CN102956016A - Electronic commerce trade method for non-tangible goods - Google Patents

Electronic commerce trade method for non-tangible goods Download PDF

Info

Publication number
CN102956016A
CN102956016A CN2011102543456A CN201110254345A CN102956016A CN 102956016 A CN102956016 A CN 102956016A CN 2011102543456 A CN2011102543456 A CN 2011102543456A CN 201110254345 A CN201110254345 A CN 201110254345A CN 102956016 A CN102956016 A CN 102956016A
Authority
CN
China
Prior art keywords
user
tangible goods
information
tangible
services device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2011102543456A
Other languages
Chinese (zh)
Inventor
陈宏宇
刘纯吟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN2011102543456A priority Critical patent/CN102956016A/en
Publication of CN102956016A publication Critical patent/CN102956016A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention discloses an electronic commerce trade method for non-tangible goods, wherein an electronic commerce trade platform for non-tangible goods comprises a portal site, a database, a safety verification module, a network transmission interface and a server. The electronic commerce trade method for non-tangible goods comprises the following steps of: logging in via the portal site to upload or download the non-tangible goods, or upload or download demands on the non-tangible goods, or providing information related or unrelated to the non-tangible goods by a user; storing the non-tangible goods, the demands and the information via the database; protecting, encrypting and verifying login information, a trade program and the non-tangible goods via the safety verification module; and operating the portal site via the server and the network transmission interface.

