CA2998543A1 - Processing method for obtaining target data, server, and online financing method - Google Patents
Processing method for obtaining target data, server, and online financing method Download PDFInfo
- Publication number
- CA2998543A1 CA2998543A1 CA2998543A CA2998543A CA2998543A1 CA 2998543 A1 CA2998543 A1 CA 2998543A1 CA 2998543 A CA2998543 A CA 2998543A CA 2998543 A CA2998543 A CA 2998543A CA 2998543 A1 CA2998543 A1 CA 2998543A1
- Authority
- CA
- Canada
- Prior art keywords
- data
- terminal
- server
- certificate
- target
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/322—Aspects of commerce using mobile devices [M-devices]
- G06Q20/3223—Realising banking transactions through M-devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0635—Risk analysis of enterprise or organisation activities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3821—Electronic credentials
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0279—Fundraising management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping [e-shopping]
- G06Q30/0609—Buyer or seller confidence or verification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/06—Asset management; Financial planning or analysis
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Strategic Management (AREA)
- Finance (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Development Economics (AREA)
- Human Resources & Organizations (AREA)
- Entrepreneurship & Innovation (AREA)
- Economics (AREA)
- Marketing (AREA)
- Game Theory and Decision Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Operations Research (AREA)
- Technology Law (AREA)
- Computer Security & Cryptography (AREA)
- Educational Administration (AREA)
- Quality & Reliability (AREA)
- Tourism & Hospitality (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
Provided are a processing method for obtaining target data, a terminal, a server, and an online financing method, the processing method for obtaining target data comprising: a first server receiving an exchange request sent by a first terminal to obtain target data, and sending said exchange request to a second terminal (S10); said exchange request containing description information and data values of said target data and also containing evaluation information, said evaluation information being generated by a second server when it detects that the user of the first terminal conforms to a range of levels preset by said second server. Using the described means, it is possible to provide to the exchange terminal the security level evaluation information of the data-obtaining party, thus improving target data security and exchange efficiency.
Description
CA Application Nat'l Entry of PCT/CN2015/089733 Blakes Ref. 15289/00002 Processing Method For Obtaining Target Data, Server, And Online Financing Method [1] [Technical Field]
[2] The present invention relates to the field of Internet data interaction technology, and in particular, to a method for processing target data, a server, and an online financing method.
[3] [Background Technology]
[4] With the development of Internet technology and especially mobile Internet technology, users can connect to the Internet through mobile devices using 2G, 3G, 4G or WiFi to conduct transactions and social activities. Users can conveniently and effectively perform online activities, this is an incomparable experience with offline.
[5] However, when users conduct transactions such as trading and social networking through the mobile Internet, their personal sensitive information is easily exposed and may be acquired by others in the process of interaction so that they can use their information for illegal purposes. This will provide network users a lot of risk.
[6] [Summary of the Invention]
[7] The technical problem to be solved by the present invention is to provide a processing method for acquiring target data, a server and a terminal device, and detect whether a first terminal user of an interaction meets a preset level range, and when meeting a preset level range interact with the target data to provide security audit evaluation information to other terminals before providing the requested data to improve the efficiency and security of network data interaction.
[8] The present invention provides a processing method for acquiring target data, which includes: The First Server receives an interactive request for acquiring target data delivered by a first terminal and delivers the interactive request to a second terminal, where the interactive request includes description information and data values of the target data, and further includes evaluation information, where the evaluation information is generated when the Second Server detects that the first terminal user meets a preset level range of the Second Server.
[9] The present invention also provides a server, including: a receiving module, configured to receive an interactive request for acquiring target data delivered by a first terminal, wherein the interactive request includes description information and data values of the target data, further comprising evaluation information generated when the Second Server detects that 23333888.1 CA Application Nat'l Entry of PCT/CN2015/089733 Blakes Ref. 15289/00002 the first terminal user meets a preset level range of the Second Server; and an interactive request delivering module, configured to deliver the interactive request to the second terminal.
[10] The present invention also provides a terminal device, comprising: one or more processors;
a memory; a plurality of application programs; and one or more programs, wherein the one or more programs are stored in the memory and configured to be executed by the one or more processors, the one or more programs including instructions for:
receiving an interactive request to obtain target data delivered by a first terminal;
wherein the interactive request includes the description information and the data value of the target data and further includes security information generated when the Second Server detects that the target data meets the guarantee scope of the Second Server; and delivers the interactive request to the second terminal.
a memory; a plurality of application programs; and one or more programs, wherein the one or more programs are stored in the memory and configured to be executed by the one or more processors, the one or more programs including instructions for:
receiving an interactive request to obtain target data delivered by a first terminal;
wherein the interactive request includes the description information and the data value of the target data and further includes security information generated when the Second Server detects that the target data meets the guarantee scope of the Second Server; and delivers the interactive request to the second terminal.
[11] In the above processing method for acquiring target data, the Second Server detects the first terminal user in advance and generates corresponding evaluation information when detecting that the Second Server matches a preset range of the Second Server, and the First Server will include the evaluation information. The interactive request is delivered to the second terminal to implement the interaction of the target data between the first terminal and the second terminal. Before providing the target data to the second terminal, a security verification mechanism is provided to improve target data security and interaction efficiency.
[12] Another object of the present invention is to provide an online financing method that allows the issuer to be audited when the publisher issues a target project in need of raising funds, and the evaluation information is added when the approval is passed, thereby providing the investor with the pre-investment. The reference information, and promoted the project financing progress.
[13] The present invention provides an online financing method, comprising:
The First Server receives a fund raising request delivered by a first terminal for a target project, and delivers the fund raising request to a second terminal. The fund raising request includes the description information of the target project and the required fund raising amount, and also including the evaluation information; and the evaluation information is generated when the Second Server verifies that the first terminal user conforms to the preset range of the Second Server.
The First Server receives a fund raising request delivered by a first terminal for a target project, and delivers the fund raising request to a second terminal. The fund raising request includes the description information of the target project and the required fund raising amount, and also including the evaluation information; and the evaluation information is generated when the Second Server verifies that the first terminal user conforms to the preset range of the Second Server.
