CN114255091A - Internet privacy shopping method and internet shopping platform - Google Patents

Internet privacy shopping method and internet shopping platform Download PDF

Info

Publication number
CN114255091A
CN114255091A CN202011010687.9A CN202011010687A CN114255091A CN 114255091 A CN114255091 A CN 114255091A CN 202011010687 A CN202011010687 A CN 202011010687A CN 114255091 A CN114255091 A CN 114255091A
Authority
CN
China
Prior art keywords
party
shopping
internet
transaction
services
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011010687.9A
Other languages
Chinese (zh)
Inventor
毛金玉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202011010687.9A priority Critical patent/CN114255091A/en
Publication of CN114255091A publication Critical patent/CN114255091A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0613Third-party assisted
    • G06Q30/0615Anonymizing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification

Abstract

The internet privacy shopping method and the internet shopping platform improve the protection of the privacy of the buyer during internet shopping, and provide the information for the buyer of the merchant for anonymous processing or decryption processing, so that the buyer can conveniently and objectively evaluate the products or services of the merchant, the merchant and the buyer are isolated to a certain degree, the merchant is prevented from harassing the buyer, and the establishment and maintenance of a better shopping environment are facilitated.

Description

Internet privacy shopping method and internet shopping platform
Technical Field
The invention belongs to Internet e-commerce, and particularly relates to an Internet privacy shopping method and an Internet shopping platform.
Background
At present, people are used to shopping or purchasing services through the internet, and the shopping or purchasing services appear on a plurality of excellent shopping platforms, such as Taobao, Tianmao, Shuduo, Jingdong, Amazon, Mei Tuo, hungry, 1688 and the like, but the shopping platform directly provides the information of purchasers to merchants, is easily disturbed by the merchants without pause when disputes occur or the merchants are badly evaluated, easily leaks personal information or is injured by illegal persons, and is not beneficial to constructing a healthy and fair shopping environment.
In other network applications, for example, the drip network car booking provides a private number for calling, so that personal calls of users are prevented from being directly exposed, and the calls are recorded, and the personal privacy and the safety of the users are protected to a great extent.
Disclosure of Invention
The internet privacy shopping method and the internet shopping platform improve the protection of the privacy of the buyer during internet shopping, and provide the information for the buyer of the merchant for anonymous processing or decryption processing, so that the buyer can conveniently and objectively evaluate the products or services of the merchant, the merchant and the buyer are isolated to a certain degree, the merchant is prevented from harassing the buyer, and the establishment and maintenance of a better shopping environment are facilitated.
In a first aspect, a method of internet privacy shopping,
providing a transaction platform for a transaction of goods or services between a first party and a second party;
obtaining the user information of the first party, and providing the user information to the second party after desensitization treatment or anonymization treatment;
providing the acquired first party user information to a third party without desensitization or anonymization;
said first party is a purchaser of said goods or services in said transaction;
the second party is a seller of the goods or services in the transaction;
the third party is a provider or distributor of the goods or services in the transaction.
Further, the user information includes at least one of a name, a contact phone, an address.
Further, an identification ID number is used to correspond to said item or service, said first party and said second party.
Further, the identification ID is presented in the form of a two-dimensional code, a bar code, an electronic label, a number and/or a letter mark.
Further, the identification ID is a transaction order number, a logistics order number, a distribution order number, or a first party user name or a user number.
Further, a filtering range set by the second party is obtained, whether the first party is in the range or not is judged, and only if the first party is in the range, a transaction is allowed to be carried out with the second party, or the second party is shown to the first party, or goods or services sold by the second party are shown to the first party;
the range is at least one of an address, a credit, a rating rate, a refund rate, and a return rate.
Further, a privacy number conversation service or an online chat service is provided for the first party and the second party.
Further, the transaction may further include the first party evaluating the second party after receiving the goods or services.
Further, the goods or services are takeaway.
In a second aspect, an internet shopping platform enables the method for internet private shopping of the first aspect.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the embodiments or the prior art descriptions will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive exercise.
FIG. 1 is a schematic flow chart diagram of a method embodiment of Internet privacy shopping of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
