CN106464661A - Processing method for obtaining target data, server, and online fund-raising method - Google Patents
Processing method for obtaining target data, server, and online fund-raising method Download PDFInfo
- Publication number
- CN106464661A CN106464661A CN201580012861.4A CN201580012861A CN106464661A CN 106464661 A CN106464661 A CN 106464661A CN 201580012861 A CN201580012861 A CN 201580012861A CN 106464661 A CN106464661 A CN 106464661A
- Authority
- CN
- China
- Prior art keywords
- data
- terminal
- server
- target data
- request
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/22—Payment schemes or models
- G06Q20/24—Credit schemes, i.e. "pay after"
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/08—Protocols for interworking; Protocol conversion
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/10—Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0279—Fundraising management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/06—Asset management; Financial planning or analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/08—Insurance
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
- H04L67/563—Data redirection of data network streams
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
- H04L67/566—Grouping or aggregating service requests, e.g. for unified processing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Development Economics (AREA)
- Strategic Management (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- Economics (AREA)
- Marketing (AREA)
- Computer Security & Cryptography (AREA)
- Technology Law (AREA)
- Entrepreneurship & Innovation (AREA)
- Game Theory and Decision Science (AREA)
- Human Resources & Organizations (AREA)
- Operations Research (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The invention provides a processing method for obtaining target data, a terminal, a server, and an online fund-raising method. The processing method for obtaining target data comprises the following steps: receiving an interaction request for obtaining target data from a first terminal by a first server, and sending the interaction request to a second terminal (S10); wherein the interaction request comprises the description information and data value of the target data and also comprises secure information; and the secure information is generated when the target data detected by the second server is in accord with the secure range of the second server. Through the abovementioned scheme, security guarantee can be provided before an interaction terminal provides target data, and the target data safety and interaction efficiency are both improved.
Description
【Technical field】
The present invention relates to internet data interaction technique field, more particularly to a kind of process side obtaining target data
Financing method on method, server and line.
【Background technology】
With the development of Internet technology especially development of Mobile Internet technology, user can by mobile device use 2G,
The modes such as 3G, 4G or wifi connect the Internet be traded, the activity such as social activity, by Internet technology, user can be easily and effectively
Ground carries out Above-the-line, and this is incomparable experience under line.
But, during the activity such as user is traded by mobile Internet, social activity, the sensitive information of its people is easy to expose
And be possible to be obtained by other people in interaction, thus carrying out illegal objective operation using its information, this will use for network
Great risk is brought at family.
【Content of the invention】
The invention mainly solves the technical problem of providing a kind of processing method obtaining target data, server and terminal
Equipment, needed for detection, whether the target data of interaction meets scope of insurance coverage, and carries out target data when meeting scope of insurance coverage
Interaction, improves efficiency and the safety of network data exchange.
The invention provides a kind of processing method obtaining target data, the method includes:First server receives first
The interaction request of the acquisition target data that terminal sends, and described interaction request is sent to second terminal;Wherein, described interaction
Request bag contains the description information data value of described target data, also comprises guarantee information, and described guarantee information is second service
Device detects that described target data generates when meeting the scope of insurance coverage of described second server.
Present invention also offers a kind of server, including:Receiver module, for receiving the acquisition target of first terminal transmission
The interaction request of data;Wherein, described interaction request comprises the description information data value of described target data, also comprises to ensure
Information, for second server, described guarantee information detects that described target data meets life during the scope of insurance coverage of described second server
Become;And interaction request sending module, for described interaction request is sent to second terminal.
Present invention also offers a kind of terminal unit, including:One or more processors;Memorizer;Multiple application programs;
And one or more program, wherein, one or more of programs are stored in described memorizer and are configured to by institute
State one or more processors execution, one or more of programs include instructing, and described instruction is used for:Receive first terminal to send out
The interaction request of the acquisition target data sent;Wherein, described interaction request comprises the description information data of described target data
Value, also comprises guarantee information, for second server, described guarantee information detects that described target data meets described second server
Scope of insurance coverage when generate;And send described interaction request to second terminal.
In the above processing method of acquisition target data, in advance target data is detected by second server and
Detection generates corresponding guarantee information when meeting the scope of insurance coverage of second server, and first server will comprise this guarantee information
Interaction request sends to second terminal, realizes the interaction of target data between first and second terminal, provides number of targets for second terminal
Safety is provided to assure according to front, to improve target data safety and interactive efficiency.
Another object of the present invention is to providing financing method on a kind of line, issuing the destination item needing to raise funds
When it is audited and examination & verification by when increase insurance information, thus reducing the financial risks of investor, and promote item
Mesh fund raising progress.
The invention provides financing method on a kind of line, including:First server receive first terminal send for mesh
The fund raising request of mark project, and described request of raising funds is sent to second terminal;Wherein, described request of raising funds includes described target
The description information of project and the required fund amount raised, also include insurance information;Described insurance information is examined for second server
Destination item described in core meets generation during the scope of insurance coverage of described second server.
Fund procurement method on above line, is audited to fund raising project in advance by second server and is being met second
It is that this fund raising project increases corresponding insurance information during the scope of insurance coverage of server, first server will comprise this insurance information
Fund raising request releases, thus introduce insurance institution's (second server) in project financing and being estimated and assure, for it
He provides investment risk guarantee with throwing people's (second terminal), and promotes project financing progress.