[14] In the above online fund raising method, the second terminal server audits the first terminal 23333888.1 CAApplication Nat'l Entry of PCT/CN2015/089733 Blakes Ref. 15289/00002 user in advance and adds the corresponding first terminal user evaluation information for the fund-raising project when the second terminal server meets the preset second-class default level. The First Server disseminate the funding request containing the assessment information so as to introduce the Second Server assessment into the project financing, provide investment risk assessment to other investors (the second terminal) and promote the progress of the project financing.
[15] [Brief Description]
[16] Figure 1 is a flowchart of a method for processing target data according to a first example of the present invention;
[17] Figure 2 is a flow chart of a method for processing target data in a second implementation manner of the present invention;
[18] Figure 3 is a schematic flowchart of a method for processing target data according to a third example of the present invention;
[19] Figure 4 is a schematic diagram of a processing relationship of acquiring target data according to an example of the present invention;
[20] Figure 5 is a schematic flowchart of a method for processing target data according to a fourth example of the present invention;
[21] Figure 6 is a schematic structural diagram of a server in an example of the present invention;
[22] Figure 7 is a schematic structural diagram of a terminal device in an example of the present invention;
[23] Figure 8 is a schematic flow chart of a method for online financing according to a first example of the present invention;
[24] Figure 9 is a schematic flow chart of a method for online fundraising in a second example of the present invention;
[25] Figure 10 is a schematic flowchart of a method for online financing according to a third example of the present invention;
[26] Figure 11 is a schematic diagram of the fund raising relationship in the example of the present invention.
[27] [Description of the Preferred Examples]
[28] The technical solution in the examples of the present invention will be clearly and completely described below with reference to the accompanying drawings in the examples of the present invention. Apparently, the described example are only a part but not all of 23333888.1 CA Application Nat'l Entry of PCT/CN2015/089733 Blakes Ref. 15289/00002 the examples of the present invention. All other examples obtained by persons of ordinary skill in the art based on the examples of the present invention without creative efforts shall fall within the protection scope of the present invention.
[29] Please refer to Figure 1, which is a schematic flowchart of a method for acquiring target data according to a first example of the present invention. The method includes:
[30] In step S10, the First Server receives the interactive request for acquiring the target data delivered by the first terminal, and delivers the interactive request to the second terminal.
[31] Wherein, the interactive request contains description of the target data, data valuesand evaluation information. The evaluation information is generated when the Second Server detects that the first terminal user meets a preset level range of Second Server.
[32] In the above solution, the second terminal detects the first terminal user in advance and generates corresponding evaluation information when detecting the preset level range that meets the Second Server. The First Server delivers an interactive request including the evaluation information to the second terminal realizes the interaction of the target data between the first terminal and the second terminal, and adopts the security check mechanism before the first terminal issues the interactive request so as to improve the target data security and the interaction efficiency. When the first terminal user passes the detection and meets the preset range of the Second Server, that is, the first terminal user has the credibility recognized by the Second Server and the first terminal user has high and low levels of credibility according to the division of the Second Server points, such as the higher the rating, the higher the credibility. If the first terminal-user does not meet the second Server default level, the Second Server does not have the credibility recognized by Second Server and Second Server does not generate the assessment information.
[33] Please refer to Figure 2, which is a schematic flowchart of a method for acquiring target data according to a first example of the present invention. The method includes:
[34] Step S20: the first terminal delivers an interactive request for obtaining target data to the First Server.
[35] Where the interactive request includes description information and data values of the target data, and further includes evaluation information generated by the Second Server when detecting that the first terminal user meets a preset level range of the Second Server. The request may also include a target date, which is the time period for obtaining the target data.
[36] The descriptive information of the target data can be the purpose of the target data.
23333888.1 CA Application Nat'l Entry of PCT/CN2015/089733 Blakes Ref. 15289/00002
23333888.1 CA Application Nat'l Entry of PCT/CN2015/089733 Blakes Ref. 15289/00002
[37] Specifically, the first terminal logs in and accesses the First Server, and delivers an interactive request for acquiring the target data.
[38] Step S21: the First Server obtains, according to the interactive request, a first data certificate whose data value is equal to the data value of the target data, and delivers the first data certificate to the second terminal. Wherein, the first data certificate contains the information of the interactive request.
[39] In the above solution, when an interactive request is delivered to acquire the target data, the second terminal detects the first terminal user and generates evaluation information when the detection succeeds, and releases the target in the form of a first data certificate with the evaluation information data. Therefore, before the first terminal issues the interactive request, the evaluation and verification mechanism is adopted to provide the second terminal with the function of evaluating the information.
[40] Please refer to Figure 3, which is a flowchart of a method for processing target data according to a third example of the present invention. The method flow shown in this example includes:
[41] Step S30: the first terminal initiates an interactive request for acquiring target data to the First Server.
[42] Where the interactive request includes description information and data values of the target data, and further includes evaluation information generated by the Second Server when detecting that the first terminal user meets a preset level range of the Second Server.
[43] Specifically, the first terminal logs in to access the First Server and delivers an interactive request for acquiring the target data
[44] Step S31: the First Server obtains, according to the interactive request, a first data certificate whose data value is equal to the data value of the target data, and delivers the first data certificate to the second terminal. Wherein, the first data certificate contains the information of the interactive request.
[45] In an implementation manner, when the Second Server detects that the first terminal user meets the preset level range of the Second Server to generate the evaluation information, the First Server generates the first data certificate with the evaluation information. The Second Server detects the first terminal user and adds the evaluation information in the target data when it is determined that the detection meets the preset level range and still retains the evaluation information in the first data certificate generated by the First Server.
The evaluation information may include a specific security level of the first terminal user, 23333888.1 CA Application Nat'l Entry of PCT/CN2015/089733 Blakes Ref. 15289/00002 identity information of Second Server, and so on.
The evaluation information may include a specific security level of the first terminal user, 23333888.1 CA Application Nat'l Entry of PCT/CN2015/089733 Blakes Ref. 15289/00002 identity information of Second Server, and so on.
