WO2017101002A1 - Data exchange processing method, server, terminal device, and online transaction method - Google Patents

Data exchange processing method, server, terminal device, and online transaction method Download PDF

Info

Publication number
WO2017101002A1
WO2017101002A1 PCT/CN2015/097392 CN2015097392W WO2017101002A1 WO 2017101002 A1 WO2017101002 A1 WO 2017101002A1 CN 2015097392 W CN2015097392 W CN 2015097392W WO 2017101002 A1 WO2017101002 A1 WO 2017101002A1
Authority
WO
WIPO (PCT)
Prior art keywords
server
data
credential
terminal
generating
Prior art date
Application number
PCT/CN2015/097392
Other languages
French (fr)
Chinese (zh)
Inventor
张毅
Original Assignee
深圳市银信网银科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳市银信网银科技有限公司 filed Critical 深圳市银信网银科技有限公司
Priority to PCT/CN2015/097392 priority Critical patent/WO2017101002A1/en
Priority to CA2995918A priority patent/CA2995918C/en
Publication of WO2017101002A1 publication Critical patent/WO2017101002A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions

Definitions

  • the present invention relates to the field of Internet data interaction technologies, and in particular, to a data interaction processing method, a server, a terminal device, and an online transaction method.
  • the technical problem to be solved by the present invention is to provide a data interaction processing method, a server, and a terminal device, which freeze the corresponding data credentials within a predetermined time in the process of performing data interaction to ensure the efficiency of data interaction.
  • the present invention provides a data interaction processing method, the method comprising: the first server detecting that the first terminal or the second server sends request information for generating a second data credential; and locking according to the request information for generating the second data credential a first data credential to refuse to receive an interaction request for the first data credential sent by another end user during the locking period; wherein the first data credential is generated by the first server and associated with the second server, and Included with the first data/value; and the second data credential is that the third server receives the request information for generating the second data credential and locks the first terminal account to be equal to the first data/value The data value is generated and received by the second server.
  • the present invention further provides a server, comprising: a detecting module, configured to detect that the first terminal or the second server sends request information for generating a second data credential; and a locking module, configured to generate a request for the second data credential according to the request
  • the information locks the first data credential to refuse to receive an interaction request for the first data credential sent by another end user during the locking period; wherein the first data credential is generated by the first server and associated with the second server And including the first data/value; and the second data credential is that the third server locks the first data account and the first data/value after receiving the request information for generating the second data credential Generated with equal size data values and received by the second server.
  • the present invention also provides a terminal device comprising: one or more processors; a memory; and one or more programs, wherein the one or more programs are stored in the memory and configured to be Executing the one or more processors, the one or more programs comprising instructions for: detecting that the first terminal or the second server sends request information for generating a second data credential; generating the second according to the The request information of the data credential locks the first data credential to refuse to receive an interaction request for the first data credential sent by another end user during the locking period; wherein the first data credential is generated by the first server Correlating the second server and including the first data/value; and the second data credential is locked by the third server after the request information for generating the second data credential is locked in the first terminal account and the first A data value equal to the data value is generated and received by the second server.
  • the first server when receiving the target interaction request sent by the first terminal, locks the first data credential associated with the target according to the locking rule to reject the interaction request sent by the other account for the same target. To avoid the situation where other accounts request the same target and there is an interaction conflict, waste network resources, thereby improving the efficiency of data interaction.
  • Another object of the present invention is to provide an online transaction method, including: the first server detects that the first terminal or the second server sends request information for generating a silver credit; and the request information is locked according to the generated silver credit.
  • the certificate is configured to refuse to receive an interaction request for the physical credential sent by another terminal user during the locking period; wherein the physical credential generates and associates the network electronic document of the second server with the first server, And including the first amount; and the silver credit is generated by the third server after receiving the request information for generating the silver credit, and then locking the first amount of funds in the first terminal account, and the Two servers receive.
  • the first server when receiving the target commodity/service transaction request issued by the first account, locks the electronic commitment certificate associated with the target commodity/service according to the locking rule to reject the other account for the same target commodity/ The transaction request of the service to avoid the occurrence of transaction conflicts in which other accounts request the same target goods/services, thereby increasing the success rate of the transaction.
  • FIG. 1 is a schematic flowchart of a data interaction processing method in a first embodiment of the present invention
  • FIG. 2 is a schematic flow chart of a data interaction processing method in a second embodiment of the present invention.
  • FIG. 3 is a schematic structural diagram of a server in a first embodiment of the present invention.
  • FIG. 4 is a schematic structural diagram of a server in a second embodiment of the present invention.
  • FIG. 5 is a schematic structural diagram of a terminal device according to an embodiment of the present invention.
  • FIG. 6 is a schematic flow chart of an online transaction method in an embodiment of the present invention.
  • FIG. 1 is a schematic flowchart of a method for processing interaction data of a target data according to a first embodiment of the present invention.
  • the method flow shown in the implementation manner includes:
  • Step S10 The first server detects that the first terminal or the second server sends the request information for generating the second data credential.
  • Step S11 Lock the first data credential according to the request information for generating the second data credential to refuse to receive an interaction request for the first data credential sent by another terminal user during the locking period.
  • the first data credential is generated by the first server and associated with the second server, and includes the first data/value.
  • the second data credential is generated by the third server after receiving the request information for generating the second data credential, and locking the data value equal to the first data/value in the first terminal account, and is received by the second server. .
  • FIG. 2 is a schematic flowchart of a method for processing interaction data of a target data according to a second embodiment of the present invention.
  • the method flow shown in the implementation manner includes:
  • Step S20 The first server detects that the first terminal or the second server sends the request information for generating the second data credential.
  • Step S21 Lock the first data credential according to the request information for generating the second data credential to refuse to receive an interaction request for the first data credential sent by another terminal user during the locking period.
  • the first data credential is generated by the first server and associated with the second server, and includes the first data/value.
  • the second data credential is generated by the third server after receiving the request information for generating the second data credential, and locking the data value equal to the first data/value in the first terminal account, and is received by the second server. .
  • the information of the first data credential includes a locking rule set by the first server.
  • the first server sets the locking rule when generating the first data credential, and the locking rule includes at least a locking time length of the first data credential.
  • the locked content for the first data voucher will be described in detail below.
  • the information of the first data credential is displayed for the first terminal to browse the information of the target associated with the first data credential.
  • the information of the first data credential may be address information, that is, address information in which the first data credential is stored in the first server, for example, URL information.
  • the other information of the target such as the type, format, and summary description information of the target, can be obtained from the first server by using the address information.
  • the first server When the first server receives the interaction request sent by the first terminal, the first server hides its address information or modifies the access authority of the address information, so that other accounts than the first terminal cannot send the mutual request. Therefore, when the first terminal requests an interaction, the first server prevents the other account from interacting with the first data credential by hiding the first data credential address information or modifying the access right of the first data credential address information, thereby avoiding data occurrence. Interaction conflicts, wasting network resources.
  • Step S22 During the locking period, it is determined whether the second server receives the valid second data certificate. If yes, the process proceeds to step S23. Otherwise, it proceeds to step S24.
  • Step S23 If it is determined that the second server verifies that the received second data credential is valid, determining that the interaction request of the first terminal for the first data credential is successful.
  • the identifier information of the first terminal is added to the first data credential, so as to identify the owner of the first data credential as the first terminal.
  • the first server may directly send the target to the first terminal according to the identification information of the first data credential.
  • the third server is a first terminal management server, and is capable of locking a specific data/value in the first terminal account according to the data credential generation request, and generating a corresponding credential.
  • the request information for generating the second data credential includes at least the first data/value and the user information of the first terminal, and may be sent by the second server or may be sent by the first terminal. details as follows:
  • the first terminal before the first server detects that the first terminal or the second server sends the request information for generating the second data credential, the first terminal sends an interaction request for the first data credential to the first server, to the first The three servers send request information for generating a second data credential.
  • the request for generating the second data credential sent by the first terminal is generated when the first terminal obtains the first data credential information, and the first data/value size included in the request information for generating the second data credential Can be determined based on the information of the target. That is, the second data voucher is generated by the third server in response to the generation request after the first terminal actively sends a generation request to the third server when determining that the target associated with the first data voucher needs to be interacted with.
  • the first terminal is account A
  • the target is the power-on password of the client B.
  • the account A and the client B may be devices such as a personal computer, a tablet computer, a smart phone, and the like that can perform data interaction with the server through a network.
  • the first server generates a corresponding first data credential of the client B's power-on password in advance, and displays URL information of the first data credential.
  • the account A accesses the first server
  • the information of the target is acquired by the URL information
  • the second data credential generation request is sent to the third server when it is determined that the target is needed.
  • the generation request includes information of the first data and information of the account A.
  • the third server locks the first data in the account A in response to the generation request, generates a second data voucher, and sends the second data voucher to the first server by the account A.
  • the second server verifies the second data credential according to the information of the second data credential to determine whether to accept, for example, determining the data/value size of the second data credential. Whether it is not smaller than the data/value size of the first data voucher, and accepts the second data voucher when it is determined not to be less than, and sends feedback information agreeing to accept the second data voucher to the first server. Otherwise, it is determined that the second data voucher is not accepted, and the feedback information rejecting the second data voucher is sent to the first server.
  • the first server when the first server detects that the first terminal or the second server sends the request information for generating the second data credential, the first server receives the interaction request of the first data credential sent by the first terminal, The second server is instructed to issue request information for generating a second data credential to the third server.
  • the data/value size of the required lock included in the request information for generating the second data voucher may be equal to the data/value represented by the first data voucher, that is, the data/value of the target may not be equal.
  • Step S24 If it is determined that the second server verifies that the received second data credential is invalid or the second server does not receive the second data credential, the first data credential is unlocked.
  • the unlocking the first data credential is: displaying address information of the first data credential or resetting access authority of the first data credential address information.
  • the address information of the first data credential can be displayed again when the first terminal interaction target is unsuccessful, so that other accounts can send the target interaction request to provide opportunities for other account interaction targets.
  • the first server when the first server receives the target interaction request sent by the first terminal, the first data credential associated with the target is locked according to the locking rule to reject the interaction request issued by the other account for the same target, and is locked.
  • the target interaction is determined to be successful during receipt of the second data credential associated with the first terminal account, and the first data credential is unlocked when the second data credential is not received during the lock, thereby providing an opportunity for other accounts to request interaction with the target. Therefore, when the target is requested to interact with the first terminal, the first data credential is locked, thereby solving the technical problem that other accounts request the same target and the interaction conflicts, waste network resources, thereby improving the efficiency of data interaction.
  • the target in the above embodiment may also be text data, audio data, video data, program data, or capital data in the financial field.
  • audio data such as a song
  • the first terminal may be a client with a multimedia playing function, such as a mobile phone
  • the first server is a music search platform
  • the second and third servers are music website servers.
  • FIG. 3 is a schematic structural diagram of a server according to a first embodiment of the present invention.
  • the server 30 shown in this embodiment is a first server, and includes a detecting module 31 and a locking module 32.
  • the detecting module 31 is configured to detect whether the first terminal or the second server sends the request information for generating the second data credential during the locking period.
  • the locking module 32 is configured to lock the first data credential according to the request information for generating the second data credential to refuse to receive the interaction request for the first data credential sent by the other end user during the locking period.
  • the first data credential is generated by the first server and associated with the second server, and includes the first data/value.
  • the second data credential is generated after the third server receives the request information for generating the second data credential and locks the data value equal to the first data/value in the first terminal account, and is received by the second server.
  • FIG. 4 is a schematic structural diagram of a server according to a second embodiment of the present invention.
  • the server 40 shown in this embodiment is a first server, and includes a detection module 41, a locking module 42, and an execution module 43.
  • the detecting module 41 is configured to detect that the first terminal or the second server sends the request information for generating the second data credential.
  • the locking module 42 is configured to lock the first data credential according to the request information for generating the second data credential to refuse to receive the interaction request for the first data credential sent by the other end user during the locking period.
  • the first data credential is generated by the first server and associated with the second server, and includes the first data/value.
  • the second data credential is generated after the third server receives the request information for generating the second data credential and locks the data value equal to the first data/value in the first terminal account, and is received by the second server.
  • the information of the first data credential includes a locking rule set by the first server.
  • the first server sets the locking rule when generating the first data credential, and the locking rule includes at least a locking time length of the first data credential.
  • the information of the first data credential is displayed for the first terminal to browse the information of the target.
  • the information of the first data voucher may be address information, that is, address information in which the first data voucher is stored in the server 40, for example, URL information.
  • address information that is, address information in which the first data voucher is stored in the server 40, for example, URL information.
  • other information of the target such as description information such as the type, format, and abstract of the target, can be obtained from the server 40 through the address information.
  • the locking module 42 when receiving the target interaction request sent by the first terminal, the locking module 42 hides its address information or modifies the access authority of its address information, so that other accounts than the first terminal cannot send the target interaction request.
