WO2017101002A1 - Data exchange processing method, server, terminal device, and online transaction method - Google Patents
Data exchange processing method, server, terminal device, and online transaction method Download PDFInfo
- Publication number
- WO2017101002A1 WO2017101002A1 PCT/CN2015/097392 CN2015097392W WO2017101002A1 WO 2017101002 A1 WO2017101002 A1 WO 2017101002A1 CN 2015097392 W CN2015097392 W CN 2015097392W WO 2017101002 A1 WO2017101002 A1 WO 2017101002A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- server
- data
- credential
- terminal
- generating
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
Definitions
- the present invention relates to the field of Internet data interaction technologies, and in particular, to a data interaction processing method, a server, a terminal device, and an online transaction method.
- the technical problem to be solved by the present invention is to provide a data interaction processing method, a server, and a terminal device, which freeze the corresponding data credentials within a predetermined time in the process of performing data interaction to ensure the efficiency of data interaction.
- the present invention provides a data interaction processing method, the method comprising: the first server detecting that the first terminal or the second server sends request information for generating a second data credential; and locking according to the request information for generating the second data credential a first data credential to refuse to receive an interaction request for the first data credential sent by another end user during the locking period; wherein the first data credential is generated by the first server and associated with the second server, and Included with the first data/value; and the second data credential is that the third server receives the request information for generating the second data credential and locks the first terminal account to be equal to the first data/value The data value is generated and received by the second server.
- the present invention further provides a server, comprising: a detecting module, configured to detect that the first terminal or the second server sends request information for generating a second data credential; and a locking module, configured to generate a request for the second data credential according to the request
- the information locks the first data credential to refuse to receive an interaction request for the first data credential sent by another end user during the locking period; wherein the first data credential is generated by the first server and associated with the second server And including the first data/value; and the second data credential is that the third server locks the first data account and the first data/value after receiving the request information for generating the second data credential Generated with equal size data values and received by the second server.
- the present invention also provides a terminal device comprising: one or more processors; a memory; and one or more programs, wherein the one or more programs are stored in the memory and configured to be Executing the one or more processors, the one or more programs comprising instructions for: detecting that the first terminal or the second server sends request information for generating a second data credential; generating the second according to the The request information of the data credential locks the first data credential to refuse to receive an interaction request for the first data credential sent by another end user during the locking period; wherein the first data credential is generated by the first server Correlating the second server and including the first data/value; and the second data credential is locked by the third server after the request information for generating the second data credential is locked in the first terminal account and the first A data value equal to the data value is generated and received by the second server.
- the first server when receiving the target interaction request sent by the first terminal, locks the first data credential associated with the target according to the locking rule to reject the interaction request sent by the other account for the same target. To avoid the situation where other accounts request the same target and there is an interaction conflict, waste network resources, thereby improving the efficiency of data interaction.
- Another object of the present invention is to provide an online transaction method, including: the first server detects that the first terminal or the second server sends request information for generating a silver credit; and the request information is locked according to the generated silver credit.
- the certificate is configured to refuse to receive an interaction request for the physical credential sent by another terminal user during the locking period; wherein the physical credential generates and associates the network electronic document of the second server with the first server, And including the first amount; and the silver credit is generated by the third server after receiving the request information for generating the silver credit, and then locking the first amount of funds in the first terminal account, and the Two servers receive.
- the first server when receiving the target commodity/service transaction request issued by the first account, locks the electronic commitment certificate associated with the target commodity/service according to the locking rule to reject the other account for the same target commodity/ The transaction request of the service to avoid the occurrence of transaction conflicts in which other accounts request the same target goods/services, thereby increasing the success rate of the transaction.
- FIG. 1 is a schematic flowchart of a data interaction processing method in a first embodiment of the present invention
- FIG. 2 is a schematic flow chart of a data interaction processing method in a second embodiment of the present invention.
- FIG. 3 is a schematic structural diagram of a server in a first embodiment of the present invention.
- FIG. 4 is a schematic structural diagram of a server in a second embodiment of the present invention.
- FIG. 5 is a schematic structural diagram of a terminal device according to an embodiment of the present invention.
- FIG. 6 is a schematic flow chart of an online transaction method in an embodiment of the present invention.
- FIG. 1 is a schematic flowchart of a method for processing interaction data of a target data according to a first embodiment of the present invention.
- the method flow shown in the implementation manner includes:
- Step S10 The first server detects that the first terminal or the second server sends the request information for generating the second data credential.
- Step S11 Lock the first data credential according to the request information for generating the second data credential to refuse to receive an interaction request for the first data credential sent by another terminal user during the locking period.
- the first data credential is generated by the first server and associated with the second server, and includes the first data/value.
- the second data credential is generated by the third server after receiving the request information for generating the second data credential, and locking the data value equal to the first data/value in the first terminal account, and is received by the second server. .
- FIG. 2 is a schematic flowchart of a method for processing interaction data of a target data according to a second embodiment of the present invention.
- the method flow shown in the implementation manner includes:
- Step S20 The first server detects that the first terminal or the second server sends the request information for generating the second data credential.
- Step S21 Lock the first data credential according to the request information for generating the second data credential to refuse to receive an interaction request for the first data credential sent by another terminal user during the locking period.
