IEC virtual currency
China's Internet of things LCF digital currency has been defined as fraud, pyramid selling and illegal fund-raising. Police in many places gave warning, involving a statement issued by the Rothschild group and a notice issued by the central bank that no digital currency was released
the following is an authoritative media report:
recently, the netizen "Shanshui" received a message about "LCF". He was not sure whether there was any prank, so he sent an article to Weihai evening news
the information is as follows: "LCF Internet of things group, especially the collaborative virtual Internet of things + + integrated platform between the Chinese government and the Rothschild family, is a rich platform for the Chinese people, At present, there is a chance to get points from 1000 to 20000 years ago, 1 LCF gold = 3 yuan
after the preferential period, the number recipient means that he can register as a member. After the successful registration of a member, he can see the free points given by the company on his account. What is the function of integral
points can be issued in shopping, tourism, insurance and other platforms. After the official opening, the platform will connect 50000 shops, 100000 famous and high-quality procts at home and abroad, 100 kinds of ground gas insurance, and 500 boutique tourism routes. Early dividend points, we are zero investment, zero risk, no money yo
the reporter consulted the Economic Investigation Department of Weihai Public Security Bureau, which said that the project has been identified as suspected of illegal pyramid selling and illegal fraud by public security organs in many parts of the country, and its mode of communication conforms to the definition of pyramid selling. The main goal is to lure housewives and elderly people who don't know much about the Internet
< P >. After entering the group, first modify the nickname, report personal information, and brainwash through text, lectures, voice sharing and other ways, and then cheat. The public should be wary of being trapped by this information
extended information:
December 23, Rothschild & amp; Co., one of the world's leading independent financial advisory groups; CO) once again reminded the Chinese public of an informal financing campaign, which calls itself the Rothschild family's LCF project
< P > the fundraising campaign said it was investing in projects related to virtual currency and the Internet of things. Investors should note that informal fund-raising activities are suspected of making fictional and informal connections in the name of Rothschild
according to the information of Rothschild group, this kind of informal financing activity has been spread by strangers on Chinese social media platforms such as wechat, Sina Weibo, Tencent QQ, etc. Initially, the event required the public to www.hlcf586cn.com Register an account and invest in "LCF points"
the website has been closed, but we believe that articles and content related to fund-raising activities are still spread on social platforms. This kind of informal fund-raising is similar to Ponzi scheme, which requires paying dividends in installments according to the time of investors' participation. It is believed that the unofficial fund-raising campaign has been going on all over the country for several months
neither the Rothschild group nor any member of the Rothschild family (also translated as "the Rothschild family") has any relationship with this financing. Rothschild has taken a series of measures to warn the public not to use the name Rothschild for informal financing. The measures taken by Rothschild group include:
1
2. Contact the domain name provider, Tencent, Sina, wechat and other online social platforms, and ask them to close the fund-raising website, delete false publicity information, and control new information
3. Timely inform the relevant regulatory authorities in the mainland and Hong Kong of the latest progress
< P > 4
5. Issued a statement to the Chinese media, once again warned the Chinese public not to believe the informal fund-raising activities in the name of Rothschild
the group will continue to work closely with regulators to deal with this matter. Rothschild group suggests that the Chinese public who have participated in the informal fund-raising activities should contact the local police immediately. Rother strongly recommends that all the public who are encouraged to participate in the informal fund-raising and spread the informal information report to the police
AP Rothschild group's statement on "LCF project of Rothschild family"
qilu.com Weihai police reminds you that "LCF project" is unreliable, please don't believe it
HUAWEI Nova 2 does not support NFC, but it can brush bus cards through Alipay. The steps are as follows:
tools need to be used: HUAWEI Nova 2, Alipay app. P>
1, open HUAWEI Nova 2 mobile phone Alipay, find the function of the card pack, as shown in the following picture:
1. Security mechanism
supports strong security mechanism. It has multi application storage area. The memory (EEPROM or Flash) in the card can be divided into several application areas. Different application areas have different management keys. Users can set different passwords and access conditions according to different applications, which provides technical preparation for the real application of all-in-one card. Multiple authentication system can be set between the card and the read-write machine, which can encrypt the communication data and storage data. Therefore, the security of the card itself is improved, and the security of the whole application system is also improved< When the signal is transmitted from the reader to the card, they transmit the signal through the 13.56MHz RF carrier. When transmitting signals from the card to the read-write device, both transmit signals through molation carrier
