CA2995916A1 - Data exchange processing method, server, terminal device, and online transaction method - Google Patents

Data exchange processing method, server, terminal device, and online transaction method Download PDF

Info

Publication number
CA2995916A1
CA2995916A1 CA2995916A CA2995916A CA2995916A1 CA 2995916 A1 CA2995916 A1 CA 2995916A1 CA 2995916 A CA2995916 A CA 2995916A CA 2995916 A CA2995916 A CA 2995916A CA 2995916 A1 CA2995916 A1 CA 2995916A1
Authority
CA
Canada
Prior art keywords
account
server
certificate
data
request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CA2995916A
Other languages
French (fr)
Inventor
Yi Zhang
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
10353744 Canada Ltd
Original Assignee
10353744 Canada Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 10353744 Canada Ltd filed Critical 10353744 Canada Ltd
Publication of CA2995916A1 publication Critical patent/CA2995916A1/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions

Abstract

A data exchange processing method, server (80, 90), terminal device (100, 110) and online transaction method, said data exchange processing method comprising: a first server generating a first data certificate relating to a target (S10, S20, S30, S50); a device corresponding to a second account receiving the first data certificate according to an agreement so as to acquire a second data certificate information (S11, S21, S31). The second data certificate information is saved within the first data certificate, and comprises at least a first predetermined data value from a first account; the second data certificate is generated in order for the first predetermined data value from the first account to be locked by a second server (80), used for adding the first predetermined data value to the second account when the first account fails to transmit the target to the second account according to the agreement. By means of the described method, it is possible to prevent the wasting of network resources by violating target/data exchange agreements, thereby increasing the efficiency of target/data exchanges.

Description

Title: Data Exchange Processing Method, Server, Terminal Device, And Online Transaction Method [1] [Technical Field]
[2] The present invention relates to the field of Internet data interaction technology, and in particular, to a data interaction processing method, a server, a terminal device, and an online transaction method.
[3] [Background Technology]
[4] With the development of Internet technology and especially mobile Internet technology, users can connect to the Internet through mobile devices using 2G, 3G, 4G or WiFi to conduct transactions and social activities. Users can conveniently and effectively perform online activities, this is an incomparable experience with offline.
[5] However, when users perform transactions such as transaction and social networking via mobile Internet, transaction parties often violate the agreement to cancel the transaction, thus wasting network resources and reducing interaction efficiency.
[6] [Summary of the Invention]
[7] The technical problem mainly solved by the present invention is to provide a data interaction processing method, a server and a terminal device, and generate a corresponding data certificate to ensure the efficiency of data interaction before performing target interaction.
[8] The present invention provides a data interaction processing method, which includes: The First Server generates a first data certificate associated with the target, and the device corresponding to the second account receives the first data certificate according to the agreement to obtain second data certificate information, where the second data certificate information is stored in the data certificate contains at least a first preset data value in a first account; the second data certificate is generated by the Second Server for locking the first preset data value in the first account, and is used to deliver the target to the second user terminal if the device corresponding to the first account fails to deliver the target to the second user account corresponding to the device, the first preset data value is added to the second account.
[9] The present invention also provides a data interaction processing method, including: The First Server generates a first data certificate associated with the target;
the device corresponding to the second account receives the first data certificate according to the i agreement, and delivers a third data certificate establishment request to the third server, where the first data certificate includes the solicitation issuing request includes a second preset data value; the third data certificate establishment request is generated when a device corresponding to the second account responds to the solicitation /
issuing request;
and the Third Server in response to the third data certificate opening request, lock the second preset data value in the second account to generate the third data certificate, and deliver the information of the third data certificate to the Second Server;
wherein the third data certificate is used to increase the second preset data value to the target when the device corresponding to the second account does not accept the target delivered by the device corresponding to the first account according to the agreement in the first account.
[10] The present invention further provides a data interaction processing method applied to a Second Server, where the method includes: receiving, by the Second Server, a second data certificate establishment request delivered by a First Server, where the second data certificate on the first request is delivered when the first data server generates a first data certificate that is associated with the target or the First Server delivers the first data certificate to the second account according to the agreement; and the second data certificate opening request including a first preset data value; and generating the second data certificate in response to the second data certificate opening request locking the first preset data value in the first account, wherein the second data certificate is used for adding the first preset data value to the second account when the device corresponding to the first account does not deliver the target to the second account according to the agreement.
[11] An example of the present invention further provides a data interaction processing method applied to a Third Server. The method includes: receiving, by the third server, an instruction that is delivered when a device corresponding to a second account receives, according to an agreement, a first data certificate delivered by a First Server. Wherein the first data certificate includes an invitation to issue a certificate request, the request for certificate issuing includes a second preset data value; and the third data certificate opening request is generated when the second account responds to the invitation for issuance request; and locking the second preset data value in the second account in response to the request; wherein the third data certificate is used to add the second preset data value to the target of the first account when the device corresponding to the second account does not accept the target delivered by the device corresponding to the first account according to the contract in an account.
[12] The present invention further provides a server, including: a communication module is used to receive a second data certificate opening request delivered by a First Server, where the second data certificate opening request is a request message delivered by the First Server for generating. The first data certificate issued by the First Server or the First Server delivers the first data certificate to the second account according to the agreement; the second data certificate establishment request includes a first preset data value; and the second data certificate generating module is used to generate the second data certificate in response to the second data certificate opening request and lock the first preset data value in the first account; and an executing module is used to respond to the first request unlocking the first preset data value; and also responds to the second request to unlock the first preset data value and deliver the first preset data value to the Third Server associated with the second account, so as to increase the first preset data value to the second account, where the first request is generated when the first server determines that the device corresponding to the first account delivers the target to the device corresponding to the second account according to the agreement; and the second request generates the first Server determines that the device corresponding to the first account does not deliver the object to the device corresponding to the second account according to the agreement.
[13] The present invention further provides a server, including: a communication module, configured to receive a third data certificate establishment request that is delivered when a device corresponding to a second account receives a first data certificate delivered by a First Server according to an agreement; where the first data certificate includes a solicitation contract issuing request, where the solicitation / issuing certification request includes a second preset data value; the third data certificate establishment request is generated when the second account responds to the solicitation / issuing certification request; and a third data certificate generation module is used for locking the second preset data value in the second account in response to the request to generate the third data certificate; and an execution module is used for unlocking the third request in response to the third request. A second preset data value; further used for unlocking the second preset data value in response to a fourth request and delivering the second preset data value to a Second Server associated with the first account to add the second preset data value to the account; wherein the third request is generated when the second account accepts the target according to the agreement; the fourth request is that the First Server determines that the device corresponding to the second account is not in accordance with the contract arises when the goal is accepted.
[14] The present invention also provides a terminal device, including: one or more processors; a memory; a plurality of application programs; and one or more programs, wherein the one or more programs are stored in the memory and used to be executed by the one or more processors, the one or more programs including instructions is used for: the Second Server receiving a second data certificate opening request delivered by a First Server; wherein the second data certificate opening request is delivered when the First Server generates a first data certificate that is associated with the target or the First Server delivers the first data certificate to the second account according to the agreement; the second data certificate opening request includes a first preset data value; and generate the second data certificate in response to the second data certificate opening request locking the first preset data value in the first account; wherein , the second data certificate is used to, when the device corresponding to the first account does not deliver the target to the second account according to the agreement, add the first preset data value to the second account.
[15] The present invention also provides a terminal device, including: one or more processors; a memory; a plurality of application programs; and one or more programs, wherein the one or more programs are stored in the memory and configured to be executed by the one or more processors, the one or more programs including instructions used for:
receiving, by the third server, an instruction that is delivered when a device corresponding to a second account receives, according to an agreement, a first data certificate delivered by a First Server. Wherein the first data certificate includes an invitation to issue a certificate request, the request for certificate issuing includes a second preset data value; and the third data certificate opening request is generated when the second account responds to the invitation for issuance request; and locking the second preset data value in the second account in response to the request; wherein the third data certificate is used to add the second preset data value to the target of the first account when the device corresponding to the second account does not accept the target delivered by the device corresponding to the first account according to the contract in an account.
[16] In the above data interaction processing method, the information of the second data certificate is recorded in the first data certificate associated with the target, and the first data certificate containing the second data certificate information is delivered to the second account that requests the interaction target. The second data certificate is used to add the first preset data value to the second account when the first account does not deliver the target to the second account according to the agreement. Therefore, when the target / data interaction occurs, the first preset data value is not delivered according to the preset interaction target / data, and the network resource is avoided by arbitrarily violating the agreement of the target / data interaction, so as to improve the efficiency of the target / data interaction.
[17] Another object of the present invention is to provide an online transaction method in which records the electronic certificate information used to compensate the other party when the transaction fails, so as to improve the transaction success rate.
[18] The present invention provides an online transaction method including:
First Server generates electronic commitment certificate; wherein the electronic commitment certificate is a network electronic certificate integrated with the required functions of the target commodity / service E-commerce; the device corresponding to the second account receives the electronic commitment certificate as agreed to acquire the first electronic certificate information; wherein the first electronic certificate information is stored in the electronic commitment certificate, and includes at least a first preset amount of a first account; and the first electronic certificate is generated by the Second Server for freezing the first preset amount of funds in the first account and is used for providing the second account with the target commodity / service if the first account does not provide the second commodity according to the agreement account, allocate the first preset amount of funds to the second account.
[19] The present invention also provides an online transaction method, including: First Server generates an electronic commitment certificate; wherein the electronic commitment certificate is a network electronic certificate integrated with the required functions of the target commodity / services electronic commerce; and the second account receives the electronic commitment certificate according to the agreement, and delivers the electronic commitment certificate to the third server wherein the electronic proof of commitment includes a solicitation of an offer for issuance, the solicitation of issuing of a solicitation includes a second preset amount of funds; and the second electronic certificate opening request is responded to by the second account and the third server is used to freeze the second preset amount of funds in the second account in response to the second electronic certificate opening request to generate the second electronic certificate and deliver the second electronic certificate where the second electronic certificate is used to, when the second account does not accept the target commodity / service provided by the first account according to the agreement, deliver the second electronic certificate to the Second Server; the second preset amount of funds is added to the first account.
[20] In the above online transaction method, an electronic certificate is used for a security deposit of the first account and / or the second account is attached to the electronic proof of commitment, and when either party fails to fulfil the agreement, the security deposit is paid to the other party for use to ensure the performance of transactions and protect the interests of both parties. Further, the margin does not need to be paid in advance to each other, nor does it need to be handed over to a third party for safekeeping in advance, which avoids the S