  • the execution module 43 is configured to determine whether the second server receives a valid second data credential during the locking period. If it is determined that the second server verifies that the received second data credential is valid, determining that the interaction request of the first terminal for the first data credential is successful. The first data credential is unlocked when it is determined during the lock period that the second server verifies that the received second data credential is invalid or the second server does not receive the second data credential.
  • the executing module 43 unlocks the first data credential: displaying address information of the first data credential or resetting access authority of the first data credential address information.
  • the third server is a first terminal management server, and is capable of locking a specific data/value in the first terminal account according to the data credential generation request, and generating a corresponding credential.
  • the request information for generating the second data credential includes at least the first data/value and the user information of the first terminal, and may be sent by the second server or may be sent by the first terminal.
  • the server 40 also includes an indication module 44.
  • the indicating module 44 is configured to instruct the second server to send the third server to the third server when receiving the interaction request of the first data credential sent by the first terminal. Generate request information for the second data credential.
  • the second data credential is generated by the third server in response to the request to acquire the second data credential to lock the first data/value in the first terminal account. That is, the second data credential is generated by the first server requesting the third data server according to the first data credential after the first terminal sends the target interaction request to the first server.
  • the server 40 when the locking module 42 locks the first data credential, the server 40 further receives the second data credential sent by the first terminal, and sends the second data credential to the second server.
  • the second data credential is generated by the third server in response to the request of the first terminal to lock the first data/value in the first terminal account.
  • the request of the first terminal is: when the first terminal sends a target interaction request to the first server, the second data credential request is sent to the third server according to the information of the target.
  • the first data/value size included in the second data voucher generation request may be determined according to the information of the target. That is, the second data credential is that the first terminal actively sends a generation request to the third server when it is determined that the target needs to be exchanged, and is generated by the third server in response to the generation request.
  • the data/value size of the required lock included in the request information for generating the second data voucher may be equal to the data/value represented by the first data voucher, that is, the data/value of the target may not be equal.
  • the executing module 43 is further configured to add the identifier information of the first terminal to the first data credential, so as to identify the owner of the first data credential as the first terminal. .
  • FIG. 5 is a schematic structural diagram of a terminal device according to an embodiment of the present invention.
  • the terminal device 50 in this embodiment is a first server.
  • the terminal device 50 includes a receiver 51, a processor 52, a transmitter 53, a read only memory 54, a random access memory 55, and a bus 56.
  • the receiver 51 is for receiving data.
  • the processor 52 controls the operation of the terminal device 50, and the processor 52 can also become a CPU (Central Processing Unit, central processing unit).
  • the processor 52 may be an integrated circuit chip with signal processing capabilities.
  • Processor 52 can also be a general purpose processor, digital signal processor (DSP), application specific integrated circuit (ASIC), off-the-shelf programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic device, discrete hardware component .
  • DSP digital signal processor
  • ASIC application specific integrated circuit
  • FPGA off-the-shelf programmable gate array
  • the general purpose processor may be a microprocessor or the processor or any conventional processor or the like.
  • the transmitter 53 is for transmitting data.
  • the memory can include read only memory 54 and random access memory 55 and provide instructions and data to processor 52.
  • a portion of the memory may also include non-volatile random access memory (NVRAM).
  • NVRAM non-volatile random access memory
  • the various components of the terminal device 50 are coupled together by a bus 56.
  • the bus 56 may include, in addition to the data bus, a power bus, a control bus, a status signal bus, and the like. However, for clarity of description, various buses are labeled as bus 56 in the figure.
  • the memory stores the following elements, executable modules or data structures, or a subset of them, or their extended set:
  • Operation instructions include various operation instructions for implementing various operations.
  • Operating system Includes a variety of system programs for implementing various basic services and handling hardware-based tasks.
  • the processor 52 performs the following operations by calling an operation instruction stored in the memory, which can be stored in the operating system:
  • the first terminal or the second server sends the request information for generating the second data credential.
  • the first data credential is locked according to the request information for generating the second data credential to refuse to receive an interaction request for the first data credential sent by the other end user during the lock period.
  • the first data credential is generated by the server 50 and associated with the second server, and includes the first data/value.
  • the second data credential is generated by the third server after receiving the request information for generating the second data credential and then locking the data value equal to the first data/value in the first terminal account, and is received by the second server.
  • the information of the first data voucher includes a locking rule set by the server 50.
  • the server 50 sets the locking rule when generating the first data credential, the locking rule including at least the locking time length of the first data credential.
  • the processor 52 locks the first data credential according to the locking rule in response to the target interaction request sent by the first terminal, to refuse to receive the target interaction request sent by the other account during the locking, and send the obtained request to the second server. The request for the second data voucher.
  • the processor 52 detects that the first terminal or the second server sends the request for generating the second data credential, and the third terminal sends the request for the interaction of the first data credential to the server 50 to the third
  • the server sends request information for generating a second data credential.
  • the request for generating the second data credential by the first terminal is generated by the first terminal when acquiring the first data credential information, and the first data/value value included may be determined according to the information of the target. That is, the second data credential is that the first terminal actively sends a generation request to the third server when it is determined that the target needs to be exchanged, and is generated by the third server in response to the generation request.
  • the second server determines whether to accept according to the information of the second data credential, for example, determining whether the data/value value of the second data credential is not less than the data/value of the first data credential. The size, and accepting the second data credential when the determination is not less than, and sending feedback information to the server 50 agreeing to accept the second data credential. Otherwise, it is determined that the second data voucher is not accepted, and the server 50 is sent feedback information rejecting the second data voucher.
  • the server 50 before the server 50 detects that the first terminal or the second server sends the request information for generating the second data credential, the server 50 receives the interaction request of the first data credential sent by the first terminal, The second server is instructed to issue request information for generating a second data credential to the third server.
  • FIG. 6 is a schematic flowchart diagram of an online transaction method according to a first embodiment of the present invention.
  • the method flow shown in the implementation manner includes:
  • Step S60 The first server detects that the first terminal or the second server sends the request information for generating a silver credit.
  • the physical evidence is a network electronic document generated by the first server and associated with the second server, and includes a first amount.
  • the silver credit card is generated by the third server receiving the request information for generating the silver credit card and then locking the first amount of funds in the first terminal account, and is received by the second server.
  • the material certificate is a network electronic document that integrates the essential functions of the target goods/services e-commerce, and includes a locking rule set by the first server.
  • the first server sets the locking rule when generating the material credential, and the locking rule is used to define a locking time length of the physical credential.
  • the information of the material certificate is displayed for the first terminal to browse the information of the target goods/services.
  • the information of the physical evidence may be address information, that is, address information stored in the first server, such as URL information.
  • address information stored in the first server, such as URL information.
  • other information about the target product/service such as a description of the category and function description of the target product, can be obtained from the first server through the address information.
  • the first server When the physical evidence is locked, the first server hides its address information or modifies the access rights of its address information, so that other accounts than the first terminal cannot obtain their address information, thereby browsing the information of the target goods/services. Therefore, when the first terminal requests the transaction target goods/services, the situation of the transaction conflict occurs by hiding the information of the address information to prevent other accounts from requesting the same target goods/services.
  • step S62 during the lock period, it is determined whether the second server receives a valid silver certificate, and if yes, proceeds to step S63; otherwise, proceeds to step S64.
  • the silver credit card is generated by the third server freezing the first amount of funds in the user account of the first terminal.
  • step S63 it is determined that the target goods/service transaction associated with the physical terminal is successful. Then the process ends.
  • the third server is the first terminal money management server, and can freeze the specific amount of funds in the user account of the first terminal according to the request for generating the silver credit, and generate a corresponding silver credit card.
  • the silver credit generation request includes the required amount of the frozen funds and the information of the first terminal, and may be sent by the second server or by the first terminal. details as follows:
  • the first terminal before the first server detects that the first terminal or the second server sends the request information for generating the silver credential, the first terminal sends an interaction request for the physical credential to the first server to the third server.
  • Send request information for generating a silver certificate The request for generating the silver credit card by the first terminal is: when the first terminal sends a transaction request for the target commodity/service to the first server, the silver credit certificate generation request is sent to the third server according to the information of the target commodity/service. .
  • the first credit size included in the silver credit generation request may be determined according to the information of the target commodity/service. That is, the silver credit card is that the first terminal actively sends a generation request to the third server when it is determined that the target commodity/service needs to be traded, and is generated by the third server in response to the generation request.
  • the amount of funds required to be frozen in the silver credit generation request may be equal to the amount of funds represented by the physical evidence, that is, the funds required to purchase the target goods/services may also be unequal.
  • the silver credit is generated by the third server in response to the request to obtain the silver credit to freeze the first amount of funds in the first terminal account. That is, the silver credential is generated by the first server requesting the third server according to the physical credential after the first terminal sends the target merchandise/service transaction request to the first server.
  • the first server before the first server detects that the first terminal or the second server sends the request information for generating the silver credential, the first server receives the interaction request of the physical credential sent by the first terminal, and indicates the second The server sends a request message for generating a silver credit to the third server.
  • step S64 during the locking period, it is determined that the second server does not receive the silver credit or does not receive a valid silver credit, and unlocks the physical evidence. Then the process ends.
  • the unlocker is: the access right of the address information of the display letter or the reset letter address information.
  • the address information of the material certificate can be displayed again, so that other accounts can obtain the address information and browse the information of the target goods/services, and provide the target goods/services for other accounts. opportunity.
  • the second server After receiving the silver letter certificate, the second server determines whether to accept according to the information of the bank letter certificate, for example, determining whether the fund value of the bank letter is not smaller than the fund value of the material certificate, and accepting when determining that the value is not less than
  • the bank letter is sent to the first server to agree to accept the feedback information of the bank letter; otherwise, it is determined not to accept the bank letter, and sends a feedback message rejecting the bank letter to the first server.
  • the first server when the first server receives the target commodity/service transaction request sent by the first terminal, the physical evidence associated with the target commodity/service is locked according to the locking rule to reject the other account for the same target commodity/service.
  • Transaction request and when the valid silver certificate with the first terminal is received during the lockout period, the target goods/service transaction is determined to be successful, and the valid letter is not received during the lockout period, thereby requesting the transaction for other accounts.
  • the target goods/services provide opportunities. Therefore, when the target goods/services are requested by the first terminal, the material trust is locked, thereby solving the technical problem of the transaction conflicts that other accounts request for the same target goods/services, thereby improving the success rate of the transactions.
  • the user of the first terminal is a buyer
  • the first server is a physical evidence generation system server
  • the second server is a fund management server for receiving a silver credit card
  • the third server is a user account fund management server of the first terminal.
  • the second and third servers may be system servers of the same bank or different banks.
  • the first server pre-configures the locking rule and the second server information for receiving the silver credit, and generates a physical certificate associated with the target commodity/service. Further, the first terminal may also preset third server information for generating a silver credit in the user account.
  • the first server After the first server generates the material certificate, the first server issues a material certificate through the Internet in the form of a URL.
  • the user of the first terminal browses the material credential information through the URL published by the Internet, and issues a transaction request when confirming the purchase of the target commodity/service associated with the physical credential.
  • the first server determines whether the transaction is successful according to the receipt of the silver certificate of the second server within a predetermined time, and the second server receives the silver credit certificate as follows:
  • the third server when the first terminal issues a transaction request, the third server sends a corresponding silver credit according to the request for generating a silver credit issued by the third server, and the silver credit can only fill in the buyer information.
  • the amount may also include the number of the physical certificate, the second server information for receiving the silver certificate.
  • the first terminal sends the request information for generating the silver credential to the first server, and the first server starts timing and locks the physical credential when receiving the request information for generating the silver credential.
  • the locked material certificate can no longer be purchased (for example, the URL information is not displayed but only the first server is displayed or no purchase authority is displayed).
  • the silver credit card After the silver credit card is generated, it is sent by the first terminal to the first server, and the first server sends the silver credit card, the physical credit number, the second server information for receiving the silver credit card, and the amount of the payment to the second server, The second server verifies whether the silver credential is valid, and receives the silver credential issued by the third server and sends and receives the information to the first server when the confirmation is valid.
  • the first server issues a request for generating a silver credential to the second server according to the transaction request, and starts timing to issue a credential credential when the request for generating the silver credential is issued.
  • the request for generating the silver credit includes transaction information such as the second server information, the physical evidence number, the physical certificate price, and the physical information lock time.
  • the second server receives the generation request of the silver credit to the third server, and the third server receives the generation request to issue the silver credit. Then, the second server automatically receives the silver certificate issued by the third server and sends and receives the information to the first server.
  • the first server determines that the second server receives the silver credit within a predetermined time, the transaction is successful, and the physical evidence status is changed to the purchased state, and Notify the first terminal that the transaction is reached. Otherwise, the first server unlocks the letter, notifies the first terminal that the transaction has failed, and displays the material certificate so that it can re-issue or modify the material certificate for purchase to make it available for purchase by the account user on the Internet.
  • the second server that is associated with the first server is instructed to send an offer to the third server associated with the first terminal, requesting to issue the amount of the information certificate.
  • the bank’s letter of credit at the same time, locks the material certificate, which better reflects the sincerity of the buyers and sellers.

