information provided thereby; any interacting party may act asan accessing party to identify the coding medium through a sensingaccess device equipped, to thereby obtain information matching theidentified coding medium and to further obtain the information providedby the releaser of the identified coding medium.

In a different example, any interacting party may act only as areleaser, or only as an accessing party, or act both as a releaser andan accessing party in different circumstances. The coding mediumidentified when any interacting party acts as an accessing party may bea coding medium generated based on the information provided by theinteracting party as a releaser, or a coding medium generated based oninformation provided by other interacting party as the releaser.

Any releaser sends a corresponding code issuing request to aninteracting party as a core administrator in the plurality ofinteracting parties to require acquiring a coding medium matching theinformation provided by the releaser; the core administrator receivesthe corresponding code issuance request such that the core administratoror a code issuing agency authorized thereby generates the coding medium.In a different example, the code issuing agency refers to a codingmedium generating unit equipped to the releaser that sends thecorresponding code issuing request, or a coding medium generating unitequipped to other interacting party than the releaser, or a third-partycoding medium generating device other than the plurality of interactingparties.

Preferably, because code issuance of the coding medium is obtained byrequesting the core administrator and generated by the coreadministrator, or although the coding medium is generated by the codeissuing agency, it must be authorized by the core administrator, thecore administrator may uniformly manage generation of the coding medium.

In a different example, the information provided by the releaser forgenerating the coding medium includes any or any combination of thefollowing: information to be released by the releaser, attribute stateof the releaser, attribute state of an interacting party associated withthe releaser, and information obtained from identifying other codingmedium using the sensing access device equipped to the releaser. Then,such information corresponding to the coding medium may be known byidentifying a certain coding medium using the sensing access device.

In some examples, the information corresponding to a certain codingmedium may only include some information items in the information above;while some other information items therein may be corresponding toanother coding medium, which may be either separately sent to anyinteracting party such as an accessing party or an appointed interactingparty, or sent, together with the coding medium either corresponding tothe information item or not corresponding to the information item, tothe any interacting party such as an accessing party or an appointedinteracting party.

In some examples, service information may be one kind of informationthat needs to be released, included in the information provided by thereleaser for obtaining the coding medium. The service informationcorresponds to a service provided by an interacting party as a serviceagency; the service corresponding to the service information isindependently provided by one service agency or provided by cooperationfrom a plurality of service agencies; any interacting party knowing thisservice information, e.g., an accessing party obtaining the serviceinformation by identifying the coding medium, sends a service providingrequest to the service agency, such that the interacting party (e.g.,the accessing party) sending the service providing request or aninteracting party appointed thereby may obtain the service correspondingto the service information. Based on different natures of the servicesprovided, the core administrator, the releaser, the interacting partyassociated with the releaser, the accessing party, and the interactingparty associated with the accessing party may respectively act as aservice agency to participate in the service providing process, or actas a party obtaining the entirety or a part of the service,respectively.

In different examples, the service provided by the service agency or theservice information corresponding thereto matches an execution situationof a set operation and/or a set attribute state; the set operationincludes operations independently executed by appointed on or moreinteracting parties in the plurality of interacting parties, oroperations executed by cooperation from appointed some interactingparties thereamong; and the set attribute state refers to a state of oneattribute or a superimposition of states of a plurality of attributescorresponding to one appointed interacting party in the plurality ofinteracting parties, or a superimposition of respective correspondingattribute states of appointed some interacting parties among theplurality of interacting parties.

Preferably, specific providing situations of the service information orservice may be prescribed in a service providing policy. For example, itmay be prescribed that the service agency only provides a service whenthe set operation is correctly executed by an appointed interactingparty, and/or when the attribute state of the appointed interactingparty is consistent with the set attribute state; for example, if theservice agency has a capability to provide a plurality of differentservices, it may be prescribed that a certain service therein may beprovided when the actual execution situation of the set operation and/orthe actual attribute state of the appointed interacting party belongs toa certain situation, while a different service is provided whenbelonging to another situation. Based on different natures of services,in some examples, an interacting party as the service agency per se mayact as an appointed party (one of appointed parties), and whether itsoperation execution situation and/or attribute state is consistent witha prescribed service providing policy is verified to determine whetherto provide a corresponding service.

Any interacting party has an attribute corresponding thereto. Anattribute item and/or a corresponding state of the attribute item mayact as one kind of information that needs to be released or may be usedto be combined with other information that needs to be released,included in the information provided by the releaser for obtaining thecoding medium. Any interacting party may provide such information toother interacting parties by directly sending the attribute state or byreleasing a coding medium including information corresponding to theattribute state.

Preferably, specific situations of attribute adjustment may beprescribed by an attribute adjustment policy. Attributes of aninteracting party satisfies any one or any combination of the following:the states of one or some attributes of any interacting party areadjusted based on state changes of another one or some attributes of theany interacting party; states of one or some attributes of anyinteracting party are adjusted based on state changes of one or someattributes of an interacting party associated with the any interactingparty; states of one or some attributes of any interacting party areadjusted based on execution situation changes of a set operation of theany interacting party; and states of one or some attributes of anyinteracting party are adjusted based on execution situation changes of aset operation of an interacting party associated with the anyinteracting party.

The attributes corresponding to the any interacting party are recordedand state adjustment are performed by one attribute management agencyindependently or by cooperation from a plurality of attribute managementagencies; in different cases, the attribute management agency may referto any one of the following: the any interacting party, an interactingparty associated with the any interacting party, the core administrator,and a third-party management device other than the interacting partyappointed by the core administrator.

Any interacting party has one or more identification informationcorresponding thereto; each identification information of the eachinteracting party may be used as one kind of information that needs tobe released, or may be used to be combined with other information thatneeds to be released, included in the information provided by thereleaser for obtaining the coding medium. Any interacting party mayprovide such information to other interacting parties by directlysending the identification information or by releasing a coding mediumincluding the identification information. The identification informationmay act as one attribute of the interacting party and have thecharacteristic described above regarding the attributes.

Preferably, the identification information may satisfy any one or anycombination of the following: the identification informationcorresponding to the any interacting party when performing any operationis used for binding the execution situation of the operation with theinteracting party; the any interacting party superimposes theidentification information of the any interacting party to theinformation to be released to the outside and then directly releases thesuperimposed information; the interacting party receiving the releasedinformation determines the interacting party that provides the releasedinformation by discerning the identification information; when the anyinteracting party acts as a releaser, after superimposing theidentification information of the any interacting party to theinformation to the released to the outside, provides the informationsuperimposed with the identification information to the coreadministrator or the code issuing agency authorized by the coreadministrator to generate a corresponding coding medium, and releasesthe coding medium; the accessing party identifies the correspondingcoding medium to obtain a binding relationship between the coding mediumand the releaser.

In some examples, the identification information of any interactingparty may be independently provided or provided together with otherattributes or other information. When any interacting party as areleaser sends a corresponding code issuing request during executing anoperation set thereto, the information simultaneously provided to thecore administrator at least includes the identification information ofthe interacting party and the information about its executing of the setoperation, thereby binding the coding medium generated based on thecorresponding code issuing request with the releaser's executionsituation of the set operation, such that the binding relationship maybe known by identifying the corresponding coding medium.

One attribute of any interacting party is a monetary share of theinteracting party, having the characteristics about the attributesdescribed above; an entirety or a portion of the monetary share of theany interacting party may be distributed and adjusted between appointedsome interacting parties; the monetary share of the any interactingparty is obtained or adjusted according to any one or any combination ofthe following manners: the any interacting party obtains a matchingmonetary share by pledging assets to the core administrator or anappointed approval authority or an appointed other interacting party;the any interacting party obtains a monetary share of a correspondingpercentage through exchanging by paying a currency of any kind to thecore administrator or an appointed approval authority or an appointedother interacting party; the any interacting party obtains a monetaryshare or the currency exchangeable to the monetary share of acorresponding percentage paid to the any interacting party by the coreadministrator or an appointed approval authority or an appointed otherinteracting party; and appointment of the approval authority or otherinteracting party is implemented by the any interacting party, or thecore administrator, or an interacting party associated with the anyinteracting party. appointment of the interacting party and distributionof the monetary share may be prescribed by an attribute adjustmentpolicy associated with monetary share attribution.

In some different examples, that the interacting party pays the monetaryshare is to obtain a service (not limited to obtaining a commodity,content, and rights, etc.) provided by the service agency; or theinteracting party obtains a monetary share paid thereto by otherinteracting party as a reward based on its execution of a certainoperation (particularly an operation prescribed by the monetarydistribution policy). A preferable currency is a digital currency, whichmay facilitate share distribution (transfer) between differentinteracting parties or even may be actually used in replacement of anissued currency in different regions of the real world.

one of the attributes of the any interacting party refers to associationinformation about an association between the interacting party and otherinteracting party; and when the any interacting party is executing theset operation and/or adjusting the set attribute state, the attributemanagement agency may adjust the attribute state of the interactingparty associated with the any interacting party. In some examples, aninteracting party becomes a registered user of one or some otherinteracting parties to thereby form an association therebetween; or aninteracting party is mutually associated with a peer interacting partywhen performing a cooperative interaction operation; or, an accessingparty is associated with a releaser by identifying a coding medium; or,some interacting parties are appointed as associated interacting partiesby a service agency, or a policy stipulation agency, or the coreadministrator; and so on.

one of the attributes of the any interacting party refers to a setweight index corresponding to the interacting party; based on the weightindex, the attribute management agency may coordinately adjust differentattributes of a same interacting party or coordinately adjust a sameattribute of different interacting parties. With distribution ofmonetary share as an example, it may be correspondingly adjusted basedon different situations of operation execution of a certain interactingparty, which may also be distributed based on respective operationexecution situations of different interacting parties.

one attribute of any interacting party refers to a physical worldcharacteristic corresponding to the interacting party; the physicalworld characteristic includes, but not limited to, corresponding to anyone of the following or any combination thereof of a real environmentand/or a virtual environment where the interacting party is currentlylocated: time parameter, location parameter, ambient parameter, andstate of another one or some attributes of the interacting party per se.In some examples, although some physical world characteristics per seare not affected by any interacting party (e.g., time), executing ofsome actions or states by a certain interacting party or its associatedinteracting party may be used as a start point/end point of metering ormeasuring the physical world characteristic, thereby becoming thephysical world characteristic corresponding to the interacting party.Based on different application situations, the physical worldcharacteristics may be obtained via various approaches such as from theany interacting party, its associated interacting party, the coreadministrator, or an external third party, etc. The real environmentand/or virtual environment may be divided into a plurality of physicalgrids based on different physical world characteristics; a physicalworld characteristic corresponding to a certain interacting party mayfacilitate respective parties to understand the real environment and/orvirtual environment where the interacting party is located and therebyunderstand the physical grid where the interacting party is located.

the core administrator stipulates or updates coding rules and decodingrules matching the coding rules, such that the core administrator or acode issuing mechanism authorized thereby may generate correspondingcoded information based on uniform coding rules and generate acorresponding coding medium based on the coded information; and asensing access device based on the matching decoding rules may identifycorresponding coded information from the coding medium as well as theinformation provided by the issuer. Any interacting party as a policyreleasing agency stipulates or updates a policy associated with theinformation provided by the releaser; the policy includes, but notlimited to, a service providing policy associated with the informationprovided by the releaser, and/or the attribute adjustment policyassociated with the attribute state provided by the releaser; and policyappointment and update by the policy releasing agency matches theexecution condition of the set operation and/or the set attribute state.

Preferably, in the example, in the policy of the policy releasingagency, execution logic of a set operation of appointed one or moreinteracting parties among the plurality of interacting parties is set,such that the corresponding coding medium generated based on the codingrules matching the policy includes an instruction that drives thecorresponding interacting party to execute the set execution logic; andthe sensing access device of the corresponding interacting party obtainsthe instruction by identifying the coding medium based on the matchingdecoding rules. Preferably, if an accessing party is a registered userof the releaser of the coding medium or an interacting party associatedtherewith (e.g., a service agency associated with the releaser), thenthe accessing party decodes and parses the coding medium based ondecoding rules consistent with the coding rules to obtain correspondinginstruction or information, for performing information interaction orinteractive operation with the appointed releaser or the interactingparty associated therewith, thereby capable of forming a closed looptransaction process which cannot be accessed by an externalnon-appointed interacting party, which provides a higher security.

Preferably, any information provider or any coding medium releaser mayform an interactive network centered about itself, corresponding tovoluntarily accessing the interactive network. Besides obtainingcorresponding information, any information receiver or any accessingparty identifying the coding medium may also be passively accessed tothe above-mentioned interactive network.

In some application examples, when any interacting party as a firstreleaser is sending a first code issuing request, the informationprovided at least includes identification information of the firstreleaser, and a first coding medium generated based on the first codeissuing request is obtained; any other interacting party as an accessingparty identifies the first coding medium with the equipped sensingaccess device to at least obtain the identification information of thefirst releaser, and the information provided when sending a second codeissuing request as a second releaser at least includes theidentification information of the first releaser and the identificationinformation of the second issuer, to thereby bind the second codingmedium generated based on the second coding request with the firstissuer and the second issuer, the binding relationship being knowable byidentifying the second coding medium.

In some application examples, the first releaser and the interactingparty associated therewith constitute a first ad-hoc interactive networkcentered about the first releaser; the second issuer accesses the firstad-hoc interactive network by identifying the first coding medium,causing the second issuer and the first issuer to be associated, andcausing a second ad-hoc interactive network, which is formed by thesecond issuer and an interacting party associated therewith and centeredabout the second issuer, to be integrated with the first ad-hocinteractive network; and the second accessing party accesses the secondad-hoc interactive network by identifying the second coding medium andmeanwhile accesses the first ad-hoc interactive network to achieveassociation with the first releaser and the second releaser.

In some application examples, an interactive network exists between afirst interacting party and an interacting party associated therewith; asecond interacting party and a third interacting party access to theinteractive network, respectively, to be associated with the firstinteracting party, respectively; information released by the secondinteracting party to the first interacting party includes any one or anycombination thereof: shared information, search request information, andhelp request information; the first interacting party sends the sharedinformation to the third interacting party in the interactive network;the first interacting party searches, based on the search requestinformation, reply information associated with the search requestinformation in the interactive network, and sorts the reply informationto form a search request, and then pushes the search result to thesecond interacting party; the reply information is provided by the thirdinteracting party to the first interacting party; and the firstinteracting party sends the help request information to the thirdinteracting party in the interactive network to facilitate the thirdinteracting party to provide the reply information to the firstinteracting party based on the search request information.

In some application scenarios, a plurality of first interacting partiesare provided, which correspond to a same motif or a plurality ofdifferent motifs, respectively; the second interacting party isassociated with the first interacting parties having a correspondingmotif based on one or more identification information of the firstinteracting parties; the first interacting party of one motif or afourth interacting party associated therewith, as the first issuer,issues a first coding medium obtained to the second interacting party;and the second interacting party, after identifying as a first accessingparty the information corresponding to the first coding medium, issuesas a second issuer a second coding medium generated based on theinformation provided by the second issuer to the first interacting party(parties) of other motif.

In some application examples, the first interacting parties of aplurality of motifs adjust, based on a secondary weight index, attributestates under corresponding identification information of the secondinteracting parties associated with them respectively; and the coreadministrator receives attribute states under the correspondingidentification information of the second interacting parties, which areprovided by the respective first interacting parties, andcomprehensively adjusts the attribute states under all identificationinformation of the second interacting parties based on a comprehensiveweight index.

In some application scenarios, a plurality of second interacting partiesare associated with a same first interacting party, respectively; thefirst executing party sets the execution logic of an operation; theoperation with the execution logic being set includes any one or anycombination of the following: independent operation of respective secondinteracting party, interactive operations between the plurality ofsecond interacting parties, and interactive operations between thesecond interacting parties and the first interacting party; and thefirst interacting party provides the execution logic to the coreadministrator, such that the coding medium generated by the coreadministrator or the code issuing agency authorized thereby based on thecorresponding code issuing request from the first interacting party orthe second interacting party includes an instruction that drives thefirst interacting party and/or the second interacting party to execute acorresponding operation set with the execution logic; the firstinteracting party or the second interacting party obtains theinstruction by identifying the coding medium through their respectivesensing access device.

In some application scenarios, the plurality of first interactingparties are associated with a same third-party interacting party, andinformation interaction between the first interacting party and the coreadministrator is uniformly implemented by the third interacting party;the third executing party sets the execution logic of an operation; theoperation with the execution logic being set includes any one or anycombination of the following: independent operation of respective firstinteracting party or second interacting party, interactive operationsbetween the plurality of second interacting parties, interactiveoperations between a plurality of second interacting parties, andinteractive operations between the second interacting parties and thefirst interacting party; and when an operation with execution logicbeing set is set with corresponding identification information and thecorresponding interacting party executes any step of the operation withexecution logic being set, the third interacting party provides theidentification information of the operation and the identificationinformation of the interacting party executing the operation to the coreadministrator to cause the generated coding medium to at least includethe identification information, such that any interacting party mayobtain execution conditions of respective steps in the operation byidentifying the coding medium.

Preferably, the any coding medium may be released by the releaser to atleast one region identifiable by the accessing party through any one orany combination of the following manners: the releaser sends thecorresponding coding medium to the sensing access device of theaccessing party; the releaser includes a module that may provide the atleast one region, and releases the corresponding coding medium throughthe module; and the releaser sends the corresponding coding medium to amodule that may provide the at least one region and releases thecorresponding medium through the module.

Preferably, based on the information provided by the releaser, the coreadministrator or the code issuing agency authorized thereby generates amatching coding medium or generates a coding medium and a correspondinghyperlink; and the coding medium refers to any one or any combinationthereof: a bar code image where the coded information is generated in apattern of one-dimensional code, two-dimensional code, ormulti-dimensional code; an optical lattice diagram where the codedinformation is generated in a form of light-shadow ray or refurbishingfrequency variation or in a form of visible light or UV or infraredlight or polarized light; and a digitalized acoustic wave or radio wavegenerated with a specific law or a specific frequency variation pattern;and the sensing access device includes a device that may identify acorresponding type of coding medium and/or hyperlink.

The present disclosure provides a sensing access device that may beadapted to implement the information processing method based on uniformcode issuing and the functions described in respective examples. Aninteracting party using the sensing access device acts as a releaser, anaccessing party, a core administrator, a service agency, a policyreleasing agency, a code issuing agency, and an attribute managementagency in different circumstances, following the method above and thecorresponding features described in the examples of the method.

The sensing access device is configured through software, hardware or acombination thereof, so as to be capable of implementing any one or anycombination of the respective examples below:

In some examples, the sensing access device identifies a coding mediumto obtain information matching the identified coding medium;

In some examples, the sensing access device identifies the coding mediumto cause an interacting party equipped with the sensing access device asan accessing party to access an ad-hoc interactive network constructedwith a releaser of the coding medium as the center, such that theaccessing party may interact via the sensing access device with thereleaser or other interacting party associated with the releaser in thead-hoc interactive network.

In some preferred examples, the interacting party equipped with thesensing access device is an entity person.

In some examples, the sensing access device comprises:

an obtaining module configured for obtaining a coding medium of acorresponding type; wherein the obtained coding medium may be decoded bya decoding unit of the sensing access device or a decoding unit of otherinteracting party to obtain coded information; further, the codedinformation decoded may be parsed by a coded information decoding unitof the sensing access device or a coded information parsing unit ofother interacting party to obtain information matching the codedinformation;

a sensing/receiving unit configured for causing the interacting partyequipped with the sensing access device to interact with otherinteracting party; for example, but not limited to: sending a serviceproviding request for obtaining a service and/or obtaining correspondingservice information, service or service providing voucher, etc., sendingas a releaser a code issuing request to the core administrator andproviding information and/or receiving the generated coding medium/or anauthorization for autonomously code issuing, sending or receiving anyinformation/coding medium, sending or receiving a policy needed by anappointed coding rule or receiving a coding rule or correspondingdecoding rule stipulated or updated by the core server, sending orreceiving an attribute state of the interacting party or an associatedinteracting party, performing information interaction with otherinteracting party accessed to the interactive network sending thecorresponding information or data to other parts in the sensing accessdevice or receiving from these parts the information having been sent toother interacting parties, etc.; a sending/receiving unit equipped toother interacting parties; by sending/receiving such information andfurther processing it by a corresponding module of the sensing accessdevice, corresponding functions may be implemented by the interactingparty equipped with the sensing access device;

Optionally, the sensing access device may include an input unit forinputting the input information involved in the interaction; differentinput units based on the required input information may have variousforms;

Optionally, the sensing access device may include an exhibiting unitconfigured for exhibiting content identified from the coding medium andcontent involved in interaction; such contents may be visual, audio orany other arbitrary form.

Optionally, the sensing access device may include a coding mediumgenerating unit, for generating a corresponding coding medium based onauthorization of the core administrator, the information provided by theinteracting party equipped with the sensing access device beingsuperimposed in the generated coding medium.

Optionally, different parts of a sensing access device are configured ina same interacting device or separately configured in a plurality ofinteracting devices that are signal connected; wherein the interactingdevice is a mobile terminal, or a stationary terminal, or a wearabledevice (also including human body implants); the interacting device isprovided with an internal sensor or signal connected with an externalsensor to acquire attribute states of the interacting party.

In some examples, the decoding rules matching the coding rules based onwhich the core administrator or an interacting party under itsauthorization generates the coding medium are set in client software;the sensing access device decodes the coding medium matching the codingrules through the client software to obtain corresponding codedinformation, parses the corresponding coded information to obtainparameters included in the coding medium, and automatically imports theparameters into the automatically boosted client software; and for anunidentifiable coding medium, the sensing access device automaticallyinstalls the decoding client software or updates the decoding rules inthe decoding client software or issue an error prompt.

In some examples, the sensing access device is provided with anacquiring unit adapted to acquire at least some attribute statescorresponding to the interacting party equipped with the sensing accessdevice; the attributes states, for example, include, but not limited to:physical world characteristics, identification information, associationinformation, weight index, monetary share, user profile of an entityperson, physical state of the entity person, etc.

the interacting party with the entity person as the body has one or moreidentification information corresponding thereto; each identificationinformation of the interacting party satisfies any one or anycombination of the following:

corresponding identification information when the interacting party isperforming any operation is used for binding an execution situation ofthe operation to the interacting party;

the interacting party, after superimposing the identificationinformation of the interacting party to the information to be releasedto the outside, directly releases the information superimposed with saididentification information; and the interacting party receiving thereleased information determines, by identifying the identification, theinteracting party that provides the released information; and

when the interacting party acts as a second releaser, aftersuperimposing the identification information of the interacting party tothe information to be released to the outside, provides the informationsuperimposed with the identification information to the coreadministrator or the authorized code issuing agency to generate acorresponding second coding medium, and releases the second codingmedium; by identifying the second coding medium, a binding relationshipbetween the second coding medium and the interacting party as the secondreleaser may be known.

In some examples, an interacting party with the entity person as thebody has one or more identification information corresponding thereto;each identification information of the interacting party satisfies anyone or any combination of the following:

corresponding identification information when the interacting party isperforming any operation is used for binding an execution situation ofthe operation to the interacting party;

the interacting party, after superimposing the identificationinformation of the interacting party to the information to be releasedto the outside, directly releases the information superimposed with saididentification information; and the interacting party receiving thereleased information determines, by identifying the identification, theinteracting party that provides the released information; and

when the interacting party acts as a second releaser, aftersuperimposing the identification information of the interacting party tothe information to be released to the outside, provides the informationsuperimposed with the identification information to the coreadministrator or the authorized code issuing agency to generate acorresponding second coding medium, and releases the second codingmedium; by identifying the second coding medium, a binding relationshipbetween the second coding medium and the interacting party as the secondreleaser may be known.

In some examples, the first releaser and an interacting party associatedtherewith constitute a first ad-hoc interactive network centered aboutthe first releaser; the interacting party with the entity person as thebody acting as a first accessing party identifies, through the sensingaccess device, the first coding medium released by the first releaserand is accessed to the first ad-hoc interactive network; and

an interacting party with an entity person as the body further acts as asecond releaser to release a second coding medium; another interactingparty as a second accessing party identifies the second coding mediumthrough another sensing access device equipped to realize associationwith the second releaser, thereby causing the second accessing party toaccess to a second ad-hoc interactive network, which is formed by thesecond releaser and an interacting party associated therewith andcentered about the second releaser, and meanwhile access to the firstad-hoc interactive network, such that the second ad-hoc interactivenetwork is integrated with the first ad-hoc interactive network.

The present disclosure provides an information processing network basedon uniform code issuing, which may be adapted to implement theinformation processing method based on uniform code issuing and thefunctions described in respective examples. the information processingnetwork comprises a plurality of interacting parties, including:

a core administrator that, based on a received code issuing request,autonomously generates a coding medium matching the code issuing requestor authorizes, after verifying rights of a code issuing agency, the codeissuing agency to generate a coding medium matching the code issuingrequest;

any interacting party as an issuer, which sends the code issuing requestand provides information to the core administrator and obtains thecoding medium that is generated by the core administrator or anauthorized code issuing agency and matches the provided information;

any interacting party as an accessing party, which identifies, through asensing access device equipped thereto, the coding medium released to atleast one region identifiable by the accessing party, to obtaininformation matching the identified coding medium and further obtaininformation provided by the releaser of the identified codedinformation.

Preferably, any information provider or any coding medium releaser mayform an ad hoc interactive network centered about itself, correspondingto voluntarily accessing the ad-hoc interactive network. Besidesobtaining corresponding information, any information receiver or anyaccessing party identifying the coding medium may also be passivelyaccessed to the above-mentioned ad-hoc interactive network.

Particularly, any interacting party, when acting as a releaser, anaccessing party, a core administrator, a service agency, a policyreleasing agency, a code issuing agency, and an attribute managementagency in different circumstances, follow the method above and thecorresponding features described in the examples of the method.Particularly, a sensing access device equipped to an interacting partyacting as an accessing party may be implemented by the sensing accessdevice described above.

In some examples, any interacting party includes essential parts andoptional parts:

the essential parts include: a sending/receiving unit configured forinteracting with other interacting party and for interacting with otherunits of a background server; and

the optional parts include any one or any combination of the following:

a sensing access device;

a built-in or external database for storing various information dataduring an interaction process;

a decoding unit configured for decoding the coding medium obtained bythe interacting party to obtain coded information;

a coded information parsing unit configured for parsing the obtainedcoded information to obtain information matching the coded information;

an input unit configured for inputting input information involved ininteraction;

an exhibiting unit configured for outputting content identified from thecoding medium and content involved in interaction;

a coding medium generating unit configured for generating the codingmedium under authorization from the core administrator;

wherein the sending/receiving unit included in an interacting party as areleaser is configured for sending a code issuing request to the coreadministrator and receiving the generated coding medium, and is furtherconfigured for releasing the obtained coding medium to at least oneregion identifiable by the accessing party;

the sending/receiving unit included in an interacting party as a codeissuing agency is configured for receiving an authorization sent fromthe core administrator to allow the code issuing agency to autonomouslygenerate the coding medium, such that the coding medium generating unitof the code issuing agency generates the coding medium under theauthorization from the core administrator;

the essential parts of an interacting party as a policy releasingmechanism further includes an access defining unit configured forformulating or updating a policy associated with the informationprovided by the releaser, and sending the policy to the coreadministrator through the sending/receiving unit of the policy releaser;and

the sending/receiving unit of an interacting party as a core server isconfigured for receiving the code issuing request sent from the releaseror releasing the generated coding medium to the releaser or aninteracting party appointed by the releaser; essential parts of theinteracting party as the core server further include: a coding mediumgenerating unit configured for generating a matching coding medium fromthe information provided by the releaser;

optional parts of the interacting party as the core server include anyone or any combination of the following:

a verifying unit configured for verifying, based on the code issuingrequest from the releaser, whether a code issuing agency appointed bythe code issuing request has rights for autonomously generating a codingmedium; wherein when the appointed code issuing agency has rights forautonomously generating a coding medium, the sending/receiving unit ofthe interacting party as the core server sends, to the appointed codeissuing agency, an authorization of allowing the code issuing agency toautonomously generate the coding medium; and

a rule managing unit configured for formulating or updating the codingrules and the decoding rules matching the coding rules based on thepolicy provided by the policy releasing agency.

For example, when any interacting party is acting as a releaser, anaccessing party, a core administrator, a service agency, a policyreleasing agency, a code issuing agency, or an attribute managementagency, etc., the parts configured thereto may be provided in thecorresponding server or provided in a mobile terminal, a stationaryterminal, or a wearable device (also including human body implants),etc.

In some examples, any interacting party has disclosure rights set withrespect to the information received thereby and/or sent therefrom, thedisclosure rights being configured for defining a plurality ofconditions for receiving and/or sending information; wherein someconditions include attribute states of the any interacting party, orattribute states of other interacting party.

In a preferred example of the present disclosure, the present disclosureprovides a “mobile terminal/wearable device” configured to be accessibleto a “digital human being network.” The digital human being networkrefers to a social network hierarchy where respective nodes under aspecific motif include corresponding dynamic social statuses/socialreputation indexes, and include social attitudes/open attitudes (forselecting which motif is received, selecting open to which friends(e.g., casual acquaintance, or allowing friends of friends, or allowingthose friends with a certain level of social reputation index to access,irrespective of the acquaintance degree); another one of its maincharacteristics is a site (environment) access, where parameters relatedto the scene upon access are acquired and uploaded; the access mannermay be various kinds of sensing access, e.g., optical instead ofelectrical (one-dimensional code, two-dimensional code, andmulti-dimensional code, hidden two-dimensional code, etc.), acousticwave, Bluetooth, brain wave, and various kinds of “digital signalpropagation and reception” manners, which are implemented by a matchinggenerating module and identification module.

In a preferred example of the present disclosure, human (entity person)behaviors may include “active code scanning access” and “passive codescanning access,” i.e., making the access behavior voluntarily orinteraction with other person that making the access behavior; “access”refers to a relevant action performed by identifying, based oncorresponding rules, a medium coded with a certain set rule which isseen, heard, or received in the real world; an effect generated by the“access” does not purely embody the “object itself,” but a “specificmotif” generated under a specific “scene” wherein the specific motif maybe predefined, or triggered based on a certain condition, e.g.,including “moral quality index of social search of the accessing oraccessed person,” available for self-performing the “judgment,” therebygenerating a quantifiable “behavior generating a moral quality indexchange for the dissemination chain of the social network” or making “abehavior of changing the self-moral quality index.”