situation that the payer cannot recover the deposit after performing the contract, so as to protect the fair rights and interests of both online transaction parties and promote the development of E-commerce.
[21] [Brief Description]
[22] Figure 1 is a schematic flow chart of a data interaction processing method in a first example of the present invention;
[23] Figure 2 is a schematic diagram of data interaction in an example of the present invention;
[24] Figure 3 is a schematic flowchart of a data interaction processing in a second example of the present invention;
[25] Figure 4 is a schematic flowchart of a data interaction processing method in a third example of the present invention;
[26] Figure 5 is a schematic flow chart of a data interaction processing method in a fourth example of the present invention.
[27] Figure 6 is a schematic flow chart of a data interaction processing method in a fifth example of the present invention.
[28] Figure 7 is a schematic flow chart of a data interaction processing method in a sixth example of the present invention;
[29] Figure 8 is a schematic structural diagram of a server in a first implementation manner of the present invention;
[30] Figure 9 is a schematic structural diagram of a server in a second example of the present invention;
[31] Figure 10 is a schematic structural diagram of a terminal device in a first example of the present invention.
[32] Figure 11 is a schematic structural diagram of a terminal device in a second implementation manner of the present invention;
[33] Figure 12 is a schematic flowchart of an online transaction method in a first implementation manner of the present invention;
[34] Figure 13 is a schematic flowchart of an online transaction method in a second example of the present invention.
[35] [Description of the Preferred Examples]
[36] The technical solutions in the examples of the present invention will be described clearly and completely below with reference to the accompanying drawings in the examples of the present invention. Apparently, the described examples are only a part but not all of the examples of the present invention the way. All other examples obtained by persons of ordinary skill in the art based on the examples of the present invention without creative , efforts shall fall within the protection scope of the present invention.
[37] Please refer to Figure 1, which is a schematic flowchart of a data interaction processing method according to a first example of the present invention. Please refer to Figure 2, a schematic diagram of data interaction is shown. First Server is used to generate, manage, update, and store the first data certificate. The Second Server is associated with the first account and is used to manage the data in the first account. The third server is associated with the second account and is used to manage the data in the second account.
The method flow shown in this example includes:
[38] In step S10, the First Server generates a first data certificate that is associated with the target.
[39] Step 511, the device corresponding to the second account receives the first data certificate according to the agreement to obtain the second data certificate information.
[4o[ Wherein, the second data certificate information is stored in the first data certificate and contains at least the first preset data value in the first account. Where the second data certificate is generated by the Second Server locking the first preset data value in the first account and is used to: when the device corresponding to the first account does not deliver the target to the device corresponding to the second account according to the agreement, the first preset data value is added to the second account.
[41] In an example, the second data certificate is requested by Second Server for First Server while generating the first data certificate. Specifically, the First Server delivers a second data certificate opening request to the Second Server, so that the Second Server generates the second data certificate by locking the first preset data value in the first account in response to the request. Further, the First Server obtains the information of the second data certificate, records the information of the second data certificate in the first data certificate, and publishes the first data certificate over the network for other terminal /
account interaction.
[42] In another example, after the second data certificate is generated by the First Server by the First Server, the device corresponding to the second account generates the first data certificate according to the agreement. That is, the First Server generates the second data certificate after generating the first data certificate and receives the request for obtaining the first data certificate delivered by the second account. The First Server issues the first data certificate through the network. When the second account needs to obtain the target associated with the first data certificate, the First Server delivers an interactive request to the First Server, so that the First Server delivers the second data certificate to the Second Server in response to the interactive request. In response to the request, the Second Server locks the first preset data value in the first account and generates the second data certificate. Further, the First Server obtains the information of the second data certificate, records the information of the second data certificate in the first data certificate, and delivers the first data certificate containing the second data certificate information to the second account.
[43] Specifically, the convention described in step Sll may include a target date, a target interaction rule, and a communication rule. The information of the second data certificate includes at least a first preset data value size, and may further include information of a validity period, a status parameter and a first data certificate, where the first data certificate information may be a name of a target, a data format of a target, and so on.
[44] Further, the device corresponding to the second account further requests the third server to verify the second data certificate according to the second data certificate information. Third Server verifies the second data certificate according to the second data certificate information specifically as follows: The third server verifies whether the information of the second data certificate meets the target requirement, for example, verifying whether the validity period of the second data certificate has expired or whether the status parameter of the Second Server is receivable.
[45] Further, after the third server verifies that the information of the second data certificate meets the target requirement, modifies the state parameter in the information of the second data certificate to the received certificate and delivers the modified second data certificate to the Second Server information. After receiving the modified second data certificate information, Second Server modifies the original second data certificate information stored by Second Server according to the modification content.
[46] In the above solution, the information of the second data certificate is recorded in the first data certificate associated with the target, and the first data certificate containing the second data certificate information is delivered to the second account that requests the interaction target. The second data certificate is used to add the first preset data value to the second account when the device corresponding to the first account fails to deliver the target to the device corresponding to the second account according to the agreement.
Therefore, when the target / data interaction occurs, the first preset data value is not delivered according to the preset interaction target / data, and the network resource is avoided by arbitrarily violating the agreement of the target / data interaction, so as to improve the efficiency of the target / data interaction.
[47] Please refer to Figure 3, which is a schematic flowchart of a data interaction processing method according to a second example of the present invention. The method shown in this example also includes the following steps with respect to the method shown in Figure 1:
[48] In step S22, the First Server determines whether the second account generates a request for rejecting the target according to the agreement. If yes, go to step S23;
otherwise, go to step S24.
[49] Specifically, when determining that the third server verifies that the second data certificate is valid, the First Server determines whether the second account has a request for refusal to accept the target according to the agreement.
[50] In step S23, the First Server requests the Second Server to unlock the first preset data value. Then, the process is over.
[51] Specifically, in this implementation manner, the second data certificate is generated for locking the first preset data value in the first account, and the first preset data value is added to the second account when the device corresponding to the first account does not deliver the target to the device corresponding to the second account according to the agreement. If the second account first generates a request for refusal to accept the target according to the agreement, it is determined that the second account violates the agreement, and the first preset data value does not need to be added to the second account to directly unlock the first preset data value and still save in the first account.
[52] In step S24, the First Server determines whether the device corresponding to the first account delivers the object to the device corresponding to the second account according to the agreement. If yes, go to step S25; otherwise, go to step S26.
[53] In step S25, the First Server requests the Second Server to unlock the first preset data value. Then, the process is over.
[54] In step S26, the First Server requests the Second Server to unlock the first preset data value and deliver the first preset data value to the third server to add the first preset data value to the second account. Then, the process is over.
[55] Please refer to Figure 4, it is a data interaction processing method according to a third example of the present invention. The method and process shown in this example includes:
[56] In step S30, the First Server generates a first data certificate that is associated with the target.
[57] Step S31: The device corresponding to the second account receives the first data certificate according to the agreement to obtain the second data certificate information.
[58] Wherein, the second data certificate information is stored in the first data certificate and contains at least the first preset data value in the first account. Where the second data certificate is generated by the Second Server locking the first preset data value in the first account and is used to: when the device corresponding to the first account does not deliver , the target to the device corresponding to the second account according to the agreement, the first preset data value is added to the second account.
[59] In an example, the second data certificate is requested by Second Server for First Server while generating the first data certificate.
[60] In another example, after the second data certificate is generated by the First Server by the First Server, the device corresponding to the second account generates the first data certificate according to the agreement.
[61] Step S32: The device corresponding to the second account delivers a third data certificate establishment request to the third server. Wherein, the first data certificate includes a solicitation / issuance certification request, and the solicitation / issuance certification request includes a second preset data value. The third data certificate open request is generated by the device corresponding to the second account in response to the request for issuing a certificate.
[62] Step S33: In response to the request, the third server locks the second preset data value in the second account to generate the third data certificate, and delivers the information of the third data certificate to the Second Server.
[63] Further, Third Server also requests Second Server to verify the third data certificate according to the information of the third data certificate.
[64] The third data certificate is used to add the second preset data value to the first account when the device corresponding to the second account fails to accept the target delivered by the device corresponding to the first account according to the contract.
[65] In the present example, while the first account provides a second data certificate that locks the first preset data value, the second account also provides a third data certificate that locks the second preset data value to constrain both the interaction of the target / data. Of course, in other examples, only the first account may provide the second data certificate, or only the second account may provide the third data certificate, and accordingly only the first account or the second account of the target / data interaction may be performed constraint.
[66] In step S34, the First Server determines whether the second account has generated a request for rejecting the target according to the agreement. If yes, go to step S35;
otherwise, go to step S36.
[67] Specifically, when the First Server determines that the Second Server verifies that the third data certificate is valid and the third server validates the second data certificate, it determines whether the second account has a request for rejecting the target according to the agreement.