[46] In another example, the First Server obtains the first data certificate from the Second Server according to the interactive request. The first data certificate is generated by the Second Server when the first terminal user detects a preset level range that conforms to the Second Server. The interactive request includes at least the storage address of the first data certificate in the Second Server. Specifically, the interactive request delivered by the first terminal to the First Server is a link address (that is, a storage address) of the first data certificate, and the link address includes a URL address that points to the first data certificate, and may further include information of the target data, data initiator information, basic information of the target data (e.g., data attributes, format, etc.).
[47] Step S32: the second terminal receives the first data certificate delivered by the First Server and delivers the first data to the Third Server.
[48] In step S32, at least one second terminal is communicatively connected to the First Server over the network, and the First Server issues the first data certificate to each second terminal over the network.
[49] Specifically, the second terminal selects the first data from the data stored in the second terminal, and delivers the first data to the first terminal. The size of the data value of the first data may be larger than the size of the data value of the target data or may be smaller than the size of the data value of the target data.
[50] Step S33: When the sum of the sizes of the data values of all the data delivered by the second terminal and received by the third server within the target date is not smaller than the data value of the target data, the third server delivers the received data to the first terminal
[51] In the above solution, the First Server obtains the first data certificate according to the interactive request of obtaining the target data initiated by the first terminal, and each second terminal delivers the first data to the Third Server. When the Third Server receives the target data within the target date when the sum of the data sizes of all the data delivered by the second terminal is not less than the data value of the target data, the received data is delivered to the first terminal, so that the first terminal obtains the data whose size is not smaller than the value of the target data. Before performing the target data interaction, the second terminal detects and adds the evaluation information to the first terminal user, and pre-divides the target data into a plurality of sections and respectively saves them in different second terminals, in this way, the security risk of the target data itself is reduced, 23333888.1 CAApplication Nat'l Entry of PCT/CN2015/089733 Blakes Ref. 15289/00002 and in the process of interaction between the target data, its authority or ownership is guaranteed by risk.
[52] Please refer to Figure 5, which is a schematic flowchart of a method for acquiring target data according to a fourth example of the present invention, please also refer to the schematic diagram of data interaction shown in Figure 4. The method flow shown in this example includes:
[53] Step S40: the first terminal delivers an interactive request for obtaining target data to the First Server.
[54] Where the interactive request includes description information and data values of the target data, and further includes evaluation information generated by the Second Server when detecting that the first terminal user meets a preset level range of the Second Server.
[55] Step S41: the First Server obtains, according to the interactive request, a first data certificate whose data value is equal to the data value of the target data, and delivers the first data certificate to the second terminal. Wherein, the first data certificate contains the information of the interactive request.
[56] Step S42: the second terminal receives the first data certificate delivered by the First Server and delivers a second data certificate to the first terminal. Wherein the second data certificate is generated by the Third Server to lock the first data in the second terminal according to the request of the second terminal.
[57] Step S43: Determine whether the sum of the sizes of the data values represented by all the second data certificates delivered by the second terminal and received by the first terminal within the target date is not smaller than the data value size of the target data, and if yes, enter Step S44, otherwise, go to step S47.
[58] Step S44: the first terminal delivers a data interaction instruction to the third server.
[59] Step S45: the Third Server receives the data interaction instruction and delivers the locked data in the second terminal to the Fourth Server in response to the data interaction instruction.
[60] Step S46: the Fourth Server delivers the received data to the first terminal, so that the first terminal acquires the target data. Then, the process is over.
[61] Further, in response to the data interaction instruction, the third server may directly deliver the locked data in the second terminal to the first terminal, so that the first terminal acquires the target data.
[62] Step S47: the first terminal delivers an instruction to the third server that the target data 23333888.1 CA Application Nat'l Entry of PCT/CN2015/089733 Blakes Ref. 15289/00002 request fails.
[63] Step S48, in response to the instruction, the Third Server unlocks the locked data in the corresponding second terminal according to the second data certificate. Then, the process is over.
[64] In the above solution, after the Second Server detects the first terminal user and adds the assessment information, the First Server obtains the first data certificate according to the interactive request, and then delivers the first data certificate to the second terminals. The second terminal receives the first data certificate and accordingly delivers a second data certificate representing the first data value to the first terminal through the Third Server when acknowledging the interactive request responding to the first data certificate, enable the first terminal to collect enough second data certificate within target date. Where the second data certificate is generated by the third server by locking the first data in the second terminal according to the request of the second terminal, and when the first terminal obtains a sufficient second data certificate in the target date, Server directly or indirectly delivers the data locked by the second terminal to the first terminal, so that the target terminal finally obtains the target data. Before the target data exchange, the target server detects and adds security information to the target data, and pre-divides the target data into a plurality of parts and saves them in different second terminals respectively, the target data request that needs to be acquired is released in the form of the first data certificate with the safeguard information. In this way, security audits are conducted before the first terminal issues an interactive request, which ensures data security. At the same time, the second terminal delivers the corresponding data in the form of a second data certificate, so as to reduce the risk of being illegally tampered with, lost or intercepted by other terminals during data exchange, making the data exchange in the process of target data storage and transmission of a complete and comprehensive protection.
[65] The processing method of acquiring the target data in the example of the present invention is described below by way of example.
[66] For example, the first terminal is terminal A, and the second terminal is terminal B1, terminal B2, and terminal B3. Target Data Bit Client D's power-on password, which is divided in advance into three parts. Each of the terminal Bl, the terminal B2, and the terminal B3 stores a part of the data of the power-on password, and the data formed can be used to turn on the client D only when the data of the three sections are grouped together and arranged in the correct order. The terminals A, B1, B2, and B3 and the client D may be 23333888.1 CAApplication Nat'l Entry of PCT/CN2015/089733 Blakes Ref. 15289/00002 devices capable of data exchange with the server through a network, such as personal computers, tablet computers and smart phones.
[67] Terminal A initiates an interactive request for obtaining target data (client D's power-on password) through First Server, and Second Server detects terminal A users and adds evaluation information to generate three first data certificates, that is, the first data certificate a, the first data certificate b and the first data certificate c.
The detection of the user of the terminal A by the Second Server includes detecting the information of the user of the terminal A (e.g., the account, the history of data interaction, and so on).