- the first data credential is generated by the first server and associated with the second server, and includes the first data/value.
- the second data credential is generated by the third server after receiving the request information for generating the second data credential, and locking the data value equal to the first data/value in the first terminal account, and is received by the second server. .
- the information of the first data credential includes a locking rule set by the first server.
- the first server sets the locking rule when generating the first data credential, and the locking rule includes at least a locking time length of the first data credential.
- the locked content for the first data voucher will be described in detail below.
- the information of the first data credential is displayed for the first terminal to browse the information of the target associated with the first data credential.
- the information of the first data credential may be address information, that is, address information in which the first data credential is stored in the first server, for example, URL information.
- the other information of the target such as the type, format, and summary description information of the target, can be obtained from the first server by using the address information.
- the first server When the first server receives the interaction request sent by the first terminal, the first server hides its address information or modifies the access authority of the address information, so that other accounts than the first terminal cannot send the mutual request. Therefore, when the first terminal requests an interaction, the first server prevents the other account from interacting with the first data credential by hiding the first data credential address information or modifying the access right of the first data credential address information, thereby avoiding data occurrence. Interaction conflicts, wasting network resources.
- Step S22 During the locking period, it is determined whether the second server receives the valid second data certificate. If yes, the process proceeds to step S23. Otherwise, it proceeds to step S24.
- Step S23 If it is determined that the second server verifies that the received second data credential is valid, determining that the interaction request of the first terminal for the first data credential is successful.
- the identifier information of the first terminal is added to the first data credential, so as to identify the owner of the first data credential as the first terminal.
- the first server may directly send the target to the first terminal according to the identification information of the first data credential.
- the third server is a first terminal management server, and is capable of locking a specific data/value in the first terminal account according to the data credential generation request, and generating a corresponding credential.
- the request information for generating the second data credential includes at least the first data/value and the user information of the first terminal, and may be sent by the second server or may be sent by the first terminal. details as follows:
- the first terminal before the first server detects that the first terminal or the second server sends the request information for generating the second data credential, the first terminal sends an interaction request for the first data credential to the first server, to the first The three servers send request information for generating a second data credential.
- the request for generating the second data credential sent by the first terminal is generated when the first terminal obtains the first data credential information, and the first data/value size included in the request information for generating the second data credential Can be determined based on the information of the target. That is, the second data voucher is generated by the third server in response to the generation request after the first terminal actively sends a generation request to the third server when determining that the target associated with the first data voucher needs to be interacted with.
- the first terminal is account A
- the target is the power-on password of the client B.
- the account A and the client B may be devices such as a personal computer, a tablet computer, a smart phone, and the like that can perform data interaction with the server through a network.
- the first server generates a corresponding first data credential of the client B's power-on password in advance, and displays URL information of the first data credential.
- the account A accesses the first server
- the information of the target is acquired by the URL information
- the second data credential generation request is sent to the third server when it is determined that the target is needed.
- the generation request includes information of the first data and information of the account A.
- the third server locks the first data in the account A in response to the generation request, generates a second data voucher, and sends the second data voucher to the first server by the account A.
- the second server verifies the second data credential according to the information of the second data credential to determine whether to accept, for example, determining the data/value size of the second data credential. Whether it is not smaller than the data/value size of the first data voucher, and accepts the second data voucher when it is determined not to be less than, and sends feedback information agreeing to accept the second data voucher to the first server. Otherwise, it is determined that the second data voucher is not accepted, and the feedback information rejecting the second data voucher is sent to the first server.
- the first server when the first server detects that the first terminal or the second server sends the request information for generating the second data credential, the first server receives the interaction request of the first data credential sent by the first terminal, The second server is instructed to issue request information for generating a second data credential to the third server.
- the data/value size of the required lock included in the request information for generating the second data voucher may be equal to the data/value represented by the first data voucher, that is, the data/value of the target may not be equal.
- Step S24 If it is determined that the second server verifies that the received second data credential is invalid or the second server does not receive the second data credential, the first data credential is unlocked.
- the unlocking the first data credential is: displaying address information of the first data credential or resetting access authority of the first data credential address information.
- the address information of the first data credential can be displayed again when the first terminal interaction target is unsuccessful, so that other accounts can send the target interaction request to provide opportunities for other account interaction targets.
- the first server when the first server receives the target interaction request sent by the first terminal, the first data credential associated with the target is locked according to the locking rule to reject the interaction request issued by the other account for the same target, and is locked.
- the target interaction is determined to be successful during receipt of the second data credential associated with the first terminal account, and the first data credential is unlocked when the second data credential is not received during the lock, thereby providing an opportunity for other accounts to request interaction with the target. Therefore, when the target is requested to interact with the first terminal, the first data credential is locked, thereby solving the technical problem that other accounts request the same target and the interaction conflicts, waste network resources, thereby improving the efficiency of data interaction.
- the target in the above embodiment may also be text data, audio data, video data, program data, or capital data in the financial field.
- audio data such as a song
- the first terminal may be a client with a multimedia playing function, such as a mobile phone
- the first server is a music search platform
- the second and third servers are music website servers.
- FIG. 3 is a schematic structural diagram of a server according to a first embodiment of the present invention.
- the server 30 shown in this embodiment is a first server, and includes a detecting module 31 and a locking module 32.