[68] In step S35, the First Server requests the Second Server to unlock the first preset data value and requests the third server to unlock the second preset data value and delivers the second preset data value to the Second Server to increase the second preset data value to First account. Then, the process is over.
[69] In step S35, since the second account refuses to accept the target according to the contract, the second preset data value in the second account needs to be added to the first account.
[70] In step S36, the First Server requests the third server to unlock the second preset data value, and determines whether the device corresponding to the first account delivers the target to the device corresponding to the second account according to the agreement. If yes, go to step S37; otherwise, go to step S38.
[71] In step S37, the First Server requests the Second Server to unlock the first preset data value. Then, the process is over.
[72] In step S38, the First Server requests the Second Server to unlock the first preset data value and deliver the first preset data value to the third server to add the first preset data value to the second account.
[73] In the above solution, the first preset data value and the second preset data value in the first account and the second account are respectively locked, and the second data certificate and the third data certificate are generated accordingly. When the first account violates the agreement, the first preset data value is added to the second account according to the second data certificate. When the second account violates the agreement, the second preset data value is added to the first account according to the third data certificate. Thus, when either party fails to follow the intended interaction goal / data during the goal / data interaction, the preset data value is added to the other party's account based on the corresponding data certificate.
[74] Further, the second preset data value is divided into the first sub data value and the second sub data value and only the first sub data value is increased when the device corresponding to the second account does not accept the target delivered by the device corresponding to the first account as agreed to the first account.
[75] Further, when it is determined that the device corresponding to the first account delivers the target to the device corresponding to the second account according to the agreement, the Third Server further determines whether the data value that is not locked in the second account is not less than the data value of the target. If so, Third Server delivers the target's data value to Second Server and adds it to the first account. Otherwise, the third server unlocks the second preset data value and delivers the target data value to the Second Server to be added to the first account.