Description

The electronic business transaction method of non-tangible goods
Technical field
The present invention relates to a kind of electronic business transaction method, particularly a kind of E-commerce transaction platform of non-tangible goods transaction.
Background technology
In the flourishing epoch of numeral now, electronic goods and network have become important element indispensable in the life, and the summit of information interchange interaction is pushed the mankind's life in the breakthrough of network and hardware technology especially; Even therefore people also can reach its purpose by network not by self work, labour.Wherein, the flourish of ecommerce namely is an obvious example.At present electronic trade platform is let a hundred schools contend, no matter online shopping, auction, and even paying shadow, sound, all occupy separately vast Supply and demand market, right these commodity belong to tangible goods more, even commodity are shadow, sound, except user charge is downloaded or also enjoyed online, be the audio-visual commodity of on-line purchase, the mode of sending by mailing or logistics afterwards is delivered in the paying user hand.
But on intangible asset or commodity, but rarely having to provide the medium that satisfies individual supply and demand, mainly is the switching plane of Wise property with what see at present; Perhaps, it is the non-tangible goods service window that must possess service human resources or Teams of Knowledge, this kind operation manner must additionally arrange rear attendant or Teams of Knowledge, the expert responds user's demand or relative service is provided, required cost improves relatively, and the user states when operating platform in the use, also can't provide voluntarily or obtain the purpose of oneself's creation or demand, namely general traditional operation manner does not meet actual user's supply and demand problem.
Summary of the invention
In view of this, the object of the present invention is to provide a kind of electronic business transaction method of non-tangible goods, provide and disclose an individual difference, the e-commerce transaction of non-tangible goods is machine-processed, has reached the purpose of head it off.
The present invention proposes a kind of embodiment of electronic business transaction method, comprising step logins via entry network site for the user, to upload or to download non-tangible goods itself, perhaps upload or download the demand for non-tangible goods, the information of relevant or irrelevant non-tangible goods perhaps is provided; Via the non-tangible goods of database storage itself, demand and information; Protect, encrypt and verify the information of logining, transaction program and non-tangible goods itself via secure verification module; And via server and the Internet Transmission interface entry network site of operating.
The purpose that the present invention reaches provide a kind of non-tangible goods self-control from the E-commerce transaction platform of wound, non-tangible goods itself and relevantly introduce, the self-control of advertisement is from the relevant introduction that E-commerce transaction platform or the user charge (active) of wound are uploaded voluntarily, the oneself markets, the E-commerce transaction platform of advertisement.
Describe the present invention below in conjunction with the drawings and specific embodiments, but not as a limitation of the invention.
Description of drawings
Fig. 1 is block diagram of the present invention;
Fig. 2 is database schematic diagram of the present invention;
Fig. 3 is steps flow chart schematic diagram of the present invention ();
Fig. 4 is steps flow chart schematic diagram of the present invention (two);
Fig. 5 is execution configuration diagram of the present invention ();
Fig. 6 is execution configuration diagram of the present invention (two).
Wherein, Reference numeral
1 ... ... the .. E-commerce transaction platform
10.............. entry network site
11.............. database
111............. user's data cell
112............. information interchange data cell
113............. transaction record unit
114............. storage element
115............. credit evaluation unit
12.............. secure verification module
13.............. Internet Transmission interface
20.............. server
30.............. user's terminal device
41.............. front end services device
411............. the privately owned golden key of user
412............. user's public key
413............. user's digital certificate
51.............. back-end services device
511............. the privately owned golden key of supvr
512............. supvr's public key
513............. supvr's digital certificate
60.............. user's end
61.............. operating environment interface
611............. privately owned district
612............. consensus
62.............. upload message unit
63.............. Download Info unit
64.............. editing and processing unit
65.............. search unit
66.............. interactive information unit
70.............. virtual objects unit
Embodiment
Below in conjunction with accompanying drawing structural principle of the present invention and principle of work are done concrete description:
Please refer to Fig. 1 and Fig. 2, Fig. 1 is block diagram, and Fig. 2 is the database schematic diagram.
E-commerce transaction platform 1 comprises: entry network site 10, database 11, secure verification module 12, Internet Transmission interface 13, server 20, front end services device 41 and back-end services device 51.
Entry network site 10 provide the user login, register, identify authentication, pay upload, pay download or pay watch online, individual's transaction or every record the functions such as personal information maintenance, change, file encryption-decryption authentication are provided.
Database 11 is one or more, explains with two databases at this, and hereinafter to be referred as front end data storehouse 11 and back-end data base 11, but not as limit.
Secure verification module 12 is in order to provide protection, encrypt and to verify the information of logining, transaction program and these non-tangible goods itself.
Front end services device 41 connects front end data storehouse 11, back-end services device 51 connects back-end data base 11, front end services device 41 and back-end services device 51 also connect secure verification module 12, can enter to front end services device 41 when the user logins to entry network site 10.
Internet Transmission interface 13 can be used as the purpose of website operation.