It is to be understood that the terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in the examples of the present invention and the appended claims, the singular forms "a," "an," "the," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any and all possible combinations of one or more of the associated listed items.
Additionally, the word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination" or "in response to a detection", depending on the context.
It is to be understood that although the terms first and second may be used in embodiments of the present invention, these terms are only used to distinguish one functional unit from another, and are not used to distinguish one connection from another. For example, a first element may also be referred to as a third element and, similarly, a second element may also be referred to as a fourth element without departing from the scope of embodiments of the present invention.
In addition, it should be understood that although the terms current, described, third party, etc. may be used herein to describe devices, these devices should not be limited to these terms, which are used only to distinguish one device from another. Some portions of the detailed descriptions which follow are presented in terms of algorithms which include operations on data stored in a computer memory. An algorithm is generally a sequence of operations that produce a desired result. These operations typically require or involve physical manipulations of physical quantities. Usually, though not necessarily, these quantities take the form of electrical or magnetic signals capable of being stored, transferred, combined, compared, and otherwise manipulated. It has proven convenient at times, principally for reasons of common usage, to refer to these signals as bits, values, elements, symbols, characters, terms, numbers, or the like.
However, all of these and similar terms are to be associated with the appropriate physical quantities and are merely convenient labels applied to these quantities. Unless specifically stated otherwise as apparent from the following discussions, it is appreciated that throughout the specification discussions utilizing terms such as "responding," "obtaining," "generating," "processing," "analyzing," "checking," "monitoring," "matching," or the like, may refer to the action and processes of a data processing system, or similar electronic device, that manipulate and transform data represented as physical (electronic) quantities within the system's registers and memories into other data similarly represented as physical quantities within the system's memories or registers or other such information storage, transmission or display devices.
The data, information, control instructions, parameters and models in the following text can be one or more combinations of numbers, characters and letters.
In addition, the sending and receiving in this document are used to describe the data flow, and it is not specific that the sending party is active or the receiving party is passive.
In order to explain the technical means of the present invention, the following description will be given by way of specific examples.
Referring to fig. 1, a schematic flow chart diagram of an embodiment of a method for internet privacy shopping according to the present invention is shown.
The first party in the figure is a purchaser, i.e. a user or consumer, of goods or services;
the second party is a seller of the goods or services, i.e. a merchant;
the third party is a provider or distributor of goods or services.
The embodiment comprises the following steps:
and S1, registering the user information.
Acquiring user information input by a first party: contact the phone, address, name to register as the recipient of the purchase of the item or service.
Further, the contact telephone, address and name of other persons can be used as the consignee.
Further, the user information may be at least one of gender, contact telephone number, address, identification number, bank card number, user name or physiological identification information. The user name can be obtained by the user, can be a user name designated by the shopping platform, and can also be a number corresponding to the user name.
And S2, uploading the sold goods or services, and setting at least one filtering range of address, credit, goodness rate, refund rate and return rate.
The article or service uploaded by the second party as the seller is acquired and purchased by the first party, in the embodiment, the second party sells fresh flowers, the fresh flowers are provided for the local user, and the flowers are sent to the home.
Furthermore, because the remote distribution cost of flowers is too high, the second party is mainly distributed to local users, when the flowers need to be sold on a platform, the distribution range is defined, namely, users with the receiving addresses within the range are used as sales objects, and the range of the second party can be obtained by means of a map fence and by means of manual address selection or address input.
In the embodiment, the address range which can be sold and distributed is specified by the closed area enclosed by a plurality of roads, and users outside the address range do not provide flowers or send flowers to home.
Further, administrative areas of different levels may be used as address ranges.
Further, a single, a plurality of, or all of the distribution ranges of the distribution companies such as the logistics distribution companies for express delivery may be used as the address range.
