TW491972B - System, method, and article of manufacture for electronic merchandising in an e-commerce application framework - Google Patents

System, method, and article of manufacture for electronic merchandising in an e-commerce application framework Download PDF

Info

Publication number
TW491972B
TW491972B TW89117695A TW89117695A TW491972B TW 491972 B TW491972 B TW 491972B TW 89117695 A TW89117695 A TW 89117695A TW 89117695 A TW89117695 A TW 89117695A TW 491972 B TW491972 B TW 491972B
Authority
TW
Taiwan
Prior art keywords
product
information
user
customer
architecture
Prior art date
Application number
TW89117695A
Other languages
Chinese (zh)
Inventor
Michel K Bowman-Amuah
Original Assignee
Andersen Consulting Llp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Andersen Consulting Llp filed Critical Andersen Consulting Llp
Application granted granted Critical
Publication of TW491972B publication Critical patent/TW491972B/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Stored Programmes (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

A system, method and article of manufacture are provided for suggesting products over a network. Information of a product is displayed. The product information includes product specifications, graphics, video images, digital samples, and/or inventory availability. A search mechanism is provided for searching for items similar to the product over a network. Items found during the search similar to the product are suggested. Selection of the product and the items similar to the product is allowed for purchase over the network.

Description

491972 A7 B7 五、發明說明(1 ) 發明領域 本發明係關於一種電子產品目錄,特別是關於一種包 ..............— -----------· 11 (請先閱讀背面之注意事項再填寫本頁) 括存貨控制資訊的產品目錄。 發明背景 電腦的重要使用之一是在網路(network)上轉移資 訊。目前,現有最大的電腦網路是網際網路 (Internet)。網際網路是一種電腦網路的全球性交互 連接,係使用共同協定而互相溝通。數以萬計的電腦,從 低階的個人電腦到高階的超級電腦,都與網際網路連接。 網際網路係.源自於美國國防部之先進硏究計畫處 (U. S . Defense Department’s Advanced Research Projects Agency),在1 960世代期間所贊助的成果。491972 A7 B7 V. Description of the Invention (1) Field of the Invention The present invention relates to an electronic product catalog, and in particular, to a bag ..............--------- -· 11 (Please read the notes on the back before filling out this page) A product catalog including inventory control information. BACKGROUND OF THE INVENTION One of the important uses of computers is to transfer information over a network. Currently, the largest computer network available is the Internet. The Internet is a global interactive connection of computer networks that communicates with each other using a common agreement. Tens of thousands of computers, from low-end personal computers to high-end supercomputers, are connected to the Internet. The Internet Department. A work sponsored by the U.S. Defense Department ’s Advanced Research Projects Agency during the 1960s.

長久以來,大學與國家實驗室裡的硏究人員使用網際網 路,以共同分享資訊。當網際網路的存在變得更普遍的時 候,許多學術硏究單位之外的使用者(例如,大公司的受 雇者)開始使用網際網路,以傳送電子郵件。 經濟部智慧財產局員工消費合作社印製 在1 989年,一種新型態的資訊系統,稱爲全球資訊 網(World- Wide-Web,“網路”,.“the Web”),被引 入網際網路之中。網路的早期發展是在CERN (歐洲粒子 物理實驗室 the European Particle Physics Laboratory)中發生。全球資訊網是一個廣域超媒體資 4HICKMAN200036TW; AND1P282.TW ] 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) 經濟部智慧財產局員工消費合作社印製 491972 A7 _B7___ 五、發明說明(2 ) 訊檢索系統,其目標是得以廣泛地存取大量的全球文件。 在那個時候,全球資訊網只有學術/硏究單位知道及使 用。對於一個技術上沒有受過訓練的人而言,並沒有容易 獲得的工具,得以進出這個全球資訊網。 在1 993年,國家超級電腦應用中心(National Center for Super computing Applications, NCSA) 的硏究人員,發行一種全球資訊網瀏覽器,稱爲“摩賽克 (Mosaic)” ,其使用圖形使用者介面(GUI)。摩賽 克的圖形使用者介面容易學習,但仍具有威力。摩賽克瀏 覽器讓使用者從全球資訊網,使用簡單的點選-按鍵 (point-and-click).命令來檢索資料。因爲使用者不需 要接受技術上的訓練,並且此瀏覽器在使用上是舒適的, 所以其對於網際網路開放給大眾將具有潛力。 網路的架構依循習知的客戶端-伺服器模式。名詞 “客戶端”以及“伺服器”被用來表示電腦的一般角色, 其係作爲資料的請求者(客戶端),或是資料的提供者 (伺服器)。在網路的環境之下,網路瀏覽器是在客戶端 這邊,網路文件是在伺服器那邊。網路客戶端及網路伺服 器係使用一協定來溝通,這個協定叫做“超文件傳送協定 (HTTP) ” 。瀏覽器對伺服器打開一連結,並啓動一對 於文件的請求。伺服器遞送這個請求文件,典型是以標準 超文件標示語言(HTML)格式所編碼的文字文件的形 4HICKMAN200036TW; AND1P282.TW 2 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) --------------- (請先閱讀背面之注意事項再填寫本頁) 0 經濟部智慧財產局員工消費合作社印製 491972 A7 B7 五、發明說明(3) 式,並且當這個連結在上述互動中關閉的時候,此伺服器 扮演一被動的角色,也就是伺服器接受來自客戶端的命 令,但無法請求客戶端執行任何動作。 在習知網路環境下的通訊模式,提供客戶端與伺服器 之間非常有限的互動程度。在許多系統中,增加系統內元 件之間的互動程度,經常會使系統更強韌,但是增加互動 會增加互動的複雜度,並且通常會減緩互動的速度。因 此,由於客戶端與伺服器之間的網路互動程度的緣故,所 以習知的網路環境提供較不複雜、較快的互動。 發明槪要 提供一系統、方法與製成品以在網路上建議產品。顯 示一產品的資訊。產品資訊包括產品規格、圖樣、視訊影 像、數位樣品與/或存貨可利用性。提供一搜尋機制來搜 尋網路上與產品相似的物品。建議在搜尋中發現之與產品 相似的物品。允許在網路上採購時選擇產品以及與產品相 似之物品。 在本發明的一實施例中,可提供一可下載的產品樣 本。在本發明的另一實施例中,也允許由使用者產生的產 品fiP。在本發明的再一實施例中,評估該產品與相似該 產品之物品的相容性以及均等性。 在本發明的更一實施例中,產品以及與產品相似的物 品之價格可以隨著一客戶簡介、一客戶類型與/或一地理 4HICKMAN200036TW; AND1P282.TW 3 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) ------------AW1 ---1----訂--------- (請先閱讀背面之注意事項再填寫本頁) A7Researchers in universities and national laboratories have long used the Internet to share information. As the Internet became more widespread, many users outside academic research units (for example, employees of large companies) began using the Internet to send e-mail. Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs in 1989, a new type of information system, called the World Wide Web ("Web", "the Web"), was introduced to the Internet Online. The early development of the Internet took place in CERN (the European Particle Physics Laboratory). World Wide Web is a wide-area hypermedia resource 4HICKMAN200036TW; AND1P282.TW] This paper size applies to China National Standard (CNS) A4 (210 X 297 mm) Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 491972 A7 _B7___ V. Description of the Invention (2) An information retrieval system whose goal is to provide extensive access to a large number of global documents. At that time, the World Wide Web was known and used only by academic / research institutions. For a technically untrained person, there are no easy-to-access tools to access this global information network. In 1 993, researchers at the National Center for Super Computing Applications (NCSA) released a World Wide Web browser, called "Mosaic," which uses a graphical user interface (GUI). Mosick's graphical user interface is easy to learn, but still powerful. The Mosico browser allows users to retrieve data from the World Wide Web using simple point-and-click. Commands. Because the user does not need technical training, and the browser is comfortable to use, it has potential for the Internet to be open to the public. The architecture of the network follows the conventional client-server model. The terms "client" and "server" are used to refer to the general role of a computer, either as the requester (client) of the data or the provider (server) of the data. In a network environment, the web browser is on the client side and the web files are on the server side. Web clients and web servers communicate using a protocol called the Hyper File Transfer Protocol (HTTP). The browser opens a link to the server and initiates a request for a file. The server delivers this request file, which is typically in the form of a text file encoded in the standard Hyper Document Markup Language (HTML) format. 4HICKMAN200036TW; AND1P282.TW 2 This paper size applies to China National Standard (CNS) A4 (210 X 297 mm) ) --------------- (Please read the notes on the back before filling out this page) 0 Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 491972 A7 B7 V. Description of Invention (3) When the link is closed in the above interaction, the server plays a passive role, that is, the server accepts commands from the client, but cannot request the client to perform any action. The communication mode in the known network environment provides a very limited degree of interaction between the client and the server. In many systems, increasing the degree of interaction between components within the system often makes the system more robust, but increasing the interaction increases the complexity of the interaction and usually slows down the speed of the interaction. Therefore, due to the degree of network interaction between the client and the server, the conventional network environment provides less complex and faster interaction. The invention is to provide a system, method, and finished product to suggest products on the Internet. Display information about a product. Product information includes product specifications, drawings, video images, digital samples and / or inventory availability. Provide a search mechanism to search for items similar to products on the Internet. It is recommended to find items similar to the product in the search. Allows selection of products and items similar to products when purchasing online. In one embodiment of the present invention, a downloadable product sample may be provided. In another embodiment of the invention, the product fiP produced by the user is also allowed. In yet another embodiment of the present invention, the compatibility and equality of the product with items similar to the product are evaluated. In a further embodiment of the present invention, the prices of products and products similar to the products may follow a customer profile, a customer type, and / or a geography. 4HICKMAN200036TW; AND1P282.TW 3 This paper standard applies Chinese National Standards (CNS) A4 specification (210 X 297 mm) ------------ AW1 --- 1 ---- Order --------- (Please read the precautions on the back before filling (This page) A7

經濟部智慧財產局員工消費合作社印製 五、發明說明(4 ) 位置而產生。在本發明的又更一實施例中,爲了一客戶, 可根據一客戶簡介、一客戶類型與/或一地理位置產生一 或多個產品與產品相似物件的特惠供應或產品特賣。 圖式之簡單說明 第1圖係爲本發明一實施例之硬體實施示意圖; 第2圖係爲揭露一架構之高階槪述的流程圖; 第3圖圖示三個結構架構的依靠關係; 第4圖揭露傳送媒介母體(delivery vehicle matrix ); 第5圖揭露傳送媒介方塊(delivery vehicle cube); 第6圖係爲一流程圖,·描述辨別一結構中所使用的的核心 技術時需要被考慮的情況; 第7圖係一圖表,可用以決定是否使用以網路中心的技術 (Netcentric technology); 第8圖係一圖表,可用以決定決定是否使用客戶端伺服器 技術; 第9圖決定使用主機的圖樣; 第10圖揭霞在發展結構架構(Development Architecture Framework)中的電子商務應用架構; 第11圖揭露電子商務應用架構、可能的電子商務銷售模 式、致能技術、致能電子商務軟體套裝程式之間的關係; 第12圖揭露根據本發明一實施例網路上自動執行服務方 法的流程圖; 4HICKMAN200036TW; AND1P282.TW 4 本紙?Γ尺度適用中國國家標準規格(210 x 297公釐) -----------裝--------訂--------- (請先閱讀背面之注意事項再填寫本頁) 491972 經濟部智慧財產局員工消費合作社印製 A7 ____B7__ 五、發明說明(5 ) 第1 3圖顯示根據本發明一實施例電子商務應用架構的代 理器; 第14圖揭露根據本發明一實施例在網路上建議產品之方 法的流程圖; 第15圖揭露本發明之電子商務應用架構的行銷規劃物件 (merchandising component ); 第16圖揭露一方法的流程圖,此方法其根據本發明一實 施例,在網路上與一使用者互動以將一網站個人化; 第17圖係根據本發明一實施例,描述電子商務應用架構 的關係管理區域; 第18圖揭露實施電子商務應用架構的關係管理區域 (Relationship Management section)之槪念個人化 架構(conceptual personalization architecture ); 第19圖揭露一簡單的個人化程序; 第20圖圖示個人化的程度; 第21圖揭露一內容目錄,其可被用以管理一企業的內 容; 第22圖揭露具有三個動態內容區域(DC As)的示範模板, 其嵌入依照一方法的模板中,此方法係將一規則與內容關 聯到一互動上; 第 23 圖係插述 一 Sh A R E (Selection,Acquisition, R e t e n t i ο η,E x t e n s i ο η )客戶關係模型,其提出在轉變 到互動式銷售(interactive marketing)時的改變;· 4HICKMAN200036TW; AND1P282.TW 5 本&張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) ~ (請先閲讀背面之注意事項再填寫本頁)Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 5. The invention description (4) was generated. In still another embodiment of the present invention, for a customer, a special offer or product sale of one or more products similar to the product may be generated according to a customer profile, a customer type, and / or a geographical location. Brief Description of the Drawings Figure 1 is a schematic diagram of the hardware implementation of an embodiment of the present invention; Figure 2 is a high-level description flowchart exposing an architecture; Figure 3 illustrates the dependency relationship of three structural architectures; Figure 4 reveals the delivery vehicle matrix; Figure 5 reveals the delivery vehicle cube; Figure 6 is a flowchart that describes the core technology used to identify a structure that needs to be Situations considered; Figure 7 is a chart that can be used to decide whether to use Netcentric technology; Figure 8 is a chart that can be used to decide whether to use client-server technology; Figure 9 is determined Use the host's design; Figure 10 exposes the e-commerce application architecture in the Development Architecture Framework; Figure 11 reveals the e-commerce application architecture, possible e-commerce sales models, enabling technology, enabling e-commerce Relationship between software package programs; FIG. 12 discloses a flowchart of a method for automatically performing a service on a network according to an embodiment of the present invention; 4HIC KMAN200036TW; AND1P282.TW 4 This paper? Γ standard applies to Chinese national standard specifications (210 x 297 mm) ----------- installed -------- order ------- -(Please read the notes on the back before filling out this page) 491972 Printed by the Consumers ’Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs A7 ____B7__ V. Description of the Invention (5) Figure 13 shows the e-commerce application architecture according to an embodiment of the present invention FIG. 14 discloses a flowchart of a method for recommending a product on the Internet according to an embodiment of the present invention; FIG. 15 discloses a merchandising component of an e-commerce application architecture of the present invention; FIG. 16 discloses a A flowchart of a method that interacts with a user on the network to personalize a website according to an embodiment of the present invention; FIG. 17 illustrates a relationship management area of an e-commerce application architecture according to an embodiment of the present invention Figure 18 reveals the conceptual personalization architecture of the Relationship Management section implementing the e-commerce application architecture; Figure 19 reveals a simple personalization process Figure 20 illustrates the degree of personalization; Figure 21 reveals a content directory that can be used to manage the content of an enterprise; Figure 22 reveals a model template with three dynamic content areas (DC As), which are embedded According to a method template, this method associates a rule with content to an interaction; Figure 23 interpolates a Sh ARE (Selection, Acquisition, Retenti ο η, Extensi ο η) customer relationship model, which Propose changes when transitioning to interactive marketing; · 4HICKMAN200036TW; AND1P282.TW 5 This & Zhang scale is applicable to China National Standard (CNS) A4 specifications (210 X 297 mm) ~ (Please read the back (Please fill in this page again)

491972 A7 B7 五、發明說明(6) 第2 4圖揭露一方法的流程圖,此方法根據本發明一實施 例,供管理網路上電子商務系統; 第2 5圖根據本發明一實施例揭露電子商務應用架構之維 護與管理部分的元件; 第2 6圖揭露本發明之電子商務應用架構的訂購程序部 分; 第27圖揭露一方法的流程圖,此方法根據本發明一實施 例以在網路上完成一交易; 第2 8圖係描述在電子商務實施上完成一個完整的訂購程 序所需要的商業能力的例示流程; 第29圖揭露一方法的流程圖,以根據本發明一實施例在 網路上以電子方式服務客戶; 第3 0圖揭露電子商務應用架構之客戶服務部分的主要客 戶服務; 第3 1圖根據本發明一實施例揭露電子商務應用架構的安 全元件; 第3 2圖揭露一方法的流程圖,此方法根據本發明一實施 例確保在網路上電子商務系統的安全; 第33圖顯示一線上廣告方案的一樣品架構; 第3 4圖揭露在一線上廣告方案中的一示範安全架構; 第35圖描述一樣品架構,其提供對一些客戶的直接網路 接觸,以分享規格、分配工程設計以及進行中工作的合 作; 第36圖描述第3 5圖的另一示範安全架構; 4HICKMAN200036TW; AND1P282.TW , 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) (請先閱讀背面之注意事項再填寫本頁) 丨丨丨丨!丨訂丨丨丨丨丨丨II*^1^· 經濟部智慧財產局員工消費合作社印製 /2 A7491972 A7 B7 V. Description of the Invention (6) Figure 24 shows a flow chart of a method according to an embodiment of the present invention for managing an e-commerce system on a network; Figure 25 shows a method according to an embodiment of the present invention. Elements of the maintenance and management part of the business application architecture; Figures 2 and 6 disclose the ordering procedure part of the e-commerce application framework of the present invention; Figure 27 shows a flowchart of a method according to an embodiment of the present invention on the network Completing a transaction; Figures 28 and 8 illustrate an exemplary flow of business capabilities required to complete a complete ordering process in the implementation of e-commerce; Figure 29 discloses a flowchart of a method for using the network according to an embodiment of the present invention Serving customers electronically; Fig. 30 discloses the main customer service of the customer service part of the e-commerce application architecture; Fig. 31 discloses the security elements of the e-commerce application architecture according to an embodiment of the present invention; and Fig. 32 discloses a method A flowchart of this method according to an embodiment of the present invention to ensure the security of an e-commerce system on the Internet; Figure 34 shows a sample architecture of an online advertising solution; Figure 34 shows a sample security architecture in an online advertising solution; Figure 35 describes a sample architecture that provides direct network access to some customers to share specifications and distribute engineering designs. And cooperation in progress; Figure 36 depicts another exemplary security architecture of Figure 35; 4HICKMAN200036TW; AND1P282.TW, this paper size applies the Chinese National Standard (CNS) A4 specification (210 X 297 mm) (please first Read the notes on the back and fill out this page) 丨 丨 丨 丨!丨 Order 丨 丨 丨 丨 丨 丨 II * ^ 1 ^ · Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economy / 2 A7

五、發明說明(7 ) 第3 7圖顯示在互動客戶支援方案中的一樣本架構; 第3 8圖揭露在客戶支援方案中的一示範樣品架構; 第3 9圖描述一線上銀行方案的一樣本架構; 第4 0圖顯示一線上銀行方案中的一示範安全架構; 第41圖揭露在一線上購物方案中的一樣品架構; 第4 2圖顯示在一線上購物方案中的一示範安全架構; 第43圖揭露一方法的流程圖,此方法根據本發明一實施 例,供在電子商務環境中一操控一客戶資料; 第4 4圖揭露根據本發明一實施例之電子商務應用架構的 決定支援元件(Decision Support component); 第4 5圖揭露根據本發明一實施例之電子商務應用架構的 整合元件(Integration component ); 第46圖揭露一方法的流程圖,此方法根據本發明一實施 例將電子商務元件整合入一已存在之一企業的架構中。 發明之詳細說明 本發明中的系統的較佳實施例最好是在個人電腦上執 行,例如IBM相容的個人電腦、蘋果麥金塔電腦或是以 UNIX爲基礎之工作站。一代表性的硬體環境例示於第1 圖中,其揭露依照較佳實施例之典型工作站硬體組態具有 中央處理器110,如微處理器(microprocessor)與一 些其他經由一系統匯流排11 2交互連結的單元。如第1圖 所示的工作站包括隨機存取記憶體(RAM) 114,唯讀 記憶體(ROM) 116,連接周邊設備的I/O接合器11.8, 4HICKMAN200036TW; AND1P282.TW 1 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) (請先閱讀背面之注意事項再填寫本頁)V. Description of the invention (7) Figure 37 shows the same architecture in the interactive customer support scheme; Figure 38 shows a sample sample architecture in the customer support scheme; Figure 39 describes the same in an online banking scheme This architecture; Figure 40 shows a model security architecture in an online banking solution; Figure 41 shows a sample architecture in an online shopping solution; Figure 42 shows a sample security architecture in an online shopping solution Figure 43 discloses a flowchart of a method according to an embodiment of the present invention for manipulating a customer's data in an e-commerce environment; Figures 4 and 4 disclose a decision of an e-commerce application architecture according to an embodiment of the present invention Supporting components (Decision Support component); Figures 4 and 5 disclose integration components of an e-commerce application architecture according to an embodiment of the invention; Figure 46 shows a flowchart of a method according to an embodiment of the invention Integrate e-commerce components into the architecture of an existing enterprise. DETAILED DESCRIPTION OF THE INVENTION The preferred embodiment of the system of the present invention is preferably implemented on a personal computer, such as an IBM-compatible personal computer, an Apple Macintosh computer, or a UNIX-based workstation. A representative hardware environment is illustrated in FIG. 1, which reveals that the typical workstation hardware configuration according to the preferred embodiment has a central processing unit 110 such as a microprocessor and some other buses 11 through a system 11 2 Interlinked units. The workstation shown in Figure 1 includes random access memory (RAM) 114, read-only memory (ROM) 116, I / O adapters 11.8 connected to peripheral equipment, 4HICKMAN200036TW; AND1P282.TW 1 This paper size is applicable to China National Standard (CNS) A4 Specification (210 X 297 mm) (Please read the precautions on the back before filling this page)

H ϋ 1 n 0 am— emmmw 1§ IH ϋ 1 n 0 am— emmmw 1§ I

經濟部智慧財產局員工消費合作社印製 經濟部智慧財產局員工消費合作社印製 491972 A7 B7 五、發明說明(8 ) 如磁碟儲存單元1 2 0連接到匯流排11 2,一連接鍵盤 124、滑鼠126、擴音器128與麥克風132的一使用者介 面接合器122,並且/或者其他使用者介面裝置,如觸碰 式螢幕(touch screen)(未圖示)連接到匯流排 112、通訊接合器134將工作站連接到通訊網路上(如資 料處理網路)以及顯示器接合器136將匯流排112連接到 顯示器裝置138。該工作站主要常駐有一個作業系統,如 微軟視窗NT、視窗9 5作業系統(0S )、IBM OS/2作業 系統、麥金塔作業系統或UNIX作業系統。熟悉該技術者 將會了解到本發明也可以在其他平台或作業系統上執行。 一個較佳的·實施例是用JAVA、C與C + +語言所寫 成,並且利用物件導向程式設計方法論。物件導向程式設 計(OOP)已漸增地被用來發展複雜的應用程式。當物 件導向程式設計變成軟體設計與發展的主流,多樣的軟體 解決方案需要適應之以利用物件導向程式設計的好處。·存 在著物件導向程式設計可適用到電子通信報系統的通信報 介面的需要,以致於可提供一組通信報介面的物件導向程 式設計類別(class)與物件(object)。 物件導向程式設計是用物件來發展電腦軟體的程序, 包括分析問題、設計系統與建構程式的步驟。物件是一軟 體程式包,其包括資料與相關結構及步驟之集合的軟體程 式包。既然物件包括資料與相關結構及步驟之集合,它可 被視爲不需要額外的架構、步驟或資料來執行其特定工作 的一個自足元件(self-sufficient component)。因 4HICKMAN200036TW; AND1P282.TW 8 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) -----------mu- ·丨丨—丨丨訂------1— (請先閲讀背面之注意事項再填寫本頁) 491972 A7 ___ B7 經濟部智慧財產局員工消費合作社印製 五、發明說明(?) 此’物件導向程式設計將一電腦程式視爲大半自主的元件 集合,稱爲物件,其各個負責一特定工作。這種包裝資 料、結構與步驟到一元件或模組中的槪念叫做囊包。 一般來說’物件導向程式設計元件是可重複使用軟體 模組,其代表符合物件模型的介面,且其經由物件整合架 構在運轉時間被存取。物件整合架構是允許在不同程序空 間的軟體模組利用彼此能力與函數的一組架構機制。通常 是藉由假設一共通元件物件模型並且在此共通元件物件模 型的架構上建構此架構來完成。在此値得區分一下物件與 物件類別(object class )。一物件是一物件類別的單 一例子,通常被稱爲一類別。一物件類別可被視爲許多物 件賴以形成的藍圖。· 物件導向程式設計允許程式設計師建立一物件,其爲 另一物件的一部份。舉例來說,代表活塞引擎的物件據稱 與代表活塞的物件有組成上的關係。事實上,一活塞引擎 包含一活塞、閥門與許多其它的元件;一活塞是一活塞引 擎的一元件的這個事實可在物件導向程式設計在邏輯上與 語義上以兩個物件表達。 物件導向程式設計也允許產生一物件其仰賴自另一物 件。假如有兩個物件,一個代表活塞引擎而另一個代表由 陶瓷做成的活塞引擎,那麼這兩個物件的關係不是組成上 的關係。一個陶瓷活塞引擎不能做成活塞引擎,它只是比 活塞引擎多一限制;它的活塞由陶瓷做成。在這個情形 中,代表陶瓷活塞引擎的物件稱爲衍生物件,並且它繼承 4HICKMAN200036TW; AND1P282.TW c (請先閱讀背面之注意事項再填寫本頁) ρί裝 訂---------Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs, printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs, printed by 491972 A7 B7 V. Invention Description (8) If the magnetic disk storage unit 1 2 0 is connected to the busbar 11 2, a keyboard 124, A user interface adapter 122 of the mouse 126, the loudspeaker 128 and the microphone 132, and / or other user interface devices, such as a touch screen (not shown) connected to the bus 112, communication The adapter 134 connects the workstation to a communication network (such as a data processing network) and the display adapter 136 connects the bus 112 to the display device 138. The workstation is mainly resident with an operating system, such as Microsoft Windows NT, Windows 95 Operating System (OS), IBM OS / 2 operating system, Macintosh operating system or UNIX operating system. Those skilled in the art will appreciate that the present invention can also be implemented on other platforms or operating systems. A preferred embodiment is written in JAVA, C, and C ++ languages, and uses an object-oriented programming methodology. Object-oriented programming (OOP) has been increasingly used to develop complex applications. When object-oriented programming becomes the mainstream of software design and development, a variety of software solutions need to be adapted to take advantage of the benefits of object-oriented programming. There exists the need for object-oriented programming that can be applied to the communication interface of the electronic communication system, so that a set of object-oriented programming classes and objects can be provided for the communication interface. Object-oriented programming is the process of developing computer software using objects, including the steps of analyzing problems, designing systems, and building programs. An object is a software package that includes a software package that contains a collection of data and related structures and steps. Since an object includes a collection of data and related structures and steps, it can be viewed as a self-sufficient component that does not require additional architecture, steps, or data to perform its specific tasks. Because 4HICKMAN200036TW; AND1P282.TW 8 This paper size is applicable to China National Standard (CNS) A4 specification (210 X 297 mm) ----------- mu- · 丨 丨 — 丨 丨 Order ---- --1— (Please read the notes on the back before filling this page) 491972 A7 ___ B7 Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs V. Invention Description (?) This' object-oriented program design treats a computer program as Mostly autonomous collections of components, called objects, each of which is responsible for a specific task. This idea of packaging information, structure, and steps into a component or module is called a bag. Generally, the object-oriented programming components are reusable software modules, which represent interfaces that conform to the object model, and which are accessed at runtime through the object integration framework. Object integration architecture is a set of architectural mechanisms that allow software modules in different program spaces to utilize each other's capabilities and functions. This is usually done by assuming a common component object model and constructing the architecture on the framework of this common component object model. Here we have to distinguish between objects and object classes. An object is a single instance of an object class and is often called a class. An object category can be viewed as a blueprint for many objects. Object-oriented programming allows programmers to create an object that is part of another object. For example, the object representing a piston engine is said to have a compositional relationship with the object representing a piston. In fact, a piston engine contains a piston, a valve, and many other components; the fact that a piston is a component of a piston engine can be expressed logically and semantically as two objects in object-oriented programming. Object-oriented programming also allows the creation of one object that depends on another. If there are two objects, one represents a piston engine and the other represents a piston engine made of ceramic, then the relationship between the two objects is not a compositional relationship. A ceramic piston engine cannot be made into a piston engine, it just has one more limitation than a piston engine; its piston is made of ceramic. In this case, the object representing the ceramic piston engine is called a derivative part, and it inherits 4HICKMAN200036TW; AND1P282.TW c (Please read the precautions on the back before filling this page) ρί Binding ---------

本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) 491972 A7 B7 五、發明說明(彳0 ) 代表活塞引擎之物件的各方面並且進一步增加限制與細 節。代表陶瓷活塞引擎的物件仰賴自代表活塞引擎的物 件。這些物件間的關係稱爲繼承。 當表示陶瓷活塞引擎的物件或類別繼承代表活塞引擎 物件的各方面,它繼承了定義在活塞類別標準活塞的熱特 性。然而,陶瓷活塞引擎物件置換這些陶瓷特定的熱特 性,這些熱特性通常與金屬活賽的熱特性不同。它略過原 始功能並且使用與陶瓷活塞相關的新功能。不同的活塞引 擎有不同的特性,但也具有與其相關的以下相同功能(例 如此引擎中有多少活塞、點火順序、潤滑等等)。爲了存 取任何活塞引擎物件中的各個這些物件,程式設計師可以 用相同名字呼叫相同功能,但是每種活塞引擎在相同名字 背後可具有不同的/置換的功能實施。在相同名字背後隱 藏不同功能實施的能力叫做多型態(polymorphism), 而且其大大地簡化物件間的通訊。 靠著組成關係、囊包、繼承與多型態的槪念,物件可 呈現真實世界中的任何事。事實上,對真實的邏輯認知是 唯一限制決定在物件導向軟體中可變成物件的事件種類。 一些典型的種類如下: ♦物件可表示實體物件,例如交通流量模擬中的汽 車、電路設計中的電子元件、經濟模型中的國家 或是空中交通控制系統中的飛行器。 ♦物件可表示電腦使用者環境中的元素,例如視 窗、表單或圖樣物件。 4HICKMAN200036TW; AND1P282.TW 1〇 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) -----------裝— <請先閱讀背面之注意事項再填寫本頁) 訂: 經濟部智慧財產局員工消費合作社印製 491972 A7 B7 五、發明說明(彳1 ) •物件可表示存貨,例如人員檔案或城市的經緯度 表單。 請 先 閱 讀 背 面 之 注 意 事 項』 *物件可表示使用者定義資料形式,例如時間、角 度與複數,或平面上的點。 由於OOP利用物件代表邏輯上可分離事物的強大能 力,因此能夠讓軟體開發人員設計及實行代表實物 (reality)層面模型的電腦程式,不論實物是具體實體、 流程、系統或事物的組合皆可。而且因爲物件可以代表一 切,所以軟體開發人員也可以建立未來在較大的軟體專案 中當作元件的物件。 訂 如果90%的新OOP軟體程式都是由已驗證之既有的 元件所組成,而且這些元件係由先前存在且可重複使用的 物件所構成,那麼只剩下10%的新軟體專案必須從頭撰 寫及測試。因爲90%是取自經過廣泛測試,可以重複使 用的物件庫存,所以會產生錯誤的可能區域只剩下此程式 的10%。因此,OOP可以讓軟體開發人員利用已經建構 好的其他物件建立物件。 此一過程非常類似利用元件(a s s e m b 1 i e s)與子元件 (subassmblies)建立一部複雜的機器。而OOP技術則使 經濟部智慧財產局員工消費合作社印製 軟體工程變得更像是硬體工程,開發人員可以利用物件型 態的各種現有元件建構軟體。這一切都有助於提升軟體品 質及加快開發速度。_ 各種程式設計語言都已經開始完全支援物件導向程式 設計(〇〇卩)原理,例如囊封(61:1〇&98111&16)、繼承,多 4HICKMAN200036TW; AND1P282.TW 11 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) 491972 A7 B7 五、發明說明(u ) 型態(poly morphism)及組成關係。C + +語言的出現使 數種商用軟體開發人員得以擁抱物件導向程式設計。 C + +是一種OOP語言,提供一快速、機器可執行的程式 碼。而且,C + +適合商業應用程式與系統程式設計專 案。如今已經成爲數種OOP程式設計師最愛的選擇,不 過市面上還是有數種其他的OOP語言,例如Smalltalk、 Common Lisp Object System (CLOS)及 Eiffel 〇 此外,更多傳統授歡迎的電腦程式設計語言,例如 Pasca卜也都加入了 OOP的能力。 物件分類的優點可以彙整如下: • 物件及其對應的類別會將複雜的程式設計問題細分 爲數種較小、較簡單的問題。 • 囊封(encapsulation)強制精簡資料,並將資料整 理成數種獨立的小物件,各小物件之間可以互相通 訊。囊封可以保護物件中的資料,防止意外受損, 但是又能藉由呼叫物件的組成功能與結構讓其他物 件與資料互動。 • 子類別(s u b c 1 a s s i η g)與繼承(i n h e r i t a n c e)使得透 過系統中可用的標準分類衍生新型物件以擴充及修 改物件成爲可能。因此要建立新能力不必從頭開 • 多型態(polymorphism)與多重繼承(multiple i n h e r i t a 11 c e )可以讓不同的程式設計師混合及匹 配許多不同類別的特性,並建立可在預期的方式下 4HICKMAN200036TW; AND1P282.TW 12 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) (請先閲讀背面之注意事項再填寫本頁) 0 emmm 1· n ϋ ί β n —^i n flu ϋ ϋ - 言 經濟部智慧財產局員工消費合作社印製This paper size applies to the Chinese National Standard (CNS) A4 (210 X 297 mm) 491972 A7 B7 V. Description of the invention (彳 0) Represents all aspects of the object of the piston engine and further increases restrictions and details. The article representing the ceramic piston engine relies on the article representing the piston engine. The relationship between these objects is called inheritance. When the object or category representing a ceramic piston engine inherits all aspects representing the object of a piston engine, it inherits the thermal characteristics of a standard piston defined in the piston category. However, ceramic piston engine objects replace the specific thermal characteristics of these ceramics, which are often different from the thermal characteristics of metal racing. It skips the original functions and uses new functions related to ceramic pistons. Different piston engines have different characteristics, but also have the following related functions (such as how many pistons are in the engine, ignition sequence, lubrication, etc.). To access each of these piston engine objects, the programmer can call the same function with the same name, but each piston engine can have different / replaced function implementations behind the same name. The ability to hide the implementation of different functions behind the same name is called polymorphism, and it greatly simplifies communication between objects. With composition, encapsulation, inheritance, and polymorphism, objects can represent anything in the real world. In fact, real logic is the only limitation that determines the kind of events that can become objects in object-oriented software. Some typical types are as follows: ♦ Objects can represent physical objects, such as cars in traffic flow simulation, electronic components in circuit design, countries in economic models, or aircraft in air traffic control systems. ♦ Objects can represent elements in the computer user's environment, such as windows, forms, or graphic objects. 4HICKMAN200036TW; AND1P282.TW 1〇 This paper size is applicable to China National Standard (CNS) A4 (210 X 297 mm) ----------- installation-< Please read the notes on the back before filling This page) Order: Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 491972 A7 B7 V. Description of Invention (彳 1) • Objects can represent inventory, such as personnel files or city latitude and longitude forms. Please read the notes on the back first "* Objects can represent user-defined data forms, such as time, angle and complex numbers, or points on a plane. Because OOP uses the power of objects to represent logically separable things, it enables software developers to design and implement computer programs that represent models at the physical level, regardless of whether the physical object is a specific entity, process, system, or combination of things. And because objects can represent everything, software developers can also create objects that will be used as components in larger software projects in the future. If 90% of the new OOP software programs are composed of verified and existing components, and these components are made up of pre-existing and reusable objects, then only 10% of the new software project must be started from scratch Write and test. Because 90% is taken from the extensively tested and reusable inventory of objects, only 10% of this program is likely to produce errors. Therefore, OOP allows software developers to create objects from other objects that have already been constructed. This process is very similar to building a complex machine using components (as s s e m b 1 i e s) and subassemblies. And OOP technology makes the software engineering printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economics more like hardware engineering. Developers can use various existing components of object types to build software. All this helps to improve software quality and speed up development. _ Various programming languages have begun to fully support the principles of object-oriented programming (〇〇 卩), such as encapsulation (61: 1〇 & 98111 & 16), inheritance, and more 4HICKMAN200036TW; AND1P282.TW 11 This paper standard applies to China National Standard (CNS) A4 specification (210 X 297 mm) 491972 A7 B7 V. Description of the invention (u) Polymorphism and composition relationship. The advent of the C ++ language has enabled several commercial software developers to embrace object-oriented programming. C ++ is an OOP language that provides a fast, machine-executable code. Moreover, C ++ is suitable for business applications and system programming projects. Today it has become the favorite choice of several OOP programmers, but there are still several other OOP languages on the market, such as Smalltalk, Common Lisp Object System (CLOS), and Eiffel. In addition, more traditionally popular computer programming languages, For example, Pasca Bu also added OOP capabilities. The advantages of object classification can be summarized as follows: • Objects and their corresponding categories break down complex programming problems into several smaller, simpler problems. • Encapsulation enforces data reduction and organizes the data into several independent small objects, which can communicate with each other. Encapsulation can protect the data in the object from accidental damage, but it can also allow other objects to interact with the data by calling the constituent functions and structures of the object. • Subcategories (s u b c 1 a s s i η g) and inheritance (in n h e r i t a n c e) make it possible to extend and modify objects by deriving new types of objects through standard classifications available in the system. Therefore, it is not necessary to start from scratch in order to build new capabilities. Polymorphism and multiple inheritance (multiple inherita 11 ce) can allow different programmers to mix and match many different types of features, and to build in the expected way 4HICKMAN200036TW; AND1P282.TW 12 This paper size is in accordance with Chinese National Standard (CNS) A4 (210 X 297 mm) (Please read the precautions on the back before filling this page) 0 emmm 1 · n ί β n — ^ in flu ϋ ϋ-Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs

'發明說明(彳3) 配合相關物件使用的專用物件。 • 類別階層(class hierarchies)與包含階層 (containment hierarchies)提供一彈性機制,建 立真實世界物件與各物件間關係的模型。 • 可重複使用的類別程式庫(c 1 a s s 1 i b r a r i e s)在許多 情況下都非常實用,但是還是有一些限制。例如: • 複雜性。在一複雜系統中,相關類別的類別階層可 能具有數十或數百個類別,而變的極度令人困惑。 • 控制的流程。在類別程式庫的幫忙下寫成的程式仍 要負責控制流程(也就是必須控制由特定程式庫建 立之所有物件之間的互動)。程式設計師必須決定要 在什麼時候爲了哪些種物件呼叫哪些功能。 • 加倍努力。雖然類別程式庫可以讓程式設計師使用 及再使用數種程式碼的小片段,但是每一位程式設 計師都以不同的方法將這些小片段放在一起。兩位 不同的程式設計師可以使用同一組類別程式庫寫出 具有完全不同的內部結構(也就是設計),但是用途 完全相同的兩套程式,其內部結構差異就在於設計 師撰寫程式的過程中所作的數百種小決定。不可避 免地,相似的程式碼片段結果會以稍微不同的方法 執行相同的工作,但一起發揮功能時不如其應有的 表現。 類別程式庫很有彈性。程式變得愈複雜,就有愈多 的程式設計師被迫要一再地針對基本的問題重新創造基本 4HICKMAN200036TW; AND1P282.TW 13 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) (請先閱讀背面之注意事項再填寫本頁) · ϋ 1 ϋ I n n*^OJI ϋ I ϋ I I n ·'Explanation of the Invention (彳 3) Dedicated articles for use with related articles. • Class hierarchies and containment hierarchies provide a flexible mechanism to model the relationship between real-world objects and each object. • The reusable category library (c 1 a s s 1 i b r a r i e s) is very useful in many cases, but there are some limitations. For example: • Complexity. In a complex system, the category hierarchy of related categories may have tens or hundreds of categories, which can become extremely confusing. • Process of control. Programs written with the help of class libraries are still responsible for controlling the flow (that is, they must control the interaction between all objects created by a particular library). The programmer must decide when and what functions to call for which objects. • double the effort. Although category libraries allow programmers to use and reuse several small pieces of code, each programmer puts these pieces together in different ways. Two different programmers can use the same set of class libraries to write completely different internal structures (that is, designs), but the two programs with the same purpose have the same internal structure difference in the process of the designer writing the program Hundreds of small decisions made. Inevitably, similar code snippets will result in the same work in slightly different ways, but not as well as they should when they function together. The category library is flexible. The more complicated the program becomes, the more programmers are forced to re-create the basics again and again in response to basic problems. ) (Please read the notes on the back before filling this page) · ϋ 1 ϋ I nn * ^ OJI ϋ I ϋ II n ·

經濟部智慧財產局員工消費合作社印製 491972 A7 B7 五、發明說明(Η) 的解決方案。一種較新的類別程式庫的延伸槪念是使用類 別程式庫的一架構(framework)。此架構較爲複雜’由 大量合作的類別集合組成,這些合作的類別擷取小規模樣 板與主要機制,其在一特定應用領域中實行共同需求與設 計。原先開發的目的是讓應用程式設計師可以不必操心顯 示功能表、視窗、對話方塊及個人電腦標準使用者介面元 件等之瑣事。 架構也代表程式設計師對其與他人所寫的程式碼間互 動之想法的改變。以往的程序式程式設計,設計師要藉由 作業系統提供的呼叫程式庫以執行特定的工作,但是基本 上會將整個程式碼從頭到尾執行一次,設計師只能負責控 制流程。對於列印出薪資支票、計算一數學表格或用以只 有單向執行的程式解決其他問題時,這樣做是恰當的。 圖形使用者介面的發展徹底改變了這種程序式程式設 計安排。這些介面使得使用者能夠驅動程式,並且決定應 該執行特定動作的時機,而不是將邏輯程式化。現在大部 分的個人電腦軟體都是藉由一事件迴圈做到這一點,事件 迴圏監測滑鼠、鍵盤及其他外部事件來源並且根據使用者 執行的動作呼叫程式設計師程式碼中適當的部分。程式設 計師不必再決定事件發生的順序。而程式是分成數種分離 的小片段,在不可預期的時間以不可預期的順序呼叫。開 發人員將控制權轉移給使用者之後,寫出來的是更容易使 用的程式。但是,開發人員寫出來的個別程式片段還是要 呼叫作業系統提供的程式庫才能完成某些工作,而且設計 4HICKMAN200036TW; AND1P282.TW μ Ρ氏張尺度適用中國國家標準(CNS)A4規格(210 X 297公Ϊ) 画 (請先閱讀背面之注意事項再填寫本頁) — — — — — — — ^«1 — — — — — — —Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 491972 A7 B7 V. The solution of invention description (Η). An extension of the newer category libraries is the use of a framework for category libraries. This structure is more complex ', which consists of a large number of cooperating category sets. These cooperating categories capture small-scale models and main mechanisms that implement common needs and designs in a specific application area. It was originally developed to allow application designers to avoid the trivialities of displaying menus, windows, dialog boxes, and standard PC user interface elements. Architecture also represents a change in a programmer's mind about interactions with code written by others. In the past, in the case of procedural programming, designers had to call libraries provided by the operating system to perform specific tasks, but basically the entire code would be executed once from beginning to end, and the designer could only be responsible for controlling the process. This is appropriate when printing paychecks, calculating a math form, or using a program that performs only one way to solve other problems. The development of graphical user interfaces has revolutionized this procedural programming arrangement. These interfaces enable users to drive programs and decide when specific actions should be performed instead of programming logic. Most personal computer software now does this through an event loop, which monitors the mouse, keyboard, and other external event sources and calls the appropriate part of the programmer's code based on the actions performed by the user . The programmer does not have to decide the sequence of events. The program is divided into several small pieces, which are called in an unexpected order at an unexpected time. After developers transfer control to users, they write programs that are easier to use. However, the individual program snippets written by the developers still need to call the libraries provided by the operating system to complete certain tasks, and the design is 4HICKMAN200036TW; AND1P282.TW μ P's scale is applicable to China National Standard (CNS) A4 specifications (210 X 297 (Ϊ 公) Painting (Please read the notes on the back before filling out this page) — — — — — — — ^ «1 — — — — — —

經濟部智慧財產局員工消費合作社印製 491972 A7 B7 經濟部智慧財產局員工消費合作社印製 五、發明說明(彳s) 師還是要在事件迴圈呼叫每一片段程式後,決定程式內的 控制流程。應用程式碼還是在系統的最上層(sit on top of the system ) ° 即使是事件迴圈程式,程式設計師也需要撰寫數種不 必爲每個應用程式分開撰寫的程式碼。應用程式架構的槪 念更進一步將事件迴圏槪念向前推進。使用應用程式架構 時,程式設計師不必再處理建構基本功能表、視窗及對話 方塊,然後將這些組合在一起的細節’程式設計師可以直 接開始處理應用程式碼與在適當位置的基本的使用者介面 元件。接著,再藉由將架構的一般功能換成要設計的應用 程式的特定功能從那裡開始建構。 應用程式架構可以減少程式設計師必須從頭開始撰寫 的程式碼總數。但是因爲架構實際上是顯示視窗、支援複 製與貼上等的一般性應用程式,因此程式設計師也可以捨 棄比此事件迴圏程式所允許之更多的控制權。架構程式碼 幾乎會注意所有的事件處理與控制流程,唯有在架構需要 時才會呼叫程式設計師的程式碼(例如建立或處理一專屬 的資料結構)。 撰寫架構程式的程式設計師,不只能將控制權轉移給 使用者(事件迴圏程式也是一樣),也可以將程式裡的詳 細控制流程轉移給架構。相對於分離式程式,這種方法具 有定製的程式碼以及針對類似問題一再重複建立,能產生 以有趣的方式一同工作的更複雜系統。 因此,如上所述,架構基本上是針對一已知問題領 4HICKMAN200036TW; AND1P282.TW 15 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) (請先閱讀背面之注意事項再填寫本頁) 裝Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs 491972 A7 B7 Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs. 5. Description of Invention (彳 s) The teacher must decide on the control within the program after calling each segment of the program in the event loop. Process. Application code is still on the top of the system ° Even for event loop programs, programmers need to write several types of code that do not have to be written separately for each application. The idea of an application architecture takes things one step further. With application architecture, programmers no longer have to deal with building basic menus, windows, and dialog boxes, and then combine these details together. 'Programmers can start working directly with application code and basic users in place. Interface components. Then, build from there by replacing the general functionality of the architecture with the specific functionality of the application you are designing. Application architecture reduces the total amount of code that programmers must write from scratch. But because the framework is actually a general application that displays windows, supports copying and pasting, etc., programmers can also give up more control than this event callback program allows. Architecture code Pays close attention to almost all event processing and control processes, and only calls the programmer's code when the architecture requires it (for example, to create or process a proprietary data structure). A programmer writing a framework program can not only transfer control to the user (the same is true for event callback programs), but can also transfer the detailed control flow in the program to the framework. In contrast to discrete programs, this approach has custom code and repeated iterations for similar problems, resulting in more complex systems that work together in interesting ways. Therefore, as mentioned above, the architecture is basically directed at a known issue. 4HICKMAN200036TW; AND1P282.TW 15 This paper size applies to China National Standard (CNS) A4 (210 X 297 mm) (Please read the precautions on the back before (Fill in this page)

n ϋ n —ϋ β ϋ I ^^1 n ϋ 1 I In ϋ n —ϋ β ϋ I ^^ 1 n ϋ 1 I I

經濟部智慧財產局員工消費合作社印製 491972 A7 B7_ 五、發明說明(Μ ) 域,構成一可再使用的設計解決方案的一合作類別集合。 其通常包含提供預設行爲的物件(例如功能表與視窗), 程式設計師使用這些物件時,要繼承其部分預設行爲,再 修訂其他一些行爲,讓架構在適當的時機呼叫應用程式。 架構與類別程式庫之間有三大差異: • 行爲與通訊協定的差異。類別程式庫基本上是在程 式需要個別行爲時呼叫的一些行爲集合。另一方 面,架構不只提供行爲,還提供控制行爲組合方式 的通訊協定或一組規則,包括規範程式設計師應提 供的內容,以及架構提供內容的規則。 • 呼叫與置換的差異。使用類別程式庫時,設計師撰 寫的程式會舉例說明物件及呼叫其成員功能。使用 架構也可以用相同的方法建立及呼叫物件(也就是 將架構當成類別程式庫),但是如果要充份利用架構 可再使用的設計,設計師撰寫程式碼,此程式碼置 換架構並且由架構呼叫。架構會管理其物件之間的 控制流程。撰寫程式牽涉到將分給架構呼叫的各個 軟體片段,而不是指定不同的程式片段應該如何合 作。 • 實行與設計的差異。有了類別程式庫,程式設計師 只能再利用實施,但是有了架構,可以再使用設 計。架構包含了一系列的相關程式或軟體片段工作 的方法。它代表了能夠適合於已知領域內數種特定 4HICKMAN200036TW; AND1P282.TW 16 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) ------------裝--------訂· (請先閱讀背面之注意事項再填寫本頁) #_ 491972 Α7 Β7 五、發明說明(η) ------------裝--- (請先閱讀背面之注意事項再填寫本頁) 問題的一種一般性設計解決方案。例如,單一架構 可以包含使用者介面運作的方式,即使但是利用同 一個架構建立的兩個不同使用者介面解決的可能是 兩個截然不同的介面問題。 經濟部智慧財產局員工消費合作社印製 因此,透過開發各種問題與程式設計工作解決方案所 需的架構,就可以大幅減少軟體設計與開發的努力。本發 明一較佳的具體實施例利用超文字標記語言(Hyper Text Markup Language,HTML),配合一般用途安全 通訊協定,以實施文件在網際網路上供在用戶端與 N e w c 〇之間的傳輸媒體。超文件傳輸協定(H y p e r T e X t Transport Protocol,HTTP)或其他通訊協定可以輕易 取代HTML,不會有不適當的情形。超文字標記語言是 一簡單的資料格式,用以產生可從一平台一致另一平台的 超文字文件。HTML是具有一般語意的標準通用標記語 言(SGML)文件,這些語意適合表達各種範圍的資訊。全 球資訊網的全球資訊行動自1 990年起就開始使用HTML 至今。HTML 是 ISO 標準 8 8 79、1 9 8 6 Information Processing Text 以及 Office Systems 及 Standard Generalized Markup Language (SGML)的應用。 時至今日,網路開發工具一直受限於動態網路應用程 式的能力,動態網路應用程式從客戶端延伸到伺服器,並 與現有電算資源(computing sources)交互運作。直到 最近,HTML還是開發以網路爲基礎的解決方案的主要 4HICKMAN200036TW; AND1P282.TW \η 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐)Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 491972 A7 B7_ V. The invention description (M) domain constitutes a set of cooperative categories for a reusable design solution. It usually contains objects that provide default behaviors (such as menus and windows). When programmers use these objects, they must inherit some of their default behaviors, and then modify other behaviors to let the framework call the application at the appropriate time. There are three major differences between architecture and category libraries: • Differences in behavior and protocols. A category library is basically a collection of behaviors that are called when the program requires individual behaviors. On the other hand, the architecture not only provides behaviors, but also provides a protocol or a set of rules that control how the behaviors are combined, including what the programmer should provide, and rules that the architecture provides. • The difference between calling and replacing. When using a class library, the designer writes programs that illustrate objects and call their member functions. You can also use the framework to create and call objects in the same way (that is, use the framework as a class library), but if you want to make full use of the architecture's reusable design, the designer writes the code. This code replaces the framework and is replaced by the framework. call. The framework manages the flow of control between its objects. Writing a program involves snippets of software that will be assigned to framework calls, rather than specifying how the different program sections should work together. • Differences between implementation and design. With category libraries, programmers can only reuse implementations, but with frameworks, they can reuse designs. The framework contains a series of related programs or software fragments working methods. It represents the ability to fit several specific 4HICKMAN200036TW; AND1P282.TW 16 in the known field. This paper size is applicable to China National Standard (CNS) A4 (210 X 297 mm) ------------ Equipment -------- Order · (Please read the precautions on the back before filling this page) #_ 491972 Α7 Β7 V. Description of the Invention (η) ------------ Equipment- -(Please read the notes on the back before filling out this page) A general design solution to the problem. For example, a single framework can include the way the user interface works, even though two different user interfaces created using the same framework may solve two distinct interface problems. Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs. Therefore, the effort required for software design and development can be drastically reduced by developing the architecture required for various problems and programming solutions. A preferred embodiment of the present invention utilizes Hyper Text Markup Language (HTML) and cooperates with a general-purpose security communication protocol to implement a document on the Internet for transmission media between a client and Newc 0. . Hyper File Transfer Protocol (HTTP) or other communication protocols can easily replace HTML without inappropriate situations. Hypertext Markup Language is a simple data format used to generate hypertext documents that can be aligned from one platform to another. HTML is a standard general markup language (SGML) document with general semantics, which is suitable for expressing a wide range of information. The World Wide Web's Global Information Initiative has been using HTML since 1990. HTML is an application of the ISO standards 8 8 79, 1 9 8 6 Information Processing Text, and Office Systems and Standard Generalized Markup Language (SGML). Today, web development tools have been limited by the capabilities of dynamic web applications. Dynamic web applications extend from the client to the server and interact with existing computing sources. Until recently, HTML was the main focus for developing web-based solutions. 4HICKMAN200036TW; AND1P282.TW \ η This paper size is in accordance with China National Standard (CNS) A4 (210 X 297 mm)

經濟部智慧財產局員工消費合作社印製 、發明說明(彳8 ) 技術。然而,目前已經證實HTML在下列範圍表現並不 佳: • 效能不佳; • 使用者介面功能有限; • 只能產生靜態的網頁; • 缺少現有應用程式與資料的交互運作能力;以及 • 無法按比例縮放。 昇陽微系統(Sun Microsystem)的Java語言利用下列 特點解決了數種用戶端的問題: • 提高用戶端的效能; • 可以讓使用者建立動態的即時網路應用程式;以及 • 提供建立廣泛的使用者介面元件的能力。 開發人員利用Java可以建立強韌的使用者介面(υι) 元件。可產生定製的「專用界面工具集」(例如即時股票 行情記錄器、動畫圖示等)並可改善用戶端效能。Java 與HTML不同,它支援用戶端驗證的槪念、將適當的處 理卸載(offload)到用戶端以提升效能。可以建立動態即 時網頁。也可以利用上述定製的UI元件建立動態網頁。 昇陽的Java語言已經脫穎而出,成爲業界普遍認同 的「Internet程式設計」語言。昇陽將java定義爲「簡 單、物件導向、分散式、解譯式(i n t e 1· p r e t e d )、堅韋刃 (robust )、女全、結構中性(a r c h i t e c t u r e - 4HICKMAN200036TW; AND1P282.TW i 〇 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) (請先閱讀背面之注意事項再填寫本頁)Printed by the Intellectual Property Bureau of the Ministry of Economic Affairs, Consumer Cooperatives, Invention Description (彳 8) technology. However, it has been proven that HTML performs poorly in the following areas: • Poor performance; • Limited user interface functionality; • Can only generate static web pages; • Lack of the ability to interact with existing applications and data; and Scaling. Sun Microsystem's Java language uses the following features to solve several client issues: • Improve client performance; • Allow users to create dynamic, real-time web applications; and • Provide a wide range of users Interface components. Developers can use Java to build robust user interface (υι) components. Can generate customized "dedicated interface toolsets" (such as real-time stock ticker, animated icons, etc.) and improve client performance. Java is different from HTML in that it supports the concept of client authentication and offloads appropriate processing to the client to improve performance. You can create dynamic instant web pages. You can also use the customized UI components to create dynamic web pages. Sun's Java language has emerged as the “Internet programming” language generally recognized by the industry. Sun Yang defines java as "simple, object-oriented, decentralized, interpreted (inte 1 · preted), robust, robust, structured (architecture-4HICKMAN200036TW; AND1P282.TW i 〇 this paper Dimensions are applicable to China National Standard (CNS) A4 (210 X 297 mm) (Please read the precautions on the back before filling this page)

491972 A7 B7 五、發明說明(β) neutral)、可攜式、高效能、多緒(multithreaded)、 動態、符合行話(buzzword compliant)、一般用途 的程式設計語言。;lava以無平台限制的;iava小程式型態 支援Internet的程式設計」。Java小程式是符合昇陽的 Java Application Programming Interface (API)的 一些專用小型應用程式,能夠讓開發人員在網路文件中加 入「互動內容(interactive content)」(例如簡單的 動畫、網頁裝飾、基本遊戲等)。小程式藉由將程式碼從 伺服器複製到用戶端上,在Java相容的瀏覽器(例如 Netscape Navigator)裡執行。以程式語言的角度來 看,Java的核心特徵組是以C + +爲基礎。昇陽的Java文 件指出,Java基本上是「C + +加上從Objective C的延 伸以提供更動態的方法解析」。 功能與Java類似的另一種技術是由Microsoft與 ActiveX技術所提供,可以讓開發人員與網路設計者必 要的手段以建立Internet與個人電腦的動態內容。 ActiveX包含開發動畫、3D虛擬實境、視訊及其他多媒 體內容的一些工具。這些工具使用Internet標準,可以 在多種平台上工作,而且已經得到1〇〇多家公司的支持。 群組的建構區塊稱爲ActiveX Control,是能夠讓開發 人員將部分軟體插入超文字標記語言(HTML)網頁中的 小型快速元件。ActiveX Control可以配合數種程式設 計語言,包括 Microsoft Visual C + +、Borland Delphi®、Microsoft® Visual Basic 程式設計系統, 4HICKMAN200036TW; AND1P282.TW 19 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) (請先閱讀背面之注意事項再填寫本頁)491972 A7 B7 V. Description of Invention (β) neutral), portable, high-performance, multithreaded, dynamic, buzzword compliant, general-purpose programming language. ; Lava has no platform restrictions; iava applet type supports Internet programming ". Java applets are specialized small applications that conform to Sun's Java Application Programming Interface (API). They allow developers to add "interactive content" (such as simple animations, web page decoration, basic Games, etc.). The applet is executed in a Java compatible browser (such as Netscape Navigator) by copying the code from the server to the client. From a programming language perspective, Java's core feature set is based on C ++. Sun's Java documentation states that Java is basically "C ++ plus extensions from Objective C to provide a more dynamic method of parsing." Another technology with functions similar to Java is provided by Microsoft and ActiveX technology, which allows developers and web designers the necessary means to create dynamic content on the Internet and personal computers. ActiveX includes tools for developing animation, 3D virtual reality, video, and other multimedia content. These tools use Internet standards, can work on multiple platforms, and have been supported by more than 1,000 companies. The building block of a group, called ActiveX Control, is a small, fast component that allows developers to insert some software into Hypertext Markup Language (HTML) web pages. ActiveX Control can cooperate with several programming languages, including Microsoft Visual C ++, Borland Delphi®, Microsoft® Visual Basic programming system, 4HICKMAN200036TW; AND1P282.TW 19 This paper standard is applicable to China National Standard (CNS) A4 specification (210 X 297 mm) (Please read the notes on the back before filling this page)

ϋ .I ϋ n ϋ ·1 ϋ «I H ϋ Iϋ .I ϋ n ϋ · 1 ϋ «I H ϋ I

經濟部智慧財產局員工消費合作社印製 491972 A7 ___ B7 五、發明說明(20 ) 以及未來的Microsoft的 Java開發工具,代名 ” Jakarta”。ActiveX 技術還包括 ActiveX Server Framework,可以讓開發人員建立伺服器應用程式。熟 悉本技術人士可以輕易看出,能夠使用A c t i v e X代替 Java實行本發明且不用不當的實驗即可實施本發明。 縱覽 架構基礎 架構槪觀 什麼是架構· 架構一不管該字是否適用於城市的空中輪廓線 (skyline)的工作或通訊系統一都是同時關於設計某些 事與製造、建造或建築某些事。一建築師字義上是指一 個”精通的建築者(master builder) ”來自希臘字archi (主要的或精通的)與tekton (建築者或木工)。然 而,在真正的希臘方式中,沒有一個健全的架構基礎就去 建築某些事情是不可想像的。因此架構牽涉到理論,但不 僅僅是理論而已。相反地,架構同時也明顯是實際的,且 不僅僅是實際的。形式與結構的觀念存在於架構的背後。 到最後吾人一個人必須放棄試圖將設計從製造分離的心 態;它們是共存的一整體,而抽離一方而不顧另一方就是 傷害整體。 架構同時也是一個工程學養(discipline)。它產 4HICKMAN200036TW; AND1P282.TW 20 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) (請先閱讀背面之注意事項再填寫本頁) 裝 訂---------" 經濟部智慧財產局員工消費合作社印製 491972 A7 B7 五、發明說明(21) 生並且依靠一結構化的方式以分析並設計所要建造的東 西。如同所有現存的學養,架構不斷地成長與演變。工程 上的發現將其領域向前推進。某些工程與設計原理明顯地 顯示出它們在實踐上的成功,進而成爲追加工作的可重複 零件。繼續去掌握每一個零件的能力,與繼續去掌握各元 件間的交互關係,是架構的卓越特性。 因此架構是與從一組基本的元件已設計並建造一些東 西有關,也與元件間的交互關係有關。它也是一個原則, 藉此所有這些事情聚在一起一材料、空間與人員,使原 來不存在的成爲實際。 雖然建造的建築師不一定樂於其事,但架構槪念有時 候會影響其它的「建造」計劃。在過去2 0年中,舉例來 說資訊系統的開發者利用架構領域的觀念,不但描述了他 們的工作並且也執行它。 架構思考的使用隱含著此工作是關於產生某種可操縱 或至少可被影響的結構,同時也隱含著此工作可以結構化 或系統化的方式來組織及執行。此外,架構觀念的使用意 味著對其工作有重複性:架構能創造一個結構,然後當遇 到相似情況時,可以在將來再次使用該結構的元件。 一架構的範例不該輕易使用。其有一些需由。使用架 構的槪念意味著充分準備才去做-也就是說那領域在其工 作上已經十分成熟,以發現樣板並依照那些樣板組織未來 的工作。 最後,架構一定要被瞭解成一程序200,而不只是一 4HICKMAN200036TW; AND1P282.TW 21 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) (請先閱讀背面之注意事項再填寫本頁) 裝--------訂---------" 經濟部智慧財產局員工消費合作社印製 491972 •般係相 經濟部智慧財產局員工消費合作社印製 A7 五、發明說明(ϋ ) 件事。這個程序可使用第2圖在很高的水準作描述 •步驟1:分析2〇2。建築師必須從聆聽旅硏究客戶的需 要開始。建造物的功能是什麼?它的環境如何?預算 吏用所設的限制是什麼? #步驟2 :設計2 04。這是藍圖階段。建築師創造一個或 數個設計,來表示結構的佈置,如何使相異空間調與 在一起’每件事從不同角度看起來如何,要使用哪些 材料等等。 #步驟3 :模型與測試2〇6。不是每一個架構計劃都有這 個步驟,但在很多情形中,建築師要製作等比例模型 j成品原型,.讓客戶對最後的解決方案是什麼樣子有 淸楚的了解。一模型是測試階段的—種,讓每一個人 〔接近真貫生活設疋(near.real_Ufe)中測試其設 計。 •步驟4:建造2〇8。這是建築物的實際建構, 據藍圖與原型。 •步驟5 :操作與發展21θ。建築物當妖 俅田_ t木切田然是要有人居住與 丨艾用’而因此一重要的步驟是保§咨甘 5,1 ^ 疋保卩显其成品能有效的受 被使用。建築師本身可能不參與建築物的搏 L他必定參與將來的擴_發展。史都華布藍Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 491972 A7 ___ B7 V. Invention Description (20) and future Microsoft Java development tools, codenamed "Jakarta". ActiveX technology also includes the ActiveX Server Framework, which allows developers to build server applications. Those skilled in the art can easily see that the invention can be implemented by using Ac t i v e X instead of Java, and the invention can be implemented without undue experimentation. Overview Architecture Basics Architecture Overview What is Architecture · Architecture 1-Regardless of whether the word applies to a city's skyline work or communication system-it's all about designing something and manufacturing, building, or building something at the same time. An architect literally means a "master builder" from the Greek words archi (main or master) and tekton (builder or carpenter). However, in the true Greek way, it is unimaginable to build something without a sound architectural foundation. So architecture involves theory, but it's not just theory. On the contrary, the architecture is also obviously practical, and not just practical. The concept of form and structure lies behind the architecture. In the end, we must abandon the mentality of trying to separate the design from manufacturing; they are a coexisting whole, and taking one side away from the other is hurting the whole. Architecture is also a discipline. It produces 4HICKMAN200036TW; AND1P282.TW 20 This paper size is applicable to China National Standard (CNS) A4 (210 X 297 mm) (Please read the precautions on the back before filling this page) Binding --------- " Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 491972 A7 B7 V. Description of Invention (21) and rely on a structured way to analyze and design what is to be built. As with all existing education, the architecture is constantly growing and evolving. Engineering discoveries have moved their fields forward. Certain engineering and design principles clearly show their success in practice, which in turn becomes repeatable parts for additional work. Continue to master the capabilities of each part, and continue to master the interaction between the components, are the outstanding characteristics of the architecture. Therefore, architecture is related to the design and construction of a basic set of components, as well as the interaction between components. It is also a principle by which all these things come together into one material, space, and people, making what had not existed a reality. Although the architects of construction may not be happy, architectural concerns can sometimes affect other “build” plans. In the past 20 years, for example, developers of information systems have used concepts in the field of architecture to describe not only their work but also to implement it. The use of architectural thinking implies that the work is about producing a structure that can be manipulated or at least affected, and it also implies that the work can be organized and executed in a structured or systematic way. In addition, the use of an architectural concept means that its work is repetitive: an architecture creates a structure, and then when similar situations are encountered, the components of the structure can be reused in the future. An architecture paradigm should not be used lightly. There are some reasons for this. The idea of using an architecture means that you are fully prepared to do it-that is, the field is already mature in its work to discover boilerplates and organize future work in accordance with those boilerplates. Finally, the structure must be understood as a program 200, not just a 4HICKMAN200036TW; AND1P282.TW 21 This paper size applies to China National Standard (CNS) A4 (210 X 297 mm) (Please read the notes on the back before filling (This page) -------- Order --------- " Printed by the Consumers' Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 491972 5. Description of the invention (说明). This procedure can be described at a high level using Figure 2. • Step 1: Analyze 202. Architects must start by listening to the needs of their clients and their clients. What is the function of the building? How is its environment? What are the limits imposed by the budget? #Step 2: Design 2 04. This is the blueprint stage. The architect creates one or more designs to represent the layout of the structure, how to blend the different spaces together ', how does everything look from different angles, what materials to use, and so on. #Step 3: Model and test 206. Not every architecture plan has this step, but in many cases, the architect needs to make a scale model and a prototype of the finished product, so that the customer has a good understanding of what the final solution looks like. A model is a test phase—a kind that lets everyone [near.real_Ufe] test their design. • Step 4: Build 208. This is the actual construction of the building, according to the blueprint and prototype. • Step 5: Operation and Development 21θ. Buildings are demon 俅 田 _t 木 切 田 Ran is to be inhabited and used 丨 Ai ’so an important step is to ensure that the finished product can be used effectively. The architect himself may not participate in the development of the building. He must be involved in future expansion. Stewart Blue