Hardware server 20 is one or more, with the operation function of the website 10 that provides access.
At this, the user can be the supplier, the non-tangible goods of self-control from wound itself are provided, it perhaps can be demander, download required above-mentioned non-tangible goods itself, but not tangible goods are for experience, knowledge, intelligence, art, information, method, idea, improvise, solely door folk prescription or humane exploration etc. are suchlike at this " invisible " assets, and these non-tangible goods can present via the digital and electronic file of shadow, sound, literal, map file or application program, yet below just enumerate, non-as limit when reality is used.
At this, upload or download for the demand of non-tangible goods and the information of relevant or irrelevant non-tangible goods is provided is to make digital and electronic file from shadow, sound, literal, map file or the application program of introduction, advertisement or the propaganda of wound by oneself for the user, yet below just enumerate, non-as limit when reality is used.
Above-mentioned database 11 is in order to the detailed data that records various non-tangible goods and store non-tangible goods itself, demand and information, also records the information such as various transaction details, user's credit evaluation, user's data (such as individual ID, name, communication modes, authenticating security identification and various virtual objects) simultaneously.Database 11 also more includes preload user data cell 111, information interchange data cell 112, transaction record unit 113, a plurality of storage element 114 and credit evaluation unit 115, a plurality of storage elements 114 store non-tangible goods itself, demand and information in order to correspondence, the storage element 114 that in detail has respectively the non-tangible goods itself such as storage experience, knowledge, intelligence, and the storage element 114 that stores the demands such as introduction, advertisement or propaganda, information.
The present embodiment provides the reciprocal mechanism of supply and demand of non-tangible (or claiming non-entity) commodity.The disclosed electronic transaction of the present embodiment mechanism, the user can come according to own demand " provide " or " obtain " various " non-tangible, and non-ly usurp the self-control of other people literary property (non-had other people literary property) or copyright from the assets of creating ".All can by this mechanism of exchange with commercialization, allow intangible asset " valueization " and have the characteristic of " differentiation " concurrently, make everybody can both represent its individual value difference and speciality, and then reach the purpose that the oneself markets, exposes, publicizes, makes a profit or shares.
See also Fig. 3 and shown in Figure 4, this method comprises the following step:
Step 900, the entry network site 10 of one E-commerce transaction platform 1 is provided, after the user logins via entry network site 10 with user's terminal device 30, can upload or download non-tangible goods itself, perhaps upload or download the demand for non-tangible goods, the information of relevant or irrelevant these non-tangible goods perhaps is provided.
Step 901 stores non-tangible goods itself, demand and information via database 11.
The information of logining, transaction program and non-tangible goods itself are protected, encrypt and verified to step 902 via secure verification module 12.
Step 903 is via server 20 and Internet Transmission interface 13 entry network site of operating.
This method of commerce provides the entry network site 10 of an E-commerce transaction platform, possesses the outfit of server 20 and Internet Transmission interface 13, possesses simultaneously the database 11 of commodity and personal information.After the user enters this E-commerce transaction platform 10 by entry network site 10, can according to individual's demand and purpose, play the part of " supplier " or the role of " demander ".
When being " supplier ", the user comes " self-control " to reach the means of " certainly ordering " publicity or marketing according to individual purpose, can be shadow, the Digital Media of sound or word application and all kinds of self-control (non-other people intelligence creation) all can upload and become supplier " advertisement " or " propaganda ", or directly become " non-tangible goods ", make and play the part of " supplier " user end reach the purpose that publicity and marketing are made a profit, the intangible goods that allow " demander " can understand by this that " supplier " wants to provide are functions perhaps in which kind of, determine whether to pay again purchase.
In addition; " the supplier " also can on this platform, seek various " non-tangible goods " demand that (or hunt) " demander " proposes; if " supplier " has the ability to provide those demands; can provide self " credit comment etc. ", " attribute ", " publicity ", " self recommendation ", " transaction record " or solve those demands " outline " or " summary " in " demander ", and become " supplier " candidate.When " demander " holds through assessment, consider " supplier " " credit evaluation ", " attribute ", " individual's publicity ", " transaction record ", the conditions such as " the large steel of making a summary " that proposes for the demander demand, after determining to adopt what " supplier " candidate's " solution " or " intangible asset ", begin to employ these non-tangible goods of purchase, should " supplier " candidate can obtain rewarding, the money that " demander " announces proposition, therefore " supplier " can increase income by own intangible asset.
When the user plays the part of the role of " demander ", except can with this E-commerce transaction platform 10 on look for its required and made by him and the intangible goods that provide merge bought carry or online the use, also can " propose to announce " oneself " non-tangible demand " and " rewarding ", and then attract " supplier " that corresponding intangible goods are provided, and from those " supplier " candidates, assess its " credit is commented etc. ", " attribute ", " transaction record "; " individual's recommendation information " or " the non-tangible assets " of the decision such as " summary of corresponding solution or extraction " information use whichever are to satisfy the demands, simultaneously payment " supplier " corresponding rewarding.And for " demander ", buy the selection of employing and can be final election.