- the detecting module 31 is configured to detect whether the first terminal or the second server sends the request information for generating the second data credential during the locking period.
- the locking module 32 is configured to lock the first data credential according to the request information for generating the second data credential to refuse to receive the interaction request for the first data credential sent by the other end user during the locking period.
- the first data credential is generated by the first server and associated with the second server, and includes the first data/value.
- the second data credential is generated after the third server receives the request information for generating the second data credential and locks the data value equal to the first data/value in the first terminal account, and is received by the second server.
- FIG. 4 is a schematic structural diagram of a server according to a second embodiment of the present invention.
- the server 40 shown in this embodiment is a first server, and includes a detection module 41, a locking module 42, and an execution module 43.
- the detecting module 41 is configured to detect that the first terminal or the second server sends the request information for generating the second data credential.
- the locking module 42 is configured to lock the first data credential according to the request information for generating the second data credential to refuse to receive the interaction request for the first data credential sent by the other end user during the locking period.
- the first data credential is generated by the first server and associated with the second server, and includes the first data/value.
- the second data credential is generated after the third server receives the request information for generating the second data credential and locks the data value equal to the first data/value in the first terminal account, and is received by the second server.
- the information of the first data credential includes a locking rule set by the first server.
- the first server sets the locking rule when generating the first data credential, and the locking rule includes at least a locking time length of the first data credential.
- the information of the first data credential is displayed for the first terminal to browse the information of the target.
- the information of the first data voucher may be address information, that is, address information in which the first data voucher is stored in the server 40, for example, URL information.
- address information that is, address information in which the first data voucher is stored in the server 40, for example, URL information.
- other information of the target such as description information such as the type, format, and abstract of the target, can be obtained from the server 40 through the address information.
- the locking module 42 when receiving the target interaction request sent by the first terminal, the locking module 42 hides its address information or modifies the access authority of its address information, so that other accounts than the first terminal cannot send the target interaction request.
- the execution module 43 is configured to determine whether the second server receives a valid second data credential during the locking period. If it is determined that the second server verifies that the received second data credential is valid, determining that the interaction request of the first terminal for the first data credential is successful. The first data credential is unlocked when it is determined during the lock period that the second server verifies that the received second data credential is invalid or the second server does not receive the second data credential.
- the executing module 43 unlocks the first data credential: displaying address information of the first data credential or resetting access authority of the first data credential address information.
- the third server is a first terminal management server, and is capable of locking a specific data/value in the first terminal account according to the data credential generation request, and generating a corresponding credential.
- the request information for generating the second data credential includes at least the first data/value and the user information of the first terminal, and may be sent by the second server or may be sent by the first terminal.
- the server 40 also includes an indication module 44.
- the indicating module 44 is configured to instruct the second server to send the third server to the third server when receiving the interaction request of the first data credential sent by the first terminal. Generate request information for the second data credential.
- the second data credential is generated by the third server in response to the request to acquire the second data credential to lock the first data/value in the first terminal account. That is, the second data credential is generated by the first server requesting the third data server according to the first data credential after the first terminal sends the target interaction request to the first server.
- the server 40 when the locking module 42 locks the first data credential, the server 40 further receives the second data credential sent by the first terminal, and sends the second data credential to the second server.
- the second data credential is generated by the third server in response to the request of the first terminal to lock the first data/value in the first terminal account.
- the request of the first terminal is: when the first terminal sends a target interaction request to the first server, the second data credential request is sent to the third server according to the information of the target.
- the first data/value size included in the second data voucher generation request may be determined according to the information of the target. That is, the second data credential is that the first terminal actively sends a generation request to the third server when it is determined that the target needs to be exchanged, and is generated by the third server in response to the generation request.
- the data/value size of the required lock included in the request information for generating the second data voucher may be equal to the data/value represented by the first data voucher, that is, the data/value of the target may not be equal.
- the executing module 43 is further configured to add the identifier information of the first terminal to the first data credential, so as to identify the owner of the first data credential as the first terminal. .
- FIG. 5 is a schematic structural diagram of a terminal device according to an embodiment of the present invention.
- the terminal device 50 in this embodiment is a first server.
- the terminal device 50 includes a receiver 51, a processor 52, a transmitter 53, a read only memory 54, a random access memory 55, and a bus 56.
- the receiver 51 is for receiving data.
- the processor 52 controls the operation of the terminal device 50, and the processor 52 can also become a CPU (Central Processing Unit, central processing unit).
- the processor 52 may be an integrated circuit chip with signal processing capabilities.
- Processor 52 can also be a general purpose processor, digital signal processor (DSP), application specific integrated circuit (ASIC), off-the-shelf programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic device, discrete hardware component .
- DSP digital signal processor
- ASIC application specific integrated circuit
- FPGA off-the-shelf programmable gate array
- the general purpose processor may be a microprocessor or the processor or any conventional processor or the like.
- the transmitter 53 is for transmitting data.
- the memory can include read only memory 54 and random access memory 55 and provide instructions and data to processor 52.
- a portion of the memory may also include non-volatile random access memory (NVRAM).
- NVRAM non-volatile random access memory
- the various components of the terminal device 50 are coupled together by a bus 56.