Brand)的新書,,建築物如何學習? 〇w buildings learn?) ”随请分〜 )陳述考有效建築物應, 學習的事實··當人們長期 人將巧妙地或不很巧妙地試圖改造其建築物Brand) 's new book, How do buildings learn? 〇w buildings learn?) "Please share ~) State the facts of effective buildings, learn the facts ... When people are long, people will subtly or not subtly try to transform their buildings

4HICKMAN200036TW; AND1P282.TW 22 本紙張尺度適用中國國家標準(CNS)A4 g (21〇 X 297公m —丨丨丨! •丨I (請先閱讀背面之注意事項再填寫本頁) 491972 A7 B7 五、發明說明(2 3) 同時,當建築師設計一建築物,他們腦子裡具有對建 築物的元件的一主要槪念架構:水管、電機、下水道、樓 梯/電梯、主架構等等。一建築師的默示步驟是”根據我對 建築物中一般零件的認知,那些零件如何在此特定建築物 中相互配合?因爲該建築物的功能需要,那些零件需要特 別注意? 牛津英語字典的定義 從其用途與設計的觀點,一電腦或以電腦爲基礎系統 的槪念結構以及總體邏輯組織;此結構與組織的特殊履 約。 硬體或軟體的建造的方法或結構定義了 一系統或程式 是如何建構的’不同元件與零件如何交互作用,使用什麼 通訊協定與介面以在模組與元件之間通訊與合作,而模組 與元件組成本系統。七個成功架構的一般特性如下: _提出去除問題的界限; 經濟部智慧財產局員工消費合作社印製 ♦清楚指派責任以將解決方案分解到元件上; φ零件間所使用的介面、格式與通訊協定的定 義。這些應該足夠淸楚與強韌以允許元件之 非同步開發與不停的重新實施; 鲁適當的使用說明讓實施者照著做; 參一審計機制運作一特定介面,以驗證到元件 的特定輸入可以得到特定結果; # —延伸機構能夠對不停變化的需求與技術做 4HICKMAN200036TW;AND1P28^^ τ 本紙張尺度適用中國國家標準(CNS)A4規格(210 χ 297公釐)" - 491972 A7 B7 五、發明說明斗) 回應; *政策、實行與組織化的結構以便於架構的採 用。 本發明考慮到的幾種架構之可能類型討論如下。 開發架構結構(Development Architecture Framework,DAF) 300提供往一個人執行、開發與操 作環境302、304、306的思考領導與架構結構的通道。 有關那些架構詳細討論,請看標準架構摘要(如下)。第 3圖顯示三個架構結構的歸屬,更詳細說明於輸送媒介槪 要(如下)中。 以下列表爲考慮各系統之架構觀點必須涵蓋的元件與 活動範圍的起始點。它們並不是環境的定義。 標準架構摘要 執行架構(Execution architecture) 302 執行架構是運轉時間技術服務、控制結構、以及應用程式 在其上執行的支持基礎結構之統一集合。 它包含元件如: 應用信息報 批次處理架構 中間體(middleware) 報告 錯誤處理 線上架構 安全 4HICKMAN200036TW; AND1P282.TW 24 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) (請先閱讀背面之注意事項再填寫本頁) 裝 ·1111111. 經濟部智慧財產局員工消費合作社印製 491972 A7 B7 五、發明說明(25) (請先閱讀背面之注意事項再填寫本頁) 編碼/解碼 資料存取方法 整合協助 檔案轉換能力 目錄服務 負載平衡 工作流服務 狀態管理 特殊需求(如工作流、電話(telephony)、群體 工具) 開發架構304 開發結構是技術服務、·工具,技術、以及建構與維持應用 程式軟體之標準的統一化集合。 其元件包含如: 設計/使用說明工具 資訊庫(information repository ) 計畫管理工具 程式介面(program shells) 經濟部智慧財產局員工消費合作社印製 圖形使用者介面視窗畫家(GUI window painter ) 製作原型的工具 程式設計師的應用程式介面 測試工具 來源碼控制/建造程序 4HICKMAN200036TW; AND1P282.TW 25 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) 491972 A7 B7__ 五、發明說明(%) (請先閱讀背面之注意事項再填寫本頁) 性能測試工具 生產力工具 設計工具 編譯器/偵錯器 編輯器 操作架構306 保持一商業應用程式生產或開發環境在設計好的服務層級 運作所需要的一統一集合,其包括技術服務、工具、標準 與控制。其與執行架構的不同點在於,其主要的使用者是 系統管理者以及生產支援人員。 其元件包括如: 工作安排器(Job scheduler) 軟體分散(Software distribution) 錯誤監視器 資料備份與恢復 協助服務台(Help desk) 經濟部智慧財產局員工消費合作社印製 安全管理 高取得性 硬體管理 性能監視器 開機/關機程序. 報告管理工具 損害復原 4HICKMAN200036TW; AND1P282.TW 26 ^紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) 72 9 1X 9 A7 ___ B7 五 經濟部智慧財產局員工消費合作社印製 發明說明(W) 網路監視工具 跨平台管理工具 考慮一所有環境 爲了確保使用者問到的是有關技術架構的正確問題所問的 問題包括: 對所有的技術元件,具有已經提出的以下特性: 按規格實行? 操作可靠性? 操作容易性? 維護需求? 與其它元件相結合的能力,尤其是來自其它供應商 的元件? 給予適當事前轉換測試的送貨排程(delivery schedule ) ? 備份程序? 供應商可靠度與財務穩定性? 未來對商業變化的考驗? 系統軟體版本是否在其他網站已經使用6到12個月 了嗎? 時間範圍隨產品而改變。參考網站已經被證實了 嗎? 什麼是結構(f r a m e w 〇 r k ) 274HICKMAN200036TW; AND1P282.TW 22 This paper size is applicable to the Chinese National Standard (CNS) A4 g (21〇X 297mm) — 丨 丨 丨! • I (Please read the notes on the back before filling this page) 491972 A7 B7 5 Explanation of the invention (2 3) At the same time, when architects design a building, they have a main idea of the building's elements in mind: water pipes, motors, sewers, stairs / elevators, main structures, etc. A building The teacher's implied step is "Based on my knowledge of general parts in a building, how do those parts fit together in this particular building? Because of the building's functional needs, those parts need special attention? The definition of the Oxford English Dictionary starts from Its use and design point of view, a computer or computer-based system and the general logical organization; the special performance of this structure and organization. The method or structure of hardware or software construction defines how a system or program is How constructed components interact with each other, what protocols and interfaces are used to communicate and collaborate between modules and components, and Groups and components make up the system. The general characteristics of the seven successful architectures are as follows: _Proposes the boundaries to remove the problem; Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs ♦ Clearly assign responsibilities to decompose the solution onto the components; Definitions of interfaces, formats, and communication protocols used. These should be clear and strong enough to allow asynchronous development and re-implementation of components; appropriate instructions for use should be implemented by implementers; participation in the operation of the audit mechanism A specific interface to verify that the specific input to the component can get specific results; # —The extension mechanism can do constant changes in demand and technology 4HICKMAN200036TW; AND1P28 ^^ τ This paper standard applies to China National Standard (CNS) A4 specification (210 χ 297 mm)-491972 A7 B7 V. Inventive Note) Response; * Policy, implementation and organizational structure to facilitate the adoption of the architecture. The possible types of architecture considered by the present invention are discussed below. Development architecture Development Architecture Framework (DAF) 300 provides a one-person execution, development, and operation environment Environments 302, 304, and 306 are the channels for thinking leadership and architecture. For a detailed discussion of those architectures, see the standard architecture summary (below). Figure 3 shows the ownership of the three architectures, and is explained in more detail in the transmission media summary ( The following list is the starting point of the components and scope of activities that must be considered when considering the architectural perspective of each system. They are not the definition of the environment. Standard Architecture Summary Execution Architecture 302 Execution Architecture is a runtime technical service, A unified set of control structures and supporting infrastructure on which applications run. It contains components such as: Application Information Batch Processing Architecture Intermediate (middleware) Report Error Processing Online Architecture Security 4HICKMAN200036TW; AND1P282.TW 24 This paper size applies to China National Standard (CNS) A4 (210 X 297 mm) (Please Read the precautions on the back before filling out this page.) 1111111. Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs, 491972 A7 B7 V. Invention Description (25) (Please read the precautions on the back before filling out this page) Code / Decoding data access method integration assistance file conversion capability directory service load balancing workflow service state management special requirements (such as workflow, telephone (telephony), group tools) development architecture 304 development structure is technical services, tools, technology, and construction A unified set of standards for maintaining application software. Its components include, for example: design / use instruction tool information repository, program management tools, program shells, the GUI of the Intellectual Property Bureau, the Ministry of Economic Affairs, the employee consumer cooperative, and the printing of a graphical user interface (GUI window painter). Tool programmer's application program interface testing tool to source control / build procedures 4HICKMAN200036TW; AND1P282.TW 25 This paper size applies to China National Standard (CNS) A4 specification (210 X 297 mm) 491972 A7 B7__ V. Description of the invention (% ) (Please read the notes on the back before filling out this page) Performance testing tools Productivity tools Design tools Compiler / debugger editor Operating structure 306 Required to maintain a commercial application production or development environment operating at the designed service level A unified collection of technical services, including technical services, tools, standards and controls. It differs from the execution architecture in that its main users are system managers and production support staff. Its components include, for example: Job scheduler Software distribution Error monitor data backup and recovery Help desk Help desk of the Intellectual Property Bureau of the Ministry of Economic Affairs Consumer Cooperatives Printed security management High-accuracy hardware management Performance Monitor On / Off Procedure. Report Management Tool Damage Recovery 4HICKMAN200036TW; AND1P282.TW 26 ^ Paper size applies Chinese National Standard (CNS) A4 (210 X 297 mm) 72 9 1X 9 A7 ___ B7 Intellectual Property of the Ministry of Economic Affairs Bureau employee consumer cooperative printed invention description (W) Network monitoring tool Cross-platform management tool Considering all environments To ensure that users are asking the right questions about the technical architecture The questions asked include: For all technical components, The following characteristics have been proposed: Implementation by specifications? Operational reliability? Ease of operation? Maintenance requirements? The ability to combine with other components, especially components from other vendors? Delivery schedule with proper pre-conversion testing? Backup procedures? Supplier reliability and financial stability? The test of business change in the future? Has the system software version been used on other websites for 6 to 12 months? The time frame varies by product. Has the reference site been verified? What is structure (f r a m e w 〇 r k) 27

4HICKMAN200036TW; AND1P282.TW 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) 491972 A7 _B7___ 五、發明說明(加) (請先閱讀背面之注意事項再填寫本頁) 設計複雜的基礎結構來滿足今日分散的、任務關鍵的 需求是主要的挑戰。基於此,擁有系統之設計、建造、裝 設與操作所需要的元件之存貨是有用的。瞭解元件觀念上 如何組合在一起也是有用的。 一結構應該被認爲是用於構築快完成之工作的一種槪 念架構。它應該當作思考的觸發或完整度檢查。一結構不 能直接建造而應該把它當作瞭解與設計的開始點。 結構用於協助實踐者瞭解可能需要那些元件,與元件 如何相互配合。根據元件的庫存與其關係的描述,實踐者 將選擇其設計必要的元件。一建築師從一個或更多個結構 抽出元件以滿足特殊組使用者或應用程式需求。一旦一個 架構已然實施,其常被稱爲架構或基礎結構。 一結構所含範圍變化很大。舉例來說,一個結構可能 槪括技術基礎結構整體的元件,然而另一個結構明確地集 中於網路上。一結構範圍的通盤了解對其在計劃的設計階 段的功用很重要。 經濟部智慧財產局員工消費合作社印製 也很重要的是,去瞭解結構其本質是否是供應商獨有 的(專用的(proprietary))或者其是否可供一些供應 商使用(開放)。 架構的重要性 經驗已經展示架構方式對資訊系統發展的好處:較好 4HICKMAN200036TW; AND1P282.TW 28 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) 491972 A7 B7 經濟部智慧財產局員工消費合作社印製4HICKMAN200036TW; AND1P282.TW This paper size is applicable to Chinese National Standard (CNS) A4 (210 X 297 mm) 491972 A7 _B7___ V. Description of the invention (plus) (Please read the precautions on the back before filling this page) The design is complex Infrastructure to meet today's decentralized, mission-critical needs is the main challenge. Based on this, it is useful to have a stock of components needed for the design, construction, installation, and operation of the system. It is also useful to understand how the components conceptually fit together. A structure should be considered a conceptual framework for constructing work that is about to be completed. It should be used as a trigger or completeness check for thinking. A structure cannot be built directly and should be used as a starting point for understanding and design. Structures are used to assist practitioners in understanding which components may be needed and how they fit together. Based on the description of the component inventory and its relationship, practitioners will select the components necessary for their design. An architect extracts components from one or more structures to meet the needs of a particular group of users or applications. Once an architecture has been implemented, it is often referred to as an architecture or infrastructure. The scope of a structure varies widely. For example, one structure may include the elements of the overall technical infrastructure, while another structure is explicitly focused on the network. A comprehensive understanding of a structural scope is important for its usefulness in the design phase of a plan. Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs is also important to understand whether the structure is inherently vendor-specific (proprietary) or whether it is available (open) to some vendors. The importance of architecture has shown the benefits of the architecture approach to the development of information systems: better 4HICKMAN200036TW; AND1P282.TW 28 This paper size applies to China National Standard (CNS) A4 (210 X 297 mm) 491972 A7 B7 Intellectual Property of the Ministry of Economic Affairs Printed by Bureau Consumers Cooperative

五、發明說明(w) 生產力與較少之基本再發明。一架構提供完整性檢查,確 保一可能解決方案的所有相關元件都已經考慮到。它確保 一致的、可靠的與高品質的應用程式。他給每一個人一開 發者與他們的顧客一用以談論工作之共同的結構與語言。 也許最重要的是,它讓專業開發者在執行額外的工作 時衡量成功的解決方案。架構牽涉到可重複的槪念,且因 此它減少了藉其解決問題的時間與成本。 一良好架構的一些特殊技術優點: *簡化應用程式開發 好的架構應提供應用服務的共同套裝 (common set)。它將程式設計挪從技術與開發工具的複雜事務抽 離,提昇吳經驗開發者的生產力。 • 品質 通常有經驗的開發者會將較複雜的技術元件實施於架 構中。然後這些元件被在使用,避免應用程式中重複的複 雜邏輯。在設計、實施與檢驗期間的反覆試驗常帶來架構 元件的改良。這些元件的所有使用者皆因此改良而受益, 並減少失敗的風險,與確保最後應用程式中更好的總體品 質。 • 整合 一架構通常把不同的軟體、平台以及通訊協定合裝在 一綜合的結構中。 •延展性(e X t e η s i b i 1 i t y ) 4HICKMAN200036TW; AND1P282.TW (請先閱讀背面之注意事項再填寫本頁) —·! 裝 _ ;觀· 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) 491972 A7 B7___ 五、發明說明(30) (請先閱讀背面之注意事項再填寫本頁) 架構是由有經驗的人員所建立的,這些人員某種程度 可預測現有的架構是否會滿足現在或未來的需求。很容易 整合程式碼的延伸。一個良好均衡的架構由正確的元件構 成,由於複雜的交互關係增加複雜度的速率比模組化可減 低它的速率來的快,元件藉由簡單的交互關相結合在一 起。 ♦位置透明度(location transparency) 一般而言,良好架構的應用程式將應用程式從來源處 的細節分離。然而這不總是真實或必須的。爲了性能的理 由,設計者與開發者仍然常需要注意程序與資料位置。 鲁水平排列(horizontal scaling) 架構協助將現存基礎結構的利用最佳化,這造成應用 程式性能與穩定度的提昇。 • 隔離 經濟部智慧財產局員工消費合作社印製 一架構可能用於將應用程式與特定產品隔離。這確保 該產品以後較易更換。這個特性可能很重要,如果一產品 的未來與產品的供應商的未來具有風險,或在一特定技術 領域的變化率特別高。回顧過去十年使用者介面標準的變 化,可以提供一個明顯的例子。沒有把使用者介面邏輯與 商用邏輯分開的應用程式,必須完全重寫以運用新使用者 介面,例如微軟視窗與Web瀏覽器。 • 可攜性 架構的使用增加了在不同平台或通訊協定內,以及跨 不同平台與通訊協定的可攜性及可再利用性。 4HICKMAN200036TW; AND1P282.TW 30 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) 外 1972 A7 B7 五、發明說明(31 ) 經濟部智慧財產局員工消費合作社印製 在分析與设i十中使用架構結構可以減少資訊技術1 (IT )解決方案的風險。經由再使用,架構結構的使用 改善發展的生產力,也改善了資訊技術解決方案的可靠性 與可維護性。 今曰資訊技術管理者的一個主要挑戰是對變化的需 要。架構提供主要變化原動力的一基本結構。很多商務由 策略性應用程式所執行,這些應用程式非常可能需要頻繁 與快速的發展來應付技術能力與商業需求的變化。一適當 定義並明智地開發的架構傳送一基礎結構,在基礎結構上 可建立一企業,並加強支援們現在與未來商業需要的應用 程式。這是一企業如何處理變化之道。 一架構的主要優點在於它分開與征服(divide and conquer)複雜性。簡單的應用程式從架構所得之好處較 複雜應用程式所得來的少。在這情形中需要較少的決策, 也較少人需要去瞭解它們。在維護期間,一個建造不良的 小應用程式使可以容忍的,因爲仍然較易找出缺點與預期 更正缺點的副作用。相反地,複雜的應用程式較難瞭解及 修正。複雜性可藉由將應用程式次分爲層面與元件,各層 面具有一特定功能。層面係強凝聚性與解偶的;一給定層 面不必知道任何其它層面的內部。 大型複雜系統(LCS)的硏究強化在大系統裡穩定 架構的重要性。以下列例子說明之: 一LCS解決方案的成功傳送仰賴共同資料應用程式 4HICKMAN200036TW; AND1P282.TW y 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) (請先閱讀背面之注意事項再填寫本頁) « •裝 訂: 491972 A7 _________B7__ 五、發明說明(32) 與技術架構的早期定義與使用。 當架構在早期的LCS成果上沒有被定義、被穩定及 被傳送,其失敗率很高。 所有可觀的LCS成果牽涉到共同或分享架構的使 用。然而一個成功的成果有賴於一個穩定共同架構 的早期定義與傳送。 資料、應用程式、或技術架構的顯著變化在可傳送 計劃的即時性與傳送物品的可靠性上有嚴重的反效 果。 雖然使每一個計劃有9個月來定義所要的架構是不切 實際的,但並不表示及早集中於架構元件的定義與 設計是必要的。. 如果必要架構與應用程式發展一同被定義或明顯地 被改變,失敗的風險將大大地增加。 架構的好處 經濟部智慧財產局員工消費合作社印製 從技術架構所得到的好處能夠使吾人站在尖端商業解 •決方案的最前端。在一可靠與具有彈性架構中的投資可造 成以下一個或多個結果: ♦藉由將其各個與他者的變化隔開,可以保留在應 用程式與技術上的投資(例如硬體或第三方軟體 的升級不會影響應用程式)。 ♦槓桿平衡稀少技術技能(例如對在特定通訊協定 4HICKMAN200036TW; AND1P282.TW 32 表紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) " 491972 A7 B7__ 五、發明說明(33 ) 或SQL方面具有細部技能之人員的需要)。 <請先閱讀背面之注意事項再填寫本頁) • 生產力、靈活性、與可維護性的加強,因爲在架 構中產生了共同、常常複雜的並且容易出錯的元 件(如錯誤處理或跨平台通訊),然後所有的應 用程式再使用它。 • 因爲共同元件運轉時的特性是熟悉且一致的,提 昇了應用程式的可預測性。 • 當作建造藍圖與討論議程並確保系統的一致性。 如此對傳輸應用程式的可操作性與維護有很大的 影響。 什麼是建築師? 建築師必須對一計劃、企業、與/或技術環境有深入 了解。商業整合規劃、管理其錯綜性與複雜性都牽涉到建 築師。 當設計與施行技術架構時很容易就全心投入。理想上 架構應該是確保發展生產力、維護靈活性、效能與穩定性 的一輕薄、界定淸楚的層面(layer)。 經濟部智慧財產局員工消費合作社印製 主要問題是可維護性與可操作性。其他人可能必須了 解架構設計背後的道理,以正確的維護它,這一點我們要 謹記在心。 架構邏輯可能很快地變成非常抽象而且建造人之外的 其他人很難去維護。細心設計的架構可能很快地被不知架 4HICKMAN200036TW; AND1P282.TW 33 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐] 經濟部智慧財產局員工消費合作社印製 491972 A7 __B7____ 五、發明說明(钟) 構當時如何設計與開發的維護人員所破壞。 架構應該盡量輕便,只顧及到驅動它的需要即可。避 免”有也不錯(n i c e t 〇 h a v e ) ”的靈活性與外加的抽象 層次,這些抽象層次智識上很有趣但沒有實質的必要。 傳送媒介總覽 一個傳送媒介是一個技術服務的整合性集合,其可支 援應用程式型態,並實施於不同的架構世代 (architecture generation ) ° 應用程式型態 一個應用型態定義一獨特類別的處理型態,其被應用 程式所使用,然後被端適用者所使用。現今應用程式型態 的傳送媒介參考組包括批次、線上交易處理、合作、資料 庫、智識管理與整合。 應用程式型態是一傳送媒介的主要特點,而多數人將 應用程式型態與傳送媒介混爲一談。 傳送媒介的主要目的是他可再使用在許多應用程式 中。它仍然是技術架構的一部份,而不涉及應用程式特定 的邏輯。另一方面,一應用程式架構對特定應用程式有特 異性。 架構世代 4HICKMAN200036TW; AND1P282.TW 34 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) -----------I ---1 (請先閱讀背面之注意事項再填寫本頁) 訂--- 491972 Α7 五、發明說明(35) 一個架構世代是廣大分類的體系,供在一技術時期內 放置技術元件。傳送媒介實體地實施於一不同的架構世代 上。 注意:要在客戶端/伺服器端與以網路爲中心技術世代 (Netcentric technology generation)劃分界線是很 困難的;通常不同人傾向於具有不同的意見。一般而言, 本發明是客戶端/伺服器端世代中的一大進展。在傳送媒 介的背景中,技術世代討論用意在在使其成爲一邏輯討 論’其目的爲了突顯新技術所能提供的新商務能力。所以 舉例來說,可能有從使用外掛程式的網路瀏覽器來執行的 一Power Builder應用程式。 傳送媒介母體 第4圖揭露一傳送媒介母體400。一種看待傳送媒介 的方式是把它當作技術世代4 02與應用程式型態4 04的交 集。追是目則採用的表現方式供在D A F中導覽。 傳送媒介方塊 傳送媒介方塊S00,如第5圖所示,表現一個傳送媒 介的全貌。除了應用型態與技術世代外,它介紹執行、開 發與操作環境,5 02、5 04與5 06間的相異點。 4HICKMAN200036TW; AND1P282.TW γ 本紙張尺度適用中國國家標準(CNS)A4規袼(210 X 297公釐) -----------裝--- (請先閱讀背面之注意事項再填寫本頁) 訂: #· 經濟部智慧財產局員工消費合作社印製 97 IX 49.. A7 _B7_ 五、發明說明(36) 其方塊有如下範圍,或方塊面: 1.方塊底部的左面有核心技術元件與服務5 08,它們 共通於所有的傳送媒介。 其核心服務將使用一個或更可能更多個技術世代;目 前的有主機、客戶端/伺服器或網路中心 (Netcentric )。大部分主要的企業具有舊有系統 (legacy system),其包含主機爲基礎的以及分散的 客戶端/伺服器應用程式。目前的開發延伸了系統技術的 混合" 2·方塊的左上方是技術元件510,其必須支持一不同 的傳送媒介。 這些元件使用特定於各個不同傳送媒介的服務,將技術架 構延伸。有些元件可以延伸一些核心服務,而其它爲完全 是新型元件。 3.方塊右面是每個傳送媒介會影響的三個環境;執 行、開發以及操作,502、504、506。 核心服務與傳送媒介延伸都需要這三個環境的支 持。方塊揭示不同的傳送媒介需要不同到核心開發與操作 環境的延伸,而不只是執行架構。一任務關鍵的高流量交 易傳送媒介可能再開媽架構中需要特殊表現調整工具,同 時也需要在操作架構中的即時監控工具。 同時不同技術世代可能需要在所有三環境中的特別服 務。當在多平台環境上工作時,可能有重複的服務在平台 上。這個時常使開發、操作與執行架構變成複雜,而特別 4HICKMAN200036TW; AND1P282.TW 36 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) (請先閱讀背面之注意事^^一:填寫本頁) · 經濟部智慧財產局員工消費合作社印製 491972 ΚΙ Β7__ 五、發明說明(37) 需要注意於提供整合架構。 (請先閱讀背面之注意事項再填寫本頁) 通常約定(engagement)的焦點專注於執行環境。 三環境之間的主要依從關係是,執行架構高程度地驅動開 發與操作架構的需求。舉例來說,如果選擇了一異質的、 分散的執行架構,開發與操作環境都要將其反應出來。 傳送結構 促進將焦點放在商業解決方案上,而從技術問題上移 開。 協助將可傳送之架構計畫與傳送的連結。 創造技術所引致之商業能力的企業化視野。 提供所須之新結構架構,以滿足特定的需求。 提供指導以界定那些架構最能滿足那些需求。 提供開發架構結構與最佳實踐,以建造這些架構。 在高性能架構設計期間,吾人能藉由提供邏輯層次的 討論,以評估基礎服務的類型以及特定狀況所需之產品。 經濟部智慧財產局員工消費合作社印製 當傳送媒介實施完畢,它們藉由提供「起始工具 (Starter Kids)」架構來減少實施商業解決方案的時 間。 當傳送媒介架設完畢,他們藉由以下方法以槓桿平衡 商業中的技術: *藉由限制不同技術與支援這些技術所需的技巧的 數目來減少操作與維護成本。 4HICKMAN200036TW; AND1P282.TW 37 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) 491972 A7 B7 五、發明說明(38 ) ♦減少執行與開發的技術成本。 -----------裝·! (請先閱讀背面之注意事項再填寫本頁) 注蒽:傳送媒介結構提供方法以組織技術架構資訊。當提 供此類內容給客戶,吾人必須根據客戶的背景與客戶熟悉 的術語,修改提出的資訊。 技術世代的選擇 檔案 本節應該協助一建築師了解特定技術世代的特性以及 選擇特定技術是代的含意。當計畫與設計一系統的時候, 各個技術世代的優劣點應該被瞭解。當識別出一架構中所 使用的核心技術,應該考慮客戶現存IT架構600的一觀 點、指導原則602與商業命令(business imperative) 604,如第6圖所示。 有一點很重要,就是去了解不同的、靜態的分野並不 在於不同的技術世代之間。有可能一架構是由多於一個世 代的元件所組成。 目標應在於去了解各元件可取得之不同技術選擇的優 劣點,並且根據客戶需求選擇最適當者。 經濟部智慧財產局員工消費合作社印製 平衡現有系統並將其與新應用程式整合變的更加重 要。一典型方案牽涉到大型電腦舊有系統,其作爲主從架 構中的伺服器、應用程式伺服器可從傳統GUI客戶端內 建的Power Builder與Visual Basic,以及透過一網路 伺服器從以網路爲基礎的前端進入存取。 4HICKMAN200036TW; AND1P282.TW 38 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) 經濟部智慧財產局員工消費合作社印製 491972 ΚΙ Β7_ 五、發明說明(3?) 一般考慮 從技術觀點,一新定製的應用程式一般應該使用最新 架構世代,以確保應用程式可以藉由是應未來變化的能力 生存的更久。 這意味著所有新應用程式應該理想地植基於網路中心 架構(Netcentric Architecture)上,而不是在傳統主 從架構上或一以主機爲基礎的架構上。 然而,選擇一世代並不只是一技術上的決定。常常主 要技術架構決定是一些本質上非技術性的因素所決定,如 財物因素、內部政策與客戶政策、以及實施/操作考慮。 當決定是否去應用一網路中心解決方案,也就是結合 以網路爲基礎的伺服器介面以及網際網路應用程式型態, 吾人必須謹記這些技術並非萬能,而只有在實質的商業理 由之下才應該使用。他們需要在技巧、工具、開發與操作 程序中的新投資。由於工作與產品的相對不成熟,他們同 時代表在技術上例如性能與可靠性,以及策略上例如供應 商與產品品質及穩定性等的額外風險。 不管如何.,今日各計畫應該經常考慮到使用以網路爲 中心技術的可能性。很重要的是,衡量應用程式是否可以 立即或是在將來從網路中心方式實施受益。 甚至如果決定使用一傳統主從方式(如使用Power Builder與Visual Basic),應該考慮使用網路中心槪 念所產生之軟體程式包與分散成本上顯著的減少。這樣的 4HICKMAN200036TW; AND1P282.TW 39 本♦紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) (請先閱讀背面之注意事項再填寫本頁) 裝 _—丨丨訂---------銻 491972 A7 B7 五、發明說明(4〇 ) 槪念包含三層或多層架構加上更多駐在伺服器上的商業邏 輯、彈性安全架構與使用者介面槪念,可於後接埠在網路 瀏覽器上。 一網路中心架構通常仍然支援主從應用程式的開發。 由於傳統主從系統通常將商業邏輯實質的部分放在一大客 戶處(fat client),而網路中心架構仍喜歡大部分的商 業邏輯留在伺服器處,所以相反的狀態不常常爲真。同時 網路中心趨向於比(靜態主導的兩層)主從系統更鬆散的 連結。 以下各節識別與網路中心的、以主從或主機爲基礎的 技術世代相關的主要特性。這個列表絕不是完整或徹底 的,但是包含以作爲確認程序的起始點。 網路中心架構世代 如果第7圖中的聲明大部分是真實的,吾人應該考慮 根據網路中心世代的一應用程式。 以下細述第7圖中每一個聲明的重要性,而其應該有 助於確認對套定客戶保證(engagement)的適當答案。 現存架構與基礎結構700 E1.其它網路中心應用程式被開發與生產。 假如他們不是完全不熟悉技術的特性,使用者族群通 常對使用新技術以提出變化的商業驅動者(business driver)較無抵抗力。假如根據網路中心架構的一應用 4HICKMAN200036TW; AND1P282.TW 40 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) (請先閱讀背面之注意事項再填寫本頁) 裝 鑣· 經濟部智慧財產局員工消費合作社印製 ^/2 A7 -______B7_____ 五、發明說明(4彳) 已經成功地試賣(pilot)與展開(deploy),對額外系 統的接受將更容易。 Ε2·客戶在他的IT部門有重要的技術技巧。 假如客戶計畫要自行開發或操作應用程式,這點特別 ®要的。爲了成功的展開此型系統,在訓練以及內部訓練 上面的可觀投資可能是必要的。客戶必須有支持變更的修 養。有些組織頗爲保守且強壯,使得用新技術傳送一成功 §十畫更爲困難。 Ε3·客戶有爲他們的客戶端機器做多重硬體/作業系統設 定。 在傳統主從環境中,對一企業來說,往內或往外分散 一應用程式要求應用程式針對特定工作站作業系統必須接 埠、重新編譯(recompile)並且測試。使用通用客戶端 (Universal client)與網路瀏覽器可藉由在許多不同 的作業系統與硬體平台上提供一致與熟悉的使用者介面, 減少許多這樣的問題。 E4.應用程式將在個人電腦以外裝置上運作。 網際網路的動力對各種網路致能(web-enabled) 裝置的供應商施加很多壓力。網際網路基礎結構的到位使 公穎商更可以從可存取的電子資訊創造新的實體裝置。舉 例來說,網路電視正在取得勢力。現在使用者可以經由電 視通往網際網路。從中央維護伺服器下載與使用的網路電 腦(弱客戶端裝置(thin-client device))產生很多 利益。同時使用者想從多重實體裝置處存取相同的資訊。 4HICKMAN200036TW; AND1P282.TW 41 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) (請先閱讀背面之注意事項再填寫本頁) 裝 訂·· 經濟部智慧財產局員工消費合作社印製 491972 經濟部智慧財產局員工消費合作社印製 A7 __B7____五、發明說明(42) 舉例來說,一使用者可能想從一行動電話上、從一網路電 視上或它們的可攜型個人電腦上存取他/她的電子郵件。 E5.現有舊有系統能按比例放大以服務眾多潛在聽眾。 藉由包括公司外的聽眾擴大舊有大型主機或主從系統 的使用者族群,可以顯著地增加系統的使用。放置在現存 系統的額外要求與增加的使用很難評估或預測。必須進行 分析以確保現存舊有系統與基礎結構可以吸收這種增加。 商業命令702 B1客戶端需要用這個應用程式聯繫新的外在聽眾。I 這大槪是選擇網路中心架構的主要理由。透過網路中 心架構的適當使用,常常可能取得對新客戶與市場的曝光 機會。藉由提供新服務與產品給其顧客,客戶端可常常達 成重大的競爭優勢。同時這個新管道使得開發新一代的” 單一市場(market-of-one) ”產品在技術上可行,每一 客戶能夠重複而容易地按照自己的喜好定製產品。 B 2 .客戶需要利用此應用程式聯繫廣大或多樣的內部聽 眾。 傳統主從應用程式的組態管理是很多公司一個主要課 題,組態管理傾向於實質上分散到客戶端與伺服器。裝成 一個大執行檔或幾個小執行這類應用程式,其軟體分配使 得甚至小規模的使用者人口的較小更新都很困難。每次作 更新時,一程序必須啓動以分散新程式碼到所有的客戶端 機器。此瀏覽器中心應用程式型態針對分散功能到內部與 4HICKMAN200036TW; AND1P282.TW 42 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) (請先閱讀背面之注意事項再填寫本頁) 裝 0 #· 外 1972 A7 --— __ B7 -- --------- 五、發明說明(43) 外部的使用者的傳統問題提供一種選擇。 IT指導原則704 G1 .客戶是新技術的早期採用者。 網路中心架構的實施能夠幫助客戶履約一大堆商業好 處。然而,將新技術引入到一組織的確具有其固有的風險 並且可造成大量的變化。客戶應該具有接收必要變化的修 養。 〇2·應用程式應該被開發以處理非專門的或偶發的使用 者。 非專業使用者需要使用簡單且熟知的介面以能使用應 用程式。當人們變成習慣於網路瀏覽器,這就是他們較喜 歡的使用者介面。由網路瀏覽器所提供之一致的介面將幫 助減少熟悉新應用程式所需的學習曲線。 G3·在適當的地方,應用程式應該開發具有多媒體能力以 展示資料(文字、聲音、視訊等)。 數位化、組織、以及傳送文字的、圖片的(如視訊、 聲音等等)等不同於傳統資料的其它資訊給更廣大的使用 者,使人們與企業有新方法可一起工作。網路中心技術 (例如HTML文件、外掛程式與JAVA等等)以及媒體資 訊格式引致對這些種類的複雜文件與應用程式的支持。網 路頻寬仍然是一性能問題。然而,網路技術的進步與壓縮 技術繼I賈造成更豐富的媒體致能(m e d i a - e n a b 1 e d )文 件與應用程式在網路上更加可行。V. Description of invention (w) Productivity and less basic re-invention. An architecture provides integrity checks to ensure that all relevant elements of a possible solution have been considered. It ensures consistent, reliable and high-quality applications. He gives everyone a common structure and language that developers and their customers use to talk about work. Perhaps most importantly, it allows professional developers to measure successful solutions as they perform additional work. Architecture involves repeatable thoughts, so it reduces the time and cost of solving problems with it. Some special technical advantages of a good architecture: * Simplify application development A good architecture should provide a common set of application services. It removes programming from the complex affairs of technology and development tools, and improves the productivity of Wu's experienced developers. • Quality Usually experienced developers implement more complex technical elements into the architecture. These components are then used to avoid duplication of complex logic in the application. Repeated tests during design, implementation, and inspection often lead to improvements in architectural components. All users of these components benefit from this improvement, reduce the risk of failure, and ensure better overall quality in the final application. • Integration An architecture usually integrates different software, platforms, and protocols into a comprehensive architecture. • ductility (e X t e η s i b i 1 i t y) 4HICKMAN200036TW; AND1P282.TW (Please read the precautions on the back before filling this page) — ·!装 _; View · This paper size is applicable to China National Standard (CNS) A4 (210 X 297 mm) 491972 A7 B7___ V. Description of the invention (30) (Please read the precautions on the back before filling this page) The structure is made by Built by experienced people who can somehow predict whether the existing architecture will meet current or future needs. It's easy to integrate code extensions. A well-balanced architecture is composed of the correct components. Due to the complex interaction relationship, the rate of increasing complexity is faster than that of modularization, which can reduce it. The components are combined by simple interaction. ♦ Location transparency Generally speaking, well-architected applications separate the application from the details at the source. However this is not always true or necessary. For performance reasons, designers and developers still need to pay attention to the program and data location. The horizontal scaling architecture helps to optimize the use of existing infrastructure, which results in improved application performance and stability. • Isolation Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economy A framework may be used to isolate applications from specific products. This ensures that the product can be easily replaced later. This feature may be important if the future of a product and the future of the supplier of the product are at risk, or if the rate of change in a particular technology area is particularly high. A review of the changes in user interface standards over the past decade can provide a clear example. Applications that do not separate user interface logic from business logic must be completely rewritten to use new user interfaces, such as Microsoft Windows and Web browsers. • The use of portability architecture increases portability and reusability within and across platforms and protocols. 4HICKMAN200036TW; AND1P282.TW 30 This paper size is applicable to Chinese National Standard (CNS) A4 (210 X 297 mm) outside 1972 A7 B7 V. Description of invention (31) Printed on the analysis and design by the Consumer Cooperative of Intellectual Property Bureau of the Ministry of Economic Affairs The use of architecture in i10 can reduce the risk of information technology 1 (IT) solutions. Through reuse, the use of the architecture improves the productivity of development and also improves the reliability and maintainability of information technology solutions. A major challenge for IT managers today is the need for change. Architecture provides a basic structure for the main driving force of change. Many businesses are run by strategic applications, which are likely to require frequent and rapid development to cope with changes in technical capabilities and business needs. A properly defined and wisely developed architecture delivers an infrastructure upon which an enterprise can be built, and applications that support business needs now and in the future are strengthened. This is how a company handles change. The main advantage of an architecture is its complexity of divide and conquer. Simple applications benefit less from the architecture than complex applications. Fewer decisions are needed in this situation, and fewer people need to understand them. During maintenance, a poorly built applet makes it tolerable, as it is still easier to identify the shortcomings and anticipate the side effects of correcting the shortcomings. Conversely, complex applications are more difficult to understand and correct. Complexity can be achieved by subdividing the application into layers and components. Each layer has a specific function. Levels are strongly cohesive and decoupled; a given level does not need to know the interior of any other level. The study of large complex systems (LCS) reinforces the importance of stable architecture in large systems. Take the following example to illustrate: The successful transmission of an LCS solution depends on the common data application 4HICKMAN200036TW; AND1P282.TW y This paper size applies to the Chinese National Standard (CNS) A4 specification (210 X 297 mm) (Please read the note on the back first Please fill in this page again for matters) «• Binding: 491972 A7 _________B7__ V. Description of the invention (32) and early definition and use of technical architecture. When the architecture was not defined, stabilized, and transmitted on early LCS results, its failure rate was high. All significant LCS results involve the use of a common or shared architecture. However, a successful outcome depends on the early definition and transmission of a stable common architecture. Significant changes in data, applications, or technology architecture have serious adverse effects on the immediacy of deliverable plans and the reliability of deliverables. Although it is impractical for each plan to have nine months to define the desired architecture, it does not mean that it is necessary to focus on the definition and design of the architecture elements early. If necessary architectures are defined or significantly changed along with application development, the risk of failure is greatly increased. Benefits of the architecture Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs The benefits obtained from the technical architecture can keep us at the forefront of cutting-edge business solutions. Investing in a reliable and flexible architecture can have one or more of the following consequences: ♦ By separating each from other changes, investments in applications and technologies (such as hardware or third parties) Software upgrades will not affect applications.) ♦ Lever balance scarce technical skills (for example, for specific communication protocols 4HICKMAN200036TW; AND1P282.TW 32, the paper size applies the Chinese National Standard (CNS) A4 specification (210 X 297 mm) " 491972 A7 B7__ V. Description of the invention (33) Or the needs of someone with detailed skills in SQL). < Please read the notes on the back before filling out this page) • Enhancements in productivity, flexibility, and maintainability because common, often complex, and error-prone components (such as error handling or cross-platform) are created in the architecture Communication), and then all apps use it. • Improved application predictability because common components operate with familiar and consistent characteristics. • Act as a blueprint and discussion agenda and ensure system consistency. This has a great impact on the operability and maintenance of the transmission application. What is an architect? Architects must have an in-depth understanding of a plan, business, and / or technology environment. Architects are involved in the complexity and complexity of business integration planning and management. When designing and implementing a technical architecture, it's easy to get involved. Ideally, the architecture should be a thin, well-defined layer that ensures development productivity, maintains flexibility, efficiency, and stability. Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs The main problem is maintainability and operability. Others may have to understand the rationale behind the architecture design in order to maintain it properly, which we must keep in mind. Architectural logic can quickly become very abstract and difficult to maintain for anyone other than the builder. Carefully designed architecture may soon be unknowable 4HICKMAN200036TW; AND1P282.TW 33 This paper size applies to China National Standard (CNS) A4 (210 X 297 mm) Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economy 491972 A7 __B7____ 5 Description of the invention (bell) How the maintenance and design staff of the architecture were destroyed. The architecture should be as light as possible, and only the needs that drive it should be avoided. Avoid the flexibility and extraness of "nicet 〇have" Levels of abstraction. These levels of abstraction are intellectually interesting but not essential. Transmission medium overview A transmission medium is an integrated collection of technical services that supports application types and is implemented in different architecture generations. ) ° Application type An application type defines a unique type of processing type that is used by the application and then used by the end-user. The reference group for the delivery type of today's application types includes batch and online transactions. Processing, collaboration, database, intellectual management and integration. Is the main characteristic of a transmission medium, and most people confuse the application type with the transmission medium. The main purpose of the transmission medium is that it can be reused in many applications. It is still part of the technical architecture, It does not involve application-specific logic. On the other hand, an application architecture is specific to a specific application. Architecture generation 4HICKMAN200036TW; AND1P282.TW 34 This paper standard applies to China National Standard (CNS) A4 specification (210 X 297 public) Li) ----------- I --- 1 (Please read the notes on the back before filling this page) Order --- 491972 Α7 V. Description of invention (35) One generation of architecture is a broad classification System for placing technical components in a technical period. The transmission medium is physically implemented on a different architecture generation. Note: The client / server side should be divided from the network-centric technology generation. Boundaries are difficult; usually different people tend to have different opinions. Generally speaking, the present invention is a big progress in the client / server end generation. In the context, the technology generation discussion is intended to make it a logical discussion. Its purpose is to highlight the new business capabilities that new technologies can provide. So for example, there may be Power Builder application. Transmission Media Master Figure 4 reveals a Transmission Media Master 400. One way to look at the transmission medium is to consider it as the intersection of technology generation 402 and application type 404. The following expression is used for navigation in DAFF. Transmission medium block S00, as shown in Fig. 5, shows the entire picture of a transmission medium. In addition to application types and technology generations, it introduces execution, development, and operating environments, the differences between 502, 504, and 506. 4HICKMAN200036TW; AND1P282.TW γ This paper size applies to Chinese National Standard (CNS) A4 (210 X 297 mm) ----------- install --- (Please read the precautions on the back before (Fill in this page) Order: # · Printed by the Employees' Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 97 IX 49 .. A7 _B7_ V. Description of the invention (36) The blocks have the following scope, or the block faces: 1. The left side of the bottom of the block has the core Technical components and services 5 08, they are common to all transmission media. Its core services will use one or more more technology generations; currently there are hosts, clients / servers, or Netcentric. Most major enterprises have legacy systems that include host-based and decentralized client / server applications. The current development extends the hybrid of system technology. 2. At the top left of the block is a technical element 510, which must support a different transmission medium. These elements extend the technical architecture using services specific to various transmission media. Some components can extend some core services, while others are completely new components. 3. To the right of the box are three environments that each transmission medium will affect; execution, development, and operation, 502, 504, and 506. Both core services and transmission media extensions need the support of these three environments. The blocks reveal that different transmission media need to extend to the core development and operating environment, not just the execution architecture. A mission-critical high-traffic transaction delivery medium may require special performance adjustment tools in the re-architecture, as well as real-time monitoring tools in the operational framework. At the same time, different technology generations may require special services in all three environments. When working on a multi-platform environment, there may be duplicate services on the platform. This often complicates the development, operation, and execution architecture, and especially 4HICKMAN200036TW; AND1P282.TW 36 This paper size applies to the Chinese National Standard (CNS) A4 specification (210 X 297 mm) (Please read the notes on the back first ^^ 一(Fill in this page) · Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 491972 ΚΙ Β7__ 5. Description of the Invention (37) Attention should be paid to providing an integrated structure. (Please read the notes on the back before filling out this page) Usually the focus of the engagement is on the execution environment. The main compliance relationship between the three environments is that the execution architecture drives the needs of the development and operation architecture to a high degree. For example, if a heterogeneous, decentralized execution architecture is selected, both the development and operating environment will reflect it. The delivery structure facilitates the focus on business solutions and moves away from technical issues. Assist in linking deliverable architectural plans with deliveries. Create a corporate vision of the business capabilities that technology creates. Provide the required new structure to meet specific needs. Provide guidance to define which architectures best meet those needs. Provide development architecture structures and best practices to build these architectures. During high-performance architecture design, we can provide logical-level discussions to evaluate the types of basic services and products needed for specific situations. Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs. When the transmission medium is implemented, they reduce the time required to implement commercial solutions by providing a "Starter Kids" framework. When the transmission medium was set up, they leveraged the technology in the business by leveraging the following methods: * Reduce operating and maintenance costs by limiting the number of different technologies and the number of skills required to support them. 4HICKMAN200036TW; AND1P282.TW 37 This paper size is applicable to the Chinese National Standard (CNS) A4 (210 X 297 mm) 491972 A7 B7 V. Description of the invention (38) ♦ Reduce the technical cost of implementation and development. ----------- Installed! (Please read the notes on the back before filling out this page) Note: Anthracene: The transmission medium structure provides a method to organize technical architecture information. When providing such content to the customer, we must modify the information presented in accordance with the customer's background and terminology familiar to the customer. Selection of Technology Generation Archives This section should assist an architect in understanding the characteristics of a specific technology generation and the implications of selecting a specific technology generation. When planning and designing a system, the pros and cons of each technology generation should be understood. When identifying the core technologies used in an architecture, one should consider a customer's existing IT architecture 600 perspective, guiding principles 602, and business imperative 604, as shown in Figure 6. It is important to understand that different, static divisions do not lie between different technology generations. It is possible that an architecture is composed of more than one generation of components. The goal should be to understand the pros and cons of the different technology options available to each component, and to choose the most appropriate based on customer needs. Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs It is even more important to balance existing systems and integrate them with new applications. A typical solution involves a large-scale computer legacy system. As a server in a master-slave architecture, an application server can be built from Power Builder and Visual Basic built in traditional GUI clients, and from a web server through a web server. Road-based front-end access. 4HICKMAN200036TW; AND1P282.TW 38 This paper size applies to Chinese National Standard (CNS) A4 (210 X 297 mm) Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 491972 ΚΙ Β7_ V. Description of invention (3?) In view of this, a newly customized application should generally use the latest architecture generation to ensure that the application can survive longer with the ability to respond to future changes. This means that all new applications should ideally be based on a Netcentric Architecture, rather than a traditional master-slave architecture or a host-based architecture. However, choosing a generation is not just a technical decision. Often the main technical architecture decisions are determined by factors that are not technical in nature, such as financial factors, internal and customer policies, and implementation / operational considerations. When deciding whether to apply a network-centric solution, that is, a combination of network-based server interfaces and Internet application types, we must keep in mind that these technologies are not a panacea, but only for substantial business reasons. Should only be used next. They need new investments in skills, tools, development and operating procedures. Due to the relative immaturity of work and products, they also represent additional risks in terms of technology, such as performance and reliability, and strategies, such as supplier and product quality and stability. Regardless, today's programs should often consider the possibility of using web-centric technologies. It is important to measure whether an application can benefit from a network-centric implementation immediately or in the future. Even if you decide to use a traditional master-slave approach (such as the use of Power Builder and Visual Basic), you should consider the significant reduction in software package and decentralization costs resulting from the use of network-centric concepts. Such 4HICKMAN200036TW; AND1P282.TW 39 This paper size is applicable to Chinese National Standard (CNS) A4 (210 X 297 mm) (Please read the precautions on the back before filling this page). __ 丨 丨 Order --- ------ Antimony 491972 A7 B7 V. Description of the invention (40) The idea consists of three or more layers of architecture plus more business logic, flexible security architecture and user interface ideas residing on the server, which can be found in The rear port is on a web browser. A network-centric architecture usually still supports the development of master-slave applications. Since the traditional master-slave system usually puts the substantial part of the business logic on a large client, and the network-centric architecture still prefers most of the business logic to stay on the server, the opposite state is not always true. At the same time, the network center tends to be more loosely connected than the (statically dominated two layers) master-slave system. The following sections identify key features related to network-centric master-slave or master-based technology generations. This list is by no means complete or exhaustive, but is included as a starting point for the validation process. Network Center Architecture Generation If most of the statements in Figure 7 are true, we should consider an application based on the Network Center Generation. The importance of each statement in Figure 7 is detailed below, and it should help confirm the appropriate answer to the set of customer engagements. Existing Architecture and Infrastructure 700 E1. Other network-centric applications are developed and produced. If they are not completely unfamiliar with the characteristics of technology, the user community is often less resistant to business drivers who use new technologies to propose changes. If according to an application of the network center architecture 4HICKMAN200036TW; AND1P282.TW 40 This paper size applies the Chinese National Standard (CNS) A4 specification (210 X 297 mm) (Please read the precautions on the back before filling this page) Decoration · Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs ^ / 2 A7 -______ B7_____ 5. Description of the invention (4 彳) Pilot sale and deployment have been successfully conducted, and it will be easier to accept additional systems. Ε2. The customer has important technical skills in his IT department. This is especially important if the customer plans to develop or operate the application themselves. In order to successfully deploy this type of system, considerable investment in training and internal training may be necessary. The customer must have a culture that supports the change. Some organizations are quite conservative and strong, making it harder to deliver a success with new technology. Ε3 · Customers have multiple hardware / operating system settings for their client machines. In a traditional master-slave environment, for an enterprise, spreading an application in or out requires the application to port, recompile, and test for a particular workstation operating system. Using universal clients and web browsers can reduce many of these problems by providing a consistent and familiar user interface on many different operating systems and hardware platforms. E4. The application will run on a device other than a personal computer. The power of the Internet places a lot of pressure on the vendors of various web-enabled devices. The Internet infrastructure is in place, making it easier for business people to create new physical devices from accessible electronic information. For example, Internet TV is gaining momentum. Users can now access the Internet via television. Network computers (thin-client devices) downloaded and used from a central maintenance server generate a lot of benefits. At the same time, users want to access the same information from multiple physical devices. 4HICKMAN200036TW; AND1P282.TW 41 This paper size is applicable to Chinese National Standard (CNS) A4 (210 X 297 mm) (Please read the precautions on the back before filling out this page) Binding ·· Printed by the Intellectual Property Bureau of the Ministry of Economic Affairs and the Consumer Consumption Cooperative 491972 Printed by the Consumer Property Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs A7 __B7____ V. Invention Description (42) For example, a user may want to use a mobile phone, an Internet TV, or their portable individuals Access his / her email on the computer. E5. The existing legacy system can be scaled up to serve many potential listeners. Expanding the user base of legacy mainframe or master-slave systems by including audiences outside the company can significantly increase system usage. The additional requirements and increased use placed on existing systems are difficult to assess or predict. Analysis must be performed to ensure that existing legacy systems and infrastructure can absorb this increase. The business order 702 B1 client needs to use this application to contact a new external audience. This is the main reason for choosing a network-centric architecture. Through the proper use of network center architecture, it is often possible to gain exposure to new customers and markets. By providing new services and products to its customers, clients can often achieve significant competitive advantages. At the same time, this new pipeline makes it technically feasible to develop a new generation of "market-of-one" products, and each customer can easily and repeatedly customize products according to their preferences. B 2. Customers need to use this application to connect with a wide or diverse internal audience. The configuration management of traditional master-slave applications is a major issue for many companies. Configuration management tends to be essentially distributed to clients and servers. Installed as a large execution file or several small executions, the software distribution makes even small updates to a small user population difficult. Every time an update is made, a process must be started to distribute the new code to all client machines. This browser center application type is for distributed functions to internal and 4HICKMAN200036TW; AND1P282.TW 42 This paper size applies to China National Standard (CNS) A4 specifications (210 X 297 mm) (Please read the precautions on the back before filling in this Page) 装 0 # · 外 1972 A7 --- __ B7 ----------- 5. Description of the invention (43) The traditional problems of external users provide an option. IT Guiding Principle 704 G1. Customers are early adopters of new technologies. The implementation of a network-centric architecture can help customers fulfill a number of business benefits. However, introducing new technologies to an organization does have its inherent risks and can cause a lot of change. The customer should have the culture to receive the necessary changes. 〇2. Applications should be developed to handle non-specialized or occasional users. Non-professional users need a simple and well-known interface to be able to use the application. When people become accustomed to web browsers, this is their preferred user interface. A consistent interface provided by a web browser will help reduce the learning curve required to become familiar with new applications. G3. Where appropriate, applications should be developed with multimedia capabilities to display information (text, sound, video, etc.). Digitizing, organizing, and transmitting text, pictures (such as video, sound, etc.) and other information other than traditional materials to a wider range of users, so that people and companies have new ways to work together. Web-centric technologies (such as HTML documents, plug-ins and JAVA, etc.) and media information formats have led to support for these types of complex documents and applications. Network bandwidth is still a performance issue. However, advances in network technology and compression technology have resulted in richer media enablement (me d i a-e n a b 1 e d) files and applications on the network.