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Development Economics (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

An acquired data exchange processing method, a server, and an online transaction method, the data exchange processing method comprising: a first server detects a request message sent by a first terminal or a second server to generate a second electronic certificate (S10, S20); on the basis of the request message to generate a second electronic certificate, locking a first electronic certificate, and during the locked period, rejecting the receipt of an exchange request for a first electronic certificate sent by the user of another terminal (S11, S21). The first electronic certificate is generated by the first server and associated with a second server, and comprises a first data/value; and the second electronic certificate is generated when a third server, after receiving the request message to generate a second electronic certificate, locks the data values in a first terminal account greater than, equal to, or less than the first data/value, then is received by the second server. The present invention can avoid the occurrence of exchange conflict and network resource wastage due to other terminals requesting the same target, thereby improving the efficiency of data exchange.

Description

数据交互处理方法、服务器、终端设备及线上交易方法 Data interaction processing method, server, terminal device and online transaction method
【技术领域】[Technical Field]
本发明涉及互联网数据交互技术领域,特别是涉及一种数据交互处理方法、服务器、终端设备以及线上交易方法。The present invention relates to the field of Internet data interaction technologies, and in particular, to a data interaction processing method, a server, a terminal device, and an online transaction method.
【背景技术】 【Background technique】
随着互联网技术尤其是移动互联网技术的发展,用户可以通过移动设备使用2G、3G、4G或wifi等方式连接互联网进行交易、社交等活动,通过互联网技术用户可以方便有效地进行线上活动,这是线下无法比拟的体验。With the development of Internet technologies, especially mobile Internet technologies, users can use the 2G, 3G, 4G or wifi to connect to the Internet for transactions, social activities, etc. Through Internet technology users can conveniently and effectively carry out online activities. It is an incomparable experience offline.
但是,用户通过移动互联网进行交易、社交等活动时,常常出现多个不同账户用户同时请求访问同一数据或信息的情况,这样可能会导致网络拥堵,降低数据交互效率。However, when a user conducts transactions, social activities, etc. through the mobile Internet, it often happens that multiple different account users request access to the same data or information at the same time, which may cause network congestion and reduce data interaction efficiency.
【发明内容】  [Summary of the Invention]
本发明主要解决的技术问题是提供一种数据交互处理方法、服务器和终端设备,在进行数据交互的过程中的预定时间内冻结相应的数据凭证以保证数据交互的效率。The technical problem to be solved by the present invention is to provide a data interaction processing method, a server, and a terminal device, which freeze the corresponding data credentials within a predetermined time in the process of performing data interaction to ensure the efficiency of data interaction.
本发明提供了一种数据交互处理方法,所述方法包括:第一服务器检测到第一终端或第二服务器发送生成第二数据凭证的请求信息;根据所述生成第二数据凭证的请求信息锁定第一数据凭证,以在锁定期间内拒绝接收其他终端用户发送的对所述第一数据凭证的交互请求;其中,所述第一数据凭证由所述第一服务器生成并关联第二服务器,且包含有第一数据/数值;以及所述第二数据凭证为第三服务器收到所述生成第二数据凭证的请求信息后锁定所述第一终端账户中与所述第一数据/数值大小相等的数据值而生成,并由所述第二服务器接收。The present invention provides a data interaction processing method, the method comprising: the first server detecting that the first terminal or the second server sends request information for generating a second data credential; and locking according to the request information for generating the second data credential a first data credential to refuse to receive an interaction request for the first data credential sent by another end user during the locking period; wherein the first data credential is generated by the first server and associated with the second server, and Included with the first data/value; and the second data credential is that the third server receives the request information for generating the second data credential and locks the first terminal account to be equal to the first data/value The data value is generated and received by the second server.
本发明还提供了一种服务器,包括:检测模块,用于检测到第一终端或第二服务器发送生成第二数据凭证的请求信息;锁定模块,用于根据所述生成第二数据凭证的请求信息锁定第一数据凭证,以在锁定期间内拒绝接收其他终端用户发送的对所述第一数据凭证的交互请求;其中,所述第一数据凭证由所述第一服务器生成并关联第二服务器,且包含有第一数据/数值;以及所述第二数据凭证为第三服务器收到所述生成第二数据凭证的请求信息后锁定所述第一终端账户中与所述第一数据/数值大小相等的数据值而生成,并由所述第二服务器接收。The present invention further provides a server, comprising: a detecting module, configured to detect that the first terminal or the second server sends request information for generating a second data credential; and a locking module, configured to generate a request for the second data credential according to the request The information locks the first data credential to refuse to receive an interaction request for the first data credential sent by another end user during the locking period; wherein the first data credential is generated by the first server and associated with the second server And including the first data/value; and the second data credential is that the third server locks the first data account and the first data/value after receiving the request information for generating the second data credential Generated with equal size data values and received by the second server.
本发明还提供了一种终端设备,包括:一个或多个处理器;存储器;以及一个或多个程序,其中,所述一个或多个程序被存储在所述存储器中并被配置为被所述一个或多个处理器执行,所述一个或多个程序包括指令,所述指令用于:检测到第一终端或第二服务器发送生成第二数据凭证的请求信息;根据所述生成第二数据凭证的请求信息锁定第一数据凭证,以在锁定期间内拒绝接收其他终端用户发送的对所述第一数据凭证的交互请求;其中,所述第一数据凭证由所述第一服务器生成并关联第二服务器,且包含有第一数据/数值;以及所述第二数据凭证由第三服务器收到所述生成第二数据凭证的请求信息后锁定所述第一终端账户中与所述第一数据/数值大小相等的数据值而生成,并由所述第二服务器接收。The present invention also provides a terminal device comprising: one or more processors; a memory; and one or more programs, wherein the one or more programs are stored in the memory and configured to be Executing the one or more processors, the one or more programs comprising instructions for: detecting that the first terminal or the second server sends request information for generating a second data credential; generating the second according to the The request information of the data credential locks the first data credential to refuse to receive an interaction request for the first data credential sent by another end user during the locking period; wherein the first data credential is generated by the first server Correlating the second server and including the first data/value; and the second data credential is locked by the third server after the request information for generating the second data credential is locked in the first terminal account and the first A data value equal to the data value is generated and received by the second server.
以上的数据交互处理方法中,第一服务器在接收到第一终端发出的目标交互请求时,按照锁定规则将目标关联的第一数据凭证锁定,以拒绝其他账户发出的针对该同一目标的交互请求,避免出现其他账户请求同一目标而出现交互冲突的情况,浪费网络资源,以此提高数据交互的效率。In the above data interaction processing method, when receiving the target interaction request sent by the first terminal, the first server locks the first data credential associated with the target according to the locking rule to reject the interaction request sent by the other account for the same target. To avoid the situation where other accounts request the same target and there is an interaction conflict, waste network resources, thereby improving the efficiency of data interaction.
本发明的另一目的在于提供一种线上交易方法,包括:第一服务器检测到第一终端或第二服务器发送生成银信证的请求信息;根据所述生成银信证的请求信息锁定物信证,以在锁定期间内拒绝接收其他终端用户发送的对所述物信证的交互请求;其中,所述物信证为所述第一服务器生成并关联第二服务器的网络电子单证,并且包含第一金额;以及所述银信证为第三服务器收到所述生成银信证的请求信息后锁定所述第一终端账户中第一金额的资金而生成的,并由所述第二服务器接收。Another object of the present invention is to provide an online transaction method, including: the first server detects that the first terminal or the second server sends request information for generating a silver credit; and the request information is locked according to the generated silver credit. The certificate is configured to refuse to receive an interaction request for the physical credential sent by another terminal user during the locking period; wherein the physical credential generates and associates the network electronic document of the second server with the first server, And including the first amount; and the silver credit is generated by the third server after receiving the request information for generating the silver credit, and then locking the first amount of funds in the first terminal account, and the Two servers receive.
以上线上交易方法,第一服务器在接收到第一账户发出的目标商品/服务交易请求时,按照锁定规则将目标商品/服务关联的电子承诺凭证锁定,以拒绝其他账户针对该同一目标商品/服务的交易请求,以避免出现其他账户请求同一目标商品/服务而出现的交易冲突的情况,从而提高交易的成功率。 In the above online transaction method, when receiving the target commodity/service transaction request issued by the first account, the first server locks the electronic commitment certificate associated with the target commodity/service according to the locking rule to reject the other account for the same target commodity/ The transaction request of the service to avoid the occurrence of transaction conflicts in which other accounts request the same target goods/services, thereby increasing the success rate of the transaction.
【附图说明】 [Description of the Drawings]
图1是本发明第一实施方式中的一种数据交互处理方法的流程示意图;1 is a schematic flowchart of a data interaction processing method in a first embodiment of the present invention;
图2是本发明第二实施方式中的一种数据交互处理方法的流程示意图;2 is a schematic flow chart of a data interaction processing method in a second embodiment of the present invention;
图3是本发明第一实施方式中的服务器的结构示意图;3 is a schematic structural diagram of a server in a first embodiment of the present invention;
图4是本发明第二实施方式中的服务器的结构示意图;4 is a schematic structural diagram of a server in a second embodiment of the present invention;
图5是本发明实施方式中的终端设备的结构示意图;FIG. 5 is a schematic structural diagram of a terminal device according to an embodiment of the present invention; FIG.
图6是本发明实施方式中的一种线上交易方法的流程示意图。6 is a schematic flow chart of an online transaction method in an embodiment of the present invention.
【具体实施方式】【detailed description】
下面将结合本发明实施方式中的附图,对本发明实施方式中的技术方案进行清楚、完整地描述,显然,所描述的实施方式仅仅是本发明一部分实施方式,而不是全部的实施方式。基于本发明中的实施方式,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施方式,均属于本发明保护的范围。The technical solutions in the embodiments of the present invention are clearly and completely described in the following with reference to the accompanying drawings in the embodiments of the present invention. It is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all embodiments. All other embodiments obtained by those skilled in the art based on the embodiments of the present invention without creative efforts are within the scope of the present invention.
请参阅图1,为本发明第一实施方式的一种目标数据的交互处理方法的流程示意图,该实施方式示出的方法流程包括:FIG. 1 is a schematic flowchart of a method for processing interaction data of a target data according to a first embodiment of the present invention. The method flow shown in the implementation manner includes:
步骤S10,第一服务器检测到第一终端或第二服务器发送生成第二数据凭证的请求信息。Step S10: The first server detects that the first terminal or the second server sends the request information for generating the second data credential.
步骤S11,根据该生成第二数据凭证的请求信息锁定第一数据凭证,以在锁定期间内拒绝接收其他终端用户发送的对该第一数据凭证的交互请求。Step S11: Lock the first data credential according to the request information for generating the second data credential to refuse to receive an interaction request for the first data credential sent by another terminal user during the locking period.
其中,该第一数据凭证由该第一服务器生成并关联第二服务器,且包含有第一数据/数值。该第二数据凭证为第三服务器收到该生成第二数据凭证的请求信息后锁定该第一终端账户中与该第一数据/数值大小相等的数据值而生成,并由该第二服务器接收。The first data credential is generated by the first server and associated with the second server, and includes the first data/value. The second data credential is generated by the third server after receiving the request information for generating the second data credential, and locking the data value equal to the first data/value in the first terminal account, and is received by the second server. .
请参阅图2,为本发明第二实施方式的一种目标数据的交互处理方法的流程示意图,该实施方式示出的方法流程包括:2 is a schematic flowchart of a method for processing interaction data of a target data according to a second embodiment of the present invention. The method flow shown in the implementation manner includes:
步骤S20,第一服务器检测到第一终端或第二服务器发送生成第二数据凭证的请求信息。Step S20: The first server detects that the first terminal or the second server sends the request information for generating the second data credential.
步骤S21,根据该生成第二数据凭证的请求信息锁定第一数据凭证,以在锁定期间内拒绝接收其他终端用户发送的对该第一数据凭证的交互请求。Step S21: Lock the first data credential according to the request information for generating the second data credential to refuse to receive an interaction request for the first data credential sent by another terminal user during the locking period.
其中,该第一数据凭证由该第一服务器生成并关联第二服务器,且包含有第一数据/数值。该第二数据凭证为第三服务器收到该生成第二数据凭证的请求信息后锁定该第一终端账户中与该第一数据/数值大小相等的数据值而生成,并由该第二服务器接收。The first data credential is generated by the first server and associated with the second server, and includes the first data/value. The second data credential is generated by the third server after receiving the request information for generating the second data credential, and locking the data value equal to the first data/value in the first terminal account, and is received by the second server. .
进一步地,该第一数据凭证的信息包含第一服务器设置的锁定规则。Further, the information of the first data credential includes a locking rule set by the first server.
该第一服务器在生成该第一数据凭证时设置该锁定规则,该锁定规则至少包含第一数据凭证的锁定时间长度。有关于第一数据凭证的锁定内容将在下文进行详细介绍。The first server sets the locking rule when generating the first data credential, and the locking rule includes at least a locking time length of the first data credential. The locked content for the first data voucher will be described in detail below.