- the bus 56 may include, in addition to the data bus, a power bus, a control bus, a status signal bus, and the like. However, for clarity of description, various buses are labeled as bus 56 in the figure.
- the memory stores the following elements, executable modules or data structures, or a subset of them, or their extended set:
- Operation instructions include various operation instructions for implementing various operations.
- Operating system Includes a variety of system programs for implementing various basic services and handling hardware-based tasks.
- the processor 52 performs the following operations by calling an operation instruction stored in the memory, which can be stored in the operating system:
- the first terminal or the second server sends the request information for generating the second data credential.
- the first data credential is locked according to the request information for generating the second data credential to refuse to receive an interaction request for the first data credential sent by the other end user during the lock period.
- the first data credential is generated by the server 50 and associated with the second server, and includes the first data/value.
- the second data credential is generated by the third server after receiving the request information for generating the second data credential and then locking the data value equal to the first data/value in the first terminal account, and is received by the second server.
- the information of the first data voucher includes a locking rule set by the server 50.
- the server 50 sets the locking rule when generating the first data credential, the locking rule including at least the locking time length of the first data credential.
- the processor 52 locks the first data credential according to the locking rule in response to the target interaction request sent by the first terminal, to refuse to receive the target interaction request sent by the other account during the locking, and send the obtained request to the second server. The request for the second data voucher.
- the processor 52 detects that the first terminal or the second server sends the request for generating the second data credential, and the third terminal sends the request for the interaction of the first data credential to the server 50 to the third
- the server sends request information for generating a second data credential.
- the request for generating the second data credential by the first terminal is generated by the first terminal when acquiring the first data credential information, and the first data/value value included may be determined according to the information of the target. That is, the second data credential is that the first terminal actively sends a generation request to the third server when it is determined that the target needs to be exchanged, and is generated by the third server in response to the generation request.
- the second server determines whether to accept according to the information of the second data credential, for example, determining whether the data/value value of the second data credential is not less than the data/value of the first data credential. The size, and accepting the second data credential when the determination is not less than, and sending feedback information to the server 50 agreeing to accept the second data credential. Otherwise, it is determined that the second data voucher is not accepted, and the server 50 is sent feedback information rejecting the second data voucher.
- the server 50 before the server 50 detects that the first terminal or the second server sends the request information for generating the second data credential, the server 50 receives the interaction request of the first data credential sent by the first terminal, The second server is instructed to issue request information for generating a second data credential to the third server.
- FIG. 6 is a schematic flowchart diagram of an online transaction method according to a first embodiment of the present invention.
- the method flow shown in the implementation manner includes:
- Step S60 The first server detects that the first terminal or the second server sends the request information for generating a silver credit.
- the physical evidence is a network electronic document generated by the first server and associated with the second server, and includes a first amount.
- the silver credit card is generated by the third server receiving the request information for generating the silver credit card and then locking the first amount of funds in the first terminal account, and is received by the second server.
- the material certificate is a network electronic document that integrates the essential functions of the target goods/services e-commerce, and includes a locking rule set by the first server.
- the first server sets the locking rule when generating the material credential, and the locking rule is used to define a locking time length of the physical credential.
- the information of the material certificate is displayed for the first terminal to browse the information of the target goods/services.
- the information of the physical evidence may be address information, that is, address information stored in the first server, such as URL information.
- address information stored in the first server, such as URL information.
- other information about the target product/service such as a description of the category and function description of the target product, can be obtained from the first server through the address information.
- the first server When the physical evidence is locked, the first server hides its address information or modifies the access rights of its address information, so that other accounts than the first terminal cannot obtain their address information, thereby browsing the information of the target goods/services. Therefore, when the first terminal requests the transaction target goods/services, the situation of the transaction conflict occurs by hiding the information of the address information to prevent other accounts from requesting the same target goods/services.
- step S62 during the lock period, it is determined whether the second server receives a valid silver certificate, and if yes, proceeds to step S63; otherwise, proceeds to step S64.
- the silver credit card is generated by the third server freezing the first amount of funds in the user account of the first terminal.
- step S63 it is determined that the target goods/service transaction associated with the physical terminal is successful. Then the process ends.
- the third server is the first terminal money management server, and can freeze the specific amount of funds in the user account of the first terminal according to the request for generating the silver credit, and generate a corresponding silver credit card.
- the silver credit generation request includes the required amount of the frozen funds and the information of the first terminal, and may be sent by the second server or by the first terminal. details as follows:
- the first terminal before the first server detects that the first terminal or the second server sends the request information for generating the silver credential, the first terminal sends an interaction request for the physical credential to the first server to the third server.
- Send request information for generating a silver certificate The request for generating the silver credit card by the first terminal is: when the first terminal sends a transaction request for the target commodity/service to the first server, the silver credit certificate generation request is sent to the third server according to the information of the target commodity/service. .
- the first credit size included in the silver credit generation request may be determined according to the information of the target commodity/service. That is, the silver credit card is that the first terminal actively sends a generation request to the third server when it is determined that the target commodity/service needs to be traded, and is generated by the third server in response to the generation request.
- the amount of funds required to be frozen in the silver credit generation request may be equal to the amount of funds represented by the physical evidence, that is, the funds required to purchase the target goods/services may also be unequal.