4HICKMAN200036TW; AND1P282.TW 4: 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) " " (請先閱讀背面之注意事項再填寫本頁) 裝 訂: 經濟部智慧財產局員工消費合作社印製 竹 19724HICKMAN200036TW; AND1P282.TW 4: This paper size applies to China National Standard (CNS) A4 (210 X 297 mm) " " (Please read the notes on the back before filling this page) Binding: Intellectual Property Bureau, Ministry of Economic Affairs Employee Consumer Cooperative Printed Bamboo 1972

五、發明說明(44) 經濟部智慧財產局員工消費合作社印製 G4.執行、操作與開發架構將被設計成支援頻繁的將加強 (enhancement) /修正(―心以以1011)釋出到產品 應用程式。 極重要的是,現今市場中的公司應該能夠很快地修改 他們的商業程序以應付業界的變化。一網路中心架構簡化 了頻繁的將軟體釋出到內外使用者。 客戶/伺服器網路世代 假如,根據客戶要求,第8圖中大部分的聲明是真實 的,吾人應該考慮根據主從技術世代的應用程式。 以下章節詳列第8圖中每個聲明的重要性,並且應該 幫助識別特定客戶保證的的適當答案。 現存架構與基礎結構800 E1·其他的主從應用程式已經被開發並開始生產,而且客 戶端IT組織包括熟習主從架構槪念的人員。 就如同任何新技術,相關於獲得主從發展技巧也具有 一學習曲線。當使用熟悉的工具與環境時,開發程序常常 更爲有效率。新技術的引進也會造成操作環境的不穩定。 主從系統對很多IT部門來說仍爲新技術。 商業命令802 B1應用程式只能由一內部使用者族群所使用。 由於執行檔與資料檔案需要常駐在客戶端硬碟中,軟 4HICKMAN200036TW; AND1P282.TW ,, 本紙張尺度適用中國國家標準(CNS)A4規格(21〇 x 297公釐) (請先閱讀背面之注意事項再填寫本頁)V. Description of the Invention (44) Printed by the Consumer Property Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs, G4. The implementation, operation and development framework will be designed to support frequent enhancements / corrections ('heart to 1011) released to the product application. It is extremely important that companies in today's market should be able to quickly modify their business processes to cope with changes in the industry. A network-centric architecture simplifies the frequent release of software to internal and external users. Client / Server Network Generation If, according to customer requirements, most of the statements in Figure 8 are true, we should consider applications based on the master-slave technology generation. The following sections detail the importance of each statement in Figure 8 and should help identify the appropriate answer that a particular customer guarantees. Existing architecture and infrastructure 800 E1 · Other master-slave applications have been developed and production started, and the client IT organization includes people familiar with master-slave architecture concepts. As with any new technology, there is a learning curve associated with acquiring master-slave development skills. When using familiar tools and environments, developing programs is often more efficient. The introduction of new technologies can also cause instability in the operating environment. Master-slave systems are still new technology to many IT departments. The Business Command 802 B1 application can only be used by an internal user community. As the execution files and data files need to be resident on the client hard disk, software 4HICKMAN200036TW; AND1P282.TW ,, this paper size applies to China National Standard (CNS) A4 specification (21〇x 297 mm) (Please read the note on the back first (Fill in this page again)

經濟部智慧財產局員工消費合作社印製 491972 A7 B7___ 五、發明說明(45) 體分散是傳統主從計算環境考量之一。到客戶端組織外使 用者族群的分散甚至更難以實施與管理,而且將會限制在 少數的主要商業合夥人。 B2.應用程式需要一先進、動態與整合的使用者介面給專 業使用者。 最先進的4GL與3GL發展語言會支持先進的使用者 介面,此介面需要在領域與視窗之間的一可觀程度之背景 管理(context management)。以網路爲基礎的使用 者介面無法良好支援這樣的介面。 B3·對話表現(session performance)對應用程式或 成功使用所必要的次秒反應時間(sub-second response times)是關鍵的。 客戶端伺服器應用程式提供支援交易密集任務關鍵系 統所必要的反應時間。應用程式邏輯與商業資料能在客戶 端與伺服器間分散以獲得最佳效率。以網路爲基礎的介 面,由於無連結通訊、常態資料下載、格式化資訊與小程 式程式碼,仍然具有固有的經常費用。 B4·應用程式必須支援不接線到電腦上之(off-line)行 動使用者 行動電腦計算在職場日漸普及,因此到伺服器的連結 不能爲所有使用者所採用。主從架構考慮到應用程式邏輯 的與或資料的分散。資料與邏輯的回應對在行動電話運作 的應用程式通常是必要的。 4HICKMAN200036TW; AND1P282.TW 45 ¥紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐)~ (請先閱讀背面之注意事項再填寫本頁)Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 491972 A7 B7___ V. Description of the Invention (45) Decentralization is one of the traditional master-slave computing environment considerations. The fragmentation of the user community outside the client organization is even more difficult to implement and manage, and will be limited to a small number of major business partners. B2. Applications need an advanced, dynamic and integrated user interface for professional users. The most advanced 4GL and 3GL development languages will support advanced user interfaces that require a considerable degree of context management between the domain and the window. Web-based user interfaces do not support such interfaces well. B3. Session performance is critical to application or sub-second response times necessary for successful use. Client server applications provide the response time necessary to support transaction-intensive mission-critical systems. Application logic and business data can be distributed between client and server for optimal efficiency. The web-based interface still has inherent recurring costs due to unlinked communication, normal data downloads, formatted information, and small-scale code. B4 · The application must support off-line mobile users. Mobile computer computing is gaining popularity in the workplace, so the connection to the server cannot be used by all users. The master-slave architecture takes into account application logic and / or data dispersion. Data and logical responses are often necessary for applications that operate on mobile phones. 4HICKMAN200036TW; AND1P282.TW 45 ¥ The paper size is applicable to China National Standard (CNS) A4 (210 X 297 mm) ~ (Please read the precautions on the back before filling this page)

491972 A7 B7__ 五、發明說明(46) IT指導原則804 ----— — — — — — I · I I (請先閱讀背面之注意事項再填寫本頁) G1.客戶在內部維護應用程式,而IT部門要有必要的資 源、組織與程序來維持主從應用程式。 將主從應用程式引入到一公司的生產環境需要對發 展、運作與支援生產系統的執行、操作與發展架構多所改 變。在主從應用程式開發之前,很重要的一點是,客戶確 認此款系統如何配合公司的策略技術計畫。 主機架構世代 如果客戶商業與技術的要求合乎如下系統特性,則根據主 機技術世代的應用程式應該給予考慮。 以下章節詳述第9圖中每一個聲明的重要性,並且協助確 認一特別客戶保證的適當答案。 現存架構與基礎結構900 E1.客戶現在都維護與操作以主機爲基礎的應用程式,而 IT組織包括熟悉這些型態應用程式開發與操作的人員。 很少組織單單只引入以主機爲基礎的生產系統。通常 此型系統的基礎結構已經存在。新的開發並不普遍,通常 現存舊有系統有必要擴充。 經濟部智慧財產局員工消費合作社印製 主機系統通常具有成熟而穩定的操作環境。注意大型電腦 的專業技術目前很貴且需求量很大。 商業命令902 B1.應用程式僅由專門專業的使用者族群所使用,不需要 4HICKMAN200036TW; AND1P282.TW 46 I紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐f 491972 A7 B7 五、發明說明(47) 圖形使用者介面。 週轉率低且熟悉特性基礎應用程式3270的專業工作 人員,減少圖形使用者介面的需要。 B2.應用程式需要大量的重複交易。 大型電腦提供的高度處理能力考慮到具有極高性能要 求應用程式的開發。 Β3.該應用程式需要可觀的批次處理。 大型電腦也許依然是最有力的平台以供大規模的批次 處理。成熟的工具存在以排程、恢復/重開機、分類、合 倂與移動大組資料。 Β4·終端使用者可隨時維持到主機的實體連結。 需要到主機的貫體連接以使用應用程式^具有資料分 散或商業邏輯的行動電腦計算或商業邏輯的方法是不可能 的。 Β5·該應用程式必須要支持大量的使用者(>1〇〇〇) 大規模、任務關鍵且具有使用者基礎的應用程式借重 今曰大型電腦的處理能力甚多。 IP指導原則904 G1·客戶擁有開發與操作以主機爲基礎的應用程式所需的 資源、組織以及程序。 在以主機爲架構開發出來之前,很重要的一點是,客 戶確認此款系統如何配合公司的策略技術計畫。 G2·依賴單一供應商(IBM)來解決技術問題是可以接受 4HICKMAN200036TW; AND1P282.TW 47 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) -----------裝--- (請先閱讀背面之注意事項再填寫本頁) 經濟部智慧財產局員工消費合作社印製 491972 A7 ___B7__ 五、發明說明(4¾ ) 的。 以主機爲基礎的架構的選擇使客戶受限於依賴一家供 應商以得到技術上的解決方案 。儘管萬國商務機器 (IBM)是一個有聲望且穩定的公司,確保IBM技術眼 光與領導將會支援客戶的長期商業策略是很重要的。 G3.集中的應用程式與資料是可以接受的策略。 一純粹以主機爲基礎的架構減少分散資料與商業邏輯 給客戶的可能性。這樣一來移除了一些應用分散策略可看 到的應用性能表現,然而到商業邏輯與商業資料的集中存 取可以改善操作安定並可降低成本。 現在的趨勢是將以大型電腦爲基礎的舊有系統轉變成在多 層主從或網路中心架構中的資料與應用程式伺服器。 結構的槪觀 當考慮使用什麼結構時,應將下列事項謹記在心: * 何時D A F的各種結構可以使用 * 結構是如何聯繫的 與傳送媒介關聯的結構 DAF的多數結構提出傳送媒介架構的種種層面。 DAF提供到一思考程序的存取,此思考程序有關於領導 與供執行、開發以及操作環境的架構結構。簡單的說, DAF包括: * 給不同架構世代的核心執行(core execution) 架構結構(主機、主從與網路中心的)。大部分 4HICKMAN200036TW; AND1P282.TW 48 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) (請先閱讀背面之注意事項再填寫本頁) 裝 訂-· 經濟部智慧財產局員工消費合作社印製 491972 A7 B7____ 五、發明說明(4 ) 使用者大多會使用網路中心結構。 * 執 fT 架構擴充部分(execution architecture extension)。這些結構用特定於特定傳送媒介 的服務擴充核心結構。 •開發架構結構應該幫忙建立與操作高品質的開發 環境。 *操作架構結構應該幫忙建立與操作高品質的操作491972 A7 B7__ V. Description of Invention (46) IT Guiding Principle 804 ----—— — — — — — I · II (Please read the notes on the back before filling this page) G1. The customer maintains the application internally, and IT departments need the resources, organization, and procedures to maintain master-slave applications. Introducing master-slave applications into a company's production environment requires changes to the development, operation, and support of the production system's implementation, operation, and development architecture. Before developing master-slave applications, it is important that customers confirm how this system fits the company's strategic technology plans. Mainframe Architecture Generations If customer business and technology requirements meet the following system characteristics, then applications based on the mainframe technology generation should be considered. The following sections detail the importance of each statement in Figure 9 and assist in identifying appropriate answers that a particular customer guarantees. Existing Architecture and Infrastructure 900 E1. Customers now maintain and operate host-based applications, and IT organizations include personnel familiar with the development and operation of these types of applications. Few organizations simply introduce host-based production systems. Usually the basic structure of this type of system already exists. New development is not common, and it is often necessary to expand existing legacy systems. Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs The mainframe system usually has a mature and stable operating environment. Note that expertise in mainframe computers is currently expensive and in great demand. Commercial Order 902 B1. The application is only used by specialized user groups. 4HICKMAN200036TW; AND1P282.TW 46 I Paper size is applicable to Chinese National Standard (CNS) A4 specifications (210 X 297 mm f 491972 A7 B7 V. Description of the invention (47) Graphical user interface. Professional staff with low turnover rate and familiarity with the basic application program 3270, reducing the need for a graphical user interface. B2. Application programs require a large number of repeated transactions. High processing power provided by large computers Considering the development of applications with extremely high performance requirements. B3. This application requires considerable batch processing. Large computers may still be the most powerful platform for large-scale batch processing. Mature tools exist to schedule, Restore / restart, sort, combine and move large groups of data. Β4. End users can maintain a physical connection to the host at any time. A continuous connection to the host is required to use the app Computing or business logic methods are not possible. B5 · The application must support a large number of (≫ 100) Large-scale, mission-critical, and user-based applications rely on the processing power of today's mainframes. IP Guiding Principles 904 G1 · Customers have the ability to develop and operate host-based applications The resources, organization, and procedures required by the program. Before the mainframe is developed, it is important that customers confirm how this system fits the company's strategic technology plan. G2 · Reliance on a single vendor (IBM) to solve Technical problem is acceptable 4HICKMAN200036TW; AND1P282.TW 47 This paper size is applicable to China National Standard (CNS) A4 specification (210 X 297 mm) ----------- install --- (Please read the back first Please pay attention to this page, please fill out this page) Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economy 491972 A7 ___B7__ V. Invention Description (4¾). The choice of host-based architecture limits customers to rely on a supplier for technology Solutions. Although IBM Business Machines (IBM) is a prestigious and stable company, the long-term business strategy to ensure that IBM's technical vision and leadership will support customers is Important. G3. Centralized applications and data are acceptable strategies. A pure host-based architecture reduces the possibility of decentralized data and business logic to customers. In this way, some application decentralized strategies can be seen. Performance, however, centralized access to business logic and business data can improve operational stability and reduce costs. The current trend is to transform legacy systems based on mainframe computers into a multi-layer master-slave or network-centric architecture The data and application server in the structure. Observation of the structure When considering what structure to use, keep the following in mind: * When the various structures of the DAF can be used * How the structure is related to the structure of the transmission medium DAF Most structures propose various aspects of the transport media architecture. DAF provides access to a thinking program that has an architectural framework for leadership and execution, development, and operating environments. In short, DAF includes: * Core execution architecture (master, master-slave, and network-centric) for different architecture generations. Most of 4HICKMAN200036TW; AND1P282.TW 48 This paper size is applicable to China National Standard (CNS) A4 (210 X 297 mm) (Please read the precautions on the back before filling out this page) Binding-· Intellectual Property Bureau, Ministry of Economic Affairs Staff Consumption Printed by the cooperative 491972 A7 B7____ 5. Description of the invention (4) Most users will use the network center structure. * Implementation fT architecture extension (execution architecture extension). These structures augment the core structure with services specific to a particular transport medium. • The development architecture should help establish and operate a high-quality development environment. * Operational architecture should help establish and operate high-quality operations

-l-yV 壞境。 重£簡務應用稃式結耩 結構槪觀 電子商務市場快速興盛。這點可從以下幾點得到證 明’如日益增加的新電子商務交易網站、每日執行的「價 値交換」交易金額之增加、專注於電子市場之公司與企業 的出現、現有企業於電子市場的匯聚(convergence) 與合夥(partnering)、以及允許每天的使用者在不停 演進的電子市場中滿足它們的需求。 電子商務的一個定義爲:一個企業與外在實體的商業 價値交換一不管是上游供應商、合夥人或下游客戶一在通 用、普遍存在的電子媒介上。 DAF中的電子商務應用程式結構1 000揭露於第10圖中。 電子商務應用程式結構(eCaf)確認並敘述對實施電子商 務商業解決方案有用與必要的應用程式的能力。其提供一 結構,以將商業程序、應用程式與電子商務技術面聯繫在 4HICKMAN200036TW; AND1P282.TW 49 ^紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公fl" -----------_ 裝— (請先閱讀背面之注意事項再填寫本頁) 訂·· 經濟部智慧財產局員工消費合作社印製 經濟部智慧財產局員工消費合作社印製 491972 A7 B7___ 五、發明說明(叨) 一起,同時也提供映射與評估電子商務套裝解決方案 (eCommerce packaged solutions)能力基礎。這個 結構應該用於當作通訊、與設計電子商務商業解決方案的 媒介。 電子商務應用程式結構一直以來是被創造以提供對服 務與應用程式型式的瞭解,這些服務與應用程式是實施電 子商務解決方案所必須的。第11圖揭露了電子商務應用 程式結構1 000、可能的電子商務銷售模式1102、致能技 術1104與致能電子商務套裝軟體1106之間的關係。 電子商務應用程式結構定義一在基礎網際網路或網路 中心致能產品(電子商務套裝軟體)與技術基礎結構(致 能技術)之間的一支持中間層,此兩者是根據上業特定銷 售模式(business-specific selling model )(電子商 務銷售模式)開發電子商務致能網站所必須的。注意電子 商務應用程式結構正好包括中間層。 各解決方案或網站可能有不同的銷售方式、架構、技 術利用、或應用程式。電子商務應用程式結構包含觀念、 應用程式、共通於不同解決方案的服務,並且把他們組成 應用能力。 技術上電子商務商業能力要求一個邏輯的服務編組, 其可履約特定電子商務功能。此功能可能是在基層結構或 或整個應用程式內的單一技術服務。其能力來自調查多層 電子商務套裝軟體與電子商務的實施。隨著電子商務演 進,其分類與能力也隨著變化。 4HICKMAN200036TW; AND1P282.TW 50 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) " (請先閱讀背面之注意事項再填寫本頁)-l-yV bad environment. Emphasis on simple applications, structure, and structural perspective The e-commerce market is booming. This can be proved by the following points: 'such as the increasing number of new e-commerce transaction sites, the increase in the daily value of "price exchange" transactions, the emergence of companies and companies focusing on the electronic market, and the existing companies' Convergence and partnership, as well as allowing everyday users to meet their needs in the evolving electronics market. One definition of e-commerce is: the exchange of business prices between an enterprise and an external entity-whether it is an upstream supplier, partner or downstream customer-on a common, ubiquitous electronic medium. The 1000 e-commerce application structure in DAF is disclosed in Figure 10. The eCaf application structure (eCaf) identifies and describes the capabilities of applications that are useful and necessary for implementing e-commerce business solutions. It provides a structure to link business processes, applications and e-commerce technology in 4HICKMAN200036TW; AND1P282.TW 49 ^ Paper size applies Chinese National Standard (CNS) A4 specification (210 X 297 public fl " ------ -----_ Equipment — (Please read the notes on the back before filling out this page) Order ·· Printed by the Employees 'Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs Printed by the Employees' Cooperatives of the Intellectual Property Bureau of the Ministry of Economy 491972 A7 B7___ Explanation (叨) Together, it also provides the ability to map and evaluate eCommerce packaged solutions. This structure should be used as a medium for communication and design of e-commerce business solutions. E-commerce application structure has always been It has been created to provide an understanding of the types of services and applications that are necessary to implement e-commerce solutions. Figure 11 reveals the structure of an e-commerce application 1000, and possible e-commerce sales models 1102. , The relationship between enabling technology 1104 and enabling electronic commerce suite software 1106. Electronic commerce should The program structure defines a support middle tier between the basic Internet or network-centric enabling products (e-commerce software package) and the technical infrastructure (enabling technology), both of which are based on the industry-specific sales model ( business-specific selling model) (e-commerce sales model) is necessary to develop an e-commerce enabled website. Note that the e-commerce application structure includes exactly the middle tier. Each solution or website may have different sales methods, architecture, technology utilization, Or application. The structure of an e-commerce application contains concepts, applications, services that are common to different solutions, and group them into application capabilities. Technically, e-commerce business capabilities require a logical grouping of services that can perform specific e-commerce functions This function may be a single technical service in the basic structure or in the entire application. Its capabilities come from investigating the implementation of multi-layer e-commerce software packages and e-commerce. As e-commerce evolves, its classification and capabilities also change. ; AND1P282.TW 50 sheets Zhang scale is applicable to China National Standard (CNS) A4 specification (210 X 297 mm) " (Please read the precautions on the back before filling this page)

491972 經濟部智慧財產局員工消費合作社印製 A7 B7 五、發明說明(Μ) DAF電子商務應用程式結構 在DAF中,其能力表現在結構元件與次元件。電子 商務能力說明電子商務能力最高層分類:外部代理器 (external agent)、電子商務規劃(electronic merchandising )、關係管理(relationship management )、維護(maintenance )與行政 (administration ) 、訂單作業(order processing)、客戶服務、安全、決定支援(decision support )以及整合。 在一分類中的能力可涵蓋潛在全範圍銷售模式。有些 元件可能僅特定於企業對企業(business-to-business)買方中心(buyer-centric)的實施。額外 的元件可能隨著技術成熟而出現。 吾人應謹記於心,在DAF中的電子商務應用程式結 構的文件紀錄注重在電子商務應用程式能力。致能技術將 在在DAF其它地方再討論(如下)。銷售模式與電子商 務套裝軟體僅簡略說明。 電子商務致能技術 電子商務實施的致能技術是相同的基層技術,其用於 達成大部分網路中心(在一些情形是主從的)實施。一般 而言,大部分的實施將利用網路中心技術。對網路中心結 構的了解將作爲建構方塊(building block),以供暸 4HICKMAN200036TW; AND1P282.TW 51 本紙張尺度適用中國國家標準(CNS)A4規格(210 x 297公爱) ---------1 I ———訂——I— (請先閱讀背面之注意事項再填寫本頁) 491972 A7 _B7___ 五、發明說明(52)491972 Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs A7 B7 V. Description of Invention (M) DAF e-commerce application structure In DAF, its capabilities are expressed in structural elements and secondary elements. E-commerce capability description The highest level of e-commerce capability classification: external agent, electronic merchandising, relationship management, maintenance and administration, order processing , Customer service, security, decision support, and integration. Capabilities in a category can cover potential full-range sales models. Some components may be specific to a business-to-business buyer-centric implementation only. Additional components may appear as the technology matures. I should keep in mind that the documentation of the e-commerce application structure in the DAF focuses on the ability of the e-commerce application. Enabling technologies will be discussed elsewhere in the DAF (see below). The sales model and e-business package are only briefly explained. E-commerce enabling technology The enabling technology for e-commerce implementation is the same basic technology that is used to achieve most network center (in some cases, master-slave) implementation. In general, most implementations will utilize network-centric technology. The understanding of the structure of the network center will be used as a building block for 4HICKMAN200036TW; AND1P282.TW 51 This paper size applies the Chinese National Standard (CNS) A4 specification (210 x 297 public love) ------ --- 1 I ——— Order——I— (Please read the notes on the back before filling this page) 491972 A7 _B7___ V. Description of the invention (52)

解一電子商務解決方案的技術層面。的資訊可以發現在標 題爲 “ A SYSTEM,METHOD AND ARTICLE OF MANUFACTURE FOR BASE SERVICE PATTERNS IN A NETCENTRIC ENVIRONMENT”的專利申請案,其可爲以上敘述之 參考並且藉由參考可倂入網路中心結構的整體中。 電子商務銷售形式 , 許多不同電子商務解決方案落在電子商務一詞的大傘 下。電子商務的模糊定義使給予本身大領域的實施與可能 性。對目前電子商務市場內網站的調查,揭露大部分價値 交換交易解決方案集中在銷售”產品”。產品可以進一步 分成實體的與電子的。 * 實體的---任何買方可碰到與感覺到的有形產品 (例如車、電冰箱、食物或家具)。這個包含零 售以及經久的貨物。 • 電子的一-任何經電子媒介傳送的產品。這可以包 含內容、資訊、聲音與視訊、或軟體(例如音 樂、財務產品,如保險或共同基金) 在許多價値交換網站中,有三種普遍的銷售模式:賣方中 心、買方中心與拍賣。 賣方中心銷售模式 銷售中心模式是最普遍的。在其最簡單的形式中,一 4HICKMAN200036TW; AND1P282.TW 52 本紙張尺度適用中國國家標準(CNS)A4規格(210; 297公釐) = ' -----------裝·! (請先閱讀背面之注意事項再填寫本頁) 訂: 經濟部智慧財產局員工消費合作社印製Explain the technical aspects of an e-commerce solution. The information can be found in the patent application entitled "A SYSTEM, METHOD AND ARTICLE OF MANUFACTURE FOR BASE SERVICE PATTERNS IN A NETCENTRIC ENVIRONMENT", which can be used as a reference for the above description and can be incorporated into the overall structure of the network center by reference. in. In the form of e-commerce sales, many different e-commerce solutions fall under the umbrella of the term e-commerce. The vague definition of e-commerce gives itself a large field of implementation and possibility. A survey of current websites in the e-commerce market reveals that most price / exchange transaction solutions focus on selling "products". Products can be further divided into physical and electronic. * Physical --- Any tangible product that buyers can come across and feel (such as a car, refrigerator, food, or furniture). This includes retail and durable goods. • Electronic one-any product delivered via electronic media. This can include content, information, sound and video, or software (such as music, financial products, such as insurance or mutual funds). There are three general sales models on many price exchange sites: seller centers, buyer centers, and auctions. Seller center sales model The sales center model is the most common. In its simplest form, a 4HICKMAN200036TW; AND1P282.TW 52 This paper size applies the Chinese National Standard (CNS) A4 specification (210; 297 mm) = '----------- installed ·! (Please read the notes on the back before filling out this page) Order: Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs

公司通常提供有關他們產品的資訊並且給與客戶能力下言了 單。更進步的實施使用電子方法支援整個銷售與支援程 序’其包括:市場、產品展不、行銷規劃、客戶需要評 估、訂單處理與其它很多活動。在大部分賣方中心解決方 案中,由供應商來建造並且維持基礎結構。客戶不外乎需 要瀏覽器與/或到網站的存取。 、 貿方中心銷售模式 在買方中心解決方案中’主要焦點在客戶或買方滿足 其對產品的需要。相反於提供產品的賣方中心網站,買方 中心網站展示買方想買的物品---用以試圖引誘賣方。同 要需要很多相同於賣方中心網站的能力,如訂單管理與付 款能力。在這個情形下,客戶參與或產生一基礎結構,其 集中於滿足他的需求。基礎結構通常提供貿易夥伴之間的 環境,貿易夥伴促進瀏覽與比較產品、訂貨、履約 (fu 1 fi 11 )、付款與任何需要的客戶支援服務。一個重 心應該放在使交易與資訊流通容易上。爲了這個理由,賣 方可以定製其產品線以達到買方特殊的需求。 在多數買方中心的情況中,買方或買方的聯合 (consortium of buyers )提供電子商務基礎結構的主 體(bulk)。額外的整合或設定也許需要或不需要有意 參予的各個貿易夥伴。需要賣方特別組態或整合他們自己 的系統以參予的實施,通常只會在買方在其關係中具有實 質的市場力量時,如在GM®或FORD®,從它們的供應 4HICKMAN200036TW; AND1P282.TW 53 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) (請先閱讀背面之注意事項再填寫本頁) 0 裝 經濟部智慧財產局員工消費合作社印製 經濟部智慧財產局員工消費合作社印製 491972 A7 __B7__ 五、發明說明(54) 商購貿零件。在此情況中,雙方應協議有關共享什麼樣的 資訊、如何將資訊模型化、通信報與通訊的標準、以及將 使用那一種技術。除了整合多種系統的技術障礙與現今軟 體產品的一些未成熟狀態,說服貿易夥伴採用網際網路商 務方式可能也很困難。假如不是特別強而有力的買方,很 難吸引潛在賣方到一個人的網站並費時來瞭解其個人的需 求。這需要賣方去採取跟傳統非常不同的活動,許多賣方 無意爲較小客戶改變他們做生意的方式。 市場的這一部份較慢出現。如上所述,維持貿易夥伴 是主要議題。在主流(hub)末端的公司必須要貿進主流 的實際作法與觀點。將來的觀點與方向亦很重要。一旦變 化已被實施,所有的貿易夥伴要一起推進。從所有夥伴處 購入將有延緩採用新技術與程序創新的潛力,時間一久其 將導致無生氣的最小公約數方法。 仲介商販賣模式 仲介商或拍買型式的解決方案也正在出現,雖然較爲 緩fe。仲介商通常不販買他們自己的產品,而是提供一電 子商務環境以便將多數賣方買方拉在一起。買賣方可利用 仲介商的網站與基礎結構,而不開發與維持它們自己的電 子商務能力。在此情況中,仲介商已然設定了貿賣貨物所 需要的基礎結構。其基礎結構將很相似賣方中心解決方 案’附w增加登日5出買物品(或在買方中心轉換 (twist)—登目己的報價要求(request f〇r qU〇te 4HICKMAN200036TW; AND1P282.TW r 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) (請先閱讀背面之注意事項再填寫本頁) :裝 訂· 經濟部智慧財產局員工消費合作社印製 491972 A7 _______B7____ 五、發明說明(迖) RFQ ))所需的元件、價格談判與投標、以及調停 (reconciliation )服務。 貿易網路(trading network,TN)是仲介網站的 絕佳商業範例。貿易網路的使用人可在貿易網路上發出報 價要求(RFQ’S)。其要求可以是要求原料、元件或成 品。供應商可以自由回答報價要求,只要他們合乎一些基 本只到方針與要求。網路提供一個真的雙臝關係。由於網 路是全球性的,不曾被彼此知道的買賣方可以自由參予。 消費方另一例子是一銷售網站。這樣的網站提供多樣 電腦、電子與健康貨物、以及一般的行銷拍賣。客戶能夠 瀏覽物品以觀看產品資訊以及它們現在的投標價格。有意 願之買方能在線上出價,並比較他們的與他人的出價。拍 賣係以時間爲基礎,並遵守詳細的投標程序。當客戶脫標 (out bid)時,他們將經由電子郵件收到通知並可以選 擇對以反報價(counter bid )作回應。 套裝電子商務軟體 關於套裝電子商務軟體,電子商務應用程式結構提供 瞭解與評估電子商務套裝軟體能力的基礎。 假如套裝軟體是用於實施部分電子商務解決方案,應 該對有關於網路中心結構與銷售模式的基層技術與商業需 求進行分析。去瞭解基層架構與任何固有應用程式限制是 很重要的,限制是來自於用以實施其架構套裝軟體技術選 擇。簡而言之,瞭解從盒子(box )出來的是什麼很重 4HICKMAN200036TW; AND1P282.TW 55 本I張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) " "" ----------裝·!!丨丨丨訂--------- (請先閱讀背面之注意事項再填寫本頁) 491972 A7 B7 五、發明說明(½) 要。記得去了解每一網路中心結構說明的主要元件(例如 網路瀏覽器、網路伺服器)、元件如何通訊以及套裝軟體 以及元件架構有何限制。 很多不同的套裝軟體都以聽起來像”電子商務伺服 器”的名稱出現。每一套可能吹噓所提到的不同問題,如 在架構、基層程序(underlying processes)與技術。 除此之外,它可能宣稱爲希望在網路上交易的企業提供從 頭到尾(end-to-end)的解決方案。現在很難去分別產 品間的差異。電子商務應用程式結構提供了解與評估現存 與新興電子商務套裝軟體能力的基礎。 目前電子商務套裝軟體可以分成下列幾類: * 霤子厣雳工奚游此類包含賴以建立電子商務應 用程式的工具或元件的任意集合。例子包括多 種” Cyber Wallets” 或電子現金(electronic cash)元件。 * 電子商務網際網路應用程式釔m包含m认後铁 特定電子商務商業功能或程序軟體。這個產品是 一個模板(template)或本身是一電子商務致能 應用程式。一個例子可包含提供目錄能力的產品 或協助台(help desk )功能。這常被稱爲垂直 解決方式(vertical solution)。 ♦霪子蔚務f易基礎铉#此類包含提供基礎結構 來支持多重交易電子商務應用程式的套裝軟體。 這些種類的解決方案提供用在許多網站的交易基 4HICKMAN200036TW; AND1P282.TW 56 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) !!^p- I 裝 i I 《請先閱讀背面之注意事項再填寫本頁) 訂· 經濟部智慧財產局員工消費合作社印製 經濟部智慧財產局員工消費合作社印製 491972 A7 ____B7______ 五、發明說明(钉) 礎結構。 一個複雜的電子商務解決方案可能潛在地利用所有這 三種分類,加上整合他們所需的任何定製程式碼 (custom code) 0 外部代理器1002 第12圖揭露方法120 0在網路上自動服務執行的流程 圖。當在操作1 202中於網路上接到一個服務要求,在操 作1204中搜尋網路上有關一產品的資訊以執行此服務。 資料包含由網路資訊所選出產品的價格,而此服務係利用 操作1206與12〇8中的賓料據以執行。 服務包括根據使用者簡介與歷史提供建議。所要求的 服務包含資料的檢索。第三,所要求的服務可包含產品比 較。一選擇是,資料可進一步包含詳細產品屬性。另一選 擇是,其它代理器的服務亦可用於執行此服務。 在網際網路上,代理器1 300 (亦稱爲智慧代理器) 是一個程式,其收集資訊並在沒有使用人的介入下執行〜 •些其它服務。見第10圖與第13圖。通常一個代理器利用 使用人提供的常數以查詢所有或部分網際網路,蒐集所要 求的資訊,並將其呈現給提出要求的使用人。智慧外部代 理器技術將隨著電子商務市場開發繼續成長。當市場充斥 著產品與資訊,對於過濾資訊的技術與代理器將會成長。 4HICKMAN200036TW; AND1P282.TW 57 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) ----------裝--------訂---------^^1 (請先閱讀背面之注意事項再填寫本頁) 491972 A7 B7 經濟部智慧財產局員工消費合作社印製Companies often provide information about their products and give orders to customers. More advanced implementations use electronic methods to support the entire sales and support process, which includes: marketing, product shows, marketing planning, customer needs assessment, order processing and many other activities. In most Seller Center solutions, the infrastructure is built and maintained by the supplier. The client simply needs a browser and / or access to the website. 2. Sales center sales model In the buyer center solution, the main focus is on the customer or the buyer to meet their product needs. In contrast to a seller-centric website that offers products, a buyer-centric website displays items that the buyer wants to buy-in an attempt to entice the seller. It also requires many of the same capabilities as the Seller Central website, such as order management and payment capabilities. In this case, the client participates or generates an infrastructure that focuses on meeting his needs. The infrastructure usually provides an environment between trading partners who facilitate browsing and comparing products, ordering, fulfillment (fu 1 fi 11), payments and any customer support services needed. A focus should be on making transactions and information flow easier. For this reason, the seller can customize its product line to meet the buyer's special needs. In the case of most buyer centers, the buyer or buyer's consortium of buyers provides the bulk of the e-commerce infrastructure. Additional integrations or settings may or may not require the intention of participating individual trading partners. Sellers need to specifically configure or integrate their own systems to participate in the implementation, usually only when the buyer has substantial market power in their relationship, such as in GM® or FORD®, from their supply 53 This paper size applies to China National Standard (CNS) A4 (210 X 297 mm) (Please read the notes on the back before filling out this page) 0 Installed by the Intellectual Property Bureau of the Ministry of Economic Affairs and printed by the Consumer Cooperative of the Ministry of Economic Affairs Printed by Employee Consumer Cooperatives 491972 A7 __B7__ V. Description of Invention (54) Commercially purchased and traded parts. In this case, the two parties should agree on what information to share, how to model the information, the standards for telegrams and communications, and which technology will be used. In addition to the technical barriers to integrating multiple systems and some of the immature state of today's software products, persuading trading partners to adopt Internet business methods can also be difficult. Without a particularly strong buyer, it is difficult to attract potential sellers to a person's website and take time to understand their individual needs. This requires sellers to take very different activities than traditional, and many sellers have no intention of changing the way they do business for smaller customers. This part of the market appears slowly. As mentioned above, maintaining trading partners is the main issue. Companies at the end of the mainstream (hub) must trade into the mainstream's practices and perspectives. Future perspectives and directions are also important. Once the changes have been implemented, all trading partners need to move forward together. Buying from all partners will have the potential to delay the adoption of new technologies and process innovations, which over time will lead to a lifeless minimal common divisor approach. Intermediary sales model Intermediary or auction-type solutions are also emerging, although more slowly. Intermediaries do not typically sell their own products, but instead provide an e-commerce environment to bring most sellers and buyers together. Buyers and sellers can take advantage of intermediary websites and infrastructure without developing and maintaining their own e-commerce capabilities. In this case, the intermediary has already set up the necessary infrastructure for trading goods. Its basic structure will be very similar to the solution of the seller's center 'with the addition of 5 to buy items on the date (or change in the buyer's center (twist)-Dengmu own quotation requirements (request f〇r qU〇te 4HICKMAN200036TW; AND1P282.TW r This paper size applies to China National Standard (CNS) A4 (210 X 297 mm) (Please read the precautions on the back before filling out this page): Binding · Printed by the Intellectual Property Bureau Staff Consumer Cooperative of the Ministry of Economy 491972 A7 _______B7____ V. Description of the Invention (ii) RFQ)) required components, price negotiation and bidding, and reconciliation services. A trading network (TN) is an excellent business example for an intermediary website. Users of the trade network can issue RFQ ’S on the trade network. The requirements may be required raw materials, components or finished products. Suppliers are free to answer quotation requests as long as they meet some basic guidelines and requirements. The Internet provides a true double-naked relationship. Because the network is global, buyers and sellers who are not known to each other are free to participate. Another example of a consumer is a sales website. Such sites offer a variety of computer, electronics and health goods, as well as general marketing auctions. Customers can browse items to view product information and their current bid prices. Prospective buyers can bid online and compare their bids with others. The auctions are time-based and follow detailed bidding procedures. When customers are out of bid, they will be notified via email and have the option to respond to counter bids. Packaged e-commerce software About packaged e-commerce software, the structure of the e-commerce application provides a foundation for understanding and evaluating the capabilities of the packaged e-commerce software. If the software package is used to implement some e-commerce solutions, it should analyze the underlying technology and business needs related to the network center structure and sales model. It is important to understand the underlying architecture and any inherent application limitations, which come from the choice of software technology used to implement its architecture package. In short, understanding what comes out of the box is heavy 4HICKMAN200036TW; AND1P282.TW 55 This I-size is applicable to the Chinese National Standard (CNS) A4 specification (210 X 297 mm) " " "- --------- Installed! !!丨 丨 丨 Order --------- (Please read the notes on the back before filling out this page) 491972 A7 B7 V. Description of the invention (½) Yes. Remember to understand the main components (such as web browsers, web servers) of each network center structure description, how the components communicate, and what are the limitations of the software package and component architecture. Many different packages appear under a name that sounds like "e-commerce server". Each set may boast about the different issues mentioned, such as in architecture, underlying processes and technology. In addition, it may claim that companies wishing to trade on the Internet provide end-to-end solutions. It is difficult to distinguish between products. The e-commerce application structure provides the foundation for understanding and evaluating the capabilities of existing and emerging e-commerce software packages. Currently, e-commerce software packages can be divided into the following categories: * Any kind of collection of tools or components that are used to create e-commerce applications. Examples include multiple “Cyber Wallets” or electronic cash components. * The e-commerce Internet application Y contains m specific iron specific e-commerce business functions or program software. This product is a template or an e-commerce enabled application itself. An example might include a product that provides directory capabilities or a help desk function. This is often called a vertical solution. ♦ 霪 子 蔚 蔚 f 易 基 铉 # This class contains software packages that provide the infrastructure to support multi-transaction e-commerce applications. These kinds of solutions provide transaction bases used on many websites. 4HICKMAN200036TW; AND1P282.TW 56 This paper size is applicable to China National Standard (CNS) A4 (210 X 297 mm) !! ^ p- I 装 i I "Please first (Please read the notes on the back and fill in this page.) Order Printed by the Employees 'Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs Printed by the Employees' Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 491972 A7 ____B7______ 5. Description of the invention (nail) Infrastructure. A complex e-commerce solution could potentially use all three categories, plus any custom code needed to integrate them 0 External agent 1002 Figure 12 reveals method 120 0 Automatic service execution on the network Flowchart. When a service request is received on the network in operation 1 202, the service is searched for information on a product on the network in operation 1204. The data includes the price of the product selected by the network information, and this service is performed using the guest data in operations 1206 and 1208. Services include advice based on user profiles and history. The requested service includes retrieval of information. Third, the required service may include product comparisons. Alternatively, the data may further include detailed product attributes. Alternatively, the services of other agents can also be used to perform this service. On the Internet, Agent 1 300 (also known as Smart Agent) is a program that collects information and executes it without the intervention of a user ~ Some other services. See Figures 10 and 13. Usually an agent uses the constant provided by the user to query all or part of the Internet, collects the requested information, and presents it to the requesting user. Smart external agent technology will continue to grow as the e-commerce market develops. As the market is flooded with products and information, technologies and agents for filtering information will grow. 4HICKMAN200036TW; AND1P282.TW 57 This paper size is applicable to China National Standard (CNS) A4 (210 X 297 mm) ---------- installation -------- order ----- ---- ^^ 1 (Please read the notes on the back before filling out this page) 491972 A7 B7 Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs

五、發明說明(α) 茼業驅動者 雖然在網際網路上有大量的資訊與工具,它仍然是被 動的要求使用人爲了獲得他們所需要的資訊而瀏覽大量的 資料。先進智慧代理器技術的引入可能將網際網路轉換成 主動網路,透過主動網路使用人能夠委派工作給電腦程 式,以站在使用人的立場來完成工作。依照本發明具體實 施例的一代理器,有能力從網路中的一個地方將自己傳送 到另一個地方’過濾有關資料來以執行其工作。軟體能設 計成根據使用人的檔案與歷史提供建議,並且隨著從經驗 以及與其它代理器的互動中學習已改變其行爲 (behavior ) 〇 智慧代理器有下列特性: #移動性-一在電子網路到處移動的能力; •自治…-代理器不需要人或其他代理器的直接即可 運作’而且對它們的行動與內部狀況具有某種程 度的控制; 鲁適應性---代理器可以調整本身配合其使用者的習 性、工作方法與喜好。 一典型的代理器是 Bargain Finder。Bafgain F i n d e r代理窃是用在比較式採購音樂匚〇的一智慧代理 器。一使用者可請求代理器按照特定藝術家與專輯去查 尋。代理器查尋已知來源,收集所需資訊,並傳回附有價 格以及規格的比$交表給請求人。如果這個觀念應用到商業 4H1CKMAN200036TW; AND1P282.TW -----------•裝 (請先閲讀背面之注意事項再填寫本頁)V. Description of Invention (α) Dedicated Drivers Although there are a large number of information and tools on the Internet, it is still a requirement that users use them to browse a large amount of information in order to obtain the information they need. The introduction of advanced smart agent technology may transform the Internet into an active network, through which users can delegate work to computer programs to complete work from the user's standpoint. An agent according to a specific embodiment of the present invention is capable of transmitting itself from one place on the network to another place 'to filter relevant data to perform its work. The software can be designed to provide suggestions based on the user's profile and history, and its behavior has changed as it learns from experience and interaction with other agents. The smart agent has the following characteristics: # mobility- 一 在 电子The ability of the network to move around; • Autonomous ...- agents do not need the direct action of people or other agents' and they have some degree of control over their actions and internal conditions; Lu adaptability --- agents can The adjustment itself matches the habits, working methods, and preferences of its users. A typical agent is Bargain Finder. Bafgain F i n d e r Agent thief is a smart agent used in comparative purchasing of music. A user can ask the agent to search for a particular artist and album. The agent searches for known sources, collects the required information, and returns a comparison form with price and specifications to the requester. If this concept is applied to business 4H1CKMAN200036TW; AND1P282.TW ----------- • equipment (Please read the precautions on the back before filling this page)

•I n ϋ H ϋ H ϋ n n ϋ 1 I 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) 491972 A7 B7____ 五、發明說明(59 ) 世界,潛在價値將大大地增加。 一企業可以利用較大規模的相似觀念,允許使用者佔 最低價的便宜。如果存在足夠的供應商,一企業可產生一 代理器去尋找建構材料或裝配元件的最好價格。如此一 來’代理器可以在材料成本與人員上節省可觀金錢。 向內(Inbound)與向外(Oubound)代理器 從網站的觀點,有向內與向外的代理器。一向外代理 器是由一網站送出的代理器以收集資訊。舉例來說,一個 販賣數位貨物的網站可能會將特定的數位浮水印嵌入其數 位貨物。然後其可以產生一代理器去找出網路上的浮水印 以決定是否有未受權的使用存在。另一個例子是競爭分析 (competetive analysis)。一個網站可產生一代理器 以對競爭網站的現貨價與產品列表進行調查,以便使自己 網站物品的定價有競爭性。 另一方面,網站可以與向內代理器進行交易。有理解 力、智慧採購助理的出現是向內代理器的主要例子。代理 器可進入網站以企圖搜尋有關產品、可利用性與價格的資 訊。舉例來說,一網際網路購買者可利用購物代理器提出 對特殊產品的請求。採購代理器決定郝個網站可具有相關 資料,與網站互動以收集任何所需資料,並且準備包含詳 細產品資訊、產品比較與價格列表報告給使用人。從販售 貨物的網站之觀點,代理器可視爲向內客戶。 本質上,代理器可同時爲向內與向外,視網站的觀點 4HICKMAN200036TW; AND1P282.TW 59 本^氏張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) ~ (請先閱讀背面之注意事項再填寫本頁) 裝 經濟部智慧財產局員工消費合作社印製 491972 A7• I n ϋ H ϋ H ϋ n n ϋ 1 I This paper size applies to the Chinese National Standard (CNS) A4 (210 X 297 mm) 491972 A7 B7____ V. Description of the invention (59) In the world, the potential price will increase significantly. A business can take advantage of similar concepts on a larger scale, allowing users to take advantage of the lowest price. If there are enough suppliers, a company can generate an agent to find the best price for construction materials or assembly components. In this way, the agent can save considerable money in material costs and personnel. Inbound and Oubound agents From the website's perspective, there are inbound and outbound agents. An outbound agent is an agent sent by a website to collect information. For example, a website that sells digital goods may embed a specific digital watermark into its digital goods. It can then generate an agent to find the watermark on the network to determine if there is an unauthorized use. Another example is competitive analysis. A website can generate an agent to investigate the spot prices and product listings of competing websites in order to make the pricing of its website items competitive. On the other hand, websites can transact with inbound agents. The emergence of intelligible, intelligent purchasing assistants is a prime example of inward agents. Agents can access websites to try to find information about products, availability and prices. For example, an Internet buyer may use a shopping agent to make a request for a particular product. The purchasing agent decided that Hao's website could have relevant information, interact with the site to collect any required information, and prepare to report to the user with detailed product information, product comparisons and price lists. From the point of view of a website that sells goods, an agent can be considered an inbound customer. In essence, the agent can be both inward and outward, depending on the website's point of view 4HICKMAN200036TW; AND1P282.TW 59 This standard scale applies to China National Standard (CNS) A4 (210 X 297 mm) ~ (Please read first (Notes on the back, please fill out this page) Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs 491972 A7

五、發明說明(6〇 ) 而疋。如果網站是代理益的起始者(丨n丨t i a t 〇 r ),則代 理器被視爲向外的。同一代理器對其互動以收集資訊的網 站來說,可視爲的向內的。 經濟部智慧財產局員工消費合作社印製 代理器技術 代理器背後的技術一直在演進。代理器通常要求比目 前網路工作與電腦標準如T C P /1P與C 〇 R B A所提供者更 多的分散處理與通訊能力。這些標準不能容納互動的靈活 度與多樣性,互動是代理器、使用者、其它代理器與系統 間所需要的。現在已可利用中間體支援(middleware support),到程序間通訊的中間體支援是很原始的。 tcp/ip滿足了必要的輸送功能;Remote ProcedureCall(RPC)與插槽資料庫(socket libraries )考慮到基本的資訊交換與TCP/IP頂層的程序 祈願(invocation of procedures );以及 COBRA 追 加選路、命名服務與資料形式轉換。 代理器、使用者與其它代理器以及系統間的彈性、可 調整互動,需要一語言與通訊協定以指定或定製代理器的 動作,不管他們的移動性如何。其語言的一些聲明將允許 代理器介面的一特定元件與服務的彈性互動。這些服務仲 介者將允許進來的代理器詢問所提供服務的性質與他沒使 用的時機。調查正進行對語言、他們的語意 (semantics )、他們的語法以及如何與代理器系統整 合。5. Description of the invention (60) And 疋. If the website is the originator of the agent's benefit (n), then the agent is considered to be outward. The same agent can be considered inward for the websites that it interacts with to gather information. Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs Agent technology The technology behind agents has been evolving. Agents usually require more decentralized processing and communication capabilities than those provided by current network work and computer standards such as TCP, / 1P, and CRC A. These standards cannot accommodate the flexibility and variety of interactions that are needed between agents, users, other agents, and the system. Middleware support is now available, and intermediate support for inter-program communication is very primitive. TCP / IP meets the necessary transport functions; Remote ProcedureCall (RPC) and socket libraries take into account basic information exchange and TCP / IP top-level invocation of procedures; and COBRA additional routing, Naming services and data format conversion. Flexible, adjustable interaction between agents, users and other agents and systems requires a language and communication protocol to specify or customize the actions of the agents, regardless of their mobility. Some statements in its language will allow a particular component of the agent interface to flexibly interact with the service. These service intermediaries will allow the incoming agent to ask about the nature of the service provided and when it is not used. Investigations are ongoing on languages, their semantics, their grammar, and how they integrate with agent systems.

4HICKMAN200036TW; AND1P282.TW 60 ------------裝— (請先閱讀背面之注意事項再填寫本頁) is 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) 外 1972 A7 B7 五、發明說明(Μ) 同輩間的電腦計算允許工作站同時傳送與主持多樣服 務請求。安全、可靠與完整性議題需要探討,尤其因爲市 場對主從環境有高期望。異步分散的電腦計算最好用行動 代理器處理。一行動代理器不是在一客戶端與多個伺服器 間編永久、複雜交換的程式碼,而是〜個帶著具有所有所 需程序的緊密程式以供在遠端執行互動。 電子行銷1004 第14圖揭露方法1400的流程圖,供在網路上建議網 路上的產品。一產品的資訊顯示在操作1402中。其產品 資訊包括產品規格、圖樣、視訊影像、數位樣本與/或存 貨可利用性。在操作1404,提供一搜尋機制以找出在網 路上與產品相似的物品。在操作1406中建議於搜尋期間 所找到之相似於產品的物件。在操作1408中允許在網路 採購時選擇產品以及與產品相似之物品。 一選擇是,同時提供產品的可下載樣本。另一選擇 是,也允許使用者產生(user-created)的產品定製。 同時,產品以及與產拼相似之物品的相容性與/或均等性 可被評估。 可選擇性的根據客戶簡介、客戶類型與/或地理位置 來產生產品價格或相似於此產品的物品價格。此外’根據 一客戶簡介,一客戶類型及一地理位置,爲一客戶產生該 產品或相似該產品之物品的一個或更多個特惠供應以及特 4HICKMAN200036TW; AND1P282.TW 61 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) (請先閱讀背面之注意事項再填寫本頁) 裝 訂-· 經濟部智慧財產局員工消費合作社印製 491972 經濟部智慧財產局員工消費合作社印製 A7 B7__五、發明說明(U) 電子行銷引入一新媒介,網際網路,給供應商以出售 他們的產品。如第1 5圖中所示,行銷元件包含遞送產 品、定價與存貨資料所需的服務。這些服務可直接與個人 化服務互動來以定製的格式傳送資訊。一傳統的例子會是 櫥窗購物(window shopping)、商品瀏覽 (merchandise browsing)或任何與銷售櫃檯人員的 情報互動。 採用電子行銷有很大的優點。以下列出其一些優點。 •資訊的數量---網際網路是來出售資料密集產品的 絕佳媒介。此外,資料可以依需要更新。客戶不 需擔心過期的目錄與資訊。 • 地點---網際網路跟地理無關。一單獨網站可以服 務全球的族群。 •可利用性一-還有,供應商不必擔心開店時間。網 站可開一週七天,每天開24小時。 • 目錄銷售模式-一目錄銷售模式很自然地移動到網 際網路上。購買者可以點選一產品以看到較大的 照片與更詳細的資訊。一智慧代理器可建議相似 物品或合乎個人品味的其它物品。特價供應與特 賣可以動態地在觀看時產生給各個客戶。目錄甚 至可以電子郵件附加檔每月傳送一次,其具有連 回主網站的連結以得到更多資訊。 •便利服務---如雜貨店購物與虛擬花店等的便利服 務在網路上很成功。忙碌的客戶可從巨大的線上 4HICKMAN200036TW; AND1P282.TW 62 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) (請先閱讀背面之注意事項再填寫本頁) _ -裝 . 491972 經濟部智慧財產局員工消費合作社印製 A7 __B7 ___五、發明說明U3) 目錄中選擇一問候卡、加上個人訊息然後在他們 指定的任何一天寄出。 •數位商品---數位商品,如新聞、硏究、或資料與 圖片媒介如美術及相片,都很適合電子商務。買 者在購買時即可立即接受送貨,提供立即性的滿 足與心安。貨物沒有收到以前,賣方無法得到付 款。 ♦貨物的廣大選擇…-線上商店能有具深度的”虛擬 存貨”,其在現實世界中上是不可能或非常昂貴 的。 產品資訊(目錄服務)1500 電子行銷有很多不同形式與比喻。其基礎基層槪念提 供產品資訊給終端用者。產品資訊可包括產品規格、圖 樣、甚或存貨的可利用性。 產品規格、圖樣或視訊影像、數位樣本或存貨可利用 性。根據企業對企業(business-to-business)或企業 對客戶(business-to-customer)的實施,顯示此資訊 的方法會不同。最普通執行是利用目錄方式。 資訊儲存(資料模式)1502 內容的實際儲存是重要的。產品資訊使用靜態 HTML存在一邊,最普遍的方式是存於一物件資料庫或 關聯資料庫。很多供應商甚至於提供產品資料庫的資料模 4HICKMAN200036TW; AND1P282.TW 63 本余氏張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐^ ~ (請先閱讀背面之注意事項再填寫本頁) _鑭 -裝 訂: 491972 A7 B7 五、發明說明(64.) 式。供應商提供的資料模式常常需要修正以合乎系統所需 要之特殊產品細節。很重要的一點是,了解如果需要引入 變化時,資料模式的強韌性與對系統的影響。系統可牽涉 到儲存與存取到很多非分離的(non-discrete)資料型 式。 資訊傳送1504 在更複雜的行銷實施中,其內容可由非分離的資料型 式所組成,如聲音與視訊。傳送機制必須要能傳送資料到 不同存取裝置上。系統將面臨管理非分離資料型式,如聲 音與視訊資料以及選擇性內容,以免此存取類型無法處理 此資料型式。 (請先閱讀背面之注意事項再填寫本頁) :裝 經 濟 部 智 慧 財 產 局 消 費 合 作 社 印 製 資料籌晝1506 傳送新產品與資訊的能力對於維持領先與應付競爭非 常關鍵。資料更新與移送到生產的速度是很關鍵的。確定 去瞭解內容變化以及轉移改變到生產系統中之正確程序間 的關係。維持與成長網站的能力可證明爲網站成功的主要 因素。 在大部分的情形中,一內容籌畫程序應該就位。在最 簡單的格式中,修正與追加內容、測試、內容與主題的驗 證以及生產的授權與轉移的程序應該以文件紀錄下來。 均等物品識別與產品比較15 084HICKMAN200036TW; AND1P282.TW 60 ------------ install — (Please read the precautions on the back before filling this page) is This paper size is applicable to China National Standard (CNS) A4 (210 X 297 (Mm) Outside 1972 A7 B7 V. Description of the Invention (M) Computer computing among peers allows workstations to transmit and host multiple service requests simultaneously. Issues of safety, reliability, and integrity need to be explored, especially because the market has high expectations for a master-slave environment. Asynchronous decentralized computer computing is best handled by mobile agents. A mobile agent does not code permanent, complex exchanges between a client and multiple servers, but rather a compact program with all the required procedures for remotely performing interactions. Electronic marketing 1004 Figure 14 discloses a flowchart of a method 1400 for suggesting products on the Internet. Information for a product is displayed in operation 1402. Its product information includes product specifications, drawings, video images, digital samples and / or inventory availability. In operation 1404, a search mechanism is provided to find items similar to products on the Internet. In operation 1406, items similar to the product found during the search are suggested. In operation 1408, a product and items similar to the product are selected when purchasing online. One option is to also provide downloadable samples of the product. Another option is to allow user-created product customization. At the same time, the compatibility and / or equality of products and similar products can be evaluated. You can optionally generate a product price or an item price similar to this product based on the customer profile, customer type and / or geographic location. In addition, 'According to a customer profile, a customer type and a geographical location, one or more preferential supplies for the product or an item similar to the product are produced for a customer and special 4HICKMAN200036TW; AND1P282.TW 61 This paper standard applies to Chinese national standards (CNS) A4 specification (210 X 297 mm) (Please read the notes on the back before filling out this page) Binding-· Printed by the Employees 'Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 491972 Printed by the Employees' Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs Printed A7 B7__V. Description of Invention (U) Electronic marketing introduces a new medium, the Internet, to suppliers to sell their products. As shown in Figure 15, the marketing component includes the services needed to deliver the product, pricing, and inventory information. These services interact directly with personalized services to deliver information in a customized format. A traditional example would be window shopping, merchandise browsing, or any intelligence interaction with sales counter personnel. There are great advantages to using electronic marketing. Some of its advantages are listed below. • The amount of information-the Internet is a great medium for selling data-intensive products. In addition, information can be updated as needed. Customers need not worry about outdated catalogs and information. • Location-The Internet has nothing to do with geography. A single website can serve global communities. • Availability-Also, suppliers don't have to worry about shop opening time. The website is open 24 hours a day, seven days a week. • Catalog sales model-A catalog sales model naturally moves to the Internet. Buyers can click on a product to see larger photos and more detailed information. A smart agent can suggest similar items or other items of personal taste. Special offers and sales can be dynamically generated for each customer while watching. The directory can even be sent as an email attachment once a month, with links to the main website for more information. • Convenience services --- Convenience services such as grocery shopping and virtual flower shops have been successful online. Busy customers can download from the huge online 4HICKMAN200036TW; AND1P282.TW 62 This paper size is applicable to the Chinese National Standard (CNS) A4 specification (210 X 297 mm) (Please read the precautions on the back before filling out this page) _-installed. 491972 Printed by the Consumer Property Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs A7 __B7 ___ V. Invention Description U3) Select a greeting card from the directory, add a personal message, and send it on any day specified by them. • Digital Goods-Digital goods, such as news, research, or data and picture media such as art and photos, are all suitable for e-commerce. Buyers can immediately receive delivery at the time of purchase, providing immediate satisfaction and peace of mind. The seller cannot receive payment until the goods have been received. ♦ Wide choice of goods ...-Online stores can have deep "virtual inventory", which is impossible or very expensive in the real world. Product Information (Catalog Services) 1500 There are many different forms and metaphors of electronic marketing. Its basic grassroots concepts provide product information to end users. Product information can include product specifications, drawings, or even the availability of inventory. Product specifications, drawings or video images, digital samples or inventory availability. The method of displaying this information varies depending on the business-to-business or business-to-customer implementation. The most common implementation is to use the directory approach. Information Storage (Data Mode) The actual storage of 1502 content is important. There is a side to using static HTML for product information. The most common way is to store it in an object database or an associated database. Many suppliers even provide data modules of product database 4HICKMAN200036TW; AND1P282.TW 63 This Yu's scale is applicable to China National Standard (CNS) A4 specifications (210 X 297 mm ^ ~ (Please read the precautions on the back before filling in (This page) _ Lanthanum-binding: 491972 A7 B7 V. Invention Description (64.) type. Suppliers' data patterns often need to be modified to fit the specific product details required by the system. It is important to understand if you need to introduce When changing, the strength of the data model and its impact on the system. The system can involve the storage and access of many non-discrete data types. Information transmission 1504 In more complex marketing implementations, the content can be changed by non-discrete data. It consists of separate data types, such as audio and video. The transmission mechanism must be able to send data to different access devices. The system will face the management of non-separable data types, such as audio and video data, and optional content to avoid this type of access This data type cannot be processed. (Please read the precautions on the back before filling this page): Install the Intellectual Property Bureau of the Ministry of Economic Affairs Fei Cooperative's ability to print data 1506 The ability to transmit new products and information is critical to maintaining leadership and coping with competition. The speed with which data is updated and transferred to production is critical. Be sure to understand content changes and transfer changes to production systems. The relationship between the correct procedures. The ability to maintain and grow a website can prove to be the main factor for the success of the website. In most cases, a content planning program should be in place. In the simplest format, correct and add content, test Procedures for verification of content, subject matter, and authorization and transfer of production should be documented. Equal Item Identification and Product Comparison 15 08

4HICKMAN200036TW; AND1P282.TW 訂---------#· 64 491972 A7 B7 五、發明說明(β) 買方中心解決方案可能需要實施評估產品相容性與均 等性的方法。假如買方網站與多個貿易夥伴交易,這;些功 能可提高額外的成本。從所有貿易夥伴買進以同意-產品 資訊共同模式是這樣能否成功的關鍵。 動態定價1510 動態定價是根據客戶簡介、客戶種類或其它邏輯上可 能性,以展示不同產品價格的能力。可能需要與個人化的 連結以處理定價方案,其根據關係、條件、數囊或其它潛 在客戶簡介事項。將資訊植基於資料庫技術是很好的,資 料庫技術考慮到快速檢索與計算(注意··這很明顯是爲一 個性能意識區域(performance- concious area))。 除此之外,定價機制應該連結到任何種類的減價或促 銷動機。對企業對企業的實施,契約與協議可在適當位置 推送特定定價。減價可適用於一增加的(inCremental) 或時間導向(time-oriented)的基礎上。所使用之一共 通的槪念是電子優待券或其它形式的減價。客戶可在之前 跟網站的互動中賺到或得到電子優待券或其它形式的折 扣。通常存放在使用者機器的優待券,可以應用在採購產 品上。 產品搜尋1512 除了目錄導航,對搜尋特殊產品的能力是決定性的。 假設該網站是賣方中心的網站,有很多方法來執行產品搜 4HICKMAN200036TW; AND1P282.TW 以 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) (請先閱讀背面之注意事項再填寫本頁) 裝 訂· · 經濟部智慧財產局員工消費合作社印製 491972 A7 B7 五、發明說明() 尋。 產品取樣1 51 4 產品取樣---能在網際網路上取樣的產品將銷售的很 好。音樂是一個例子。在決定下單之前’購買者可以傾聽 CD上的歌曲的片段。 定製產品組態1516 有些應用程式要求產生定製部件的能力或各件結合的 能力,使用者可合倂個別元件以滿足一特定的、難以管理 的需要。部件相容性與定價可變得非常複雜與不可管理。 寬施上的考量 國際考量 當設計行銷元件時,將國際考量謹記在心非常重要。 此明顯的考量係關於轉換貨幣與語言。除了這些之外,還 有特定客戶的暗藏陷阱可能不知不覺地觸犯。有些產品不 得銷售到一些國家。 網站設計考量 當考慮任何網站時,其佈局、設計與導航面非常重 要。網頁以及網站入口具有決定性的影響。對於想要什麼 程度的群集與組織常常有爭論。硏究潛在使用者目前網站 4HICKMAN200036TW; AND1P282.TW ^ 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) 丨丨丨丨丨«! (請先閲讀f面之注意事項再填寫本頁) 裝 訂-· 經濟部智慧財產局員工消費合作社印製 A7 B7 i '發明說明(67) 設計與佈局的標準慣例是很好的。 關係管理1006 第16圖說明方法1 600的流程,供在網路上與使用者 互動以將一網站個人化。一使用者被識別,且有關於他的 資訊收錄於操作1 602與1 604中。使用者簡介根據所收錄 的資訊建立,而複數個不同的內容管理在操作1606與 1 608中。在操作1610中其簡介與內容被分析以使使用者 簡介的屬性與內容屬性相配合。然後在操作1612及1614 中選擇具有有與使用者簡介屬性相配的屬性之內容,並傳 送此內容給使用者。操作161 6中允許使用者手動選擇那 一個送到的內容出現在顯示器上。在操作161 8中也允許 使用者選擇性地將送到的內容放在顯示器上。 簡介的分析係及時發生的。可藉由使用一密碼追蹤資 料(cookie )、接受使用者輸入、以及數位證明 (digital certificate)。一選擇是,識別使用者上一 次看內容的時間,也指出上一次上完內容後已經修正或追 加的部分。另外一選擇是,允許使用者評價其內容。 更進一步,一潛在的客戶可以從複數的使用者中選 出,可執行一動作以引誘可能的客戶變成真的客戶。同時 進一步的一些活動可以來保持目前的客戶,並提供要求產 生應用程式(demand generating application)。 企業必須藉由投資互動媒介提供的新潛能以作爲回 應;以觸及、溝通並與客戶互動。由於對高便捷性的要4HICKMAN200036TW; AND1P282.TW Order --------- # · 64 491972 A7 B7 V. Description of Invention (β) The buyer-centric solution may need to implement a method to evaluate product compatibility and equality. These functions can increase additional costs if the buyer's website trades with multiple trading partners. Buying from all trading partners to agree-common product information model is the key to this success. Dynamic Pricing 1510 Dynamic pricing is the ability to show different product prices based on customer profiles, customer types, or other logical possibilities. A personalised link may be needed to handle the pricing plan, which is based on relationships, conditions, pockets or other potential customer profile matters. It is good to base information on database technology. Database technology allows for fast retrieval and calculation (note that this is clearly a performance-concious area). Beyond that, pricing mechanisms should be linked to any kind of price reduction or promotion motivation. For business-to-business implementation, contracts and agreements can push specific pricing in place. The price reduction can be applied on an incremental or time-oriented basis. One common thought used is electronic coupons or other forms of discounts. Customers can earn or receive electronic coupons or other forms of discounts from previous interactions with the website. Coupons, usually stored on the user's machine, can be applied to purchased products. Product Search 1512 In addition to catalog navigation, the ability to search for specific products is decisive. Assuming that the website is a seller center website, there are many ways to perform a product search. 4HICKMAN200036TW; AND1P282.TW Applies the Chinese National Standard (CNS) A4 specification (210 X 297 mm) to this paper size. (Please read the notes on the back before (Fill in this page) Binding · · Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 491972 A7 B7 V. Description of Invention () Product Sampling 1 51 4 Product Sampling-Products that can be sampled on the Internet will sell well. Music is an example. Before deciding to place an order, 'the buyer can listen to a fragment of a song on the CD. Custom Product Configuration 1516 Some applications require the ability to generate custom parts or the ability to combine individual pieces. Users can combine individual components to meet a specific, difficult-to-manage need. Component compatibility and pricing can become very complex and unmanageable. Broad Considerations International Considerations When designing marketing components, it is important to keep international considerations in mind. This obvious consideration is about switching currencies and languages. In addition to these, there are hidden pitfalls for specific customers that may be unknowingly violated. Some products must not be sold in some countries. Website Design Considerations When considering any website, its layout, design, and navigation are very important. The webpage and website entry are decisive. There are often arguments about the extent to which clusters and organizations are desired. Investigate the current website of potential users 4HICKMAN200036TW; AND1P282.TW ^ This paper size is applicable to China National Standard (CNS) A4 (210 X 297 mm) 丨 丨 丨 丨 丨 «! (Please read the precautions on f before filling (This page) Binding-· Printed by the Consumers 'Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs A7 B7 i' Invention Note (67) The standard practice of design and layout is good. Relationship Management 1006 Figure 16 illustrates the flow of method 1 600 for interacting with users on the Internet to personalize a website. A user is identified and information about him is included in operations 1 602 and 1 604. The user profile is created based on the information collected, and a plurality of different contents are managed in operations 1606 and 1 608. In operation 1610, its profile and content are analyzed to match the attributes of the user profile with the attributes of the content. Then, in operations 1612 and 1614, content having attributes matching the attribute of the user profile is selected, and this content is transmitted to the user. The operation 1616 allows the user to manually select which delivered content appears on the display. The user is also allowed to selectively place the delivered content on the display in operation 1618. The analysis of the introduction occurred in a timely manner. This can be done by using a password to track cookies (cookies), accepting user input, and digital certificates. One option is to identify when the user last watched the content, and also indicate the parts that have been modified or added since the last time the content was last viewed. Another option is to allow users to rate their content. Furthermore, a potential customer can be selected from a plurality of users, and an action can be performed to lure potential customers into real customers. At the same time, there are further activities to keep current customers and provide demand generating applications. Companies must respond by investing in new potential provided by interactive media; reaching, communicating, and interacting with customers. Because of the need for high convenience

4HICKMAN200036TW; AND1P282.TW 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) 訊 (請先閱讀背面之注意事項再填寫本頁) 裝 !丨訂·1丨丨! ! 經濟部智慧財產局員工消費合作社印製 491972 A7 B7 五、發明說明(68) 求、較好的存取、較高階的互動與快速達成,企業與其客 戶互動的方式不斷的改變。因此,透過電子方式產生更多 的客戶互動(例如家庭電腦、自動化櫃員系統、自動化語 音回答、800號免付費電話與網際網路)。不管客戶所選 擇特定媒介,很淸楚的將來通信將日益成爲技術致能的與 資訊密集的,且將提供與客戶連續雙向對話的基礎。 以新媒介與通訊技術來互動的優點眾多,使得企業提 供更好的客戶服務,獲取客戶行爲以及使用產品的寶貴資 訊、允許在接觸點上更大的差異性。然而,大部分下一代 客戶介面繼續設計成爲高科技而不是高格調(high touch ) 〇4HICKMAN200036TW; AND1P282.TW This paper size is applicable to China National Standard (CNS) A4 (210 X 297 mm) News (Please read the precautions on the back before filling out this page) Pack! !! Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 491972 A7 B7 V. Description of Invention (68) Demand, better access, higher-level interaction, and rapid reach, the way companies interact with their customers is constantly changing. As a result, more customer interactions are generated electronically (eg, home computers, automated teller systems, automated voice answers, 800 toll-free telephones and the Internet). Regardless of the particular medium chosen by the customer, communication in the future will increasingly become technology-enabled and information-intensive, and will provide the basis for a continuous two-way dialogue with the customer. The advantages of interacting with new media and communication technologies are numerous, allowing companies to provide better customer service, gain valuable information on customer behavior and use of products, and allow greater differences in touch points. However, most of the next-generation customer interfaces continue to be designed as high-tech rather than high-touch.