【Brief description】
Fig. 1 is the flow chart of the processing method that one of first embodiment of the invention obtains target data
Fig. 2 is the schematic flow sheet of the processing method that one of second embodiment of the invention obtains target data;
Fig. 3 is the schematic flow sheet of the processing method that one of third embodiment of the invention obtains target data;
Fig. 4 is the schematic diagram of dealing with relationship of the acquisition target data in embodiment of the present invention;
Fig. 5 is the schematic flow sheet of the processing method that one of four embodiment of the invention obtains target data;
Fig. 6 is the structural representation of one of embodiment of the present invention server;
Fig. 7 is the structural representation of one of embodiment of the present invention terminal unit;
Fig. 8 is the schematic flow sheet of financing method on one of first embodiment of the invention line;
Fig. 9 is the schematic flow sheet of financing method on one of second embodiment of the invention line;
Figure 10 is the schematic flow sheet of financing method on one of third embodiment of the invention line;
Figure 11 is the fund procurement relation schematic diagram in embodiment of the present invention.
【Specific embodiment】
Below in conjunction with the accompanying drawing in embodiment of the present invention, the technical scheme in embodiment of the present invention is carried out clearly
Chu, it is fully described by it is clear that described embodiment is only a part of embodiment of the present invention, rather than whole realities
Apply mode.Based on the embodiment in the present invention, those of ordinary skill in the art institute under the premise of not making creative work
The every other embodiment obtaining, belongs to the scope of protection of the invention.
Refer to Fig. 1, be the schematic flow sheet of the processing method of acquisition target data in first embodiment of the invention,
Method flow shown in this embodiment includes:
Step S10, first server receives the interaction request of the acquisition target data that first terminal sends, and this is interacted
Request sends to second terminal.
Wherein, this interaction request comprises description information, data value and the guarantee information of target data.This guarantee information is
Second server detects that this target data meets and generates during the scope of insurance coverage of second server.
In above scheme, in advance target data is detected by second server and met second server in detection
Corresponding guarantee information is generated, the interaction request comprising this guarantee information is sent to second eventually by first server during scope of insurance coverage
End, realizes the interaction of target data between first and second terminal, and providing for second terminal provides safety to assure before target data, with
Improve target data safety and interactive efficiency.
Refer to Fig. 2, be the schematic flow sheet of the processing method of acquisition target data in second embodiment of the invention,
Method flow shown in this embodiment includes:
Step S20, first terminal sends the interaction request obtaining target data to first server.
Wherein, this interaction request comprises the description information data value of this target data, also comprises guarantee information, this guarantee
For second server, information detects that this target data meets and generates during the scope of insurance coverage of this second server.This request is acceptable
Including the scheduled time, this scheduled time is the time limit obtaining this target data.
The description information of this target data can be the purposes of this target data.
Specifically, this first terminal logs in and accesses first server, and sends the interaction request obtaining target data.
Step S21, this first server obtains the data of representative data value and target data according to this interaction request
It is worth the first equal data voucher, and the first data voucher is sent to second terminal.Wherein, the first data voucher comprises this
The information of interaction request.
In above scheme, when sending interaction request acquisition target data, by second server, target data is examined
Survey and detection by when generate guarantee information, and in the form of the first data voucher with this guarantee information issue target
Data.Thus, provide, by second terminal, the review mechanism that provides safeguard before asked data, there is transfer data safety risk
Effect.
Refer to Fig. 3, be the schematic flow sheet of the processing method of acquisition target data in third embodiment of the invention.
Method flow shown in this embodiment includes:
Step S30, first terminal initiates to obtain the interaction request of target data to first server.
Wherein, this interaction request comprises the description information data value of this target data, also comprises guarantee information, this guarantee
For second server, information detects that this target data meets and generates during the scope of insurance coverage of this second server.
Specifically, this first terminal logs in and accesses first server, and sends the interaction request obtaining target data.
Step S31, this first server obtains the data of representative data value and target data according to this interaction request
It is worth the first equal data voucher, and the first data voucher is sent to second terminal.Wherein, the first data voucher comprises this
The information of interaction request.
In one embodiment, in second server, first server detects that target data meets the guarantor of this second server
When hindering scope and generating guarantee information, generate the first data voucher with this guarantee information.This second server is to number of targets
According to being detected, and determining that detection increases this guarantee information when meeting scope of insurance coverage in target data, and in the first clothes
Still this guarantee information is retained in the first data voucher that business device generates.This guarantee information can include the backup letter of target data
Breath, identification information of second server etc..
In another embodiment, first server according to this interaction request obtain from second server the first data with
Card.Wherein, life when this first data voucher is met the scope of insurance coverage of second server by second server to target data detection
Become, this interaction request at least includes storage address in second server for the first data voucher.Specifically, this first terminal to
The interaction request that first server sends is the chained address (that is, storage address) of the first data voucher, and this chained address comprises
Point to the URL address of the first data voucher, the information of target data can also be comprised, e.g., data sponsor's information, target data
Essential information (e.g., data attribute, form etc.).
Step S32, this second terminal receives the first data voucher that first server sends, and sends to the 3rd server
First data.
In step s 32, at least one second terminal passes through network and first server communication connection, this first service
First data voucher is passed through Web Publishing to each second terminal by device.
Specifically, this second terminal selects the first data from the data that it preserves, and sends it to first terminal.Should
The data value size of the first data can be more than the data value size of target data it is also possible to the data value being less than target data is big
Little.
