CN110322269A - A kind of internet marketing method - Google Patents

A kind of internet marketing method Download PDF

Info

Publication number
CN110322269A
CN110322269A CN201910386089.2A CN201910386089A CN110322269A CN 110322269 A CN110322269 A CN 110322269A CN 201910386089 A CN201910386089 A CN 201910386089A CN 110322269 A CN110322269 A CN 110322269A
Authority
CN
China
Prior art keywords
service
product
key node
information
node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910386089.2A
Other languages
Chinese (zh)
Other versions
CN110322269B (en
Inventor
陈雨霖
李晓祥
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CHENGDU CYBERKEY TECHNOLOGY Co Ltd
Original Assignee
CHENGDU CYBERKEY TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CHENGDU CYBERKEY TECHNOLOGY Co Ltd filed Critical CHENGDU CYBERKEY TECHNOLOGY Co Ltd
Priority to CN202111355980.3A priority Critical patent/CN114511344A/en
Priority to CN201910386089.2A priority patent/CN110322269B/en
Publication of CN110322269A publication Critical patent/CN110322269A/en
Application granted granted Critical
Publication of CN110322269B publication Critical patent/CN110322269B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0207Discounts or incentives, e.g. coupons or rebates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Engineering & Computer Science (AREA)
  • Development Economics (AREA)
  • Strategic Management (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Game Theory and Decision Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

This application provides a kind of internet marketing methods to increase letter in service routine binding technology method when identity identifying technology, Unified coding technology, dynamic node configuration method, dynamic BTS configuration, dynamic rights distribution, operation come the economic and practical product that constructs, intermediary service dynamic is energized, extends business chain, the wisdom marketing management system that extension sale scene and conglomerate merge.The internet marketing method is that product assigns unique identities identification code, different function and meaning are assigned for identity code according to the various states in life cycle where product, pointedly meet management and business demand under current state, come that personalized service is presented automatically with application scenarios, it is each with per family can be on demand come setting information service node and binding information service function, integration configuration resource on demand, dynamic assigns the resource and ability of node, resource allocation and the upstream and downstream collaboration of each intermediate link are driven by operation demand, full chain information sharing, promote operational efficiency and benefit.