the use of this contactless communication protocol enables the reader / writer to read and write the card effectively within the effective range. There is no need to insert or unplug the card, and there is no direction requirement for the card. As long as there is no shield between the card and the reader / writer, the reader / writer can find the card in any state within its effective operation range (such as the card in the bag), which is not only convenient for operation, And the operation speed is greatly improved. Because of the mechanical contact between the non-contact IC card and the reading and writing machine, all kinds of faults caused by the contact reading and writing are avoided, and the wear of the card is also avoided. In addition, the contactless IC card chip is sealed in the card, and the area is small, so there is no need to worry about chip falling off, electrostatic breakdown, bending damage, etc., which improves the reliability of the system. Type A, represented by Mifare technology, has been widely used in the market
3. Anti conflict mechanism
ISO / IEC 14443-3 stipulates the anti conflict mechanism of type A and type B. The principles of the two anti-collision mechanisms are completely different. The former is based on bit conflict detection protocol, while the latter is based on byte, detection and command. The anti-collision mechanism enables the non-contact IC card to carry out parallel operation and data interference. Users with multiple cards do not need to find the correct card. Only algorithm programming is used, and the read-write machine can automatically select the correct card for subsequent operation. In this way, the operation is convenient, the parallelism of the application is improved, and the speed of the system is also improved
it can be seen from the above that contactless IC card is omnipotent, and it has absolute advantages in the application fields that require high security and fast transaction speed, such as small e-wallet application and public transportation system application
fully shows that counterfeiting is only imaginary, and the cost of counterfeiting is too high. Even if you sit all over Guangzhou, it is more than ten yuan. It is not worth taking such risks unless it is too free and too idle.
In April 2008, Heilongjiang Yilin Network Technology Service Co., Ltd., the predecessor of Heilongjiang Yilin Network Co., Ltd., was established in Harbin
in August, the company obtained the qualification of ICP (Internet Information Service) and IDC (Internet Data Center), marking that the company officially launched value-added telecom services
signed a contract with Sohu in November to provide IDC service for online game "Tianlong Babu"< In March 2009, we successfully developed cloud computing, cloud storage system and related supporting software and hardware, becoming the first cloud computing R & D enterprise in Heilongjiang Province
in July, the 7 * 24 * 365 national unified customer service hotlines 4006440451 and 8007220011 were launched to officially launch nationwide business
in March 2010, the company entered the software R & D market and obtained the al soft certification, which indicates that the enterprise has obtained the pass to enter the market and can enjoy the preferential policies of the national software instry
in September, ISO9001 quality management system certification was passed, and the green channel to open the international market was obtained
in December, we signed a contract with ku6.com to provide IDC services and become a long-term partner of ku6.com
in February 2011, he was honored as the director unit of Heilongjiang Communication Instry Association, and the company participated in the development of service standards of communication instry
in March, he was honored as the director of Heilongjiang Internet association, which played a positive role in promoting the healthy, orderly and rapid development of Internet instry in Heilongjiang Province
in July, the company obtained the qualification of "national high tech enterprise", which represents that the company has been affirmed and recognized by the state in terms of software R & D and overall technical level
in August, he undertook the construction of "Internet resource management" project and was selected as the national Torch Program project
participated in Heilongjiang excellent Internet application competition in September and won the best business model award
in November, Hainan Hong Kong and Macao Information Instry Co., Ltd. was signed to become its IDC resource supplier in Heilongjiang Province
in January 2012, the company won the title of "double excellent unit of public satisfaction, quality and integrity", which indicates that the company's service concept of "emphasizing quality and keeping integrity" has been affirmed and recognized by the public
in the same month, he attended the 6th annual ceremony of China's IDC instry, and concted in-depth discussions on the development of cloud data center and application innovation in the cloud era
in April, the number of independent intellectual property rights of the company increased to 13, among which the "authenticity verification management system and operation management system of access service providers" were used by Heilongjiang Provincial Communication Administration
in June, it won the title of excellent software enterprise in software and information service instry of Heilongjiang Province from 2001 to 2011, and Yilin data software procts passed the verification and application of the majority of users and were recognized
in July, we called for the establishment of Heilongjiang cloud computing association to participate in the development of Heilongjiang cloud computing instry standards
in August, he undertook the construction of "cultural instry science and technology innovation information service management system", and was selected as the national science and technology support plan project
in September, it was identified as "Harbin cloud computing service enterprise" and became the first batch of cloud computing service enterprises in Heilongjiang Province
in October, he became Vice President of Harbin service outsourcing Association and engaged in information technology outsourcing (ITO) business
in October, it was awarded the title of "three good units of quality, reputation and satisfaction in 2012" by Heilongjiang quality supervision and Inspection Association
in April 2013, the computer room construction of China Cloud Valley BGP multi line data center (Harbin saida Technology Development Co., Ltd.) was started
in May, it was restructured into a joint stock limited company and renamed "Heilong Yilin Network Co., Ltd."
