WO2017045154A1 - Processing method for acquiring target data, server, and online funding method - Google Patents

Processing method for acquiring target data, server, and online funding method Download PDF

Info

Publication number
WO2017045154A1
WO2017045154A1 PCT/CN2015/089732 CN2015089732W WO2017045154A1 WO 2017045154 A1 WO2017045154 A1 WO 2017045154A1 CN 2015089732 W CN2015089732 W CN 2015089732W WO 2017045154 A1 WO2017045154 A1 WO 2017045154A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
terminal
server
request
target
Prior art date
Application number
PCT/CN2015/089732
Other languages
French (fr)
Chinese (zh)
Inventor
张毅
Original Assignee
深圳市银信网银科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳市银信网银科技有限公司 filed Critical 深圳市银信网银科技有限公司
Priority to CA2998517A priority Critical patent/CA2998517C/en
Priority to CN201580012861.4A priority patent/CN106464661A/en
Priority to PCT/CN2015/089732 priority patent/WO2017045154A1/en
Priority to CA3192799A priority patent/CA3192799A1/en
Publication of WO2017045154A1 publication Critical patent/WO2017045154A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/22Payment schemes or models
    • G06Q20/24Credit schemes, i.e. "pay after"
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/08Protocols for interworking; Protocol conversion
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/10Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0279Fundraising management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/06Asset management; Financial planning or analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/08Insurance
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/563Data redirection of data network streams
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/566Grouping or aggregating service requests, e.g. for unified processing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements

Definitions

  • the present invention relates to the field of Internet data interaction technologies, and in particular, to a method, a server, and an online fundraising method for acquiring target data.
  • the technical problem to be solved by the present invention is to provide a processing method, a server and a terminal device for acquiring target data, detecting whether the target data of the required interaction meets the scope of protection, and performing interaction of the target data when the scope of the guarantee is met, and improving the network data.
  • the efficiency and security of interaction is to provide a processing method, a server and a terminal device for acquiring target data, detecting whether the target data of the required interaction meets the scope of protection, and performing interaction of the target data when the scope of the guarantee is met, and improving the network data.
  • the present invention provides a processing method for acquiring target data, the method comprising: receiving, by the first server, an interaction request for acquiring target data sent by the first terminal, and transmitting the interaction request to the second terminal; wherein the interaction
  • the request includes the description information and the data value of the target data, and further includes the security information, where the security information is generated when the second server detects that the target data meets the coverage range of the second server.
  • the invention further provides a server, comprising: a receiving module, configured to receive an interaction request for acquiring target data sent by the first terminal; wherein the interaction request includes description information and data values of the target data, and further includes protection The information is generated when the second server detects that the target data meets the coverage of the second server, and the interaction request sending module is configured to send the interaction request to the second terminal.
  • the present invention also provides a terminal device comprising: one or more processors; a memory; a plurality of applications; and one or more programs, wherein the one or more programs are stored in the memory and Configuring to be executed by the one or more processors, the one or more programs comprising instructions for: receiving an interaction request of the acquisition target data sent by the first terminal; wherein the interaction request includes The description information and the data value of the target data further include security information, where the security information is generated when the second server detects that the target data meets the coverage of the second server; and sends the interaction request to The second terminal.
  • the second server detects the target data in advance and generates corresponding guarantee information when detecting the coverage range of the second server, and the first server sends an interaction request including the guarantee information to the
  • the second terminal implements interaction of target data between the first terminal and the second terminal, and provides security guarantee before providing the target data to the second terminal, so as to improve target data security and interaction efficiency.
  • Another object of the present invention is to provide an online fundraising method for reviewing a target project that needs to raise funds and increasing insurance information when the audit is approved, thereby reducing the capital risk of the investor and facilitating project financing. schedule.
  • the present invention provides an online fundraising method, including: receiving, by a first server, a funding request for a target item sent by a first terminal, and transmitting the funding request to a second terminal; wherein the funding request includes the The description information of the target item and the amount of funds to be raised further include insurance information; and the insurance information is generated when the second server verifies that the target item meets the coverage of the second server.
  • the second server pre-verifies the fundraising project and adds corresponding insurance information to the fundraising project when the second server is covered, and the first server issues a financing request including the insurance information. Go out, so that when the project is funded, the insurance institution (second server) is introduced for evaluation and guarantee, and other investment investors (second terminal) are provided with investment risk protection, and the project financing progress is promoted.
  • FIG. 1 is a flowchart of a method for processing acquisition target data in a first embodiment of the present invention
  • FIG. 2 is a schematic flowchart of a method for processing target data in a second embodiment of the present invention
  • FIG. 3 is a schematic flowchart of a method for processing target data in a third embodiment of the present invention.
  • FIG. 4 is a schematic diagram showing a processing relationship of acquiring target data in an embodiment of the present invention.
  • FIG. 5 is a schematic flowchart of a method for processing target data according to a fourth embodiment of the present invention.
  • FIG. 6 is a schematic structural diagram of a server in an embodiment of the present invention.
  • FIG. 7 is a schematic structural diagram of a terminal device according to an embodiment of the present invention.
  • FIG. 8 is a schematic flow chart of an online fundraising method in a first embodiment of the present invention.
  • FIG. 9 is a schematic flow chart of an online fundraising method in a second embodiment of the present invention.
  • FIG. 10 is a schematic flow chart of an online fundraising method in a third embodiment of the present invention.
  • FIG. 11 is a schematic diagram of a fund raising relationship in an embodiment of the present invention.
  • FIG. 1 is a schematic flowchart of a method for processing target data in a first embodiment of the present invention.
  • the method flow shown in the implementation manner includes:
  • Step S10 The first server receives an interaction request for acquiring target data sent by the first terminal, and sends the interaction request to the second terminal.
  • the interaction request includes description information, data values, and security information of the target data.
  • the guarantee information is generated when the second server detects that the target data meets the coverage range of the second server.
  • the second server detects the target data in advance and generates corresponding security information when detecting the coverage of the second server, and the first server sends an interaction request including the security information to the second terminal to implement the first
  • the interaction of the target data between the first and second terminals provides a security guarantee for the second terminal to provide target data to improve the security and interaction efficiency of the target data.
  • FIG. 2 is a schematic flowchart of a method for processing target data in a second embodiment of the present invention.
  • the method flow shown in the implementation manner includes:
  • Step S20 The first terminal sends an interaction request for acquiring target data to the first server.
  • the interaction request includes the description information and the data value of the target data, and the security information is generated when the second server detects that the target data meets the coverage range of the second server.
  • the request may also include a predetermined time, which is a time period for obtaining the target data.
  • the description information of the target data may be the purpose of the target data.
  • the first terminal logs in and accesses the first server, and sends an interaction request for acquiring target data.
  • Step S21 The first server obtains, according to the interaction request, a first data credential whose data value is equal to the data value of the target data, and sends the first data credential to the second terminal.
  • the first data voucher includes information of the interaction request.
  • the target data when the interaction request acquisition target data is issued, the target data is detected by the second server and the security information is generated when the detection passes, and the target data is released in the form of the first data certificate having the security information. Therefore, providing a security audit mechanism before providing the requested data to the second terminal has the function of transferring data security risks.
  • FIG. 3 is a schematic flowchart diagram of a method for processing target data in a third embodiment of the present invention.
  • the method flow shown in this embodiment includes:
  • Step S30 The first terminal initiates an interaction request for acquiring target data to the first server.
  • the interaction request includes the description information and the data value of the target data, and the security information is generated when the second server detects that the target data meets the coverage range of the second server.
  • the first terminal logs in and accesses the first server, and sends an interaction request for acquiring target data.
  • Step S31 The first server obtains a first data credential whose data value is equal to the data value of the target data according to the interaction request, and sends the first data credential to the second terminal.
  • the first data voucher includes information of the interaction request.
  • the first server generates the first data credential having the guarantee information when the second server detects that the target data meets the guarantee range of the second server to generate the guarantee information.
  • the second server detects the target data, and adds the guarantee information to the target data when it is determined that the detection meets the coverage, and the guarantee information is still retained in the first data certificate generated by the first server.
  • the guarantee information may include backup information of the target data, identity information of the second server, and the like.
  • the first server obtains the first data credential from the second server according to the interaction request.
  • the first data credential is generated when the second server detects that the target data meets the guarantee range of the second server, and the interaction request includes at least the storage address of the first data credential in the second server.
  • the interaction request sent by the first terminal to the first server is a link address (ie, a storage address) of the first data credential, where the link address includes a URL address that points to the first data credential, and may also include information of the target data. For example, data initiator information, basic information of target data (eg, data attributes, formats, etc.).
  • Step S32 The second terminal receives the first data credential sent by the first server, and sends the first data to the third server.
  • step S32 at least one second terminal communicates with the first server through a network, and the first server issues the first data credential to each second terminal through the network.
  • the second terminal selects the first data from the data it saves and sends it to the first terminal.
  • the data value of the first data may be larger than the data value of the target data, or may be smaller than the data value of the target data.
  • Step S33 When the sum of the data value values of all the data sent by the second terminal received by the third terminal within a predetermined time is not less than the data value size of the target data, the received data is sent to the first terminal.
  • the first server acquires the first data credential according to the interaction request of the acquiring target data initiated by the first terminal, and each second terminal sends the first data to the third server, when the third server receives the data within the predetermined time.
  • the received data is sent to the first terminal, so that the first terminal obtains data that is not smaller than the target data data value.
  • the second server detects and increases the target data, and pre-divids the target data into multiple parts and stores them in different second terminals, thus reducing the target data itself. Security risks, and in the process of interaction of the target data, its authority or ownership is protected by risks.
  • FIG. 5 is a schematic flowchart of a method for processing target data in a fourth embodiment of the present invention. Please refer to the data interaction relationship shown in FIG. 4 at the same time.
  • the method flow shown in this embodiment includes:
  • Step S40 The first terminal sends an interaction request for acquiring target data to the first server.
  • the interaction request includes the description information and the data value of the target data, and the security information is generated when the second server detects that the target data meets the coverage range of the second server.
  • Step S41 The first server obtains, according to the interaction request, a first data credential whose data value is equal to the data value of the target data, and sends the first data credential to the second terminal.
  • the first data voucher includes information of the interaction request.
  • Step S42 the second terminal receives the first data credential sent by the first server, and sends the second data credential to the first terminal.
  • the second data credential is generated by the third server locking the first data in the second terminal according to the request of the second terminal.
  • Step S43 determining whether the sum of the data values represented by all the second data vouchers sent by the second terminal received by the first terminal within a predetermined time is not less than the data value of the target data, and if yes, proceeding to step S44. Otherwise, it proceeds to step S47.
  • Step S44 the first terminal sends a data interaction instruction to the third server.
  • Step S45 the third server receives the data interaction instruction, and sends the locked data in the second terminal to the fourth server in response to the data interaction instruction.
  • Step S46 The fourth server sends the received data to the first terminal, so that the first terminal acquires the target data. Then the process ends.
  • the third server may further send the locked data in the second terminal to the first terminal in response to the data interaction instruction, so that the first terminal acquires the target data.
  • Step S47 the first terminal sends an instruction that the target data request fails to the third server.
  • Step S48 the third server, in response to the instruction, unlocks the locked data in the corresponding second terminal according to the second data credential. Then the process ends.
  • the first server acquires the first data certificate according to the interaction request, and then sends the data to the plurality of second terminals. Receiving, by the second terminal, the first data credential, and correspondingly sending a second data credential representing the first data data value to the first terminal by using the third server, when confirming the interaction request in response to the first data credential, so that the first The terminal can collect enough second data credentials within a predetermined time.
  • the second data credential is generated by the third server locking the first data in the second terminal according to the request of the second terminal, and when the first terminal obtains sufficient second data credential within a predetermined time, The third server directly or indirectly transmits the data locked by the second terminal to the first terminal, so that the target data is finally obtained.
  • the second server detects the target data and adds the guarantee information, and pre-divides the target data into a plurality of parts and stores them in different second terminals respectively, and has the protection information.
  • the target data request to be acquired is issued in the form of the first data voucher. In this way, the other terminals are provided with the requested data for review before they have data security.
  • the second terminal sends the corresponding data in the form of the second data credential, which can reduce the risk of being illegally tampered with, lost or intercepted by other terminals during the data interaction process, so that the target data is stored during the data interaction process.
  • the transmission is fully and comprehensively protected.
  • the method for processing the acquisition target data in the embodiment of the present invention is exemplified below.
  • the first terminal is terminal A
  • the second terminal is terminal B1, terminal B2, and terminal B3.
  • the target data bit client D's power-on password which is pre-divided into three parts.
  • the terminal B1, the terminal B2, and the terminal B3 each hold a part of the data of the above-mentioned power-on password, and the formed data can be used to open the client D only when the data of the three parts are grouped together and arranged in the correct order.
  • the terminals A, B1, B2, and B3 and the client D may be devices that can exchange data with the server through a network, such as a personal computer, a tablet, or a smart phone.
  • the terminal A initiates an interaction request for acquiring the target data (the power-on password of the client D) through the first server, and the second server detects the target data and adds the guarantee information to generate three first data credentials, that is, the first data. Credential a, first data voucher b, and first data voucher c.
  • the detecting, by the second server, the target data includes detecting information (such as format, description information, security level, and the like) of the target data, and may further include detecting the terminal A (such as the privilege level) that acquires the target data.
  • the reason for this setting is that the target data or the terminal A is detected by the second server to ensure whether the target data is allowed to be exchanged or whether the terminal A has the qualification to use the target data before the transmission of the target data, so as to ensure the security of the data. And provide a security basis for the terminals B1, B2, and B3 to provide respective saved partial data.
  • the terminal A knows in advance that the power-on password of the client D is divided into three parts, so the request sent includes the number of the first data certificate and the authority level of the terminal A.
  • Each of the three first data credentials generated by the second server includes the permission level of the terminal A, and each of the first data credentials further represents data of the corresponding portion of the target data that needs to be acquired.
  • the first data voucher a represents the first part of the data of the power-on password that needs to be obtained
  • the first data voucher b represents the second part of the data of the power-on password that needs to be acquired
  • the first data voucher c represents the power-on password that needs to be obtained.
  • the third part of the data is the third part of the data.
  • the first server sends the first data voucher to the terminal B1, the terminal B2, and the terminal B3, respectively, so that the three terminals select the matching first data voucher from the received three first data voucher according to the saved data. And sending the second data certificate to terminal A.
  • terminal B1 takes terminal B1 as an example for description, terminal B1 saves the second part of data of the power-on password, and then selects the first data certificate b representing the second part of data.
  • the second data credential sent by the terminal B1 is an electronic credential generated by the third server locking the second part of the data saved by the third server, and the third server is the upper computer of the management terminals B1, B2 and B3.
  • the second data voucher is information representing the second part of the data that is locked, and is not the second part of the data itself.
  • the information mentioned above may be a predetermined symbol, a picture, or the like.
  • the terminal B1 may also directly send the second part of data to the terminal A.
  • the terminal A receives all the second data credentials constituting the power-on password of the client D within a predetermined time, and then requests the third server to send the data locked by the third server to the terminal A.
  • the target data may also be text data, audio data, video data, program data or financial data in the financial field. If it is capital data, such as funds, then the first terminal is the fundraiser, and the data sender It is the investor, the first server is the publishing platform for raising funds, and the second, third and fourth servers are fund management servers, for example, banks. If it is audio data, such as a song, the data originator and the data sender may be a client having a multimedia playing function, such as a mobile phone, the first server is a music search platform, and the second, third, and fourth servers are music website servers.
  • FIG. 6 is a schematic structural diagram of a server according to an embodiment of the present invention.
  • the server 50 shown in this embodiment includes a receiving module 51 and an interaction request sending module 52.
  • the receiving module 51 is configured to receive an interaction request for acquiring target data initiated by the first terminal.
  • the interaction request includes the description information and the data value of the target data, and the security information is generated when the second server detects that the target data meets the coverage range of the second server.
  • the interaction request sending module 52 is configured to send the interaction request to the second terminal.
  • the server 50 further includes a first data credential obtaining module 53 and a first data credential sending module 54, wherein the first data credential obtaining module 53 detects that the target data meets the guarantee range and increases the securing information at the second server.
  • the first data credential is generated according to the interaction request.
  • the first data credential sending module 54 is configured to send the first data credential to the second terminal.
  • the server 50 further includes a first data credential obtaining module 53 and a first data credential sending module 54, wherein the first data credential obtaining module 53 obtains the first data from the second server according to the interaction request. certificate.
  • the first data credential is generated when the second server detects that the target data meets the guarantee range, and the request includes at least a storage address of each first data credential in the second server.
  • the first data credential is pre-generated by the first terminal and stored in the second server, and the request sent by the first terminal to the first server is a link address (ie, a storage address) of the first data credential, and the link is The address includes a URL address corresponding to the first data voucher, and may also include information of the target data, such as data originator information, basic information of the target data (eg, data attributes, format, etc.).
  • the first data credential sending module 54 is configured to send the first data credential to the second terminal.
  • FIG. 7 is a schematic structural diagram of a terminal device according to an embodiment of the present invention.
  • the terminal device 60 in this embodiment is a server.
  • the terminal device 60 includes a receiver 61, a processor 62, a transmitter 63, a read only memory 64, a random access memory 65, and a bus 66.
  • the receiver 61 is for receiving data.
  • the processor 62 controls the operation of the terminal device 60, and the processor 62 can also become a CPU (Central Processing Unit, central processing unit).
  • the processor 62 may be an integrated circuit chip with signal processing capabilities.
  • Processor 62 can also be a general purpose processor, digital signal processor (DSP), application specific integrated circuit (ASIC), off-the-shelf programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic device, discrete hardware component .
  • the general purpose processor may be a microprocessor or the processor or any conventional processor or the like.
  • the transmitter 63 is for transmitting data.
  • the memory can include read only memory 64 and random access memory 65 and provide instructions and data to processor 62.
  • a portion of the memory may also include non-volatile random access memory (NVRAM).
  • NVRAM non-volatile random access memory
  • the various components of the terminal device 60 are coupled together by a bus 66.
  • the bus 66 may include, in addition to the data bus, a power bus, a control bus, a status signal bus, and the like. However, for clarity of description, various buses are labeled as bus 66 in the figure.
  • the memory stores the following elements, executable modules or data structures, or a subset of them, or their extended set:
  • Operation instructions include various operation instructions for implementing various operations.
  • Operating system Includes a variety of system programs for implementing various basic services and handling hardware-based tasks.
  • the processor 62 performs the following operations by calling an operation instruction stored in the memory, which can be stored in the operating system:
  • the interaction request for acquiring target data sent by the first terminal, where the interaction request includes description information and data values of the target data, and further includes protection information, where the protection information is that the second server detects that the target data meets the protection of the second server.
  • the range is generated.
  • the interaction request is sent to the second terminal.
  • the processor 62 generates the first data credential according to the interaction request when the second server detects that the target data meets the guarantee range and increases the guarantee information.
  • the processor 62 obtains the first data credential from the second server according to the interaction request.
  • the first data credential is generated when the second server detects that the target data meets the guarantee range, and the request includes at least a storage address of each first data credential in the second server.
  • the first data credential is pre-generated by the first terminal and stored in the second server, and the request sent by the first terminal to the terminal device 60 is a link address (ie, a storage address) of the first data credential, and the link is The address includes a URL address corresponding to the first data voucher, and may also include information of the target data, such as data originator information, basic information of the target data (eg, data attributes, format, etc.).
  • FIG. 8 is a schematic flowchart diagram of an online fundraising method according to a first embodiment of the present invention.
  • the method flow shown in the implementation manner includes:
  • Step S70 The first server receives the fundraising request for the target item sent by the first terminal, and sends the fundraising request to the second terminal.
  • the financing request includes description information of the target item and the amount of funds to be raised, and insurance information, which is generated when the second server audits that the target item meets the coverage of the second server.
  • the second server pre-follows the fundraising project and adds corresponding insurance information to the fundraising project when the scope of the second server is met, and the first server issues the financing request including the insurance information, thereby
  • the insurance institution second server
  • other investment investors second terminal
  • FIG. 9 is a schematic flowchart of an online financing method according to a second embodiment of the present invention.
  • the method flow shown in the implementation manner includes:
  • Step S80 The first terminal sends a fundraising request for the target item to the first server.
  • the financing request includes description information of the target item and a fund amount to be raised, and insurance information; the insurance information is generated when the second server verifies that the target item meets the coverage of the second server.
  • Step S81 The first server obtains, according to the fundraising request, a first electronic voucher whose representative fund amount is equal to the amount of funds required to be raised by the target item, and sends the plurality of first electronic voucher to the second terminal.
  • the first electronic voucher includes information of the interaction request.
  • the first electronic voucher is a physical evidence, and is an electronic document including at least a fundraising amount, a target fund amount, and a preset time.
  • the first server acquires the corresponding first electronic voucher according to the fundraising request for the target item sent by the first terminal.
  • the insurance company (second server) is introduced to audit and insure the initiated project, thereby providing investment confidence and investment risk protection for other investors (second terminal).
  • FIG. 10 is a schematic flowchart of an online fundraising method according to a third embodiment of the present invention.
  • FIG. 11 for a schematic diagram of the fund raising relationship.
  • the method flow shown in this embodiment includes:
  • Step S90 The first terminal sends a fundraising request for the target item to the first server.
  • the financing request includes description information of the target item and a fund amount to be raised, and insurance information; the insurance information is generated when the second server verifies that the target item meets the coverage of the second server.
  • Step S91 The first server obtains, according to the fundraising request, a first electronic voucher whose representative fund amount is equal to the amount of funds required to be raised by the target item, and sends the first electronic voucher to the second terminal.
  • the first electronic voucher includes information of the interaction request.
  • the first electronic voucher is a physical evidence, and is an electronic document including at least a fundraising amount, a target fund amount, and a preset time.
  • the first server generates the first electronic voucher having the insurance information when the second server detects that the target item meets the coverage and generates the insurance information.
  • the second server reviews the target item, and determines the insurance information such as the insurance premium and the claim amount when determining the approval, and adds the insurance information to the target item, and remains in the first electronic certificate generated by the first server.
  • the insurance information is not limited to the insurance information.
  • the first server obtains the first electronic credential from the second server according to the funding request.
  • the first data credential is generated when the second server verifies the target item, and the request includes at least a storage address of each first electronic credential in the second server.
  • the identification information added for the first electronic voucher is the signature of the person or the signature of the institution, etc., thereby improving the authority and credibility of the target item and reducing the financing when raising funds to the second end user. Difficulty.
  • the second server may be an insurance company management server
  • the crowdfunding project generator is credified by the material certificate generator loaded with the insurance company audit plugin.
  • the insurance company will review the crowdfunding project and determine the insurance premium and the amount of claims.
  • Step S92 the second terminal receives the first server to send the first electronic voucher, and sends a certain amount of funds to the third server.
  • step S93 when the sum of the funds amount received by the third server within a predetermined time is not less than the amount of funds to be raised by the target item, the third server sends the received funds to the first terminal, so that the first terminal user obtains the target. Funding for the target project.
  • the second terminal receives the first electronic credential sent by the first server, and sends the second electronic credential to the first terminal, and adds the identifier information of the second terminal to the obtained first electronic credential.
  • the second electronic voucher is a silver credit certificate, and is opened for the second terminal user with the bank account fund or the credit line as a guarantee, and the bank promises to handle the electronic credit certificate for settlement and payment according to the payment condition.
  • the third server is a money management server of the second end user, such as a bank.
  • the second electronic voucher is opened for the third server to freeze the account funds or the credit line of the second end user, and the frozen account fund or credit line is the same as the fund amount represented by the obtained first electronic voucher.
  • the third terminal sends a settlement request to the third server, and the third server responds to the settlement request.
  • the frozen funds in the second terminal user account are transferred to the fourth server. Accordingly, the fourth server transfers the funds to the account of the first terminal user, so that the first terminal user obtains the funds to be raised.
  • the fourth server is a fund management server of the first terminal.
  • the third server may further allocate the frozen funds in the second terminal user account to the account of the first terminal corresponding to the settlement request, so that the first terminal acquires the funds to be raised.
  • the information about the failure of the financing is sent to the third server, and the third server responds to the information according to the second data voucher. Two end user's account funds.
  • the first server acquires the corresponding first electronic voucher according to the fundraising request initiated by the first terminal for the target item.
  • the second terminal receives the first electronic voucher sent by the first server and transfers the corresponding funds to the account of the first terminal user, so that the first terminal can raise funds required for the target project within a predetermined time.
  • an insurance institution (second server) is introduced to evaluate and guarantee the project, thereby providing risk protection for other investors (second terminal).
  • each second terminal may further send the second electronic voucher with the same amount of funds to the fund management server of the first terminal, and solve the second electronic after the project financing is completed.
  • the voucher is used to transfer funds to the account of the first end user.
  • the funds with the investors are only temporarily frozen, making the investment safer.
  • the first terminal is a fundraising initiator
  • the second server is an insurance company
  • the second terminal is an investor
  • the first server is an e-commerce platform.
  • the e-commerce platform When the fund-raising initiator issues a request for financing a target project of 1 million through the e-commerce platform, the e-commerce platform generates a material letter for the crowdfunding project by using a physical information certificate generator provided by the insurance company or loaded with an insurance company audit plug-in. certificate. The amount of funds represented by this material certificate is 1 million. Further, the insured expenses may be paid by the sponsor or paid by the respective investors.
  • the initiator-generated physical evidence is stored on the second server, and the link information of the physical certificate is issued on the publishing platform by the first server.
  • the link information includes a URL address pointing to the material certificate, and may also include item introduction information, initiator information, product pictures, and the like.
  • the investor a purchases the physical evidence from the initiator, the identity information of the investor a is recorded on the physical evidence card, and the investor a can use the silver letter certificate to purchase or use Other methods, such as bank transfer, Alipay and other network methods to pay. If it is a silver letter and investment, the third server freezes the account funds of the investor a to open a corresponding bank certificate for the purchase of the material certificate.
  • the fund-raising period expires, it is judged whether the fund raising is successful and the fund allocation is completed. If the project is successfully funded, it will enter the implementation stage, and the holder of the physical evidence will obtain the predetermined income based on the material certificate held. Wherein, if the investor a uses the bank credit and the investment, the account fund of the third server investor a is released to the sponsor's fundraising account. If it is not successful, the project will fail to raise funds, and the return will be based on the material certificate. For example, if the traditional payment method is used for the follow-up, the investment will be returned to the last assignee of the physical information certificate. If a bank letter is used for payment, the investor’s bank letter issued to the fundraising account is released.
  • the target project passes the insurance company's audit and insurance guarantee, and the investor purchases the physical information certificate that needs to be purchased by online banking payment, bank transfer or through bank credit card, and allocates the corresponding funds when the target project is successful.
  • the fund-raising project is issued by means of physical evidence, and the insurance guarantee for the project to be audited by the insurance company is introduced, thereby providing investment risk protection for other investors.
  • the investor purchases the target project by means of a bank letter.
  • the funds frozen because the bank letter is issued are not directly transferred to the bank account of the initiator. They are only frozen by the bank and cannot be used, but the funds are still in the investor's bank. In the bank account. As a result, the risk of the investor is greatly reduced, and because the frozen funds remain their own, they may gain additional benefits.

