Page 266 - Unleashing the potenti al of the Internet of Things
P. 266

3                                     Unleashing the potential of the Internet of Things

            In B2B2C models, a single business corporation can care for both B2B and B2C applications or
            another business  company provides  B2C services  by inter-operation with  B2B applications by  a
            business partnership contract.

            At a vegetable store, a consumer browses vegetables to find better quality goods and his cell phone
            equipped with  an  ID terminal  reads an identifier from  a chosen vegetable to  check the place  of
            origin, harvest date, quality certification, etc. Then he can decide to buy better vegetables with such
            information which is prepared by a contracted business operation between B2B and B2C domains.

            III.4.2  Home delivery service
            This is a kind of postal service. A consumer asks a post office to send a postal package to someone.
            The office affixes an ID tag for delivery control in various transportation networks where many
            transportation agents may be involved with reading and using identifiers for routing decisions for
            proper delivery. That is, identification information is used in a B2B domain.
            The sender reads an identifier from a receipt issued by the post office and checks delivery status for
            the  postal  package.  A  post  man  delivers  the  package  to  a  receiver  and  his  information  terminal
            equipped with an ID terminal reads the identifier from the delivered package and sends a delivery
            confirmation message to the sender.


            III.5   C2C tag-based identification applications and services
            III.5.1  Business card exchange

            The consumer-to-consumer relationship can be realized by an intervention of business domains or a
            direct connection between consumers. It depends on implementations.

            A user terminal may have ID terminal as well as ID tag. That is, it works sometimes as a terminal
            and sometimes as a tag. When a user meets someone for the first time, he aims his terminal at or
            touches it to the other person's terminal to read identification information consisting of identifier,
            name, contact address, etc. Using this process business card information can be exchanged.












































            252      Rec. ITU-T Y.4108/Y.2213 (09/2008)
   261   262   263   264   265   266   267   268   269   270   271