The detection of the user of the terminal A by the Second Server includes detecting the information of the user of the terminal A (e.g., the account, the history of data interaction, and so on).
[68] The reason for this setting is that terminal server A is detected by Second Server to evaluate the security level of terminal A, so as to ensure the security of data and provide terminals Bl, B2 and B3 with partial data respectively to provide security in accordance with.
[69] Wherein, Terminal A knows that the starting password of the client D
is divided into three parts, so the request to be delivered includes the number of the first data certificate and the permission level of terminal A. Each of the three first data certificates generated by Second Server contains the permission level of the terminal A, while each first data certificate also represents the data corresponding to the target data that needs to be obtained. For example, the first data certificate a represents the first part of the required power-on password, the first data certificate b represents the second part of the required power-on password, and the first data certificate c represents the third part of the power-on password that needs to be obtained data.
is divided into three parts, so the request to be delivered includes the number of the first data certificate and the permission level of terminal A. Each of the three first data certificates generated by Second Server contains the permission level of the terminal A, while each first data certificate also represents the data corresponding to the target data that needs to be obtained. For example, the first data certificate a represents the first part of the required power-on password, the first data certificate b represents the second part of the required power-on password, and the first data certificate c represents the third part of the power-on password that needs to be obtained data.
[70] The First Server then delivers the first data certificate to the terminal Bl, the terminal B2 and the terminal B3, respectively, so that the three terminals select the matched first data from the received three first data certificates according to the stored data certificate, and delivers the second data certificate to terminal A. Now, taking the terminal B1 as an example for description, the terminal BI stores the second part of the power-on password, and selects the first data certificate b representing the second part of the data. And, the second data certificate delivered by the terminal B1 is an electronic certificate generated by the third server by locking the second part data stored by the third server, and the third server is a supervisory computer that manages the terminals Bl, B2, and B3.
Wherein, the second data certificate is the information representing the second portion of the data that is locked, and not the second portion of the data itself. The information mentioned above may be a preset symbol, a picture, and so on. Certainly, in other examples, the terminal B1 may 23333888.1 CA Application Nat'l Entry of PCT/CN2015/089733 Blakes Ref. 15289/00002 directly deliver the second part of data to the terminal A as well.
Wherein, the second data certificate is the information representing the second portion of the data that is locked, and not the second portion of the data itself. The information mentioned above may be a preset symbol, a picture, and so on. Certainly, in other examples, the terminal B1 may 23333888.1 CA Application Nat'l Entry of PCT/CN2015/089733 Blakes Ref. 15289/00002 directly deliver the second part of data to the terminal A as well.
[71] Further, the terminal A receives all the second data certificates constituting the power-on password of the client D within the target date, and then requests the Third Server to deliver its locked data to the terminal A.
[72] Further, the target data may also be text data, audio data, video data, program data or financial data in the financial field, etc. In the case of fund data, such as funds, the first terminal is a fund-raising party at this time, the deliverer of the data is an investor. First Server is a platform for raising funds. The second, third and fourth servers are Funds-Management servers, for example, banks. In the case of audio data, such as songs, the data initiator and the data deliverer may be clients with multimedia playing functions such as mobile phones. First Server is a music search platform and the second, third and fourth servers are music website servers.
[73] Please refer to Figure 6, which is a schematic structural diagram of a server according to an example of the present invention. The server 50 shown in this example includes a receiving module 51 and an interactive request delivering module 52.
[74] The receiving module 51 is used to receive a first terminal initiated interactive request for acquiring target data. Where the interactive request includes description information and data values of the target data, and further includes evaluation information generated by the Second Server when detecting that the first terminal user meets a preset level range of the Second Server.
[75] The interactive request delivering module 52 is used to deliver the interactive request to the second terminal.
[76] In an example, the server 50 further includes a first data certificate acquisition module 53 and a first data certificate delivering module 54. The first data certificate acquisition module 53 detects, at the Second Server, that the first terminal user conforms to a preset and increase the evaluation information, a first data certificate is generated according to the interactive request. The first data certificate delivering module 54 is used to deliver the first data certificate to the second terminal.
[77] In another example, the server 50 further includes a first data certificate acquisition module 53 and a first data certificate delivering module 54. The first data certificate acquisition module 53 obtains, according to the interactive request, the second data certificate from the Second Server first data certificate. The first data certificate is generated when the second terminal detects the preset level range for the first terminal user. The request includes at 23333888.1 CA Application Nat'l Entry of PCT/CN2015/089733 Blakes Ref. 15289/00002 least the storage address of each first data certificate in the Second Server.
Specifically, the first data certificate is generated in advance by the first terminal and stored in the Second Server. The request delivered by the first terminal to the First Server is a link address (that is, a storage address) of the first data certificate, and the link address includes point to the URL address corresponding to the first data certificate. It can also contain information about the target data, data initiator information, and basic information about the target data (e.g., data attributes, formats, etc.). The first data certificate delivering module 54 is used to deliver the first data certificate to the second terminal.
Specifically, the first data certificate is generated in advance by the first terminal and stored in the Second Server. The request delivered by the first terminal to the First Server is a link address (that is, a storage address) of the first data certificate, and the link address includes point to the URL address corresponding to the first data certificate. It can also contain information about the target data, data initiator information, and basic information about the target data (e.g., data attributes, formats, etc.). The first data certificate delivering module 54 is used to deliver the first data certificate to the second terminal.
[78] Please refer to Figure 7, which is a schematic structural diagram of a terminal device in an example of the present invention, a terminal device 60 in this example is a server. The terminal device 60 includes a receiver 61, a processor 62, a transmitter 63, a read only memory 64, a random access memory 65, and a bus 66.
[79] The receiver 61 is used for receiving data.
[80] The processor 62 controls the operation of the terminal device 60. The processor 62 may also be a CPU (Central Processing Unit). The processor 62 may be an integrated circuit chip with signal processing capability. The processor 820 may also be a general purpose processor, a digital signal processor (DSP), an application specific integrated circuit (ASIC), a field programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components. The general purpose processor may be a microprocessor or the processor may also be any conventional processor and so on.
[81] This transmitter 63 is used for transmitting data.