Abstract

A processing method for acquiring target data, a terminal, a server, and an online funding method. The processing method for acquiring target data comprises: a first server receives an exchange request transmitted by a first terminal for acquiring target data and transmits the exchange request to a second terminal (S10), where the exchange request comprises descriptive information and a data value of the target data and also comprises coverage information, and the coverage information is generated when the second server detects that the target data complies with a coverage range of the second server. By such means, security guarantee can be provided before the target data is provided to the exchanging terminals, thus increasing the security and exchange efficiency of the target data.

Description

获取目标数据的处理方法、服务器及线上筹资方法 Method for processing target data, server and online fundraising method
【技术领域】[Technical Field]
本发明涉及互联网数据交互技术领域,特别是涉及一种获取目标数据的处理方法、服务器以及线上筹资方法。The present invention relates to the field of Internet data interaction technologies, and in particular, to a method, a server, and an online fundraising method for acquiring target data.
【背景技术】 【Background technique】
随着互联网技术尤其是移动互联网技术的发展,用户可以通过移动设备使用2G、3G、4G或wifi等方式连接互联网进行交易、社交等活动,通过互联网技术用户可以方便有效地进行线上活动,这是线下无法比拟的体验。With the development of Internet technologies, especially mobile Internet technologies, users can use the 2G, 3G, 4G or wifi to connect to the Internet for transactions, social activities, etc. Through Internet technology users can conveniently and effectively carry out online activities. It is an incomparable experience offline.
但是,用户通过移动互联网进行交易、社交等活动时,其个人的敏感信息易于暴露且在交互过程中有可能被其他人获取,从而利用其信息进行非法目的操作,这将为网络用户带来很大风险。However, when users use the mobile Internet to conduct transactions, social activities, etc., their personal sensitive information is easy to be exposed and may be obtained by others during the interaction process, thereby using its information for illegal purposes, which will bring great benefits to network users. Big risk.
【发明内容】  [Summary of the Invention]
本发明主要解决的技术问题是提供一种获取目标数据的处理方法、服务器和终端设备,检测所需交互的目标数据是否符合保障范围,并在符合保障范围时进行目标数据的交互,提高网络数据交互的效率和安全性。The technical problem to be solved by the present invention is to provide a processing method, a server and a terminal device for acquiring target data, detecting whether the target data of the required interaction meets the scope of protection, and performing interaction of the target data when the scope of the guarantee is met, and improving the network data. The efficiency and security of interaction.
本发明提供了一种获取目标数据的处理方法,该方法包括:第一服务器接收第一终端发送的获取目标数据的交互请求,并将所述交互请求发送至第二终端;其中,所述交互请求包含所述目标数据的描述信息和数据值,还包含保障信息,所述保障信息为第二服务器检测所述目标数据符合所述第二服务器的保障范围时生成的。The present invention provides a processing method for acquiring target data, the method comprising: receiving, by the first server, an interaction request for acquiring target data sent by the first terminal, and transmitting the interaction request to the second terminal; wherein the interaction The request includes the description information and the data value of the target data, and further includes the security information, where the security information is generated when the second server detects that the target data meets the coverage range of the second server.
本发明还提供了一种服务器,包括:接收模块,用于接收第一终端发送的获取目标数据的交互请求;其中,所述交互请求包含所述目标数据的描述信息和数据值,还包含保障信息,所述保障信息为第二服务器检测所述目标数据符合所述第二服务器的保障范围时生成的;以及交互请求发送模块,用于将所述交互请求发送至第二终端。The invention further provides a server, comprising: a receiving module, configured to receive an interaction request for acquiring target data sent by the first terminal; wherein the interaction request includes description information and data values of the target data, and further includes protection The information is generated when the second server detects that the target data meets the coverage of the second server, and the interaction request sending module is configured to send the interaction request to the second terminal.
本发明还提供了一种终端设备,包括:一个或多个处理器;存储器;多个应用程序;以及一个或多个程序,其中,所述一个或多个程序被存储在所述存储器中并被配置为被所述一个或多个处理器执行,所述一个或多个程序包括指令,所述指令用于:接收第一终端发送的获取目标数据的交互请求;其中,所述交互请求包含所述目标数据的描述信息和数据值,还包含保障信息,所述保障信息为第二服务器检测所述目标数据符合所述第二服务器的保障范围时生成的;以及将所述交互请求发送至第二终端。The present invention also provides a terminal device comprising: one or more processors; a memory; a plurality of applications; and one or more programs, wherein the one or more programs are stored in the memory and Configuring to be executed by the one or more processors, the one or more programs comprising instructions for: receiving an interaction request of the acquisition target data sent by the first terminal; wherein the interaction request includes The description information and the data value of the target data further include security information, where the security information is generated when the second server detects that the target data meets the coverage of the second server; and sends the interaction request to The second terminal.
以上的获取目标数据的处理方法中,由第二服务器预先对目标数据进行检测并在检测符合第二服务器的保障范围时生成相应的保障信息,第一服务器将包含该保障信息的交互请求发送至第二终端,实现第一、二终端之间目标数据的交互,为第二终端提供目标数据前提供安全担保,以提高目标数据安全性和交互效率。In the above method for acquiring the target data, the second server detects the target data in advance and generates corresponding guarantee information when detecting the coverage range of the second server, and the first server sends an interaction request including the guarantee information to the The second terminal implements interaction of target data between the first terminal and the second terminal, and provides security guarantee before providing the target data to the second terminal, so as to improve target data security and interaction efficiency.
本发明的另一目的在于提供一种线上筹资方法,在发布需要筹集资金的目标项目时对其进行审核并在审核通过时增加保险信息,从而降低投资方的资金风险,并促进了项目筹资进度。Another object of the present invention is to provide an online fundraising method for reviewing a target project that needs to raise funds and increasing insurance information when the audit is approved, thereby reducing the capital risk of the investor and facilitating project financing. schedule.
本发明提供了一种线上筹资方法,包括:第一服务器接收第一终端发送的针对目标项目的筹资请求,并将所述筹资请求发送至第二终端;其中,所述筹资请求包括所述目标项目的描述信息和所需筹集的资金额度,还包括保险信息;所述保险信息为第二服务器审核所述目标项目符合所述第二服务器的保障范围时生成。The present invention provides an online fundraising method, including: receiving, by a first server, a funding request for a target item sent by a first terminal, and transmitting the funding request to a second terminal; wherein the funding request includes the The description information of the target item and the amount of funds to be raised further include insurance information; and the insurance information is generated when the second server verifies that the target item meets the coverage of the second server.
以上的线上资金筹集方法,由第二服务器预先对筹资项目进行审核并在符合第二服务器的保障范围时为该筹资项目增加相应的保险信息,第一服务器将包含该保险信息的筹资请求发布出去,从而在项目筹资时引入保险机构(第二服务器)进行评估和担保,为其他跟投人(第二终端)提供投资风险保障,并促进项目筹资进度。 In the above online fund raising method, the second server pre-verifies the fundraising project and adds corresponding insurance information to the fundraising project when the second server is covered, and the first server issues a financing request including the insurance information. Go out, so that when the project is funded, the insurance institution (second server) is introduced for evaluation and guarantee, and other investment investors (second terminal) are provided with investment risk protection, and the project financing progress is promoted.
【附图说明】 [Description of the Drawings]
图1是本发明第一实施方式中的一种获取目标数据的处理方法的流程图1 is a flowchart of a method for processing acquisition target data in a first embodiment of the present invention;
图2是本发明第二实施方式中的一种获取目标数据的处理方法的流程示意图;2 is a schematic flowchart of a method for processing target data in a second embodiment of the present invention;
图3是本发明第三实施方式中的一种获取目标数据的处理方法的流程示意图;3 is a schematic flowchart of a method for processing target data in a third embodiment of the present invention;
图4是本发明实施方式中的获取目标数据的处理关系示意图;4 is a schematic diagram showing a processing relationship of acquiring target data in an embodiment of the present invention;
图5是本发明第四实施方式中的一种获取目标数据的处理方法的流程示意图;FIG. 5 is a schematic flowchart of a method for processing target data according to a fourth embodiment of the present invention; FIG.
图6是本发明实施方式中的一种服务器的结构示意图;6 is a schematic structural diagram of a server in an embodiment of the present invention;
图7是本发明实施方式中的一种终端设备的结构示意图;7 is a schematic structural diagram of a terminal device according to an embodiment of the present invention;
图8是本发明第一实施方式中的一种线上筹资方法的流程示意图;8 is a schematic flow chart of an online fundraising method in a first embodiment of the present invention;
图9是本发明第二实施方式中的一种线上筹资方法的流程示意图;9 is a schematic flow chart of an online fundraising method in a second embodiment of the present invention;
图10是本发明第三实施方式中的一种线上筹资方法的流程示意图;10 is a schematic flow chart of an online fundraising method in a third embodiment of the present invention;
图11是本发明实施方式中的资金筹集关系示意图。11 is a schematic diagram of a fund raising relationship in an embodiment of the present invention.
【具体实施方式】【detailed description】
下面将结合本发明实施方式中的附图,对本发明实施方式中的技术方案进行清楚、完整地描述,显然,所描述的实施方式仅仅是本发明一部分实施方式,而不是全部的实施方式。基于本发明中的实施方式,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施方式,均属于本发明保护的范围。The technical solutions in the embodiments of the present invention are clearly and completely described in the following with reference to the accompanying drawings in the embodiments of the present invention. It is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all embodiments. All other embodiments obtained by those skilled in the art based on the embodiments of the present invention without creative efforts are within the scope of the present invention.
请参阅图1,为本发明第一实施方式中的获取目标数据的处理方法的流程示意图,该实施方式示出的方法流程包括:1 is a schematic flowchart of a method for processing target data in a first embodiment of the present invention. The method flow shown in the implementation manner includes:
步骤S10,第一服务器接收第一终端发送的获取目标数据的交互请求,并将该交互请求发送至第二终端。Step S10: The first server receives an interaction request for acquiring target data sent by the first terminal, and sends the interaction request to the second terminal.
其中,该交互请求包含目标数据的描述信息、数据值以及保障信息。该保障信息为第二服务器检测该目标数据符合第二服务器的保障范围时生成的。The interaction request includes description information, data values, and security information of the target data. The guarantee information is generated when the second server detects that the target data meets the coverage range of the second server.
以上方案中,由第二服务器预先对目标数据进行检测并在检测符合第二服务器的保障范围时生成相应的保障信息,第一服务器将包含该保障信息的交互请求发送至第二终端,实现第一、二终端之间目标数据的交互,为第二终端提供目标数据前提供安全担保,以提高目标数据安全性和交互效率。In the above solution, the second server detects the target data in advance and generates corresponding security information when detecting the coverage of the second server, and the first server sends an interaction request including the security information to the second terminal to implement the first The interaction of the target data between the first and second terminals provides a security guarantee for the second terminal to provide target data to improve the security and interaction efficiency of the target data.
请参阅图2,为本发明第二实施方式中的获取目标数据的处理方法的流程示意图,该实施方式示出的方法流程包括:2 is a schematic flowchart of a method for processing target data in a second embodiment of the present invention. The method flow shown in the implementation manner includes:
步骤S20,第一终端向第一服务器发送获取目标数据的交互请求。Step S20: The first terminal sends an interaction request for acquiring target data to the first server.
其中,该交互请求包含该目标数据的描述信息和数据值,还包含保障信息,该保障信息为第二服务器检测该目标数据符合该第二服务器的保障范围时生成的。该请求还可以包括预定时间,该预定时间为获取该目标数据的时间期限。The interaction request includes the description information and the data value of the target data, and the security information is generated when the second server detects that the target data meets the coverage range of the second server. The request may also include a predetermined time, which is a time period for obtaining the target data.
该目标数据的描述信息可以是该目标数据的用途。The description information of the target data may be the purpose of the target data.
具体地,该第一终端登陆并访问第一服务器,并发送获取目标数据的交互请求。Specifically, the first terminal logs in and accesses the first server, and sends an interaction request for acquiring target data.
步骤S21,该第一服务器根据该交互请求获得所代表的数据值与目标数据的数据值相等的第一数据凭证,并且将第一数据凭证发送至第二终端。其中,第一数据凭证包含该交互请求的信息。Step S21: The first server obtains, according to the interaction request, a first data credential whose data value is equal to the data value of the target data, and sends the first data credential to the second terminal. The first data voucher includes information of the interaction request.
以上方案中,在发出交互请求获取目标数据时,由第二服务器对目标数据进行检测并在检测通过时生成保障信息,并且以具有该保障信息的第一数据凭证的形式发布目标数据。从而,为第二终端提供所请求的数据前提供保障审核机制,具有转移数据安全风险的作用。In the above solution, when the interaction request acquisition target data is issued, the target data is detected by the second server and the security information is generated when the detection passes, and the target data is released in the form of the first data certificate having the security information. Therefore, providing a security audit mechanism before providing the requested data to the second terminal has the function of transferring data security risks.
请参阅图3,为本发明第三实施方式中的获取目标数据的处理方法的流程示意图。该实施方式示出的方法流程包括:Please refer to FIG. 3 , which is a schematic flowchart diagram of a method for processing target data in a third embodiment of the present invention. The method flow shown in this embodiment includes:
步骤S30,第一终端向第一服务器发起获取目标数据的交互请求。Step S30: The first terminal initiates an interaction request for acquiring target data to the first server.