Description

A kind of internet marketing method
Technical field
This application involves field of computer technology, in particular to a kind of internet marketing method.
Background technique
In internet and smart phone universal today, industry 4.0, wisdom factory have been provided with the base strip of realization Part, various innovation concepts and new departure, be just constantly done step-by-step under the guidance of Statutes intelligent design, intelligence manufacture these Vision, still, the sale of corresponding with intelligence manufacture product and consumption, there are no the wisdom marketing practices system of set of system, And this is also wisdom society about wisdom consumption institute's household function.Manufacturing enterprise, especially medium-sized and small enterprises, there are no be both able to satisfy Quality tracing, purchase, sales and stock management, and can be effectively controlled and drive Sales Channel, realize precision marketing, increment marketing, culture battalion Pin, consumption go directly and the e-manufacturing marketing management unified platform of bean vermicelli culture.
The generally existing information islands of links such as production, marketing, the consumption of present fast-moving consumer goods, upstream and downstream disconnect, and lack The problems such as Interactive Experience and low efficiency.Manufacturer can not recognize the preference of user demand and consumer groups in time, consumer's The problem timely response that is also unable to get manufacturer after sale, various queries are unable to get the Real-time Answer of manufacturer, product consumption process Chinesization is supported and amusement supports do not have substantially, in addition, without direct association channel between sale advertising and buying behavior, Precision marketing and interaction consumption are difficult to realize, and cause blindness, isolatism and the significant wastage of advertisement, activity investment.Based on body The product quality of part coding traces to the source, production & marketing goods entry, stock and sales, controlling channel, anti-fake anti-channeling, brand creation, consumption interdynamic these function Links can be dispersed in, be dispersed in each department, relatively scattered, there are no form an organic whole to interconnect, mesh Qian Ge enterprise, the loose fragmentary Informatization Service of each link, there are no carrying out fusion perforation under the guidance of a set of theoretical property system, It is echoed without head and the tail, mutually supports, amplifies each other, the data that each link sporadicly acquires, the complete big of industrial chain can not be formed Data do not embody the effect of industrial value multiplier, can't adapt to intelligent design, intelligence manufacture, intelligent consumption, personalization The development trend of service.
There are the products such as some mass consumption fast-moving consumer goods, such as drinks, toiletries, health care products, not only has and produce Product attribute, it may have cultural feature.In existing sale consumption status, it can satisfy people there are no set of system and consuming In the process, to the demand for experience of product culture and dependence, personalized consumption cannot be experienced in process of consumption, wisdom is consumed Enjoyment, can not be with product culture depth integration and scene interaction.
Summary of the invention
In view of this, the application's is designed to provide a kind of internet marketing method, institute before obtaining manufacturing enterprise will Social resources dispatching, Dynamic Integration ability, channel control ability and the fillip not having, can be directly mutual with consumer Dynamic, independence maintenance consumes fan group, also can individual character marketing, precision marketing melts with service depth such as banking and insurance business, entertainments It closes, expands marketing scene and extended service industry chain (supply chain) length.
In a first aspect, the embodiment of the present application provides a kind of internet marketing method, this method comprises:
The unique identities code of product is generated, and the unique identities code is set on the product and is stored in service Device;
Sync database or block linking point are established in manufacturer, regulatory agency's collaboration, save product identification coding, manufacturer's base This type information and encoding verification one time key;Each node of block chain is mutually in step and forms distributed common recognition account book, the public It accesses each time and is just verified and supervised;
The key assignments and access entrance URL retrieved and serviced using product identification code as product information, access entrance URL and production Node serve in product process dynamically associates at runtime, and the scheduler program on server is according to the identity of visitor, geographical position It sets, life cycle state, locating node and management management strategy where time or product, selects corresponding information service;It visits The person of asking and to provide the node of service and service procedure service be dynamic binding at runtime;
Have in the product life cycle production, transport, sale, after sale, consumption time and operation flow, institute on stream Link dynamic definition service node message is needed, node is arranged as discrete nodes chain with time or service logic sequence, and access carries out When in respective nodes dynamic binding service program;
Each information service key node is preset with corresponding activation condition, the information service key node according to The circulation process of the product is arranged, and has preamble and subsequent relationship, only preamble key node between adjacent key node When being met the requirements by condition, the information state of the product just can enter subsequent key node, and activate the subsequent key The procedure service of node, each key node correspond to one of procedure service or a variety of services;
Function serving information required for node each in process is decomposed, it is real to cross webpage, software module or small routine It is existing, unique identifier is assigned to small routine and service page, makes its convenient and node binding;
Each node maintenance one opens resource control table, title, attribute, access limit, operation permission, fortune including resource Row conditional parameter;Dynamic adds or deletes the service routine or device resource of the node, and data resource is functional configuration Process;
Manager carries out Unified Identity coding, each manageable minimum unit to people, equipment, resource, organization A unique identity coding is all distributed, classified packets are carried out to people and organization according to attribute, form Identity Management table, packet Include the relationship of individual and grouping, the authority distribution structure of grouping and individual;Dynamic assigns the corresponding identity attribute of user, according to Identity attribute determines the permission of accessed node, program execution rights, data access and resources use right limit;
Manager carries out dynamic rights distribution to data, procedure service, the various resource setting access levels of equipment and permission And rights management, different visitors belong to different groupings and assign different access levels, possess and access level phase The access authority answered authenticates the identity of visitor, carries out dynamic rights calculating according to Product Status and node state, according to This generates visitor's access authority table under current state, forms the timeliness pass of visitor, which can only be in certain section Under the certain states of point effectively, the state of timeliness and addressable node is by server-side authority management module dynamic chek;System Scheduler program and access control program start service routine, service routine according to the subsidiary parameters of the pass of visitor Corresponding data are accessed according to the subsidiary rights parameters of the pass;
Third party cooperates resource provided by industry, common with the product life cycle as the addition product packet of the product It is permanently present;It to addition product packet, is issued using the intelligent contract that software program defines, carries out preservation and journey with block chain Sequence executes, and the form of account book exercises supervision and deposit card evidence obtaining by memory node in a distributed manner;For newly-increased during product consumption Service, persistence can be carried out in the data record of block chain, and anti-fake anti-channeling and anti-is carried out using the method for encryption Management is denied, specific practice is service subscription, and person is digitally signed transaction and historical record, and service provider remembers history Record carries out signature approval, and data supervision keeper or block chain packing person carry out signature packing, Xiang Shehui publicity block to block Chain is exercised supervision by society and is identified, and guaranteeing that addition product packet can be arbitrated can supervise executable, and permanently survives;
When product is from when entering consumer phase in the commercial distribution stage, setting product has sold mark, and after-sale service is arranged Key node be executable state, follow-up service node bind Extension Services program, in point-of-sale terminal, service routine Buyer is bound, which is endowed the access authority and scheduled service of the node after sale of the product;Once certain product with The identity binding of a certain specific consumer, background service will carry out authentication to the consumer, and provide preset visit It asks permission, enjoys corresponding after-sale service and Extension Services;
After sale include a kind of service that value-added, content extends with Extension Services, there is services and dynamic Service;It is static Service is the pre-sales service item and content clearly arranged, and dynamic Service refers to the industrial chain service including manufacturer The cooperative alliances of quotient and manufacturer, newly-increased service item on demand, background service program with webpage, small routine, micro services side Formula is realized, is loaded on the node of after-sale service by the way of dynamic binding, and consumer can be by scanning the unique body of product The service item that the mode of part code selects dynamic newly-increased;
Visitor obtains the unique identity code in product packaging by smart phone, intelligent code reading device, by mutual Networking the message transmissions comprising product unique code word symbol string and access request to Cloud Server, cloud service program to visitor into Row authentication determines visitor's identity, the status information of product is retrieved so that the unique code of product is index, with visitor's identity Information and product status information come search and calculate the visitor to the product the node access authority, scheduler program according to Access authority starts corresponding service routine, and access control program is according to reading and writing data permission come operation data;Product it is current Status information include the position in intermediate links where product, the time point in life cycle, current owners, quality state, Circulation status and permissive condition calculate access right by access authority distribution module in conjunction with visitor's identity and product status information Limit is added the current access authority table of the user validity period, anti-fake anti-tamper guarantor is carried out by the way of data signature Shield, visitor hold the access pass and obtain procedure service and data access limit;
The procedure information for the current key node that the user uploads according to operating right is received, and according to the user's Operating right records the procedure information of the current key node of upload, and, history procedure information is inquired;
In products in circulation, server receives user and scans unique identities using mobile phone or end of scan by internet Query result, is sent back to the mobile phone or end of scan of user by code;
After the product is purchased, the consumer for buying the product passes through described in the login of unique identities code described in barcode scanning Server, typing personal information and key node information establish being associated with for the product and the consumer that buys the product;
After establishing association, the marketing additional rights of the product are obtained, corresponding after-sale service and Extension Services are enjoyed, The after-sale service includes services and dynamic Service, and services include the pre-sales service item clearly arranged and interior Hold, the service item that the cooperative alliances of industrial chain service provider and manufacturer of the dynamic Service including manufacturer increase newly jointly.
According in a first aspect, the embodiment of the present application provides the first possible embodiment of first aspect, wherein institute State method further include:
Manager is in product life cycle some links, according to business demand, including functional requirement, demands on examination, control Demand processed, data requirements, regulatory requirement, excitation requirement, integration demand, extends a series of increment sections of requirement definition at status requirements Point, these nodes as service, increase believe, trace to the source, product control, goods entry, stock and sales, inspection, marketing, the control of interaction function manage key point, It may be, for example, the production of certain class Product Definition, packaging, storage, transport, wholesale, retail, consumption key node.
According to the first possible embodiment of first aspect, the embodiment of the present application provides second of first aspect Possible embodiment, wherein the method also includes:
Node is arranged by the production of product, storage, logistics, wholesale, retail, consumption, transfer circulation sequence, adjacent segments Have preamble and a subsequent relationship between point, each node be divided into it is optional by with must pass through condition property, binding procedure on node Service is divided into compulsory execution or optionally performs, and result data is divided into the standard of having to comply with or selection execution standard, only preamble When being met the requirements by condition of node, the information state of product just can enter descendant node, and the procedure service of successor node is It can activate, subsequent tasks can be implemented, and ensure that production circulation consumes each stage all by product node administration In controllable manageable range, product whole life cycle items management role and quality requirement are decomposed into discrete node Definition, node tasks distribution, node function quality examination meet management requirement by the single key node of management to ensure product Life cycle management meets the requirements, and completes corresponding set function and additional function.
According to the first possible embodiment of first aspect, the embodiment of the present application provides the third of first aspect Possible embodiment, wherein the method also includes:
The state of node is divided into operating status, ready state, and blocked state waits in line state after state, execution;It is same Time, only one node was in operating status, and front end node sequential search or is held to backend nodes since node chain Row, the implementing result of only predecessor node meet scheduled requirement, and the task execution of present node finishes, the state of present node It is changed to state after executing, the state of descendant node is changed to ready state, meets the primary condition of execution, waits the service of visitor Request, when node in execution because resource contention, external never call factor cause the implementing result of present node to be unable to satisfy Pre-provisioning request, then the node enters blocked state, need other strength intervene just be added execute after state, after present node Node be known as waiting in line state node, wait in line the binding function on node be it is not executable, only pass through ready shape The node of state inspection just can enter execution state.