[76] Please refer to Figure 5, which is a data interaction processing method in a fourth example of the present invention, the method shown in this example includes the following steps:
[77] In step S50, the First Server generates a first data certificate that is associated with the target.
[78] Step S51: The device corresponding to the second account receives the first data certificate according to the agreement, and delivers a third data certificate establishment request to the third server.
[79] Wherein, the first data certificate includes a solicitation / issuance certification request, and the solicitation / issuance certification request includes a second preset data value. The third data certificate open request is generated by the device corresponding to the second account in response to the request for issuing a certificate.
[80] Step S52: In response to the third data certificate opening request, the third server locks the second preset data value in the second account to generate a third data certificate, and delivers the information of the third data certificate to the Second Server.
[81] The third data certificate is used to add the second preset data value to the first account when the device corresponding to the second account fails to accept the target delivered by the device corresponding to the first account according to the contract.
[82] Further, the method further includes:
[83] In step S53, the First Server determines whether the second account has generated a request for rejecting the target according to the agreement. If yes, go to step S54.
Otherwise, step S55 is performed.
[84] In step S54, the First Server requests the third server to unlock the second preset data value and delivers the second preset data value to the Second Server to add the second preset data value to the first account.
[85] In step S55, the First Server requests the third server to unlock the second preset data value.
[86] Please refer to Figure 6, which is a data interaction processing method in a fifth example of the present invention. The method shown in this example is applied to a Second Server, and includes the following steps:
[87] In step S60, the Second Server receives the second data certificate opening request delivered by the First Server.
[88] The second data certificate opening request is delivered when the First Server generates the first data certificate that is associated with the target, or the First Server delivers the first data certificate to the second account according to the agreement. The second data certificate opening request includes the first preset data value.

[89] Step S61: Generate a second data certificate in response to the second data certificate opening request for locking the first preset data value in the first account.
[90] The second data certificate is used to add the first preset data value to the second account when the device corresponding to the first account does not deliver the target to the second account according to the agreement.
[91] Further, the Second Server unlocks the first preset data value in response to the first request; unlocks the first preset data value in response to the second request and delivers the first preset data value to a Third Server to add the first preset data value to the second account.
[92] Wherein, the first request is generated when the First Server determines that the device corresponding to the first account delivers the target to the device corresponding to the second account according to the agreement; and the second request determines that the First Server determines that the first device corresponding to the account is not generated when the target is not delivered to the device corresponding to the second account according to the agreement.
[93] Please refer to Figure 7, which is a data interaction processing method in a sixth example of the present invention. The method shown in this example is applied to a Third Server and includes the following steps:
[94] Step S70: The third server receives the third data certificate establishment request that is delivered when the device corresponding to the second account receives the first data certificate delivered by the First Server according to the agreement.
[95] Wherein, the first data certificate includes a solicitation / issuance certification request, and the solicitation / issuance certification request includes a second preset data value. The third data certificate open request is generated by the second account in response to an invitation to issue a certificate.
[96] Step S71: Lock the second preset data value in the second account to generate a third data certificate in response to the request.
[97] The third data certificate is used to add the second preset data value to the first account when the device corresponding to the second account fails to accept the target delivered by the device corresponding to the first account according to the contract.
[98] Further, the third server delivers the third data certificate information to the Second Server associated with the first account, and requests the Second Server to verify the third data certificate according to the third data certificate information.
[99] Further, the third server unlocks the second preset data value in response to the third request; in response to the fourth request, unlocks the second preset data value and delivers the second preset data value to Second Server to add the second preset data value to the first account.
[100] Where the third request is generated when the second account accepts the target according to the contract; and the fourth request is generated when the First Server determines that the device corresponding to the second account fails to accept the target according to the contract.
[101] Please refer to Figure 8, it is a schematic structural diagram of a server in a first example of the present invention. The server 80 includes a communication module 81, a second data certificate generation module 82, and an execution module 83. In this example, the server 80 is a Second Server.
[102] The communication module 81 is used to receive a second data certificate establishment request delivered by the First Server. The second data certificate opening request is delivered when the first data server generates the first data certificate that is associated with the target or the First Server delivers the first data certificate to the second account according to the agreement. The second data certificate opening request includes the first preset data value.
[103] The second data certificate generating module 82 is used to generate a second data certificate in response to the second data certificate opening request for locking the first preset data value in the first account. The second data certificate is used to add the first preset data value to the second account when the device corresponding to the first account fails to deliver the target to the second account according to the agreement.
[104] The execution module 83 is used to unlock the first preset data value in response to the first request; unlocks the first preset data value in response to the second request and delivers the first preset data value to a Third Server to add the first preset data value to the second account.
[105] Wherein, the first request is generated when the First Server determines that the device corresponding to the first account delivers the target to the device corresponding to the second account according to the agreement; and the second request determines that the First Server determines that the first device corresponding to the account is not generated when the target is not delivered to the device corresponding to the second account according to the agreement.
[106] Figure 9 is a schematic structural diagram of a server in a second example of the present invention. The server 90 includes a communication module 91, a third data certificate generation module 92, and an execution module 93. In this example, the server 90 is a Third Server.