For a digital human being network with the above characteristics, no“practical visual effect” will be generated if a monkey or a robot wearsthe sensing access device, because such monkeys or robots do not have a“moral quality index and social circle” that may generate differentaccess effects based on environment, time, and user attributes, etc.;this is a fundamental difference between human and animals as well asrobots.

The means of “sensing access” not only enables an entity person to havea digital human being attributes by “being equipped with a sensingaccess device,” but also may solve the operation action features of the“digital human being”; besides, it is also embodied that “the device”has various kinds of “digital human being” features described above andin the embodiments below; or even when a “Nano organ/Nano chip” that mayplay a role of a sensing access device is implanted in a human body or ahuman brain, manufacturer attribute may be further attached, so as to beimparted with a “personalized attribute” to connect with respectiveinteracting parties and implement attribute changes. For example, anapparatus provided by a manufacturer, i.e., the ECNU AffiliatedHospital, has “psychologically stable/emotional stable personality,” andan apparatus provided by another manufacturer, i.e., Fudan AffiliatedHospital has an “intelligent personality,” etc. This may be used todescribe “personality attribute distinguishing in a semi-personsemi-machine era formed by a large number of machine organs inreplacement of human organs.”

The digital human being may identify digitalized codes with a “modulehaving a sensing access capability” to sensing access, e.g., by“scanning a two-dimensional code,” an O2O mode from offline to online isimplemented to access a cloud service background. By superimposing theunique ID (and various kinds of affiliated attribute information) of thedigital human being per se to newly opened digital human beinginformation, another new “digital human being information” having a samecontent but a different ID for identification may be generated; thisaction may be recorded by the background even it is not disseminated andthus belongs to “structured big data,” which shows the world that it hasexhibited “its own social attitude: having opened and read.”

Based on superimposition of its own ID, the digital human being may“share” the new digital information “to its friend circle” or“point-to-point send it to friends,” further expressing its attitude.This manner of communicating with other person accessed by sensingthrough the coded information “added with its own information and thensent out” constitutes a basis of the “value” of “human society.”

That is, by identifying the digital human being ID superimposed invarious information (particularly the information having been widelydisseminated for multiple times), the digital human beings that executeeach time of operation such as information sharing may be identified,and then respective levels of disseminators during the whole process maybe traced. Moreover, the disseminators may be rewarded through thedigitally quantifiable “price scale,” i.e., a “digital currency” thatmay be practically circulated. Evolution of existing currencies such asbit coins is not based on “labor and value” in human society, whose“quantity” and “mining process” are only artificially defined;therefore, they cannot play a role of “digital currency.” The digitalcurrency referred to in the present disclosure is generated based on“surplus value in the circulation field,” which belongs to “a valuesystem in the circulation and sharing sector” and has a measurementstandard of “being digitizable, being dividable, being traceable, andbeing quantifiable,” and thus may become a “universal equivalent” torepresent a value of any commodity.

It is just through this manner that the value of informationdissemination may be cashed, thereby motivating people to participatewith benefits, realizing a real socialized e-commerce. According to theapplicants, the socialized e-commerce refers to a business mode whereaccurate tracing of the dissemination process is implemented throughbackground processing with the online social network as an informationpropagation channel, which is a basis for disseminators to receive therewards for forwarding, helping the releaser to gain incremental orders.In this business mode, what commodities to sell is not important,because creation of value is originated from the releaser's setting; theprecondition is that he believes that the dissemination may bring himbenefits and he would like to give a share of profits. The essence ofthe socialized e-commerce will not be touched with using the socialnetwork to transfer the focus onto the value created by thedissemination per se. Besides the typical commodities, the services thatdo not belong to traditional commercial retails and even the informationper se may act as a body for dissemination in our socialized e-commercemode, e.g., membership seeking, job recruitment, investment-inviting,etc. In the socialized e-commerce mode, a releaser, who is the finalbeneficiary for disseminating information to those who need, mayvoluntarily decide whether to pay the consideration for thedissemination behavior for making a deal based on his expectation ofthis mode. By identifying the ID of a disseminator, the attributefeatures corresponding to the disseminator, such as dynamic socialstatus/social reputation index (which are adjusted based on his actions)may be known, acting as a basis for other person to determine thecredibility degree of the information disseminated thereby or as a basisfor setting his open attitude for receiving and sending information.

Information processing shall go through the procedures of obtaining,identifying, transmitting, processing, and storing. Scanning adigitalized coding medium such as a two-dimensional code with a mobileterminal such as a mobile phone is not only a simple action that may bereadily performed by a person in the real world, but also an instructionfor requesting the virtual world for obtaining an online resourcerepresented by the two-dimensional code. A smart phone integrates a codereader, a communicator, a processor, and a display, which may not onlycapture the two-dimensional code to obtain and present the onlineinformation, but also may be further hooked to the online cloud servicefor subsequent operation interactions, corresponding to extending humanorgans and limbs into the virtual world.

A digitalized coding medium such as a two-dimensional code may beexistent as an entity label of a merchant, a commodity, or a service. Aplurality of two-dimensional codes labeling a certain entity resourcesin the reality constitute an offline real world, and informationassociated with these two-dimensional codes usually constitutes anonline virtual world; the two-dimensional codes associate the scenes andindividuals in the real world with the data in the virtual world.Besides, the two-dimensional code has enough information capacity (whichmay further cover coded information corresponding to executioninstructions of a complex action), which becomes a key entering thevirtual world in replacement of the webpage link.

An effective means of “sensing access” is visual and audio sense of the“wearable device equipped to a human, including implanted chip,” “havinga unique digital ID and may access in a digital human beingalized mannerof a cloud background service accessed by sensing”; usually notincluding “analog access by matching a database through biometricidentifications, such as fingerprint identification, facial recognition,etc.”

A fundamental difference between the wearable device and human eyes isthat unlike eyes, the wearable device needn't collect all light signals.As a bridge linking the real world and the virtual world, with only onefunction of obtaining the digitalized coding medium (e.g., scanning atwo-dimensional code), the basic requirements will be met (i.e.,implementing “sensing access” as mentioned above). Therefore, it isessential for a wearable device is to provide a unit module forobtaining a coding medium, e.g., installing a camera that may scan atwo-dimensional code on an eyeglass device, which may cooperate with theeyes to cruise all around to quickly capture two-dimensional codesvisible or invisible on the entity resources; the whole process may bedone in 1 second. Subsequently, the two-dimensional code is transmittedto the bound (its own) mobile phone or other device for parsing;subsequent operations are executed on the mobile phone according to theprocedures described above. This may improve the speed of sensing thevirtual world to be comparable with usual visual sensing. Moreover, anAPP (application) corresponding to the two-dimensional code isautomatically opened through setting on the mobile phone, where theparsing result of the two-dimensional code will be further processed; byfinding featured characteristics associated with the specific APP, theAPP will be automatically opened or it will prompt to download the APP.With cooperation with APP merchants to obtain the parameters in thetwo-dimensional code, the parameters will be directly imported afteropening the APP and a certain function page will be directed to, furthershortening the processing process. Of course, with technologicaldevelopment, equipment such as a personal portable optical screen(optical touch screen), a brain wave holographic helmet, etc., whichsenses the information of digitalized codes in other manners thanvisual, will also become possible.

In the present disclosure, because all important code-sending proceduresof the coding medium are uniformly managed by the core administrator;firstly, it may control the execution flows designed for respectiveparties; secondly, because when respective parties are executing theirspecific operations required by the procedures, their respectiveidentification Ids which for example are unique are bound, correctexecution of the procedures may be monitored.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a flow diagram of an information processing method based onuniform code issuing in a first embodiment of the present disclosure;

FIG. 2 is a flow diagram of an information processing method based onuniform code issuing in a second embodiment of the present disclosure;

FIG. 3 is a partial flow diagram of another embodiment of theinformation processing method shown in FIG. 2 ;

FIG. 4 is a partial flow diagram of a further embodiment of theinformation processing method shown in FIG. 2 ;

FIG. 5 is a flow diagram of an information processing method based onuniform code issuing in a third embodiment of the present disclosure;

FIGS. 6A and 6B show a flow diagram of an information processing methodbased on uniform code issuing in a fourth embodiment of the presentdisclosure;

FIG. 7 is a partial flow diagram of another embodiment of theinformation processing method shown in FIGS. 6A and 6B;

FIGS. 8A and 8B show a flow diagram of an information processing methodbased on uniform code issuing in a fifth embodiment of the presentdisclosure;

FIGS. 9A and 9B show a flow diagram of an information processing methodbased on uniform code issuing in a sixth embodiment of the presentdisclosure;

FIG. 10 is a structural schematic diagram of an information processingnetwork based on uniform code issuing in a seventh embodiment of thepresent disclosure;

FIG. 11 is a structural schematic diagram of an information processingnetwork based on uniform code issuing in an eighth embodiment of thepresent disclosure;

FIG. 12 is a structural schematic diagram of an information processingnetwork based on uniform code issuing in a ninth embodiment of thepresent disclosure;

FIG. 13 is a schematic diagram of an exemplary structure of a mobileterminal in the information processing network based on uniform codeissuing in the ninth embodiment of the present disclosure;

FIG. 14 is a schematic diagram of an exemplary structure of a backgroundserver in the ninth embodiment of the present disclosure;

FIG. 15 is a schematic diagram of an exemplary structure of a coreserver in the ninth embodiment of the present disclosure;

FIG. 16 is a structural schematic diagram of an information processingnetwork based on uniform code issuing in a tenth embodiment of thepresent disclosure;

FIGS. 17A and 17B show a flow diagram of an information processingmethod based on uniform code issuing in an eleventh embodiment of thepresent disclosure;

FIG. 18 is a structural schematic diagram of an information processingnetwork based on uniform code issuing in a thirteenth embodiment of thepresent disclosure;

FIG. 19 is a structural schematic diagram of an information processingnetwork based on uniform code issuing in a fourteenth embodiment of thepresent disclosure;

FIG. 20 and FIG. 21 are structural schematic diagrams of an entirety ofan information processing network based on uniform code issuing in afifteenth embodiment of the present disclosure;

FIG. 22 is a schematic diagram of an exemplary flow of an informationprocessing method based on uniform code issuing in the fifteenthembodiment of the present disclosure;

FIG. 23 and FIG. 24 are flow diagrams of an information processingmethod based on uniform code issuing in a sixteenth embodiment of thepresent disclosure;

FIG. 25 is a schematic diagram of an exemplary structure of aninformation processing method based on uniform code issuing in theseventeenth embodiment of the present disclosure; and

FIG. 26 is a schematic diagram of another exemplary structure of aninformation processing method based on uniform code issuing in theseventeenth embodiment of the present disclosure.

DETAILED DESCRIPTION OF EMBODIMENTS

Hereinafter, the concept, specific structures, and achieved technicaleffects of the present disclosure will be further illustrated withreference to the accompanying drawings so as to sufficiently understandthe objectives, features and effects of the present disclosure.

Embodiment 1

Hereinafter, a plurality of examples of an information processing methodbased on uniform code issuing are provided, as shown in FIG. 1 , whichmainly involve interactions between a core server, a background server,and a mobile terminal; a third-party server is configured according toactual application scenarios.

In step S101, the background server sends a request to the core serverto request for a two-dimensional code corresponding to a serviceprovided by the background server.

In step S102, the core server receives the request and generates, basedon the service provided by the background server, corresponding codedinformation from service-related information based on a predeterminedcoding rule, then generates a corresponding two-dimensional code fromthe coded information, and then sends the two-dimensional code to thebackground server.

In step S103, the background server releases the two-dimensional code toa place where a user of the mobile terminal is accessible. For example,the two-dimensional code may be released on an Internet webpage or on anapplication software, e.g., Weibo, WeChat, QQ, etc., which may also bereleased on a plurality of information platforms such as a salescatalog, a TV shopping screen, a building advertisement media, a poster,a real store wall, an exhibition fair, etc., or directly sent to themobile terminal.

In step S104, the user becomes a registered user of the backgroundserver by registration on the mobile terminal; the mobile terminal sendsregistration information to the background server, the registrationmessage at least including information that may uniquely identify themobile terminal or uniquely identify the user (referred to as uniqueidentification information).

The unique identification information for example may be the unique IMEInumber or SIM card number of the mobile terminal, or a physical addressof the mobile terminal interface, or the user's ID number, phone number,etc. The registration information may further include a username, apassword, an address, interests and hobbies, QQ number, payment account,and other personal information, or other information required by thebackground server or core server.

In step S105, the background server stores the user's registrationinformation and sends a registration success message to the mobileterminal; the background server or mobile terminal notify the coreserver such that the core server records the association informationrepresenting “the user becomes a registered user of the backgroundserver.”

In step S106, the user identifies the two-dimensional code through themobile terminal and decodes it to obtain coded information correspondingto the service information. For example, the two-dimensional code isshot by a camera provided in the mobile terminal and then decoded. Thecamera generally has 0.3 mega pixels or above, which may guarantee thedefiniteness of the two-dimensional code. When the camera targets at thetwo-dimensional code and the two-dimensional code is clear enough on theview-finding screen, the camera may automatically shoot thetwo-dimensional code.

In step S107, the mobile terminal parses the coded information, extractsthe stored service information from the background server, and presentsthe information related to the provided service on the display screen ofthe mobile terminal for the user to view.

In step S108, the mobile terminal sends a service providing request tothe background server to request the background server to provide theservice. The service providing request at least includes informationthat may uniquely identify the mobile terminal or uniquely identify theuser, the information being consistent or matched with the uniqueidentification information included in the registration information tofacilitate the background server to identify the mobile terminal or theuser.

In step S109, the background server provides the corresponding serviceto the mobile terminal based on the content in the service providingrequest and notifies the core server. In another example, a conditionthat the service has been obtained may be notified by the mobileterminal to the core server.

In step S110, the core server sets accounts respectively correspondingto the background server and its registered user or the mobile terminalof the registered user, for computing one or more attributes of theirs.The background server, the registered user or its mobile terminal maynotify the core server to record or adjust the attributes in theiraccounts with respect to any operation that is implemented by themselvesand satisfies a preset condition.

In this example, the core server for example may perform attributeadjustment in the user's or its mobile terminal's account with respectto the user's operation in step S107 of extracting the service relatedinformation from the background server for viewing so as to decode andparse the two-dimensional code through the mobile terminal. For anotherexample, the core server may perform attribute adjustment in the user'sor its mobile terminal's account with respect to the user's operation ofrequesting and obtaining the service; or further perform attributeadjustment in the background server's account with respect to thebackground server's operation of providing the service. Because the coreserver records the association information between the background serverand its registered user, it may perform corresponding adjustment ofrespective attributes with respect to their interactive operations basedon notification by any party in step S109. Or, supposing the core serveroriginally does not record the association information therebetween, itmay also include information of all involved interacting parties (e.g.,the background server and the user's mobile terminal) in thenotification from one party to the core server, and then the core serveperforms corresponding adjustment of respective attributes based on theinformation of the interacting parties in the notification.

In different application scenarios, change of one or some attributes(e.g., contribution degree or active degree) of the user account may beused to impact a change of other attribute (e.g., currency or creditbalance) of the user; or, the user may obtain different servicesprovided for different values from the background server based ondifferent values of a certain attribute in the account. Respectiveparties may send a request to the core server to query attribute valuesof itself or relevant other parties (e.g., the background server mayquery the values of its own attributes or the attributes of itsregistered users, and the user may also query the values of its ownattributes or the attributes of other registered users of theservice-providing background server or; the rights of querying attributeinformation may be agreed in advance).

Based on different preset conditions, in different application scenariosof step S110, an operation that may be recorded by the core server foradjusting the attributes in the account may be an operation implementedby the background server or the registered user per se, or aninteractive operation therebetween, or an interactive operation betweenthemselves and the core server, the third-party server, other backgroundserver or other mobile terminal. Any party implementing or participatingin the operation notifies the core server, so as to perform recordsadjustment in the corresponding account based on the implementedoperation.

Which operations may be recorded or subjected to attribute adjustment,or which attributes are adjustable, or manners of adjusting theattributes corresponding to respective operations or the valuesadjusted, or the impact caused by attribute adjustment, or which partyhas rights of querying the attributes, etc., are all specificallyprescribed in the preset condition. The preset condition may not be makeknown to the user or relevant parties; or notified to the user orrelevant parties in advance or during the interaction process throughvarious manners: for example, directly provided to the user when theuser registers, or released together with the two-dimensional code, ordirectly encoded in the coded information of the two-dimensional codeand then presented to the user when extracting the service-relatedinformation by decoding or parsing, etc.

Relevant steps in the embodiment may be varied to adapt differentapplication scenarios: for example, in another example of generating thetwo-dimensional code (e.g., step S102), when the core server receives arequest from the background server to request for obtaining thetwo-dimensional code, by reviewing the background server'stwo-dimensional code generation qualification (code-sendingqualification), it sends a preset coding rule to the background serverand authorizes the background server to autonomously generate thetwo-dimensional code.

The coding rule may be sent to the background server only after the coreserver receives the request for generating the two-dimensional code; or,the current coding rule may be obtained from the core server and savedin the background server when the background server registers anattribute recording account with the core server, and generates thetwo-dimensional code based on the saved coding rule after sending therequest and receiving an authorization instruction from the core serverto agree with it to autonomously generate the two-dimensional code; or,when sending the authorization instruction, the core server maysimultaneously send the updated coding rule to the background server inreplacement of the originally saved version, and then the backgroundserver generates the two-dimensional code based on the updated codingrule.

The coding rule is set to be read-only to the background server, i.e.,the background server may generate, under authorization, thetwo-dimensional code according to the received coding rule, but cannotautonomously modify the coding rule. Operations of stipulating thecoding rule, updating or releasing the coding rule to the partyauthorized to generate the two-dimensional code can only be executed bythe core server. When the background server needs to change relevantmatters during the service providing process (e.g., the type or contentor set condition of the provided service, preset condition of attributechange, reward policy, etc.), change of the coding rule is notified tothe core server before actual occurrence of the matter; then, thetwo-dimensional code that needs to be generated in subsequent operationsmay be generated according to the changed coding rule, which can only bedecoded and parsed based on the mated updated decoding rule.

Or, in another example of generating the two-dimensional code (e.g.,step S102), when receiving the request from the background server forgenerating the two-dimensional code, the core server may send thecurrently latest coding rule (which may be the preset coding rule or theupdated coding rule) to a third-party generating device, and afterauthorizing the third-party generating device, directly sends orforwards the two-dimensional code to the background server. Thethird-party generating device cannot modify the coding rule either.

Besides, except the step 102 in which the background server requests forgenerating the two-dimensional code corresponding to the providedservice, the background server or the mobile terminal may, in subsequentsteps, request, with respect to the information that needs to be sent torespective external parties, the core server and obtains thetwo-dimensional code that is generated by the core server or by theparty authorized thereby based on the currently latest coding rule andcorresponds to the information to be sent, such that the respectiveparties identify the two-dimensional code based on the matching decodingrule to obtain the information sent from the background server or mobileterminal. For example, two-dimensional code corresponding to theregistration request and the service providing request and the like sentfrom the mobile terminal to the background server, and the registrationsuccess message, service information, and even the specific servicecontent provided as sent from the background to the mobile terminal, mayall be requested to be generated by the core server or its authorizedparty, and then sent to a corresponding information recipient. Due tothe high security nature of the two-dimensional code, by transmittingthe information in the two-dimensional code, the security may still beguaranteed without ciphering and deciphering.

Supposing that the background server or the mobile terminal requests thecore server for automatically generating the two-dimensional code andobtains the authorization from the core server at an early stage of acertain interactive process, the background server or the mobileterminal may encode the relevant information it notifies to the coreserver and generate the corresponding two-dimensional code to be sent tothe core server.

Further supposing that the interactive information that needs to be sentto the outside by the background server or the mobile terminal at acertain time of the process corresponds to the currently ongoingoperation (e.g., sending payment information to the outside at thepayment phase), when the background server or the mobile terminalrequests the core server to obtain the corresponding two-dimensionalcode or requests to obtain an authorization of autonomous code issuing,it corresponds to notifying the core server of its ongoing operation,thereby facilitating the core server to adjust the attributes in itsaccount, without a need of additionally sending the notification messageto the core server.

When generating any kind of two-dimensional code during the interactiveprocess, a hyperlink may also be generated at the same time, such thatthe information contained in the hyperlink is identical to theinformation contained in the two-dimensional code. After obtaining thegenerated two-dimensional code and the corresponding hyperlink, thebackground server directly sends them to the mobile terminal. Thehyperlink and the two-dimensional code may be displayed on a same pagesent to the mobile terminal, respectively; or the hyperlink per se isinvisible and attached to the two-dimensional code or attached to othermedia such as text, picture, video multi-media, etc. Then, the user mayshoot the two-dimensional code or click the hyperlink (or click thetwo-dimensional code or propagation medium attached with the hyperlink)through the mobile terminal to extract the contained coded informationand further parse it to obtain the information related to the providedservice.

implementation sequence of some steps may not be limited by theimplementation sequence described above. For example, the operation ofstep S104 of performing user registration, or the operation of step S105in which the core server records the association information between theuser and the background server, may be adjusted in different applicationscenarios, e.g., the operations of user registration and notifying thecore server to record and register the association information may beperformed before implementing any one of the steps S101˜S103; foranother example, while sending relevant request to the background serverin step S107 or step S108, operations of user registration and notifyingthe core server to record may be performed.

Moreover, the user may send the registration information to thebackground server to become a registered user thereof in other mannerwithout through the mobile terminal. For example, when receiving theservice providing request or other request sent from the mobileterminal, the background server automatically identifies some uniqueidentification information of the mobile terminal (e.g., unique IMEInumber, SIM card number or physical address of the interface of themobile terminal) for user registration. For example, the user directlyprovides the registration information by paper or mail to an operator ofthe background server for user registration.

In some examples, the user does not register with the background server,but obtains the service or feedback information provided by thebackground server by directly sending a request to the background serverafter identifying the two-dimensional code, and attribute recording oradjustment for the corresponding operation is made by the core serverobtaining the notification.

Besides, the background server, the user or the mobile terminal of theuser may register with the core server in a similar manner like the userregistering with the background server, to become a registered user ofthe core server, such that the core server sets separate accounts forthem to record the attributes. For another example, the core server mayalso requests the background server to send the unique identificationinformation of the background server to verify its identity anddetermine whether it is an eligible background server; then, the coreserver may set to only provide services to eligible background servers(the services may be for example an autonomous code-sendingauthorization instruction of generating the two-dimensional code orsending the two-dimensional code, or for example recording of attributechanges, etc.)

Based on different types of the provided services (e.g., in step S109),the background server may separately provide services to the mobileterminal, or the background needs to cooperate with other backgroundserver or third-party server to provide services to the mobile terminal.For example, in the case of a content providing service, the backgroundserver may independently complete the content providing service if ithas enough content information; in the case of a payment service, aslong as the background server per se has the corresponding function, thepayment transaction may be directly completed; otherwise, the backgroundserver may need to cooperate with other payment server, or a third-partyserver such as a bank settlement platform to complete the action ofpayment.

Or, based on different contents of the provided services, the objectfinally obtaining the service from the background server based on theservice providing request sent by the mobile terminal might not be themobile terminal, but the background server per se, or the third-partyserver, or the core server, or other background server, or other mobileterminal, etc.

When receiving the service providing request, the background server mayfirst determine whether the set condition is satisfied, and onlyprovides services to the mobile terminal when the condition issatisfied. Based on different application scenarios, this step isoptional, not compulsory. The set condition may be an active condition(e.g., the user completes payment, or the value of a certain attributeof the user reaches the requirement, etc.) that may be satisfied afterone of the core server, the background server, the user or the mobileterminal of the user implements a corresponding operation on their ownor with cooperation between various parties, or may be an externalpassive condition (arriving at a certain time, date, etc.) that is notaffected by the operations of various parties, or even a conditioncombining the active condition and the passive condition, etc.

Generally, unless otherwise indicated to exclude corresponding featuresin the following embodiments, relevant definitions, interactiveprocedures, and the features described in their varied examples in thisembodiment (including, but not limited to, user registration, accountopening, generating and releasing of various kinds of two-dimensionalcodes and/or corresponding hyperlinks, service providing, and attributeadjustment, etc.) may all be applied to subsequent other embodiments.

Embodiment 2

Hereinafter, a plurality of examples of an information processing methodbased on uniform code issuing to implement paying to purchasecommodities are provided, as shown in FIG. 2 , which mainly involveinteractions between a core server, a background server, and a mobileterminal; a third-party server is configured according to actualapplication scenarios.

In step S201, the background server provides a service of sellingcommodities; the background server sends a request to the core server torequest for obtaining a two-dimensional code corresponding to acommodity in sale.

In step S202, the core server, or a background server or a third-partygenerating device authorized by the core server, encodes commodityinformation of the commodity based on a currently latest coding rule andgenerates the two-dimensional code corresponding to the commodityinformation.

The commodity information may include commodity-related information,such as commodity code, commodity group, regional GIS classificationinformation, transaction price, sales organization, sales channel,payment manner, receiving bank account number, third-party receivingbank account number, and etc.

In step S203, the background server obtains the two-dimensional code ofthe commodity and releases it to various kinds of information platforms.

In step S204, a user of the mobile terminal registers to become aregistered user of the background server; the background server storesthe user's registration information and sends a registration successmessage to the mobile terminal; the core server records associationinformation therebetween based on the notification from the mobileterminal or the background server, for subsequently performing attributeadjustment based on an eligible operation of the mobile terminal orbackground server.

In step S205, the mobile terminal shoots, through a camera therein, thetwo-dimensional code of the commodity, and decodes the shottwo-dimensional code to obtain coded information corresponding to thecommodity information.

In step S206, the mobile terminal decodes the coded information todetermine whether the two-dimensional code is generated according to apreset coding rule; if so, it is indicated that the information thereincorresponds to the commodity information provided by the backgroundserver, and then subsequent steps of the present method will becontinued to execute. If the two-dimensional code is not generatedaccording to the predetermined coding rule, the two-dimensional codepossibly corresponds to a commodity or service provided by othermerchants, and an error message will be presented as a prompt, or acorresponding webpage that may be hooked to the commodity or service ofother merchant or a link corresponding to the webpage is provided to themobile terminal; or after other set webpage is provided, subsequentsteps of the method will not be continued to execute.

In step S207, commodity information is extracted from the backgroundserver based on the coded information and is displayed on a displayscreen of the mobile terminal for the user to view.

In step S208, if the user is satisfied with the commodity, he will senda purchase request message to the background server through the mobileterminal. The purchase request message includes unique identificationinformation of the mobile terminal (e.g., one or more of telephonenumber, IMEI number of the mobile terminal, user name, and physicaladdress of the interface of the mobile terminal) and may also includeother user information. The purchase request message further includestransaction information, e.g., purchase quantity, payment manner, etc.

In step S209, the background server generates an order based on thereceived purchase request message.

In step S210, the background server sends a payment request message to athird-party payment server. The payment server may be a payment serverof a bank, a payment server of a mobile operator, or a payment server ofAlipay, etc.

In step S211, the payment server processes the payment to completecommodity payment, and then sends a payment success message to thebackground server.

In step S212, the background server sends a payment success message tothe mobile terminal and displays it on the display screen of the mobileterminal to notify the user.

In step S213, the core server performs corresponding attributeadjustment in the account of the background server, the registered user,or a mobile terminal of the registered user based on the payment successmessage sent from the background server.

Particularly, another example of step S212 is that the payment serverdirectly sends the payment success message to the mobile terminal. Forexample, another example of step S213 is that the mobile terminal or thepayment server sends the payment success message to the core server,thereby notifying it to perform attribute adjustment based on thesituation of transaction completed. For another example, after stepS212, the background server may also communicate with a server of themanufacturer or warehouse or logistic company to notify them thedelivery address of the user; or, the commodity is an electroniccommodity (e.g., music, e-book) that has already been extracted to thebackground server to store; then, after successful payment, thebackground server directly sends the electronic commodity or a link tothe electronic commodity to the user's mobile terminal or other mobileterminal appointed by the user.

Besides, supposing that the background server has a strong enoughpayment processing function, interaction with the third-party paymentserver may not be necessary; instead, the operation performed by thepayment server is implemented by the background server per se or aplurality of functional modules in-built therein.

Or, in another embodiment, the procedures of performing steps S201˜S209are substantially identical to those in the embodiment above or in itsvaried example. Subsequent steps may be implemented as follows:

In step S210′, the background server sends a payment request message toa third-party payment server; the core server forwards payment requestinformation to the third-party payment server.

In step S211′, the payment server processes the payment to completecommodity payment, and then sends a payment success message to the coreserver.

In step S212′, the core server sends a payment success message to bothof background server and the mobile terminal, respectively.

In step S213′, the core server performs corresponding attributerecording and adjustment in the account of the background server, theregistered user, or a mobile terminal of the registered user. Becausethe core server participates in a relevant interaction process of thepayment transaction, it need not wait for other device to notify, butdirectly performs attribute adjustment.

Or, in another embodiment, the procedures of performing steps S201˜S208are substantially identical to those in the embodiment above or in itsvaried example. Subsequent steps may be implemented as follows, as shownin FIG. 3 :

In step S209″, the background server generates an order and requests thecore server for obtaining a payment two-dimensional code or obtaining anauthorization to autonomously generate the payment two-dimensional code;coded information of the payment two-dimensional code corresponds to thepayment request message (for example, including a total payment amount,payment manner, account information of the user and account informationof the merchant, etc.).

In step S210″, the background server sends the payment two-dimensionalcode to the third-party payment server; or in another example, as shownin FIG. 4 , the payment two-dimensional code is first sent to the mobileterminal for identification, and when receiving a confirmationinstruction returned from the mobile terminal after checking thetransaction information therein, the mobile terminal or backgroundserver sends the payment two-dimensional code to the payment server.

In steps S211″ and S212″, the payment server obtains a correspondingpayment request message to perform an operation of payment processingafter identifying the received payment two-dimensional code, completespayment of the commodity, and sends a payment success message to one orrespective parties of the background server, the core server, and themobile terminal.

In step S213′, the core server performs corresponding attributeadjustment in the account of the background server, the registered user,or a mobile terminal of the registered user based on the payment successmessage sent from the payment server or the background server or themobile terminal.