具体地,当第一服务器生成第一数据凭证时,显示该第一数据凭证的信息以供第一终端浏览与该第一数据凭证关联的目标的信息。该第一数据凭证的信息可以是地址信息,即,第一数据凭证保存在第一服务器中的地址信息,例如,URL信息。第一终端登陆并访问第一服务器时,通过该地址信息能够从第一服务器中获得该目标的其他信息,如,目标的类型、格式、摘要等描述信息。Specifically, when the first server generates the first data credential, the information of the first data credential is displayed for the first terminal to browse the information of the target associated with the first data credential. The information of the first data credential may be address information, that is, address information in which the first data credential is stored in the first server, for example, URL information. When the first terminal logs in and accesses the first server, the other information of the target, such as the type, format, and summary description information of the target, can be obtained from the first server by using the address information.
当第一服务器收到第一终端发送的交互请求时,第一服务器隐藏其地址信息或修改其地址信息的访问权限,使得除第一终端以外的其他账户不能够发送互请求。因此,在第一终端请求交互,第一服务器通过隐藏第一数据凭证地址信息的方式或修改第一数据凭证地址信息的访问权限以防止其他账户对该第一数据凭证请求交互,从而避免出现数据交互冲突,浪费网络资源的情况。When the first server receives the interaction request sent by the first terminal, the first server hides its address information or modifies the access authority of the address information, so that other accounts than the first terminal cannot send the mutual request. Therefore, when the first terminal requests an interaction, the first server prevents the other account from interacting with the first data credential by hiding the first data credential address information or modifying the access right of the first data credential address information, thereby avoiding data occurrence. Interaction conflicts, wasting network resources.
步骤S22,在锁定期间内,判断第二服务器是否接收到有效的第二数据凭证。若是,则进入步骤S23。否则,进入步骤S24。Step S22: During the locking period, it is determined whether the second server receives the valid second data certificate. If yes, the process proceeds to step S23. Otherwise, it proceeds to step S24.
步骤S23,如确定第二服务器验证接收到的第二数据凭证有效,确定第一终端对第一数据凭证的交互请求成功。Step S23: If it is determined that the second server verifies that the received second data credential is valid, determining that the interaction request of the first terminal for the first data credential is successful.
具体地,当确定目标交互成功时,在第一数据凭证中增加第一终端的标识信息,以此来标识第一数据凭证的所有者为第一终端。Specifically, when it is determined that the target interaction is successful, the identifier information of the first terminal is added to the first data credential, so as to identify the owner of the first data credential as the first terminal.
进一步地,在第一终端确定需要目标时,第一服务器可以根据第一数据凭证的标识信息将目标直接发送至第一终端。Further, when the first terminal determines that the target is needed, the first server may directly send the target to the first terminal according to the identification information of the first data credential.
进一步地,第三服务器为第一终端管理服务器,能够根据数据凭证生成请求锁定第一终端账户中特定数据/数值,生成相应凭证。其中,生成第二数据凭证的请求信息至少包含第一数据/数值和第一终端的用户信息,且可以由第二服务器发出,也可以由第一终端发出。具体如下:Further, the third server is a first terminal management server, and is capable of locking a specific data/value in the first terminal account according to the data credential generation request, and generating a corresponding credential. The request information for generating the second data credential includes at least the first data/value and the user information of the first terminal, and may be sent by the second server or may be sent by the first terminal. details as follows:
在一实施方式中,在第一服务器检测到第一终端或第二服务器发送生成第二数据凭证的请求信息之前,第一终端向第一服务器发送对第一数据凭证的交互请求时,向第三服务器发送生成第二数据凭证的请求信息。In an embodiment, before the first server detects that the first terminal or the second server sends the request information for generating the second data credential, the first terminal sends an interaction request for the first data credential to the first server, to the first The three servers send request information for generating a second data credential.
生成在本实施方式中,第一终端发送的生成第二数据凭证的请求为第一终端在获取第一数据凭证信息时产生,该生成第二数据凭证的请求信息包含的第一数据/数值大小,可以根据目标的信息确定。即,第二数据凭证是在第一终端在确定需要交互与该第一数据凭证关联的目标时主动向第三服务器发出生成请求后,由第三服务器响应该生成请求而生成的。In the present embodiment, the request for generating the second data credential sent by the first terminal is generated when the first terminal obtains the first data credential information, and the first data/value size included in the request information for generating the second data credential Can be determined based on the information of the target. That is, the second data voucher is generated by the third server in response to the generation request after the first terminal actively sends a generation request to the third server when determining that the target associated with the first data voucher needs to be interacted with.
例如,该第一终端为账户A,目标为客户端B的开机密码。其中,账户A以及客户端B可以是个人计算机、平板电脑、智能手机等能够通过网络与服务器进行数据交互传输的设备。For example, the first terminal is account A, and the target is the power-on password of the client B. The account A and the client B may be devices such as a personal computer, a tablet computer, a smart phone, and the like that can perform data interaction with the server through a network.
第一服务器预先将客户端B的开机密码生成相应的第一数据凭证,并显示将第一数据凭证的URL信息。当账户A访问第一服务器时,通过URL信息获取目标的信息,并在确定需要该目标时向第三服务器发送第二数据凭证生成请求。其中,该生成请求包含了第一数据的信息以及账户A的信息。该第三服务器响应该生成请求锁定账户A中第一数据,生成第二数据凭证,并由账户A将该第二数据凭证发送至第一服务器。The first server generates a corresponding first data credential of the client B's power-on password in advance, and displays URL information of the first data credential. When the account A accesses the first server, the information of the target is acquired by the URL information, and the second data credential generation request is sent to the third server when it is determined that the target is needed. The generation request includes information of the first data and information of the account A. The third server locks the first data in the account A in response to the generation request, generates a second data voucher, and sends the second data voucher to the first server by the account A.
进一步地,在本实施方式中,第二服务器接收到第二数据凭证后,会根据该第二数据凭证的信息对其进行验证以确定是否接受,例如,判断第二数据凭证的数据/数值大小是否不小于第一数据凭证的数据/数值大小,并在确定不小于时接受该第二数据凭证,并向第一服务器发送同意接受该第二数据凭证的反馈信息。反之,则确定不接受该第二数据凭证,并向第一服务器发送拒绝接受该第二数据凭证的反馈信息。Further, in this embodiment, after receiving the second data credential, the second server verifies the second data credential according to the information of the second data credential to determine whether to accept, for example, determining the data/value size of the second data credential. Whether it is not smaller than the data/value size of the first data voucher, and accepts the second data voucher when it is determined not to be less than, and sends feedback information agreeing to accept the second data voucher to the first server. Otherwise, it is determined that the second data voucher is not accepted, and the feedback information rejecting the second data voucher is sent to the first server.
在另一实施方式中,在第一服务器检测到第一终端或第二服务器发送生成第二数据凭证的请求信息之前,第一服务器接收到第一终端发送的第一数据凭证的交互请求时,指示第二服务器向第三服务器发出生成第二数据凭证的请求信息。In another embodiment, when the first server detects that the first terminal or the second server sends the request information for generating the second data credential, the first server receives the interaction request of the first data credential sent by the first terminal, The second server is instructed to issue request information for generating a second data credential to the third server.
进一步地,该生成第二数据凭证的请求信息中包含的所需锁定的数据/数值大小可以与第一数据凭证所代表的数据/数值相等,即,目标的数据/数值,也可以不相等。Further, the data/value size of the required lock included in the request information for generating the second data voucher may be equal to the data/value represented by the first data voucher, that is, the data/value of the target may not be equal.
步骤S24,如确定第二服务器验证接收到的第二数据凭证无效或者第二服务器未接收到第二数据凭证,则解锁第一数据凭证。Step S24: If it is determined that the second server verifies that the received second data credential is invalid or the second server does not receive the second data credential, the first data credential is unlocked.
具体地,解锁第一数据凭证为:显示第一数据凭证的地址信息或重置第一数据凭证地址信息的访问权限。这样,在第一终端交互目标未成功时可以再次显示第一数据凭证的地址信息,使得其他账户能够发送目标交互请求,为其他账户交互目标提供机会。Specifically, the unlocking the first data credential is: displaying address information of the first data credential or resetting access authority of the first data credential address information. In this way, the address information of the first data credential can be displayed again when the first terminal interaction target is unsuccessful, so that other accounts can send the target interaction request to provide opportunities for other account interaction targets.
以上方案中,在第一服务器接收到第一终端发出的目标交互请求时,按照锁定规则将目标关联的第一数据凭证锁定,以拒绝其他账户发出的针对该同一目标的交互请求,并在锁定期间接收到与第一终端账户中关联的第二数据凭证时确定目标交互成功,而在锁定期间未接收到第二数据凭证时解锁第一数据凭证,从而为其他账户请求交互该目标提供机会。因此,在目标被第一终端请求交互时,锁定第一数据凭证,以此解决了其他账户请求同一目标而出现交互冲突,浪费网络资源的技术问题,从而提高数据交互的效率。In the above solution, when the first server receives the target interaction request sent by the first terminal, the first data credential associated with the target is locked according to the locking rule to reject the interaction request issued by the other account for the same target, and is locked. The target interaction is determined to be successful during receipt of the second data credential associated with the first terminal account, and the first data credential is unlocked when the second data credential is not received during the lock, thereby providing an opportunity for other accounts to request interaction with the target. Therefore, when the target is requested to interact with the first terminal, the first data credential is locked, thereby solving the technical problem that other accounts request the same target and the interaction conflicts, waste network resources, thereby improving the efficiency of data interaction.
进一步地,以上实施方式中的目标还可以是文字数据、音频数据、视频数据、程序数据或金融领域的资金数据等。如果是音频数据,比如歌曲,此时第一终端可以是手机等具有多媒体播放功能的客户端,第一服务器为音乐搜索平台,第二、三服务器为音乐网站服务器。Further, the target in the above embodiment may also be text data, audio data, video data, program data, or capital data in the financial field. If it is audio data, such as a song, the first terminal may be a client with a multimedia playing function, such as a mobile phone, the first server is a music search platform, and the second and third servers are music website servers.
请参阅图3,为本发明第一实施方式的服务器的结构示意图,该实施方式示出的服务器30为第一服务器,包括检测模块31和锁定模块32。FIG. 3 is a schematic structural diagram of a server according to a first embodiment of the present invention. The server 30 shown in this embodiment is a first server, and includes a detecting module 31 and a locking module 32.
该检测模块31用于在锁定期间内检测是否收到第一终端或第二服务器发送生成第二数据凭证的请求信息。The detecting module 31 is configured to detect whether the first terminal or the second server sends the request information for generating the second data credential during the locking period.
该锁定模块32用于根据生成第二数据凭证的请求信息锁定第一数据凭证,以在锁定期间内拒绝接收其他终端用户发送的对第一数据凭证的交互请求。The locking module 32 is configured to lock the first data credential according to the request information for generating the second data credential to refuse to receive the interaction request for the first data credential sent by the other end user during the locking period.
其中,第一数据凭证由第一服务器生成并关联第二服务器,且包含有第一数据/数值。第二数据凭证为第三服务器收到生成第二数据凭证的请求信息后锁定第一终端账户中与第一数据/数值大小相等的数据值而生成,并由第二服务器接收。The first data credential is generated by the first server and associated with the second server, and includes the first data/value. The second data credential is generated after the third server receives the request information for generating the second data credential and locks the data value equal to the first data/value in the first terminal account, and is received by the second server.
请参阅图4,为本发明第二实施方式中的服务器的结构示意图,该实施方式示出的服务器40为第一服务器,包括检测模块41、锁定模块42以及执行模块43。FIG. 4 is a schematic structural diagram of a server according to a second embodiment of the present invention. The server 40 shown in this embodiment is a first server, and includes a detection module 41, a locking module 42, and an execution module 43.
该检测模块41用于检测到第一终端或第二服务器发送生成第二数据凭证的请求信息。The detecting module 41 is configured to detect that the first terminal or the second server sends the request information for generating the second data credential.
该锁定模块42用于根据生成第二数据凭证的请求信息锁定第一数据凭证,以在锁定期间内拒绝接收其他终端用户发送的对第一数据凭证的交互请求。The locking module 42 is configured to lock the first data credential according to the request information for generating the second data credential to refuse to receive the interaction request for the first data credential sent by the other end user during the locking period.
其中,第一数据凭证由第一服务器生成并关联第二服务器,且包含有第一数据/数值。第二数据凭证为第三服务器收到生成第二数据凭证的请求信息后锁定第一终端账户中与第一数据/数值大小相等的数据值而生成,并由第二服务器接收。The first data credential is generated by the first server and associated with the second server, and includes the first data/value. The second data credential is generated after the third server receives the request information for generating the second data credential and locks the data value equal to the first data/value in the first terminal account, and is received by the second server.
进一步地,该第一数据凭证的信息包含第一服务器设置的锁定规则。该第一服务器在生成该第一数据凭证时设置该锁定规则,该锁定规则至少包含第一数据凭证的锁定时间长度。Further, the information of the first data credential includes a locking rule set by the first server. The first server sets the locking rule when generating the first data credential, and the locking rule includes at least a locking time length of the first data credential.
当服务器生成第一数据凭证时,显示该第一数据凭证的信息以供第一终端浏览目标的信息。该第一数据凭证的信息可以是地址信息,即,第一数据凭证保存在服务器40中的地址信息,例如,URL信息。第一终端登陆并访问服务器40时,通过该地址信息能够从服务器40中获得该目标的其他信息,如,目标的类型、格式、摘要等描述信息。When the server generates the first data credential, the information of the first data credential is displayed for the first terminal to browse the information of the target. The information of the first data voucher may be address information, that is, address information in which the first data voucher is stored in the server 40, for example, URL information. When the first terminal logs in and accesses the server 40, other information of the target, such as description information such as the type, format, and abstract of the target, can be obtained from the server 40 through the address information.