in September, the day exchange was officially listed, becoming the only high-tech enterprise listed on the day exchange in Heilongjiang Province
in October, China Cloud Valley BGP multi line computer room was put into use, which is the first green open multi line data center in Heilongjiang Province
in December, it was approved to set up Heilongjiang Digital Media Engineering Technology Research Center, which will become the research and development base of new interactive digital entertainment technology in Heilongjiang Province
in December, Yilin data obtained ISO27001 information security management system international standard certification, which indicates that Yilin data has reached the international standard requirements in quality and information security management system construction and implementation
in January 2014, we visited children's welfare homes and poor families in the community, and actively participated in social activities of offering love
in April, the company obtained the network culture business license, and obtained the qualification of using information network to operate game procts (including online game virtual currency issuance)
in May, the construction of the company's points exchange mall was completed and officially launched, marking the official launch of the company's points exchange gift scheme
won the title of "youth civilization" in July, and the company was recognized by Heilongjiang provincial Party committee in practicing the socialist core values
visit freebit in August to learn advanced technology and management experience
in the same month, I participated in the first national special technical training course on website filing security management of access service providers to learn professional knowledge of filing
attended the China Internet Conference in September to discuss business with Internet instry enterprises and promote investment promotion in Heilong Province
in September, he participated in the establishment of Hanan chamber of Commerce for cultural and creative instries, served as vice president of the chamber, and presided over the branch work of new media instry chamber of Commerce; At the same time, we will discuss with Hanan enterprises such issues as lack of development funds, difficulty in retaining creative talents and instrial upgrading
signed a strategic cooperation agreement with China Mobile on Internet and IDC server hosting business in October
in November, he attended Shenzhen high tech fair, participated in project matching negotiation and talent instry docking exchange, and clarified the R & D direction of new technology and new procts of the company
in December, he attended the launch ceremony of Hongtai foundation and discussed cooperation issues in related fields of mobile Internet applications
in December, the company obtained ISO / IEC 20000-1:2001 international certification of information technology service management system, which strengthened the company's information technology service management
The definition of Microsoft C + + language is mainly inherited from C and C + +, and many elements in the language also reflect this. C + + has more options for designers to inherit from C + + than Java (for example, struts). It also adds its own new features (for example, source code version definition). But it is still too immature, It's impossible to crush Java. C#needs to evolve into a language that developers can accept and adopt. It's also worth noting that Microsoft is making a big impact on this new language. At present, everyone's response is that it's a counterattack against Java.
c#is more like Java, although Microsoft keeps silent on this issue. This is also expected, I think, Because of Java's recent success, companies using java report that they are more proctive than C + +. Intermediate code
Microsoft leaves a lot of room for users to choose when MSIL should be compiled into machine code, It also understands that many, if not most, programmers think that Java programs are inevitably slower than anything written in C. This implementation mode determines the program based on MSIL, Managed C + +, a CLS compliant version of C + +, will outperform interpretive java code in performance. Of course, it needs to be proved, because C # and other compilers that generate MSIL have not been released yet. However, the popularity of Java JIT compilers makes Java and C # relatively the same in performance, Java's intermediate code and MSIL are both intermediate assembly languages, which are compiled into machine code at runtime or other times.