Or, such an embodiment may be further provided, where the procedures ofsteps S201˜S207 are substantially consistent with the variousembodiments above or their varied embodiments. In another example ofstep S208 of the method above, supposing that the user is satisfactorywith the commodity, then he may directly send a purchase request messageto the payment server through the mobile terminal. The purchase requestmessage includes unique identification information of the mobileterminal and may also include other user information. The purchaserequest message further includes transaction information, e.g., purchasequantity, payment manner, payment collection information of themerchant, etc. Then, after receiving the purchase request message andcompleting relevant operations of commodity payment (e.g., transferringthe payment from the user's capital account to the merchant's capitalaccount), the payment server sends a payment success message to thebackground server, the core server, and the mobile terminal, such thatthe background server notifies the merchant or warehouse or logisticcompany to deliver, and the core server adjusts the attributes inrespective accounts.

Further, the mobile terminal in this example may send a purchase requestmessage in a payment two-dimensional form; to this end, the mobileterminal needs to request the core server for the paymenttwo-dimensional code corresponding to the payment request message or forbeing authorized to autonomously generate the payment two-dimensionalcode.

Various implementation manners in this embodiment may provide aconvenient e-commerce. The user is only required to access thetwo-dimensional code corresponding to the commodity information; thesimple action of shooting may trigger a series of subsequenttransactions, thereby implementing a full flow of a complex e-commerce.Due to the extremely distribution scope of the two-dimensional code andthe mobile flexibility of the mobile terminal, the user may veryconveniently purchase and pay anywhere and anytime. Moreover, it is onlyrequired to become a registered user of the background server to accesstwo-dimensional purchase on various information platform. In this way,it may be avoided to repetitively submit personal information(particularly payment information) to respective purchase website, whichavoids risks.

Various implementation manners of this embodiment provide a more securepayment method by sending, to the outside, various information neededfor transaction management, such as information related to order andpayment in a payment two-dimensional code form. Because the codedinformation corresponding to the information provided by thetwo-dimensional sending party, actual coded information in thetwo-dimensional code transmitted by respective parties, and decodedinformation of the two-dimensional code receiving party are matched toeach other according to a same specific coding rule, as long as thethree parties are not infected by the same virus, risks of informationleakage such as the payment account number will not occur. In thepresent disclosure, particularly the code issuing (or code issuingauthorization) and all coding rules of the two-dimensional code areuniformly managed by the core server, which may effectively avoidoccurrence of issues of tampering or intercepting the information in thetwo-dimensional code by a hacker obtaining the same specific codingrule.

Embodiment 3

A plurality of examples of an information processing method based onuniform code issuing are provided in this embodiment, which mainlyinvolve interactions between a core server, a background server, and amobile terminal having a specific physical world peculiarity whenaccessing an interactive process; other third-party server is configuredaccording to actual application scenarios.

The physical world peculiarities of the mobile terminal when interactingwith various other parties may refer to any one or any combination ofspecific time, specific location, specific environment, and specificuser identity, and not limited to these mentioned peculiarities; thephysical world peculiarities are decided according to a policy set bythe background server dependent on actual application scenarios and aregenerally mutually associated with a service provided by the backgroundserver. That is, the background server will provide different pertinentservices for different physical world peculiarities. The backgroundsends the policy including association information between the physicalworld peculiarities and the services to the core server in advance orduring the interactive process, such that the core server prepares orupdates a coding rule for generating a two-dimensional code based on thepolicy; the core server may also use the physical world peculiaritiesinvolved in the policy as one of reference basis for adjusting theattributes of respective parties during the interaction.

The background server obtains the two-dimensional code generated based othe coding rule including the policy and releases it. The useridentifies the two-dimensional code for decoding and parsing through themobile terminal and sends information about the peculiarities of thephysical world where the user or mobile terminal is currently located tothe background server. The peculiarity-related information may beseparately sent to the background or may be attached to any other kindof interactive information sent by the mobile terminal to the background(e.g., the sent registration information, a request for querying serviceinformation corresponding to the two-dimensional code, a serviceproviding request) and is then sent together to the background server;or, some information in the peculiarity related information needn't bevoluntarily sent by the mobile terminal, but may be obtained by thebackground server from other information interacted between it and themobile terminal, or obtained from the third party; specifically, how tosend may be determined based on the policy set by the background server.

In different examples, the “current” in the “peculiarities of thephysical world currently located” may refer to the time of identifyingthe two-dimensional code, or the time of sending the peculiarityinformation or other interactive information sent to the backgroundserver through the mobile terminal or other way, or any other timeprescribed by the policy. To facilitate understanding, some examples ofthe “peculiarities of the physical world currently located” are providedbelow: for example, the mobile terminal sends the time of shooting ordecoding or parsing the two-dimensional code to the background serverwhen identifying the two-dimensional code; or location information of areal location (e.g., a store, an advertising board) or a virtuallocation (e.g., a media advertisement, a webpage) when identifying thetwo-dimensional code; or, an inherent characteristic of the user or itsmobile terminal per se or a changing feature that may be changedsomewhat by executing a corresponding operation (e.g., a certain digitof the phone number of the mobile terminal satisfies a set value, or theuser reaches a certain VIP level); or external factors that cannot bechanged by the user per se or the server (e.g., ambient temperature),etc.

When the background server receives information related to the mobileterminal's “peculiarities of the physical world currently located,”corresponding special services are provided to the user based on thepeculiarities such as the time, location, environment or user identityor a combination thereof as included in the information. For anotherexample, an example of combining of the peculiarities is provided below:the background may require that service should only be provided when thepeculiarities of the mobile terminal performing two associatedoperations meet a preset condition, e.g., the commodity to sell isprovided to the mobile terminal only when the location where the mobileterminal scans the two-dimensional code is consistent with the locationof sending a commodity purchase request, and an interval between thetime of scanning the two-dimensional code and the time of paymentsatisfies a set threshold.

Besides, the rules set by the core server for attribute adjustment mayalso differ based on the difference of the “peculiarities of thephysical world currently located.” That is, the core server makes amatching adjustment to the attributes in respective parties' accountsbased on the peculiarity related information sent by the mobile terminalor forwarded by the background server.

Besides, respective parties may send any one of the peculiarity relatedinformation in a two-dimensional form, i.e., the information sendingparty requests the core server for code issuing and obtains thetwo-dimensional code corresponding to the peculiarity relatedinformation generated by the core server or the party authorizedthereby.

Hereinafter, a specific example of obtaining a corresponding couponbased on a specific physical world peculiarity is provided. As shown inFIG. 5 , in this example, it is supposed that the background serverprovides different discounts for a commodity sold by a merchant based ondifferent physical world peculiarity and provides a coupon with thecorresponding discount to the user.

In step S301, the background server sends a request to the core serverto request for a two-dimensional code corresponding to a serviceprovided by the background server.

To this end, the background server may send the association information(policy) between different services provided and differentpeculiarities, independently or together with the request, to the coreserver, such that the core server prepares or updates the coding rulerequired when generating the two-dimensional code.

In step S302, the core server (or a background server or a third-partygenerating device authorized by the core server) generates atwo-dimensional code needed by the background server based on acurrently latest coding rule, the coded information of thetwo-dimensional code corresponding to the service matching thecorresponding peculiarity provided by the background server.

In step S303, the background server obtains the two-dimensional code andreleases it to various kinds of information platforms.

In step S304, the mobile terminal identifies the two-dimensional codeand records the system displayed on the mobile terminal when identifyingthe two-dimensional code as identification time.

In step S305, the mobile terminal sends request information forobtaining the coupon to the background server based on the informationidentified from the two-dimensional code, the request information alsoincluding the identification time of the mobile terminal.

In step S306, the background server receives the request information,and compares the identification time of the mobile terminal with theidentification time prescribed in the policy preset at the backgroundserver; for example, it is prescribed that 20% and 10% discount couponsare provided respectively for the identification time before 8:00 am and9:00 am, and no coupon is provided for the identification time after9:00 am.

In step S307, the background server generates a coupon information witha corresponding discount based on the comparison result.

In step S308, the background server adds the coupon information with thecorresponding discount to the two-dimensional generation request sent bythe background server to the core server, requesting for obtaining acoupon two-dimensional code corresponding to the coupon information.

In step S309, the core server (or a background server or a third-partygenerating device authorized by the core server) generates the desiredcoupon two-dimensional code based on the currently latest coding rule.

In step S310, the mobile terminal receives the coupon two-dimensionalcode directly sent by the core server or forwarded by the backgroundserver and identifies the coupon two-dimensional code to extract thecoupon information including the corresponding discount, and presents itto the user for viewing.

In step S311, the coupon two-dimensional code may be saved in the mobileterminal; when the user goes to the merchant to buy, the saved coupontwo-dimensional code is read through the mobile terminal and presentedto the merchant through the screen of the mobile terminal.

In step S312, the merchant identifies the coupon two-dimensional code onthe mobile terminal through a two-dimensional scanner, another mobileterminal, or any other two-dimensional identifying device with a similarfunction to obtain the corresponding discount in the coupon information,testifying the authenticity of the coupon.

The operations of paying after obtaining the coupon with thecorresponding discount may be implemented with reference to relevantdescription in Embodiment 2 or other prior arts, which will not bedetailed here.

Supposing the user of the mobile terminal does not go to a real store tobuy and it is inconvenient for the merchant to scan and identify thecoupon two-dimensional code face to face, in steps S311′˜S312′ ofanother example, the user may send the coupon two-dimensional code tothe merchant so as to be identified by the merchant's two-dimensionalidentifying device.

It is also possible that the merchant simultaneously verifies the userights of the coupon two-dimensional code, and only a user havingcorresponding rights can get the corresponding discount; to this end,when sending the coupon two-dimensional code, the user maysimultaneously send the user information (e.g., including the uniqueidentification information of the user or its mobile terminal, orincluding the peculiarities of the physical world where the user'smobile terminal is located when sending the coupon two-dimensional code,and attribute value of the mobile terminal user, etc.) together to thebackground server for verification.

Preferably, information including the user information, the couponinformation parsed from the coupon two-dimensional code, and otherneeded information, may be sent to the merchant in a two-dimensionalform, which may be further implemented based on the following process:

In step S313′, the user requests the core server to obtain a discounttwo-dimensional code through the mobile terminal, such that the codedinformation of the discount two-dimensional code includes the userinformation and the coupon information parsed from the coupontwo-dimensional code. The corresponding discount two-dimensional code isgenerated by the core server or its authorized party (authorizedbackground server, third-party generating device or mobile terminal)based on the currently latest coding rule. Particularly, parsing of thecoupon information may be performed by the mobile terminal, or obtainedafter parsing, by the core server, the coupon two-dimensional code sentby the mobile terminal thereto.

Besides, in another example, relevant operations of generating thediscount two-dimensional code may be combined with the example in aboveEmbodiment 2 where the mobile terminal sends a purchase request messagein the payment two-dimensional code form, e.g., when the mobile terminalsends the purchase request message to the core server, it also sends thecoupon information parsed out and the user information to the coreserver, such that the generated payment two-dimensional code alsoincludes the coupon information besides necessary information forcompleting the transaction; then, when the merchant identifies thepayment two-dimensional code sent from the mobile terminal, it maysettle the user consumption using the discount corresponding to thecoupon information, thereby completing commodity sale.

Supposing that in another embodiment, the procedures of performing othersteps are substantially identical to the embodiment above or its variedexamples, steps S304′˜S307′ are implemented based on the followingprocedures: the mobile terminal identifies the released two-dimensionalcode and sends request information for obtaining the coupon to thebackground server based on the information identified in thetwo-dimensional code. The background server receives the requestinformation, compares the sending time (receiving time) of the requestinformation with the time prescribed in the policy preset at thebackground server, and provides the coupon information with thecorresponding discount; for example, it is prescribed that 20% and 10%discount coupons are provided respectively for the identification timebefore 8:00 am and 9:00 am, and no coupon is provided for theidentification time after 9:00 am.

Supposing that in another embodiment, the procedures of performing othersteps are substantially identical to the embodiment above or its variedexamples, steps S304″˜S307″ are implemented based on the followingprocedures: the mobile terminal identifies the released two-dimensionalcode, obtains current location information of the mobile terminalthrough a built-in positioning module or other LBS way (LBS: LocationBased Service), and attach the location information to the requestinformation sent to the background server for obtaining the coupon. Thebackground server receives the request information, and compared thelocation information therein with the location information prescribed inthe policy at the background server and provides coupon information witha corresponding discount; for example, it is prescribed that coupon isprovided when the location information indicates that the mobileterminal is in a tariff-free zone when identifying or sending thepurchase request, while no coupon is provided when the locationinformation indicates that the mobile terminal is not in the tariff-freezone.

In another example, steps S304′″˜S307′″ are implemented based on thefollowing procedures: the mobile terminal identifies the releasedtwo-dimensional code and sends request information for obtaining thecoupon to the background server based on the information identified inthe two-dimensional code. The background receives the requestinformation, e.g., based on the base station used when the mobileterminal sends the request information, obtains, from a third party, thetime or location when the mobile terminal sends the request informationthrough interaction between the background server and the base station,such that the background server performs comparison and determinationbased on the time or location information, so as to providecorresponding coupon.

Embodiment 4

A plurality of examples of an information processing method based onuniform code issuing are provided, as shown in FIGS. 6A and 6B, whichmainly involve interactions between a core server, a background server,and at least two mobile terminals to thereby implement commodityrecommendation; other mobile terminal and a third-party server may beconfigured according to actual application scenarios.

In step S401, the background server provides a service of sellingcommodities; the background server sends a request to the core server torequest for obtaining a two-dimensional code corresponding to acommodity in sale.

In step S402, the core server, or a background server or a third-partygenerating device authorized by the core server, encodes commodityinformation of the commodity based on a currently latest coding rule andgenerates a first two-dimensional code corresponding to the commodityinformation.

In step S403, the background server obtains the first two-dimensionalcode of the commodity and releases it to various kinds of informationplatforms.

In step S405, the first mobile terminal shoots, through a cameratherein, the first two-dimensional code, and decodes the shot firsttwo-dimensional code to obtain coded information corresponding to thecommodity information, and may extract the commodity information fromthe background server based on the coded information and display it onthe display screen of the mobile terminal, for the user to view.

In step S405, the first mobile terminal as a commodity recommendingparty sends a request to the core server, requesting the core server ora party authorized thereby (e.g., a background server, a third-partygenerating device or the first mobile terminal, authorized by the coreserver) to generate a recommendation two-dimensional code (secondtwo-dimensional code) based on the currently latest coding rule, suchthat the content corresponding to the coded information of therecommendation two-dimensional code not only includes information aboutthe commodity in sale at the background server, but also includes userinformation of the first mobile terminal (for example, including theunique identification of the first mobile terminal), or may furtherinclude any other desired information (e.g., appraisals on the commodityby the first mobile terminal user, physical world peculiarities of thefirst mobile terminal user, attribute value of the first mobile terminaluser, etc.); therefore, the situation of the first mobile terminal as arecommending party has been closely related to the recommendationtwo-dimensional code, which, when needed, may be known to variousparties identifying the recommendation two-dimensional code.

To this end, the first mobile terminal may send the commodityinformation obtained by parsing, by itself, the first two-dimensionalcode, individually or together with the interactive information such asthe code-sending request above, to the core server; or, the first mobileterminal directly sends the first two-dimensional code to the coreserver, such that the core server or a device appointed thereby obtainsthe commodity information after parsing the first two-dimensional codefor generating the recommendation two-dimensional code. The userinformation of the first mobile terminal may be provided by the firstmobile terminal, independently or together with other interactiveinformation, to the core server before the interaction or during theinteraction process; or, the user information of the first mobileterminal may be obtained by the core server from other information aboutthe interaction with the first mobile terminal, or from the backgroundserver with which the first mobile terminal is registered, or from anyother third-party server.

In step S406, the first mobile terminal obtains the generatedrecommendation two-dimensional code and releases it to a placeaccessible to a user of the second mobile terminal, i.e., the user ofthe first mobile terminal performs commodity recommendation to the userof the second mobile terminal.

For example, the first mobile terminal (or the core server or thebackground server) releases the recommendation two-dimensional code tovarious information platforms; or, the first mobile terminal sends therecommendation two-dimensional code, or a page or other media (picture,multi-media, etc.) including the recommendation two-dimensional code,directly to the second mobile terminal via application tools of varioussocial networks; or, the first mobile terminal displays therecommendation two-dimensional code on its own screen, available for thecamera of the second mobile terminal to directly shoot and scan.

In step S407, the second mobile terminal identifies the recommendationcode and obtains therefrom the coded information corresponding to thecommodity information and the coded information corresponding to theuser information of the first mobile terminal.

In step S408, the second mobile terminal extracts the commodityinformation from the background server based on the coded informationand displays the commodity information on a display screen of the secondmobile terminal for the user to view. Whether to simultaneously displaythe user information of the first mobile terminal or other informationprovided thereby (e.g., appraisal information) is chosen according toneeds.

In step S409, if the user of the second mobile terminal is satisfiedwith the commodity recommended by the user of the first mobile terminal,he will send a purchase request message to the background server throughthe second mobile terminal. Relevant operations of the background servercompleting commodity sale may be implemented through the proceduresdescribed in the various foregoing embodiments.

The background server, when the commodity is sold, may know thepurchasing party of the commodity is the second mobile terminal and therecommending party of the commodity is the first mobile terminal. Thisexample does not limit the specific manner for the background server toobtain the user information of the first mobile terminal associated withthe recommendation two-dimensional code, e.g., whether the secondterminal sends the user information of the first mobile terminal parsedout thereby from the recommendation two-dimensional code, independentlyor together with the purchase request information, to the backgroundserver; or, the background server receives the recommendationtwo-dimensional code and autonomously parses it to obtain the userinformation of the first mobile terminal; or, the background serverobtains the user information of the first mobile terminal that requests,when processing the purchase request information, for generating therecommendation two-dimensional code from the information residing at thecore server due to querying the core server for generating therecommendation two-dimensional code; or, to obtain the recommendationtwo-dimensional code, the first mobile terminal provides the userinformation to the core server, and the first mobile terminal or thecore server simultaneously provides the user information of the firstmobile terminal to the background server.

In step S410, based on the fact that the first mobile terminal userrecommends the commodity to other user, the background server calculatesa recommendation commission based on a preset commission rule, sends acommission message to the first mobile terminal, and displays it on thedisplay screen of the first mobile terminal to notify it to the user.

In step S411, the core server adjusts corresponding attributes in theaccount corresponding to the first mobile terminal or its user (and/orthe background server, the second mobile terminal or its user) based onthe fact that the first mobile terminal user recommends the commodity toother users. The attribute adjustment operation implemented by thesecond core server as to the deal being made between the second mobileterminal and the background server may refer to the description in theforegoing embodiments.

As another example, the specific operation of the background servercalculating the recommendation commission for the first mobile terminalmay be implemented after step S411 of completing the attributeadjustment of the first mobile terminal; for example, the backgroundserver queries from the core server that the first mobile terminal orits user is practicing recommendation and obtains the adjusted attributestate, and then calculates the recommendation commission for the firstmobile terminal based on the latest attribute state.

Based on different commission rules as set, the background may grant thecommission to the first mobile terminal after the second mobile terminalactually completes the purchase transaction according to therecommendation; or the background server will grant the commission tothe first mobile terminal as long as the first mobile terminalimplements the recommendation operation (e.g., the first mobile terminalsends the recommendation two-dimensional code and meanwhile notifies thebackground server; or when the second mobile terminal identifies therecommendation two-dimensional code and extracts commodity informationfor viewing, the background server knows that the first mobile terminalimplements the recommendation operation).

As shown in FIG. 7 , the first mobile terminal, by identifying the firsttwo-dimensional code or the recommendation two-dimensional code, and thesecond mobile terminal, by identifying the first two-dimensional code orthe recommendation two-dimensional code, may interact with thebackground server to complete the commodity purchase deal, and obtainsthe transaction rewards granted by the background server based on thereward rules; the core server receiving the notification performscorresponding attribute value adjustment.

Or, the background serve has already sent the rules for reward andcommission to the core server (e.g., when requesting for generating thefirst two-dimensional code, or separately sending); then, based on thenotification of transaction completion and/or recommendation operationimplementation sent by the background server (or the first mobileterminal/second mobile terminal) to the core server, the core servercalculates the corresponding transaction reward/recommendationcommission, and grants them to the corresponding users. The forms oftransaction reward or recommendation commission are not limited, whichmay be in the form of digital currency or real currency or attributevalue adjustment or any other agreed form; the transaction reward orrecommendation commission may act as one attribute of the user, which isdirectly adjusted by the core server in the user account and notified tothe corresponding users.

The present embodiment is not limited to only one recommending party oronly generating the recommendation two-dimensional code once or onlyperforming one-to-one recommendation. Dependent on actual differentapplication scenarios, there may be a plurality of recommending parties,each of which may generate new recommendation two-dimensional codes formultiple times; after implementing the recommendation or success of thecommodity purchase, the background server calculates the commissions forrespective recommending parties or respective times of recommendationbased on a preset commission rule, and the core server correspondinglyperforms attribute adjustment. In different examples, based on differentrules, it may be set that the commission for each of multiple times ofrecommendation is identical, or further taking the recommendation timesas a reference item (the times are superimposed in the recommendationtwo-dimensional code or recorded by the core server), so as to providerelatively more commission to the next recommendation of therecommending party that recommends more times, etc.

Suppose there are three mobile terminals, wherein the first mobileterminal requests the core server to generate a recommendationtwo-dimensional code to be sent to the second mobile terminal and thethird mobile terminal, respectively; the second and third mobileterminals have different physical world peculiarities when identifyingthe recommendation two-dimensional code and thus obtain differentservices from the background server, and based on the preset commissionrules, the background server may grant different commissions to thefirst terminal in consideration of the situation that the first mobileterminal recommends to the second and third mobile terminals and finallyprovides different services, and the core server provides attributeadjustments with different values. Or, the peculiarities of the firstmobile terminal when sending the recommendation two-dimensional code tothe second mobile terminal are different from the peculiarities thereofwhen sending the recommendation two-dimensional codes to the thirdmobile terminal, then on this basis, the background server may providedifferent commissions to the first mobile terminal, and the core serverprovides attribute adjustment with different values. Or, the userinformation provided when the first mobile terminal requests the coreserver for generating the first recommendation two-dimensional codeincludes one peculiarity of the first mobile terminal, and the userinformation provided when requesting for generating the secondrecommendation two-dimensional code includes another peculiarity of thefirst mobile terminal, wherein the first recommendation two-dimensionalcode is sent to the second mobile terminal, and the secondrecommendation two-dimensional code is sent to the third mobileterminal; then on this basis, the background server may providedifferent services corresponding to different peculiarities to thesecond and third mobile terminals, and may also provide differentcommissions corresponding to different peculiarities to the first mobileterminal; and the core server provides attribute adjustment withdifferent values. The various embodiments above may be further extendedto a scenario where one recommending party (referring to the firstmobile terminal) performs multi-party/multi-time recommendations to morethan three users.

Further supposing another scenario with three mobile terminals, thefirst mobile requests the core server for generating the firstrecommendation two-dimensional code, including coded informationcorresponding to the commodity information and the user information ofthe first mobile terminal user, and the first mobile terminal as a firstlevel of recommending party sends the first recommendationtwo-dimensional code to the second mobile terminal. The second mobileterminal identifies the first recommendation two-dimensional code toobtain the corresponding relevant information mentioned above, requeststhe core server for generating a second recommendation two-dimensionalcode, including coded information corresponding to the commodityinformation and the user information of the first mobile terminal userand the second mobile terminal user; and the second mobile terminal as asecond level of recommending party sends the second recommendationtwo-dimensional code to the third mobile terminal. The third mobileterminal identifies the second recommendation two-dimensional code toobtain the corresponding relevant information as mentioned above(including the commodity information and the user information of thefirst and the second mobile terminals), and finally interacts with thebackground server to complete the transaction. The background servergrants, in consideration of the respective recommendation operationsimplemented by the first and second mobile terminals, differentcommissions matching their recommendation levels; and supposing thesecond mobile terminal further interacts with the background serverbased on the first recommendation two-dimensional code to complete thetransaction, then the first mobile terminal may not only obtain thecommission regarding its direct recommendation to the second mobileterminal, but also may obtain the commission regarding its indirectrecommendation to the third mobile terminal. Moreover, each level ofrecommendation two-dimensional code may refer to the foregoing operationfor multi-party/multi-time recommendations.

Of course, because the core server has records of user informationregarding the requests for generating each level of two-dimensionalcodes, and the background server and/or the core server also haverecords for each step of the transaction process, the transactionobjects, and recommending parties, the recommendation two-dimensionalcodes may only include the information of the recommending parties fordirect recommendation (e.g., the second recommendation code may onlyinclude commodity information and the user information of the secondmobile terminal, without the user information for the first mobileterminal); or even the recommendation two-dimensional codes may notinclude information regarding the recommending parties; instead, thebackground server knows the user information of the each level ofrecommending party corresponding to the recommendation two-dimensionalcode based on its own records or based on the records at the coreserver, such that the background server directly grants commissions tothe recommending parties of direction recommendation (e.g., the secondmobile terminal), or grants commissions to recommending parties of bothdirect recommendation and indirect recommendation (e.g., the first andsecond mobile terminals) based on the preset commission rules.

Various embodiments above may be further extended to a scenario withmulti-level recommending parties, namely, each user knowing theservice-related information provided by the background server (e.g.,obtaining the service information by ways of knowing from the backgroundserver, or knowing by scanning the two-dimensional node from theinformation releasing platform, or knowing from recommendation by otherusers) may interact with the background server to obtain services, oracts as a recommending party to request, through the mobile terminal,the core server for generating a recommendation two-dimensional codewhich superimposes the user information of the recommending party per seonto the service information, and releases the superimposedrecommendation two-dimensional code to the external. The user receivingthe recommendation two-dimensional code may interact with the backgroundserver to obtain the service based on the service information therein,or acts as a next level of recommending part to request the core serverto generate a next-level recommendation two-dimensional code whichsuperimposes at least the user information of the next-levelrecommending party per se onto the service information, and releases thesuperimposed recommendation two-dimensional code to the external forrecommendation. Then, for example, respective parties of generatingrespective levels of recommendation two-dimensional codes, respectiveparties releasing the respective levels of recommendationtwo-dimensional codes, respective parties identifying the respectivelevels of recommendation two-dimensional codes, and respective partiesinteracting with the identifying parties, may all know, where needed,the situations of respective users acting as a certain level ofrecommending party; if needed, they may also know for example theinformation of the preceding level of direct recommending user or theinformation of several preceding levels of recommending users based onthe content included in the recommendation two-dimensional code or thecontents recorded when querying the core server or the backgroundserver, so as to facilitate the background server to grant correspondingcommissions to each level of recommending parties. The background servermay set corresponding percentages so as to allocate the commissions tomultiple levels of recommending parties involved in a successfultransaction by percentages.

The core server may know, based on a similar method of commissiongranting by the background server, the user information of eachrecommending party in multiple times of recommendations or multiplelevels of recommendations, the recommendation operation implementedthereby, whether the transaction is successful after the direct orindirect recommendation, and corresponding attribute adjustment made bythe core server in the accounts of respective recommending parties orrespective interacting parties; the core server may set different weightindexes (corresponding examples will be specifically describedhereinafter) for recommendation levels of respective parties, differentrecommendation operations, recommendation times, whether the transactionis successful, times of purchase after successful recommendation, andvarious other situations, and perform matching attribute adjustmentsbased on weight indexes; the adjusted attribute states may furtherbecome one reference basis for the background server to grantcommissions for this time or for next time.

A plurality of methods according to this embodiment may provide a newsales channel for all-people direct sale and statistical parsing ofcorresponding sales conditions. Any person, e.g., a start endorsing acommodity, a Weibo administrator, or an ordinary person who browses awebpage and finds a commodity, may perform recommendation only byidentifying, through his/her own mobile terminal or other smart devices,a one-time generated two-dimensional code for the commodity, generatinga secondary two-dimensional code through the core server or a partyauthorized by the core server, and then widely releasing the secondarilygenerated two-dimensional code. For another example, various kinds ofinformation releasing platforms that release the two-dimensional code orother background server or a third-party server, may also act as arecommending party in a certain level thereof, to request for generatinga secondary two-dimensional code and then release it to obtainrecommendation commissions. Any generated recommendation two-dimensionalcode is at least superimposed (or at least corresponding to in thestorage records of the background server or core server) with the userinformation of a recommending party so as to uniquely bind andcorrespond the recommendation two-dimensional code to the user of therecommending party or his/her mobile terminal. Therefore, after thecommodity is purchased by other person, user information of therecommending party will be extracted for each time of purchase forcalculating the commissions granted to the recommending party andfacilitating corresponding to attribute adjustment.

Embodiment 5

In this embodiment, a plurality of examples of an information processingmethod based on uniform code issuing are provided, which mainly involvesa core server, a first background server providing services relatedcommodity sale, a second background serve providing services related toa social network platform, a mobile terminal of a first user, and one ormore other user's mobile terminal in the social network platform,interactions between the above implement a solution of SNS (socialnetwork service) search; other mobile terminal, other background server,and other third-party server may be configured according to actualapplication scenarios.

The first background server requests, as to the commodity it sells, thecore server to obtain a promotion two-dimensional code corresponding tothe commodity information and then releases the promotiontwo-dimensional code (procedures of generating and releasing thepromotion two-dimensional code may refer to the descriptions in theabove various embodiments).

The first user is a registered user of the second background server,such that the first user may use social network platform-relatedservices provided by the second background server for informationinteraction with other registered users of the second background server.Each user in the social network platform may further establish one ormore friend circles, and thus may group other users in the friendscircles to perform a more private and pertinent communicationinteraction.

The first user identifies the promotion two-dimensional code through themobile terminal to extract corresponding commodity information forviewing and wishes to further obtain other users' appraisals on thecommodity. To this end, the mobile terminal of the first user sends anSNS search request to the second background server, and the first usersubmits a topic (e.g., including the name and model and the like of thecommodity to be searched) to the second background server through theSNS search request, asking the second background server to perform SNSsearch in the social network platform.