Ecaf的關係管理部門,如第17圖所示,涵蓋應用程 式與架構元件以適合於在客戶互動上投下金錢。在關係管 理內,有兩個主要驅動力:互動式彳了銷1 7 0 2與個人化 1700 ° 個人化1700 經濟部智慧財產局員工消費合作社印製 ----1------Μ--------訂 (請先閱讀背面之注意事項再填寫本頁) 個人化是收集、分析與使用終端客戶資料的連續程 序,以改善生產力以及其與組織互動的價値。個人化的目 的是與客戶/使用者互動,希望建立關係並藉由滿足個別 客戶的需要、交叉銷售(cross selling)或向上銷售 (up selling)、以及吸引客戶返回此站來增加銷售。 不同於其他的廣播媒介,網際網路被設計爲可雙向互動, 因而提供窄播(narrow cast)或定製個別使用者互動的 4HICKMAN200036TW; AND1P282.TW 68 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) 經濟部智慧財產局員工消費合作社印製 491972 A7 ---^_B7___ 五、發明說明(切) 能力。 產生網站產品或服務的需求與建立客戶關係對電子商 務實施是有決定性的。這在銷售中心實施與宣傳 (hype)或是常行銷驅動的實施中更加明顯。定製可以 很多形式發生。服務與基礎結構能隨著個人化程度而呈現 多樣變化。每一個電子商務套裝軟體可以使用不同的服務 與基礎結構達成個人化。 個人化方式的企業複雜性將帶動實施與傳送策略所需 要的架構元件與應用程式。去瞭解個人化策略如何影響整 個企業是企業成功的決定性因素。 槪念個人化架構 槪念個人化架構獨立於企業或工業。 實施一個人化策略到現存系統中或新系統中需要個\ 化架構元件的設計與開發。這些元件對個人化策略的成# 很重要。他們包含識別元件171〇以識別使用者、資訊摘 取元件171 2以擷取使用者資料、內容目錄元件1714以管 理系統中不同的內容、匹配元件1716以匹配使用者簡介 屬性與正確的內容、合倂與傳送(Merge&Deliver)元 件1718以傳送內容給使用者、以及一最佳化與管自 (optimization & administration )元件 1720 以持糸賨 的最佳化個人互動並管理變化與外加的規則與內容。見g 17圖。藉由舉例,揭露於第18圖的槪念個人化架構元# 將就其此元件的子元件做細部討論。Ecaf's relationship management department, as shown in Figure 17, covers applications and architectural elements suitable for investing money in customer interactions. In relationship management, there are two main driving forces: interactive sales of 1 7 0 2 and personalization 1700 ° personalization 1700 printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs ---- 1 ------ Μ -------- Order (Please read the notes on the back before filling out this page) Personalization is a continuous process of collecting, analyzing, and using end-customer data to improve productivity and the cost of interacting with your organization. The purpose of personalization is to interact with customers / users, hoping to build relationships and increase sales by meeting the needs of individual customers, cross selling or up selling, and attracting customers to return to this site. Unlike other broadcast media, the Internet is designed to allow two-way interaction, thus providing narrow cast or customized individual user interactions. 4HICKMAN200036TW; AND1P282.TW 68 This paper standard applies to Chinese National Standard (CNS) A4 Specifications (210 X 297 mm) Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economy 491972 A7 --- ^ _ B7___ V. Description of invention (cutting) capabilities. Generating demand for website products or services and establishing customer relationships are decisive for e-commerce implementation. This is even more apparent in sales center implementations and hype or often marketing-driven implementations. Customization can take many forms. Services and infrastructure can change in varying degrees of personalization. Each e-commerce suite can be personalized using different services and infrastructure. The corporate complexity of a personalized approach will drive the architectural components and applications needed to implement and deliver a strategy. Understanding how personalization strategies affect the entire business is a decisive factor for business success. Mind Personalized Architecture Mind Personalized Architecture is independent of business or industry. Implementing a personification strategy into an existing system or a new system requires the design and development of individualized architecture elements. These elements are important to the personalization strategy. They include an identification element 1710 to identify users, an information extraction element 1712 to retrieve user data, a content directory element 1714 to manage different content in the system, a matching element 1716 to match user profile attributes with correct content, Merge & Deliver element 1718 to deliver content to users, and an optimization & administration element 1720 to maintain optimized personal interaction and manage change and additional Rules and content. See figure g17. By way of example, the imagination personalization architecture element # disclosed in FIG. 18 will discuss the sub-components of this component in detail.

4HICKMAN200036TW; AND1P282.TW 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) (請先閲讀背面之注意事項再填寫本頁) 裝---11--—訂 -------· 經濟部智慧財產局員工消費合作社印製 491972 A7 ________B7_ 五、發明說明(70 ) 個人化技術 目前有很多宣傳與媒體焦點都專注於個人化的觀念 上。有這麼多樣化標榜個人化的產品與觀念,很顯然地多 種個人化傳送技術與科技正在演進。如同大多新興的槪 念,初步的技術涵蓋廣大範圍之基礎結構與方式的複雜 性。大多個人化的網站利用技巧的合倂。個人化技巧的樣 例如下: 使用者承認 這就是以個人化聲明承認或問候客戶。其聲明可以簡 單如「歡迎回來<使用者姓名>!」或從上次互動中更複 雜、更長的資訊。 個人化介面 在這個方式中,其應用或網站使用者介面爲個人所定 製。實際頁面配置與頁面設計可以根據個別與系統互動而 改變。目錄可以根據誰(網站或使用者)控制介面是如何 改變再加以分隔。 ♦網站變形(site morphing)。網站變形是當網 站改變使用者介面。網站可能根據使用者所知改 變網頁配置、主題、內容型式與資訊、或網站能 力·。種種不同使用者屬性或演算法可用以定製使 用者介面。 1. 客戶策略。網站介面可以隨著客戶情況或策略 4HICKMAN200036TW; AND1P282.TW 70 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) ^ 一 (請先閱讀背面之注意事項再填寫本頁) 裝 04HICKMAN200036TW; AND1P282.TW This paper size is applicable to China National Standard (CNS) A4 (210 X 297 mm) (Please read the precautions on the back before filling this page). ---------- Order ---- --- · Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 491972 A7 ________B7_ V. Description of Invention (70) At present, there are many propaganda and media focuses on personalization concepts. With such diversified products and concepts, it is clear that a variety of personalized transmission technologies and technologies are evolving. As with most emerging ideas, preliminary technologies cover a wide range of complex infrastructures and approaches. Most personal websites use a combination of skills. Examples of personalization techniques are as follows: User acknowledgement This is to acknowledge or greet the customer with a personalized statement. The statement can be as simple as "Welcome back < user name >!" or more complex and longer information from the last interaction. Personalized interface In this way, the application or website user interface is customized by the individual. The actual page configuration and page design can be changed based on individual interactions with the system. Directories can be separated according to who (website or user) controls how the interface changes. ♦ Site morphing. Website deformation is when the website changes the user interface. The website may change the layout, themes, content types and information, or the capabilities of the website according to the user's knowledge. Various user attributes or algorithms can be used to customize the user interface. 1. Customer strategy. The website interface can be adapted to the customer's situation or strategy 4HICKMAN200036TW; AND1P282.TW 70 This paper size is applicable to China National Standard (CNS) A4 specifications (210 X 297 mm) 0

五、發明說明(Μ) 經濟部智慧財產局員工消費合作社印製 A7 而更改。當爲現有客戶使介面與互動準備爲保 留(retention)並擴展(extension)(銷 售外加的產品、允許客戶自助、或使得與公司 交易更容易)時,客戶策略可能企圖與新的網 站來訪者互動,此互動係藉由備以選擇(這個 客戶的潛在價値是什麼)與取得(如何取得此 客戶)的介面。 2. 客戶狀態。網站介面可以根據客戶狀態而更 改。舉例來說,聯合航空網站可以根據使用者 MileagePlus情況來定製。非會員會有一個很 一般的網站,在其上他們可執行基本網站功 能。M i 1 e a g e P1 u s會員將有額外的能力(如航 行歷史、旅程狀態或客戶服務交談)與根據他 們的正確狀態不同的網站配置。 3 . 目的決定(Intent Determination)。這個技 巧企圖預先決定使用者到網站訪問的目的,並 定製導航與使用者介面以幫助使用者快速執行 此行動。根據使用者的資訊與過去的行動,通 常可決定客戶登錄的最可能,並因此使這些功 能與資訊立即可以利用---前面與中心。假設聯 合航空使用目的決定來創造個人化介面。時間 一過,網站學習到使用者定期的檢查他們的旅 程情況、飛行間電影表、食物服務表與航站地 圖。網站同時也注意到最後兩個互動,使用者 4HICKMAN200036TW; AND1P282.TW 71 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) (請先閱讀背面之注意事項再填寫本頁)V. Description of Invention (Μ) The Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs printed A7 and changed it. When preparing interfaces and interactions for existing customers to retain and extend (sell additional products, allow customers to self-help, or make it easier to trade with the company), customer strategies may attempt to interact with new website visitors , This interaction is through the interface of choice (what is the potential price of this customer) and acquisition (how to get this customer). 2. Customer status. The web interface can change based on the status of the customer. For example, the United Airlines website can be customized based on the user's MileagePlus situation. Non-members have a very general website where they can perform basic website functions. M i 1 e a g e P1 u s members will have additional capabilities (such as flight history, journey status or customer service conversations) and different website configurations based on their correct status. 3. Intent Determination. This technique attempts to determine in advance the purpose of the user's visit to the website, and customize the navigation and user interface to help users perform this action quickly. Based on the user's information and past actions, it is often possible to determine the most likely customer login, and therefore make these functions and information immediately available-front and center. It is assumed that United Airlines uses purpose decisions to create a personalized interface. After time, the website learns that users regularly check their trips, flight schedules, food service schedules and terminal maps. The website also notices the last two interactions, user 4HICKMAN200036TW; AND1P282.TW 71 This paper size applies to China National Standard (CNS) A4 (210 X 297 mm) (Please read the precautions on the back before filling this page)

491972 經濟部智慧財產局員工消費合作社印製 A7 B7491972 Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs A7 B7

五、發明說明(72J 要升等到頭等艙。下次客戶登錄,瞭解客戶有 預定班機到芝加哥,則一個O’Hare航站地圖、 飛行中電影與晚餐菜單將自動地顯示,同時立 即詢問客戶是否要昇等到頭等艙。此槪念的力 量將隨著更多功能網站的配置日益重要,多功 能網站允許使用做出數百種不同的事情。使用 者已開始不滿較小簡單網站的導航能力。個人 化目的決定追求”整理(d e - c 1 u 11 e r ) ”公司網 站並讓使用者知道公司知道他們並了解什麼對 他們是重要的。好的目的決定不易辦到,但保 持真正的權力以使得以客戶爲基礎的應用程式 較容易而更可能被使用。 ♦使用者組態介面。使用者控制網站的組態。在 這種情形中,網站提供允許使用者組態網頁 配置、主題、連結或此網頁包含的內容的能 力。一旦經組態後,使用者擁有符合他們規 格的定製網頁。當使用者進入此網站時,使 用者組態介面就被載入。在使用者組態網站 內,使用者有能力藉由選擇配置、標題與內 容細節去設定所屬網站,靠著從組態選項的 定義選單選擇物品以顯示內容細節。 內容過濾 這個技巧根據使用者的輸入或瞭解,過濾顯示給使用 4HICKMAN200036TW; AND1P282.TW 72 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) ------------裝--------訂--------- (請先閱讀背面之注意事項再填寫本頁) 491972 A7 B7___ 五、發明說明(叼) 者的資訊或內容。很多個人化網站使用一些內容過濾的形 式。現有各種不同的過濾技巧。有些採用傳統適合於網路 的主從技巧。在此所提第一群技巧,使用者控制資訊是如 何過濾。 ♦使用者控制,明示內容過濾。在此分類中的技巧 能夠讓使用者過濾資料或內容。 個人化資訊。允許使用者去看特定給他們的資 訊。在此情形中的內容可能是有關於使用者簡 介、有關他們有的產品或過去訂單歷史。這個 技巧允許使用者藉由建構「那裡子句」聲明或 執行Γ'罐頭」詢問去過濾資料。這在使用者熟 悉資料並希望以多種方法組織或過濾資料時常 常被使用。 ♦使用者控制,默示內容過濾。 協力過濾。協力過濾決定具有相似興趣的一群 客戶,無論是藉由明白地詢問使用者或觀察使 用者的選擇與行動以默示地決定他們的興趣。 這是有效推薦產品的技巧。 ♦網站控制的內容過濾。 背景上推論(c ο n t e X t u a 1 i n f e r e n c e )。背 景上推論使用人性決定規則以根據行爲、興趣 或其它檔案屬性去選擇內容。 什麼是新的(what’s new)。根據知道使用者 最近訪問時間,網站決定使用者上一次與網站 4HICKMAN200036TW; AND1P282.TW 73 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) <請先閱讀背面之注意事項再填寫本頁) 裝 ^---------齋· 經濟部智慧財產局員工消費合作社印製 A7 ----—____ 五、發明說明(/7斗) 互動後那些內谷£經變化並展示改變的列表。 -個人化「什麼是新的」是比—般顯示給所有 使用者的更爲魏兒…顯然地「什麼是新的」 封昨日來g嫌用者h個月未使用關站的人 疋不一k的。註明爲斩的內容可能被進一部強 制到僅包含使用考過奸___。 組態程序或捷徑(fastpath ) 此技巧藉由儲存使用者個人偏好與完成此程序所需的 輸入簡化了複雜程序或重複工作。在大部分情形中-系列 的預先界定的問題與偏好必須設定以便使用此功能。可提 供Ι-chck,其允許使用者用單_點選選擇一物品並採購 此物品-藉由-跳_朗_、訂貨單、送貨與付款頁 面。捷徑方式可關地方㈣使用者之前曾執行過其功 ㈣’與使用者允_用程式動輯保賴多靜態資料如送 貨地址 預塡表格與資訊 在需要使用者資料以完成動作的情形中,網址可以使 用現有使用者資訊來預塡表單。舉例來說,網址可能塡寫 訂單上的使用者最後網址、訂貨資料或網址可以塡寫上次 訂貨物品的列表。此方式跟捷徑不同的地方在於使用者仍 可以看預塡表單並有機會更改資料。 4HICKMAN200036TW; AND1P282.TW 74 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) -----------^--- (請先閱讀背面之注意事項再填寫本頁) 丁 · 言 經濟部智慧財產局員工消費合作社印製 4^1972 A7 ---------B7_五、發明說明(75 ) 個人助理 網站提供一互動助理以傳送個人化幫忙與協助。其目 的是就困難的操作與網站功能幫忙使用者。根據觀察與紀 錄使用者在網站內使用一功能的頻率,提示、建議與其它 型式的協助,可以仔細地調整到使用者的經驗水準。 經濟部智慧財產局員工消費合作社印製V. Description of the invention (72J should be upgraded to first class. Next time the customer logs in and understands that the customer has a scheduled flight to Chicago, an O'Hare terminal map, in-flight movie and dinner menu will be automatically displayed, and the customer will be immediately asked Whether to upgrade to first class. The power of this idea will become more and more important with the configuration of more functional websites. Multifunctional websites allow the use to do hundreds of different things. Users have begun to be dissatisfied with the navigation of smaller simple websites Ability. Personal purpose decides to pursue “de-c 1 u 11 er” company website and let users know that company knows them and what is important to them. Good purpose decisions are not easy to achieve, but remain true The power is to make the customer-based application easier and more likely to be used. ♦ User configuration interface. The user controls the configuration of the website. In this case, the website provides the user with the ability to configure the web configuration, themes , Links, or the content contained in this web page. Once configured, users have a custom web page that meets their specifications. When using When the user enters this website, the user configuration interface is loaded. In the user configuration website, the user has the ability to set the own website by selecting the configuration, title and content details. Define menus to select items to display content details. Content filtering is a technique based on user input or understanding. Filtering is displayed for use. 4HICKMAN200036TW; AND1P282.TW 72 This paper size applies Chinese National Standard (CNS) A4 (210 X 297 mm) ------------ Installation -------- Order --------- (Please read the notes on the back before filling this page) 491972 A7 B7___ V. Invention Explain (叼) information or content. Many personalized websites use some forms of content filtering. There are various filtering techniques available. Some use traditional master-slave techniques suitable for the Internet. The first group of techniques mentioned here, use User controls how information is filtered. ♦ User control, explicit content filtering. The techniques in this category allow users to filter data or content. Personalized information. Allow users to see information specific to them. The content in the situation may be about the user profile, about the products they have, or the history of past orders. This technique allows users to filter the data by constructing a "where clause" statement or performing a 'canned' query. This is in use People who are familiar with the data and want to organize or filter the data in many ways are often used. ♦ User control, implied content filtering. Collaborative filtering. Collaborative filtering determines a group of customers with similar interests, whether by explicitly asking the user or Observe the choices and actions of users to implicitly determine their interests. This is a technique for effectively recommending products. ♦ Website-controlled content filtering. Background inference (c ο nte X tua 1 inference). The background reasoning uses humanity decision rules to select content based on behavior, interests, or other archival attributes. What's new. Based on knowing the user ’s recent visit time, the website decides the user ’s last time with the website 4HICKMAN200036TW; AND1P282.TW 73 This paper size applies to China National Standard (CNS) A4 (210 X 297 mm) < Please read the notes on the back first (Fill in this page again) Pretend ^ --------- Printed A7 by the Consumers' Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs -------- ____ V. Invention Description (/ 7 buckets) Those inner valleys after interaction. Changes and displays a list of changes. -Personalized "what's new" is more Weier than-generally displayed to all users ... apparently "what's new" The person who has n’t used the station in the past month for g suspects has not A k. Content marked as chopped may be coerced to include only use of test ___. Configuration procedure or fastpath This technique simplifies complex procedures or repetitive tasks by storing the user's personal preferences and the inputs required to complete the procedure. In most cases, the pre-defined questions and preferences of the series must be set in order to use this feature. I-chck is available, which allows the user to select an item with a single click and purchase this item-by-jump_lang_, order form, delivery and payment page. The shortcut method can be used to close the place. The user has performed its functions before. “With the user ’s permission, you can use the program to edit the static data such as the shipping address advance form and information. In situations where user data is required to complete the action, , The URL can use existing user information to preview the form. For example, the website address may include the last URL of the user on the order, the order information, or the website address may include a list of the last ordered items. The difference between this method and the shortcut is that users can still view the preview form and have the opportunity to change the data. 4HICKMAN200036TW; AND1P282.TW 74 This paper size applies to China National Standard (CNS) A4 (210 X 297 mm) ----------- ^ --- (Please read the notes on the back before filling (This page) Ding Yan Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 4 ^ 1972 A7 --------- B7_V. Invention Description (75) The personal assistant website provides an interactive assistant to deliver personalized help With assistance. The goal is to help users with difficult operations and website functions. Based on observations and records of how often a user uses a feature on the website, tips, suggestions, and other types of assistance can be carefully adjusted to the level of user experience. Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs

非互動傳送技巧 大部分上述個人化技巧互動式個人化技巧。內容與資 訊即時地爲使用者個人化---而使用者與應用程式或網站 互動。一些型式的個人化亦可使用在非互動或「推送 (push)」方式.。 推送(或伺服者推送)是在網路上的資訊傳送係由資 訊伺服器觸發並起始的而不是使用者觸發或起始的。 事實上,從一伺服器到一使用者推送的資訊,來自使 用者所產生的g了閱式常駐要求(subscription-like standing request),其儲存於伺服器或他們的區域機 器上。這個程式區域地擷取並存放使用者簡介並週期性地 代表使用者從伺服器要求資料。 推送技術能使企業達到並提供價値給傳統互動不可及 之客戶。在上述個人化技巧中,內容過濾不需要透過互動 對話送。記住推送不一定是指個人化。一網站可以簡單地 推送同一資訊給所有使用者或訂閱者。個人化推送指的是 資訊根據特定使用者要求、或檔案、或排定給特定使用者 的位置加以過濾。有多種不同的正當商業理由來推送使用 4HICKMAN200036TW; AND1P282.TW 75 (請先閱讀背面之注意事_填寫本頁) —裝 · 本紙張尺度適用中國國家標準(CNS)A4規格(21〇 X 297公釐) v^ 97 1X 9 A7 __ B7_ 五、發明說明(% ) 者資訊。以下各例爲個人化推送: ♦資訊傳送。使用者訂購以定期收到資訊。所推送 的資訊要不就透過使用者選擇來決定-一使用者選 擇他們所想要的主題、資料型式,或者網站根據 他們的檔案資訊決定使用者可能對什麼資訊有興 趣。舉例來說,在一投資網站,允許使用者訂購 投資資訊報表。使用者決定收到他們有價貨物股 價的每日報表。網站根據使用者簡介保有的有價 證券將傳送此資訊並另外增加推送新聞與股票建 議。 *事件提醒。使用者訂購以從網站接收事件提醒。 事件提醒可以提醒使用者所注意之感興趣的特定 曰期,如生日或週年紀念、一付款提醒或最近將 來所需的行動。 _ 資料更新。一個網站可以推送更新給使用者。舉 例來說,微軟的expedia允許使用者去要求費用 更新。一使用者能選擇特定的網際網路目的。如 果此地方的費用變化,使用者會被通知費用更 新。 不要成爲寄送垃圾電子郵件者。推送媒介是功能強大 並潛在地比傳統信件更省費用。這並不會將其在垃圾郵件 上的使用正當化。它沒有作用,因爲每個人收到垃圾電子 4HICKMAN200036TW; AND1P282.TW 76 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) (請先閱讀背面之注意事_填寫本頁) 丨裝 訂: 經濟部智慧財產局員工消費合作社印製 491972 A7 B7 五、發明說明(π ) 郵件,而最後丟到垃圾桶的垃圾郵件無法達成市場行銷效 果。將它個人化。傳送客戶有興趣的有價値資訊。允許他 們去選擇主題,如何來過濾內容與傳送的頻率。 個人化程患· 個人化是實際上爲一些基層技術能力的收集所,這些 技術能力是產生組織與使用者之間個人化互動所需要的。 藉由將基層技術與邏輯打散成較簡單元件,可以建立對程 序與技術的瞭解以傳送個人化應用程式。 個人化是收集、分析與使用終端使用者資訊的連續程 序,以改善生產力與他們跟組織間互動的價値。這個定義 隱含需要做一些基本的事情。簡而言之,需要一些方法來 識別使用者、收集(或偵測)並儲存使用者資訊、分析資 訊、評估那些內容或功能是適當的,然後呈現給使用者。 第19圖揭露一簡單的個人化程序1 900。大部分個人 化技巧以某種方式或其他方式利用這個程序。程序的複雜 與細節可能隨著技巧而有所不同。以下說明不同個人化程 序元件。 經濟部智慧財產局員工消費合作社印製 ♦識別1902---第一步是識別使用者。這個致能剩 下其他的個人化程序元件。吾人必須知道跟誰談 話才能將個人化的經驗個人化。 ♦資訊擷取1904-—下一步是有關蒐集使用者資 訊。這個可以用使用者指導的或系統控制的明示 或默示技巧。其目在於擷取助以決定並傳送有價 4HICKMAN200036TW; AND1P282.TW 77 本紙張尺度適用中國國豕標準(CNS)A4規格(210 X 297公爱) A7 ---—____Β7 _ 五、發明說明(78 ) 値互動的資訊。 分析與精鍊…-一旦資料被擷取,其使用前需要精 鍊。系統需要分析資料的能力,並得到有關資訊 與互動的見解與結論。精鍊可以轉換從問卷或暗 中觀察所得之資料,以配合匹配規則與內容索引 策略(content index strategy)發揮功用。 •匹配1906…-當個人化策略已開發,個人化匹配 因素(Personalization Matching Factor)與 規則(根據誰、什麼、哪裡、何時、爲什麼)因 而產生,這些匹配因素與規則定於決定內容、導 航與是與使用者的配置是必要的。 ♦合倂與傳送1 908---爲了決定適當資訊與格式, 資訊需要被合倂並傳送給使用者。這個可以透過 互動介面或推送機制。 ♦個人化最佳化1910 —-個人化是一個複雜以及演 進中的程序。在個人化過程中收集尺寸與測量以 執行規則或資料轉換、模式調整與報告的能力對 將此槪念的潛能最大化是很重要的。 個人化策略 個人化將繼續被市場所採用。很多網站把個人化技巧 融合到他們的網站中,而市場中充滿獨立的軟體供應商, 其創造出個人化相關軟體。 各個企業必須從他們的角度評估他們個人化的機會, 4HICKMAN200036TW; AND1P282.TW 78 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) (請先閱讀背面之注意事^填寫本頁) 丨裝 經濟部智慧財產局員工消費合作社印製 491972 A7 _B7__五、發明說明(竹) 並開發他們自己的個人化策略。個人化策略必須與企業現 有的客戶關係、技術與電子商務策略結合。 開發個人化策略 使用如下的機會(Opportunity)母體,個人化通 常傳送最多價値的機會是在互動領域中。此區域包含組織 與使用者互動或使用者在交談中企圖訂約(engage)的 機會。互動部分的的出版片段與智識管理層面通常是個人 化機會的二次區域,而交割區域是最後一個區域。 經濟部智慧財產局員工消費合作社印製 程序; 出版, 互動; 交易 開發產品 硏究與產品 取得客戶 整合設計 與服務; 資料; 回報; 系統; 共同設計 產品; 產生需求; 產品資訊; 互動式行銷; ; 需求產生 廣告 單一市場 定價 實現需求 產品可利用性 客戶關係 訂貨送貨 資訊 管理 付款; 權利金程式 計畫與管理 出版政策與 知識管理 內部採購 企業; 程序; 人力資源與 人力資源與 財務資料 福利系統 當評估什麼機會存在時,所有地區都應該考慮。個人 化互動的價値仰賴很多因素,如產品種類與服務(他們能 夠個人化嗎?)或與客戶或消費者的關係種類與取得使用 4HICKMAN200036TW; AND1P282.TW 79 本紙張尺度適用中國國家標準(CNS〉A4規格(210 X 297公釐) 丨丨—丨丨! — I - •丨!丨丨丨訂i丨I ! (請先閱讀背面之注意事項再填寫本頁) 491972 經濟部智慧財產局員工消費合作社印製 A7 ______B7___ 五、發明說明(80 ) 者資料的能力。 〜個正式的個人化策略應該建立’其包括短程目標與 長程展望。很多公司立刻跳進去,而對他們如何成長與加 強企業沒有沒有任何指導或瞭解。其策略應該全局開始。 執行關鍵力量檢驗,這些關鍵力量影響企業,並且執行檢 驗以找出這些力量如何影響商業程序。驅動力是什麼?社 會、市場行銷、技術、商業/工業?隨著個人化市場的出 現,仍然有很多未證實商業事例與未證實的技術。公司不 應該從事於個人化只因爲他們能’也不可以陷入由供應商 或行銷宣傳所製造之未證實期望而淪落爲羔羊。考慮個人 化的公司必須在真實企業目標的背景裡構建個人化(增加 客戶保有或增加客戶擴張)’然後決定個人化如何幫助完 成這這些目標。 個人化策略應該檢驗個人化的複雜性、實施的成本與 時間以及潛在商業影響。在很多情況中,一個真的一對~ 個人化網站可能沒啥道理。創造百萬個不同產品,只有會 使互動複雜化,到了使得使用人眼花撩亂的地步。有些情 形中,從事於簡單個人化對話可能是接近最好與中程 (m i d t e r m )的解決方法。 既然不同的使用者希望以不同的方式互動,對於個人 化策略有很多正確答案。一些使用者自助並想要得到工 具,以探索或自己做選擇,其它的則要求立刻性 (immediacy),其他的可能想要親密性以致於他們的 登記在公司的回應與選擇。見第2〇圖,其圖示個人化從Non-interactive delivery techniques Most of the above personalization techniques are interactive personalization techniques. Content and information are personalized for users in real time-and users interact with apps or websites. Some types of personalization can also be used in non-interactive or "push" ways. Push (or server push) is that information transmission on the network is triggered and initiated by the information server, not by the user. In fact, the information pushed from a server to a user comes from a subscription-like standing request generated by the user, which is stored on the server or their regional machine. This program locally retrieves and stores user profiles and periodically requests data from the server on behalf of the user. Push technology enables companies to reach and provide prices to customers who are out of reach of traditional interactions. In the above personalization techniques, content filtering does not need to be sent through interactive dialogue. Remember that push does not necessarily mean personalization. A website can simply push the same information to all users or subscribers. Personalized push refers to the filtering of information based on specific user requirements, or files, or locations scheduled for specific users. There are many different legitimate business reasons to push the use of 4HICKMAN200036TW; AND1P282.TW 75 (please read the notes on the back first_fill in this page) — installed · This paper size applies Chinese National Standard (CNS) A4 specification (21〇X 297 public (Centimeters) v ^ 97 1X 9 A7 __ B7_ 5. Information of the invention description (%). The following examples are personalized push: ♦ Information transmission. Users order to receive information on a regular basis. The information that is pushed is determined by user selection-a user chooses the topic, data type they want, or the website decides what information the user might be interested in based on their profile information. For example, an investment website allows users to order investment information reports. Users decide to receive daily reports on the value of their stocks of value. The securities held by the website based on the user profile will transmit this information and additionally add push news and stock recommendations. * Event reminder. Users subscribe to receive event reminders from the website. Event reminders can remind users to pay attention to a specific date of interest, such as birthdays or anniversaries, a payment reminder, or actions required in the near future. _ Information update. A website can push updates to users. For example, Microsoft's Expedia allows users to request cost updates. A user can choose a specific Internet purpose. If the fee changes in this place, the user will be notified of the fee update. Don't be a spammer. Push media are powerful and potentially less costly than traditional letters. This does not justify its use on spam. It has no effect, because everyone receives junk electronics 4HICKMAN200036TW; AND1P282.TW 76 This paper size applies to China National Standard (CNS) A4 specification (210 X 297 mm) (Please read the notes on the back first_fill this page) 丨Binding: 491972 A7 B7 printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 5. Description of the invention (π) E-mail, and the spam e-mail that was finally dropped in the trash can not achieve the marketing effect. Personalize it. Send valuable information that customers are interested in. Allow them to choose topics and how to filter content and delivery frequency. Personalization process · Personalization is actually a collection of basic technical capabilities that are needed to generate personalized interactions between organizations and users. By breaking down the underlying technology and logic into simpler components, you can build an understanding of programs and technologies to deliver personalized applications. Personalization is a continuous process of collecting, analyzing, and using end-user information to improve productivity and the cost of their interactions with the organization. This definition implies the need to do some basic things. In short, methods are needed to identify users, collect (or detect) and store user information, analyze information, evaluate what content or features are appropriate, and present them to users. Figure 19 reveals a simple personalization procedure 1,900. Most personalization techniques make use of this program in one way or another. The complexity and details of the program may vary with techniques. The different personalization program components are described below. Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs ♦ Identification 1902 --- The first step is to identify users. This enablement leaves other personalised program elements. We must know who to talk to to personalize the personal experience. ♦ Information Retrieval 1904—The next step is to collect user information. This can be either explicit or implicit, user-directed or system-controlled. The purpose is to extract help to determine and transmit the value 4HICKMAN200036TW; AND1P282.TW 77 This paper size is applicable to China National Standard (CNS) A4 specification (210 X 297 public love) A7 ------- ____ Β7 _ V. Description of the invention (78 ) 値 Interactive information. Analysis and Refining ...-Once the data is retrieved, it needs to be refined before it can be used. The system needs the ability to analyze data and get insights and conclusions about information and interaction. Refining can transform data obtained from questionnaires or obscure observations to work with matching rules and content index strategies. • Matching 1906 ...- When personalization strategies have been developed, Personalization Matching Factors and rules (based on who, what, where, when, why) are generated. These matching factors and rules are determined by the content, navigation Configuration with the user is necessary. ♦ Combining and transmitting 1 908 --- In order to determine the appropriate information and format, the information needs to be combined and transmitted to the user. This can be through an interactive interface or a push mechanism. ♦ Personalization and optimization 1910 — Personalization is a complex and ongoing process. The ability to collect dimensions and measurements to perform rules or data conversions, model adjustments, and reporting during personalization is important to maximize the potential of this idea. Personalization strategy Personalization will continue to be adopted by the market. Many websites incorporate personalization skills into their websites, and the market is full of independent software vendors that create personalization-related software. Individual companies must evaluate their opportunities for personalization from their perspective, 4HICKMAN200036TW; AND1P282.TW 78 This paper size is applicable to China National Standard (CNS) A4 (210 X 297 mm) (Please read the notes on the back ^ Fill this first Page) 丨 Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 491972 A7 _B7__ V. Invention Description (Bamboo) and develop their own personalization strategy. Personalization strategies must be combined with the company's existing customer relationship, technology and e-commerce strategies. Develop a personalization strategy Using the Opportunity matrix below, personalization usually transmits the most expensive opportunities in the interactive field. This area contains opportunities for organizations to interact with or attempt to engage in conversations. The interactive segment's published clips and the level of intellectual management are usually the secondary areas of personalization opportunities, while the delivery area is the last area. Intellectual Property Bureau, Ministry of Economic Affairs, employee consumer cooperative printing procedures; publishing, interaction; transaction development product research and product acquisition customer integration design and service; data; returns; systems; co-designing products; generating demand; product information; interactive marketing; ; Demand generation advertising; single market pricing; realization of demand; product availability; customer relationship; order delivery information; management payment; royalty program planning and management; publishing policy and knowledge management; internal procurement enterprise; procedures; human resources and human resources and financial information welfare system All regions should consider when assessing what opportunities exist. The price of personalized interaction depends on many factors, such as the type of product and service (can they be personalized?) Or the type and relationship with customers or consumers. 4HICKMAN200036TW; AND1P282.TW 79 This paper standard applies Chinese national standards (CNS> A4 specification (210 X 297 mm) 丨 丨 — 丨 丨! — I-• 丨! 丨 丨 丨 i 丨 I! (Please read the precautions on the back before filling this page) 491972 Employees ’Intellectual Property Bureau of the Ministry of Economic Affairs Consumption Cooperatives print A7 ______B7___ V. The ability to invent (80) information. ~ A formal personalization strategy should be established, which includes short-range goals and long-range prospects. Many companies immediately jump in, and there is no way for them to grow and strengthen the enterprise. There is no guidance or understanding. The strategy should start at a holistic level. Perform key force tests that affect the business, and perform tests to find out how these forces affect business processes. What are the driving forces? Society, marketing, technology, business Industry? With the emergence of the personalized market, there are still many unverified business cases and undocumented Technology. Companies should not engage in personalization simply because they can't and can't fall into unproven expectations created by suppliers or marketing promotions. Companies that consider personalization must be built in the context of real business goals Personalization (increasing customer retention or increasing customer expansion) 'then determines how personalization can help achieve these goals. Personalization strategies should examine the complexity of personalization, the cost and time of implementation, and the potential business impact. In many cases, Really a pair ~ Personalized websites may not make much sense. Creating millions of different products will only complicate the interaction and make it confusing to use. In some cases, engaging in a simple personalized conversation may be the closest Good and midterm solution. Since different users want to interact in different ways, there are many correct answers for personalization strategies. Some users are self-help and want tools to explore or make their own choices, others Others require immediatecy, others may want intimacy So that they are registered in response to the selected companies. 2〇 see section view illustrating the personal

4HICKMAN200036TW; AND1P282.TW 本紙張尺度適用中國國家標準(CNS)A4規格(210 x 297公釐) -------I----ιϋ^Γ 裝---I--丨丨訂------ (請先閱讀背面之注意事項再填寫本頁) 491972 A7 ___B7__ 五、發明說明(81 ) 無定製2000到一對一個人化2002。 網站與使用者對話形式隨著使用者而不同。在一些情 況中,不應該執行個人化或定製。從客戶取得更多資料, 正確型式的對話應該被存取。決定正確的接觸點與個人化 技巧複雜程度是企業個人化策略的重要部分。 個人化的常見障礙 以下列示一些個人化的常見障礙: 1. 成本-一執行複雜個人化的成本是很高的。維持一高度 個人化網站的年成本,甚至高於實施成本。 2. 軟體不成熟一-一些根據行爲與偏好分隔使用者的網站 測量與分析技巧直接來自學術,而未在真實世界中適 當試驗過。 3. 供應商不成熟---很多提供最複雜的個人化軟體的廠商 是由學者建立的小廠商。這些公司仍然在開發他們的 策略與成長計畫,並且很容易在將來幾年改變計畫。 4. 內容管理---內容必須被產生與存放,以便彈性合倂並 且時常修正。 5. 與行銷資料庫整合---爲了不只是創新而已,個人化要 求與行銷資料庫密切整合。這形成嚴重的整合挑戰, 也許需要產生一全企業策略以收集、正常化與分析客 戶資料。 6. 必要的維護---個人化要求全力的維護。雖然很多個人 化程序是自動化的,用以匹配內容與來訪者的商業規 4HICKMAN200036TW; AND1P282.TW 81 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) ^ -----------«-裝 (請先閱讀背面之注意事項再填寫本頁) 1T---------# 經濟部智慧財產局員工消費合作社印製 經濟部智慧財產局員工消費合作社印製 491972 A7 ----- --B7 __ 五、發明說明(W ) 則的建立以及分類所有內容所需要的元資料 (metadata)標籤仍然需要大量的人員監督。監督的 需要只會因爲個人化隨著來訪者的數量與可取得的資 料量增加而指數性地變的更爲複雜。其綜合結果是決 定從事個人化而不大量增員的公司終將失敗。 7·個人化失敗---假如個人化技巧不能傳送正確的訊息或 產品,其結果非常有害。個人化技巧最不應該破壞或 損害相互關係。 實施上的考量 架構元件與程序隨著所實施個人化技巧的型式而不 同。對於每一個技巧,應該瞭解其都有重要考慮及不同 點。每一個技巧在方式、所需資訊與傳送上有所不同。 下列物品應該予以考慮: 1·啓嚴藤X必程什麼啓動個人化程序?是使用者控 制此程序抑或是網站控制此程序?程序是當使用者g 求一頁面或頁面內的DCA被啓動?或者是由根據默禾 資訊擷取的背景程序所啓動? 2·使用#獻允資矜-一個人化程序要求什麼資訊?什麼是 資料來源或資訊儲存在何處?其是如何與何時被擷取 的? 3.座縻靂薄…什麼驅.動匹配邏輯?其規則如何定義?使 用者能制訂規則嗎?其規則自己會最佳化與學習嗎? 假如所需資訊不存在怎麼辦,網站是否企圖擷取它?4HICKMAN200036TW; AND1P282.TW This paper size is applicable to Chinese National Standard (CNS) A4 (210 x 297 mm) ------- I ---- ιϋ ^ Γ Packing --- I-- 丨 丨 Order- ----- (Please read the notes on the back before filling out this page) 491972 A7 ___B7__ V. Description of the invention (81) No customization 2000 to one-on-one 2002. The form of dialogue between the website and the user varies from user to user. In some cases, no personalization or customization should be performed. To get more information from the customer, the correct type of conversation should be accessed. Deciding on the right touchpoint and personalization Skill complexity is an important part of your personalization strategy. Common barriers to personalization Some common barriers to personalization are listed below: 1. Cost-The cost of performing complex personalization is high. The annual cost of maintaining a highly personalized website is even higher than the implementation cost. 2. Immature software-some websites that separate users based on behaviors and preferences Measurement and analysis techniques come directly from academia and have not been properly tested in the real world. 3. Immature suppliers-Many of the vendors that provide the most complex personalized software are small vendors established by academics. These companies are still developing their strategies and growth plans, and it is easy to change them in the coming years. 4. Content management --- content must be generated and stored in order to be flexible and constantly revised. 5. Integrate with marketing database --- For more than just innovation, personalization requires close integration with the marketing database. This poses a serious integration challenge and may require a company-wide strategy to collect, normalize and analyze customer data. 6. Necessary maintenance --- Personalization requires full maintenance. Although many personalization procedures are automated to match the content and the business rules of the visitor 4HICKMAN200036TW; AND1P282.TW 81 This paper size applies the Chinese National Standard (CNS) A4 specification (210 X 297 mm) ^ ----- ------ «-Packing (please read the precautions on the back before filling out this page) 1T --------- # Employee Cooperatives of Intellectual Property Bureau of the Ministry of Economic Affairs, printed by employees of Intellectual Property Bureau of the Ministry of Economic Affairs Co-operatives printed 491972 A7 ----- --B7 __ V. The establishment of the invention statement (W) and the metadata tags needed to classify all content still require a large number of personnel to supervise. The need for monitoring will only increase exponentially as personalization increases with the number of visitors and the amount of information available. The overall result is that a company that decides to personalize without a significant increase in staffing will eventually fail. 7. Personalization failure-if personalization techniques fail to deliver the right message or product, the results are very harmful. Personalization skills should not undermine or undermine relationships. Implementation considerations Architecture elements and procedures vary with the type of personalization techniques implemented. For each technique, you should understand that there are important considerations and differences. Each technique is different in terms of method, required information and delivery. The following items should be considered: 1. What will Kai Yan Teng X start to personalize? Is the user controlling the process or is the site controlling the process? Is the program started when user g asks for a page or the DCA in the page? Or was it initiated by a background process based on Moho information? 2 · Use # 献 允 资 矜-What information is required for a personalization process? What is the data source or where is it stored? How and when was it retrieved? 3. The base is thin ... what drives the dynamic matching logic? How are its rules defined? Can users make rules? Will the rules themselves be optimized and learned? What if the required information does not exist, is the website trying to retrieve it?

4HICKMAN200036TW; AND1P282.TW 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) -----------11^ -裝--------訂--------- (請先閱讀背面之注意事項再填寫本頁) 經濟部智慧財產局員工消費合作社印製 491972 A7 B7____ 五、發明說明(B) 4. 涔容一-潛在內容是什麼?如何將其儲存?其內容是如 何合倂與顯示的?什麼是內容管理的程度如何? 5. 定義輿濰蕙---誰負責制訂與維護此規則、匹配邏輯或 個人化技巧?測量ROI的計量是什麼?如何獲取計量? 這些答案可以很多種方式回答。其答案的影響隨企業與其 個人化策略而異。 一些所考慮的特定技巧,詳列如下: 1·個人確認(personal acknowledgement)——在個人 確認的情形中,所設定的規則定義良好且使用者尙不 知其存在。也無法讓使用者來改變或定製其內容。個 人確認的一個例子可能是簡單問候說”您好 < 使用者 >,午安”,其規則是根據一天中的時間,如系統時間 所定者。一旦使用者進入網站,就執行此規則。根據 結果系統會問候使用者”早安,午安或晚安”。在此情 形中,規則已定且不會更改。 2.內容過濾-一內容過濾與個人卻的功能相似,但它允許 使用者去改變他們想看到的內容。所設定的規則定義 並沒有個人確認定義的那麼淸楚,而只是在適當位置 的規則輪廓,以及使用者有能力去定製規則的屬性。 內容過濾允許使用者定義想在他們的網頁上看到什 麼。在一網站上,.使用者可以選擇看什麼資訊對他們 重要。使用者可以選擇他們是否願意看到有關運動、 氣候、美國新聞、世界新聞、州以及其他很多。不管 4HICKMAN200036TW; AND1P282.TW 83 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐)~~~ = ~™ (請先閱讀背面之注意事項再填寫本頁)4HICKMAN200036TW; AND1P282.TW This paper size is applicable to China National Standard (CNS) A4 (210 X 297 mm) ----------- 11 ^ -install -------- order-- ------- (Please read the notes on the back before filling out this page) Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 491972 A7 B7____ V. Description of the Invention (B) 4. What's the potential content ? How do I store it? How is its content combined and displayed? What is the extent of content management? 5. Defining public opinion-who is responsible for formulating and maintaining this rule, matching logic, or personalization skills? What is the measure of ROI? How do I get metered? These answers can be answered in many ways. The impact of their answers varies depending on the company and its personalization strategy. Some of the specific techniques considered are detailed below: 1. Personal acknowledgement-In the case of personal acknowledgement, the rules set are well defined and the user does not know they exist. Nor does it allow users to change or customize their content. An example of personal confirmation might be a simple greeting saying "hello < user >, good afternoon", the rules of which are based on the time of day, such as system time. Once the user enters the website, this rule is enforced. According to the results, the system will greet the user "Good morning, good morning or good night". In this case, the rules are fixed and do not change. 2. Content Filtering-Content filtering is similar to personal functions, but it allows users to change what they want to see. The defined rule definitions are not as scrupulous as the personal confirmation definitions, but only the outlines of the rules in the proper place and the ability of the user to customize the attributes of the rules. Content filtering allows users to define what they want to see on their web pages. On a website, users can choose what information is important to them. Users can choose whether they want to see sports, climate, US news, world news, states, and many more. Regardless of 4HICKMAN200036TW; AND1P282.TW 83 This paper size applies to China National Standard (CNS) A4 (210 X 297 mm) ~~~ = ~ ™ (Please read the precautions on the back before filling this page)

491972 ! A7 B7 五、發明說明(钭) 使用者選擇了什麼選項,都是顯示在他們個人化頁面 的故事型式。使用者應該被給予在任何時間改變選項 的選項。在此情形中,規則輪廓被定義,然而使用者 可以在任何時間更改這些屬性。 3. 客戶介面一-客戶介面的例子更進一步取用內容過濾的 槪念。在這個情形中,使用者不但具有設定內容屬性 的選項,而且他們也能設定頁面屬性。藉由給予使用 設定頁面屬性的能力,他們設定他們頁面的配置,所 以物品爲他們所想要的而且是在他們想要看到物品 處。在此,使用相同形式的規則輪廓,但是使用者同 時也有很多選項,其允許他們去設定他們想要的頁 面。 4. 個人助理一-個人助理的觀念,已經藉由微軟外加個人 助理在Microsoft Office而大眾化了。如果吾人開始 有困難或不知道如何做,個人助理可以幫忙。此種介 面不同於其它提過的形式。在此例中,系統被設計成 學習系統並是以情況爲基礎的。也就是,其被設計成 去監控使用者正在進行的行動並試著決定使用者是否 迷失。如果系統發現使用者持續地回到設計以改變網 址的網站區間,但使用者無法成功改變網址,則個人 助理會開動。助理會試圖幫助使用者跟隨順利變換位 址所需的步驟。這種型態的網站不是建構於死應的規 則上,而是設計成再其作用時盡可能去學習跟使用者 相關的事。 4HICKMAN200036TW; AND1P282.TW 84 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) (請先閱讀背面之注意事項再填寫本頁) 裝 經濟部智慧財產局員工消費合作社印製 491972 A7 _B7___ 五、發明說明(犯) , 識別171 Ο 個人化引擎的第一個工作就是識別使用者。不同於每 日人與人之間的互動,一個人認得另一個人的面貌、聲音 或其它屬性去識別其他人,在線上識別一使用者是一困難 的程序。識別使用者的簡單工作其實一點都不簡單。一系 統可以根據單一對話中擷取的資訊或整個關係持續期間收 集的資訊,可個人化一互動。不管如何,所擷取的資訊需 要與使用者關聯在一起。爲了追蹤一使用者,一辨識或追 蹤機制需要產生。 確認技巧 各種技巧可以用於辨識使用者。其技巧依照網站安全 的安全需要與隱私考量。今日最常見的方式是在客戶端機 器上產生一密碼追蹤資料(cookie)或在伺服器上有一 識別系統,例如一個使用者登錄。在將來,數位證明將更 普遍而成爲主流的確認方法。 客戶端儲存…-密碼追蹤資料 密碼追蹤資料是一個由網路伺服器放置在客戶端硬碟 的一個小文件檔案。它基本上是一個使用者身分識別卡, 而不能執行程式碼或傳送病毒。它是使用者所特有的,而 僅能由發行的伺服器所使用。雖然這是識別使用者的常見 方法,有很多相關的風險存在。 4HICKMAN200036TW; AND1P282.TW 85 本&張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) *~* ----------—裝--- (請先閱讀背面之注意 再填寫本頁) 一5J · 經濟部智慧財產局員工消費合作社印製 491972 A7 B7 五、發明說明(½) ♦密碼追蹤資料可能過期貨由使用者砍掉。 I t^i n amm— 1^1 I ϋ ^^1 1_ϋ I · ^1 ϋ (請先閱讀背面之注意事項再填寫本頁) •很多人可能使用同一客戶端機器。確認哪一個使 用者正在使用可能很複雜。這個可能導致多重密 碼追蹤資料或複雜的密碼追蹤資料才能夠確認多 個使用者。不管如何,密碼追蹤資料無法決定那 個使用者正在系統上。 •使用者可能使用多部機器。在此情況中,新/其他 機器可能沒有使用者的密碼追蹤資料而無 '法_ _ 使用者。 ♦使用者有能力關閉在瀏覽器內密碼追蹤資料的使 用。有一個選擇是使用者可設定以告訴癎覽器去 排除所有的密碼追蹤資料。假如使用者這樣做, 那麼他/她將無法被識別。 伺服器端應用邏輯 這個技巧要求使用者在網站上登入或簽名。這需要產 生一使用者ID與密碼,以利用確認與儲存ΙΓ)與密碼的系 統與資源。有了此技術,使用者必須記得他們的ID與密 碼。也應該提供查詢登入姓名或請求新密碼的外加服務。 經濟部智慧財產局員工消費合作社印製491972! A7 B7 V. Description of the Invention (钭) What options the users have chosen are the types of stories displayed on their personalized pages. The user should be given the option to change the option at any time. In this case, regular contours are defined, however the user can change these attributes at any time. 3. Customer Interface One-The example of the customer interface takes the idea of content filtering even further. In this case, users not only have the option to set content properties, but they can also set page properties. By giving them the ability to set page properties, they set the layout of their pages so the items are what they want and where they want to see the items. Here, the same form of regular outline is used, but users also have many options at the same time, which allows them to set the page they want. 4. Personal Assistant One-The concept of personal assistant has been popularized by Microsoft plus personal assistant in Microsoft Office. A personal assistant can help if I start having trouble or don't know how to do it. This interface is different from other mentioned forms. In this example, the system is designed as a learning system and is case-based. That is, it is designed to monitor what the user is doing and try to determine if the user is lost. If the system finds that the user continues to return to the site section designed to change the web address, but the user cannot successfully change the web address, the personal assistant is activated. The assistant will try to help the user follow the steps required to smoothly change addresses. This type of website is not built on the rules of death, but is designed to learn as much as possible about the user when it works. 4HICKMAN200036TW; AND1P282.TW 84 This paper size is applicable to China National Standard (CNS) A4 (210 X 297 mm) (Please read the precautions on the back before filling this page) Printed by the Intellectual Property Bureau of the Ministry of Economic Affairs and Consumer Cooperatives 491972 A7 _B7___ 5. Description of the invention (offender), identification 171 〇 The first job of the personalization engine is to identify the user. Unlike daily human interaction, one person recognizes another person's face, voice, or other attributes to identify others, and identifying a user online is a difficult process. The simple task of identifying users is not at all simple. A system can personalize an interaction based on information captured in a single conversation or information collected throughout the duration of a relationship. Regardless, the captured information needs to be associated with the user. To track a user, an identification or tracking mechanism needs to be generated. Confirmation techniques Various techniques can be used to identify users. The techniques are based on the security needs and privacy considerations of website security. The most common way today is to generate a password tracking cookie (cookie) on the client machine or an identification system on the server, such as a user login. In the future, digital proofs will become more common and become the mainstream confirmation method. Client storage ...-Password tracking data Password tracking data is a small file file placed on the client's hard drive by a web server. It is basically a user identity card, and cannot execute code or send viruses. It is user-specific and can only be used by the distribution server. Although this is a common method for identifying users, there are many related risks. 4HICKMAN200036TW; AND1P282.TW 85 This & Zhang scale is applicable to China National Standard (CNS) A4 specifications (210 X 297 mm) * ~ * ------------ install --- (Please read the back first Please pay attention to this page and fill in this page) 5J · Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 491972 A7 B7 V. Invention Description (½) ♦ Password tracking data may be cut by users through futures. I t ^ i n amm— 1 ^ 1 I ϋ ^^ 1 1_ϋ I · ^ 1 ϋ (Please read the notes on the back before filling out this page) • Many people may use the same client machine. Confirming which user is using it can be complicated. This may result in multiple password tracking data or complex password tracking data being able to confirm multiple users. However, the password tracking data cannot determine which user is on the system. • Users may use multiple machines. In this case, the new / other machine may not have the user's password tracking data and there is no method _ _ user. ♦ The user has the ability to turn off the use of password tracking data in the browser. One option is that the user can set it to tell the browser to exclude all password tracking data. If the user does this, he / she will not be identified. Server-side application logic This technique requires users to log in or sign on the site. This requires the generation of a user ID and password to take advantage of the system and resources for confirming and storing the ID and password. With this technology, users must remember their ID and password. Additional services should also be provided to check login names or request new passwords. Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs

證明與數位ID 在曰常生活中,人們帶有不同型式的身分證。一個人 的線上身分可能不一樣。現代密碼技術提供當作電子型式 證明或數位ID。數位證明仍在演進,而片段主要的玩家 4HICKMAN200036TW; AND1P282.TW 〇, 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) 491972 經濟部智慧財產局員工消費合作社印製 A7 B7 五、發明說明(?午) 如何整合在一起的細節尙未落定。 一個有效使用證明的例子是Fire fly Passport。其 中證明與使用者簡介資料存在一起。(微軟爲了此技術買 下Firefly ’其名字會在一段時間後改變。Firefly Passport給使用者一個應用程式,有了此應用程式,可 控制他們個人資訊與明細。此資訊可選擇性地分與第三者 使用。 亦可使用合倂技術。密碼追蹤資料可用在初步的識別 或登入程序的預設ID値,而伺服器端的登入程序可以用 來驗證使用者身份。很重要的一點是,使此程序沒有縫隙 與不冒昧的(obstrusive)。確認程序應該消逝在背景 中。它應該以看不見與不冒昧的方式出現。Proofs and Digital IDs In everyday life, people carry different types of identification cards. A person's online identity may be different. Modern cryptographic technology provides as electronic form identification or digital ID. Digital proofs are still evolving, and the main players of the clip 4HICKMAN200036TW; AND1P282.TW 〇, this paper size applies the Chinese National Standard (CNS) A4 specification (210 X 297 mm) 491972 printed by the Consumer Property Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs A7 B7 5. Description of the invention (?) The details of how to integrate them have not yet been determined. An example of a valid proof of use is Fire fly Passport. This proves to be with the user profile. (Microsoft bought Firefly for this technology. Its name will change after a period of time. Firefly Passport gives users an application. With this application, they can control their personal information and details. This information can be selectively assigned to the first The three can be used. Combination technology can also be used. Password tracking data can be used for initial identification or the default ID of the login process, and the server-side login process can be used to verify the identity of the user. It is important to make this The program has no gaps or obstrusive. Make sure the program should disappear in the background. It should appear in an invisible and non-obtrusive way.

有關多重ID 從一網站或企業的觀點,建立登入與簽入程序引入了 多重登錄(或身分)的老問題。假如使用者忘記他們的登 入代碼,他們可能就建立一個新的。這個可能造成使用者 的多重登入,而與前次登入相關的任何資訊無法與新的關 聯在一起。爲了防止這個情形發生,應該提供查詢現有登 入姓名或要求新密碼的能力。 如同在主從世界中,建議一單一或通用的登入,尤其 是針對希望個人化他們的網站互動的系統。如果企業已經 有使用者基礎,應該鼓勵推送ID給使用者或允許能夠再 使用現存ID的能力。舉例來說,聯合航空產生一個人識 4HICKMAN200036TW; AND1P282.TW 87 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) ---I-------裝·--- ! — 訂---I----- (請先閱讀背面之注意事項再填寫本頁) 491972 經濟部智慧財產局員工消費合作社印製 A7 ______ J7_____ 五、發明說明(δ8 ) 別號碼(PIN)給各個Mileage Plus會員並推送(實體 寄送)此個人識別號碼到每個會員’每個會員都能存取他 們網站的Mileage Plus部分。個人識別號碼是他們的 Mileage Plus號碼與一密碼合倂在一起。藉由這樣做他 們可以再使用他們現存的識別程序以及登入ID。 資訊擷取1712 個人化程序是:資料密集的且是由系統使用者相關資訊 所驅動。網站收集與保有使用者的資料越多’它越可能在 個人化水準加値與互動。沒有此關鍵性的資料’就沒有塑 造互動或驅動個人化技巧的基礎。 個人化檔案 所收集之有關使用者的資訊即是使用者簡介。邏輯 上,這個是企業(網站)對使用者的所有了解。從使用者 簡介的屬性將會是個人化程序的輸入,以及不同個人化技 巧的驅動資料。企業應該開發檔案策略(profiling s t r a t e g y ),企業提出擷取什麼資訊、此資訊的來源、 擷取他的方法與如何存放此資訊。如果客戶全程被以相同 方式對待,應該發展一所有部門與應用程式共享的共通檔 案。 決定收集什麼資訊或哪些屬性組成使用者簡介可以是 一困難的程序。在大部分情形中,檔案將根據企業的個人 化策略、所實施的個人化技巧、實施他們所需的資料以及 4HICKMAN200036TW; AND1P282.TW 88 尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) 一 (請先閱讀背面之注意事項再填寫本頁) 491972 A7 B7 五、發明說明(的) 可收集到有用的任何使用者資訊的混合。一般而言,網站 要擷取執行個人化程序的分析層面所需要的資訊,以使得 各個個人化技巧得以實施。這資訊可包括: *基本使用者資料,如名字與地址。 *使用者人口統計、性格分析 (psychographics )與社群分析 (sociographics),如性別、高度或年齢。 *使用者交易或企業資料,如採購歷史。 ♦使用者指定的組態資訊,如使用者個人網頁的屬 性。 ♦互動資訊,如所觀看的內容或內容展示給使用者 的期間。 每一個個人化技巧需要來自使用者簡介而來的不同組 的屬性。用於傳送「網站控制的上下文推論」(Site controlled Contextual Inferences )的資訊將非常不 同於「預塡表格」所需要的資訊。網站控制上下文推論內 容過濾要求產生規則,以及滿足此規則或上下文推論之必 要使用者資訊。(滿足一規則所需要的資訊被稱爲是參考 個人化匹配因素( Personal JVI atching Factors P M F s )並且將詳細討論在匹配邏輯元件中)。舉例來 說,此規則可能是根據性別、年齡、採購歷史或客戶人口 統計。另一方面,用來預塡表格的資訊可能是不同組使用 者簡介屬性。舉例來說,這可能是名字、住址、送貨資訊 與付款資訊。其他個人化技巧可使用同一組使用者薈訊或 4HICKMAN200036TW; AND1P282.TW ftr 本紙張尺度適用中國國家標準(CNS)A4規袼(210 X 297公釐) ----------•裝 (請先閱讀背面之注意事項再填寫本頁) 訂---------# 經濟部智慧財產局員工消費合作社印製 491972 A7 B7 五、發明說明Π〇 ) 需要使用者資訊的另一子組。 實際上,此資訊可能來自企業內的許多來源。資訊可 能透過默不或明示的資訊收集技巧,直接由個人化網站的 使用者互動直接收集。資訊也許從其它資料來源使用,如 現存應用程式交易資料、企業資料倉庫(data warehouse)、或由內在或外在資料來源。 應該分析情勢來決定是否檔案資料應該複製並儲存在 外加檔案表中,或其是否應該保持在現存資料源內。有些 個人化技巧需要追加報表以儲存用於傳送個人化技巧的使 用者簡介屬性。此將詳細討論於此文章之匹配一節。 檔案標準 業界已認知個人化的重要性以及使用者簡介資料去傳 送個人化的需要性。時至今日,一檔案標準或一通用的 「使用者簡介」定義尙未存在。這表示每一個網站必須去 擷取與保持自己一套的檔案資訊。從一使用者角度,由於 他們受到很多個人化網站的要求要提供相同的基本資訊, 這帶來新的困擾。開放檔案標準已被提議以解決這個議 題。 供隱私偏好與開放檔案標準的平台 網際網路隱私工作群(The Internet priVacy Working Group,IPWG)開始開發隱私偏好平台 (Platfirm for Privacy Preference, P3P ) 〇 P3P 以 4HICKMAN200036TW; AND1P282.TW Qr 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公羞) -----------«_裝—— (請先閱讀背面之注意事項再填寫本頁) «· 經濟部智慧財產局員工消費合作社印製 ^/2 A7 " —__B7___ 五、發明說明Π1) 致能自動協調偏好、政策與資訊交換的注意(notice) 與同意能力(consent capabilities),來擴張網際網 路內容選擇平台(Platform for Internet Content Selection,PICS )標準。如果(P3P )的設定是正確 的,網路快覽者(web surfer)應該可以任意快覽,而 當他們走失到檔案中已經同意的界線外時,只會看到 (P3P )的注意。 網景(Netscape)、Fire fly 與 VeriSign已經採用 開放檔案標準(OPS),一助以解決多重檔案課題之被 提出的標準。這個被提出的標準提供網際網路網站開發者 一齊一的方法,以取得使用者的個人檔案資訊來將互動個 人化。OPS是一値硏究當成部分WWW Consortium’s Platform , 以達到隱私偏好的標準 (http://www.w3c.org)。它可與現存的 vCard 與 X.5 09數位證明技術標準相容,其考慮到在網路上的使用 者識別與認證。 個人將會擁有個人檔案,其包含他們的名字、.電子郵 件地址、郵寄地址與他們希望提供的任何其他資訊。此檔 案將儲存在他們的個人電腦上(或安全地儲存於全企業或 全球目錄中)。第一次個人訪問支持0PS的網站時,網 站將從個人檔案要求資訊。爲了保護他們的私權,使用者 能決定是否他們要給出版者全部或部分的資訊,以及什麼 人可以看到。此外,如果網站收集有關個人偏好的額外資 訊,它可(得到個人同意)儲存此資訊在個人檔案中以爲 4HICKMAN200036TW; AND1P282.TW 91 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) 一 (請先閱讀背面之注音W事項再填寫本頁) « -裝 訂---------#· 經濟部智慧財產局員工消費合作社印製 491972 A7 B7 經濟部智慧財產局員工消費合作社印製 五、發明說明(u) 未來之用。 對使用者的一些優點如下: ♦爲許多網站只保持一套個人資料的方便性,能夠 省時並減少給許多網站相同資訊的不方便。 *藉由允許使用者,而不是網站,能控制到網站的 隱私資訊,加強個人隱私。 *藉由可能地加密局部儲存的資訊,或到網站知此 資訊的傳送,可提供安全性。 使用者可以選擇性地釋出或保留個人檔案中的資訊, 而不是「全有或全無」的程序以接受或拒絕使用者不能檢 驗的密碼追蹤資料。OPS對於個人資訊比密碼追蹤資料 給予個人更多的彈性與更多的控制。 P3 P與0 P S有共同的目標並且已經整合了他們的計 畫。其主導名稱(governing term)爲P3P。 資訊擷取技巧 一旦檔案策略已定,而其來源已被識別,下一步驟即 是擷取資訊。在很多情形中,資訊來自現存資料來源。在 追些形中,資料可能需要精鍊或重複。所剩的資訊可以 直接從使用者與網站的互動擷取。 在大部分的情形中,使用者將控制個人化程序或技 巧。在這些情況中,使用者注意到個人化技巧並選擇使用 可傳送個人化技巧的介面。舉例來說,一組態的介面如 My Yahoo !要求使用者選擇他們想要顯示在個人化頁面 4HICKMAN200036TW; AND1P282.TW r (請先閱讀背面之注意事項再填寫本頁) - 裝Regarding multiple IDs From the perspective of a website or business, establishing login and check-in procedures introduces the old problem of multiple logins (or identities). If the user forgets their login code, they may create a new one. This may cause multiple logins for the user, and any information related to the previous login cannot be associated with the new one. To prevent this, you should provide the ability to query existing login names or request a new password. As in the master-slave world, a single or universal login is recommended, especially for systems that want to personalize their website interactions. If the company already has a user base, the ability to push IDs to users or allow reuse of existing IDs should be encouraged. For example, United Airlines produces a personal identity 4HICKMAN200036TW; AND1P282.TW 87 This paper size is applicable to the Chinese National Standard (CNS) A4 specification (210 X 297 mm) --- I ------- installation ----- ! — Order --- I ----- (Please read the notes on the back before filling out this page) 491972 Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs A7 ______ J7_____ V. Description of the Invention (δ8) Special Number (PIN ) To each Mileage Plus member and push (physical delivery) this personal identification number to each member 'Every member can access the Mileage Plus section of their website. The PIN is their Mileage Plus number combined with a password. By doing so, they can reuse their existing identification procedures and login IDs. Information retrieval 1712 The personalization process is data-intensive and driven by relevant information about the system user. The more data the site collects and holds about users, the more likely it is to interact and interact at a personal level. Without this critical source ’there is no basis for shaping interaction or driving personalization skills. The personal information collected about a user is the user profile. Logically, this is all that the company (website) knows about users. The attributes from the user profile will be the input of the personalization program, as well as the driving data of different personalization skills. An enterprise should develop a file strategy (profiling s t r a t e g y). The enterprise proposes what information to retrieve, the source of this information, how to retrieve it, and how to store this information. If customers are treated the same way throughout, a common file shared by all departments and applications should be developed. Deciding what information to collect or what attributes make up a user profile can be a difficult process. In most cases, the archives will be based on the company ’s personalization strategy, the personalization techniques implemented, the information needed to implement them, and the 4HICKMAN200036TW; AND1P282.TW 88 standard applicable to the Chinese National Standard (CNS) A4 specification (210 X 297 public) PCT) First (please read the precautions on the back before filling out this page) 491972 A7 B7 5. Description of the invention (of) A mixture of any useful user information can be collected. In general, websites need to capture the information needed to perform the analytical aspects of a personalization process so that individualization techniques can be implemented. This information can include: * Basic user information, such as name and address. * User demographics, psychographics, and sociographics, such as gender, height, or age. * User transactions or corporate information, such as purchase history. ♦ User-specific configuration information, such as the attributes of the user's personal web page. ♦ Interactive information, such as the content viewed or the period during which the content is displayed to the user. Each personalization technique requires a different set of attributes from the user profile. The information used to transmit "Site controlled Contextual Inferences" will be very different from the information required by the "pre-forms". The website controls the context inference content filtering requirements to generate rules and the necessary user information to satisfy this rule or context inference. (The information needed to satisfy a rule is referred to as Personal JVI atching Factors P M F s and will be discussed in detail in Matching Logic Elements). For example, this rule might be based on gender, age, purchase history, or customer demographics. On the other hand, the information used to preview the form may be a profile of different groups of users. This could be, for example, name, address, shipping information, and payment information. Other personalization techniques can use the same group of users or 4HICKMAN200036TW; AND1P282.TW ftr This paper size applies the Chinese National Standard (CNS) A4 regulations (210 X 297 mm) ---------- • (Please read the precautions on the back before filling this page) Order --------- # Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 491972 A7 B7 V. Description of the invention Π〇) Another subgroup. In fact, this information may come from many sources within the enterprise. Information may be collected directly by user interaction on personalised websites through tacit or explicit information collection techniques. Information may be used from other sources, such as existing application transaction data, corporate data warehouses, or internal or external data sources. Situations should be analyzed to determine whether archival data should be copied and stored in additional archival tables, or whether it should be kept in existing sources. Some personalization tips require additional reports to store user profile attributes for transmitting personalization tips. This is discussed in detail in the matching section of this article. File Standards The industry has recognized the importance of personalization and the need for personalization to transmit personalization information. To this day, a file standard or a common definition of "user profile" does not exist. This means that every website must retrieve and maintain its own set of file information. From a user's perspective, this is a new problem because they are being asked to provide the same basic information by many personalized websites. Open archive standards have been proposed to address this issue. Platform for privacy preferences and open file standards The Internet PriVacy Working Group (IPWG) began to develop the Platform for Privacy Preference (P3P) 〇P3P 4HICKMAN200036TW; AND1P282.TW Qr This paper standard applies China National Standard (CNS) A4 specification (210 X 297 male shame) ----------- «_ equipment—— (Please read the notes on the back before filling this page)« · Intellectual Property of the Ministry of Economic Affairs Printed by the Bureau ’s Consumer Cooperatives ^ / 2 A7 " —__ B7___ V. Description of the invention Π1) Enable the automatic coordination of preferences, policies and information exchange of notice and consent capabilities to expand Internet content selection Platform (Platform for Internet Content Selection, PICS) standard. If the setting of (P3P) is correct, web surfers should be able to browse arbitrarily, and they will only see the attention of (P3P) when they go outside the agreed boundaries in the file. Netscape, Fire fly and VeriSign have adopted the Open Archive Standard (OPS), a proposed standard to help solve multiple archive issues. This proposed standard provides a unified approach for Internet site developers to personalize interactions by obtaining user profile information. OPS is a part of the WWW Consortium ’s Platform, in order to meet the standards of privacy preference (http://www.w3c.org). It is compatible with existing vCard and X.5 09 digital certification technology standards, which allows for user identification and authentication on the Internet. Individuals will have a personal file containing their name, e-mail address, mailing address, and any other information they wish to provide. This file will be stored on their personal computer (or securely in an enterprise-wide or global directory). The first time an individual visits a website that supports 0PS, the website will request information from the profile. To protect their privacy, users can decide whether they want to give the publisher all or part of the information and who can see it. In addition, if the website collects additional information about personal preferences, it may (with personal consent) store this information in personal files as 4HICKMAN200036TW; AND1P282.TW 91 This paper size applies the Chinese National Standard (CNS) A4 specification (210 X 297 public) Li) One (please read the note on the back and fill in this page) «-Binding --------- # · Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs 491972 A7 B7 Employee of the Intellectual Property Bureau of the Ministry of Economic Affairs Printed by Consumer Cooperatives 5. Invention Description (u) Future Uses. Some of the advantages to users are as follows: ♦ The convenience of maintaining only one set of personal information for many websites can save time and reduce the inconvenience of giving the same information to many websites. * Enhance personal privacy by allowing users, not websites, to control the privacy of the website. * Provides security by possibly encrypting locally stored information, or by transmitting this information to a website. Users can selectively release or retain information in their personal files rather than a "all or nothing" process to accept or reject password tracking data that users cannot verify. OPS gives individuals more flexibility and more control over personal information than password tracking data. P3 P and 0 P S have shared goals and have integrated their plans. Its dominant term is P3P. Information Retrieval Tips Once the file strategy has been determined and its source has been identified, the next step is to retrieve the information. In many cases, information comes from existing sources. In some cases, the data may need to be refined or repeated. The remaining information can be obtained directly from user interactions with the website. In most cases, the user will control a personalized program or skill. In these cases, the user notices the personalization technique and chooses to use an interface that transmits the personalization technique. For example, a configured interface such as My Yahoo! requires users to choose what they want to display on the personalized page 4HICKMAN200036TW; AND1P282.TW r (Please read the precautions on the back before filling this page)-Install

一ejI 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) 491972 A7 B7 五、發明說明(β ) 上的配置與主題。此組態(或設定)介面擷取所需要的資 訊,並把這點家到使用者邏輯檜案。 範圍另外一端的是網站控制的資訊擷取技巧。網站收 集有關互動的資訊。此互動資料擷取可分類爲明示的或默 示的技巧。 明示資訊擷取 明示資訊收集通常提供一介面以收集檔案資訊。網站 明示地詢問使用者以提供資訊。明示資訊的擷取技巧的例 子是: ♦登記表格。使用者塡寫以在網站上登記的表格。 這可能包含網站已經定義或使用者願意提供的興 趣、人口統計或其它檔案屬性。 鲁靜態或動態問卷。互動期間,網站可以促使使用 者去回答問題。問題可能根據上次問題的答案。 (注意:登記表格或評分介面也可以是問卷的例 子)。如果有個人化認知差距(Personal Knowledge Gap)的話,網站可能問使用者一 個問題。(一個人化認知差距是傳送個人化互動 所需資料與網站從使用者收集之資訊數量之間的 差)。另一個例子可能是需要評估問卷(need assessment questionaire)。舉例來說,先進 的保險網站提供一問題列表以分析使用者保險需 要。1 ejI This paper size is applicable to the Chinese National Standard (CNS) A4 specification (210 X 297 mm) 491972 A7 B7 5. The configuration and subject on the invention description (β). This configuration (or setting) interface captures the required information and puts this into the user's logic plan. At the other end of the range are site-controlled information retrieval techniques. The website collects information about interactions. This interactive data extraction can be categorized as an explicit or implicit technique. Explicit Information Extraction Explicit information collection usually provides an interface to collect file information. The website explicitly asks users to provide information. Examples of explicit information retrieval techniques are: ♦ Registration form. A form written by a user to register on the website. This may include interests, demographics, or other file attributes that are already defined on the site or that users are willing to provide. Lu static or dynamic questionnaire. During the interaction, the website can prompt users to answer questions. The question may be based on the answer to the previous question. (Note: the registration form or scoring interface can also be an example of a questionnaire). If there is a Personal Knowledge Gap, the website may ask users a question. (A personalization gap is the difference between the data needed to deliver a personalized interaction and the amount of information the site collects from users). Another example might be a need assessment questionaire. For example, advanced insurance websites provide a list of issues to analyze user insurance needs.