[107] The communication module 91 is used to receive a third data certificate opening request that is delivered when the device corresponding to the second account receives the first data certificate delivered by the First Server according to the agreement.
[108] Wherein, the first data certificate includes a solicitation /
issuance certification request, and the solicitation / issuance certification request includes a second preset data value. The third data certificate open request is generated by the second account in response to an invitation to issue a certificate.
[109] The third data certificate generation module 92 is used to lock the second preset data value in the second account to generate the third data certificate in response to the request.
Wherein the third data certificate is used to add the second preset data value to the first account when the device corresponding to the second account fails to accept the target delivered by the device corresponding to the first account according to the contract.
[110] In an example, while the first account provides a second data certificate that locks the first preset data value, the second account also provides a third data certificate that locks in the second preset data value to constrain the target/data interaction. In other examples, only the first account may provide the second data certificate, or only the second account may provide the third data certificate, and accordingly only the first account or the second account of the target / data interaction may be constrained.
[111] The execution module 93 is used to unlock the second preset data value in response to the third request; and further configured to, in response to the fourth request, unlock the second preset data value and deliver the second preset data value to the first account associated Second Server to add the second preset data value to the first account.
[112] Where the third request is generated when the second account accepts the target according to the contract; and the fourth request is generated when the First Server determines that the device corresponding to the second account fails to accept the target according to the contract.
[11 3] Please refer to Figure 10, which is a schematic structural diagram of a terminal device in a first example of the present invention. The terminal device 100 in this example is a Second Server. The terminal device 100 includes a receiver 101, a processor 102, a transmitter 103, a read only memory 104, a random access memory 105, and a bus 106.
[114] The receiver 101 is used for receiving data.
[115] The processor 102 controls the operation of the terminal device 100.
The processor 102 may also be a CPU (Central Processing Unit). The processor 102 may be an integrated circuit chip with signal processing capability. The processor 102 may also be a general purpose processor, a digital signal processor (DSP), an application specific integrated circuit (ASIC), a field programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components. The general purpose processor may be a microprocessor or the processor may also be any conventional processor and so on.
[116] The transmitter 103 is for transmitting data.
[117] The memory may include a read-only memory 104 and a random access memory 105 and provide instructions and data to the processor 102. A portion of the memory may also include non-volatile random access memory (NVRAM).
[118] The various components of the terminal device 100 are coupled together via a bus 106, where the bus 106 may include a power bus, a control bus, a status signal bus, and so on in addition to a data bus. However, for the sake of clarity, various buses are labelled as buses 106 in the figure.
[119] The memory stores the following elements, executable modules or data structures, or a subset of them, or their extensions:
[120] Operation Instructions: Various operation instructions are included for various operations.
[121] Operating System: Includes various system programs for implementing various basic services and handling hardware-based tasks.
[122] In the example of the present invention, the processor 102 performs the following operations by invoking memory-stored operation instructions (the operation instructions may be stored in the operating system):
[123] Receive the second data certificate request from First Server. The second data certificate opening request is delivered when the first data server generates the first data certificate that is associated with the target or the First Server delivers the first data certificate to the second account according to the agreement. The second data certificate opening request includes the first preset data value. And [124] In response to the second data certificate, open the request to lock the first preset data value in the first account to generate the second data certificate. The second data certificate is used to add the first preset data value to the second account when the device corresponding to the first account fails to deliver the target to the second account according to the agreement.
[125] Optionally, the processor 102 is also used to: unlock the first preset data value in response to the first request; unlocks the first preset data value in response to the second request and delivers the first preset data value to a Third Server to add the first preset data value to the second account.
[126] Wherein, the first request is generated when the First Server determines that the device corresponding to the first account delivers the target to the device corresponding to the second account according to the agreement; and the second request determines that the First Server determines that the first device corresponding to the account is not generated when the target is not delivered to the device corresponding to the second account according to the agreement.
[127] Please refer to Figure 11, which is a schematic structural diagram of a terminal device in a second example of the present invention. The terminal device 110 in this example is a Third Server. The terminal device 110 includes a receiver 111, a processor 112, a transmitter 113, a read only memory 114, a random access memory 115, and a bus 116.
[128] The receiver 111 is used for receiving data.
[129] The processor 112 controls the operation of the terminal device 110. The processor 112 may also be a CPU (Central Processing Unit). The processor 112 may be an integrated circuit chip with signal processing capability. The processor 102 may also be a general purpose processor, a digital signal processor (DSP), an application specific integrated circuit (ASIC), a field programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components. The general purpose processor may be a microprocessor or the processor may also be any conventional processor and so on.
[130] The transmitter 113 is for transmitting data.
[131] The memory may include a read-only memory 114 and a random access memory 115 and provide instructions and data to the processor 112. A portion of the memory may also include non-volatile random access memory (NVRAM).
[132] The various components of the terminal device 110 are coupled together via a bus 116, where the bus 116 may include a power bus, a control bus, a status signal bus, and so on in addition to a data bus. However, for the sake of clarity, various buses are labelled as buses 116 in the figure.
[133] The memory stores the following elements, executable modules or data structures, or a subset of them, or their extensions:
[134] Operation Instructions: Various operation instructions are included for various operations.
[135] Operating System: Includes various system programs for implementing various basic services and handling hardware-based tasks.
[136] In the example of the present invention, the processor 102 performs the following operations by invoking memory-stored operation instructions (the operation instructions may be stored in the operating system):
[137] Receive a third data certificate opening request that is delivered when the device corresponding to the second account receives the first data certificate delivered by the First Server according to the agreement. Wherein, the first data certificate includes a solicitation / issuance certification request, and the solicitation / issuance certification request includes a second preset data value. The third data certificate open request is generated by the second account in response to an invitation to issue a certificate.
[138] In response to the request, lock the second preset data value in the second account to generate the third data certificate. Wherein the third data certificate is used to add the second preset data value to the first account when the device corresponding to the second account fails to accept the target delivered by the device corresponding to the first account according to the contract.
[139] Further, the third server delivers the third data certificate information to the Second Server associated with the first account, and requests the Second Server to verify the third data certificate according to the third data certificate information.
[140] Optionally, the processor 112 is also used to execute: unlocking the second preset data value in response to the third request; unlocking the second preset data value in response to the fourth request and delivering the second preset data value to the Second Server associated with the first account to add the second preset data value to the first account.
[141] Where the third request is generated when the second account accepts the target according to the contract; and the fourth request is generated when the First Server determines that the device corresponding to the second account fails to accept the target according to the contract.
[142] Please refer to Figure 12, which is a schematic flowchart of an online transaction method according to a first example of the present invention. The method includes:
[143] In step S120, the First Server generates the electronic commitment certificate.
[144] Wherein, E-commitment certificate is the network electronic certificate that integrates the essential functions of the target commodity/service E-business.
[145] Step S121: The device corresponding to the second account receives the electronic commitment certificate according to the agreement to obtain the first electronic certificate information.
[146] Wherein, the first electronic certificate information is stored in the electronic commitment certificate and includes at least a first preset amount of the first account.
The first electronic certificate is generated by the Second Server freezing the first preset amount of money in the first account and is used for providing the target account to the second account when the first account does not provide the target account / service to the second account according to the agreement. The first preset amount of funds is allocated to the second account.
[147] In one example, the first electronic certificate requests the First Server to generate the electronic commitment certificate for the First Server.
[148] In another example, after the first electronic certificate generates the electronic commitment certificate for the First Server, the device corresponding to the second account generates the electronic commitment certificate according to the agreement.
[149] Specifically, the contract described in step S121 may include a target date, a transaction amount of a target commodity / service, a trading rule, and so on. The information of the first electronic certificate includes at least the size of the first preset amount of funds, and may further include information of the validity period, the status parameter, and the electronic proof of commitment. In this example, the electronic commitment certificate information may be a certificate number, an amount of a target commodity, and so on.
[150] Further, the device corresponding to the second account further requests the third server to verify the first electronic certificate according to the first electronic certificate information.
The third server verifies the first electronic certificate according to the first electronic certificate information specifically as follows: The Third Server verifies whether the information of the first electronic certificate meets the target requirement, for example, verifying whether the validity period of the first electronic certificate has expired or whether the status parameter thereof is a recertification certificate.
Further, after verifying that the information of the first electronic certificate meets the target requirement, the third server modifies the status parameter in the information of the first electronic certificate as received and delivers the modified first electronic certificate message to Second Server.
After receiving the modified first electronic certificate information, Second Server modifies the original first electronic certificate information stored by Second Server according to the modification content. Further, the method also includes the following steps:
[151] In step S122, the First Server determines whether the second account generates a request for rejecting the target! item according to the agreement. If yes, go to step S123; otherwise, go to step S124.
[152] Step S123, requesting the Second Server to unfreeze the first preset amount of funds.
[153] Step S124: The First Server determines whether the first account provides the target! item to the second account according to the agreement. If yes, go to step S125;
otherwise, go to step S126.
[154] In step S125, the First Server requests the Second Server to unfreeze the first preset amount of funds. Then, the process is over.