Aforementioned credit evaluation unit 115 is for providing the credit for this transaction platform user the method such as to comment.Each can set up by following mechanism individual " credit comment etc. " the user of this E-commerce transaction platform 1.
(1) when being " supplier ", whenever " selling " (namely " demander " end pay to download is bought) once during oneself " non-tangible goods or assets ", can obtain evaluations such as " fronts " or " negative " (or making " satisfaction " and " being unsatisfied with ") by " demander " end, thereby set up " credit comment etc. " and " attribute " trend of self, those such as comment at loyal record of meeting is the non-tangible goods of which kind of classification, and transaction detailed catalogue etc. information is in database.
(2) when the user is " demander ", the detailed situation of estimating " supplier " also can become self " credit comment etc. ", the evaluation of for example after demander is bought, for those non-tangible goods the supplier being done, also can together be recorded in the database together with the classification of commodity, therefore, those " evaluations of acquisition " and " giving other people evaluation ", follow the various classification of detailed row detailed, be user's direct record itself, the credit that loyalty presents each user self is commented etc. and " attribute " trend.
See also Fig. 5 and shown in Figure 6, in order to reach in real time and the demand of efficient, the transaction of non-tangible goods is established in upper its characteristic of can bringing into play of network; Yet must consider modestly the problem of its security by transmission over networks, be propagated by a large amount of the download if the protection of intangible goods cracks, be greatest loss for the intangible asset supplier so.In view of this, this non-tangible goods method of commerce also provides a safety protecting mechanism, provides each user can carry out the circulation of commodity under the method for commerce of a safety.The user can protect, encrypt and verify the information of logining, transaction program and non-tangible goods itself by secure verification module 12; and pay to buy with transmit file, information and payment transaction program are logined in checking, guarantee that the user can use E-commerce transaction platform 1 under safe and reliable environment.
At first, this electronic business transaction method is distinguished the mechanism of two services, i.e. front end services device 41 and back-end services device 51.Front end services device 41 provides the Essential Environment after each user logins, this environment belongs to the lower environment of safety grades, mainly be to belong to user's consensus 612, the function that wherein comprises is for example uploaded (upload) and is published all kinds of non-tangible goods and be correlated with and incoherent publicity, advertisement, or (its content can be literal to publish the demand of various non-tangible goods, image, sound, flash file and digital and electronic file etc.), and provide the basic instrument of user in order to editor or process all kinds of publicity that it is uploaded, advertisement, or all kinds of non-tangible demands, cutting sound or image file for example is provided, or from non-tangible goods file, directly carry out the elite acquisition, in order to the media portion of preparing advertising.In addition, the user also can carry out the search (search) and retrieval (request information) of various classification.In this front end service unit 41, also can provide all kinds of communication mechanisms, exchanging of interaction and information between the user is provided.In addition, legal user's digital certificate 413 (user CA) that this zone also can provide by the user is decrypted for the file of downloading (download) or all kinds of Download Info and processes or in order to every security measures such as checkings.
To belong to the high zone of security level at back-end services device 51, must the absolute problem of considering security.Because back-end data base 11 is except comprising non-tangible goods itself, user's personal data, all kinds of transaction details, and the significant datas such as credit evaluation or all kinds of virtual objects all deposit in this, if cracked, the loss that causes will be unable to estimate.Can guarantee the independence in each user space with the protection mechanism of secure verification module 12, avoid suffering related security attack; It is safe and reliable also possessing simultaneously the voucher that the golden key of gerentocratic independence guarantees that institute is examined.
See also Fig. 6, the virtual objects unit 70 that above-mentioned back-end data base 11 comprises uses such as the virtual treasure in the online game, ideal money mode of operation.Reason is except online game, and another consumption and the main force that uses of network are network auction, electronic trade platform at present, often lack the mechanism of this class virtual objects.In view of this, the present invention provides combined with virtual article in the platform of network electronic trade at this, and by " extra value added characteristic " and " characteristic boosts consumption " of virtual objects, the raising user uses the wish of this electronic trade platform and boosts consumption; Simultaneously, platform provider also can provide " feedback " for the user by this virtual objects, with " complimentary awards ", allows platform provider and user both sides each get its benefit.
Take the practical application of electronic trade platform as example, angle with platform provider, after both parties conclude the transaction, platform provider can be examined apprehensive plan article, (for example ideal money or virtual card) gives both parties, simultaneously by after the transaction accumulation, when user's accumulation reaches certain degree, can exchange that other essence is preferential for to platform provider, money rewarding the or more value of adding is served etc.Platform provider can stimulate and increase the quantity that user's transaction is reached by this.For the user who buys, sells both sides, the user also can buy to obtain by the exchange between the user or money except accumulating, collect those virtual objects, the treasure by concluding the transaction.The user can by these virtual objects, treasure come or the more value added interests of platform provider, such as deduction and exemption transaction service charge, deduction and exemption Insertion Fees, prolong the publication time limit, increase usage space, obtain lottery drawing machine meeting, to exchange actual money or all kinds of gift tokens etc. for all kinds of preferential and serve.