The second server receives the SNS search request and searches at leastin the information released by other users through the social networkplatform based on keywords extracted from the topic, sorts the found SNSsearch results and pushes the results to the mobile terminal of thefirst user. The SNS search results are displayed on the mobile terminalscreen of the first user such that the first user has a furtherunderstanding of the condition of the commodity; then, the first usermay interact with the first background server based on the promotiontwo-dimensional code and complete the transaction to obtain thecommodity sold at the first background server (similar process ofinteracting with the first background server may refer to thedescriptions in the above various embodiments).

In this example, there is no limitation on the information that isreleased by other users (for ease of depiction, referred to as peerusers) of the second background server through the social networkplatform and available for SNS search: which may be the contentspromptly posted by peer users in reply to this topic, or the contentsoriginally posted by peer users and residing on the social networkplatform or the contents stored by the second background server: forexample, contents previously posted by peer users in reply to othersimilar topics, or contents posted by peer users on their personal homepage of the social network platform, or messages posted on home pages ofother person, or contents directly sent by peer users to others throughthe social network platform.

Respective user (when acting as a peer user) may send a message to thesecond background server to set rights for the open degree or disclosurescope of various information released by the user: for example, decidingwhether to allow using certain information released thereby for SNSsearch; or, deciding that certain information released thereby is onlyfound for SNS search within a set scope, while cannot be found beyondthe set scope. There is no limitation on the form of the set scope. Thefollowing examples are provided for reference: for example, limiting thesurvival time of the released information, such that only the releasedinformation within the survival time may be found through SNS search;for another example, limiting the identity, or a value of a certainattribute, or a physical world peculiarity of the user that issues anSNS search request, or limiting the search open only to users a certainattribute value of whom reaches a specific level or a specific scope, oronly to associated users (e.g., users within the friend circle, userspreviously having interactions), or only to users that issue the SNSsearch request from a certain location through a certain device, whilenot open to other users issuing the SNS search request; for anotherexample, limiting the contents of the topics for SNS search, such thatthe released contents are open only to some topics for SNS search, whilenot open for other topics, etc.

Respective users of the second background server (when acting as thefirst user initiating an SNS search request) may also set rights for thescope it wishes to search or the search results it wishes to receive,e.g., limiting the time of information release, or only taking theinformation released within a certain period (e.g., within one month,one year, etc.) as the search source, which may help to exclude too oldinformation; for another example, limiting the identity, or attributevalue, or physical world peculiarity of a peer user who releasesinformation, and only taking the following as the search source: thecontents released by an associated user, or a peer user whose attributevalue reaches a certain level, or the contents released only from acertain location or through a certain device, or the contents releasedby only peer users who satisfy a preset condition (e.g., a userproviding a voucher to the background server to prove that he hasactually purchased the commodity), so as not to search from the contentsreleased by other users.

setting of the rights above do not affect normal use and disseminationof the information released by users on the social network platform. Thesecond background server rules out the search sources or search resultsthat do not meet the preset scope based on the rights. The operation ofthe second background server sorting the SNS search results may refer toproviding SNS search results to the first user based on matching degreesof keywords, or in the case of having no completely matching keywords,further obtaining similar keywords by association to perform SNS searchand then pushing the results to the first user (e.g., when matchingcontents cannot be found based on commodity name and model,automatically searching based on manufacturer name and similar model ofthe commodity), or if the matching contents cannot be found in thesocial network platform, searching with a larger scope in the Internet,etc.

The first user may become a registered user of the social networkplatform of the second background server prior to interaction or duringthe interaction process based on the manners described above in thevarious embodiments to thereby send an SNS search request to the secondbackground server; supposing that the first user is a registered userfor a plurality of social network platforms, respectively, it may selecteither logging on any one thereof or logging on the plurality of socialnetwork platforms, respectively, to send the SNS search request to thecorresponding background server, through the mobile terminal.

In some other examples, the coded information of a link address for thesecond background server to receive the SNS search request may befurther included in the promotion two-dimensional code corresponding tothe commodity information released by the first background server; then,the mobile terminal of the first user may know the link address afteridentifying the promotion two-dimensional code, and the SNS searchrequest sent will also be directly redirected to the link address, suchthat the first background appoints a specific social network platformwhich receives the SNS search request, namely, the operation of thefirst user sending the SNS search request is bound to the social networkplatform of the second background server; this may effectively preventthe first users from turning to other social network platforms when thefirst background server and the second background server belong to thesame operator.

In another example, the first user obtains the commodity information(and/or receives the link address information of the SNS search request)not by identifying the promotion two-dimensional code released by thefirst background server; instead, it obtains the relevant information byidentifying the recommendation two-dimensional code released by otherusers thereto, where information of the recommending user is furthersuperimposed, based on the commodity information, in the recommendationtwo-dimensional code generated by the core server at the request of therecommending user. Further supposing that the recommendation user may bea registered user of the social network platform of the secondbackground server and sends the recommendation two-dimensional code tothe first user based on the social network platform, then therecommendation two-dimensional code received by the first user may alsoinclude corresponding coded information of the link address of thesecond background server for receiving the SNS search request, so as todesignate that searching with respect to the SNS search request from thefirst user received by the second background server is performed on thesocial network platform of the second background server. The codedinformation of the link address may be added when the recommending userrequests the core server to generate the recommendation two-dimensionalcode, or may be added when the second background server requests thecore server to further impose the link address based on the codedinformation included in the first recommendation two-dimensional code toform the second recommendation code, for the social network platform tocomplete the recommendation two-dimensional code forwarding operation,which thereby prevents loss of the first user to other social networkplatforms.

In different application scenarios, a background server with morepowerful functions may be provided, which may simultaneously cover thecommodity-selling services of the first background server and theservices of the second background server of maintaining the socialnetwork platform and implementing SNS search. Or, upon receiving the SNSsearch request from the first user, the second background serverforwards it to the third-party server to perform a specific searchoperation; and then the second background server obtains the results ofSNS search from the third-party server and pushes them to the firstuser.

Besides, the core server knows relevant operations of respective partiesduring the SNS search process, and performs corresponding attributeadjustment in the accounts of such as the second background server thatcompletes the SNS search, the first user that initiates the SNS searchrequest, the peer user the information released by whom is adopted bythe SNS search, and the recommending user that releases therecommendation two-dimensional code, etc. The first background serverand/or the second background server may provide more pertinent services(e.g., enjoying a larger discount when providing services, or promotingthe user's level in the social network platform) based on the user'sattribute state. The attribute state of a certain user may also be onebasis for other person sets reception rights with respect to thecontents released by the certain user upon SNS search, or for the secondbackground server adopts the contents released by the certain user aseffective SNS search results.

The process of the embodiment will be illustrated through a specificexample of ordering at a restaurant, as shown in FIGS. 8A and 8B:

In step S501, a customer enters a restaurant; autonomously or remindedby a waiter, the consumer uses a mobile phone to identify thetwo-dimensional code on a table, where coded information correspondingto the two-dimensional code includes information of the first backgroundserver and a request instruction for initiating an SNS search query. Thetwo-dimensional code is generated by the core server or a partyauthorized thereby according to a set coding rule.

In step 502, the consumer opens the camera in the mobile phone to shootthe two-dimensional code and obtains the address and relevant parametersof the first background server through a decoder and an encodedinformation parsing unit in the mobile phone hardware entity, to therebyaccess the first background server.

In step S503, it may be determined whether a decoding client softwarecorresponding to the coding rule of the two-dimensional code isinstalled in the mobile phone; if the software is not installed, thedecoding client software is downloaded and installed; then, theparameters included in the parsed two-dimensional code are imported inthe automatically booted client software; if the software has beeninstalled, the parameters included in the parsed two-dimensional codeare directly imported in the automatically booted client software; orthe service corresponding to the two-dimensional code is directlyidentified; if it is the two-dimensional code corresponding to theservice provided by the first background server, the mobile phone willbe hooked to a set webpage or hooked to no webpage (it may be the casethat only ERROR information is prompted on the screen, notifying theuser that a wrong two-dimensional code is scanned, please scan a correcttwo-dimensional code, etc.). In different application scenarios, thisstep may be optional.

In step S504, the menu of the restaurant is presented on the mobilephone (the client software opened) of the consumer, the menu beingcoded, read and presented according to the set coding rule of thetwo-dimensional code. A request for SNS search query may be initiatedfor each dish in the menu, that is, requesting the second backgroundserver to query, in the friend circle of the consumer's social networkplatform, whether there are friends who have appraised the dish qualityof the menu/the restaurant; supposing searching in the search scope setby the consumer, if no appraisals have been posted in the first tier offriend circle (i.e., friends directly associated with the consumer),then the search goes to the second tier of friend circle (friends of theconsumer's friends) to search whether there are friends having postedappraisals; so on and so forth, search is conducted in a plurality oftiers of friend circles to obtain appraisals.

In step S505, when sending the found appraisals to the consumer's mobilephone, the second background server may also notify the consumer of a“appraiser index” of the appraisal poster such that the consumer has anunderstanding of the credibility degree of the appraisal.

As a user attribute, the “appraiser index” may be given, throughcalculation, by the core server or the second background server based onthe appraiser's relevant operations or other attributes, and recorded inthe account of the appraisal poster. Dependent on different settingpolicies or rules, the operation of calculating the “appraiser index”may have a plurality of manners or a combination of a plurality ofmanners: for example, the times of extracting menus or ordering from thefirst background server when the appraisal poster scans two-dimensionalcodes represents the times for him to patronize the restaurant or thetimes of successful consumption; it may be set that more times maycorrespond to getting a higher index value; for another example, it maybe set that the more times the appraisals posted by the appraiser insimilar topics are adopted as valid SNS search results, the higher indexvalue he gets correspondingly, etc.

Preferably, the appraising operation may be limited or the SNS searchresults may be screened based on LBS (location-based services) or otherphysical world peculiarities. For example, the appraisals can only bemade after the client software on the appraiser's mobile phone hasscanned the two-dimensional code in the restaurant or successfullyordered based on the two-dimensional code (for example, when the mobilephone of the appraiser is interacting with the corresponding backgroundserver, the location information of the mobile phone or the voucher ofsuccessful deal are also sent to determine whether the prescribedrequirements for appraisals are met). Further, the appraisal may beassociated with the appraiser's mobile phone, thereby avoiding massinvalid appraisals. The appraisal may be found by corresponding SNSsearch based on the appraiser's index and his settings about the opendegree and scope for the appraisal; meanwhile, the appraisal released bythe appraiser may reside on the personal home page or friend circle ofthe appraiser and may be disseminated based on the original means of thesocial network platform.

In step S506, after referring to the appraisals, the consumer may orderthe preferred dishes on the menu and send order information to thewaiter's mobile phone/the restaurant's service terminal deviceassociated with the two-dimensional code, including the dishes ordered,desk number, time, etc.; the waiter's mobile phone/the restaurant'sservice terminal device directly receives the order information orreceives the order information forwarded by the first background serverthrough the client software or an SMS message or other way, to providecorresponding services to the consumer.

Preferably, the menu presented on the consumer's mobile phone may alsoinclude a link to obtain a coupon, and after the link is clicked, acoupon two-dimensional code including coupon information is sent to theconsumer's mobile phone. Further, when sending the request for obtainingthe coupon two-dimensional code, the consumer's mobile phone providesthe current time and address, and then the generated coupontwo-dimensional code includes discounts corresponding to the requestedtime and address; the client software in the waiter's mobile phone scansand verifies the coupon two-dimensional code in the consumer's mobilephone, such that the consumer may consume using the discount provided bythe coupon. Of course, the manner of getting the coupon is not limitedthereto, which is not limited in the present disclosure.

In step S507, the consumer may, as a new appraiser, post a appraisalunder a menu presented through the client software in the mobile phoneor post the appraisal on the friend circle or other page on the socialplatform, and may set the open degree and scope for the appraisal, anddetermine whether the appraisal may be presented by the secondbackground server to other users initiating the SNS search request.

In step S508, the second background server calculates a correspondingappraiser index for the consumer posting the appraisal, as a referencefor adopting the appraisal as a valid SNS search result or as areference for granting rewards to the consumer.

This embodiment enables the SNS search and quantified recommendationwith respect to the consumer's understanding of the merchant's menu.Further, the requesting party for the SNS search may have a detailedunderstanding regarding the services provided by the merchant from thecontents posted in the friend circle; while the appraiser posting theappraisals may not only express his own preferences, but also may helpfriends through the social network platform, and meanwhile get rewardsfrom the merchant, which is finally embodied on the adjustment ofvarious attribute values such as his personal appraiser index.

Embodiment 6

This embodiment provides a plurality of examples of an informationprocessing method based on uniform code issuing to implement a solutionof SNS (Social Network Service) help seeking, wherein configurations ofa core server, a first background server, a second background server, afirst user's mobile terminal, and a peer user's mobile terminal asinvolved, may refer to Embodiment 5, and various features described inEmbodiment may be applied to this embodiment, vice versa; besides, theoperations of the SNS help seeking and the SNS search initiated by theusers do not conflict. Other mobile terminals, other background servers,and other third-party servers may be configured based on actualapplications.

The first background server requests, as to the commodity it sells, thecore server to obtain a promotion two-dimensional code corresponding tothe commodity information and then releases the promotiontwo-dimensional code. The first user is a registered user of the secondbackground server, such that the first user may use social networkplatform-related services provided by the second background server forinformation interaction with other registered users of the secondbackground server or the friends in his friend circle.

The first user identifies the promotion two-dimensional codecorresponding to the commodity information through the mobile terminalto extract corresponding commodity information for viewing and wishes tofurther obtain the appraisals on the commodity posted by users(particularly the friends in his friend circle) in the social networkplatform. To this end, the mobile terminal of the first user sends anSNS help seeking request to the second background server, i.e.,submitting a topic (e.g., including the name and model and the like ofthe commodity to be searched, and notes that the user needs to know) tothe second background server through the SNS help seeking request,inviting users (for ease of depiction, referred to as peer users) in thesocial network platform who receive the topic forwarded by the secondbackground server to reply to the topic. The coded information of thepromotion two-dimensional code released by the first background servermay further includes a link address of the second background serverappointed to receive the SNS help seeking request, such that the firstuser directly sends the SNS help seeking request to the appointed secondbackground server.

The appraisal information provided by a peer user receiving the topicwith respect to the involved commodity may be searched on its own, andmay also be directly sent to the first user through variousdissemination manners (private messages, left messages, SMS messages,etc.) or posted on the page of the first user, or superimposed by thesecond background server to its returned information with respect to theSNS help seeking request and forwarded to the first user. A result ofthe SNS help seeking is displayed on the mobile terminal screen of thefirst user, such that the first user has a further understanding of theconditions of the commodity. Afterwards, the first user may interactwith the first background server based on the promotion two-dimensionalcode and completes the transaction to obtain the commodity sold at thefirst background server. The second background server or the core servercalculates a value of a corresponding attribute such as a appraiservalue for a peer user replying to the topic, and records the value inthe account of the peer user; the first background server or the secondbackground server may query the index to grant a corresponding reward,e.g., granting a recommendation commission.

Particularly, respective user (when acting as the first user initiatingthe SNS help seeking) may also send a message to the second backgroundserver to set rights for the open degree and scope of the help seekingso as to limit the identity and physical world peculiarities and thelike of the users intended to reply to the topic: asking the secondbackground server to send, after querying the corresponding user states,the topic of SNS help seeking, to all users in an online state, or onlysend, after querying the user's friend association conditions, the topicto friends in the first and second tiers of friend circles, or onlysend, after comparing location information, the topic to users with adistance from the initiator's actual geographical position not exceedinga set distance. Moreover, the user may also set rights to the contentsand physical world peculiarities when replying to the topic fed backfrom the second background server, e.g., screening the replies with somekeywords, screening the replies sent later than a certain time, etc. Thesecond background server will then rule out the reply results beyond thescope of the set rights.

Besides, respective user (when acting as a peer user) may send a messageto the second background server to set rights for the open degree oropen scope as to whether the user is willing to receive the SNS helpseeking request initiated by other persons: for example, allowing orscreening all SNS help seeking requests, or only receiving the SNS helpseeking requests initiated by associated users (e.g., the friends in hisfriend circle or friends in his second tier of friend circle, or usershaving interactions). The user may limit, by setting rights, theidentity, or a value of a certain attribute, or a physical worldpeculiarity of the user initiating the SNS help seeking request, and mayalso limit the content of the topic of SNS help seeking and the physicalworld peculiarities involved upon initiation, so as to receive the SNShelp seeking request satisfying the set rights. The second backgroundserver will then rule out the help seeking requests beyond the scope ofthe set rights. If necessary, the user may also ask the secondbackground server to also send relevant auxiliary information (e.g.,user information of the topic initiator, physical world peculiaritiesinvolved with the topic or its initiator) when sending the topic of theSNS help seeking request thereto; the user views the auxiliaryinformation to determine whether it is necessary to reply to thereceived SNS help seeking.

A peer user replying to the topic may act as a referral to ask the coreserver or a party authorized by the core server to generate arecommendation two-dimensional code with coded information includingsuch as commodity information, user information of the peer user, andhis appraisals on the commodity, and send the recommendationtwo-dimensional code to the first user as a reply to the topic, orrelease it to other users for commodity recommendation (relevantexamples of commodity recommendation may refer to depictions in thevarious embodiments above).

In another example, the first user obtains the corresponding commodityinformation and referral information by identifying the recommendationtwo-dimensional code released thereto by other person. The first usermay directly send the SNS help seeking request to the referral based onthe recommendation two-dimensional code; then the recommendationtwo-dimensional code may further include a link address for the secondbackground server of the social network platform where the referral islocated to receive the SNS help seeking request. The SNS help seekingrequest received by the second background server further includesidentification information of the referral, so as to accurately send therequest to the corresponding referral to reply.

The core server knows relevant operations of respective parties duringthe SNS help seeking process, and performs corresponding attributeadjustment in the accounts of such as the second background server thatcompletes the SNS help seeking, the first user that initiates the SNShelp seeking request, the peer user replying to the SNS help seeking,and the recommending user that releases the recommendationtwo-dimensional code, etc. The first background server and/or the secondbackground server may provide more pertinent services (e.g., providing alarger discount when services are provided, providing awardedcommissions or promoting the user's level in the social networkplatform) based on the user's attribute state. Further, an attributestate of a certain user may also be a reference basis for setting rightswhen initiating or receiving the SNS help seeking.

As shown in FIGS. 9A and 9B, the process of the embodiment will beillustrated with another specific example of ordering from a restaurant.After performing operations similar to steps S501˜S503, in step S601,the menu of the restaurant may be presented through the mobile phone ofthe first user, the menu being coded, read, and presented according to aset coding rule for two-dimensional codes The SNS help seeking requestmay be initiated for each dish in the menu, i.e., requesting thebackground server to invite friends, of the consumer in the first tosecond tiers of friend circles on the social network platform, to postappraisals on the dish quality of the menu/the restaurant. In step S602,the peer user receiving the SNS help seeking request obtains therestaurant or dishes involved in the topic, further query theinformation of the initiating user presented thereto by the backgroundserver to verify the identity of the peer user, and the peer user, afterproviding the appraisal information about the corresponding restaurantor dishes, sends the appraisal information to the background server. Instep S603, the background server forwards the appraisals replied by thepeer user to the mobile phone of the consumer (initiating user) andmeanwhile notifies the consumer of the peer user's “appraiser index” orother attributes allowed to be open by the peer user, for the consumer'sreference.

Afterwards, the consumer may order according to the operation in stepS506 and posts his appraisals according to the operation of step S507for other persons to query and use when initiating the SNS search, orsends a recommendation two-dimensional code including the information ofthe restaurant/dishes, the information of the consumer as a referral, torecommend to other persons, or as described in step S508, the backgroundserver or the core server adjusts and records the corresponding indexesof the consumer and its peer user. For example, the background servermay also record conditions that the consumer has scanned thetwo-dimensional code at the restaurant or completed the transaction,such that when other users initiate a request for SNS search or SNS helpseeking later, the consumer's appraisals will be searched in priority,or an invitation for replying to the topic is initiated to the consumerin priority.

The request for SNS search or the request for SNS help seeking submittedby the mobile terminal of the consumer to the social network platformmay be implemented in coordination. For example, the consumer may firstperform operations similar to steps S501˜S505 to present, on the mobilephone of the consumer, the appraisal result returned after performingSNS search with respect to a certain dish, and the appraiser index ofthe appraisal poster. Then, the consumer may select several appraiserswith the highest appraiser indexes, and further sends an SNS helpseeking request to the background server, requesting the backgroundserver to send a topic to these selected appraisers to invite them tointroduce a certain dish in detail. The appraisers receiving theinvitation may post appraisals on this topic and reply to the consumer,or screen the invitation based on the rights they set. Similarly, theconsumer may set corresponding keywords in the appraisal resultsreturned from the SNS help seeking to form a new topic, requesting thebackground server to perform SNS search in a larger scope of userpopulation based on the new topic.

Besides, in another example, supposing that when the consumer presentsthe menu through a specific client software in the mobile terminal andinitiates an SNS search and/or an SNS help seeking request or anordering request with respect to a certain dish, a party (e.g., otheruser/a background server of the social network/the service terminaldevice of the restaurant, etc.) receiving the corresponding requestknows the consumer's interest in the dish and then further pushes othercommodity or service related to the dish to the consumer, e.g., if thedish of interest is fatty meat, pushes him an insurance for fatty liverdiseases; the pushed content is correspondingly matched according tosome physical world peculiarities or a combination of the peculiaritiesof the consumer. The consumer may buy an insurance based on the pushedmessage or recommend the insurance-related content to other users, andis awarded for the recommendation based on a condition that any level ofperson to whom the insurance is recommended in the dissemination chainsuccessfully buys the insurance, which is embodied to adjustment of therecommendation index of the consumer.

Embodiment 7

A plurality of examples of an information processing method based onuniform code issuing are provided in this embodiment, as shown in FIG.10 , which mainly involve interactions between a core server, aplurality of background servers respectively having a different motif,and a mobile terminal of a user having a plurality of identities (IDs);other mobile terminal and other third-party server may be configuredaccording to actual application scenarios. The interaction mentioned inthe above or the following other examples may refer to an interactionbetween one of the plurality of background server in this embodimentand/or the user or one of a plurality of IDs of the mobile terminal.

The user registers to become a registered user of the background serverfor a corresponding motif using one or more IDs; one mobile terminal ofthe user may only correspond to one ID of the user, and may alsocorrespond to a plurality of Ids of the user and may implement switchingbetween these Ids as needed; one ID of the user may also log ondifferent mobile terminals to implement interaction with a correspondingbackground server. The process in which the user, with any ID, interactswith the background for any corresponding motif through the mobileterminal may refer to the descriptions in various embodiments above.

Hereinafter, illustration will be made with an example where the coreserver correspondingly sets an attribute account for each user (forexample, it may be required to register with the core server with a realname or a unique ID such as the ID number, such that each user only hasa corresponding one attribute account; but it is not limited that inother examples, one user may have a plurality of corresponding attributeaccounts). An attribute account correspondingly includes a plurality ofattributes, wherein each attribute in some attributes correspondinglyincludes a plurality of topic items which correspond to a plurality oftopics; the core server knows that one or more IDs of the user or one ormore Ids are respectively associated with a plurality of topics (e.g.,the user or the corresponding background server notifies the associationto the core server), such that the core server may adjust the attributevalue under the corresponding topic item in the attribute account withrespect to the operation that is performed by the user with a certain IDand meets a set attribute adjustment condition (this may refer to thevarious embodiments above, for example, including, but not limited to,interactive operations with a background server for a correspondingtopic, and/or a recommendation operation of generating a recommendationtwo-dimensional code superimposed with the user ID and recommending toother persons, an operation of replying to the SNS search request or SNShelp seeking request, etc.). The core server may set correspondingweight indexes for different topic items (corresponding to differenttopics) to calculate matching attribute adjustment values. For example,for the same kind of operations performed by the user under differentmotifs with a certain ID, the core server may obtain different valuesfor adjusting the corresponding attributes after calculating based onthe weight index of the topic.

In some other examples, besides for different motifs, correspondingweight indexes may also be set for other matters, e.g., correspondingweight indexes may be set for different operations performed by theuser, or corresponding weight indexes may be set for different physicalworld peculiarities when the user performs the same kind of operations.Attribute values may be separately calculated based on the weight indexof a matter: for example, adjustment values for corresponding attributesmay be obtained after calculating different operations of the user underthe same motif based on the weight indexes set for the operations.Attribute values calculated based on the weight indexes of a pluralityof matters may also be calculated in combination: for example, a certainoperation of the user may be first calculated based on a first weightindex corresponding to the different operations, then calculated basedon a second weight index corresponding to the physical worldpeculiarities when performing the operation, and then calculated basedon a third weight index corresponding to different motifs with respectto the motif corresponding to the user ID performing the operation, andfinally obtaining the adjustment value of the corresponding attribute.

Hereinafter, a specific example will be provided to illustrate thesolution of this embodiment: setting that a user DM1 has a plurality ofIds based on a plurality of specific motifs, e.g., WeChat ID=WECHAT1,WeiboID=WEIBO1, and MOMOID=MOMO1. WeChat, Weibo, and MoMo maintaindifferent social network platforms through their respective backgroundservers, corresponding to three different motifs having an SMS releaseand dissemination functions in this example; they generate, through acore server or an authorized party, two-dimensional codes correspondingto their respective motifs and release them on their respectivecooperative platforms.

In different application scenarios, the two-dimensional code ofrespective motif may correspond to different service contents; or, thetwo-dimensional code of respective motif may correspond to a sameservice content, but meanwhile further covers respective features ofdifferent motifs, e.g., having different coding manners, such that thedimensional code of a certain motif can only be identified by softwarematching the motif so as to extract the included service content. Thesame service content (commodity information/promotion content)corresponding to respective motif may be provided by a third partyindependent of these motifs.

The user DM1 identifies corresponding two-dimensional codes usingdifferent Ids, respectively, and perform a plurality of actions at acorresponding O2O scenario (e.g., a specific time point, a specificphysical location, or other elements of the physical world peculiaritiesor combinations thereof; the conditions are specifically defined inadvance by the background server) for example with the ID of motif 1,i.e., WECHAT1:

-   -   (Wechat-Activity 1, Wechat-Activity2 . . . Wechat-ActivityN);

A plurality of further actions are completed with the ID of motif 2,i.e., WEIBO1:

-   -   (Weibot-Activity 1, Weibo-Activity2 . . . Weibo-ActivityN);

A plurality of other actions are completed with the ID of motif 3, i.e.,MOMO1:

-   -   (Momot-Activity1, Momo-Activity2 . . . Momo-ActivityN).

To this end, the user DM1 obtains the following comprehensive appraisalindex:

-   Index1=F(F1(Wechat-Activity1, Wechat-Activity2 . . .    Wechat-ActivityN, O2O),-   F2(Weibot-Activity1, Weibo-Activity2 . . . Weibo-ActivityN, O2O),    F3(Momot-Activity1, Momo-Activity2 . . . Momo-ActivityN, O2O), . . .    FN( . . . )).

Assessment of the comprehensive appraisal index (defined as a function Fseries) is performed according to uniform rule and/or protocol. The setrule and/or protocol for example determines which actions of the userunder respective motifs may be appraised, or whether these actions havedifferent weight indexes; and whether the appraisal refers to differentO2O scenarios or weight indexes corresponding to different O2O scenarioswhen corresponding actions are completed, etc. For example, in differentapplication scenarios, actions that may be appraised under respectivemotifs may be set identical or not identical, and these actions may beset to have different weight indexes. To obtain the appraisal, theactions implemented by the user under respective motifs may be identicalor different; the user may obtain an appraisal index under a motif whencompleting all set actions for the motif, and obtain an appraisal indexunder another motif when completing some actions of all set actions forsaid another motif. The O2O scene when completing the actions may befurther used as one basis for reference when the background serverand/or core server of respective motif performs appraisal.

Particularly, the background server of motif 1 appraises the actionsunder the motif through function F1, the background server of motif 2appraises the actions under the motif through function F2, so on and soforth for the appraisal cases with more motifs; finally, the core serveror a background server appointed thereby, and the third-party serverperforms comprehensive calculation to the appraisal indexes obtainedunder all motifs through the function F. Particularly, the backgroundserver of respective motif may know a complete appraisal rule (i.e., allfunctions F (F1˜Fn) in the whole series), or should at least know partof appraisal rules corresponding to the motif (i.e., at least includinga function FN, N corresponding to the motif); the core server may know acomplete appraisal rule (i.e., all functions F (F1˜Fn) in the wholeseries), or should at least know the rule used for final comprehensiveappraisal (i.e., at least including a function F).

The rules as the basis for appraisal by the background server ofrespective motif may be prepared by respective background server,respectively, and if necessary, they may be informed to other backgroundserver, core server, service provider or user. Or, in another example,the rules as the basis for appraisal by the background server ofrespective motif may also be prepared by the core server and informed torespective background server, respectively, and if necessary, may bemake known to the user. Or, in a further example, the rules as the basisfor appraisal by the background server of respective motif may also beprepared by another third-party (e.g., a merchant as a service providingparty or a reward granting party) independent of respective backgroundserver (corresponding to the social platform of respective motif), andis informed to the respective background server, and if necessary,informed to the core server or made known to the user.

Similarly, the rule based on which the core server makes the finalappraisal may be formulated by the core server, or may be formulated bythe third party and notified to the core server; where necessary, therule may be informed to respective background servers or to the user.Besides, the background server of respective motif also has its ownattribute account at the core server; the core server may appraise therespective background server and calculates its appraisal index after ithas completed the action set by the rule; the weight parameters fordifferent actions and/or the appraisal index involved with variousactions may be referenced.

Moreover, in some examples, the core server may set corresponding weightindexes for the appraisal index of respective background server; then,after receiving the appraisal index of the user under respective motifas sent from the background server, the core server may further refer tothe appraisal index of the background server per se of respective motifwhen comprehensively appraising the user, so as to obtain the finalappraisal index of the user under a certain attribute after calculatingthe corresponding weight index. The attribute involved in calculatingthe user's comprehensive appraisal index may be identical to ordifferent from the attribute of the background server referenced uponcalculation. For example, when comprehensively appraising the user'scredit level, credits or amount of digital currency, the core serverappraises or sets corresponding weight index with reference to thecredit level of the background server.