[155] In step S126, the First Server requests the Second Server to unfreeze the first preset amount of funds and allocate the third amount of funds to the third server, so as to allocate the funds to the second account. Then, the process is over.
[156] Further, in an example, while the first account provides for freezing a first electronic certificate of a first preset amount, the second account also provides a second electronic certificate that will freeze the second preset amount to bind both parties to the transaction.
[157] Specifically, the second account delivers a second electronic certificate opening request to the third server, and the third server, in response to the request, blocks a second preset amount of funds in the second account to generate the second electronic certificate and delivers the second electronic certificate electronic certificate to the Second Server to request the Second Server to verify the second electronic certificate according to the information of the second electronic certificate. The second electronic certificate is used to allocate a second preset amount of funds to the first account when the second account does not accept the target commodity / service delivered by the first account as agreed upon.
Also, the electronic proof of commitment includes an offer for issuing request that includes a second preset amount of money. The second electronic certificate opening request is generated by the second account in response to an invitation to issue a certificate.
Specifically, the second account applies for establishment of the second electronic certificate to Third Server according to the solicitation and issuance information contained in the electronic proof of commitment. That is, the first account records the invitation for offer in advance in the electronic proof of commitment. The solicitation and issuing request includes the information such as the issuing amount, expiration date, receiving bank, collecting account and so on. The second account will be delivered to Third Server directly after obtaining the request for issuing the certificate, no need to fill out the opening content again. Second Server information is included in the solicitation / issuing request. After the third server is issued, the third server can be issued to the Second Server without the need of the second account and then the first account.
[158] Further, when the first account provides a first electronic certificate for freezing a first preset amount and the second account also provides a second electronic certificate for freezing a second preset amount, the first account determines that the second account is generated. The First Server requests the Second Server to unfreeze the first preset amount of money and requests the third server to unfreeze the second preset amount of money and refuses the second preset amount of money to the Second Server. The second preset amount of funds allocated to the first account. When the First Server determines that the second account does not generate a request for rejecting the target / item according to the agreement, the First Server requests the third server to unfreeze the second preset amount of funds. When the First Server also determines that the first account provides the target /
item to the second account according to the agreement, the First Server requests the Second Server to unfreeze the first preset amount of funds. Otherwise, the First Server requests the Second Server to unfreeze the first preset amount of funds and allocates the first preset amount of funds to the Third Server to add the first preset amount of funds to the second account.
[159] Further, when it is determined that the first account delivers the target / commodity to the second account according to the agreement, the Third Server determines whether the amount of the unfrozen funds in the second account is not less than the target / commodity of amount : If yes, funds equal to the target / commodity amount will be allocated to the Second Server, and the funds will be allocated to the first account;
otherwise, the funds of the second preset amount will be unfrozen, the same amount of target /
commodity funds allocated to the Second Server, the funds allocated to the first account.
[160] Further, the second account cancels the transaction by way of a request to First Server for the return of the electronic proof of commit or a request for refund to Third Server. Further, when Third Server pays for the payment with electronic certificate. The refund request may be withdrawal of the electronic certificate request.
[161] Further, the First Server may directly deliver to the third server information that the first account has delivered the target / item to the second account according to the agreement, or may entrust a third party (such as a logistics company, a tenancy registration authority, etc.) to deliver the information.
[162] Of course, in other examples, only the first account may provide the second data certificate, or only the second account may provide the third data certificate, and accordingly only the first account or the second account of the target / data interaction may be constrained.
[163] Please refer to Figure 13, which is a schematic flowchart of an online transaction method in a second example of the present invention. The method includes:
[164] In step S130, the First Server generates the electronic commitment certificate.
[165] Wherein, E-commitment certificate is the network electronic certificate that integrates the essential functions of the target commodity/service E-business.
[166] Step S131: The second account receives the electronic commitment certificate according to the agreement, and delivers a second electronic certificate establishment request to the Third Server.
[167] Wherein, the electronic proof of commitment includes an offer for issuing request that includes a second preset amount of money. The second electronic certificate opening request is generated by the second account in response to an invitation to issue a certificate.
[168] Step S132: In response to the second electronic certificate opening request, the third server may freeze the second preset amount of funds in the second account to generate a second electronic certificate, and deliver the information of the second electronic certificate to the Second Server.
[169] The second electronic certificate is used to add a second preset amount of funds to the first account when the second account does not accept the target commodity /
services provided by the first account as agreed upon.
[170] In the above scheme, the electronic certificate for margin bond with the first account and /
or the second account attached to the electronic proof of promise, when one of the parties fails to perform the agreement, pays a security deposit to the other party to guarantee the transaction fulfilment and safeguard the interests of both parties. Further, the margin does not need to be paid in advance to each other, nor does it need to be handed over to a third party for safekeeping in advance, which avoids the situation that the payer cannot recover the deposit after performing the contract, so as to protect the fair rights and interests of both online transaction parties and promote the development of E-commerce.
[171] In the above examples, the present invention has been exemplary described only, but various modifications to the present invention can be made by those skilled in the area after reading this patent application without departing from the spirit and scope of the present invention.

Claims (20)