The supplier of E-commerce transaction platform 1 can determine those virtual objects, treasure whether allow between the user mutual exchange, gift or money dealing, its applicable cases should be looked situation and the character of transaction platform and be stipulated it.
When the user holds 60 in server 20 ends operations front end services device 41 or back-end services device 51, the user holds 60 can be via operating environment interface 61, upload message unit 62 (upload), Download Info unit 63 (download), editing and processing unit 64 (edit and access), search unit 65 (search) or interactive information unit 66 (communicate) operates.
Aforesaid operations environmental interface 61 comprises privately owned district 611, provide the user to login the position and in order to carry out personal set, to upload the legal operations functions such as user's digital certificate 413, deposit to the personal air of front end services device 41 or back-end services device 51 and be about to first non-tangible goods after buying, user's capable of selecting time, place or suitable medium are downloaded.
Operating environment interface 61 comprises consensus 612, provide the user position and in order to serve the uploading of all kinds of periodical advertisements, propaganda or demand (upload), search (search), change with operate (access), and the Interact and Exchange between each user (communicate).
Back-end services device 51 is the recognition data that receive user's data cell of registered user, and confirm that recognition data namely produces the privately owned golden key 411 of a user (user private key) and corresponding user's public key 412 (user public key) thereof after legal, the user can't directly obtain (access) or the privately owned golden key 411 of access user, must come correspondingly to obtain and use it for each user's account by server 20 ends.
From the above, user's public key 412 comes stamped signature and nuclear user's digital certificate 413 (user CA) to give user's keeping by the privately owned golden key 511 of an exclusive supvr, and when the user uses the operation of every security next time, provide, this user's digital certificate 413 can be come the proved stamped signature and be confirmed legitimacy by the privately owned golden key 511 supvr's public key 512 that produces of the supvr of back-end services device 51 (administrator public key) or supvr's digital certificate 513 (administrator CA).
Its detailed description is:
(1) security mechanisms of back-end services device 51 or server 20 possess one or many privately owned golden key 511 of supvr, have simultaneously supvr's public key 512 that one or more is generated by the privately owned golden key 511 of this supvr, simultaneously by the privately owned golden key of this relative supvr 511 stamped signature and produce one or more supvr's digital certificate 513 in addition.
(2) each user namely can be with recognition data own (such as individual ID after being registered as the user, communication modes or all kinds of data that are beneficial to identification) be sent to the security mechanisms of back-end services device 51, and deposit in the back-end data base 11, after confirming that user's data are legal, produce immediately a privately owned golden key 411 of user, the data length of golden key is not subject to the limits.The privately owned golden key 411 of this user is present in server 20 ends and keeps properly, the privately owned golden key 411 of this user will be stored in server 20 ends (can be that front end also can be back-end server) in the security mechanisms, and " directly corresponding " in the logining account (the user space after namely logining) of this user and " non-" transfer to user itself certainly, this is the consideration based on security; User itself can't directly obtain the privately owned golden key 411 of this exclusive user, also can't learn the actual interior literary composition of the privately owned golden key 411 of this user, i.e. 411 meetings of the privately owned golden key of this user itself are carried out correspondence by server 20, when using certain, the user logins after data login the account, server 20 can and be obtained the privately owned golden key 411 of this user by this user's account correspondence, is used for simultaneously the processing of security.
(3) after the privately owned golden key 411 of this exclusive user produces, by the privately owned golden key 411 of this user produced (deriving) one user's public key 412, this user's public key 412 will be by supvr end by the privately owned golden key of supvr 511 stamped signature in addition, afterwards should be through user's digital certificate 413 that privately owned golden key 511 stamped signatures of supvr produce later and nuclear is sent out, the user's public key 412 that is produced by the privately owned golden key 411 of user before namely comprising, user's digital certificate 413 behind this process supvr digital signature will be transferred to the user and keep properly, when after conclude the business and download or during the safety operation such as change personal information, supvr's end will require the user that its digital certificate 413 is provided, and verify stamped signature by supvr's digital certificate 513 (comprising supvr's public key 512) for this user's digital certificate 413, if user's digital certificate 413 that checking provides by the expression user is to hold the nuclear that authenticates to send out by the supvr, therefore approves the operation that its security level is high and can remove the content of encrypting by the privately owned golden key 411 of user with this user's digital certificate 413.
The above security features that provides is as follows:
(1) the privately owned golden key 411 of user can't be obtained by illegal user, and therefore illegal user or hacker can't produce relative user's public key 412 by the privately owned golden key 411 of this user.
(2) illegal user also can't obtain the voucher of signing and issuing through the privately owned golden key 511 of rear end supvr in the security mechanism by back-end services device 51.
