[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

TWM419998U - Electronic commerce transaction platform for intangible commodity - Google Patents

Electronic commerce transaction platform for intangible commodity Download PDF

Info

Publication number
TWM419998U
TWM419998U TW100216047U TW100216047U TWM419998U TW M419998 U TWM419998 U TW M419998U TW 100216047 U TW100216047 U TW 100216047U TW 100216047 U TW100216047 U TW 100216047U TW M419998 U TWM419998 U TW M419998U
Authority
TW
Taiwan
Prior art keywords
user
service device
tangible
tangible goods
information
Prior art date
Application number
TW100216047U
Other languages
Chinese (zh)
Inventor
Hung-Yu Chen
Chun-Yin Liu
Original Assignee
Hung-Yu Chen
Chun-Yin Liu
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hung-Yu Chen, Chun-Yin Liu filed Critical Hung-Yu Chen
Priority to TW100216047U priority Critical patent/TWM419998U/en
Publication of TWM419998U publication Critical patent/TWM419998U/en

Links

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Description

M419998 五、新型說明: 【新型所屬之技術領域】 本創作係有關一種電子商務交易平台,特別是提供一種非有形商品交 易之電子商務交易平台β 【先前技術】M419998 V. New description: [New technology field] This creation is about an e-commerce trading platform, especially to provide an e-commerce trading platform for non-tangible goods transactions. [Prior Art]

現今之數位發達時代,電子商品以及網路已成為生活中不可或缺之重 要元素.,而網路與硬體技術的突破更是將人類的生活推向資訊交流互動的 鮮;因此人情使補由自身的勞動、勞力,也能透過網路來達到其目 的。其巾’電子紐喊勃發展即是—觀的例子。時τ電子交砰台百 家爭鳴,無論線上購物、拍賣,乃至於付費影、音,皆各自佔有廣大的供 需市場,《賊Μ屬於有形商品,即使商品為影、音,除了使用者付 費下載或並線上享受之外,即鱗上購㈣音商品,之鋪由郵寄或是物 流遞送的方式交付至付費使用者手中。 但是,在無形的資產或是商品上,卻鮮有能夠提供滿足個人供需的媒 介’以目細_概智謝或者,舰備服務人 力貧源或知顧_非有贿品服務fp,此種營運方式必義外設置後 方服務人員或知梅、專家來回應使_求或提供相對服務,所需成 本相對提高,而朗者在㈣上述營運平㈣,亦無法自行提供或獲取自 _作或需求之目的,即—般傳統營運方式較不符合實際使用者的供需問 匕’非有形商品之電子商務 有鑑於此,本創作提供並揭露一個別差❸ 交易機制,已達軸此_之目的。 3 【新型内容】 本創作提種電子商務交易平台的實施例,包含:人α網站,提供 傳或下載非有形商品本身、需求及資訊;資料庫,用以儲存非有形商品 而求及貝訊,前端服務裝置,並連資料庫與入口網站,前端服務裝 β供安全&層級低並讓使用者登入後進行操作的基本環境;後端服務裝 置並連資料庫與前端服務裝置後端服務裝置提供安全性層級高並儲存 用者重要資料的環境;安全驗證模組,並連前端服務裝置與後端服務裝 *全驗證模缺供賴、加紐碰登人f訊交純序及非有形商 。。本身’伺服器,提供營運入口網站;及網路傳輸介面,提供營運入口網 站。 本創作達到的目的是提供—種非有形商品自製自創之電子商務交易平 α非有形商品本身及其相關介紹、廣告之自製自創之電子商務交易平台 或者使用者付f(絲式)自行上傳、自我行銷之侧介紹、廣告之電子商務 交易平台。 以下在實施方式巾詳細敘述本創作之詳㈣徵以及優點 ,其内容足以 使任何熟習相關技藝者瞭解摘作之技術内容並據以實施,且根據本說明 書所揭露之内容、中請專利·及圖式,任何熟習相藝者可輕易地理 解本創作相關之目的及優點。 【實施方式】 凊參照第1圖及第2 ® ’第1圖射塊示意圖,第2圖為資料庫示意 圖。 電子商務交易平台1包含:人口繼1G、f料庫U、安全驗證模組 4 M419998 12、網路傳輸介面13、伺服器20、前端服務裝置41及後端服務裝置51。 入口網站10提供使用者登入、註冊、識別認證、付費上傳、付費下載 或付費線上觀看、個人交易或各項記錄之提供個人資訊維護、變更、檔案 加解密認證等功能。 貝料庫11為一個或複數’在此以二個資料庫作說明,以下簡稱前端資 料庫11及後端I料庫1卜但不以此為限,資料庫㈣赠赫有形商品 本身、需求及資訊。 Θ端服務裝置41並連接前端資料庫u與人〇 _ 1G,後端服務裝置 51並連後端資料庫„與前端服務裝置41,前端服務裝置41及後端服務裝 置si並連接安全驗證模、组12,當使用者登入至入口網站1〇後會進入至前 端服務裝置41。 安全驗證模組12並連前端服務裝置41與後端服務裝置51,安全驗證 模組筛X提供保護、加密及驗證登人資訊、交易程序及非有形商品本身。 網路傳輸介面13可作為網站營運之目的。In today's digitally developed era, electronic goods and the Internet have become an indispensable element in life. The breakthrough of Internet and hardware technology is to push human life to the exchange of information and interaction; therefore, the human condition makes up Through its own labor and labor, it can also achieve its purpose through the Internet. Its towel 'electronic neon shouting development is an example of the view. At the time, there are hundreds of schools in the electronic exchanges, regardless of online shopping, auctions, and even paying for movies and sounds, each of which has a large supply and demand market. "The thief is a tangible commodity, even if the product is a shadow, sound, in addition to users paying for download or In addition to online enjoyment, the purchase of (four) audio products on the scales is delivered to the paying users by mail or by logistics. However, in the intangible assets or commodities, there are few media that can provide personal satisfaction with the supply and demand. The operation method must be set up by the rear service personnel or the experts and experts to respond to the request or provide the relative services. The cost is relatively high, and the landlord is unable to provide or obtain the self-made or The purpose of demand, that is, the traditional way of operation is less in line with the actual user's supply and demand. 'E-commerce of non-tangible goods. In view of this, this creation provides and exposes a different trading mechanism, which has reached the goal of this. . 3 [New Content] This creation proposes an embodiment of an e-commerce transaction platform, which includes: a person's website, which provides or transmits non-tangible goods, needs and information; a database for storing non-tangible goods and seeking for Beixun , the front-end service device, and the database and the portal, the front-end service is installed in a basic environment for the security & low level and allows the user to log in and operate; the back-end service device is connected to the database and the front-end service device back-end service The device provides an environment with high security level and important information for the user; the security verification module, and even the front-end service device and the back-end service device * full verification mode is missing, and the New Zealand meets the person to send the message to the pure order and non- Tangible quotient. . It is a server that provides an operational portal; and a network transmission interface that provides an operational portal. The purpose of this creation is to provide a non-tangible commodity self-made e-commerce transaction flat alpha non-tangible goods and their related introductions, self-made e-commerce trading platform for advertising or users pay f (silk) Upload, self-marketing side introduction, advertising e-commerce trading platform. The details of the present invention and the advantages thereof will be described in detail in the following embodiments, and the contents thereof are sufficient for any skilled person to understand the technical contents of the abstract and implement it according to the contents disclosed in the present specification, and the patents and Schema, anyone familiar with the art can easily understand the purpose and advantages of this creation. [Embodiment] Referring to Figure 1 and Figure 2, the first diagram of the block diagram, Figure 2 is a schematic diagram of the database. The e-commerce transaction platform 1 includes: a population following 1G, a f library U, a security verification module 4 M419998 12, a network transmission interface 13, a server 20, a front-end service device 41, and a back-end service device 51. The portal 10 provides functions such as user login, registration, identification authentication, paid upload, paid download or paid online viewing, personal transactions or various records to provide personal information maintenance, change, file encryption and decryption authentication. The billing library 11 is one or plural 'here described by two databases, hereinafter referred to as the front-end database 11 and the back-end I library 1 but not limited to this, the database (4) is given to the tangible goods themselves, the demand And information. The terminal service device 41 is connected to the front-end database u and the user _ 1G, and the back-end service device 51 is connected to the back-end database „and the front-end service device 41, the front-end service device 41 and the back-end service device si and connected to the security verification mode. The group 12, when the user logs in to the portal site, enters the front-end service device 41. The security verification module 12 is connected to the front-end service device 41 and the back-end service device 51, and the security verification module screen X provides protection and encryption. And verify the personal information, trading procedures and non-tangible goods themselves. The network transmission interface 13 can be used for the purpose of website operation.