具体地,该锁定模块42在收到第一终端发送的目标交互请求时,隐藏其地址信息或修改其地址信息的访问权限,使得除第一终端以外的其他账户不能够发送目标交互请求。Specifically, when receiving the target interaction request sent by the first terminal, the locking module 42 hides its address information or modifies the access authority of its address information, so that other accounts than the first terminal cannot send the target interaction request.
该执行模块43用于在锁定期间内判断第二服务器是否接收到有效的第二数据凭证。如确定第二服务器验证接收到的第二数据凭证有效时,确定第一终端对第一数据凭证的交互请求成功。在锁定期间内确定第二服务器验证接收到的第二数据凭证无效或者第二服务器未接收到第二数据凭证时,解锁第一数据凭证。The execution module 43 is configured to determine whether the second server receives a valid second data credential during the locking period. If it is determined that the second server verifies that the received second data credential is valid, determining that the interaction request of the first terminal for the first data credential is successful. The first data credential is unlocked when it is determined during the lock period that the second server verifies that the received second data credential is invalid or the second server does not receive the second data credential.
进一步地,该执行模块43解锁第一数据凭证为:显示第一数据凭证的地址信息或重置第一数据凭证地址信息的访问权限。Further, the executing module 43 unlocks the first data credential: displaying address information of the first data credential or resetting access authority of the first data credential address information.
第三服务器为第一终端管理服务器,能够根据数据凭证生成请求锁定第一终端账户中特定数据/数值,生成相应凭证。其中,生成第二数据凭证的请求信息至少包含第一数据/数值和第一终端的用户信息,且可以由第二服务器发出,也可以由第一终端发出。The third server is a first terminal management server, and is capable of locking a specific data/value in the first terminal account according to the data credential generation request, and generating a corresponding credential. The request information for generating the second data credential includes at least the first data/value and the user information of the first terminal, and may be sent by the second server or may be sent by the first terminal.
进一步地,该服务器40还包括指示模块44。在一实施方式中,当该锁定模块42锁定第一数据凭证时,该指示模块44用于在接收到第一终端发送的第一数据凭证的交互请求时,指示第二服务器向第三服务器发出生成第二数据凭证的请求信息。Further, the server 40 also includes an indication module 44. In an embodiment, when the locking module 42 locks the first data credential, the indicating module 44 is configured to instruct the second server to send the third server to the third server when receiving the interaction request of the first data credential sent by the first terminal. Generate request information for the second data credential.
具体地,该第二数据凭证为第三服务器响应获取第二数据凭证的请求锁定第一终端账户中的第一数据/数值而生成的。即,第二数据凭证是在第一终端向第一服务器发送目标交互请求之后,由第一服务器根据第一数据凭证向第三服务器请求而生成的。Specifically, the second data credential is generated by the third server in response to the request to acquire the second data credential to lock the first data/value in the first terminal account. That is, the second data credential is generated by the first server requesting the third data server according to the first data credential after the first terminal sends the target interaction request to the first server.
在另一实施方式中,当该锁定模块42锁定第一数据凭证时,该服务器40还接收第一终端发送的第二数据凭证,并将该第二数据凭证发送至第二服务器。In another embodiment, when the locking module 42 locks the first data credential, the server 40 further receives the second data credential sent by the first terminal, and sends the second data credential to the second server.
具体地,该第二数据凭证为第三服务器响应第一终端的请求锁定第一终端账户中第一数据/数值而生成的。其中,第一终端的请求为:第一终端向第一服务器发出目标的交互请求时,根据该目标的信息向第三服务器发出的生成第二数据凭证请求。该第二数据凭证生成请求包含的第一数据/数值大小可以根据目标的信息确定。即,第二数据凭证是第一终端在确定需要交互该目标时主动向第三服务器发出生成请求,而由第三服务器响应该生成请求而生成的。Specifically, the second data credential is generated by the third server in response to the request of the first terminal to lock the first data/value in the first terminal account. The request of the first terminal is: when the first terminal sends a target interaction request to the first server, the second data credential request is sent to the third server according to the information of the target. The first data/value size included in the second data voucher generation request may be determined according to the information of the target. That is, the second data credential is that the first terminal actively sends a generation request to the third server when it is determined that the target needs to be exchanged, and is generated by the third server in response to the generation request.
进一步地,该生成第二数据凭证的请求信息中包含的所需锁定的数据/数值大小可以与第一数据凭证所代表的数据/数值相等,即,目标的数据/数值,也可以不相等。Further, the data/value size of the required lock included in the request information for generating the second data voucher may be equal to the data/value represented by the first data voucher, that is, the data/value of the target may not be equal.
在以上各实施方式中,当确定目标交互成功时,该执行模块43还用于在第一数据凭证中增加第一终端的标识信息,以此来标识第一数据凭证的所有者为第一终端。In the above embodiments, when it is determined that the target interaction is successful, the executing module 43 is further configured to add the identifier information of the first terminal to the first data credential, so as to identify the owner of the first data credential as the first terminal. .
请参阅图5,为本发明实施方式中的终端设备的结构示意图,该实施方式中的终端设备50为第一服务器。该终端设备50包括接收器51、处理器52、发送器53、只读存储器54、随机存取存储器55以及总线56。FIG. 5 is a schematic structural diagram of a terminal device according to an embodiment of the present invention. The terminal device 50 in this embodiment is a first server. The terminal device 50 includes a receiver 51, a processor 52, a transmitter 53, a read only memory 54, a random access memory 55, and a bus 56.
该接收器51用于接收数据。The receiver 51 is for receiving data.
该处理器52控制终端设备50的操作,该处理器52还可以成为CPU(Central Processing Unit,中央处理单元)。该处理器52可能是一种集成电路芯片,具有信号的处理能力。处理器52还可以是通用处理器、数字信号处理器(DSP)、专用集成电路(ASIC)、现成可编程门阵列(FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。The processor 52 controls the operation of the terminal device 50, and the processor 52 can also become a CPU (Central Processing Unit, central processing unit). The processor 52 may be an integrated circuit chip with signal processing capabilities. Processor 52 can also be a general purpose processor, digital signal processor (DSP), application specific integrated circuit (ASIC), off-the-shelf programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic device, discrete hardware component . The general purpose processor may be a microprocessor or the processor or any conventional processor or the like.
该发送器53用于发送数据。The transmitter 53 is for transmitting data.
存储器可以包括只读存储器54和随机存取存储器55,并向处理器52提供指令和数据。存储器的一部分还可以包括非易失性随机存取存储器(NVRAM)。The memory can include read only memory 54 and random access memory 55 and provide instructions and data to processor 52. A portion of the memory may also include non-volatile random access memory (NVRAM).
终端设备50的各个组件通过总线56耦合在一起,其中,总线56除包括数据总线之外,还可以包括电源总线、控制总线和状态信号总线等。但是为了清楚说明起见,在图中将各种总线都标为总线56。The various components of the terminal device 50 are coupled together by a bus 56. The bus 56 may include, in addition to the data bus, a power bus, a control bus, a status signal bus, and the like. However, for clarity of description, various buses are labeled as bus 56 in the figure.
存储器存储了如下的元素,可执行模块或者数据结构,或者它们的子集,或者它们的扩展集:The memory stores the following elements, executable modules or data structures, or a subset of them, or their extended set:
操作指令:包括各种操作指令,用于实现各种操作。Operation instructions: include various operation instructions for implementing various operations.
操作系统:包括各种系统程序,用于实现各种基础业务以及处理基于硬件的任务。Operating system: Includes a variety of system programs for implementing various basic services and handling hardware-based tasks.
在本发明实施例中,处理器52通过调用存储器存储的操作指令(该操作指令可存储在操作系统中),执行如下操作:In the embodiment of the present invention, the processor 52 performs the following operations by calling an operation instruction stored in the memory, which can be stored in the operating system:
检测到第一终端或第二服务器发送生成第二数据凭证的请求信息。It is detected that the first terminal or the second server sends the request information for generating the second data credential.
根据生成第二数据凭证的请求信息锁定第一数据凭证,以在锁定期间内拒绝接收其他终端用户发送的对第一数据凭证的交互请求。The first data credential is locked according to the request information for generating the second data credential to refuse to receive an interaction request for the first data credential sent by the other end user during the lock period.
其中,第一数据凭证由服务器50生成并关联第二服务器,且包含有第一数据/数值。第二数据凭证由第三服务器收到生成第二数据凭证的请求信息后锁定第一终端账户中与第一数据/数值大小相等的数据值而生成,并由第二服务器接收。The first data credential is generated by the server 50 and associated with the second server, and includes the first data/value. The second data credential is generated by the third server after receiving the request information for generating the second data credential and then locking the data value equal to the first data/value in the first terminal account, and is received by the second server.
进一步地,该第一数据凭证的信息包含服务器50设置的锁定规则。该服务器50在生成该第一数据凭证时设置该锁定规则,该锁定规则至少包含第一数据凭证的锁定时间长度。可选地,该处理器52响应第一终端发送的目标交互请求,按照该锁定规则锁定第一数据凭证,以在该锁定期间拒绝接收其他账户发送的目标交互请求,并向第二服务器发送获取第二数据凭证的请求。Further, the information of the first data voucher includes a locking rule set by the server 50. The server 50 sets the locking rule when generating the first data credential, the locking rule including at least the locking time length of the first data credential. Optionally, the processor 52 locks the first data credential according to the locking rule in response to the target interaction request sent by the first terminal, to refuse to receive the target interaction request sent by the other account during the locking, and send the obtained request to the second server. The request for the second data voucher.
在一实施方式中,该处理器52检测到第一终端或第二服务器发送生成第二数据凭证的请求信息之前,第一终端向服务器50发送对第一数据凭证的交互请求时,向第三服务器发送生成第二数据凭证的请求信息。In an embodiment, the processor 52 detects that the first terminal or the second server sends the request for generating the second data credential, and the third terminal sends the request for the interaction of the first data credential to the server 50 to the third The server sends request information for generating a second data credential.
其中,第一终端发送生成第二数据凭证的请求为第一终端在获取第一数据凭证信息时产生,包含的第一数据/数值大小,可以根据目标的信息确定。即,第二数据凭证是第一终端在确定需要交互该目标时主动向第三服务器发出生成请求,而由第三服务器响应该生成请求而生成的。The request for generating the second data credential by the first terminal is generated by the first terminal when acquiring the first data credential information, and the first data/value value included may be determined according to the information of the target. That is, the second data credential is that the first terminal actively sends a generation request to the third server when it is determined that the target needs to be exchanged, and is generated by the third server in response to the generation request.
进一步地,第二服务器接收到第二数据凭证后,会根据该第二数据凭证的信息确定是否接受,例如,判断第二数据凭证的数据/数值大小是否不小于第一数据凭证的数据/数值大小,并在确定不小于时接受该第二数据凭证,并向服务器50发送同意接受该第二数据凭证的反馈信息。反之,则确定不接受该第二数据凭证,并向服务器50发送拒绝接受该第二数据凭证的反馈信息。Further, after receiving the second data credential, the second server determines whether to accept according to the information of the second data credential, for example, determining whether the data/value value of the second data credential is not less than the data/value of the first data credential. The size, and accepting the second data credential when the determination is not less than, and sending feedback information to the server 50 agreeing to accept the second data credential. Otherwise, it is determined that the second data voucher is not accepted, and the server 50 is sent feedback information rejecting the second data voucher.
在另一实施方式中,在该服务器50检测到第一终端或第二服务器发送生成第二数据凭证的请求信息之前,该服务器50接收到第一终端发送的第一数据凭证的交互请求时,指示第二服务器向第三服务器发出生成第二数据凭证的请求信息。In another embodiment, before the server 50 detects that the first terminal or the second server sends the request information for generating the second data credential, the server 50 receives the interaction request of the first data credential sent by the first terminal, The second server is instructed to issue request information for generating a second data credential to the third server.
请参阅图6,为本发明第一实施方式中的一种线上交易方法的流程示意图,该实施方式示出的方法流程包括:FIG. 6 is a schematic flowchart diagram of an online transaction method according to a first embodiment of the present invention. The method flow shown in the implementation manner includes:
步骤S60,第一服务器检测到第一终端或第二服务器发送生成银信证的请求信息。步骤S61,根据生成银信证的请求信息锁定物信证,以在锁定期间内拒绝接收其他终端用户发送的对物信证的交互请求。Step S60: The first server detects that the first terminal or the second server sends the request information for generating a silver credit. Step S61: Lock the material certificate according to the request information for generating the silver credit to refuse to receive the interactive request for the physical communication sent by other terminal users during the locking period.
其中,物信证为第一服务器生成并关联第二服务器的网络电子单证,并且包含第一金额。银信证为第三服务器收到生成银信证的请求信息后锁定第一终端账户中第一金额的资金而生成的,并由第二服务器接收。The physical evidence is a network electronic document generated by the first server and associated with the second server, and includes a first amount. The silver credit card is generated by the third server receiving the request information for generating the silver credit card and then locking the first amount of funds in the first terminal account, and is received by the second server.
其中,该物信证为集成目标商品/服务电子商务必备功能的网络电子单证,且包含第一服务器设置的锁定规则。The material certificate is a network electronic document that integrates the essential functions of the target goods/services e-commerce, and includes a locking rule set by the first server.
进一步地,该第一服务器在生成该物信证时设置该锁定规则,该锁定规则用于定义物信证的锁定时间长度。Further, the first server sets the locking rule when generating the material credential, and the locking rule is used to define a locking time length of the physical credential.
具体地,当第一服务器生成物信证时,显示该物信证的信息以供第一终端浏览目标商品/服务的信息。该物信证的信息可以是地址信息,即,物信证保存在第一服务器中的地址信息,例如,URL信息。第一终端登陆并访问第一服务器时,通过该地址信息能够从第一服务器中获得该目标商品/服务的其他信息,如,目标商品的类别、功能介绍等描述信息。Specifically, when the first server generates a certificate, the information of the material certificate is displayed for the first terminal to browse the information of the target goods/services. The information of the physical evidence may be address information, that is, address information stored in the first server, such as URL information. When the first terminal logs in and accesses the first server, other information about the target product/service, such as a description of the category and function description of the target product, can be obtained from the first server through the address information.