declaration in the namespace
when you create a program, You create one or more classes in a namespace. You can also declare interfaces, enumerate types and structs in the same namespace (outside the class). You must use the using keyword to refer to the contents of other namespace.
basic data types
C # has more data types than C, C + + or Java. These types are bool, byte, ubyte, short, USHORT, Int, uint, long, ulong, float, double, and decimal. Like Java, all these types have a fixed size. Like C and C + +, each data type has two types: signed and unsigned. The same as Java, a character variable contains a 16 bit Unicode character. The new data type of C is the decimal data type. For currency data, the, It can hold 28 decimal digits.
two basic classes
a class named object is the base class of all other classes. A class named string is also a part of the language like object. Being a part of the language means that the compiler may use it - no matter when you write a quoted string in a program, The compiler creates a string object to hold it.
parameter passing
methods can be declared to accept variable parameters. The default parameter passing method is to pass values to basic data types. The ref keyword can be used to force a variable to pass by reference, which makes a variable accept a return value. The out keyword can also declare a reference passing process, Different from ref, it indicates that this parameter does not need an initial value.
integration with com
the biggest selling point of C # for windows programs may be its seamless integration with com, which is Microsoft's Win32 component technology; The generated class can also be used as a COM component, and then can be used again. For example, JScript language subclasses it to get a third COM component. The result of this phenomenon is the generation of a running environment, in which the components are network services, You can subclass with any. Net language.
index subscript
an index is similar to an attribute except that it does not use the attribute name to refer to a class member, but uses a number in square brackets to refer to it anonymously (just like an array subscript).
public class listbox: control
{
private string [] items< br />public string this[int index]
{
get
{
return items[index];< br />}
set
{
items[index] = value;< br />Repaint();
}
}
}
you can use a circulator to refer to the inner array members of a string anonymously, as follows:
listbox listbox =< br />listBox[0] = hello;< br />Console.WriteLine(listBox[0]);
proxy and feedback
a proxy object contains the information needed to access a specific method of a specific object. Just think of it as a smart method pointer. A proxy object can be moved to another place, A feedback method is a special case of proxy. The event keyword is used to declare a method that will be called as a proxy when an event occurs. C sharp is a new programming language released by Microsoft in June last year, C # is the latest achievement of Anders Hejlsberg, a researcher at Microsoft. C # seems to have amazing similarities with Java; It includes such things as single inheritance, interface, almost the same syntax as Java, and the process of compiling into intermediate code and running again. However, C # is obviously different from Java. It draws on a feature of Delphi, and is directly integrated with com (component object model), and it is the protagonist of Microsoft's.net windows network framework.
Microsoft's C # language definition is mainly inherited from C and C + +, Many elements in the language also reflect this point. C # is more extensive than Java in the optional options that designers inherit from C + + (for example, structs). It also adds its own new features (for example, source code version definition). But it is still too immature, It is impossible to crush Java.C# and evolve into a language that developers can accept and adopt. Microsoft's current momentum for its new language is also noteworthy. At present, the response is: This is a counterattack to Java.