(3) though user's digital certificate 413 of signing and issuing through the supvr usurped or stolen, although can be by the checking of rear end security mechanism, yet this illegal user still must " correct " login this user's account (by logining password, ID or all kinds of recognition data), because account is mutually corresponding with the privately owned golden key 411 of this user and voucher, if the account of logining non-I, wrong user's digital certificate 413 that this user has can't be decrypted privately owned golden key 411 encrypted contents of user corresponding to the account; Vice versa.Therefore security still ensures to some extent.
(4) because the privately owned golden key 411 of user and the corresponding relation of account only are present in the server of security mechanisms, though user itself also can't learn, so security is higher.
The present embodiment is divided into front end services device 41 and back-end services device 51 with service mechanism, and both respectively comprise database 11 systems separately.Front end services device 41 comprises the privately owned district 611 of user and all users' consensus 612, the privately owned district 611 of user is the interval that the user logins rear place, user's digital certificate 413 that can carry out individual's related setting and upload legal (sending out through supvr privately owned golden key 511 stamped signatures and nuclear) this user, simultaneously by this user's digital certificate 413 carry out for buy, the safety operation such as needed deciphering etc. when downloading non-tangible goods.In user's consensus 612, the service of including comprises uploading, search, change and operating of aforesaid all kinds of advertisement-printing, propaganda or demand, and the Interact and Exchange between each user etc.
In the service of back-end services device 51, the operation that the user can carry out comprise for " non-tangible goods " itself upload, search, buy, download, change and operate etc.; This will also comprise the requirement (request information) for every terms of information, and the tabulation of user's personal information, user's commodity, user's credit are commented etc. such as requiring, attribute trend, also or the information of the detail of all kinds of transaction, taxonomic revision and various virtual objects etc.When the user buy, when downloading non-tangible goods, the branch of service department of rear end takes out first user's digital certificate 413 of uploading corresponding to the privately owned golden key 411 of the user of this user's account itself and user, then verify stamped signature for user's digital certificate 413, whether reliable for these user's digital certificate 413 its sources of checking by supvr's digital certificate 513 of supvr's end; After checking is passed through, can be for the result who was calculated through hash tables (Hash Table) by the non-tangible goods itself of being concluded the business or the non-tangible goods of being concluded the business, also or the result that calculates of various security, after being encrypted (for example using rsa encryption technique) with the privately owned golden key 411 of user, be resent to front end services device 41, user's digital certificate 413 of uploading by the user afterwards is decrypted.
Security verification flow process during this can be the single or multiple step, travels to and fro between 51 in front end services device 41 and back-end services device, with elasticity and the reliability of guaranteeing its safety verification.The end user can obtain its non-tangible goods after by 413 deciphering of legal user's digital certificate, if employed user's digital certificate 413 is illegal, or the account of logining is incorrect, and this user can't correctly obtain the non-tangible goods that this is concluded the business.
The purchase of non-tangible goods, download to transmit can for " in real time " or " non real-time "." in real time " and the download transmission be, after the user buys these non-tangible goods, verify and be downloaded to user's terminal device 30 (End Device, Terminal) by the transaction platform process immediately, those user's terminal devices 30 can be PC, NB, hand-held device, flat computer or the various electronic product that connects to network, and the user can bring into use those non-tangible goods; This type of also can be by the mode of online crossfire broadcast except obtaining immediately this digital document, audio/video file, and this all is contained in the mode of real-time transmission.
And " non real-time " and transfer mode, refer to after the user selects to buy non-tangible goods, these non-tangible goods of being concluded the business not are that direct download is sent to user's terminal device 30, but the user's personal space that is stored in server 20 ends (can be front end data storehouse 11, also can be back-end data base 11), the user can be from any time, actual download is carried out in any place, so can get rid of the storage area, security reason of all kinds of environmental factors such as network bandwidth, user's end etc.
Yet, if the non-tangible goods of being concluded the business belong to the in real time mode of online crossfire broadcast, when the user is not enough for fear of network bandwidth, play after can selecting, its " authorize number of times or the time that can play " personal space to the user will be noted down, the user can freely select time and the place of playing, and so the rights and interests of buyer and seller can both be guaranteed.
When buying or downloading non-tangible goods, front end services device 41 can pass through the privately owned golden key 411 of user and user's digital certificate 413 with the service mechanism of back-end services device 51, the privately owned golden key 511 of matching management person, carry out the checking of all kinds of encryption and decryption and security according to situation and demand, to guarantee its elasticity.
The present invention use the purpose that reaches provide a kind of non-tangible goods self-control from the E-commerce transaction platform of wound, non-tangible goods itself and relevantly introduce, the self-control of advertisement is from the relevant introduction that E-commerce transaction platform or the user charge (active) of wound are uploaded voluntarily, the oneself markets, the E-commerce transaction platform of advertisement.
Certainly; the present invention also can have other various embodiments; in the situation that do not deviate from spirit of the present invention and essence thereof; those of ordinary skill in the art work as can make according to the present invention various corresponding changes and distortion, but these corresponding changes and distortion all should belong to the protection domain of the appended claim of the present invention.