[82] The memory may include a read-only memory 64 and a random access memory 65 and provide instructions and data to the processor 62. A portion of the memory may also include non-volatile random access memory (NVRAM).
[83] The various components of the terminal device 60 are coupled together by a bus 66, which may include a power bus, a control bus, a status signal bus, etc., in addition to the data bus.
However, for the sake of clarity, various buses are labelled as buses 66 in the figure.
However, for the sake of clarity, various buses are labelled as buses 66 in the figure.
[84] The memory stores the following elements, executable modules or data structures, or a subset of them, or their extensions:
[85] Operation Instructions: Various operation instructions are included for various operations.
[86] Operating System: Includes various system programs for implementing various basic services and handling hardware-based tasks.
23333888.1 CA Application Nat'l Entry of PCT/CN2015/089733 Blakes Ref. 15289/00002
23333888.1 CA Application Nat'l Entry of PCT/CN2015/089733 Blakes Ref. 15289/00002
[87] In the example of the present invention, the processor 62 performs the following operations by invoking memory-stored operation instructions (the operation instructions may be stored in the operating system):
[88] Receive an interactive request for acquiring target data delivered by a first terminal, where the interactive request includes description information and data values of the target data, and the evaluation information is generated when Second Server detects that the first terminal user is in accordance with the preset range of the Second Server; and
[89] The interactive request is delivered to the second terminal.
[90] Optionally, the processor 62 generates a first data certificate according to the interactive request when the Second Server detects that the first terminal user meets a preset level range and adds the evaluation information.
[91] Optionally, the processor 62 obtains the first data certificate from the Second Server according to the interactive request. Where the first data certificate is generated when the second data server detects that the target data meets a target requirement, and the request includes at least the storage address of each first data certificate in the Second Server.
Specifically, the first data certificate is generated in advance by the first terminal and stored in the Second Server. The request delivered by the first terminal to the terminal device 60 is a link address (that is, a storage address) of the first data certificate, and the link address includes point to the URL address corresponding to the first data certificate.
It can also contain information about the target data, AP, data initiator information, and basic information about the target data (e.g., data attributes, formats, etc.).
Specifically, the first data certificate is generated in advance by the first terminal and stored in the Second Server. The request delivered by the first terminal to the terminal device 60 is a link address (that is, a storage address) of the first data certificate, and the link address includes point to the URL address corresponding to the first data certificate.
It can also contain information about the target data, AP, data initiator information, and basic information about the target data (e.g., data attributes, formats, etc.).
[92] Please refer to Figure 8, which is a schematic flowchart of a method for online fund-raising in a first example of the present invention, the method includes:
[93] Step S70: the First Server receives the fund raising request for the target item delivered by the first terminal, and delivers the fund raising request to the second terminal.
[94] Wherein, the fund raising request includes description information of the target project and the amount of funds to be raised, and also includes the evaluation information, which is generated when Second Server audits the first terminal user to conform to the default level of the Second Server.
[95] In the above solution, the second terminal server audits the first terminal user in advance and adds the corresponding evaluation information for the fund-raising project when the second terminal server meets the preset second-class default level. The First Server disseminate the funding request containing the assessment information so as to introduce 23333888.1 CAApplication Nat'l Entry of PCT/CN2015/089733 Blakes Ref. 15289/00002 the Second Server assessment into the project financing, provide investment risk level reference to other investors (the second terminal) and promote the progress of the project financing.
[96] Please refer to Figure 9, which is a schematic flowchart of a method for online fund-raising in a second example of the present invention, the method includes:
[97] Step S80: the first terminal delivers a fund raising request for the target item to the First Server.
[98] Wherein, the fund raising request includes description information of the target project and the amount of funds to be raised, and also includes the evaluation information, which is generated when Second Server audits the first terminal user to conform to the default level of the Second Server.
[99] Step S81: the First Server obtains, according to the fund raising request, a first electronic certificate with a representative amount of money equal to a fund amount required to be raised by the target item, and delivers the plurality of first electronic certificates to the second terminal. Wherein, the first electronic certificate contains the information of the interactive request.
[100] In this example, the first electronic certificate is an Object Credit Certificate and is an electronic document that includes at least a financing amount, a target amount of funds, and a preset time.
[101] In the solution above, the First Server obtains the corresponding first electronic certificate according to the funding request for the target item delivered by the first terminal. When launching a funding project in the form of an electronic certificate, Second Server is introduced to review and evaluate the sponsors so as to provide a reference for other investors (the second terminal) with investment confidence and investment risk.
[102] Please refer to Figure 10, which is a schematic flowchart of a method for online financing according to a third example of the present invention. Please refer to Figure 11, a schematic diagram of a relationship for fund raising is also shown. The method flow shown in this example includes:
[103] Step S90: the first terminal delivers a fund raising request for the target item to the First Server.
[104] Wherein, the fund raising request includes description information of the target project and the amount of funds to be raised, and also includes the evaluation information, which is generated when Second Server audits the second terminal user to conform to the default 23333888.1 CAApplication Nat'l Entry of PCT/CN2015/089733 Blakes Ref. 15289/00002 level of the Second Server.
[105] Step S91: the First Server obtains, according to the fund raising request, a first electronic certificate equal to a quota of the funds required to be raised by the target project, and delivers the first electronic certificate to the second terminal. Wherein, the first electronic certificate contains the information of the interactive request.
[106] In this example, the first electronic certificate is an Object Credit Certificate and is an electronic document that includes at least a financing amount, a target amount of funds, and a preset time.
[107] In an implementation manner, when the Second Server generates the evaluation information by detecting that the first terminal user meets a preset level range, the First Server generates a first electronic certificate having the evaluation information. The Second Server examines the first terminal user and determines the level of the first terminal user. The evaluation content includes the account of the first terminal user, the credit record, and so on, adds the evaluation information of the first terminal user to the target item. The evaluation information is still retained in the first electronic certificate generated by First Server.
[108] In another example, the First Server obtains the first electronic certificate from the Second Server according to the funding request. The first data certificate is generated when the Second Server approves the first terminal user. The request includes at least the storage address of each first electronic certificate in Second Server.