其中,该交互请求包含该目标数据的描述信息和数据值,还包含保障信息,该保障信息为第二服务器检测该目标数据符合该第二服务器的保障范围时生成的。The interaction request includes the description information and the data value of the target data, and the security information is generated when the second server detects that the target data meets the coverage range of the second server.
具体地,该第一终端登陆并访问第一服务器,并发送获取目标数据的交互请求。Specifically, the first terminal logs in and accesses the first server, and sends an interaction request for acquiring target data.
步骤S31,该第一服务器根据该交互请求获得所代表的数据值与目标数据的数据值相等的第一数据凭证,并且将第一数据凭证发送至第二终端。其中,第一数据凭证包含该交互请求的信息。Step S31: The first server obtains a first data credential whose data value is equal to the data value of the target data according to the interaction request, and sends the first data credential to the second terminal. The first data voucher includes information of the interaction request.
在一实施方式中,第一服务器在第二服务器检测目标数据符合该第二服务器的保障范围而生成保障信息时,生成具有该保障信息的第一数据凭证。该第二服务器对目标数据进行检测,并在确定检测符合保障范围时在目标数据中增加该保障信息,并且在第一服务器生成的第一数据凭证中仍然保留该保障信息。该保障信息可以包括目标数据的备份信息、第二服务器的身份标识信息等。In an embodiment, the first server generates the first data credential having the guarantee information when the second server detects that the target data meets the guarantee range of the second server to generate the guarantee information. The second server detects the target data, and adds the guarantee information to the target data when it is determined that the detection meets the coverage, and the guarantee information is still retained in the first data certificate generated by the first server. The guarantee information may include backup information of the target data, identity information of the second server, and the like.
在另一实施方式中,第一服务器根据该交互请求从第二服务器中获得第一数据凭证。其中,该第一数据凭证由第二服务器对目标数据检测符合第二服务器的保障范围时生成,该交互请求至少包括第一数据凭证在第二服务器中的存储地址。具体地,该第一终端向第一服务器发送的交互请求为第一数据凭证的链接地址(即,存储地址),该链接地址包含指向第一数据凭证的URL地址,还可以包含目标数据的信息,如,数据发起人信息、目标数据的基本信息(如,数据属性、格式等)。In another embodiment, the first server obtains the first data credential from the second server according to the interaction request. The first data credential is generated when the second server detects that the target data meets the guarantee range of the second server, and the interaction request includes at least the storage address of the first data credential in the second server. Specifically, the interaction request sent by the first terminal to the first server is a link address (ie, a storage address) of the first data credential, where the link address includes a URL address that points to the first data credential, and may also include information of the target data. For example, data initiator information, basic information of target data (eg, data attributes, formats, etc.).
步骤S32,该第二终端接收第一服务器发送的第一数据凭证,并向第三服务器发送第一数据。Step S32: The second terminal receives the first data credential sent by the first server, and sends the first data to the third server.
在步骤S32中,至少有一个第二终端通过网络与第一服务器通信连接,该第一服务器将第一数据凭证通过网络发布至各个第二终端。In step S32, at least one second terminal communicates with the first server through a network, and the first server issues the first data credential to each second terminal through the network.
具体地,该第二终端从其保存的数据中选择第一数据,并将其发送至第一终端。该第一数据的数据值大小可以大于目标数据的数据值大小,也可以小于目标数据的数据值大小。Specifically, the second terminal selects the first data from the data it saves and sends it to the first terminal. The data value of the first data may be larger than the data value of the target data, or may be smaller than the data value of the target data.
步骤S33,该第三服务器在预定时间内接收到的由第二终端发送的所有数据的数据值大小总和不小于目标数据的数据值大小时,将接收到的数据发送至第一终端。Step S33: When the sum of the data value values of all the data sent by the second terminal received by the third terminal within a predetermined time is not less than the data value size of the target data, the received data is sent to the first terminal.
以上方案中,第一服务器根据第一终端发起的获取目标数据的交互请求获取第一数据凭证,每个第二终端向第三服务器发送第一数据,当第三服务器在预定时间内接收到的由第二终端发送的所有数据的数据值大小总和不小于目标数据的数据值大小时,将接收到的数据发送至第一终端,使第一终端获得不小于目标数据数据值大小的数据。在进行目标数据交互之前,由第二服务器对目标数据进行检测和增加保障,并预先将目标数据预先划分成多个部分并分别保存在不同的第二终端内,这样就降低了目标数据本身的安全风险,并且在目标数据进行交互的过程中,其权限或权属得到风险保障。In the above solution, the first server acquires the first data credential according to the interaction request of the acquiring target data initiated by the first terminal, and each second terminal sends the first data to the third server, when the third server receives the data within the predetermined time. When the sum of the data value sizes of all the data transmitted by the second terminal is not less than the data value size of the target data, the received data is sent to the first terminal, so that the first terminal obtains data that is not smaller than the target data data value. Before the target data interaction, the second server detects and increases the target data, and pre-divids the target data into multiple parts and stores them in different second terminals, thus reducing the target data itself. Security risks, and in the process of interaction of the target data, its authority or ownership is protected by risks.
请参阅图5,为本发明第四实施方式中的获取目标数据的处理方法的流程示意图,请同时参阅图4所示的数据交互关系示意图。该实施方式示出的方法流程包括:5 is a schematic flowchart of a method for processing target data in a fourth embodiment of the present invention. Please refer to the data interaction relationship shown in FIG. 4 at the same time. The method flow shown in this embodiment includes:
步骤S40,第一终端向第一服务器发送获取目标数据的交互请求。Step S40: The first terminal sends an interaction request for acquiring target data to the first server.
其中,该交互请求包含所述目标数据的描述信息和数据值,还包含保障信息,所述保障信息为第二服务器检测所述目标数据符合所述第二服务器的保障范围时生成的。The interaction request includes the description information and the data value of the target data, and the security information is generated when the second server detects that the target data meets the coverage range of the second server.
步骤S41,该第一服务器根据该交互请求获得所代表的数据值与目标数据的数据值相等的第一数据凭证,并且将第一数据凭证发送至第二终端。其中,第一数据凭证包含该交互请求的信息。Step S41: The first server obtains, according to the interaction request, a first data credential whose data value is equal to the data value of the target data, and sends the first data credential to the second terminal. The first data voucher includes information of the interaction request.
步骤S42,该第二终端接收该第一服务器发送的第一数据凭证,并向第一终端发送第二数据凭证。其中,该第二数据凭证为该第三服务器根据该第二终端的请求锁定该第二终端中的第一数据而生成的。Step S42, the second terminal receives the first data credential sent by the first server, and sends the second data credential to the first terminal. The second data credential is generated by the third server locking the first data in the second terminal according to the request of the second terminal.
步骤S43,判断该第一终端在预定时间内接收到的由第二终端发送的所有第二数据凭证所代表的数据值大小总和是否不小于目标数据的数据值大小,若是,则进入步骤S44,否则,进入步骤S47。Step S43, determining whether the sum of the data values represented by all the second data vouchers sent by the second terminal received by the first terminal within a predetermined time is not less than the data value of the target data, and if yes, proceeding to step S44. Otherwise, it proceeds to step S47.
步骤S44,该第一终端向第三服务器发送数据交互指令。Step S44, the first terminal sends a data interaction instruction to the third server.
步骤S45,该第三服务器接收该数据交互指令,并响应该数据交互指令将第二终端中被锁定的数据发送至第四服务器。Step S45, the third server receives the data interaction instruction, and sends the locked data in the second terminal to the fourth server in response to the data interaction instruction.
步骤S46,该第四服务器将接收到的数据发送至第一终端,使第一终端获取该目标数据。然后,流程结束。Step S46: The fourth server sends the received data to the first terminal, so that the first terminal acquires the target data. Then the process ends.
进一步地,该第三服务器还可以响应该数据交互指令将第二终端中被锁定的数据直接发送至第一终端,使第一终端获取目标数据。Further, the third server may further send the locked data in the second terminal to the first terminal in response to the data interaction instruction, so that the first terminal acquires the target data.
步骤S47,该第一终端向第三服务器发送目标数据请求失败的指令。Step S47, the first terminal sends an instruction that the target data request fails to the third server.
步骤S48,该第三服务器响应该指令根据第二数据凭证解锁对应的第二终端中被锁定的数据。然后,流程结束。Step S48, the third server, in response to the instruction, unlocks the locked data in the corresponding second terminal according to the second data credential. Then the process ends.
以上方案,在第二服务器对第一终端所需获取的目标数据进行检测和添加保障信息后,第一服务器根据交互请求获取第一数据凭证,然后再发送给多个第二终端。第二终端接收该第一数据凭证,并在确认响应该第一数据凭证的交互请求时相应地向通过第三服务器向第一终端发送代表第一数据数据值的第二数据凭证,使第一终端在预定时间内能够收集到足够的第二数据凭证。其中,该第二数据凭证为该第三服务器根据该第二终端的请求锁定该第二终端中的第一数据而生成的,在预定时间内第一终端获得足够的第二数据凭证时,由第三服务器将第二终端被锁的数据直接或间接发送至第一终端,使其最终获得该目标数据。在进行目标数据交互之前,由第二服务器对目标数据进行检测和增加保障信息,并预先将目标数据预先划分成多个部分并分别保存在不同的第二终端内,并以具有该保障信息的第一数据凭证的形式发布所需获取的目标数据请求。这样,为其他终端提供所请求的数据前进行审核,具有数据安全保障。同时,第二终端以第二数据凭证的形式发送相应的数据,能够降低在数据交互过程中被非法篡改、丢失或被其他终端窃取截获的风险,使得在数据交互过程中对目标数据的存储和传送进行完整、全面地保护。In the above solution, after the second server detects the target data acquired by the first terminal and adds the security information, the first server acquires the first data certificate according to the interaction request, and then sends the data to the plurality of second terminals. Receiving, by the second terminal, the first data credential, and correspondingly sending a second data credential representing the first data data value to the first terminal by using the third server, when confirming the interaction request in response to the first data credential, so that the first The terminal can collect enough second data credentials within a predetermined time. The second data credential is generated by the third server locking the first data in the second terminal according to the request of the second terminal, and when the first terminal obtains sufficient second data credential within a predetermined time, The third server directly or indirectly transmits the data locked by the second terminal to the first terminal, so that the target data is finally obtained. Before the target data interaction is performed, the second server detects the target data and adds the guarantee information, and pre-divides the target data into a plurality of parts and stores them in different second terminals respectively, and has the protection information. The target data request to be acquired is issued in the form of the first data voucher. In this way, the other terminals are provided with the requested data for review before they have data security. At the same time, the second terminal sends the corresponding data in the form of the second data credential, which can reduce the risk of being illegally tampered with, lost or intercepted by other terminals during the data interaction process, so that the target data is stored during the data interaction process. The transmission is fully and comprehensively protected.
下面对本发明实施方式中的获取目标数据的处理方法进行举例说明。The method for processing the acquisition target data in the embodiment of the present invention is exemplified below.
例如,该第一终端为终端A,该第二终端为终端B1、终端B2和终端B3。目标数据位客户端D的开机密码,其被预先划分成三个部分。终端B1、终端B2和终端B3各自保存上述开机密码的其中一部分数据,且只有当三个部分的数据集合在一起并按照正确的顺序排列,所形成的数据才能够用于开启客户端D。其中,终端A、B1、B2、B3以及客户端D可以是个人计算机、平板电脑、智能手机等能够通过网络与服务器进行数据交互传输的设备。For example, the first terminal is terminal A, and the second terminal is terminal B1, terminal B2, and terminal B3. The target data bit client D's power-on password, which is pre-divided into three parts. The terminal B1, the terminal B2, and the terminal B3 each hold a part of the data of the above-mentioned power-on password, and the formed data can be used to open the client D only when the data of the three parts are grouped together and arranged in the correct order. The terminals A, B1, B2, and B3 and the client D may be devices that can exchange data with the server through a network, such as a personal computer, a tablet, or a smart phone.
终端A通过第一服务器发起需要获取目标数据(客户端D的开机密码)的交互请求,第二服务器对目标数据进行检测并增加保障信息,以生成三个第一数据凭证,即,第一数据凭证a、第一数据凭证b和第一数据凭证c。该第二服务器对目标数据进行检测包括对目标数据的信息(如格式、描述信息、安全级别等)进行检测,还可以包括对获取目标数据的终端A(如权限级别)进行检测。The terminal A initiates an interaction request for acquiring the target data (the power-on password of the client D) through the first server, and the second server detects the target data and adds the guarantee information to generate three first data credentials, that is, the first data. Credential a, first data voucher b, and first data voucher c. The detecting, by the second server, the target data includes detecting information (such as format, description information, security level, and the like) of the target data, and may further include detecting the terminal A (such as the privilege level) that acquires the target data.
这样设置的原因在于,通过第二服务器对目标数据或终端A进行检测以保障在传输目标数据之前判断该目标数据是否允许被交互或者终端A是否具有使用目标数据的资格,以保证数据的安全性,并为终端B1、B2、B3提供各自保存的部分数据提供安全依据。The reason for this setting is that the target data or the terminal A is detected by the second server to ensure whether the target data is allowed to be exchanged or whether the terminal A has the qualification to use the target data before the transmission of the target data, so as to ensure the security of the data. And provide a security basis for the terminals B1, B2, and B3 to provide respective saved partial data.
其中,该终端A预先知道客户端D的开机密码被划分成三个部分,因此发送的请求包括第一数据凭证的数量以及终端A的权限级别。该第二服务器生成的三个第一数据凭证中均包含该终端A的权限级别,同时每个第一数据凭证还代表所需获取的目标数据对应部分的数据。例如,第一数据凭证a代表所需获取的开机密码的第一部分数据,第一数据凭证b代表所需获取的开机密码的第二部分数据,第一数据凭证c代表所需获取的开机密码的第三部分数据。The terminal A knows in advance that the power-on password of the client D is divided into three parts, so the request sent includes the number of the first data certificate and the authority level of the terminal A. Each of the three first data credentials generated by the second server includes the permission level of the terminal A, and each of the first data credentials further represents data of the corresponding portion of the target data that needs to be acquired. For example, the first data voucher a represents the first part of the data of the power-on password that needs to be obtained, the first data voucher b represents the second part of the data of the power-on password that needs to be acquired, and the first data voucher c represents the power-on password that needs to be obtained. The third part of the data.