当物信证被锁定时,第一服务器隐藏其地址信息或修改其地址信息的访问权限,使得除第一终端以外的其他账户不能够获得其地址信息,从而浏览目标商品/服务的信息。因此,在第一终端请求交易目标商品/服务时,通过隐藏物信证地址信息的方式以防止其他账户请求同一目标商品/服务,从而出现交易冲突的情况。When the physical evidence is locked, the first server hides its address information or modifies the access rights of its address information, so that other accounts than the first terminal cannot obtain their address information, thereby browsing the information of the target goods/services. Therefore, when the first terminal requests the transaction target goods/services, the situation of the transaction conflict occurs by hiding the information of the address information to prevent other accounts from requesting the same target goods/services.
步骤S62,在锁定期间内,判断第二服务器是否接收到有效的银信证,若是,则进入步骤S63;否则,进入步骤S64。In step S62, during the lock period, it is determined whether the second server receives a valid silver certificate, and if yes, proceeds to step S63; otherwise, proceeds to step S64.
其中,银信证为第三服务器冻结第一终端的用户账户中第一额度的资金而生成的。The silver credit card is generated by the third server freezing the first amount of funds in the user account of the first terminal.
步骤S63,确定第一终端对物信证关联的目标商品/服务交易成功。然后,流程结束。In step S63, it is determined that the target goods/service transaction associated with the physical terminal is successful. Then the process ends.
具体地,第三服务器为第一终端资金管理服务器,能够根据生成银信证的请求冻结第一终端的用户账户中特定额度的资金,生成相应的银信证。其中,该银信证生成请求包含了所需冻结的资金额度大小和第一终端的信息,且可以由第二服务器发出,也可以由第一终端发出。具体如下:Specifically, the third server is the first terminal money management server, and can freeze the specific amount of funds in the user account of the first terminal according to the request for generating the silver credit, and generate a corresponding silver credit card. The silver credit generation request includes the required amount of the frozen funds and the information of the first terminal, and may be sent by the second server or by the first terminal. details as follows:
在一实施方式中,在第一服务器检测到第一终端或第二服务器发送生成银信证的请求信息之前,第一终端向第一服务器发送对物信证的交互请求时,向第三服务器发送生成银信证的请求信息。其中,第一终端发送生成银信证的请求为:第一终端向第一服务器发出目标商品/服务的交易请求时,根据该目标商品/服务的信息向第三服务器发出的银信证生成请求。该银信证生成请求包含的第一额度大小可以根据目标商品/服务的信息确定。即,银信证是第一终端在确定需要交易该目标商品/服务时主动向第三服务器发出生成请求,而由第三服务器响应该生成请求而生成的。In an embodiment, before the first server detects that the first terminal or the second server sends the request information for generating the silver credential, the first terminal sends an interaction request for the physical credential to the first server to the third server. Send request information for generating a silver certificate. The request for generating the silver credit card by the first terminal is: when the first terminal sends a transaction request for the target commodity/service to the first server, the silver credit certificate generation request is sent to the third server according to the information of the target commodity/service. . The first credit size included in the silver credit generation request may be determined according to the information of the target commodity/service. That is, the silver credit card is that the first terminal actively sends a generation request to the third server when it is determined that the target commodity/service needs to be traded, and is generated by the third server in response to the generation request.
进一步地,该银信证生成请求中包含的所需冻结的资金额度大小可以与物信证所代表的资金额度相等,即,购买目标商品/服务所需的资金,也可以不相等。Further, the amount of funds required to be frozen in the silver credit generation request may be equal to the amount of funds represented by the physical evidence, that is, the funds required to purchase the target goods/services may also be unequal.
在本实施方式中,该银信证为第三服务器响应获取银信证的请求冻结第一终端账户中的第一额度的资金而生成的。即,银信证是在第一终端向第一服务器发送目标商品/服务交易请求之后,由第一服务器根据物信证向第三服务器请求而生成的。In this embodiment, the silver credit is generated by the third server in response to the request to obtain the silver credit to freeze the first amount of funds in the first terminal account. That is, the silver credential is generated by the first server requesting the third server according to the physical credential after the first terminal sends the target merchandise/service transaction request to the first server.
在另一实施方式中,第一服务器检测到第一终端或第二服务器发出生成银信证的请求信息之前,第一服务器接收到第一终端发送的物信证的交互请求时,指示第二服务器向第三服务器发出生成银信证的请求信息。In another embodiment, before the first server detects that the first terminal or the second server sends the request information for generating the silver credential, the first server receives the interaction request of the physical credential sent by the first terminal, and indicates the second The server sends a request message for generating a silver credit to the third server.
步骤S64,在该锁定期间确定第二服务器未接收到银信证或未收到有效的银信证时,解锁物信证。然后,流程结束。In step S64, during the locking period, it is determined that the second server does not receive the silver credit or does not receive a valid silver credit, and unlocks the physical evidence. Then the process ends.
具体地,解锁物信证为:显示物信证的地址信息或重置物信证地址信息的访问权限。这样,在第一终端交易目标商品/服务未成功时可以再次显示物信证的地址信息,使得其他账户能够获取该地址信息并浏览目标商品/服务的信息,为其他账户交易目标商品/服务提供机会。Specifically, the unlocker is: the access right of the address information of the display letter or the reset letter address information. In this way, when the first terminal transaction target product/service is unsuccessful, the address information of the material certificate can be displayed again, so that other accounts can obtain the address information and browse the information of the target goods/services, and provide the target goods/services for other accounts. opportunity.
第二服务器接收到银信证后,会根据该银信证的信息确定是否接受,例如,判断银信证的资金值大小是否不小于物信证的资金值大小,并在确定不小于时接受该银信证,并向第一服务器发送同意接受该银信证的反馈信息;反之,则确定不接受该银信证,并向第一服务器发送拒绝接受该银信证的反馈信息。After receiving the silver letter certificate, the second server determines whether to accept according to the information of the bank letter certificate, for example, determining whether the fund value of the bank letter is not smaller than the fund value of the material certificate, and accepting when determining that the value is not less than The bank letter is sent to the first server to agree to accept the feedback information of the bank letter; otherwise, it is determined not to accept the bank letter, and sends a feedback message rejecting the bank letter to the first server.
以上方案中,在第一服务器接收到第一终端发出的目标商品/服务交易请求时,按照锁定规则将目标商品/服务关联的物信证锁定,以拒绝其他账户针对该同一目标商品/服务的交易请求,并在锁定期间接收到与第一终端的有效银信证时确定目标商品/服务交易成功,而在锁定期间未接收到有效银信证时解锁物信证,从而为其他账户请求交易该目标商品/服务提供机会。因此,在目标商品/服务被第一终端请求交易时,锁定物信证,以此解决了其他账户请求同一目标商品/服务而出现的交易冲突的技术问题,从而提高交易的成功率。In the above solution, when the first server receives the target commodity/service transaction request sent by the first terminal, the physical evidence associated with the target commodity/service is locked according to the locking rule to reject the other account for the same target commodity/service. Transaction request, and when the valid silver certificate with the first terminal is received during the lockout period, the target goods/service transaction is determined to be successful, and the valid letter is not received during the lockout period, thereby requesting the transaction for other accounts. The target goods/services provide opportunities. Therefore, when the target goods/services are requested by the first terminal, the material trust is locked, thereby solving the technical problem of the transaction conflicts that other accounts request for the same target goods/services, thereby improving the success rate of the transactions.
下面对本发明实施方式中的线上交易方法进行举例说明。The online transaction method in the embodiment of the present invention is exemplified below.
该第一终端的用户为买方,该第一服务器为物信证生成系统服务器,第二服务器为用于接收银信证的资金管理服务器,该第三服务器为第一终端的用户账户资金管理服务器。其中,第二、三服务器可以为同一银行或不同银行的系统服务器。The user of the first terminal is a buyer, the first server is a physical evidence generation system server, the second server is a fund management server for receiving a silver credit card, and the third server is a user account fund management server of the first terminal. . The second and third servers may be system servers of the same bank or different banks.
第一服务器预先配置锁定规则和用于接收银信证的第二服务器信息,生成与目标商品/服务关联的物信证。进一步地,第一终端也可以在用户账户中预先设置用于生成银信证的第三服务器信息。The first server pre-configures the locking rule and the second server information for receiving the silver credit, and generates a physical certificate associated with the target commodity/service. Further, the first terminal may also preset third server information for generating a silver credit in the user account.
第一服务器在生成物信证后,以URL形式通过互联网发布物信证。第一终端的用户通过互联网发布的URL浏览物信证信息,并在确认购买该物信证所关联的目标商品/服务时,发出交易请求。After the first server generates the material certificate, the first server issues a material certificate through the Internet in the form of a URL. The user of the first terminal browses the material credential information through the URL published by the Internet, and issues a transaction request when confirming the purchase of the target commodity/service associated with the physical credential.
第一服务器会根据第二服务器在预定时间内的银信证的接收情况判断交易是否成功,第二服务器接收银信证原理如下所述:The first server determines whether the transaction is successful according to the receipt of the silver certificate of the second server within a predetermined time, and the second server receives the silver credit certificate as follows:
在一实施方式中,第一终端发出交易请求时,向第三服务器根据发出的生成银信证的请求并由第三服务器开出相应的银信证,该银信证可以只填入买方信息和金额,还可以包含该物信证的编号、用于接收银信证的第二服务器信息。第一终端将生成银信证的请求信息发送至第一服务器,第一服务器在接收到生成银信证的请求信息时开始计时并锁定物信证。其中,已锁定的物信证不能再被购买(例如,不显示URL信息而仅在第一服务器上显示或显示没有购买权限)。银信证生成后,由第一终端发送给第一服务器,第一服务器将银信证、物信证编号、用于接收银信证的第二服务器信息和价款金额发送至第二服务器,第二服务器验证银信证是否有效,并在确认有效时接收第三服务器开出的银信证并发送接收信息给第一服务器。In an embodiment, when the first terminal issues a transaction request, the third server sends a corresponding silver credit according to the request for generating a silver credit issued by the third server, and the silver credit can only fill in the buyer information. And the amount, may also include the number of the physical certificate, the second server information for receiving the silver certificate. The first terminal sends the request information for generating the silver credential to the first server, and the first server starts timing and locks the physical credential when receiving the request information for generating the silver credential. Among them, the locked material certificate can no longer be purchased (for example, the URL information is not displayed but only the first server is displayed or no purchase authority is displayed). After the silver credit card is generated, it is sent by the first terminal to the first server, and the first server sends the silver credit card, the physical credit number, the second server information for receiving the silver credit card, and the amount of the payment to the second server, The second server verifies whether the silver credential is valid, and receives the silver credential issued by the third server and sends and receives the information to the first server when the confirmation is valid.
在另一实施方式中,第一服务器根据该交易请求向第二服务器发出银信证的生成请求,并在发出银信证的生成请求时开始计时以锁定物信证。其中,该银信证的生成请求包含第二服务器信息、物信证编号、物信证价款、物信证锁定时间等交易信息。第二服务器接收该银信证的生成请求发送给第三服务器,第三服务器接收该生成请求开出银信证。然后,第二服务器自动接收第三服务器开出的银信证并发送接收信息给第一服务器。In another embodiment, the first server issues a request for generating a silver credential to the second server according to the transaction request, and starts timing to issue a credential credential when the request for generating the silver credential is issued. The request for generating the silver credit includes transaction information such as the second server information, the physical evidence number, the physical certificate price, and the physical information lock time. The second server receives the generation request of the silver credit to the third server, and the third server receives the generation request to issue the silver credit. Then, the second server automatically receives the silver certificate issued by the third server and sends and receives the information to the first server.
当由以上实施方式所述的第二服务器接收银信证时,第一服务器确定在预定时间内第二服务器接收银信证,则交易成功,并将物信证状态更改为已购买状态,同时通知第一终端该笔交易达成。否则,第一服务器解锁物信证,通知第一终端该笔交易失败,显示物信证使其可以重新发布或修改物信证供购买的权限使其在互联网上供账户用户购买。When receiving the silver credit by the second server described in the above embodiment, the first server determines that the second server receives the silver credit within a predetermined time, the transaction is successful, and the physical evidence status is changed to the purchased state, and Notify the first terminal that the transaction is reached. Otherwise, the first server unlocks the letter, notifies the first terminal that the transaction has failed, and displays the material certificate so that it can re-issue or modify the material certificate for purchase to make it available for purchase by the account user on the Internet.
如上所述,第一服务器获取在接收到第一终端的交易请求时,即指示与第一服务器关联的第二服务器向第一终端关联的第三服务器发出邀约,请求开出物信证等额价款的银信证,同时锁定该物信证,这样更能体现买卖双方的交易诚意。As described above, when the first server acquires the transaction request of the first terminal, the second server that is associated with the first server is instructed to send an offer to the third server associated with the first terminal, requesting to issue the amount of the information certificate. The bank’s letter of credit, at the same time, locks the material certificate, which better reflects the sincerity of the buyers and sellers.
在上述实施例中,仅对本发明进行了示范性描述,但是本领域技术人员在阅读本专利申请后可以在不脱离本发明的精神和范围的情况下对本发明进行各种修改。 In the above-described embodiments, the present invention has been exemplarily described, and various modifications of the present invention may be made without departing from the spirit and scope of the invention.

