CA3192799A1 - Processing method for acquiring target data, server, and online funding method - Google Patents

Processing method for acquiring target data, server, and online funding method

Info

Publication number
CA3192799A1
CA3192799A1 CA3192799A CA3192799A CA3192799A1 CA 3192799 A1 CA3192799 A1 CA 3192799A1 CA 3192799 A CA3192799 A CA 3192799A CA 3192799 A CA3192799 A CA 3192799A CA 3192799 A1 CA3192799 A1 CA 3192799A1
Authority
CA
Canada
Prior art keywords
data
terminal
server
target
certificate
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CA3192799A
Other languages
French (fr)
Inventor
Yi Zhang
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
10353744 Canada Ltd
Original Assignee
10353744 Canada Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 10353744 Canada Ltd filed Critical 10353744 Canada Ltd
Priority to CA3192799A priority Critical patent/CA3192799A1/en
Publication of CA3192799A1 publication Critical patent/CA3192799A1/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/22Payment schemes or models
    • G06Q20/24Credit schemes, i.e. "pay after"
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/10Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0279Fundraising management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/06Asset management; Financial planning or analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/08Insurance
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/563Data redirection of data network streams
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/566Grouping or aggregating service requests, e.g. for unified processing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/08Protocols for interworking; Protocol conversion
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Development Economics (AREA)
  • Strategic Management (AREA)
  • Theoretical Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Computer Security & Cryptography (AREA)
  • Technology Law (AREA)
  • Game Theory and Decision Science (AREA)
  • Human Resources & Organizations (AREA)
  • Operations Research (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

A processing method for acquiring target data, a terminal, a server, and an online funding method. The processing method for acquiring target data comprises: a first server receives an exchange request transmitted by a first terminal for acquiring target data and transmits the exchange request to a second terminal (S10), where the exchange request comprises descriptive information and a data value of the target data and also comprises coverage information, and the coverage information is generated when the second server detects that the target data complies with a coverage range of the second server. By such means, security guarantee can be provided before the target data is provided to the exchanging terminals, thus increasing the security and exchange efficiency of the target data.

Description

CA Application Division of CA 2,998,517, Blakes Ref. 15289/00005 Title: Processing Method For Acquiring Target Data, Server, And Online Funding Method [11 [Technical Field]
[2] The present invention relates to the field of Internet data interaction technology, and in particular, to a method for processing target data, a server, and an online financing method.
[31 [Background Technology]
[4] With the development of Internet technology and especially mobile Internet technology, users can connect to the Internet through mobile devices using 2G, 3G, 4G or WiFi to conduct transactions and social activities. Users can conveniently and effectively perform online activities, this is an incomparable experience with offline.
[51 However, when users conduct transactions such as trading and social networking through the mobile Internet, their personal sensitive information is easily exposed and may be acquired by others in the process of interaction so that they can use their information for illegal purposes. This will provide network users a lot of risk.
[6] [Summary of the Invention]
[71 The technical problem to be solved by the present invention is to provide a processing method for acquiring target data, a server and a terminal device, to detect whether target data required for interaction meet the guarantee range and to interact with the target data when the target data meets the guarantee range, improve the efficiency and security of network data interaction.
[8] The present invention provides a processing method for acquiring target data, which includes: Receiving, by the First Server, an interactive request for acquiring target data delivered by a first terminal, and delivering the interactive request to a second terminal, where the interactive request includes description information and a data value of the target data, and further includes guarantee information, and the guarantee information is generated when the Second Server detects that the target data meets the guarantee scope of the Second Server.
[91 The present invention also provides a server, including: a receiving module, configured to receive an interactive request for acquiring target data delivered by a first terminal, wherein the interactive request includes description information and data values of the target data, When the Second Server detects that the target data meets the guarantee range of the Second Server, the Second Server further includes protection information; and the 24654239.1 Date Regue/Date Received 2023-03-13 CA Application Division of CA 2,998,517, Blakes Ref. 15289/00005 interactive request delivering module is used to deliver the interactive request to the second terminal.
[10] The present invention also provides a terminal device, comprising: one or more processors;
a memory; a plurality of application programs; and one or more programs, wherein the one or more programs are stored in the memory and configured to be executed by the one or more processors, the one or more programs including instructions for:
receiving an interactive request to obtain target data delivered by a first terminal;
wherein the interactive request includes the description information and the data value of the target data and further includes security information generated when the Second Server detects that the target data meets the guarantee scope of the Second Server; and delivers the interactive request to the second terminal.
[11] In the above processing method for acquiring target data, the Second Server detects the target data in advance and generates corresponding guarantee information when detecting the Second Server's coverage, and the First Server delivers an interactive request including the guarantee information to the second terminal realizes the interaction of the target data between the first terminal and the second terminal and provides the security guarantee before providing the target terminal for the second terminal so as to improve the target data security and the interaction efficiency.
[12] Another object of the present invention is to provide an online financing method that can be used to examine the target project in need of fund raising and increase the insurance information when the approval is passed, thereby reducing the funds risk of the investor and promoting the project financing progress.
[13] The present invention provides an online financing method, comprising:
The First Server receives a fund raising request delivered by a first terminal for a target project, and delivers the fund raising request to a second terminal. The fund raising request includes the description information of the target project and the required fund raising amount, and also including the insurance information; and the insurance information is generated when the second Server verifies that the target item conforms to the scope of the Second Server.
[14] The above method of online fund-raising, which is reviewed by Second Server in advance and raised the corresponding insurance information for the financing item when it meets the scope of Second Server, first Server issues the financing request containing the insurance information so as to introduce the assessment and guarantee of Second Server when funding the project, provide investment risk protection for other investors (the 24654239.1 Date Regue/Date Received 2023-03-13 CA Application Division of CA 2,998,517, Blakes Ref. 15289/00005 second terminal) and promote the progress of project financing.
[15] [Brief Description]
[16] Figure 1 is a flowchart of a method for processing target data according to a first example of the present invention;
[17] Figure 2 is a flow chart of a method for processing target data in a second implementation manner of the present invention;
[18] Figure 3 is a schematic flowchart of a method for processing target data according to a third example of the present invention;
[19] Figure 4 is a schematic diagram of a processing relationship of acquiring target data according to an example of the present invention;
[20] Figure 5 is a schematic flowchart of a method for processing target data according to a fourth example of the present invention;
[21] Figure 6 is a schematic structural diagram of a server in an example of the present invention;
[22] Figure 7 is a schematic structural diagram of a terminal device in an example of the present invention;
[23] Figure 8 is a schematic flow chart of a method for online financing according to a first example of the present invention;
[24] Figure 9 is a schematic flow chart of a method for online fundraising in a second example of the present invention;
[25] Figure 10 is a schematic flowchart of a method for online financing according to a third example of the present invention;
[26] Figure 11 is a schematic diagram of the fund raising relationship in the example of the present invention.
[27] [Description of the Preferred Examples]
[28] The technical solution in the examples of the present invention will be clearly and completely described below with reference to the accompanying drawings in the examples of the present invention. Apparently, the described example are only a part but not all of the examples of the present invention. All other examples obtained by persons of ordinary skill in the art based on the examples of the present invention without creative efforts shall fall within the protection scope of the present invention.
[29] Please refer to Figure 1, which is a schematic flowchart of a method for acquiring target data according to a first example of the present invention. The method includes:
3 24654239.1 Date Regue/Date Received 2023-03-13 CA Application Division of CA 2,998,517, Blakes Ref. 15289/00005 [30] In step S10, the First Server receives the interactive request for acquiring the target data delivered by the first terminal, and delivers the interactive request to the second terminal.
[31] Wherein, the interactive request contains description of the target data, data values and security information. The security information is generated when Second Server detects that the target data meets the scope of Second Server.
[32] In the above solution, the Second Server detects the target data in advance and generates corresponding guarantee information when detecting the Second Server's coverage, and the First Server delivers an interactive request including the guarantee information to the second terminal realizes the interaction of the target data between the first terminal and the second terminal and provides the security guarantee before providing the target terminal for the second terminal so as to improve the target data security and the interaction efficiency.
[33] Please refer to Figure 2, which is a schematic flowchart of a method for acquiring target data according to a first example of the present invention. The method includes:
[34] Step S20: the first terminal delivers an interactive request for obtaining target data to the First Server.
[35] Wherein, the interactive request includes description information and data values of the target data, and further includes security information, which is generated when Second Server detects that the target data conforms to the scope of the Second Server. The request may also include a target date, which is the time period for obtaining the target data.
[36] The descriptive information of the target data can be the purpose of the target data.
[37] Specifically, the first terminal logs in and accesses the First Server, and delivers an interactive request for acquiring the target data.
[38] Step S21: the First Server obtains, according to the interactive request, a first data certificate whose data value is equal to the data value of the target data, and delivers the first data certificate to the second terminal. Wherein, the first data certificate contains the information of the interactive request.
[39] In the above solution, when an interactive request is delivered to acquire the target data, the Second Server detects the target data and generates the protection information when the detection succeeds, and releases the target data in the form of the first data certificate with the guarantee information. Therefore, before providing the requested data to the second terminal, a security verification mechanism is provided, which has a role of transferring the data security risk.
4 24654239.1 Date Regue/Date Received 2023-03-13 CA Application Division of CA 2,998,517, Blakes Ref. 15289/00005 [40] Please refer to Figure 3, which is a flowchart of a method for processing target data according to a third example of the present invention. The method flow shown in this example includes:
[41] Step S30: the first terminal initiates an interactive request for acquiring target data to the First Server.
[42] Wherein, the interactive request includes description information and data values of the target data, and further includes security information, which is generated when Second Server detects that the target data conforms to the scope of the Second Server.
[43] Specifically, the first terminal logs in and accesses the First Server, and delivers an interactive request for acquiring the target data.
[44] Step S31: the First Server obtains, according to the interactive request, a first data certificate whose data value is equal to the data value of the target data, and delivers the first data certificate to the second terminal. Wherein, the first data certificate contains the information of the interactive request.
[45] In an implementation manner, when the Second Server detects that the target data meets the guarantee scope of the Second Server and generates the safeguard information, the First Server generates the first data certificate with the safeguard information.
The Second Server detects the target data and adds the guarantee information to the target data when it is determined that the detection meets the guarantee range and still retains the guarantee information in the first data certificate generated by the First Server. The safeguard information may include backup information of the target data, identity information of Second Server, and so on.
[46] In another example, the First Server obtains the first data certificate from the Second Server according to the interactive request. Wherein, the first data certificate is generated when the second data server detects that the target data meets the scope of Second Server and the interactive request includes at least the storage address of the first data certificate in the Second Server. Specifically, the interactive request delivered by the first terminal to the First Server is a link address (that is, a storage address) of the first data certificate, and the link address includes a URL address that points to the first data certificate, and may further include information of the target data, data initiator information, basic information of the target data (e.g., data attributes, format, etc.).
[47] Step S32: the second terminal receives the first data certificate delivered by the First Server and delivers the first data to the Third Server.
24654239.1 Date Regue/Date Received 2023-03-13 CA Application Division of CA 2,998,517, Blakes Ref. 15289/00005 [48] In step S32, at least one second terminal is communicatively connected to the First Server over the network, and the First Server issues the first data certificate to each second terminal over the network.
[49] Specifically, the second terminal selects the first data from the data stored in the second terminal, and delivers the first data to the first terminal. The size of the data value of the first data may be larger than the size of the data value of the target data or may be smaller than the size of the data value of the target data.
[50] Step S33: When the sum of the sizes of the data values of all the data delivered by the second terminal and received by the third server within the target date is not smaller than the data value of the target data, the third server delivers the received data to the first terminal [51] In the above solution, the First Server obtains the first data certificate according to the interactive request of obtaining the target data initiated by the first terminal, and each second terminal delivers the first data to the Third Server. When the Third Server receives the target data within the target date when the sum of the data sizes of all the data delivered by the second terminal is not less than the data value of the target data, the received data is delivered to the first terminal, so that the first terminal obtains the data whose size is not smaller than the value of the target data. Before the target data interaction, the target data is detected and added by the Second Server, and pre-divides the target data into a plurality of sections and respectively saves them in different second terminals, in this way, the security risk of the target data itself is reduced, and in the process of interaction between the target data, its authority or ownership is guaranteed by risk.
[52] Please refer to Figure 5, which is a schematic flowchart of a method for acquiring target data according to a fourth example of the present invention, please also refer to the schematic diagram of data interaction shown in Figure 4. The method flow shown in this example includes:
[53] Step S40: the first terminal delivers an interactive request for obtaining target data to the First Server.
[54] Wherein, the interactive request includes description information and data values of the target data, and further includes security information, which is generated when Second Server detects that the target data conforms to the scope of the Second Server.
[55] Step S41: the First Server obtains, according to the interactive request, a first data certificate whose data value is equal to the data value of the target data, and delivers the 24654239.1 Date Regue/Date Received 2023-03-13 CA Application Division of CA 2,998,517, Blakes Ref. 15289/00005 first data certificate to the second terminal. Wherein, the first data certificate contains the information of the interactive request.
[56] Step S42: the second terminal receives the first data certificate delivered by the First Server and delivers a second data certificate to the first terminal. Wherein the second data certificate is generated by the Third Server to lock the first data in the second terminal according to the request of the second terminal.
[57] Step S43: Determine whether the sum of the sizes of the data values represented by all the second data certificates delivered by the second terminal and received by the first terminal within the target date is not smaller than the data value size of the target data, and if yes, enter Step S44, otherwise, go to step S47.
[58] Step S44: the first terminal delivers a data interaction instruction to the third server.
[59] Step S45: the Third Server receives the data interaction instruction and delivers the locked data in the second terminal to the Fourth Server in response to the data interaction instruction.
[60] Step S46: the Fourth Server delivers the received data to the first terminal, so that the first terminal acquires the target data. Then, the process is over.
[61] Further, in response to the data interaction instruction, the third server may directly deliver the locked data in the second terminal to the first terminal, so that the first terminal acquires the target data.
[62] Step S47: the first terminal delivers an instruction to the third server that the target data request fails.
[63] Step S48, in response to the instruction, the Third Server unlocks the locked data in the corresponding second terminal according to the second data certificate. Then, the process is over.
[64] In the above solution, after the Second Server detects the target data that needs to be obtained by the first terminal and adds the protection information, the First Server obtains the first data certificate according to the interactive request, and then delivers the first data certificate to the second terminals. The second terminal receives the first data certificate and accordingly delivers a second data certificate representing the first data value to the first terminal through the Third Server when acknowledging the interactive request responding to the first data certificate, enable the first terminal to collect enough second data certificate within target date. Where the second data certificate is generated by the third server by locking the first data in the second terminal according to the request of the 24654239.1 Date Regue/Date Received 2023-03-13 CA Application Division of CA 2,998,517, Blakes Ref. 15289/00005 second terminal, and when the first terminal obtains a sufficient second data certificate in the target date, Server directly or indirectly delivers the data locked by the second terminal to the first terminal, so that the target terminal finally obtains the target data. Before the target data exchange, the target server detects and adds security information to the target data, and pre-divides the target data into a plurality of parts and saves them in different second terminals respectively, the target data request that needs to be acquired is released in the form of the first data certificate with the safeguard information. In this way, the data for other terminals are reviewed before the requested data, and it has data security. At the same time, the second terminal delivers the corresponding data in the form of a second data certificate, so as to reduce the risk of being illegally tampered with, lost or intercepted by other terminals during data exchange, making the data exchange in the process of target data storage and transmission of a complete and comprehensive protection.
[65] The processing method of acquiring the target data in the example of the present invention is described below by way of example.
[66] For example, the first terminal is terminal A, and the second terminal is terminal Bl, terminal B2, and terminal B3. Target Data Bit Client D's power-on password, which is divided in advance into three parts. Each of the terminal Bl, the terminal B2, and the terminal B3 stores a part of the data of the power-on password, and the data formed can be used to turn on the client D only when the data of the three sections are grouped together and arranged in the correct order. The terminals A, Bl, B2, and B3 and the client D may be devices capable of data exchange with the server through a network, such as personal computers, tablet computers and smart phones. [67] Terminal A initiates an interactive request for obtaining target data (client D's power-on password) through First Server, and the Second Server detects the target data and adds security information to generate three first data certificates, that is, the first data certificate a, the first data certificate b and the first data certificate c. The detection of the target data by the Second Server includes detecting information (such as format, description information, security level, etc.) of the target data, and may further include detecting a terminal A (such as a permission level) for acquiring target data.
[68] The reason for this setting is that the target data or the terminal A
is detected by the Second Server to ensure whether the target data is allowed to be interacted with before the target data is transmitted or whether the terminal A is qualified to use the target data to ensure that the data security, and provide a security basis for the terminal Bl, B2, and B3 to 24654239.1 Date Regue/Date Received 2023-03-13 CA Application Division of CA 2,998,517, Blakes Ref. 15289/00005 provide their own saved part of the data.
[69] Wherein, Terminal A knows that the starting password of the client D
is divided into three parts, so the request to be delivered includes the number of the first data certificate and the permission level of terminal A. Each of the three first data certificates generated by Second Server contains the permission level of the terminal A, while each first data certificate also represents the data corresponding to the target data that needs to be obtained. For example, the first data certificate a represents the first part of the required power-on password, the first data certificate b represents the second part of the required power-on password, and the first data certificate c represents the third part of the power-on password that needs to be obtained data.
[70] The First Server then delivers the first data certificate to the terminal Bl, the terminal B2 and the terminal B3, respectively, so that the three terminals select the matched first data from the received three first data certificates according to the stored data certificate, and delivers the second data certificate to terminal A. Now, taking the terminal B1 as an example for description, the terminal B1 stores the second part of the power-on password, and selects the first data certificate b representing the second part of the data. And, the second data certificate delivered by the terminal B1 is an electronic certificate generated by the third server by locking the second part data stored by the third server, and the third server is a supervisory computer that manages the terminals Bl, B2, and B3.
Wherein, the second data certificate is the information representing the second portion of the data that is locked, and not the second portion of the data itself. The information mentioned above may be a preset symbol, a picture, and so on. Certainly, in other examples, the terminal B1 may directly deliver the second part of data to the terminal A as well.
[71] Further, the terminal A receives all the second data certificates constituting the power-on password of the client D within the target date, and then requests the Third Server to deliver its locked data to the terminal A.
[72] Further, the target data may also be text data, audio data, video data, program data or financial data in the financial field, etc. In the case of fund data, such as funds, the first terminal is a fund-raising party at this time, the deliverer of the data is an investor. First Server is a platform for raising funds. The second, third and fourth servers are Funds-Management servers, for example, banks. In the case of audio data, such as songs, the data initiator and the data deliverer may be clients with multimedia playing functions such as mobile phones. First Server is a music search platform and the second, third and 24654239.1 Date Regue/Date Received 2023-03-13 CA Application Division of CA 2,998,517, Blakes Ref. 15289/00005 fourth servers are music website servers.
[73] Please refer to Figure 6, which is a schematic structural diagram of a server according to an example of the present invention. The server 50 shown in this example includes a receiving module 51 and an interactive request delivering module 52.
[74] The receiving module 51 is used to receive a first terminal initiated interactive request for acquiring target data. Wherein, the interactive request includes description information and data values of the target data, and further includes security information, which is generated when Second Server detects that the target data conforms to the scope of the Second Server.
[75] The interactive request delivering module 52 is used to deliver the interactive request to the second terminal.
[76] In an example, the server 50 further includes a first data certificate acquisition module 53 and a first data certificate delivering module 54. The first data certificate acquisition module 53 detects that the target data meets the coverage requirement and increases when securing the information, a first data certificate is generated according to the interactive request. The first data certificate delivering module 54 is used to deliver the first data certificate to the second terminal.
[77] In another example, the server 50 further includes a first data certificate acquisition module 53 and a first data certificate delivering module 54. The first data certificate acquisition module 53 obtains, according to the interactive request, the second data certificate from the Second Server first data certificate. Wherein, the first data certificate is generated when the second data server detects that the target data meets the guaranteed range, and the request includes at least the storage address of each first data certificate in the Second Server.
Specifically, the first data certificate is generated in advance by the first terminal and stored in the Second Server. The request delivered by the first terminal to the First Server is a link address (that is, a storage address) of the first data certificate, and the link address includes point to the URL address corresponding to the first data certificate. It can also contain information about the target data, data initiator information, and basic information about the target data (e.g., data attributes, formats, etc.). The first data certificate delivering module 54 is used to deliver the first data certificate to the second terminal.
[78] Please refer to Figure 7, which is a schematic structural diagram of a terminal device in an example of the present invention. The terminal device 60 in this example is a server. The terminal device 60 includes a receiver 61, a processor 62, a transmitter 63, a read only 24654239.1 Date Regue/Date Received 2023-03-13 CA Application Division of CA 2,998,517, Blakes Ref. 15289/00005 memory 64, a random access memory 65, and a bus 66.
[79] The receiver 61 is used for receiving data.
[80] The processor 62 controls the operation of the terminal device 60. The processor 62 may also be a CPU (Central Processing Unit). The processor 62 may be an integrated circuit chip with signal processing capability. The processor 62 may also be a general purpose processor, a digital signal processor (DSP), an application specific integrated circuit (ASIC), a field programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components. The general purpose processor may be a microprocessor or the processor may also be any conventional processor and so on.
[81] This transmitter 63 is used for transmitting data.
[82] The memory may include a read-only memory 64 and a random access memory 65 and provide instructions and data to the processor 62. A portion of the memory may also include non-volatile random access memory (NVRAM).
[83] The various components of the terminal device 60 are coupled together by a bus 66, which may include a power bus, a control bus, a status signal bus, etc., in addition to the data bus.
However, for the sake of clarity, various buses are labelled as buses 66 in the figure.
[84] The memory stores the following elements, executable modules or data structures, or a subset of them, or their extensions:
[85] Operation Instructions: Various operation instructions are included for various operations.
[86] Operating System: Includes various system programs for implementing various basic services and handling hardware-based tasks.
[87] In the example of the present invention, the processor 62 performs the following operations by invoking memory-stored operation instructions (the operation instructions may be stored in the operating system):
[88] Receive an interactive request for acquiring target data delivered by a first terminal, wherein, the interactive request includes description information and data values of the target data, and further includes security information, which is generated when Second Server detects that the target data conforms to the scope of the Second Server. And [89] The interactive request is delivered to the second terminal.
[90] Optionally, the processor 62 generates a first data certificate according to the interactive request when the Second Server detects that the target data meets the coverage range and adds the protection information.

24654239.1 Date Regue/Date Received 2023-03-13 CA Application Division of CA 2,998,517, Blakes Ref. 15289/00005 [91] Optionally, the processor 62 obtains the first data certificate from the Second Server according to the interactive request. Wherein, the first data certificate is generated when the second data server detects that the target data meets the guaranteed range, and the request includes at least the storage address of each first data certificate in the Second Server. Specifically, the first data certificate is generated in advance by the first terminal and stored in the Second Server. The request delivered by the first terminal to the terminal device 60 is a link address (that is, a storage address) of the first data certificate, and the link address includes point to the URL address corresponding to the first data certificate. It can also contain information about the target data, data initiator information, and basic information about the target data (e.g., data attributes, formats, etc.).
[92] Please refer to Figure 8, which is a schematic flowchart of a method for online fund-raising in a first example of the present invention, the method includes:
[93] Step S70: the First Server receives the fund raising request for the target item delivered by the first terminal, and delivers the fund raising request to the second terminal.
[94] Wherein, the funding request includes descriptive information of the target project and the amount of funds to be raised, and also includes insurance information generated when Second Server verifies that the target project meets the scope of the Second Server.
[95] In the above scheme, Second Server pre-audits the fund-raising project and adds corresponding insurance information to the fund-raising project when it meets the scope of Second Server. First Server publishes the fund-raising request containing the insurance information so that at Second Funds will be introduced into the project to assess and guarantee the investment, guarantee investment risks to other investors (second terminal) and promote the progress of project financing.
[96] Please refer to Figure 9, which is a schematic flowchart of a method for online fund-raising in a second example of the present invention, the method includes:
[97] Step S80: the first terminal delivers a fund raising request for the target item to the First Server.
[98] Wherein, the funding request includes descriptive information of the target project and the amount of funds to be raised, and also includes insurance information generated when Second Server verifies that the target project meets the scope of the Second Server.
[99] Step S81: the First Server obtains, according to the fund raising request, a first electronic certificate with a representative amount of money equal to a fund amount required to be raised by the target item, and delivers the plurality of first electronic certificates to the 24654239.1 Date Regue/Date Received 2023-03-13 CA Application Division of CA 2,998,517, Blakes Ref. 15289/00005 second terminal. Wherein, the first electronic certificate contains the information of the interactive request.
[100] In this example, the first electronic certificate is an Object Credit Certificate and is an electronic document that includes at least a financing amount, a target amount of funds, and a preset time.
[101] In the solution above, the First Server obtains the corresponding first electronic certificate according to the funding request for the target item delivered by the first terminal. When launching a financing project in the form of electronic certificate, Second Server is introduced to review and insure the sponsored projects so as to provide investment trust and investment risk protection for other investors (the second terminal).
[102] Please refer to Figure 10, which is a schematic flowchart of a method for online financing according to a third example of the present invention. Please refer to Figure 11, a schematic diagram of a relationship for fund raising is also shown. The method flow shown in this example includes:
[103] Step S90: the first terminal delivers a fund raising request for the target item to the First Server.
[104] Wherein, the funding request includes descriptive information of the target project and the amount of funds to be raised, and also includes insurance information generated when Second Server verifies that the target project meets the scope of the Second Server.
[105] Step S91: the First Server obtains, according to the fund raising request, a first electronic certificate equal to a quota of the funds required to be raised by the target project, and delivers the first electronic certificate to the second terminal. Wherein, the first electronic certificate contains the information of the interactive request.
[106] In this example, the first electronic certificate is an Object Credit Certificate and is an electronic document that includes at least a financing amount, a target amount of funds, and a preset time.
[107] In an implementation manner, when the Second Server detects that the target item meets the coverage requirement and the insurance information is generated, the First Server generates a first electronic certificate with the insurance information. The Second Server verifies the target item and determines the guarantee information such as the insurance fee and the claim amount when the verification is approved and adds the insurance information to the target item and still retains the insurance in the first electronic certificate generated by the First Server information.

24654239.1 Date Regue/Date Received 2023-03-13 CA Application Division of CA 2,998,517, Blakes Ref. 15289/00005 [108] In another example, the First Server obtains the first electronic certificate from the Second Server according to the funding request. The first data certificate is generated when Second Server verifies the target project. The request includes at least the storage address of each first electronic certificate in the Second Server.
[109] The identification information added for the first electronic certificate when the test is passed is the signature of the person or the signature of the institution, so as to improve the authority and credibility of the target item when raising funds to the second terminal user, reduce the difficulty of raising funds.
[110] In the scenario above, Second Server can be an insurance company management server that generates an Object Credit Certificate from an Crowd funding Project via an Object Credit Certificate generator loaded with an insurance company audit plug-in.
Wherein, the insurance company will crowd funding project audit, and determine the insurance costs, claims amount and so on.
[111] Step S92: the second terminal receives the first electronic mail delivered by the First Server and delivers a certain amount of money to the third server.
[112] Step S93: When the total amount of funds received by the third server within the target date is not less than the amount of money to be raised for the target item, the third server delivers the received funds to the first terminal, so that the first terminal user obtains funding for the target project.
[113] In another implementation manner, the second terminal receives the first electronic certificate delivered by the First Server and delivers a second electronic certificate to the first terminal, and adds the second electronic certificate to the obtained first electronic certificate identification information.
[114] Wherein, the second electronic certificate is a Bank Credit Certificate, which is opened by the second terminal user with the guarantee of its bank account fund or credit line, and the bank promises to process the electronic credit certificate of payment and settlement according to the settlement conditions. That is, the Third Server is the Funds-Management server for the second terminal user. The second electronic certificate is opened by the third server for freezing the account funds or the credit limit of the second terminal user, and the frozen account or credit limit is the same as the quota represented by the first electronic certificate obtained.
[115] When the sum of the second electronic certificate funds amount received by the first terminal in the target date is not less than the amount of money required for raising the 24654239.1 Date Regue/Date Received 2023-03-13 CA Application Division of CA 2,998,517, Blakes Ref. 15289/00005 target item, the first terminal delivers a settlement request to the third server, and the third server delivers the settlement request in response to the settlement request.
The funds frozen in the second terminal user account are allocated to the Fourth Server.

Correspondingly, the fourth server allocates this part of the funds to the account of the first terminal user, so that the first terminal user can obtain the funds required for raising funds.
[116] Wherein, the Fourth Server is the Funds-Management server of the first terminal.
[117] Further, the third server may further allocate the frozen funds in the second terminal user account to the account of the first terminal according to the solution request, so that the first terminal obtains the funds needed to be raised.
[118] When the amount of money received by the first terminal within the target date is less than the amount of money to be raised for the target item, the first terminal delivers a funding failure message to Third Server, and the Third Server responds to the information to unfreeze the corresponding Second terminal user's account funds.
[119] In the solution above, the First Server obtains the corresponding first electronic certificate according to the funding request for the target item delivered by the first terminal. The second terminal receives the first electronic certificate delivered by the First Server and allocates the corresponding fund to the account of the first terminal user, so that the first terminal can raise funds required by the target project within the target date. When issuing a financing project in the form of electronic certificate, Second Server is introduced to evaluate and guarantee the project so as to provide risk protection to other investors (the second terminal).
[120] Further, after receiving the first electronic certificate, each second terminal may further deliver a second electronic certificate of equal amount of funds to the Funds-Management server of the first terminal, and release the second electronic certificate after the project financing is completed. Pay the second electronic certificate to transfer funds to the first terminal user's account. Using the second electronic certificate way with the target investment projects, the investment of funds is only temporarily frozen, making investment safer.
[121] The financing method in the examples of the present invention is described below by way of example.
[122] For example, the first terminal is a fund-raising initiator, the Second Server is an insurance company, the second terminal is an investor, and the First Server is an E-commerce platform.
24654239.1 Date Regue/Date Received 2023-03-13 CA Application Division of CA 2,998,517, Blakes Ref. 15289/00005 [123] When the funding initiator issues a request for a target of 1 million fund-raising through the E-commerce platform, the E-commerce platform utilizes the Object Credit Certificate generator provided by the insurance company or loaded with the insurance company review plug-in for this crowd funding item generate Object Credit Certificate.
This Object Credit Certificate represents a limit of 1 million. Further, the premiums may be paid by the sponsor or by the individual. In one example, the Object Credit Certificate generated by the initiator is stored on the Second Server and the Object Server Certificate is published on the publishing platform via First Server. Wherein, the link information includes a URL
address pointing to the Object Credit Certificate, and may also include item introduction information, sponsor information, commodity images, and so on.
[124] The other investors conduct the follow-up vote. Specifically, the investor a acquires the Object Credit Certificate from the initiator, and records the identity information of the investor a on the Object Credit Certificate. The investor can use the Bank Credit Certificate to purchase, it can also use other methods, such as bank transfer, Alipay and other network ways to pay. In the case of Bank Credit Certificate, Third Server freezes the account of investor a open the corresponding Bank Credit Certificate for purchasing the Object Credit Certificate.
[125] Judgement of successful fund-raising at the expiration of the funding period and completion of the transfer of funds. If the project financing is successful, then enter the implementation phase, Object Credit Certificate holder based Object Credit Certificate for a preset income. Wherein, if the investor a uses Bank Credit Certificate, the funds of the account of the third-party investor a will be paid to the sponsor's fund-raising account. If unsuccessful, the project financing fails, and the investment fund is returned according to the Object Credit Certificate. For example, in the case of a conventional payment method, the investment fund is returned to the last assignee of the Object Credit Certificate. If Bank Credit Certificate is used for payment, the investor opens a bank credit certificate to the financing account for unfreezing.
[126] In the above scheme, the target project is insured by the insurance company and secured by the insurance company. The investment needs to purchase Object Credit Certificate by online banking payment, bank transfer or through the Bank Credit Certificate way to buy, and the success of the target project will be the corresponding of the funds allocated to the sponsor's bank account. Use Object Credit Certificate to issue financing projects and introduce insurance guarantees for the projects audited by insurance companies so as to 24654239.1 Date Regue/Date Received 2023-03-13 CA Application Division of CA 2,998,517, Blakes Ref. 15289/00005 provide investment risk protection for other investors. The investor purchases the target project by means of Bank Credit Certificate. The funds frozen due to the opening of the Bank Credit Certificate are not directly transferred to the sponsor's bank account but merely frozen by the bank and cannot be used. However, the funds are still invested by the investor Bank account. As a result, the risk to the investor is greatly reduced, and at the same time it is also possible to obtain additional benefits because the frozen funds remain their own.
[127] In the above examples, the present invention has been exemplary described only, but various modifications to the present invention can be made by those skilled in the area after reading this patent application without departing from the spirit and scope of the present invention.

24654239.1 Date Regue/Date Received 2023-03-13

Claims

CA Application Division of CA 2,998,517, Blakes Ref. 15289/00005 The Claims [Claim 11 A processing method of acquiring target data, wherein the method comprises:
The First Server receives the interactive request for acquiring the target data delivered by the first terminal, and delivers the interactive request to the second terminal.
Wherein, the interactive request includes description information and data values of the target data, and further includes security information, which is generated when Second Server detects that the target data conforms to the scope of the Second Server.
[Claim 21 The method for obtaining target data according to Claim 1, wherein the First Server receives an interactive request for acquiring target data delivered by the first terminal, and delivers the interactive request to a second terminal. The steps of the terminal are as follows:
By the First Server, a first data certificate whose data value is equal to the data value of the target data according to the interactive request for acquiring the target data delivered by the first terminal, and delivering the first data certificate to Second terminal;
Where the first data certificate includes the information of the interactive request.
[Claim 31 The data processing method according to Claim 2, wherein First Server, based on the interaction request of obtaining target data delivered by the First terminal, obtains the First data certificate that represents the data value equal to the data value of the target data as follows:
Receiving, by the First Server, an interactive request for acquiring target data delivered by the first terminal, and generating the first data certificate when the Second Server detects that the target data meets the guarantee range of the Second Server.
[Claim 41 The data processing method according to Claim 2, wherein First Server, based on the interaction request of obtaining target data delivered by the First terminal, obtains the First data certificate that represents the data value equal to the data value of the target data as follows:
Receiving, by the First Server, an interactive request for acquiring target data delivered by the first terminal, and obtaining the first data certificate from the 24654239.1 Date Regue/Date Received 2023-03-13 CA Application Division of CA 2,998,517, Blakes Ref. 15289/00005 Second Server according to the interactive request, where the first data certificate is acquired by the first terminal. The Second Server generates when the Second Server detects that the target data meets the protection scope of the Second Server.
[Claim 51 The data processing method according to Claim 2, wherein the method comprises:
The second terminal receives the first data certificate and delivers the first data to the third server;
When the sum of data size values of all data delivered by the second terminal and received by the Third Server within the target date is not smaller than the data value size of the target data, the Third Server delivers the received data to the first terminal.
[Claim 61 The data processing method according to Claim 2, wherein the method comprises:
The second terminal receives the first data certificate and delivers a second data certificate to the first terminal, where the second data certificate is generated by Third Server locking the first data in the second terminal according to the request of the second terminal;
The stun of the sizes of the data values represented by all the second data certificates that are delivered by the second terminal and received by the first terminal within the target date is not less than the data value size of the target data, deliver data interaction instructions to the Third Server;
The third server receives the data interaction instruction and delivers the locked data in the second terminal to the first terminal in response to the data interaction instruction or the third server delivers the data to the first terminal in response to the data interaction instruction. The data that the second terminal is locked is delivered to the fourth server, so that the fourth server delivers the received data to the first terminal.
[Claim 71 The processing method for acquiring target data according to Claim 6, wherein the data value represented by the second data certificate and delivered by the second terminal and received by the first terminal within the target date when the size is smaller than the data value size of the target data, the method further comprises:
The first terminal delivers an instruction to the Third Server to deliver the target data interaction failure;
And The third server receives the instruction, and in response to the instruction, 24654239.1 Date Regue/Date Received 2023-03-13 CA Application Division of CA 2,998,517, Blakes Ref. 15289/00005 unlocks the locked first data in the corresponding second terminal according to the second data certificate.
[Claim 81 A server, wherein, comprising:
The receiving module is used to receive a first terminal initiated interactive request for acquiring target data;
Wherein, the interactive request includes description information and data values of the target data, and further includes security information, which is generated when Second Server detects that the target data conforms to the scope of the Second Server; and The interactive request delivering module is used to deliver the interactive request to the second terminal.
[Claim 91 The server according to Claim 8, further comprising:
First data certificate acquisition module, which is used to obtain the first data certificate representing the data value of the data value that is represented according to the data obtained from the target data delivered by the first terminal;
wherein, the first data certificate contains information about the interaction request;
The first data certificate delivering module is configured to deliver the first data certificate obtained by the first data certificate acquisition module to a second terminal.
[Claim 101 A terminal device, wherein the device includes:
One or more processors;
Memory;
Multiple applications; and One or more programs, wherein the one or more programs are stored in the memory and configured to be executed by the one or more processors, the one or more programs include instructions that, which are used for:
Receive an interactive request for acquiring target data delivered by a first terminal, wherein, the interactive request includes description information and data values of the target data, and further includes security information, which is generated when Second Server detects that the target data conforms to the scope of the Second Server; and Deliver the interactive request to the second terminal.
24654239.1 Date Regue/Date Received 2023-03-13 CA Application Division of CA 2,998,517, Blakes Ref. 15289/00005 [Claim 111 The terminal device according to Claim 10, wherein the instructions are further for:
According to the interactive request, a first data certificate whose data value is equal to a data value of the target data, where the first data certificate contains the information of the interactive request; and Deliver the first data certificate to the second terminal.
[Claim 121 An online fund raising method, wherein the method comprises:
The First Server receives a fund raising request delivered by a first terminal for a target project, and delivers the fund raising request to a second terminal.
The fund raising request includes the description information of the target project and the required fund raising amount, and also including insurance information;
The insurance information is generated when Second Server verifies that the target item conforms to the scope of the Second Server.
[Claim 131 The online financing method according to Claim 12, wherein First Server receives the funding request for the target project delivered by the First terminal and delivers the financing request to the second terminal for the following steps:
Receiving, by the First Server, a fund raising request for a target item delivered by a first terminal and obtaining, according to the fund raising request, a first electronic certificate equal in amount of funds represented by the target item and the amount of money required for raising the target item, the first electronic certificate is delivered to the second terminal.
Wherein the first electronic certificate includes the information of the fund raising request.
[Claim 141 The online financing method according to Claim 13, wherein the First Server receives a fund raising request for the target item delivered by the first terminal, and obtains a representative fund limit according to the fund raising request and the step of the first electronic certificate required for the target item to be raised with the same amount of funds is specifically as follows:
The First Server receives a funding request for the target item delivered by the first terminal, and generates the security information with the safeguard information when the second server detects that the target item meets the coverage of the second server to generate the guarantee information of the first electronic certificate.

24654239.1 Date Regue/Date Received 2023-03-13 CA Application Division of CA 2,998,517, Blakes Ref. 15289/00005 [Claim 151 The online financing method according to Claim 13, wherein the First Server receives a fund raising request for the target item delivered by the first terminal, and obtains a representative fund limit according to the fund raising request and the step of the first electronic certificate required for the target item to be raised with the same amount of funds is specifically as follows:
Receiving, by the First Server, a fund raising request for a target item delivered by the first terminal, and obtaining the first electronic certificate from the Second Server according to the fund raising request; wherein the first electronic certificate is obtained from the Second Server generates when the target server detects that the Second Server is covered by the Second Server.
[Claim 161 The online financing method according to Claim 13, wherein the method further comprises:
The second terminal receives the first electronic certificate and delivers the first fund to the Third Server;
And when the sum of the funds of all the first funds delivered by the second terminal and received by the third server within the target date is not less than the required amount of money to be raised for the target item, deliver the received funds to First terminal.
[Claim 171 The online financing method according to Claim 13, wherein the method further comprises:
The second terminal receives the first electronic certificate and delivers a second electronic certificate to the third server;
The second electronic certificate is generated by the third server freezing the first fund in the second terminal user account according to the request of the second terminal;
When the total amount of funds represented by all the second electronic certificates that are delivered by the second terminal and received by the first terminal within the target date is not less than the amount of money required for raising the target item, deliver a fund transfer instruction to the third Server;
Receiving, by the third server, the fund transfer instruction, and delivering, in response to the fund transfer instruction, funds frozen in the second terminal to the first terminal.

24654239.1 Date Regue/Date Received 2023-03-13
CA3192799A 2015-09-16 2015-09-16 Processing method for acquiring target data, server, and online funding method Pending CA3192799A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CA3192799A CA3192799A1 (en) 2015-09-16 2015-09-16 Processing method for acquiring target data, server, and online funding method

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
CA2998517A CA2998517C (en) 2015-09-16 2015-09-16 Processing method for acquiring target data, server, and online funding method
PCT/CN2015/089732 WO2017045154A1 (en) 2015-09-16 2015-09-16 Processing method for acquiring target data, server, and online funding method
CA3192799A CA3192799A1 (en) 2015-09-16 2015-09-16 Processing method for acquiring target data, server, and online funding method

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CA2998517A Division CA2998517C (en) 2015-09-16 2015-09-16 Processing method for acquiring target data, server, and online funding method

Publications (1)

Publication Number Publication Date
CA3192799A1 true CA3192799A1 (en) 2017-03-23

Family

ID=58093995

Family Applications (2)

Application Number Title Priority Date Filing Date
CA2998517A Active CA2998517C (en) 2015-09-16 2015-09-16 Processing method for acquiring target data, server, and online funding method
CA3192799A Pending CA3192799A1 (en) 2015-09-16 2015-09-16 Processing method for acquiring target data, server, and online funding method

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CA2998517A Active CA2998517C (en) 2015-09-16 2015-09-16 Processing method for acquiring target data, server, and online funding method

Country Status (3)

Country Link
CN (1) CN106464661A (en)
CA (2) CA2998517C (en)
WO (1) WO2017045154A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113014533B (en) * 2019-12-20 2022-11-08 北京金山云网络技术有限公司 Processing method, device and system for checking file, storage medium and electronic device
CN112486869A (en) * 2020-11-12 2021-03-12 北京壹体体育产业发展有限公司 Device and method for data exchange among multiple systems

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103117856B (en) * 2012-01-16 2015-07-01 深圳市可秉资产管理合伙企业(有限合伙) Method and apparatus for provisioning applications in mobile devices
CN103208065A (en) * 2012-01-16 2013-07-17 深圳市家富通汇科技有限公司 Method and apparatus for personalizing secure elements in mobile devices
US20140214675A1 (en) * 2013-01-25 2014-07-31 Pankaj Sharma Push payment system and method
CN104579663B (en) * 2013-10-24 2018-03-27 上海中移通信技术工程有限公司 For the method for the validity for limiting digital certificate

Also Published As

Publication number Publication date
CN106464661A (en) 2017-02-22
CA2998517A1 (en) 2017-03-23
CA2998517C (en) 2023-04-25
WO2017045154A1 (en) 2017-03-23

Similar Documents

Publication Publication Date Title
Guerar et al. A fraud-resilient blockchain-based solution for invoice financing
US20180075536A1 (en) Multiparty reconciliation systems and methods
US20190066206A1 (en) Peer-to-peer trading with blockchain technology
US20180091316A1 (en) System and method of providing a multi-validator oracle
US20170270527A1 (en) Assessing trust to facilitate blockchain transactions
US20170024817A1 (en) Device, System, and Method for Transfer of Commodities
AU2019229453A1 (en) Systems and methods for storing and sharing transactional data using distributed computer systems
CN111418184B (en) Credible insurance letter based on block chain
US20180204216A1 (en) Transaction settlement systems and methods
US20180268483A1 (en) Programmable asset systems and methods
WO2018204548A1 (en) Ledger management systems and methods
US20220067834A1 (en) Method, system and non-transitory computer-readable recording medium for supporting asset transactions
US10810586B2 (en) Currency information processor and currency information processing system
US20190385172A1 (en) Trade finance management systems and methods
CN111417945A (en) Credible insurance letter based on block chain
CN115456773A (en) Payment control method, device, equipment and medium based on block chain
CN111433799A (en) Credible insurance letter based on block chain
CA2998543C (en) Processing method for obtaining target data, server, and online financing method
KR102092757B1 (en) Accounting and management system using block chain
CA2998517C (en) Processing method for acquiring target data, server, and online funding method
WO2019144152A1 (en) Clearing systems and methods
WO2001067321A1 (en) Stock selling/purchasing system and stock selling/purchasing method
KR20190140869A (en) Method, system and non-transitory computer-readable recording medium for supporting securities short sale
CN115439253A (en) Data management method and device for transaction account, electronic equipment and storage medium
CN112685185A (en) Resource transfer method, device, system, computer equipment and storage medium

Legal Events

Date Code Title Description
EEER Examination request

Effective date: 20230313

EEER Examination request

Effective date: 20230313

EEER Examination request

Effective date: 20230313

EEER Examination request

Effective date: 20230313

EEER Examination request

Effective date: 20230313

EEER Examination request

Effective date: 20230313

EEER Examination request

Effective date: 20230313