- the silver credit is generated by the third server in response to the request to obtain the silver credit to freeze the first amount of funds in the first terminal account. That is, the silver credential is generated by the first server requesting the third server according to the physical credential after the first terminal sends the target merchandise/service transaction request to the first server.
- the first server before the first server detects that the first terminal or the second server sends the request information for generating the silver credential, the first server receives the interaction request of the physical credential sent by the first terminal, and indicates the second The server sends a request message for generating a silver credit to the third server.
- step S64 during the locking period, it is determined that the second server does not receive the silver credit or does not receive a valid silver credit, and unlocks the physical evidence. Then the process ends.
- the unlocker is: the access right of the address information of the display letter or the reset letter address information.
- the address information of the material certificate can be displayed again, so that other accounts can obtain the address information and browse the information of the target goods/services, and provide the target goods/services for other accounts. opportunity.
- the second server After receiving the silver letter certificate, the second server determines whether to accept according to the information of the bank letter certificate, for example, determining whether the fund value of the bank letter is not smaller than the fund value of the material certificate, and accepting when determining that the value is not less than
- the bank letter is sent to the first server to agree to accept the feedback information of the bank letter; otherwise, it is determined not to accept the bank letter, and sends a feedback message rejecting the bank letter to the first server.
- the first server when the first server receives the target commodity/service transaction request sent by the first terminal, the physical evidence associated with the target commodity/service is locked according to the locking rule to reject the other account for the same target commodity/service.
- Transaction request and when the valid silver certificate with the first terminal is received during the lockout period, the target goods/service transaction is determined to be successful, and the valid letter is not received during the lockout period, thereby requesting the transaction for other accounts.
- the target goods/services provide opportunities. Therefore, when the target goods/services are requested by the first terminal, the material trust is locked, thereby solving the technical problem of the transaction conflicts that other accounts request for the same target goods/services, thereby improving the success rate of the transactions.
- the user of the first terminal is a buyer
- the first server is a physical evidence generation system server
- the second server is a fund management server for receiving a silver credit card
- the third server is a user account fund management server of the first terminal.
- the second and third servers may be system servers of the same bank or different banks.
- the first server pre-configures the locking rule and the second server information for receiving the silver credit, and generates a physical certificate associated with the target commodity/service. Further, the first terminal may also preset third server information for generating a silver credit in the user account.
- the first server After the first server generates the material certificate, the first server issues a material certificate through the Internet in the form of a URL.
- the user of the first terminal browses the material credential information through the URL published by the Internet, and issues a transaction request when confirming the purchase of the target commodity/service associated with the physical credential.
- the first server determines whether the transaction is successful according to the receipt of the silver certificate of the second server within a predetermined time, and the second server receives the silver credit certificate as follows:
- the third server when the first terminal issues a transaction request, the third server sends a corresponding silver credit according to the request for generating a silver credit issued by the third server, and the silver credit can only fill in the buyer information.
- the amount may also include the number of the physical certificate, the second server information for receiving the silver certificate.
- the first terminal sends the request information for generating the silver credential to the first server, and the first server starts timing and locks the physical credential when receiving the request information for generating the silver credential.
- the locked material certificate can no longer be purchased (for example, the URL information is not displayed but only the first server is displayed or no purchase authority is displayed).
- the silver credit card After the silver credit card is generated, it is sent by the first terminal to the first server, and the first server sends the silver credit card, the physical credit number, the second server information for receiving the silver credit card, and the amount of the payment to the second server, The second server verifies whether the silver credential is valid, and receives the silver credential issued by the third server and sends and receives the information to the first server when the confirmation is valid.
- the first server issues a request for generating a silver credential to the second server according to the transaction request, and starts timing to issue a credential credential when the request for generating the silver credential is issued.
- the request for generating the silver credit includes transaction information such as the second server information, the physical evidence number, the physical certificate price, and the physical information lock time.
- the second server receives the generation request of the silver credit to the third server, and the third server receives the generation request to issue the silver credit. Then, the second server automatically receives the silver certificate issued by the third server and sends and receives the information to the first server.
- the first server determines that the second server receives the silver credit within a predetermined time, the transaction is successful, and the physical evidence status is changed to the purchased state, and Notify the first terminal that the transaction is reached. Otherwise, the first server unlocks the letter, notifies the first terminal that the transaction has failed, and displays the material certificate so that it can re-issue or modify the material certificate for purchase to make it available for purchase by the account user on the Internet.
- the second server that is associated with the first server is instructed to send an offer to the third server associated with the first terminal, requesting to issue the amount of the information certificate.
- the bank’s letter of credit at the same time, locks the material certificate, which better reflects the sincerity of the buyers and sellers.
Landscapes
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- Economics (AREA)
- Marketing (AREA)
- Development Economics (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Description
Claims (17)
- 一种数据交互处理方法,其中,所述方法包括:A data interaction processing method, wherein the method comprises:第一服务器检测到第一终端或第二服务器发送生成第二数据凭证的请求信息;The first server detects that the first terminal or the second server sends the request information for generating the second data credential;根据所述生成第二数据凭证的请求信息锁定第一数据凭证,以在锁定期间内拒绝接收其他终端用户发送的对所述第一数据凭证的交互请求;And locking the first data credential according to the request information for generating the second data credential to refuse to receive an interaction request for the first data credential sent by another terminal user during the locking period;其中,所述第一数据凭证由所述第一服务器生成并关联第二服务器,且包含有第一数据/数值;以及The first data credential is generated by the first server and associated with the second server, and includes a first data/value;所述第二数据凭证为第三服务器收到所述生成第二数据凭证的请求信息后锁定所述第一终端账户中与所述第一数据/数值大小相等的数据值而生成,并由所述第二服务器接收。The second data credential is generated after the third server receives the request information for generating the second data credential and locks the data value in the first terminal account that is equal to the first data/value. The second server receives.