然后,第一服务器将第一数据凭证分别发送至终端B1、终端B2和终端B3,使这三个终端根据其保存的数据从接收到的三个第一数据凭证选择匹配的第一数据凭证,并将第二数据凭证发送至终端A。现在以终端B1为例进行说明,终端B1保存了开机密码的第二部分数据,则选择代表该第二部分数据的第一数据凭证b。并且,终端B1发送的第二数据凭证为第三服务器锁定其保存的第二部分数据而生成的电子凭证,该第三服务器为管理终端B1、B2和B3的上位机。其中,该第二数据凭证为代表被锁定的第二部分数据的信息,并不是第二部分数据本身,上面提到的信息可以是预定的符号、图片等。当然,在其他实施方式中,终端B1也可以直接将第二部分数据发送至终端A。Then, the first server sends the first data voucher to the terminal B1, the terminal B2, and the terminal B3, respectively, so that the three terminals select the matching first data voucher from the received three first data voucher according to the saved data. And sending the second data certificate to terminal A. Now, taking terminal B1 as an example for description, terminal B1 saves the second part of data of the power-on password, and then selects the first data certificate b representing the second part of data. Moreover, the second data credential sent by the terminal B1 is an electronic credential generated by the third server locking the second part of the data saved by the third server, and the third server is the upper computer of the management terminals B1, B2 and B3. The second data voucher is information representing the second part of the data that is locked, and is not the second part of the data itself. The information mentioned above may be a predetermined symbol, a picture, or the like. Of course, in other embodiments, the terminal B1 may also directly send the second part of data to the terminal A.
进一步地,终端A在预定时间内接收到了组成客户端D的开机密码的全部第二数据凭证,然后请求第三服务器将其锁定的数据发送至终端A。Further, the terminal A receives all the second data credentials constituting the power-on password of the client D within a predetermined time, and then requests the third server to send the data locked by the third server to the terminal A.
进一步地,该目标数据还可以是文字数据、音频数据、视频数据、程序数据或金融领域的资金数据等,如果是资金数据,比如资金,则此时第一终端是资金筹集方,数据发送方是投资方,第一服务器为筹集资金的发布平台,第二、三、四服务器为资金管理服务器,例如,银行。如果是音频数据,比如歌曲,此时数据发起方和数据发送方可以是手机等具有多媒体播放功能的客户端,第一服务器为音乐搜索平台,第二、三、四服务器为音乐网站服务器。Further, the target data may also be text data, audio data, video data, program data or financial data in the financial field. If it is capital data, such as funds, then the first terminal is the fundraiser, and the data sender It is the investor, the first server is the publishing platform for raising funds, and the second, third and fourth servers are fund management servers, for example, banks. If it is audio data, such as a song, the data originator and the data sender may be a client having a multimedia playing function, such as a mobile phone, the first server is a music search platform, and the second, third, and fourth servers are music website servers.
请参阅图6,为本发明实施方式的服务器的结构示意图,该实施方式示出的服务器50包括接收模块51、交互请求发送模块52。FIG. 6 is a schematic structural diagram of a server according to an embodiment of the present invention. The server 50 shown in this embodiment includes a receiving module 51 and an interaction request sending module 52.
该接收模块51用于接收第一终端发起的获取目标数据的交互请求。其中,该交互请求包含该目标数据的描述信息和数据值,还包含保障信息,该保障信息为第二服务器检测该目标数据符合该第二服务器的保障范围时生成的。The receiving module 51 is configured to receive an interaction request for acquiring target data initiated by the first terminal. The interaction request includes the description information and the data value of the target data, and the security information is generated when the second server detects that the target data meets the coverage range of the second server.
该交互请求发送模块52用于将该交互请求发送至第二终端。The interaction request sending module 52 is configured to send the interaction request to the second terminal.
在一实施方式中,服务器50还包括第一数据凭证获取模块53和第一数据凭证发送模块54,其中,该第一数据凭证获取模块53在第二服务器检测目标数据符合保障范围并增加保障信息时,根据该交互请求生成第一数据凭证。该第一数据凭证发送模块54用于将第一数据凭证发送至第二终端。In an embodiment, the server 50 further includes a first data credential obtaining module 53 and a first data credential sending module 54, wherein the first data credential obtaining module 53 detects that the target data meets the guarantee range and increases the securing information at the second server. The first data credential is generated according to the interaction request. The first data credential sending module 54 is configured to send the first data credential to the second terminal.
在另一实施方式中,服务器50还包括第一数据凭证获取模块53和第一数据凭证发送模块54,其中,该第一数据凭证获取模块53根据该交互请求从第二服务器中获得第一数据凭证。其中,该第一数据凭证由第二服务器对目标数据检测符合保障范围时生成,该请求至少包括每个第一数据凭证在第二服务器中的存储地址。具体地,该第一数据凭证由第一终端预先生成并存储在第二服务器中,该第一终端向第一服务器发送的请求为第一数据凭证的链接地址(即,存储地址),该链接地址包含指向对应第一数据凭证的URL地址,还可以包含目标数据的信息,如,数据发起人信息、目标数据的基本信息(如,数据属性、格式等)。该第一数据凭证发送模块54用于将第一数据凭证发送至第二终端。In another embodiment, the server 50 further includes a first data credential obtaining module 53 and a first data credential sending module 54, wherein the first data credential obtaining module 53 obtains the first data from the second server according to the interaction request. certificate. The first data credential is generated when the second server detects that the target data meets the guarantee range, and the request includes at least a storage address of each first data credential in the second server. Specifically, the first data credential is pre-generated by the first terminal and stored in the second server, and the request sent by the first terminal to the first server is a link address (ie, a storage address) of the first data credential, and the link is The address includes a URL address corresponding to the first data voucher, and may also include information of the target data, such as data originator information, basic information of the target data (eg, data attributes, format, etc.). The first data credential sending module 54 is configured to send the first data credential to the second terminal.
请参阅图7,为本发明实施方式中的终端设备的结构示意图,该实施方式中的终端设备60为服务器。该终端设备60包括接收器61、处理器62、发送器63、只读存储器64、随机存取存储器65以及总线66。FIG. 7 is a schematic structural diagram of a terminal device according to an embodiment of the present invention. The terminal device 60 in this embodiment is a server. The terminal device 60 includes a receiver 61, a processor 62, a transmitter 63, a read only memory 64, a random access memory 65, and a bus 66.
该接收器61用于接收数据。The receiver 61 is for receiving data.
该处理器62控制终端设备60的操作,该处理器62还可以成为CPU(Central Processing Unit,中央处理单元)。该处理器62可能是一种集成电路芯片,具有信号的处理能力。处理器62还可以是通用处理器、数字信号处理器(DSP)、专用集成电路(ASIC)、现成可编程门阵列(FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。The processor 62 controls the operation of the terminal device 60, and the processor 62 can also become a CPU (Central Processing Unit, central processing unit). The processor 62 may be an integrated circuit chip with signal processing capabilities. Processor 62 can also be a general purpose processor, digital signal processor (DSP), application specific integrated circuit (ASIC), off-the-shelf programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic device, discrete hardware component . The general purpose processor may be a microprocessor or the processor or any conventional processor or the like.
该发送器63用于发送数据。The transmitter 63 is for transmitting data.
存储器可以包括只读存储器64和随机存取存储器65,并向处理器62提供指令和数据。存储器的一部分还可以包括非易失性随机存取存储器(NVRAM)。The memory can include read only memory 64 and random access memory 65 and provide instructions and data to processor 62. A portion of the memory may also include non-volatile random access memory (NVRAM).
终端设备60的各个组件通过总线66耦合在一起,其中,总线66除包括数据总线之外,还可以包括电源总线、控制总线和状态信号总线等。但是为了清楚说明起见,在图中将各种总线都标为总线66。The various components of the terminal device 60 are coupled together by a bus 66. The bus 66 may include, in addition to the data bus, a power bus, a control bus, a status signal bus, and the like. However, for clarity of description, various buses are labeled as bus 66 in the figure.
存储器存储了如下的元素,可执行模块或者数据结构,或者它们的子集,或者它们的扩展集:The memory stores the following elements, executable modules or data structures, or a subset of them, or their extended set:
操作指令:包括各种操作指令,用于实现各种操作。Operation instructions: include various operation instructions for implementing various operations.
操作系统:包括各种系统程序,用于实现各种基础业务以及处理基于硬件的任务。Operating system: Includes a variety of system programs for implementing various basic services and handling hardware-based tasks.
在本发明实施例中,处理器62通过调用存储器存储的操作指令(该操作指令可存储在操作系统中),执行如下操作:In the embodiment of the present invention, the processor 62 performs the following operations by calling an operation instruction stored in the memory, which can be stored in the operating system:
接收第一终端发送的获取目标数据的交互请求,其中,该交互请求包含目标数据的描述信息和数据值,还包含保障信息,该保障信息为第二服务器检测目标数据符合该第二服务器的保障范围时生成的。以及Receiving an interaction request for acquiring target data sent by the first terminal, where the interaction request includes description information and data values of the target data, and further includes protection information, where the protection information is that the second server detects that the target data meets the protection of the second server. The range is generated. as well as
将该交互请求发送至第二终端。The interaction request is sent to the second terminal.
可选地,该处理器62在第二服务器检测目标数据符合保障范围并增加保障信息时,根据该交互请求生成第一数据凭证。Optionally, the processor 62 generates the first data credential according to the interaction request when the second server detects that the target data meets the guarantee range and increases the guarantee information.
可选地,该处理器62根据该交互请求从第二服务器中获得第一数据凭证。其中,该第一数据凭证由第二服务器对目标数据检测符合保障范围时生成,该请求至少包括每个第一数据凭证在第二服务器中的存储地址。具体地,该第一数据凭证由第一终端预先生成并存储在第二服务器中,该第一终端向终端设备60发送的请求为第一数据凭证的链接地址(即,存储地址),该链接地址包含指向对应第一数据凭证的URL地址,还可以包含目标数据的信息,如,数据发起人信息、目标数据的基本信息(如,数据属性、格式等)。Optionally, the processor 62 obtains the first data credential from the second server according to the interaction request. The first data credential is generated when the second server detects that the target data meets the guarantee range, and the request includes at least a storage address of each first data credential in the second server. Specifically, the first data credential is pre-generated by the first terminal and stored in the second server, and the request sent by the first terminal to the terminal device 60 is a link address (ie, a storage address) of the first data credential, and the link is The address includes a URL address corresponding to the first data voucher, and may also include information of the target data, such as data originator information, basic information of the target data (eg, data attributes, format, etc.).
请参阅图8,为本发明第一实施方式中的线上筹资方法的流程示意图,该实施方式示出的方法流程包括:FIG. 8 is a schematic flowchart diagram of an online fundraising method according to a first embodiment of the present invention. The method flow shown in the implementation manner includes:
步骤S70,第一服务器接收第一终端发送的针对目标项目的筹资请求,并将该筹资请求发送至第二终端。Step S70: The first server receives the fundraising request for the target item sent by the first terminal, and sends the fundraising request to the second terminal.
其中,该筹资请求包括该目标项目的描述信息和所需筹集的资金额度,还包括保险信息,该保险信息为第二服务器审核该目标项目符合该第二服务器的保障范围时生成。The financing request includes description information of the target item and the amount of funds to be raised, and insurance information, which is generated when the second server audits that the target item meets the coverage of the second server.
以上方案中,由第二服务器预先对筹资项目进行审核并在符合第二服务器的保障范围时为该筹资项目增加相应的保险信息,第一服务器将包含该保险信息的筹资请求发布出去,从而在项目筹资时引入保险机构(第二服务器)进行评估和担保,为其他跟投人(第二终端)提供投资风险保障,并促进项目筹资进度。In the above solution, the second server pre-follows the fundraising project and adds corresponding insurance information to the fundraising project when the scope of the second server is met, and the first server issues the financing request including the insurance information, thereby When the project is funded, the insurance institution (second server) is introduced for evaluation and guarantee, and other investment investors (second terminal) are provided with investment risk protection, and the project financing progress is promoted.
请参阅图9,为本发明第二实施方式中的线上筹资方法的流程示意图,该实施方式示出的方法流程包括:FIG. 9 is a schematic flowchart of an online financing method according to a second embodiment of the present invention. The method flow shown in the implementation manner includes:
步骤S80,第一终端向第一服务器发送针对目标项目的筹资请求。Step S80: The first terminal sends a fundraising request for the target item to the first server.
其中,该筹资请求包括该目标项目的描述信息和所需筹集的资金额度,还包括保险信息;该保险信息为第二服务器审核该目标项目符合该第二服务器的保障范围时生成。The financing request includes description information of the target item and a fund amount to be raised, and insurance information; the insurance information is generated when the second server verifies that the target item meets the coverage of the second server.
步骤S81,该第一服务器根据该筹资请求获得代表的资金额度与目标项目所需筹集的资金额度相等的第一电子凭证,并将该多个第一电子凭证发送至第二终端。其中,第一电子凭证包含该交互请求的信息。Step S81: The first server obtains, according to the fundraising request, a first electronic voucher whose representative fund amount is equal to the amount of funds required to be raised by the target item, and sends the plurality of first electronic voucher to the second terminal. The first electronic voucher includes information of the interaction request.
在本实施方式中,该第一电子凭证为物信证,为至少包括筹资额度、目标资金额度以及预设时间的电子单证。In this embodiment, the first electronic voucher is a physical evidence, and is an electronic document including at least a fundraising amount, a target fund amount, and a preset time.