硬體錬器20為-個或複數,以提供入口網站K)的營運功能。 、在此’者可以是供應者,提供自製自創之非有轉品本身,或者 了以疋而求者’下載所需上述非有形商品本身,而非有形商品在此係為經 、識曰慧藝術、情報、方法、觀念、即興創作、獨門偏方或人文 探索等諸如此類之”益形,,资姦, …、4貝產’且該非有形商品可以經由影、音、文字、 圖檔或應用程式之數位電子檔央 非以此為限Ο電子植衫現,然而以上只是列舉,於實際使用時 在此, 傳或下裁針對非有形商品之需求以及提供相關或非相關非有 5 M419998 形商品之資訊係級用者自製自創之介紹、廣告或文官之影、音、文字、 圖檔或應用程式之數位電子棺,然'而以上只是列舉,於實際使用時非以此 為限。 述貝料庫11用以讀各種非有形商品的明細資料以及儲存非有形 商品本身、需求及資訊,晴也記錄各種交㈣細、使时㈣評定使 用者資細如個人ID、姓名、通财式、敝安飾m及各種虛擬物品) 等貝訊。資料庫11並更包含有預.載使用者資料單元⑴、訊息交流資料單 I2 乂易A錄單7L 1丨3、複數儲存單元1M及侧評定單元出,複數 儲存單元m用以對應儲存非有形商品本身、需求及資訊,詳言之分別具 有儲存經驗、知識、智‘料非有形商品本身之儲存單元ιΐ4,以及儲存介 紹、廣告或文宣等需求、資訊之儲存單元114。 本實施例係提供非有形(或稱非實體)商品之供需互惠機制。本實施例所 揭路之電子父易機制,使用者可依自己之需求來,,提供,,或是,,獲取,,各種,,非 有开/且非典用他人著作權(非已具有他人著作權)或版權之自製自創之資 產”。都可藉由本交錢觀將之商品化,讓無_f產“價值化,,並兼具 “差異化”的特色,使人人都能展現其個人價值差異及特f,進而達到自我 行銷、曝光、宣傳、獲利或是分享之目的。 請參閱第3圖及第4圖所示,本實施例包含下列步帮: 步驟90G,提供-電子商敍易平台丨之人口_ ω,當使用者以使 用者終端設備3〇經由1G登讀,可以上傳或下載非有形商品本 身,或者上傳或下載針對非有贿品之需求,或者提供相關或非相關該非 有形商品之資訊。 步驟901,經由資料庫11儲存非有形商品本身、需求及資訊。 步驟902,經由安全驗證模組12來保護、加密及驗證登入資訊、交易 程序及非有形商品本身。 步驟知,經由伺廳2〇及網路傳輪介面13來營運人口網站。 本汽知例提供電子商務交易平台之入口網站川,具備舰器如與 網路傳輸介面13的配備’同時具備商品與個人資訊之資料庫U.當使用 者错由人口戦1G進人本t子商務交易平㈣之後,即可健人之需求 與目的,扮演”供應者”或是“需求者,,的角色。 田為供應者時,使用者依據個人目的來“自製,,及“自訂,,宣傳或 订銷的手’可絲、音或文字顧程式以及各類自麵他人之智慧創作) 的數位媒體皆可±傳域為供應者之‘‘廣告”或是“文宣,,,或直接成為 商ηα麟《供應者”的铜者端制宣傳以及行賴利的目 ^讓“需求者”能夠藉此明瞭“供應者,,所欲提供之無形商品是何種内 谷或功月b,再決定是否付費購買。 ,此外’”供應者”也可於此平台上尋求(或狩獵)“需求者,,提出的各種“非 >。需求^尚若供應者,,有能力提供該些需求,即可提供自身的“信 平等屬性、宣傳,’、“自我推薦”、“交易記錄”、或是解決該些需求 之大、闲或摘要”於“需求者,,,而成為“供應者”候選人。當“需求者,,端經評 、考里供應者”的“信用評定,,、“屬性,,、,,個人的宣傳,,、“交易記錄,,、對 求者而求所提出的“摘要大鋼”等條件,決定採用何“供應者,,候選人的 解決方案或疋無形資產”後,始可錄用購買該非有形商品,該“供應者,,候 選人即可獲得“絲者,’所公告提㈣細、錢,耻“供應者,,可藉 M419 卿 由自己無形資產來增加收入。 當使用者扮演“爾,,的咖,除了可與本電怖㈣平台ι〇 上找尋其所需且已由他製作並提供的無形商品並購買下載或線上使用之 外,也可“提出公告,’自己的“非有形需求,,以及“獎酬,,進而吸引“供應者” _姆紅_品,錄“提供者,,錢人巾,雜其“信用評 屬 父易°己錄、個人推薦資訊”或是“相對應解決方案之摘要 或節料軸咖_“非靖產”啸絲,_支付“供應 者撕應之獎酬。而對“需求者,,而言,購買錄用的選擇可為複選。 捕撕定單元lls為提供_贿於本_台使时的信用評等 方式。母-個在本電子商務交易平台丨的使用者可透過如下機制來建立個 人之“信用評等”。 已的Si為供?者時’母當“售出即“需求者,,端付費下載購買)-次自 d形商品峨,,時啊由“嫩,鳴“靖或“負面,,等評價 與“爾”),從谢自身料精”从“雜,,趨向,該 =等會忠實的記錄是何齡_非有形商品,^細目料資訊於資料 ⑺當使用者為“需求者,’時 “信求_之_=:也會成為_ 评定,也會連同商品的分類1記錄於#料;' )商品對供應者所做的 與“給予他人之評價”,伴隨 二因此’該些“獲得之評價” J之各種刀類明細,皆為使The hardware device 20 is one or plural to provide an operational function of the portal K). Here, the 'can be the supplier, provide the self-made non-transfer product itself, or the one who wants to download the required non-tangible goods themselves, instead of the tangible goods in this system. Hui art, intelligence, methods, concepts, improvisation, singularity or humanistic exploration, and so on, such as "profit, traitor, ..., 4 shellfish" and the non-tangible goods can be through shadows, sounds, words, graphics or applications The digital electronic file of the program is not limited to the electronic implants. However, the above is just an enumeration. In actual use, the current or the next ruling is for non-tangible goods and provides related or unrelated non-5 M419998 shapes. The information of the commodity is the self-made introduction, the advertisement or the digital image of the official, shadow, text, graphic file or application. However, the above is just an enumeration, and is not limited to the actual use. The shell library 11 is used to read the detailed information of various non-tangible goods and to store the non-tangible goods themselves, the demand and the information, and also to record the various items (4), and the time (4) to assess the user's qualifications such as personal ID. Name, Tongcai, 敝安饰m and various virtual items), etc. The database 11 also contains pre-loaded user data unit (1), message exchange data sheet I2 A易A record 7L 1丨3, The plurality of storage units 1M and the side evaluation unit are used to store the non-tangible goods themselves, the requirements and the information, and in detail, the storage unit ιΐ4, which stores the experience, knowledge, and intelligence of the non-tangible goods, respectively. A storage unit 114 for storing requirements, information, such as an introduction, an advertisement, or a text. The present embodiment provides a supply and demand reciprocal mechanism for a non-tangible (or non-physical) commodity. The electronic parental mechanism of the method disclosed in this embodiment can be Your own needs come, provide, or,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, All of them can be commercialized through this pay-for-money concept, so that no _f production is “valued, and has the characteristics of “differentiation”, so that everyone can show their personal value differences and special f, and then achieve self-marketing. For the purpose of exposure, exposure, publicity, profit, or sharing. Please refer to Figures 3 and 4, this example includes the following steps: Step 90G, provide - the population of the e-commerce platform _ ω, when The user can upload or download the non-tangible goods themselves by using the user terminal device 3, and upload or download the non-tangible goods, or provide information about the non-tangible goods or related non-tangible goods. Step 901, The non-tangible product itself, the demand and the information are stored in the database 11. Step 902, the security verification module 12 is used to protect, encrypt and verify the login information, the transaction program and the non-tangible product itself. The road transmission interface 13 is used to operate the population website. The company knows that the portal website of the e-commerce transaction platform provides the equipment such as the equipment and the network transmission interface 13 News of the library U. When the wrong person after entering this population Zhan 1G t-commerce transaction level (iv), to human health needs and purposes, play a "provider" or "role of consumer ,,. When Tian is the supplier, the user “self-made, and “customize, promote or order the hand” can be silk, sound or text program and various types of self-writing wisdom created by the user according to personal purposes. Can be the domain of the supplier's ''advertising' or "literary propaganda,, or directly become the business ηα Lin "supplier" of the copper-based propaganda and the interests of the line of interest, so that the "demand" can borrow This explains the "suppliers, what kind of intangible goods are intended to be provided, and then decide whether to pay for the purchase." In addition, the 'suppliers' can also seek (or hunt) "demands," and various "non-> If the supplier is still able to provide these needs, they can provide their own “equitable attributes, propaganda, ', “self-recommendation”, “transaction record”, or solve the needs of the big or small. "Abstract" in the "demand,", and become the "supplier" candidate. When the "demand, the end of the evaluation, the supplier of the test" "credit evaluation,", "attribute,,,,, personal propaganda ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, Tangible goods, the "supplier, the candidate can get the "silk," the announcement of the (four) fine, money, shame "suppliers, can borrow M419 from their own intangible assets to increase income. When the user plays" Er, the coffee, in addition to being able to find the intangible goods that it has prepared and provided by him and to download or use it online, can also "propose the announcement, 'own" Non-tangible demand, to "Reward, and then attract "suppliers" _ _ red _ goods, recorded "providers, money people towel, miscellaneous "credit evaluation is easy to record, personal recommendation information" or "corresponding solution" The summary or the seasoning axis coffee _ "non-Jing production" Xiaosi, _ pay "the supplier tears the reward. For the "demand, for example, the choice of purchase can be a check. The tear-off unit lls provides a way to provide a credit rating when the bribe is used in this e-commerce trading platform. The user can establish a personal "credit rating" through the following mechanism: When the Si is the supplier, the 'female when the seller is sold, that is, the "demander, the end of the payment download purchase" - the second self-d-shaped goods, , by the time of "nen, Ming "Jing or "negative," and other evaluations and "Er"), from Xie's own material "from the miscellaneous, trend, the = faithful record is how old _ non-tangible goods , ^Details information in the data (7) when the user is "demand," when the letter _ _ =: will also become _ assessment, will also be recorded along with the classification of the goods 1 in the material; ') goods to suppliers What is done with the "evaluation of giving others", along with the second, so the "evaluation of the "acquisition" J, the various details of the knife, so that