4HICKMAN200036TW; AND1P282.TW 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公f ) -----------祕·裝 (請先閲讀背面之注意事項再填寫本頁) ----訂---------. 經濟部智慧財產局員工消費合作社印製 491972 A7 B7 五、發明說明(钭) *過濾或詢問介面。一介面其允許使用者去直接操 控或過濾顯示的內容。 *組態介面。一介面其允許使用者去造型網站或選 擇所展示內容。 默示資訊擷取 默示技巧不用直接問使用者,即可收集有關互動的資 訊。基本上,網站記錄互動以尋找有用資訊。使用者可能 沒注意到網站正在擷取資訊。最普遍默不技巧是點選流向 分析(c 1 i c k s t r e a m a n a 1 y s i s )。網站記錄使用者的行 動、他們點選了什麼、他們往何處瀏覽、所顯示的內容、 所花的時間或一圖樣顯示的時間。然後分析所收集的資訊 以得到樣板(pattern)與趨勢(trend) ° 資訊收集考量 個人化網站的目標是增加使用者與組織互動的價値° 不幸地,網站有可能適得其反。網站的個人化層面.事實上 可能侵犯或嚇住客戶。網站用以擷取資訊的的方式扮演個 人化網站成功的重要角色。以下是當收集使用者簡介資訊 時要注意的一些事項: •提供價値。一般而言,人們不喜歡將個人資訊交 給他人。爲了克服這問題,網站需要提供資訊擷 取的價値,或提供一個雙臝狀態。假如資訊擷取 造成一些使用者的好處,他們更可能會提供資 4HICKMAN200036TW; AND1P282.TW 9' 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) (請先閱讀背面之注意事項再填寫本頁) 裝 訂: 經濟部智慧財產局員工消費合作社印製 491972 經濟部智慧財產局員工消費合作社印製 A7 B7_____五、發明說明(¾ ) .料。一個好的例子是雜貨優先卡(grocery-p referred card)。舉例來說,Jewel食品商店 提供優先卡,使用者每週獲得選定雜貨的減價。 - 使用者必須出示他們的卡片去接收減價。當客戶 收到實質的折扣時,Jewel獲得可貴的使用者簡 介屬性,如採購歷史與趨勢,當客戶得到實質的 減價。同樣的比喻可應用到個人化網站所使用的 明示資訊擷取技巧。 ♦適當的小問題。塡寫長表單或問卷也可能是立即 的關掉(turn off)。使用者不想要被資訊擷取 技巧所拖累。他們有他們的目標與工作事項,如 果網站以完成塡表讓使用者分心,則網站冒著失 去一個客戶的風險。假如資訊擷取不直接聯繫到 使用者立即看到的一些價値,就將其割分成爲小 單位或單一問題。此外,只問需要什麼與何時是 適當的。假如使用者在互動的開始或他們初次訪 問網站時就被要求去塡寫一個長的問卷,他們很 可能離去。藉由收集所需要的以及聯繫到實質價 値的資訊,使用者更加可能願意提供正確資訊並 留在此網站。 •正確性議題。沒有方法停止使用者說謊或提供錯 誤資訊。雖然沒有一定成功的方法防止這種事, 4HICKMAN200036TW; AND1P282.TW 95 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) (請先閱讀背面之注意事項再填寫本頁) 0 -裝 491972 經濟部智慧財產局員工消費合作社印製 A7 B7___五、發明說明ΠΜ .網站可以減少發生的可能性。如上所述,如果當 回答問題關聯到認知的價値或小數量,使用者更 可能誠實。網站應該說明正確資訊的好處以及其 如何藉由更好的服務嘉惠使用者。 資料可能隨時間改變。使用者的興趣或婚姻 狀態可能隨時間改變。每過一段時間證實資料是 必要的。如果所得的資料已儲存,這些也可能隨 時間變的不正確。舉例來說,由於移動違規或婚 姻狀態的改變,駕駛人狀態可能隨時間改變。同 樣的風險亦出現於默示擷取的資訊。 • 隱私議題。使用者個人空間與法律權利的細微界 線是另一個關心的可能區域。 ♦法規的遵從。一使用者法律權利的細節尙未淸 楚。在不久的將來,法律規定將要求所有公司在 他們網站上放置隱私聲明,與提供客戶一機制來 檢驗與挑戰所收集來之有關他們的個人資訊。到 個人資料的客戶存取將難以實施,因爲使用者認 證要求與資料請求與更改的難預測本質。在任一 情況中,無法遵從網站聲明的隱私政策或無法提 供客戶他們個人資料的副本,將意味著國家法規 下 公司的 法 律 訴 訟 。 (請先閱讀背面之注意事項再填寫本頁) « -裝 4HICKMAN200036TW; AND1P282.TW 96 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐)嫌 491972 A7 B7 經濟部智慧財產局員工消費合作社印製 五、發明說明(竹) ♦定義偏好或個性 私人的定義可以公開討論。舉例來說,歐洲資料 保護指導原則(European Data Protection Directive)定義一些被認爲特別隱私的地區 (例如政治同盟),因而受到加強的控制。然 而,網路跟隨使用者搜尋樣版與定製某網站提供 之內容的能力,由網站所提供(例如大部分的目 前事件網站(current-affairs site)),將提 供事實上的能力以確認使用者的觀看偏好,而不 用法律要求的明示授權,如果他們正確認他們自 己特性的話。此議題造成美國與歐洲立法者最多 的摩擦,因爲美國傾向於在上下文與使用的基礎 上評估隱私,而歐洲則是根據資料之認知隱私的 絕對衡量(看註釋1)。可用來得到敏感資訊的資 料集合(在每一轄區)將受到與敏感資訊水準 (0.7可能性)等同的隱私規範。 _兒童。 其網站是爲兒童設計的販售商,針對違反隱私規 定與公約將受到更多的公開監督。兒童網站在多 次來訪後去執行內容定製或上下文定製將在政治 上變的敏感。 *出售資料給第三方供應者。 4HICKMAN200036TW; AND1P282.TW ^ 本紙張尺度適用巾@ ®家標準(CNS)A4規格(210 X 297公爱) ' (請先閱讀背面之注意事項再填寫本頁) « -裝 491972 A7 B7 五、發明說明(竹) .一般資料隱私指導方針言明,資訊不得以無法解 釋成資訊收集當時理由的方式使用。其問題來自 於最個人化的資訊(例如股票投資組合)當與其 他應用程式供應商分享時也是最有價値的。這能 造成在網站提供給其訪客的價値(以其提供個人 化的程度而言)相較於從其服務提出的價値(藉 由與廣告商以及第三方組織分享資訊)之間的緊 張。管理個人化與資訊共享之間衝突的要求將成 爲決定網站成功與否的關鍵因素。 內容目錄1714 目前’大多數網站的網路內容未經管理。其企業沒有 利用追蹤內容或內容屬性的發法。而企業有一池內容(a pool of content),其可能分出多個目錄、部門與網路 伺服器。當內容產生,其單藉由將其加入網路伺服器的目 錄並加入顯示它所需的連結,加到這池內容中。在池中的 內容可以被複製、過時的或不使用的。簡而言之,企業不 知道有關內容屬性的內容程度或資訊。 未管理的內容可以是個人化的阻礙。爲了傳送個人化 的內容或過濾內容,系統必須知道那些內容存在與其內容 的屬性。一個內容目錄2 1〇〇或內容管理系統應該用於管 理企業內容。內容目錄的一簡單定義如下。 內容有很多種形式。如第2 1圖所示,內容可能是網 頁(HTML頁面)2102、圖樣(影像)2104、聲音、視 4HICKMAN200036TW; AND1P282.TW 〇c 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) (請先閱讀背面之注意事項再填寫本頁) _·! 裝 經濟部智慧財產局員工消費合作社印製 491972 經濟部智慧財產局員工消費合作社印製 A7 __ _ B7__ 五、發明說明Π1 ) 訊或甚至於資訊2106與訊息。內容儲存的型式也有很多 種;其可儲存在表格、檔案或目錄中。內容目錄需要注意 漼在什麼內容以及儲存在哪裡。這可以藉由保留內容的屬 性並提供內容的索引而達到。內容屬性可能是實體特性, 如內容的什麼型式(HTML頁面、圖樣、聲音檔案、視 訊檔案或文字訊息)或內容的大小。困難點是在於企圖要 儲存試誤的(heuristic)或分析的屬性,並使得個人化 技巧可取得這些屬性。索引策略應該包含完整文件與屬性 索引,其提供有效的存取給企業使用者與任何可能的企業 價値鏈整合會員(integrated members of the enterprises value chain) ° 匹配邏輯1716 此個人化元件需要提供智慧以匹配使用者簡介屬性與 正確內容,並且傳送此內容給使用者。連接檔案資訊到內 容真正是個人化架構的核心。各種不同的方式可以實施以 完成此工作。此匹配邏輯的複雜性直接與此網站個人化層 面有多有彈性、強韌與動態成正比。 匹配的槪念是分析已知使用者的資訊以及決定顯示給 他們之正確內容的程序。一旦使用者簡介屬性已被識別, 他們必須被應用對照於網站內所定之規則與匹配邏輯,以 決定域顯示之適當內容。需要三個輸入以完成匹配程序。 •使用者簡介資訊_一這個資訊由有關使用者已知事 項而組成。用於收集此資訊的程序已在本節稍早 4HICKMAN200036TW; AND1P282.TW 99 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) (請先閱讀背面之注意事項再填寫本頁)4HICKMAN200036TW; AND1P282.TW This paper size is applicable to China National Standard (CNS) A4 (210 X 297 male f) ----------- Secret · Install (Please read the precautions on the back before filling this page ) ---- Order ---------. Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economy 491972 A7 B7 V. Description of Invention (钭) * Filter or inquire the interface. An interface allows the user to directly manipulate or filter the displayed content. * Configuration interface. An interface that allows users to shape a website or choose what to display. Implicit Information Extraction Implicit techniques collect information about interactions without asking the user directly. Basically, websites record interactions to find useful information. Users may not notice that the site is fetching information. The most common silent technique is point-to-point flow analysis (c 1 i c k s t r e a m a n a 1 y s i s). The website records user actions, what they click, where they browse, what is displayed, the time it takes, or the time it takes for a pattern to appear. Then analyze the collected information to obtain patterns and trends ° Information collection considerations The goal of a personalized website is to increase the price of user interaction with the organization. ° Unfortunately, the website may be counterproductive. Personalization of the website. In fact, it may invade or scare customers. The way a website uses to capture information plays an important role in the success of a personalized website. Here are some things to keep in mind when collecting user profile information: • Provide price. Generally speaking, people do not like to give personal information to others. In order to overcome this problem, the website needs to provide the price of information retrieval, or provide a dual-naked status. If the information retrieval causes some user benefits, they are more likely to provide 4HICKMAN200036TW; AND1P282.TW 9 'This paper size is applicable to China National Standard (CNS) A4 (210 X 297 mm) (Please read the note on the back first Please fill in this page for matters) Binding: Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs 491972 Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs A7 B7_____ V. Description of the invention (¾). A good example is the grocery-p referred card. For example, Jewel Food Store offers priority cards, where users get weekly discounts on selected groceries. -Users must present their card to receive the discount. When a customer receives a substantial discount, Jewel obtains valuable user profile attributes, such as purchasing history and trends, and when the customer receives a substantial discount. The same analogy can be applied to explicit information retrieval techniques used on personalized websites. ♦ Proper little questions.塡 Writing long forms or questionnaires can also be turned off immediately. Users do not want to be burdened by information retrieval techniques. They have their goals and tasks, and if the site distracts users by completing a presentation, the site runs the risk of losing a customer. If the information retrieval is not directly related to some prices immediately seen by the user, it is divided into small units or a single problem. Also, just ask what is needed and when it is appropriate. If users are asked to write a long questionnaire at the beginning of an interaction or when they first visit a website, they are likely to leave. By collecting the information needed and linked to the actual price, users are more likely to be willing to provide the correct information and stay on this site. • Correctness issues. There is no way to stop users from lying or providing misinformation. Although there is no certain successful way to prevent this, 4HICKMAN200036TW; AND1P282.TW 95 This paper size is applicable to China National Standard (CNS) A4 (210 X 297 mm) (Please read the precautions on the back before filling this page) 0 -Installed 491972 Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs A7 B7___ V. Invention Description Π. The website can reduce the possibility of occurrence. As mentioned above, users are more likely to be honest if answering a question is associated with a perceived price or small amount. The website should explain the benefits of the right information and how it can benefit users by better serving them. Information may change over time. User interests or marital status may change over time. Confirmation of the information is necessary every time. If the resulting data is stored, these may also become incorrect over time. For example, driver status may change over time due to mobile violations or changes in marriage status. The same risks arise with implied information. • Privacy issues. The subtle boundaries between user space and legal rights are another area of concern. ♦ Regulatory compliance. The details of a user's legal rights are unknown. In the near future, legal requirements will require all companies to place privacy statements on their websites and provide customers with a mechanism to verify and challenge the personal information they collect about them. Customer access to personal data will be difficult to implement due to the unpredictable nature of user authentication requirements and data requests and changes. In either case, failure to comply with the privacy policy stated on the website or failure to provide customers with a copy of their personal data will mean a legal action by the company under national regulations. (Please read the precautions on the back before filling this page) «-Packed 4HICKMAN200036TW; AND1P282.TW 96 This paper size is applicable to China National Standard (CNS) A4 (210 X 297 mm) 491972 A7 B7 Intellectual Property Bureau of the Ministry of Economic Affairs Printed by the employee consumer cooperative V. Invention Description (Bamboo) ♦ Define personal preferences or personal definitions for public discussion. The European Data Protection Directive, for example, defines areas that are considered particularly private (e.g., political alliances) and is therefore under increased control. However, the ability of the Internet to follow users' search patterns and customize the content provided by a website provided by the website (such as most current-affairs sites) will provide de facto ability to confirm the use People ’s viewing preferences, without explicit authorization required by law, if they are confirming their own identity. This issue has caused the most friction between lawmakers in the United States and Europe, as the United States tends to evaluate privacy based on context and use, while Europe is an absolute measure of the perceived privacy of data (see note 1). The collection of data that can be used to obtain sensitive information (in each jurisdiction) will be subject to a privacy standard equivalent to the level of sensitive information (0.7 probability). _child. Its website is a seller designed for children and will be subject to more public oversight for violations of privacy regulations and conventions. Children's websites that perform content customization or context customization after multiple visits will become politically sensitive. * Sell materials to third-party suppliers. 4HICKMAN200036TW; AND1P282.TW ^ This paper size applies towel @ ® 家 standard (CNS) A4 specification (210 X 297 public love) '(Please read the precautions on the back before filling this page) «-Packing 491972 A7 B7 V. Invention Explanation (Bamboo). General data privacy guidelines state that information must not be used in a way that cannot be interpreted as the reason for the time the information was collected. The problem is that the most personal information (such as a stock portfolio) is also the most valuable when it is shared with other app vendors. This can create a tension between the price that a website offers its visitors (to the extent that it offers personalization) compared to the price offered from its services (by sharing information with advertisers and third-party organizations). The requirement to manage conflicts between personalization and information sharing will be a key factor in determining the success of a website. Content Directory 1714 Currently, most websites have unmanaged web content. Its companies do not make use of tracking content or content attributes. An enterprise has a pool of content, which may be divided into multiple directories, departments, and web servers. When the content is generated, it is added to the pool of content by adding it to the directory of a web server and adding the link needed to display it. Content in the pool can be copied, outdated or unused. In short, companies don't know the content level or information about content attributes. Unmanaged content can be a barrier to personalization. In order to deliver personalized content or filter content, the system must know what attributes exist with those attributes. A content catalog 2 100 or content management system should be used to manage enterprise content. A simple definition of the content directory is as follows. There are many forms of content. As shown in Figure 21, the content may be a web page (HTML page) 2102, a pattern (image) 2104, sound, and video 4HICKMAN200036TW; AND1P282.TW 〇c This paper size applies the Chinese National Standard (CNS) A4 specification (210 X 297 (Mm) (Please read the notes on the back before filling out this page) _ ·! Printed by the Consumers ’Cooperative of the Intellectual Property Bureau of the Ministry of Economy 491972 Printed by the Employees’ Cooperative of the Intellectual Property Bureau of the Ministry of Economy A7 __ _ B7__ V. Description of the invention Π1 ) News or even information 2106 and messages. There are many different types of content storage; they can be stored in tables, files, or directories. Content directories need to pay attention to what content and where it is stored. This can be achieved by preserving the attributes of the content and providing an index of the content. Content attributes may be physical characteristics, such as what type of content (HTML page, artwork, sound file, video file, or text message) or the size of the content. The difficulty is attempting to store heuristic or analytical attributes and to make these attributes accessible to personal skills. The indexing strategy should include a complete document and attribute index, which provides effective access to enterprise users and any possible enterprise value chain integrated members ° Matching logic 1716 This personalized component needs to provide wisdom to Match user profile attributes with the correct content and send this content to the user. Linking file information to content is truly at the heart of personalization. Various ways can be implemented to accomplish this. The complexity of this matching logic is directly proportional to how resilient, strong and dynamic this website's personalization layer is. Matching thought is the process of analyzing the information of known users and determining the correct content to display to them. Once the user profile attributes have been identified, they must be applied against the rules and matching logic defined in the website to determine the appropriate content for the domain to display. Three inputs are required to complete the matching process. • User profile information-This information consists of things known to the user. The procedure used to collect this information was earlier in this section. 4HICKMAN200036TW; AND1P282.TW 99 This paper size applies to China National Standard (CNS) A4 (210 X 297 mm) (Please read the precautions on the back before filling this page)

491972 A7 B7________ 五、發明說明(仂0) .做過說明。 •可用內容_一在系統上的內容包括任何顯示給使用 者的資訊。在此情形中,內容包括;視訊、文 字、個人化聲明、小程式與數位資訊。 •系統定義規則或匹配邏輯一-爲了有效使用使用者 簡介資訊,吾人必須具備一組淸楚定義的規則以 依此評估各個使用者。定義此規則以匹配使用者 資訊與內容。 此匹配邏輯的一簡單例子是一個定義查詢。網站可以 提供使用者邏輯來觀看他們的帳戶資訊。在此情形中,檔 案資訊是他們的使用者ID或帳號,其規則是定義查詢 (SELECT account_info FROM Account where Acct_Id= : USer_ACCt_Id)而其內容是儲存在帳戶表 中的使用者帳戶資訊。如果內容儲存在關聯或物件資料 庫,SQL查詢是存取此資料的有效方法。在此情形中,” 定義規則”以SQL聲明的形式出現。不幸地,大部分內容 不儲存於關聯資料庫,或不直接關連到像使用者帳號ID 這樣的東西。取而代之地,內容是網頁或大量的新聞供給 (news feeds)或文字資訊。這些情形需要不同的以及 可能更複雜的方式與基礎結構來執行此匹配邏輯。在這個 環境裡,其規則通常由個人化匹配因素 (Personalization Matching Factors,PMFs)而組 成。 4HICKMAN200036TW; AND1P282.TW 100 本紙張尺度適用中國國家標準(CNS)A4規格(210 χ 297公釐) -----------·! (請先閲讀背面之注意事項再填寫本頁) 裝 _ 經濟部智慧財產局員工消費合作社印製 491972 A7 B7_____ 五、發明說明(Μί) 個人化匹配因素(PMFs ) 個人化匹配因素(PMF )是一規則的建構方塊。執 行個人化程序的匹配層面所要的是資訊。這是人口統計的 /性格分析的(psychographic )/與社群分析 (sociographic )的或任何其它驅動個人化程序所需要 的資訊。PMF可能簡單如使用者性別或一複雜屬性,如 從一群資料得到的駕駛人類型。PMF的定義裡應該包含 創造它所需要的定義。 開發PMF將需要市場行銷部門與其它商業實體的涉 入,其了解客戶策略與企業的客戶。很重要的是,了解客 戶的需要、客戶期望什麼、以及當決定並產生PMF時什 麼會對客戶產生不同的影響。 PMF應該限定在網站可實際上收集到的資訊以及可 靠並正確的資訊。槪念上,PMF可以是任何得到的與構 想出來的資訊。舉例來說,PMF可能是使用者的性別、 年齢、婚姻狀態、子女數、成爲客戶的年數、他們的職 業、駕駛記錄、興趣諸如運動、旅行、其它休閒活動、喜 愛的顏色、個性特徵如他們是細心或悲觀的、或任何其它 人口統計的/性格分析的/社群分析的資訊。這資訊如何收 集?什麼屬性可以用來得到這個?什麼是此資料的準確 性?爲什麼PMF用來作個人化?這些是當決定可能的 PMF時所需要問到的問題形式。 一PMF必須具有淸楚的定義與有限的可能性。舉例 來說,一網站可以產生一個叫做「年齡分類」的PMF。 4HICKMAN200036TW; AND1P282.TW 101 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐"5~^ ~ (請先閱讀背面之注意事項再填寫本頁) --裝 經濟部智慧財產局員工消費合作社印製 491972 A7 __B7________ 五、發明說明(彳02) (請先閱讀背面之注意事項再填寫本頁) 此網站需要定義年齢分類PMF指的是什麼。在此例來 說,年齢分類只是一根據使用者年齡的使用者的邏輯群 組。其値是: 年齢 年齢分類 0-12 兒童 13-19 青少年 20-40 青年人 41-64 中年人 65-125 高齡人 125-200 老人 一 PMF也可能是低層級資料的組合。如果產生一個 保險風險(Insurance Risk)的PMF,所需要的資料會 遠超過年齢一項。它需要包含年齢、駕駛歷史、車輛、地 區與可能的其它資料。 規則與匹配邏輯 PMF是規則與匹配邏輯的建構區塊。不像SQL的擴 充,沒有工業標準方供存取網路內容與產生規則。有些方 式詳列如下= 經濟部智慧財產局員工消費合作社印製 _簡單條件規則---最簡單的程序是去定義一個明確 的規則組合,以依照它來評估PMF。這些規則通 常簡單規則並只具有少許條件去評估。一個簡單 規則會跟隨這個架構: 4HICKMAN200036TW; AND1P282.TW 102 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐)~ " 491972 A7 也-—--- 五、發明說明(切3) .使用者變數+比較算符(operator) +預定値(或 PMF ) 年齡=青年人( 20-40 ) 使用者變數是一特定使用者的簡介屬性或規則之 PMF的値。在此情形中,可從使用者生日與目前日 期所得到使用者年齡。此結構中下一個元件是比較 算符。最後的元件是PMF或此規則所根據的群集或 資料。根據使用者年齡與PMF的粒度,此規則可能 有很多結果。每一個結果可能指向不同組的已定義 內容。整個年齢可能如下·· 使用者年齢 =兒童(<12) 傳送內容ABC =青少年(1 3-19)傳送內容DEF =青年人( 20-40 )傳送內容GHI =中年人(41-64)傳送內容JKL =筒齢人(>64) 傳送內容MN0 ,加上允許規則具有多重PMFs的一邏輯操作員,一 規則將變成更爲複雜。舉例來說,一規則可以只是 「AND」多重PMFs在一起。在此例中,此規則會 像這樣: 使用者變數A +比較算符+預定値(或pMF) a 以及491972 A7 B7________ V. Description of Invention (仂 0). • Content available-Content on the system includes any information displayed to the user. In this case, the content includes; video, text, personalization statements, applets, and digital information. • System-defined rules or matching logic-In order to effectively use user profile information, we must have a well-defined set of rules to evaluate each user accordingly. Define this rule to match user information and content. A simple example of this matching logic is a definition query. Websites can provide user logic to view their account information. In this case, the file information is their user ID or account number. The rule is to define a query (SELECT account_info FROM Account where Acct_Id =: USer_ACCt_Id) and its content is the user account information stored in the account table. If the content is stored in a relational or object database, SQL queries are an effective way to access this data. In this case, the "definition rules" come in the form of SQL statements. Unfortunately, most of the content is not stored in an associated database or directly linked to something like a user account ID. Instead, the content is a web page or a large number of news feeds or textual information. These situations require different and possibly more complex ways and infrastructure to perform this matching logic. In this environment, the rules are usually composed of Personalization Matching Factors (PMFs). 4HICKMAN200036TW; AND1P282.TW 100 This paper size applies to China National Standard (CNS) A4 (210 χ 297 mm) ----------- ·! (Please read the precautions on the back before filling this page ) Equipment _ Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 491972 A7 B7_____ V. Invention Description (Μί) Personalized Matching Factors (PMFs) Personalized Matching Factors (PMF) is a regular building block. Information is needed for the matching level of the personalization process. This is the demographic / psychographic / sociographic or any other information needed to drive personalization. PMF may be as simple as user gender or a complex attribute, such as the type of driver obtained from a group of data. The definition of PMF should include the definitions needed to create it. The development of PMF will require the involvement of the marketing department and other business entities, who understand customer strategies and corporate customers. It is important to understand what customers need, what they expect, and what affects customers differently when deciding and generating PMF. The PMF should be limited to the information that the site can actually collect and reliable and accurate information. In theory, PMF can be any information obtained and conceived. For example, PMF may be the user's gender, age, marital status, number of children, years of becoming a customer, their occupation, driving history, interests such as sports, travel, other leisure activities, favorite colors, personality characteristics such as They are attentive or pessimistic, or any other demographic / characteristic analysis / community analysis information. How is this information collected? What attributes can be used to get this? What is the accuracy of this information? Why is PMF used for personalization? These are the forms of questions that need to be asked when deciding on a possible PMF. A PMF must have a good definition and limited possibilities. For example, a website can generate a PMF called "age classification". 4HICKMAN200036TW; AND1P282.TW 101 This paper size is applicable to China National Standard (CNS) A4 (210 X 297 mm " 5 ~ ^ ~ (Please read the precautions on the back before filling this page)-Install the intellectual property of the Ministry of Economic Affairs Printed by the Bureau ’s Consumer Cooperatives 491972 A7 __B7________ 5. Description of the Invention (彳 02) (Please read the notes on the back before filling out this page) This website needs to define what the annual category PMF means. In this case, the annual category It is only a logical group of users based on the age of the users. The categories are: year, year, year, class, 0-12, child, 13-19, young, 20-40, young, 41-64, middle-aged, 65-125, senior, 125-200, old PMF may also be a combination of low-level data. If an insurance risk PMF is generated, the required data will be much more than one year. It needs to include the year, driving history, vehicle, region and possibly other information. Rule and matching logic PMF is the building block of rules and matching logic. Unlike the extension of SQL, there is no industry standard for accessing network content and generating rules. Some methods The details are as follows = Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs_Simple Condition Rules --- The simplest procedure is to define a clear combination of rules to evaluate PMF according to it. These rules are usually simple rules with only a few Conditions to evaluate. A simple rule will follow this structure: 4HICKMAN200036TW; AND1P282.TW 102 This paper size applies the Chinese National Standard (CNS) A4 specification (210 X 297 mm) ~ " 491972 A7 also ----- Description of the invention (cut 3). User variable + comparison operator (operator) + predetermined 値 (or PMF) Age = young people (20-40) User variable is a specific user profile attribute or rule of PMF 値In this case, the user's age can be obtained from the user's birthday and the current date. The next element in this structure is the comparison operator. The last element is the PMF or the cluster or data on which this rule is based. With the granularity of PMF, this rule may have many results. Each result may point to a defined content of a different group. The whole year may be as follows: User year: = children ( < 12) Transmission content ABC = Youth (1 3-19) Transmission content DEF = Young people (20-40) Transmission content GHI = Middle-aged person (41-64) Transmission content JKL = Chuanren (> 64) The delivery of content MN0, plus a logical operator that allows the rule to have multiple PMFs, will make the rule more complex. For example, a rule can be just "AND" multiple PMFs together. In this example, the rule would look like this: user variable A + comparison operator + predetermined 値 (or pMF) a and

使用者變數B +比較算符+預定値(或PMF) B 4HICKMAN200036TW; AND1P282.TW 1(Γ 冢紙張尺度適用中國國家標準(CNS)A4規格(210 χ 297公釐)~^ (請先閱讀背面之注意事項再填寫本頁) > I I I §1 I ϋ ml ϋ 一 I— 1 an .^1 ϋ I I · 經濟部智慧財產局員工消費合作社印製 經濟部智慧財產局員工消費合作社印製 491972 A7 __JB7___ 五、發明說明(切斗) 實際規則則像這樣: 年齡=青年人( 20-40 ) 以及性別=Μ (男) 這個規則現在是年齢-性別規則。它評估使用者的年 齢分類與性別。.如果使用者年齡分類是”青年人”與男, 那麼聲明評估其爲真並採取行動,或者傳送特定內容。 初看時,這似乎難以編碼。假如直接放置於腳本 (script )中,這會是一個真實聲明。取而代之的是,此 基礎結構應該被創造成能夠定義規則、評估規則、指定一 規則給動態內容區域或頁面,並且指定內容到特定的規則 結果。非但在應用程式或腳本中硬編碼(hard coding),此規則元件或動態內容區域(DCA)被放置 在腳本中。當遇到DCA此架構處理規則評估與定義檔案 屬性到規則的匹配,以傳送適當的內容。 槪念上這很容易,但是創造這個基礎結構卻很困難。 爲此,一規則引擎(rule engine)或個人化販售商將被 引進。許多獨立軟體販售商(IS Vs)集資到這個市場定 位上並創造他們自己的專有個人化基礎結構。這些販售商 將更詳描述在隨附的販售商文件中。 •前進連鎖規則(Forward Chaining Rule)-… 前進連鎖仍然使用簡單規則的基本原則,但是促 進建構於此時可得之使用者資訊之上。在此情形 中,只要可取得小量有關使用者的資訊,則此規 4HICKMAN200036TW; AND1P282.TW 104 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) ^ : (請先閱讀背面之注意事項再填寫本頁)User variable B + comparison operator + predetermined 値 (or PMF) B 4HICKMAN200036TW; AND1P282.TW 1 (Γ The paper size is applicable to the Chinese National Standard (CNS) A4 specification (210 χ 297 mm) ~ ^ (Please read the back first Please fill in this page for more details) > III §1 I ϋ ml ϋ 一 I— 1 an. ^ 1 ϋ II __JB7___ 5. Explanation of the invention (cut bucket) The actual rules are like this: Age = young people (20-40) and gender = M (male) This rule is now the age-gender rule. It evaluates the age-category and gender of users. If the user's age classification is "young people" and male, then declare to evaluate it as true and take action, or transmit specific content. At first glance, this seems difficult to code. If placed directly in a script, this would be A true statement. Instead, this infrastructure should be created to define rules, evaluate rules, assign rules to dynamic content areas or pages, and assign content to specific The result of the rule. Instead of hard coding in the application or script, this rule element or dynamic content area (DCA) is placed in the script. When DCA is encountered, this framework handles rule evaluation and defines file attributes to the rule's Match to deliver the appropriate content. It ’s easy to remember, but it ’s difficult to create this infrastructure. To this end, a rule engine or personalized vendor will be introduced. Many independent software vendors (IS Vs) to fund this market positioning and create their own proprietary personalization infrastructure. These vendors will be described in more detail in the accompanying vendor documents. • Forward Chaining Rule- … Forward Chain still uses the basic principles of simple rules, but promotes the construction based on the user information available at this time. In this case, as long as a small amount of information about the user can be obtained, this rule 4HICKMAN200036TW; AND1P282.TW 104 This paper size applies to China National Standard (CNS) A4 (210 X 297 mm) ^: (Please read the precautions on the back before filling this page)

491972 A7 B7 五、發明說明(彳〇s) 經濟部智慧財產局員工消費合作社印製 .則將只根據此資料而決定。一旦收集到更多資 訊,此規則考慮到更多域評估的複雜條件。此規 則的設定與此相似: 使用者變數+比較算符+預定値(或PMF) 與若以下已知 使用者變數+比較算符+預定値(或PMF) 年齢=2 0-4 0 與若 性別已知是 = 男 以上規則將依據已知的使用者相關資訊量 估。舉例來說,如果對使用者所知只有他/她的年齢,^ 規則將以一種方式評估。如果他/她的性別& 規則將以另一方式評估。 & 鲁學習系統(神經網路(Neural Net 〜〇rk))… 學習系統背後的前提是,它將監_ 用者的行動 並隨系統從使用者之所學以不同的^ & 技巧是規則與關係的複雜組合,遞相^用^與網 站的互動來增加企業有關客戶的知_。^ 此的方法是用神經系統網路的定義。 # 〜神經系統 網路是一模擬人腦運作的程式與食 枓結構的系 統。通常一個神經系統網路起初裹,,;^^士 &爻訓練”或給491972 A7 B7 V. Description of the Invention (s〇s) Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs, will only be determined based on this information. Once more information is collected, this rule takes into account the complex conditions of more domain evaluations. The setting of this rule is similar to this: user variable + comparison operator + booking 値 (or PMF) and if the following known user variable + comparison operator + booking + (or PMF) year 齢 = 2 0-4 0 and if Known gender = Male rule is estimated based on information about known users. For example, if the user knows only his / her age, the ^ rule will be evaluated in one way. If his / her gender & rules will be evaluated in another way. & Lu learning system (Neural Net ~ 〇rk) ... The premise behind the learning system is that it will monitor _ the user's actions and follow the system from the user to learn different ^ & skills are A complex combination of rules and relationships, phase by phase ^ use ^ interaction with the website to increase corporate knowledge about customers. ^ This method uses the definition of neural network. # ~ Nervous system The network is a system that simulates the functioning of the human brain and the structure of the food. Usually a neural network is wrapped at first, ^^ 士 & 爻 training "or give

予大量有關資料關係的資料與規貝[J 一個人的爺爺比父親年長)。一瘦$I have a lot of information about the relationship between the data and rules [J a grandfather who is older than his father]. A thin $

4HICKMAN200036TW; AND1P282.TW 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) (請先閱讀背面之注意事項再填寫本頁) « -裝 (舉例來說 能指示網路 105 A7 B74HICKMAN200036TW; AND1P282.TW This paper size is applicable to China National Standard (CNS) A4 (210 X 297 mm) (Please read the precautions on the back before filling this page) B7

如何因應外來的刺激’或者它能自己根據使用者 的行動起始活動。 • 歸納推導(Inductive reasoning)與合作過濾 (Collaborative Fi 11 er i n g ) - — F ir e f i y 將合 經濟部智慧財產局員工消費合作社印製 491972 五、發明說明(扣6) 作過濾定義成一技術,其仿效人根據對彼此偏好 的了解做出推薦的社會程序。個人代理器追蹤並 根據個人的品味與偏好選擇物品。 核心技術在定義的網路環境內或品味空間內,將 內容傳送與對有關人員的了解個人化。Firefly工具 根據在其它情況下可比較物品的明示或默示評比,將 個人使用者的偏好相互關聯。這些評比可以整個儲存 於單一網站內或配合在從個人客戶與分享伺服器組成 之資訊而來的飛檔(fly)上。 合作過濾評估單一組使用者偏好以識別個人利害族群 (community of interest)。合作過濾、.相互關聯個 人使用者的品味與可比較使用者的偏好以發展一系列個人 化推薦。這有時候被稱爲人對人匹配(People- to people matching )並致力於將口語(word-of-mouth) 類的資訊自動化。 現成查詢(Canned query)---現成查詢系統允許 使用者只選擇一些爲使用者所預定的活動。此查詢給使用 者所列舉的選擇,而不隨時間改變。 上列例子主要是網站控制。此網站具有預先定義的規 4HICKMAN200036TW; AND1P282.TW 106 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) ^How to respond to external stimuli ’or it can initiate activities based on user actions. • Inductive reasoning and collaborative filtering (Collaborative Fi 11 er ing)-Fir efiy will be printed by the Consumers' Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs 491972 5. The invention description (deduction 6) is defined as a technology for filtering. Imitate social procedures in which people make recommendations based on their knowledge of each other's preferences. Personal agents track and select items based on personal tastes and preferences. The core technology personalises the delivery of content and understanding of the people involved within a defined network environment or taste space. Firefly tools correlate individual user preferences based on explicit or implicit ratings of comparable items in other situations. These ratings can be stored entirely on a single website or combined on a fly from information composed of individual customers and sharing servers. Cooperative filtering evaluates a single set of user preferences to identify individual communities of interest. Collaborative filtering, interrelated personal user tastes and comparable user preferences to develop a series of personalized recommendations. This is sometimes called people-to-people matching and is dedicated to automating word-of-mouth information. Canned query-The ready-made query system allows the user to select only some activities that are reserved for the user. This query gives the user the choices listed without changing over time. The examples above are mainly site controls. This website has pre-defined rules 4HICKMAN200036TW; AND1P282.TW 106 This paper size applies to China National Standard (CNS) A4 (210 X 297 mm) ^

491972 A7 B7 五、發明說明(仏7) 則或將執行的匹配邏輯。此網站負責決定從互動中已經學 習到什麼,根據所得知識可做到什麼,那些外加資訊將提 供更多的見解。可能的話’使用者應被允許去定義規則以 及匹配邏輯或者是他們想看的內容。提供使用者結構以創 造規則或定義查詢° 定義合法的商業規則與模式與評估他們的基礎結構一 樣重要。規則可以執行而內容可被傳送,但是如果其規則 在商業上沒道理,其努力是全是白費。商業與市場行銷人 員應該參與定義規則’並確認他們被正確地解讀並技術性 地被執行。這是個人化小組應包含來自1τ、商業與市場 行銷部的人員的另一原因。其集團需要瞭解他們現在的及 潛在的客戶、可取得的內容以及在何時與爲何顯示它。 合倂與傳送內容1718 匹配邏輯的規則應該被定義成獨立實體,所以他們能 再被使用於多種情況中°各個情況可將相同的規則關聯到 不同互動與不同組的內容。匹配邏輯應關聯到一模版或互 動,而內容應關聯到一規則結果或匹配邏輯條件。 一種聯繫一規則與內容到一互動的可能方法是使用動 態內容區域(DCA)。DCA是嵌附於一模版並指向一定 規則,而一規則結果組合將關聯到特定內容。例如一頁面 可對目前的使用者說明一特殊服務。此網站可能希望在一 頁面上顯示使用者可聯繫到的一圖樣’以及個人化到使用 者之利益的列表’最後列出使用者有資格得到的折扣。 4HICKMAN200036TW; AND1P282.TW 107 _本紙張尺度適用中國國家標準(CNS)A4規格(210 x 297公釐) (請先閱讀背面之注意事項再填寫本頁)491972 A7 B7 V. Description of the invention (仏 7) Matching logic that may or may be executed. This site is responsible for deciding what has been learned from the interaction and what can be done based on the knowledge gained, and those additional information will provide more insights. If possible, users should be allowed to define rules and match logic or what they want to see. Provide user structure to create rules or define queries ° Defining legitimate business rules and models is as important as evaluating their infrastructure. Rules can be enforced and content can be delivered, but if their rules are not commercially justified, their efforts are all in vain. Business and marketing people should be involved in defining the rules ’and make sure they are properly interpreted and technically enforced. This is another reason why the personalization team should include people from 1τ, Business and Marketing. Its group needs to understand their current and potential customers, what is available, and when and why it is displayed. Combining and transmitting content 1718 The rules of the matching logic should be defined as independent entities, so they can be used in multiple situations. Each situation can associate the same rule to different interactions and different groups of content. Matching logic should be tied to a template or interaction, and content should be tied to a rule result or matching logic condition. One possible way to connect a rule with content to an interaction is to use a dynamic content area (DCA). DCA is embedded in a template and points to certain rules, and a combination of rule results will be associated with specific content. For example, a page can explain a particular service to the current user. This site may wish to display on one page a graphic that the user can reach, as well as a list of benefits that are personalized to the user, and finally list the discounts that the user is eligible for. 4HICKMAN200036TW; AND1P282.TW 107 _ This paper size applies to China National Standard (CNS) A4 (210 x 297 mm) (Please read the precautions on the back before filling this page)

MM ΜΜ W a··· ΜΗ· MB MIB W IBB A 經濟部智慧財產局員工消費合作社印製 經濟部智慧財產局員工消費合作社印製 491972 A7 B7 五、發明說明(彳oS) 一分離的DCA可以用在各組資料。第22圖揭露一示 範模版2200與嵌入於此模版的三個DCA。 • DCA1 2202可能是圖樣的放置架 (place h ο 1 d e r )。與D C A 1相關的規則可能是一組 PMFs的基礎,如年齢與性別。依照規則評估的 方式,可能顯示不同的圖樣(在此情形中,一圖 樣是內容) • DCA2 2204可能代表使用者可從此服務所得之 利益的放置架。此規則可關聯到不同的PMFs。 舉例來說,這個規則的PMFs可能是婚姻狀態、 子女的年齢與數量以及收入水準。不同利益將根 據此規則評估的方式顯示。在此情形中,與利益 相關的一文字聲明被認爲是其內容。 • DCA3 22〇6可能代表折扣的放置架。此區域可 在使用爲DCA2所創造的規則,但內容卻不同。 在這個情形中,其內容係表列根據規則評估的折 扣° 在網站的設計期間,必須做出一決定以決定網站的那 一區域將提供個人化內容給使用者,使用的規則與相關的 匹配邏輯,以及對於各個規則結果應該顯示什麼內容。既 然沒有與使用者面對面的互動,確認所用內容是很重要 的。網站必須讓使用者感覺好似他們被直接溝通。一旦使 用者要求或碰到此網頁,其網頁就被產生,而各個D C A 將要求一規則應被執行,而內容應按使用者檔案產生。 4HICKMAN200036TW; AND1P282.TW lnc 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) -----------裝--------訂· (請先閱讀背面之注意事項再填寫本頁) 著· A7MM MM W a ·· ΜΗ · MB MIB W IBB A Printed by the employee's consumer cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs Printed by the employee's consumer cooperative of the Intellectual Property Bureau of the Ministry of Economics 491972 A7 B7 V. Description of the invention (彳 oS) A separate DCA can Used in each group of materials. Figure 22 reveals a model template 2200 and three DCAs embedded in this template. • DCA1 2202 may be a pattern placement rack (place h ο 1 d e r). Rules related to DCA 1 may be the basis for a set of PMFs, such as age and gender. Depending on how the rules are evaluated, different graphics may be displayed (in this case, a graphic is content) • DCA2 2204 may represent a shelf for the benefits that users can derive from this service. This rule can be linked to different PMFs. For example, the PMFs for this rule might be marital status, age and number of children, and income level. Different interests will be shown in the way that this rule is evaluated. In this case, a written statement of interest is considered to be its content. • DCA3 22〇6 may represent discounted shelves. This area can use the rules created for DCA2, but the content is different. In this case, the content is a list of discounts assessed according to rules. During the design of the website, a decision must be made to determine which area of the website will provide personalized content to the user, and the rules used will match the relevant Logic, and what should be displayed for each rule result. Since there is no face-to-face interaction with the user, it is important to confirm what is being used. The site must make users feel as if they are being communicated directly. Once the user requests or encounters this webpage, its webpage is generated, and each DCA will require that a rule should be implemented and the content should be generated according to the user's profile. 4HICKMAN200036TW; AND1P282.TW lnc This paper size is applicable to China National Standard (CNS) A4 (210 X 297 mm) ----------- Installation -------- Order · (Please first (Read the notes on the back and fill out this page.) A7

五、發明說明(彳D兮) 經濟部智慧財產局員工消費合作社印製 內·谷的正吊傳送方法是透過使用HTTp。這個方法將 被用於傳送多數的內容。還有其它根據域傳送內容會被考 慮的傳送方法。其它傳送方法包括電子郵件、FTP、推送 或頻道與串适W像(Streaming video)。既然傳送的 時機非常重要,一定要考慮開發一傳送方法,其即時地提 供使用者最大的影響。 管理1720 個人化因一些理由而有些困難,但其最大的困難 (gotcha)在於其畢竟需要專用的維護人員。當很多個 人化程序可以自動化時,用以匹配內容到來訪者之商業規 則的建立以及分類所有內容的元資料(metadata)標籤 仍然需要大量的人人力監督。對如此的監督的需要只會因 爲隨著來訪者的數目與可取得內容的增加,個人化指數地 變得更爲複雜而加重。其結果是決定從事個人化公司沒有 適當地集合人員將招致失敗。 個人化是連續的程序。它不是一種應用,輸送完然後 不再提起或忘記它。個人化技巧需要加入、移除與修正。 規則、內容與訊息將變化。大部分企業無法測量投資的利 潤,或無法直接地將客戶行爲歸因於某些主動權。結果, 企業時常投資在首創、推廣與活動,而不知他們將如何影 響產品與客戶收益性(profitability)。程序、測量與 報告裝置、以及度量必須被創造,以允許企業去評估並改 進他們個人化互動與輸送客戶策略,以及傳送他們的客戶 4HICKMAN200036TW; AND1P282.TW 1〇9 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) ~ ^ : 一 .丨丨-----丨丨丨·丨丨丨·!丨訂-丨丨丨—丨丨丨-· (請先閱讀背面之注意事項再填寫本頁) 經濟部智慧財產局員工消費合作社印製 491972 A7 B7 _______ 五、發明說明(彳1〇) 策略。網站可提供客戶機會去做採購的決定。假如他們決 定不去購買,理由是什麼?企業應該企圖去收集爲什麼會 發生這結果的資料並想辦法阻止將來再發生。下列最佳化 與管理元件應考慮用在個人化網站上: • 內容評等與使用者回報。允許使用者直接去評等 互動與內容。網際網路是互動媒介,但不像面對 面互動,無法解讀使用者的臉或他們聲音中的感 染力以決定是否已滿足其需求。此型回報需要內 建於網站中。介面應簡單讓使用者以單一點選即 可提供回報。 • 投資/資訊上計量收益(metris return )。如何 決定個人化程序是否幫助這個企業?計量應被定 義以測量投資/資訊上收益(Return on Investment/Information, ROI )。這可會b 包 含報告設備以擷取提供這些計量所需要的資訊。 •管理設備(Administration Facility)。設計 | 一個人化網站時,規則與內容的維護應予以考 慮。最可能推送此資訊的人將不是技術導向的, 而且可能需要簡單的介面來改變個人化內容的規 則。一個IS工作成員不該被要求去改變規則。對 內容也是一樣。內容增加時,資訊需要編入索引 並與在網站執行的搜尋技術整合。 互動市場行銷1702 4HICKMAN200036TW; AND1P282.TW 110 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) ~_ — ----------裝--------訂--------- (請先閱讀背面之注音心事項再填寫本頁) 491972 A7 B7 五、發明說明⑴ί) 有了互動媒體的新興,以及收集與此媒體互動客戶之 即時資訊的固有能力,企業的市場行銷策略與系統變的越 來越以客戶爲中心。隨著從大眾(或目標)市場行銷到以 客戶爲中心的市場行銷形式,企業必須評估他們的客戶關 係模式。 傳統上,市場行銷模式傾向專注於客戶取得(大眾市 場(mass marketing)),然後專注於客戶選擇(微市 場行銷(micromarkeing)與目標市場行銷(target marketing))。然而,一些硏究指出,去取得一個可收 益客戶的成本爲保留一個客戶的四到十倍。這個體認導致 在客戶保留與擴張上升高的重視,並且此一體認已經成爲 關係市場行銷(relationship marketing)的主要驅策 力量。 然而,客戶保留與擴張較不獨立於傳統市場行銷,而 且更緊繋於客戶在每一次與企業的互動中所認·定的價値。 此外,這些策略需要不同的市場行銷基礎結構,其是資料 與客戶驅動的,而不是產品與創意驅動的。因此關係市場 行銷是有些叫錯名,因爲爲客戶關係加値不只是一市場行 銷挑戰,而更牽涉到企業內每一功能的挑戰。這個商業模 式需要藉由在與客戶的每一接觸點持續地提供優越的服 務,以將自己區分出來。5. Description of the invention (彳 D 兮) Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs. This method will be used to deliver most of the content. There are other delivery methods that are considered based on the domain delivery content. Other delivery methods include email, FTP, push or channel and streaming video. Since the timing of transmission is very important, we must consider developing a transmission method that will provide the user with the greatest impact in real time. Managing 1720 personalization is difficult for a number of reasons, but the biggest difficulty (gotcha) is that it requires dedicated maintenance personnel after all. When many personalization procedures can be automated, the establishment of business rules to match content to visitors and the classification of metadata tags for all content still require a lot of human supervision. The need for such monitoring is only exacerbated by the exponential increase in personalization as the number of visitors and available content increases. As a result, the decision to engage in a personalised company without proper staffing will lead to failure. Personalization is a continuous process. It is not an application, and it is no longer lifted or forgotten after delivery. Personalization skills need to be added, removed, and modified. Rules, content and messages will change. Most companies are unable to measure the profitability of their investments or directly attribute customer behavior to certain initiatives. As a result, companies often invest in initiatives, promotions and events without knowing how they will impact product and customer profitability. Procedures, measurement and reporting devices, and metrics must be created to allow companies to evaluate and improve their personalized interactions and delivery of customer strategies, as well as delivery of their customers. 4HICKMAN200036TW; AND1P282.TW 109 This paper standard applies Chinese national standards ( CNS) A4 specifications (210 X 297 mm) ~ ^: One. 丨 丨 ----- 丨 丨 丨 丨 丨 丨 !! Order-丨 丨 丨 丨 丨 丨-· (Please read the first Please fill in this page again for attention) Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economy 491972 A7 B7 _______ V. Description of Invention (彳 1〇) Strategy. The website can provide a client that will make purchasing decisions. If they decide not to buy, what is the reason? Companies should try to collect data on why this happens and find ways to prevent it from happening again in the future. The following optimization and management components should be considered for personalized websites: • Content rating and user reporting. Allow users to rate interactions and content directly. The Internet is an interactive medium, but unlike face-to-face interaction, it is impossible to interpret the user's face or the infectivity in their voice to determine whether their needs have been met. This type of return needs to be built into the website. The interface should be simple so that users can provide a return with a single click. • Metrics return on investment / information (metris return). How to decide if a personalization program will help the business? Measurements should be defined to measure Return on Investment / Information (ROI). This may include reporting equipment to capture the information needed to provide these measurements. • Administration Facility. When designing a personal website, rules and content maintenance should be considered. The people most likely to push this information will not be technology-oriented and may require a simple interface to change the rules of personalized content. An IS member should not be required to change the rules. The same is true for content. As content increases, information needs to be indexed and integrated with search technology performed on the site. Interactive marketing 1702 4HICKMAN200036TW; AND1P282.TW 110 This paper size is applicable to China National Standard (CNS) A4 specification (210 X 297 mm) ~ _----------- install ------- -Order --------- (Please read the phonetic notes on the back before filling out this page) 491972 A7 B7 V. Description of the Invention⑴) With the emergence of interactive media and the collection of real-time customers who interact with this media The inherent capabilities of information, corporate marketing strategies and systems are becoming more and more customer-centric. As they move from mass (or target) marketing to customer-centric marketing, companies must evaluate their customer relationship models. Traditionally, the marketing model tends to focus on customer acquisition (mass marketing), and then focus on customer choice (micromarkeing and target marketing). However, some studies have pointed out that the cost of acquiring a profitable customer is four to ten times that of retaining a customer. This recognition has led to an increased emphasis on customer retention and expansion, and this recognition has become a major driving force for relationship marketing. However, customer retention and expansion are less independent of traditional marketing and are more closely tied to the price that customers recognize and set in each interaction with the enterprise. In addition, these strategies require different marketing infrastructures that are data and customer driven, not product and creative driven. Therefore, relational marketing is a bit misnamed, because adding customer relationships is not just a marketing challenge, but also a challenge for every function in the enterprise. This business model needs to differentiate itself by continuously providing superior services at every point of contact with customers.