C++, which is usually read in the Chinese mainland programmers circle as "C plus", while western programmers usually read "C plus plus". It is a widely used computer programming language. C + + is a general programming language with static data type checking and multiple programming paradigms. It supports programming, data abstraction, object-oriented programming, generic programming and other programming styles
Dr. W: en: Bjarne Stroustrup of Bell Labs invented and implemented C + + (originally known as "C with classes") in the 1980s. At the beginning, C + + appeared as an enhanced version of C language. From adding classes to C language, new features were constantly added. Virtual function, operator overloading, multiple inheritance, template, exception, RTTI and name space are graally added to the standard. In 1998, ISO issued the international standard ISO / IEC 14882-1998 for C + + programming language. Unfortunately, e to the complexity of the C + + language and its long evolution, only a few compilers have fully complied with this standard until now (2004)
in addition, as far as learning C + + is concerned, it can be considered as an independent language; He does not rely on C language, we can not learn C language, and directly learn C + +. According to the book thinking in C + +, the efficiency difference between C + + and C is usually between plus and minus 5%. So some people think that C + + can completely replace c language in most cases
the development of C + + language can be divided into three stages: the first stage is from 1980s to 1995. At this stage, C + + language is basically the object-oriented language on the traditional type, and with the efficiency close to C language, it occupies a considerable share in the development language used in the instry; The second stage is from 1995 to 2000. Due to the emergence of standard template library (STL) and later boost, generic programming takes up more and more proportion in C + +. Of course, at the same time, e to the emergence of Java, C # and other languages and the large-scale decline of hardware prices, C + + has suffered a certain impact; The third stage from 2000 to now, e to the emergence of proction programming and template meta programming represented by Loki, MPL and other libraries, C + + has a new peak in the history of development. The emergence of these new technologies and the integration with the original technology make C + + become the most complex one of the main stream programming languages. There is nothing in the world that affects programmers more than programming tools. VC, VB, Delphi, Java... These dazzling names not only occupy the lives of programmers, but also seem to have become a belief. However, with the pace of the new century, these beliefs once again encounter a major challenge. Microsoft, a lion who is tired and annoyed by judges and hackers, vowed to keep its crown, made every effort, and put forward its housekeeping skills -. Net strategy. As the core development language of. Net, C # emerges naturally. Programmers also have to make a painful choice, with whom? To find out, we have to make a comparison and prediction. As a senior programmer, I dare to talk wildly here and have the right to throw a brick to attract jade
if we put aside all the non-technical factors, C # is undoubtedly the best programming language ever on the planet. It concentrates almost all the latest achievements in software development and software engineering research. Object oriented, type security, component technology, automatic memory management, cross platform exception handling, version control, code security management... You can't find all these features in another language. Although as many people have noticed, when I list the above features, it always reminds people of Java, but C # does go further. But the reality is that non-technical factors often determine the future of a proct. Especially in the history of computer software, procts with excellent technology, such as OS / 2, Mac OS, UNIX, etc., are defeated by windows. This time, the role of Microsoft seems to have changed from an unarmed revolutionary to a bullying old landlord. If things are really going to change, isn't this child born in the wrong way? Maybe the situation is not so bad. After all, a skinny camel is bigger than a horse, and C # has been submitted to a standardization organization. Once it becomes an international standard, it's hard to say whether there is a real itchy hero (or Microsoft itself) who will transplant it to Linux and other platforms. In that case, Java will be miserable. Because the users of Java are mainly developers of network services and embedded device software, embedded device software is not the place where c#can be used, and in terms of network services, c#'s instant compilation and local code cache scheme has absolute performance advantages over Java virtual machine. What's more, once c#becomes an image
The bin number is the bank identification number
bin is represented by 6 digits and appears in the first 6 digits of card number, which is assigned by international organization for Standardization (ISO) to all bank card organizations engaged in inter-bank transfer exchange. The card number of a bank card is the number that identifies the information of the issuing institution and the cardholder. It consists of the following three parts: the identification code of the issuing bank (bin number), the user-defined bit of the issuing bank, and the verification code
generally, there are the following information on the face of the credit card:
front: name and identification of the issuing bank, credit card type (organization identification) and holographic anti-counterfeiting mark, card number, English or Pinyin name, start date (generally calculated to month), effective date (generally calculated to month), and chip is attached on the front of the latest issued card, Chip account and card magnetic stripe account are two relatively independent accounts
back: card magnetic stripe, cardholder's signature column (signature is required after activation), service hotline, the last four digits of the card number or all of the card numbers (to prevent false use), credit card security code (on the signature column on the back of the credit card, the three digits immediately after the last four digits of the card number are used for credit card activation, password management, TV Telephone and Internet transactions, etc.)