    The Claims
  1. [Claim 1] A data interaction processing method, wherein the method comprises:
    First Server generates the first data certificate associated with the target;
    and The device corresponding to the second account receives the first data certificate according to the agreement to obtain the second data certificate information;
    Where the second data certificate information is stored in the first data certificate and includes at least a first preset data value in a first account; and the second data certificate is used by a Second Server to lock the second data certificate in the first account preset data value, and configured to: when the device corresponding to the first account fails to deliver the target to the device corresponding to the second account according to the agreement, increase the first preset data value to the second account.
  2. [Claim 2] The data interaction processing method according to Claim 1, wherein the second data certificate is the information generated by the First Server when the First Server requests the Second Server to generate the first data certificate, or after the First Server generates the first data certificate, the device corresponding to the second account generates before receiving the first data certificate according to the contract.
  3. [Claim 3] The data interaction processing method according to Claim 1, wherein the method also includes:
    The First Server determines whether the second account produces a request to reject the stated goal in accordance with the agreed terms;
    When it is determined that the second account generates the request, the First Server requests the Second Server to unlock the first preset data value;
    otherwise, the First Server determines whether the device corresponding to the first account follows the target is delivered to the device corresponding to the second account;
    When it is determined that the device corresponding to the first account delivers the target to the device corresponding to the second account according to the agreement, the First Server requests the Second Server to unlock the first preset data value; otherwise, the First Server requests the Second Server to unlock the first preset data value and deliver the first preset data value to the third server to add the first preset data value to the second account.
  4. [Claim 4] The data interaction processing method according to Claim 1, wherein the method also includes:
    The equipment corresponding to the second account delivers the Third data certificate to the Third Server to open the request; wherein, the first data certificate contains the invitation to open the card request, and the request for issuing the request contains the second preset data value;
    The third data certificate open request is generated when a device corresponding to the second account responds to the solicitation / issuing request; and In response to the third data certificate opening request, the third server locks the second preset data value to generate the third data certificate, and delivers the information of the third data certificate to the second server; wherein, the third data certificate is used to add the second preset data value to the first target when the device corresponding to the second account does not accept the target delivered by the device corresponding to the first account according to the agreement account.
  5. [Claim 5] -- The data interaction processing method according to Claim 4, wherein the method also includes:
    The First Server determines whether the second account produces a request to reject the stated goal in accordance with the agreed terms;
    When it is determined that the second account generates the request, the First Server requests the Second Server to unlock the first preset data value, and requests the Third Server to unlock the second preset data value, and delivers the second preset data value to the Second Server to add the second preset data value to the first account;
    Otherwise, the First Server requests the third server to unlock the second preset data value, and determines whether the device corresponding to the first account delivers the target to the device corresponding to the second account according to the agreement;
    When it is determined that the device corresponding to the first account delivers the target to the device corresponding to the second account according to the agreement, the First Server requests the Second Server to unlock the first preset data value; otherwise, the First Server requests the Second Server to unlock the first preset data value and deliver the first preset data value to the third server to add the first preset data value to the second account.
  6. [Claim 6] -- The data interaction processing method according to Claim 4 or 5, wherein the second preset data value includes a first sub data value and a second sub data value, and in the device corresponding to the second account. The first sub data value is added to the first account when the target delivered by the device corresponding to the first account is not accepted according to the agreement.
  7. [Claim 7] The data interaction processing method according to Claim 6, wherein when it is determined that the device corresponding to the first account delivers the target to the device corresponding to the second account according to the agreement. The method also includes:
    Third Server determines whether the data value that is not locked in the second account is not less than the data value of the target;
    When the data value that is not locked is not less than the data value of the target, delivering, by the third server, the data value of the target to the Second Server and adding the data value of the target to the first account; otherwise, the third server unlocks the second preset data value and delivers the data value of the target to the Second Server, and adds the data value of the target to the first account.
  8. [Claim 8] A data interaction processing method, wherein the method comprises:
    First Server generates the first data certificate associated with the target;
    The device corresponding to the second account receives the first data certificate according to the agreement and delivers a third data certificate establishment request to the third server, where the first data certificate includes an offer for issuing a certificate, the invitation for certificate issuing request includes a second preset data value; the third data certificate opening request is generated when a device corresponding to the second account responds to the solicitation /
    issuing request; and In response to the third data certificate opening request, the third server locks the second preset data value in the second account to generate the third data certificate, and delivers the information of the third data certificate to the second server; wherein, the third data certificate is used to add the second preset data value to the first target when the device corresponding to the second account does not accept the target delivered by the device corresponding to the first account according to the agreement account.
  9. [Claim 9] The data interaction processing method according to Claim 8, wherein the method also includes:
    The First Server determines whether the second account produces a request to reject the stated goal in accordance with the agreed terms;
    When determining that the second account generates the request, the First Server requests the third server to unlock the second preset data value and delivers the second preset data value to the Second Server, the second preset data value is added to the first account; otherwise, the First Server requests the third server to unlock the second preset data value.
  10. [Claim 10] A data interaction processing method applied to a Second Server, wherein the method includes:
    Receiving, by the Second Server, a second data certificate opening request delivered by the First Server, where the second data certificate opening request is delivered when the First Server generates a first data certificate that is associated with the target, or the First Server deliver the first data certificate to the second account according to the agreement; the second data certificate establishment request includes a first preset data value; and In response to the second data certificate opening request, locking the first preset data value in the first account to generate the second data certificate, where the second data certificate is used to generate the second data certificate in the first account corresponding to the first account when the device does not deliver the target to the second account according to the agreement, the first preset data value is added to the second account.
  11. [Claim 11] A data interaction processing method applied to a Third Server, wherein the method includes:
    Receiving, by the third server, a third data certificate establishment request that is delivered when a device corresponding to the second account receives the first data certificate delivered by the First Server according to an agreement, where the first data certificate includes an invitation for issuing request, where the invite issuing request contains a second preset data value; the third data certificate opening request is generated by the second account in response to the offer issuing request; and The request locks the second predetermined data value in the second account to generate the third data certificate; wherein the third data certificate is used to add the second preset data value to the target of the first account when the device corresponding to the second account does not accept the target delivered by the device corresponding to the first account according to the contract in an account.
  12. [Claim 12] A server, wherein the server includes:
    The communication module is used to receive a second data certificate opening request delivered by a First Server, where the second data certificate opening request is delivered when the First Server generates a first data certificate that is associated with the target, or the First Server deliver the first data certificate to the second account according to the agreement; the second data certificate establishment request includes a first preset data value;
    The second data certificate generating module is used to generate a second data certificate in response to the second data certificate opening request for locking the first preset data value in the first account;
    And An execution module is used for unlocking the first preset data value in response to a first request; and further for unlocking the first preset data value in response to a second request and delivering the first preset data value to a second preset data value associated with the second account. The third server adds the first preset data value to the second account, where the first request is that the First Server determines that the device corresponding to the first account stores the first preset data value according to the agreement when the target is delivered to the device corresponding to the second account, the second server requests the First Server to determine that the device corresponding to the first account fails to deliver the target to the device corresponding to the second account according to the agreement.
  13. [Claim 13] A server, wherein the server includes:
    The communication module is used to receive a third data certificate opening request that is delivered when a device corresponding to the second account receives the first data certificate delivered by the First Server according to an agreement, where the first data certificate includes an invitation for issuing request, where the invite issuing request contains a second preset data value;
    the third data certificate opening request is generated by the second account in response to the offer issuing request;
    A third data certificate generation module for locking the second preset data value in the second account in response to the request to generate the third data certificate; and An execution module to unlock the second preset data value in response to a third request; and to further unlock the second preset data value in response to a fourth request and deliver the second preset data value to a second preset data value associated with the first account associated Second Server to add the second preset data value to the first account, wherein the third request is generated when the second account accepts the target according to the contract, and the fourth request is generated when the First Server determines that the device corresponding to the second account does not accept the target according to the contract.
  14. [Claim 14] A terminal device, wherein the device includes:
    One or more processors;
    Memory;
    Multiple applications; and One or more programs, wherein the one or more programs are stored in the memory and configured to be executed by the one or more processors, the one or more programs include instructions that, which are used for:
    Receiving, by the Second Server, a second data certificate opening request delivered by the First Server, where the second data certificate opening request is delivered when the First Server generates a first data certificate that is associated with the target, or the First Server deliver the first data certificate to the second account according to the agreement; the second data certificate establishment request includes a first preset data value; and In response to the second data certificate opening request, locking the first preset data value in the first account to generate the second data certificate, where the second data certificate is used to generate the second data certificate in the first account corresponding to the first account when the device does not deliver the target to the second account according to the agreement, the first preset data value is added to the second account.
  15. [Claim 15] A terminal device, wherein the device includes:
    One or more processors;
    Memory;
    Multiple applications; and One or more programs, wherein the one or more programs are stored in the memory and configured to be executed by the one or more processors, the one or more programs include instructions that, which are used for:
    Receiving, by the third server, a third data certificate establishment request that is delivered when a device corresponding to the second account receives the first data certificate delivered by the First Server according to an agreement, where the first data certificate includes an invitation for issuing request, where the invite issuing request contains a second preset data value; the third data certificate opening request is generated by the second account in response to the offer issuing request; and The request locks the second predetermined data value in the second account to generate the third data certificate; wherein the third data certificate is used to add the second preset data value to the target of the first account when the device corresponding to the second account does not accept the target delivered by the device corresponding to the first account according to the contract in an account.
  16. [Claim 16] An online transaction method, wherein the method includes:
    First Server generates electronic commitment certificates; wherein the electronic commitment certificates are network electronic certificates integrated with the required functions of the target commodity / services electronic commerce;
    The device corresponding to the second account receives the electronic commitment certificate according to the agreement to obtain the first electronic certificate information;
    Wherein the first electronic certificate information is stored in the electronic commitment certificate, and includes at least a first preset amount of a first account; and the first electronic certificate is a Second Server freezing the first subscription in the first account amount of funds and is used to allocate the first preset amount of funds to the second account when the first account does not provide the second account with the target commodity / service according to the agreement.
  17. [Claim 17] The online transaction method of Claim 16, wherein the method further includes:
    The First Server determines whether the second account produces a request to reject the stated /commodity in accordance with the agreed terms;
    When it is determined that the second account generates the request, the First Server requests the Second Server to unfreeze the first preset amount of funds;
    otherwise, the First Server determines whether the first account is in accordance with the agreement. The target / commodity is provided to the second account;
    The First Server requests the Second Server to unfreeze the first preset amount of funds when it is determined that the first account provides the target / item to the second account according to the agreement; otherwise, the first Server requests the Second Server to unfreeze the first preset amount of funds and allocates the third preset amount of funds to the third server so as to allocate the first preset amount of funds to the second account.
  18. [Claim 18] The online transaction method of Claim 16, wherein the method further includes:
    Sending, by the second account, a second electronic certificate opening request to the Third Server, where the electronic commitment certificate includes a solicitation / issuing request, and the solicitation / issuing certification request includes a second preset amount; and a second electronic certificate opening request is generated by the second account in response to the issuing request;
    and The third server freezing the second preset amount of funds in response to the second electronic certificate opening request to generate the second electronic certificate and delivering the information of the second electronic certificate to the Second Server, the second electronic certificate is used to allocate the second preset amount of money to the second account when the second account does not accept the target commodity / service provided by the first account according to the agreement in an account.
  19. [Claim 19] The online transaction method of Claim 18, wherein the method further includes:
    The First Server determines whether the second account produces a request to reject the stated /commodity in accordance with the agreed terms;
    When it is determined that the second account generates the request, the First Server requests the Second Server to unfreeze the first preset amount of funds and requests the Third Server to unfreeze the second preset amount of funds, and allocate the second preset amount of funds to the second server to allocate the second preset amount of funds to the first account; otherwise, the first server requests the third server to release the second preset amount of funds, and determining whether the first account provides the target / item to the second account according to the appointment;
    The First Server requests the Second Server to unfreeze the first preset amount of funds when it is determined that the first account provides the target / item to the second account according to the agreement; otherwise, the First Server requests the Second Server to release the first preset amount of funds and allocates the first preset amount of funds to the Third Server to increase the first preset amount of funds to the second account.
  20. [Claim 20] An online transaction method, wherein the method includes:
    First Server generates electronic commitment certificates; wherein the electronic commitment certificates are network electronic certificates integrated with the required functions of the target commodity / services electronic commerce;
    The second account receives the electronic commitment certificate according to the agreement, and delivers a second electronic certificate establishment request to the Third Server, where the electronic commitment certificate includes a solicitation / issuing request, and the solicitation / issuing certification request includes a second preset amount; and a second electronic certificate opening request is generated by the second account in response to the issuing request;
    and The third server freezing the second preset amount of funds in the second account in response to the second electronic certificate opening request to generate the second electronic certificate and delivering the information of the second electronic certificate to the Second Server, the second electronic certificate is used to add the second preset amount of money to the second account when the second account does not accept the target commodity / service provided by the first account according to the agreement in an account.
CA2995916A 2015-12-15 2015-12-15 Data exchange processing method, server, terminal device, and online transaction method Pending CA2995916A1 (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2015/097391 WO2017101001A1 (en) 2015-12-15 2015-12-15 Data exchange processing method, server, terminal device, and online transaction method