ShARE模式ShARE mode

ShARE (選擇1 730、取得1 732、保留1 736、與擴 4HICKMAN200036TW; AND1P282.TW 111 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) (請先閱讀背面之注意事項再填寫本頁) 經濟部智慧財產局員工消費合作社印製ShARE (choose 1 730, obtain 1 732, reserve 1 736, and expand 4HICKMAN200036TW; AND1P282.TW 111 This paper size applies to China National Standard (CNS) A4 specifications (210 X 297 mm) (Fill in this page) Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs

491972 A7 B7 五、發明說明(112) 張1 734 )客戶關係模式2300詳述於第23圖。同時參看第 17圖。此模式提出轉換到互動市場行銷的改變。由於互 動媒體的新興,今日的系統有能力達到ShARE模式的所 有範圍。 選擇1730491972 A7 B7 V. Description of the Invention (112) Zhang 1 734) The customer relationship model 2300 is detailed in Figure 23. See also Figure 17. This model proposes a shift to interactive marketing. Due to the emerging of interactive media, today's systems are capable of reaching the full scope of the ShARE model. Choice 1730

ShARE模式的選擇部分決定在一般人群中誰是公司 最可獲益的客戶。選擇決定產品目標觀眾的組成,並允許 一公司更正確地集中注意力。這是人口統計資訊,如年 齢、地理與收入所應用到的範圍,以產生可能客戶之較有 限的名單。選擇程序允許企業做出如不要在艾瓜多爾 (Ecuador)行銷雪鏟等等的決策。 取得1732 取得重點在於讓潛在客戶以最有效的方式去使用一家 公司的服務或買一家公司的產品。傳統上此領域的重點集 中在大眾市場行銷以及量測一企業每一千個聯繫到客戶的 成本。取得的經典例子是P&G在美國白天的電視劇推銷 肥皂,造成今日所謂的肥皂劇。其它的取得方法包含直接 郵寄、電話勸誘、免費訂貨電話號碼、以及最近的網際網 路廣告與線上交易。 廣告 在雙向互動與一般大眾觀眾上投入資本時,常常利用 4HICKMAN200036TW; AND1P282.TW 112 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) --裝--- (請先閱讀背面之注意事項再填寫本頁) 訂·. 經濟部智慧財產局員工消費合作社印製 A7 B7 I、發明說明(彳13) 廣告於展開在網際網路的應用程式上。在以瀏覽器爲基礎 的實施中,資訊框或標題的使用創造將一部份顯示用廣告 的可能性。具有了大部分市場行銷能,廣告模式(服務) 可以從簡單的靜態廣告改變到與個人化整合在一起的強韌 廣告。實施的方法從廣告小程式到與個人化系統整合的廣 告服務。以下詳列包括在複雜廣告實施中的可能服務。 儲存 廣告內容的存放應以與產品與電子行銷內容相同的方 式儲存。其內容應與個人化服務與使用者簡介整合在一 起。 與個人化的整合 理想上,個人化服務是分開的,而可被多個應用程式 所使用。爲將廣告個人化、檔案資料將被收集而廣告內容 將根據檔案進行過濾。一分離的程序將處理內容的合倂與 傳送以及當使用者瀏覽過往暫時改變廣告。廣告內容可包 含豐富內容如圖樣與視訊。 立即買服務 微軟與其它公司正在致力於允許使用者去點選廣告與 採購物品而不離開網站的技術。這些技術正不停出現’而 且可能要求客戶側的錢包(wallet)以執行此交易。推 銷的技巧在於提供快速購買感興趣物品,而不用離開感興 4HICKMAN200036TW; AND1P282.TW 113 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) -----------裝 (請先閱讀背面之注意事項再填寫本頁) 訂--------- 經濟部智慧財產局員工消費合作社印製 491972 A7 B7 五、發明說明(114) 趣的網站以進行購買。微軟最近提供使用與一微軟錢包 (Microsoft Wallet)整合的ActiveX控制。其它廠商 必定跟隨此趨勢。 使用星度(m e t e r i n g )與調解(r e c 〇 η e i 1 i a t i 〇 n ) 有很多種不同之廣告空間收費的方法。最普遍付款的 方法是利用其可包含的使用:顯示時間數目、廣告顯示長 度或看到廣告使用者的數量。需要有記錄使用資訊的服 務,以與廣告提供者調解。既然很多網站的資金來源是廣 告收入,此服務的準確度是具決定性的。 當線上廣告與其支援技術趨於成熟,新廣告方法將出 現。舉例來說,在頁面間自動跳出的「網路廣告 (intermercial )」(有時是指間隙意思 (interstitial-meaning )糾纏的(intertwined)) 可能是嚇一個可選擇的方法。確保維持靈活度並與能夠考 量到用以實施廣告之不斷更新的技術。 保留1736 現在公司知道保留現有客戶比找新客戶便宜的多’大 家都越來越重視保留客戶。保留的重點在於保持客戶越久 越好。達到此最有效的方法是在每一個與客戶互動中,提 供最傑出的客戶服務。既然電子商務不提供傳統的客戶服 務,以網路爲基礎的企業具有含適當支援功能的網站是很 4HICKMAN200036TW; AND1P282.TW 1 ^ 本紙張尺度適用中國國家標準(CNS)A4規格(210 ¾公[y (請先閱讀背面之注意事項再填寫本頁) 裝 經濟部智慧財產局員工消費合作社印製 72 9 1X 49 五 經濟部智慧財產局員工消費合作社印製 A7 — _____ B7 發明說明(彳15) 重要的。此支援應易於使用,並符合該產品客戶的特定需 求。 推薦服務 推薦功能可能有複雜的格式。最普通的格式是允許網 站使用者提供有關於該網站內容或產品正面或負面的直接 回報以及推薦。藉著提供這些服務,網站可以提供一個讓 使用者可以互相互動、提供網站價値的社群。例如網站能 允許使用者提出書評。然後此資訊又可供一般大眾消費。 雖然實施此技術是相當簡單,其程序可能較爲複雜。此程 序包括接收輸入、評論推薦、過濾與核准內容,然後再張 貼這些評論或推薦。過濾與評論程序的缺乏可能破壞網 另一種推薦服務是給使用者庫建議。這些服務可能從 簡單到複雜。一較複雜的推薦服務可能利用合作過濾 (collaborative filtering)。合作過濃是使用從網站 使用者庫來的內容或產品評比以預估其它潛在使用者對此 內容或產品的興趣。關聯演算法(c 〇 r r e 1 a t i ο η algorithms)使用檔案資料、歷史,與/或輸入偏好以建 構一關聯使用者群組,他們的評比是新使用者有效的預估 根據。預估演算法接著使用使用者的評比與檔案資訊做出 他們最可能感興趣的內容預估。(注意:合作過濾技術可 在個人化系統內實施) 相互關係階段手段使用檔案資料、歷史,與/或輸入 4HICKMAN200036TW; AND1P282.TW iis 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) -----------裝--------訂--------- (請先閱讀背面之注意事項再填寫本頁) 491972 A7 -------_____五、發明說明(1仏) 優先去建AI翻拥互_群,他們㈣等是新使用者有 效的預估。預雖段手段_的熊案資料㈣他們發現 取有興趣的內額估。(处:合作過難術可在個人化 系統執行) 經濟部智慧財產局員工消費合作社印製 網站宣告與事件提醒(site AnouncementsandEvent Reminder ) 外加的關係建立技術是網站宣布與事件提醒。其基礎 的站具有以產生的內容,從根據 客戶取後來g方之新產品宣佈或對特定客戶重要之將到來事 件的提醒。雜來_…事件提醒能指出即將到來的婚 禮’個人紀念日或假日。f吏用者一旦被提醒,可利用此網 站對事件做出回應。假如網站執行複雜的事件提醒,可能 需要外加的服務以提供日曆與排程功能。這些服務也可以 與網站外訂閱服務合倂,以提供未登錄此網站使用者提 醒。 忠誠與返回客戶程式 營造促進客戶返回網站的環境對網站的壽命是很重 要。許多賣方中心的實施將利用會員服務與其他鼓勵程式 以試圖並促進客戶返回。舉例來說,網站會員會收到折扣 與額外的特權,因而建立與網站較好的關係。像老主顧點 數以及使用會員獨享資訊則是其他常見的方法。忠誠程式 可能需要額外的邏輯以得到允許並進行內容過濾。大部分The selection of the ShARE model partly determines who is the company's most profitable customer in the general population. Selection determines the composition of the product's target audience and allows a company to focus more accurately. This is demographic information such as age, geography, and income to which the scope is applied to produce a more limited list of possible customers. The selection process allows companies to make decisions such as not selling snow shovels in Ecuador. Gaining 1732 Gaining focuses on making potential customers use a company's services or buy a company's products in the most efficient way. Traditionally, the focus in this area has been on mass market marketing and measuring the cost per thousand contacts of a company. The classic example obtained was the marketing of soap by P & G's daytime TV series in the United States, resulting in what is now called the soap opera. Other ways to get it include direct mailing, telephone solicitation, toll-free phone numbers, and recent internet advertising and online transactions. Advertisements often use 4HICKMAN200036TW; AND1P282.TW 112 when investing capital in two-way interactions and the general public. This paper size is applicable to China National Standard (CNS) A4 (210 X 297 mm) --- --- (Please read first Note on the back, please fill in this page again.) Order .. A7 B7 I printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs, I. Description of Invention (彳 13) Advertisement is spread on the application on the Internet. In a browser-based implementation, the use of information boxes or titles creates the possibility of displaying a portion of the advertisement. With most marketing capabilities, the advertising model (service) can be changed from simple static advertising to strong advertising integrated with personalization. Implementation methods range from advertising applets to advertising services integrated with personalized systems. The following is a list of possible services included in the implementation of complex advertising. Storage Advertising content should be stored in the same way as products and e-marketing content. Its content should be integrated with personalized services and user profiles. Integration with personalization Ideally, personalization services are separate and can be used by multiple applications. In order to personalize the advertisement, archive information will be collected and the advertisement content will be filtered based on the archive. A separate program will handle the integration and delivery of content and temporarily change ads as users browse past. Advertising content can include rich content graphics and videos. Buy Now Services Microsoft and other companies are working on technologies that allow users to click on ads and purchase items without leaving the site. These technologies are constantly appearing 'and may require a client-side wallet to execute this transaction. The selling technique is to provide quick purchase of items of interest without leaving the interest. 4HICKMAN200036TW; AND1P282.TW 113 This paper size applies to China National Standard (CNS) A4 (210 X 297 mm) ---------- -Installation (please read the notes on the back before filling this page) Order --------- Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 491972 A7 B7 V. Description of the Invention (114) Interesting website for buy. Microsoft recently offered to use ActiveX controls integrated with a Microsoft Wallet. Other manufacturers must follow this trend. There are many different ways to charge for advertising space using star degree (m e t e r i n g) and mediation (r e c 〇 η e i 1 i a t i 〇 n). The most common method of payment is to take advantage of what it can include: the amount of time displayed, the length of time an ad is displayed, or the number of users who see an ad. Services that record usage information are needed to mediate with the advertising provider. Since many websites are funded by advertising revenue, the accuracy of this service is decisive. As online advertising and its supporting technologies mature, new advertising methods will emerge. For example, an "intermercial" (sometimes referred to as interstitial-meaning entangled) that automatically pops up between pages may be an alternative. Ensure that flexibility is maintained and that technology is continually updated to take into account the implementation of advertising. Retaining 1736 Now the company knows that retaining existing customers is much cheaper than finding new ones. Everyone is paying more and more attention to retaining customers. The point of retention is to keep customers as long as possible. The most effective way to do this is to provide the most outstanding customer service in every interaction with the customer. Since e-commerce does not provide traditional customer service, web-based companies have websites with appropriate support functions. 4HICKMAN200036TW; AND1P282.TW 1 ^ This paper standard applies to China National Standard (CNS) A4 specifications (210 ¾ public [ y (Please read the notes on the back before filling out this page) Printed on the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 72 9 1X 49 Five printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs A7 — _____ B7 Description of Invention (彳 15) Important. This support should be easy to use and meet the specific needs of the customers of the product. The recommendation service recommendation function may have complex formats. The most common format is to allow website users to provide direct or negative information about the content or product of the website. Reports and recommendations. By providing these services, the website can provide a community where users can interact with each other and provide the price of the website. For example, the website can allow users to submit book reviews. This information can then be consumed by the general public. The technology is quite simple, and its procedure may be more complicated. This procedure includes receiving input , Comment and recommend, filter and approve content, and then post these comments or recommendations. The lack of filtering and commenting procedures may damage the network. Another recommendation service is to suggest to the user base. These services may range from simple to complex. A more complex recommendation The service may use collaborative filtering. Over-cooperation is the use of content or product ratings from the user base of the website to estimate the interest of other potential users on this content or product. Correlation algorithms (c ore 1 ati ο η algorithms) use file data, history, and / or input preferences to construct an associated user group, and their evaluation is a valid estimation basis for new users. The estimation algorithm then uses the user's evaluation and file information Make an estimate of the content that they are most likely to be interested in. (Note: the collaborative filtering technology can be implemented in the personalization system) Use of archival data, history, and / or input at the stage of interrelationship 4HICKMAN200036TW; AND1P282.TW iis This paper standard applies China National Standard (CNS) A4 specification (210 X 297 mm) ----------- install ------ --Order --------- (Please read the notes on the back before filling out this page) 491972 A7 -------_____ V. Invention Description (1 仏) Priority is to build AI. Mutual group, they are waiting for the effective estimation of new users. Although the pre-paragraph means _ bear case data, they found that they are interested in the internal valuation. (Department of cooperation can be implemented in a personalized system) The website of the Ministry of Economic Affairs ’Intellectual Property Bureau ’s Consumer Cooperatives prints website announcements and event reminders (site Anouncements and Event Reminder). The technology for relationship building is website announcements and event reminders. The base station has generated content from reminders of upcoming events that are announced or important to a particular customer based on the customer's new product. Miscellaneous _... Event reminders can point to the upcoming wedding ceremony 'personal anniversary or holiday. f Once the user is reminded, he can use this website to respond to the incident. If the website performs complex event reminders, additional services may be required to provide calendar and scheduling functions. These services can also be combined with off-site subscription services to provide reminders to users who are not logged in to this site. Loyalty and Customer Return Programs Creating an environment that promotes customer return to the site is important to the life of the site. Many seller center implementations will use affiliate services and other incentive programs to try and facilitate customer return. For example, website members receive discounts and extra privileges, and thus build better relationships with the website. Points like patrons' points and the use of exclusive member information are other common methods. Loyalty programs may require additional logic to be allowed and content filtered. most

4HICKMAN200036TW; AND1P282.TW 116 (請先閱讀背面之注意事項再填寫本頁) 裝 -·線」 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) 經濟部智慧財產局員工消費合作社印製 491972 A7 B7 五、發明說明(07) 可以藉由收集與使用檔案並且與複雜個人化系統整合來執 行之。 返回程式是用以引誘客戶返回網站的服務。網際網路 減少影響客戶忠誠度的兩大因素。第一是鄰近 (proximity )。在傳統店面購物媒介(brick and mortar me dium )中’客戶傾向於在他們住處或工作 處附近購物或瀏覽。第二個因素是時間以及商店營業的時 間長短。網際網路每天24小時、每週7天運作並與地理上 無關,這些項目都不相關了。基於此’可投注可觀的努力 於創造返回程式。最常見的形式是現在方法的電子化版 本,雖然他們由於個人化與即時傳送而更有效率。 推送與網站外訂閱服務 本節包括利用電子郵件推送資訊給使用者的行銷手 法。(注意網站與資資訊的訂閱涵蓋在訂購處理中在訂貨 處理中一履約元件(fulfillment component))。可 利用很多一般常見服務如儲存、過濾、格式化與同意內 容。會需要額外的服以推送此內容到想要的寄件名單。使 用推送技術的細節與考量包含在討論網路中心結構的應用 中,參照如上。以下是一些基本服務。 •訂閱管理 由於網際網路族群對垃圾電子郵件與罐頭廣告 (spamming)感到不滿,大多網站使用訂購導向方式來 分配散他們的推送市場行銷。應提供服務以允許使用者從 4HICKMAN200036TW; AND1P282.TW 117 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) (請先閲讀背面之注咅S事項再填寫本頁)4HICKMAN200036TW; AND1P282.TW 116 (Please read the precautions on the back before filling out this page) Packing-· "This paper size applies to China National Standard (CNS) A4 (210 X 297 mm) Employees of the Intellectual Property Bureau of the Ministry of Economy Printed by the cooperative 491972 A7 B7 V. Description of the invention (07) It can be implemented by collecting and using files and integrating with complex personalized systems. A return program is a service used to lure customers back to a website. The Internet Reduces two factors that affect customer loyalty. The first is proximity. In traditional brick and mortar medium, customers ’tend to shop or browse near their place of residence or work. The second factor is time and how long the store is open. The Internet operates 24 hours a day, 7 days a week, and is geographically irrelevant. None of these items are relevant. Based on this, considerable efforts can be invested in creating return programs. The most common form is an electronic version of the current method, although they are more efficient due to personalization and instant delivery. Push and Offsite Subscription Services This section includes marketing techniques for using email to push information to users. (Note that the subscription of the website and information information covers a fulfillment component in the order processing in the order processing). Many common services are available such as storage, filtering, formatting and consent. Additional services will be required to push this content to the desired mailing list. The details and considerations of using push technology are included in the discussion of the application of network-centric structures, see above. Here are some basic services. • Subscription Management As the Internet community is unhappy with spam and spamming, most websites use a subscription-oriented approach to distribute their push marketing. Services should be provided to allow users from 4HICKMAN200036TW; AND1P282.TW 117 This paper size is applicable to Chinese National Standard (CNS) A4 (210 X 297 mm) (Please read the Note on the back before filling out this page)

經濟部智慧財產局員工消費合作社印製 491972 ΚΙ Β7__________ 五、發明說明(ίβ) 網站市場行銷分配散訂購與取消訂購訂購。 •分配管理 當網站的使用者庫成長,實際的分配機制必須構強韌 以按比例放大來處理不斷成長的使用者庫。應該硏究以不 影響已然不停增加之網路交通的方式分配資訊方法。 擴張1734 擴張要求企業回答此問題,「如何提高客戶的忠誠度與可 獲利率?」 交互銷售與向上銷售 交互銷售與向上銷售與推薦服務相似。交互銷售使用 對消費者的一些了解以建議消費者可能有興趣之讚賞的 (complimentary)或相似產品---「您想要一塊兒來點 薯條嗎?」。向上銷售是努力促銷更多的同樣事物或消費 者目前正在考慮試誤的更加版本-「您想要超大型的 嗎?」 交互銷售與向上銷售被認爲是一應用或複雜的個人化 可做到的服務。雖然從市場角度看很重要,一旦爲複雜個 人化的基礎服務就位,很多產生要求的應用程式現在成爲 可能的。交互銷售或向上銷售能夠藉由資料庫中的產品關 係加以實施。 維護與管理1008 第24圖揭露方法2400的流程圖供管理網路上一個電 4HICKMAN200036TW; AND1P282.TW 118 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) (請先閱讀背面之注音W事項再填寫本頁)Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 491972 ΚΙ Β7 __________ V. Description of Invention (ίβ) Website Marketing Distribution Distribution Bulk Order and Cancel Order. • Allocation management As the user base of a website grows, the actual allocation mechanism must be robust to scale up to handle the growing user base. It should be studied how to distribute information in a way that does not affect the ever-increasing network traffic. Expansion 1734 Expansion requires companies to answer the question, "How to increase customer loyalty and profitability?" Cross-selling and up-selling Cross-selling and up-selling are similar to referral services. Cross-selling use Some understanding of consumers to suggest complimentary or similar products that consumers may be interested in-"Do you want some fries together?". Upselling is a more recent version of the same thing struggling to promote more or consumers are currently considering trial and error-"Do you want oversized?" Interactive sales and upselling are considered an application or complex personalization to do To the service. Although important from a market perspective, many of the applications that generate requests are now possible once the basic services for complex personalization are in place. Cross-selling or up-selling can be implemented through product relationships in the database. Maintenance and management 1008 Figure 24 reveals the flow chart of method 2400 for the management of an electricity on the network 4HICKMAN200036TW; AND1P282.TW 118 This paper size applies to China National Standard (CNS) A4 (210 X 297 mm) (Please read the (Notes for W matters, please fill out this page)

經濟部智慧財產局員工消費合作社印製 491972 A7 B7_______ 五、發明說明(彳11) 子商務系統。在操作2402中監控實體的操作。實體包含 伺服器程序、磁碟空間、可取得記憶體、中央處理器利 用、存取到伺服器的時間,與/或一電子商務系統中連線 的數目。在操作2404中,包括行銷內容、匯率、稅率、 與/或在電子郵件系統中的定價等之項目在預定間隔都要 更新。此外,與電子商務系統分開儲存的外部資料在操作 2406中儲存於電子商務系統上的內部資料同步化。從電 子商務系統使用者接收而來的聯絡資訊也管理在操作 2408中。在操作2410中,物品可以根據電子商務系統使 用者的簡介而改變。 根據使用者當案而改變的物品之一可包括價格,其可 被改變以反映指定給使用者的折扣。在與外部資料同步化 之前,也可執行針對電子商務系統內部資料的一硏究。 一選擇是,亦可實行一負載平衡服務,其隨著電子商 務系統中利用水準的改變而起始或停止程序。另一選擇 是,聯絡資訊的管理可以進一步包括追蹤電子商務系統對 使用者的回應。 如同任何系統,一支持、管理、與維護能力,而步驟 必須就位以維持運作與效率。一般而言,套裝實施只提供 最基本的維護與管理設備,而將留大堆的累贅留給給整合 者。設備的基礎技術可能是基本的批次下載/上載,簡單 的伺服器程序與應用程式,或甚至是以瀏覽器爲基礎的。 去了解系統管理與維護的需要,開發一計劃,並徹底實行 之是很重要的。有些考慮的領域如下所列。第25圖揭露 4HICKMAN200036TW; AND1P282.TW 119 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) --------11 —AWI --------訂------1— (請先閱讀背面之注音心事項再填寫本頁) 外 1972 A7 --__B7_ 五、發明說明(U〇) 維護與管理結構的高階槪念。 系統監控設備2500 一系統的健康可藉由使監控設備與擷取系統的電子生 命跡象(e 1 e c t r ο n i c v i t a 1 s i g η )就位而輕易的維持。 常常一系統的使用者是第一個知道系統問題的,而管理者 最後才知道。這可藉由產生自動化監控伺服器程序、磁碟 空間、記憶體、中央處理器利用率、存取時間、連線數量 與其他電子生命跡象等的設備來防止之。這些設備的複雜 性可開放討論。除了線上監控設備,更應該包括強韌的登 錄(robust logging),審計存底登錄(audit trail) 與歸檔能力(archiving capabilities )。這些將有助 於系統需要的分析與預測。 系統管理 系統管理一詞是用於分類支援一系統所需行動的模糊 名詞。這個包含開機、停止,或重開機伺服器或程序、備 份排程以及資料或檔案的載入、回復步驟或其他維持系統 必須的任何事物。傳統系統管理也包含系統軟體的更新、 套裝軟體與作業系統。下列是一電子商務系統可能遭遇到 之額外的系統管理考量。 行銷管理2502 行銷層面可引進額外的管理與維護。應備妥步驟以處 4HICKMAN200036TW; AND1P282.TW 120 本紙張尺度適用中國國家標準(CNS)A4規格(21〇 x 297公釐) (請先閱讀背面之注意事項再填寫本頁) 裝 訂: 經濟部智慧財產局員工消費合作社印製 I 2 97 11 49 A7 B7 經濟部智慧財產局員工消費合作社印製 - 五、發明說明(彳W) 理售罄的商品與回覆訂單物品。需要定期更新行銷內容、 貨幣、稅、與定價。行銷管理能力應能處理定價與折扣物 品,並能允許得到授權的管理者自動更新與手動置換 (override)會巨力。 個人化維護能力2504 個人化最大的困難爲商業市場規劃、檔案分類、收集 檔案資訊與發展帶有適當內容索引之強f刃的內容決定匹配 規則。一旦這些都E確立’他們應該很容易維護。當設計 個人化服務,應該考慮規則與內容的維護。最可能推動此 資訊的人將不是技術導向的人,而可能需要簡單的介面以 改變市場行銷、廣告、或其他個人化內容的規則。 內容管理 當內容已經加入,此麵將需要索引並與此網路執行 的搜尋技術整合在一起。其他如客戶服務聊天討输 (customer service chatdlscUssi〇n)或評論“ 期的整理。 資料管理2506 利用套裝軟體來執行一個電子商務解 为畔厌方案很多時候 將引入客戶與產品資訊專用的資料模式。爲了 、、 其他人可以存取此資訊,此資料必須要μ 此組織的 文與止茱資料同步。 可能需要決定變化與同步資料的服務。 4HICKMAN200036TW; AND1P282.TW 私紙張尺度適用中國國家標準(CNS)A4規格(i10 χ 297公爱) 491972 經濟部智慧財產局員工消費合作社印製 A7 B7 五、發明說明(122) 收集到而未整合到企業資料中的資訊。 負載平衡 除了監控與維護設備,應考慮穩定效能的服務。假設 系統是可按比例縮放的,負載平衡服務將有助於當利用程 度改變時,起始與停止超出的程序。程序可被啓動以在尖 峰時期處理額外的要求,以提供使用者一定水準的表現。 在尖峰使用時期此點極度重要。一個很好的例子是當市場 要求激增,某些目前的電子交易系統平均反應時間的波 動。在市場要求激增時的時間比平常平均6到1 0秒的反應 時間多出2到3分鐘。 聯絡維護2508 網際網路使用者很快指出錯誤與改善意見。網站將從 對網站經歷各種情緒的使用者處收到零星的電子郵件。如 果沒有採取行動或注意所指的項目,使用者可能很快就會 失望。對客戶的回饋的回應應被監控以確保從一客戶的各 個訊息都會以某種方式回應之。 系統的管理與維護常常監督不善。這是改善客戶滿意 度與建立客戶關係的要件。具有強韌的維護與管理設備應 可藉由減少確認與決定問題時間與成本、程序自動化、以 及致能(enabling)系統管理力,而增加系統的整體安 定性。 4HICKMAN200036TW; AND1P282.TW 122 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) -------------裝--------訂· (請先閱讀背面之注意事寫本頁)Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 491972 A7 B7_______ V. Invention Description (彳 11) Sub-business system. The operation of the entity is monitored in operation 2402. Entities include server programs, disk space, available memory, CPU utilization, time to access the server, and / or the number of connections in an e-commerce system. In operation 2404, items including marketing content, exchange rates, tax rates, and / or pricing in the email system are updated at predetermined intervals. In addition, external data stored separately from the e-commerce system is synchronized with internal data stored on the e-commerce system in operation 2406. Contact information received from users of the e-commerce system is also managed in operation 2408. In operation 2410, the item may be changed according to a profile of a user of the e-commerce system. One of the items that changes based on the user's case may include a price, which may be changed to reflect the discount assigned to the user. Before synchronizing with external data, it is also possible to perform research on the internal data of the e-commerce system. As an option, a load balancing service can also be implemented, which starts or stops the process as the level of utilization in the e-commerce system changes. Alternatively, the management of contact information may further include tracking e-commerce system responses to users. As with any system, one must support, manage, and maintain capabilities, and steps must be in place to maintain operations and efficiency. Generally speaking, the package implementation only provides the most basic maintenance and management equipment, leaving the bulk of the burden to the integrator. The basic technology of the device may be basic batch download / upload, simple server processes and applications, or even browser-based. It is important to understand the needs of system management and maintenance, develop a plan, and implement it thoroughly. Some of the areas considered are listed below. Figure 25 reveals 4HICKMAN200036TW; AND1P282.TW 119 This paper size applies the Chinese National Standard (CNS) A4 specification (210 X 297 mm) -------- 11 --AWI -------- Order- ----- 1— (Please read the phonetic notes on the back before filling out this page) Outside 1972 A7 --__ B7_ V. Description of the Invention (U〇) High-level thoughts on maintaining and managing the structure. System monitoring equipment 2500 The health of a system can be easily maintained by having the monitoring equipment and capturing the electronic life signs (e 1 e c t r ο n i c v i t a 1 s i g η) in place. Often the user of a system is the first to know about the system, and the manager is the last to know. This can be prevented by generating equipment to automatically monitor server programs, disk space, memory, CPU utilization, access time, number of connections, and other electronic signs of life. The complexity of these devices can be discussed openly. In addition to online monitoring equipment, it should also include robust logging, audit trail and archiving capabilities. These will help the analysis and prediction of the system needs. System management The term system management is a vague term used to classify the actions required to support a system. This includes starting, stopping, or restarting a server or process, backup schedule, and loading of data or files, recovery steps, or anything else necessary to maintain the system. Traditional system management also includes system software updates, software packages, and operating systems. The following are additional system management considerations that an e-commerce system may encounter. Marketing Management 2502 The marketing level can introduce additional management and maintenance. Steps should be prepared to deal with 4HICKMAN200036TW; AND1P282.TW 120 This paper size is applicable to China National Standard (CNS) A4 specification (21〇x 297 mm) (Please read the precautions on the back before filling this page) Binding: Wisdom of the Ministry of Economic Affairs Printed by the Consumer Cooperative of the Property Bureau I 2 97 11 49 A7 B7 Printed by the Consumer Cooperative of the Intellectual Property Office of the Ministry of Economic Affairs-V. Description of the Invention (彳 W) Manage the sold out products and reply to the order items. Marketing content, currency, taxes, and pricing need to be updated regularly. Marketing management capabilities should be able to handle pricing and discounted items and allow authorized managers to automatically update and override manually. Personalized maintenance ability 2504 The biggest difficulty of personalization is the commercial market planning, file classification, collection of file information, and development of content with appropriate content indexing to determine matching rules. Once these are established, they should be easy to maintain. When designing a personalized service, consideration should be given to maintaining rules and content. The people most likely to drive this information will not be technology-oriented, but may need a simple interface to change the rules of marketing, advertising, or other personalized content. Content Management When content has been added, this aspect will need to be indexed and integrated with the search technology performed by this network. Others such as customer service chat discussion (customer service chatdlscUssi〇n) or review the "organization of the period." Data management 2506 The use of software packages to implement an e-commerce solution to the problem is often introduced in the customer and product information-specific data model. In order that other people can access this information, this data must be synchronized with the organization ’s text and data. It may be necessary to determine the service for changing and synchronizing the data. 4HICKMAN200036TW; AND1P282.TW The private paper standard applies the Chinese national standard (CNS ) A4 specification (i10 χ 297 public love) 491972 Printed by A7 B7, Consumer Cooperative of Intellectual Property Bureau of the Ministry of Economic Affairs 5. Description of the invention (122) Information collected but not integrated into enterprise data. Load balancing In addition to monitoring and maintenance equipment, Services with stable performance should be considered. Assuming the system is scalable, load-balancing services will help start and stop excess programs as utilization levels change. Programs can be started to handle additional requirements during peak periods, To provide users with a certain level of performance. This point is extremely extreme during peak usage periods Yes. A good example is the fluctuation of the average response time of some current electronic trading systems when market demand surges. The time when the market demand surges is 2 to 3 minutes longer than the average response time of 6 to 10 seconds Contact maintenance 2508 Internet users quickly point out errors and suggestions for improvement. The site will receive sporadic e-mails from users who experience various emotions on the site. If no action is taken or attention is paid to the item, the user may Disappointment soon. Responses to customer feedback should be monitored to ensure that all messages from a customer are responded to in some way. System management and maintenance are often poorly monitored. This is to improve customer satisfaction and build customer relationships Requirements. Tough maintenance and management equipment should increase the overall stability of the system by reducing the time and cost of identifying and deciding problems, process automation, and enabling system management. 4HICKMAN200036TW; AND1P282.TW 122 This paper size applies to China National Standard (CNS) A4 (210 X 297 mm) ------------- pack- ------- Order · (Please read the notes on the back to write this page)

經濟部智慧財產局員工消費合作社印製 491972 A7 _____ B7 五、發明說明(彳23) 實施上的考量_ 資訊籌畫 遞送新產品與資訊的能力是保持領先或維持競爭力是 很關鍵的。資訊更新與移到生產線的速度是關鍵的。確記 要了解瞭解內容改變間的關係,並要了解將改變移到生產 系統的正確程序。維持網站與成長網站的能力是試網站成 功不可或缺的因素。 大部分情形中,內容籌畫程序應該就位。在最簡單的 格式中’修改與增加內容的步驟、測試、內容與主題的確 認、授權與移至生產應該以文件紀錄。 訂購處理1010 第2 6圖揭露電子商務應用程式結構〗000的訂購程序 部分1010。副章節包括產品選擇2600、核對2602、付 款2604與實現2 606。 第27圖揭露一方法2700的流程圖,供在網路上完成 —交易。在操作2702中,顯示欲售產品的資訊。當在操 作2704中收到一產品採購訂單,欲售產品的價格就在操 作27〇6中根據產品實價與折扣、稅、實現成本與/或送貨 成本而動態地產生。在操作2 7 0 8中,允許產品以及訂單 的儲存與再呼叫。在操作2710中決定一付款方式。當收 到付款’其訂單已實現(見操作2712與2714)。 接收付款的媒介可能透過信用基礎付款、負債基礎的 4HICKMAN200036TW; AND1P282.TW 123 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) ----------I ----I---^ ·11111111 - (請先閱讀背面之注意事項再填寫本頁) 491972 經濟部智慧財產局員工消費合作社印製 A7 B7 五、發明說明(124) 付款與/或電子現金。此外,也可允許針對一選定產品的 出口限制。 一個選擇是,可允許檢視、更新、以及在任何時間取 消訂單的能力。另一選擇是,亦可以管理電子權利 (electronicrights)。更進一步的選擇是,也可以提 供關於訂貨狀態的訂貨追蹤資料。 對一成功的電子商務解決方案來說,使客戶不只可以 瀏覽與互動,且可以完成訂購是很重要的。本節包含許多 談判與執行整個交易所需要的能力。當使用者採取行動採 購物品時父易就開始了。從賣方中心觀點看來,一旦採購 鍵已被選擇,此交易就起始了。此「購買交易(buy transaction)」如合計、付款選擇、存貨管理與採購授 權。 認知到一些商務套裝軟體係專精於電子商務解決方案 的交易處理部分是很重要的。舉例來說,開放市場 (Open Market)的OM-Transact並不提供目錄介面 或任何供與潛在客戶互動的基礎結構。而其確提供與其交 易基礎結構通訊的介面。 各個實施將需要特定的流程與商業邏輯。今日可取得 的商務套裝軟體提供一般訂購處理商業能力,將需要定製 這些能力以達到此企業的特定需求。第28圖揭露在電子 商務實施上完整訂購處理所需的商業能力示範流程。此程 序以操作2800作爲開場,其允許瀏覽與互動來達到准許 在操作28〇2中選擇產品的目的。此程序在結帳後後結束Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economy 491972 A7 _____ B7 V. Description of the Invention (彳 23) Implementation Considerations _ Information Planning The ability to deliver new products and information is critical to staying ahead or maintaining competitiveness. The speed with which information is updated and moved to the production line is critical. Be sure to understand the relationship between content changes and the correct procedures for moving changes to production systems. The ability to maintain and grow your website is an indispensable factor for successful website testing. In most cases, the content planning process should be in place. In the simplest format, the steps to modify and add content, testing, content and subject matter confirmation, authorization, and transfer to production should be documented. Order processing 1010 Figure 2-6 reveals the e-commerce application structure [000] order procedure part 1010. The sub-chapters include product selection 2600, reconciliation 2602, payment 2604, and implementation 2606. FIG. 27 discloses a flowchart of a method 2700 for completing on the network-transaction. In operation 2702, information of a product to be sold is displayed. When a product purchase order is received in operation 2704, the price of the product to be sold is dynamically generated in operation 2706 according to the actual price and discount of the product, tax, realization cost and / or delivery cost. In operation 2 7 0 8, storage and recall of products and orders are allowed. A payment method is decided in operation 2710. When payment is received 'its order has been fulfilled (see operations 2712 and 2714). The receiving medium may be paid through credit-based payment and debt-based 4HICKMAN200036TW; AND1P282.TW 123 This paper size applies the Chinese National Standard (CNS) A4 specification (210 X 297 mm) ---------- I- --- I --- ^ 11111111-(Please read the notes on the back before filling out this page) 491972 Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs A7 B7 V. Description of the invention (124) Payment and / or electronic cash . In addition, export restrictions on a selected product may be allowed. One option is the ability to view, update, and cancel orders at any time. Alternatively, electronicrights can also be managed. A further option is to provide order tracking information on order status. For a successful e-commerce solution, it is important for customers to not only browse and interact, but also complete orders. This section contains many of the capabilities needed to negotiate and execute an entire exchange. When the user takes action to purchase a product, the parent is started. From a seller-centric perspective, the transaction begins once the purchase key has been selected. This "buy transaction" includes totals, payment options, inventory management, and purchasing authorization. It is important to recognize that some business suite software systems specialize in the transaction processing part of e-commerce solutions. For example, Open Market's OM-Transact does not provide a catalog interface or any infrastructure for interacting with potential customers. It does provide an interface to communicate with its trading infrastructure. Each implementation will require specific processes and business logic. The business suite software available today provides general order processing business capabilities that will need to be tailored to meet the specific needs of this business. Figure 28 illustrates the demonstration of the business capabilities required for complete order processing in e-commerce implementation. This program starts with operation 2800, which allows browsing and interaction to achieve the purpose of permitting product selection in operation 2802. This process ends after checkout

4HICKMAN200036TW; AND1P282.TW 本紙張尺度適用中國國豕標準(CNS)A4規格(210 X 297公釐) (請先閱讀背面之注意事項寫本頁) I!裝 寫太 491972 A7 ___B7 _ 五、發明說明(彳躬) 於操作2 804。 --------------裳--- (請先閱讀背面之注意事填寫本頁) 商品選擇2600 需要某種商品集合能力。所有感興趣的物品應集合在 一起並組織起來,以便在他們被採購前可先被檢視。最常 見的方式是一訂購表格或一比喩,如購物車或是籃子。 購物車比喻一讓使用者能選擇物品並將其加到他在線 上的購買車上。所選擇的物品將被追蹤。使用者能加入或 移除物品、檢視物品細節、與核對並計算物品總計。此 外,購買車應允許使用者離開並再次進入此商店而不會遺 失他以選擇的物品。 獨立於媒介,應考慮下列能力: •訂購表與資訊應與行銷機制一致。如果可能的話,以 相同格式顯示此商品,這樣一來此商品會如同他們訂 購它時一樣具有吸引力。 •客戶應能儲存或再呼叫物品、定價、以及其他現在與 前一次訂購之訂購細節。 經濟部智慧財產局員工消費合作社印製 •允許額外的銷售與衝動購買。此核對程序最適合消護 銷售方法爲交互銷售或其他型式的衝動購買。這些能 力應整合到商品選擇設備。 •允許檢視、更新、甚或在選擇訂購流程的任何時點取 消訂單的能力。客戶不應覺得受限制或被強迫購買。 4HICKMAN200036TW; AND1P282.TW 125 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) 72 9 IX 49 A7 _ B7_ 五、發明說明(1½) 核對2602 一旦使用者決定去採購或訂購收集物品,核對層面就 開始了。可能需要各種能力,而各種能力可能影響此程 序。以下所列是核對處理期間可考慮的服務。 價格確認 若給定在地理上獨立的環境許多潛在客戶關係,很多 因素可影響實際的定價。交易的第一步是決定價格。在大 多數情形中,價格將根據物品的實際價格、稅賦、實現或 遞送成本、以及任何其他影響價格的物品。理想上,產品 價格、運送與處理費用與其他費用應該分開保管。此功能 應包含處理免稅客戶與交易的能力。也應包括銷售稅 (sales tax)與增値稅(value added tax)登錄與審 計能力。 打折 一般而言,定價是動態計算的。對特殊物品或整個訂 購可基於很多原因而打折。可因使用偏好的付款機制而得 到額外的折扣。其他的實施可在月底根據總銷售提供折 扣。 稅與稅率(tariff ) 有關於個人有形資產或服務在網際網路上的買賣的稅 賦問題是眾多且繁複的。問題包含那個產品與服務應課 4HICKMAN200036TW; AND1P282.TW 126 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) (請先閱讀背面之注意事'寫本頁) 裝 · 經濟部智慧財產局員工消費合作社印製 491972 A7 B74HICKMAN200036TW; AND1P282.TW This paper size is applicable to China National Standard (CNS) A4 (210 X 297 mm) (Please read the precautions on the back first to write this page) I! Writing too 491972 A7 ___B7 _ 5. Description (Bow) at operation 2 804. -------------- Shang --- (Please read the notes on the back to fill in this page first) Product selection 2600 requires some product collection ability. All items of interest should be grouped together and organized so that they can be inspected before they are purchased. The most common methods are an order form or a comparison, such as a shopping cart or basket. The shopping cart metaphor one allows the user to select items and add them to his online shopping cart. The selected items will be tracked. Users can add or remove items, view item details, check with and calculate item totals. In addition, the purchase cart should allow the user to leave and enter the store again without losing the item he chose. Independent of the media, the following capabilities should be considered: • Order forms and information should be consistent with the marketing mechanism. If possible, display this item in the same format so that it will be as attractive as when they ordered it. • Customers should be able to store or recall items, pricing, and other order details for current and previous orders. Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economy This reconciliation procedure is best suited for conserving sales methods as cross-selling or other types of impulse purchases. These capabilities should be integrated into commodity selection equipment. • The ability to view, update, or even cancel orders at any point in the selection process. Customers should not feel restricted or forced to buy. 4HICKMAN200036TW; AND1P282.TW 125 This paper size applies to Chinese National Standard (CNS) A4 (210 X 297 mm) 72 9 IX 49 A7 _ B7_ V. Description of the invention (1½) Check 2602 Once the user decides to purchase or order collection The item, check level begins. Various capabilities may be required, and various capabilities may affect this process. Listed below are services that can be considered during the reconciliation process. Price Confirmation Given the many potential customer relationships in a geographically independent environment, many factors can affect actual pricing. The first step in trading is to determine the price. In most cases, the price will be based on the actual price of the item, taxes, implementation or delivery costs, and any other item that affects the price. Ideally, product prices, shipping and handling costs should be kept separate from other costs. This feature should include the ability to handle tax-exempt customers and transactions. It should also include sales tax and value added tax registration and auditing capabilities. Discounts In general, pricing is calculated dynamically. Special items or entire subscriptions can be discounted for a number of reasons. Additional discounts are available for preferred payment mechanisms. Other implementations can provide discounts based on total sales at the end of the month. Taxes and Tariffs Taxation issues related to the purchase and sale of personal tangible assets or services on the Internet are numerous and complex. Questions include which products and services should be taught 4HICKMAN200036TW; AND1P282.TW 126 This paper size is applicable to China National Standard (CNS) A4 (210 X 297 mm) (Please read the notes on the back first 'write this page) Printed by the Intellectual Property Bureau Staff Consumer Cooperatives 491972 A7 B7

五、發明說明(彳27) 稅,何時且在何處在零售交易上徵稅、供應商需要收集{十 麼稅(銷售或使用)。應考慮具有整合銷售稅或增値稅弓丨 擎的稅計算功能,可以根據客戶特定產品碼、原始訂購 點、運送人地址以及收貨人地址。 由於這些複雜性,大多數具有稅賦引擎的解決方案t 面以降低風險以及牽涉到稅務的合法性(legality)。X 多數今日可取得的商務軟體套件與一領導稅務引擎 (leading tax engine )接合0 (請先閱讀背面之注意事項®寫本頁) F'裝 經濟部智慧財產局員工消費合作社印製 運送費用 運送費用可應用在不能直接藉由網站實現的物品上。 在某些情形中,客戶的運送位置可用來決定他們的稅與運 送費用。決定送貨費用的機制有很多種。他們包括: •價格門檻一運送費用將根據設定價格位階而變動。 •重量一運送費用可根據毛運送重量而決定。 •數量一費用可根據訂購物品的數量而感變。物品可能 在高至一給定數量後免費,或者,運送可能在超過一 給定數量後免費.。 •系列物品一指定一特定運送費用給各個訂購上的系列 物品。 訂單資訊 其他基本訂單資訊可在核對處理中收集。最普通方法 是一訂購表格。此訂購表格應可輕易定製並可包含各種不 4HICKMAN200036TW; AND1P282.TW 127 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) - 491972 A7 __B7______ 五、發明說明(彳洸) 同的資訊。 •訂購表格有著一般問題的標準線上表格:名稱、地 址、運送位置、信用卡號碼、電子郵件地址等等。使 用者通常能夠在此一時點提交或拒絕訂單。提交的訂 單應藉由此商務伺服器自動的加密。 •客戶資訊(建立客戶位置)如果基本客戶資訊早在 程序之初尙未被收集,其應該在付款階段前收集。對 於一些實施,客戶希望保持匿名,但此不常發生。 •運送/收款地址應用程式應能支援運送地址獨立於, 並且不同於收款地址。此允許對一產品或服務的收款 送到一個地方,而實際產品遞送到另一個地方。 •自動化庫存管理在有些情形中,貿易夥伴可根據使 用或排程設定自動訂購。如果庫存是定期使用,此再 訂貨程序可以自動化。 •訂單確認出口限制的庫存檢查與確認可以在下訂單 前做好。根據資訊是在何時與如何收集,此動作可在 程序流程的任何地方完成,或者同時與其他程序當成 背景事件。 •採購訂單產生如果商務實施與現有系統整合在一 起,可能需要產生唯一的採購訂單。可能需要整合與 管理此功能的服務。 •決定付款機制可能需要與使用者以決定付款機制。 現在也正在進行調查,看看這動作是否也可以自動 化。 4HICKMAN200036TW; AND1P282.TW 128 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐)~ (請先閱讀背面之注意事項再填寫本頁) 裝 訂: 經濟部智慧財產局員工消費合作社印製 經濟部智慧財產局員工消費合作社印製 491972 A7 B7_______ 五、發明說明(1奶) 付款2604 在合計建立完後,必須決定一付款方式。多種不同的 媒介可以處理金錢的轉送。方法、流程、技術與潛在的通 訊將隨執行而異。有關安全性、可靠性以及與實現的關係 有關的課題必須解決。 下列是一些考量以供決定付款流程與利用的媒介。 •匿名。如果有需要讓使用者用維持匿名,可能需要實 施一匿名媒介。實施如無聲競標網站(silent bidding site )可能需要爲匿名定嚴格標準與媒介夂 一般來說,匿名並不是多數實施的重點。 •金融交易規模。假如網站要處理很小或很大的金融交 易,將需要有額外的考量。接受微量交易的網站將需 要計畫一程序來收集與確認付款。爲使低價交易符合 成本,解決方案可能犧牲安全。在一些實施中,其假 設某種欺詐(fraud)會發生,但金額很小而可以忽 略。 •交易成本。根據付款方法,有很多潛在相關成本。大 部分媒介有交易成本或需要額外費用的仲介者。當計 畫一有效付款系統時,了解相關成本是很重要的。 •審計存底登錄。如果需要的話,有些實施可以用供追 蹤資金的一獨特識別符(identifier)紀錄每一交 易。 •安全。在過去,電子商務一直受缺乏安全與強韌的交 4HICKMAN200036TW; AND1P282.TW 129 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐)~ — ------------裝--------訂--------· (請先閱讀背面之注咅心事項再填寫本頁) 491972 A7 B7_ 五、發明說明(130) 易選擇而受阻。最近在網際網路上安全線上付款選擇 1的發展一直是主要使這成爲可能的關鍵。加強加密的 線上採購交易通訊協定已被開發並被整合在軟體中, * 供消費者、供應商、與銀行能做到信用卡交易。 •消費者形式。流程的形式與付款媒介主要隨消費者或 採購者而有很大的差異。一旦下完訂單,商業一消費 者(B-C)實施要求付款(或至少授權)。對於買方 中心,交易伙伴關係,已建立的基礎結構可使用傳統 開發票(invoicing)或EDI或電子資金轉送 (e 1 e c t r ο n i c f u n d t r a n s f e r )的網際網路致能型 式。 •電子認證。在貿易夥伴與潛在財經機構之間需要某種 數位簽章策略在適當位置。 •訊息標準。付款指示必須受到所有方(all parties) 的認可。 付款方法 有多種不同的販售商與技術可供處理電子付款。基礎 結構、程序、與技術可因販售商的不同而劇烈的變化。目 前付款選擇的實際媒介落在以下這些類型: •信用基礎付款。今日最廣爲使用的電子付款方式是信用 卡。有了此交易通訊協定與安全特徵,信用卡可像真實世 界中依樣使用於網際網路上。對已熟悉標準,消費者信心 較高。現今淸算(clearing)、核對(settlement)與 4HICKMAN200036TW; AND1P282.TW 130 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) ~ (請先閱讀背面之注意事項再填寫本頁) 裝 · 經濟部智慧財產局員工消費合作社印製 經濟部智M財產局員工消費合作社印製 491972 A7 __B7 _ 五、發明說明(彳31) 欺詐的經常費用,使得信用卡基礎的解決方案對於小額交 易並不經濟。 •負債基礎付款。利用此方法的付款將直接負債並歸入 帳號。這些可以形諸於簽帳卡、電子支票、或使用 EDI或EFT的訊息等的形式。 •電子現金。電子現金紙鈔的電子均等物。其時常使用 公鑰(public key)加密、數位簽章與肓目簽章 (blind signature)加以實施。電子現金是電腦硬碟 上的數位金錢。理論上,金錢可以小量花用,如美金 一分的十分之一或更小。在電子現金系統中通常有一 銀行,其負責發行貨幣,而消費者從銀行或中間人以 及接受數位現金販售貨品與服務的供應商處取得現 金。簡而言之,銀行、供應商與消費者各擁有一公鑰 或私鑰(private key),其可用於加密與數位地簽署 電子現金。 •聰明卡(Smartcards)。一個聰明卡是一可程式之 儲存裝置,其大小與外表與正常的信用卡相同。它含 有一微晶片來儲存與處理資訊。有些卡可含有數位錢 幣型,式的儲値。掉卡就是失掉價値,跟現金一樣。持 卡人能在任何接受聰明卡商店花用存放於上的價値。 這個技術對線上購物特別有用,而且比放價値在硬碟 上的系統更不易受損。此種型式付款的交易成本很 低,允許使用者行使微量交易如一分或更少。微軟與 一些電腦製造商推廣合併聰明卡者到個人電腦鍵盤的 4HICKMAN200036TW; AND1P282.TW 131 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐〉 (請先閲讀背面之注意事項再填寫本頁)V. Description of Invention (彳 27) Tax, when and where taxes are levied on retail transactions, suppliers need to collect {10% tax (sale or use). It should be considered to have integrated tax calculation function of sales tax or tax increase engine, which can be based on customer specific product code, original order point, shipper address and consignee address. Because of these complexities, most solutions with tax engines have been designed to reduce risk and involve tax legitimacy. X Most commercial software packages available today are integrated with a leading tax engine 0 (Please read the note on the back first ® write this page) F 'Pack printed by the Intellectual Property Bureau of the Ministry of Economic Affairs and the consumer co-operative shipping costs Shipping Costs can be applied to items that cannot be realized directly through the website. In some cases, customers' shipping locations can be used to determine their taxes and shipping costs. There are many mechanisms for determining shipping costs. They include: • Price Threshold-Shipping costs will change based on the set price level. • Weight-shipping costs can be determined based on gross shipping weight. • The quantity-a fee can vary depending on the quantity of the ordered items. Items may be free up to a given quantity, or shipping may be free after more than a given quantity. • Series Items-A specific shipping fee is assigned to the series items on each order. Order information Other basic order information can be collected during the reconciliation process. The most common method is an order form. This order form should be easily customizable and can include a variety of 4HICKMAN200036TW; AND1P282.TW 127 This paper size applies to China National Standard (CNS) A4 (210 X 297 mm)-491972 A7 __B7______ V. Description of the invention (彳 洸) Same information. • Order form A standard online form with general questions: name, address, shipping location, credit card number, email address, and more. The user is usually able to submit or reject the order at this point. Submitted orders should be automatically encrypted by this commerce server. • Customer information (creating customer locations) If basic customer information was not collected early in the process, it should be collected before the payment phase. For some implementations, customers want to remain anonymous, but this does not happen often. • Shipping / Payment Address Apps should be able to support shipping addresses that are independent of and different from the payment address. This allows payment for a product or service to be delivered to one place while the actual product is delivered to another place. • Automated inventory management In some cases, trading partners can automatically order based on usage or scheduling settings. If the inventory is used regularly, this reordering process can be automated. • Inventory check and confirmation of order confirmation export restrictions can be done before placing an order. Depending on when and how the information was collected, this action can be done anywhere in the process flow or as a background event with other processes at the same time. • Purchase order generation If business implementation is integrated with existing systems, a unique purchase order may need to be generated. Services for this feature may need to be integrated and managed. • Deciding on a payment mechanism may need to be done with the user to decide on the payment mechanism. Investigations are also ongoing to see if this action can also be automated. 4HICKMAN200036TW; AND1P282.TW 128 This paper size applies to Chinese National Standard (CNS) A4 (210 X 297 mm) ~ (Please read the precautions on the back before filling out this page) Binding: Printed by the Consumers ’Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 491972 A7 B7_______ V. Description of Invention (1 Milk) Payment 2604 After the establishment of the total, a payment method must be decided. Many different media can handle the transfer of money. Methods, processes, technologies and potential communications will vary by implementation. Issues related to security, reliability, and the relationship to implementation must be addressed. Here are some media to consider for deciding on the payment process and use. •anonymous. If there is a need to keep users anonymous, an anonymous medium may be implemented. Implementations such as silent bidding sites may require strict standards and media for anonymity. Generally speaking, anonymity is not the focus of most implementations. • Financial transaction scale. If the website is to handle small or large financial transactions, additional considerations will be required. Sites that accept micro-transactions will need to plan a process to collect and confirm payments. To make low-cost transactions cost-effective, solutions may sacrifice security. In some implementations, it is assumed that some kind of fraud will occur, but the amount is small and can be ignored. •transaction cost. Depending on the payment method, there are many potentially related costs. Most media have transaction costs or intermediaries that require additional fees. When planning for an effective payment system, it is important to understand the associated costs. • Audit log entry. If desired, some implementations can record each transaction with a unique identifier for tracking funds. •Safety. In the past, e-commerce has been affected by the lack of security and toughness. 4HICKMAN200036TW; AND1P282.TW 129 This paper size applies to the Chinese National Standard (CNS) A4 specification (210 X 297 mm) ~---------- --- Install -------- Order -------- · (Please read the note on the back before filling this page) 491972 A7 B7_ V. Description of the invention (130) Easy to choose Blocked. Recent developments in secure online payment options1 on the Internet have been the key to making this possible. An encrypted online purchase transaction protocol has been developed and integrated into the software. * Provides consumers, suppliers, and banks with credit card transactions. • Consumer form. The form of the process and the payment medium differ greatly depending on the consumer or purchaser. Once the order has been placed, the business-consumer (B-C) implementation requires payment (or at least authorization). For buyer centers, trading partnerships, established infrastructure can use traditional Internet-enabled invoicing or EDI or electronic funds transfer (e 1 e c t r ο n i c f u n d t r a n s f e r). • Electronic certification. Some kind of digital signature strategy is needed between trading partners and potential financial institutions in place. • Messaging standards. Payment instructions must be approved by all parties. Payment methods There are many different vendors and technologies available to process electronic payments. Infrastructure, procedures, and technology can vary dramatically from vendor to vendor. The actual medium for current payment options falls into these types: • Credit-based payments. Credit cards are the most widely used electronic payment method today. With this transaction protocol and security features, credit cards can be used on the Internet just as they are in the real world. Consumers are more confident about the standards they are familiar with. Today's clearing, settlement and 4HICKMAN200036TW; AND1P282.TW 130 This paper size applies to China National Standard (CNS) A4 (210 X 297 mm) ~ (Please read the precautions on the back before filling this page ) Printing · Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economy Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economy 491972 A7 __B7 _ V. Invention Description (彳 31) The recurring costs of fraud make the credit card-based solution for small transactions Not economical. • Liability-based payments. Payments using this method will be directly liabilities and accounted for. These can take the form of debit cards, electronic checks, or messages using EDI or EFT. • Electronic cash. Electronic equivalent of electronic cash bills. It is often implemented using public key encryption, digital signatures and blind signatures. Electronic cash is digital money on a computer hard drive. In theory, money can be spent in small amounts, such as one-tenth of a dollar or less. In electronic cash systems, there is usually a bank that is responsible for issuing currency, and consumers receive cash from banks or intermediaries and suppliers that accept digital cash for goods and services. In short, banks, suppliers, and consumers each have a public or private key that can be used to encrypt and digitally sign electronic cash. • Smartcards. A smart card is a programmable storage device that is the same size and appearance as a normal credit card. It contains a microchip to store and process information. Some cards can contain digital coin-type storage. Losing a card means losing the price, just like cash. Cardholders can pay the stored price at any smart card accepting store. This technology is particularly useful for online shopping and is less susceptible to damage than systems that put a price on a hard drive. The transaction cost of this type of payment is very low, allowing users to exercise micro-transactions such as a penny or less. Microsoft and some computer manufacturers promote 4HICKMAN200036TW; AND1P282.TW 131 which merges smart card holders into personal computer keyboards. This paper size applies to China National Standard (CNS) A4 (210 X 297 mm) (Please read the precautions on the back before (Fill in this page)

491972 A7 B7__ 五、發明說明(132) 標準,而大部分電視機上網際網路存取裝置已經具有 他們了。 (請先閲讀背面之注音心事項再填寫本頁) •數位錢包。數位錢包軟體便利了消費與供應商間,以 及供應商與銀行間的安全線上交易。對於消費者,很 快就有數以百計的數位錢包軟體可供利用。他們將是 免費、功能類似並可在一網路瀏覽器上運作。 •付款授權。在很多情形中,實施信用卡付款方式的消 費網站要求付款授權。在某些情形中實際的核對程序 直到物品運送到之後才會發生。 • JEPI,由W3C與商務網(CommerceNet)聯合許多 大科技所發展出來,其係一標準機制,供網客戶與伺 服器去找出他們共有何種付款能力,並協商付款工 具、通訊協定與彼此傳送。其對使用者是透明的;他 們只被錢包軟體告知在此商家有何種付款選擇可利用 (伴隨任何因付款型式或加入會員而可取得之減 價),並且被要求選擇。 實現2 6 0 6 經濟部智慧財產局員工消費合作社印製 實現程序可以很複雜並將隨著送貨的形式而不同。與 現有系統的整合,以及發票與到批發商或貿易夥伴訂單的 通訊將扮演重要角色。 將需要很多的通訊與後端處理。實施一電子商務環境 常常打開檢視基礎系統與程序的大門。潛在區域包括倉庫 通知(warehouse notification)與郵局遞送。印刷、 4HICKMAN200036TW; AND1P282.TW 132 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) 491972 A7 ____B7____ 五、發明說明(彳33) 傳真、.或潛拽網路系統(s n e a k e r n e t s y s t e m )可以升 級到到EDI、電子郵件或其他電子媒介。這些程序的更新 與改善對於提供客戶支持將很關鍵。使用者期望有能力看 到他們訂單的進展,當訂單從網站移動到倉庫到他們桌 面。 電子分配 軟性貨物可形諸於資訊、軟體、圖樣、音樂或任何其 他數位內容型式。很多傳統內容提供者已進口他們的內容 到網際網路。雖然利潤的產生少於他們透過傳統分配管道 達到的少、出版商與其他娛樂提供者已經發現網際網路提 供更豐富、更互動的環境以呈現他們的內容。網際網路使 消費者能去搜尋、評估、交易與個人化此內容。網際網路 將繼續被採用爲有效分配管道。 網站訂閱 一種非常簡化的軟性貨品實現的形式藉由允許使用者 存取此網站而達到。處理許可與存取的功能可被要求去阻 止未授權的使用者或行動。 網站訂購可以根據不同的計數技術。網際網路計數技 術可分成兩類:觀察計數與使用計數。觀察計數'測胃網1立占 活動,而使用計數測量物品,如檔案、位元或時間的使 用。 4HICKMAN200036TW; AND1P282.TW 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) ------------裝--- (請先閱讀背面之注意事項再填寫本頁) ·- # 經濟部智慧財產局員工消費合作社印製 491972 A7 B7 五、發明說明(彳抖) 電子權利管理 數位內容的所有者,包含作者與出版商’一値在尋找 一個方法來防止他們作品在網計網路上的未授權分配。今 曰網際網路可取得的的大多數內容是免費分配的’時常沒 有考慮內容擁有者的著作權與適當的權利金。保護網路內 容是一件困難的工作。物品如受著作權保護的字句、影像 與其他數位物件,皆需要被保護以免於未授權的複製。目 前,著作權的警告能輕易的被剝奪。近來有些針對追蹤著 作權侵害的發展。 有些權利管理方法係用以辨認文件或數位物件的合法 與非法使用。這些槪念仍然需要主動地在網路上搜尋濫用 的跡象。基本上,此方法仍然允許內容被提取並使用’而 大部分的安全防護仰賴信任(trust)。其他的方式包括 用安全封套(security wrapper)包裹此內容以使其不 致受到未授權使用者的存取。 •數位浮水印一最普通方法是加上數位“浮水印”。這個 浮水嵌入在影像背景中而不改變整個影像的外表。一代理 器,因其爬行於網路上的方式而有時被稱爲「蜘蛛 (spider)」,能用於掃描網際網路以搜尋影像或識別 符存在,並報告未授權網址。浮水印跟著影像走,即使影 像被下載後亦然。 •數位物件識別符(D Ο I ) -此方法結合一獨特的識別 符與數位內容。識別符會永久的結合,並可能如段落一般 的低階。追個D ΟI槪念只是一建構區塊,而且仍然需要491972 A7 B7__ 5. Description of the invention (132) standard, and most TV Internet access devices already have them. (Please read the phonetic notes on the back before filling out this page) • Digital wallet. Digital wallet software facilitates secure online transactions between consumers and suppliers, and between suppliers and banks. For consumers, hundreds of digital wallet software will soon be available. They will be free, similar in functionality and work on a web browser. • Payment authorization. In many cases, consumer websites implementing credit card payment methods require payment authorization. In some cases the actual reconciliation process does not occur until the item has arrived. • JEPI, developed by the W3C and CommerceNet in conjunction with many major technologies, is a standard mechanism for network customers and servers to find out what payment capabilities they have in common, and negotiate payment tools, communication protocols and each other Send. It is transparent to the user; they are only informed by the wallet software what payment options are available to this merchant (with any reductions available due to payment types or membership) and are asked to choose. Achieved 2 6 0 6 Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economics Implementation procedures can be complex and will vary depending on the form of delivery. Integration with existing systems and the communication of invoices to orders from wholesalers or trading partners will play an important role. A lot of communication and back-end processing will be required. Implementing an e-commerce environment often opens the door to reviewing the underlying systems and processes. Potential areas include warehouse notifications and post office delivery. Printing, 4HICKMAN200036TW; AND1P282.TW 132 This paper size is applicable to China National Standard (CNS) A4 (210 X 297 mm) 491972 A7 ____B7____ 5. Description of the invention (彳 33) Fax,. Or sneakernet system Upgrade to EDI, email or other electronic media. Updates and improvements to these procedures will be critical to providing customer support. Users expect to be able to see the progress of their orders as they move from the website to the warehouse to their desktop. Electronic distribution Soft goods can take the form of information, software, graphics, music or any other type of digital content. Many traditional content providers have imported their content into the Internet. Although profit generation is less than they achieved through traditional distribution channels, publishers and other entertainment providers have found that the Internet provides a richer and more interactive environment to present their content. The Internet enables consumers to search, evaluate, trade and personalize this content. The Internet will continue to be adopted as an effective distribution channel. Website Subscription A very simplified form of soft goods implementation is achieved by allowing users to access this website. Features that handle permissions and access can be required to prevent unauthorized users or actions. Website ordering can be based on different counting techniques. Internet counting technology can be divided into two categories: observation counting and usage counting. Observation counts the use of gastrointestinal nets to measure activities, while counting is used to measure items such as files, bits, or time. 4HICKMAN200036TW; AND1P282.TW This paper size is applicable to China National Standard (CNS) A4 (210 X 297 mm) ------------ install --- (Please read the precautions on the back before filling (This page) ·-# Printed by the Intellectual Property Office of the Ministry of Economic Affairs, Consumer Cooperatives 491972 A7 B7 V. Description of the Invention (trembling) Owners of digital content in electronic rights management, including authors and publishers, are looking for a way to prevent Unauthorized distribution of their work on the Internet. Most of the content available on the Internet today is distributed free of charge 'often without considering the copyright and appropriate royalties of the content owner. Protecting network content is a difficult task. Items such as copyrighted words, images, and other digital objects need to be protected from unauthorized copying. At present, copyright warnings can be easily deprived. There have been recent developments aimed at tracking violations of copyright. Some rights management methods are used to identify the legal and illegal use of documents or digital objects. These thoughts still need to actively search the web for signs of abuse. Basically, this method still allows the content to be extracted and used ' and most security relies on trust. Other methods include wrapping this content in a security wrapper so that it is not accessible to unauthorized users. • The most common method for digital watermarking is to add a digital "watermark." This floating water is embedded in the background of the image without changing the appearance of the entire image. An agent, sometimes called a "spider" because of the way it crawls on the Internet, can be used to scan the Internet for images or identifiers and report unauthorized URLs. The watermark follows the image, even after the image is downloaded. • Digital Object Identifier (D Ο I)-This method combines a unique identifier with digital content. Identifiers are permanently combined and may be as low-level as paragraphs. Chasing D ΟI 槪 is just a building block, and it still needs

4HICKMAN200036TW; AND1P282.TW 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) (請先閱讀背面之注意事項再填寫本頁) 裝 訂: 經濟部智慧財產局員工消費合作社印製 491972 A7 B7 經濟部智慧財產局員工消費合作社印製 五、發明說明(1钙) 融合於.權利管理系統。 •數位指紋一一數位指紋是接觸電子文件者看不見的記 錄。需要決定是誰第一個誤用文件的服務(如不當複製或 分配它)。指紋電子文件是依內容而定的,而且對於運用 大量位元的文件型式最易使用。 •安全封裝(secure packaging)—這個槪念藉由將物 品載一邏輯安全包封(logical security envelop) 中而阻止資訊的使用。使用者可跟據安全包封的要求 得以存取資訊。安全防護允許使用者先看摘要、價 格、使用規則與其他相關資料。在終端使用者同意付 款與/或規則後,使用者將得到一鑰匙去開啓包含在 安全包封的文件。 客戶服務1012 第29圖接露方法2900的流程圖,此方法供在網上電 子式第服務客戶。在操作2902中,提供透過網站在網上 搜尋資訊的能力。在操作2904中顯示供追蹤訂單的訂單 追蹤資訊。在操作2906中允許透過網站的退貨,而購價 回還給客戶。在操作2908中執行一訓練應用程式,訓練 一客戶在網上利用網站。藉由允許客戶於網路尙在操作 2910中與客戶服務代表溝通,透過網站及時與客戶互 動。 能夠被找尋到的資訊包含產品資訊與訂單狀態。同 時客戶可藉由聊天室與客戶服務代表溝通。 4HICKMAN200036TW; AND1P282.TW 135 (請先閱讀背面之注意事項再填寫本頁) 裝4HICKMAN200036TW; AND1P282.TW This paper size applies to Chinese National Standard (CNS) A4 (210 X 297 mm) (Please read the precautions on the back before filling out this page) Binding: Printed by the Consumer Cooperative of Intellectual Property Bureau of the Ministry of Economic Affairs 491972 A7 B7 Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs. 5. Description of the Invention (1 Calcium) Integrate into the rights management system. • Digital fingerprints-Digital fingerprints are records that are invisible to anyone who contacts an electronic file. You need to decide who is the first service to misuse a file (such as improperly copying or distributing it). Fingerprint electronic files are content-dependent and are the easiest to use for file formats that use large numbers of bits. • Secure packaging—This concept prevents the use of information by placing the item in a logical security envelop. Users can access the information upon request for security encapsulation. Security protection allows users to look at the summary, price, usage rules and other relevant information first. After the end user agrees to the payment and / or rules, the user will be given a key to open the document contained in the security envelope. Customer Service 1012 Figure 29 shows a flowchart of a method 2900, which is used to serve customers electronically online. In operation 2902, the ability to search for information online through a website is provided. The order tracking information for tracking the order is displayed in operation 2904. In operation 2906, returns through the website are allowed, and the purchase price is returned to the customer. A training application is executed in operation 2908 to train a customer to use a website on the Internet. By allowing customers to communicate with customer service representatives on the Internet in operation 2910, interact with customers in a timely manner through the website. The information that can be found includes product information and order status. At the same time, customers can communicate with customer service representatives through chat rooms. 4HICKMAN200036TW; AND1P282.TW 135 (Please read the precautions on the back before filling this page)