According to the first possible embodiment of first aspect, the embodiment of the present application provides the 4th kind of first aspect Possible embodiment, wherein the method also includes:
To in the life cycle of product, be defined by a series of key nodes required for service management, to node into Row unique encodings, the coding should include the classification information and node sequence number of the unique identification product, pass through the suitable of node Serial number identifies preamble and subsequent relationship naturally, if selection integer represents node, system maintenance one open product category identification code with The circulation node of the mapping relations of integer code, in this way each product category can be identified with integer.
According to the first possible embodiment of first aspect, the embodiment of the present application provides the 5th kind of first aspect Possible embodiment, wherein the method also includes:
Manager needs according to business for each node dynamic binding service function, these service functions include application service Program, small routine, micro services program, webpage, the service that key node is related to is controlled including acquisition of tracing to the source, quality, circulation records, Anti-channeling inspection, anti-fake Jianzhen, barcode scanning reward, consumption excitation, report and complaint, suggestion feedback, Cultural Services, entertainment interactive, finance Service, consumer's binding, property rights transfer, second purchase, service function and service node are by global administration person or local network operator It freely defines, there is no limit various service functions use the realization side of webpage, small routine or micro services for function type and quantity Formula;Function serving information required for each node in production, circulation, consumption process is decomposed, ties up it conveniently with node It is fixed, it is realized by webpage, software module or small routine, modularization can be used, can also be with micro services, these servlets In Cloud Server or intelligent terminal operation can be downloaded to.
According to the first possible embodiment of first aspect, the embodiment of the present application provides the 6th kind of first aspect Possible embodiment, wherein the method also includes:
Different trigger conditions is arranged for the small routine on node, micro services program in manager, when a triggering condition is met, Small routine is activated and runs;Trigger condition includes the location of product state, circulation status, quality state, preamble node Complete state, external resource association status, time state, visitor's identity, supervision state and other external conditions.
According in a first aspect, the embodiment of the present application provides the 7th kind of possible embodiment of first aspect, wherein institute State method further include:
Product unique identities code contain manufacturer's unique identification code, kind unique identification code and individual unique serial number, with And auxiliary information;Identifying code is added in the tail portion of product unique identities code, the integrality of coding can be verified, source is verified, support Imperial personation, this identifying code is the key by manufacturer, is generated by special algorithm operation, has to resist and forges and prevent manufacturer The function of denying, if authorization and endorsement information in the production process of identifying code comprising third-party intendance mechanism, from testing Relevant information can also be obtained in card code to tangle.
According to the 7th of first aspect the kind of possible embodiment, the embodiment of the present application provides the 8th kind of first aspect Possible embodiment, wherein the method also includes:
To the original text of product unique identities code, comprising: manufacturer's unique identification code, kind unique identification code and individual are only One serial number composition character string carry out asymmetrical digital signature, asymmetrical digital signature result one-time pad dynamic key, The operation result of symmetry algorithm and hash class algorithm is controlled by dynamic key, by multistage operations and algorithm combination, finally Verifying code length and security intensity needed for obtaining.
According to the 7th of first aspect the kind of possible embodiment, the embodiment of the present application provides the 9th kind of first aspect Possible embodiment, wherein the method also includes:
Manufacturer is currently 256 ECC algorithms using the private key of the elliptic curve asymmetric arithmetic ECC independently generated, Can the higher asymmetric arithmetic of ability security intensity, to product digital identity encode, including manufacturer coding, kind coding, product Serial number codes carry out digital digest extraction, are signed with ECC signature algorithm to abstract, obtain two 256 (R, S) respectively 256 hash are carried out, i.e., totally 512 signature hash are as a result, using the two 256 as the key of AES-256 twice, respectively To high 128 and low 128 progress cryptographic calculation of the SHA-256 operation result of digital identity coding, operation result, i.e., two A 128 synthesis are carrying out RipeMD-128 operation, obtain 128 operation results, as the key of next round IDEA operation, Low eight of product digital identity coding input as parameter, obtain 64 encrypted results, that is, the ciphertext conduct of 8 bytes Compression signature code;If obtaining shorter coding, recombinant uses OUTH algorithm, and CCIT-CRC algorithm carries out operation;It is non-right Algorithm is claimed to have RSA, ECC, SM2, symmetry algorithm has SM4, AES, 3-DES, IDEA, and hash algorithm has SM3, SHA, MD, RIPEMD, Hash identifying algorithm with key has HMAC, and checking algorithm has CRC-32, CRC-24, CRC-16, CRC-8, which is specifically used Algorithm and process have application demand to determine;The code Design process only represents a kind of design philosophy for shortening signature code length, The change of any Encryption Algorithm or the increase and decrease of operation process belong to a kind of specific implementation of the design philosophy.
According to the 7th of first aspect the kind of possible embodiment, the embodiment of the present application provides the tenth kind of first aspect Possible embodiment, wherein the method also includes:
Unique device coding is assigned for small routine, webpage, micro services program, the producing method of unique device coding is program Source program carries out digital digest calculating, can also carry out complete Hash operation, then compress to foregoing operation result, can be used Perhaps FPE algorithm carries out Base58 coding or decimal coded to result to checking algorithm, obtains the service routine of preset length ID, this program ID must have stability and uniqueness, that is, in preset period of time, and the program represented is fixed 's;If program during continuous modification, can be mapped to above procedure ID using a positive integer, system maintains one Positive integer in use process, quotes the positive integer to the mapping table of program ID and program name to represent program ID.
According in a first aspect, the embodiment of the present application provides a kind of the tenth possible embodiment of first aspect, wherein The method also includes:
Service system manages the identity information of the producer, logistics provider, agent, retailer, consumer, to different access person Identity carry out automatic identification, provide procedure service respectively according to the identity of visitor, different visitors can only use and from The corresponding service of own identity information, can only check and update information relevant to oneself identity.
According in a first aspect, the embodiment of the present application provides the 12nd kind of possible embodiment of first aspect, wherein The method also includes:
Small routine, webpage are assigned and execute permission, non-executable state, assigns the program in certain node, certain period, certain shape State can star or can not start, can be performed, not can be performed, and generate the incidence relation table of small routine, webpage and node.
According to the 12nd of first aspect the kind of possible embodiment, the embodiment of the present application provides the tenth of first aspect Three kinds of possible embodiments, wherein the method also includes:
Authentication and dynamic rights distribution system is arranged in manager, authenticates at runtime to the identity of visitor, Dynamic rights calculating is carried out according to Product Status and node state, accordingly generates visitor's access authority table under current state, The current access authority table of the user is added validity period, using the side of data signature by the timeliness pass for forming visitor Formula carries out anti-fake anti-tampering protection, and visitor holds the access pass and obtains procedure service and data access limit;System call journey Sequence and access control program start service routine according to the subsidiary parameters of the pass of visitor, and service routine is according to logical Row demonstrate,proves subsidiary rights parameters to access corresponding data;Wherein, Product Status includes position in intermediate links, in Life Cycle Time point, current owners, quality state, circulation status and the permissive condition of phase.
According to the 12nd of first aspect the kind of possible embodiment, the embodiment of the present application provides the tenth of first aspect Four kinds of possible embodiments, wherein the method also includes:
Manager only needs to manage the identity of all kinds of visitors, is dynamically grouped to visitor, adds or deletes on demand The access authority of certain resource realizes the dynamic allocation of permission.
According to the 12nd of first aspect the kind of possible embodiment, the embodiment of the present application provides the tenth of first aspect Five kinds of possible embodiments, wherein the method also includes:
Manager needs dynamic organization and addition Service Source, including procedure service, device service, calculating service, finance Various Informatization Services, are added to each node on demand or serviced accordingly from the knot removal by service, manpower service, are realized Dynamic function management and dynamic resource allocation.
According in a first aspect, the embodiment of the present application provides the 16th kind of possible embodiment of first aspect, wherein The method also includes:
When visitor, which scans the unique identities in product packaging, to be encoded to access service, server first determines whether visitor Identity, obtain visitor where grouping, the addressable product category of the grouping and addressable node are searched, by node Access control list and the filtering of resource control table calculate, and obtain visitor under present node to the access authority of various resources, Form the anti-fake anti-tamper temporary visit pass;Visitor holds the current sign of temporary visit and each node resource is accessed and obtained Take service.
According in a first aspect, the embodiment of the present application provides the 17th kind of possible embodiment of first aspect, wherein The method also includes:
Resource provided by industry, including cultural resource, celebrity resources, insurance service, value preserving gold are cooperated for third party Warm derivative business exists or is permanently present jointly with the product life cycle as the addition product packet of the product;To additional Product packet is defined and is issued in the form of intelligent contract, save with block chain and program executes, in a distributed manner account This form exercises supervision and deposits card evidence obtaining, prevents from distorting and deleting, receives the general supervision of society and the arbitration of regulatory agency;It is right Cultural Services, entertainment service, financial service, hosted service, shared addition, the sharing chain, transfer increased newly in process of consumption Service, can carry out persistence in the data record of block chain, and using the method for password seal carry out anti-fake anti-channeling and Anti-repudiation management, specific practice is service subscription, and person is digitally signed historical record, service provider to historical record into Row signature approves that data supervision keeper or block chain packing person carry out signature packing to block, Xiang Shehui publicity block chain, by Society exercises supervision and identifies, and guaranteeing that addition product packet can be arbitrated can supervise executable, and permanently survives.
A kind of internet marketing method that the embodiment of the present application proposes, by generating the unique identities code of product, and by institute It states unique identities code and is set on the product and is uploaded to server, after the product is purchased, buy the product Consumer the server is logged in by unique identities code described in barcode scanning, typing personal information establishes the product and purchase The association of the consumer of the product, consumer obtain the marketing additional rights of the product by the association.The application is implemented A kind of internet marketing method that example is proposed, so that manufacturing enterprise obtains unprecedented social resources dispatching, dynamic Integration ability, channel control ability and fillip, can directly interact with consumer, and independence maintenance consumes fan group, also can Enough individual character marketing, precision marketing expand marketing scene and extended service with the service depth integration such as banking and insurance business, entertainment Industry chain (supply chain) length.
To enable the above objects, features, and advantages of the application to be clearer and more comprehensible, preferred embodiment is cited below particularly, and cooperate Appended attached drawing, is described in detail below.
Detailed description of the invention
Technical solution in ord to more clearly illustrate embodiments of the present application, below will be to needed in the embodiment attached Figure is briefly described, it should be understood that the following drawings illustrates only some embodiments of the application, therefore is not construed as pair The restriction of range for those of ordinary skill in the art without creative efforts, can also be according to this A little attached drawings obtain other relevant attached drawings.
Fig. 1 is a kind of flow diagram of internet marketing method provided by the embodiments of the present application;
Fig. 2 is the flow diagram of another internet marketing method provided by the embodiments of the present application;
Fig. 3 is a kind of setting schematic diagram of information service key node provided by the embodiments of the present application;
Fig. 4 is a kind of structural schematic diagram of internet marketing system provided by the embodiments of the present application.
Specific embodiment
To keep the purposes, technical schemes and advantages of the embodiment of the present application clearer, below in conjunction with the embodiment of the present application Middle attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is only It is some embodiments of the present application, instead of all the embodiments.The application being usually described and illustrated herein in the accompanying drawings is real The component for applying example can be arranged and be designed with a variety of different configurations.Therefore, below to the application's provided in the accompanying drawings The detailed description of embodiment is not intended to limit claimed scope of the present application, but is merely representative of the selected reality of the application Apply example.Based on embodiments herein, those skilled in the art institute obtained without making creative work There are other embodiments, shall fall in the protection scope of this application.
The embodiment of the present application provides a kind of internet marketing method, as shown in Figure 1, this approach includes the following steps S100-S102:
S100, the unique identities code for generating product, and the unique identities code is set on the product and is uploaded To server, the unique identities code, comprising: graphical label, electronic tag or digital label, wherein the unique identities code It is attached to by the way of printing, printing, firing or labeling on the product.
Sync database or block linking point are established in manufacturer, regulatory agency's collaboration, save product identification coding, manufacturer's base This type information and encoding verification one time key.Each node of block chain is mutually in step and forms distributed common recognition account book, the public It accesses each time and is just verified and supervised, form the public credibility of sustainable growth.
The key assignments and access entrance URL retrieved and serviced using product identification code as product information, access entrance URL and production Node serve in product process dynamically associates at runtime, and the scheduler program on server is according to the identity of visitor, geographical position It sets, life cycle state, locating node and management management strategy where time or product, selects corresponding information service.It visits The person of asking and to provide the node of service and service procedure service be dynamic binding at runtime.
Have in the product life cycle production, transport, sale, after sale, consumption etc. time flows, required ring on stream Save dynamic definition service node message, node is arranged as discrete nodes chain with time or service logic sequence, when access carries out Dynamic binding service program in respective nodes, the acquisition of dynamically load data, interactive service, channel excitation, resource group on node It knits, consumes identification, complains the procedure services such as suggestion, entertainment, banking and insurance business, consumption association, quality tracing, government regulation.
Each information service key node is preset with corresponding activation condition, the information service key node according to The circulation process of the product is arranged, comprising: production node, packaging node, storage node, transit node, wholesale node, Retail node, consumption node, there is preamble and subsequent relationship between adjacent key node, and only preamble key node passes through condition When meeting the requirements, the information state of the product just can enter subsequent key node, and activate the program of the subsequent key node Service, described program service control including acquisition of tracing to the source, quality, circulation record, anti-channeling inspection, anti-fake Jianzhen, barcode scanning reward, disappear Take excitation, report and complaint, suggestion feedback, Cultural Services, entertainment interactive, financial service, consumer's binding, property rights transfer and two Secondary purchase, each key node correspond to one of procedure service or a variety of services.
Function serving information required for node each in the processes such as production, circulation, consumption is decomposed, webpage, soft is crossed Part module or small routine are realized, assign unique identifier to small routine and service page, make its convenient and node binding.
Each node maintenance one opens resource control table, title, attribute, access limit, operation permission, fortune including resource The parameters such as row condition;Dynamic adds or deletes the service routine or device resource of the node, and data resource is functional configuration Process.
Each node maintenance one opens access privilege control table, as an access authority filter, is examined by filter The permission looked into is given to visitor, and access privilege control table includes the mark of all resources under the node, and visit is awarded The identity of visitor, production when asking the attributes such as mark and the access control right of the identity packet of permission, access authority and operation Product state, node state management strategy are related, carry out dynamic mandatory control in access time of origin.Default situations appear in section Identity in point access control list has corresponding access right, and the identity not occurred means to forbid accessing.
Manager carries out Unified Identity coding, each manageable minimum unit to people, equipment, resource, organization A unique identity coding is all distributed, classified packets are carried out to people and organization according to attribute, form Identity Management table, packet Include the relationship of individual and grouping, the authority distribution structure of grouping and individual;Dynamic assigns the corresponding identity attribute of user, according to Identity attribute determines the permission of accessed node, program execution rights, data access and resources use right limit.
Access level and permission is arranged to the various resources such as data, procedure service, equipment in manager, carries out dynamic rights point Match and rights management, different visitors belongs to different groupings and assigns different access levels, possesses and access level Corresponding access authority authenticates the identity of visitor, carries out dynamic rights calculating according to Product Status and node state, Visitor's access authority table under current state is accordingly generated, the timeliness pass of visitor is formed, which can only be at certain Under the certain states of node effectively, the status checkout of timeliness and addressable node is examined by rear server-side authority management module dynamic It looks into.System scheduler and access control program start service routine according to the subsidiary parameters of the pass of visitor, Service routine accesses corresponding data according to the subsidiary rights parameters of the pass.
Third party cooperates resource provided by industry, including cultural resource, celebrity resources, insurance service, value preserving finance etc. Resource and derivative business exist or are permanently present jointly with the product life cycle as the addition product packet of the product.To attached Add product packet, be defined and issue in the form of intelligent contract, save with block chain and program executes, in a distributed manner The form of account book exercises supervision and deposits card evidence obtaining, prevents from distorting and deleting, receives the general supervision of society and the arbitration of regulatory agency. For Cultural Services newly-increased in process of consumption, entertainment service, financial service, hosted service, shared addition, sharing chain, turn It allows service, persistence can be carried out in the data record of block chain, and anti-fake anti-channeling is carried out using the method for password seal With anti-repudiation management, specific practice is service subscription, and person is digitally signed historical record, and service provider is to historical record Carrying out signature approval, data supervision keeper or block chain packing person carry out signature packing to block, Xiang Shehui publicity block chain, It is exercised supervision by society and is identified, guaranteeing that addition product packet can be arbitrated can supervise executable, and permanently survive.
When product is from when entering consumer phase in the commercial distribution stage, setting product has sold mark, and after-sale service is arranged Key node be executable state, starting Cultural Services, entertainment service, insurance service, Claims Resolution service, financial service, renewal, The emerging services such as transfer service, derivative service, these services are only related to a certain specific consumer, so in point-of-sale terminal, It needs to bind buyer, which is endowed the access authority and scheduled service of the node after sale of the product.Once certain is produced The identity binding of product and a certain specific consumer, background service will authenticate the consumer, for preset access Permission enjoys corresponding after-sale service and Extension Services.
After-sale service includes a kind of service that value-added, content extends, and has services and dynamic Service.Services are The pre-sales service item and content clearly arranged, dynamic Service refer to the industrial chain service provider including manufacturer, and The cooperative alliances of manufacturer, newly-increased service item, is the optional service item of consumer jointly, and belonging to dynamic scalable may be selected Service, background service quotient is realized in a manner of webpage, small routine, micro services, is loaded into after sale by the way of dynamic binding On the node of service, consumer can select dynamically newly-increased service item by way of scanning product unique identities code.
Receive the information that is identified using intelligent terminal to the unique identities code of user, the intelligent terminal with it is described Server establishes connection, and the server obtains the identity information of the intelligent terminal, according to the identity information and the use The key node information of family input determines the operating right of the user, determines that the program of the user takes according to the operating right Business, different users correspond to different operating rights, and different operating rights corresponds to different procedure services, and different users is only It can corresponding with oneself identity information procedure service of use, comprising: the product is in production line stage, the identity of the user The producer, subordinate server provide the service of product traceability data input and product packaging data input service for the producer;Institute It states product and enters distribution stage, being provided according to the identity information of logistics practitioner includes product loading time, carrier, supply line Road, the product stream data input service for starting shipment the time;The product enters sales section stage, wholesale, retail node use Family obtains relevant to oneself identity by the identification that records, traces to the source, record, circulation record, the sales incentive note of unpacking of unpacking Record service.
The procedure information for the current key node that the user uploads according to operating right is received, and according to the user's Operating right records the procedure information of the current key node of upload, and, history procedure information is inquired.
In products in circulation, server receives user and scans unique identities using mobile phone or end of scan by internet Query result, is sent back to the mobile phone or end of scan of user by code, query result include the product place of production, manufacturer, the production time, Title, model, products in circulation information, product whether in print, product whether have been sold out, for the product having been sold out, It cannot sell again.
Specifically, unique identities coding is assigned to each product, using secure digital identity coding techniques, there is space Uniqueness is both the code of tracing to the source of product, it may have anti-fake attribute, while the associated purposes of channel anti-channeling, big data is had both, as The key assignments and access entrance of the retrieval of product information and service.
Product unique identities code contain manufacturer's unique identification code, kind unique identification code and individual unique serial number, with And auxiliary information.Identifying code is added in the tail portion of product unique identities code, the integrality of coding can be verified, source is verified, support Imperial personation, this identifying code is the key by manufacturer, is generated by special algorithm operation, has to resist and forges and prevent manufacturer The function of denying, if authorization and endorsement information in the production process of identifying code comprising third-party intendance mechanism, from testing Relevant information can also be obtained in card code to tangle.
To the original text of product unique identities code, comprising: manufacturer's unique identification code, kind unique identification code and individual are only The character string of the compositions such as one serial number carries out asymmetrical digital signature, and the dynamic asymmetrical digital signature result one-time pad is close Key controls the operation result of symmetry algorithm and hash class algorithm by dynamic key, by multistage operations and algorithm combination, most Verifying code length and security intensity needed for obtaining eventually.
Manufacturer is currently 256 ECC algorithms using the private key of the elliptic curve asymmetric arithmetic ECC independently generated, Can the higher asymmetric arithmetic of ability security intensity, to product digital identity encode, including manufacturer coding, kind coding, product Serial number codes carry out digital digest extraction, are signed with ECC signature algorithm to abstract, obtain two 256 (R, S) respectively 256 hash are carried out, i.e., totally 512 signature hash are as a result, using the two 256 as the key of AES-256 twice, respectively To high 128 and low 128 progress cryptographic calculation of the SHA-256 operation result of digital identity coding, operation result, i.e., two A 128 synthesis are carrying out RipeMD-128 operation, obtain 128 operation results, as the key of next round IDEA operation, Low eight of product digital identity coding input as parameter, obtain 64 encrypted results, that is, the ciphertext conduct of 8 bytes Compression signature code.If obtaining shorter coding, recombinant uses OUTH algorithm, and CCIT-CRC algorithm carries out operation.It is non-right Algorithm is claimed there are the multiple choices such as RSA, ECC, SM2, symmetry algorithm has SM4, AES, 3-DES, IDEA and other alternate algorithms, Hash Algorithm has a variety of options such as SM3, SHA, MD, RIPEMD, and the hash identifying algorithm with key has HMAC etc., and checking algorithm has CRC- 32, which algorithm and process specifically used, has application demand to determine for a variety of options such as CRC-24, CRC-16, CRC-8.The volume Code design cycle only represents a kind of design philosophy for shortening signature code length, the change of any Encryption Algorithm or operation process Increase and decrease belongs to a kind of specific implementation of the design philosophy.
Product unique identities coding has a variety of carrying forms, including the forms such as graphical label or electronic tag, uses Printing, printing, fire, the modes such as labeling are permanent product unique identities coding or are periodically attached to the packaging of product On.
Product unique identities coding is the access entrance or URL of service, with operation Cloud Server on the internet or Procedure service is associated on person's enterprise servers, and visitor is compiled by network communication product unique identities are contained using intelligent terminal The link or character string of code are transferred to the application program on Cloud Server, identity of the application program according to visitor, geographical position It sets, life cycle state locating for time or product, selects corresponding information service, and realize interaction interaction;It is namely visit The person of asking provide service node and application program service be it is determining at runtime, the incidence relation with access entrance be dynamic tie up Fixed.
Wherein, above- mentioned information service is true according to the identity of node state and visitor where product as application program Fixed corresponding service, for example, product, in the production line stage, the identity of visitor is the producer, then background service program will be The producer provides: product traceability data input service, product packaging data input service, if product enters distribution stage, that The logistics information typing service of product is just provided according to the identity information of logistics practitioner, including the product loading time, is held Transport people, transportation route, start shipment the time etc., when the life cycle of product enters sales section, wholesale, retail node visitor is Service relevant to oneself identity can be obtained, for example passes through the identification that records, traces to the source, the record, circulation of unpacking of unpacking using product The function services that the background systems such as channel record, sales incentive record, buyer's identity record provide.