extended information:
characteristics of credit card:
do not encourage cash deposit, consume before repayment, enjoy interest free repayment period, self repayment in installments (with minimum repayment amount), join visa, master card, JCB and other international credit card organizations for global use
is one of the fastest growing financial businesses, and it is a kind of electronic currency that can replace the traditional cash flow in a certain range
it has two functions of payment and credit at the same time. Cardholders can use it to buy goods or enjoy services, but also through the use of credit cards from the card issuing institutions to obtain certain loans
is a high-tech proct integrating financial business and computer technology. It can rece the use of cash currency, provide settlement services, facilitate shopping and consumption, and enhance the sense of security. It can simplify the collection proceres and save social labor. It can promote commodity sales and stimulate social demand
< UL >< / UL >
source: Internet credit card
the new generation of Internet of things (hereinafter referred to as "Internet of things") is the second set of computer communication network system in the world, which can run the Internet globally, It has been developed and applied by many institutions in China for more than 20 years. China has built one female root and 13 main roots (N-Z roots) of the Internet of things, and has begun to provide IP addresses to the world, and can comprehensively address and resolve domain names, so as to realize cross-border, cross language and cross system communication
on December 4, 2014, after years of competition and gaming among countries in the world, ISO / IEC International Standards Organization officially confirmed in its international standards for the future network (GB weiwaihan [2014] No. 46): China will lead the formulation of core standards such as naming and addressing and security for the future network, and China will own the core intellectual property rights. At present, the new generation Internet of things in China is the only computer communication network that meets the "international future network standard", representing the development direction of the new generation Internet. It is worth noting that English has only 26 letters, which are occupied by 13 root servers in China and the United States (index of initials), making it difficult to proce a third computer communication network system in the world
the new generation Internet of things abandons the underlying structure and defects of the traditional Internet. The basic length of its web address is 256 bits (reserved to 1024 bits), of which 128 bits are reserved for Internet compatibility. In fact, 2 ^ 128 effective web addresses are added, which can meet the needs of the future 700 years. In the future, the reserved website will be used for space migration. The Internet of things adopts new technologies such as authentication before communication and address encryption to effectively solve the security architecture defects of the Internet<
(application scenario diagram of the new generation of Internet of things)
the new generation of Internet of things has truly realized the Internet of things (IOT), which can assign a dedicated static IP address to live things and can be resolved and connected through the network; It can also assign an exclusive Internet of things code (RFID tag) to the uncharged things, which can be decoded and queried through the network. We can understand the Internet of things coding as a simple IP address, which corresponds to a string of simple text information chain. For example, if consumers scan the Internet of things code of an apple, they will be able to display the information chain related to the apple, such as planting, fertilization, picking, packaging, selling price, delivery, transportation, signing in, buyer, relevant date, etc. Some manufacturers claim that they have developed iots without IP address. These are all pseudo iots. The principle is to build a communication system similar to chat group, assign a number to each device, and connect things by adding friends. These pseudo iots can only run in their own software systems, and once they cross systems, they cannot be interconnected
the construction and use of the Internet of things in China can not only save huge Internet usage fees, but also export more cost-effective Internet of things services to the world, enter the most valuable field of the Internet and obtain huge economic benefits. With the construction and use of the Internet of things, China will be able to greatly speed up the network, rece costs, benefit the people and enterprises, and greatly promote the vigorous development of China's network application market and related instries
because the Internet is virtual, it is extremely easy to be used for criminal activities and network attacks. In recent years, the use of Internet virtual features for fraud incidents emerge in endlessly. In addition, according to the sampling test of China's national Internet Emergency Center, in 2011, nearly 50000 overseas IP addresses were used as Trojan horse or botnet control servers, participating in the control of nearly 8.9 million hosts in China, of which more than 99.4% of the accused hosts originated in the United States. The new generation of Internet of things can effectively crack down on Telecom fraud and resist network attacks through new technologies such as authentication before communication and network address encryption. In the future, the key applications of digital economy (such as national digital currency) based on blockchain technology are still supported by the new generation of Internet of things
so far, the new generation of Internet of things has been fully prepared in terms of system technology, intellectual property rights, international standards, national policies, software and hardware, and service capabilities. A new generation of IOT business platform has been implemented, and it has begun to provide root services, IP address distribution, domain name resolution and other underlying network services for commercial IOT.