[109] When the verification is passed, the identification information added for the first electronic certificate is the signature of the person or the signature of the institution, so as to improve the credibility of the first terminal user when raising funds to the second terminal user, reduce the difficulty of raising funds.
[110] In the above scenario, Second Server can be a bank management server that generates an Object Credit Certificate from the Crowd funding Project via an Object Credit Certificate generator loaded with a bank audit plug-in. Wherein, the bank will review the crowd funding promoters, and determine the level range.
[111] Step S92: the second terminal receives the first electronic mail delivered by the First Server and delivers a certain amount of money to the third server.
[112] Step S93: When the total amount of funds received by the third server within the target date is not less than the amount of money to be raised for the target item, the third server delivers the received funds to the first terminal, so that the first terminal user obtains 23333888.1 CA Application Nat'l Entry of PCT/CN2015/089733 Blakes Ref. 15289/00002 funding for the target project.
[113] In another implementation manner, the second terminal receives the first electronic certificate delivered by the First Server and delivers a second electronic certificate to the first terminal, and adds the second electronic certificate to the obtained first electronic certificate identification information.
[114] Wherein, the second electronic certificate is a Bank Credit Certificate, which is opened by the second terminal user with the guarantee of its bank account fund or credit line, and the bank promises to process the electronic credit certificate of payment and settlement according to the settlement conditions. That is, the Third Server is the Funds-Management server for the second terminal user. The second electronic certificate is opened by the third server for freezing the account funds or the credit limit of the second terminal user, and the frozen account or credit limit is the same as the quota represented by the first electronic certificate obtained.
[115] When the sum of the second electronic certificate funds amount received by the first terminal in the target date is not less than the amount of money required for raising the target item, the first terminal delivers a settlement request to the third server, and the third server delivers the settlement request in response to the settlement request.
The funds frozen in the second terminal user account are allocated to the Fourth Server.
Correspondingly, the fourth server allocates this part of the funds to the account of the first terminal user, so that the first terminal user can obtain the funds required for raising funds.
The funds frozen in the second terminal user account are allocated to the Fourth Server.
Correspondingly, the fourth server allocates this part of the funds to the account of the first terminal user, so that the first terminal user can obtain the funds required for raising funds.
[116] Wherein, the Fourth Server is the Funds-Management server of the first terminal.
[117] Further, the third server may further allocate the frozen funds in the second terminal user account to the account of the first terminal according to the solution request, so that the first terminal obtains the funds needed to be raised.
[118] When the amount of money received by the first terminal within the target date is less than the amount of money to be raised for the target item, the first terminal delivers a funding failure message to Third Server, and the Third Server responds to the information to unfreeze the corresponding Second terminal user's account funds.
[119] In the solution above, the First Server obtains the corresponding first electronic certificate according to the funding request for the target item delivered by the first terminal. The second terminal receives the first electronic certificate delivered by the First Server and allocates the corresponding fund to the account of the first terminal user, so that the first terminal can raise funds required by the target project within the target date. When issuing 23333888.1 CA Application Nat'l Entry of PCT/CN2015/089733 Blakes Ref. 15289/00002 a funding project in the form of an electronic certificate, Second Server introduced the crowd funding sponsor to provide a risk assessment reference for other investors (the second terminal).
[120] Further, after receiving the first electronic certificate, each second terminal may further deliver a second electronic certificate of equal amount of funds to the Funds-Management server of the first terminal, and release the second electronic certificate after the project financing is completed. Pay the second electronic certificate to transfer funds to the first terminal user's account. Using the second electronic certificate way with the target investment projects, the investment of funds is only temporarily frozen, making investment safer.
[121] The financing method in the examples of the present invention is described below by way of example.
[122] For example, the first terminal is a fund-raising initiator, the Second Server is a bank, the second terminal is an investor, and the First Server is an E-commerce platform.
[123] When the funding initiator issues a request for a target of 1 million fund-raising through the E-commerce platform, the E-commerce platform generates an Object for the crowd funding project using the Object Credit Certificate generator provided by the bank or loaded with the bank audit plug-in Credit Certificate. This Object Credit Certificate represents a limit of 1 million. In one example, the Object Credit Certificate generated by the initiator is stored on the Second Server and the Object Server Certificate is published on the publishing platform via First Server. Wherein, the link information includes a URL
address pointing to the Object Credit Certificate, and may also include item introduction information, sponsor information, commodity images, and so on.
address pointing to the Object Credit Certificate, and may also include item introduction information, sponsor information, commodity images, and so on.
[124] The other investors conduct the follow-up vote. Specifically, the investor a acquires the Object Credit Certificate from the initiator, and records the identity information of the investor a on the Object Credit Certificate. The investor can use the Bank Credit Certificate to purchase, it can also use other methods, such as bank transfer, Alipay and other network ways to pay. In the case of Bank Credit Certificate, Third Server freezes the account of investor a open the corresponding Bank Credit Certificate for purchasing the Object Credit Certificate.
[125] Judgement of successful fund-raising at the expiration of the funding period and completion of the transfer of funds. If the project financing is successful, then enter the implementation phase, Object Credit Certificate holder based Object Credit Certificate for 23333888.1 CAApplication Nat'l Entry of PCT/CN2015/089733 Blakes Ref. 15289/00002 a preset income. Wherein, if the investor a uses Bank Credit Certificate, the funds of the account of the third-party investor a will be paid to the sponsor's fund-raising account. If unsuccessful, the project financing fails, and the investment fund is returned according to the Object Credit Certificate. For example, in the case of a conventional payment method, the investment fund is returned to the last assignee of the Object Credit Certificate. If Bank Credit Certificate is used for payment, the investor opens a bank credit certificate to the financing account for unfreezing.
[126] In the above solution, the first terminal user through the bank's audit and assessment, the investment needs to purchase Object Credit Certificate by online banking payment, bank transfer or through the Bank Credit Certificate way to buy, and the success of the target project will be the corresponding of the funds allocated to the sponsor's bank account. In the case of Object Credit Certificate, the fund-raising project is launched and introduced into the bank to review the first terminal-user so as to provide other investors with information on investment risk. The investor purchases the target project by means of Bank Credit Certificate. The funds frozen due to the opening of the Bank Credit Certificate are not directly transferred to the sponsor's bank account but merely frozen by the bank and cannot be used. However, the funds are still invested by the investor Bank account. As a result, the risk to the investor is greatly reduced, and at the same time it is also possible to obtain additional benefits because the frozen funds remain their own.