則實W者自她轉从H 4閱第5圖及第6圖聯,為了達到即時與效铜求,非有形商. M419998 品的交論貌娜之上_發揮其特色;_由祕上傳輸必須謹 慎地考量其安全性的問題’若無形商品的保護遭·解而被大量下載傳 播’如此對純形資產提供者而言是莫A的損失。有舰此,本電子商務 ^平台i亦提供-健全倾_,提供每—個使时關在_個安全 的父易方式下來進行商品的流通。使用者可透過安全驗證模組η來保護、 加密及驗證登人資訊、交易程序及非有形商品本身,並在付費購買與傳遞 檔案、驗證登入資減付款交易程序,確保烟者能在安全可靠的環境下 使用電子商務交易平台1。 首先,本電子商務交易平台i區分兩個服務的機制,即前端服務裝置 41與後端服務裝置51。前端服務裝置41提供每一個使用者登入後的基本 環境,該環境安全性等級較低的環境,主要是屬於使用者共有區=, 其中包含的功能例如上傳(upload)並刊纟各類非有形商品相關與不相關之 宣傳、廣告、或是刊登各種非有形商品的需求(其内容可以是文字、影像、 聲音、flash觀數位電子檔等等),以及提供使用者基本的工具用以1或 是處理其上傳的各類宣傳、廣告、或是各類非有形需求,例如提供對聲音 或影像難的裁切,献從转顧品齡上直接進行精義取,用以製 作廣告的雜部分。此外,使用者也可以進行各齡_搜私_職檢 索(request information)。在此^端服務裝置w中也可提供各類溝通機制, 提供使用者_互動無息的錢。此外,此區域也會透過侧者提供之 合法使用者數位憑證413(uSerCA),針對下載(download)的樓案或是各類下 載資訊進行解密處理或者用以驗證等各項安全性措施。 在後端服務裝置Μ是屬於安全性層級高的區域,必須絕對考量安全性 9 M419998 的問題。由於後端資料庫11除了包含非有形商品本身之外,使用者個人資 料、各類交易明細、與信用評定或是各類虛擬物品等重要資料皆存放於此, 倘使遭到破解,造成的損失將無法估計。以安全驗證模組12的保護機制能 夠確保每個使用者空間的獨立性,避免遭到連帶的安全性攻擊;同時也具 備管理者之獨立金鑰來確保所核發的憑證是安全可靠的。 請參閱第6 B ’上述後端資料庫n所包含的虛擬物品單元%,運用 如網路遊射的施寶物、顧貨幣方式。是除了網路遊戲之外, 目前網路的另-個消費與使用的主力,即為網路拍賣、電子交易平台,常 缺乏這類虛擬物品賴制。有鑑於此,本鮮在此提供—結合虛擬物品於 網路電子交易之平台’藉由虛擬物品的“額外加值特性,,與“刺激消費特 性”’提@使用者使肋電子交易平台的意願並且做消費;同時平台提 供者也可以藉由此虛擬物品提供對於使用者之“回饋,,,與“優惠獎勵,,,讓 平台提供者與使用者雙方各得其益。 以電子交易平台的實際應用為例,以平台提供者的角度,當買賣雙方 達成交易之後,平台提供者可以核發虛擬物品,(例如虛擬貨幣或是虛擬卡 片)給貝賣雙方,同時透過交易累積之後,當使用者累積達一定的程度,可 以向平台提供者換取其他的實質優惠、金錢_、或是更多加值服務等。 藉此平。提供者㈣刺激並增加使用者交易達成的數量。對於買、賣雙方 的使用者而5 ’使用者除了透過達成交絲累積荒集該些虛擬物品寶 卜也可以透過使肖相的交換或是金錢購買來獲得。使用者可以藉 >虛擬物σα、寶物來或得平台提供者更多的加值利益,例如減免交易 費咸免子J登費、延長刊登時限、增加使用空間、獲得抽獎機會、換 M419998 取實際金錢或是各類禮券等各類優惠及服務。 電子商務交易平台1的提供者可以決定該些虛擬物品、寶物是否允許 使用者間之相互交換、贈與或是錢胃賣,其顧姐減交胃平台之狀 況與性質來訂定之。 • 上述當使用者端60於伺服器20端操作前端服務裝置41或後端服務裝 - 置51,使用者端60會經由操作環境介面61、上傳資訊單元62(upl〇ad)、下 載資訊單元63(d〇wnl〇ad)、編輯處理單元64(edit㈣access)、搜尋單元 鲁 65(search)或互動訊息單元66(communicate)進行運作。 上述操作環境介面61包含私有區611,提供使用者登入所在位置並用 以進行個人設定、上傳合法之使用者數位憑證413等各項操作功能,而講 買後先行將非有形商品械讀端服務裝置W錢務裝置51之私人 二間,使用者可選擇時間、地點或適當的媒介進行下載。 操作壤境介面61包含共有區612,提供使用者所在位置並用以服務各 類刊廣告、文宣或是需求之上傳(upload)、搜尋(search)、變更與操作 • ㈣㈣,以及各個使用者間的互動與交流(c〇mmunicate)。 後端服務裝置Μ雜收註删戶之制者諸翠元供應者資料單元 之識別資料,並確認識別資料合法後即產生一使用者私有金錄4ιι(職 private key)及其相對應之一使用者公開金鑰412(userpubik key),使用者無 法直接取得(access)或存取使用者私有金錄扣,必須藉由词服器Μ端對於 每一使用者帳戶來對應取得並使用之。 承上所述,使用者公開金鑰4Π透過專屬的一管理者私有金錄511來 簽章並核發-使用者數位憑證4l3(user CA)予使用者保管,並在使用者下 M419998 人使用各項女王ii的操作時提供,該使用者數位憑證化會由後端服務裝 置51之管理者私有金錄511所產生一管理者公開金錄512响心她犷 public key)或-管理者數位憑證51_—_沉ca)來加以驗證簽章並 確認合法性》 其詳細說明為: 51的安全賴縣舰器2G具備-或多把管理者私 有金餘Ml同時會有—或多個由該管理者私有金錄Μ丨所產生出來的管理 者a開金錄512 ’同時由該相對的管理者私有金錄5ιι加以簽章且產生一 或多個管理者數位憑證513。 (2) 每個使用者當註冊成為用戶之後即會將本身的識別資料(如個人仍, 通訊方式或是各類利於辨識之資料)傳送至後端服務裝置 51之安全性機 制’並且存人後端資料庫u中,當確認使用者㈣合法之後 ’隨即產生一 把使用者私有金餘411 ’金鑰的資料長度不在此限。此使用者私有金錄4ιι 存在於舰器20端並且安善保管,該把使用者私有金錄4ΐι將會儲存於安 全1±機制巾關㈣2〇端⑽是前端也可以是後端偃幻,並且”直麟 應於該使用者的登入帳戶(即登入後的使用者空間)而,,非,,交由使用者本身 保管,此為基於安全性之考量;使用者本身無法直接取得該把專屬之使用 者私有金錄41卜也無法得知該把使用者私有金錄似的實際内文即該把 使用者私有金錄411只會由伺服器2〇本身來進行對應當使用者使用某個 且入資料登人雜戶之後,舰器2G會由觀肖者帳戶制並絲得該把 使用者私有金錄41卜同時用於安全性的處理。 (3) 該把專屬的使用者私有金錄川產生之後由該把使用者私有金錄 12 M419998 411所產生(衍生)之-把使用者公開金錄412,此把使用者公開金錄化將 會由管理者端透過管理者私有金錄511加以簽章,之後該經過管理者私有 金錄511簽章過後產生並核發的使用者數位憑證413,即包含之前由使用 者私有金錄411產生出的使用者公開金錄412,此經過管理者數位簽章後 之使用者數位憑證413將交由使用者妥善保管,當之後進行交易下載或變 更個人資訊等安全性操作時,管理者端將會要求使用者提供其數位憑證 化’並且透過管理者數位憑證卿包含管理者公開金錄犯)對於該使用者 數位憑證W進行驗證簽章’若驗證通過表示使用者所提供之使用者數位 憑證仍是由管理者端所認證核發的,因此認可其安全層級高的操作並且 可用該使用者數位憑證413來解除透過使用者私有金錄411加密的内容。 以上所提供的安全性特點如下: ⑴使用者私有金鑰川無法被非法使用者所取得,因此非法使用者或 骇客無法由該使用者私有金錄仙產生出相對的使用者公開金錄犯。 (2) 非法使时也無法峨端服務裝置51之安全機财取得經過後端 管理者私有金鑰511所簽發的憑證。 (3) 即使經過管理者所簽發的使用者數位憑證413遭到盜用或竊取雖 然可以通猶粧全機儀薇,細_法者倾,,正麵”登入該 使用者的帳戶(透過登人密碼、ID、或各類識職料),因祕戶與該使用 者私有金錄411以及憑證是相互對應的,若登入的帳戶非本人的,該使用 者有之錯誤使用者數位憑證W無法對該帳戶對應之使用者私有金錄扣 加密内容進行解密;反之亦然。因此安全性仍然有所保障。 (4)由於使用者私有金鑰411與帳戶的對應關係只存在於安全性機制之 13 M419998 伺服器,即使使用者本身也無法得知,因此安全性較高。 本實施例將服務機制區分為前端服務裝置41與後端服務裝置5ΐ,兩 者各包含各自的資料庫11系統。前端服務裝置41包含使用者私有區611 以及所有使用者之共有區612,使用者私有區611即為使用者登入後所在 的區間,在此使用者可以進行個人的相關設定以及上傳合法(經過管理者私 有金鑰511簽章並核發)之使用者數位憑證413,同時透過該使用者數位憑 證413進行對於購買、下載非有形商品時所需要的解密等安全性操作等。 在使用者共有區612中,所囊括的服務包含前述之各類刊登廣告、文宣或 是需求之上傳、搜尋、變更與操作,以及各個使用者_互動與交流等。 在後端服務裝置51的服務部分,使用者可以進行的操作包含對於,,非 有形商时本身之上傳、搜尋、購買、下載、變更與操作等;此要還包括對 於各項資訊的要求(reqUest时〇咖_,例如要求使时個人資訊使用者 商品列表、使用者信用評等、屬性趨向、亦或是各類交易的明細、分類整 理以及各種虛擬物品的資訊等。當使用者進行購f、下載非有形商品時, 後端之服務部分會先取出對應於該使用者帳戶本身之使用者私有金錄叫 以及使用者上傳之使用者數位憑證4丨3,接著對於使用者數位憑證化進 灯驗也簽早’透過官理者端之管理者數位憑證犯對於該使用者數位憑證 413驗證其來源疋否可靠;當驗證通過之後,會針對被交易之非有形商品 本身、或是被交易之非有形商品經過雜凑表(Η··)演算過之結果、亦 或疋各種安全性演算之結果,以使用者私有金錄4ΐι進行加密⑽如使用 RSA加密技術)後,再傳送至前端服務裝置41,之後透過使用者上傳之使 用者數位憑證413進行解密。 M419998 此期間的安全性驗證流程可以是單次或多次步驟,往返於前端服務裝 置與後端服務裝置間,以碟保其安全驗證之彈性與可靠性。最终使 用者會得到其透過合法使用者數位憑證413解密後之非有形商品,倘使所 使用之使用者數位憑證413不合法,或是登入之帳戶不正確,該使用者都 無法正確獲得該被交易之非有形商品。 非有形商品之靖買、下載傳遞可以為,,即時,,或”非即時,,。”即時,,的下載 傳遞為,當制韻買轉有顧品之後,立即由交許台簡驗證且下 載至使用者終端設備30(End Device、丨、斗 脱Termmal) ’該些使用者終端設備30 可為PC、NB、手持裝置、手機、平板電腦、或是各種可連上網路之電子 產品’使用者即可開始_該些非有形商品;此類除了立即獲得絲位標、 影音檔之外,也可透猶上串流魏的方式,此純含於㈣傳遞的方式。 而”非即時,,的傳遞方式,是指當使时選擇購買非有形商品之後該 被交易之神形商品齡直接下鋪送至姻者終端設備Μ,而是儲存於 舰器20端之使用者個人空間(可以是前端資料庫u,也可為後端資料庫 ⑴,使用者可以從任何時間、任何地點來進行實際下載,如此可排除各類 環境因素例如網珞頻寬、使用者末端之儲存㈣、安全性理由等。 然而,若被交易之非有形商品屬於即時地線上串流播放的方式,當使 用者礙於網路頻寬不足時,可以選擇之後播放,其”授權可播放的次數或 時間”將會紀錄至使用者個人空間,使用者可以自由選擇播放的時間與地 點,如此買方與賣方的權益都能夠確保。 當購買或下載非有形商品時,前端服務裝置41與後端服務裝置51的 服務機制可以透過使用者私有金輪川以及使用者數位憑證仍,配合管 15 M419998 理者私有⑽5U ’輯⑽及需絲進行各類轉密以及安全性的驗證, 以確保其彈性。 此外’本創作亦包含-個使用者個人專業資訊,即為專業背景之資訊 提供與驗證機制’用以表述使用者所提供非相關非有形商品之資訊,在此, 資訊較佳地為經由審查通過之專業證明、檢定書錄照。對於每個使用本 創作的使用者而言,使用者端6〇可進一步提供個人專業證照、證明、檢定 書或執照等背景資訊,供“需求者“在選定“提供者“時之參考用途。該 些專業證照、證明、檢定的證明範圍可涵蓋醫學法律、技術等領域。當 使用者欲提供其專業,背景資訊時,透過將其證明資訊交予平台 提供者,經由正規管道進行審4、驗證,若該些專業證照、檢定書為合法 且屬實時,平台提供者會將f訊併入該使用者之個人資訊中,同時標注表 不已經由平台審查通過“,做為日後參考的依據。此專業資訊驗證模組 的好處包含: ⑴有助於“需求者找尋具專業相關之“供應者“來提供其商品。 (2) 透過該些專業者、專家的提供’所獲得的商品能有較高的可信度或 依據。 (3) 經由平台提供者的再次雜、審查及標註之後,解台朗者本身 會更有保障’也讓該些證明更具可信度。 本創作藉以達到的目的是提供__種非有形商品自製自創之電子商務交 易平台、非有形商品本身及其相關介紹、廣告之自製自創之電子商務交易 平台或者使用者付費(主動式)自行上傳、自我行鎖之棚介紹、廣告之電子 商務父易平台。 ' ^419998 雖然本創作的技術内容已經以較佳實施例揭露如上,纱 ^ ·,、、',、並非用以限 定本創作,任何熟習此技藝者,在不脫離本創作之精神所作些許之更動與 潤飾,皆應涵蓋於本創作的範疇内,因此本創作之保護範圍當視後附之申 請專利範圍所界定者為準。 【圖式簡單說明】 第1圖為本創作之方塊示意圖。 第2圖為本創作之資料庫示意圖。 第3圖為本創作之步驟流程示意圖(_)。 第4圖為摘作之步職程示意圖㈡。 第5圖為本創作之執行架構示意圖㈠。 第6圖為本創作之執行架構示意圖㈡。 【主要元件符號說明】 ....電子商務交易平台 • . _ .入口網站··Then the real W from her to H 4 read the 5th and 6th map, in order to achieve immediate and effective copper, non-tangible business. M419998 product of the appearance of the top of the _ play its characteristics; _ by the secret Transmission must carefully consider the issue of its security 'If the protection of intangible goods is solved and is widely downloaded and transmitted', it is a loss to the pure asset provider. There is a ship, this e-commerce ^ platform i also provides - a sound dumping _, providing each of the time to close the _ a safe father easy way to carry out the circulation of goods. Users can protect, encrypt and verify the personal information, transaction procedures and non-tangible goods themselves through the security verification module η, and purchase and transfer files and verify the login payment reduction transaction procedures to ensure that smokers can be safe and reliable. The use of e-commerce trading platform 1 in the environment. First, the e-commerce transaction platform i distinguishes between two service mechanisms, namely, the front-end service device 41 and the back-end service device 51. The front-end service device 41 provides a basic environment after each user logs in. The environment with a lower level of environmental security mainly belongs to the user shared area=, and the functions included therein are, for example, uploaded and published various types of non-tangible. Product-related and irrelevant publicity, advertising, or the need to publish a variety of non-tangible goods (the content can be text, video, sound, flash view digital electronic files, etc.), and provide users with basic tools for 1 or It is to deal with all kinds of propaganda, advertisements, or various non-tangible needs uploaded by it, such as providing a difficult cut of sound or image, and making a direct use of the quality of the product to make a miscellaneous part of the advertisement. In addition, the user can also perform various levels of _ search_request information. In this service device w, various communication mechanisms can also be provided to provide users with interactive and interest-free money. In addition, this area will also use the legal user digital certificate 413 (uSerCA) provided by the side to decrypt or download various downloaded information or verify various security measures. In the case where the back-end service device is