以上方案,第一服务器根据第一终端发送的针对目标项目的筹资请求获取对应的第一电子凭证。采用电子凭证的方式发布筹资项目时,引入保险公司(第二服务器)对发起的项目进行审核和保险,从而为其他跟投人(第二终端)提供投资信心和投资风险的保障。In the above solution, the first server acquires the corresponding first electronic voucher according to the fundraising request for the target item sent by the first terminal. When the financing project is issued by means of electronic voucher, the insurance company (second server) is introduced to audit and insure the initiated project, thereby providing investment confidence and investment risk protection for other investors (second terminal).
请同时参阅图10,为本发明第三实施方式中的一种线上筹资方法的流程示意图,请同时参阅图11所述的资金筹集关系示意图。该实施方式示出的方法流程包括:Please refer to FIG. 10, which is a schematic flowchart of an online fundraising method according to a third embodiment of the present invention. Please refer to FIG. 11 for a schematic diagram of the fund raising relationship. The method flow shown in this embodiment includes:
步骤S90,第一终端向第一服务器发送针对目标项目的筹资请求。Step S90: The first terminal sends a fundraising request for the target item to the first server.
其中,该筹资请求包括该目标项目的描述信息和所需筹集的资金额度,还包括保险信息;该保险信息为第二服务器审核该目标项目符合该第二服务器的保障范围时生成。The financing request includes description information of the target item and a fund amount to be raised, and insurance information; the insurance information is generated when the second server verifies that the target item meets the coverage of the second server.
步骤S91,该第一服务器根据该筹资请求获得代表的资金额度与目标项目所需筹集的资金的额度相等的第一电子凭证,并将该第一电子凭证发送至第二终端。其中,第一电子凭证包含该交互请求的信息。Step S91: The first server obtains, according to the fundraising request, a first electronic voucher whose representative fund amount is equal to the amount of funds required to be raised by the target item, and sends the first electronic voucher to the second terminal. The first electronic voucher includes information of the interaction request.
在本实施方式中,该第一电子凭证为物信证,为至少包括筹资额度、目标资金额度以及预设时间的电子单证。In this embodiment, the first electronic voucher is a physical evidence, and is an electronic document including at least a fundraising amount, a target fund amount, and a preset time.
在一实施方式中,第一服务器在第二服务器检测目标项目符合保障范围而生成保险信息时,生成具有该保险信息的第一电子凭证。该第二服务器对目标项目进行审核,并在确定审核通过时确定投保费用、理赔额度等担保信息,并在该目标项目中增加该保险信息,在第一服务器生成的第一电子凭证中仍然保留该保险信息。In an embodiment, the first server generates the first electronic voucher having the insurance information when the second server detects that the target item meets the coverage and generates the insurance information. The second server reviews the target item, and determines the insurance information such as the insurance premium and the claim amount when determining the approval, and adds the insurance information to the target item, and remains in the first electronic certificate generated by the first server. The insurance information.
在另一实施方式中,第一服务器根据该筹资请求从第二服务器中获得第一电子凭证。其中,该第一数据凭证由第二服务器对目标项目审核通过时生成,该请求至少包括每个第一电子凭证在第二服务器中的存储地址。In another embodiment, the first server obtains the first electronic credential from the second server according to the funding request. The first data credential is generated when the second server verifies the target item, and the request includes at least a storage address of each first electronic credential in the second server.
当检测通过时为第一电子凭证增加的标识信息为该人士的签名或该机构的签章等,从而在向第二终端用户筹集资金时提高该目标项目的权威性、可信性,降低筹资的难度。When the detection is passed, the identification information added for the first electronic voucher is the signature of the person or the signature of the institution, etc., thereby improving the authority and credibility of the target item and reducing the financing when raising funds to the second end user. Difficulty.
以上方案中,第二服务器可以是保险公司管理服务器,通过加载有保险公司审核插件的物信证生成器将众筹项目生成物信证。其中,保险公司会对众筹项目进行审核,并确定投保费用、理赔额度等。In the above solution, the second server may be an insurance company management server, and the crowdfunding project generator is credified by the material certificate generator loaded with the insurance company audit plugin. Among them, the insurance company will review the crowdfunding project and determine the insurance premium and the amount of claims.
步骤S92,该第二终端接收第一服务器发送第一电子凭证,并向第三服务器发送一定额度的资金。Step S92, the second terminal receives the first server to send the first electronic voucher, and sends a certain amount of funds to the third server.
步骤S93,第三服务器在预定时间内接收到的资金额度总和不小于该目标项目所需筹集的资金额度时,第三服务器将接收到的资金发送至第一终端,使第一终端用户获得针对该目标项目的资金。In step S93, when the sum of the funds amount received by the third server within a predetermined time is not less than the amount of funds to be raised by the target item, the third server sends the received funds to the first terminal, so that the first terminal user obtains the target. Funding for the target project.
在另一实施方式中,该第二终端接收第一服务器发送的第一电子凭证,并向第一终端发送第二电子凭证,同时向获取的第一电子凭证中增加该第二终端的标识信息。In another embodiment, the second terminal receives the first electronic credential sent by the first server, and sends the second electronic credential to the first terminal, and adds the identifier information of the second terminal to the obtained first electronic credential. .
其中,该第二电子凭证为银信证,为第二终端用户以其银行账户资金或授信额度作为保证而开立的,银行承诺依照解付条件办理收付结算的电子信用凭证。即,该第三服务器为第二终端用户的资金管理服务器,如,银行。该第二电子凭证为第三服务器冻结第二终端用户的账户资金或授信额度而开立的,且被冻结的账户资金或授信额度与获取的第一电子凭证所代表的资金额度相同。Wherein, the second electronic voucher is a silver credit certificate, and is opened for the second terminal user with the bank account fund or the credit line as a guarantee, and the bank promises to handle the electronic credit certificate for settlement and payment according to the payment condition. That is, the third server is a money management server of the second end user, such as a bank. The second electronic voucher is opened for the third server to freeze the account funds or the credit line of the second end user, and the frozen account fund or credit line is the same as the fund amount represented by the obtained first electronic voucher.
第一终端在预定时间内接收到的第二电子凭证资金额度总和不小于该目标项目所需筹集的资金额度时,向第三服务器发送解付请求,该第三服务器响应该解付请求将第二终端用户账户中被冻结的资金划拨至第四服务器,相应地,该第四服务器将这部分资金划拨至第一终端用户的账户中,使第一终端用户获取所需筹集的资金。When the sum of the second electronic voucher funds received by the first terminal within a predetermined time is not less than the amount of funds required to be raised by the target item, the third terminal sends a settlement request to the third server, and the third server responds to the settlement request. The frozen funds in the second terminal user account are transferred to the fourth server. Accordingly, the fourth server transfers the funds to the account of the first terminal user, so that the first terminal user obtains the funds to be raised.
其中,该第四服务器为该第一终端的资金管理服务器。The fourth server is a fund management server of the first terminal.
进一步地,该第三服务器还可以相应该解付请求将第二终端用户账户中被冻结的资金划拨至第一终端的账户中,使第一终端获取所需筹集的资金。Further, the third server may further allocate the frozen funds in the second terminal user account to the account of the first terminal corresponding to the settlement request, so that the first terminal acquires the funds to be raised.
第一终端在预定时间内接收到的资金额度小于该目标项目所需筹集的资金额度时,向第三服务器发送筹资失败的信息,该第三服务器响应该信息根据第二数据凭证解冻对应的第二终端用户的账户资金。When the amount of funds received by the first terminal within a predetermined time is less than the amount of funds to be raised by the target item, the information about the failure of the financing is sent to the third server, and the third server responds to the information according to the second data voucher. Two end user's account funds.
以上方案,第一服务器根据第一终端发起的针对目标项目的筹资请求获取对应的第一电子凭证。第二终端接收第一服务器发送的第一电子凭证并将相应的资金划拨至第一终端用户的账户中,使第一终端在预定时间内能够筹集到目标项目所需的资金。采用电子凭证的方式发布筹资项目时,引入保险机构(第二服务器)对项目进行评估和担保,从而为其他跟投人(第二终端)提供风险保障。In the above solution, the first server acquires the corresponding first electronic voucher according to the fundraising request initiated by the first terminal for the target item. The second terminal receives the first electronic voucher sent by the first server and transfers the corresponding funds to the account of the first terminal user, so that the first terminal can raise funds required for the target project within a predetermined time. When an electronic voucher is used to issue a fundraising project, an insurance institution (second server) is introduced to evaluate and guarantee the project, thereby providing risk protection for other investors (second terminal).
进一步地,每个第二终端在接收第一电子凭证后,还可以将资金额度相等的第二电子凭证发送至至第一终端的资金管理服务器中,并在项目筹资完成后解付第二电子凭证以将资金划拨至第一终端用户的账户中。采用第二电子凭证的方式跟投目标项目,跟投人的资金只是暂时冻结,使得投资更安全。Further, after receiving the first electronic voucher, each second terminal may further send the second electronic voucher with the same amount of funds to the fund management server of the first terminal, and solve the second electronic after the project financing is completed. The voucher is used to transfer funds to the account of the first end user. Using the second electronic voucher to invest in the target project, the funds with the investors are only temporarily frozen, making the investment safer.
下面对本发明实施方式中的筹资方法进行举例说明。The financing method in the embodiment of the present invention will be exemplified below.
例如,该第一终端为筹资发起方,该第二服务器为保险公司,该第二终端为投资方,该第一服务器为电商平台。For example, the first terminal is a fundraising initiator, the second server is an insurance company, the second terminal is an investor, and the first server is an e-commerce platform.
当筹资发起方通过电商平台发布针对目标项目需要筹资100万的请求时,该电商平台利用保险公司提供的或加载有保险公司审核插件的物信证生成器针对该众筹项目生成物信证。这物信证代表的资金额度为100万。进一步地,投保费用可以由发起人支付,或者由跟投人各自支付。在一种实施方式中,发起方生成的物信证存储在第二服务器上,通过第一服务器在发布平台上发布物信证的链接信息。其中,链接信息包含指向该物信证的URL地址,还可以包括项目介绍信息、发起人的信息、产品图片等。When the fund-raising initiator issues a request for financing a target project of 1 million through the e-commerce platform, the e-commerce platform generates a material letter for the crowdfunding project by using a physical information certificate generator provided by the insurance company or loaded with an insurance company audit plug-in. certificate. The amount of funds represented by this material certificate is 1 million. Further, the insured expenses may be paid by the sponsor or paid by the respective investors. In an embodiment, the initiator-generated physical evidence is stored on the second server, and the link information of the physical certificate is issued on the publishing platform by the first server. The link information includes a URL address pointing to the material certificate, and may also include item introduction information, initiator information, product pictures, and the like.
其他投资方进行跟投,具体为:投资方a向发起方购买物信证后,在物信证上记载有投资方a的身份信息,投资方a可以使用银信证进行购买,也可以使用其他方式,例如银行转账、支付宝等网络方式进行支付。如果是银信证跟投,则由第三服务器冻结投资方a的账户资金以开立出相应资金的银信证,用于购买物信证。Other investors will follow the investment, specifically: after the investor a purchases the physical evidence from the initiator, the identity information of the investor a is recorded on the physical evidence card, and the investor a can use the silver letter certificate to purchase or use Other methods, such as bank transfer, Alipay and other network methods to pay. If it is a silver letter and investment, the third server freezes the account funds of the investor a to open a corresponding bank certificate for the purchase of the material certificate.
筹资期限届满时判断资金筹集是否成功,并完成资金划拨。如果项目筹资成功,则进入实施阶段,物信证持有人依据持有的物信证获取预定收益。其中,如果投资方a使用银信证跟投,则第三服务器投资方a的账户资金解付给发起方的筹资账户。如果没有成功,则项目筹资失败,依据物信证退回跟投资金。例如,如果是使用传统支付方式进行跟投的,则将跟投资金退回至物信证最后的受让人。如果采用银信证进行支付的,则投资方a开给筹资账户的银信证解冻。When the fund-raising period expires, it is judged whether the fund raising is successful and the fund allocation is completed. If the project is successfully funded, it will enter the implementation stage, and the holder of the physical evidence will obtain the predetermined income based on the material certificate held. Wherein, if the investor a uses the bank credit and the investment, the account fund of the third server investor a is released to the sponsor's fundraising account. If it is not successful, the project will fail to raise funds, and the return will be based on the material certificate. For example, if the traditional payment method is used for the follow-up, the investment will be returned to the last assignee of the physical information certificate. If a bank letter is used for payment, the investor’s bank letter issued to the fundraising account is released.
以上方案中,目标项目通过保险公司的审核和保险担保,投资方针对需要购买的物信证以网银支付、银行转账或者通过银信证方式进行购买,并在目标项目成功时将相应的资金划拨至发起方的银行账户中。采用物信证方式发布筹资项目,并引入保险公司对项目进行审核的保险担保,从而为其他投资方提供投资风险保障。投资方以银信证方式购买对目标项目进行投资,由于开立银信证所冻结的资金并非直接划拨至发起方的银行账户中,仅仅是被银行冻结不能使用,但资金仍然在投资方的银行账户中。因此,投资方的风险大大降低,同时也因为冻结的资金仍属于自己因而可能获得另外利益。In the above plan, the target project passes the insurance company's audit and insurance guarantee, and the investor purchases the physical information certificate that needs to be purchased by online banking payment, bank transfer or through bank credit card, and allocates the corresponding funds when the target project is successful. In the bank account of the originator. The fund-raising project is issued by means of physical evidence, and the insurance guarantee for the project to be audited by the insurance company is introduced, thereby providing investment risk protection for other investors. The investor purchases the target project by means of a bank letter. The funds frozen because the bank letter is issued are not directly transferred to the bank account of the initiator. They are only frozen by the bank and cannot be used, but the funds are still in the investor's bank. In the bank account. As a result, the risk of the investor is greatly reduced, and because the frozen funds remain their own, they may gain additional benefits.
在上述实施例中,仅对本发明进行了示范性描述,但是本领域技术人员在阅读本专利申请后可以在不脱离本发明的精神和范围的情况下对本发明进行各种修改。 In the above-described embodiments, the present invention has been exemplarily described, and various modifications of the present invention may be made without departing from the spirit and scope of the invention.