S101, after the product is purchased, the consumer for buying the product is stepped on by unique identities code described in barcode scanning Record the server, typing personal information establishes being associated with for the product and the consumer that buys the product.
Specifically, when product is sold, background system detects all preamble nodes and has executed completion, meets sale item Part, once it is that sale status, background system will check the ready shape of the addition product services package of product the product marking The service routine of product, is set as executable state by state, and data are set as readable write state, reservation function, shares function Energy, direct broadcast function, intercommunication function, playing function, selection function are set as executable state, are set using permission filter table, Access authority and execution permission authorize consumer's account number of binding.
S102, establish association after, obtain the marketing additional rights of the product, enjoy corresponding after-sale service and extension Service, the after-sale service includes services and dynamic Service, and services include the pre-sales service entry clearly arranged Mesh and content, the service entry that the cooperative alliances of industrial chain service provider and manufacturer of the dynamic Service including manufacturer increase newly jointly Mesh, Extension Services include that the online play right of famous person's song, the downloading of famous person's song and sharing permission, famous person bless permission, famous person Text programme permission, value insurance permission, repurchase guarantee permission, shared part addition product permission, famous person's video permission and name Any one in permission or combinations thereof is broadcast live in people's distributed collaborative.
Visitor obtains the unique identity code in product packaging by smart phone, intelligent code reading device, by mutual Networking the message transmissions comprising product unique code word symbol string and access request to Cloud Server, cloud service program to visitor into Row authentication determines visitor's identity, the status information of product is retrieved so that the unique code of product is index, with visitor's identity Information and product status information come search and calculate the visitor to the product the node access authority, scheduler program according to Access authority starts corresponding service routine, and access control program is according to reading and writing data permission come operation data;Product it is current Status information include the position in intermediate links where product, the time point in life cycle, current owners, quality state, Circulation status and permissive condition etc. are calculated by access authority distribution module and are accessed in conjunction with visitor's identity and product status information Permission is added the current access authority table of the user validity period, anti-fake anti-tamper guarantor is carried out by the way of data signature Shield, visitor hold the access pass and obtain procedure service and data access limit.
Specifically, the addition product of the after-sale service of product includes but is not limited to: famous person's star's song is chosen, and song is broadcast It puts, famous person blesses language and text programme, famous person's video playing, famous person's distributed collaborative live streaming etc..
The value-added service after sale of product includes: value insurance, and repurchase guarantees.
The entertainment of product, which services, shares, and the owner of famous person's wine can be labeled music or image, then downloading point It enjoys and propagates, broadcasting can be associated with mobile sound equipment.
The Extension Services of product include that entertainment service is shared, allow buyer under primary account number, add a limited number of Sub- account, sub- account can share part entertainment service.
After services of product and the information service of addition product packet are developed by modes such as webpage, small routine, micro services, are managed Reason and dynamic binding.
Above step S100-S102 can show as process as shown in Figure 2 in more detail.
In an optional embodiment, described after establishing association, the marketing additional rights of the product is obtained, are enjoyed After corresponding after-sale service and Extension Services, the method also includes:
The voucher of the product of binding is obtained, and is arranged that the voucher is stored in the product is corresponding The memory space of server is sent in specified mailbox, communication software or SMS.
Specifically, the manufacturer of product, marketer can push coupon, active volume, feedback voucher to the account of product, this A little vouchers can be stored in the memory space that system is distributed automatically, can also be forwarded to mailbox, wechat that consumer specifies and short Letter etc., notification condition and advice method can be set in consumer.
In an optional embodiment, described after establishing association, the marketing additional rights of the product is obtained, are enjoyed After corresponding after-sale service and Extension Services, the method also includes:
Turn to increase when representing request of the product when receiving consumer, passes through representing for the corresponding server of the product Service routine is that the new owner of the product adds account, and temporary visit password is arranged, notifies the new owner;
It receives the new owner and logs in the password modification request after the server, modify the temporary visit password, Generation, which is represented, is recorded and stored in the server.
Specifically, after owner's log-in service system of product, it can be used and represent program, add the account of new owner Number, temporary visit password is set, and new owner logs in background service, changes temporary visit password, is transferred to record and is write typing area Block chain, persistence.
In an optional embodiment, described after establishing association, the marketing additional rights of the product is obtained, are enjoyed After corresponding after-sale service and Extension Services, the method also includes:
Manager is in product life cycle some links, according to business demand, such as functional requirement, demands on examination, control Demand processed, status requirements, data requirements, regulatory requirement, excitation requirement, integration demand, extend increment demand etc. and define it is a series of Node, these nodes as service, increase believe, trace to the source, product control, goods entry, stock and sales, inspection, marketing, the functions such as interaction key point, such as It can be the key nodes such as the production of certain class Product Definition, packaging, storage, transport, wholesale, retail, consumption.
To in the life cycle of product, be defined by a series of key nodes required for service management, to node into Row unique encodings, the coding should include the classification information and node sequence number of the unique identification product, can pass through node Serial number identify preamble and subsequent relationship naturally, if selection integer represents node, system maintenance one opens product category knowledge The circulation node of the mapping relations of other code and integer code, in this way each product category can be identified with integer, each described Key node is preset with corresponding activation condition;
Receive the information that is identified using intelligent terminal to the unique identities code of user, the intelligent terminal with it is described Cloud Server establishes connection, and the Cloud Server obtains the identity information of the intelligent terminal, according to the identity information and institute The key node information for stating user's input determines the operating right of the user;
Whether the activation condition of the Cloud Server verifying current key node has met, and confirmation meets activation condition Afterwards, user uploads the procedure information of current key node by the intelligent terminal, and according to the operating right pair of the user History procedure information is inquired.
Specifically, manager is according to business demand, in product life cycle some links, according to business demand, such as Functional requirement, demand for control, status requirements, data requirements, regulatory requirement, excitation requirement, integration demand, extends demands on examination Increment demand etc. defines a series of nodes, these nodes as service, trace to the source, product control, goods entry, stock and sales, inspection, marketing, the function such as interaction Can binding key point, have preamble and subsequent relationship between adjacent node, each node be divided into it is optional by with must pass through Condition property, binding procedure service is divided into compulsory execution or optionally performs on node, result data be divided into the standard of having to comply with or Person selects execution standard, and only when being met the requirements by condition of preamble node, the information state of product just can enter subsequent section The procedure service of point, successor node can activate, and subsequent tasks can be implemented, and ensure product by product node administration Production circulation consumes each stage all in controllable manageable range, product whole life cycle items management role and matter Amount requires to be decomposed into discrete node definition, node tasks distribution, node function quality examination, by managing single key node Meet management to require to ensure that Production Lifecycle Management meets the requirements, and completes corresponding set function and additional function.
Manager needs according to business for each node dynamic binding service function, these service functions include application service Program, small routine, micro services program etc., the service that key node is related to record including acquisition of tracing to the source, quality control, circulation, are anti- Alter inspection, anti-fake Jianzhen, barcode scanning reward, consumption excitation, report and complaint, suggestion feedback, Cultural Services, entertainment interactive, finance clothes Business, consumer's binding, property rights transfer, second purchase etc., service function and service node are by global administration person or local network operator It freely defines, there is no limit various service functions use the realization side of webpage, small routine or micro services for function type and quantity Formula decomposes function serving information required for node each in the processes such as production, circulation, consumption, makes its convenient and node Binding is realized by webpage, software module or small routine, can use modularization, can also be with micro services, these small service journeys Sequence can Cloud Server or download to intelligent terminal operation.
Each node maintenance one opens resource control table, title, attribute, access limit, operation permission, fortune including resource The parameters such as row condition;Dynamic adds or deletes the service routine or device resource of the node, and data resource is functional configuration Process.Each node is given to visitor as an access authority filter, by the permission of filter inspection, visits It asks that permission control table includes the mark of all resources under the node, and the mark of the identity packet of access authority is awarded, with And the attributes such as access control right.Default situations, the identity appeared in node visit control table have corresponding access Power, the identity not occurred mean to forbid accessing.
Unified Identity coding is carried out to the people of service platform management, equipment, resource, organization, each manageable Minimum unit all distributes a unique identity coding, carries out classified packets to people and organization according to attribute, forms identity Table is managed, the relationship including individual and grouping, authority distribution structure of the grouping with individual;Participant of the manager to plateform system Or user, including manufacturer, circulation quotient, agent, retailer, service provider, consumer etc. carry out Identity Management, to different Group or individual carry out identities grouping, assign the corresponding identity attribute of user, access is determined according to identity attribute Permission, program execution rights and the data access and resources use right of node limit.
Unique device coding is assigned for programs such as small routine, webpage, micro services, the producing method of unique device coding is journey Sequence source program carries out digital digest calculating, can also carry out complete Hash operation, then compress to foregoing operation result, such as Using checking algorithm, perhaps FPE algorithm carries out Base58 coding or decimal coded to result, obtains the service of preset length Program ID, this program ID must have stability and uniqueness, that is, in preset period of time, and the program represented is Fixed.If program during continuous modification, can be mapped to above procedure ID using a positive integer, system is maintained One positive integer in use process, quotes the whole number to the mapping table of program ID and program name to represent program ID.To small Program, webpage, which assign, executes permission, not executable etc. states, assigns the program in certain node, certain period, certain state etc. can open It moves or can not start, can be performed, not executable etc. conditions, generate the incidence relation table of small routine, webpage and node.
Access level and permission is arranged to the various resources such as data, procedure service, equipment in manager, and different visitors belongs to In different groupings and different access levels is assigned, possesses access authority corresponding with access level.Service system management The identity information of the producer, logistics provider, agent, retailer, consumer carry out automatic identification to the identity of different access person, Procedure service is provided respectively according to the identity of visitor, and different visitors can only use clothes corresponding with oneself identity information Business, can only check and update information relevant to oneself identity, for example, providing the essential information typing of product for the producer, compiling Volume and storage service, provide the record service of storage for warehousing management person;Product transmitting-receiving and transportation route are provided for logistics provider Data input etc..
Authentication and dynamic rights distribution system is arranged in manager, authenticates at runtime to the identity of visitor, According to Product Status (including the position in intermediate links, the time point in life cycle, current owners, quality state, circulation State and permissive condition etc.) and node state progress dynamic rights calculating, accordingly generate visitor's access right under current state Table is limited, the timeliness pass of visitor is formed, the current access authority table of the user, validity period is added, using data label The mode of name carries out anti-fake anti-tampering protection, and visitor holds the access pass and obtains procedure service and data access limit;System Scheduler program and access control program start service routine, service routine according to the subsidiary parameters of the pass of visitor Corresponding data are accessed according to the subsidiary rights parameters of the pass.Manager only needs to manage the identity of all kinds of visitors, moves State is grouped to visitor, adds or deletes the access authority of certain resource on demand, realizes the dynamic allocation of permission.Manager is also Dynamic organization and addition Service Source, including procedure service, device service, calculating service, financial service, manpower service are needed, Various Informatization Services are added to each node on demand or are serviced accordingly from the knot removal, realize dynamic function management and Dynamic resource allocation.