[127] In the above examples, the present invention has been exemplary described only, but various modifications to the present invention can be made by those skilled in the area after reading this patent application without departing from the spirit and scope of the present invention.
23333888.1
23333888.1
Claims (17)
- [Claim 1] A processing method of acquiring target data, wherein the method comprises:
The First Server receives the interactive request for acquiring the target data delivered by the first terminal, and delivers the interactive request to the second terminal.
Where the interactive request includes description information and data values of the target data, and further includes evaluation information generated by the Second Server when detecting that the first terminal user meets a preset level range of the Second Server. - [Claim 2] The method for obtaining target data according to Claim 1, wherein the First Server receives an interactive request for acquiring target data delivered by the first terminal, and delivers the interactive request to a second terminal. The steps of the terminal are as follows:
By the First Server, a first data certificate whose data value is equal to the data value of the target data according to the interactive request for acquiring the target data delivered by the first terminal, and delivering the first data certificate to Second terminal;
Where the first data certificate includes the information of the interactive request. - [Claim 3] The data processing method according to Claim 2, wherein First Server, based on the interaction request of obtaining target data delivered by the First terminal, obtains the First data certificate that represents the data value equal to the data value of the target data as follows:
Receiving, by the First Server, an interactive request for acquiring target data delivered by the first terminal, and when the Second Server detects that the first terminal user conforms to a preset level range of the Second Server, generating, by the First Server, the evaluation information of the first data certificate. - [Claim 4] The data processing method according to Claim 2, wherein First Server, based on the interaction request of obtaining target data delivered by the First terminal, obtains the First data certificate that represents the data value equal to the data value of the target data as follows:
Receiving, by the First Server, an interactive request for acquiring target data delivered by the first terminal, and obtaining the first data certificate from the Second Server according to the interactive request, where the first data certificate is acquired by the first terminal. Second Server generates when the first terminal user detects that the first terminal user complies with the second-server default level range. - [Claim 5] The data processing method according to Claim 2, wherein the method comprises:
The second terminal receives the first data certificate and delivers the first data to the third server;
When the sum of data size values of all data delivered by the second terminal and received by the Third Server within the target date is not smaller than the data value size of the target data, the Third Server delivers the received data to the first terminal. - [Claim 6] The data processing method according to Claim 2, wherein the method comprises:
The second terminal receives the first data certificate and delivers a second data certificate to the first terminal, where the second data certificate is generated by Third Server locking the first data in the second terminal according to the request of the second terminal;
The sum of the sizes of the data values represented by all the second data certificates that are delivered by the second terminal and received by the first terminal within the target date is not less than the data value size of the target data, deliver data interaction instructions to the Third Server;
The third server receives the data interaction instruction and delivers the locked data in the second terminal to the first terminal in response to the data interaction instruction or the third server delivers the data to the first terminal in response to the data interaction instruction. The data that the second terminal is locked is delivered to the fourth server, so that the fourth server delivers the received data to the first terminal. - [Claim 7] The processing method for acquiring target data according to Claim 6, wherein the data value represented by the second data certificate and delivered by the second terminal and received by the first terminal within the target date when the size is smaller than the data value size of the target data, the method further comprises:
The first terminal delivers an instruction to the Third Server to deliver the target data interaction failure;
And The third server receives the instruction, and in response to the instruction, unlocks the locked first data in the corresponding second terminal according to the second data certificate. - [Claim 8] A server, wherein, comprising:
The receiving module is used to receive a first terminal initiated interactive request for acquiring target data;
Where the interactive request includes description information and data values of the target data, and further includes evaluation information generated by the Second Server when detecting that the first terminal user meets a preset level range of the Second Server; and The interactive request delivering module is used to deliver the interactive request to the second terminal. - [Claim 9] The server according to Claim 8, further comprising:
First data certificate acquisition module, which is used to obtain the first data certificate representing the data value of the data value that is represented according to the data obtained from the target data delivered by the first terminal;
wherein, the first data certificate contains information about the interaction request;
The first data certificate delivering module is configured to deliver the first data certificate obtained by the first data certificate acquisition module to a second terminal. - [Claim 10] A terminal device, wherein the device includes:
One or more processors;
Memory;
Multiple applications; and One or more programs, wherein the one or more programs are stored in the memory and configured to be executed by the one or more processors, the one or more programs include instructions that, which are used for:
Receive an interactive request for acquiring target data delivered by a first terminal, where the interactive request includes description information and data values of the target data, and the evaluation information is generated when Second Server detects that the first terminal user is in accordance with the preset range of the Second Server; and Deliver the interactive request to the second terminal. - [Claim 11] The terminal device according to Claim 10, wherein the instructions are further for:
According to the interactive request, a first data certificate whose data value is equal to a data value of the target data, where the first data certificate contains the information of the interactive request; and Deliver the first data certificate to the second terminal. - [Claim 12] An online fund raising method, wherein the method comprises:
The First Server receives a fund raising request delivered by a first terminal for a target project, and delivers the fund raising request to a second terminal.
The fund raising request includes the description information of the target project and the required fund raising amount, and also including the evaluation information;
and the evaluation information is generated when the Second Server verifies that the first terminal user conforms to the preset range of the Second Server. - [Claim 13] The online financing method according to Claim 12, wherein First Server receives the funding request for the target project delivered by the First terminal and delivers the financing request to the second terminal for the following steps:
Receiving, by the First Server, a fund raising request for a target item delivered by a first terminal and obtaining, according to the fund raising request, a first electronic certificate equal in amount of funds represented by the target item and the amount of money required for raising the target item, the first electronic certificate is delivered to the second terminal.