Claims (17)

  1. 一种获取目标数据的处理方法,其中,所述方法包括:A processing method for acquiring target data, wherein the method comprises:
    第一服务器接收第一终端发送的获取目标数据的交互请求,并将所述交互请求发送至第二终端;The first server receives an interaction request for acquiring target data sent by the first terminal, and sends the interaction request to the second terminal;
    其中,所述交互请求包含所述目标数据的描述信息和数据值,还包含保障信息,所述保障信息为第二服务器检测所述目标数据符合所述第二服务器的保障范围时生成的。The interaction request includes the description information and the data value of the target data, and further includes the security information, where the security information is generated when the second server detects that the target data meets the coverage of the second server.
  2. 根据权利要求1所述的获取目标数据的处理方法,其中,所述第一服务器接收所述第一终端发送的获取目标数据的交互请求,并将所述交互请求发送至第二终端的步骤具体为:The method for processing the target data according to claim 1, wherein the step of the first server receiving the interaction request of the acquisition target data sent by the first terminal and transmitting the interaction request to the second terminal is specific for:
    所述第一服务器根据所述第一终端发送的获取目标数据的交互请求,获得所代表的数据值与所述目标数据的数据值相等的第一数据凭证,并将所述第一数据凭证发送至第二终端;The first server obtains a first data credential whose data value is equal to the data value of the target data according to the interaction request of the acquiring target data sent by the first terminal, and sends the first data credential To the second terminal;
    其中,所述第一数据凭证包含所述交互请求的信息。The first data credential includes information of the interaction request.
  3. 根据权利要求2所述的数据处理方法,其中,所述第一服务器根据所述第一终端发送的获取目标数据的交互请求,获得所代表的数据值与所述目标数据的数据值相等的第一数据凭证的步骤具体为:The data processing method according to claim 2, wherein the first server obtains, according to the interaction request of the acquisition target data sent by the first terminal, that the represented data value is equal to the data value of the target data. The steps of a data voucher are specifically as follows:
    所述第一服务器接收所述第一终端发送的获取目标数据的交互请求,并在所述第二服务器检测所述目标数据符合所述第二服务器的保障范围时,生成所述第一数据凭证。The first server receives an interaction request for acquiring target data sent by the first terminal, and generates the first data credential when the second server detects that the target data meets a coverage range of the second server .
  4. 根据权利要求2所述的数据处理方法,其中,所述第一服务器根据所述第一终端发送的获取目标数据的交互请求,获得所代表的数据值与所述目标数据的数据值相等的第一数据凭证的步骤具体为:The data processing method according to claim 2, wherein the first server obtains, according to the interaction request of the acquisition target data sent by the first terminal, that the represented data value is equal to the data value of the target data. The steps of a data voucher are specifically as follows:
    所述第一服务器接收所述第一终端发送的获取目标数据的交互请求,并根据所述交互请求从所述第二服务器中获得所述第一数据凭证;其中,所述第一数据凭证由所述第二服务器检测所述目标数据符合所述第二服务器的保障范围时生成。The first server receives an interaction request for acquiring target data sent by the first terminal, and obtains the first data credential from the second server according to the interaction request; wherein the first data credential is The second server generates when the target data is detected to meet the coverage range of the second server.
  5. 根据权利要求2所述的数据处理方法,其中,所述方法包括:The data processing method according to claim 2, wherein the method comprises:
    所述第二终端接收所述第一数据凭证,并向第三服务器发送第一数据;The second terminal receives the first data credential and sends the first data to the third server;
    所述第三服务器在预定时间内接收到的由所述第二终端发送的所有所述第一数据的数据值大小总和不小于所述目标数据的数据值大小时,将接收到的数据发送至第一终端。And sending, by the third server, the received data to the sum of the data value sizes of all the first data sent by the second terminal that is not within the target data in a predetermined time period The first terminal.
  6. 根据权利要求2所述的数据处理方法,其中,所述方法包括:The data processing method according to claim 2, wherein the method comprises:
    所述第二终端接收所述第一数据凭证,并向第一终端发送第二数据凭证,所述第二数据凭证为第三服务器根据所述第二终端的请求锁定所述第二终端中的第一数据而生成的;The second terminal receives the first data credential, and sends a second data credential to the first terminal, where the second data credential is that the third server locks the second terminal according to the request of the second terminal. Generated from the first data;
    所述第一终端在预定时间内接收到的由所述第二终端发送的所有所述第二数据凭证所代表的数据值大小总和不小于所述目标数据的数据值大小时,向所述第三服务器发送数据交互指令;When the sum of the data value values represented by all the second data vouchers sent by the second terminal received by the second terminal within a predetermined time is not less than the data value size of the target data, The three servers send data interaction instructions;
    所述第三服务器接收所述数据交互指令,并响应所述数据交互指令将所述第二终端中被锁定的数据发送至所述第一终端,或者所述第三服务器响应所述数据交互指令将所述第二终端被锁定的数据发送至第四服务器,使所述第四服务器将接收到的数据发送至所述第一终端。The third server receives the data interaction instruction, and sends the locked data in the second terminal to the first terminal in response to the data interaction instruction, or the third server responds to the data interaction instruction Sending the locked data of the second terminal to the fourth server, so that the fourth server sends the received data to the first terminal.
  7. 根据权利要求6所述的获取目标数据的处理方法,其中,所述第一终端在预定时间内接收到的由所述第二终端发送的第二数据凭证所代表的数据值大小小于所述目标数据的数据值大小时,所述方法还包括:The processing method of acquiring target data according to claim 6, wherein the data value represented by the second data voucher sent by the second terminal received by the first terminal within a predetermined time is smaller than the target When the data value size of the data, the method further includes:
    所述第一终端向所述第三服务器发送目标数据交互失败的指令;以及Sending, by the first terminal, an instruction that the target data interaction fails to the third server;
    所述第三服务器接收所述指令,并响应所述指令根据所述第二数据凭证解锁对应的第二终端中被锁定的所述第一数据。The third server receives the instruction, and in response to the instruction, unlocks the first data that is locked in the corresponding second terminal according to the second data credential.
  8. 一种服务器,其中,包括:A server, including:
    接收模块,用于接收第一终端发送的获取目标数据的交互请求;其中,所述交互请求包含所述目标数据的描述信息和数据值,还包含保障信息,所述保障信息为第二服务器检测所述目标数据符合所述第二服务器的保障范围时生成的;以及a receiving module, configured to receive an interaction request for acquiring target data sent by the first terminal, where the interaction request includes description information and data values of the target data, and further includes security information, where the security information is detected by the second server Generated when the target data meets the coverage of the second server;
    交互请求发送模块,用于将所述交互请求发送至第二终端。And an interaction request sending module, configured to send the interaction request to the second terminal.
  9. 根据权利要求8所述的服务器,其中,还包括:The server according to claim 8, further comprising:
    第一数据凭证获取模块,用于根据第一终端发送的获取目标数据的交互请求获得所代表的数据值与所述目标数据的数据值相等的第一数据凭证;其中,所述第一数据凭证包含所述交互请求的信息;a first data voucher obtaining module, configured to obtain, according to an interaction request of the acquisition target data sent by the first terminal, a first data voucher whose data value is equal to the data value of the target data; wherein the first data voucher Information containing the interaction request;
    第一数据凭证发送模块,用于将所述第一数据凭证获取模块获取的所述第一数据凭证发送至第二终端。And a first data credential sending module, configured to send the first data credential obtained by the first data credential obtaining module to the second terminal.
  10. 一种终端设备,其中,所述设备包括:A terminal device, wherein the device includes:
    一个或多个处理器;One or more processors;
    存储器;Memory
    多个应用程序;以及Multiple applications; and
    一个或多个程序,其中,所述一个或多个程序被存储在所述存储器中并被配置为被所述一个或多个处理器执行,所述一个或多个程序包括指令,所述指令用于:One or more programs, wherein the one or more programs are stored in the memory and configured to be executed by the one or more processors, the one or more programs comprising instructions Used for:
    接收第一终端发送的获取目标数据的交互请求;其中,所述交互请求包含所述目标数据的描述信息和数据值,还包含保障信息,所述保障信息为第二服务器检测所述目标数据符合所述第二服务器的保障范围时生成的;以及And receiving, by the first terminal, an interaction request for acquiring the target data, where the interaction request includes the description information and the data value of the target data, and further includes the protection information, where the protection information is that the second server detects that the target data is consistent. Generated when the second server is secured; and
    将所述交互请求发送至第二终端。Sending the interaction request to the second terminal.
  11. 根据权利要求10所述的终端设备,其中,所述指令还用于:The terminal device according to claim 10, wherein the instructions are further configured to:
    根据所述交互请求获得所代表的数据值与所述目标数据的数据值相等的第一数据凭证;其中,所述第一数据凭证包含所述交互请求的信息;以及Acquiring, according to the interaction request, a first data credential whose data value is equal to the data value of the target data; wherein the first data credential contains information of the interaction request;
    将所述第一数据凭证发送至第二终端。Sending the first data credential to the second terminal.
  12. 一种线上筹资方法,其中,所述方法包括:An online financing method, wherein the method comprises:
    第一服务器接收第一终端发送的针对目标项目的筹资请求,并将所述筹资请求发送至第二终端;其中,所述筹资请求包括所述目标项目的描述信息和所需筹集的资金额度,还包括保险信息;所述保险信息为第二服务器审核所述目标项目符合所述第二服务器的保障范围时生成。The first server receives the fundraising request for the target item sent by the first terminal, and sends the fundraising request to the second terminal; wherein the financing request includes description information of the target item and a fund amount to be raised, The insurance information is further included; the insurance information is generated when the second server verifies that the target item meets the coverage range of the second server.
  13. 根据权利要求12所述的线上筹资方法,其中,所述第一服务器接收第一终端发送的针对目标项目的筹资请求,并将所述筹资请求发送至第二终端的步骤具体为:The online fundraising method according to claim 12, wherein the step of the first server receiving the fundraising request for the target item sent by the first terminal and transmitting the fundraising request to the second terminal is specifically:
    所述第一服务器接收第一终端发送的针对目标项目的筹资请求,并根据所述筹资请求获得代表的资金额度与所述目标项目所需筹集的资金额度相等的第一电子凭证,以及将所述第一电子凭证发送至第二终端; Receiving, by the first server, a financing request for the target item sent by the first terminal, and obtaining, according to the financing request, a first electronic voucher that is equal to the amount of funds required to be raised by the target item, and the Transmitting the first electronic voucher to the second terminal;
    其中,所述第一电子凭证包含所述筹资请求的信息。The first electronic voucher includes information of the financing request.
  14. 根据权利要求13所述的线上筹资方法,其中,所述第一服务器接收所述第一终端发送的针对目标项目的筹资请求,并根据所述筹资请求获得代表的资金额度与所述目标项目所需筹集的资金额度相等的第一电子凭证的步骤具体为:The online fundraising method according to claim 13, wherein the first server receives a fundraising request for the target item sent by the first terminal, and obtains a representative fund amount and the target item according to the fundraising request. The steps of the first electronic voucher for which the amount of funds to be raised are equal are as follows:
    所述第一服务器接收所述第一终端发送的针对目标项目的筹资请求,并在所述第二服务器检测所述目标项目符合所述第二服务器的保障范围而生成所述保障信息时,生成具有所述保障信息的所述第一电子凭证。Receiving, by the first server, a fundraising request for the target item that is sent by the first terminal, and generating, when the second server detects that the target item meets the coverage of the second server, generating the protection information, generating The first electronic voucher having the guarantee information.
  15. 根据权利要求13所述的线上筹资方法,其中,所述第一服务器接收所述第一终端发送的针对目标项目的筹资请求,并根据所述筹资请求获得代表的资金额度与所述目标项目所需筹集的资金额度相等的第一电子凭证的步骤具体为:The online fundraising method according to claim 13, wherein the first server receives a fundraising request for the target item sent by the first terminal, and obtains a representative fund amount and the target item according to the fundraising request. The steps of the first electronic voucher for which the amount of funds to be raised are equal are as follows:
    所述第一服务器接收所述第一终端发送的针对目标项目的筹资请求,并根据所述筹资请求从所述第二服务器中获得所述第一电子凭证;其中,所述第一电子凭证由所述第二服务器对所述目标项目检测符合所述第二服务器的保障范围时生成。Receiving, by the first server, a financing request for the target item that is sent by the first terminal, and obtaining the first electronic voucher from the second server according to the financing request; wherein the first electronic voucher is The second server generates when the target item is detected to meet the coverage range of the second server.
  16. 根据权利要求13所述的线上筹资方法,其中,所述方法还包括:The online fundraising method of claim 13, wherein the method further comprises:
    所述第二终端接收所述第一电子凭证,并向第三服务器发送第一资金;The second terminal receives the first electronic voucher and sends the first funds to the third server;
    所述第三服务器在预定时间内接收到的由所述第二终端发送的所有所述第一资金的资金额度总和不小于所述目标项目所需筹集的资金额度时,将接收到的资金发送至第一终端。Sending the received funds when the sum of the funds amount of all the first funds sent by the second terminal received by the third terminal within a predetermined time is not less than the amount of funds required to be raised by the target item To the first terminal.
  17. 根据权利要求13所述的线上筹资方法,其中,所述方法还包括:The online fundraising method of claim 13, wherein the method further comprises:
    所述第二终端接收所述第一电子凭证,并向第三服务器发送第二电子凭证;所述第二电子凭证为第三服务器根据所述第二终端的请求冻结所述第二终端用户账户中的第一资金而生成的;The second terminal receives the first electronic voucher and sends a second electronic voucher to the third server; the second electronic voucher is a third server that freezes the second terminal user account according to the request of the second terminal Generated in the first fund;
    所述第一终端在预定时间内接收到的由所述第二终端发送的所有所述第二电子凭证所代表的资金额度总和不小于所述目标项目所需筹集的资金额度时,向所述第三服务器发送资金划拨指令;When the sum of the funds amount represented by all the second electronic vouchers sent by the second terminal received by the first terminal within a predetermined time is not less than the amount of funds required to be raised by the target item, The third server sends a fund transfer instruction;
    所述第三服务器接收所述资金划拨指令,并响应所述资金划拨指令将所述第二终端中被冻结的资金发送至所述第一终端。 The third server receives the fund transfer instruction, and sends the frozen funds in the second terminal to the first terminal in response to the fund transfer instruction.
PCT/CN2015/089732 2015-09-16 2015-09-16 Processing method for acquiring target data, server, and online funding method WO2017045154A1 (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
CA2998517A CA2998517C (en) 2015-09-16 2015-09-16 Processing method for acquiring target data, server, and online funding method
CN201580012861.4A CN106464661A (en) 2015-09-16 2015-09-16 Processing method for obtaining target data, server, and online fund-raising method
PCT/CN2015/089732 WO2017045154A1 (en) 2015-09-16 2015-09-16 Processing method for acquiring target data, server, and online funding method
CA3192799A CA3192799A1 (en) 2015-09-16 2015-09-16 Processing method for acquiring target data, server, and online funding method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2015/089732 WO2017045154A1 (en) 2015-09-16 2015-09-16 Processing method for acquiring target data, server, and online funding method