Further, a filtering range larger than a certain good evaluation rate can be set as a selling object, only those users giving good evaluation rates in a certain range to merchants provide flowers, the example is set to be larger than 98% good evaluation rate, partial critical users are avoided, and even normal flowers and services can also give bad evaluation risks.
Further, the filtering range of the sales target can also be used as the good rating given to the user by the merchant.
Further, a credit range may be set as a filtering range of the sales object, and a user with a poor part of credit may be filtered or rejected.
Further, a refund rate may be set as a filtering range of the sales object, and a user with a high partial refund rate may be filtered or rejected.
Furthermore, the filtering range of the sales object can be used only one, or multiple filtering ranges can be used simultaneously, or the filtering range of the sales object is not set, and the sales is directed to all users.
Furthermore, S1 and S2 are not consecutive in the flow.
S3, finding the second party, or the goods or services sold by the second party.
The method comprises the steps that a first party is obtained to find a desired article or service through a platform, and in the embodiment, the first party is obtained to input a flower selling merchant in a search bar of a shopping platform.
Further, the category of the goods or services may also be displayed for the first party to find the merchant.
Further, the first party can also obtain the goods or services that the first party directly finds out the merchant sells through searching or categories.
S4, displaying the second party, or the second party' S goods or services, for the first party.
In this embodiment, the first party searches for a merchant selling fresh flowers, the second party is a merchant selling fresh flowers, the first party purchases articles or services 100 times in an accumulated manner, the rating is 99 times, and the poor rating is 1 time, the rating given to the merchant is 99%, the rating is greater than the rating set by the merchant, the rating is greater than 98%, the first party is within the rating range set by the merchant, and the receiving address of the first party is also within the address range set by the second party. The shopping platform shows the second party to the first party, and the first party can further look over information including merchant address, telephone, merchant name, flower type, specification, picture, price and the like.
Furthermore, the information such as the address of the merchant, the name of the merchant, the flower type, the specification, the picture, the price and the like can also be directly displayed.
Further, the first party is also directly presented with the relevant services or services that the merchant sells and is sought by the first party.
Furthermore, a plurality of merchants or articles or services of a plurality of merchants can be displayed at the same time, and the first party is logged in the platform and actively displayed with articles or services of the second party or the second party.
Further, if the merchant is provided with a filtering range, the third party, or the third party's goods or services, is only presented to the first party when the first party is within range.
And S5, selecting and purchasing the goods or the services.
In this embodiment the first party selects the flower sold by the second party and selects the name, address, contact phone used for the transaction for receiving the flower and contact phone registered at S1 and completes the payment and the shopping platform obtains the purchasing and payment activities of the first party.
Further, the shipping address, contact phone may be populated with other names, addresses, contact phones for receiving flowers for this transaction when flowers are selected.
Further, the payment of the goods or the service fee can be carried out after the delivery or the service of the goods is finished, and the payment can be carried out according to the appointed times.
And S6, sending the order related information to the second party, wherein the first party user information is subjected to desensitization processing or anonymization processing.
In the embodiment, the shopping platform sends the user information of the first party, namely the order information after shielding the name, the contact telephone and the address, to the second party or displays the order information to the second party. Thus, the merchant knows that someone purchased flowers, but cannot reach the first party outside of the shopping platform.
Further, desensitizing or anonymizing the first party user information, the method comprises: hiding, field replacing, partial shielding processing and the like.
Further, the user information may be information such as gender, identification number, bank card number, user name, or physiological identification.
S7, sending the item or service through the third party, or notifying the third party to provide the item or service.
In this embodiment, the second party delivers the flowers ordered by the first party to the third party, the shopping platform provides the name, telephone and address of the recipient of the first party to the third party, and the third party delivers the flowers to the first party.
Furthermore, the shopping platform generates an order number for flower ordering transaction of a first party and a second party, the order number is used as an identification ID in transaction and is used for identifying different transactions, the identification ID in transaction corresponds to the goods or services, the first party and the second party in transaction, and the identification ID of flowers is noted or explained when the second party delivers the flowers to a third party.