an area with a high level of security, the problem of security 9 M419998 must be absolutely considered. Since the back-end database 11 contains not only the non-tangible goods itself, important data such as user personal data, various transaction details, credit ratings, or various virtual items are stored here, and if they are cracked, the losses are caused. Will not be able to estimate. The security verification module 12's protection mechanism can ensure the independence of each user space and avoid the associated security attacks. It also has the administrator's independent key to ensure that the issued credentials are safe and reliable. Please refer to the virtual item unit % included in the above-mentioned back-end database n in the 6th B', using the treasures such as the Internet, and the currency method. In addition to online games, the main force of the current consumption and use of the Internet, namely online auctions and electronic trading platforms, often lacks such virtual items. In view of this, this is hereby provided—in combination with virtual goods on the platform of online electronic transactions', by the “additional value-added feature of virtual goods, and “stimulation of consumption characteristics” Willingness and consumption; at the same time, the platform provider can also provide the “reward, reward, and reward” for the user with the virtual item, so that the platform provider and the user can benefit from each other. As an example of the actual application, in the perspective of the platform provider, after the buyer and the seller reach a transaction, the platform provider can issue virtual items (such as virtual currency or virtual card) to the seller, while accumulating through the transaction, when using To a certain extent, you can exchange platform providers for other substantial benefits, money _, or more value-added services, etc.. The provider (4) stimulates and increases the number of user transactions reached. The users of both sides sell 5' users in addition to accumulating the collection of virtual items through the wire, and can also make Xiao Xiang’s If you change it or buy it with money, you can borrow the virtual object σα, treasure, or the platform provider for more value-added benefits, such as reducing the transaction fee, saving the money, increasing the time limit, and increasing the space. , get lucky draw chances, change M419998 to take real money or various kinds of coupons and other benefits and services. The provider of e-commerce trading platform 1 can decide whether these virtual items, treasures allow users to exchange, give or The money stomach is sold, and the Gu sister reduces the condition and nature of the stomach platform. • When the user terminal 60 operates the front end service device 41 or the back end service device 51 at the server 20 end, the user terminal 60 Via the operating environment interface 61, the uploading information unit 62 (upl〇ad), the download information unit 63 (d〇wnl〇ad), the editing processing unit 64 (edit), the search unit 65 or the interactive message unit 66 (communicate) The operation environment interface 61 includes a private area 611, which provides a user login location and is used for personal setting, uploading a legitimate user digital certificate 413, and the like. For the function, after the purchase, the non-tangible commodity reading service device (the private room of the money service device 51) can be downloaded first, and the user can select the time, the place or the appropriate medium to download. The operation environment interface 61 includes the shared area 612. Provide the location of the user and serve to upload, upload, search, change, and operate various types of advertisements, articles, or requirements. (4) (4), and interaction and communication between users (c〇mmunicate). The back-end service device is noisy and accepts the identification data of the supplier data unit of the Jade source provider, and confirms that the identification data is legal, and then generates a user private record 4 ιι (private key) and one of its corresponding ones The user public key 412 (userpubik key), the user cannot directly access or access the user's private gold record, and must be obtained and used by the word server for each user account. As stated above, the user's public key 4 is signed and issued by the exclusive manager's private account 511, and the user's digital certificate 4l3 (user CA) is reserved for the user, and the user uses M419998 under each user. Provided during the operation of the item Queen ii, the user digital voucher will be generated by the manager of the backend service device 51, the private account 511, a manager's public account 512, her public key) or - the manager's digital certificate 51_—_ sinking ca) to verify the signature and confirm the legitimacy. The detailed description is: 51. The security of the county ship 2G has - or more than the manager private gold Ml will have - or more than the management The manager a private record is generated by the manager a. The record 512' is signed by the relative manager private record 5 and the one or more manager digital certificates 513 are generated. (2) Each user, when registered as a user, will transmit his/her identification information (such as personal still, communication method or various types of information for identification) to the security mechanism of the backend service device 51 and deposit In the back-end database u, after confirming that the user (4) is legal, the data length of the user's private gold 411 'key will be generated. This user's private gold record 4ιι exists on the end of the ship 20 and is safely kept. The user's private record 4 ΐ will be stored in the security 1± mechanism towel (4) 2 ( end (10) is the front end or the back end illusion, and "Lin Lin should be in the user's login account (that is, the user space after login), and not, and it should be kept by the user. This is based on security considerations; the user cannot directly obtain the exclusive account. The user's private account record 41 can't know the actual text of the user's private record, that is, the user's private record 411 will only be used by the server 2 itself. After the data is entered into the miscellaneous household, the 2G of the ship will be made by the accountant and the user's private record will be used for security. (3) The exclusive user private gold record After the generation, the user's private record 12 M419998 411 is generated (derived) - the user is disclosed 412, and the user's public record will be uploaded by the administrator through the manager's private record 511. Signature, after that The user digital certificate 413 generated and issued after the signature of the private account 511, that is, the user's public account 412 generated by the user's private account 411, which is the user number after the manager's digital signature The voucher 413 will be handed over to the user for safekeeping. When a transaction operation such as downloading a transaction or changing personal information is performed, the administrator will ask the user to provide his digital voucher's and disclose it to the manager through the administrator's digital certificate. The gold record is verified by the user's digital certificate. If the verification proves that the user's digital certificate provided by the user is still authenticated by the administrator, it recognizes the security level high operation and is available. The user digital certificate 413 is used to release the content encrypted by the user's private account 411. The security features provided above are as follows: (1) The user's private key is not available to the illegal user, so the illegal user or the visitor It is not possible for the user's private account to produce a relative user's public record. (2) Illegal time can not be overturned. The security device of the service device 51 obtains the certificate issued by the back-end manager private key 511. (3) Even if the user digital certificate 413 issued by the manager is stolen or stolen, the device can be used. Wei, fine _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ If the account that is logged in is not the one, the user has the wrong user digital certificate W and cannot decrypt the encrypted content of the user's private gold record corresponding to the account; and vice versa. Therefore, security is still guaranteed. (4) Since the correspondence between the user private key 411 and the account exists only in the 13 M419998 server of the security mechanism, even if the user itself cannot know it, the security is high. In this embodiment, the service mechanism is divided into a front-end service device 41 and a back-end service device 5, each of which includes a respective database 11 system. The front-end service device 41 includes a user private area 611 and a shared area 612 of all users. The user private area 611 is a section where the user logs in, where the user can perform personal related settings and upload legal (management The user digital certificate 413 is signed and issued by the private key 511, and the user digital certificate 413 is used to perform security operations such as decryption required for purchasing and downloading non-tangible goods. In the user sharing area 612, the services included include various types of advertisements, texts, or requests for uploading, searching, changing, and operating, as well as individual users' interactions and exchanges. In the service part of the backend service device 51, the operations that the user can perform include, for example, the uploading, searching, purchasing, downloading, changing, and operating of the non-tangible business time itself; this also includes requirements for various information ( When reqUest, it is required to make a list of personal information users, user credit ratings, attribute trends, or details of various transactions, sorting and sorting, and information about various virtual items. f. When downloading a non-tangible item, the service part of the back end first takes out the user's private gold record corresponding to the user account itself and the user digital certificate 4丨3 uploaded by the user, and then the user digital certificate In the light test, the signing is also early. 'Through the administrator's digital certificate, the digital certificate 413 verifies that the source is reliable. When the verification is passed, it will be directed to the non-tangible goods being traded, or The non-tangible goods of the transaction are calculated by the hash table (Η··), or the results of various security calculations, and the user's private record is 4ΐι Encryption (10), if using RSA encryption technology, is transmitted to the front-end service device 41, and then decrypted by the user-uploaded user digital certificate 413. M419998 The security verification process during this period can be a single or multiple steps between the front-end service device and the back-end service device to ensure the security and reliability of its security verification. The end user will get the non-tangible item decrypted by the legitimate user digital certificate 413. If the user digital certificate 413 used is invalid, or the account being logged in is incorrect, the user cannot obtain the transaction correctly. Non-tangible goods. The purchase and download of non-tangible goods can be, for example, instant, or "not real-time,". Instant, the download is delivered as, when the rhyme buys and has the product, it is immediately verified by the interpreter and downloaded to User terminal device 30 (End Device, 丨, 斗Termmal) 'The user terminal devices 30 can be PCs, NBs, handheld devices, mobile phones, tablets, or various electronic products that can be connected to the network' You can start _ these non-tangible goods; in addition to the immediate access to the silk mark, audio and video files, this type can also pass through the way of streaming Wei, which is purely contained in (4) the way of transmission. The "non-immediate," delivery method means that when the non-tangible goods are selected for purchase, the traded god-shaped commodity age is directly sent to the marriage terminal device, but stored at the end of the ship 20 Personal space (can be the front-end database u, or the back-end database (1), users can download the actual data from any time, anywhere, so as to eliminate various environmental factors such as network bandwidth, user end Storage (4), security reasons, etc. However, if the non-tangible goods being traded belong to the way of streaming on the live line, when the user is not able to play the network bandwidth, they can choose to play later. The number of times or time will be recorded in the user's personal space, and the user can freely choose the time and place of the broadcast, so that the interests of the buyer and the seller can be ensured. When purchasing or downloading non-tangible goods, the front-end service device 41 and the rear The service mechanism of the end service device 51 can be passed through the user's private Jinchuanchuan and the user's digital certificate. The management is still in the possession of the 15 M419998 controller (10) 5U ' And the need for silk to carry out various types of confidentiality and security verification to ensure its flexibility. In addition, 'this creation also contains a user's personal professional information, that is, the professional background information providing and verification mechanism' to express the user's Providing information about non-related non-tangible goods, where the information is preferably a professional certificate and a certificate booked through the examination. For each user who uses the creation, the user can further provide the individual. Background information such as professional licenses, certificates, certificates or licenses for reference purposes of “demanders” when selecting “providers.” The scope of these professional licenses, certificates, and certifications may cover medical law, technology, etc. When users want to provide their professional and background information, they will submit their certification information to the platform provider, and they will be verified and verified through the formal channels. If the professional licenses and verification documents are legal and real-time, the platform provider will f is incorporated into the user's personal information, and the labeling form has not been reviewed by the platform, as a basis for future reference. The benefits of the information verification module include: (1) It helps the “demanders to find professional “suppliers” to provide their products. (2) Through the provision of these professionals and experts, the products obtained can have higher The credibility or basis of the (3) After the platform provider's reconciliation, review and labeling, the tyrants themselves will be more secure' also make the proofs more credible. Is to provide __ non-tangible goods homemade self-made e-commerce trading platform, non-tangible goods themselves and their related introductions, advertising self-made e-commerce trading platform or user paid (active) self-upload, self-locking The introduction of the shed, the e-commerce parent of the advertisement platform. ' ^419998 Although the technical content of the creation has been disclosed in the preferred embodiment as above, the yarn ^ ·, ,, ', is not intended to limit the creation, any familiar with this skill Those who make some changes and refinements without departing from the spirit of this creation should be covered in the scope of this creation. Therefore, the scope of protection of this creation should be attached to the scope of patent application. Makers prevail. [Simple description of the diagram] The first diagram is a block diagram of the creation. Figure 2 is a schematic diagram of the database of the creation. Figure 3 is a schematic diagram of the steps of the creation process (_). Figure 4 is a schematic diagram of the steps of the excerpt (2). Figure 5 is a schematic diagram of the execution architecture of the creation (1). Figure 6 is a schematic diagram of the execution architecture of the creation (2). [Main component symbol description] ....E-commerce trading platform • . _ . Portal website··