Step S33, the number of all data being sent by second terminal that the 3rd server receives in the given time
According to value size summation be not less than target data data value size when, by the data is activation receiving to first terminal.
In above scheme, the interaction request of the acquisition target data that first server is initiated according to first terminal obtains first
Data voucher, each second terminal sends the first data to the 3rd server, when the 3rd server receives in the given time
The all data being sent by second terminal data value size summation be not less than target data data value size when, will receive
The data is activation arriving, to first terminal, makes first terminal obtain the data not less than target data data value size.Carrying out mesh
Before mark data interaction, by second server, target data is detected and increased guarantee, and by target data in advance in advance
It is divided into some and is saved in respectively in different second terminals, this reduces the safety wind of target data itself
Danger, and during target data interacts, its authority or ownership obtain risk guarantee.
Refer to Fig. 5, be the schematic flow sheet of the processing method of acquisition target data in four embodiment of the invention,
Please refer to the data interaction relation schematic diagram shown in Fig. 4.Method flow shown in this embodiment includes:
Step S40, first terminal sends the interaction request obtaining target data to first server.
Wherein, this interaction request comprises the description information data value of described target data, also comprises guarantee information, described
For second server, guarantee information detects that described target data generates when meeting the scope of insurance coverage of described second server.
Step S41, this first server obtains the data of representative data value and target data according to this interaction request
It is worth the first equal data voucher, and the first data voucher is sent to second terminal.Wherein, the first data voucher comprises this
The information of interaction request.
Step S42, this second terminal receives the first data voucher of this first server transmission, and sends to first terminal
Second data voucher.Wherein, this second data voucher be the 3rd server according to the request of this second terminal lock this second
The first data in terminal and generate.
Step S43, judges all second numbers being sent by second terminal that this first terminal receives in the given time
Whether it is not less than the data value size of target data according to the data value size summation representated by voucher, if so, then enter step
S44, otherwise, enters step S47.
Step S44, this first terminal sends data interaction instruction to the 3rd server.
Step S45, the 3rd server receives this data interaction instruction, and responds this data interaction instruction by second terminal
In locked data is activation to the 4th server.
Step S46, the 4th server, by the data is activation receiving to first terminal, makes first terminal obtain this target
Data.Then, flow process terminates.
Further, the 3rd server can also respond this data interaction and instruct the data being locked in second terminal
It is sent directly to first terminal, make first terminal obtain target data.
Step S47, this first terminal sends, to the 3rd server, the instruction that target data asks failure.
Step S48, the 3rd server responds this instruction and unlocks quilt in corresponding second terminal according to the second data voucher
The data of locking.Then, flow process terminates.
Above scheme, is detected to the target data obtaining needed for first terminal in second server and is added guarantee letter
After breath, first server obtains the first data voucher according to interaction request, is then then forwarded to multiple second terminals.Second terminal
Receive this first data voucher, and service to correspondingly by the 3rd in the interaction request confirming to respond this first data voucher
Device sends, to first terminal, the second data voucher representing the first Data Data value, so that first terminal can be received in the given time
Collect the second enough data voucher.Wherein, this second data voucher is the request according to this second terminal for the 3rd server
Lock the first data in this second terminal and generate, first terminal obtains the second enough data voucher in the given time
When, by the 3rd server, the data that second terminal is locked directly or indirectly is sent to first terminal so as to finally obtain this mesh
Mark data.Before carrying out target data interaction, by second server, target data is detected and increased guarantee information, and
In advance target data is divided in advance some and is saved in respectively in different second terminals, and to have this guarantee letter
The form of the first data voucher of breath issues the required target data obtaining request.So, asked by other-end offer
Audited before data, be there is data safety guarantee.Meanwhile, second terminal is sent in the form of the second data voucher and counts accordingly
According to can reduce and illegally distorted in data exchange process, lose or the risk of intercepting and capturing is stolen so that counting by other-end
According to carrying out completely, comprehensively protect in interaction to the storage of target data and transmission.
Below the processing method of the acquisition target data in embodiment of the present invention is illustrated.
For example, this first terminal is terminal A, and this second terminal is terminal B1, terminal B2 and terminal B3.Target data position visitor
The startup password of family end D, it is divided into three parts in advance.Terminal B1, terminal B2 and terminal B3 each preserve above-mentioned start
A portion data of password, and only when the data acquisition system of three parts arranges together and in the correct order, institute
The data being formed can be used for opening client D.Wherein, terminal A, B1, B2, B3 and client D can be individual calculus
Machine, panel computer, smart mobile phone etc. can carry out the equipment of data interaction by network and server.
Terminal A initiates the interaction request needing to obtain target data (startup password of client D) by first server,
Second server is detected to target data and is increased guarantee information, to generate three the first data vouchers, i.e. the first data
Voucher a, the first data voucher b and the first data voucher c.This second server carries out detection to target data and includes to number of targets
According to information (as form, description information, level of security etc.) detected, can also include to obtain target data terminal A
(as Permission Levels) are detected.
So arrange the reason be, by second server, target data or terminal A are carried out detecting ensures biography
Judge before defeated target data whether this target data allows to be interacted or whether terminal A has the money using target data
Lattice, to ensure the safety of data, and provide the partial data each preserving to provide safe foundation for terminal B1, B2, B3.