When visitor, which scans the unique identities in product packaging, to be encoded to access service, server first determines whether visitor Identity, obtain visitor where grouping, the addressable product category of the grouping and addressable node are searched, by node Access control list and the filtering of resource control table calculate, and obtain visitor under present node to the access authority of various resources, Form the anti-fake anti-tamper temporary visit pass;Visitor holds the current sign of temporary visit and each node resource is accessed and obtained Take service.
In an optional embodiment, as shown in figure 3, the key node, comprising: production node, packaging node, storage Node, transit node, wholesale node, retail node, consumption node.
Specifically, above-mentioned key node set-up mode can be the production of certain class product, packaging, storage, transport, it is wholesale, The key nodes such as retail, consumption, node are arranged by the circulations sequence such as the production of product, storage, logistics, wholesale, retail, consumption Column.
Node is arranged by the circulations sequence such as the production of product, storage, logistics, wholesale, retail, consumption, transfer, adjacent Have preamble and subsequent relationship between node, each node be divided into it is optional by with the conditions property such as must pass through, bound on node Procedure service is divided into compulsory execution or optionally performs, and result data is divided into the standard of having to comply with or selection execution standard, only When being met the requirements by condition of preamble node, the information state of product just can enter descendant node, the program clothes of successor node Business can activate, and subsequent tasks can be implemented, and ensure that each rank is consumed in production circulation by product node administration Section all in controllable manageable range, is decomposed into product whole life cycle items management role and quality requirement discrete Node definition, node tasks distribution, node function quality examination meet management requirement by the single key node of management to ensure Production Lifecycle Management meets the requirements, and completes corresponding set function and additional function.
In an optional embodiment, the activation condition, comprising: the location of product state, circulation status, quality State, the complete state of preamble node, external resource association status, time state, visitor's identity, supervision state and other outer Portion's condition.
Specifically, different trigger conditions is arranged for the small routine on node, micro services program in manager, triggers when meeting When condition, small routine is activated and runs.Trigger condition includes the location of product state, circulation status, quality state, preceding The complete state of sequence node, external resource association status, time state, visitor's identity, supervision state and other external conditions.
In an optional embodiment, the circulation status, comprising: the state of node is divided into operating status, ready state, Blocked state waits in line state after state, execution.The same time, only one node was in operating status, from node chain Beginning front end node to backend nodes, sequential search or execution, the implementing result of only predecessor node meets scheduled requirement, The task execution of present node finishes, and the state of present node is changed to state after executing, and the state of descendant node is changed to ready shape State meets the primary condition of execution, waits the service request of visitor, when node in execution because resource contention, it is external not The factors such as calling cause the implementing result of present node to be unable to satisfy pre-provisioning request, then the node enters blocked state, needs it Its strength come intervene just be added execute after state, the node after present node is known as waiting in line state node, wait in line Binding function on node be it is not executable, only by the node of ready state inspection, just can enter execution state.
The embodiment of the present application provides a kind of internet marketing system again, as shown in figure 4, the system includes:
Unique identities code generation module 20 is arranged for generating the unique identities code of product, and by the unique identities code In on the product and being uploaded to server, the unique identities code, comprising: graphical label, electronic tag or digital label, Wherein, the unique identities code is attached on the product by the way of printing, printing, firing or labeling.
Specifically, unique identities coding is assigned to each product, using secure digital identity coding techniques, there is space Uniqueness is both the code of tracing to the source of product, it may have anti-fake attribute, while the associated purposes of channel anti-channeling, big data is had both, as The key assignments and access entrance of the retrieval of product information and service.
Product unique identities coding has a variety of carrying forms, including the forms such as graphical label or electronic tag, uses Printing, printing, fire, the modes such as labeling are permanent product unique identities coding or are periodically attached to the packaging of product On.
Product unique identities coding is the access entrance or URL of service, with operation Cloud Server on the internet or Procedure service is associated on person's enterprise servers, and visitor is compiled by network communication product unique identities are contained using intelligent terminal The link or character string of code are transferred to the application program on Cloud Server, identity of the application program according to visitor, geographical position It sets, life cycle state locating for time or product, selects corresponding information service, and realize interaction interaction;It is namely visit The person of asking provide service node and application program service be it is determining at runtime, the incidence relation with access entrance be dynamic tie up Fixed.
Wherein, above- mentioned information service is true according to the identity of node state and visitor where product as application program Fixed corresponding service, for example, product, in the production line stage, the identity of visitor is the producer, then background service program will be The producer provides: product traceability data input service, product packaging data input service, if product enters distribution stage, that The logistics information typing service of product is just provided according to the identity information of logistics practitioner, including the product loading time, is held Transport people, transportation route, start shipment the time etc., when the life cycle of product enters sales section, wholesale, retail node visitor is Service relevant to oneself identity can be obtained, for example passes through the identification that records, traces to the source, the record, circulation of unpacking of unpacking using product The function services that the background systems such as channel record, sales incentive record, buyer's identity record provide.
Relating module 21, the consumer for after the product is purchased, buying the product pass through described in barcode scanning only One identity code logs in the server, typing personal information, establishes being associated with for the product and the consumer of the purchase product.
Specifically, when product is sold, background system detects all preamble nodes and has executed completion, meets sale item Part, once it is that sale status, background system will check the ready shape of the addition product services package of product the product marking The service routine of product, is set as executable state by state, and data are set as readable write state, reservation function, shares function Energy, direct broadcast function, intercommunication function, playing function, selection function are set as executable state, are set using permission filter table, Access authority and execution permission authorize consumer's account number of binding.
Authority acquiring module 22, for after establishing association, obtaining the marketing additional rights of the product, the marketing is attached Weighting limit includes that the online play right of famous person's song, the downloading of famous person's song and sharing permission, famous person bless permission, famous person's text exhibition Broadcast permission, value insurance permission, repurchase guarantee permission, shared part addition product permission, famous person's video permission and famous person strange land Any one in permission or combinations thereof is broadcast live in collaboration.
Specifically, the addition product of the after-sale service of product includes but is not limited to: famous person's star's song is chosen, and song is broadcast It puts, famous person blesses language and text programme, famous person's video playing, famous person's distributed collaborative live streaming etc..
The value-added service after sale of product includes: value insurance, and repurchase guarantees.
The entertainment of product, which services, shares, and the owner of famous person's wine can be labeled music or image, then downloading point It enjoys and propagates, broadcasting can be associated with mobile sound equipment.
The Extension Services of product include that entertainment service is shared, allow buyer under primary account number, add a limited number of Sub- account, sub- account can share part entertainment service.
After services of product and the information service of addition product packet are developed by modes such as webpage, small routine, micro services, are managed Reason and dynamic binding.
In an optional embodiment, the authority acquiring module 22, further includes:
The voucher of the product of binding is obtained, and is arranged that the voucher is stored in the product is corresponding The memory space of server is sent in specified mailbox, communication software or SMS.
Specifically, the manufacturer of product, marketer can push coupon, active volume, feedback voucher to the account of product, this A little vouchers can be stored in the memory space that system is distributed automatically, can also be forwarded to mailbox, wechat that consumer specifies and short Letter etc., notification condition and advice method can be set in consumer.
In an optional embodiment, the system also includes:
Turn to increase module 23, for passing through the product pair when receiving when representing request of the consumer turn increasing product The server answered represents service routine, is that the new owner of the product adds account, and temporary visit password is arranged, notifies The new owner;It receives the new owner and logs in the password modification request after the server, modify the temporary visit Password, generation, which is represented, is recorded and stored in the server.
Specifically, after owner's log-in service system of product, it can be used and represent program, add the account of new owner Number, temporary visit password is set, and new owner logs in background service, changes temporary visit password, is transferred to record and is write typing area Block chain, persistence.
The embodiment of the present application is raw in product by mission requirements by assigning unique identifier for any product on Internet of Things It produces, circulate, each link of consumption defines service node, the acquisition of dynamically load data, interactive service, prison of tracing to the source on this node Pipe, channel excitation, resource tissue, consumption identify, complain suggestions, entertainment, banking and insurance business, consumption be associated with etc. procedure services and Information service comes dynamic organization with application scenarios on demand and drives the resource of each link, and dynamic assigns node different resources And ability, the critical data of acquisition is automatically analyzed and is classified, realization trace to the source call to account, qualitative control, anti-fake, anti-channeling, essence The functions such as quasi- advertisement, Culture Marketing, bean vermicelli marketing, consumption interdynamic have inexpensive, easy to maintain, easy use, easily promote, can expand The features such as exhibition;The new platform of new system is encoded to entrance with product unique identities, establishes through logical between business and consumer Road has been bonded other derivative service industries, increases marketing scene and service content, extends industrial chain, banking and insurance business, throws Money financing, entertainment, anti-fake anti-channeling, the services such as call to account of tracing to the source mutually are merged, and are enhanced each other, the consumption demand of energy quick response, Increase added value of product, expand the consumer group, consumption confidence and satisfaction will be significantly greatly increased in service platform, while new production of being born Industry and new business have great exemplary role to industrial upgrading, service upgrade.
In embodiment provided herein, it should be understood that disclosed method and apparatus, it can be by others side Formula is realized.The apparatus embodiments described above are merely exemplary, for example, the division of the unit, only one kind are patrolled Function division is collected, there may be another division manner in actual implementation, in another example, multiple units or components can combine or can To be integrated into another system, or some features can be ignored or not executed.Another point, shown or discussed is mutual Coupling, direct-coupling or communication connection can be INDIRECT COUPLING or communication link by some communication interfaces, device or unit It connects, can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme 's.
In addition, each functional unit in embodiment provided by the present application can integrate in one processing unit, it can also To be that each unit physically exists alone, can also be integrated in one unit with two or more units.
It, can be with if the function is realized in the form of SFU software functional unit and when sold or used as an independent product It is stored in a computer readable storage medium.Based on this understanding, the technical solution of the application is substantially in other words The part of the part that contributes to existing technology or the technical solution can be embodied in the form of software products, the meter Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be a People's computer, server or network equipment etc.) execute each embodiment the method for the application all or part of the steps. And storage medium above-mentioned includes: that USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited The various media that can store program code such as reservoir (RAM, Random Access Memory), magnetic or disk.
It should also be noted that similar label and letter indicate similar terms in following attached drawing, therefore, once a certain Xiang Yi It is defined in a attached drawing, does not then need that it is further defined and explained in subsequent attached drawing, in addition, term " the One ", " second ", " third " etc. are only used for distinguishing description, are not understood to indicate or imply relative importance.
Finally, it should be noted that embodiment described above, the only specific embodiment of the application, to illustrate the application Technical solution, rather than its limitations, the protection scope of the application is not limited thereto, although with reference to the foregoing embodiments to this Shen It please be described in detail, those skilled in the art should understand that: anyone skilled in the art Within the technical scope of the present application, it can still modify to technical solution documented by previous embodiment or can be light It is readily conceivable that variation or equivalent replacement of some of the technical features;And these modifications, variation or replacement, do not make The essence of corresponding technical solution is detached from the spirit and scope of the embodiment of the present application technical solution.The protection in the application should all be covered Within the scope of.Therefore, the protection scope of the application shall be subject to the protection scope of the claim.