- 根据权利要求1所述的数据交互处理方法,其中,所述方法还包括:The data interaction processing method according to claim 1, wherein the method further comprises:在锁定期间内,如确定所述第二服务器验证接收到的第二数据凭证有效,确定所述第一终端对所述第一数据凭证的交互请求成功;如确定所述第二服务器验证接收到的第二数据凭证无效或者所述第二服务器未接收到第二数据凭证,则解锁所述第一数据凭证。During the locking period, if it is determined that the second server verifies that the received second data credential is valid, determining that the first terminal's interaction request for the first data credential is successful; if it is determined that the second server is verified to be received The second data credential is invalid or the second server does not receive the second data credential, and the first data credential is unlocked.
- 根据权利要求1所述的数据交互处理方法,其中,所述生成第二数据凭证的请求信息至少包含所述第一数据/数值和所述第一终端的用户信息。The data interaction processing method according to claim 1, wherein the request information for generating the second data voucher includes at least the first data/value and user information of the first terminal.
- 根据权利要求3所述的数据交互处理方法,其中,所述第一服务器检测到第一终端或第二服务器发送生成第二数据凭证的请求信息的步骤之前,所述方法还包括:The data interaction processing method according to claim 3, wherein the method further comprises: before the step of the first server or the second server transmitting the request information for generating the second data credential, the method further comprising:所述第一服务器接收到所述第一终端发送的第一数据凭证的交互请求时,指示所述第二服务器向所述第三服务器发出所述生成第二数据凭证的请求信息。When the first server receives the interaction request of the first data credential sent by the first terminal, the first server instructs the second server to send the request information for generating the second data credential to the third server.
- 根据权利要求3所述的数据交互处理方法,其中,所述第一服务器检测到第一终端或第二服务器发送生成第二数据凭证的请求信息的步骤之前,所述方法还包括:The data interaction processing method according to claim 3, wherein the method further comprises: before the step of the first server or the second server transmitting the request information for generating the second data credential, the method further comprising:所述第一终端向所述第一服务器发送对所述第一数据凭证的交互请求时,向所述第三服务器发送所述生成第二数据凭证的请求信息。When the first terminal sends an interaction request for the first data credential to the first server, the request information for generating the second data credential is sent to the third server.
- 根据权利要求1至5任意一项所述的数据交互处理方法,其中,所述锁定第一数据凭证的方式为在预定时间内隐藏所述第一数据凭证地址信息或修改所述第一数据凭证地址信息的访问权限。The data interaction processing method according to any one of claims 1 to 5, wherein the method of locking the first data voucher is to hide the first data voucher address information or modify the first data voucher within a predetermined time. Access to address information.
- 一种服务器,其中,所述服务器包括:A server, wherein the server comprises:检测模块,用于检测到第一终端或第二服务器发送生成第二数据凭证的请求信息;a detecting module, configured to detect, by the first terminal or the second server, request information for generating a second data credential;锁定模块,用于根据所述生成第二数据凭证的请求信息锁定第一数据凭证,以在锁定期间内拒绝接收其他终端用户发送的对所述第一数据凭证的交互请求;a locking module, configured to lock the first data credential according to the request information for generating the second data credential, to refuse to receive an interaction request for the first data credential sent by another terminal user during the locking period;其中,所述第一数据凭证由所述第一服务器生成并关联第二服务器,且包含有第一数据/数值;以及The first data credential is generated by the first server and associated with the second server, and includes a first data/value;所述第二数据凭证为第三服务器收到所述生成第二数据凭证的请求信息后锁定所述第一终端账户中与所述第一数据/数值大小相等的数据值而生成,并由所述第二服务器接收。The second data credential is generated after the third server receives the request information for generating the second data credential and locks the data value in the first terminal account that is equal to the first data/value. The second server receives.
- 根据权利要求6所述的服务器,其中,还包括执行模块,用于在锁定期间内,如确定所述第二服务器验证接收到的第二数据凭证有效时,确定所述第一终端对所述第一数据凭证的交互请求成功;还用于在锁定期间内确定所述第二服务器验证接收到的第二数据凭证无效或者所述第二服务器未接收到第二数据凭证时,解锁所述第一数据凭证。The server according to claim 6, further comprising an execution module, configured to determine, during the locking period, that the second terminal verifies that the received second data credential is valid, The interaction request of the first data credential is successful; and is further configured to: when it is determined that the second server verifies that the received second data credential is invalid during the locking period or the second server does not receive the second data credential, unlocking the first A data voucher.
- 根据权利要求6所述的服务器,其中,所述生成第二数据凭证的请求信息至少包含所述第一数据/数值和所述第一终端的用户信息。The server according to claim 6, wherein said request information for generating a second data voucher includes at least said first data/value and user information of said first terminal.