Wherein, this terminal A is known a priori by the startup password of client D and is divided into three parts, the therefore request of transmission
Quantity including the first data voucher and the Permission Levels of terminal A.Three the first data vouchers that this second server generates
In all comprise the Permission Levels of this terminal A, each first data voucher also represents the target data correspondence portion of required acquisition simultaneously
The data divided.For example, the first data voucher a represents the Part I data of the required startup password obtaining, the first data voucher b
Represent the Part II data of the required startup password obtaining, the first data voucher c represents the of the required startup password obtaining
Three partial datas.
Then, the first data voucher is respectively sent to terminal B1, terminal B2 and terminal B3 by first server, makes these three
The data that terminal preserves according to it selects the first data voucher of coupling from three the first data vouchers receiving, and by second
Data voucher sends to terminal A.Taking terminal B1 as a example illustrate now, terminal B1 saves the Part II number of startup password
According to then selection represents the first data voucher b of this Part II data.And, the second data voucher that terminal B1 sends is the
Its Part II data of preserving of three server locks and the electronic certificate that generates, the 3rd server is management terminal B1, B2
Host computer with B3.Wherein, this second data voucher is the information of the Part II data that representative is locked, and is not second
Divided data itself, information above-mentioned can be predetermined symbol, picture etc..Certainly, in other embodiments, terminal B1
Can also directly by Part II data is activation to terminal A.
Further, terminal A have received whole second data of the startup password of composition client D in the given time
Voucher, the data is activation that then request the 3rd server is locked is to terminal A.
Further, this target data can also be lteral data, voice data, video data, routine data or finance
The funds data in field etc., if funds data, such as fund, then now first terminal is fund procurement side, data is activation
Side be investor, first server is the distribution platform raised funds, second and third, four servers be capital management server, example
As bank.If voice data, such as song, now data initiator data sender can be that mobile phone etc. has many
The client of media play function, first server be platform for music search, second and third, four servers be music site service
Device.
Refer to Fig. 6, be the structural representation of the server of embodiment of the present invention, the server shown in this embodiment
50 include receiver module 51, interaction request sending module 52.
This receiver module 51 is used for receiving the interaction request of the acquisition target data of first terminal initiation.Wherein, this interaction
Request bag contains the description information data value of this target data, also comprises guarantee information, and this guarantee information is examined for second server
Survey this target data meet this second server scope of insurance coverage when generate.
This interaction request sending module 52 is used for sending this interaction request to second terminal.
In one embodiment, server 50 also includes the first data acquisition of credentials module 53 and the first data voucher sends
Module 54, wherein, this first data acquisition of credentials module 53 meets scope of insurance coverage and increases in second server detection target data
Plus when ensureing information, the first data voucher is generated according to this interaction request.This first data voucher sending module 54 is used for the
One data voucher sends to second terminal.
In another embodiment, server 50 also includes the first data acquisition of credentials module 53 and the first data voucher is sent out
Send module 54, wherein, this first data acquisition of credentials module 53 obtains the first number according to this interaction request from second server
According to voucher.Wherein, this first data voucher is met to target data detection by second server and generates during scope of insurance coverage, this request
At least include each the first data voucher storage address in second server.Specifically, this first data voucher is by first
Terminal previously generates and is stored in second server, the request that this first terminal sends to first server be the first data with
The chained address (that is, storage address) of card, this chained address comprises to point to the URL address of corresponding first data voucher, acceptable
Comprise the information of target data, e.g., data sponsor's information, the essential information (e.g., data attribute, form etc.) of target data.
This first data voucher sending module 54 is used for sending the first data voucher to second terminal.
Refer to Fig. 7, be the structural representation of the terminal unit in embodiment of the present invention, the terminal in this embodiment
Equipment 60 is server.This terminal unit 60 includes receptor 61, processor 62, transmitter 63, read only memory 64, deposits at random
Access to memory 65 and bus 66.
This receptor 61 is used for receiving data.
The operation of this processor 62 control terminal equipment 60, this processor 62 can also become CPU (Central
Processing Unit, CPU).This processor 62 is probably a kind of IC chip, has the process of signal
Ability.Processor 62 can also be general processor, digital signal processor (DSP), special IC (ASIC), ready-made can
Programming gate array (FPGA) or other PLDs, discrete gate or transistor logic, discrete hardware components.
General processor can be microprocessor or this processor can also be any conventional processor etc..
This transmitter 63 is used for sending data.
Memorizer can include read only memory 64 and random access memory 65, and provides instruction sum to processor 62
According to.The a part of of memorizer can also include nonvolatile RAM (NVRAM).
Each assembly of terminal unit 60 is coupled by bus 66, wherein, bus 66 remove include data/address bus it
Outward, power bus, controlling bus and status signal bus in addition etc. can also be included.But for the sake of clear explanation, will in figure
Various buses are all designated as bus 66.
Memory storage following element, executable module or data structure, or their subset, or they
Superset:
Operational order:Including various operational orders, it is used for realizing various operations.
Operating system:Including various system programs, it is used for realizing various basic businesses and processes hardware based task.
In embodiments of the present invention, processor 62 by calling the operational order of memory storage, (can deposit by this operational order
Storage is in an operating system), execution is following to be operated:
Receive the interaction request of the acquisition target data that first terminal sends, wherein, this interaction request comprises target data
Description information data value, also comprise guarantee information, this guarantee information for second server detection target data meet this
Generate during the scope of insurance coverage of two servers.And
This interaction request is sent to second terminal.
Alternatively, this processor 62 meets scope of insurance coverage and increases guarantee information in second server detection target data
When, the first data voucher is generated according to this interaction request.