Claims (17)

  1. 一种数据交互处理方法,其中,所述方法包括:A data interaction processing method, wherein the method comprises:
    第一服务器检测到第一终端或第二服务器发送生成第二数据凭证的请求信息;The first server detects that the first terminal or the second server sends the request information for generating the second data credential;
    根据所述生成第二数据凭证的请求信息锁定第一数据凭证,以在锁定期间内拒绝接收其他终端用户发送的对所述第一数据凭证的交互请求;And locking the first data credential according to the request information for generating the second data credential to refuse to receive an interaction request for the first data credential sent by another terminal user during the locking period;
    其中,所述第一数据凭证由所述第一服务器生成并关联第二服务器,且包含有第一数据/数值;以及The first data credential is generated by the first server and associated with the second server, and includes a first data/value;
    所述第二数据凭证为第三服务器收到所述生成第二数据凭证的请求信息后锁定所述第一终端账户中与所述第一数据/数值大小相等的数据值而生成,并由所述第二服务器接收。The second data credential is generated after the third server receives the request information for generating the second data credential and locks the data value in the first terminal account that is equal to the first data/value. The second server receives.
  2. 根据权利要求1所述的数据交互处理方法,其中,所述方法还包括:The data interaction processing method according to claim 1, wherein the method further comprises:
    在锁定期间内,如确定所述第二服务器验证接收到的第二数据凭证有效,确定所述第一终端对所述第一数据凭证的交互请求成功;如确定所述第二服务器验证接收到的第二数据凭证无效或者所述第二服务器未接收到第二数据凭证,则解锁所述第一数据凭证。During the locking period, if it is determined that the second server verifies that the received second data credential is valid, determining that the first terminal's interaction request for the first data credential is successful; if it is determined that the second server is verified to be received The second data credential is invalid or the second server does not receive the second data credential, and the first data credential is unlocked.
  3. 根据权利要求1所述的数据交互处理方法,其中,所述生成第二数据凭证的请求信息至少包含所述第一数据/数值和所述第一终端的用户信息。The data interaction processing method according to claim 1, wherein the request information for generating the second data voucher includes at least the first data/value and user information of the first terminal.
  4. 根据权利要求3所述的数据交互处理方法,其中,所述第一服务器检测到第一终端或第二服务器发送生成第二数据凭证的请求信息的步骤之前,所述方法还包括:The data interaction processing method according to claim 3, wherein the method further comprises: before the step of the first server or the second server transmitting the request information for generating the second data credential, the method further comprising:
    所述第一服务器接收到所述第一终端发送的第一数据凭证的交互请求时,指示所述第二服务器向所述第三服务器发出所述生成第二数据凭证的请求信息。When the first server receives the interaction request of the first data credential sent by the first terminal, the first server instructs the second server to send the request information for generating the second data credential to the third server.
  5. 根据权利要求3所述的数据交互处理方法,其中,所述第一服务器检测到第一终端或第二服务器发送生成第二数据凭证的请求信息的步骤之前,所述方法还包括:The data interaction processing method according to claim 3, wherein the method further comprises: before the step of the first server or the second server transmitting the request information for generating the second data credential, the method further comprising:
    所述第一终端向所述第一服务器发送对所述第一数据凭证的交互请求时,向所述第三服务器发送所述生成第二数据凭证的请求信息。When the first terminal sends an interaction request for the first data credential to the first server, the request information for generating the second data credential is sent to the third server.
  6. 根据权利要求1至5任意一项所述的数据交互处理方法,其中,所述锁定第一数据凭证的方式为在预定时间内隐藏所述第一数据凭证地址信息或修改所述第一数据凭证地址信息的访问权限。The data interaction processing method according to any one of claims 1 to 5, wherein the method of locking the first data voucher is to hide the first data voucher address information or modify the first data voucher within a predetermined time. Access to address information.
  7. 一种服务器,其中,所述服务器包括:A server, wherein the server comprises:
    检测模块,用于检测到第一终端或第二服务器发送生成第二数据凭证的请求信息;a detecting module, configured to detect, by the first terminal or the second server, request information for generating a second data credential;
    锁定模块,用于根据所述生成第二数据凭证的请求信息锁定第一数据凭证,以在锁定期间内拒绝接收其他终端用户发送的对所述第一数据凭证的交互请求;a locking module, configured to lock the first data credential according to the request information for generating the second data credential, to refuse to receive an interaction request for the first data credential sent by another terminal user during the locking period;
    其中,所述第一数据凭证由所述第一服务器生成并关联第二服务器,且包含有第一数据/数值;以及The first data credential is generated by the first server and associated with the second server, and includes a first data/value;
    所述第二数据凭证为第三服务器收到所述生成第二数据凭证的请求信息后锁定所述第一终端账户中与所述第一数据/数值大小相等的数据值而生成,并由所述第二服务器接收。The second data credential is generated after the third server receives the request information for generating the second data credential and locks the data value in the first terminal account that is equal to the first data/value. The second server receives.
  8. 根据权利要求6所述的服务器,其中,还包括执行模块,用于在锁定期间内,如确定所述第二服务器验证接收到的第二数据凭证有效时,确定所述第一终端对所述第一数据凭证的交互请求成功;还用于在锁定期间内确定所述第二服务器验证接收到的第二数据凭证无效或者所述第二服务器未接收到第二数据凭证时,解锁所述第一数据凭证。The server according to claim 6, further comprising an execution module, configured to determine, during the locking period, that the second terminal verifies that the received second data credential is valid, The interaction request of the first data credential is successful; and is further configured to: when it is determined that the second server verifies that the received second data credential is invalid during the locking period or the second server does not receive the second data credential, unlocking the first A data voucher.
  9. 根据权利要求6所述的服务器,其中,所述生成第二数据凭证的请求信息至少包含所述第一数据/数值和所述第一终端的用户信息。The server according to claim 6, wherein said request information for generating a second data voucher includes at least said first data/value and user information of said first terminal.
  10. 根据权利要求9所述的服务器,其中,所述服务器还包括指示模块,用于在接收到所述第一终端发送的第一数据凭证的交互请求时,指示所述第二服务器向第三服务器发出所述生成第二数据凭证的请求信息。The server according to claim 9, wherein the server further comprises an indication module, configured to instruct the second server to the third server when receiving the interaction request of the first data credential sent by the first terminal The request information for generating the second data credential is issued.
  11. 一种终端设备,其中,所述设备包括:A terminal device, wherein the device includes:
    一个或多个处理器;One or more processors;
    存储器;以及Memory;
    一个或多个程序,其中,所述一个或多个程序被存储在所述存储器中并被配置为被所述一个或多个处理器执行,所述一个或多个程序包括指令,所述指令用于:One or more programs, wherein the one or more programs are stored in the memory and configured to be executed by the one or more processors, the one or more programs comprising instructions Used for:
    检测到第一终端或第二服务器发送生成第二数据凭证的请求信息;Detecting that the first terminal or the second server sends the request information for generating the second data credential;
    根据所述生成第二数据凭证的请求信息锁定第一数据凭证,以在锁定期间内拒绝接收其他终端用户发送的对所述第一数据凭证的交互请求;And locking the first data credential according to the request information for generating the second data credential to refuse to receive an interaction request for the first data credential sent by another terminal user during the locking period;
    其中,所述第一数据凭证由所述第一服务器生成并关联第二服务器,且包含有第一数据/数值;以及The first data credential is generated by the first server and associated with the second server, and includes a first data/value;
    所述第二数据凭证由第三服务器收到所述生成第二数据凭证的请求信息后锁定所述第一终端账户中与所述第一数据/数值大小相等的数据值而生成,并由所述第二服务器接收。The second data voucher is generated by the third server after the request information for generating the second data voucher is received, and the data value equal to the first data/value in the first terminal account is locked and generated. The second server receives.
  12. 一种线上交易方法,其中,所述方法包括:An online transaction method, wherein the method comprises:
    第一服务器检测到第一终端或第二服务器发送生成银信证的请求信息;The first server detects that the first terminal or the second server sends the request information for generating a silver credit card;
    根据所述生成银信证的请求信息锁定物信证,以在锁定期间内拒绝接收其他终端用户发送的对所述物信证的交互请求;And according to the request information for generating the silver credit, the physical evidence is locked to refuse to receive an interaction request for the physical evidence sent by another terminal user during the locking period;
    其中,所述物信证为所述第一服务器生成并关联第二服务器的网络电子单证,并且包含第一金额;以及Wherein the physical certificate is a network electronic document generated and associated with the second server by the first server, and includes a first amount;
    所述银信证为第三服务器收到所述生成银信证的请求信息后锁定所述第一终端账户中第一金额的资金而生成的,并由所述第二服务器接收。The silver credential is generated by the third server after receiving the request information for generating the silver credential and locking the first amount of funds in the first terminal account, and is received by the second server.
  13. 根据权利要求12所述的线上交易方法,其中,所述方法还包括:The online transaction method of claim 12, wherein the method further comprises:
    在锁定期间内,如确定所述第二服务器验证接收到的银信证有效,则确定所述第一终端对所述物信证的交互请求成功;如确定所述第二服务器验证接收到的银信证无效或者所述第二服务器未接收到银信证,则解锁所述物信证。During the locking period, if it is determined that the second server verifies that the received silver credit is valid, determining that the first terminal's interaction request for the physical credential is successful; and determining that the second server verifies the received If the silver certificate is invalid or the second server does not receive the silver certificate, the material certificate is unlocked.
  14. 根据权利要求12所述的线上交易方法,其中,所述生成银信证的请求信息至少包含所述第一金额所述第一终端的用户信息。The online transaction method according to claim 12, wherein said request information for generating a silver credit includes at least said first amount of user information of said first terminal.
  15. 根据权利要求14所述的线上交易方法,其中,所述第一服务器检测到第一终端或第二服务器发出生成银信证的请求信息的步骤之前,所述方法还包括:The online transaction method according to claim 14, wherein before the step of the first server or the second server detecting the request information for generating a silver credit, the method further comprises:
    所述第一服务器接收到所述第一终端发送的物信证的交互请求时,指示所述第二服务器向所述第三服务器发出所述生成银信证的请求信息。When the first server receives the interaction request of the physical certificate sent by the first terminal, the first server instructs the second server to send the request information for generating the silver credit to the third server.
  16. 根据权利要求14所述的线上交易方法,其中,所述第一服务器检测到第一终端或第二服务器发出生成银信证的请求信息的步骤之前,所述方法还包括:The online transaction method according to claim 14, wherein before the step of the first server or the second server detecting the request information for generating a silver credit, the method further comprises:
    所述第一终端向所述第一服务器发送对所述第一数据凭证的交互请求时,向所述第三服务器发送所述生成第二数据凭证的请求信息。When the first terminal sends an interaction request for the first data credential to the first server, the request information for generating the second data credential is sent to the third server.
  17. 根据权利要求12至16任意一项所述的线上交易方法,其中,所述锁定物信证的方式为在预定时间内隐藏所述物信证地址信息或修改所述物信证地址信息的访问权限。The online transaction method according to any one of claims 12 to 16, wherein the manner of locking the evidence is to hide the material letter address information or modify the material letter address information within a predetermined time. access permission.
PCT/CN2015/097392 2015-12-15 2015-12-15 Data exchange processing method, server, terminal device, and online transaction method WO2017101002A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2015/097392 WO2017101002A1 (en) 2015-12-15 2015-12-15 Data exchange processing method, server, terminal device, and online transaction method
CA2995918A CA2995918C (en) 2015-12-15 2015-12-15 Data exchange processing method, server, terminal device, and online transaction method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2015/097392 WO2017101002A1 (en) 2015-12-15 2015-12-15 Data exchange processing method, server, terminal device, and online transaction method