The appraisal index of the user for a certain attribute under a certainmotif may act as one of reference basis for appraising other attributesunder the motif; the comprehensive appraisal index obtained by the userunder a certain attribute may also act as one of the reference basiswhen appraising other attributes. The comprehensive appraisal index ofan attribute of the user or one of its IDs is recorded by the coreserver under the user's attribute account; the comprehensive appraisalindex may be directly displayed digitally, available for respectiveparties to view when needed, such as the user himself, other users,background servers, third-party servers, etc., such that parties mayunderstand the situation of the user, which may serve as one of thebasis for reference when considering, for example, the setting of rightson whether adopt the user's reply information. Of course, the user orcore server may also limit which interacting parties are allowed to viewthe user's comprehensive appraisal index and/or its appraisal indexobtained under respective motif

Of course, in the case that the background server of a certain motifknows that the same user has a plurality of Ids, the background servermay first appraise the actions performed by respective Ids,respectively, and then calculates a uniform appraisal index of the userunder the motif with respect to the weight indexes of different Ids(e.g., setting the weight index with reference to a certain attributevalue of each ID (e.g., user level, active degree, etc.)), and thensends the uniform appraisal index to the core server for comprehensiveappraisal. Or, in another example, when the background server knows ordoes not know that the user has a plurality of different Ids, it onlyappraises the actions performed by individual IDs, respectively, andsends the appraisal indexes corresponding to the different Idsseparately; then, supposing that the core server knows that the user hasa plurality of Ids under the same motif, the core server maycomprehensively calculate the appraisal indexes of these Ids (e.g.,based on a certain weight index), and records these appraisal indexes inthe attribute account of the user.

The action performed by the user, which may be appraised, may be anoperation implemented by the user or via its mobile terminal, asmentioned in any embodiment above, or the interaction operation of theuser with respective other parties, e.g., including, but not limited to:an operation of registering with the background server, an operation ofidentifying the two-dimensional code to thereby obtain theservice-related information from the corresponding background server, anoperation of recommending (e.g., releasing the recommendationtwo-dimensional code) to other users, an operation of completing thetransaction with the background corresponding to the service containedin the two-dimensional code, an operation of replying to an SNS searchrequest or an SNS help seeking request from other users, and otherconventional operations performed by the user at the social networkplatform maintained at the background server of a certain motif, etc.The action of the respective background server, which may be appraisedby the core server, may be an operation of the background servermentioned in any embodiment above, or its interactive operation with themobile terminal, the core server, or the third-party server, or anoperation of appraising the user as mentioned in this embodiment, etc.

The data or information that needs to be sent by any interacting party(e.g., the user and its mobile terminal, the background server ofrespective motif, the third-party server, the core server) to respectiveother party, including, but not limited to: interaction information,appraisal index, rule notification information, O2O scenarioinformation, etc., may be transmitted in a two-dimensional form; thesender of the information requests the core server for generation of thetwo-dimensional code, and the core server or a party authorized therebygenerates the two-dimensional code including codes corresponding to theinformation.

An example of a uniform two-dimensional coding rule of the core serverin the present disclosure is shown as follows: setting a two-dimensionalgeneration interface, and adjusting the length of the short code of thecurrent two-dimensional code from 8 bits to 12 bits, e.g., www.linkon.cn/ABCDEFGHIJKL UVWXYZ. The first 12 bits (A˜L) are unique, containing apromotion page two-dimensional code and a payment two-dimensional code;after an operation server invokes the interface, the short code isreturned to the operation server, such that the operation servergenerates a two-dimensional image; the promotion page parameters: serverID, merchant ID, object type, object ID, area ID, channel ID, share to,user ID, source two-dimensional code, etc.; the payment two-dimensionalinterface parameter: server ID, merchant ID, manager ID, amount, notes,etc.; the interface needs to verify the operation server web site,server ID, application ID, application key, token, etc. The latter 6bits (U˜Z) refer to the merchant ID, location, channel management,object ID, and object type (Code Type, which may manage a plurality ofattributes of the object, such as display/promotion and investmentinviting/buy/questionnaire/collecting coupon/donate, etc., and servicesthat may be obtained by clicking (e.g., in the WeChat)/long press (e.g.,two-dimensional code in the WeChat)/code scanning (e.g., in anenvironment where code scanning is allowed)/shake (within a scene)), theuser ID, the source code, etc.

Embodiment 8

Hereinafter, illustration will be made by further providing an exampleof weight calculation with the appraisal index to grant awards to auser's recommendation. Corresponding settings may refer to theembodiment above.

Still supposing that a certain user DM1 has a plurality of Ids based ona plurality of specific motifs. Respective backgrounds of these topics(e.g., WeChat, Weibo, and MoMo) maintain different social networkplatforms. They have an SNS release and disseminating function,respectively, and connected to a same access server, respectively, so asto obtain a content (e.g., service content/commodity content/promotioncontent, etc.) provided by the merchant from the access server, andrelease, on cooperative platforms (e.g., respective O2O scenes such asmerchant, counter, webpage) corresponding to respective topics, atwo-dimensional code with the encoded content containing the content topromote.

The SNS releasing and dissemination function of the background server ofrespective motif, including but not limited to, supporting the user toperform any of the following operations: posting or replying to amessage on personal home page or other page; messaging between users,performing SNS search/SNS help seeking, and setting rights for messagereleasing or message obtaining, etc. The user may send the recommendedcontent to other users based on the SNS releasing and disseminationfunction. The user may send the recommended content in a recommendationtwo-dimensional code form.

Moreover, the background server may also obtain the content provided bythe merchant from an accessed server to generate two-dimensional codescorresponding to respective motifs; or the background server maydirectly obtain original two-dimensional codes containing the contentfrom the accessed server, decode the relevant content, and then generatethe two-dimensional codes corresponding to respective motifs. Theoperation of generating respective two-dimensional codes may refer tothe depictions in the various embodiments above.

The two-dimensional codes released by the background servers ofdifferent topics may have uniform contents and formats; or, besides thecontents such as the service content/commodity content/recommendationcontent provided by the merchant, the coded contents corresponding tothe two-dimensional codes released for different topics may also besuperimposed with the topic or unique identification information of itsbackground server or other information (e.g., a link to the socialnetwork associated with the topic, the webpage, the client software,etc.); or, the two-dimensional codes released for different topics mayalso have coding patterns corresponding to respective motifs such thatthey can only be identified by client software for corresponding motifs,etc.

The user DM1 identifies, through its mobile terminal, the originaltwo-dimensional code released by the merchant, or identifies thetwo-dimensional code released by the background server of a certainmotif, and knows, by extracting the content contained therein, arewarding rule “the sharing dissemination value of sharing links for ahouse property promotion with a total value of 1 million yuan is 10,000yuan” set by the merchant. To obtain the dissemination reward, the userDM1 further superimposes, based on the content corresponding to thetwo-dimensional code, information of the user or its mobile terminal, torequest the core server to obtain corresponding recommendationtwo-dimensional code. For example, generating, releasing, andidentifying of the merchant's original two-dimensional code, thetwo-dimensional code released by the background server of respectivetopic, or the recommendation two-dimensional code of the user, may allrefer to the depictions in the various embodiments above, which will notbe detailed one by one.

The user DM1 may perform dissemination and promotion using a same kindof recommendation two-dimensional code or using a plurality ofrecommendation two-dimensional codes superimposed with its different IDinformation, on a social network platform of a same motif or on socialnetwork platforms of different motifs. For example, the user DM1presents, with his ID of a certain motif, promotion content BUY1 toother users under the motif in scene O2O1 (at a certain time, locationor, elements of other physical world peculiarities, or combinationsthereof) by sharing the recommendation two-dimensional code or by otherdissemination and promotion ways. The operation is recorded, by abackground server (or core server or third-party server or accessedserver, etc.) of the motif, as an action of “completing SNSrecommendation 1 with the ID of WECHAT1_1”; the promotion content BUY1is, for example, transmitted to his friend with the WeChat ID ofWECHAT1_2, and transmitted all along till a friend with the WeChat ofWECHAT1_N through multiple tiers of recommendation (which may refer tothe depictions in the above embodiments); and transmission of thepromotion content BUY1 directly causes a user WECHAT1_N+1 to create anoperation of “buying” the promoted house property with the total valueof 1 million yuan. The entire “dissemination chain” of multi-tierrecommendation is referred to “O2O_CHAIN1,” where the first tier ofreferral WECHAT1_1 till the Nth tier of direct referral WECHAT1_Nfacilitating the deal done may share the 10000 yuan commission award setby the merchant.

Supposing that the appraisal rule selects Rule 1, which prescribes: theprofit appraisal weight for dissemination in the “dissemination chain”employs “Fibonacci sequence (N=10)=1,1,2,3,5,8,13,21,34,55,89,N=10”, asshown in the table below:

Sequence 1 2 3 4 5 6 7 8 9 10 Tier 1 2 3 5 8 13 21 34 55 89 Weight 0.43%0.87% 1.30% 2.16% 3.46% 5.63% 9.09% 14.72% 23.81% 38.53%That is, different “weights” are granted to respective “tiers” accordingto (a sequence of) 10 (the weight in this example=a percentage derivedfrom the number of the present tier divided by the total number of thesequence).

Particularly, WECHAT1_N who directly “facilitates the deal done” will begranted the “commission” of 38.53% referred to in the tenth tier; thecommission is calculated as follows: if the final buyer WECHAT1_N+1 onlyhas one “upstream referral”, i.e., “WECHAT1_N,” then WECHAT1_N obtainsan award of 10000(yuan)×100%×38.53%=3853(Yuan); the corresponding awardsattributed to other tiers of referral on the “dissemination chain” maybe deduced in a similar manner.

In another scenario, the content is recommended to the final buyer by aplurality of users under a certain motif, while recommended by a furtherplurality of users under another motif, which finally urges him to buythe recommended commodity. Then, all of these users act as “upstreamreferrals” for direct recommendation, sharing the rewards correspondingto the sequence 10 in the table above.

As shown in FIG. 11 , for example, the “upstream referral” of the finalbuyer WECHAT1_N+1 may be defined as: the final buyer is recommended withthree pieces of information being Recommendation 1 by three referralsMOTIF1 (i.e., WECHAT10), MTIF2, MOTIF3 under a same motif, then thethree persons become “top three items closest to the final buyerarranged into a sequence according to time order for recommendationsunder a same theme.” And the remaining 7 persons MOTIF4, MOTIF5, . . . ,MOTIF10 who are recommended under a different motif, are also directreferrals of WECHAT_1+N, such that the 7 persons will constitute the“last 7 items of the sequence.”

The forgoing MOTIF1, MOTIF2, . . . MOTIF10 become 10 nodes, constitutingawards assigned to a network (digital human being network identifier) ofWECHAT_1+N VIPs closing the deal based on recommendation 1. The awardsare assigned in such a manner: MOTIF1 (i.e., WECHAT1_10) is the firstreferral for recommending the content to the final buyer; therefore, heis awarded according to “the reward percentage is sequence 10 with thefirst weight 38.53%,” namely, he is awarded to 10,000 yuan×100%×38.53%(reward percentage)×38.53% (weight percentage)=1484 yuan. MOTIF2 is thesecond referral for recommending the content to the final buyer;therefore, he is awarded according to “the reward percentage is sequence10 with the second weight 23.81%,” namely, he is awarded to 10,000yuan×100%×38.53% (reward percentage)×23.81% (weight percentage)=917.4yuan. And so on, each “node” in the “digital human being network” forthe deal may be awarded as calculated above.

Of course, other sequences may also be selected to calculate rewardpercentages or weight indexes according to actual application scenarios.In addition, the “first” referral in this example is ranked by timeorder, e.g., a referral whose recommendation time is closest to the buytime, or in alternative examples, he may also refer to the earliestreferral; and in similar fashion, the ranks of the “second” andsubsequent referrals may be derived. The present disclosure does notlimit ranking the respective referrals based on other peculiar elements(e.g., distance, credits) or combination of peculiar elements (e.g.,combination of distance and time) than time.

Relevant computation rules such as the specific weight indexes andreward percentages may be stipulated by a third party (e.g., merchantswho specifically provide services or grant rewards), and sent by theinternal server of the third party to the access server, the coreserver, or the background server of respective motif, available forrespective parties to use when generating a two-dimensional code orcalculating parameters such as the specific attribute values, appraisalindexes, award amount, etc. Or, in other examples, the rules above mayalso be set by the core server or the access server based on therequirements of the third party (merchant) and notified to other partiesto record.

As to the rules involved in computing relevant weight indexes/rewardpercentages, or in computing other attribute values based on the weightindexes/reward percentages, respective parties (e.g., the core server,the access server, the background server of respective motif, etc.) mayclaim them from the rule stipulating party or recording party whenperforming the computations above. The internal server of the merchantor the background server/third-party server appointed by the merchantmay refer to the descriptions in the various embodiments so as to closethe deal through interaction with the mobile terminal of the finalbuyer.

The roles played by referral-related information in the entire“dissemination chain,” particularly the referrals from different motifs,to the final closing of the deal, for example, may be known by tracingback the information of respective tiers of referrals in therecommendation two-dimensional code. In view that the recommendationtwo-dimensional code is unanimously generated by the core server orafter the core server knows it, generated by a respective party underauthorization by the core server, the core server may know theinformation of respective tiers of referrals, such that other parties(internal server of the merchant, access server, background server ofrespective motif, etc.) may query the core server for the information ofthe referrals when necessary. In different examples, the core server,the internal server of the merchant, the access server, and thebackground server of respective motif may calculate the specificappraisal index, award amount, and various other attribute values of auser; the attribute values independently calculated by respectiveparties may be recorded in the databases respectively established by therespective parties or may be used for calculating other parameters; or,the attribute values independently computed by respective parties may benotified to the core server to record in the attribute accounts of theusers or notified to the core server to conduct a comprehensivecomputation, etc.

Further, besides recommending the contents generated or pushed byrespective other servers, the personal users may also create digitalizedcontents, e.g., articles/music/cartoons/videos/ games, etc., forexample, generating a two-dimensional code corresponding to thedigitalized content or its link address, so as to be disseminated toother users. As a service provider, the user may set corresponding userules and/or award policies for promotion of that digitalized content:for example, the first 1000 users who obtain the digitalized content byidentifying a dissemination two-dimensional information may be chargedfree, while starting from the 1001th user, each user will be charged 1yuan for each use; to this end, the service provider performs recordingand judging based on the time order of the requests sent thereto fromthe dissemination two-dimensional code receiving users for obtaining thedigitalized content. For another example, a referral who disseminatesand shares the digitalized content is granted a “whole-chain transactioncommission reward mechanism” to set that different charging rules areavailable for different distribution amounts, and different awards aregranted to successful disseminations or successful deals: supposing foreach incrementation of one dissemination user on the promotion anddissemination chain, the award will be 0.1 yuan, and for eachincrementation of one paying user, the award will be 0.2 yuan, etc.

The user creating the digitalized content notifies the core server ofhis originator conditions, use rules, and reward policies, for the coreserver to formulate corresponding rules needed in generating adissemination two-dimensional code, and generating recommendationtwo-dimensional codes during respective stages of promotion procedure;based on the agreements, any party in the core server/background serverof the social platform/third-party server storing the digitalizedcontent, etc., grants the rewards to referrals based on thecorresponding policies above. In view that the disseminationtwo-dimensional code and recommendation two-dimensional code are alluniformly generated by the core server or a party authorized therebybased on the set coding rules, user information of the originator andrespective tiers of referrals may be included therein, and theinformation of users who request the service provider for thedigitalized contents by identifying respective two-dimensional codes mayalso be known, thereby achieving a traceability of the user informationin the entire dissemination chain, so as to grant rewards to referrals,charge users, and protect the benefits and rights of the originator.

Embodiment 9

This embodiment relates to a digital human being, a digital human beingnetwork constructed based thereupon, and a communication method, asshown in FIG. 12 .

The “digital human being” defined in the present disclosure issuperimposed or attached to an entity person, which may be understood asan integration of a person in the real world with a device that isequipped to the person and enables digitalized sensing access. Thedigitalized sensing accessed device imparts digitalized properties tothe entity person, to make the digital human being become a node in anetwork. The mobile terminal/client/wearable device and the like of theuser described in various embodiments and their varied embodiments ofthe present disclosure are a kind of digitalized sensing accesseddevice; operations performed by a user with the corresponding device orthe interactive operations between the user and respective parties, asdescribed in various embodiments and their varied embodiments of thepresent disclosure may be regarded as acts of a digital human being.

The digital human being has any one or any combination of the followingbehavior patterns: the digital human being may understand, byidentifying one or some coding mediums (e.g., any one kind oftwo-dimensional codes or corresponding hyperlink as mentioned above, andother forms of coding mediums will also be described in subsequentembodiments), the content corresponding to coded information in thecoding medium or an approach of accessing the corresponding content (thecontent, for example, may be a notification message, a digitalizedproduct, a predefined operation process, a condition policy, anoperation instruction, etc., and the accessing approach may refer tobeing redirected to the webpage, link address, identificationinformation or the like of a content providing agency), access thecorresponding information network defined in the coded information, andcommunicate with a server of a specified agency defined in the codedinformation (for information interaction, transaction execution, serviceaccess, etc.).

The digital human being has an identifiable digital human being symbol:in different examples, the digital human being symbol may be deviceinformation and/or user identity information; the user identityinformation may be bound to the device information; the digital humanbeing symbol may be unique within a specific range. Any behavioraloperation executed by the digital human being may be identified andrecorded by an authorized agency based on the identifiable digital humanbeing. The agency identifying or recording the digital human beinginformation may, for example, select different digital human beingsbased on the identified digital human being information, and opendifferent matching operation rights to corresponding digital humanbeings, execute different matching operation processes when interactingwith the digital human beings, provide different matching services, andperform attribute recording and value adjustment with respective to theconditions of executing operations conforming to predefinitions, etc.The digital human being, when interacting with a corresponding agency,provides its own digital human being symbol thereto, for the counterpartto identify and verify.

The act of digital human being is closely associated with the realphysical world. When interacting with a corresponding agency, thedigital human being may provide some peculiar elements or a combinationof elements (time, location, identify, behavior, etc.) available for thecounterpart to identify the real physical world scene where it islocated; then, the corresponding agency may identify the peculiarelements and compare them with the elements predefined in the rulepolicy, the comparison result acting as one of the grounds forselecting/opening corresponding rights to/providing matching servicesto/executing corresponding operations for/adjusting corresponding valuesof the digital human being.

One of the acts of the digital human being may be sharing anddisseminating content to the outside. The shared content may beinformation obtained thereby from the coding medium, which is allowed tobe superimposed with the symbol of the digital human being and/orinformation content newly added by the digital human being according toneeds. By identifying the symbol therein, the corresponding agencyidentifies/records/adjusts the attributes thereof regarding the sharingoperation. The digital human being may release the shared content to theoutside in a recommendation two-dimensional code form, so as to performmultiple times of recommendation, multiple tiers of recommendation,etc., among a plurality of digital human beings. The recommendationtwo-dimensional code or any other two-dimensional code is all generatedby a uniform code issuing agency within a region or generated by anagency authorized by the uniform code issuing agency; the uniform codeissuance enables, for example, an effective tracing of the disseminationpath of the shared content after multiple times/multiple tiers ofrecommendations, so as to identify contribution degrees of respectiveparties (e.g., the recommended party finally strikes a deal) and computean attribute value matching thereto).

An act of the digital human being may also be conducting the SNS searchor releasing the content for SNS search as mentioned above, and/orperforming SNS help seeking or replying to other persons' SNS helpseeking topic, and allowing setting of corresponding filter conditionsor disclosure rights, etc. The digital human being logs on one or moresocial networks, based on its corresponding ID information, to performacts such as forwarding the recommendation/SNS search/SNS help seeking,etc.; the ID information of the digital human being may be a symbol ithas for the agency identifying the symbol to perform correspondingappraisals (recording and adjusting the attribute values, etc.).

To appraise the attribute value of the digital human being, differentweight indexes may be assigned, according to the predefined rule, todifferent motifs (different social networks, different operations,different peculiar elements, recommendation levels, etc.) when thedigital human being is conducting a corresponding act, so as to computethe corresponding attribute values. Some attribute values (appraisalindex, peculiar elements, etc.) act as the basis for adjusting otherattributes (credits, capital amount, etc.); some attribute values(appraisal index, peculiar elements, etc.) are available for query byother digital human beings or other agencies when necessary; someattribute values may be circulated and transferred (e.g., capitalamount) between the accounts of digital human beings or between theaccounts of a digital human being and other agencies); these havespecific depictions in various embodiments of the present disclosure.

The digital human being uses a digitalized sensing access-enabled deviceto identify a coding medium, which may simplify the operations needed toaccess the interactive network defined thereby to obtaininformation/service, or provide services to other persons (e.g.,recommending, releasing information to the SNS search, replying to anSNS help seeking motif, etc.). Based on the coding rule and the matchingdecoding rule uniform to respective parties, the interaction implementedbetween the respective parties and a digital human being (particularlythe digital human being being registered with the respective party) is aclosed-loop transaction (which is not limited to commodity transaction),such that other parties without the uniform rule can hardly hack intothe closed-loop transaction process, which thus may effectivelyguarantee information security. Further, the digital human being'sdevice may simplify corresponding operations by judging andautomatically installing a client software with the corresponding rule.

A “command” triggered by a system (the digital human being device andcorresponding devices of respective interacting parties) that mayexecute a closed-loop transaction command is compiled according to acoding rule specific to “the system,” which also generates a codingmedium such as a two-dimensional code; for example, it may be requiredthat the digital human being have to be a registered user of the mobilephone APP and the background system, and it may execute a “closedtransaction” only as a “member” of the “background system.” In thisexample, the two-dimensional code may not only encode the URL address,but also may be encoded, for example, as O2OBUY12345 (the executioncommand with a symbol of O2OBUY server is O2OBUY12345).

Understanding of the physical world peculiar elements when the digitalhuman being is accessed to the interactive network facilitates thedigital human being to determine the grid space where it is located inthe real world (the grid space represents a set of various properties inthe physical world, e.g., region, organization, product group, saleschannel, sales representative, reward policy, activity scope, etc.).Whether the digital human being may access the released information(e.g., in the form of coding medium) is dependent on whether thespecific grid space under the real world environment of the releaser'sinterest, where the digital human being is located, matches adissemination policy stipulated by the information releasing party,e.g., a specific location, a specific time point, a specific friendcircle, a specific webpage browsing, an audience of a specific TVprogram, etc. In this way, the real economy creates more “value accesspoints” in the “O2O e-commerce era,” such that by imparting real worldproperties to the act of digital human being, an enterprise may performa quantified evaluation on the investment and outcome of the “O2O fullchannel” for the overall advertisement placement based on thedissemination attribute and effect of the “grid space of physicalworld.”

It needs to be noted that the “O2O” mentioned herein refers to Offlineto Online, rather than traditionally Online to Offline. That is, thephysical world belongs to an Offline world, for example, but not limitedto: store, computer page, mobile terminal screen, and various otherplaces visible to naked eyes. The sensing access capability of thedigital human being device refers to a function of “the sensing deviceaccesses by sensing,” such as two-dimensional code scanning, and afunction of accessing to an ad-hoc network through radio sensing such asZIGBEE/IBEACON to interact with the server of other agency or otherdigital human being.

By identifying the digital human being symbol, the act of the digitalhuman being may be identified/recorded/appraised/awarded by acorresponding agency, and by further combination with relevant physicalworld peculiar elements upon executing of the operation, a uniqueappraisal award or service may be obtained. Therefore, the digital humanbeing will have an incentive to try its best to conduct an act meeting apredetermined appraisal policy so as to achieve a higher appraisal award(e.g., increasing the attribute value), e.g., sharing and disseminatingin a social network to help other digital human beings to obtaininformation/services; and a commission award with a corresponding weightwill be obtained based on its recommendation level to thereby achieveprofit sharing. If mass digital human beings would like to disseminateand share contents, a benign circulation of “ready to help, all for one”will be formed.

Content sharing and disseminating conducted with digital human being IDsunder different motifs in the social network is an effective extensionimplemented by a digital human being over an interactive networkidentifying the coding medium access, while by superimposing the digitalhuman being symbol in the shared information, it would be convenient forthe original information releaser or various other parties to trace eachnode (i.e., each sharing digital human being) on the contentdissemination and sharing chain throughout the whole process. Bygenerating the recommendation two-dimensional code by a uniform codeissuing agency or a party authorized thereby, there provides aneffective means of conveniently superimposing information such asdigital human being symbol and facilitating the respective parties toobtain the digital human being symbol by identifying the recommendationtwo-dimensional code.

The present disclosure provides a digital human being network, whichinitiates an access point for services (e.g., commodities, rules,policies, operation flows, etc.) predefined by an initial agency (whichmay be an enterprise or an individual person), while the digital humanbeing and the digital human being acts participate in its constructionprocess. The initial agency encodes various contents defined thereby,presents then in various encoding medium forms such as two-dimensionalcodes, and releases the coding mediums to the real world. The codingmedium is generated by a uniform code issuing agency or its authorizedparty, which may guarantee that the coding medium is generated based ona uniform coding rule (corresponding to the predefined content); andonly the digital human being identifying the coding medium based on thematching decoding rule may trigger a signal of urging the digital humanbeing and its respective interacting parties to execute a definedoperation flow.

The real world is divided, by the digital human being network, intoindividual “O2O grid spaces,” which become individual access pointsenabling the digital human being to access the digital human beingnetwork to obtain services or provide services; the physical worldpeculiar elements involved when the digital human being accesses providean effective means of facilitating respective interacting parties (e.g.,service providers) to understand the nature of the O2O grid space towhich the digital human being belongs. Moreover, the access pointsformed by matching coding mediums distributed in different O2O gridspaces impart a “full channel O2O” digitalized access capability to thereal world. Therefore, the real economy which is not covered by theInternet is also covered; meanwhile, a full-channel coverage, for theenterprise, of “Internet (channel 1)+real economy (channel 2)” may beachieved when presenting the coding medium such as the two-dimensionalcode on the Internet webpage; compared with the “additional hardwareconnection for the IoT,” the present disclosure enables access only byidentifying the coding medium, such that no additional hardware layoutis needed except the sensing access device (the device has a universalapplicability); in this way, wider applications may be obtained.

The full-channel O2O access points are spread in various scenes of theambient world, and various SNS recommendations and SNS searches areexistent anytime and anywhere. The reason why a digital human being maysee a certain “e-commerce information” is that it belongs to a circle of“digital human being network based on a certain motif,” and theinformation is only obtained through accessing/recommending/sharing froma full-channel traceable mechanism of the real world; after identifyingthe corresponding coding medium, the digital human being may know whorecommends it thereto, what kind of social appraisal index is involved,and “a mechanism regarding what kind of sharing benefits the digitalhuman being act will obtain”; on this base, the digital human being willtake “what kind of digital human being act” to access the network orconstruct its own digital human being network.

Different from the existing Internet-centralized and information-basedmanners, the digital human being network of the present disclosure is anad-hoc network hierarchy that is decentralized, closed-looptransaction-based, and centered about respective digital human being perse. In contrast to the Internet search which relies on acomputer/browser, the SNS search and SNS help seeking and the like inthe present disclosure is based on O2O access, and what is found is nota cold webpage, but “a service that may help you” and “a person that mayhelp based on the digital human being social network.”

With the digitalized sensing access device, each digital human being,who is bound with a digital human being symbol, has a digital attributesuperimposed on a flesh attribute of the real world, which correspondsto accessing the real person to the IoT (Internet of Things). Thedigital human being may be searched with its digital human being symbolto thus become a part of mass data of the entire “digital human beingnetwork.” any digital human being may not only act as an informationcontent receiving node (receiving services), but also may act as asending node to create a “social influence” and obtain a value byreleasing contents to others (providing services, not limited torecommending and sharing information). A mechanism for recording theacts executed by the digital human being network for the digital humanbeing and evaluate whether the digital human being act complies apredefinition so as to quantize the appraisal (e.g., computing theappraisal index of the shared content and grant corresponding rewardsbased on a uniform appraisal standard, etc.).

Each act of the digital human being is an act of “closed-looptransaction bearing a LOGIN ID and executing a background-specificfunction.” That is, “a digital human being” may “implement theclosed-loop transaction based on the function defined by the backgroundthrough a LOGIN-ID,” such that each “act” (includingfocus/click/disseminate/share/act, etc.) is superimposed with its own ID(DNA) and then passed to the background for recording, such thatwhole-process tracking may be realized; besides, it may also achieve“P4P (Pay for Performance) mode” and “work more, earn more” ; varioussocial network-based behavioral modes such as the “QR scan,” “Momentshare,” and “SNS searchable” which may leave traces that may berecorded, queried, and appraised in the social network are significantlydifferent from the information-based Internet mode.

That is, each digital human being may construct a digital human beingnetwork centered about “self” based on different “motifs, socialstatuses (appraisal indexes), open attitudes (shared to whom, who maysee), and reward policies,” etc. Each digital human being may beprovided with a plurality of digital human being IDs that have multipledimensions and are uniquely identified within different circle scopes,thereby having digitalized characteristics having a plurality ofpersonal attributes; digitalized access and dissemination are enabledbased on each digital human being ID, and the acts executed may betracked and appraised, respectively, thereby implementing a socialnetwork constructed based on multi-motif matrix, a social reputationindex (or social status)-based matrix (for dissemination path andinfluential power), and an open attitude matrix. The social reputationindex refers to a “quantized appraisal index” within a certain timeperiod based on a plurality of “closed-loop transaction” acts of thedigital human being, which not only has an influential power to otherdigital human beings during the dissemination process, but also may actas a weight index for “Pay for Performance.”

The following are some examples of digital human being network accesspoints: offline, various kinds of two-dimensional codes are spread asaccess points in a shopping mall, which, after being identified, mayimplement “shoot to buy, prompt transaction”; they may also be joinpoints and experience exhibition points of the “digital human beingnetwork”; “shopping mall service two-dimensional codes” are spreadaround the shopping mall, which become join points of the “digital humanbeing network”; the shopping assistants or their relatives and friendsbecome core recommenders of the “digital human being network,” and theaccessories with the service two-dimensional code they wear may act asthe “access points of the digital human being network”; various kinds ofreal world scenes that may exhibit the offline access points of the“two-dimensional code” enable a statistical analysis of thedissemination effects of various kinds of passing population accordingto “O2O scene setting parameters,” and “the access points” may alsobecome “a mode for transaction commissions.” Online, the “service accesstwo-dimensional code” may be exhibited through various kinds ofwebpages, becoming access points of the “digital human being network.” Awebpage including the access two-dimensional code may also become acommon Internet search object as well as an SNS search object.