Publications (1)

Publication Number Publication Date
WO2017045154A1 true WO2017045154A1 (en) 2017-03-23

Family

ID=58093995

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/089732 WO2017045154A1 (en) 2015-09-16 2015-09-16 Processing method for acquiring target data, server, and online funding method

Country Status (3)

Country Link
CN (1) CN106464661A (en)
CA (2) CA3192799A1 (en)
WO (1) WO2017045154A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112486869A (en) * 2020-11-12 2021-03-12 北京壹体体育产业发展有限公司 Device and method for data exchange among multiple systems

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113014533B (en) * 2019-12-20 2022-11-08 北京金山云网络技术有限公司 Processing method, device and system for checking file, storage medium and electronic device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103117856A (en) * 2012-01-16 2013-05-22 深圳市家富通汇科技有限公司 Method and apparatus for provisioning applications in mobile devices
CN103208065A (en) * 2012-01-16 2013-07-17 深圳市家富通汇科技有限公司 Method and apparatus for personalizing secure elements in mobile devices
US20140214675A1 (en) * 2013-01-25 2014-07-31 Pankaj Sharma Push payment system and method
CN104579663A (en) * 2013-10-24 2015-04-29 上海中移通信技术工程有限公司 Method for limiting validity of digital certificate

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103117856A (en) * 2012-01-16 2013-05-22 深圳市家富通汇科技有限公司 Method and apparatus for provisioning applications in mobile devices
CN103208065A (en) * 2012-01-16 2013-07-17 深圳市家富通汇科技有限公司 Method and apparatus for personalizing secure elements in mobile devices
US20140214675A1 (en) * 2013-01-25 2014-07-31 Pankaj Sharma Push payment system and method
CN104579663A (en) * 2013-10-24 2015-04-29 上海中移通信技术工程有限公司 Method for limiting validity of digital certificate

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112486869A (en) * 2020-11-12 2021-03-12 北京壹体体育产业发展有限公司 Device and method for data exchange among multiple systems

Also Published As

Publication number Publication date
CA2998517C (en) 2023-04-25
CA2998517A1 (en) 2017-03-23
CA3192799A1 (en) 2017-03-23
CN106464661A (en) 2017-02-22

Similar Documents

Publication Publication Date Title
WO2023033298A1 (en) Service providing method performed by server of sound source platform using blockchain-based nft
WO2019085699A1 (en) Data sharing method, client, server, computing device, and storage medium
WO2020171538A1 (en) Electronic device and method for providing digital signature service of block chain using the same
WO2021010766A1 (en) Electronic authentication device and method using blockchain
WO2016137307A1 (en) Attestation by proxy
EP4010834A1 (en) Electronic device and method for managing blockchain address using the same
WO2018194379A1 (en) Method for approving use of card by using token id on basis of blockchain and merkle tree structure associated therewith, and server using same
US7357329B2 (en) IC card, terminal device, and data communication method
CN111373431B (en) Credible insurance letter based on block chain
WO2019198866A1 (en) Method and device for providing transaction service for cryptocurrencies based on different blockchains
US11943256B2 (en) Link detection method and apparatus, electronic device, and storage medium
TWI623904B (en) Confirmation system based on blockchain smart contract and method thereof
CN111433798B (en) Credible insurance letter based on block chain
CN111433799B (en) Credible insurance letter based on block chain
WO2021101020A1 (en) Server for processing real estate investment mediation based on security token and operation method therefor
WO2020231177A1 (en) Electronic device and method for receiving push message stored in blockchain
CN113826134A (en) Credible insurance letter based on block chain
WO2013191427A1 (en) Method for providing security transaction service
WO2020190099A1 (en) Electronic device for managing personal information and operating method thereof
WO2017045155A1 (en) Processing method for obtaining target data, server, and online financing method
WO2023013861A1 (en) Method and device for managing non-fungible tokens for digital content
TWI646487B (en) Smart contract executing system with permission rating and avoid duplication and method thereof
WO2020141783A1 (en) Method and server for managing user identity using blockchain network, and method and terminal for authenticating user using blockchain network-based user identity
WO2017045154A1 (en) Processing method for acquiring target data, server, and online funding method
WO2020209664A2 (en) Method for distributing certificate of right to use digital content, and computer program stored in medium in order to carry out method

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15903844

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2998517

Country of ref document: CA

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 21.06.18)

122 Ep: pct application non-entry in european phase

Ref document number: 15903844

Country of ref document: EP

Kind code of ref document: A1