Claims (18)

1. a kind of internet marketing method, it is characterised in that, this method comprises:
The unique identities code of product is generated, and the unique identities code is set on the product and is stored in server;
Sync database or block linking point are established in manufacturer, regulatory agency's collaboration, save product identification coding, manufacturer's basic model Information and encoding verification one time key;Each node of block chain is mutually in step and forms distributed common recognition account book, and the public is each Secondary access is just verified and is supervised;
The key assignments and access entrance uniform resource locator retrieved and serviced using product identification code as product information, access entrance Uniform resource locator dynamically associates at runtime with the information service key node in goods batch, the scheduling journey on server Sequence according to the identity of visitor, geographical location, the time, life cycle state where product, locating information service key node, with And management management strategy, select corresponding information service;Visitor and information service key node and service procedure service be Dynamic binding when operation;
Goods batch include production in the product life cycle, transport, sale, after sale, consumption time and operation flow, information clothes Business key node is arranged as discrete nodes chain with time or service logic sequence, in corresponding information service key section when access carries out Dynamic binding service program on point;
Each information service key node is preset with corresponding activation condition, and the information service key node is according to the product Circulation process arranged, have preamble and subsequent relationship, only preamble information service between neighbor information service key node When being met the requirements by condition of key node, the information state of the product just can enter subsequent information service key node, And the procedure service of the subsequent information service key node is activated, each information service key node corresponds to one in procedure service Kind or a variety of services;
Function serving information required for information service key node each in process is decomposed, webpage, software module are passed through Or small routine is realized, is assigned unique identifier to small routine and service page, is bound it with information service key node;
Each information service key node safeguards a resource control table, title, attribute, access limit, fortune including resource Row permission, service condition parameter;Dynamic adds or deletes the service routine or device resource of the information service key node, number According to resource;
Manager carries out Unified Identity coding to people, equipment, resource, organization, and each manageable minimum unit all divides With a unique identity coding, classified packets are carried out to people and organization according to attribute, form Identity Management table, including a The relationship of body and grouping, the authority distribution structure of grouping and individual;Dynamic assigns the corresponding identity attribute of user, according to identity Attribute determines the permission of access information service key node, program execution rights, data access and resources use right limit;
Manager carries out dynamic rights distribution and power to data, procedure service, the various resource setting access levels of equipment and permission Limit management, different visitors belong to different groupings and assign different access levels, possess corresponding with access level Access authority authenticates the identity of visitor, carries out dynamic power according to Product Status and information service key node state Limit calculates, and accordingly generates visitor's access authority table under current state, forms the timeliness pass of visitor, the pass is only Can under the preset state of preset information service key node effectively, timeliness and accessive information service key node State is by server-side authority management module dynamic chek;System scheduler and access control program are according to the pass of visitor Subsidiary parameters start service routine, and service routine accesses corresponding number according to the subsidiary rights parameters of the pass According to;
Third party cooperates resource provided by industry, jointly permanent with the product life cycle as the addition product packet of the product In the presence of;It to addition product packet, is issued using the intelligent contract that software program defines, save with block chain and program is held Row, the form of account book exercises supervision and deposits card evidence obtaining by memory node in a distributed manner;For clothes newly-increased during product consumption Business carries out persistence in the data record of block chain, and carries out anti-fake anti-channeling and anti-repudiation management using the method for encryption, Service subscription person is digitally signed transaction and historical record, and service provider carries out signature approval, data to historical record Supervision keeper or block chain packing person carry out signature packing to block, Xiang Shehui publicity block chain, exercised supervision by society and Identify, guaranteeing that addition product packet can be arbitrated can supervise executable, and permanently survive;
When product is from when entering consumer phase in the commercial distribution stage, setting product has sold mark, and the letter of after-sale service is arranged Breath service key node is executable state, in follow-up service key node binding Extension Services program, in point-of-sale terminal, Service routine binds buyer, which is endowed the access authority of the key node of information service after sale of the product and makes a reservation for Service;If the identity binding of pre-set product and consumer, background service will carry out authentication to the consumer, provide in advance The access authority of setting enjoys corresponding after-sale service and Extension Services;
It is after sale the service of value-added content extension, including services and dynamic Service with Extension Services;Services are to sell The preceding service item and content clearly arranged, dynamic Service refer to the industrial chain service provider including manufacturer, Yi Jichang The cooperative alliances of quotient, the service item increased newly on demand, background service program is realized in a manner of webpage, small routine, micro services, is adopted It is loaded on the information service key node of after-sale service with the mode of dynamic binding, consumer passes through scanning product unique identities The service item that the mode of code selects dynamic newly-increased;
Visitor obtains the unique identity code in product packaging by smart phone, intelligent code reading device, passes through internet The message transmissions comprising product unique code word symbol string and access request to Cloud Server, service routine carries out identity to visitor Certification, determines visitor's identity, retrieves the status information of product so that the unique code of product be index, with visitor's identity information with The visitor is searched and calculated to product status information to the product in the access authority of the node, and scheduler program is according to access right Limit starts corresponding service routine, and access control program is according to reading and writing data permission come operation data;The current state of product is believed Breath includes the position where product in intermediate links, the time point in life cycle, current owners, quality state, circulation shape State and permissive condition calculate access authority by access authority distribution module, this in conjunction with visitor's identity and product status information The current access authority table of visitor is added validity period, anti-fake anti-tampering protection is carried out by the way of data signature, is accessed Person holds the access pass and obtains procedure service and data access limit;
The procedure information for the current information service key node that the user uploads according to operating right is received, and according to the use The operating right at family records the procedure information of the current information service key node of upload, and, history process is believed Breath is inquired;
In products in circulation, server receives user and scans unique identities code using mobile phone or end of scan by internet, will Query result sends back to the mobile phone or end of scan of user;
After the product is purchased, the consumer for buying the product logs in the service by unique identities code described in barcode scanning Device, typing personal information and information service key node information establish the product and buy the pass of the consumer of the product Connection;
After establishing association, the marketing additional rights of the product are obtained, corresponding after-sale service and Extension Services are enjoyed.
2. internet marketing method according to claim 1, which is characterized in that the internet marketing method further include:
Manager is in product life cycle link, according to business demand, including functional requirement, demands on examination, demand for control, shape State demand, regulatory requirement, excitation requirement, integration demand, extends increment at least one information service of requirement definition pass at data requirements Key node, the information service key node conduct services, increasing is believed, traces to the source, product control, goods entry, stock and sales, inspection, marketing, interaction function Control manage key point, for pre-set product definition production, packaging, storage, transport, it is wholesale, retail, consumption information service key Node.
3. internet marketing method according to claim 2, which is characterized in that the internet marketing method further include:
The information service key node by the production of product, storage, logistics, wholesale, retail, consumption, transfer circulation sequence into Row arrangement, there is ordinal relation between neighbor information service key node, each information service key node be divided into it is optional by with Must be by condition property, binding procedure service is divided into compulsory execution and optionally performs, number of results on information service key node According to being divided into the standard of having to comply with or selection execution standard, only current information service key node are met the requirements by condition When, the information state of product just can enter next information service key node, the program of next information service key node Service can activate, and next task can be implemented, and ensure product by the information service key node management of product Production, circulation, in consumption each stage all in controllable manageable range, product whole life cycle items management times Business and quality requirement are decomposed into discrete information service key node definition, the distribution of information service key node task, information clothes Business key node function quality examination meets management requirement by the single information service key node of management to ensure the life of product Cycle management meets the requirements, and completes corresponding set function and additional function.
4. internet marketing method according to claim 2, which is characterized in that the internet marketing method further include:
The state of information service key node is divided into operating status, ready state, blocked state, after waiting in line state, execution State;The same time, only one information service key node was in operating status, from opening for information service key node chain Beginning front-end information service key node is to backend information service key node, sequential search or execution, only current information service The implementing result of key node meets scheduled requirement, and the task execution of current information service key node finishes, current information The state of service key node is changed to state after executing, and the state of next information service key node is changed to ready state, full The preset condition executed enough, waits the service request of visitor, current information service key node because resource contention, it is external not When calling factor causes the implementing result of current information service key node to be unable to satisfy pre-provisioning request, the information service key section Point enters blocked state, need other strength intervene execution is just added after state, after current information service key node Information service key node is known as waiting in line status information service key node, waits in line on information service key node Binding function not can be performed, and only by the information service key node of ready state inspection, the information service key node is It can enter execution state.
5. internet marketing method according to claim 2, which is characterized in that the internet marketing method further include:
In the life cycle of product, it is defined by multiple information services key node required for service management, to information Service key node carries out unique encodings, which should include the classification information and information service of the unique identification product Key node serial number, by the serial number nature recognition sequence relationship of information service key node, if selecting integer to represent The mapping table of product category identification code and integer code is opened in information service key node, system maintenance one, in this way each The circulation information service key node of product category is identified with integer.
6. internet marketing method according to claim 2, which is characterized in that the internet marketing method further include:
Manager needs according to business for each information service key node dynamic binding service function, these service functions include Application services, small routine, micro services program, webpage, the service that information service key node is related to include trace to the source acquisition, matter Amount control, circulation record, anti-channeling inspection, anti-fake Jianzhen, barcode scanning reward, consumption excitation, report and complaint, suggestion feedback, culture clothes Business, entertainment interactive, financial service, consumer's binding, property rights transfer, second purchase, service function and service information service are crucial Node is freely defined by global administration person and local network operator, and there is no limit various service functions use for function type and quantity The implementation of webpage, small routine or micro services;It will produce, circulation, consume in process needed for each information service key node The function serving information wanted is decomposed, and is made its convenient and node binding, is realized, adopted by webpage, software module or small routine With modularization or micro services, the small routine is in Cloud Server or downloads to intelligent terminal operation.
7. internet marketing method according to claim 2, which is characterized in that the internet marketing method further include:
Different trigger conditions is arranged for the small routine on information service key node, micro services program in manager, touches when meeting When clockwork spring part, small routine is activated and runs;Trigger condition include the location of product state, circulation status, quality state, The complete state of a upper information service key node, external resource association status, time state, visitor's identity, supervision state And other external conditions.
8. internet marketing method according to claim 1, which is characterized in that the internet marketing method further include:
Product unique identities code contains manufacturer's unique identification code, kind unique identification code and individual unique serial number, Yi Jifu Supplementary information;Identifying code is added in the tail portion of product unique identities code, which is the key by manufacturer, is transported by preset algorithm It calculates and generates, if authorization and endorsement information in the production process of identifying code comprising third-party intendance mechanism, added in identifying code Relevant information.
9. internet marketing method according to claim 8, which is characterized in that the internet marketing method further include:
To the original text of product unique identities code, comprising: manufacturer's unique identification code, kind unique identification code and the unique sequence of individual Number composition character string carry out asymmetrical digital signature, asymmetrical digital signature result one-time pad dynamic key, pass through Dynamic key is finally obtained to control the operation result of symmetry algorithm and hash class algorithm by multistage operations and algorithm combination Required verifying code length and security intensity.
10. internet marketing method according to claim 8, which is characterized in that the internet marketing method further include:
Manufacturer is currently 256 asymmetric calculations of elliptic curve using the private key of the elliptic curve asymmetric arithmetic independently generated Method algorithm or the higher asymmetric arithmetic of security intensity encode product digital identity, including manufacturer's coding, kind coding, production Product serial number codes carry out digital digest extraction, are signed, are obtained to abstract with elliptic curve asymmetric arithmetic signature algorithm Two 256 signatures carry out 256 hash, i.e. totally 512 signature Hash results to two signatures, the two respectively 256 keys as Advanced Encryption Standardalgorithm -256 twice, respectively to the secure hash algorithm -256 of digital identity coding High 128 and low 128 progress cryptographic calculation of operation result, operation result, i.e. two 128 synthesis are carrying out RACE original - 128 operations of abstract of beginning completeness check message, obtain 128 operation results, as next round international data encryption algorithm operation Key, inputted using low eight of product digital identity coding as parameter, 64 encrypted results of acquisition, that is, 8 bytes Ciphertext as compression signature code;If obtaining shorter coding, recombinant thinks algorithm, the progress of CCIT-CRC algorithm with difficult to understand Operation;Asymmetric arithmetic has RSA cryptographic algorithms, elliptic curve asymmetric arithmetic, SM2 algorithm, and symmetry algorithm has SM4 algorithm, height Grade Encryption Standard algorithm, triple data encryption algorithm, international data encryption algorithm, hash algorithm have SM3 algorithm, secure hash to calculate Method, Message Digest 5, RACE raw integrity verify message digest algorithm, and the Hash identifying algorithm with key, which has, breathes out western message Authentication code, checking algorithm have cyclic redundancy check -32, cyclic redundancy check -24, cyclic redundancy check -16, cyclic redundancy school - 8 are tested, the algorithm specifically used and process are determined by application demand;The code Design process only represents a kind of shortening signature code length The design philosophy of degree, the change of any Encryption Algorithm or the increase and decrease of operation process belong to a kind of specific reality of the design philosophy Existing scheme.
11. internet marketing method according to claim 8, which is characterized in that the internet marketing method further include:
Unique device coding is assigned for small routine, webpage, micro services program, the producing method of unique device coding is program source journey Sequence carries out digital digest calculating, or carries out complete Hash operation, then compress to operation result, can be used checking algorithm or FPE algorithm carries out Base58 coding or decimal coded to result, obtains the service routine ID of preset length, this program ID must have stability and uniqueness, that is, in preset period of time, and the program represented is fixed;If program During continuous modification, above procedure ID is mapped to using a positive integer, system maintains a positive integer to program ID With the mapping table of program name, in use process, the positive integer is quoted to represent program ID.
12. internet marketing method according to claim 1, which is characterized in that the internet marketing method further include:
Service system manages the identity information of the producer, logistics provider, agent, retailer, consumer, to the body of different access person Part carries out automatic identification, provides procedure service respectively according to the identity of visitor, different visitors can only use and oneself body The corresponding service of part information, can only check and update information relevant to oneself identity.
13. internet marketing method according to claim 1, which is characterized in that the internet marketing method further include:
Small routine, webpage are assigned and execute permission, non-executable state, assigns the program in presupposed information service key node, Preset period of time, preset state can star, can not start, can be performed or not can be performed, and generate the pass of small routine, webpage and node Join relation table.
14. internet marketing method according to claim 13, which is characterized in that the internet marketing method also wraps It includes:
Authentication and dynamic rights distribution system is arranged in manager, authenticates at runtime to the identity of visitor, according to Product Status and information service key node state carry out dynamic rights calculating, accordingly generate visitor and access under current state Authority list forms the pass of visitor, the current access authority table of the user is added validity period, using data signature Mode carries out anti-fake anti-tampering protection, and visitor holds the pass and obtains procedure service and data access limit;System scheduler Service routine is started according to the subsidiary parameter preset of the pass of visitor with access control program, service routine is according to passage Subsidiary rights parameters are demonstrate,proved to access corresponding data;Wherein, Product Status includes position in intermediate links, in life cycle Time point, current owners, quality state, circulation status and permissive condition.
15. internet marketing method according to claim 13, which is characterized in that the internet marketing method also wraps It includes:
Manager manages the identity of visitor, is dynamically grouped to visitor, adds or deletes the access right of certain resource on demand Limit, realizes the dynamic allocation of permission.
16. internet marketing method according to claim 13, which is characterized in that the internet marketing method also wraps It includes:
Manager needs dynamic organization and addition Service Source, and the Service Source includes procedure service, device service, calculates clothes Various Informatization Services are added to information service key node on demand or taken from the information by business, financial service, manpower service Being engaged in, key node deletion is corresponding to be serviced, and realizes dynamic function management and dynamic resource allocation.
17. internet marketing method according to claim 1, which is characterized in that the internet marketing method further include:
When visitor, which scans the unique identities in product packaging, to be encoded to access service, server first determines whether the body of visitor Part, the grouping where visitor is obtained, the addressable product category of the grouping and addressable information service key node are searched, It is calculated by the access control list of information service key node and the filtering of resource control table, obtains visitor in current information service To the access authority of resource under key node, the anti-fake anti-tamper temporary visit pass is formed;It is logical that visitor holds temporary visit Row sign accesses and obtains service to information service key node resource.
18. internet marketing method according to claim 1, which is characterized in that the internet marketing method further include:
Resource provided by industry, including cultural resource, celebrity resources cooperated for third party, insurance service, value preserving finance and Derivative business exists or is permanently present jointly with the product life cycle as the addition product packet of the product;To addition product Packet, is defined and is issued in the form of intelligent contract, save with block chain and program executes, in a distributed manner account book Form exercises supervision and deposits card evidence obtaining, prevents from distorting, delete, and receives the general supervision of society and the arbitration of regulatory agency;It is right Cultural Services, entertainment service, financial service, hosted service, shared addition, the sharing chain, transfer increased newly in process of consumption Service carries out persistence in the data record of block chain, and carries out anti-fake anti-channeling and anti-repudiation pipe using the method for encryption Reason, specific practice is service subscription, and person is digitally signed historical record, and service provider carries out signature to historical record and recognizes Can, data supervision keeper or block chain packing person carry out signature packing to block.
CN201910386089.2A 2019-05-09 2019-05-09 Internet marketing method Active CN110322269B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202111355980.3A CN114511344A (en) 2019-05-09 2019-05-09 Control method for internet dynamic marketing
CN201910386089.2A CN110322269B (en) 2019-05-09 2019-05-09 Internet marketing method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910386089.2A CN110322269B (en) 2019-05-09 2019-05-09 Internet marketing method