It is seen that different from the traditionaladvertisement/market/marketing/planning, including the enterprisesearning their revenues from TV stations/audience rating/market survey,the present disclosure implements a revolutionary “brand-new businessmodel” based on the digital human being network; because the enterprisesmay arrange the “digital human being network” access points (e.g., afull-channel O2O two-dimensional code) at places where potential targetclient groups gather, the preferences and behavior patterns of “eachindividual” may be understood from the perspective of full samples,thereby improving formulation of the enterprise's marketing policies;while the “traditional advertising fee” is instead paid to eachcontributing party in the “full-process of dissemination,” including the“releasing source,” “propagation individual,” and “management platform.”Based on the construction of O2O full-channel marketing system, it isobtained “channel=beneficial rights from scene access”; the initialconstruction comes from the digital human being network of theenterprise owner; while the sustainable operation comes from “eachdigital human being that may conduct all-people marketing.” For example,each employee of the company may promote the two-dimensional codecorresponding to the commodity information to friends and relatives. Byconstructing the “digital human being network server,” a plurality ofO2O scenes may be correspondingly managed with one server website, whichis applicable to a multi-ID multi-O2O scene comprehensive weightappraisal mechanism. The server may compute the rebate for each employeebased on the corresponding channel, sales organization, salesrepresentative, sales price, rebate percentage, etc., and makingstatistics and parsing the sales conditions of respective channels.

Based on MatrixLink protocol, accessing with O2O and O2O two-dimensionalcode, the MatrixLink protocol is downwardly compatible and inreplacement of the Http protocol. Similar to the principle that the httpprotocol is an Internet basic protocol, WWW is an application systemwith the Internet as a transmission medium, and the basic transmissionunit on the WWW network is the Web page, MatrixLink is also a basicprotocol of MatrixLink network (digital human being network). Itsworking principle and mechanism is also based on a mobile client/servercomputation model, comprising a sensing access device such as an NFCchip (identification NFC reader) of the mobile terminal, a camera, andan identification software unit (which may be preset in the mobileterminal, or installed layer), implementing a similar mechanism formedby Web browser (client) and Web server (server); the communicationbetween the mobile client/server may also adopt a similar HTTTP protocol(but including the MatrixLink coding rule). The MatrixLink protocol isalso a protocol based on TCP/IP protocol, which is an application layerprotocol between the mobile terminal and the Web server, which may be auniversal or customized protocol including traffic logic, encryptionrule, and operation execution procedure.

The working principle of the MatrixLink protocol includes:

(1) Connection: similar to clicking .com in the Web browser to establisha connection with the Web server, MatrixLink connection is also aconnection to the background server by identification with a mobileterminal that scans a two-dimensional code and/or aligns with an imagecode (the image code is displayed on a screen, identified by a mobileterminal camera shooting module based on the bright spot UV linedifferences on the screen, not an image identified by human eyes).

(2) Request: similar to submitting a request to a Web server in a Webbrowser through a socket. MatrixLink request generally furthercomprises, besides establishing a connection, the server is directed toparameters related to a predefined service operation logic.

(3) Response: similar to transferring the http protocol to the Webserver after submitting the request to the Web browser, after the Webserver receives submission of the MatrixLink protocol from the mobileclient, it performs transaction processing according to a predefinedrule; the processing result is further transmitted back to the clientthrough the MatrixLink protocol, such that the client software that mayparse the predefined coding rule may be started at the mobile client,displaying the requested page and executing according to a predefinedprocessing flow, or only executing the predefined flow, therebyimplementing a predefined closed-loop transaction processing.

Therefore, with the MatrixLink protocol, a network connecting people tothings and people to people may be constructed through the personalmobile terminal, referred to as a MatrixLink network. All contents andservices of the Internet may become “a subset mainly including displayunder the protocol.”

Basic compositions of the Internet include a plurality of interconnectedbackground servers that uniformly defining the access mode and record aplurality of acts; O2O access points (i.e., full-channel nodearrangement of two-dimensional code), and digital human beings eachhaving any kind of sensing access device, which become receiving andsending nodes of the network in a manner similar to radio sensing ad-hocnetwork, so as to extend interaction with other digital human beings(e.g., based on the manner of login a social network with a digitalhuman being ID). Any coding medium such as the two-dimensional codeinvolved in the digital human being network is generated by the coreserver. Various other third-party servers such as the access server,platform server, etc., may be configured as needed with reference tovarious embodiments of the present disclosure.

To implement various embodiments of the present disclosure, thedigitalized sensing access device equipped to the digital human being,for example, a mobile terminal such as a smart phone, a personal digitalassistant (PDA), or a tablet computer, is required to be able to bebound with a digital human being symbol (which may be unique within acertain scope, and may be bound permanently or temporarily) and havefunctions of identifying coding mediums and networking communication;which also be any kind of client device having similar functions.Connection between the mobile terminal and a serer of one or morebackground agency and connection between servers of a plurality ofbackground agencies may be made over a wireless network or a wirednetwork. The wireless network may be a GPRS network, a 3G network, a 4Gnetwork, a Wi-Fi network, and a Bluetooth network, etc., a network thatenables communication between the mobile terminal and the backgroundserver anytime where there are network signals.

With an example of an identified coding medium being a two-dimensionalcode, as shown in FIG. 13 , a mobile terminal in a preferred embodimentcomprises the following modules: a control unit configured forgenerating signals of controlling respective other units and forcontrolling the respective other units to implement their own functions;a camera for shooting the two-dimensional code; wherein any camera with0.3 megapixel or above may clearly shoot the two-dimensional code; adecoder configured for decoding the shot two-dimensional code to obtaincoded information; a coded information parsing unit configured forparsing the coded information to determine whether the two-dimensionalcode is generated according to a preset coding rule; atransmitting/receiving unit configured for, if the two-dimensional codeis generated based on the preset coding rule, interacting with thebackground server or a core server or other digital human being withrespect to information to receive a service or provide a service, etc.;an input unit configured for inputting various input informationinvolved in an interaction process; and a display unit configured fordisplaying contents resulting from identifying the two-dimensional codeor various information that needs to be displayed during the interactionprocess with respective parties such as the background server.

The background server in a specific example, as shown in FIG. 14 ,comprises: a control unit configured for generating signals ofcontrolling respective other units and for controlling the respectiveother units to implement their own functions; and a sending/receivingunit configured for interacting with a digital human being device suchas a mobile terminal or an agency such as a core server; wherein thebackground server may be provided with an access defining unit fordefining an access rule as a basis for the digital human being to accessthe digital human being network, e.g., defining information such as anoperation procedure that needs to be executed by a digital human beingor a server of other agency, a commission award policy, etc. Thebackground server is provided with a built-in or external database thatstores various information data during the interaction process andsupports invoking at any time.

The core server in a specific example comprises: a control unitconfigured for generating signals of controlling respective other unitsand for controlling the respective other units to implement their ownfunctions; a sending/receiving unit configured for interacting with adigital human being device such as a mobile terminal or an agency suchas a background server; a coded information generating unit configuredfor generating a corresponding coding rule and generating correspondingcoded information, based on various information such as a serviceprovided by the background, and an access rule defined by the backgroundserver; and a two-dimensional generating unit configured for generatinga two-dimensional code corresponding to the coded information.

In some different examples, the mobile terminal per se may not beprovided with the aforementioned decoder and/or coded informationparsing unit, but sends the shot two-dimensional code to a backgroundserver that has a decoder and a coded information parsing unit, suchthat the background server, after identifying the information includedin the two-dimensional code, sends it back to the mobile terminal.

If the mobile terminal is required to execute a closed-loop transactionwith respective interacting parties (i.e., commands needed for executingthe operation procedure are corresponding to the coded information inthe two-dimensional code), the mobile terminal needs to sendregistration information to the background server via thesending/receiving unit, and after a successful registration, receives aregistration success message from the background server. If thetwo-dimensional code is generated based on the preset coding rule, thesending/transmitting unit of the mobile terminal is also configured forsending a service providing request message to the background server andreceiving a service from the background server; if the two-dimensionalcode is not generated based on the preset coding rule, thesending/receiving unit is further configured for sending a webpagerequesting message to a certain network browser and receiving a webpagecorresponding to the coded information from the web browser, oroutputting an error alert on the display unit.

The mobile terminal may also obtain the client software needed forexecuting the set operation procedure by downloading, memory card orother ways, and after completion of the installation, the mobileterminal communicates with the background server through the clientsoftware. The background server further comprises a client softwaremonitoring unit configured for monitoring whether the mobile terminal isinstalled with a client software matching the coding rule of thetwo-dimensional code, and a client software installing unit configuredfor automatically providing download and installation of the clientsoftware for the mobile terminal when it is monitored that the mobileterminal is not installed with the client software.

The core server may authorize a mobile terminal or a background serverhaving a two-dimensional code generating unit to autonomously generate atwo-dimensional code (not limited to a recommendation two-dimensionalcode) based on a uniform coding rule. The coding rule is uniformlygenerated by the core server and sent to a mobile terminal or backgroundserver with rights. To execute a closed-loop transaction, respectiveparties involved in the interactive procedure has a uniform coding ruleand decoding rule. Two-dimensional codes such as a transactiontwo-dimensional code, a content promotion two-dimensional code, and arecommendation two-dimensional code, etc., provide instructions forexecuting different acts after being identified dependent on differentaccess rules defined in the coding rule based on which thetwo-dimensional codes are generated.

Jointly referring to FIG. 14 and FIG. 15 , a background server providedwith a verifying unit may identify a digital human being symbol andexecuted operations when interacting with respective parties such as thedigital human being, and compare the identified information with thepredefined rules, so as to provide matching services to the digitalhuman being. The background server may send the identified digital humanbeing symbol information and the act executed by the digital human beingin compliance with the preset rule to the core server via thesending/receiving unit to notify. The core server is provided with anattribute adjusting unit to perform recording and value adjustment withrespect to various attributes under the account of the digital humanbeing or background agency stored in a built-in or external database, toimplement such as award granting, transferring of digital coin quota,etc. The core server may also be provided with a similar verifying unitto identify and verify the corresponding symbol and operation of thedigital human being or background server. The background server may alsoperform recording and value adjustment with respect to the attributes ofthe digital human being accessing to the digital human being networkinitiated thereby in the corresponding database.

The mobile terminal may also provide a corresponding acquiring unit toobtain physical world peculiar elements of the corresponding scene basedon the requirements defined in the two-dimensional code and provide themto the background server or the core server when interacting. Then, theverifying unit of the background serve or core server may identify thephysical world peculiar elements of the digital human being and comparethem with the predetermined policy rule, as one basis for operationssuch as attribute adjustment. Corresponding unit modules may beconfigured for the mobile terminal, background server, and core serverbased on the functions described in respective embodiments of thepresent disclosure.

Embodiment 10

This embodiment provides an example of an information processing methodbased on uniform code issuance to implement promotion of a food center.As shown in FIG. 16 , the method mainly involves a core server and athird-party appointed thereby (in charge of preparing coding rule for atwo-dimensional code, uniform generation of a two-dimensional code,review of granting digital coin quota, and granting the quota), aplatform server (acting as a first background server for providingservices relative to a user or an application server, in charge ofinviting investments from merchants, promotion of commercial ads,facilitating an electronic trade, and management relevant transactionprocedures), one or more application servers (acting as a user relativeto the platform server, while acting as a second background server forproviding services relative to a consumer terminal, in charge ofapplying for an account, applying for being an administrator, editingpromotion content, releasing and disseminating, striking a deal,generating a payment collecting two-dimensional code, presenting orreleasing the payment collecting two-dimensional code, etc.), aconsumer's client or mobile terminal (which may act as a user of thefirst background server and/or the second background server, interactingwith respective other parties through identifying a two-dimensionalaccess, obtaining a service after executing the set operation procedure,and obtaining an award by sharing to others); the interacting processbetween relevant providing parties and the user may refer to theembodiments above.

(1) setting a corresponding platform server for the food center; acorresponding capital account is set at the core server or a third-partyserver appointed thereby to record shares of the digital currency of thefood city, as well as use and change conditions of the digital currency.The food center may obtain a use quota of digital currency through anyone or any combination of the following ways:

1) with tangible or intangible assets (e.g., real estate, intellectualproperties, etc.) as mortgages, issuing a request to the core server ora review agency appointed thereby, and obtaining corresponding digitalcurrency after passing the review.

For example, the platform server of a food center issues a request of“mortgaging with the real estates of the food center for obtainingdigital currency”; the core server, upon being notified from the coreserver or the platform server, assesses the values of the mortgaged realestates, and the core server determines, based on the assessment, that adigital current of for example 2 billion yuan may be granted to theplatform server, and then the corresponding digital currency istransferred into the capital account of the platform server.

2) paying real currency to the core server or a third-party agencyappointed thereby to exchange a share of digital currency, and directlycharging it to the capital account corresponding to the presentplatform.

For example, the food center sends a request for exchanging digitalcurrency to a server of an appointed bank and pays corresponding RMBcurrency; the server of the bank confirms, based on a preset exchangeratio, that a digital currency of for example 2 billion yuan may beexchanged; the server of the bank issues a notification that thecorresponding RMB currency has been received or issues a notificationthat a corresponding digital currency may be exchanged; and the coreserver transfers the corresponding digital current into the capitalaccount of the platform server according to the notification.

Particularly, the exchange ratio is set by the core server or otherappointed agency; usually, the exchange will be made after the platformconfirms. The digital currency may be exchanged back to the realcurrency according to a same or a different exchange ratio.

3) obtaining the digital currency paid by the application server or theuser terminal to the platform server, the corresponding share beingtransferred into the capital account of the platform server from thecapital account of the application server or the user terminal. Afterreceiving the corresponding digital currency, the platform usually needsto provide a service or commodity of an equivalent value to theapplication server or the user terminal, wherein relevant operationsinvolved during this period may refer to the depictions in theaforementioned embodiments.

(2) respective merchants stationed in the food center are respectivelyprovided with a corresponding application server. (1) setting acorresponding capital account at the core server or the platform serveror other third-party server appointed to record shares of the digitalcurrency of respective merchants as well as use and change conditions ofthe digital currency. The merchants may obtain digital currency throughany one or any combination of the following ways:

1) paying real currency to exchange for digital currency;

For example, the application server sends a request to the core server(or a platform server or an appointed third-party agency) and pays thereal currency to exchange for the digital currency; the obtained digitalcurrency is directly changed in the capital account corresponding to thepresent merchant. The exchange ratio is set by the core server or theplatform server or the third-party agency; usually, the exchange will bemade after the application server confirms.

2) executing various operations conforming to digital currency awardrules to obtain the awarded digital currency;

The merchant performs operations of forwarding and recommending thetwo-dimensional code or other forms of promotion contents released byrespective agencies such as the platform server or other applicationservers to obtain the digital currency awarded by the correspondingagency. For example, the application server may release a recommendationtwo-dimensional code to obtain the award of corresponding digitalcurrency calculated based on a weight index (the operations involved mayrefer to the depictions in the foregoing embodiments). The agencygranting the award notifies the core server to transfer a digitalcurrency corresponding to the award into the merchant's correspondingcapital account.

3) purchasing, with the real currency or the digital currency, a shareof digital currency distributed by the platform server, wherein thepurchased share is transferred from the platform's capital account intothe merchant's capital account. Specific interactive operations neededwhen the merchant buys the share may refer to corresponding operationsof buying commodities in the foregoing embodiments.

4) obtaining the digital currency paid by the user terminal to theapplication server, which is transferred from the capital account of theuser terminal into the merchant's capital account; after receiving thecorresponding digital currency, the application server usually needs toprovide a service or commodity of an equivalent value to the userterminal; the corresponding interactive operations may also refer to thedepictions in the foregoing embodiments.

(3) the consumer is provided with a corresponding capital account at thecore server (or the platform server or the application server or otherthird-party server appointed) to record shares of the digital currencyof the consumer as well as use and change conditions of the shares. Theconsumer may obtain digital currency through any one or any combinationof the following ways:

1) paying real current to exchange for digital currency, and directlycharging the digital currency into the capital account of the user.

For example, the client or mobile terminal of the consumer sends arequest to the core server (or the platform server or the applicationserver or an appointed third-party agency) and pays the real currency toexchange for the digital currency; the obtained digital currency isdirectly changed in the capital account corresponding to the consumer.The exchange ratio is set by the core server or the platform server orthe third-party agency; usually, the exchange will be made after theconsumer confirms.

2) purchasing, with a real currency or a digital currency, the digitalcurrency share distributed by the food center, or purchasing a share ofdigital currency redistributed by the merchant, wherein thecorresponding share is transferred into the consumer's capital accountfrom the capital account of the food center platform or the merchant.The specific interactive operations of the consumer with the platformserver or application server via the client or mobile terminal or thelike when buying the shares may refer to various foregoing embodimentsof buying a commodity.

3) executing various operations conforming to digital currency awardrules to obtain the awarded digital currency.

For example, the consumer performs operations of posting andrecommending the two-dimensional code or other forms of promotioncontents released by the application server (or the platform server orvarious other agencies) to obtain the digital currency awarded by thecorresponding server or agency. For example, obtaining an award with acorresponding digital calculated based on a weight index by performingoperations of posting the recommendation two-dimensional code via aclient or a mobile terminal (the operations involved may refer to thedepictions in the foregoing embodiments). The server or agency grantingthe award notifies the core server to transfer the awarded digitalcurrency into the consumer's corresponding capital account.

In a specific example, respective merchants obtain, by paying rents tothe food center, a service of use rights of the place within a setperiod to become a stationing merchant of the food center, following useand settlement rules of the digital currency. Based on an agreementbetween the food center platform and the merchant, the rent may be paidin real currency or digital currency, which, for example, is implementedby various payment manners described in the foregoing embodiments.

Respective merchants may formulate an advertising policy and set awardrules in form of digital currency or other form so as to define thevalue for awarding respective circulation nodes. Codes corresponding tothe contents such as promotion content and award rules are included inthe promotion two-dimensional code released by the merchant; themerchant releases the promotion two-dimensional code. The promotiontwo-dimensional code is generated by the core server or a partyauthorized thereby.

With the mobile terminal, the consumer identifies the promotiontwo-dimensional code or the recommendation two-dimensional code postedby other users to him, or receives a link to a promotion contentreleased by the merchant or other user thereto, such that the consumerviews the corresponding promotion content to access a digital currencyuse ecologic system. The consumer obtains a digital currency awardcorresponding to the transaction by disseminating and forwarding themerchant's promotion two-dimensional code or by generating, on thatbasis, a recommendation two-dimensional code superimposed with theconsumer information according to the award rules set by the merchant.

The consumer's digital currency may be directly circulated and usedamong respective merchants of the food center. The consumer may consumeby paying digital currency to the merchant's application server or thefood center's platform server to obtain a service or a commodity. Tothis end, the merchant's application server or platform server mayrequest the core server or its authorized party to generate a paymentcollecting two-dimensional code based on payable amount, including codedinformation of the corresponding payment collecting account information.

For example, the consumer installs a specific client software (e.g.,WeChat payment, etc., in replacement of a bank card) in the mobileterminal, such that he may identify, on site or remotely, the paymentcollecting two-dimensional code (to replace a POS machine) released bythe merchant according to a decoding rule corresponding to the presetcoding rule, so as to pay corresponding fees to the merchant; the coreserver or other third-party agency recording the consumer digitalcurrency account performs an operation of transferring the digitalcurrency to the merchant's account, and sends the settlement informationto the consumer and the merchant. After receiving the settlementinformation, the merchant provides services or commodities to theconsumer.

Besides, the consumer's capital account may also be implemented in theform of a registered or unregistered prepaid card such as a shoppingcard. The consumer obtains the prepaid card issued by the food centerplatform or merchant by directly paying cash or transferring a realcurrency or digital currency, and consumes directly at the merchant withthe prepaid card, which is not bound with the consumer's account. Themerchant has a device that may identify the amount information of thedigital currency in the prepaid card and collect corresponding payment.Or, the consumer purchases an unregistered prepaid card, transfers, withthe client software installed, the digital currency amount in the cardinto a membership card or consumer account registered at the platform orat the merchant and pays with the balance in the membership card oraccount.

It may be understood that, in some other examples, the platform serverof the food center and the application server of the merchant may switchtheir roles: for examples, the platform server disseminates andrecommends the promotion content released by the application server toobtain a digital currency or other award granted by the applicationserver; or, the platform pays the digital currency to the applicationserver to obtain the services or commodities provided by the applicationserver. Or, the merchant may mortgage its assets to the core server orreview center to obtain a corresponding digital currency, etc.

In the embodiments above, any kind of two-dimensional code as generated,for example, a payment two-dimensional code, a promotion two-dimensionalcode, a recommendation two-dimensional code, etc., or a hyperlinkcorresponding to the two-dimensional code content, is all generated bythe core server or generated under its authorization. If thesetwo-dimensional codes are generated according to the specific codingrule while parsed by only the matching coding rule, then the informationinvolved therein is protected more reliably, which may effectivelyprevent the information from being stolen.

The management issues regarding issuing and using of the digitalcurrency as well as settlement rules thereof may be stripped off fromthe core server, e.g., which are managed by a uniform digital currencyissuing unit, the unit performing operations such as adjusting the quotaof the digital currency based on the notifications from respectiveparties (such as the core server, the review agency, the platformserver, the application server, or the consumer terminal, etc.) duringthe interactive process; the respective interacting parties may query,from the digital currency issuing unit, the digital currency quota ofits own or other parties based on the set rights. The quota of thedigital currency of a certain party or use condition thereof may berecorded, as a certain attribute item, by the core server (or theplatform server or application server or other third-party agency) to bereferenced when adjusting the values of other attributes orcorrespondingly adjusted with value adjustment of other attributes.

In an example, the functions of the core server are deployed indifferent operating servers so as to corresponding to differentoperators, while the main functions of the core server, such asgenerating two-dimensional codes, reviewing and approving credit quotaof the operating servers, etc., are integrated to become a core system.The digital currency quota of the operator is applied by respectiveoperating server to the core system; the core system, after the reviewpasses, grants the quota to respective operating servers; the quotaconsumed when the merchants and users charge and the quota released whenwithdrawing within the operating servers are operated within the quotascope. To this end, with a built-in or external database, the coresystem records, in a list of operating servers, the ID, name, domain,application ID, application key, Token and other information ofrespective operating server, and the amount of the generated objecttwo-dimensional codes or payment two-dimensional codes, etc.; sets alist of digital currency quota for respective operating server to recordthe digital currency quota that may be granted by the operating server,the remained quota of the digital currency that may be granted to themerchants and users (deducting the withdrawal part), etc.

Embodiment 11

This embodiment provides an example of an information processing methodbased on uniform code issuance to implement crowd-funding, as shown inFIGS. 17A and 17B. Corresponding settings of respective parties such asthe core server, the review agency, the platform server, the applicationserver, the consumer terminal, the digital currency issuing unit in theforegoing embodiments may all be applied to this example; otherthird-party servers may be configured when needed.

Supposing that in the above case, the food center need to crowd-fund 2billion yuan (corresponding to the first share), the digital currency ofthe first share is split into 200,000 shares each share being 10,000yuan (corresponding to a second share) by setting a crowd-fundingserver; the 200,000 shares are distributed through the crowd-fundingserver or through a platform server, available for respective otherparties (e.g., stationing merchants, or consumers, or other investmentinstitutions, etc.) to subscribe.

The respective merchants subscribe for shares of the distributed digitalcurrency with real currency (e.g., RMB yuan) from the crowd-fundingserver or platform server through the application server to obtain aplurality of second shares of the digital currency; or, respectivemerchants convert the digital currencies they already own into aplurality of second shares of the distributed digital currency at a setratio (e.g., a digital currency worthy of 8,000 yuan may be used forsubscribing for a share of digital currency worthy of 10,000 yuan).

The consumer may also subscribe for shares of distributed digitalcurrency directly from the crowd-funding server or the platform serverwith real currency or digital currency. Or, the merchant may re-sell theobtained second share of digital currency to consumers. For example, theconsumers may obtain a share of digital currency worthy of 1,050 yuan(corresponding to a third share) with a real currency of 1,000 yuan orby charging a digital currency worthy of 1,000 yuan.

The funds (real currency, digital currency, etc.) obtained by the foodcenter crowd-funding platform may, for example, be used when furtherdeveloping the food center. The shares of the digital currency purchasedby the merchant or consumer may be circulated and used among theplatform server, the application server, and the consumers, etc.; or,the shares of the purchased digital currency may be used for claimingvalue-added rewards from the food center platform and/or merchant when acertain condition reaches an expected setting (including, but notlimited to, when the time, or funding scale, or profits reach setexpectations), or directly obtaining the services or commodities asprovided, or being converted into a voucher for obtaining the servicesor commodities later. The corresponding mechanism (core server,crowd-funding server or digital currency issuing unit, etc.) performscorresponding recording and adjustment in the capital accounts ofrespective parties with respect to the values or changes of the digitalcurrency shares.

As agreed in advance, the voucher may be used by the buyer itself ortransferred to other users for use when set conditions are satisfied, toexchange for corresponding services or commodities with the platformserver or application server or third-party server. The voucher issuedby the distributing party may be implemented in a two-dimensional codeform. Coded information of the voucher two-dimensional code for exampleincludes contents corresponding to the set conditions and the servicesor commodities to obtain; when exchanging the voucher, an exchangetwo-dimensional code where subscriber user information is superimposedon the content corresponding to the voucher two-dimensional code may beset so as to distinguish the subscriber and verify its exchangeridentity. When transferring the voucher, a transfer two-dimensional codewhere the subscriber user information is superimposed on the contentcorresponding voucher two-dimensional code may also be sent, and whenthe transferee is exchanging, an exchange two-dimensional code where thetransferee user information is superimposed on the content correspondingto the transfer two-dimensional code is sent to distinguish thetransferee and verify its exchanger identity. As agreed in advance, thetransferrer or the transferee may notify the platform server orapplication server or the third-party server to record the transfermatter upon transferring the voucher; the notification may also not benotified upon transferring, but verification is directly performed basedon the corresponding content included in the exchange two-dimensionalcode upon exchanging. Respective two-dimensional codes must be generatedby the core server or under authorization of the core server.

Besides, for the rent or other fees paid by a merchant to the foodcenter platform via the application server, the food center will grant acorresponding electronic note and/or grants a corresponding percentageof share of digital currency, as the grounds for the merchant tocontribute to the investment of the food center; when the food centerinvestment earns profits, the merchant may obtain a bonus based on theelectronic note, or exchange the real currency corresponding to thebonus with the share of digital currency.

Supposing that the developer of the food center raises funds throughvarious manners such as the crowd-funding or contribution from thestationing merchants to buy land and build houses, the merchants orconsumers who are granted the corresponding digital currency share orvoucher or electronic notes during fund raising may require thedeveloper to distribute the houses to sell for profits so as to obtainvalue-added rewards (in a form of digital currency, real currency orvarious other forms); or, may require converting, with enough shares,the above into the house per se, or converting into a qualification forbuying a house with discounts, etc.

In the set conditions for determining a redemption, physical worldpeculiarities corresponding to the exchanger (subscriber) and/or thehonor party (e.g., a platform server of the distributing or fund-raisingparty, or an application server, or a third-party server as appointed)may be further agreed upon; then upon redemption, the honor party willfurther verify the physical world peculiarities provided by theexchanger to the honor party when the exchanger was subscribing orexchanging, and/or the honor party will further verify the peculiaritiesof the physical world when the honor party per se is located, todetermine whether the set conditions are satisfied, and then furtherdetermine whether to grant corresponding profits/provide services orcommodities.

Operations such as propagation and recommendation as described in theforegoing embodiments may also be combined with the technical solutionsregarding digital currency and set conditions in the example above tothereby implement a new dissemination management mechanism: for example,an activity of “recommending leading actors/actresses of a movie”launched by an e-commerce website of a film company; the consumer mayview the introduction and promotion contents of the mobile throughvarious means such as a mobile terminal or a webpage browser, e.g., byidentifying the corresponding two-dimensional code or clicking ahyperlink. The consumer may obtain relevant information from the serverof the e-commerce website through various means such as correspondingsoftware installed at the mobile terminal, corresponding clientinstalled in a computer device, or a webpage browser, and executeoperations such as information interaction with the server and dataprocessing.

In different application scenarios, through interacting with the serverof the e-commerce website, the consumer, for example, may select to paya down payment with a real currency or an already owned digital currencyor newly exchanged digital currency to obtain rights of buying ticketswith discount when the movie is on show, or obtain an option of equitysharing when the total box-office profits reach 0.1 billion yuan; thenthe server, after collecting the payment, will grant it a correspondingvoucher, and honor it when conditions such as the movie being on show orbox-office profits are satisfied. For another example, the consumer mayparticipate in the activity to recommend a leading actor to the filmcompany, and if the leading actor is employed, obtains a right of buying100 tickets with discount; the right can be distributed to other usersin a two-dimensional code (generated by the core server or under itsauthorization) form, and when the movie is on show, the right will behonored by the server; for example, each user claims a ticket based onthe information read out from the same two-dimensional code; then thesequence of granting the tickets will be based on time order ofreception of the ticket claiming requests, and when the ticket claimingrequests exceed the predetermined quantity 100, granting of the ticketswill be suspended; or, for example, the consumer generates, in advance,corresponding 100 two-dimensional codes (including different serialnumbers); other users claim the tickets from the server based on theinformation read out from respective two-dimensional codes. For anotherexample, the consumer superimposes the user information of the consumerwith the promotion content of the website activity or the information ofthe leading actor recommended by the consumer, distribute arecommendation two-dimensional code generated (by the core server orunder authorization thereby) and the corresponding hyperlink to otherusers; then, the server, for examples, triggers a right of allowing theconsumer to buy 100 tickets with discount by counting the times of therecommendation two-dimensional codes or its lower tiers ofrecommendation two-dimensional codes being identified when allpropagators under the share chain of the consumer reaches 10,000person-times, or assign rights of buying different numbers of ticketsamong other propagators under the sharing chain based on set weightindexes, etc.

Embodiment 12

This embodiment illustrates a specific application of generating a“digital currency” based on “surplus value in circulation” so as toderivatively creative a “theory of digital human being economy”featuring “capitalization of advertisement placement, equitization ofdissemination and circulation.”