Claims (10)

1. the electronic business transaction method of non-tangible goods is characterized in that, comprises the following step:
Login via an entry network site, to upload or to download non-tangible goods itself, perhaps upload or download the demand for these non-tangible goods, an information of relevant or irrelevant these non-tangible goods perhaps is provided;
Via these non-tangible goods of a database storage itself, this demand and this information;
Protect, encrypt and verify the information of logining, transaction program and these non-tangible goods itself via a secure verification module; And
Via a server and an Internet Transmission interface this entry network site of operating.
2. the electronic business transaction method of non-tangible goods according to claim 1, it is characterized in that, these non-tangible goods itself are to be experience, knowledge, intelligence, art, information, method, idea, improvise, only door folk prescription or humane explore of self-control from wound, and this demand and this information are to be the certainly digital and electronic file of shadow, sound, literal, map file or the application program of introduction, advertisement or the propaganda of wound of self-control.
3. the electronic business transaction method of non-tangible goods according to claim 1, it is characterized in that, this entry network site provide the user login, register, identify authentication, pay upload, pay that downloads, paying are watched online, personal information maintenance, change, file encryption-decryption and authentication procedure.
4. the electronic business transaction method of non-tangible goods according to claim 1, it is characterized in that, this database more comprises: preload one user's data cell, an information interchange data cell, a transaction record unit, a plurality of storage element and a credit evaluation unit, a plurality of storage elements store these non-tangible goods itself, this demand and this information in order to correspondence.
5. the electronic business transaction method of non-tangible goods according to claim 1 is characterized in that, this secure verification module more comprises: allow the user pay by this secure verification module and buy and transmit file, verify information and the payment transaction program logined.
6. the electronic business transaction method of non-tangible goods according to claim 1, it is characterized in that, more comprise a front end services device and a back-end services device, the user holds in this front end services device of this server side operation or this back-end services device, and user's end is uploaded message unit, a download message unit, an editing and processing unit, a search unit or an interactive information unit via an operating environment interface, and operated.
7. the electronic business transaction method of non-tangible goods according to claim 6, it is characterized in that, this operating environment interface comprises a privately owned district, provide the user position and in order to carry out personal set, to upload legal user's digital certificate, and buy and needed temporarily providing room when downloading these non-tangible goods, deposit to the personal air of this front end services device or this back-end services device and be about to first these non-tangible goods after buying, user's capable of selecting time, place or suitable storing media are downloaded.
8. the electronic business transaction method of non-tangible goods according to claim 6, it is characterized in that, this operating environment interface comprises a consensus, provide the user position and in order to serving uploading, search, change and operating of all kinds of periodical advertisements, propaganda or this demand, and the Interact and Exchange between each user.
9. the electronic business transaction method of non-tangible goods according to claim 6, it is characterized in that, this back-end services device is the recognition data that receives the registered user, and the affirmation legal privately owned golden key of rear generation one user of recognition data and corresponding user's public key thereof, the user can't directly obtain or the privately owned golden key of this user of access, must come corresponding obtaining for each user's account by this server end.
10. the electronic business transaction method of non-tangible goods according to claim 9, it is characterized in that, this user's public key comes stamped signature and nuclear user's digital certificate to give user's keeping by the privately owned golden key of an exclusive supvr, and when using next time, provide, this user's digital certificate can be produced by the privately owned golden key of this supvr of this back-end services device supvr's public key or supvr's digital certificate to be come in addition stamped signature and confirms its legitimacy.
CN2011102543456A 2011-08-26 2011-08-26 Electronic commerce trade method for non-tangible goods Pending CN102956016A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2011102543456A CN102956016A (en) 2011-08-26 2011-08-26 Electronic commerce trade method for non-tangible goods