Publications (1)

Publication Number Publication Date
WO2017101002A1 true WO2017101002A1 (en) 2017-06-22

Family

ID=59055624

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/097392 WO2017101002A1 (en) 2015-12-15 2015-12-15 Data exchange processing method, server, terminal device, and online transaction method

Country Status (2)

Country Link
CA (1) CA2995918C (en)
WO (1) WO2017101002A1 (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070214059A1 (en) * 1999-07-06 2007-09-13 Duncan Dana B On-line interactive system and method for transacting business
CN103827903A (en) * 2013-03-18 2014-05-28 深圳市银信网银科技有限公司 Internet payment method and system
CN103827902A (en) * 2013-03-18 2014-05-28 深圳市银信网银科技有限公司 Method and system for Intenet payment
CN104580085A (en) * 2013-10-17 2015-04-29 腾讯科技(深圳)有限公司 Business data updating method, system, client side and server
CN104838401A (en) * 2014-09-12 2015-08-12 深圳市银信网银科技有限公司 Transaction system based on electronic certificate
CN104838400A (en) * 2014-09-12 2015-08-12 深圳市银信网银科技有限公司 Capital receipt and payment system based on electronic certificate

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070214059A1 (en) * 1999-07-06 2007-09-13 Duncan Dana B On-line interactive system and method for transacting business
CN103827903A (en) * 2013-03-18 2014-05-28 深圳市银信网银科技有限公司 Internet payment method and system
CN103827902A (en) * 2013-03-18 2014-05-28 深圳市银信网银科技有限公司 Method and system for Intenet payment
CN104580085A (en) * 2013-10-17 2015-04-29 腾讯科技(深圳)有限公司 Business data updating method, system, client side and server
CN104838401A (en) * 2014-09-12 2015-08-12 深圳市银信网银科技有限公司 Transaction system based on electronic certificate
CN104838400A (en) * 2014-09-12 2015-08-12 深圳市银信网银科技有限公司 Capital receipt and payment system based on electronic certificate

Also Published As

Publication number Publication date
CA2995918A1 (en) 2017-06-22
CA2995918C (en) 2023-08-01

Similar Documents

Publication Publication Date Title
WO2016137307A1 (en) Attestation by proxy
US11943256B2 (en) Link detection method and apparatus, electronic device, and storage medium
WO2019198866A1 (en) Method and device for providing transaction service for cryptocurrencies based on different blockchains
US20220271924A1 (en) Method and apparatus for processing data request
WO2022108529A1 (en) Model construction method and apparatus, and medium and electronic device
WO2018231495A1 (en) Securing authorization tokens
WO2022001717A1 (en) Blockchain-based user information processing method and system
WO2018208136A1 (en) System and method for fraud detection
WO2022169012A1 (en) Device and method for processing item sales information
WO2017045155A1 (en) Processing method for obtaining target data, server, and online financing method
WO2017000197A1 (en) Data interaction processing method, device and system
WO2017101002A1 (en) Data exchange processing method, server, terminal device, and online transaction method
WO2017045154A1 (en) Processing method for acquiring target data, server, and online funding method
US11502850B2 (en) Server apparatus, client terminal, information processing system and information processing method
WO2017000207A1 (en) Data interaction processing method, device and system
TWM583978U (en) System of using physical carrier to store digital certificate for performing online transaction
WO2022057595A1 (en) Marking information processing method and device, and storage medium
WO2017101008A1 (en) Target information management method and management equipment and management server thereof
US11316843B1 (en) Systems for authenticating users from a separate user interface
WO2017000194A1 (en) Data interaction processing method, device and system
WO2017101007A1 (en) Information processing method, server, terminal device, and online transaction method
WO2017000166A1 (en) Method for establishing interaction relationship, and interaction terminal
WO2017000200A1 (en) Data interaction processing method, device and system
WO2017000167A1 (en) Method for establishing interaction relationship, and interaction terminal
WO2017000205A1 (en) Data interaction processing method, device and system

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15910475

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2995918

Country of ref document: CA

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 25/09/2018)

122 Ep: pct application non-entry in european phase

Ref document number: 15910475

Country of ref document: EP

Kind code of ref document: A1