I ϋ I I ϋ ϋ ϋ ϋ I I II ϋ I I ϋ ϋ ϋ ϋ I I I

本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) 經濟部智慧財產局員工消費合作社印製 491972 A7 B7 五、發明說明(彳祕) 一選擇是,可依照並順從採購歷史資訊。其他選擇 是,亦可提供包含政策文件的資訊。一外加選擇是,可提 供一個線上告示板允許從複數個客戶的輸入。 這個分類包含任何滿足使用者需要之解決方案的元 件,其通常由一真人客戶服務代表來塡入。這些服務跨越 市場行銷、經營銷售、訂單處理,與其他分類。電子商務 的客戶服務層面與銷售實際產品一樣的重要。正如同紙鈔 的世界中,客戶服務的不足、或不良的客戶服務,能破壞 使用者已經與電子商務建立的關係。 客戶服務的商業驅動者是: •高客戶滿意度 •支援人員的減少 •筒功能 •及時的資訊與服務 在網際網路上行使商務就是允許直接存取系統與資 料。新使用者較不能忍受難懂的介面與網站配置,並且需 要很多協助以了解網站上有什麼資訊與如何去發現。客戶 服務仍持續是維持客戶關係的重要因素。 加強客戶服務有很多不同種類。應該實施那一種服務 要視網站的目標與特性而定。以下列示主要客戶服務,其 亦示於第30圖。 網站搜尋3000 4HICKMAN200036TW; AND1P282.TW 136 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) -----------^11裝--------訂---------線 (請先閱讀背面之注意事項再填寫本頁) 491972 A7 _B7__ 五、發明說明(1W) 搜尋引擎已然成爲任何資訊密集網站的通俗元件。其 引導使用者到其尋找的資料型式的能力不只使互動更有效 率,並加強了客戶關係。「搜尋」是一般用語,可用以尋 找特定的產品或可加以實施供搜尋特定客戶的訂單或其他 資訊。 訂單追蹤(訂單管理)3002 使客戶能追蹤他們的訂單能對支援人員的減少與建立 客戶關係上帶來很多好處。具有此性質的應用程式依細分 程度從簡單到複雜。訂單追蹤系統應整合在訂單處理的固 有流程系統中。亦可提供採購歷史功能。 退還商品/信用3004 假如網站銷售貨品,客戶就有可能退貨。如同在大多 例外處理,雖然應該允許退貨但可造成很多問題。實際上 計入聰明卡與取代一數位貨幣可能很困難。應仔細考慮法 律與程序應予考慮並提供文件。 協助與資訊3 0 06與問題解決3 008 一網站可以提供很多協助與資訊特徵。下列一些較常 見的例子。 •政策文件一文件說明網站的政策。某些情形中這是因爲 法律理由所必要的。一般而言,配置網站政策與步驟是很 重要的。 4HICKMAN200036TW; AND1P282.TW 137 本^氏張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) -----------_ (請先閱讀背面之注意事項再填寫本頁) 『裝---- % 經濟部智慧財產局員工消費合作社印製 經濟部智慧財產局員工消費合作社印製 491972 A7 ____E-------- 五、發明說明(彳38) •電子郵件/意見/聯絡供應商一提供機制讓使用者能輕 易聯絡網站是一個很好的做法。從實際使用者可以得到寶 貴的輸入與意見。有些實施允許使用者去評等網站內容。 此功可被認爲是虛擬建議方塊(virtual suggesti()n box ) 〇 •線上協助與訓練(網站導航)一不論網站是網際網路或 網內網路,使用者應可以得到有關網站導航與使用的協 助。在更有力的情形中,如果其將改善網站效能與使用’ 可以提供互動訓練。 •商店定位器一很多客戶可使用網站供定價與產品硏究’ 並可能不滿足於經電子媒介採購物品。如果網站有實體商 店位置,提供設備供猶豫的客戶找到他們。 •困難協助台一大多協助台可透過一網站提供。這些服 務能從簡單文件,如問題解決指導與常見問題到複雜 應用程式。 合作服務(Collaboration Services) 在安全背後,一客戶不在線上交易的主要原因是缺乏 與予人的聯絡。雖然大部分技術人員不相信,在大部分潛 在消費者庫中仍隱藏著對電腦的潛藏恐懼。現金大部分賣 方中心網站不提供真正的雙向、互動、或合作的環境。網 站可能具有個人化的複雜形式,其將過濾與遞送供特定使 用者用的內容,但在大部分情形中將不提供即時客戶互 動。互動可以下列方式輸送: 4HICKMAN200036TW; AND1P282.TW n〇 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) (請先閱讀背面之注意事項再填寫本頁)This paper size applies to China National Standard (CNS) A4 (210 X 297 mm) Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs 491972 A7 B7 V. Description of the invention (secret) One option is to follow and obey the purchase history Information. Alternatively, information containing policy documents is also available. As an option, an online bulletin board can be provided to allow input from multiple customers. This category contains any component of a solution that meets the needs of the user, usually entered by a live customer service representative. These services span marketing, operating sales, order processing, and other categories. The customer service level of e-commerce is as important as selling actual products. Just as in the world of paper money, insufficient customer service or poor customer service can destroy the relationship that users have established with e-commerce. The business drivers of customer service are: • High customer satisfaction • Reduction of support staff • Barrel functions • Timely information and services Performing business on the Internet allows direct access to systems and information. New users are less able to tolerate difficult interfaces and website configurations, and need a lot of help to understand what information is on the website and how to discover it. Customer service continues to be an important factor in maintaining customer relationships. There are many different types of enhanced customer service. Which service should be implemented depends on the goals and characteristics of the website. The main customer services are shown below and are also shown in Figure 30. Website search 3000 4HICKMAN200036TW; AND1P282.TW 136 This paper size is applicable to China National Standard (CNS) A4 (210 X 297 mm) ----------- ^ 11 pack -------- Order --------- line (please read the notes on the back before filling out this page) 491972 A7 _B7__ 5. Description of Invention (1W) The search engine has become a popular component of any information-intensive website. Its ability to direct users to the type of data they are looking for not only makes interactions more efficient, it also strengthens customer relationships. "Search" is a general term that can be used to find specific products or can be implemented to search for orders or other information about specific customers. Order Tracking (Order Management) 3002 Enabling customers to track their orders can bring many benefits to the reduction of support staff and the establishment of customer relationships. Applications with this nature can range from simple to complex by segmentation. The order tracking system should be integrated into the inherent process system for order processing. It also provides purchasing history function. Product Return / Credit 3004 If the website sells goods, the customer may return the product. As with most exceptions, although returns should be allowed, they can cause many problems. In fact, counting smart cards and replacing a digital currency can be difficult. Careful consideration should be given to laws and procedures and documentation should be provided. Assistance and Information 3 06 and Problem Solving 3 008 A website can provide many assistance and information features. Here are some more common examples. • Policy Document-A document describing the website's policies. In some cases this is necessary for legal reasons. In general, it is important to configure website policies and procedures. 4HICKMAN200036TW; AND1P282.TW 137 This sheet scale is applicable to China National Standard (CNS) A4 (210 X 297 mm) -----------_ (Please read the precautions on the back before filling in this Page) "Preparation ----% Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economy Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economy 491972 A7 ____ E -------- 5. Description of Invention (彳 38) • Electronics Email / Comments / Contact Vendors-It is a good practice to provide a mechanism for users to contact the website easily. Valuable input and comments can be obtained from actual users. Some implementations allow users to rate website content. This function can be considered as a virtual suggesti () n box. 〇Online assistance and training (Site navigation)-Regardless of whether the website is the Internet or intranet, users should be able to get relevant website navigation and Use of assistance. In more powerful situations, it will provide interactive training if it will improve website performance and usage. • Store Locator-Many customers can use the website for pricing and product research ’and may not be content to purchase items via electronic media. If the website has a physical store location, provide equipment for hesitant customers to find them. • Difficult help desks. Most help desks are available through a website. These services can range from simple documents such as problem solving instructions and common problems to complex applications. Collaboration Services Behind security, the main reason why a customer is not trading online is the lack of contact with others. Although most technicians don't believe it, the hidden fear of computers is still hidden in most potential consumer libraries. Most cash seller center websites do not provide a true two-way, interactive, or collaborative environment. Websites may have complex, personalized forms that will filter and deliver content for specific users, but in most cases will not provide instant customer interaction. Interactions can be delivered in the following ways: 4HICKMAN200036TW; AND1P282.TW n〇 This paper size applies to China National Standard (CNS) A4 (210 X 297 mm) (Please read the precautions on the back before filling this page)

--------訂---------線I 491972 A7 B7 經濟部智慧財產局員工消費合作社印製 五、發明說明(1奶) •客戶服務交談一提供透過網站直接與與客戶互動的服 務。最簡單的形式可能是〜即時、文字的交談功能讓 遲疑的採購者對服務或業務代表提出問題。在聲音或 視訊解決方案可被考慮之前,必須檢視技術與帶寬考 量。 •族群--線上客戶的興趣族群。族群的目的是在網站 中建立一興趣,如此一來客戶將回返只爲了互動並取 得資訊(以及潛在地購買物品)。這可能包括產品或 產業的額外資訊等等不長包括於傳統經銷方式中。 有關合作服務進一步細節,請參照前面的在DAF中的合 作傳送媒介。 安全1014 第31圖接露根據本發明的一具體實施例之電子商務 應用程式結構的安全元件1014。其各種不同的子元件討 論如下: 第32圖接露方法3200的流程圖,供確保網路上電子 商務的安全。在操作3202中,一訊息摘要在傳輸前附加 在資料上,以決定此資料在使用者計送後是否經過修改。 此資料同時在操作32 04中加密以阻止在傳輸中未經授權 之存取。認證資訊與資料在傳輸中一起送出以在操作 3206中核使用者身分。藉由在操作3208中,於客戶端上 使用認證模式而決定哪一個實體可存取特定應用程式、資 料、與資源,客戶端環境得以確保。一伺服器環境藉由在 4HICKMAN200036TW; AND1P282.TW 139 (請先閱讀背面之注意事項再填寫本頁) 裝 #· 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) 491972 經濟部智慧財產局員工消費合作社印製 Α7 Β7 五、發明說明(彳40) 操作3210中實施一個防火牆得以確保安全。 當資料修正發生時’訊息摘要可包括時間紀錄。此認 證資訊亦包含數位簽名。此外,認證資訊可進一步包括一 證明。進而,此證明可包含使用者身份、一服務識別符、 用以查驗數位簽章的一公鑰、發證明者的名稱、證明有效 期間、以及電子郵件地址。 在最近幾年中,電腦犯罪爆炸一駭客損害CIA的網 站,從太空總署(NASA)與五角大廈(Pantagotl)竊 取資訊與軟體,並進行未授權之線上轉帳造成銀行損失數 百萬。根據Wonroom Research,從電腦犯罪造成的財 物損失一年約有一百億。從歷史上,8 0 %的安全問題都 是內部的。從員工越權’或因不滿而起。網路中心電腦計 算與電子商務正由於快速演進的科技基礎結構而增加風 險。到企業系統的存取實際上已擴張,每天發現新的安全 漏洞,安全問題變的很複雜。 當提供無線可能的商業優勢時,電子商務也可能將企 業暴露於風險中。假如他們的系統被闖入,他們將冒著財 物損失的風險、難堪、損失客戶、以及潛在的法律責任。 企業常常在利用電子商務上卻步,因爲他們單擔心安全問 題。雖然安全技術持續演進以減少這些電子商務安全風 險,安全漏洞因爲企業無法實施適當的安全解覺方案組合 而發生。 相關於連結網路到廣大網際網路的問題已經廣爲發 表。到處都是駭客,而且妥協網路的新方法幾乎天天發 4HICKMAN200036TW; AND1P282.TW Ί Α( 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) -----------裝--------訂--------- (請先閱讀背面之注意事項再填寫本頁) 經濟部智慧財產局員工消費合作社印製 491972 A7 B7___ 五、發明說明(彳41) 表。然而,何不連結網路到一合夥人以進行計劃整合,或 也許是自動存貨控制的供應商?吾人也許相信他們的供應 商,然而,吾人真的瞭解他們網路保全的良好程度嗎?合 約與服務水準可以並應該處理很多這些議題,然而技術亦 可用於加強安全政策。 一旦正確的安全解決方案組合已然實施,公司除了因 其網站安全而放心外,將享受許多利益。安全也允許人們 在網路上行使商業功能,這些功能之前親自處理或運用更 私密的連結。此允許擴大到新市場與新商業能力,增加效 率並降低做生意的成本。舉例來說,在典型的電子店面情 形中,安全使未知的買賣雙方在尊重交易的保證下交換貨 物。安全亦爲公司電子商務服務的賣點。藉由展示一較高 層級的信任與降低之受欺騙機會,一客戶可選擇一供應商 的服務,而不選另一家的。而且,電子商務技術仰賴電子 自動化安全而不是不準確的程序安全。這可造成更可靠的 程序與較少的錯誤。 除非客戶與使用者覺得系統是安全,而且使用系統的 風大,否則其實施將不會成功。隨著系統,在不同安全區 域的安全量在不同地區也有不同。藉由防護網站的所有層 面,其使得一入侵者進入系統而不被發現非常困難。可以 使用許多不同的方式以提供系統防護。在最常使用的方式 中,有防火牆、加密與認證(a u t h e n t i c a t i ο η )。每一 項供給一個特殊形式與程度的安全,而在很多情形中使用 多層技術達成所要結果是合理的。安全應極度小心地內建 4HICKMAN200036TW; AND1P282.TW 141 >紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) (請先閱讀背面之注意事項再填寫本頁)-------- Order --------- line I 491972 A7 B7 Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 5. Description of the invention (1 milk) • Customer service conversation-provided directly through the website Services to interact with customers. The simplest form may be ~ the instant, text-based chat feature allows hesitant buyers to ask questions about services or agents. Before a sound or video solution can be considered, technology and bandwidth considerations must be reviewed. • Ethnicity-Interesting ethnicity of online customers. The purpose of ethnic groups is to build an interest in the website so that customers will return only for interaction and information (and potentially purchase items). This may include additional information about the product or industry, etc. that are not included in traditional distribution methods. For further details on cooperation services, please refer to the previous Cooperative Delivery Medium in DAF. Security 1014 FIG. 31 illustrates a security element 1014 of an e-commerce application structure according to an embodiment of the present invention. The various sub-components are discussed as follows: Figure 32 shows the flowchart of method 3200 for ensuring the security of electronic commerce on the network. In operation 3202, a message digest is attached to the data before transmission to determine whether the data has been modified after the user has scheduled it. This data is also encrypted in operation 32 04 to prevent unauthorized access during transmission. Authentication information is sent along with the data to verify user identity in operation 3206. By using the authentication mode on the client to determine which entity can access specific applications, data, and resources in operation 3208, the client environment is ensured. A server environment is based on 4HICKMAN200036TW; AND1P282.TW 139 (please read the precautions on the back before filling this page). Loading # · This paper size applies to China National Standard (CNS) A4 (210 X 297 mm) 491972 Economy Printed by the Intellectual Property Bureau of the Ministry of Intellectual Property, Consumer Cooperative, A7, B7 5. Invention Description (彳 40) Operation 3210 implemented a firewall to ensure security. When a data correction occurs, the message summary may include a time record. This certification information also contains a digital signature. In addition, the certification information may further include a certificate. Further, the certificate may include the identity of the user, a service identifier, a public key to verify the digital signature, the name of the issuer, the period of validity of the certificate, and an email address. In recent years, a computer crime explosion has resulted in hackers damaging CIA websites, stealing information and software from NASA and the Pantagotl, and performing unauthorized online transfers that have cost banks millions of dollars. According to Wonroom Research, property damage from computer crime is about 10 billion a year. Historically, 80% of security issues were internal. Starting from the employee ’s authority ’or because of dissatisfaction. Network-centric computer computing and e-commerce are increasing risks due to the rapidly evolving technological infrastructure. Access to enterprise systems has actually expanded, new security vulnerabilities are discovered daily, and security issues have become more complex. E-commerce may also expose businesses to risks when providing the possible business advantages of wireless. If their systems are breached, they run the risk of financial loss, embarrassment, loss of customers, and potential legal liability. Companies are often deterred from using e-commerce because they are solely concerned about security issues. Although security technologies continue to evolve to reduce these e-commerce security risks, security breaches occur because companies are unable to implement an appropriate combination of security awareness solutions. Issues related to connecting the Internet to the wider Internet have been widely published. Hackers are everywhere, and new methods of compromising the Internet are issued almost every day 4HICKMAN200036TW; AND1P282.TW Α Α (This paper size applies the Chinese National Standard (CNS) A4 specification (210 X 297 mm) ------- ---- Equipment -------- Order --------- (Please read the notes on the back before filling out this page) Printed by the Consumer Consumption Cooperative of the Intellectual Property Bureau of the Ministry of Economy 491972 A7 B7___ Five Table of Inventions (彳 41). However, why not link the Internet to a partner for planning integration, or maybe a supplier of automatic inventory control? I may trust their suppliers, but I do understand them. How good is road security? Contracts and service levels can and should deal with many of these issues, but technology can also be used to strengthen security policies. Once the right combination of security solutions has been implemented, companies will enjoy rest assured that their website is secure Many benefits. Security also allows people to exercise business functions on the Internet, which previously handled or used more private connections. This allows expansion into new markets and new business capabilities, increasing efficiency Reduce the cost of doing business. For example, in a typical e-shop situation, security enables unknown buyers and sellers to exchange goods under the guarantee of respecting the transaction. Security is also the selling point of the company's e-commerce services. And reduce the chance of being deceived, a customer can choose the services of one supplier over another. Moreover, e-commerce technology relies on electronic automation security rather than inaccurate program security. This can lead to more reliable procedures With fewer errors. Unless customers and users feel that the system is safe, and the wind of using the system, its implementation will not be successful. With the system, the amount of security in different security areas in different regions also varies. Protecting all aspects of a website, making it very difficult for an intruder to enter the system without detection. There are many different ways to provide system protection. Among the most commonly used methods are firewalls, encryption and authentication (authenticati ο η) .Each item provides a special form and degree of security, and in many cases It is reasonable to use multi-layer technology to achieve the desired result. Safety should be built with extreme care 4HICKMAN200036TW; AND1P282.TW 141 > Paper size applies Chinese National Standard (CNS) A4 (210 X 297 mm) (Please read the notes on the back first (Fill in this page again)

經濟部智慧財產局員工消費合作社印製 A7 B7 、發明說明(m) 於一系統中以達到效用。 電子商務中安全的細節將就以五個電子商務跨元件應 用程式形式進行討論。其五種應用程式形式討論如下: •線上產品廣告 •合作 •互動式客戶服務 •網際網路家庭理財 •線上店面/產品銷售. 第33-42圖接露此五種應用形式。這些圖編組成連續 的配對,其中一樣品架構展示在第一圖,而下一圖將是安 全架構,其可能也可能不是藉由修正前一個樣品架構所造 成。成雙圖的組織如下:圖33·34、35-36、37_38、 39-40、41-42 ° 安全通訊3 100The Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs printed A7 B7 and Invention Description (m) in a system to achieve effectiveness. The details of security in e-commerce will be discussed in the form of five e-commerce cross-component applications. The five application forms are discussed as follows: • Online product advertising • Cooperation • Interactive customer service • Internet home finance • Online store / product sales. Figures 33-42 show these five application forms. These diagrams are composed of consecutive pairs. One of the sample architectures is shown in the first diagram, and the next one will be the security architecture. It may or may not be created by modifying the previous sample architecture. The organization of the double graph is as follows: Figure 33 · 34, 35-36, 37_38, 39-40, 41-42 ° Security communication 3 100

Visa®與MasterCard® —同開發了安全電子交易 (Secure Electronic Transaction,SET)通訊協定以允 許在開放網路上安全、省錢的銀行卡交易在公開網路。 SET包括設施供: •電子地採購貨品與服務 •要求付款授權 •要求確認證明 消費者此用整合到他們瀏覽器的的特定程式,取得 他們的加密鑰匙。此程式自動的轉換一消費者的信用卡號 4HICKMAN200036TW; AND1P282.TW 142 本紙張尺度適用中國國家標準(cns)a4規格(210 χ 297公爱) -------------------^--------- (請先閱讀背面之注意事項再填寫本頁) 491972 經濟部智慧財產局員工消費合作社印製 A7 B7 五、發明說明CH3) 碼成Visa或MasterCard給的一證明。此證明包括有一鑰 匙與永遠附加於消費者的瀏覽器。 然後,對於每一交易,消費者要求供應商寄送他的證 明’而此供應商能詢問消費者的銀行以確認消費者的證 明。 SET系統的完全實施要求對使用者欲在網際網路上 使用的每一張信用卡發行證明。這提高了管理的困難度, 也關係到達成統一採用水準的問題。 安至環境3102 網際網路安全有很多不同的技術方法。安全技術的最 後目檩是相同的。注意方式以及他們市圖回答的問題是很 重要的。例如安全插槽層(Secure Socket Layer, SSL)與安全http (SHTTP) —直被認爲是相互競爭 的技術。SSL使用TCP/IP通訊協定以在傳送層級提供交 易安全。安全性質連接到雙方間的通訊管道。他們所解決 的課題是對話或交易的管道私密性。SHTTP在文件層級 提供交易安全。此方式係爲解決認證的問題與網路交易的 授權。 安全日期3104 首先防護的區域就是資料。必須要確保資訊免於未授 權的存取。當傳輸敏感資料,如信用卡號碼或商業數據 時,這點特別重要。資料通常在到達最後目的地以前會經 4HICKMAN200036TW; AND1P282.TW 143 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) (請先閱讀背面之注意事項再填寫本頁)Visa® and MasterCard® — Developed the Secure Electronic Transaction (SET) protocol to allow secure, cost-effective bank card transactions on the open network on the open network. SET includes facilities for: • electronically purchasing goods and services • requesting payment authorization • requesting confirmation of certification Consumers use a specific program integrated into their browser to obtain their encryption keys. This program automatically converts a consumer's credit card number 4HICKMAN200036TW; AND1P282.TW 142 This paper size applies the Chinese National Standard (cns) a4 specification (210 χ 297 public love) -------------- ----- ^ --------- (Please read the notes on the back before filling out this page) 491972 Printed by the Consumers ’Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs A7 B7 V. Invention Description CH3) Coded as Visa Or a certificate from MasterCard. This proof includes a key and a browser that is always attached to the consumer. Then, for each transaction, the consumer asks the supplier to send his certificate 'and the supplier can ask the consumer's bank to confirm the consumer's certificate. The full implementation of the SET system requires the issuance of a certificate for each credit card the user wishes to use on the Internet. This raises the difficulty of management and is related to the issue of achieving a uniform level of adoption. Anzhi Environment 3102 There are many different technical approaches to Internet security. The final purpose of safety technology is the same. It's important to pay attention to the way and the questions they answer in the city map. For example, Secure Socket Layer (SSL) and Secure HTTP (SHTTP) are considered to be competing technologies. SSL uses the TCP / IP protocol to provide transaction security at the transport level. The security nature connects to the communication channel between the two parties. The problem they are addressing is the privacy of the pipeline of the conversation or transaction. SHTTP provides transaction security at the file level. This method is to solve the problem of authentication and authorization of online transactions. Safety Date 3104 The first area to be protected is data. It is important to ensure that information is protected from unauthorized access. This is especially important when transmitting sensitive information such as credit card numbers or business data. Documents usually pass through 4HICKMAN200036TW; AND1P282.TW before reaching their final destination. 143 This paper size applies to China National Standard (CNS) A4 (210 X 297 mm) (Please read the precautions on the back before filling this page)

491972 經濟部智慧財產局員工消費合作社印製 Α7 Β7 五、發明說明(M4) 過一段漫長的路程,而很容易被第三者讀取。因此資料必 須在傳輸前先加密。今日使用一些加密技術,其確保資料 在被攔截時無法使用。 除了加密資料,涉入電子交易的各方必須知道收到與 寄出的資料是安全的。認證技術需要知道寄件者與收件者 的身份,而且寄送的資料未被改變。認證可藉由訊息摘要 與數位簽章的使用而達到。一些這些技術的細節如下: 密碼學 、 密碼學是保全資料一個重要元件。最基本來說,密碼 學是使用一運算法或某種鑰匙加密或解密碼資料。加密資 料如無鑰匙解密是毫無用處的。今日存在一些加密標準, 其利用各式各樣的運算法與鑰匙。一些不同方法的可以在 「網際網路電子商業安全技術手冊(Internet Electronic Commerce Security Technology Handbook )」看到。 訊息摘要 訊息摘要是用以確定訊息在傳輸與接收之間不會改 變。其用以提供資料完整性(data-intergrity)。一個 摘要合倂於一傳送訊息。收件者能重新計算此摘要並比較 新的與傳送的。假如他們相合,此訊息在傳送中沒有被動 手腳。送件者與收件者用以計算摘要的運算法一定要相 同。一訊息摘要是一短、固定長度的數位碼,其係以單向 4HICKMAN200036TW; AND1P282.TW ι 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) -------------------訂---------線一 (請先閱讀背面之注意事項再填寫本頁) 491972 A7 B7_____ 五、發明說明(14S) (οn e - w ay )的方式從一個較長可變長度訊得來。結 果,無法根據此摘要決定原始訊息運用相同的摘要找到一 不同的訊息。 數位簽章 數位簽章確保只有送件者已經寄送的人收到此訊息。 送件者藉由用私鑰加密一訊息摘要簽署一訊息。除了特定 寄件者,沒人可產生與訊息相對應的摘要。這樣提供寄件 者的認證以及與原本的不可推翻性(n ο η - r e p u d i a t i ο η of the origin)。加密一訊息摘要亦將此簽章與訊息內 容相連接。寄件者不能宣稱他們沒有寄送此訊息或資訊非 他們所寄送的那一個。 證明 有些安全技術可能需要使用公鑰來加密資料。當使用 一公鑰,鑰匙管理與確認的議題即會產生。通常一授信任 的第三方將必須要發行鑰匙與簽名的的證明授權 (Certification Authority,CA)。證明授權宣告那 一個公鑰與簽明屬於哪一個使用者與服務。因爲一使用者 需要CA公鑰去檢查證書的真僞,CA必須提供一方法以 安全地輸送他自己的公鑰。 一個證明典型地含有: •使用者與服務識別符 •實際公鑰 4HICKMAN200036TW; AND1P282.TW 145 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) (請先閱讀背面之注意事項再填寫本頁) I ϋ i^i n H ϋ ϋ I I ϋ ^1 ϋ ϋ ϋ ^1 I ^ 經濟部智慧財產局員工消費合作社印製 經濟部智慧財產局員工消費合作社印製 491972 A7 B7 五、發明說明(146) •一公鑰,其可用來驗證送件者的數位簽章 •發行者名字,或證明授權(CA) •證明有效期間 •其他識別資訊如電子郵件地址 安全客戶環境3106 客戶環境也應予以保全。既然系統可能公開給大眾使 用,與可供廣大群眾存取,亦可成爲新攻擊型態的目標。 一環境一定要具有安全機制就位以控制誰能存取它與控制 使用者的動作。這可以利用授權模式達成。授權模式用方々 決定那一實體(例如人或應用)可存取特定應用程式、^ 料或來源。 隨著網路中心電腦計算的起步,整個應用程式或其# 形式的可執行內容可從網路上下載。這種類型的電腦胃十算; 引入了各種不同的安全考量。下載可具有應甩程式、小 式、ActiveX控制、腳本與各種其他軟體。瞭解下載之 不同的安全考量是很重要的。491972 Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs Α7 Β7 V. Description of Invention (M4) A long journey, which is easily read by a third party. Therefore the data must be encrypted before transmission. Some encryption technologies are used today to ensure that data cannot be used when intercepted. In addition to encrypting data, all parties involved in electronic transactions must know that the data received and sent is secure. Authentication technology needs to know the identity of the sender and recipient, and the information sent has not been changed. Certification can be achieved through the use of message digests and digital signatures. The details of some of these technologies are as follows: Cryptography, Cryptography is an important component of security data. At its most basic, cryptography uses an algorithm or some kind of key to encrypt or decrypt cryptographic data. Encrypted data such as keyless decryption is useless. There are encryption standards today that use a variety of algorithms and keys. Some different methods can be seen in the "Internet Electronic Commerce Security Technology Handbook". Message digest The message digest is used to ensure that the message does not change between transmission and reception. It is used to provide data-intergrity. A summary is combined in one message. Recipients can recalculate this summary and compare new and transmitted. If they match, the message is not passive in its transmission. The algorithm used by the sender and recipient to calculate the digest must be the same. A message digest is a short, fixed-length digital code that uses unidirectional 4HICKMAN200036TW; AND1P282.TW ι The paper size is applicable to China National Standard (CNS) A4 (210 X 297 mm) ------- ------------ Order --------- Line 1 (Please read the notes on the back before filling this page) 491972 A7 B7_____ V. Description of the invention (14S) (οn e -w ay) is obtained from a longer variable-length message. As a result, the original message cannot be determined based on this digest using the same digest to find a different message. Digital signature Digital signature ensures that only the sender of the message has received this message. The sender signs a message by encrypting a message digest with a private key. With the exception of specific senders, no one can generate a summary corresponding to the message. This provides the sender's authentication and its originality (n ο η-r e p u d i a t i ο η of the origin). Encrypting a message digest also links this signature to the message content. The sender cannot claim that they did not send this message or the information was not the one they sent. Proof Some security technologies may require public keys to encrypt data. When a public key is used, issues of key management and validation arise. Usually a trusted third party will have to issue a key and a signed Certification Authority (CA). The certificate authority declares which public key and signature belong to which user and service. Because a user needs the CA public key to check the authenticity of the certificate, the CA must provide a method to securely transmit his own public key. A certificate typically contains: • user and service identifiers • actual public key 4HICKMAN200036TW; AND1P282.TW 145 This paper size applies to China National Standard (CNS) A4 (210 X 297 mm) (Please read the notes on the back first (Fill in this page again) I ϋ i ^ in H ϋ ϋ II ϋ ^ 1 ϋ ϋ ϋ ^ 1 I ^ Printed by the Employees 'Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs Printed by the Employees' Cooperatives of the Ministry of Economics and Intellectual Property Bureau 491972 A7 B7 V. Inventions Explanation (146) • A public key that can be used to verify the digital signature of the sender • Issuer's name, or certification authority (CA) • Validity period of the certificate • Other identifying information such as email addresses Security Customer environment 3106 Customer environment also It should be preserved. Since the system may be publicly available and accessible to the general public, it may also become the target of new attack types. An environment must have security mechanisms in place to control who can access it and control user actions. This can be achieved using an authorization model. Authorization mode users 々 determine which entity (such as a person or application) can access a particular application, source, or source. With the start of network-centric computer computing, the entire application or executable content in the form of # can be downloaded from the Internet. This type of computer stomach counts; introduces a variety of different security considerations. Downloads can include applications, widgets, ActiveX controls, scripts and various other software. It's important to understand the different security considerations of downloads.

Java AppletsJava Applets

Java係設計以發展程式供執行於一起連接在網路的 不同電腦。一 J a v a A ρ ρ 1 e t是一附在一個網頁上的特殊種 Java程式。小程式嵌在網頁的HTML定義中並且由java 致能的瀏覽器來加以說明。使用者有可能從網路上下在此 小程式,並於當地執行此程式。 4HICKMAN200036TW; AND1P282.TW 146 本紙張尺度適用中國國家標準(CNS)A4規格(21〇 X 297公釐) ------------裝--------訂---------線 (請先閱讀背面之注咅^事項再填寫本頁) 經濟部智慧財產局員工消費合作社印製 491972 A7 B7__ 五、發明說明(Η7) 執行一些未知人士的未受信任程式碼本來就危險。基 於此,Java限制Applets的行動在安全活動組(安全小 程式標不爲授信任之小程式)。J a v a安全模式如下地限 制了一小程式: •小程式不能做直接系統呼叫 •小程式禁止去: 1. 存取檔案系統 2. 開插座(除了在原生伺服器) 3. 與其他小程式相介 4. 偵查當地環境 因爲其內建安全模式,Java將這些風險迎頭解決。 不幸地,在;lava安全模式仍然有漏洞而具有風險。舉例 來說,小程式可產生以執行各種有害的動作: •拒絕服務;此類不友善的小程式佔據使用者機器之所 有可使用的系統資源。 •侵犯隱私;這些小程式能公開私有資料。 •煩惱;這些小程式執行聲音檔案、顯示圖樣、或產生 無數的視窗。Java is designed to develop programs for execution on different computers connected together on a network. A J a v a A ρ ρ 1 e t is a special kind of Java program attached to a web page. The applet is embedded in the HTML definition of the web page and explained by a java-enabled browser. It is possible for users to run this program from the Internet and run it locally. 4HICKMAN200036TW; AND1P282.TW 146 This paper size applies to China National Standard (CNS) A4 (21〇X 297 mm) ------------ installation -------- order-- ------- line (please read the note on the back 咅 ^ Matters before filling out this page) Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 491972 A7 B7__ 5. Description of the invention (Η7) Untrusted execution of some unknown persons Any code is inherently dangerous. Based on this, Java restricts Applets' actions in the security activities group (security applets are not trusted applets). J ava security mode restricts one applet as follows: • Applets cannot make direct system calls • Applets are not allowed to: 1. Access the file system 2. Open sockets (except on the native server) 3. Compare with other applets Introduction 4. Investigating the Local Environment Java has addressed these risks head-on because of its built-in security model. Unfortunately, the lava security model is still vulnerable and risky. For example, applets can be generated to perform various harmful actions: • Denial of service; such unfriendly applets occupy all available system resources on the user's machine. • Privacy violations; these small programs can make private information public. • Trouble; these applets execute sound files, display patterns, or generate countless windows.

ActiveXActiveX

ActiveX是微軟公司所開發的技術,供在網際網路 上分散軟體。如同Java小程式,一 ActiveX控制可遷入 在網頁中,其通常以智慧互動圖樣出現。不像Java是一 個與平台無關的程式言語,ActiveX控制被分配成可執 4HICKMAN200036TW; AND1P282.TW 147 本紙張尺度適用中國國家標準(CNS)A4&格(210 X 297公釐)~~ (請先閱讀背面之注意事項再填寫本頁)ActiveX is a technology developed by Microsoft Corporation to distribute software on the Internet. Like a Java applet, an ActiveX control can be moved into a web page, which usually appears as a smart interactive pattern. Unlike Java, which is a platform-independent programming language, ActiveX control is assigned to be executable 4HICKMAN200036TW; AND1P282.TW 147 This paper size applies to China National Standard (CNS) A4 & grid (210 X 297 mm) ~~ (please first (Read the notes on the back and fill out this page)

A7 B7 五、發明說明(H?) 行雙體(executable binaries),而必須個別地依從各 目標機器與作業系統。A7 B7 V. Invention Note (H?) Executable binaries, and must individually follow each target machine and operating system.

ActiveX安全模式與Java Applet相當不同。 ActiveX對一控制能做什麼事並沒有限制。而各 ActiveX控制可以由作者數位地簽章,這樣一來此簽名 不能被改變或拒絕。此數位簽章可由一授信任的證明管理 機構如Verisign,以產生縮包套裝軟體(shink-wrapped software)的同等物。假如下載一簽章的 ActiveX控制造成機器當機,將可指認出負責方。 這個安全模式將電腦系統安全的責任加諸於使用者。 在瀏覽器下載一未簽章過的ActiveX控制,或已經簽章 但被一未知證明管理機構證明之前,瀏覽器顯示一對話方 塊警告使用者其行動可能不安全。使用者可放棄傳送,或 可繼續冒險傳送。 描述性程式語言 網際網路描述性程式語言是嵌入在HTML頁面之程 式語言,並可由使用者的瀏覽器解讀(例如網景的 Navigator或微軟的Explorer)。通常他們致力於控制 使用者與HTML文件的互動,例如當: ♦處理滑鼠事件 •開啓新視窗 ♦核對形式 ♦與其它動態內容互動 4HICKMAN200036TW; AND1P282.TW 148 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) (請先閱讀背面之注意事項再填寫本頁) 裝 1· I ϋ ϋ ϋ ϋ 1^aJ0 1 ϋ ϋ —.1 ϋ n n I ^ 經濟部智慧財產局員工消費合作社印製 491972 A7 B7 五、發明說明(彳半?) 由於腳本是從外在來源執行於使用者系統上的程式 碼,他們引起安全問題。的確,一使用者必須確定一下載 腳本對系統不會進行不良的活動。描述性程式語言的設計 者必須企圖管理經由限制而達成之安全與程式語言能力之 間的平衡。 曼全伺服器環境3108 防護伺服器環境將依賴此實施的技術與架構。存在技 巧與安全模式以達到伺服器側電腦計算的不同方法。以下 包含一些不同技術的基本安全資訊。 網際網路防火牆 一個防火牆用以保護一受信任的網路免於受到不信任 的網路之害。通常關心的此兩網路是一組織的內部網路 (受信任的)與網際網路(不信任的)。一防火牆是—個 或一系統群,其加強兩網路間的存取控制政策。一防火牆 是兀件的集合或兩網路間的系統,並且具有下列性暂: •所有從內到外,或反向交通,一定要經過它。 經濟部智慧財產局員工消費合作社印製 •只有授權的交通,如由當地安全政策所界定者,被允 許通過它。 •系統本身免於滲透。 共用閘道介面(C 〇 m m ο n G a t e w a y I n t e r f a c a 1 a c e ? CGI ) —纖⑽職删酸.TW 149ActiveX security mode is quite different from Java Applet. ActiveX has no restrictions on what a control can do. Each ActiveX control can be digitally signed by the author, so that the signature cannot be changed or rejected. This digital signature can be used by a trusted certification authority such as Verisign to produce an equivalent of shink-wrapped software. If downloading a signed ActiveX control causes the machine to crash, the responsible party will be identified. This security model places the responsibility of the computer system on the user. Before the browser downloads an unsigned ActiveX control, or has been signed but certified by an unknown certification authority, the browser displays a dialog box to warn the user that his actions may be unsafe. The user can abandon the transmission, or can continue to risk transmission. Descriptive programming language The Internet descriptive programming language is a programming language embedded in HTML pages and can be interpreted by the user's browser (such as Netscape's Navigator or Microsoft Explorer). Usually they are dedicated to controlling user interaction with HTML files, such as when: ♦ handling mouse events • opening a new window ♦ checking the form ♦ interacting with other dynamic content 4HICKMAN200036TW; AND1P282.TW 148 This paper standard applies Chinese National Standards (CNS) A4 size (210 X 297 mm) (Please read the precautions on the back before filling this page) Pack 1 · I ϋ ϋ ϋ ^ 1 ^ aJ0 1 ϋ ϋ —.1 I nn I ^ Consumption of employees of the Intellectual Property Bureau of the Ministry of Economic Affairs Printed by the cooperative 491972 A7 B7 V. Description of the invention (half a second?) Since the scripts are code executed on the user's system from external sources, they cause security problems. Indeed, a user must be sure that a download script will not perform adverse activities on the system. Designers of descriptive programming languages must attempt to manage the balance between restricted security and programming language capabilities. MAN's full server environment 3108 The protected server environment will rely on the technology and architecture of this implementation. There are different methods of skill and security mode to achieve server-side computer calculations. The following contains basic safety information for different technologies. Internet firewall A firewall is used to protect a trusted network from untrusted networks. The two networks that are usually of interest are an organization's intranet (trusted) and the internet (untrusted). A firewall is a system or group of systems that enforces access control policies between two networks. A firewall is a collection of components or a system between two networks, and has the following characteristics: • All internal to external or reverse traffic must pass through it. Printed by the Consumer Property Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs • Only authorized traffic, as defined by local security policies, is allowed to pass through it. • The system itself is free from infiltration. Common gateway interface (C0 m m ο n G a t e w a y I n t e r f a c a 1 a c e? CGI) — Fiber Optic Deletion Acid. TW 149

經濟部智慧財產局員工消費合作社印製 491972 A7 B7__ 五、發明說明(1叨) 共用閘道介面腳本是使用一表格,處理提交到網路伺 服器資訊的方法。一共用閘道介面腳本可以任何語言寫 成,此語言能夠使用標準進出資訊流(通常Perl或C. Shell)。爲處理一表格,客戶端首先提交資料內容給伺 服器。在伺服器上,一共用閘道介面腳本讀出表格內容, 然後使用它去寫一新HTM網頁,其從伺服器被送回到客 戶端。共用閘道介面腳本的安全問題發生在客戶端與伺服 器雙方。 共用閘道介面客戶端側 提交一表格給共用閘道介面腳本,其放置在一伺服器 上,意味著此表格內容在網路上的寄送。如果所使用的管 道不安全,表格內容可輕易地被解讀或曲解 (perverted)。任何確保管道安全的方法,如SSL、 PCT或SHTTP ,皆能夠用以達成提交資料的機密性。由 於這些通訊協定必須被客戶端與伺服器雙方來實施,一使 用者必須檢查伺服器才能夠確保管道的安全。現今受歡迎 的瀏覽器,能夠警告使用者資訊是否正以不安全的方式提 交。 共用閘道介面伺服器側 在伺服器上使用伺服器資源如系統指令來處理一表 格,如系統指令,能導致安全漏洞。的確,表格可能充滿 不良內容,造成伺服器去執行機密資料遞送、伺服器當 4HICKMAN200036TW; AND1P282.TW 150 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) (請先閱讀背面之注咅心事項再填寫本頁)Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 491972 A7 B7__ V. Description of the Invention (1 叨) The shared gateway interface script is a method for processing information submitted to the web server using a form. A common gateway interface script can be written in any language that can use standard ingress and egress traffic (usually Perl or C. Shell). To process a form, the client first submits the content of the data to the server. On the server, a shared gateway interface script reads the contents of the form, and then uses it to write a new HTM web page, which is sent back from the server to the client. Security issues with the shared gateway interface script occur on both the client and the server. Client side of the shared gateway interface Submit a form to the shared gateway interface script, which is placed on a server, which means that the contents of this form are sent on the network. If the pipe used is not secure, the contents of the form can be easily interpreted or perverted. Any method to ensure the security of the pipeline, such as SSL, PCT or SHTTP, can be used to achieve the confidentiality of the submitted information. Because these protocols must be implemented by both the client and the server, a user must check the server to ensure the security of the pipeline. Popular browsers today can warn users if information is being submitted in an insecure manner. Shared Gateway Interface Server Side Using a server resource such as a system command to process a table on the server, such as a system command, can lead to a security breach. Indeed, the form may be full of bad content, causing the server to perform confidential data delivery. The server acts as 4HICKMAN200036TW; AND1P282.TW 150. This paper size applies to the Chinese National Standard (CNS) A4 specification (210 X 297 mm) (please read the back first) (Note the matter of concern, fill out this page)

491972 經濟部智慧財產局員工消費合作社印製 A7 B7__ 五、發明說明(151) 機,或未授權存取。 保護一伺服器免於透過共用閘道介面腳本之攻擊的唯 一方法,就是當撰寫、測試並使用共用閘道介面腳本時要 很小心。只要可以的話,共用閘道介面應避免執行系統指 令。各個提交的輸入項目(entry)在處理之前應被檢查 並分析。由於分析腳本來源是找出透過腳本有效攻擊的最 好方法,所以腳本來源一定要隱藏起來。在多使用者系統 上’裝置共用閘道介面的權利應該只給予管理者或直得信 賴的使用者。 共用物件請求仲介(Common Object Request Broker, CORBA) 共用物件請求仲介架構是一開放分配的物件電腦計算 基礎結構,其由物件管理群組標準化。共用物件請求仲介 規定分配物件(元件)所使用之介面、結構與政策以獨立 於語言、作業系統、機器或網路通訊。 共用物件請求仲介2 . 〇規格提出一組良好的安全政 策,提供認證、資料完整性、機密性與不可推翻性。此標 準將不依照ISO規格處理不可推翻政策的問題留給此應用 程式。此標準不完全解決不同的安全網域之可交互運作性 的問題。 分配元件物件模型(DCOM) 微軟元件物件模型提供一根據物件技術的模型,以處 4HICKMAN200036TW; AND1P282.TW 15] 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) ^ (請先閲讀背面之注意事項再填寫本頁)491972 Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs A7 B7__ V. Description of Invention (151) machine, or unauthorized access. The only way to protect a server from attacks through a shared gateway interface script is to be careful when writing, testing, and using a shared gateway interface script. Whenever possible, the shared gateway interface should avoid executing system commands. Each submitted entry should be checked and analyzed before processing. Since analyzing the script source is the best way to find effective attacks through the script, the script source must be hidden. On a multi-user system, the right to share the gateway interface of a device should only be given to managers or trusted users. Common Object Request Broker (CORBA) The Common Object Request Broker architecture is an open-distribution object computer computing infrastructure that is standardized by the object management group. Shared Object Request Mediation Specifies the interface, structure, and policies used to distribute objects (components) independently of language, operating system, machine, or network communications. The Common Object Request Intermediate 2.0 specification proposes a good set of security policies that provide authentication, data integrity, confidentiality, and irreversibility. This standard leaves this application with issues that do not deal with irreversible policies in accordance with ISO specifications. This standard does not completely address the issue of interoperability of different security domains. Distributing Component Object Model (DCOM) Microsoft Component Object Model provides a model based on the object technology, which is based on 4HICKMAN200036TW; AND1P282.TW 15] This paper size applies the Chinese National Standard (CNS) A4 specification (210 X 297 mm) ^ (Please (Read the notes on the back before filling out this page)

491972 A7 B7 五、發明說明(152) 理一區域電腦上的程序間通訊。微軟的分配元件物件模型 是元件物件模型(COM)的延伸,支援網路上的合作程序 的分配。 DCOM考量的的安全議題: •通訊安全;程序間通訊訊息被送到潛在不安全的網 路,如網際網路。 •系統管理考慮;使用一意識到DCOM的應用程式牽涉 到使用者在其他系統上管理程序的可能性。這在各系 統上千萬不可與使用者的權利相衝突。 遠端方法調用(Remote Method Invocation,RMI) 遠端方法調用允許一程式設計者去創造分配的Java 對Java應用程式。這允許遠方Java物件從其他Java虛擬 機器引動,甚至從不同主機。只有當它已經得到遠端物件 的參照時,一 Java物件才能呼叫一遠端物件。這可藉由 以下方法做到: •使用RMI提供的自我啓動命名服務(bootstrap naming service)尋找遠端物件。 •接受其參照,當做一論點或一回返價値(return value ) 〇 一客戶端可呼叫在一伺服器上的遠端物件,而其伺服 器也可當呼叫其他遠端物件時,作爲一客戶端。由於遠端 方法調用同時意味著外部程式碼的執行與在網路上的通 訊’遠端方法調用的展開需要一^安全的環境與安全的通 4HICKMAN200036TW; AND1P282.TW 152 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) (請先閱讀背面之注意事項再填寫本頁) 裝 —丨—訂----- 經濟部智慧財產局員工消費合作社印製 491972 A7 __________Β7___ 五、發明說明(153) 訊。. 遠端方法調用的規格不設定任何安全特徵供分配交 易。爲了確保位在不同網址時空之間資訊傳送的安全,需 要在規格中加入〜些安全特徵。 線上廣告產品- 在圖示於第33圖的樣品架構中,一潛在客戶3300將 存取一個公司的網站以取得一些銷售資訊。這只是一個 資訊來源’不能執行交易(交換價値)。網際網路使用者將 快覽到廣告網站’並點選各種在網頁內的連線以取得特定 產品的更多資訊。網路伺服器能從應用程式伺服器提出請 求以供應動態網頁給使用者。如果請求詳細產品資訊,此 應用程式伺服器能從資料庫引出資訊。網站管理人在開發 伺服器上開發內容,並在籌畫伺服器上測試它。 功能描述 1·客戶啓動一網路瀏覽器並前往零售店集合地的網站。 2. 用一密碼追蹤資料,零售商的應用程式伺服器3302能 識別此客戶並選擇一供應商以在首頁上顯示。此外,它能 量身定作供應商的互動產品目錄來強調客戶可能有興趣的 那些產品。 3. 客戶選擇物品並得到此物品的詳細描述,包括其價格 與最接近的商店位址或一電話號碼以在線上訂貨。491972 A7 B7 V. Description of the invention (152) Manage inter-program communication on a local computer. Microsoft's Component Object Model is an extension of the Component Object Model (COM) and supports the distribution of collaborative processes on the Internet. Security issues considered by DCOM: • Communication security; inter-process communication messages are sent to potentially unsafe networks, such as the Internet. • System management considerations; using a DCOM-aware application involves the possibility of the user managing the program on other systems. This must not conflict with the rights of users on all systems. Remote Method Invocation (RMI) Remote method invocation allows a programmer to create an allocated Java-to-Java application. This allows remote Java objects to be launched from other Java virtual machines, even from different hosts. A Java object can call a remote object only if it has already obtained a reference to the remote object. This can be done in the following ways: • Use the bootstrap naming service provided by RMI to find remote objects. • Accept its reference as an argument or a return value. A client can call a remote object on a server, and its server can also act as a client when calling other remote objects. . Because remote method calls mean both the execution of external code and the communication on the network, the deployment of remote method calls requires a secure environment and a secure communication. 4HICKMAN200036TW; AND1P282.TW 152 This paper standard applies Chinese national standards ( CNS) A4 specification (210 X 297 mm) (Please read the precautions on the back before filling out this page) Pack — 丨 —Order ----- Printed by the Consumer Consumption Cooperative of Intellectual Property Bureau of the Ministry of Economy 491972 A7 __________ Β7 ___ V. Invention Explanation (153). The specification of the remote method invocation does not set any security features for distribution transactions. In order to ensure the security of information transmission between different URLs in time and space, some security features need to be added to the specifications. Online Advertising Products-In the sample architecture shown in Figure 33, a potential customer 3300 will access a company's website for some sales information. This is just a source of information ’cannot execute a transaction (exchange price). Internet users will quickly browse to the ad site ’and click on various links within the webpage to get more information about a specific product. Web servers can make requests from application servers to serve dynamic web pages to users. If detailed product information is requested, this application server can pull information from the database. The webmaster develops content on a development server and tests it on a development server. Functional description 1. The customer launches a web browser and goes to the website where the retail store meets. 2. With a password tracking data, the retailer's application server 3302 can identify the customer and select a supplier to display on the homepage. In addition, it can be tailored as a supplier's interactive product catalog to highlight those products that customers may be interested in. 3. The customer selects the item and gets a detailed description of the item, including its price and the nearest store address or a phone number to order online.

4HICKMAN200036TW; AND1P282.TW 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) ----------- (請先閱讀背面之注意事項再填寫本頁) 裝 訂: 經濟部智慧財產局員工消費合作社印製 491972 A7 B7__ 五、發明說明(彳5斗) 安全商業優先事項 •防止網站被破壞 •確保網站隨時可供潛在客戶使用 •大眾認知到公司與網站提供適當與有效的安全 一示範的安全架構揭露於第34圖。此架構優於第33圖的 架構。 安全技術描述 •加密服務並未實施於此架構中,因爲在客戶端3400與 網站間無機密資訊寄送。 •在公司網路伺服器3402處提供認證服務,而一伺服器 側證明3404由一領導CA提供者所簽章。不認證客 戶。內部使用者(如管理者)以他們的NT網域登入來認 證。 經濟部智慧財產局員工消費合作社印製 ---------I I --I I (請先閱讀背面之注音W事項再填寫本頁)4HICKMAN200036TW; AND1P282.TW This paper size is applicable to Chinese National Standard (CNS) A4 (210 X 297 mm) ----------- (Please read the precautions on the back before filling this page) Binding: Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 491972 A7 B7__ V. Description of Invention (斗 5 斗) Safe business priorities • Prevent the website from being damaged • Ensure that the website is available to potential customers at any time Effective security-An exemplary security architecture is shown in Figure 34. This architecture is superior to the architecture in Figure 33. Security technology description • Encryption services are not implemented in this architecture because confidential information is sent between the client 3400 and the website. • Provide certification services at the corporate web server 3402, and a server-side certification 3404 is signed by a leading CA provider. Does not authenticate customers. Internal users (such as administrators) authenticate with their NT domain login. Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs --------- I I --I I (Please read the note on the back before filling this page)

•存取控制係由防火牆3406提供於進入公司內部網路的 入口點處。一封包過濾路由器(packet filter* router) 3408位於網路資源前以限制交通到只有 HTTP。此外,在架構(防火牆、網路、應用程式、資 料庫)中的所有敏感伺服器,具有用特定安全伺服器或 一外加套裝軟體強化實施的作業系統。 •即時提供審計服務所有重要服務上的侵入偵測模組 (Intrusion Detection Module,IDM)3410。提供 離線審計作業系統安全掃瞄工具以識別易受侵入性。 4HICKMAN200036TW; AND1P282.TW 154 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) '• Access control is provided by the firewall 3406 at the entry point into the company's intranet. A packet filter * router 3408 is located in front of network resources to restrict traffic to only HTTP. In addition, all sensitive servers in the architecture (firewall, network, application, database) have operating systems that are enhanced with specific security servers or an additional software package. • Intrusion detection module (IDM) 3410 on all important services of the audit service is provided in real time. Provides an offline auditing operating system security scanning tool to identify invasiveness. 4HICKMAN200036TW; AND1P282.TW 154 This paper size applies to China National Standard (CNS) A4 (210 X 297 mm) ''

經濟部智慧財產局員工消費合作社印製 、發明說明(彳这) 复施上的考量 •責任的分工是必要的,以確保適當的控制被執行與監 控。安全管理(加上/除去使用者,更新系統組態等等) 應由安全審計(登錄檢視、執行作業系統安全掃瞄等) 之外的不同人員加以執行。 •一安全政策是必要的,以提供那些財產應予防護以及 那些威脅最受關心的方向。 •安全標準是必要的,以確保在多個平台與應用程式之 一致的、安全的組態。 •管理程序應予開發與執行,其淸楚地畫淸管理者針對 使用者管理與系統/安全管理等,必須遵守的程序。在 要求執行時,各個程序應包含適當的指導原則,而時 間必須由管理者與他們的經理同意。 •應產生測試程序與指導原則供開發與維護應用程式碼 與架構組態。 .•應針對在架構中實現安全角色的個體,畫淸訓練程 式。使用者訓練資訊也應該以一種易讀、易實行的方 式開發與分配。應特別注意任何放棄權利 (disclaimer)與政策聲明的法律要求,其必須在存 取此網站時呈現給客戶。 合作(Collaboration ) 在示於第35圖的樣品架構中,一矽晶片設計者希望 有到一些他們的客戶3500的直接網路存取,以分享規 4HICKMAN200036TW; AND1P282.TW 155 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) -----------裝--------訂--------- (請先閱讀背面之注意事項再填寫本頁) 491972 經濟部智慧財產局員工消費合作社印製 A7 B7 五、發明說明(彳祕) 格、分配工程設計以及在進行中工作的合作。從總部 3502、地方辦公室3504以及一遠端地區3506來的公司 員工,能存取儲存於網路伺服器或後端資料庫伺服器上的 資訊。員工易有能力存取網路致能的模擬應用程式。客戶 也可張貼資訊在他們自己的網路伺服器或資料庫伺服器 上,以提供詳細的規格或資訊給晶片製造商° 安全商業優先事項 •保護在內部網路上之敏感資源免於未授權之外部存取 •保護客戶設計資訊免於駭客或競爭者的存取 •只允許客戶存取他們自己的資料,而不是其他人的 •確保設計資訊維持適當完整性 第36圖描述另一示範性安全架構,其優於第35圖的安全 架構。 安全技術描述 •提供在第36圖的安全架構中的加密服務,其具有虛擬 私人網路(Virtual Private Networking,VPN)。其 中央公司防火牆3 600有一伺服器VPN模組3602,而 所有遠端客戶位址也必須實施一 VPN模組在他們防火 牆3604上。遠端使用者3606將需要在他們的個人電腦 上安裝客戶端VPN軟體。遠端使用者也應執行一當地 加密應用程式,其將加密在他們的硬碟上敏感目錄的 內容。 4HICKMAN200036TW; AND1P282.TW 15^ 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) -----------t--------訂---------線 (請先閱讀背面之注意事項再填寫本頁) 491972 A7 __B7_ 五、發明說明(彳57) •在客戶位置處,提供具有數位證明的認證服務給使用 者。中央公司總部將維持一 CA(證明授權)以管理此證 明。此證明與一個LDAP伺服器整合以儲存目錄資 訊。一登記授權(Registration Authority)用於處 理證明要求。對於在客戶位置的使用者,認證發生在 公司網露伺服器上,並被網路伺服器存取控制軟體所 管理。因此遠端使用者將被發予聰明卡,在卡上將儲 存私鑰,各個遠端使用者將需要一聰明卡讀卡機在他 們的個人電腦上。 •防火牆在存取控制在公司總部網路與客戶位置的入口 點處提供存取控制。在公司總部,一第二防火牆位於 網路伺服器背後以進一步限制到內部網路敏感伺服器 的存取。一存取控制套裝軟體3608用以在網路伺服器 上限制到特定網頁、檔案、與目錄的存取。此外,所 有在公司總部(資料庫、檔案傳送程式(ftp)、應用 程式、防火牆、網路),具有用特定安全伺服器或一 外加套裝軟體強化實施的作業系統。 •運用在ftp伺服器的數位指紋技術提供完整性 (integrity)。當一使用者下載一檔案到他們的個人 電腦,其印有一數位指紋,此數位指紋唯一地識別了 下在檔案的時間與使用者。 •即時提供審計服務在所有重要服務上的侵入偵測模組 (IDM)。提供離線審計作業系統安全掃描工具以識別 易受攻擊處。 4HICKMAN200036TW; AND1P282.TW 157 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) (請先閱讀背面之注意事項再填寫本頁) ▼裝-------訂---------線j 經濟部智慧財產局員工消費合作社印製 491972 A7 B7 五、發明說明(1S8) 實施上的考量 •責任的分工是必要的,以確保適當的控制被執行與監 控。安全管理(加上/除去使用者,更新系統組態等等) 應由安全審計(登錄檢視、執行作業系統安全掃瞄等) 之外的不同人員加以執行。 •一安全政策是必要的,以提供那些財產應予防護以及 那些威脅最受關心的方向。 •安全標準是必要的,以確保在多個平台與應用程式之 一致的、安全的組態。 •管理程序應予開發與執行,其淸楚地畫淸管理者針對 使用者管理與系統/安全管理等,必須遵守的程序。在 要求執行時,各個程序應包含適當的指導原則,而時 間必須由管理者與他們的經理同意。 •應產生測試程序與指導原則供開發與維護應用程式碼 與架構組態。 •應針對在架構中實現安全角色的個體,畫淸訓練程 式。使用者訓練資訊也應該以一種易讀、易實行的方 式開發與分配。應特別注意任何放棄權利 (disclaimer)與政策聲明的法律要求,其必須在存 取此網站時呈現給客戶。 客戶服務 在圖示於第37圖中的樣品架構,一軟體供應商的客 4HICKMAN200036TW; AND1P2S2.TW 158 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) -----------•裝 (請先閱讀背面之注意事項再填寫本頁) I I I I ^ ·111---- 經濟部智慧財產局員工消費合作社印製 491972Printed by the Consumers' Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs, the invention statement (this) Considerations for re-application • The division of responsibilities is necessary to ensure that appropriate controls are implemented and monitored. Security management (add / remove users, update system configuration, etc.) should be performed by different people than security audits (login review, operating system security scan, etc.). • A security policy is necessary to provide the direction in which those properties should be protected and those threats are of most concern. • Security standards are necessary to ensure consistent and secure configuration across multiple platforms and applications. • Management procedures should be developed and implemented. They should clearly describe the procedures that managers must follow for user management and system / security management. When required, procedures should include appropriate guidelines and time must be agreed between managers and their managers. • Test procedures and guidelines should be generated for the development and maintenance of application code and architecture configuration. • Training procedures should be drawn for individuals who implement security roles in the architecture. User training information should also be developed and distributed in a way that is easy to read and implement. Particular attention should be paid to any legal requirements for disclaimers and policy statements, which must be presented to customers when accessing this site. Collaboration In the sample architecture shown in Figure 35, a silicon chip designer hopes to have direct network access to some of their customers 3500 to share the regulations 4HICKMAN200036TW; AND1P282.TW 155 This paper standard applies to China Standard (CNS) A4 specification (210 X 297 mm) ----------- install -------- order --------- (Please read the note on the back first Please fill in this page again for details) 491972 A7 B7 printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 5. The description of the invention (secret), the distribution engineering design, and the work in progress. Company employees from headquarters 3502, local offices 3504, and a remote area 3506 can access information stored on web servers or back-end database servers. Employees have easy access to network-enabled simulation applications. Customers can also post information on their own web server or database server to provide detailed specifications or information to the chip manufacturer ° Security business priorities • Protect sensitive resources on the intranet from unauthorized External access • Protect customer design information from hackers or competitors • Allow customers to access only their own data, not others' • Ensure that design information maintains proper integrity Figure 36 depicts another exemplary Security architecture, which is superior to the security architecture of Figure 35. Security Technology Description • Provides encryption services in the security architecture of Figure 36, which has a Virtual Private Networking (VPN). Its central company firewall 3 600 has a server VPN module 3602, and all remote client addresses must also implement a VPN module on their firewall 3604. Remote users 3606 will need to install client VPN software on their personal computers. Remote users should also run a local encryption application that will encrypt the contents of sensitive directories on their hard drives. 4HICKMAN200036TW; AND1P282.TW 15 ^ This paper size applies to China National Standard (CNS) A4 (210 X 297 mm) ----------- t -------- Order --- ------ line (please read the precautions on the back before filling this page) 491972 A7 __B7_ V. Description of Invention (彳 57) • At the customer's location, provide a certification service with a digital certificate to the user. Central company headquarters will maintain a CA (certificate authority) to manage this certification. This certificate is integrated with an LDAP server to store directory information. A Registration Authority is used to process certification requirements. For users at the customer's location, authentication occurs on the company's network exposure server and is managed by the web server's access control software. Therefore, remote users will be issued smart cards, and private keys will be stored on the cards. Each remote user will need a smart card reader on their personal computer. • Firewalls provide access control at the entry points of access control in the company's headquarters network and customer locations. At the company headquarters, a second firewall is located behind the web server to further restrict access to sensitive servers on the intranet. An access control software package 3608 is used to restrict access to specific web pages, files, and directories on a web server. In addition, all of the company's headquarters (databases, file transfer programs (ftp), applications, firewalls, networks) have operating systems that are enhanced with specific security servers or an additional software package. • Provides integrity using digital fingerprint technology on the ftp server. When a user downloads a file to their personal computer, it prints a digital fingerprint that uniquely identifies the time and user of the file being downloaded. • Intrusion detection module (IDM) that provides audit services on all important services in real time. Provides offline auditing operating system security scanning tools to identify vulnerable areas. 4HICKMAN200036TW; AND1P282.TW 157 This paper size is applicable to China National Standard (CNS) A4 (210 X 297 mm) (Please read the precautions on the back before filling this page) ▼ Install ------- Order-- ------- Line j Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 491972 A7 B7 V. Description of the invention (1S8) Implementation considerations • The division of responsibilities is necessary to ensure that appropriate controls are implemented and monitored . Security management (add / remove users, update system configuration, etc.) should be performed by different people than security audits (login review, operating system security scan, etc.). • A security policy is necessary to provide the direction in which those properties should be protected and those threats are of most concern. • Security standards are necessary to ensure consistent and secure configuration across multiple platforms and applications. • Management procedures should be developed and implemented. They should clearly describe the procedures that managers must follow for user management and system / security management. When required, procedures should include appropriate guidelines and time must be agreed between managers and their managers. • Test procedures and guidelines should be generated for the development and maintenance of application code and architecture configuration. • Training programs should be developed for individuals who implement security roles in the architecture. User training information should also be developed and distributed in a way that is easy to read and implement. Particular attention should be paid to any legal requirements for disclaimers and policy statements, which must be presented to customers when accessing this site. The customer service is shown in the sample structure shown in Figure 37. A software vendor's customer 4HICKMAN200036TW; AND1P2S2.TW 158 This paper size applies the Chinese National Standard (CNS) A4 specification (210 X 297 mm) ----- ------ • Equipment (Please read the precautions on the back before filling out this page) IIII ^ · 111 ---- Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 491972