? Sven published in 2006-4-15 16:13:00
Introction
with the full popularity of the Internet, e-commerce based on the Internet has also emerged, and has achieved great development in recent years, becoming a new business model, which is considered as a new economic growth point by many economic experts
as a new business model, it has a great future. At the same time, this e-business model puts forward higher requirements for management level and information transmission technology, and the construction of security system is particularly important. How to establish a safe and convenient e-commerce application environment to provide sufficient protection for information is a topic of great concern for businesses and users. Security has become the core of e-commerce. This article will make a basic discussion on the security of e-commerce
1 e-commerce model
modern e-commerce technology has focused on the establishment and operation of online stores. There is no difference between online store and real store in department structure and function. The difference lies in the way of realizing these functions and structure and the way of business operation
the online store is a special web server from the perspective of the front desk. The multimedia support and good interaction function of modern web site become the foundation of building this kind of virtual store, which enables customers to push the shopping cart to select goods like in a real supermarket, and finally check out at the checkout counter. This also constitutes the three pillars of online store software: proct catalog, customer shopping cart and payment desk. A good catalog can make customers find the procts they need in the simplest way, and fully understand all kinds of proct information through text description, image display, customer comments, etc; Shopping carts connect stores and indivials. Customers can either put their favorite procts one by one in the shopping carts or take them out of the shopping carts until the final payment; Payment desk is not only the final link of network transaction, but also the most critical link. Customers must be safe and reliable for both customers and stores when they use some kind of electronic currency to trade with the store
in the United States, online stores must meet three conditions for collecting credit cards:
1) they need to establish a commercial account in a commercial bank in the United States. This account allows you to receive credit card payments and process credit card business, and ultimately obtain funds
2) it is necessary to provide direct commodity buyers with an SSL compliant encryption site for them to submit their credit card information safely. While ensuring the accuracy and reliability of the information they submit, it is also necessary to ensure that the information will not be stolen by a third party. Through cooperation with VeriSign, the largest CA center in the United States, the United States and China Tonglian have established such an encrypted site that users can highly trust to serve customers
3) the credit card information provided by the buyer will be directly sent to the professional company (payment gateway) which provides the credit card service for processing. They will verify the credit card, transfer the money, and finally transfer the money to the commercial account. Cybercash, the partner of Zoomlion, is also the most famous online payment provider in the United States. It can not only provide visa, MasterCard service business, but also provide American Express, discover and other credit card payment and digital cash, digital coins, smart card and other electronic currency settlement methods
behind the online store, the enterprise should first have the goods storage warehouse and management organization; Secondly, the procts sold on the Internet should be delivered to customers by post or other channels; Third, enterprises should also be responsible for the after-sales service of procts, which may or may not be provided through the network
online trading is usually a kind of shopping mode of paying first and then taking the goods. For customers, the convenience lies in that the purchased goods will be delivered directly to their own home, and it is difficult to be assured that they can not confirm what they are holding before the goods arrive. Therefore, the reputation and service quality of online stores are actually the key to the success of e-commerce
necessary conditions for an online store:
store name: it is like a registered trademark, which is called a domain name on the Internet. It is unique in the whole online world. A network name associated with your company name can make it easier for customers to remember your store
store location: that is to say, the address of the network server where you open your store. With high-speed network connection, it is like opening a store in a downtown area. Customers can arrive quickly and easily, which is very important to customers
shop decoration: the design of the website is naturally very important to users. A moving web page is like a first-class shopping mall, which not only attracts customers, but also increases their confidence
goods placement: in online stores, it is reflected in how to establish the catalog structure of goods, what website navigation and search functions are provided, so that users can quickly and conveniently find the goods and related information they need
shopping cart: convenient and smart shopping cart can make customers feel good service and increase their confidence. It is the key link between goods and payment desk
currency settlement: payment system is an important part of network transaction. In the United States and Europe, credit card has become the most common way of electronic transactions. By providing the necessary personal credit card information, stores can settle accounts with customers through the bank computer network. This is also a necessary condition for the establishment of online stores. Moreover, the safety and reliability of currency settlement is not only related to the vital interests of customers, but also directly related to the safety and reliability of your business operation
proct inventory update: daily maintenance of online stores, such as removing sold out procts and placing new procts, is a business that must be carried out frequently