Furthermore, the second party or the third party can upload the express bill number to the shopping platform, and the express bill number is used as the identification ID in the transaction.
Further, the identification ID may be another number corresponding to the current flower transaction, such as a physical distribution list number, a distribution list number, or a user number.
Further, the identification ID is displayed in the form of a two-dimensional code, a bar code, electronic label information, a label of a number and/or a letter, or may be transmitted in a form of a piece of information recognizable by a computer.
And S8, the third party acquires the information of the first party related user.
And the shopping platform sends the identification ID and the first party consignee information corresponding to the identification ID to a third party, or sends the first party consignee information corresponding to the identification ID to the third party when the third party inquires the shopping platform according to the identification ID.
S9, delivering the goods or services to the first party.
In this embodiment, the third party is a local distributor, and the flowers provided by the second party are delivered to the first party.
Furthermore, the third party can distribute flowers to the first party by himself, and can also deliver other express deliveries, logistics and the like to the flowers for the first party.
Furthermore, the second party does not have flowers, but only sells the flowers, the third party is a flower provider, after the flowers are sold to the first party, the second party informs the third party to distribute the flowers to the first party, and the third party can send the flowers by himself or delegate the sending party to send the flowers.
Further, the third party and the second party are not directly handed over or connected, but the second party establishes connection through other distribution or transfer parties, and the third party provides goods or services to the first party, or the third party provides goods or services to the first party through other distribution parties or services.
Furthermore, the consignee information in the logistics order such as the express delivery sent by the second party to the third party or the self-printed logistics order is the consignee information of the first party after decryption processing or anonymous processing of the shopping platform, for example, all or part of addresses, names, contact calls and the like are omitted, and after the third party receives the consignment express of the second party, the shopping platform actively sends the detailed consignee information of the first party to the third party or provides the detailed consignee information of the first party after the third party inquires. And the third party completes delivery according to the completed information of the first party consignee user. Or the third party supplements the information of the first party consignee user, for example, the information of the first party detailed consignee is printed and pasted when in sorting or transferring, and then the distribution is completed or other distribution parties are entrusted to carry out the distribution.
And S10, evaluating the second party.
After the first party receives the flowers, the second party is evaluated, such as good evaluation, medium evaluation and bad evaluation, or quality, delivery speed, service attitude and the like. If the merchant receives a poor rating, it can only improve and cannot require the first party to modify or delete the rating by receiving, harassing or threatening as before.
Furthermore, chat or communication service is provided for consultation or communication in the transaction between the first party and the second party, so that the first party and the second party can communicate clearly in time, the transaction is facilitated, and the condition that goods or services cannot be delivered or delivered is avoided.
Further, in the transaction, the consultation or communication between the first party and the second party is performed through an online chat service of the shopping platform, such as a message system or an instant messenger.
Further, in the transaction, consultation or communication between the first party and the second party is performed through a privacy number call service provided by the shopping platform.
Furthermore, the call is recorded, which is beneficial to dispute handling.
Further, user information that is not available to the first party may be provided to the second party subject to authorization by the first party.
Further, a name or a generation ID filled by the first party can be specified, generated or obtained for the first party and displayed to the second party. This surrogate or surrogate ID may be temporary or long-term. May be used for customer registration, preferential treatment or management of the first party by the second party.
Further, the flowers may be sold in the transaction, or other goods or services, such as mobile phones, home appliances, clothes, takeout, decoration services, home services, and the like.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned.
Furthermore, it should be understood that although the present description refers to embodiments, not every embodiment may contain only a single embodiment, and such description is for clarity only, and those skilled in the art should integrate the description, and the embodiments may be combined as appropriate to form other embodiments understood by those skilled in the art.