Publications (1)

Publication Number Publication Date
CA2995916A1 true CA2995916A1 (en) 2017-06-22

Family

ID=59055411

Family Applications (1)

Application Number Title Priority Date Filing Date
CA2995916A Pending CA2995916A1 (en) 2015-12-15 2015-12-15 Data exchange processing method, server, terminal device, and online transaction method

Country Status (2)

Country Link
CA (1) CA2995916A1 (en)
WO (1) WO2017101001A1 (en)

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
RU2222826C2 (en) * 1999-07-06 2004-01-27 Дана Б. ДУНКАН Interactive system and method for concluding transactions
CN104937624A (en) * 2014-03-11 2015-09-23 深圳市银信网银科技有限公司 Online payment system and method
WO2015135121A1 (en) * 2014-03-11 2015-09-17 深圳市银信网银科技有限公司 Online payment system and method, and online payment server
CA3124250C (en) * 2014-09-12 2022-08-02 10353744 Canada Ltd. Electronic certificate-based transaction system
CN104794651A (en) * 2015-04-28 2015-07-22 胡刚 Freezing and unfreezing method and system of auction margin along with bidding behavior

Also Published As

Publication number Publication date
WO2017101001A1 (en) 2017-06-22

Similar Documents

Publication Publication Date Title
US20210287215A1 (en) Resource transfer system
US20220366416A1 (en) Temporary consensus networks in a resource transfer system
Barmouta et al. Gridbank: A grid accounting services architecture (gasa) for distributed systems sharing and integration
US11367072B2 (en) Private networks and content requests in a resource transfer system
US11481771B2 (en) One way functions in a resource transfer system
US20220350658A1 (en) Transfer costs in a resource transfer system
US11386415B2 (en) Hold condition in a resource transfer system
WO2018034828A1 (en) Techniques for transaction management
AU2018201463A1 (en) Online payment
US20160342984A1 (en) Loop transfer in a resource transfer system
AU2022215275A1 (en) Temporary consensus networks in a resource transfer system
US20180152429A1 (en) Systems and methods for publicly verifiable authorization
US20210174350A1 (en) System to enable utilization and movement of digital assets without access to the private key for enabling complex operations
CA3058591C (en) Cross-funds management server-based payment system, and method, device and server therefor
CN112016114B (en) Intelligent contract generating method based on cryptocurrency, related equipment and storage medium
WO2017060816A1 (en) Private networks and content requests in a resource transfer system
Weishaupl et al. gSET: trust management and secure accounting for business in the grid
CA2995916A1 (en) Data exchange processing method, server, terminal device, and online transaction method
CA2987295A1 (en) Payment system based on shared funds-management server, and method, device and server therefor
CA3230041A1 (en) Data exchange processing method, apparatus, and online financing method
CN103268552A (en) Method and system for processing data
Buyya GridBank: A Grid Accounting Services Architecture (GASA) for distributed systems sharing and integration
Li et al. Design of a multiagent-based e-marketplace to secure service trading on the Internet
CA3071368C (en) Lending method, and data interaction processing method, device and system
CA3094228A1 (en) Cross-funds management server-based payment system, and method, device and server therefor

Legal Events

Date Code Title Description
EEER Examination request

Effective date: 20201209

EEER Examination request

Effective date: 20201209

EEER Examination request

Effective date: 20201209

EEER Examination request

Effective date: 20201209

EEER Examination request

Effective date: 20201209

EEER Examination request

Effective date: 20201209

EEER Examination request

Effective date: 20201209

EEER Examination request

Effective date: 20201209