Alternatively, this processor 62 obtains the first data voucher according to this interaction request from second server.Wherein, should
First data voucher is met to target data detection by second server and generates during scope of insurance coverage, this request at least include each the
Storage address in second server for the one data voucher.Specifically, this first data voucher is previously generated simultaneously by first terminal
It is stored in second server, the chained address that this first terminal is the first data voucher to the request that terminal unit 60 sends
(that is, storage address), this chained address comprises to point to the URL address of corresponding first data voucher, can also comprise target data
Information, e.g., data sponsor's information, the essential information (e.g., data attribute, form etc.) of target data.
Refer to Fig. 8, be the schematic flow sheet of financing method on the line in first embodiment of the invention, this embodiment
The method flow illustrating includes:
Step S70, first server receives the fund raising request for destination item that first terminal sends, and this is raised funds
Request sends to second terminal.
Wherein, this fund raising request includes the description information of this destination item and the required fund amount raised, and also includes protecting
Dangerous information, this insurance information for second server audit this destination item meet this second server scope of insurance coverage when generate.
In above scheme, in advance fund raising project is audited by second server and met the guarantee of second server
It is that this fund raising project increases corresponding insurance information during scope, the fund raising comprising this insurance information is asked to issue by first server
Go out, thus introduce insurance institution's (second server) in project financing and being estimated and assure, for other with throwing people (second
Terminal) investment risk guarantee is provided, and promote project financing progress.
Refer to Fig. 9, be the schematic flow sheet of financing method on the line in second embodiment of the invention, this embodiment
The method flow illustrating includes:
Step S80, first terminal sends the fund raising request for destination item to first server.
Wherein, this fund raising request includes the description information of this destination item and the required fund amount raised, and also includes protecting
Dangerous information;This insurance information for second server audit this destination item meet this second server scope of insurance coverage when generate.
Step S81, this first server is raised according to needed for the fund amount that this fund raising request acquisition represents is with destination item
Equal first electronic certificate of fund amount of collection, and the plurality of first electronic certificate is sent to second terminal.Wherein, first
Electronic certificate comprises the information of this interaction request.
In the present embodiment, this first electronic certificate believes card for thing, is at least to include fund raising amount, target fund amount
And the electronic documents of Preset Time.
Above scheme, the fund raising acquisition request for destination item that first server sends according to first terminal is corresponding
First electronic certificate.When issuing fund raising project by the way of electronic certificate, introduce insurance company's (second server) to initiation
Project audited and insured, thus provide guarantees of investment confidence and investment risk with throwing people's (second terminal) for other.
Please refer to Figure 10, it is the schematic flow sheet of financing method on one of third embodiment of the invention line,
Please refer to the fund procurement relation schematic diagram described in Figure 11.Method flow shown in this embodiment includes:
Step S90, first terminal sends the fund raising request for destination item to first server.
Wherein, this fund raising request includes the description information of this destination item and the required fund amount raised, and also includes protecting
Dangerous information;This insurance information for second server audit this destination item meet this second server scope of insurance coverage when generate.
Step S91, this first server is raised according to needed for the fund amount that this fund raising request acquisition represents is with destination item
Equal first electronic certificate of amount of the fund of collection, and this first electronic certificate is sent to second terminal.Wherein, the first electricity
Sub- voucher comprises the information of this interaction request.
In the present embodiment, this first electronic certificate believes card for thing, is at least to include fund raising amount, target fund amount
And the electronic documents of Preset Time.
In one embodiment, first server meets scope of insurance coverage and generates guarantor in second server detection destination item
During dangerous information, generate first electronic certificate with this insurance information.This second server is audited to destination item, and
Determine examination & verification by when determine insurance expenses, the Claims Resolution guarantee information such as amount, and increase this insurance information in this destination item,
Still retain this insurance information in the first electronic certificate that first server generates.
In another embodiment, first server according to this fund raising request obtain from second server the first electronics with
Card.Wherein, this first data voucher by second server to destination item audit by when generate, this request at least includes each
Storage address in second server for first electronic certificate.
When detection by when be first electronic certificate increase identification information be the signature of this personage or the stamped signature of this mechanism
Deng, thus improve the authoritative, credible of this destination item to second terminal user when raising funds, the difficulty that reduction is raised funds
Degree.
In above scheme, second server can be insurance company management server, by being loaded with insurance company's examination & verification
Crowd is raised project product letter card by the thing letter card maker of plug-in unit.Wherein, insurance company can audit to crowd's project of raising, and really
Determine insurance expenses, Claims Resolution amount etc..
Step S92, this second terminal receives first server and sends the first electronic certificate, and sends one to the 3rd server
The fund of quota degree.
Step S93, the fund amount summation that the 3rd server receives in the given time is not less than this destination item institute
During the fund amount that need to raise, the 3rd server sends the fund receiving to first terminal, so that first terminal user is obtained
Fund for this destination item.
In another embodiment, this second terminal receives the first electronic certificate that first server sends, and to first
Terminal sends the second electronic certificate, increases the identification information of this second terminal in the first electronic certificate obtaining simultaneously.
Wherein, this second electronic certificate is silver letter card, is second terminal user with its bank account capital or the accrediting amount
Open as guarantee, Bank promise pays, according to solution, the electronic credit voucher that condition handles receipt and payment clearing.That is, the 3rd service
Device is the capital management server of second terminal user, e.g., bank.This second electronic certificate freezes second eventually for the 3rd server
The account fund of end subscriber or the accrediting amount and open, and frozen account fund or the accrediting amount and the first electricity obtaining
Fund amount representated by sub- voucher is identical.