Claims (10)

1. A method for shopping in the privacy of the Internet is characterized in that,
providing a transaction platform for a transaction of goods or services between a first party and a second party;
obtaining the user information of the first party, and providing the user information to the second party after desensitization treatment or anonymization treatment;
providing the acquired first party user information to a third party without desensitization or anonymization;
said first party is a purchaser of said goods or services in said transaction;
the second party is a seller of the goods or services in the transaction;
the third party is a provider or distributor of the goods or services in the transaction.
2. The method of internet private shopping as claimed in claim 1, wherein said user information includes at least one of name, contact phone, address.
3. The method of internet private shopping of claim 1, wherein an identification ID number is used to correspond to the item or service, the first party, and the second party.
4. The internet privacy shopping method as claimed in claim 3, wherein the identification ID is presented in the form of a two-dimensional code, a bar code, an electronic tag, a number and/or a letter mark.
5. The internet private shopping method as claimed in claim 3, wherein the identification ID is a transaction order number, a logistics order number, a distribution order number or a first party user name or a user number.
6. The internet privacy shopping method according to claim 1, wherein a filtering range set by the second party is obtained, and whether the first party is within the range is judged, and only if the first party is within the range, a transaction with the second party is allowed to occur, or the second party is shown to the first party, or goods or services sold by the second party are shown to the first party;
the range is at least one of an address, a credit, a rating rate, a refund rate, and a return rate.
7. The method of internet private shopping of claim 1, wherein the first party and the second party are provided with a private number call service or an online chat service.
8. The method of internet private shopping of claim 1, wherein the transaction further comprises the first party evaluating the second party after receiving the item or service.
9. The method of internet private shopping of claim 1, wherein the item or service is take-away.
10. An internet shopping platform, characterized in that it is capable of implementing the method of internet private shopping according to claims 1-9.
CN202011010687.9A 2020-09-23 2020-09-23 Internet privacy shopping method and internet shopping platform Pending CN114255091A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011010687.9A CN114255091A (en) 2020-09-23 2020-09-23 Internet privacy shopping method and internet shopping platform

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011010687.9A CN114255091A (en) 2020-09-23 2020-09-23 Internet privacy shopping method and internet shopping platform

Publications (1)

Publication Number Publication Date
CN114255091A true CN114255091A (en) 2022-03-29

Family

ID=80788638

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011010687.9A Pending CN114255091A (en) 2020-09-23 2020-09-23 Internet privacy shopping method and internet shopping platform

Country Status (1)

Country Link
CN (1) CN114255091A (en)

Similar Documents

Publication Publication Date Title
CA3053280C (en) System and method for tracking purchases
AU2010278706B2 (en) Method and system for transferring an electronic payment
KR20010031840A (en) Electronic commerce with anonymous shopping and anonymous vendor shipping
US6816843B1 (en) Method and apparatus for conducting purchases in private over a network
KR20000054577A (en) Real-Time Face-to-Face Conversational Electronic Commerce with Video Conference
US20120323710A1 (en) Method and system for storing and using identifying account information on an electronic device
US20130325645A1 (en) Semi-Anonymous Request-Offer Matching Commerce Mobile App
JP2002269413A (en) Internet order system
KR20040054386A (en) Electronic Commerce System and Method Using the Electronic Approval Information
US20170193522A1 (en) Method, server and system for dynamic customer/provider data pairing
JP2003016349A (en) Electronic commerce supporting method, article buying method, electronic commerce supporting information processor, information communication terminal, and program
CN114255091A (en) Internet privacy shopping method and internet shopping platform
CN114255092A (en) Internet privacy ordering method and Internet ordering platform
KR20030062286A (en) Method for certifying deliverer
US20040267631A1 (en) Match promoting system and method
EP4280146A1 (en) Computer-implemented method and system for securing data
JP2004518196A (en) Commerce via the Internet
KR20060099899A (en) Merchandise selling system using merchandise identification scanning device and method thereof
JP2004021485A (en) Mail-order sales system
GB2577342A (en) Anonymous acknowledgement of receipt in assisted purchasing
WO2019058352A1 (en) Anonymous acknowledgement of receipt in assisted purchasing
KR20020055204A (en) electronic commerce through wireless network and method thereof
KR100635388B1 (en) Electronic Commerce Intermediate Method using URL call back
Sari et al. THE IMPORTANCE OF SECURITY AND CONSUMER TRUST ASPECTS IN ESTABLISHING CUSTOMER SATISFACTION IN TRANSACTIONS THROUGH E-COMMERCE
KR20210024758A (en) QR code based E-commerce system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20220329