CA3230041A1 - Data exchange processing method, apparatus, and online financing method - Google Patents

Data exchange processing method, apparatus, and online financing method Download PDF

Info

Publication number
CA3230041A1
CA3230041A1 CA3230041A CA3230041A CA3230041A1 CA 3230041 A1 CA3230041 A1 CA 3230041A1 CA 3230041 A CA3230041 A CA 3230041A CA 3230041 A CA3230041 A CA 3230041A CA 3230041 A1 CA3230041 A1 CA 3230041A1
Authority
CA
Canada
Prior art keywords
data
terminal
certificate
server
certificates
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CA3230041A
Other languages
French (fr)
Inventor
Yi Zhang
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
10353744 Canada Ltd
Original Assignee
10353744 Canada Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 10353744 Canada Ltd filed Critical 10353744 Canada Ltd
Priority to CA3230041A priority Critical patent/CA3230041A1/en
Publication of CA3230041A1 publication Critical patent/CA3230041A1/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3821Electronic credentials
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3821Electronic credentials
    • G06Q20/38215Use of certificates or encrypted proofs of transaction rights
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/405Establishing or using transaction specific rules
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/409Device specific authentication in transaction processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/03Credit; Loans; Processing thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/06Asset management; Financial planning or analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Development Economics (AREA)
  • Computer Security & Cryptography (AREA)
  • Economics (AREA)
  • Technology Law (AREA)
  • Marketing (AREA)
  • Game Theory and Decision Science (AREA)
  • Operations Research (AREA)
  • Human Resources & Organizations (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

Provided are a data exchange processing method, apparatus, and online financing method, the data exchange processing method comprising: first terminals, when responding to an exchange request sent by a second terminal, sending a first data certificate to said second terminal (S403); if the sum of the data value sizes represented by all of the first data certificates received by the second terminal within the preset time is smaller than the data value size of the target data, then the second terminal sending to the first server an instruction that the target data exchange has failed (S404);
the first server responding to said exchange failure instruction and unlocking the first data certificate (S405). The described data exchange method improves data exchange security.

Description

DATA EXCHANGE PROCESSING METHOD, APPARATUS, AND ONLINE FINANCING
METHOD
Technical Field [0001] The present invention relates to the field of Internet data interaction technology, and in particular, to a data interaction processing method and device, and an online funding method.
Background Technology
[0002] With the development of Internet technology and especially mobile Internet technology, users can connect to the Internet through mobile devices using 2G, 3G, 4G or WiFi to conduct transactions and social activities. Users can conveniently and effectively perform online activities, this is an incomparable experience with offline.
[0003] However, when users conduct transactions such as trading and social networking through the mobile Internet, their personal sensitive information is easily exposed and may be acquired by others in the process of interaction so that they can use their information for illegal purposes. This will provide network users a lot of risk.
Summary
[0004] It is an object of the present invention to provide a data interaction processing method and device and an online financing method which transmit data in the form of data certificate during data interaction and complete data interaction when the terminal meets a preset condition so as to improve network data interaction security.
[0005] In order to solve the above problem, a first technical solution adopted by the present invention is to provide a data interaction processing method, where the method includes: when a first terminal responds to an interactive request delivered by a second terminal, delivering, by the second terminal, a first data certificate; wherein the interactive request at least includes the data value of the target data and a preset time; and delivering, by the First Server, the first data certificate to the first terminal according to the request of the first terminal; and when all the data size values represented by all the first data certificates that are received by the second terminal within the preset time are smaller than the data size of the target data, the First Server delivers an instruction that the target data exchange fails; and the First Server unlocks the first data certificate in response Date Recue/Date Received 2024-02-23 to the instruction that the interaction fails.
[0006] In order to solve the above problem, a second technical solution adopted by the present invention is to provide a data interaction processing method, where the method includes: receiving, by a first terminal, an interactive request delivered by a second terminal;
wherein, the interactive request at least including the data value of the target data and the preset time; delivering, by the first terminal, a first data certificate to the second terminal when confirming the response to the interactive request; wherein the interactive request includes at least data of the target data value, and a preset time, where the first data certificate is generated by the First Server by locking the first data in the first terminal according to the request of the first terminal.
[0007] In order to solve the above problem, a third technical solution adopted by the present invention is to provide a data interaction processing method, where the method includes:
delivering, by a second terminal, an interactive request for acquiring target data to a first terminal, where the interactive request includes at least the data value of the target data and a preset time;
receiving, by the second terminal, a first data certificate that is delivered by the first terminal when confirming the response to the interactive request; wherein the first data certificate is a First Server generated by the first terminal; the total size of the data valuesrepresented by all the first data certificates that the second terminal receives within the preset time is less than the sum of the sizes of the data values. The size of the data value, deliver an instruction to the First Server that the target data exchange fails; wherein the instruction of failing to interact is used to notify the First Server to unlock the first data certificate.
[0008] In order to solve the above problem, a fourth technical solution adopted by the present invention is to provide a data interaction processing device, where the device includes a receiving module and a response module. The receiving module is used to receive an interaction delivered by a second terminal request, wherein the interactive request at least includes a data value of the target data and a preset time; and the response module is used to deliver a first data certificate to the second terminal when confirming the response to the interactive request;
wherein, the interactive request comprises at least a data value of the target data and a preset time, and the first data certificate is generated by the First Server according to the first terminal locking the first data in the first terminal.
[0009] In order to solve the above problem, the fifth technical solution adopted by the present Date Recue/Date Received 2024-02-23 invention is to provide a data interaction processing device, where the device includes a delivering module, an acquisition module, a confirmation module, and a notification module; the delivering module is used to deliver where the interactive request includes at least a data value of the target data and a preset time; and the acquisition module is used to receive, by the first terminal, an acknowledgement response to the request delivered by the delivering module wherein the first data certificate is generated when the First Server locks the first data in the first terminal according to the request of the first terminal; and the confirmation module is used to:
Judging whether the sum of the sizes of the data values represented by all the first data certificates that are received by the acquisition module within the preset time is less than the data value size of the target data; and the notification module is used when the confirmation module determines that the total data value size of all the first data certificate received in target date is smaller than the data value of the target data, and the instruction to deliver the target data interaction failed to the received First Server, in which the instructions for the interaction failure are used to inform the First Server to unlock the First data certificate.
[0010] In the above solution, when the second terminal responds to the interactive request delivered by the second terminal in response to the request, it delivers a first data certificate to the second terminal; all the first data certificates that the second terminal receives within a preset time represented by when the sum of the data values is smaller than the data value of the target data, the First Server delivers a message indicating that the target data exchange fails to the First Server, and notifies the First Server to unlock the first data certificate. In the foregoing manner, when data is transmitted in the form of data certificate during data exchange and the data exchange is completed when the first terminal does not meet the preset condition, the second terminal cannot successfully obtain the data provided by the second terminal. Only when the first terminal matches when the preset condition completes the data interaction, the second terminal can successfully obtain the data provided by the first terminal, which can improve the security of data interaction.
[0011] In order to solve the above problem, the sixth technical solution adopted by the present invention is to provide a method for online financing, the method comprising:
when responding to a fund raising request delivered by a second terminal, wherein the fund raising request comprises at least the target item information, the target fund amount and the preset time; the first electronic certificate is that the First Server froze the first user's funds account according to the request of the Date Recue/Date Received 2024-02-23 first terminal. And promises to settle the payment certificate of electronic credit commitment of the first fund according to the agreed conditions; the First Server is an account management server of the first user; and the first terminal delivers notification information to the first server when the sum of the funds amounts of all the first electronic certificates received by the second terminal within the preset time is less than the target amount of funds; and the instruction to deliver the target data interaction failed to the received First Server, in which the instructions for the interaction failure are used to inform the First Server to unlock the First data certificate.
[0012] In order to solve the above problem, a seventh technical solution adopted by the present invention is to provide an online financing method, wherein the method comprises: receiving, by a first terminal, a fund raising request delivered by a second terminal;
wherein, the fund raising request comprises at least target project information, a target fund amount and a preset time; and when confirming the response to the fund raising request, the first terminal delivers a first electronic certificate to the second terminal, wherein the first the electronic certificate is a payment certificate of electronic credit commitment generated by the First Server and frozen in the funds account of the first user according to the request of the first terminal and promised to be settled according to the agreed conditions; the First Server is the account management server of the first user.
[0013] In order to solve the above problem, an eighth technical solution adopted by the present invention is to provide an online financing method, wherein the method comprises: delivering, by a second terminal, a fund raising request to a first terminal; wherein, the fund raising request comprises at least the target item information, the target fund amount and the preset time;
receiving, by the second terminal, a first electronic certificate delivered by the first terminal when confirming the response to the fund raising request; wherein the first electronic certificate is First Server generates a payment certificate of electronic credit commitment that is generated by freezing the first fund in the capital account of the first user according to the request of the first terminal and promises to be settled according to the agreed conditions; and the First Server is the first account of the user Funds-Management server; and when the sum of the funds of all the first electronic certificates received by the second terminal within the preset time is not less than the target fund limit, a command for financing failure is delivered to the First Server, where the failure instruction is used to notify the First Server to respond to the financing failure instruction and to Date Recue/Date Received 2024-02-23 release the first electronic certificate.
[0014] In the solution above, when the first terminal confirms that it is responding to the fund raising request delivered by the second terminal, it delivers the first electronic certificate to the second terminal and all the first electronic certificates received by the second terminal within the preset time when the sum of the funds amount is less than the target amount of money, the First Server delivers an instruction of initiating the fund-raising failure to notify First Server to unfreeze all the first electronic certificates. In the above way, during the fund-raising process, the funds represented by the electronic certificate are transmitted, and when the fund-raising fails, the funds represented by the electronic certificate are unfrozen to the fund account of the first terminal; when the second terminal completes the fund-raising according to the preset condition. The second terminal can obtain the funds represented by the electronic certificate and increase the security of network financing. The funds represented by the first electronic certificate can also generate current interest and raise the profit of the second terminal during the funding period.
Brief Description of the Drawings
[0015] Figure 1 is a schematic flow chart of an example of an online financing method according to the present invention;
[0016] Figure 2 is a schematic flow chart of another example of the online financing method of the present invention;
[0017] Figure 3 is a schematic flow chart of still another example of the online financing method of the present invention;
[0018] Figure 4 is a schematic flow chart of an example of a data interaction processing method according to the present invention;
[0019] Figure 5 is a schematic flow chart of another example of a data interaction processing method according to the present invention;
[0020] Figure 6 is a schematic flow chart of another example of a data interaction processing method according to the present invention;
[0021] Figure 7 is a schematic structural diagram of an example of a data interaction processing device according to the present invention;
Date Recue/Date Received 2024-02-23
[0022] Figure 8 is a schematic structural diagram of an example of a data interaction processing device according to the present invention;
[0023] Figure 9 is a schematic structural diagram of an example of a data interaction processing device according to the present invention;
[0024] Figure 10 is a schematic structural diagram of an example of a data interaction processing device according to the present invention.
Detailed Description
[0025] In the following description, in order to illustrate, not to qualify, specific details such as specific system structure, interfaces, and technology are presented to make a thorough understanding of this invention. However, technical personnel in this field should be aware that this invention can be implemented in other implementation ways without these specific details. In other instances, omit the detailed instructions on the well-known devices, circuits, and methods to avoid unnecessary details that prevent the description of the invention.
[0026] Please refer to Figure 1, Figure 1 is a schematic flowchart of an online financing method according to an example of the present invention. The online financing method of this example includes the following steps:
[0027] S101: the second terminal delivers the fund-raising request of the target item to the multiple first terminals.
[0028] When the second terminal needs to initiate fund-raising for the target project, the fund-raising request is delivered to the plurality of first terminals.
[0029] Wherein, the funding request includes at least the target project information, the target amount of funds and the default time. The information of the target project is the information of the project that needs to be raised, and the target fund is the fund needed to start or finish the target project. The preset time is the funding period.
[0030] Further, the target project information may also include the way of reporting, that is, the way of reporting the object of financing to the object of financing after the target project is started or completed, the way of reporting may be cash or non-cash, for example, shares, bonuses, membership privileges, etc., which is not limited herein.

Date Recue/Date Received 2024-02-23
[0031] It can be understood that the fund-raising request may be delivered by the second terminal directly to the first terminal that meets the requirement, or it may be that the second terminal delivers the fund-raising request to the electricity supplier platform, and the electricity supplier platform screens the first terminal, and delivers the funding request to the first terminal that meets the requirement, which is not limited herein. The E-commerce platform is a server with integrated E-commerce capabilities. The E-commerce platform can be integrated with First Server or with two independent servers.
[0032] It is understandable that, in this example, the fund raising request may be delivered in the form of information and webpage links, and may also be delivered in the form of an electronic certificate, which is not limited herein.
[0033] Further, when the second terminal delivers the fund raising request in the form of an electronic certificate, step S101 is specifically:
[0034] The second terminal generates a plurality of second electronic certificates according to the fund raising request information of the target item, and delivers the plurality of second electronic certificates to the Second Server; and the Second Server delivers the received multiple second electronic certificates to the multiple first terminals.
[0035] Wherein, the second electronic certificate at least includes the amount of funds represented by the second electronic certificate, the target item information, the target amount of funds and the preset time. The sum of the financing quotas represented by the multiple second electronic certificates is greater than or equal to the target funding limit.
[0036] Wherein, the second electronic certificate may be an Object Credit Certificate, and the Object Credit Certificate is an electronic certificate that integrates the project identifier and the E-commerce function and records the project information.
[0037] S102: the first terminal receives the fund raising request and confirms whether to respond to the fund raising request.
[0038] The first terminal receives the fund raising request delivered by the second terminal, and confirms whether to respond to the fund raising request according to the information contained in the fund raising request.

Date Recue/Date Received 2024-02-23
[0039] Further, when the second terminal delivers the fund raising request in the form of an electronic certificate, step S102 is specifically: receiving, by the first terminal, a plurality of second electronic certificates delivered by the second terminal, and confirming, according to the second electronic certificate information, whether accept at least one second electronic certificate.
[0040] When the first terminal confirms the response to the fund-raising request, step S102 is executed; and when the first terminal confirms not to respond to the fund-raising request, the process ends.
[0041] 5103: the first terminal delivers a first electronic certificate to the second terminal when confirming the response to the fund-raising request.
[0042] When the first terminal acknowledges responding to the fund raising request delivered by the second terminal, the first terminal delivers a first electronic certificate to the second terminal.
[0043] The first electronic certificate is generated by the First Server according to the first terminal's request to freeze the first funds in the first user's funds account and promises to settle the payment certificate of electronic credit commitment of the first fund according to the agreed conditions. The first user is a user of the first terminal, the amount of money represented by the first electronic certificate is a first amount of money, and the First Server is an account management server of the first user.
[0044] Further, when the second terminal delivers the fund raising request in the form of an electronic certificate, step 5103 is specifically: the first terminal delivers the first electronic certificate to the second terminal when it is confirmed that the second terminal receives at least one second electronic certificate; wherein, the amount of investment represented by the first electronic certificate equals the sum of the financing amount represented by at least one second electronic certificate accepted by the second terminal.
[0045] 5104: When the sum of the funding amounts of all the first electronic certificates that are received by the second terminal within the preset time is less than the target credit limit, the second terminal delivers an instruction to the First Server that the financing is unsuccessful.
[0046] For example, when the second terminal confirms that the amount of funds of all the Date Recue/Date Received 2024-02-23 first electronic certificates received within the preset time is less than the target amount of money, the fund-raising for the target item fails. The second terminal delivers an instruction to raise funds to the First Server corresponding to the received first electronic certificate, and delivers the received first electronic certificate to the corresponding First Server.
[0047] Further, when the sum of the funding amounts of all the first electronic certificates that are received by the second terminal within the preset time is not less than the target credit limit, notification information is delivered to the First Server; and delivering, by the First Server in response to the notification information, the funds represented by the first electronic certificate to the funds account of the second user.
[0048] For example, when the second terminal confirms that the sum of the funding amounts of all the first electronic certificates received within the preset time is greater than or equal to the target funding amount, for the successful financing of the target project, the second terminal delivers the notification message to First Server, which is received by the First electronic certificate.
[0049] Upon receiving the notification information delivered by the second terminal, the First Server releases the funds represented by the first electronic certificate in response to the notification message and transfers the unfrozen funds from the first user's funds account to the second user's funds account. The second user is the user of the second terminal.
[0050] Wherein, First Server may directly transfer the unfrozen funds to the second user's funds account, or may allocate the unfrozen funds to the second terminal's funds account by other means, which is not limited herein.
[0051] Further, the step of the First Server, in response to the notification information, allocating the fund represented by the first electronic certificate to the fund account of the second user specifically includes:
[0052] In response to the notification message, First Server allocates the funds represented by the first electronic certificate to the funds account of Third Server. After Server allocates the funds represented by the first electronic certificate to the funds account of Third Server, notify Third Server to transfer funds not less than the target funds amount to the second user's funds account so that the second terminal can use the funds raised to start the target project.

Date Recue/Date Received 2024-02-23
[0053] S105: the First Server responds to the fund raising failure instruction, and unfreezes all the first electronic certificates.
[0054] When the First Server receives the instruction of the fund raising failure delivered by the second terminal and the first electronic certificate, in response to the instruction of the fund raising failure, the First Server releases all the received first electronic certificates to deliver the first electronic certificate. The funds are returned to the funds account of the first terminal.
[0055] In the solution above, when the first terminal confirms that it is responding to the fund raising request delivered by the second terminal, it delivers the first electronic certificate to the second terminal and all the first electronic certificates received by the second terminal within the preset time when the sum of the funds amount is less than the target amount of money, the First Server delivers an instruction of initiating the fund-raising failure to notify First Server to unfreeze all the first electronic certificates. In the above way, during the fund-raising process, the funds represented by the electronic certificate are transmitted, and when the fund-raising fails, the funds represented by the electronic certificate are unfrozen to the fund account of the first terminal; when the second terminal completes the fund-raising according to the preset condition. The second user can obtain the funds represented by the electronic certificate and increase the security of network financing. The funds represented by the first electronic certificate can also generate current interest and raise the profit of the first terminal during the funding period.
[0056] Please refer to Figure 2, Figure 2 is a schematic flowchart of an online financing method according to an example of the present invention. The executive body in this example is a second terminal. The online financing method of this example includes the following steps:
[0057] S201: the second terminal delivers a fund raising request of the target item to the first terminal.
[0058] When the second terminal needs to initiate fund-raising for the target project, the second terminal delivers the fund-raising request to the plurality of first terminals.
[0059] Wherein, the funding request includes at least the target project information, the target amount of funds and the default time. The information of the target project is the information of the project that needs to be raised, and the target fund is the fund needed to start or finish the target project. The preset time is the funding period.
Date Recue/Date Received 2024-02-23
[0060] Further, the target project information may also include the way of reporting, that is, the way of reporting the object of financing to the object of financing after the target project is started or completed, the way of reporting may be cash or non-cash, for example, shares, bonuses, membership privileges, etc., which is not limited herein.
[0061] It can be understood that the fund-raising request may be delivered by the second terminal directly to the first terminal that meets the requirement, or it may be that the second terminal delivers the fund-raising request to the electricity supplier platform, and the electricity supplier platform screens the first terminal, and delivers the funding request to the first terminal that meets the requirement, which is not limited herein. The E-commerce platform is a server with integrated E-commerce capabilities. The E-commerce platform can be integrated with First Server or with two independent servers.
[0062] It is understandable that, in this example, the fund raising request may be delivered in the form of information and webpage links, and may also be delivered in the form of an electronic certificate, which is not limited herein.
[0063] Further, when the second terminal delivers the fund raising request in the form of an electronic certificate, step S201 is specifically:
[0064] The second terminal generates a plurality of second electronic certificates according to the fund raising request information of the target item, and delivers the plurality of second electronic certificates to the Second Server; and the Second Server delivers the received multiple second electronic certificates to the multiple first terminals.
[0065] Wherein, the second electronic certificate at least includes the amount of funds represented by the second electronic certificate, the target item information, the target amount of funds and the preset time. The sum of the financing quotas represented by the multiple second electronic certificates is greater than or equal to the target funding limit.
The second electronic certificate may be an Object Credit Certificate, and the Object Credit Certificate is an electronic certificate that integrates the proj ect identifier and the E-commerce function and records the project information.
[0066] S202: the second terminal receives the first electronic certificate that is delivered by the first terminal when confirming the response to the fund-raising request.

Date Recue/Date Received 2024-02-23
[0067] Wherein, the first electronic certificate is delivered by the first terminal to the second terminal when the first terminal confirms the response to the fund raising request delivered by the second terminal, and the request for fund raising includes at least the target item information, the target amount of money and the preset time. The information of the target project is the information of the project that needs to be raised, and the target fund is the fund needed to start or finish the target project. The preset time is the funding period.
[0068] The first electronic certificate is generated by the First Server according to the first terminal's request to freeze the first funds in the first user's funds account and promises to settle the payment certificate of electronic credit commitment of the first fund according to the agreed conditions. The first user is a user of the first terminal, the amount of money represented by the first electronic certificate is a first amount of money, and the First Server is an account management server of the first user.
[0069] When the second terminal delivers the fund raising request in the form of an electronic certificate, step S202 is specifically: receiving, by the second terminal, a first electronic certificate that is delivered when the first terminal confirms accepting the at least one second electronic certificate.
[0070] Wherein, the second electronic certificate is generated by the second terminal according to the target item information, and there are multiple second electronic certificates.
[0071] The amount of money frozen on behalf of the first electronic certificate equals the sum of the financing amount represented by the second electronic certificate accepted by the first terminal.
[0072] S203: When the sum of the funding amounts of all the first electronic certificates that are received by the second terminal within the preset time is less than the target credit limit, the second terminal delivers an instruction to the First Server that the financing is unsuccessful.
[0073] The failed funding instruction is used to notify First Server to respond to the failed funding instruction and release the first electronic certificate.
[0074] For example, when the second terminal confirms that the amount of funds of all the first electronic certificates received within the preset time is less than the target amount of money, Date Recue/Date Received 2024-02-23 the fund-raising for the target item fails. The second terminal delivers an instruction for fund raising failure to the received First Server corresponding to the first electronic certificate and delivers the received first electronic certificate to the corresponding First Server so that the First Server receives the instruction of the fund raising failure and the first electronic certificate, in response to the instruction of the funding failure, unfreezing all the received first electronic certificates to return the funds represented by the first electronic certificate to the second user's funds account.
[0075] Further, when the sum of the funding amounts of all the first electronic certificates that are received by the second terminal within the preset time is not less than the target credit limit, notification information is delivered to the First Server.
[0076] For example, when the second terminal confirms that the sum of the funding amounts of all the first electronic certificates received within the preset time is greater than or equal to the target funding amount, for the successful financing of the target project, the second terminal delivers the notification message to First Server, which is received by the First electronic certificate, so that to notify First Server to unfreeze the funds represented by the First electronic certificate and transfer the unfrozen funds to the second user's funds account so that the second user can use the funds raised to start the target project. The second user is a second terminal user.
[0077] Wherein, First Server may directly transfer the funds unfrozen to the funds account of the second terminal, or may allocate the unfrozen funds to the funds account of the second terminal through other channels, which is not limited herein.
[0078] In the solution above, the second terminal delivers financing information to the multiple first terminals and receives the first electronic certificate delivered by the first terminal when confirming the response to the fund-raising request. The second terminal receives all when the sum of the funds of the first electronic certificate is less than the target amount of fund, the first electronic certificate delivers an instruction of initiating an fund-raising failure to First Server to notify First Server to unfreeze the first electronic certificate. In the above manner, the funds represented by the electronic certificate are transmitted in the process of fund-raising, and the funds represented by the electronic certificate are unfrozen to the funds account of the second terminal when the fund-raising fails; and the second terminal completes the financing according to the preset conditions. The second user can obtain the funds and improve the security of the network Date Recue/Date Received 2024-02-23 financing. The funds represented by the first electronic certificate within the funding period can also generate interest rates and increase the profits of the first user.
[0079] Please refer to Figure 3, Figure 3 is a schematic flowchart of an online financing method according to another example of the present invention. The executive body in this example is a first terminal. The online financing method of this example includes the following steps:
[0080] S301: the first terminal receives the fund raising request delivered by the second terminal.
[0081] The first terminal receives a fund raising request initiated by the second terminal for the target item. Wherein, the funding request includes at least the target project information, the target amount of funds and the default time. The information of the target project is the information of the project that needs to be raised, and the target fund is the fund needed to start or finish the target project. The preset time is the funding period.
[0082] Further, the target project information may also include the way of reporting, that is, the way of reporting the object of financing to the object of financing after the target project is started or completed, the way of reporting may be cash or non-cash, for example, shares, bonuses, membership privileges, etc., which is not limited herein.
[0083] It can be understood that the fund-raising request may be delivered by the second terminal directly to the first terminal that meets the requirement, or it may be that the second terminal delivers the fund-raising request to the electricity supplier platform, and the electricity supplier platform screens the first terminal, and delivers the funding request to the first terminal that meets the requirement, which is not limited herein. The E-commerce platform is a server with integrated E-commerce capabilities. The E-commerce platform can be integrated with First Server or with two independent servers.
[0084] It is understandable that, in this example, the fund raising request may be delivered in the form of information and webpage links, and may also be delivered in the form of an electronic certificate, which is not limited herein.
[0085] Further, when the second terminal delivers the fund raising request in the form of an electronic certificate, the step S301 is specifically:

Date Recue/Date Received 2024-02-23
[0086] The first terminal receives multiple second electronic certificates that are delivered by the second terminal through the Second Server.
[0087] Wherein, the plurality of second electronic certificates are generated by the second terminal according to the fund raising request information of the target item.
The second electronic certificate at least includes the amount of funds represented by the second electronic certificate, the target item information, the target amount of funds, and the preset time.
The sum of the financing quotas represented by the multiple second electronic certificates is greater than or equal to the target funding limit. The second electronic certificate may be an Object Credit Certificate, and the Object Credit Certificate is an electronic certificate that integrates the project identifier and the E-commerce function and records the project information.
[0088] S302: the first terminal delivers a first electronic certificate to the second terminal when confirming the response to the fund-raising request.
[0089] When receiving the fund raising request delivered by the second terminal, the first terminal confirms whether to respond to the fund raising request and delivers a first electronic certificate to the second terminal when confirming the response to the fund raising request delivered by the second terminal.
[0090] Wherein, the first electronic certificate is generated by the First Server freezing the first fund in the fund account of the first user according to the request of the first terminal, and promises to settle the payment certificate of electronic credit commitment of the first fund according to the agreed conditions. The first user is a user of the first terminal, the amount of money represented by the first electronic certificate is a first amount of money, and the First Server is an account management server of the first user.
[0091] Further, step 302 is specifically: delivering, by the first terminal, a request for generating the first electronic certificate to the First Server in response to determining that the fund raising request is delivered in response to the second terminal; wherein the request is at least Includes information of a first fund to be frozen; and when receiving the first electronic certificate delivered by the First Server, the first terminal delivers the first electronic certificate to the second terminal.
[0092] Further, when the second terminal delivers the fund raising request in the form of an Date Recue/Date Received 2024-02-23 electronic certificate, step S302 is specifically: the first terminal delivers the first electronic certificate to the second terminal when it is confirmed that the second terminal receives at least one second electronic certificate; wherein, the amount of investment represented by the first electronic certificate equals the sum of the financing amount represented by at least one second electronic certificate accepted by the second terminal.
[0093] In the solution above, when confirming the response to the fund raising request delivered by the first terminal, the second terminal delivers the first electronic certificate to the first terminal. In the above manner, the funds represented by the electronic certificate are transmitted in the process of fund-raising, and the funds represented by the electronic certificate are unfrozen to the funds account of the second terminal when the fund-raising fails; and the second terminal completes the financing according to the preset conditions. The second user can obtain the funds and improve the security of the network financing. The funds represented by the first electronic certificate within the funding period can also generate interest rates and increase the profits of the first user.
[0094] Please refer to Figure 4, Figure 4 is a schematic flow chart of third example of a data interaction processing method according to the present invention. The data interaction processing method in this example includes the following steps:
[0095] S401: the second terminal delivers an interactive request for acquiring target data to multiple first terminals.
[0096] When the second terminal needs to acquire the target data, the second terminal delivers an interactive request for acquiring the target data to the multiple first terminals. The interactive request includes at least the data value of the target data and the preset time.
[0097] It is understandable that the interactive request may be delivered in the form of information, but not limited thereto, and may also be delivered in the form of data certificate, which is not limited herein.
[0098] When the interactive request is delivered in the form of data certificate, step S401 is specifically:
[0099] The second terminal generates a plurality of second data certificates according to the Date Recue/Date Received 2024-02-23 interactive request of the target data, and delivers the plurality of second data certificates to the Second Server, and the Second Server delivers the received second data certificates to the plurality of first terminal.
[0100] Wherein, the second data certificate at least includes the data represented by the second data certificate, the data value of the target data, and the preset time, and the sum of the data values of the data represented by the multiple second data certificates is greater than or equal to the sum of the data values of the target data. The data represented by the second data certificate is the first data of the target data.
[0101] S402: the first terminal receives the interactive request, and confirms whether to respond to the interactive request.
[0102] When receiving the interactive request delivered by the second terminal, the first terminal confirms whether to respond to the interactive request. Further, when the interactive request is delivered in the form of data certificate, step S402 is specifically: receiving, by the first terminal, a plurality of second data certificates delivered by the second terminal, and confirming to accept at least one second data certificate according to the second data certificate information.
[0103] When responding to the interactive request, step S403 is executed;
and when the interactive request is not responded, the process ends.
[0104] S403: the first terminal delivers a first data certificate to the second terminal when responding to the interactive request delivered by the second terminal.
[0105] The first data certificate is generated by the First Server by locking the first data in the first terminal according to the request of the first terminal.
[0106] Further, when the interactive request is delivered in the form of data certificate, step S403 is specifically: the first terminal delivers the first data certificate to the second terminal when confirming the acceptance of at least one second data certificate.
[0107] The size of the data value of the locked data represented by the first data certificate is equal to the sum of the data values of the data represented by the second data certificate accepted by the first terminal.
[0108] S404: When the sum of the sizes of the data values represented by all the first data Date Recue/Date Received 2024-02-23 certificates that are received by the second terminal within the preset time is less than the data value of the target data, deliver target data exchange failed instructions.
[0109] For example, when the second terminal confirms that the sum of the data value sizes represented by all the first data certificates received within the preset time is smaller than the data value size of the target data included in the interactive request, the acquiring, by the second terminal, the received first data server corresponding to the first data certificate delivers an instruction that the target data exchange fails, and delivers the received first data certificate to the corresponding First Server.
[0110] Further, when the sum of the sizes of the data values represented by all the first data certificates that are received by the second terminal within the preset time is not less than the data value size of the target data, sending, by the First Server, notification information; and in response to the notification information, adding, by the First Server, data with the same size as the data value of the data represented by the first data certificate to the second terminal.
[0111] For example, when the second terminal confirms that the sum of the sizes of the data valuesrepresented by all the first data certificates received within the preset time is greater than or equal to the size of the data value of the target data, the received second data certificate corresponding First Server, and delivers a notification to the First Server that the target data exchange was successful. The notification information includes at least the first data certificate information.
[0112] When receiving the notification information delivered by the second terminal, the First Server unlocks the data of the same size as the data value of the data represented by the first data certificate in response to the notification message, and adds the unlocked data to the second terminal.
[0113] Wherein, the First Server may directly add the unlocked data to the second terminal, or may add the unlock data to the second terminal by other means, which is not limited herein.
[0114] S405: the First Server unlocks the first data certificate in response to the instruction that the interaction fails.
[0115] When the First Server receives the instruction of the interaction failure and the first Date Recue/Date Received 2024-02-23 data certificate delivered by the second terminal, the First Server unlocks the received first data certificate and responds to the instruction of the interaction failure, and the data represented by the first data certificate is added to the data unit of first terminal.
[0116] The data interaction processing method in the example of the present invention is described below by way of example.
[0117] For example, the first terminal is User B, the second terminal is user C, and the first terminal is multiple, that is, Bl, B2, ...,: Bn. User B is an administrator for more than one client and has a corresponding password for each client for administrator privileges.
Clients can be personal computers, tablets, smart phones and other devices that can exchange data with servers through the network. The user C initiates an interactive request that needs target data to the User B. The target data includes first data, second data,..., N th data, and the first data is a password for requesting administrator rights of one of the clients, and the second data is a password for requesting management rights of another client. That is, the user C requests the User B1 the password of the administrator authority of the Client 2 and the password of the administrator authority of the Client 3 to the User B2.
[0118] When the User B determines that the interactive request for acquiring the target data delivered by the user C is to be responded to, the User B issues a data certificate to the user C
through the First Server and delivers the data certificate to the user C. The user C may set a preset time for requesting the User B to respond to the interactive request. For example, user C sets that User B needs to deliver the administrator rights of clients 2 and 3 to User B
within a month.
[0119] Wherein, User B's administrator password is saved in the First Service Party, and for each client, the corresponding administrator privileges have different levels of importance. For example, Client 1 is a corporate server, Client 2 is a tablet, and Client 3 is a personal computer.
Therefore, you need to set the highest level of administrator privileges for Client 1, the most important level for administrator permissions for Client 3, and secondly, the importance level for Client 2's administrator permissions.
[0120] When User B1 agrees to pass the Client 2's administrator authority to user C, the corresponding data certificate is provided to First Server. The data certificate may be an operation log when the User B1 manages the Client 2, so as to prove the security and reliability of the User Date Recue/Date Received 2024-02-23 B1 .
[0121] 126] When User B2 agrees to give Client 3's administrator authority to User C, the corresponding data certificate is provided to First Server. The data certificate may be an operation log when the User B2 manages the Client 3, so as to prove the security and reliability of the User B2.
[0122] When the user C receives the data certificate submitted by the User B 1, the user C
blocks the administrator right of the User B1 on the Client 2 according to the content of the data certificate submitted by Bl, that is, the User B1 cannot use the corresponding password to decrypt the Client 2 to manage. When the First Server receives the data certificate submitted by the User B2, the First Server blocks, according to the content of the data certificate submitted by the B2, the administrator right of the User B2 on the Client 3, that is, the User B2 cannot manage the Client 3 by using the corresponding password.
[0123] When user C confirms that only the data certificate issued by User B1 or User B2 is acquired within the preset time, the target data fails to be obtained. User C
notifies First Server to return the data certificate delivered by B1 to User B1 to return the password of Client 2's administrator right and the data certificate returned by B2 to User B2 to return the password of Client 3's administrator.
[0124] When the user C confirms that both the data certificates issued by the users B1 and B2 are obtained within the preset time, the user C delivers an instruction to the First Server to obtain the target data to notify the First Server to acquire the Client 2 and the Client 3 and delivers the password of the administrator authority of the Client 2 and the Client 3 to the user C and opens the authority of the first data in the Client 2 for the user C and the password of the second user in the open Client 3 data permissions.
[0125] In the above, when the User B (data provider) receives a request from the user C (data requesting party) for obtaining the administrator authority password of the Client 2 or 3, the First Server confirms whether it is the user C according to the instruction delivered by the user C open Client 2, 3 administrator privileges. On the one hand, User B1 and B2 give administrators authority to the process of user C. Risk management is controlled through First Server.
User data and certificate of B1 and B2 are guaranteed as guarantee, so that administrators' rights will not be Date Recue/Date Received 2024-02-23 transferred arbitrarily. On the other hand, when the First Server confirms that the user C
successfully acquires the target data within the preset time, the administrator delivers the administrator authority of the Client 2 or 3 storing the target data to the user C; and when the target data is failed to be acquired, the First Server returns Users B1 and B2 have their own administrator rights on their respective clients so as to ensure that there is only one administrator's authority on the clients so as not to cause confusion in the client's data management and avoid the risk of client data security.
[0126] Further, the requested data may also be text data, audio data, video data, program data or financial data in the financial field, etc. In the case of financial data, such as funds, the User B
is now connected to the user, the user C is the sponsor of funding, the server is Funds-Management server, for example, bank. If it is audio data, such as a song, the data requester and the data initiator may be clients with multimedia playing functions such as mobile phones, and the server is a music web site server.
[0127] In the above solution, when the first terminal responds to the interactive request delivered by the second terminal in response to the request, it delivers a first data certificate to the second terminal; all the first data certificates that the second terminal receives within a preset time represented by when the sum of the data values is smaller than the data value of the target data, the First Server delivers a message indicating that the target data exchange fails to the First Server, and notifies the First Server to unlock the first data certificate. In the foregoing manner, when data is transmitted in the form of data certificate during data exchange and the data exchange is completed when the first terminal does not meet the preset condition, the second terminal cannot successfully obtain the data provided by the second terminal. Only when the first terminal matches when the preset condition completes the data interaction, the second terminal can successfully obtain the data provided by the first terminal, which can improve the security of data interaction.
[0128] Please refer to Figure 5, Figure 5 is a schematic flowchart of another example of a data interaction processing method according to the present invention. The executive body in this example is a second terminal. The data interaction processing method in this example includes the following steps:
[0129] S501: the second terminal delivers an interactive request for acquiring target data to multiple first terminals.

Date Recue/Date Received 2024-02-23
[0130] When it is needed to acquire the target data, the second terminal delivers an interactive request for acquiring the target data to the multiple first terminals. The interactive request includes at least the data value of the target data and the preset time.
[0131] It is understandable that the interactive request may be delivered in the form of information, but not limited thereto, and may also be delivered in the form of data certificate, which is not limited herein.
[0132] When the interactive request is delivered in the form of data certificate, step S501 is specifically as follows:
[0133] The second terminal generates a plurality of second data certificates according to the interactive request of the target data, and delivers the plurality of second data certificates to the Second Server, and the Second Server delivers the received second data certificates to the plurality of first terminal.
[0134] Wherein, the second data certificate at least includes the data represented by the second data certificate, the data value of the target data, and the preset time, and the sum of the data values of the data represented by the multiple second data certificates is greater than or equal to the sum of the data values of the target data. The data represented by the second data certificate is the first data of the target data.
[0135] S502: the second terminal receives the first data certificate delivered by the first terminal.
[0136] Wherein, the first data certificate is delivered by the first terminal to the second terminal in response to the interactive request for acquiring the target data delivered by the second terminal, where the target data includes at least the data value of the target data and the preset time, and the first A data certificate is generated for the First Server to lock the first data in the first terminal according to the request of the first terminal.
[0137] Further, when the interactive request is delivered in the form of data certificate, step S502 is specifically: receiving, by the second terminal, the first data certificate that is delivered by the first terminal when confirming the acceptance of the at least one second data certificate. Where the at least one second data certificate is at least one of a plurality of second data certificates that Date Recue/Date Received 2024-02-23 the Second Server delivers to the second terminal.
[0138] The size of the data value of the locked data represented by the first data certificate is equal to the sum of the data values of the data represented by the second data certificate accepted by the first terminal.
[0139] S503: When the sum of the sizes of the data values represented by all the first data certificates that are received by the second terminal within the preset time is less than the data value of the target data, deliver target data exchange failed instructions.
[0140] For example, when the second terminal confirms that the sum of the data value sizes represented by all the first data certificates received within the preset time is smaller than the data value size of the target data included in the interactive request, the acquiring, by the second terminal, the received first data server corresponding to the first data certificate delivers an instruction that the target data exchange fails, and delivers the received first data certificate to the corresponding First Server. Wherein, the instruction of interaction failure is used to notify First Server to unlock the first data certificate.
[0141] When the First Server receives the instruction of the interaction failure and the first data certificate delivered by the second terminal, the First Server unlocks the received first data certificate and responds to the instruction of the interaction failure, and the data represented by the first data certificate is added to first terminal.
[0142] Further, when the sum of the sizes of the data values represented by all the first data certificates that are received by the second terminal within the preset time is not less than the data value size of the target data, the first terminal notifies the first server adds data with the same size as the data value of the data represented by the first data certificate to the second terminal.
[0143] For example, when the second terminal confirms that the sum of the sizes of the data values represented by all the first data certificates that are received within the preset time is not less than the size of the data value of the target data, the received first data certificate corresponding and delivers the First Server a notification message indicating that the target data exchange succeeds, so as to notify the First Server to add the data of the same size as the data value of the data represented by the first data certificate to the storage unit of second terminal. The notification information includes at least the first data certificate information.

Date Recue/Date Received 2024-02-23
[0144] In the solution above, when the second terminal receives the first data certificate delivered by the first terminal and confirms that the sum of the sizes of the data values represented by all the first data certificates received within the preset time is smaller than the data value of the target data. Sends a message to First Server that the target data exchange fails, so as to notify First Server to unlock the first data certificate. In the foregoing manner, when data is transmitted in the form of data certificate during data exchange and the data exchange is completed when the first terminal does not meet the preset condition, the second terminal cannot successfully obtain the data provided by the second terminal. Only when the first terminal matches when the preset condition completes the data interaction, the second terminal can successfully obtain the data provided by the first terminal, which can improve the security of data interaction.
[0145] Please refer to Figure 6, Figure 6 is a schematic flow chart of example of a data interaction processing method according to the present invention. The executive body in this example is a first terminal. The data interaction processing method in this example includes the following steps:
[0146] S601: the first terminal receives the interactive request delivered by the second terminal.
[0147] The first terminal receives an interactive request for acquiring target data delivered by a second terminal, and confirms whether to respond to the interactive request.
The interactive request includes at least the data value of the target data and the preset time.
[0148] It is understandable that the interactive request may be delivered in the form of information, but not limited thereto, and may also be delivered in the form of data certificate, which is not limited herein.
[0149] When the interactive request is delivered in the form of data certificate, step S601 is specifically: receiving, by the first terminal, a plurality of second data certificates delivered by the second terminal, and confirming whether to accept at least one second data certificate according to the second data certificate information.
[0150] The second data certificate is generated by the second terminal according to the interactive request of the target data, where the second data certificate is generated and delivered by the Second Server to the first terminal.

Date Recue/Date Received 2024-02-23
[0151] Wherein, the second data certificate at least includes the data represented by the second data certificate, the data value of the target data, and the preset time, and the sum of the data values of the data represented by the multiple second data certificates is greater than or equal to the sum of the data values of the target data. The data represented by the second data certificate is the first data of the target data.
[0152] When responding to the interactive request, step S602 is executed;
and when the interactive request is not responded, the procedure ends.
[0153] S602: the first terminal delivers a first data certificate to the second terminal when confirming the response to the interactive request.
[0154] Wherein, the interactive request includes at least the data value of the target data and the preset time. The first data certificate is generated by the First Server by locking the first data in the first terminal according to the request of the first terminal.
[0155] Further, when the interactive request is delivered in the form of data certificate, step S602 is specifically: the first terminal delivers the first data certificate to the second terminal when confirming the acceptance of at least one second data certificate.
[0156] The size of the data value of the locked data represented by the first data certificate is equal to the sum of the data values of the data represented by the second data certificate accepted by the first terminal.
[0157] Further, the step of the first terminal delivering the first data certificate to the second terminal when confirming the response to the interactive request is specifically:
[0158] The first terminal delivers a request for generating a first data certificate to the First Server when confirming the response to the interactive request delivered by the second terminal.
The request for generating the first data certificate includes at least the information of the first data to be locked. When receiving the first data certificate delivered by the First Server, the first terminal delivers the first data certificate to the second terminal.
[0159] In the solution above, when confirming to respond to the interactive request delivered by the second terminal, the first terminal delivers a first data certificate to the first terminal. In the foregoing manner, when data is transmitted in the form of data certificate during data exchange Date Recue/Date Received 2024-02-23 and the data exchange is completed when the first terminal does not meet the preset condition, the second terminal cannot successfully obtain the data provided by the second terminal. Only when the first terminal matches when the preset condition completes the data interaction, the second terminal can successfully obtain the data provided by the first terminal, which can improve the security of data interaction.
[0160] Please refer to Figure 7, Figure 7 is a schematic structural diagram of an example of a data interaction processing device according to the present invention. Each module included in the data interaction processing device in this example is used to execute each step in the example corresponding to Figure 5 and Figure 5. For details, reference may be made to related descriptions in the examples corresponding to Figure 5 and Figure 5, and details are not described herein again.
The data interaction processing device in this example is a second terminal.
The data interaction processing device in this example includes a delivering module 710, an acquisition module 720, a confirming module 730, and a notification module 740.
[0161] The delivering module 710 is used to deliver an interactive request for acquiring target data to a first terminal, where the interactive request includes at least a data value of the target data and a preset time.
[0162] The acquisition module 720 is used to receive a first data certificate delivered by a first terminal, where the first data certificate is delivered when the first terminal confirms to respond to an interactive request delivered by a second terminal, where the interaction request includes at least the data value of the target data and the preset time, and the first data certificate is generated by the First Server locking the first data in the first terminal.
[0163] Further, the acquisition module 720 is used to receive the first data certificate delivered by the first terminal when confirming the acceptance of the at least one second data certificate, where the at least one second data certificate is delivered by the second terminal according to the target second data certificate generated by the interactive request for the data and delivered by the Second Server to the acquisition module 720.
[0164] The confirming module 730 is used to determine whether the sum of the sizes of the data values represented by all the first data certificates that are received by the acquisition module within the preset time is less than the data value size of the target data.

Date Recue/Date Received 2024-02-23
[0165] The notification module 740 is further configured to, when the confirmation module 730 determines that the sum of the data size values of all the first data certificates received within the target date is smaller than the data value size of the target data. The First Server delivers an instruction that the target data exchange fails, where the instruction of interacting fails is used to notify the First Server to unlock the first data certificate.
[0166] Further, the notification module 740 is used to notify the First Server to notify, when the confirmation result of the confirmation module 730 is that the sum of the sizes of the data valuesrepresented by all the first data certificates is not smaller than the data value size of the target data. The data of the same size as the data value of the data represented by the first data certificate is added to the data interaction processing device.
[0167] In the above solution, the data interaction processing device receives the first data certificate delivered by the first terminal and confirms that the sum of the sizes of the data values represented by all the first data certificates received within the preset time is smaller than the data value of the target data. Sends a message to First Server that the target data exchange fails, so as to notify First Server to unlock the first data certificate. In the foregoing manner, when data is transmitted in the form of data certificate during data exchange and the data exchange is completed when the first terminal does not meet the preset condition, the second terminal cannot successfully obtain the data provided by the second terminal. Only when the first terminal matches when the preset condition completes the data interaction, the second terminal can successfully obtain the data provided by the first terminal, which can improve the security of data interaction.
[0168] Please refer to Figure 8, Figure 8 is a schematic structural diagram of an example of a data interaction processing device according to the present invention. Each module included in the data interaction processing device in this example is used to execute each step in the example corresponding to Figure 6 and Figure 6. For details, reference may be made to related descriptions in the examples corresponding to Figure 6 and Figure 6, and details are not described herein again.
The data interaction processing device in this example is a first terminal.
The data interaction processing device in this example includes a receiving module 810 and a response module 820.
[0169] The receiving module 810 is used to receive an interactive request delivered by a second terminal, where the interactive request includes at least a data value of the target data and a preset time.

Date Recue/Date Received 2024-02-23
[0170] The response module 820 is used to deliver a first data certificate to the second terminal when confirming the interactive request received by the response receiving module 810, where the interactive request at least includes the data value of the target data and a preset time; the first data certificate is generated by the First Server by locking the first data in the first terminal according to the request of the first terminal.
[0171] In the above solution, when confirming the response to the interactive request delivered by the second terminal, the data interaction processing device delivers the first data certificate to the first terminal. In the foregoing manner, when data is transmitted in the form of data certificate during data exchange and the data exchange is completed when the first terminal does not meet the preset condition, the second terminal cannot successfully obtain the data provided by the second terminal. Only when the first terminal matches when the preset condition completes the data interaction, the second terminal can successfully obtain the data provided by the first terminal, which can improve the security of data interaction.
[0172] Please refer to Figure 8, Figure 8 is a schematic structural diagram of an example of a data interaction processing device according to the present invention. The data interaction processing device in this example is a second terminal. The data interaction processing device in this example includes a receiver 910, a processor 920, a transmitter 930, a read-only memory 940, a random access memory 950, and a bus 960.
[0173] The receiver 910 is used for receiving data.
[0174] The processor 920 controls the operation of the data interaction processing device. The processor 920 may also be referred to as a CPU (Central Processing Unit). The processor 920 may be an integrated circuit chip with signal processing capabilities. The processor 820 may also be a general purpose processor, a digital signal processor (DSP), an application specific integrated circuit (ASIC), a field programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components. The general purpose processor may be a microprocessor or the processor may also be any conventional processor and so on.
[0175] This transmitter 930 is used for transmitting data.
[0176] The memory may include a read-only memory 940 and a random access memory 950 and provide instructions and data to the processor 920. A portion of the memory may also include Date Recue/Date Received 2024-02-23 non-volatile random access memory (NVRAM).
[0177] The various components of the data interaction processing device are coupled together by a bus 960, which may include a power bus, a control bus, a status signal bus, and so on in addition to a data bus. However, for the sake of clarity, various buses are labelled bus 960 in the figure.
[0178] The memory stores the following elements, executable modules or data structures, or a subset of them, or their extensions:
[0179] Operation Instructions: Various operation instructions are included for various operations.
[0180] Operating System: Includes various system programs for implementing various basic services and handling hardware-based tasks.
[0181] In the example of the present invention, the processor 920 performs the following operations by invoking memory-stored operation instructions (the operation instructions may be stored in the operating system):
[0182] The processor 920 is used to control the receiver 910 receiver 810 to receive the first data certificate sent by the first terminal, where the first data certificate is delivered by the first terminal after confirming that the second terminal delivers the acknowledgement. The first data certificate is generated by the First Server according to a request of the first terminal for locking the first data in the first terminal, and the first data certificate is generated when the first data certificate is delivered by the first terminal;
[0183] The processor 920 is used to determine whether the sum of the sizes of the data values represented by all the first data certificates that are received by the acquisition module within the preset time is less than the data value size of the target data;
[0184] The processor 920 is used to deliver the target data to the received First Server if the sum of the data value sizes of all the first data certificates received within the target date is smaller than the data value size of the target data. Wherein the instruction failed to interact is used to notify the First Server to unlock the first data certificate.
[0185] Further, the processor 920 is used to control the receiver 910 to receive, by the receiver Date Recue/Date Received 2024-02-23 810, a first data certificate that is delivered when the first terminal confirms to accept the at least one second data certificate. Where the at least one second data certificate is delivered by the second terminal according to the target second data certificate generated by the interactive request for the data and delivered by the Second Server to the acquisition module;
[0186] The processor 920 is also used to, when the confirmation result is that the sum of the sizes of the data valuesrepresented by all of the first data certificates is not smaller than the data value size of the target data, notify the First Server to be the same as the A
data certificate data represented by the data value of the same size data to the second terminal.
[0187] In the above solution, the data interaction processing device receives the first data certificate delivered by the first terminal and confirms that the sum of the sizes of the data values represented by all the first data certificates received within the preset time is smaller than the data value of the target data. Sends a message to First Server that the target data exchange fails, so as to notify First Server to unlock the first data certificate. In the foregoing manner, when data is transmitted in the form of data certificate during data exchange and the data exchange is completed when the first terminal does not meet the preset condition, the second terminal cannot successfully obtain the data provided by the second terminal. Only when the first terminal matches when the preset condition completes the data interaction, the second terminal can successfully obtain the data provided by the first terminal, which can improve the security of data interaction.
[0188] Please refer to Figure 10, Figure 10 is a schematic structural diagram of an example of a data interaction processing device according to the present invention. The data interaction processing device in this example is a first terminal. The data interaction processing device in this example includes a receiver 1010, a processor 1020, a transmitter 1030, a read-only memory 1040, a random access memory 1050, and a bus 1060.
[0189] The receiver 1010 is used for receiving data.
[0190] The processor 1020 controls the operation of the data interaction processing device.
The processor 1020 may also be referred to as a CPU (Central Processing Unit).
The processor 1020 may be an integrated circuit chip with signal processing capabilities.
The processor 1020 may also be a general purpose processor, a digital signal processor (DSP), an application specific integrated circuit (ASIC), a field programmable gate array (FPGA) or other programmable logic Date Recue/Date Received 2024-02-23 device, discrete gate or transistor logic, discrete hardware components. The general purpose processor may be a microprocessor or the processor may also be any conventional processor and so on.
[0191] This transmitter 1030 is used for transmitting data.
[0192] The memory may include a read only memory 1040 and a random access memory 1050 and provide instructions and data to the processor 1020. A portion of the memory may also include non-volatile random access memory (NVRAM).
[0193] The various components of the data interaction processing device are coupled together via a bus 1060, which may include a power bus, a control bus, a status signal bus, etc., in addition to the data bus. However, for the sake of clarity, various buses are labelled as buses 1060 in the figure.
[0194] The memory stores the following elements, executable modules or data structures, or a subset of them, or their extensions:
[0195] Operation Instructions: Various operation instructions are included for various operations.
[0196] Operating System: Includes various system programs for implementing various basic services and handling hardware-based tasks.
[0197] In the example of the present invention, the processor 1020 performs the following operations by invoking memory-stored operation instructions (the operation instructions may be stored in the operating system):
[0198] The processor 1020 is used to control the receiver 1010 to receive an interactive request delivered by a second terminal, where the interactive request includes at least a data value of the target data and a preset time.
[0199] The processor 1020 is used to control the transmitter 1030 to deliver a first data certificate to the second terminal when confirming the response to the interactive request. The interactive request includes at least the data value of the target data and a preset time; and the first data certificate is generated by the First Server by locking the first data in the first terminal according to the request of the first terminal.

Date Recue/Date Received 2024-02-23
[0200] Further, the processor 1020 is specifically configured to control the deliverer 1030 to deliver, to the First Server, a request for generating the first data certificate when confirming the response to the interactive request, and is used to: after receiving the first Server delivers the first data certificate to the second terminal, where the request includes at least information about the first data to be locked.
[0201] In the solution above, the data interaction processing device receives an interactive request delivered by a second terminal, and delivers a first data certificate to the second terminal when confirming the response to the interactive request. In the foregoing manner, when data is transmitted in the form of data certificate during data exchange and the data exchange is completed when the first terminal does not meet the preset condition, the second terminal cannot successfully obtain the data provided by the second terminal. Only when the first terminal matches when the preset condition completes the data interaction, the second terminal can successfully obtain the data provided by the first terminal, which can improve the security of data interaction.
[0202] In the several examples provided in the present invention, it should be understood that the disclosed system, device, and method may be implemented in other manners.
For example, the device implementation described above is merely exemplary. For example, the division of the modules or units is merely logical function division and may be other division in actual implementation. For example, a plurality of units or components may be Combining or may be integrated into another system, or some of the features may be ignored or not performed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be electrical, mechanical or other forms.
[0203] The units described as separate components may be or may not be physically separated.
The components displayed as units may or may not be physical units, that is, may be located in one place or may be distributed to multiple networks unit. Some or all of the units may be selected according to actual needs to achieve the objectives of the solution of the examples.
[0204] In addition, each of the functional units in the examples of the present invention may be integrated in one processing unit, or each of the units may exist alone physically, or two or more units may be integrated in one unit. The above-mentioned integrated unit can be implemented in the form of hardware or in the form of software functional unit.

Date Recue/Date Received 2024-02-23
[0205]
When the integrated unit is implemented in the form of a software functional unit and is sold or used as an independent commodity, the integrated unit may be stored in a computer-readable storage medium. Based on such understanding, the technical solution of the present invention essentially, or the part contributing to the prior art, or all or part of the technical solution may be embodied in the form of a software commodity stored in a storage medium Includes several instructions for causing a computer device (which may be a personal computer, a server, a network device, etc.) or a processor to execute all or part of the steps of the method according to the examples of the present invention. The foregoing storage medium includes various media capable of storing program codes, such as a USB flash disk, a removable hard disk, a read only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk.

Date Recue/Date Received 2024-02-23

Claims (20)

Claims:
1. A data exchange processing method, comprising:
delivering, by a second terminal, an interactive request for acquiring target data to a plurality of first terminals, wherein the interactive request includes at least a password for administrator rights of each of the plurality of first terminals;
issuing a data certificate by each of the plurality of first terminals responding to the interactive request, each data certificate including the target data for the respective first terminal;
receiving the data certificates at the second terminal through a first server;
and acquiring, by the second terminal, administrator rights for each of the plurality of first terminals which responded with a data certificate, when the data certificates are received under a preset condition.
2. The method of claim 1, wherein, when the interactive request is responded to, each of the data certificates are stored on the first server.
3. The method of claim 2, wherein when the preset condition is not met the second terminal delivers to the first server instructions to return the data certificates to the plurality of first terminals.
4. The method of claim 2, wherein each of the stored data certificates is assigned a level of imp ortanc e.
5. The method of any one of claims 1-4, wherein at least one data certificate includes an operation log of the first terminal associated with the at least one data certificate, wherein the operation log proves the security and reliability of the first terminal associated with the at least one data certificate.
6. The method of any one of claims 1-5, wherein when the second terminal acquires the administrator rights of any of the plurality of first terminals, all other administrator rights of the first terminal are blocked.

Date Recue/Date Received 2024-02-23
7. The method of any one of claims 1-6 wherein the preset condition is receipt of the data certificate within a preset time, wherein when the data certificate is received by the second terminal after the preset time the second terminal cannot acquire administrator rights.
8. The method of any one of claims 1-6 wherein the preset condition is receipt of the data certificates from all of the plurality of first terminals, wherein when only a subset of data certificates is received from the plurality of first terminals the second terminal cannot acquire any administrator rights.
9.
The method of any one of claims 1-6, wherein the preset condition is that all of the plurality of first terminals send the target data within a preset time.
10. The method of any one of claims 1-9, wherein when the preset condition is met the second terminal sends instructions to the first server to obtain the data certificates.
11. A data exchange processing system, comprising:
a plurality of first terminals, wherein each of the plurality of first terminals is a computing device, and wherein each of the plurality of first terminals requires a password for administrator rights;
a second terminal of a second user, wherein the second terminal sends an interactive request for acquiring target data of the plurality of first terminals, wherein the target data includes the password for administrator rights for each of the plurality of first terminals; and a first server for receiving a data certificate from each of the plurality of first terminals which responds to the interactive request wherein each data certificate includes the target data, and delivering each data certificate to the second terminal when a preset condition is met, wherein the second terminal acquires administrator rights from the data certificates.
12. The system of claim 11, wherein, when the interactive request is responded to, the first server is configured to store the data certificates.
13. The system of claim 12, wherein when the preset condition is not met the second terminal delivers to the first server instructions to return the data certificates to the plurality of first terminals.
Date Recue/Date Received 2024-02-23
14. The system of claim 12, wherein each of the stored data certificates is assigned a level of importance.
15. The system of any one of claims 11-14, wherein at least one data certificate includes an operation log of the first terminal associated with the at least one data certificate, wherein the operation log proves the security and reliability of the first terminal associated with the at least one data certificate.
16. The system of any one of claims 11-15, wherein when the second terminal acquires the administrator rights of any of the plurality of first terminals, all other administrator rights of the first terminal are blocked.
17. The system of any one of claims 11-16 wherein the preset condition is receipt of the data certificate within a preset time, wherein when the data certificate is received by the second terminal after the preset time the second terminal cannot acquire administrator rights.
18. The system of any one of claims 11-16 wherein the preset condition is receipt of the data certificates from all of the plurality of first terminals, wherein when only a subset of data certificates is received from the plurality of first terminals the second terminal cannot acquire any administrator rights.
19. The system of any one of claims 11-16, wherein the preset condition is that all of the plurality of first terminals send the data certificates within a preset time.
20. The system of any one of claims 11-19, wherein when the preset condition is met the second terminal sends instructions to the first server to obtain the data certificates.

Date Recue/Date Received 2024-02-23
CA3230041A 2015-09-16 2015-09-16 Data exchange processing method, apparatus, and online financing method Pending CA3230041A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CA3230041A CA3230041A1 (en) 2015-09-16 2015-09-16 Data exchange processing method, apparatus, and online financing method

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
CA2998007A CA2998007A1 (en) 2015-09-16 2015-09-16 Data exchange processing method, apparatus, and online financing method
PCT/CN2015/089731 WO2017045153A1 (en) 2015-09-16 2015-09-16 Data exchange processing method, apparatus, and online financing method
CA3230041A CA3230041A1 (en) 2015-09-16 2015-09-16 Data exchange processing method, apparatus, and online financing method

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CA2998007A Division CA2998007A1 (en) 2015-09-16 2015-09-16 Data exchange processing method, apparatus, and online financing method

Publications (1)

Publication Number Publication Date
CA3230041A1 true CA3230041A1 (en) 2017-03-23

Family

ID=57348292

Family Applications (2)

Application Number Title Priority Date Filing Date
CA3230041A Pending CA3230041A1 (en) 2015-09-16 2015-09-16 Data exchange processing method, apparatus, and online financing method
CA2998007A Pending CA2998007A1 (en) 2015-09-16 2015-09-16 Data exchange processing method, apparatus, and online financing method

Family Applications After (1)

Application Number Title Priority Date Filing Date
CA2998007A Pending CA2998007A1 (en) 2015-09-16 2015-09-16 Data exchange processing method, apparatus, and online financing method

Country Status (3)

Country Link
CN (1) CN106164956A (en)
CA (2) CA3230041A1 (en)
WO (1) WO2017045153A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108765165A (en) * 2018-05-30 2018-11-06 杭州复杂美科技有限公司 Encryption currency crowd raises monitoring and managing method and system, equipment and storage medium
CN113657992A (en) * 2021-08-16 2021-11-16 支付宝(杭州)信息技术有限公司 Data processing method and system

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101556671A (en) * 2008-04-07 2009-10-14 永丰商业银行股份有限公司 On-line financing management method
CN101650812A (en) * 2008-08-14 2010-02-17 里斯特资讯媒体股份有限公司 Digital content product trading method and system
KR20160047456A (en) * 2013-06-14 2016-05-02 에스에이에스 게임즈, 아이엔씨. Methods and systems for activity-based fundraising
US20150186956A1 (en) * 2013-12-27 2015-07-02 Andrew S. Gordon Method of Promoting Customer Loyalty and Charitable Donations by Adjusting a Sale Transaction Subtotal by Executing Computer-Executable Instructions Stored On a Non-Transitory Computer-Readable Medium
CN104851038A (en) * 2015-06-08 2015-08-19 上海民道信息科技有限公司 Internet public financing platform

Also Published As

Publication number Publication date
WO2017045153A1 (en) 2017-03-23
CN106164956A (en) 2016-11-23
CA2998007A1 (en) 2017-03-23

Similar Documents

Publication Publication Date Title
US11907947B2 (en) Resource transfer system
US10592985B2 (en) Systems and methods for a commodity contracts market using a secure distributed transaction ledger
US11159306B2 (en) Autonomous exchange via entrusted ledger token and transaction management
US11625711B2 (en) Autonomous exchange via entrusted ledger key management
WO2020103566A1 (en) Blockchain certificate storage method and apparatus, and computer device
US10855446B2 (en) Autonomous exchange via entrusted ledger
KR102384340B1 (en) Method for processing blockchain based real-time transaction and system thereof
US20190324958A1 (en) Autonomous exchange via entrusted ledger immutable distributed database
WO2020125234A1 (en) Blockchain-based data processing method and apparatus
EP3989150A1 (en) Third-party settlement control method and apparatus, electronic device and storage medium
KR102407187B1 (en) Method for charging electronic money automatically based on blockchain and system thereof
US11917057B2 (en) Method, device, and apparatus for processing distributed data, and medium
US20180152429A1 (en) Systems and methods for publicly verifiable authorization
CA3093994A1 (en) Method and device for data exchange processing and online funding method
CN112488707B (en) Business circulation supervision method and system
CA3230041A1 (en) Data exchange processing method, apparatus, and online financing method
CN112016114B (en) Intelligent contract generating method based on cryptocurrency, related equipment and storage medium
KR20200000595A (en) Blockchain based certificate management method and device, server and system thereof
CA2998543C (en) Processing method for obtaining target data, server, and online financing method
CA2993034C (en) Online funds management method, and data interaction processing method and device
KR102240201B1 (en) Digital Asset based Loan Service Providing Method, Apparatus and Program
US20240163326A1 (en) Resilient and decentralized microservice architecture
JP7113589B2 (en) Information intermediation device, information provision device, and information acquisition device
CA2995868C (en) Target exchange processing method, server, terminal device, and online transaction method
CA2997998C (en) Data exchange processing method, apparatus, and system

Legal Events

Date Code Title Description
EEER Examination request

Effective date: 20240223

EEER Examination request

Effective date: 20240223

EEER Examination request

Effective date: 20240223

EEER Examination request

Effective date: 20240223

EEER Examination request

Effective date: 20240223