The second electronic certificate fund amount summation that first terminal receives in the given time is not less than this destination item
Required raise fund amount when, send solution to the 3rd server and pay request, the 3rd server responds this solution and pays request by the
In two terminal user account, the frozen allocation of the funds is to the 4th server, and correspondingly, the 4th server is by this part fund
Transfer to the account of first terminal user, make the fund that first terminal user raises needed for obtaining.
Wherein, the 4th server is the capital management server of this first terminal.
Further, the 3rd server can also mutually should solve pay request will be frozen in second terminal user account
The allocation of the funds, to the account of first terminal, makes the fund that first terminal is raised needed for obtaining.
The fund amount that first terminal receives in the given time is less than the fund amount raised needed for this destination item
When, send the information of failure of raising funds to the 3rd server, the 3rd server responds this information and thaws according to the second data voucher
The account fund of corresponding second terminal user.
Above scheme, the fund raising acquisition request for destination item that first server is initiated according to first terminal is corresponding
First electronic certificate.Second terminal receives the first electronic certificate that first server sends and by the corresponding allocation of the funds to first
In the account of terminal use, make first terminal can raise the fund needed for destination item in the given time.Using electronics
When the mode of voucher issues fund raising project, introduce insurance institution's (second server) and project is estimated and assures, thus being
Other provide risk guarantee with throwing people's (second terminal).
Further, each second terminal, can also be by equal for fund amount second after receiving the first electronic certificate
Electronic certificate sends to the capital management server to first terminal, and solution pays the second electronic certificate after the completion of project financing
With by the account of the allocation of the funds to first terminal user.With throwing destination item by the way of the second electronic certificate, with throwing people
Fund simply temporarily freeze so that investing safer.
Below the financing method in embodiment of the present invention is illustrated.
For example, this first terminal is fund raising initiator, and this second server is insurance company, and this second terminal is investment
Side, this first server is electric business platform.
When fund raising initiator issued by electric business platform need to raise funds for destination item 1,000,000 request when, this electric business
Thing letter card maker that is that platform is provided using insurance company or being loaded with insurance company's examination & verification plug-in unit raises project life for this crowd
Become thing letter card.The fund amount that this thing letter card represents is 1,000,000.Further, insurance expenses can be paid by sponsor, or
Each paid by with throwing people.In one embodiment, the thing letter card that initiator generates is stored on second server, by the
The link information of one server publication letter card on distribution platform.Wherein, link information comprises to point to the URL ground of this thing letter card
Location, can also include Project Introduction information, the information of sponsor, product picture etc..
Other investors carry out with throwing, specially:Investor a buys after thing letter card to initiator, records on thing letter card
There is the identity information of investor a, investor a can be bought using silver letter card, it is possible to use other modes, such as bank
Transfer accounts, the network mode such as Alipay is paid.If silver letter card with throwing, is then freezed the account of investor a by the 3rd server
Family fund, to open out the silver letter card of corresponding fund, is demonstrate,proved for buying thing letter.
Raise funds to judge whether fund procurement is successful at the expiry, and complete the allocation of the funds.If project financing success,
Enter implementation phase, thing letter card holder obtains estimated earnings according to the thing letter card held.Wherein, if investor a is using silver
With throwing, then the account fund solution of the 3rd server investor a pays the fund raising account of initiator to letter card.If it is unsuccessful
Project financing failure, returns with investment gold according to thing letter card.For example, if using conventional payment mode carry out with throw, then
The last assignee of thing letter card will be back to investment Periostracum Cicadae.If paid using silver letter card, investor's a open is raised funds
The silver letter card of account thaws.
In above scheme, destination item passes through examination & verification and the guarantee of insurance of insurance company, and investor is directed to needs purchase
Thing letter card bought with e-Bank payment, bank transfer or by silver letter card mode, and will be corresponding in destination item success
The allocation of the funds to the bank account of initiator.Fund raising project is issued using thing letter card mode, and introduces insurance company to item
The guarantee of insurance that mesh is audited, thus provide investment risk guarantee for other investors.Investor is bought in silver letter card mode
Destination item is invested, by opening silver letter the freezed fund of card and non-immediate transferring to the bank account of initiator
In, only can not be used by bank freezing, but fund is still in the bank account of investor.Therefore, the risk of investor
Substantially reduce, simultaneously also because the fund freezed still falls within oneself thus may obtain other interests.
In the above-described embodiments, only exemplary description has been carried out to the present invention, but those skilled in the art are reading this
Without departing from the spirit and scope of the present invention various modifications can be carried out to the present invention after patent application.
Claims (17)
1. a kind of processing method obtaining target data, wherein, methods described includes:
First server receive first terminal send acquisition target data interaction request, and by described interaction request send to
Second terminal;
Wherein, described interaction request comprises the description information data value of described target data, also comprises guarantee information, described guarantor
For second server, barrier information detects that described target data generates when meeting the scope of insurance coverage of described second server.
2. the processing method obtaining target data according to claim 1, wherein, described first server receives described the
The interaction request of the acquisition target data that one terminal sends, and described interaction request is sent concrete to the step of second terminal
For:
The interaction request of the acquisition target data that described first server sends according to described first terminal, obtains representative number
According to the value first data voucher equal with the data value of described target data, and described first data voucher is sent to second eventually
End;
Wherein, described first data voucher comprises the information of described interaction request.