inventory management: logistics guarantee is the basis of any business operation. No matter the online store or the real store, the goods and money are equally real, and the storage and management of inventory goods are equally real
final delivery of goods to users: online shopping is actually mail order. The last step is naturally to deliver the goods to the end users quickly and reliably through postal or other systems< After sales service: it goes without saying that this is also an important part of modern commodity sales. And network technology can provide users with 24-hour uninterrupted service, which is one of the advantages of online stores. Usually, online stores also provide a 30 day return / exchange commitment
therefore, when an enterprise enters the field of e-commerce, it must consider the following questions:
how to apply for its own domain name? How to set up an e-commerce server? How does the server connect to the Internet? How to design this online store and realize various functions? Who will design it? Who will maintain this website? How to realize online transaction? How to settle online electronic currency safely and reliably? How to coordinate online store and commodity inventory? How to deliver goods to users quickly and conveniently? How to carry out after sales service<
2 the key link in the development of e-commerce
2.1 good network environment
e-commerce is developed on the telecommunication network. Therefore, advanced computer network infrastructure and loose telecommunications policy become the premise of the development of e-commerce. At present, the high price of telecommunication service, limited bandwidth, untimely or unreliable service and other factors have become the constraints for the development of e-commerce. Speeding up the construction of telecommunication infrastructure, breaking the monopoly of telecommunication market, introcing competition mechanism, ensuring fair competition of telecommunication business, promoting network interconnection, and providing users with cheap, high-speed and reliable communication services are the construction goals of a good network environment, and are also common issues faced by all countries in the world
China's telecom business has been affected by the planned economy for a long time, and the monopoly situation has not been broken. In recent years, with the rapid development of the Internet, the contradiction between the Telecom Policy and the situation has become increasingly prominent. The main performance is as follows:
the price of ISP's leased line is too high, which makes them unprofitable. A number of ISPs that entered this field in the early stage have withdrawn e to losses
the interconnection between ISP and telecommunication network has met with resistance from telecommunication department. The interconnection cost is too high, and it is difficult for ISP to use various excuses
e to the monopoly of access services by the telecommunications sector, the user access costs are too high to bear. We can't choose a good service provider< In order to promote the opening of telecommunication market and coordinate the telecommunication policies of all countries in the world, the WTO successfully concluded the basic telecommunication agreement in 1997. The agreement will ensure competition in the global telecommunications market and strengthen cooperation between countries
2.2 public e-commerce shopping guide platform
public e-commerce shopping guide platform is the physical guarantee to ensure the smooth completion of online e-commerce activities. It mainly involves the construction of network platform and enterprise information database. The transaction information that people send to the network must be accurately and quickly transmitted among suppliers, distributors, management departments, banks, transportation and other departments, which requires all countries and departments to unify the standards and protocols of information storage, communication and processing, and have a coordinated shopping guide platform. At the same time, the construction of commodity information database is the foundation of the platform. Without the commodity information database consistent with the platform standard, e-commerce will lose the foundation of survival. At present, only a few enterprises, mainly information technology enterprises, have established enterprise commodity information database, which slows down the construction of public electronic commodity shopping guide platform in China
2.3 enterprise e-commerce system
enterprise e-commerce is the foundation of e-commerce system. Today, with the rapid development of science and technology and the rapid change of economic situation, people no longer proce first and then look for the market, but obtain market information first and then organize proction. With the advent of the era of knowledge economy, information has become the basis of leading the global economy. Enterprise internal information network: intranet is a new infrastructure for enterprise internal information management and exchange. It inherits the previous MIS achievements in network, transaction processing and database, and introces the Internet communication standard and WWW content standard in software. With the rise of Intranet, the closed and single system MIS is transformed into an open, easy-to-use, efficient and colorful enterprise information network. Enterprise information network should include proction, proct development, sales and marketing, decision support, customer service and support and office affairs management. For large enterprises, we should also pay attention to the construction of internal scientific and technological information database, such as the construction of various databases for technological innovation, new proct development, scientific and technological archives, scientific and technological books, scientific and technological papers, scientific and technological achievements, energy consumption, raw and auxiliary materials, etc. Of course, we have to choose some professional networks and local networks
2.4 security authentication system
the most prominent problem in developing e-commerce is to solve the security problems in online shopping, trading and settlement, including the establishment of trust between e-commerce entities, that is, the establishment of security authentication system (CA); Select security standards (such as set, SSL, PKI, etc.); Encryption, decryption and encryption are adopted