10 . 11 · 111 112 113 114 115 12 · 13 . •.··資料庫 •··.使用者資料單元 •··.訊息交流資料單元 •···交易記錄單元 •...儲存單元 •...信用評定單元 ··••安全驗證模組 •···網路傳輸介面 17 M419998 20..............伺服器 30..............使用者终端設備 41..............前端服務裝置 411 .............使用者私有金鑰 412 .............使用者公開金鑰 413 .............使用者數位憑證 51............... ·後端服務裝置 511 .............管理者私有金鑰 512 .............管理者公開金餘 513 .............管理者數位憑證 60 ..............使用者端 61 ..............操作環境介面 611 .............私有區 612 .............共有區 62 ..............上傳資訊單元 63 ..............下載資訊單元 64 ..............編輯處理單元 65 ..............搜尋單元 66 ..............互動訊息單元 70..............虚擬物品單元10 . 11 · 111 112 113 114 115 12 · 13 . •················································································ .. Credit Rating Unit··••Security Verification Module•···Network Transmission Interface 17 M419998 20..............Server 30......... .....user terminal device 41..............front-end service device 411.............user private key 412 ... ..........user public key 413 .............user digital certificate 51............... Backend Service Device 511 .............Manager Private Key 512 .............Manager Opens Jin Yu 513....... ...Manager digital certificate 60 ..............user end 61 ..............Operating environment interface 611 ... ..........Private Area 612 .............Common Area 62 ..............Upload Information Unit 63 ... ...........Download information unit 64 ..............edit processing unit 65 ..............search unit 66 ..............Interactive message unit 70..............virtual item unit