As indicated by Marx in Das Capital, currency was initially originatedfrom a simple, individual, and occasional barter. With development ofproductivity and expansion of commodity production, an augmented valueform forms gradually. When a commodity specifically acting as anequivalent for any commodities is split from the commodity world, auniversal value form emerges. However, further development ofproductivity and further expansion of commodity exchange scope requirethat a universal equivalent should be fixed on a special form ofcommodity; then currency emerges. However, irrespective of value form,the value of a commodity has to be embodied on another real commodity.In an era when a mobile network is “existent anytime and ubiquitous,”which is ignited by population of mobile terminals including wearabledevices, a “digital currency” will emerge to act as a manifestation ofany commodity.

If Marx's Das Capital fully illustrates the theories of “surplus value”in “production” and “currency exchange,” the “digital human being”network theory proposed in the present disclosure further illustrates a“value system in circulation and sharing”; and with a “digitallytraceable and quantifiable” measurement standard, a “digital currency”may emerge to become a “universal equivalent.” In the presentdisclosure, the digital currency is originated from “circulation anddissemination,” while use of the digital current is through a“two-dimensional code system.”

Hereinafter, a specific example of implementing a digital currencyexchange will be introduced. A “digital currency exchange” is anoriginal carrier for stock analysis and dissemination and promotionpages; respective parties may obtain, by accessing a code issuingcenter, a dissemination two-dimensional code corresponding to a contentthat needs to be promoted, and may also implement stock purchase. Ane-commerce website of an automobile manufacturer or “digital human beingexchange,” for example, will raise dissemination and order of a “new carmodel” to test market response (including a willingness to buy the newcar as a final consumer, and a willingness to buy the stock as aninvestor).

The final consumer knows the promotion content in various ways (e.g.,identifying a dissemination two-dimensional code, or accessing thee-commerce website, etc.), enters a corresponding page throughinteraction between the client terminal and the server of the e-commercewebsite to pay advance payment, and selects a real currency (USD/RMB) ordigital currency (digital currency obtained in various ways,particularly a currency value generated in circulation, e.g., digitalcurrency awarded by promoting the car) by paying consideration, toobtain a “right of triggering purchase of option with 800 USD/stock or200,000 USD/car when the stock price rises to 1,000 USD,” therebyimplementing “quantization of the surplus value in dissemination andfeedback to the value of shareholder's stock” and implementing practiceof “Soros' Positive Feedback Theory” by quantization.

For an automobile manufacturer or “digital human being exchange,” themore orders obtained from consumers in the above way, the larger thescale effect is achieved, which may reduce costs, increase marginalprofits, and boost stock price. The automobile manufacturer takes aportion (e.g., 10%) of the total sales revenue as an award fordissemination and promotion to implement payment by promotionperformance, which may reduce conventional advertising fees; besides,the rewards paid for advertising and dissemination will turn intoenterprise profits if the awarded promoters buy the stock or purchasethe cars.

In the whole procedure, it may be designed into a “digital currency”only mode: supposing that the car is priced as 200,000 digitalcoins/car; the award fee for dissemination and promotion is 10%, i.e.,20,000 digital coins/car; the current stock price is 400 digitalcoin/share, the total equity is 1 billion shares, i.e., the market valueis 400 billion digital coins; the total sales amount is 100,000 cars,i.e., the predicted total sales revenue is 20 billion digital coins; thepredicted net profit is 40%, i.e., 8 billion digital coins; the PE ratio(price-earnings ratio) is 100 times, and the market value will reach 800billion digital coins. Then, the surplus value (quantized index) incirculation and dissemination is embodied in three aspects: 1) reductionof advertising fees and effective placement may be quantized into arange of specific percentages of the total sales revenue; 2) thecompany's net profit, and the percentage to convert awards into stocks(options); 3) value-added of the total market value caused by stockprice rise.

Therefore, the digital currency has a “value scale” superior to the“surplus value in production in the traditional economic theory,” whileby measuring the value scale that may be “quantized, digitalized, andcirculated” in the circulation and dissemination, a digital currencysystem may be established (incorporating various main circulationcommodities, such as consumables, bulk commodities, and raw minerals,into the system), which is immune from the inflation caused byover-issuing of respective central banks; in the entire digital humanbeing network world, only the digital currency is used in transaction,circulation, consumption, and award, and its value scale is hooked tothe “three value representations.” When people “leave the digital humanbeing network world” and return to the “real world,” the digitalcurrency may be exchanged into real currency such as “USD/RMB” throughsetting an exchange rate.

The digital currency has a “stable value scale,” because it is hooked tothe surplus value in the circulation, thereby breaking away from thedilemma of over-issuing of paper notes caused by “currently, thecurrencies of respective countries are hooked to USD, while the USD ishooked to gold, which causes gold insufficiency; then under-issuing ofUSD; therefore, they are decoupled from the USD”; the digital currencyhas characteristics such as being generated in circulation, being ableto trace the whole transaction process (satisfying the anti-moneylaundering regulation mode), being safe to pay, and being convenient forcirculation; besides, it satisfies the requirement of “the conventionalmode of first raising funds” for expanding reproduction of enterprise;further, the solution of the present disclosure now may reach “positivefeedback from production capital+effectiveness of circulation anddissemination+advance sale+profit increase causing stock price rise”;therefore, the enterprise may quickly expand the reproduction without alarge production capital after small tests for researches have beencompleted.

Still with the automobile as an example, supposing that to completeupgrading to the latest version and small testing thereon, it isnecessary to expand the reproduction to 100,000 cars, with a predictedsales revenue of 20 billion digital coins; according to the conventionalmode, it is needed to prepare in advance 45% for covering the funds forproduction and sales costs, i.e., 9 billion digital coins; the profit is40%, and the taxation is 15%. However, according to the solution of thepresent disclosure, with an order of 100,000 cars completed throughdissemination and circulation, amounting to a sales revenue of 2 billiondigital coins, as the computing basis, theoretically 10% (i.e., 2billion digital coins) is taken as the “surplus value scale of thecirculation and dissemination” to issue a digital currency for “buyingcars and stocks” (if there is a concern that the automobile manufacturerdoes not have enough credit, it may be required to mortgage part of itsshares, under the precondition that it does not mortgage its stocks(options) before listing, or manufacturing plants, or IPs, etc.).According to the principles described in various foregoing embodiments,the code issuing center signs with the automobile manufacturer tostepwise issue automobile-related digital currency as “rewardexpenditure” to be awarded to propagators (each level of recommenders).

The manufacturer or e-commerce website guides the consumers to pay theadvance payment to thereby complete raising of funds for reproductionexpansion; if only 10,000 cars are ordered, the expenditure of thepromotion expenses will also decrease, so will the total value of thestocks; more stocks need to be taken out to mortgage; “algorithm terms”with respect to corresponding algorithms may be specified when signingwith the code issuing center. Or, “mortgage with the expected benefitsof the dissemination and sharing value of the digital human being as thefounder” may be added to reach an agreement with the code issuingcenter, i.e., “quantizing and cashing the personal credit index andcapability in advance”; algorithm example of the personal credit indexmay refer to the “appraisal index INDEX” mentioned above.

In this example, the mode of “production, sale, circulation, and stockissuance” implemented above is referred to as the “digital human beingstock issuance and exchange.” The code issuing center has the functionof a digital human being stock exchange: the stocks mortgaged by theautomobile manufacturer or used for exchanging digital currency may beregarded as to-be-issued stock (stock mortgage is similar to the marketmaker mechanism, wherein the due diligence includes predicting marketsales of the product, assessing the validity of the moral quality indexof the founder, assessing the product testing, assessing the feasibilityof reproduction expansion, and assessing reliability of theproduction/sale/delivery). The consumer may be awarded with digitalcurrency for his dissemination, may pay the digital currency for buyingthe car, and may also buy the stock of the manufacturer's stock “withthe digital currency in the digital human being world,” and sell thestock after appreciation to obtain digital currency (during the stockappreciation process, the value contribution in the circulation anddissemination may be quantized or partially quantized). Therefore, inthe case, the value of digital currency is hooked to the value ofcirculating and disseminating the car, while indirectly hooked with themarket sale price of the car, and even hooked with the manufacturer'sstock, thereby implementing the value scale of digital currency.

When more and more enterprises select to issue stocks in the exchangemanner, the currency value of the digital currency will become more andmore stable (as a benchmark scale for a package of currencies to resistagainst the inflation of traditional paper notes); the funds obtainedfrom issuing the stock may be monitored in the whole process, such thatthey will not be embezzled, and there will be no risk of “falsefinancial statement”; the dissemination/order index is real-timeproduced and monitored, and the automobile manufacturer's stock indexwill also rise with promotion of the dissemination (i.e., rise of thedissemination index); announcement of the stock in this example may beregarded as “listing announcement of an enterprise,” and the exchange isjust a “digitized securities exchange.”

Currently, various financial institutions, online retailers, andthird-party payment agencies have successively launched their owntwo-dimensional code payment solutions. Besides so many technicalproblems (e.g., non-scene payment, identity identification, securityguarantee, etc.) not solved yet, the market is divided with orderlesscompetition; it is hard for the consumers to choose, and it is alsoimpossible to form a nation-level large data. The present disclosureimplements a top-level planning and systematic resolution fortwo-dimensional applications, which reduces repetitive investment. Byestablishing the “digital human being network digital currency issuingcenter” & “regional two-dimensional code issuing center” and the“national two-dimensional code payment and settlement (public)platform,” security issues caused by hardly authenticating thetwo-dimensional codes independently issued by multiple agencies may besolved through uniform code issuance, which wins consumer recognitionmore easily; by establishing a public settlement platform (similar toUnionPay), the present disclosure addresses the issue of faircompetition, such that all financial institutions, online vendors, andthird-party payment agencies may share national settlement platformresources with their own uniformly authenticated two-dimensional codepayment technologies, and in this way, a structural “big data” withrespect to people's daily life of a significant strategical sense may beobtained.

The award granting manner provided in this example may be regarded as a“fans economy,” which capitalizes advertisement placement, equitizes thepurchase acts, and shapes a super virtual digital currency, and thussolves an important issue existing in the current economics: the DasCapital expounds the “surplus value theory in production”; however, inthe circulation phase in the human society, the “social-modelcirculation and dissemination appraisal” is not “quantized and valued.”To address this issue, the present disclosure provides a technical meansfor implementation.

Embodiment 13

This embodiment provides an application case of a credit digitalcurrency, as shown in FIG. 18 , which involves a cloud platform, one ofa plurality of merchants stationed in the platform, and a digitalcurrency quota reviewing and approving agency, all of which have acorresponding server for data processing and information interaction; aconsumer who having a device such as a mobile terminal to access thedigital human being network; wherein two-dimensional codes needed duringinteraction between the respective parties above are generated by a coreserver of a code issuing center based on a coding rule set with auniform standard.

Particularly, the merchant, as a registered merchant, accesses the cloudplatform and submit an application for obtaining a digital currencyquota to the cloud platform; the platform will send information, such asan asset certification provided by the merchant, credit of the merchant,and business qualification, to the server of the reviewing and approvingserver.

The reviewing and approving agency (e.g., a bank, an insurance company,etc.) grants a corresponding digital currency quota after undergoingassets assessment, creditor assessment, equity assessment, CDM (CleanDevelopment Mechanism), BOT (Building-Operating-Transferring)assessment, PPP (Public-Private Partnership) assessment, etc., andtransfers the quota into the merchant's account. The digital currencyquota is dividable and traceable and may be used as note endorsement.The digital currency obtained by the merchant is equivalent to thevaluation of its assets and credit.

The cloud platform performs a whole-process digitalized transactionmanagement with respect to the issuance and circulation of the digitalcurrency; during the transaction process, requests from respectiveparties for two-dimensional codes are all sent to the cloud platform,such that after interacting between the cloud platform and the codeissuing center, a two-dimensional code generated by the latter will bereturned to respective transaction party. In view that respectiveclients involved in the transaction are all registered users of thecloud platform, the cloud platform will provide a unique two-dimensionalcode for each client, corresponding to the client's information foridentity verification and credit assessment. When needed, the clienttwo-dimensional code may be provided to the reviewing and approvingagency.

Besides, the cloud platform monitors each transaction and collectscommissions according to the percentage agreed with the transactionparties. To implement monitoring, the cloud platform provides a uniquetransaction two-dimensional code, e.g., an order, a warehouse receipt,an invoice, a bill of exchange, a payment collection code, and alsoprovides a unique two-dimensional code for each commodity/service item;then, when disseminating and promoting the commodity/service item, aresult of decoding the coded information corresponding to thetwo-dimensional code may be superimposed in a secondarily generatedrecommendation two-dimensional code. The cloud platform or respectiveother parties may decode the two-dimensional code based on a presetuniform coding rule to obtain the client information, transactioninformation, and commodity/service information therein, and may know thesituations of generating the two-dimensional code at multiple stages andmultiple times, thereby implementing a traceability. Upon transaction,circulation of the digital currency may be implemented in a paymentcollection two-dimensional code form, for example; in view that thepayment collection two-dimensional code is generated by uniform codeissuance, it may be controlled in the whole process, therebyguaranteeing capital security and reducing capital costs.

Suppose the merchant is a travel agency. The travel agency requests,through accessing the cloud platform, requests for and obtains a digitalcurrency quota granted by the reviewing and approving agency, whereinthe quota of the digital currency may be circulated in transactions withoutlets (not limited to real stores or online stores) home and abroad. Atraveler registers, with his mobile terminal, to become a registeredmember of the travel agency, and may buy and exchange digital currenciesat various outlets of the travel agency, or charge, through other ways,his personal digital currency account. Respective outlets upload salesdata to the server of the travel agency and the cloud platform, suchthat the cloud platform settles the sales data of respective outlets anduniformly grant corresponding amounts to the outlets for example at theend of each month.

The traveler may also identify, with his mobile terminal, a promotiontwo-dimensional code regarding the travel agency information or travelroute information exhibited at the outlet, and indirectly interact withthe code issuing center by accessing the cloud platform, to obtain asecondarily generated recommendation two-dimensional code superimposedwith user information of the traveler, for recommending to other usersvia various ways such as a social platform. The cloud platform grants anaward (e.g., various kinds of awards such as a digital currency, or acoupon, etc.) to the traveler according to a policy stipulated by themerchant based on sharing and forwarding conditions of therecommendation two-dimensional code. Because some physical worldpeculiarities of travelers are different, the award may be furtherdifferentiated; the peculiarities may be superimposed in certaininformation interacting with the cloud platform or superimposed in acertain two-dimensional code.

With the traceability of the recommendation two-dimensional code, thecloud platform grants social online business-based transactioncommissions to the user and may summarize relevant data to provideinformation regarding media channels/regions, target audiences,respective levels of people havinginterest/participants/forwarders/consumers, etc. to the travel agency.

Besides, the traveler needn't use foreign currency or credit card whentraveling abroad. To complete payment of the digital currency, it isonly needed to scan, with a mobile terminal, the payment collectiontwo-dimensional code (in replacement of a POS machine) presented by thestore to learn the account information of the payment collector;generally, after confirming the payment amount, the traveler uploadsmember information and payment information to a member management systemof the cloud platform or travel agency; the store will also upload thesales data to the store management system of the cloud platform; thestore management system and the member management system will performinter-system settlement, realizing transfer of the digital currency.After returning home, the traveler may exchange the digital currencyamount in its membership account back to local currency.

The sales data uploaded by respective stores may be in various forms,such as sales slip, order, shipping order, and order for settlement,etc. The cloud platform may further summarize and sort these data toprovide to the agencies that need these data, such as the sore, thetravel agency, a duty-free store manager, or a government agency, etc.for query, to thereby implement big data analysis and guide enterpriseoperation and government planning.

In some examples, the merchant may store the to-be-presented informationinto a cloud space assigned by the cloud platform to the merchant, andclassifying the information into a plurality of information groups, suchas commodity, activity, presentation, etc.; the merchant may alsorequest the agency such as the cloud platform or the code issuing centerto prepare the content involved in any information group into atwo-dimensional code to be released to the external. Respective party,after scanning the two-dimensional code, may access the cloud space toretrieve contents in a corresponding information group. When themerchant requests for code issuance, it may define the identity of thecode scanning party and the operations allowed to be executed by thecode scanning party; then, the coded information of the generatedtwo-dimensional code may include corresponding verification information;it also requires that the code scanning party, when accessing the cloudspace by scanning the two-dimensional code, provide his identityinformation and/or elements of physical world peculiarities, availablefor the platform to verify the identity of the code scanning party andopening corresponding operation rights thereto.

Embodiment 14

This embodiment provides a case of a supply chain management (SCM), asshown in FIG. 19 , which involves an e-commerce network platform, one ofa plurality of operations stationing in the platform, a bank, aconsumable manufacturer, and a logistic service provider, all of whichhave a corresponding server for data processing and informationinteraction; a consumer who having a device such as a mobile terminal toaccess the digital human being network; wherein two-dimensional codesneeded during interaction between the respective parties above aregenerated by a core server of a code issuing center based on a codingrule set with a uniform standard.

The operator obtains rights of relevant services such as setting up anelectronic store, using the transaction platform, etc., by paying storefees. To this end, the server of the operator interacts with the serverof the platform, e.g., paying fees to the platform by identifying apayment two-dimensional code released by the platform; an agency such asthe bank or a core server which records the operator's accountinformation, transfers the corresponding digital currency/real currencyto the account of the platform; the platform provides correspondingservices to the operator based on a notification of payment completionsent from the agency.

The operator signs a product purchase agreement with the manufacturer,sends a request to a bank with respect to the fees needed for purchasingthe product, for applying for an unsecured load, and also sends relevantcontents about products and their purchase prices in the agreementbetween the operator and the manufacturer via the server of the operatoror manufacturer to the servers of the platform and the bank; the serverof the operator submits a loan amount as needed to the servers of theplatform and the bank.

The e-commerce network platform provides a support to the bank for microcredits, e.g., providing, via the server of the platform, credit recordsof the operator on the platform to the bank so as to assist the operatorto get the loan. The manufacturer signs a guaranteed repurchaseagreement with the bank. The bank disburses the loan and directlyappropriates the funds to the manufacturer as the payment for theproducts purchased by the operator. As a capital information platform,the platform provides information such as the loan amount, repurchaseamount, cash flow, available for the bank, the manufacturer, and theoperator to query when needed.

After obtaining the payment, the manufacturer ships the goods purchasedby the operator to a supervising party. That is, the goods purchased bythe operator registered with the platform from the manufactureraccording to the agreement are directly shipped from the manufacturer toa warehouse of a third-party logistics (3PL) appointed by the bank tostore. The operator promotes the commodities he sell to the external ina form of two-dimensional code according to the manners in the foregoingembodiments.

The consumer browses, via various clients, the store on the platform orthe two-dimensional code released by the operator to understand thecommodities as sold; after confirming the commodity to buy, the consumerissues a purchase order to the server of the operator; the server of theoperator issues a transaction instruction to the server of thethird-party logistic service provider based on the order, such that thelogistic server ships the corresponding commodity to the consumer.

The platform may interact with the server of the logistic serviceprovider to obtain the species, quantity and value information of thegood purchased and deposited by the operator, as well as the goodstransaction status information and warehouse management informationunder the supervision of the logistic service provider; with suchinformation, the platform may perform online analysis with respect tothe financial balances of the operator, and if necessary, may providesuch information to respective parties such as the bank, themanufacturer, and the operator to query.

The consumer pays through the client upon receiving the commodity, e.g.,in the two-dimensional code-based mobile payment manner in the foregoingembodiment, to pay the purchased commodity to the operator (or theplatform or the bank). Because two dimensional codes such as thepromotion two-dimensional code, payment two-dimensional code, andrecommendation two-dimensional code are all uniformly generated by thecode issuing center, the platform, through information interaction withthe code issuing center, may monitor the whole process of thetransaction between the operator and the consumer, e.g., providingreceivable information of the operation, payable information of theconsumer, etc., which may be retrieved when queried by respectiveparties such as the bank, the manufacturer, the operator, and theconsumer when needed. The platform provides customer services, handlestransaction complaints and other issues, records credit values of theoperator, records appraiser index of the consumer, and grants award,etc.

The loan is recovered at an appointed supervisory bank, and risk depositis paid according to a certain percentage; if the merchant fails torepay the loan in due time, the manufacturer shall repurchase thecommodities deposited at the logistic service provider according to therisk repurchase agreement, and the repurchase payment is directlytransferred to the supervisory bank, thereby avoiding risks. To thisend, when receiving the repurchase payment from the manufacturer, thebank sends an instruction of delivering the goods to a locationspecified by the manufacturer to the server of the logistic serviceprovider; and the logistic service provider executes relevantoperations. Besides the bank, the platform may also lower the recordedcredit rating of the operator based on the default information of theoperation sent from the bank.

Besides, the merchant may also pledge its legally owned goods forfinancing; the bank entrusts a qualified logistic company to supervisethe goods in the whole transaction process; after the bank determinesthe lowest value, the bank will autonomously determine whether to grantloans to the part exceeding the lowest value.

In this example, the e-commerce service platform may solve the existingproblems such as lacking reasonable and effective profit modes andinsufficient supervision on credible transaction of commodities, therebyproviding a high-quality commodity supply and distribution value chainplatform, which charges by traffics and ensures quality products ofoutstanding enterprises to enter the market.

For the operators, who are faced with the problems of difficulty inobtaining financial support, slow fund recovery, and lack ofcomprehensive logistics services, the solution in this case may providethem with unsecured micro loan support from the bank, speed up theirfund return, and provide them with high quality comprehensive VIPlogistic services.

The bank may solve the problems of logistic supervisory risks and creditmonitoring risks for micro loan services; with collaboration between theplatform and strategic logistic partners, the risks for the logisticservice provider to monitor the warehouse order pledge are reduced; bysharing credit and capital information through the platform, more loans(guarantees) may be provided to small and medium-sized enterprises withtheir future cash flow as a basis, which reduces credit risks whileextending businesses.

To the manufacturer, the high cost of the original channel affects itsprofits, while it is hard to effectively extend the e-commerce channel;through this example, infiltration capabilities of respective operatorsin the consumer market may be fully exploited; with the assistance ofthe platform, the manufacturer and the operator may easily construct ane-commerce value chain with joint efforts, where the operator performsdissemination and promotion using two-dimensional codes or the like,while the manufacturer may focus on products.

The consumer may obtain quality products through the solution in thisexample, and obtain a high quality logistic service matching the qualityproduct. The consumer may also obtain an award granted by the operatoror the platform by performing operations meeting the award policies asdescribed in the foregoing embodiments, e.g., recommending to othersthrough a secondarily generated two-dimensional code, completing atransaction through interacting with the server of the operator orplatform, etc.

Besides, the loan amount, repurchase payment amount, commodity purchasepayment amount and the like in this example are all paid with a digitalcurrency recognized by respective parties; the manner of obtaining thedigital currency may refer to the depictions in the foregoingembodiments. Further, respective parties may exchange, at theirlocalities, the digital currency into corresponding real currency. Thisis particularly suitable when respective parties such as the consumerand the manufacturer are not using the same real currency.

This embodiment provides a win-win novel business mode for multipleparties. It guarantees quality supervision. Logistic services areguaranteed. Goods storage and allocation are uniformly managed. Theenforcement force of the load cooperation agreement between the bank,the goods supplier, and the operator is guaranteed. Credit risks arelowered. It also provides a secure and convenient payment mode forpayment on delivery, which is hugely trustworthy for buyer users andprovides a powerful support for seller users to build a top-level VIPstore.

Embodiment 15

This embodiment provides a case of implementing an informationplatform-based factoring business. In traditional factoring businesses,a factoring company or bank can hardly understand relevant situationsbetween an upstream supplier and a core manufacturer/vendor, e.g.,orders, shipments, acceptance, invoicing, payment, and similarsituations between the core manufacturer/vendor and store customers.Therefore, insufficient information integration and sharing and unclearsales information can hardly provide effective data support to factoringservices. Nonuniform documents and notes and relevant ease ofcounterfeiting documents and notes bring risks to the financier and thefinal creditor; there is also a risk of repetitive pledge financing; themismatch of factoring terms will cause misappropriation of funds; all ofthe above bring a huge operational risk for factoring services.

As shown in FIG. 20 , in this embodiment, with an information platform,the factoring company or bank is interfaced in depth with an enterpriseERP system (enterprise management information platform) of the coremanufacturer/vendor, to obtain sales information such as the orders,materials, capitals between the core manufacturer/vendor and theupstream supplier or client, such that the factoring company or bank maytimely grasp such information and provides a credit financing service tothe whole supply chain based on such information.

The information platform is interfaced with the enterprise ERP systemsof a plurality of core manufacturers/vendors, respectively. Thefollowing will refer to interactive operations between respectiveparties when any one of the core manufacturers/vendors applies to thefactoring company or bank to conduct a factoring service. The enterpriseERP system sends the application for the factoring service, and theinformation corresponding to the factoring service, agreed between thecore manufacturer/vendor and the upstream supplier and/or the client inan agreement, to the information platform. The information agreed in theagreement refers to, for example, but not limited to, the quantity ofitems and purchase prices and the like specified in the order, timelimit and standards and the like involved in respective stages such asshipments, acceptance, payments, and various specific relevantoperations of actual executors of respective stages (e.g., one of thesigning parties of the agreement, or a third-party authorized thereby).

The information platform requests the code issuing center to obtain atwo-dimensional code uniquely corresponding to the factoring servicewith the core manufacturer/vendor based on the application for thefactoring service and the information above as obtained. Whenidentifying the two-dimensional code sent from the information platform(or core manufacturer/vendor) thereto, the factoring company or bankextracts information about the core manufacturer/vendor and relevantagreed operations so as to confirm whether to accept this factoringservice. The code issuing center may also obtain corresponding serviceinformation from the information platform to verify.

In respective steps of the sale execution process, the informationplatform may obtain corresponding real-time service information fromrespective parties to the agreement or a third-party authorized thereby,and add it to record entries correspondingly set by the informationplatform for the core manufacturer/vendor or for the factoring service;and coded content of the two-dimensional code uniquely corresponding tothe core manufacturer/vendor and the factoring service is also includedin the added real-time service information.

For example, the two-dimensional code may also be the sametwo-dimensional code generated upon the original application; however,when identifying it in different stages, the (factoring company or bankor various other agencies) may obtain contents in the record entriescorresponding to different stages in the information platform. Or, afterthe real-time service information of a certain stage is added, theinformation platform requests the code issuing center to superimpose thecontent of real-time service information based on the content of theoriginal two-dimensional code to generate a new two-dimensional code,and (the factoring company or bank or various other agencies) obtain thecorresponding real-time service information by identifying the newtwo-dimensional code so as to verify the factoring service.

Similarly, supposing the respective parties to the agreement agree uponsome newly added relevant operations in a certain stage of the factoredsale business and notify the information platform, the informationplatform may record the information of the newly added operations in therecord entry stored for the factoring service, such that the informationabout the newly added operations may be obtained by identifying theoriginal two-dimensional code or the newly generated two-dimensionalcode.

obtaining of the real-time service information does not purely rely onthe documents uploaded to the information platform from the coremanufacturer/vendor. For example, as to determining whether the shipmentoperation has been completed, the logistics agency or warehouse agencyspecified in the agreement may access, via their respective device,interaction with the information platform to send, to the informationplatform, that the delivery has been made or the acceptance has beenconfirmed, and then the information platform will record thecorresponding information about completion of the shipment stage. Forexample, the logistics agency or warehouse agency may, aftersuperimposing its own identification information and its confirmationinformation of relevant stage of the factoring service based on theinformation of the factoring service, request the code issuing center togenerate a new two-dimensional code, and send the new two-dimensionalcode to the information platform, such that the information platformupdates the real-time service information.

In one example, as shown in FIGS. 20 and 21 , the vendor passing theclient acceptance, performs information registration through a factoringservice application platform at the front end of the informationplatform; a core part of the information platform, after reviewing theregistered information, requests the code issuing center that issuescodes uniformly to generate a two-dimensional code corresponding to thevendor and the factoring content it applies for; an SAP system(financial industry solution platform) at the backend of the informationplatform may generate main data corresponding to the included contentbased on the two-dimensional code. If an endorsement to otherenterprises is required, the vendor provides the two-dimensional codeand the information about the endorsed enterprise to the factoringservice application platform and pre-registers at the factoring serviceapplication platform; the information platform obtains the rights of theendorsed enterprise as registered by the vendor to record. Theenterprise provides a two-dimensional code and its own identification tothe factoring service application platform and performs endorsementregistration at the factoring service application platform; theinformation platform obtains the information of the enterprise and therecorded rights for comparison and confirmation, and in the case ofconfirming the consistency, notifies the SAP system for recording theendorsement records. When the enterprise applies the factoring companyfor the factoring service, the factoring company obtains relevantconditions of the factoring application through the factoring serviceapplication platform based on the information from identifying thetwo-dimensional code, and interacts with the information platform toconfirm the rights of the enterprise; in the case of confirming noerror, the SAP system processes the factoring service.

In an example of reviewing and approving a business flow using theinformation platform, interactions with the vendor and the factoringcompany are added to basic settings of the SAP system on the informationplatform, to set functions such as submitting an amount review andapproval request, amount settlement, and amount review and approval.Based on the original functions of finance, cost, procurement, andproject management of the SAP system, the information platform in thisexample is interfaced with the original SAP system via the SAP interfaceand performs interaction based on the MatrixLink protocol; a frameworkof the information platform is connected to the application database toperform relevant operations of project reviewing and approval and amountaccounting management including main data management, sale support, workflow management, project management, and review management, etc.

As shown in FIG. 22 , setting of the business flow may be implementedthrough the ERP or SAP system within the enterprise, e.g., completing a“general manager A1—sales director A2—salesman A3” reviewing flow andrights setting, or completing a review flow B1, B2, B3 executed bydifferent enterprise staff members.

Settings of the business flow are provided to the O2O server and may beopen to the external partnership; the O2O server may request the codeissuing center to generate a corresponding two-dimensional code based onthe settings; the two-dimensional code generated based on the settings,for example, prescribes that only a specified person may set thebusiness flow according to the work flow A1, A2, A3 or B1, B2, B3.

The corresponding person accesses the interaction with the O2O server byscanning the two-dimensional code with a client device to obtaincorresponding business flow; unique identity information of the clientmay be submitted during the interaction to verify whether it has rightsto execute the operations prescribed by the flow. The O2O server mayinteract with a digital currency quota reviewing and approving centerbased on the unique identity information of the client to settle thedigital currency quota, complete the transaction payment-relatedoperations involved in the business flow.