- 根据权利要求9所述的服务器,其中,所述服务器还包括指示模块,用于在接收到所述第一终端发送的第一数据凭证的交互请求时,指示所述第二服务器向第三服务器发出所述生成第二数据凭证的请求信息。The server according to claim 9, wherein the server further comprises an indication module, configured to instruct the second server to the third server when receiving the interaction request of the first data credential sent by the first terminal The request information for generating the second data credential is issued.
- 一种终端设备,其中,所述设备包括:A terminal device, wherein the device includes:一个或多个处理器;One or more processors;存储器;以及Memory;一个或多个程序,其中,所述一个或多个程序被存储在所述存储器中并被配置为被所述一个或多个处理器执行,所述一个或多个程序包括指令,所述指令用于:One or more programs, wherein the one or more programs are stored in the memory and configured to be executed by the one or more processors, the one or more programs comprising instructions Used for:检测到第一终端或第二服务器发送生成第二数据凭证的请求信息;Detecting that the first terminal or the second server sends the request information for generating the second data credential;根据所述生成第二数据凭证的请求信息锁定第一数据凭证,以在锁定期间内拒绝接收其他终端用户发送的对所述第一数据凭证的交互请求;And locking the first data credential according to the request information for generating the second data credential to refuse to receive an interaction request for the first data credential sent by another terminal user during the locking period;其中,所述第一数据凭证由所述第一服务器生成并关联第二服务器,且包含有第一数据/数值;以及The first data credential is generated by the first server and associated with the second server, and includes a first data/value;所述第二数据凭证由第三服务器收到所述生成第二数据凭证的请求信息后锁定所述第一终端账户中与所述第一数据/数值大小相等的数据值而生成,并由所述第二服务器接收。The second data voucher is generated by the third server after the request information for generating the second data voucher is received, and the data value equal to the first data/value in the first terminal account is locked and generated. The second server receives.
- 一种线上交易方法,其中,所述方法包括:An online transaction method, wherein the method comprises:第一服务器检测到第一终端或第二服务器发送生成银信证的请求信息;The first server detects that the first terminal or the second server sends the request information for generating a silver credit card;根据所述生成银信证的请求信息锁定物信证,以在锁定期间内拒绝接收其他终端用户发送的对所述物信证的交互请求;And according to the request information for generating the silver credit, the physical evidence is locked to refuse to receive an interaction request for the physical evidence sent by another terminal user during the locking period;其中,所述物信证为所述第一服务器生成并关联第二服务器的网络电子单证,并且包含第一金额;以及Wherein the physical certificate is a network electronic document generated and associated with the second server by the first server, and includes a first amount;所述银信证为第三服务器收到所述生成银信证的请求信息后锁定所述第一终端账户中第一金额的资金而生成的,并由所述第二服务器接收。The silver credential is generated by the third server after receiving the request information for generating the silver credential and locking the first amount of funds in the first terminal account, and is received by the second server.
- 根据权利要求12所述的线上交易方法,其中,所述方法还包括:The online transaction method of claim 12, wherein the method further comprises:在锁定期间内,如确定所述第二服务器验证接收到的银信证有效,则确定所述第一终端对所述物信证的交互请求成功;如确定所述第二服务器验证接收到的银信证无效或者所述第二服务器未接收到银信证,则解锁所述物信证。During the locking period, if it is determined that the second server verifies that the received silver credit is valid, determining that the first terminal's interaction request for the physical credential is successful; and determining that the second server verifies the received If the silver certificate is invalid or the second server does not receive the silver certificate, the material certificate is unlocked.
- 根据权利要求12所述的线上交易方法,其中,所述生成银信证的请求信息至少包含所述第一金额所述第一终端的用户信息。The online transaction method according to claim 12, wherein said request information for generating a silver credit includes at least said first amount of user information of said first terminal.
- 根据权利要求14所述的线上交易方法,其中,所述第一服务器检测到第一终端或第二服务器发出生成银信证的请求信息的步骤之前,所述方法还包括:The online transaction method according to claim 14, wherein before the step of the first server or the second server detecting the request information for generating a silver credit, the method further comprises:所述第一服务器接收到所述第一终端发送的物信证的交互请求时,指示所述第二服务器向所述第三服务器发出所述生成银信证的请求信息。When the first server receives the interaction request of the physical certificate sent by the first terminal, the first server instructs the second server to send the request information for generating the silver credit to the third server.
- 根据权利要求14所述的线上交易方法,其中,所述第一服务器检测到第一终端或第二服务器发出生成银信证的请求信息的步骤之前,所述方法还包括:The online transaction method according to claim 14, wherein before the step of the first server or the second server detecting the request information for generating a silver credit, the method further comprises:所述第一终端向所述第一服务器发送对所述第一数据凭证的交互请求时,向所述第三服务器发送所述生成第二数据凭证的请求信息。When the first terminal sends an interaction request for the first data credential to the first server, the request information for generating the second data credential is sent to the third server.