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN202111355980.3A Division CN114511344A (en) 2019-05-09 2019-05-09 Control method for internet dynamic marketing

Publications (2)

Publication Number Publication Date
CN110322269A true CN110322269A (en) 2019-10-11
CN110322269B CN110322269B (en) 2021-11-12

Family

ID=68118897

Family Applications (2)

Application Number Title Priority Date Filing Date
CN202111355980.3A Pending CN114511344A (en) 2019-05-09 2019-05-09 Control method for internet dynamic marketing
CN201910386089.2A Active CN110322269B (en) 2019-05-09 2019-05-09 Internet marketing method

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN202111355980.3A Pending CN114511344A (en) 2019-05-09 2019-05-09 Control method for internet dynamic marketing

Country Status (1)

Country Link
CN (2) CN114511344A (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111031036A (en) * 2019-12-12 2020-04-17 深圳大学 Block chain-based vaccine information monitoring method and device and computer equipment
CN112330340A (en) * 2020-11-06 2021-02-05 新华中经信用管理有限公司 Food tracing method based on block chain
CN113421145A (en) * 2021-06-01 2021-09-21 安徽资产通鉴物联网科技有限公司 Operation system for sharing package
CN113506128A (en) * 2021-06-22 2021-10-15 中国联合网络通信集团有限公司 Marketing method based on industrial internet identification and identification analysis system
CN113537387A (en) * 2021-08-04 2021-10-22 北京思特奇信息技术股份有限公司 Model design method and device for Internet online operation activities and computer equipment
CN114745421A (en) * 2022-03-30 2022-07-12 北京奇艺世纪科技有限公司 Fission path data recording method, device, server and storage medium
CN114973502A (en) * 2022-05-12 2022-08-30 深圳市乐科智控科技有限公司 Method and system for supporting multi-manufacturer access to dynamic cabinet
WO2022262377A1 (en) * 2021-06-15 2022-12-22 上海商汤智能科技有限公司 Display method and apparatus, and device, computer-readable storage medium and computer program
CN115640556A (en) * 2022-08-30 2023-01-24 北京华宜信科技有限公司 Multi-user dynamic competitive right distribution control method and device
CN117541032A (en) * 2024-01-09 2024-02-09 云南建投物流有限公司 Business digital management method and system based on transaction architecture construction
CN117974232A (en) * 2024-03-29 2024-05-03 芯茹倩(厦门)商贸有限公司 E-commerce sales data analysis method based on distributed deployment architecture

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103177367A (en) * 2013-04-01 2013-06-26 欧家奇 Anti-counterfeiting authentication processing method, transaction terminal and processing system
CN104424579A (en) * 2013-08-27 2015-03-18 成都天钥科技有限公司 Security traceability management system
CN106157056A (en) * 2015-05-14 2016-11-23 黄世纬 A kind of product is traced to the source method for anti-counterfeit
US20180144153A1 (en) * 2016-11-21 2018-05-24 Adobe Systems Incorporated Providing user control of shared personal information
CN108776878A (en) * 2018-05-21 2018-11-09 湖北迪天信息科技有限公司 A kind of logistics cloud big data information platform
CN109191142A (en) * 2018-08-02 2019-01-11 华中科技大学 A kind of commodity tracing method, equipment and system
CN109409912A (en) * 2018-10-30 2019-03-01 黄子骞 A kind of anti-fake method for preventing goods from altering of product traceability based on block chain

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103177367A (en) * 2013-04-01 2013-06-26 欧家奇 Anti-counterfeiting authentication processing method, transaction terminal and processing system
CN104424579A (en) * 2013-08-27 2015-03-18 成都天钥科技有限公司 Security traceability management system
CN106157056A (en) * 2015-05-14 2016-11-23 黄世纬 A kind of product is traced to the source method for anti-counterfeit
US20180144153A1 (en) * 2016-11-21 2018-05-24 Adobe Systems Incorporated Providing user control of shared personal information
CN108776878A (en) * 2018-05-21 2018-11-09 湖北迪天信息科技有限公司 A kind of logistics cloud big data information platform
CN109191142A (en) * 2018-08-02 2019-01-11 华中科技大学 A kind of commodity tracing method, equipment and system
CN109409912A (en) * 2018-10-30 2019-03-01 黄子骞 A kind of anti-fake method for preventing goods from altering of product traceability based on block chain

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
N. KSHETRI, E. LOUKOIANOVA: "Blockchain Adoption in Supply Chain Networks in Asia", 《IT PROFESSIONAL》 *
李明佳 等: "基于区块链的食品安全溯源体系设计", 《食品科学》 *
王晓平,张旭凤: "农产品流通中的分阶段追溯模式", 《中国流通经济》 *

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111031036A (en) * 2019-12-12 2020-04-17 深圳大学 Block chain-based vaccine information monitoring method and device and computer equipment
CN112330340A (en) * 2020-11-06 2021-02-05 新华中经信用管理有限公司 Food tracing method based on block chain
CN113421145A (en) * 2021-06-01 2021-09-21 安徽资产通鉴物联网科技有限公司 Operation system for sharing package
WO2022262377A1 (en) * 2021-06-15 2022-12-22 上海商汤智能科技有限公司 Display method and apparatus, and device, computer-readable storage medium and computer program
CN113506128B (en) * 2021-06-22 2023-06-06 中国联合网络通信集团有限公司 Marketing method based on industrial Internet identification and identification analysis system
CN113506128A (en) * 2021-06-22 2021-10-15 中国联合网络通信集团有限公司 Marketing method based on industrial internet identification and identification analysis system
CN113537387A (en) * 2021-08-04 2021-10-22 北京思特奇信息技术股份有限公司 Model design method and device for Internet online operation activities and computer equipment
CN114745421A (en) * 2022-03-30 2022-07-12 北京奇艺世纪科技有限公司 Fission path data recording method, device, server and storage medium
CN114745421B (en) * 2022-03-30 2023-10-10 北京奇艺世纪科技有限公司 Method, device, server and storage medium for recording fission path data
CN114973502A (en) * 2022-05-12 2022-08-30 深圳市乐科智控科技有限公司 Method and system for supporting multi-manufacturer access to dynamic cabinet
CN115640556A (en) * 2022-08-30 2023-01-24 北京华宜信科技有限公司 Multi-user dynamic competitive right distribution control method and device
CN117541032A (en) * 2024-01-09 2024-02-09 云南建投物流有限公司 Business digital management method and system based on transaction architecture construction
CN117541032B (en) * 2024-01-09 2024-04-23 云南建投物流有限公司 Business digital management method and system based on transaction architecture construction
CN117974232A (en) * 2024-03-29 2024-05-03 芯茹倩(厦门)商贸有限公司 E-commerce sales data analysis method based on distributed deployment architecture

Also Published As

Publication number Publication date
CN114511344A (en) 2022-05-17
CN110322269B (en) 2021-11-12

Similar Documents

Publication Publication Date Title
CN110322269A (en) A kind of internet marketing method
Ducange et al. A glimpse on big data analytics in the framework of marketing strategies
Haydon et al. Facebook marketing for dummies
CN107220837A (en) A kind of destination object source tracing method and device
US20120209680A1 (en) Method, program and system for promoting chain transactions
EP2764489A1 (en) Incentive optimization for social media marketing campaigns
CN109670845B (en) Data resource allocation method and device
Özoğlu et al. Digital marketing strategies and business trends in emerging industries
EP4356307A1 (en) Systems and methods for automated blockchain based recommendation generation, advertising and promotion
Ilgaz Sümer A new marketing trend in the digital age: Social media marketing
Kunz et al. Media management and social media business: New forms of value creation in the context of increasingly interconnected media applications
Pires et al. Confronting security and privacy challenges in digital marketing
Moilanen et al. API economy 101: changes your business
CN105976037A (en) Two-dimensional-code-based automobile maintenance service providing method
CN110503470B (en) Operation method and system for product sales promotion
Wang et al. The co-evolution of IT competence, organisational agility and entrepreneurial action: a case study of entrepreneurial e-tailers
Crnkovic Invited article: the future of CRM is UX
Hajar et al. The role of emerging technologies in shaping the value innovation aptitude toward competitive advantage and sustainability
Maamar et al. Bridging the gap between the business and social worlds: a data artifact-driven approach
US20170024835A1 (en) System and method for creating cultural heritage tour program and historical environment for tourists
US20200320582A1 (en) Systems and methods for autonomous branding using a platform that contains a plurality of features and functions that enable any user to have access to a complete digital presence and monetization opportunities with the use of artificial intelligence with both centralized and peer to peer network interfaces
Suresh Kumar et al. Dynamics of Swarm Intelligence Health Analysis for the Next Generation
Damodaran et al. Branch‐and‐Price Methods for Prescribing Profitable Upgrades of High‐Technology Products with Stochastic Demands
Eggenschwiler et al. Retailing in the metaverse: A framework of managerial considerations for success
Coggiola Blockchain Technology for Parcel Delivery Systems.

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant