CN106464661A - Processing method for obtaining target data, server, and online fund-raising method - Google Patents

Processing method for obtaining target data, server, and online fund-raising method Download PDF

Info

Publication number
CN106464661A
CN106464661A CN201580012861.4A CN201580012861A CN106464661A CN 106464661 A CN106464661 A CN 106464661A CN 201580012861 A CN201580012861 A CN 201580012861A CN 106464661 A CN106464661 A CN 106464661A
Authority
CN
China
Prior art keywords
data
terminal
server
target data
request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201580012861.4A
Other languages
Chinese (zh)
Inventor
张毅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Cifpay Network Bank Technology Co Ltd
Original Assignee
Shenzhen Cifpay Network Bank Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Cifpay Network Bank Technology Co Ltd filed Critical Shenzhen Cifpay Network Bank Technology Co Ltd
Publication of CN106464661A publication Critical patent/CN106464661A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/22Payment schemes or models
    • G06Q20/24Credit schemes, i.e. "pay after"
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/08Protocols for interworking; Protocol conversion
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/10Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0279Fundraising management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/06Asset management; Financial planning or analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/08Insurance
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/563Data redirection of data network streams
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/566Grouping or aggregating service requests, e.g. for unified processing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Development Economics (AREA)
  • Strategic Management (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Computer Security & Cryptography (AREA)
  • Technology Law (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Game Theory and Decision Science (AREA)
  • Human Resources & Organizations (AREA)
  • Operations Research (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention provides a processing method for obtaining target data, a terminal, a server, and an online fund-raising method. The processing method for obtaining target data comprises the following steps: receiving an interaction request for obtaining target data from a first terminal by a first server, and sending the interaction request to a second terminal (S10); wherein the interaction request comprises the description information and data value of the target data and also comprises secure information; and the secure information is generated when the target data detected by the second server is in accord with the secure range of the second server. Through the abovementioned scheme, security guarantee can be provided before an interaction terminal provides target data, and the target data safety and interaction efficiency are both improved.

Description

Obtain financing method on processing method, server and the line of target data
【Technical field】
The present invention relates to internet data interaction technique field, more particularly to a kind of process side obtaining target data Financing method on method, server and line.
【Background technology】
With the development of Internet technology especially development of Mobile Internet technology, user can by mobile device use 2G, The modes such as 3G, 4G or wifi connect the Internet be traded, the activity such as social activity, by Internet technology, user can be easily and effectively Ground carries out Above-the-line, and this is incomparable experience under line.
But, during the activity such as user is traded by mobile Internet, social activity, the sensitive information of its people is easy to expose And be possible to be obtained by other people in interaction, thus carrying out illegal objective operation using its information, this will use for network Great risk is brought at family.
【Content of the invention】
The invention mainly solves the technical problem of providing a kind of processing method obtaining target data, server and terminal Equipment, needed for detection, whether the target data of interaction meets scope of insurance coverage, and carries out target data when meeting scope of insurance coverage Interaction, improves efficiency and the safety of network data exchange.
The invention provides a kind of processing method obtaining target data, the method includes:First server receives first The interaction request of the acquisition target data that terminal sends, and described interaction request is sent to second terminal;Wherein, described interaction Request bag contains the description information data value of described target data, also comprises guarantee information, and described guarantee information is second service Device detects that described target data generates when meeting the scope of insurance coverage of described second server.
Present invention also offers a kind of server, including:Receiver module, for receiving the acquisition target of first terminal transmission The interaction request of data;Wherein, described interaction request comprises the description information data value of described target data, also comprises to ensure Information, for second server, described guarantee information detects that described target data meets life during the scope of insurance coverage of described second server Become;And interaction request sending module, for described interaction request is sent to second terminal.
Present invention also offers a kind of terminal unit, including:One or more processors;Memorizer;Multiple application programs; And one or more program, wherein, one or more of programs are stored in described memorizer and are configured to by institute State one or more processors execution, one or more of programs include instructing, and described instruction is used for:Receive first terminal to send out The interaction request of the acquisition target data sent;Wherein, described interaction request comprises the description information data of described target data Value, also comprises guarantee information, for second server, described guarantee information detects that described target data meets described second server Scope of insurance coverage when generate;And send described interaction request to second terminal.
In the above processing method of acquisition target data, in advance target data is detected by second server and Detection generates corresponding guarantee information when meeting the scope of insurance coverage of second server, and first server will comprise this guarantee information Interaction request sends to second terminal, realizes the interaction of target data between first and second terminal, provides number of targets for second terminal Safety is provided to assure according to front, to improve target data safety and interactive efficiency.
Another object of the present invention is to providing financing method on a kind of line, issuing the destination item needing to raise funds When it is audited and examination & verification by when increase insurance information, thus reducing the financial risks of investor, and promote item Mesh fund raising progress.
The invention provides financing method on a kind of line, including:First server receive first terminal send for mesh The fund raising request of mark project, and described request of raising funds is sent to second terminal;Wherein, described request of raising funds includes described target The description information of project and the required fund amount raised, also include insurance information;Described insurance information is examined for second server Destination item described in core meets generation during the scope of insurance coverage of described second server.
Fund procurement method on above line, is audited to fund raising project in advance by second server and is being met second It is that this fund raising project increases corresponding insurance information during the scope of insurance coverage of server, first server will comprise this insurance information Fund raising request releases, thus introduce insurance institution's (second server) in project financing and being estimated and assure, for it He provides investment risk guarantee with throwing people's (second terminal), and promotes project financing progress.
【Brief description】
Fig. 1 is the flow chart of the processing method that one of first embodiment of the invention obtains target data
Fig. 2 is the schematic flow sheet of the processing method that one of second embodiment of the invention obtains target data;
Fig. 3 is the schematic flow sheet of the processing method that one of third embodiment of the invention obtains target data;
Fig. 4 is the schematic diagram of dealing with relationship of the acquisition target data in embodiment of the present invention;
Fig. 5 is the schematic flow sheet of the processing method that one of four embodiment of the invention obtains target data;
Fig. 6 is the structural representation of one of embodiment of the present invention server;
Fig. 7 is the structural representation of one of embodiment of the present invention terminal unit;
Fig. 8 is the schematic flow sheet of financing method on one of first embodiment of the invention line;
Fig. 9 is the schematic flow sheet of financing method on one of second embodiment of the invention line;
Figure 10 is the schematic flow sheet of financing method on one of third embodiment of the invention line;
Figure 11 is the fund procurement relation schematic diagram in embodiment of the present invention.
【Specific embodiment】
Below in conjunction with the accompanying drawing in embodiment of the present invention, the technical scheme in embodiment of the present invention is carried out clearly Chu, it is fully described by it is clear that described embodiment is only a part of embodiment of the present invention, rather than whole realities Apply mode.Based on the embodiment in the present invention, those of ordinary skill in the art institute under the premise of not making creative work The every other embodiment obtaining, belongs to the scope of protection of the invention.
Refer to Fig. 1, be the schematic flow sheet of the processing method of acquisition target data in first embodiment of the invention, Method flow shown in this embodiment includes:
Step S10, first server receives the interaction request of the acquisition target data that first terminal sends, and this is interacted Request sends to second terminal.
Wherein, this interaction request comprises description information, data value and the guarantee information of target data.This guarantee information is Second server detects that this target data meets and generates during the scope of insurance coverage of second server.
In above scheme, in advance target data is detected by second server and met second server in detection Corresponding guarantee information is generated, the interaction request comprising this guarantee information is sent to second eventually by first server during scope of insurance coverage End, realizes the interaction of target data between first and second terminal, and providing for second terminal provides safety to assure before target data, with Improve target data safety and interactive efficiency.
Refer to Fig. 2, be the schematic flow sheet of the processing method of acquisition target data in second embodiment of the invention, Method flow shown in this embodiment includes:
Step S20, first terminal sends the interaction request obtaining target data to first server.
Wherein, this interaction request comprises the description information data value of this target data, also comprises guarantee information, this guarantee For second server, information detects that this target data meets and generates during the scope of insurance coverage of this second server.This request is acceptable Including the scheduled time, this scheduled time is the time limit obtaining this target data.
The description information of this target data can be the purposes of this target data.
Specifically, this first terminal logs in and accesses first server, and sends the interaction request obtaining target data.
Step S21, this first server obtains the data of representative data value and target data according to this interaction request It is worth the first equal data voucher, and the first data voucher is sent to second terminal.Wherein, the first data voucher comprises this The information of interaction request.
In above scheme, when sending interaction request acquisition target data, by second server, target data is examined Survey and detection by when generate guarantee information, and in the form of the first data voucher with this guarantee information issue target Data.Thus, provide, by second terminal, the review mechanism that provides safeguard before asked data, there is transfer data safety risk Effect.
Refer to Fig. 3, be the schematic flow sheet of the processing method of acquisition target data in third embodiment of the invention. Method flow shown in this embodiment includes:
Step S30, first terminal initiates to obtain the interaction request of target data to first server.
Wherein, this interaction request comprises the description information data value of this target data, also comprises guarantee information, this guarantee For second server, information detects that this target data meets and generates during the scope of insurance coverage of this second server.
Specifically, this first terminal logs in and accesses first server, and sends the interaction request obtaining target data.
Step S31, this first server obtains the data of representative data value and target data according to this interaction request It is worth the first equal data voucher, and the first data voucher is sent to second terminal.Wherein, the first data voucher comprises this The information of interaction request.
In one embodiment, in second server, first server detects that target data meets the guarantor of this second server When hindering scope and generating guarantee information, generate the first data voucher with this guarantee information.This second server is to number of targets According to being detected, and determining that detection increases this guarantee information when meeting scope of insurance coverage in target data, and in the first clothes Still this guarantee information is retained in the first data voucher that business device generates.This guarantee information can include the backup letter of target data Breath, identification information of second server etc..
In another embodiment, first server according to this interaction request obtain from second server the first data with Card.Wherein, life when this first data voucher is met the scope of insurance coverage of second server by second server to target data detection Become, this interaction request at least includes storage address in second server for the first data voucher.Specifically, this first terminal to The interaction request that first server sends is the chained address (that is, storage address) of the first data voucher, and this chained address comprises Point to the URL address of the first data voucher, the information of target data can also be comprised, e.g., data sponsor's information, target data Essential information (e.g., data attribute, form etc.).
Step S32, this second terminal receives the first data voucher that first server sends, and sends to the 3rd server First data.
In step s 32, at least one second terminal passes through network and first server communication connection, this first service First data voucher is passed through Web Publishing to each second terminal by device.
Specifically, this second terminal selects the first data from the data that it preserves, and sends it to first terminal.Should The data value size of the first data can be more than the data value size of target data it is also possible to the data value being less than target data is big Little.
Step S33, the number of all data being sent by second terminal that the 3rd server receives in the given time According to value size summation be not less than target data data value size when, by the data is activation receiving to first terminal.
In above scheme, the interaction request of the acquisition target data that first server is initiated according to first terminal obtains first Data voucher, each second terminal sends the first data to the 3rd server, when the 3rd server receives in the given time The all data being sent by second terminal data value size summation be not less than target data data value size when, will receive The data is activation arriving, to first terminal, makes first terminal obtain the data not less than target data data value size.Carrying out mesh Before mark data interaction, by second server, target data is detected and increased guarantee, and by target data in advance in advance It is divided into some and is saved in respectively in different second terminals, this reduces the safety wind of target data itself Danger, and during target data interacts, its authority or ownership obtain risk guarantee.
Refer to Fig. 5, be the schematic flow sheet of the processing method of acquisition target data in four embodiment of the invention, Please refer to the data interaction relation schematic diagram shown in Fig. 4.Method flow shown in this embodiment includes:
Step S40, first terminal sends the interaction request obtaining target data to first server.
Wherein, this interaction request comprises the description information data value of described target data, also comprises guarantee information, described For second server, guarantee information detects that described target data generates when meeting the scope of insurance coverage of described second server.
Step S41, this first server obtains the data of representative data value and target data according to this interaction request It is worth the first equal data voucher, and the first data voucher is sent to second terminal.Wherein, the first data voucher comprises this The information of interaction request.
Step S42, this second terminal receives the first data voucher of this first server transmission, and sends to first terminal Second data voucher.Wherein, this second data voucher be the 3rd server according to the request of this second terminal lock this second The first data in terminal and generate.
Step S43, judges all second numbers being sent by second terminal that this first terminal receives in the given time Whether it is not less than the data value size of target data according to the data value size summation representated by voucher, if so, then enter step S44, otherwise, enters step S47.
Step S44, this first terminal sends data interaction instruction to the 3rd server.
Step S45, the 3rd server receives this data interaction instruction, and responds this data interaction instruction by second terminal In locked data is activation to the 4th server.
Step S46, the 4th server, by the data is activation receiving to first terminal, makes first terminal obtain this target Data.Then, flow process terminates.
Further, the 3rd server can also respond this data interaction and instruct the data being locked in second terminal It is sent directly to first terminal, make first terminal obtain target data.
Step S47, this first terminal sends, to the 3rd server, the instruction that target data asks failure.
Step S48, the 3rd server responds this instruction and unlocks quilt in corresponding second terminal according to the second data voucher The data of locking.Then, flow process terminates.
Above scheme, is detected to the target data obtaining needed for first terminal in second server and is added guarantee letter After breath, first server obtains the first data voucher according to interaction request, is then then forwarded to multiple second terminals.Second terminal Receive this first data voucher, and service to correspondingly by the 3rd in the interaction request confirming to respond this first data voucher Device sends, to first terminal, the second data voucher representing the first Data Data value, so that first terminal can be received in the given time Collect the second enough data voucher.Wherein, this second data voucher is the request according to this second terminal for the 3rd server Lock the first data in this second terminal and generate, first terminal obtains the second enough data voucher in the given time When, by the 3rd server, the data that second terminal is locked directly or indirectly is sent to first terminal so as to finally obtain this mesh Mark data.Before carrying out target data interaction, by second server, target data is detected and increased guarantee information, and In advance target data is divided in advance some and is saved in respectively in different second terminals, and to have this guarantee letter The form of the first data voucher of breath issues the required target data obtaining request.So, asked by other-end offer Audited before data, be there is data safety guarantee.Meanwhile, second terminal is sent in the form of the second data voucher and counts accordingly According to can reduce and illegally distorted in data exchange process, lose or the risk of intercepting and capturing is stolen so that counting by other-end According to carrying out completely, comprehensively protect in interaction to the storage of target data and transmission.
Below the processing method of the acquisition target data in embodiment of the present invention is illustrated.
For example, this first terminal is terminal A, and this second terminal is terminal B1, terminal B2 and terminal B3.Target data position visitor The startup password of family end D, it is divided into three parts in advance.Terminal B1, terminal B2 and terminal B3 each preserve above-mentioned start A portion data of password, and only when the data acquisition system of three parts arranges together and in the correct order, institute The data being formed can be used for opening client D.Wherein, terminal A, B1, B2, B3 and client D can be individual calculus Machine, panel computer, smart mobile phone etc. can carry out the equipment of data interaction by network and server.
Terminal A initiates the interaction request needing to obtain target data (startup password of client D) by first server, Second server is detected to target data and is increased guarantee information, to generate three the first data vouchers, i.e. the first data Voucher a, the first data voucher b and the first data voucher c.This second server carries out detection to target data and includes to number of targets According to information (as form, description information, level of security etc.) detected, can also include to obtain target data terminal A (as Permission Levels) are detected.
So arrange the reason be, by second server, target data or terminal A are carried out detecting ensures biography Judge before defeated target data whether this target data allows to be interacted or whether terminal A has the money using target data Lattice, to ensure the safety of data, and provide the partial data each preserving to provide safe foundation for terminal B1, B2, B3.
Wherein, this terminal A is known a priori by the startup password of client D and is divided into three parts, the therefore request of transmission Quantity including the first data voucher and the Permission Levels of terminal A.Three the first data vouchers that this second server generates In all comprise the Permission Levels of this terminal A, each first data voucher also represents the target data correspondence portion of required acquisition simultaneously The data divided.For example, the first data voucher a represents the Part I data of the required startup password obtaining, the first data voucher b Represent the Part II data of the required startup password obtaining, the first data voucher c represents the of the required startup password obtaining Three partial datas.
Then, the first data voucher is respectively sent to terminal B1, terminal B2 and terminal B3 by first server, makes these three The data that terminal preserves according to it selects the first data voucher of coupling from three the first data vouchers receiving, and by second Data voucher sends to terminal A.Taking terminal B1 as a example illustrate now, terminal B1 saves the Part II number of startup password According to then selection represents the first data voucher b of this Part II data.And, the second data voucher that terminal B1 sends is the Its Part II data of preserving of three server locks and the electronic certificate that generates, the 3rd server is management terminal B1, B2 Host computer with B3.Wherein, this second data voucher is the information of the Part II data that representative is locked, and is not second Divided data itself, information above-mentioned can be predetermined symbol, picture etc..Certainly, in other embodiments, terminal B1 Can also directly by Part II data is activation to terminal A.
Further, terminal A have received whole second data of the startup password of composition client D in the given time Voucher, the data is activation that then request the 3rd server is locked is to terminal A.
Further, this target data can also be lteral data, voice data, video data, routine data or finance The funds data in field etc., if funds data, such as fund, then now first terminal is fund procurement side, data is activation Side be investor, first server is the distribution platform raised funds, second and third, four servers be capital management server, example As bank.If voice data, such as song, now data initiator data sender can be that mobile phone etc. has many The client of media play function, first server be platform for music search, second and third, four servers be music site service Device.
Refer to Fig. 6, be the structural representation of the server of embodiment of the present invention, the server shown in this embodiment 50 include receiver module 51, interaction request sending module 52.
This receiver module 51 is used for receiving the interaction request of the acquisition target data of first terminal initiation.Wherein, this interaction Request bag contains the description information data value of this target data, also comprises guarantee information, and this guarantee information is examined for second server Survey this target data meet this second server scope of insurance coverage when generate.
This interaction request sending module 52 is used for sending this interaction request to second terminal.
In one embodiment, server 50 also includes the first data acquisition of credentials module 53 and the first data voucher sends Module 54, wherein, this first data acquisition of credentials module 53 meets scope of insurance coverage and increases in second server detection target data Plus when ensureing information, the first data voucher is generated according to this interaction request.This first data voucher sending module 54 is used for the One data voucher sends to second terminal.
In another embodiment, server 50 also includes the first data acquisition of credentials module 53 and the first data voucher is sent out Send module 54, wherein, this first data acquisition of credentials module 53 obtains the first number according to this interaction request from second server According to voucher.Wherein, this first data voucher is met to target data detection by second server and generates during scope of insurance coverage, this request At least include each the first data voucher storage address in second server.Specifically, this first data voucher is by first Terminal previously generates and is stored in second server, the request that this first terminal sends to first server be the first data with The chained address (that is, storage address) of card, this chained address comprises to point to the URL address of corresponding first data voucher, acceptable Comprise the information of target data, e.g., data sponsor's information, the essential information (e.g., data attribute, form etc.) of target data. This first data voucher sending module 54 is used for sending the first data voucher to second terminal.
Refer to Fig. 7, be the structural representation of the terminal unit in embodiment of the present invention, the terminal in this embodiment Equipment 60 is server.This terminal unit 60 includes receptor 61, processor 62, transmitter 63, read only memory 64, deposits at random Access to memory 65 and bus 66.
This receptor 61 is used for receiving data.
The operation of this processor 62 control terminal equipment 60, this processor 62 can also become CPU (Central Processing Unit, CPU).This processor 62 is probably a kind of IC chip, has the process of signal Ability.Processor 62 can also be general processor, digital signal processor (DSP), special IC (ASIC), ready-made can Programming gate array (FPGA) or other PLDs, discrete gate or transistor logic, discrete hardware components. General processor can be microprocessor or this processor can also be any conventional processor etc..
This transmitter 63 is used for sending data.
Memorizer can include read only memory 64 and random access memory 65, and provides instruction sum to processor 62 According to.The a part of of memorizer can also include nonvolatile RAM (NVRAM).
Each assembly of terminal unit 60 is coupled by bus 66, wherein, bus 66 remove include data/address bus it Outward, power bus, controlling bus and status signal bus in addition etc. can also be included.But for the sake of clear explanation, will in figure Various buses are all designated as bus 66.
Memory storage following element, executable module or data structure, or their subset, or they Superset:
Operational order:Including various operational orders, it is used for realizing various operations.
Operating system:Including various system programs, it is used for realizing various basic businesses and processes hardware based task.
In embodiments of the present invention, processor 62 by calling the operational order of memory storage, (can deposit by this operational order Storage is in an operating system), execution is following to be operated:
Receive the interaction request of the acquisition target data that first terminal sends, wherein, this interaction request comprises target data Description information data value, also comprise guarantee information, this guarantee information for second server detection target data meet this Generate during the scope of insurance coverage of two servers.And
This interaction request is sent to second terminal.
Alternatively, this processor 62 meets scope of insurance coverage and increases guarantee information in second server detection target data When, the first data voucher is generated according to this interaction request.
Alternatively, this processor 62 obtains the first data voucher according to this interaction request from second server.Wherein, should First data voucher is met to target data detection by second server and generates during scope of insurance coverage, this request at least include each the Storage address in second server for the one data voucher.Specifically, this first data voucher is previously generated simultaneously by first terminal It is stored in second server, the chained address that this first terminal is the first data voucher to the request that terminal unit 60 sends (that is, storage address), this chained address comprises to point to the URL address of corresponding first data voucher, can also comprise target data Information, e.g., data sponsor's information, the essential information (e.g., data attribute, form etc.) of target data.
Refer to Fig. 8, be the schematic flow sheet of financing method on the line in first embodiment of the invention, this embodiment The method flow illustrating includes:
Step S70, first server receives the fund raising request for destination item that first terminal sends, and this is raised funds Request sends to second terminal.
Wherein, this fund raising request includes the description information of this destination item and the required fund amount raised, and also includes protecting Dangerous information, this insurance information for second server audit this destination item meet this second server scope of insurance coverage when generate.
In above scheme, in advance fund raising project is audited by second server and met the guarantee of second server It is that this fund raising project increases corresponding insurance information during scope, the fund raising comprising this insurance information is asked to issue by first server Go out, thus introduce insurance institution's (second server) in project financing and being estimated and assure, for other with throwing people (second Terminal) investment risk guarantee is provided, and promote project financing progress.
Refer to Fig. 9, be the schematic flow sheet of financing method on the line in second embodiment of the invention, this embodiment The method flow illustrating includes:
Step S80, first terminal sends the fund raising request for destination item to first server.
Wherein, this fund raising request includes the description information of this destination item and the required fund amount raised, and also includes protecting Dangerous information;This insurance information for second server audit this destination item meet this second server scope of insurance coverage when generate.
Step S81, this first server is raised according to needed for the fund amount that this fund raising request acquisition represents is with destination item Equal first electronic certificate of fund amount of collection, and the plurality of first electronic certificate is sent to second terminal.Wherein, first Electronic certificate comprises the information of this interaction request.
In the present embodiment, this first electronic certificate believes card for thing, is at least to include fund raising amount, target fund amount And the electronic documents of Preset Time.
Above scheme, the fund raising acquisition request for destination item that first server sends according to first terminal is corresponding First electronic certificate.When issuing fund raising project by the way of electronic certificate, introduce insurance company's (second server) to initiation Project audited and insured, thus provide guarantees of investment confidence and investment risk with throwing people's (second terminal) for other.
Please refer to Figure 10, it is the schematic flow sheet of financing method on one of third embodiment of the invention line, Please refer to the fund procurement relation schematic diagram described in Figure 11.Method flow shown in this embodiment includes:
Step S90, first terminal sends the fund raising request for destination item to first server.
Wherein, this fund raising request includes the description information of this destination item and the required fund amount raised, and also includes protecting Dangerous information;This insurance information for second server audit this destination item meet this second server scope of insurance coverage when generate.
Step S91, this first server is raised according to needed for the fund amount that this fund raising request acquisition represents is with destination item Equal first electronic certificate of amount of the fund of collection, and this first electronic certificate is sent to second terminal.Wherein, the first electricity Sub- voucher comprises the information of this interaction request.
In the present embodiment, this first electronic certificate believes card for thing, is at least to include fund raising amount, target fund amount And the electronic documents of Preset Time.
In one embodiment, first server meets scope of insurance coverage and generates guarantor in second server detection destination item During dangerous information, generate first electronic certificate with this insurance information.This second server is audited to destination item, and Determine examination & verification by when determine insurance expenses, the Claims Resolution guarantee information such as amount, and increase this insurance information in this destination item, Still retain this insurance information in the first electronic certificate that first server generates.
In another embodiment, first server according to this fund raising request obtain from second server the first electronics with Card.Wherein, this first data voucher by second server to destination item audit by when generate, this request at least includes each Storage address in second server for first electronic certificate.
When detection by when be first electronic certificate increase identification information be the signature of this personage or the stamped signature of this mechanism Deng, thus improve the authoritative, credible of this destination item to second terminal user when raising funds, the difficulty that reduction is raised funds Degree.
In above scheme, second server can be insurance company management server, by being loaded with insurance company's examination & verification Crowd is raised project product letter card by the thing letter card maker of plug-in unit.Wherein, insurance company can audit to crowd's project of raising, and really Determine insurance expenses, Claims Resolution amount etc..
Step S92, this second terminal receives first server and sends the first electronic certificate, and sends one to the 3rd server The fund of quota degree.
Step S93, the fund amount summation that the 3rd server receives in the given time is not less than this destination item institute During the fund amount that need to raise, the 3rd server sends the fund receiving to first terminal, so that first terminal user is obtained Fund for this destination item.
In another embodiment, this second terminal receives the first electronic certificate that first server sends, and to first Terminal sends the second electronic certificate, increases the identification information of this second terminal in the first electronic certificate obtaining simultaneously.
Wherein, this second electronic certificate is silver letter card, is second terminal user with its bank account capital or the accrediting amount Open as guarantee, Bank promise pays, according to solution, the electronic credit voucher that condition handles receipt and payment clearing.That is, the 3rd service Device is the capital management server of second terminal user, e.g., bank.This second electronic certificate freezes second eventually for the 3rd server The account fund of end subscriber or the accrediting amount and open, and frozen account fund or the accrediting amount and the first electricity obtaining Fund amount representated by sub- voucher is identical.
The second electronic certificate fund amount summation that first terminal receives in the given time is not less than this destination item Required raise fund amount when, send solution to the 3rd server and pay request, the 3rd server responds this solution and pays request by the In two terminal user account, the frozen allocation of the funds is to the 4th server, and correspondingly, the 4th server is by this part fund Transfer to the account of first terminal user, make the fund that first terminal user raises needed for obtaining.
Wherein, the 4th server is the capital management server of this first terminal.
Further, the 3rd server can also mutually should solve pay request will be frozen in second terminal user account The allocation of the funds, to the account of first terminal, makes the fund that first terminal is raised needed for obtaining.
The fund amount that first terminal receives in the given time is less than the fund amount raised needed for this destination item When, send the information of failure of raising funds to the 3rd server, the 3rd server responds this information and thaws according to the second data voucher The account fund of corresponding second terminal user.
Above scheme, the fund raising acquisition request for destination item that first server is initiated according to first terminal is corresponding First electronic certificate.Second terminal receives the first electronic certificate that first server sends and by the corresponding allocation of the funds to first In the account of terminal use, make first terminal can raise the fund needed for destination item in the given time.Using electronics When the mode of voucher issues fund raising project, introduce insurance institution's (second server) and project is estimated and assures, thus being Other provide risk guarantee with throwing people's (second terminal).
Further, each second terminal, can also be by equal for fund amount second after receiving the first electronic certificate Electronic certificate sends to the capital management server to first terminal, and solution pays the second electronic certificate after the completion of project financing With by the account of the allocation of the funds to first terminal user.With throwing destination item by the way of the second electronic certificate, with throwing people Fund simply temporarily freeze so that investing safer.
Below the financing method in embodiment of the present invention is illustrated.
For example, this first terminal is fund raising initiator, and this second server is insurance company, and this second terminal is investment Side, this first server is electric business platform.
When fund raising initiator issued by electric business platform need to raise funds for destination item 1,000,000 request when, this electric business Thing letter card maker that is that platform is provided using insurance company or being loaded with insurance company's examination & verification plug-in unit raises project life for this crowd Become thing letter card.The fund amount that this thing letter card represents is 1,000,000.Further, insurance expenses can be paid by sponsor, or Each paid by with throwing people.In one embodiment, the thing letter card that initiator generates is stored on second server, by the The link information of one server publication letter card on distribution platform.Wherein, link information comprises to point to the URL ground of this thing letter card Location, can also include Project Introduction information, the information of sponsor, product picture etc..
Other investors carry out with throwing, specially:Investor a buys after thing letter card to initiator, records on thing letter card There is the identity information of investor a, investor a can be bought using silver letter card, it is possible to use other modes, such as bank Transfer accounts, the network mode such as Alipay is paid.If silver letter card with throwing, is then freezed the account of investor a by the 3rd server Family fund, to open out the silver letter card of corresponding fund, is demonstrate,proved for buying thing letter.
Raise funds to judge whether fund procurement is successful at the expiry, and complete the allocation of the funds.If project financing success, Enter implementation phase, thing letter card holder obtains estimated earnings according to the thing letter card held.Wherein, if investor a is using silver With throwing, then the account fund solution of the 3rd server investor a pays the fund raising account of initiator to letter card.If it is unsuccessful Project financing failure, returns with investment gold according to thing letter card.For example, if using conventional payment mode carry out with throw, then The last assignee of thing letter card will be back to investment Periostracum Cicadae.If paid using silver letter card, investor's a open is raised funds The silver letter card of account thaws.
In above scheme, destination item passes through examination & verification and the guarantee of insurance of insurance company, and investor is directed to needs purchase Thing letter card bought with e-Bank payment, bank transfer or by silver letter card mode, and will be corresponding in destination item success The allocation of the funds to the bank account of initiator.Fund raising project is issued using thing letter card mode, and introduces insurance company to item The guarantee of insurance that mesh is audited, thus provide investment risk guarantee for other investors.Investor is bought in silver letter card mode Destination item is invested, by opening silver letter the freezed fund of card and non-immediate transferring to the bank account of initiator In, only can not be used by bank freezing, but fund is still in the bank account of investor.Therefore, the risk of investor Substantially reduce, simultaneously also because the fund freezed still falls within oneself thus may obtain other interests.
In the above-described embodiments, only exemplary description has been carried out to the present invention, but those skilled in the art are reading this Without departing from the spirit and scope of the present invention various modifications can be carried out to the present invention after patent application.

Claims (17)

1. a kind of processing method obtaining target data, wherein, methods described includes:
First server receive first terminal send acquisition target data interaction request, and by described interaction request send to Second terminal;
Wherein, described interaction request comprises the description information data value of described target data, also comprises guarantee information, described guarantor For second server, barrier information detects that described target data generates when meeting the scope of insurance coverage of described second server.
2. the processing method obtaining target data according to claim 1, wherein, described first server receives described the The interaction request of the acquisition target data that one terminal sends, and described interaction request is sent concrete to the step of second terminal For:
The interaction request of the acquisition target data that described first server sends according to described first terminal, obtains representative number According to the value first data voucher equal with the data value of described target data, and described first data voucher is sent to second eventually End;
Wherein, described first data voucher comprises the information of described interaction request.
3. data processing method according to claim 2, wherein, described first server sends according to described first terminal Acquisition target data interaction request, obtain first several equal with the data value of described target data of representative data value Step according to voucher is specially:
Described first server receives the interaction request of the acquisition target data that described first terminal sends, and in the described second clothes When business device detects the scope of insurance coverage that described target data meets described second server, generate described first data voucher.
4. data processing method according to claim 2, wherein, described first server sends according to described first terminal Acquisition target data interaction request, obtain first several equal with the data value of described target data of representative data value Step according to voucher is specially:
Described first server receives the interaction request of the acquisition target data that described first terminal sends, and according to described interaction Request obtains described first data voucher from described second server;Wherein, described first data voucher is taken by described second Business device detects that described target data meets and generates during the scope of insurance coverage of described second server.
5. data processing method according to claim 2, wherein, methods described includes:
Described second terminal receives described first data voucher, and sends the first data to the 3rd server;
All described first data being sent by described second terminal that described 3rd server receives in the given time When data value size summation is not less than the data value size of described target data, by the data is activation receiving to first terminal.
6. data processing method according to claim 2, wherein, methods described includes:
Described second terminal receives described first data voucher, and sends the second data voucher, described second number to first terminal It is that the 3rd server generates according to the first data in the request described second terminal of locking of described second terminal according to voucher;
The all described second data voucher being sent by described second terminal that described first terminal receives in the given time When representative data value size summation is not less than the data value size of described target data, send number to described 3rd server According to interactive instruction;
Described 3rd server receives described data interaction instruction, and responds described data interaction instruction by described second terminal Locked data is activation is to described first terminal, or the described data interaction instruction of described 3rd server response is by described the The data is activation that two terminals are locked, to the 4th server, makes described 4th server by the data is activation receiving to described the One terminal.
7. the processing method obtaining target data according to claim 6, wherein, described first terminal is in the given time The data value size representated by the second data voucher being sent by described second terminal receiving is less than described target data During data value size, methods described also includes:
Described first terminal sends the instruction of target data interaction failure to described 3rd server;And
Described 3rd server receives described instruction, and responds described instruction according to described second data voucher unblock corresponding the Locked described first data in two terminals.
8. a kind of server, wherein, including:
Receiver module, for receiving the interaction request of the acquisition target data of first terminal transmission;Wherein, described interaction request bag Description information data value containing described target data, also comprises guarantee information, and described guarantee information detects for second server Described target data meets and generates during the scope of insurance coverage of described second server;And
Interaction request sending module, for sending described interaction request to second terminal.
9. server according to claim 8, wherein, also includes:
First data acquisition of credentials module, the interaction request of the acquisition target data for being sent according to first terminal obtains institute's generation The data value of the table first data voucher equal with the data value of described target data;Wherein, described first data voucher comprises The information of described interaction request;
First data voucher sending module, for the described first data voucher obtaining described first data acquisition of credentials module Send to second terminal.
10. a kind of terminal unit, wherein, described equipment includes:
One or more processors;
Memorizer;
Multiple application programs;And
One or more programs, wherein, one or more of programs are stored in described memorizer and are configured to by institute State one or more processors execution, one or more of programs include instructing, and described instruction is used for:
Receive the interaction request of the acquisition target data that first terminal sends;Wherein, described interaction request comprises described number of targets According to description information data value, also comprise guarantee information, described guarantee information be second server detect described target data Generate during the scope of insurance coverage meeting described second server;And
Described interaction request is sent to second terminal.
11. terminal units according to claim 10, wherein, described instruction is additionally operable to:
Data value first data equal with the data value of described target data according to representated by described interaction request obtains with Card;Wherein, described first data voucher comprises the information of described interaction request;And
Described first data voucher is sent to second terminal.
Financing method on a kind of 12. lines, wherein, methods described includes:
First server receives the fund raising request for destination item that first terminal sends, and described request of raising funds is sent extremely Second terminal;Wherein, described request of raising funds includes the description information of described destination item and the required fund amount raised, and also wraps Include insurance information;Described insurance information audits, for second server, the guarantee model that described destination item meets described second server Generate when enclosing.
Financing method on 13. lines according to claim 12, wherein, described first server receives what first terminal sent For the fund raising request of destination item, and raise funds to ask the step sending to second terminal to be specially by described:
Described first server receives the fund raising request for destination item that first terminal sends, and according to described request of raising funds Obtain fund amount first electronic certificate equal with the fund amount raised needed for described destination item representing, and by institute State the first electronic certificate to send to second terminal;
Wherein, described first electronic certificate comprises the information of described request of raising funds.
Financing method on 14. lines according to claim 13, wherein, described first server receives described first terminal and sends out The fund raising request for destination item sent, and the fund amount representing and described destination item are obtained according to described request of raising funds The step of the first equal electronic certificate of the required fund amount raised is specially:
Described first server receives the fund raising request for destination item that described first terminal sends, and in the described second clothes When business device detects that described destination item meets the scope of insurance coverage of described second server and generates described guarantee information, generation has Described first electronic certificate of described guarantee information.
Financing method on 15. lines according to claim 13, wherein, described first server receives described first terminal and sends out The fund raising request for destination item sent, and the fund amount representing and described destination item are obtained according to described request of raising funds The step of the first equal electronic certificate of the required fund amount raised is specially:
Described first server receives the fund raising request for destination item that described first terminal sends, and according to described fund raising Request obtains described first electronic certificate from described second server;Wherein, described first electronic certificate is taken by described second Business device generates when meeting the scope of insurance coverage of described second server to the detection of described destination item.
Financing method on 16. lines according to claim 13, wherein, methods described also includes:
Described second terminal receives described first electronic certificate, and sends the first fund to the 3rd server;
All described first fund being sent by described second terminal that described 3rd server receives in the given time When fund amount summation is not less than the fund amount raised needed for described destination item, the fund receiving is sent to first eventually End.
Financing method on 17. lines according to claim 13, wherein, methods described also includes:
Described second terminal receives described first electronic certificate, and sends the second electronic certificate to the 3rd server;Described second Electronic certificate is the first money in the 3rd server second terminal user account according to the request for freezing of described second terminal Gold and generate;
All described second electronic certificate being sent by described second terminal that described first terminal receives in the given time When representative fund amount summation is not less than the fund amount raised needed for described destination item, send out to described 3rd server The allocation of the funds is sent to instruct;
Described 3rd server receives described allocation of the funds instruction, and responds described allocation of the funds instruction by described second terminal Frozen fund sends to described first terminal.
CN201580012861.4A 2015-09-16 2015-09-16 Processing method for obtaining target data, server, and online fund-raising method Pending CN106464661A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2015/089732 WO2017045154A1 (en) 2015-09-16 2015-09-16 Processing method for acquiring target data, server, and online funding method

Publications (1)

Publication Number Publication Date
CN106464661A true CN106464661A (en) 2017-02-22

Family

ID=58093995

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201580012861.4A Pending CN106464661A (en) 2015-09-16 2015-09-16 Processing method for obtaining target data, server, and online fund-raising method

Country Status (3)

Country Link
CN (1) CN106464661A (en)
CA (2) CA2998517C (en)
WO (1) WO2017045154A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113014533B (en) * 2019-12-20 2022-11-08 北京金山云网络技术有限公司 Processing method, device and system for checking file, storage medium and electronic device
CN112486869A (en) * 2020-11-12 2021-03-12 北京壹体体育产业发展有限公司 Device and method for data exchange among multiple systems

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103117856B (en) * 2012-01-16 2015-07-01 深圳市可秉资产管理合伙企业(有限合伙) Method and apparatus for provisioning applications in mobile devices
CN103208065A (en) * 2012-01-16 2013-07-17 深圳市家富通汇科技有限公司 Method and apparatus for personalizing secure elements in mobile devices
US20140214675A1 (en) * 2013-01-25 2014-07-31 Pankaj Sharma Push payment system and method
CN104579663B (en) * 2013-10-24 2018-03-27 上海中移通信技术工程有限公司 For the method for the validity for limiting digital certificate

Also Published As

Publication number Publication date
CA2998517A1 (en) 2017-03-23
CA3192799A1 (en) 2017-03-23
CA2998517C (en) 2023-04-25
WO2017045154A1 (en) 2017-03-23

Similar Documents

Publication Publication Date Title
CN104504562B (en) A kind of method of mobile payment and system
Khiaonarong Oversight issues in mobile payments
CN101588577A (en) Safe system and method for bank transaction system
CN107480988A (en) A kind of block chain realizes the supervisory systems of stock exchange
WO2018114654A1 (en) System for offline payment with e-money using a mobile device with a short transaction time and final settlement
CN101986336A (en) Electronic check payment system and electronic check payment method
CN102129650A (en) Network finance
CN103077454A (en) Synchronous payment system
MX2012008408A (en) Trusted stored-value payment system that includes untrusted merchant terminals.
KR20190108666A (en) Apparatus and method for automated deposit and withdrawal of funds for cryptocurrency transactions and computer program for the same
CN110020841A (en) On a kind of line and ideal money transfer method and its system under line
Comolli et al. Surfing the first wave of cryptocurrency money laundering
CN101615318A (en) E-payment system and device thereof
KR102092757B1 (en) Accounting and management system using block chain
CN101577656B (en) The control replacing integrated circuit card shows device and network system
CN106133775A (en) Obtain financing method on the processing method of target data, server and line
CN106464661A (en) Processing method for obtaining target data, server, and online fund-raising method
US20240005290A1 (en) Method for providing digital currency platform service and system for same
JP6487319B2 (en) Mobile terminal for cashing deposits and savings and cashing system
KR20210020838A (en) Method and apparatus for conducting loans backed by digital assets
CN110060058B (en) Transaction method, device, equipment and readable storage medium
Mas et al. Bitcoin-like protocols and innovations
CN111242785A (en) Bill processing method and device, electronic equipment and storage medium
CN106549900A (en) Obtain financing method on processing method, server and the line of target data
KR20200054536A (en) Method of making a transaction between cryptocurrencies and apparatus using it

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20170222