- 根据权利要求12至16任意一项所述的线上交易方法,其中,所述锁定物信证的方式为在预定时间内隐藏所述物信证地址信息或修改所述物信证地址信息的访问权限。The online transaction method according to any one of claims 12 to 16, wherein the manner of locking the evidence is to hide the material letter address information or modify the material letter address information within a predetermined time. access permission.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2015/097392 WO2017101002A1 (en) | 2015-12-15 | 2015-12-15 | Data exchange processing method, server, terminal device, and online transaction method |
CA2995918A CA2995918C (en) | 2015-12-15 | 2015-12-15 | Data exchange processing method, server, terminal device, and online transaction method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2015/097392 WO2017101002A1 (en) | 2015-12-15 | 2015-12-15 | Data exchange processing method, server, terminal device, and online transaction method |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2017101002A1 true WO2017101002A1 (en) | 2017-06-22 |
Family
ID=59055624
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2015/097392 WO2017101002A1 (en) | 2015-12-15 | 2015-12-15 | Data exchange processing method, server, terminal device, and online transaction method |
Country Status (2)
Country | Link |
---|---|
CA (1) | CA2995918C (en) |
WO (1) | WO2017101002A1 (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070214059A1 (en) * | 1999-07-06 | 2007-09-13 | Duncan Dana B | On-line interactive system and method for transacting business |
CN103827903A (en) * | 2013-03-18 | 2014-05-28 | 深圳市银信网银科技有限公司 | Internet payment method and system |
CN103827902A (en) * | 2013-03-18 | 2014-05-28 | 深圳市银信网银科技有限公司 | Method and system for Intenet payment |
CN104580085A (en) * | 2013-10-17 | 2015-04-29 | 腾讯科技(深圳)有限公司 | Business data updating method, system, client side and server |
CN104838401A (en) * | 2014-09-12 | 2015-08-12 | 深圳市银信网银科技有限公司 | Transaction system based on electronic certificate |
CN104838400A (en) * | 2014-09-12 | 2015-08-12 | 深圳市银信网银科技有限公司 | Capital receipt and payment system based on electronic certificate |
-
2015
- 2015-12-15 CA CA2995918A patent/CA2995918C/en active Active
- 2015-12-15 WO PCT/CN2015/097392 patent/WO2017101002A1/en active Application Filing
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070214059A1 (en) * | 1999-07-06 | 2007-09-13 | Duncan Dana B | On-line interactive system and method for transacting business |
CN103827903A (en) * | 2013-03-18 | 2014-05-28 | 深圳市银信网银科技有限公司 | Internet payment method and system |
CN103827902A (en) * | 2013-03-18 | 2014-05-28 | 深圳市银信网银科技有限公司 | Method and system for Intenet payment |
CN104580085A (en) * | 2013-10-17 | 2015-04-29 | 腾讯科技(深圳)有限公司 | Business data updating method, system, client side and server |
CN104838401A (en) * | 2014-09-12 | 2015-08-12 | 深圳市银信网银科技有限公司 | Transaction system based on electronic certificate |
CN104838400A (en) * | 2014-09-12 | 2015-08-12 | 深圳市银信网银科技有限公司 | Capital receipt and payment system based on electronic certificate |
Also Published As
Publication number | Publication date |
---|---|
CA2995918A1 (en) | 2017-06-22 |
CA2995918C (en) | 2023-08-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2016137307A1 (en) | Attestation by proxy | |
US11943256B2 (en) | Link detection method and apparatus, electronic device, and storage medium | |
WO2019198866A1 (en) | Method and device for providing transaction service for cryptocurrencies based on different blockchains | |
US20220271924A1 (en) | Method and apparatus for processing data request | |
WO2022108529A1 (en) | Model construction method and apparatus, and medium and electronic device | |
WO2018231495A1 (en) | Securing authorization tokens | |
WO2022001717A1 (en) | Blockchain-based user information processing method and system | |
WO2018208136A1 (en) | System and method for fraud detection | |
WO2022169012A1 (en) | Device and method for processing item sales information | |
WO2017045155A1 (en) | Processing method for obtaining target data, server, and online financing method | |
WO2017000197A1 (en) | Data interaction processing method, device and system | |
WO2017101002A1 (en) | Data exchange processing method, server, terminal device, and online transaction method | |
WO2017045154A1 (en) | Processing method for acquiring target data, server, and online funding method | |
US11502850B2 (en) | Server apparatus, client terminal, information processing system and information processing method | |
WO2017000207A1 (en) | Data interaction processing method, device and system | |
TWM583978U (en) | System of using physical carrier to store digital certificate for performing online transaction | |
WO2022057595A1 (en) | Marking information processing method and device, and storage medium | |
WO2017101008A1 (en) | Target information management method and management equipment and management server thereof | |
US11316843B1 (en) | Systems for authenticating users from a separate user interface | |
WO2017000194A1 (en) | Data interaction processing method, device and system | |
WO2017101007A1 (en) | Information processing method, server, terminal device, and online transaction method | |
WO2017000166A1 (en) | Method for establishing interaction relationship, and interaction terminal | |
WO2017000200A1 (en) | Data interaction processing method, device and system | |
WO2017000167A1 (en) | Method for establishing interaction relationship, and interaction terminal | |
WO2017000205A1 (en) | Data interaction processing method, device and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 15910475 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2995918 Country of ref document: CA |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 25/09/2018) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 15910475 Country of ref document: EP Kind code of ref document: A1 |