Wherein the first electronic certificate includes the information of the fund raising request. - [Claim 14] The online financing method according to Claim 13, wherein the First Server receives a fund raising request for the target item delivered by the first terminal, and obtains a representative fund limit according to the fund raising request and the step of the first electronic certificate required for the target item to be raised with the same amount of funds is specifically as follows:
Receiving, by the First Server, a request for raising funds for the target item delivered by the first terminal, and when the Second Server detects that the first terminal user meets a level range preset by the Second Server and generates the evaluation information, generate the first electronic certificate with the evaluation information. - [Claim 15] The online financing method according to Claim 13, wherein the First Server receives a fund raising request for the target item delivered by the first terminal, and obtains a representative fund limit according to the fund raising request and the step of the first electronic certificate required for the target item to be raised with the same amount of funds is specifically as follows:
Receiving, by the First Server, a fund raising request for a target item delivered by the first terminal, and obtaining the first electronic certificate from the Second Server according to the fund raising request; wherein the first electronic certificate is obtained from the Second Server generates when the first terminal user detects a level range that conforms to the preset value of the Second Server. - [Claim 16] The online financing method according to Claim 13, wherein the method further comprises:
The second terminal receives the first electronic certificate and delivers the first fund to the Third Server;
And when the sum of the funds of all the first funds delivered by the second terminal and received by the third server within the target date is not less than the required amount of money to be raised for the target item, deliver the received funds to First terminal. - [Claim 17] The online financing method according to Claim 13, wherein the method further comprises:
The second terminal receives the first electronic certificate and delivers a second electronic certificate to the third server;
The second electronic certificate is generated by the third server freezing the first fund in the second terminal user account according to the request of the second terminal;
When the total amount of funds represented by all the second electronic certificates that are delivered by the second terminal and received by the first terminal within the target date is not less than the amount of money required for raising the target item, deliver a fund transfer instruction to the third Server;
Receiving, by the third server, the fund transfer instruction, and delivering, in response to the fund transfer instruction, funds frozen in the second terminal to the first terminal.
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2015/089733 WO2017045155A1 (en) | 2015-09-16 | 2015-09-16 | Processing method for obtaining target data, server, and online financing method |
Publications (2)
Publication Number | Publication Date |
---|---|
CA2998543A1 true CA2998543A1 (en) | 2017-03-23 |
CA2998543C CA2998543C (en) | 2022-05-17 |
Family
ID=57471550
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA2998543A Active CA2998543C (en) | 2015-09-16 | 2015-09-16 | Processing method for obtaining target data, server, and online financing method |
Country Status (3)
Country | Link |
---|---|
CN (1) | CN106133775A (en) |
CA (1) | CA2998543C (en) |
WO (1) | WO2017045155A1 (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110533419B (en) * | 2019-07-24 | 2023-09-26 | 创新先进技术有限公司 | Block chain-based sharing method, device and server of wind control model |
CN111105304B (en) * | 2019-11-19 | 2023-06-02 | 泰康保险集团股份有限公司 | Data processing method and device, storage medium and electronic terminal |
CN113630382A (en) * | 2021-07-08 | 2021-11-09 | 浙江清华长三角研究院 | System management method for data compliance safety circulation |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103117856B (en) * | 2012-01-16 | 2015-07-01 | 深圳市可秉资产管理合伙企业(有限合伙) | Method and apparatus for provisioning applications in mobile devices |
CN103208065A (en) * | 2012-01-16 | 2013-07-17 | 深圳市家富通汇科技有限公司 | Method and apparatus for personalizing secure elements in mobile devices |
US20140214675A1 (en) * | 2013-01-25 | 2014-07-31 | Pankaj Sharma | Push payment system and method |
CN104579663B (en) * | 2013-10-24 | 2018-03-27 | 上海中移通信技术工程有限公司 | For the method for the validity for limiting digital certificate |
-
2015
- 2015-09-16 WO PCT/CN2015/089733 patent/WO2017045155A1/en active Application Filing
- 2015-09-16 CA CA2998543A patent/CA2998543C/en active Active
- 2015-09-16 CN CN201580012884.5A patent/CN106133775A/en active Pending
Also Published As
Publication number | Publication date |
---|---|
CN106133775A (en) | 2016-11-16 |
WO2017045155A1 (en) | 2017-03-23 |
CA2998543C (en) | 2022-05-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10546296B2 (en) | Public ledger authentication system | |
US11615408B2 (en) | Multi-signature verification network | |
US20210065293A1 (en) | Distributed ledger lending | |
US20170270527A1 (en) | Assessing trust to facilitate blockchain transactions | |
WO2018214716A1 (en) | Method and apparatus for determining line of credit, server and readable storage medium | |
US20180005235A1 (en) | Electronic transaction risk assessment based on digital identifier trust evaluation | |
US11636479B2 (en) | Computer-implemented system and method for performing social network secure transactions | |
US20150324769A1 (en) | System and methods for facilitating fund transfers over a network | |
CN109544335B (en) | Transaction data processing method, device, equipment and storage medium based on blockchain | |
JP6980113B2 (en) | Data processing methods and equipment in the online payment process | |
US20220067834A1 (en) | Method, system and non-transitory computer-readable recording medium for supporting asset transactions | |
US20200242600A1 (en) | System for leveraged collaborative pre-verification and authentication for secure real-time resource distribution | |
CN111784347B (en) | Resource transfer method and device | |
US20160098791A1 (en) | Method, terminal and system for resetting payment password | |
KR20190108666A (en) | Apparatus and method for automated deposit and withdrawal of funds for cryptocurrency transactions and computer program for the same | |
JP2019135677A (en) | System and method for secure account transfer | |
US20230342759A1 (en) | Systems and methods for sending and receiving math-based currency via a fiat currency account | |
CA2998543C (en) | Processing method for obtaining target data, server, and online financing method | |
CN112037020A (en) | Method, device, equipment and medium for opening domestic mobile payment by overseas customer | |
CA2998517C (en) | Processing method for acquiring target data, server, and online funding method | |
WO2022047582A1 (en) | Blockchain-based technologies for secure offline transaction processing | |
Achim | A Cryptocurrency Spectrum Short Analysis | |
TWI778271B (en) | Method for electronic trading examination and system for electronic trading | |
KR20240157416A (en) | Loan method and system using proof of property rights nft and fungible token | |
CA2993034A1 (en) | Online funds management method, and data interaction processing method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
EEER | Examination request |
Effective date: 20200828 |