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2011102543456A CN102956016A (en) 2011-08-26 2011-08-26 Electronic commerce trade method for non-tangible goods

Publications (1)

Publication Number Publication Date
CN102956016A true CN102956016A (en) 2013-03-06

Family

ID=47764797

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2011102543456A Pending CN102956016A (en) 2011-08-26 2011-08-26 Electronic commerce trade method for non-tangible goods

Country Status (1)

Country Link
CN (1) CN102956016A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103366304A (en) * 2013-06-14 2013-10-23 北京小米科技有限责任公司 Method, device and equipment for transfer of virtual commodity use right
CN105989529A (en) * 2015-02-16 2016-10-05 王任昌 Network instant video or audio service transaction management system
CN109544175A (en) * 2018-10-25 2019-03-29 珠海市视微网络科技有限公司 A kind of e-commerce sale of antitheft figure and operation system

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050021362A1 (en) * 2003-06-30 2005-01-27 Yamaha Corporation Contents distribution supporting apparatus and program
JP2006244362A (en) * 2005-03-07 2006-09-14 Nec Corp Content distribution support method, system thereof, program thereof, and mediation device

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050021362A1 (en) * 2003-06-30 2005-01-27 Yamaha Corporation Contents distribution supporting apparatus and program
JP2006244362A (en) * 2005-03-07 2006-09-14 Nec Corp Content distribution support method, system thereof, program thereof, and mediation device

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103366304A (en) * 2013-06-14 2013-10-23 北京小米科技有限责任公司 Method, device and equipment for transfer of virtual commodity use right
CN103366304B (en) * 2013-06-14 2016-12-28 小米科技有限责任公司 A kind of usufructuary assignment method of virtual goods, device and equipment
CN105989529A (en) * 2015-02-16 2016-10-05 王任昌 Network instant video or audio service transaction management system
CN109544175A (en) * 2018-10-25 2019-03-29 珠海市视微网络科技有限公司 A kind of e-commerce sale of antitheft figure and operation system

Similar Documents

Publication Publication Date Title
US10838945B2 (en) Information processing network based on uniform code issuance, method therefor, and sensing access device
US10432693B2 (en) System, method and computer program for signing and dedicating information objects
US6325292B1 (en) Card system and methods utilizing collector cards
JP2022132450A (en) Blockchain-based personal data processing method, computer program, recording medium, and computer device
US8626838B2 (en) Digital media asset identification system and method
US20160125403A1 (en) Offline virtual currency transaction
TWI389046B (en) Trusted third party clearing house for lead tracking
US20060170759A1 (en) Methods and apparatus for optimizing digital asset distribution
US20220407702A1 (en) Systems and Methods for Token Creation and Management
CN104603813A (en) Data collection and analysis systems and methods
JP2019153275A (en) Control method, controller, data structure and power transaction system
TW200849126A (en) Electric payment system, electric payment server, value providing apparatus, mobile communications terminal, and electric payment method
CN101641707A (en) Authentication system, server used in authentication system, mobile communication terminal, and program
KR102269812B1 (en) System for providing blockchain based drawing transaction service
KR102452210B1 (en) Method of managing privacy preserving lottery
US20230419355A1 (en) Systems and methods for implementing a reactive and transactive ecosystem
CN112765565B (en) Copyright protection method and system based on block chain
CN109754247A (en) For the system and method based on bio-identification and device data certification user
TW201310372A (en) E-commerce transaction system for intangible merchandise
CN110503529A (en) A kind of transaction platform
CN102956016A (en) Electronic commerce trade method for non-tangible goods
Johnsen Blockchain in digital marketing: a new paradigm of trust
CN101588351A (en) Method for information security device for binding network software
CN107506619A (en) DRM Q digital literary property protection methods and system
CN110689412A (en) Method, device, server and storage medium for game virtual article transaction based on block chain

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20130306