3. data processing method according to claim 2, wherein, described first server sends according to described first terminal
Acquisition target data interaction request, obtain first several equal with the data value of described target data of representative data value
Step according to voucher is specially:
Described first server receives the interaction request of the acquisition target data that described first terminal sends, and in the described second clothes
When business device detects the scope of insurance coverage that described target data meets described second server, generate described first data voucher.
4. data processing method according to claim 2, wherein, described first server sends according to described first terminal
Acquisition target data interaction request, obtain first several equal with the data value of described target data of representative data value
Step according to voucher is specially:
Described first server receives the interaction request of the acquisition target data that described first terminal sends, and according to described interaction
Request obtains described first data voucher from described second server;Wherein, described first data voucher is taken by described second
Business device detects that described target data meets and generates during the scope of insurance coverage of described second server.
5. data processing method according to claim 2, wherein, methods described includes:
Described second terminal receives described first data voucher, and sends the first data to the 3rd server;
All described first data being sent by described second terminal that described 3rd server receives in the given time
When data value size summation is not less than the data value size of described target data, by the data is activation receiving to first terminal.
6. data processing method according to claim 2, wherein, methods described includes:
Described second terminal receives described first data voucher, and sends the second data voucher, described second number to first terminal
It is that the 3rd server generates according to the first data in the request described second terminal of locking of described second terminal according to voucher;
The all described second data voucher being sent by described second terminal that described first terminal receives in the given time
When representative data value size summation is not less than the data value size of described target data, send number to described 3rd server
According to interactive instruction;
Described 3rd server receives described data interaction instruction, and responds described data interaction instruction by described second terminal
Locked data is activation is to described first terminal, or the described data interaction instruction of described 3rd server response is by described the
The data is activation that two terminals are locked, to the 4th server, makes described 4th server by the data is activation receiving to described the
One terminal.
7. the processing method obtaining target data according to claim 6, wherein, described first terminal is in the given time
The data value size representated by the second data voucher being sent by described second terminal receiving is less than described target data
During data value size, methods described also includes:
Described first terminal sends the instruction of target data interaction failure to described 3rd server;And
Described 3rd server receives described instruction, and responds described instruction according to described second data voucher unblock corresponding the
Locked described first data in two terminals.
8. a kind of server, wherein, including:
Receiver module, for receiving the interaction request of the acquisition target data of first terminal transmission;Wherein, described interaction request bag
Description information data value containing described target data, also comprises guarantee information, and described guarantee information detects for second server
Described target data meets and generates during the scope of insurance coverage of described second server;And
Interaction request sending module, for sending described interaction request to second terminal.
9. server according to claim 8, wherein, also includes:
First data acquisition of credentials module, the interaction request of the acquisition target data for being sent according to first terminal obtains institute's generation
The data value of the table first data voucher equal with the data value of described target data;Wherein, described first data voucher comprises
The information of described interaction request;
First data voucher sending module, for the described first data voucher obtaining described first data acquisition of credentials module
Send to second terminal.
10. a kind of terminal unit, wherein, described equipment includes:
One or more processors;
Memorizer;
Multiple application programs;And
One or more programs, wherein, one or more of programs are stored in described memorizer and are configured to by institute
State one or more processors execution, one or more of programs include instructing, and described instruction is used for:
Receive the interaction request of the acquisition target data that first terminal sends;Wherein, described interaction request comprises described number of targets
According to description information data value, also comprise guarantee information, described guarantee information be second server detect described target data
Generate during the scope of insurance coverage meeting described second server;And
Described interaction request is sent to second terminal.
11. terminal units according to claim 10, wherein, described instruction is additionally operable to:
Data value first data equal with the data value of described target data according to representated by described interaction request obtains with
Card;Wherein, described first data voucher comprises the information of described interaction request;And
Described first data voucher is sent to second terminal.
Financing method on a kind of 12. lines, wherein, methods described includes:
First server receives the fund raising request for destination item that first terminal sends, and described request of raising funds is sent extremely
Second terminal;Wherein, described request of raising funds includes the description information of described destination item and the required fund amount raised, and also wraps
Include insurance information;Described insurance information audits, for second server, the guarantee model that described destination item meets described second server
Generate when enclosing.
Financing method on 13. lines according to claim 12, wherein, described first server receives what first terminal sent
For the fund raising request of destination item, and raise funds to ask the step sending to second terminal to be specially by described:
Described first server receives the fund raising request for destination item that first terminal sends, and according to described request of raising funds
Obtain fund amount first electronic certificate equal with the fund amount raised needed for described destination item representing, and by institute
State the first electronic certificate to send to second terminal;
Wherein, described first electronic certificate comprises the information of described request of raising funds.
Financing method on 14. lines according to claim 13, wherein, described first server receives described first terminal and sends out
The fund raising request for destination item sent, and the fund amount representing and described destination item are obtained according to described request of raising funds
The step of the first equal electronic certificate of the required fund amount raised is specially:
Described first server receives the fund raising request for destination item that described first terminal sends, and in the described second clothes
When business device detects that described destination item meets the scope of insurance coverage of described second server and generates described guarantee information, generation has
Described first electronic certificate of described guarantee information.