Claims (1)

申請專利範圍: 種非有形商品之電子商務交易平台,包含 之-資訊; —入嘯’提供上傳或下㈣有爾品本身,或者上傳或下 對該財形商品之—需求,或者提供相«非相_非有形商品 —資料庫’用以前該非有形商品本身、該需求及該資訊;The scope of application for patents: an e-commerce trading platform for non-tangible goods, including - information; - entering the whistle of 'providing uploading or lowering (4) having the product itself, or uploading or placing the demand for the financial product - or providing the phase Phase _ non-tangible goods - database 'use the previously non-tangible goods themselves, the demand and the information; β㈣《裝置’並連該諸庫_人口網站,該前端服務裝置 提供安全⑽減觸制者登人魏行_本環境; β後端服務裝置,並賴資料庫與财端服務裝置,該後端服務 裝置提供安全性層級高並_使用者重要麟的環境,· —安全驗賴組,並連該前端服務裝置與該後端服務裝置,該安 全驗證模組提供保護、加密及驗證登人:纽、交易程序及該非有形商 品本身; 飼服器’提供營運該入口網站;及 一網路傳輸介面,提供營運該入口網站。 如明求項1所述之非有形商品之電子商務㈣平台,其中該非有形商品 本身係為自製自創之經驗、知識、智慧、藝術'情報、方法'觀念、即 興創作、獨Η偏方或人文探索,該需求及該資訊絲自製自創之介紹、 廣告或文宣之影、音、文字、隨或應贿式之數位電子檔。 〆項所t之非有形商品之電子商務又易平台,該入口網站係提供 使用者登人、注冊、識別認證、付費上傳、付費下載、付費線上觀看、 個人資訊維護、變更、檔案加解密及認證程序。 19 M419998 4、如請求項1所述之非有形商品之電子商務交易平台,該資料較包含: 預載-使用者資料單元、一訊息交流資料單元,該供應者資料單元及該 需求者資料單元分別連結一交易記錄單元、複數儲存單元及一信用評定 單元,複數儲存單元用以對應儲存該非有載品本身、該需求及該資訊。 5、如請求項1所述之非有形商品之電子商務交易平台,更包含-使用者端, 於該飼服益端操作該前端服務裝置或該後端服務裝置,該使用者端經由 操作I境;I面、上傳^訊單元(upload)、一下載資訊單元 (download)、-編輯處理單元(edit — _ss) ' —搜尋單元㈣咖卜)或一 互動訊息單元(communicate)進行運作。 6、如請求項5所述之非有形商品之電子商務交易平台,其令該操作環境介 面包含-私有區’提供使用者所在位置並用以進行個人設定、上傳合法 之使用者數位憑證,並購f及下賴非有形商品時所需要的暫存空間, 而購貝後先行將該非有形商品存放至該前端服務裝置或該後端服務裝 置之私人空間’使用者可選擇時間、地點或適當的鍺存媒介進行下載。 7如明求項5所述之非有形商品之電子商務交易平台,其中該操作環境介 面包含-共有區,提供使用者所在位置並用以服務各類刊廣告、文宣或 是該需求之上傳(upload)、搜尋(search)、變更與操作(_的,以及各個 使用者間的互動與交流(communicate)。 8、 如請求項i所述之非有形商品之電子商務交易平台,更包含—使用者個 人專業資訊,用以表述使用者所提供非相關該非有形商品且經由審查通 過之專業證明、檢定書或執照的該資訊。 9、 如請求項1舰之非有形邮之電子商務交易平台,其中該後端服務裝 M419998 置係接收註冊用戶之識別資料,並確認識別資料合法後產生一使用者私 有金錄(user private key)及其相對應之一使用者公開金錄(user public key) ’使用者無法直接取得或存取該使用者私有金鑰,必須藉由該伺服 器端對於每一使用者帳戶來對應取得。 10、如請求項9所述之非有形商品之電子商務交易平台’其中該使用者公 開金錄透過專屬的一管理者私有金鑰來簽章並核發一使用者數位憑證 (user CA)予使用者保管,並在下次使用時提供,該使用者數位憑證會由 該後端服務裝置之該管理者私有金錄所產生一管理者公開金錄 (adimmstratoi· public key)或-管理者數位憑證(administrat〇r CA)來加以 簽章並確認其合法性。 如月求項1所述之非麵商品之電子商務交易平台,其中該後端服務 裝置包含—施物品單元’提供婦加值與脑肖費作用。 21β(四) "Devices" and connected to the library _ population website, the front-end service device provides security (10) the system of the touch-offer Wei Wei _ this environment; β back-end service device, and rely on the database and financial services, after The service device provides a security level and a user-critical environment, a security verification group, and the front-end service device and the back-end service device, the security verification module provides protection, encryption and verification. : New Zealand, the transaction procedure and the non-tangible goods themselves; the feeding machine 'provides the operation of the portal; and a network transmission interface to provide the operation of the portal. The e-commerce (4) platform of non-tangible goods as described in Item 1, wherein the non-tangible goods are self-made experience, knowledge, wisdom, art 'intelligence, method' concept, improvisation, singularity or humanity Exploring, the demand and the self-made introduction of the information, the advertisement or the image of the text, the sound, the text, the digital file with or with the bribe. The non-tangible goods of e-commerce are easy to use. The portal provides users with login, registration, identification and authentication, paid upload, paid download, paid online viewing, personal information maintenance, change, file encryption and decryption. Certification process. 19 M419998 4. The e-commerce transaction platform for non-tangible goods as claimed in claim 1, the data includes: a preload-user data unit, a message exchange data unit, the supplier data unit and the demander data unit A transaction record unit, a plurality of storage units and a credit rating unit are respectively connected, and the plurality of storage units are configured to store the non-loaded product itself, the demand and the information. 5. The e-commerce transaction platform of the non-tangible item according to claim 1, further comprising: a user terminal, operating the front-end service device or the back-end service device at the service end, the user terminal operating via I The I side, the uploading unit (upload), a download information unit (download), the edit processing unit (edit — _ss) ' — the search unit (4) coffee) or an interactive message unit (communicate) operate. 6. The e-commerce transaction platform for non-tangible goods as claimed in claim 5, wherein the operating environment interface includes a private area that provides a location of the user and is used for personal setting, uploading a legitimate user digital certificate, and acquiring f And the temporary storage space required for the non-tangible goods, and the non-tangible goods are first stored in the private space of the front-end service device or the back-end service device after the purchase of the user's choice of time, place or appropriate Save the media for download. 7 The e-commerce transaction platform of the non-tangible commodity according to Item 5, wherein the operation environment interface comprises a shared area, providing a location of the user and serving various types of advertisements, advertisements or uploading of the demand (upload) ), search, change and operation (_, and interaction and communication between users. 8. E-commerce trading platform for non-tangible goods as described in claim i, including - user Personal professional information, which is used to express the information provided by the user and is not related to the non-tangible goods and passed the professional certificate, verification certificate or license passed by the examination. 9. If the request item 1 is a non-tangible postal e-commerce trading platform, The backend service installed M419998 is configured to receive the identification data of the registered user, and confirm that the identification data is legal and generate a user private key and one of the corresponding user public key ' The user cannot directly obtain or access the user's private key, and must be obtained by the server for each user account. The e-commerce transaction platform for non-tangible goods described in Item 9 wherein the user's public account is signed and issued a user's personal certificate (user CA) to the user for custody. And provided at the next use, the user digital certificate will be generated by the manager's private account of the backend service device, a manager's public account (adimmstratoi·public key) or - manager digital certificate (administrat〇r CA) to sign and confirm its legitimacy. For example, the non-face commodity e-commerce transaction platform described in Item 1 of the month, wherein the back-end service device includes an application unit to provide a woman-added value and a brain-feeing effect. twenty one
TW100216047U 2011-08-26 2011-08-26 Electronic commerce transaction platform for intangible commodity TWM419998U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW100216047U TWM419998U (en) 2011-08-26 2011-08-26 Electronic commerce transaction platform for intangible commodity