Therefore, the client may complete, by scanning the two-dimensionalcodes, various prescribed flows such as “review andapproval/acceptance/payment” (execution of some flows need interactivecooperation from respective other parties) to thereby simplify theoperations and enhance network security of the Internet.

Embodiment 16

As shown in FIGS. 23 and 24 , this embodiment involves the followingparties: clients of the user at respective network platforms, which mayperform two-dimensional code scanning, and share and recommend relevantinformation to other persons based on the content identified from thetwo-dimensional code, purchase by paying digital coins, and attendactivities, etc.; a two-dimensional code server that supports userregistration and login, sets sales organizations and channels, generatestwo-dimensional codes, assigns client access, shares a rebate mechanism,and implements client function interface; respective PPP platforminterfaces that are connected to the two-dimensional code server andrespective EC platforms, wherein an interface for quick implementationof connection to respective PPP platforms is developed in advance torealize a client function implementation interface, commodity interface,two-dimensional code interface, and order interface, etc.; andrespective PPP platforms docked to the respective PPP platforminterfaces to implement O2O services, client function implementation,commodity main data login, order processing, etc.

wherein the PPP platform creates a project related to a certaincommodity, which is imported into the two-dimensional code server via aPPP project synchronous interface, and wherein business scope is set inthe two-dimensional code server, and a corresponding two-dimensionalcode is generated and released to the external. After scanning thetwo-dimensional code, the user forwards it to the two-dimensional codeserver to parse, and obtains the corresponding commodity main data fromthe PPP platform based on the parsing result, and after the commoditymain data are read by the two-dimensional code server via a commodityquery interface, the commodity information is presented to the user'sclient.

If the user is satisfactory with the presented commodity, he will placean order; the two-dimensional code server records the order of the user,generates a two-dimensional code related to the order information andthe transaction user information, which is sent, via an order generationinterface, to the PPP platform to generate the order. The PPP platformperforms order processing and feeds back the order information to theuser's client via the PPP platform interface and the order queryinterface of the two-dimensional code server successively. The PPPplatform may also set the functions that need to be executed by theclient, which are transmitted successively via the PPP platforminterface and the functional interface of the two-dimensional codeserver, and then presented to the client.

After the user scans the two-dimensional code and the two-dimensionalcode is parsed by the two-dimensional code server, the user obtains thecorresponding commodity main data from the EC platform based on theparsing result, and after the commodity main data are read by thetwo-dimensional code server via a commodity query interface of the ECplatform interface, the commodity main data are presented to the user'sclient.

The user requests, via the client, the two-dimensional code server togenerate a sharing two-dimensional code and releases the sharingtwo-dimensional code to share with other users. The sharing operation isrecorded by the two-dimensional code server for rebate. The actualcorresponding functions may only be implemented at the client and the ECplatform, wherein the EC platform interface is mainly used forinformation transmission.

By setting the PPP platform interface and EC platform interface, thisembodiment may cause the corresponding platform to be docked with thetwo-dimensional code server, extending the platform with a plurality ofnew service functions based on the two-dimensional code.

Embodiment 17

Besides the two-dimensional code, the information sent from one party torespective other parties during any interacting process in the foregoingembodiments may also be encoded in other forms of coding mediums. Thecoding mediums may be barcode images such as one-dimensional code,two-dimensional code, multi-dimensional code, which are visible to nakedeyes, or the barcode image or its coded information or any other kind ofcoded information may be an optical lattice diagram drawn with afluorescent pen and represented in various forms such as: light-shadowrays, visible light, UV light or infrared light, polarized light,refurbish frequency, etc., or a digitalized acoustic represented with aspecific rule/frequency change, as long as the coding medium maycompletely store the coded information corresponding to the informationthat needs to be sent. Although the one-dimensional code has a limitedstorage information amount, it is also feasible theoretically. Theoptical lattice diagram is generally designed to be unidentifiable orhardly identifiable to naked eyes, and the digitalized acoustic wavesare generally designed to be hardly identifiable by human ears. However,the present disclosure is not limited thereto; when necessary, they maybe made visible to naked eyes/audible to human ears.

A device that identifies any of the coding mediums above, performs dataprocessing to the identified content, and performs various kinds ofcommunication interaction operations with a background server appointedby the coding medium releasing mechanism to obtain contents/servicescorresponding to the coding medium, may also be a wearable device inaddition to the mobile terminal (mobile phone, tablet computer) andpersonal computer as described in the foregoing embodiments. Thewearable device refers to, but not limited to, various human bodywearable parts such as a portion (e.g., for arranging a flexibleinformation display and input screen) of accessories, eyewear, eyewearclips, headwear, hats, tie clips, brooches, bow ties, bracelets,watches, earphones, clothing, shoes. A certain user may besimultaneously equipped with one or more wearable devices.

A wearable device may have all functional modules of a mobile terminalin the foregoing embodiments to replace the functions of the mobileterminal, thereby implementing corresponding operations; or, a certainwearable device may only have some of the functional modules of themobile terminal; but it must coordinate with a smart television, aset-top box, a home smart gateway, a mobile terminal, or further one ormore wearable devices with remaining functional modules so as toimplement the operations performed by a mobile terminal in the foregoingembodiments. The functional modules includes, but not limited to: anobtaining module configured for obtaining a coding medium, e.g., byshooting a visible barcode image using a camera, or receiving an opticallattice diagram or digitalized acoustic wave using a corresponding kindof obtaining module, etc.; a decoder for decoding the obtained codingmedium to obtain coded information; a coded information parsing unit forparsing the coded information and determining whether the coding mediumis generated based on preset coding rule; a transmitting/receiving unitconfigured for interacting with a background server or respective otherparties with respect to information, receiving services or providingservices if the coding medium is generated based on the preset codingrule; an input unit for inputting input information involved in theinteraction process; and a displaying unit is configured for displayingthe identified content or the information that required to be displayedduring the interaction with the background server. These functionalmodules may be integrated into the same wearable device or scattered ina plurality of wearable devices or scattered in a plurality of devicessuch as the wearable device and the mobile terminal. The decoder and/orcoded information parsing unit, for example, may even be arranged in thecore server or background server or third-party server, and the wearabledevice or mobile terminal sends the obtained coding medium to theseservers to identify, etc. The communication mechanism between the mobileterminal and various types of servers in the foregoing embodiments areall applicable to the combination between the wearable device andvarious kinds of servers in this embodiment.

With the wearable device being a smart eyewear as an example, it maycomprise a camera for identifying a barcode image (which may further beconfigured with: an indicating unit (e.g., an indicator lamp) toindicate successful shooting or transmitting of the bar code image; asetting unit for setting shooting speed, definitions, etc.), and furthercomprise a transmitting unit that is in communicative connection withthe mobile terminal or a further wearable device (e.g., a smart watch)in a wired manner or wireless manner such as Bluetooth/WiFi, etc. Thetransmitting unit is configured for sending the shot barcode image tothe mobile terminal or watch. After the barcode image is identified by adecoder and a coded information parsing unit provided in the mobileterminal or watch, the content corresponding to the barcode image issent back to the eyewear and displayed on the screen provided on theeyewear lens (or the content is displayed on the electronic screen ofthe mobile terminal or watch); after the user views the correspondingcontent, operations on the mobile terminal or watch implement sending ofa service providing request to the background server and receiving ofthe provided service. Or, another example of the eyewear furthercomprises a decoder mentioned above; the coded information as decoded issent to the mobile terminal for parsing; while the information displayscreen on the watch individually displays or synchronously displays theparsed information with the mobile terminal. In another example, theeyewear per se may perform all operations such as obtaining codedinformation from the barcode image, identifying, till interacting withthe background sever, and obtaining the service; then, it may replacethe mobile terminal. Or, the mobile terminal is used to signal connectwith the eyewear to synchronously back up the data processed by theeyewear. Of course, the wearable device and the mobile terminal may alsohave a plurality of modified embodiments. It may be understood thatthese modified embodiments all fall within the protection scope of thepresent disclosure.

In different examples, a certain wearable device may be designed to becapable of identifying the one or more coding mediums described above.After obtaining an unidentifiable coding medium (including: unable todecode a certain barcode image, or although the coded information may bedecoded, but a to-be-executed operation defined according to a rulecannot be parsed out), the wearable device or the mobile terminal thatis signal connected therewith, for example, may alert Error, require are-scanning, or be directed to other specified webpage; or no responseis made; or, send the unidentified coding medium to the backgroundserver to identify, etc. When the coding medium is successfullyidentified and the operation flows defined by rules are obtained, thewearable device itself or the mobile terminal or other device driventhereby execute their respective operations.

The wearable device in this embodiment as a device of a digital humanbeing may, like the mobile terminal in any of the foregoing embodiment,access the digital human being network when the user identifies anexplicit or implicit coding medium through the wearable device (or withcooperation of other device terminal), and through operations as agreedin any embodiments above (including but not limited to, generating a newcoding medium (e.g., a recommendation two-dimensional code) by a uniformcore server/coding issuing center or other authorized party andrecommending to other users, initiating an SNS search/SNS help seekingrequest or replying to other person's SNS search or SNS help seeking,completing the transaction, etc.), a corresponding agency such as thecore server/platform server/background server/third party server recordschange of the attribute value (e.g., appraisal index) for the user, withthe corresponding reward (e.g., digital currency) being obtained. Inaddition, during the interaction process with various agencies throughthe wearable device (or cooperation with other device terminal), e.g.,when requesting the background server to provide a service based on theinformation obtained from identifying the coding medium, the user mayreport, to the background server or other agency, some peculiarities ofthe user per se or the physical world he is located(time/location/identity, etc.), so as to obtain peculiar serviceexperiences (e.g., obtaining different discounts) corresponding todifferent peculiarities.

As shown in FIG. 25 , in an application example, enterprise A prepares,through a background server, for a new product AP to be launched to themarket. In an enterprise ERP server (including e-commerce processing),the sales amount and sales revenues of the new product AP are preset;the two-dimensional code is generated by the code issuing centeraccording to a predefined rule, which is released through a televisionrelease channel and a store release channel.

In addition, a certain percentage (AP%) of the sales revenues of theproduct AP is extracted as a promotion fee for marketing, which is paidwith a contacted third-party server (which may be prepaid or paid bystages). This manner covers advertising platforms such as TV stations,organizers of multi-level dissemination, two-dimensional code designand/or technology manufacturers, and server administrators, etc.

The two-dimensional code is released through TV stations. Consumers wearglasses, headphones or other wearable components when watching TVprograms. The user may manipulate a built-in camera of the eyewear toshoot the two-dimensional code displayed at any time on the screen,without a need to take out a mobile terminal to start a shooting action,which is more user-friendly.

In addition to a two-dimensional code visible to human eyes, aninvisible two-dimensional code may also be played on the screen forexample by controlling the display frequency through a TV set-top box.The optical lattice corresponding to the invisible two-dimensional codeis unidentifiable to naked eyes, but may be identified by acorresponding obtaining module of an eyewear, decoded and parsed by adecoder and a coded information parsing module embedded in correspondingclient software.

As long as the consumer stared at the TV picture for several seconds (itmay be set to other duration), the optical lattice may be automaticallycaptured to start the execution flow of various set operations. Theeyewear, watch, and mobile terminal in this example may all be embeddedwith a sense core engine. The sense core engine is asoftware/middleware, which drives the optical camera to identify opticalsignals of the optical lattice. The original optical information as readapplies the two-dimensional code coding/identification principle, andafter undergoing classified identification, error correction, matching,screening and/or signal format conversion, operation instructionscorresponding to respective parties such as the eyewear, the mobileterminal, and the background server. The operation instructions aretransmitted to the background server by the eye glass or mobileterminal, and by further processing based on transaction managementaccording to corresponding rules, the following functions areimplemented, such as download, opening APP, e-commerce, transaction andpayment.

The eyewear drives a mobile terminal (or watch, or laptop, etc.) that iswired or wirelessly connected to itself to communicate with thebackground server. Introduction of the product AP returned from thebackground server is watched by opening the client software of themobile terminal of the consumer (this product introduction may also bepresented on the eyewear lens or the television screen). In addition,the consumer may also interact with the background server through themobile terminal to post comments, answer survey questions, receivecoupons, etc.; a recommended two-dimensional code may be re-generated bya code issuing center and released to other users, such that the mobileterminal becomes a lower level of sales representative of the product APtwo-dimensional code developed through the TV channel.

An order is placed by scanning, with the mobile terminal or eyewear orlike part, the payment two-dimensional code presented on the TV screenor mobile phone screen (or an order placement request is sent through amenu of the set-top box presented on the screen), and the codedinformation is first parsed and verified by the server. After theverification is completed, the coded information is passed to the O2Oserver (private to the enterprise) to implement functions such as TVchannel management, and then passed to the enterprise ERP server tocomplete order processing. The order processing result is fed back to anorder processing serve to perform rebate calculation. The serverextracts a corresponding percentage from the advance payment to returnsto respective corresponding parties including the mobile terminal (theuser of the mobile terminal has the payment/payment collection accountbound to the mobile terminal), the TV station, and the two-dimensionalcode technology manufacturing party, and a third-party server.

As shown in FIG. 26 , in another example, a system capable of providingexercise guidance to a user is provided, wherein when the user wears afirst wearable device (such as an eyewear) to watch a fitness videothrough an eyewear lens or through a screen of a television/mobileterminal, as indicated in P1, the eyewear identifies the two-dimensionalcode (which is preferably not visible to naked eyes; or in anotherexample, a digitalized acoustic wave loaded in the video, which ispreferably unidentifiable by human ears, but identifiable throughearphones; the coded information of the two-dimensional code correspondsto a set of operation procedures required to be executed by relevantdevices.

In view that the devices such as the eyewear, watch, earphone, mobileterminal, TV set-top box in the system are connected with each other ina wired or wireless way, or perform information interaction through ahome smart gateway, when the operation flow defined in the codedinformation of the two-dimensional code may be parsed out by the clientsoftware of the mobile terminal, the operation flow is notified to otherdevices mentioned above such that they may know the operations to beperformed thereby.

Therefore, after the eyewear or the mobile terminal connected with theeyewear identifies the two-dimensional code, it issues a control signalthat drives a sensor in a second wearable device to detect according toa defined flow (as shown in P2-1). The second wearable device, forexample, a smart watch worn by the user, may detect the user's heartrate; or, it is clothes covering the entire body of the user, whereinsensors are embedded in different parts of the corresponding body todetect body conditions such as heartbeat, blood pressure, sweating, etc.

The second wearable device detects physical conditions of the user inreal time as the user moves along with the video according to theoperation flow defined in the codes of the two-dimensional code; when itis judged that the detection result reaches a certain predefinedthreshold (such as too fast heartbeat), the second wearable device sendsa request for “smart alert” to the eyewear or the mobile terminal.

According to the request, a prompt statement or prompt video for playing“deepen the breath and relaxing the abdomen” is triggered on the displayscreen of the eyewear or the mobile terminal (or the eyewear or themobile terminal drives the set top box to display it the display screenof the television),or, the prompt statement (for example, P3-1) isplayed by an earpiece driven by the eyewear or mobile terminal, to guidethe user to adjust his actions.

Supposing that the second wearable device determines that the detectionresult of the user's body is another threshold, according to the definedoperation, an instruction may be issued to drive another device toperform a prompt request for another statement, or an instruction may beissued to switch to the next video. In addition, besides issuingcommands based on the detection results of the user's body, respectivedevices such as the eyewear, smart watch, or mobile terminal may alsodetect other physical world peculiarities or combinations thereof (e.g.,the built-in clock of the mobile terminal shows overtime of exercise)with a built-in or external sensor, for issuing instructions to otherdevices in the system (e.g., issuing a “turn off the video” instructionto the TV set-top box), or further interact with agencies outside thesystem to send control commands or transmit data such as the user'scurrent exercise conditions (for example, the first and second wearabledevices or the mobile terminal release the user's exercise duration onthe social network platform by interacting with the background server,and the platform's server or core server grants different bonusescorresponding to the exercise duration with respect to the user'sexercise conditions), as shown in P3-2, P3-3, P3-4, and P3-5.

In some different examples, the work of judging the acquired values andthe set thresholds may be performed by the second wearable device or maybe performed by the first wearable device or the mobile terminalaccording to different defined operating procedures. According to thejudgment result, the device executing the judgment itself or the otherdevice driven thereby performs the subsequent operations specified inthe flow. The subsequent operations may be performed by one device ormay be performed by interaction with other devices.

In another example, other sensors may be driven to detect by identifyingvarious forms of two-dimensional codes. For example, the two-dimensionalcode in the form of optical lattice is provided on a smart furniture(for example, a set of light sources on an outer surface of arefrigerator embodies the optical lattice by light and dark changesaccording to a coding pattern of the two-dimensional code). For example,an initial two-dimensional code in the form of optical lattice isdisplayed first. A wearable device (such as eyewear) worn by the useridentifies it, and then issues, based on a flow defined by the codedcontent, an instruction to drive the refrigerator to detect. Therefrigerator receives the instruction, detects stored amounts fordifferent foods in the refrigerator (for example, P2-1) through thebuilt-in sensor; a second two-dimensional code indicating the storedamounts is generated under authorization of the code issuing center,wherein the two-dimensional code is represented in an optical latticeform. Then, the wearable device automatically continuously scans thetwo-dimensional code presented on the refrigerator within a set time,until obtains a second two-dimensional code to identify to thereby thestored amounts of foods in the refrigerator. For another example, whenthe refrigerator detects that the amount of a certain food storage iszero, it incorporates an instruction to ask the wearable device topurchase in the coded information of a generated third two-dimensionalcode; then, after identifying the two-dimensional code, the wearabledevice may also purchase foods by interacting with the server ofplatform or the server of a merchant stationing in the platform based onthe link to the e-commerce platform included therein, and the e-commerceplatform notifies the server of a logistics company to deliver goods.The function of the wearable device in this example can also beaccomplished by a mobile terminal or other similar enterprise to deliverthe goods. In this example, the functions of the wearable device mayalso be implemented by the mobile terminal or other similar devices. Theapproach in this example may also be applied to a scenario where asalesperson identifies, with a wearable device, a two-dimensional codeof checking goods inventory.

Although the contents of the present disclosure have been described indetail through the foregoing preferred embodiments, it should beunderstood that the depictions above shall not be regarded aslimitations to the present disclosure. After those skilled in the arthaving read the contents above, many modifications and substitutions tothe present disclosure are all obvious. Therefore, the protection scopeof the present disclosure should be limited by the appended claims.

1. A method of disseminating information based on a grid space,comprising, releasing information to a grid space of a releaser'sinterest to quantitatively evaluate a dissemination effect of theinformation.
 2. The method according to claim 1, comprising: after thequantitative evaluation, further adjusting a dissemination policyformulated by the releaser.
 3. The method according to claim 1, wherein:the grid space matches the releaser's dissemination policy, such that aninteracting party in the grid space accesses the released information.4. The method according to claim 1, wherein: the released information issuperimposed with the releaser's identification information and/or astate of the releaser's attribute.
 5. The method according to claim 1,wherein: the information is further disseminated by the interactingparty in the grid space.
 6. The method according to claim 5, wherein:the disseminated information and the released information have identicalcontents; the disseminated information or an information disseminationbehavior is bound to or associated with the identification informationof a disseminator; and disseminators include a plurality of interactingparties or a plurality of levels of interacting parties that disseminatethe information.
 7. The method according to claim 5, wherein: thedisseminated information is superimposed with one or more of thefollowing items over the released information or bound to or associatedwith one or more of the following items: identification information ofthe disseminators, information newly added by the disseminators, andattribute states of the disseminator; wherein the disseminators includea plurality of interacting parties or a plurality of levels ofinteracting parties which disseminate the information.
 8. The methodaccording to claim 5, wherein: respective interaction nodes ininformation release and/or dissemination are recorded, or traced, orappraised, or rewarded.
 9. The method according to claim 8, wherein:rewarded objects include: source of information dissemination,individual disseminators, and administration platform.
 10. The methodaccording to claim 5, wherein: the information is released via anoffline channel and/or an online channel; and the information isdisseminated via an offline channel and/or an online channel; and 11.The method according to claim 5, wherein: the released information is inthe form of a coding medium; the disseminated information is in the formof a coding medium.
 12. The method according to claim 11, wherein: thecoding medium may be presented via a corresponding device, ortransmitted between corresponding devices, or presented via a webpage orsoftware, or deployed at a physical object in a real-world scenario, ordeployed at a physical object worn by a human body.
 13. The methodaccording to claim 11, wherein: the offline channel and/or onlinechannel that releases or disseminates the coding medium is entitled torewards.
 14. The method according to claim 11, wherein: the codingmedium is deployed at places where potential target client groups gatherso as to understand the preferences and behavior patterns ofindividuals.
 15. The method according to claim 11, wherein: variouskinds of passing population are subject to statistical analysis withrespect to dissemination effects based on the real-world scenario wherethe coding medium is located.
 16. The method according to claim 11,wherein: accessing interaction with a designated interacting party byidentifying the coding medium; or, accessing a designated interactivenetwork by identifying the coding medium.
 17. The method according toclaim 16, wherein: the released information is associated with acommodity or service; any interacting party is enabled to transact withthe designated interacting party based on the released or disseminatedinformation so as to obtain the commodity or service; the transaction issubjected to statistical analysis to quantitatively evaluatedissemination effect.
 18. The method according to claim 17, wherein:rebates are calculated based on channels, sales organization, salesrepresentative, sales price, rebate percentage, and sales on variouschannels are subjected to statistical analysis.
 19. The method accordingto claim 1, wherein: the grid space represents a set of one or more ofthe following attributes in the physical world: region, organization,product group, sales channel, sales representative, reward policy, andscope of activities.
 20. The method according to claim 5, wherein: whenany interacting party obtaining the released or disseminated informationopens the information, the identification information of the interactingparty or the identification information and the attribute state issuperimposed over the opened information to generate another newinformation with identical content but different identificationinformation; the behavior is recorded and assigned to the structured bigdata; and the behavior is configured for expressing the interactingparty's social attitude towards opened and read information.
 21. Themethod according to claim 3, wherein: the releaser's disseminationpolicy involves specification of one or more of the following items:location, time, friend circle, webpage, user identity.
 22. The methodaccording to claim 1, wherein: the real environment and/or virtualenvironment are divided into a plurality of grid spaces based ondifferent physical world characteristics; the physical worldcharacteristics corresponding to any interacting party are helpful toother interacting parties to understand or determine the grid spacewhere the interacting party is located and to understand the realenvironment and/or virtual environment where the interacting party islocated.
 23. The method according to claim 22, wherein: the grid spaceis formed based on one or more of the following items: time parameter,location parameter, environment parameter, and interacting parties'attribute states; wherein the location corresponds to an offline realaddress or corresponds to an online virtual address.
 24. The methodaccording to claim 16, wherein: any interacting party, when interactingwith another interacting party or accessing an interactive process,provides corresponding physical world characteristics including one ormore of the following items: time parameter, location parameter,environment parameter, and the interacting party's identity information;wherein the location corresponds to an offline real address or an onlinevirtual address.
 25. The method according to claim 5, wherein: anyinteracting party obtaining the released or disseminated information isenabled to interact with a designated service provider so as to obtain aservice; or the interacting party obtains different services based onthe physical world characteristics corresponding to the interactingparty and/or service provider.
 26. The method according to claim 22,wherein: elements of the physical world characteristics provided by theinteracting party are compared or verified against elements predefinedin a rule policy, and a comparison or verification result serves as thebasis for screening interacting parties, or granting privileges, orproviding services, or granting rewards, or adjusting attribute states.27. The method according to claim 5, wherein: the physical worldcharacteristics set by the releaser are configured for setting alimitation with respect to the open degree or open scope of the releasedinformation; or the physical world characteristics set by anyinteracting party are configured for setting a limitation with respectto the scope of source of the information that may be pushed to theinteracting party or the scope of source of pushed information.
 28. Themethod according to 4, wherein the attributes of the interacting partyinclude physical world characteristics; or appraisal index; or creditlevel; or a weight index set for the interacting party to adjust otherattribute states of the interacting party; or proportion of a digitalcurrency that is allocable or adjustable by the interacting party andmay be circulated between designated interacting parties; wherein thecurrency refers to a digital currency or a physical currency.
 29. Themethod according to claim 1, wherein: a behavioral operation performedby any interacting party in the grid space where it is located and thephysical world characteristics corresponding to the interacting partywhen performing the behavioral operation are recordable for retrospectand query.
 30. The method according to claim 29, wherein: by identifyingthe identification information of the interacting party, the behavioraloperation performed by the interacting party can be identified, orrecorded, or appraised, or rewarded; and a matched evaluation, orreward, or service is obtained based on the physical worldcharacteristics corresponding to the interacting party or the grid spacewhere the interacting party is located when the behavioral operation isperformed.
 31. The method according to claim 5, wherein: eachinteraction node in releasing and/or disseminating the information canbe rewarded; dependent on different physical world characteristicscorresponding to the interaction node or different grid spaces where theinteracting party is located, the interaction node obtains differentrewards or is subject to different reward calculation rules; and/or,dependent on different physical world characteristics corresponding tothe information obtaining party or different grid spaces where theinformation obtaining party is located, the interaction node obtainsdifferent rewards or is subject to different reward calculation rules.32. The method according to claim 30, wherein: the reward includesadjustment to one or more of the following items corresponding to theinteracting party: proportion of currency that may be allocated andadjusted by the interacting party and may be circulated betweendesignated interacting parties; appraisal index; credit point; creditlevel; and weight index for adjusting other attribute states of theinteracting party; wherein the currency refers to a digital currency ora physical currency.
 33. The method according to claim 11, wherein: thecoding medium is uniformly generated by a code issuance center orgenerated under authorization by the code issuance center; the codingmedium refers to any one or any combination of the following items: abar code image generated from the coding information in a form ofone-dimensional code, two-dimensional code, or multi-dimensional code;an optical lattice diagram generated from the coding information in aform of light-shadow ray or refurbishing frequency variation or in aform of visible light or UV or infrared light or polarized light; and adigitalized acoustic wave or radio wave generated from the codinginformation according to a specific law or a specific frequencyvariation pattern.
 34. An interacting apparatus, wherein the interactingapparatus is configured to implement the information disseminatingmethod based on a grid space according to claim 1; the interactingapparatus refers to a mobile terminal or a wearable device of theinteracting party, configured to perform one or more of the followingitems: identifying a coding medium; sending a request for generating thecoding medium to a core server of a code issuance center to obtain thecoding medium generated by the core server or generated by a third partyauthorized by the core server, or to obtain authorization from the coreserver; interacting with another interacting party's server or mobileterminal or wearable device; transmitting information related tophysical world characteristics; setting or connecting a sensor toacquire information related to the physical world characteristics;comparing or verifying elements in the physical world characteristicsagainst elements defined in a rule policy; and using a currency, orsetting an account related to the currency, wherein the currency refersto a digital currency or a physical currency.
 35. The interactingapparatus according to claim 34, wherein: device information of themobile terminal or wearable device serves as identification informationof an interacting party or is bound to the identification information ofthe interacting party.
 36. A background server, wherein the backgroundis configured to implement the information disseminating method based ona grid space according to claim 1; the background server is configuredto formulate or adjust an information dissemination policy, and thebackground server performs quantitative evaluation on an informationdissemination effect independently or in cooperation with other servers.37. The background server according to claim 36, wherein: the backgroundserver is further configured to perform one or more of the followingitems: formulating a corresponding dissemination policy, or providing acorresponding service, or granting a corresponding reward based on thephysical world characteristics corresponding to the interacting party towhich the background server belongs and/or corresponding to otherinteracting parties or based on the grid space where the interactingparty and/or other interacting parties are located; screening or sortingthe other interacting parties based on the physical worldcharacteristics corresponding to the other interacting parties or basedon the grid spaces where the other interacting parties are located;identifying, or recording, or appraising, or rewarding, or providingservices with respect to the behavioral operations performed by theother interacting parties based on the physical world characteristicscorresponding to the other interacting parties or based on the gridspaces where the other interacting parties are located; acquiring, orrecording, or tracing, or querying, or transmitting the physical worldcharacteristics corresponding to the interacting party to which thebackground server belongs and/or corresponding to the other interactingparties; releasing or forwarding the information to the otherinteracting parties located in corresponding grid spaces; interactingwith the other interacting parties' servers or mobile terminals orwearable devices; transmitting a request for generating a coding mediumto a core server of a code issuance center to obtain the coding mediumgenerated by the core server or generated by a third party authorized bythe core server, or to obtain authorization from the core server;comparing or verifying elements in the physical world characteristicsagainst elements defined in a rule policy; configuring an apparatus foridentifying the coding medium; requesting the code issuance center toissue a currency and obtaining the issued currency; setting an accountassociated with the currency, or using, allocating, and exchanging thecurrency; wherein the currency refers to a digital currency or aphysical currency.
 38. A core server, wherein the core server isconfigured to implement the information disseminating method based on aphysical world grid space according to claim 1; the core server isconfigured to accept a request for generating a coding medium, generatethe coding medium, or authorize a third party to generate the codingmedium, or authorize the interacting party sending the request; theinteracting party sending the request includes the information releaserwhich requests for generating a coding medium corresponding to theto-be-released information.
 39. The core server according to claim 38,wherein: the core server is further configured to perform one or more ofthe following items: quantitatively evaluating an informationdissemination effect independently or in cooperation with other servers;providing a corresponding service, or granting a corresponding rewardbased on the physical world characteristics corresponding to the otherinteracting parties or the grid spaces where the other interactingparties are located; screening or sorting the other interacting partiesbased on the physical world characteristics corresponding to the otherinteracting parties or based on the grid spaces where the otherinteracting parties are located; identifying, or recording, orappraising, or rewarding, or providing services to the behavioraloperations performed by the other interacting parties based on thephysical world characteristics corresponding to the other interactingparties or based on the grid spaces where the other interacting partiesare located; acquiring, or recording, or tracing, or querying, ortransmitting the physical world characteristics corresponding to theother interacting party; interacting with the other interacting parties'server or mobile terminal or wearable device; comparing or verifyingelements in the physical world characteristics against elements definedin a rule policy; configuring an apparatus for identifying the codingmedium; issuing a currency based on the request; managing an accountassociated with the currency, or allocating and exchanging the currency;wherein the currency refers to a digital currency or a physicalcurrency.