五、發明說明(1Θ) 戶3 700能夠存取供應商的網站並企圖解決他們的技術問 題,而不直接造成供應商客戶支援人員的負擔。假如找不 到答案,客戶可送電子郵件至支援機構,而由一支援代表 來回應。這個架構可當作三種不同應用·· 1)一客戶的客 戶端應用程式,其產生一網路介面以使用個人化與產品特 定的線上協助資源,包括電子郵件、聊天室、新聞群組' 舆全文搜尋,2)—客戶支援代表應用程式,其可以用於 回應客戶使用者的透過電子郵件、交談、或新聞的請求’ 以及3) —管理應用程式,其使公司網路管理者輕易地改 變支援網站的模樣與感覺。 功能描述 1. 客戶啓動一網路瀏覽器,到公司的網站並點選客戶服 務。 2. 網頁具有一選單,包括線上技術支援、交談室以及升 級/修正(Patch )。 3. 線上技術支援包含寄送電子郵件給技術支援代表的能 力與得到電子郵件回應的能力,或存取一互動式問題與解 答資料庫3702。 4. 當使用者點選互動支援,他將被詢問一連串的問題以 找出癥結。 5·在此處的另一選擇是讓使用者輸入產品序號並且讓網 路伺服器根據使用者所有的產品以定製協助頁面。 6·如果使用者不滿於他收到的協助,還有一交談室與/ 4HICKMAN200036TW; AND1P282.TW 15〇 本紙張尺度適月中國國家標準(CNS)A4規格(210 X 297公釐) (請先閱讀背面之注意事項再填寫本頁) 裝---- 訂---------, 經濟部智慧財產局員工消費合作社印製 491972 A7 B7 五、發明說明(16ο) 或新聞群組,以跟在場客戶支援代表與其他客戶交談。 安全商業優先事項 •大眾認爲公司與網站提供適當與有效的安全 •保護到內部網路任何資料的存取,尤其是客戶相關資 訊 •保護他們網站的完整性並確保完整性不會被破壞。 一示範性安全架構圖示於第3 8圖中。此架構比第3 7 圖的架構提供更多安全性。 安全技術描述 •加密服務並未實施於此架構中,因爲在客戶3 8 〇 〇與網 站間無機密資訊寄送。 •在公司網站伺服器3 802處提供認證服務,而一伺服器 側證明由一領導CA提供者所簽章。不認證·客戶。內部 使用者(如管理者)以他們的NT網域登入來認證。 •存取控制係由防火牆3 8 0 4提供於進入公司內部網路的 入口點處。一封包過濾路由器(packet filter router ) 3 8 0 6位於網路資源之前以限制交通到只有 HTTP與NNTP 〇此外,在架構(防火牆、網路、應用 程式、資料庫〉中的所有敏感伺服器,具有用特定安全 伺服器或一外加套裝軟體強化實施的作業系統。 •即時提供審計服務所有重要服務上的侵入偵測模組 3 808。提供離線審計作業系統安全掃瞄工具以識別易 4HICKMAN200036TW; AND1P282.TW 160 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) (請先閱讀背面之注意事項再填寫本頁) · MM MM MB IBM MM I Μ» I # -^口 經濟部智慧財產局員工消費合作社印製 經濟部智慧財產局員工消費合作社印製 491972 A7 B7___ 五、發明說明(仏1) 受侵入性。 •於軟體中在交談伺服器與新聞伺服器處提供內容過 濾。此軟體將根據預定的規則基礎過濾已張貼的內 容,以阻止不當之內容素材。 實施上的考量 •責任的分工是必要的,以確保適當的控制被執行與監 控。安全管理(加上/除去使用者,更新系統組態等等) 應由安全審計(登錄檢視、執行作業系統安全掃瞄等) 之外的不同人員加以執行。 •一安全政策是必要的,以提供那些財產應予防護以及 那些威脅最受關心的方向。 •安全標準是必要的,以確保在多個平台與應用程式之 一致的、安全的組態。 •管理程序應予開發與執行,其淸楚地畫淸管理者針對 使用者管理與系統/安全管理等,必須遵守的程序。在 要求執行時,各個程序應包含適當的指導原則,而時 間必須由管理者與他們的經理同意。 •應產生測試程序與指導原則供開發與維護應用程式碼 與架構組態。 •應針對在架構中實現安全角色的個體,畫淸訓練程 式。使用者訓練資訊也應該以一種易讀、易實行的方 式開發與分配。應特別注意任何放棄權利 (disclaimer)與政策聲明的法律要求,其必須在存 4HICKMAN200036TW; AND1P282.TW 161 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) (請先閱讀背面之注意事項再填寫本頁)5. Description of the invention (1Θ) Users 3 700 can access the supplier's website and attempt to solve their technical problems without directly burdening the customer support staff of the supplier. If no answer is found, the customer can send an email to the support agency and a support representative will respond. This architecture can be used as three different applications. 1) A client's client application that generates a web interface to use personalized and product-specific online assistance resources, including email, chat rooms, newsgroups Full-text search, 2) —a customer support representative application that can be used to respond to customer users ’requests via email, chat, or news' and 3) —a management application that allows corporate network administrators to easily change Support the look and feel of the site. Function description 1. The customer launches a web browser, goes to the company's website and clicks on customer service. 2. The webpage has a menu including online technical support, chat rooms, and upgrades / patches. 3. Online technical support includes the ability to send an e-mail to a technical support representative and the ability to receive e-mail responses, or access to an interactive question and answer database 3702. 4. When the user clicks Interactive Support, he will be asked a series of questions to find the crux. 5. Another option here is to let the user enter the serial number of the product and let the web server customize the assistance page based on the product owned by the user. 6 · If the user is not satisfied with the assistance he received, there is also a chat room with / 4HICKMAN200036TW; AND1P282.TW 15〇 This paper is suitable for the Chinese National Standard (CNS) A4 specification (210 X 297 mm) (Please read first Note on the back, please fill in this page again) Packing ---- Order ---------, Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 491972 A7 B7 V. Invention Description (16ο) or news group, To speak with other customer support representatives. Safe business priorities • The public believes that companies and websites provide appropriate and effective security • Protects access to any data on the intranet, especially customer-related information • Protects the integrity of their websites and ensures that their integrity is not compromised. An exemplary security architecture is illustrated in Figure 38. This architecture provides more security than the architecture in Figure 37. Security technology description • Encryption services are not implemented in this architecture because confidential information is sent between the customer's 3800 and the website. • Provide certification services at company web server 3 802, with a server-side certificate signed by a leading CA provider. Not certified · Customer. Internal users (such as administrators) authenticate with their NT domain login. • Access control is provided by the firewall 3 804 at the entry point into the company's intranet. A packet filter router 3 8 0 6 is located in front of network resources to restrict traffic to only HTTP and NNTP. In addition, all sensitive servers in the architecture (firewall, network, application, database), Has an operating system that is enhanced with a specific security server or an additional software package. • Provides intrusion detection module 3 808 on all important services in real time. Provides offline scanning operating system security scanning tools to identify easy 4HICKMAN200036TW; .TW 160 This paper size applies to Chinese National Standard (CNS) A4 (210 X 297 mm) (Please read the notes on the back before filling this page) · MM MM MB IBM MM I Μ »I #-^ 口 经济Printed by the Consumer Cooperatives of the Ministry of Intellectual Property Bureau Printed by the Consumer Cooperatives of the Ministry of Economic Affairs of the Ministry of Economy 491972 A7 B7___ V. Invention Description (仏 1) Intrusive. • Provide content filtering in the software at the chat server and news server The software will filter the posted content based on a predetermined rule basis to prevent inappropriate content material. • Division of responsibilities is necessary to ensure that appropriate controls are implemented and monitored. Security management (add / remove users, update system configuration, etc.) should be audited by security (login review, operating system security scan, etc.) ) To be implemented by different people. • A security policy is necessary to provide the direction that those properties should be protected and those threats are of most concern. • Security standards are necessary to ensure that multiple platforms and applications Consistent and secure configuration. • The management program should be developed and executed, which should clearly describe the procedures that the administrator must follow for user management and system / security management, etc. When required, each program should include Appropriate guidelines, and time must be agreed by managers and their managers. • Test procedures and guidelines should be generated for the development and maintenance of application code and architecture configuration.淸 Training programs. User training information should also be developed and distributed in a way that is easy to read and implement. In order to comply with the legal requirements of any disclaimer and policy statement, it must be stored in 4HICKMAN200036TW; AND1P282.TW 161 This paper size applies to China National Standard (CNS) A4 (210 X 297 mm) (Please read the note on the back first (Fill in this page again)

經濟部智慧財產局員工消費合作社印製 491972 κι Β7 _ 五、發明說明(彳&) 取此網站時呈現給客戶。 網際網路家庭銀行 第39圖揭露一示範性架構。在此樣品架構中,提供 客戶端3900存取帳戶資訊、付款、訂購支票與在多個帳 戶間轉帳的能力。客戶將使用一個人電腦去撥接他們的 ISP3902並存取銀行的網站。客戶端個人電腦將裝備有 標準HTML瀏覽器軟體,而HTTP通訊能力供連結到在銀 行處的伺服器3904。使用SSLv3建立客戶端與伺服器間 一加密的對話期(session)。一旦連接建立,客戶可以 從銀行網站請求服務。此要求包括再次呼叫ASP或 HTML頁面,在TCP/IP上使用安全SSL3/PCT對話期。 請求一到達網路伺服器後,在主動伺服器頁面 (Active Server Pages)依照請求執行 VBScript 或 JScripts。這些腳本與0LE/C0M物件互動,0LE/C0M 物件常駐於應用程式伺服器上。這些物件執行應用程式服 務以處理使用者請求的資訊。此應用程式服務接著受交易 服務的控制,其控制在地方與遠端資料庫上的物件作業與 資料交易。對於請求的回答接著送回給客戶端,在此從 ASP轉換成HTML,或由ActiveX來處理。 功能描述 1. 客戶啓動一網路瀏覽器並到銀行的網站。 2. 加密伺服器產生一安全SSL對話期,並請求一登入名稱 4HICKMAN200036TW; AND1P282.TW 162 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) ------------裝·丨!!訂 i!丨丨 1 (請先閱讀背面之注意事項再填寫本頁) 經濟部智慧財產局員工消費合作社印製 491972 ΚΙ Β7_ 五、發明說明(ΐβ) 與密碼。 3. 傳送認證到應用程式伺服器並被驗證。 4. 主網頁提供使用者不同的選擇,如帳戶資訊、基金轉 帳、帳單付款、有價證券管理以及一貸款服務中心。 5. 客戶想要付帳單但先點選帳戶資訊以查明餘額。 6. 網路伺服器從應用程式伺服器請求帳戶資訊,應用程 式伺服器存取主機以取得資料庫。 7. 帳戶資訊包括餘額、最近存款與已付淸的支票,帳戶 資訊被回傳到網路伺服器並顯示於使用者的電腦上。 8. 使用者決定付帳單並點選帳單付款。 9. 使用者輸入受款人姓名,應用程式伺服器詢問向主機 以得到之前使用者寫給受款人的支票之受款人地址與 資訊。 10. 使用者輸入應付金額與日期。 1 1.資料轉送給應用程式伺服器並在指定日執行。 12. 金額從使用者的帳戶轉出,並透過銀行的淸賬中心以 受款人的銀行付淸。 13. 使用者登出而SSL對話期結束。 安全商業優先事項 •大眾認爲是公司與網站係爲安全的,而他們的錢是安 全的。 •保護到內部網路任何財務資訊的存取,尤其是帳戶與 客戶資訊。 4HICKMAN200036TW; AND1P282.TW 163 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) ' ϋ -ϋ 11 ϋ ^^1 tma§ ϋ·· 11 ϋ-i ϋ· I JtfNr 11 l ϋ ϋ ϋ Jl、 ϋ a·—· in I (請先閱讀背面之注意事項再填寫本頁) 經濟部智慧財產局員工消費合作社印製 491972 A7 B7 五、發明說明(彳64) •防止牽涉多個客戶帳戶的大筆財務損失。 第40圖描述另一示範性安全架構,其優於第39圖的架 構。 安全技術描述 •在客戶端4000與伺服器4002之間,使用128位元對話 鑰匙。此加密對話期係位於客戶端個人電腦與加密伺 服器4004之間。注意這需要客戶端具有支援SSLv3的 瀏覽器。 •提供認證服務數位證明。客戶將獲頒個人數位證明 4006,由銀行根鑰(root key)加簽。此加密伺服器 將具有由一領導PKI提供者加簽之伺服器側證明。證 明管理將外包,這樣一來銀行將在RA (登記授權)處 同意與拒絕證書要求,但證書的調用與管理服務將由 一 PKI服務供應商4 008所提供。 •防火牆4010在銀行網路入口處提供存取控制。一封包 過濾路由器被放置於防火牆伺服器之前,而一姐塞路 由器(choke router)放置於防火牆之後以在關鍵的 連結點處提供一些冗位(redundancy)。防火牆應執 行網路位址翻譯(NAT)以保護銀行內部網路的組態資 訊。在一應用程式伺服器外的資料庫上,維持限制客 戶到應用程式與主機存取的客戶簡介。給予使用者唯 一的ID與特權以存取應用程式與主機。此外,所有在 銀行的敏感伺服器(防火牆、加密、應用程式、網路) 4HICKMAN200036TW; AND1P282.TW 164 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) -----------裝--------訂---------線 (請先閱讀背面之注意事項再填寫本頁) 經濟部智慧財產局員工消費合作社印製 491972 A7 B7_ 五、發明說明(1沾) 具有用一特定安全伺服器或一外加套裝軟體實施的加 強作業系統。 •從客戶端個人電腦傳送到應用程式伺服器之交易訊息 的數位簽名提供完整性。 •即時提供審計服務以所有重要服務上的侵入偵測模 組。提供離線審計以作業系統安全掃瞄工具供識別易 受侵入性。此外,一單獨交易ID登記於架構的每一 點,以提供透過多個審計存底資料追蹤單獨交易的能 力。 實施上的考量 •責任的分工是必要的,以確保適當的控制被執行與監 控。安全管理(加上/除去使用者,更新系統組態等等) 應由安全審計(登錄檢視、執行作業系統安全掃瞄等) 之外的不同人員加以執行。 •一安全政策是必要的,以提供那些財產應予防護以及 那些威脅最受關心的方向。 •安全標準是必要的,以確保在多個平台與應用程式之 一致的、安全的組態。 •管理程序應予開發與執行,其淸楚地畫淸管理者針對 使用者管理與系統/安全管理等,必須遵守的程序。在 要求執行時,各個程序應包含適當的指導原則,而時 間必須由管理者與他們的經理同意。 •應產生測試程序與指導原則供開發與維護應用程式碼 4HICKMAN200036TW; AND1P282.TW 165 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) (請先閱讀背面之注意事項再填寫本頁)Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 491972 κι Β7 _ V. Description of Invention (彳 &) Present to customers when taking this website. Internet Home Banking Figure 39 illustrates an exemplary architecture. In this sample architecture, the client 3900 is provided with the ability to access account information, make payments, order checks, and transfer money between multiple accounts. Customers will use a personal computer to dial into their ISP3902 and access the bank's website. The client personal computer will be equipped with standard HTML browser software, and HTTP communication capabilities will be provided to connect to the server 3904 at the bank. Use SSLv3 to establish an encrypted session between the client and the server. Once the connection is established, customers can request services from the bank's website. This requirement includes calling ASP or HTML pages again, using a secure SSL3 / PCT session over TCP / IP. Once the request arrives at the web server, VBScript or JScripts are executed on the Active Server Pages as requested. These scripts interact with 0LE / C0M objects, which are resident on the application server. These objects perform application services to process the information requested by the user. This application service is then controlled by the transaction service, which controls object operations and data transactions on local and remote databases. The response to the request is then sent back to the client, where it is converted from ASP to HTML or processed by ActiveX. Functional description 1. The client launches a web browser and goes to the bank's website. 2. The encryption server generates a secure SSL session and requests a login name of 4HICKMAN200036TW; AND1P282.TW 162 This paper size is applicable to China National Standard (CNS) A4 specification (210 X 297 mm) -------- ---- Equipped · 丨! !! Order i! 丨 丨 1 (Please read the notes on the back before filling this page) Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 491972 ΚΙ Β7_ V. Description of Invention (ΐβ) and password. 3. Send credentials to the application server and be authenticated. 4. The main page provides users with different options, such as account information, fund transfer, bill payment, securities management, and a loan service center. 5. The customer wants to pay the bill but first clicks on the account information to find out the balance. 6. The web server requests account information from the application server, and the application server accesses the host to obtain the database. 7. The account information includes the balance, recent deposits and paid checks. The account information is returned to the web server and displayed on the user's computer. 8. The user decides to pay the bill and clicks on the bill payment. 9. The user enters the payee name, and the application server asks the host to obtain the payee address and information of the check that the user previously wrote to the payee. 10. The user enters the amount and date due. 1 1. Data is transferred to the application server and executed on the specified day. 12. The amount is transferred from the user's account and paid at the payee's bank through the bank's billing center. 13. The user logs out and the SSL session ends. Safe business priorities • The public considers companies and websites to be secure, and their money is secure. • Protect access to any financial information on the intranet, especially account and customer information. 4HICKMAN200036TW; AND1P282.TW 163 This paper size applies to China National Standard (CNS) A4 (210 X 297 mm) 'ϋ -ϋ 11 ϋ ^^ 1 tma§ ϋ ·· 11 ϋ-i ϋ · I JtfNr 11 l ϋ ϋ ϋ Jl, ϋ a · — · in I (Please read the notes on the back before filling out this page) Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 491972 A7 B7 V. Description of the invention (彳 64) • Prevent the involvement of multiple Large financial losses in customer accounts. Figure 40 depicts another exemplary security architecture that is superior to the architecture of Figure 39. Description of Security Technology • A 128-bit session key is used between Client 4000 and Server 4002. This encrypted session is located between the client personal computer and the encryption server 4004. Note that this requires the client to have a browser that supports SSLv3. • Provide digital certification of certification services. The customer will be issued a personal digital certificate 4006, signed by the bank root key. This encrypted server will have a server-side certificate signed by a leading PKI provider. Certificate management will be outsourced so that the bank will agree and reject certificate requirements at the RA (Registration Authorization), but certificate invocation and management services will be provided by a PKI service provider 4 008. • Firewall 4010 provides access control at the bank network entrance. A packet filtering router is placed in front of the firewall server, while a choke router is placed behind the firewall to provide some redundancy at key junctions. The firewall should perform network address translation (NAT) to protect the configuration information of the bank's internal network. Maintain a customer profile that restricts customer-to-application and host access to a database off an application server. Give users unique IDs and privileges to access applications and hosts. In addition, all sensitive servers (firewalls, encryption, applications, networks) in the bank 4HICKMAN200036TW; AND1P282.TW 164 This paper size applies the Chinese National Standard (CNS) A4 specification (210 X 297 mm) ----- ------ Equipment -------- Order --------- line (Please read the notes on the back before filling this page) A7 B7_ 5. Description of the invention (1) There is a strengthened operating system implemented with a specific security server or an additional software package. • Digital signatures of transaction messages sent from the client PC to the application server provide integrity. • Instantly provide audit services with intrusion detection modules on all important services. Provides offline audits for operating system security scanning tools to identify invasiveness. In addition, a separate transaction ID is registered at each point of the structure to provide the ability to track individual transactions through multiple audit trails. Implementation considerations • A division of responsibilities is necessary to ensure that appropriate controls are implemented and monitored. Security management (add / remove users, update system configuration, etc.) should be performed by different people than security audits (login review, operating system security scan, etc.). • A security policy is necessary to provide the direction in which those properties should be protected and those threats are of most concern. • Security standards are necessary to ensure consistent and secure configuration across multiple platforms and applications. • Management procedures should be developed and implemented. They should clearly describe the procedures that managers must follow for user management and system / security management. When required, procedures should include appropriate guidelines and time must be agreed between managers and their managers. • Test procedures and guidelines should be generated for the development and maintenance of application code 4HICKMAN200036TW; AND1P282.TW 165 This paper size applies to China National Standard (CNS) A4 (210 X 297 mm) (Please read the notes on the back before filling in (This page)

491972 A7 B7_ 五、發明說明(1½) 與架構組態。 (請先閱讀背面之注意事項再填寫本頁) •應針對在架構中實現安全角色的個體,畫淸訓練程 式。使用者訓練資訊也應該以一種易讀、易實行的方 式開發與分配。應特別注意任何放棄權利 (disclaimer)與政策聲明的法律要求,其必須在存 取此網站時呈現給客戶。 線上店面/產品銷售 在揭露於第41圖的樣品架構中,所有的訪客4100將 被提供到零售點的存取,銷售點存取各式貨物,其包含很 多供應商。使用者將依照他們特別的興趣與對應檔案,看 到不同的預設商店。客戶能在一囊包的格式中觀看所有產 品,在那裡只顯示有限的產品資訊。當選定一產品,可顯 示其描述、定價、動機與其他細節。客戶可以放置物品在 一採購籃中,並可以觀看與除去已在籃中的物品。與構買 所有在一籃子中的物品,必須提供使用者運送與收費地址 資訊、信用卡資訊與電子郵件地址。 經濟部智慧財產局員工消費合作社印製 在一個樣品交易中,客戶將撥號至他們的ISP並瀏覽 到購物中心網站。網路伺服器4 102將從使用者的網路瀏 覽器請求一密碼追蹤資料以決定他們是否已經使用過此服 務,以及他們是否擁有個人化檔案。如果使用者有一密碼 追蹤資料,網路伺服器將從應用程式伺服器4104請求個 人化檔案並將其顯示給使用者。接著使用者能瀏覽此網 站,選擇不同從每一個供應商頁面的不同物件,並且放置 4HICKMAN200036TW; AND1P282.TW 166 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) 491972 A7 B7_ 五、發明說明(1以) (請先閱讀背面之注意事項再填寫本頁) 那些物件於採購車上。採購車維持於應用程式伺服器中。 如果使用者決定採購車內的物品,他將點選現在就買按 鍵,並將被要求提供運送以及付款資訊。此資訊由網路伺 服器收集並且回傳到應用程式伺服器。應用程式伺服器接 著再替它選路到在照片底下的付款服務功能。付款服務將 確認信用卡的時效,傳回是或否的回應。一旦付款已獲同 意,每一個貨物被採購的供應商在付款檔案中會加入一筆 輸入。此付款檔案每小時被傳送到各個供應商以進行鄧單 處理。 功能描述 1. 客戶啓動一網路瀏覽器,並前往零售點網站。 2. 運用一密碼追蹤資料,零售商的應用程式伺服器能識 別此客戶並選擇一供應商以顯示在首頁上。此外,其 可以量身定作供應商的互動式產品目錄,以突顯那些 客戶感興趣的產品。 3 .客戶選擇物品,並得到物品的詳細描述,包含其價 格。 經濟部智慧財產局員工消費合作社印製 4. 當客戶喜歡一個物品,按鍵後物品就加入到虛擬採購 車。 5. 客戶點選核對,其將客戶轉送到一安全網路伺服器, 並詢問一密碼或對於地一次使用者來說產生一密碼。 6. 安全網路伺服器認證使用者,並顯示訂單與信用卡資 訊。 4HICKMAN200036TW; AND1P282.TW 167 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) 491972 A7 B7_ 五、發明說明(1½) 7. 客戶有機會修改訂單、信用卡或運送資訊,然後接受 訂單。 (請先閱讀背面之注意事項再填寫本頁) 8. 從網路伺服器傳送資訊從網路伺服器到應用伺服器, 其然後再替資訊選路到付款服務功能。 9. 當採購已獲准,網路伺服器寄送電子郵件給客戶以確 認訂單。 10. 應用伺服器現在替訂單/付款資訊選路到供應商的實 現系統以便出貨。 11. 當貨物已送出,另一電子郵件寄送給客戶。. 安全商業優先事項 •大眾認爲此公司與網站提供適當以及有效的安全。 •保護他們客戶的交易與檔案資料免於被竊取或解讀。 •防止欺詐的交易。 •提供及時的、機密的、訂單檔案給會員供應商。 一示範性的安全架構揭露在第42圖中。雖然功能相 似,這個架構優於第41圖的架構。 安全技術描述 經濟部智慧財產局員工消費合作社印製 •提供於客戶端42 00與在店面處的網路伺服器42 02之間 加密服務的SSLv3,其使用128位元對話鍵4204。注 意這要求客戶具有支援SSLv3的瀏覽器。爲了保全傳 送於店面與供應商之間的檔案,使用一工具箱以在應 用程式伺服器4206 (店面)與實現伺服器42 0 8 (供應 4HICKMAN200036TW; AND1P282.TW 168 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) 491972 經濟部智慧財產局員工消費合作社印製 A7 B7 五、發明說明(彳沾) 商).處處實施加密服務。 •在供應商與店面之間提供認證服務數位證明,與加密 服務一樣以相同的安全工具箱來實施。證明管理將被 店面以一領導的CA(證明授權)產品所執行。一 RA(登 記授權)用以處理證明要求。客戶將不會唯一地被認 證。店面網路伺服器將有由一領導CA的提供者所簽之 伺服器側證明,以提供客戶自己的認證。 •存取控制係由防火牆提供於進入店面網路的入口點 處。一封包過濾路由器(packet filter router)位於 網路資源之前,以限制交通到只有HTTP。此外,在店 面(防火牆、網路、應用程式、資料庫)中的所有敏感 伺服器,具有用特定安全伺服器或一外加套裝軟體強 化實施的作業系統。 •以實施在應用程式伺服器與實現伺服器上的簽名,在 供應商與店面之間的檔案傳輸上,提供完整性。 •即時提供審計服務在所有重要服務上的侵入偵測模組 (IDM)。提供離線審計一些作業系統安全掃描工具以 識別易受攻擊處。 •詐欺服務係由一不同的公司所提供,其專長於安全付 款技術。此店面將從客戶處收集訂單與付款資訊,並 且傳遞此資訊到付款/詐欺公司,以檢查此信用卡號 碼,看看有無詐欺企圖,然後允許且處理此筆交易。 在此應用程式伺服器與付款伺服器之間使用一加密工 具箱以保全兩網路間的交易。491972 A7 B7_ V. Description of the invention (1½) and architecture configuration. (Please read the notes on the back before filling out this page.) • Draw training programs for individuals who implement security roles in the architecture. User training information should also be developed and distributed in a way that is easy to read and implement. Particular attention should be paid to any legal requirements for disclaimers and policy statements, which must be presented to customers when accessing this site. Online Store / Product Sales In the sample architecture disclosed in Figure 41, all visitors 4100 will be provided to the retail point of sale, and the point of sale to access a variety of goods, including many suppliers. Users will see different default stores based on their special interests and corresponding files. Customers can view all products in one package format, where only limited product information is displayed. When a product is selected, its description, pricing, motivation, and other details can be displayed. Customers can place items in a shopping basket and view and remove items already in the basket. All items in a basket must provide user shipping and billing address information, credit card information, and email addresses. Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs In a sample transaction, customers will dial to their ISP and browse to the shopping mall website. The web server 4 102 will request a password tracking data from the user's web browser to determine whether they have used the service and whether they have a personalized profile. If the user has a password tracking data, the web server will request a personalization file from the application server 4104 and display it to the user. Then the user can browse this website, choose different objects from each supplier page, and place 4HICKMAN200036TW; AND1P282.TW 166 This paper size applies the Chinese National Standard (CNS) A4 specification (210 X 297 mm) 491972 A7 B7_ V. Description of the invention (1 to) (Please read the notes on the back before filling this page) Those items are on the purchase cart. The purchase cart is maintained in the application server. If the user decides to purchase the contents of the cart, he will click the buy now button and will be asked to provide shipping and payment information. This information is collected by the web server and passed back to the application server. The application server then routes it to the payment service function under the photo. The payment service will confirm the aging of the credit card and return a yes or no response. Once the payment has been agreed, each supplier who purchased the goods will add an entry to the payment file. This payment file is sent to each supplier for Deng single processing every hour. Functional Description 1. The customer launches a web browser and goes to the retail site. 2. Using a password tracking data, the retailer's application server can identify the customer and select a supplier to display on the homepage. In addition, it can be tailored as a supplier's interactive product catalog to highlight those customers are interested in. 3. The customer selects the item and gets a detailed description of the item, including its price. Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs 4. When the customer likes an item, the item is added to the virtual shopping cart after pressing the button. 5. The customer clicks the check, which forwards the customer to a secure web server and asks for a password or generates a password for the user at a time. 6. The secure web server authenticates the user and displays the order and credit card information. 4HICKMAN200036TW; AND1P282.TW 167 This paper size applies to Chinese National Standard (CNS) A4 (210 X 297 mm) 491972 A7 B7_ V. Description of the invention (1½) 7. The customer has the opportunity to modify the order, credit card or shipping information, and then accept Order. (Please read the notes on the back before filling out this page) 8. Send information from the web server from the web server to the application server, and then route the information to the payment service function. 9. When the purchase is approved, the web server sends an email to the customer to confirm the order. 10. The application server now routes the order / payment information to the vendor's implementation system for shipment. 11. When the goods have been delivered, another email is sent to the customer. Security Business Priorities • The public believes that this company and website provide appropriate and effective security. • Protect their clients' transactions and archives from theft or interpretation. • Prevent fraudulent transactions. • Provide timely, confidential, order files to member suppliers. An exemplary security architecture is disclosed in Figure 42. Although functionally similar, this architecture is superior to the architecture of Figure 41. Security technology description Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs • SSLv3, an encryption service provided between the client 42 00 and the web server 42 02 at the storefront, uses a 128-bit session key 4204. Note that this requires customers to have a browser that supports SSLv3. In order to preserve the files transmitted between the storefront and the supplier, a toolbox is used between the application server 4206 (storefront) and the implementation server 42 0 8 (supplied with 4HICKMAN200036TW; AND1P282.TW 168. This paper standard applies to Chinese national standards ( CNS) A4 specification (210 X 297 mm) 491972 A7 B7 printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs. 5. Description of Inventions (Small Business). Encryption services are implemented everywhere. • Provide digital certification of authentication services between supplier and storefront, implemented in the same secure toolbox as encrypted services. Certification management will be performed by the storefront with a leading CA (certificate authorization) product. An RA (Registration Authorization) is used to process certification requirements. Customers will not be uniquely certified. The storefront web server will have a server-side certificate signed by a leading CA provider to provide the customer's own certification. • Access control is provided by the firewall at the entry point into the store network. A packet filter router precedes network resources to restrict traffic to only HTTP. In addition, all sensitive servers in the storefront (firewall, network, application, database) have operating systems that are enhanced with specific security servers or an additional software package. • Provides integrity on file transfers between vendors and storefronts by implementing signatures on application servers and implementation servers. • Intrusion detection module (IDM) that provides audit services on all important services in real time. Provides offline auditing of some operating system security scanning tools to identify vulnerable areas. • Fraud services are provided by a different company that specializes in secure payment technology. The store will collect order and payment information from the customer and pass this information to the payment / fraud company to check the credit card number for fraud attempts and then allow and process the transaction. Use an encryption toolbox between this application server and the payment server to secure transactions between the two networks.

4HICKMAN200036TW; AND1P282.TW 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) -----------裝--------訂------1—線 Imr (請先閱讀背面之注意事項再填寫本頁) 經濟部智慧財產局員工消費合作社印製 491972 A7 B7_ 五、發明說明(彳7〇) 實施上的考量 •責任的分工是必要.的,以確保適當的控制被執行與監 控。安全管理(加上/除去使用者,更新系統組態等等) 應由安全審計(登錄檢視、執行作業系統安全掃瞄等) 之外的不同人員加以執行。 •一安全政策是必要的,以提供那些財產應予防護以及 那些威脅最受關心的方向。 •安全標準是必要的,以確保在多個平台與應用程式之 一致的、安全的組態。 •管理程序應予開發與執行,其淸楚地畫淸管理者針對 使用者管理與系統/安全管理等,必須遵守的程序。在 要求執行時,各個程序應包含適當的指導原則,而時 間必須由管理者與他們的經理同意。 •應產生測試程序與指導原則供開發與維護應用程式碼 與架構組態。 •應針對在架構中實現安全角色的個體,畫淸訓練程 式。使用者訓練資訊也應該以一種易讀、易實行的方 式開發與分配。應特別注意任何放棄權利 (disclaimer)與政策聲明的法律要求,其必須在存 取此網站時呈現給客戶。 決定支援1016 第43圖揭露方法43 00的流程圖,此方法供在一電子 4HICKMAN200036TW; AND1P282.TW 170 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) ------------裝--------訂---------線 (請先閱讀背面之注意事項再填寫本頁) 491972 A7 B7__ 五、發明說明(171) 商務環境中操控有關客戶的資料。在操作43 02中,提供 一電子商務應用程式’其允許產品或服務的購買。此電子 商務應用程式接收並分析(見操作4304與4306)有關一客 戶的資訊。這個資訊包括客戶所作的購買量’以及採購發 生的次數。此客戶相關資訊的分析儲存於操作4 3 0 8中’ 而一管理電子商務應用程式的決定支援服務係根據客戶相 關資訊分析,提供於操作4310中。 客戶相關資訊可以被分析以辨別此客戶進行採購的頻 數與數量。此決定支援服務可被設計去管理包括於電子商 務應用程式中的廣告。 一選擇是,此決定支援服務可被設計成管理包括於此 電子商務應用程式的推廣活動。一外加選擇是,此資訊可 能也包括客戶的人口統計資料。進一步而言,可能也提供 報告工具,以報告未實現的商品、銷售稅、售出貨物、拖 欠訂單物品、銷售預估、與電子商務應用程式的活動。 一最佳化的電子商務實施將允許電子商務相關資料的 整合被公司的決定支援系統所使用,示於第44圖。電子 商務應用程式與客戶花費習慣有關的大量資料以及其他的 客戶資訊。爲了要最完全地平衡此資訊,資訊系統應予整 合以允許適當使用者族群操控與評估此資料。 一電子商務解決方案的決定支援服務與任何其他的實 施一致。下列是一些在電子商務程式背景中特定的決定支 援服務。 4HICKMAN200036TW; AND1P282.TW 171 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) (請先閱讀背面之注 «14 意事項再话 ϋ ϋ ϋ I 1 ϋ 1 ·ϋ I I ϋ I *' 再填寫本頁) 經濟部智慧財產局員工消費合作社印製 經濟部智慧財產局員工消費合作社印製 491972 A7 _B7_ 五、發明說明(Π2) 客戶資料服務 服務可被設計以擷取、分析並儲存客戶行爲。所收集 的資訊會與描述在一複雜個人化中的一檔案服務相似。 市場資料服務 市場資料服務係被設計以分析客戶資料。此係用來準 確的瞄準促銷活動與廣告到適當的使用群。舉例來說,市 場行銷可能有興趣知道瀏覽電子商務網站之人的 人口統計資料,以更有效地銷售廣告。 網站報告 網站報告可加強網站的綜合效率。應備妥報告工具與 程序,以至少含蓋基礎網站需要。一些基礎的報告需要可 能包括交易報告、未實現的商品、銷售稅、賣出貨物、拖 欠訂單物品、銷售預估與網站活動。 整合1018 第45圖揭露電子商務應用程式結構的整合元件 1018,其係按照本發明一實施例。整合將是電子商務成 功與進步的重要因素。整合的大標題可以關連到許多層 面,當估計企業的總策略時,應該考慮各個層面。 第46圖揭露方法4600的流程圖,此方法供整合一電 子商務元件到現存的企業結構中。電子商務元件的基礎架 構,在操作4602與4604中被分析並與企業結構的架構做 4HICKMAN200036TW; AND1P282.TW 172 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) -----------裝--------訂---------線 (請先閱讀背面之注意事項再填寫本頁) 491972 經濟部智慧財產局員工消費合作社印製 A7 B7 五、發明說明(彳73) 比較。.針對此電子商務元件是否與企業的架構相容,在操 作4 6〇6中做出決定。在操作46〇8與461〇中,此電子商 務兀件與此企業結構的架構整合,並與此企業結構的能力 整合。在操作46 12中,針對電子商務元件是否需要額外 能力亦做出一決定。如果是這樣,此外加能力被加入當成 一企業能力。較好的是,企業結構的其他應用程式可利用 此外加能力。 可以提供定做的HTML標籤,供加強一電子商務元 件的表示。同時,也可以提供模版與/或精靈 (wizards)供產生電子商務應用程式與/或介面。較好 的是,執行電子商務元件與企業結構資料的整合。 理想上,一企業的電子商務策略應該整合到企業的經 營策略中。依此類推,電子商務系統也應整合到企業的架 構與系統中。在大多數情形中,電子商務實施是分立的實 體,急忙地加入到系統中,而欠缺與企業整合的考量。因 此,很多整合修正必須實施以與企業將資料(如訂單,客 戶或產品)同步化。更甚者,這將在企業策略與電子商務 演進時,造成額外的維護。如果電子商務策略需要立即產 生’也應該同時努力了解電子商務系統應如何整合到企業 整體策略。 理想上,電子商務策略應被實施成企業系統,而與現 存企業架構、能力與資料整合。如果電子商務系統需要額 外的能力,這些應予評估並可能地加入作爲企業能力。舉 例來說,如果企業不支持複雜的個人化,這些能力應引進 4HICKMAN200036TW; AND1P282.TW m 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) ----------—Aw- ^--------訂--------- (請先閱讀背面之注意事項再填寫本頁) 經濟部智慧財產局員工消費合作社印製 491972 A7 _B7_ 五、發明說明(彳钭) 作爲企業能力,而不只是電子商務能力。其他的企業應用 程式能在將來利用這些能力。 外部企業整合 很多情況中,電子商務實施將跨於多個企業。實施一 買方中心或交易伙伴類型的解決方案將涉及多個企業。在 這些情形中,整合層面時常將成爲實施能成功的主要因 素。有些多企業系統的主要阻礙是: •資料模式相容性 •技術基礎結構 •訊息格式 •採用阻礙;新貿易伙伴的增加應該是一快而簡單的程 序 •合作環境促進互動 實施上的考量 一電子商務系統可一次加入作爲一套裝程式或一元 件。這裡有些關於套裝整合的主要考量。 基礎架構 此套裝的基礎架構應予分析並與企業的系統作比較。 資料模式 此套裝引進一專用的資料模式嗎? 4HICKMAN200036TW; AND1P282.TW 174 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) ------------裝--------訂---------線 (請先閱讀背面之注意事項再填寫本頁) «· 491972 經濟部智慧財產局員工消費合作社印製 A7 B7___ 五、發明說明(竹5) 商業能力 商業能力能提供多少?舉例來說,在行銷與交易處理 中,所提供的商業能力與所期望者的差距有多大?它有否 提供開放的APIs? 元件整合 此商業套裝本身可能需要整合元件,如付款系統,稅 賦軟體或其他元件。在可以整合什麼選擇上的硏究可能很 重要。有些套裝可能不與任何其他元件相容,而需要使用 他們專用的元件。 定做的HTML標籤 有些套裝將提供定做的HTML標籤,以加強表示。 這些標籤的利用導致較不開放與更專屬的系統。必須要了 解使用這些標籤的會有的影響(他們將與所有瀏覽器一同 使用嗎?在未來的版本中,這些將如何改變?) 模版與精靈(Wizard) 很多電子商務套裝提供模版與精靈以產生一些基本的 電子商務應用程式與介面。模版與精靈藉由提供此基礎而 減少一些開發時間。他們只應被認爲是開發強韌電子商務 應用程式的起點。在大多數情形中,產生到實施之特定需 要的介面將需要可觀的額外定製。 雖然各種具體實施已如上所述,吾人應該了解它們只 4HICKMAN200036TW; AND1P282.TW 175 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐)~' -----------裝--------訂--------- (請先閱讀背面之注意事項再填寫本頁) 491972 A7 _B7_ 五、發明說明(1%) (請先閲讀背面之注意事項再填寫本頁) 不過是舉例說明而已,而不是限制。因此,較佳實施利的 幅度與範圍不應該被任何上述示範性實施例所限制,但應 該只依照以下申請專利範圍與其均等變化所界定。 經濟部智慧財產局員工消費合作社印製 4HICKMAN200036TW; AND1P282.TW 176 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐)4HICKMAN200036TW; AND1P282.TW This paper size is applicable to China National Standard (CNS) A4 (210 X 297 mm) ----------- installation -------- order ----- -1—Line Imr (Please read the notes on the back before filling out this page) Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 491972 A7 B7_ V. Description of Invention (彳 70) Implementation considerations • Division of responsibilities is necessary To ensure proper controls are implemented and monitored. Security management (add / remove users, update system configuration, etc.) should be performed by different people than security audits (login review, operating system security scan, etc.). • A security policy is necessary to provide the direction in which those properties should be protected and those threats are of most concern. • Security standards are necessary to ensure consistent and secure configuration across multiple platforms and applications. • Management procedures should be developed and implemented. They should clearly describe the procedures that managers must follow for user management and system / security management. When required, procedures should include appropriate guidelines and time must be agreed between managers and their managers. • Test procedures and guidelines should be generated for the development and maintenance of application code and architecture configuration. • Training programs should be developed for individuals who implement security roles in the architecture. User training information should also be developed and distributed in a way that is easy to read and implement. Particular attention should be paid to any legal requirements for disclaimers and policy statements, which must be presented to customers when accessing this site. It was decided to support the flow chart of the method 43 00 disclosed in Figure 43 of Figure 1016. This method is provided for an electronic 4HICKMAN200036TW; AND1P282.TW 170 This paper size applies the Chinese National Standard (CNS) A4 specification (210 X 297 mm) ----- ------- install -------- order --------- line (please read the precautions on the back before filling this page) 491972 A7 B7__ V. Description of the invention (171) Manipulating information about customers in a business environment. In operation 43 02, an e-commerce application 'is provided which allows the purchase of a product or service. This e-commerce application receives and analyzes (see operations 4304 and 4306) information about a customer. This information includes the number of purchases made by the customer ’and the number of purchases. The analysis of this customer-related information is stored in operation 4 308 'and a decision support service for managing an e-commerce application is provided in operation 4310 based on customer-related information analysis. Customer related information can be analyzed to identify the frequency and quantity of purchases made by this customer. This decision support service can be designed to manage advertisements included in e-commerce applications. As an option, this decision support service can be designed to manage promotion activities included in this e-commerce application. As an option, this information may also include customer demographics. Further, reporting tools may be provided to report activity on unrealized goods, sales taxes, goods sold, backordered items, sales estimates, and e-commerce applications. An optimized e-commerce implementation will allow integration of e-commerce related information to be used by the company's decision support system, as shown in Figure 44. E-commerce applications have a wealth of information about customer spending habits and other customer information. To best balance this information, information systems should be integrated to allow the appropriate user population to manipulate and evaluate this information. Decision support services for an e-commerce solution are consistent with any other implementation. The following are some decision support services specific to the context of e-commerce programs. 4HICKMAN200036TW; AND1P282.TW 171 This paper size is applicable to China National Standard (CNS) A4 (210 X 297 mm) (Please read the note on the back «14 Notice before you talk ϋ ϋ ϋ I 1 ϋ 1 · ϋ II ϋ I * 'Please fill out this page again) Printed by the Employees' Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs Printed by the Employees' Cooperatives of the Intellectual Property Bureau of the Ministry of Economics 491972 A7 _B7_ V. Description of the Invention (Π2) Customer data service can be designed to capture, analyze and Store customer behavior. The information collected will be similar to a file service described in a complex personalization. Market Information Service Market Information Service is designed to analyze customer information. This system is used to accurately target promotions and advertisements to the appropriate user groups. For example, marketing may be interested in knowing the demographics of people who visit e-commerce sites to sell advertising more effectively. Website reports Website reports enhance the overall efficiency of your website. Reporting tools and procedures should be in place to cover at least the basic website needs. Some basic reporting needs may include transaction reports, unrealized goods, sales taxes, goods sold, backorder items, sales estimates, and website activity. Integration 1018 FIG. 45 discloses an integration element 1018 of an e-commerce application program structure, which is an embodiment according to the present invention. Integration will be an important factor in the success and progress of e-commerce. The integrated headline can be linked to many levels, and each level should be considered when estimating the overall strategy of the business. Figure 46 discloses a flowchart of a method 4600 for integrating an e-commerce component into an existing enterprise structure. The basic structure of the e-commerce components is analyzed in operations 4602 and 4604 and is done with the structure of the enterprise structure. 4HICKMAN200036TW; AND1P282.TW 172 This paper size applies the Chinese National Standard (CNS) A4 specification (210 X 297 mm) --- -------- Installation -------- Order --------- line (please read the notes on the back before filling this page) Printing A7 B7 V. Description of Invention (彳 73) Comparison. A decision is made in Operation 4606 on whether this e-commerce component is compatible with the enterprise's architecture. In operations 4608 and 4610, this electronic business component is integrated with the structure of this enterprise structure, and is integrated with the capabilities of this enterprise structure. In operation 46 12, a decision is also made as to whether additional capabilities are needed for the e-commerce component. If so, the additional capacity is added as an enterprise capacity. Better yet, other applications in the corporate structure can take advantage of this additional power. Custom HTML tags can be provided to enhance the presentation of an e-commerce element. At the same time, templates and / or wizards can also be provided for generating e-commerce applications and / or interfaces. It is better to perform integration of e-commerce components with corporate structure data. Ideally, an enterprise's e-commerce strategy should be integrated into its business strategy. By analogy, the e-commerce system should also be integrated into the enterprise's architecture and systems. In most cases, e-commerce implementation is a separate entity and hastily added to the system without consideration of integration with the enterprise. As a result, many consolidation amendments must be implemented to synchronize data (such as orders, customers, or products) with the enterprise. What's more, this will cause additional maintenance as business strategy and e-commerce evolve. If e-commerce strategies need to be generated immediately, one should also strive to understand how e-commerce systems should be integrated into the overall corporate strategy. Ideally, e-commerce strategies should be implemented as enterprise systems and integrated with existing enterprise architecture, capabilities, and data. If e-commerce systems require additional capabilities, these should be assessed and possibly added as business capabilities. For example, if the company does not support complex personalization, these capabilities should be introduced 4HICKMAN200036TW; AND1P282.TW m This paper size applies the Chinese National Standard (CNS) A4 specification (210 X 297 mm) -------- --- Aw- ^ -------- Order --------- (Please read the notes on the back before filling out this page) Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 491972 A7 _B7_ V. Description of Invention (i) As an enterprise capability, not just an e-commerce capability. Other enterprise applications can take advantage of these capabilities in the future. External enterprise integration In many cases, e-commerce implementations will span multiple enterprises. Implementing a buyer center or trading partner type solution will involve multiple businesses. In these cases, the integration level will often be the main factor for successful implementation. The main obstacles to some multi-enterprise systems are: • data model compatibility • technical infrastructure • message formats • adoption obstacles; the addition of new trading partners should be a quick and simple process Business systems can be added as a package or a component at a time. Here are some of the main considerations for package integration. Infrastructure The infrastructure of this package should be analyzed and compared with the enterprise's systems. Data Mode Does this package introduce a dedicated data mode? 4HICKMAN200036TW; AND1P282.TW 174 This paper size is applicable to China National Standard (CNS) A4 (210 X 297 mm) ------------ Installation -------- Order --- ------ line (Please read the notes on the back before filling this page) «· 491972 Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs A7 B7___ V. Invention Description (Bamboo 5) How much can the business ability provide? ? For example, how big is the gap between the commercial capabilities offered and those expected in marketing and transaction processing? Does it provide open APIs? Component integration The business package itself may need to integrate components such as payment systems, tax software or other components. Research on what options can be integrated can be important. Some packages may not be compatible with any other components and require their own components. Custom HTML tags Some packages will provide custom HTML tags to enhance presentation. The use of these tags results in less open and more proprietary systems. It is important to understand the impact of using these tags (will they work with all browsers? How will these change in future versions?) Templates and Wizards Many e-commerce packages provide templates and wizards to generate Some basic e-commerce applications and interfaces. Templates and sprites reduce some development time by providing this foundation. They should only be considered as a starting point for developing robust e-commerce applications. In most cases, interfaces that generate specific needs for implementation will require considerable additional customization. Although the various specific implementations have been described above, I should understand that they are only 4HICKMAN200036TW; AND1P282.TW 175 This paper size is applicable to the Chinese National Standard (CNS) A4 specification (210 X 297 mm) ~ '--------- --Install -------- Order --------- (Please read the precautions on the back before filling this page) 491972 A7 _B7_ V. Description of the invention (1%) (Please read the back first Please fill in this page beforehand) It is just an example, not a limitation. Therefore, the scope and scope of the preferred implementation benefits should not be limited by any of the above-mentioned exemplary embodiments, but should be defined only in accordance with the scope of the following patent applications and their equivalent changes. Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 4HICKMAN200036TW; AND1P282.TW 176 This paper size applies to China National Standard (CNS) A4 (210 X 297 mm)

Claims (1)

491972 A8 B8 C8 D8六、申請專利範圍 經濟部智慧財是局員工消費合作社印製 1. 一種在網路上建議產品的方法,包含下列步驟: (a) 展示一產品的資訊,包含至少一個產品規格、 圖樣、視訊影像、數位樣品、與存貨可利用性; (b) 提供一個搜尋機制以便在一網路上搜尋與該產品相 似的物品; (c) 建議相似該產品之物品;以及 (d) 允許在網路上購物時選擇該產品與與相似該產品相 似之項。 2. 如申請專利範圍第1項所述之方法,更包含提供該產 品之可下載樣品的步驟。 3. 如申請專利範圍第1項所述之方法,更包含一步驟, 該步驟允許使用者產生之該產品的定製。 4. 如申請專利範圍第1項所述之方法,更包含一步驟, 該步驟至少評估該產品與相似該產品之物品的相容性 以及均等性其中之一。 5. 如申請專利範圍第1項所述之方法,更包含一步驟, 該步驟根據至少一客戶簡介,一客戶類型及一地理位 置,產生該產品或相似該產品之物品的價格。 6. 如申請專利範圍第1項所述之方法,更包含一步驟, 該步驟根據至少一客戶簡介,一客戶類型及一地理位 置,爲一客戶產生該產品或相似該產品之物品的一個 或更多個特惠供應以及特賣。 7. —種具體實施在一電腦可讀媒體上的電腦程式,供在 4HICKMAN200036TW; AND1P282.TW 177 (請先閲讀背面之注意事項再填寫本頁) 、1T -線· 木紙張尺度適用中國國家標準(CNS ) Α4規格(210Χ 297公釐) 491972 A8 B8 C8 D8 經濟部智葸財4局3工消費合作社印繁 六、申請專利範圍 網路上建議產品,包含: (a) 一程式碼片段,展示包含至少一產品規格、圖 樣、視訊視訊影像、數位樣品、以及存貨可利用性之 一產品的資訊; (b) 一程式碼片段,提供一搜尋機制以便在網上搜 尋相似該產品之物品; (c) 一程式碼片段,提供相似該產品之物品;以及 (d) 一程式碼片段,允許在網路上採購時選擇該產 品與相似該產品之物品。 8. 如申請專利範圍第7項所述之電腦程式,更包含提供 該產品之一可下載樣品的一程式碼片段。 9. 如申請專利範圍第7項所述之電腦程式,更包含一程 式碼片段,該程式碼片段允許使用者產生之該產品的 定製。 10. 如申請專利範圍第7項所述之電腦程式,更包含一程 式碼片段,至少評估該產品與相似該產品之物品的相 容性以及均等性其中之一。 11. 如申請專利範圍第7項所述之電腦程式,更包含一程 式碼片段,該程式碼片段根據至少一客戶簡介,一客 戶類型及一地理位置,產生該產品或相似該產品之物 品的價格。 12. 如申請專利範圍第7項所述之電腦程式,更包含一程 式碼片段,該程式碼片段根據至少一客戶簡介,一客 戶類型及一地理位置,爲一客戶產生該產品或相似該 4HICKMAN200036TW; AND1P282.TW 178 (請先閲讀背面之注意事項再填寫本頁) 本紙張尺度適用中國國家標準(CNS ) A4規格(210X297公釐) 491972 經濟部智&財4局8工消費合作社印製 A8 B8 C8 D8六、申請專利範圍 產品之物品的一個或更多個特惠供應以及特賣。 13. —種在網路上建議產品的系統,包含: (a) 邏輯,展示包含至少一產品規格、圖樣、視訊 視訊影像、數位樣品、以及存貨可利用性之一產品的 資訊; (b) 提供一搜尋機制以便在網上搜尋相似該產品之 物品; (c) 提供相似該產品之物品;以及 (d) 允許在網路上採購時選擇該產品與相似該產品 之物品。 14. 如申請專利範圍第13項所述之系統,更包含該產品 之一可下載樣品的邏輯。 15. 如申請專利範圍第13項所述之系統,更包含邏輯, 該邏輯允許使用者產生之該產品的定製。 16. 如申請專利範圍第13項所述之系統,更包含邏輯, 該邏輯至少評估該產品與相似該產品之物品的相容性 以及均等性其中之一。 17. 如申請專利範圍第13項所述之系統,更包含邏輯, 該邏輯根據至少一客戶簡介,一客戶類型及一地理位 置,產生該產品或相似該產品之物品的價格。 18. 如申請專利範圍第13項所述之系統,更包含邏輯,該 邏輯根據至少一客戶簡介,一客戶類型及一地理位 置,爲一客戶產生該產品或相似該產品之物品的一個 或更多個特惠供應以及特賣。 4HICKMAN200036TW; AND1P282.TW 179 本紙張尺度適用中國國家標準(CNS ) A4規格(210X297公釐) (請先閱讀背面之注意事項再填寫本頁) ’1T.491972 A8 B8 C8 D8 VI. Patent Application Scope Wisdom of the Ministry of Economy is printed by the Bureau's Consumer Cooperatives 1. A method of recommending products on the Internet, including the following steps: (a) Displaying information about a product, including at least one product specification , Drawings, video images, digital samples, and inventory availability; (b) provide a search mechanism to search for items similar to the product on the Internet; (c) suggest items similar to the product; and (d) allow Select items similar to similar products when shopping online. 2. The method described in item 1 of the patent application scope further includes the step of providing a downloadable sample of the product. 3. The method described in item 1 of the scope of patent application, further comprising a step that allows the user to generate customization of the product. 4. The method described in item 1 of the scope of patent application, further comprising a step of assessing at least one of compatibility and equality of the product with items similar to the product. 5. The method described in item 1 of the scope of patent application, further comprising a step of generating the price of the product or an item similar to the product based on at least one customer profile, a customer type, and a geographical location. 6. The method described in item 1 of the scope of patent application, further comprising a step of generating one or more of the product or an item similar to the product for a customer based on at least one customer profile, a customer type, and a geographic location. More special offers and special offers. 7. — A computer program specifically implemented on a computer-readable medium for use in 4HICKMAN200036TW; AND1P282.TW 177 (please read the precautions on the back before filling this page), 1T-line · wood paper scale applicable to Chinese national standards (CNS) Α4 specification (210 × 297 mm) 491972 A8 B8 C8 D8 Ministry of Economic Affairs 4th Bureau of Intellectual Property and Finance, 3th Industrial Consumer Cooperative, India Fanfan 6. Patent application Internet recommended products, including: (a) a code snippet to display Contains information on at least one product specification, drawing, video image, digital sample, and one of the products available in inventory; (b) a code snippet that provides a search mechanism to search online for items similar to the product; ( c) a code snippet that provides items similar to the product; and (d) a code snippet that allows selection of the product and items similar to the product when purchasing on the Internet. 8. The computer program described in item 7 of the scope of patent application further includes a code snippet that provides a downloadable sample of one of the products. 9. The computer program described in item 7 of the scope of patent application, further includes a program code segment, which allows the user to customize the product. 10. The computer program described in item 7 of the scope of patent application, further includes a program code snippet that evaluates at least one of the compatibility and equality of the product with items similar to the product. 11. The computer program described in item 7 of the scope of patent application further includes a code snippet that generates the product or an item similar to the product based on at least one customer profile, a customer type, and a geographic location. price. 12. The computer program described in item 7 of the patent application scope further includes a code snippet that generates the product for a client or similar to the 4HICKMAN200036TW based on at least one client profile, a client type, and a geographic location. AND1P282.TW 178 (Please read the notes on the back before filling out this page) This paper size is applicable to China National Standard (CNS) A4 specification (210X297 mm) 491972 Printed by the Ministry of Economic Affairs & Finance 4 Bureau 8 Workers Consumer Cooperative A8 B8 C8 D8 VI. One or more preferential supplies and special sales of the items in the patent application products. 13. —A system for recommending products on the Internet, including: (a) logic to display information including at least one product specification, drawing, video image, digital sample, and one of the products available in inventory; (b) provide A search mechanism to search online for items similar to the product; (c) provide items similar to the product; and (d) allow selection of the product and items similar to the product when purchasing on the Internet. 14. The system described in item 13 of the scope of patent application, further includes logic for downloading a sample of one of the products. 15. The system described in item 13 of the scope of patent application further includes logic that allows the user to generate customization of the product. 16. The system described in item 13 of the scope of patent application further includes logic that evaluates at least one of compatibility and equality of the product with items similar to the product. 17. The system described in item 13 of the scope of patent application further includes logic that generates the price of the product or an item similar to the product based on at least one customer profile, a customer type, and a geographic location. 18. The system described in item 13 of the patent application scope further includes logic that generates one or more of the product or an item similar to the product for a customer based on at least one customer profile, a customer type, and a geographical location Multiple special offers and special offers. 4HICKMAN200036TW; AND1P282.TW 179 This paper size is applicable to China National Standard (CNS) A4 (210X297 mm) (Please read the precautions on the back before filling this page) ’1T.
TW89117695A 1999-08-31 2001-02-14 System, method, and article of manufacture for electronic merchandising in an e-commerce application framework TW491972B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US38718999A 1999-08-31 1999-08-31

Publications (1)

Publication Number Publication Date
TW491972B true TW491972B (en) 2002-06-21

Family

ID=23528858

Family Applications (1)

Application Number Title Priority Date Filing Date
TW89117695A TW491972B (en) 1999-08-31 2001-02-14 System, method, and article of manufacture for electronic merchandising in an e-commerce application framework

Country Status (4)

Country Link
EP (1) EP1222587A2 (en)
AU (1) AU7111100A (en)
TW (1) TW491972B (en)
WO (1) WO2001016848A2 (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI416510B (en) * 2006-01-09 2013-11-21 Lg Electronics Inc Recording medium, apparatus for reproducing data and method thereof
TWI588764B (en) * 2007-11-30 2017-06-21 微軟技術授權有限責任公司 Computer-storage media ,method,and computerized system for feature-value attachment, re-ranking, and filtering of advertisements
TWI610258B (en) * 2015-12-11 2018-01-01 林國龍 Method, computer program product, computer readable recording medium and system for article selection based on user preferences
TWI614709B (en) * 2014-06-06 2018-02-11 Rakuten Inc Information system and information processing method
TWI651947B (en) * 2017-08-03 2019-02-21 中華電信股份有限公司 Programmable Template Monitoring Method for Equipment and Service Monitoring
TWI662809B (en) * 2017-08-08 2019-06-11 中華電信股份有限公司 Obstacle location system and maintenance method for image streaming service
TWI710992B (en) * 2018-12-27 2020-11-21 日商樂天股份有限公司 Information processing device, information processing system, and information processing method
TWI713021B (en) * 2019-11-25 2020-12-11 中華電信股份有限公司 Electronic device and method for converting chinese address format
TWI768265B (en) * 2018-11-30 2022-06-21 高曼計量財務管理顧問股份有限公司 Intelligent investment assistance system and method thereof
TWI778597B (en) * 2021-04-23 2022-09-21 新加坡商鴻運科股份有限公司 Deployment method of remote desktop gateways, computer device, and storage medium

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7370006B2 (en) 1999-10-27 2008-05-06 Ebay, Inc. Method and apparatus for listing goods for sale
US7373317B1 (en) 1999-10-27 2008-05-13 Ebay, Inc. Method and apparatus for facilitating sales of goods by independent parties
US8533094B1 (en) 2000-01-26 2013-09-10 Ebay Inc. On-line auction sales leads
US8275673B1 (en) 2002-04-17 2012-09-25 Ebay Inc. Method and system to recommend further items to a user of a network-based transaction facility upon unsuccessful transacting with respect to an item
EP1732945B1 (en) 2004-04-08 2014-12-24 Sangamo BioSciences, Inc. Methods and compositions for modulating cardiac contractility
US8200687B2 (en) 2005-06-20 2012-06-12 Ebay Inc. System to generate related search queries

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI416510B (en) * 2006-01-09 2013-11-21 Lg Electronics Inc Recording medium, apparatus for reproducing data and method thereof
TWI588764B (en) * 2007-11-30 2017-06-21 微軟技術授權有限責任公司 Computer-storage media ,method,and computerized system for feature-value attachment, re-ranking, and filtering of advertisements
US10346854B2 (en) 2007-11-30 2019-07-09 Microsoft Technology Licensing, Llc Feature-value attachment, reranking and filtering for advertisements
TWI614709B (en) * 2014-06-06 2018-02-11 Rakuten Inc Information system and information processing method
TWI610258B (en) * 2015-12-11 2018-01-01 林國龍 Method, computer program product, computer readable recording medium and system for article selection based on user preferences
TWI651947B (en) * 2017-08-03 2019-02-21 中華電信股份有限公司 Programmable Template Monitoring Method for Equipment and Service Monitoring
TWI662809B (en) * 2017-08-08 2019-06-11 中華電信股份有限公司 Obstacle location system and maintenance method for image streaming service
TWI768265B (en) * 2018-11-30 2022-06-21 高曼計量財務管理顧問股份有限公司 Intelligent investment assistance system and method thereof
TWI710992B (en) * 2018-12-27 2020-11-21 日商樂天股份有限公司 Information processing device, information processing system, and information processing method
TWI713021B (en) * 2019-11-25 2020-12-11 中華電信股份有限公司 Electronic device and method for converting chinese address format
TWI778597B (en) * 2021-04-23 2022-09-21 新加坡商鴻運科股份有限公司 Deployment method of remote desktop gateways, computer device, and storage medium

Also Published As

Publication number Publication date
AU7111100A (en) 2001-03-26
WO2001016848A8 (en) 2001-11-22
EP1222587A2 (en) 2002-07-17
WO2001016848A2 (en) 2001-03-08

Similar Documents

Publication Publication Date Title
US6697824B1 (en) Relationship management in an E-commerce application framework
US6904449B1 (en) System and method for an application provider framework
Chang et al. Trust and reputation for service-oriented environments: technologies for building business intelligence and consumer confidence
CA2261262C (en) Personal information security and exchange tool
US6067528A (en) Confidential market making system
US20050234860A1 (en) User agent for facilitating transactions in networks
US20050038707A1 (en) Methods and apparatus for enabling transactions in networks
TW491972B (en) System, method, and article of manufacture for electronic merchandising in an e-commerce application framework
US20070244769A1 (en) User interaction for trading system and method
WO1998003927A9 (en) Personal information security and exchange tool
CA2682997A1 (en) A system and device for social shopping on-line
WO2002073364A2 (en) System and method for providing secure transactions
WO2006009716A2 (en) Methods and apparatus for enabling transactions in networks
EP1170926A2 (en) Personal information security and exchange tool
Mariga Managing e-commerce and mobile computing technologies
Rahman et al. Internet commerce and software agents: cases, technologies, and opportunities
WO2001016851A2 (en) System, method, and article of manufacture for decision support in an e-commerce application framework
Joseph-Vaidyan Factors that enhance customer trust in e-commerce Web sites: An examination of e-commerce success metrics using Internet audience rating
WO2001052095A2 (en) Method for an application server provider framework
Wafgaonkar Critical study of e-commerce in the pharmaceutical industry
WO2001016843A2 (en) System, method and article of manufacture for providing external agents in an e-commerce application framework
Hussin PTA: Personal Trust Agent for e-Commerce
User file l
Gloor Key e-business technologies
Khurana E Commerce Notes

Legal Events

Date Code Title Description
GD4A Issue of patent certificate for granted invention patent
MK4A Expiration of patent term of an invention patent