Financing method on 15. lines according to claim 13, wherein, described first server receives described first terminal and sends out
The fund raising request for destination item sent, and the fund amount representing and described destination item are obtained according to described request of raising funds
The step of the first equal electronic certificate of the required fund amount raised is specially:
Described first server receives the fund raising request for destination item that described first terminal sends, and according to described fund raising
Request obtains described first electronic certificate from described second server;Wherein, described first electronic certificate is taken by described second
Business device generates when meeting the scope of insurance coverage of described second server to the detection of described destination item.
Financing method on 16. lines according to claim 13, wherein, methods described also includes:
Described second terminal receives described first electronic certificate, and sends the first fund to the 3rd server;
All described first fund being sent by described second terminal that described 3rd server receives in the given time
When fund amount summation is not less than the fund amount raised needed for described destination item, the fund receiving is sent to first eventually
End.
Financing method on 17. lines according to claim 13, wherein, methods described also includes:
Described second terminal receives described first electronic certificate, and sends the second electronic certificate to the 3rd server;Described second
Electronic certificate is the first money in the 3rd server second terminal user account according to the request for freezing of described second terminal
Gold and generate;
All described second electronic certificate being sent by described second terminal that described first terminal receives in the given time
When representative fund amount summation is not less than the fund amount raised needed for described destination item, send out to described 3rd server
The allocation of the funds is sent to instruct;
Described 3rd server receives described allocation of the funds instruction, and responds described allocation of the funds instruction by described second terminal
Frozen fund sends to described first terminal.
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2015/089732 WO2017045154A1 (en) | 2015-09-16 | 2015-09-16 | Processing method for acquiring target data, server, and online funding method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106464661A true CN106464661A (en) | 2017-02-22 |
Family
ID=58093995
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201580012861.4A Pending CN106464661A (en) | 2015-09-16 | 2015-09-16 | Processing method for obtaining target data, server, and online fund-raising method |
Country Status (3)
Country | Link |
---|---|
CN (1) | CN106464661A (en) |
CA (2) | CA2998517C (en) |
WO (1) | WO2017045154A1 (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113014533B (en) * | 2019-12-20 | 2022-11-08 | 北京金山云网络技术有限公司 | Processing method, device and system for checking file, storage medium and electronic device |
CN112486869A (en) * | 2020-11-12 | 2021-03-12 | 北京壹体体育产业发展有限公司 | Device and method for data exchange among multiple systems |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103117856B (en) * | 2012-01-16 | 2015-07-01 | 深圳市可秉资产管理合伙企业(有限合伙) | Method and apparatus for provisioning applications in mobile devices |
CN103208065A (en) * | 2012-01-16 | 2013-07-17 | 深圳市家富通汇科技有限公司 | Method and apparatus for personalizing secure elements in mobile devices |
US20140214675A1 (en) * | 2013-01-25 | 2014-07-31 | Pankaj Sharma | Push payment system and method |
CN104579663B (en) * | 2013-10-24 | 2018-03-27 | 上海中移通信技术工程有限公司 | For the method for the validity for limiting digital certificate |
-
2015
- 2015-09-16 WO PCT/CN2015/089732 patent/WO2017045154A1/en active Application Filing
- 2015-09-16 CN CN201580012861.4A patent/CN106464661A/en active Pending
- 2015-09-16 CA CA2998517A patent/CA2998517C/en active Active
- 2015-09-16 CA CA3192799A patent/CA3192799A1/en active Pending
Also Published As
Publication number | Publication date |
---|---|
CA2998517A1 (en) | 2017-03-23 |
CA3192799A1 (en) | 2017-03-23 |
CA2998517C (en) | 2023-04-25 |
WO2017045154A1 (en) | 2017-03-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104504562B (en) | A kind of method of mobile payment and system | |
Khiaonarong | Oversight issues in mobile payments | |
CN101588577A (en) | Safe system and method for bank transaction system | |
CN107480988A (en) | A kind of block chain realizes the supervisory systems of stock exchange | |
WO2018114654A1 (en) | System for offline payment with e-money using a mobile device with a short transaction time and final settlement | |
CN101986336A (en) | Electronic check payment system and electronic check payment method | |
CN102129650A (en) | Network finance | |
CN103077454A (en) | Synchronous payment system | |
MX2012008408A (en) | Trusted stored-value payment system that includes untrusted merchant terminals. | |
KR20190108666A (en) | Apparatus and method for automated deposit and withdrawal of funds for cryptocurrency transactions and computer program for the same | |
CN110020841A (en) | On a kind of line and ideal money transfer method and its system under line | |
Comolli et al. | Surfing the first wave of cryptocurrency money laundering | |
CN101615318A (en) | E-payment system and device thereof | |
KR102092757B1 (en) | Accounting and management system using block chain | |
CN101577656B (en) | The control replacing integrated circuit card shows device and network system | |
CN106133775A (en) | Obtain financing method on the processing method of target data, server and line | |
CN106464661A (en) | Processing method for obtaining target data, server, and online fund-raising method | |
US20240005290A1 (en) | Method for providing digital currency platform service and system for same | |
JP6487319B2 (en) | Mobile terminal for cashing deposits and savings and cashing system | |
KR20210020838A (en) | Method and apparatus for conducting loans backed by digital assets | |
CN110060058B (en) | Transaction method, device, equipment and readable storage medium | |
Mas et al. | Bitcoin-like protocols and innovations | |
CN111242785A (en) | Bill processing method and device, electronic equipment and storage medium | |
CN106549900A (en) | Obtain financing method on processing method, server and the line of target data | |
KR20200054536A (en) | Method of making a transaction between cryptocurrencies and apparatus using it |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20170222 |