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW100216047U TWM419998U (en) 2011-08-26 2011-08-26 Electronic commerce transaction platform for intangible commodity

Publications (1)

Publication Number Publication Date
TWM419998U true TWM419998U (en) 2012-01-01

Family

ID=46452088

Family Applications (1)

Application Number Title Priority Date Filing Date
TW100216047U TWM419998U (en) 2011-08-26 2011-08-26 Electronic commerce transaction platform for intangible commodity

Country Status (1)

Country Link
TW (1) TWM419998U (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI477977B (en) * 2012-12-19 2015-03-21 Htc Corp Scene-sound set operating method and installation system of portable device and web server
TWI574679B (en) * 2013-06-03 2017-03-21 朱義文 Massage apparatus, system and method for providing massage related services

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI477977B (en) * 2012-12-19 2015-03-21 Htc Corp Scene-sound set operating method and installation system of portable device and web server
TWI574679B (en) * 2013-06-03 2017-03-21 朱義文 Massage apparatus, system and method for providing massage related services
US9813239B2 (en) 2013-06-03 2017-11-07 Osim International Ltd System and method for providing massage related services

Similar Documents

Publication Publication Date Title
JP2022132450A (en) Blockchain-based personal data processing method, computer program, recording medium, and computer device
AU2020204411A1 (en) Information processing network and method based on uniform code sending and sensing access device
US20130290707A1 (en) Information distribution system
US20060170759A1 (en) Methods and apparatus for optimizing digital asset distribution
US20210125282A1 (en) Information Processing Method, Information Processing Apparatus and Non-Transitory Computer-Readable Storage Medium
US20170243216A1 (en) Digital payment processing utilizing encrypted computer networking
JP2020030783A (en) Server device, electronic commerce system, and electric commerce method
US20230118312A1 (en) System and method of promoting and validating a non-fungible token
US20230120534A1 (en) Methods for Conditional Transaction Tokens, Secure Sharing of Token Assets, Wallet Spam Protection, and User Interfaces for Acceptance of Terms
US20230334534A1 (en) Combining online user activity with advertisements for distribution on a decentralized network
JP2014164751A (en) Card, method, and server for circulating digital content off-line
JP2013045460A (en) E-commerce transaction method for intangible merchandise
US20210357892A1 (en) Method and system for purchasing digital media in a secure electronic marketplace
TWM419998U (en) Electronic commerce transaction platform for intangible commodity
JP2023130420A (en) Information processing method, and information processing apparatus
JP7442602B2 (en) Programs, information processing methods, terminals
CN102956016A (en) Electronic commerce trade method for non-tangible goods
JP6844828B1 (en) Information processing method, information processing device, information processing program and recording medium
KR102298668B1 (en) Method for Managing of Marketer Activity of Video/Product Matching Sales
JP2023004074A (en) NFT information management system and NFT information management program
JP7149195B2 (en) Program, information processing device, and information processing method
KR100891492B1 (en) Contents direct - transaction system of member.
JP7260721B1 (en) E-commerce management system for tipping
US20240152580A1 (en) System and method to manage digital assets
JP5775313B2 (en) Point exchange device, computer program for point exchange, point exchange method

Legal Events

Date Code Title Description
MM4K Annulment or lapse of a utility model due to non-payment of fees