Note: Descriptions are shown in the official language in which they were submitted.
CA 02993034 2018-01-19
WO 2017/012001 PCT/CN2015/084568
Title: Online Funds Management Method, And Data Interaction Processing
Method And Device
[1] [Technical Field]
[2] The present invention relates to the field of electronic commerce, and
in particular, to an
online fund management method and data interaction processing method and
device.
[3] [Background Technology]
[4] The current online electronic payment or online payment methods mainly
include bank
online banking payment (including credit card payment) and third-party
payment. In the
existing online electronic payment or online payment, there is less risk in
the form of
third-party payment company guarantee.
[5] However, in the form of a third-party payment company guarantee, for
the payee customer
or payer, the funds have been paid to the third-party payment company when the
commodity are not received, and once a third-party payment company has a
problem, the
payment to the client or the borrower is not guaranteed. Therefore, in the
form of a
third-party payment company guarantee, there is still a large risk of payment
to the client
or the borrower. Especially when the cash flow of the payer client or payer is
abnormal, the
third-party company cannot timely and effectively intervene and prevent the
commodity
provider from obtaining the funds for the sale of the commodity. For example,
the amount
of the commodity purchased by the paying customer or the payer due to the
civil economic
dispute cannot be paid to the commodity provider normally.
[6] Further, since users can realize various ways of data interaction
through the Internet, it is
necessary to provide an online data interaction processing method.
[7] [ Summary of the Invention]
[8] The object of the present invention is to provide an online fund
management method, a
data interaction processing method, a device and a system which can
effectively ensure the
financial benefits of the commodity / service providers are not damaged when
the cash
flow of the paying party is abnormal.
[9] In order to solve the above technical problem, the first technical
solution adopted by the
present invention is to provide an online fund management method, which
includes: First
Participant delivers a request to the first Funds-Management server to deduct
funds from a
Second Participant account to a target account; the first Funds-Management
server
performs identity verification on the First Participant in response to the
request; the First
CA 02993034 2018-01-19
WO 2017/012001 PCT/CN2015/084568
Funds-Management server verifies the identity information of the First
Participant and
confirms that the Funds required to be deducted include at least some of the
Funds for the
electronic certificate of the Second Participant, the released funds is not
greater than the
amount of the electronic certificate, which is to deduct the Funds from the
target account
and deliver the electronic certificate information to the second funds-
management server
after the deduction of the Funds; and the second Funds-Management server
delivers the
electronic certificate information received to Third Participant; the third
participant obtains
the electronic certificate information; wherein the target account is an
account designated
by the First Participant, the first Funds-Management server is an account
management
server of the Second Participant, the second Funds-Management server is the
account
Management server for the Third Participant.
[10] In order to solve the above technical problem, a second technical
solution adopted by the
present invention is to provide a method for online fund management, where the
method
includes: First Funds-Management server receives the request from the Second
Participant
account to deduct Funds from the Second Participant account, verify the
identity of the
First Participant; when the identity verification passes and confirming that
the funds to be
deducted include at least a part of the funds of the second Participant's
electronic
certificate, deliver the electronic certificate information after the
deduction to the second
Funds-Management server; wherein the target account is the first participant
designated
account, the first Funds-Management server is an account management server of
the
Second Participant, and the second Funds-Management server is an account
management
server of the Third Participant.
[11] In the above solution, when the circulation of the Second Participant
is abnormal, the First
Participant deduct funds from the Second Participant account to the account
designated by
First Participant through the account management server that requests the
Second
Participant; after successful fund transfer, the Second Participant The
account management
server notifies Third Participant of the change information through Third
Participant's
account management server so that Third Participant can be promptly notified
when the
flow of Second Participant is abnormal, so as to effectively ensure that Third
Participant's
funds interests are not impaired.
[12] In order to solve the above technical problem, a third technical
solution adopted by the
present invention is to provide a data interaction processing method, where
the method
includes a first interacting party delivers a request for adding the data
value of the at least
part of the data of the second interacting party to a target data unit to the
First Service
Party; the First Server party, upon receiving the request, performs identity
verification on
2
CA 02993034 2018-01-19
WO 2017/012001 PCT/CN2015/084568
the first interacting party; and when the First Server party is performing the
verification on
the first interacting party identity verification and confirming that the data
value to be
added includes at least a part of the data value of the data certificate of
the second
interacting party, unlocking the first data whose size is not greater than the
data certificate
data value, the target data unit adds the data with the same size as the first
data, and
delivers the data certificate information whose data value is changed to the
Second Service
Party; and the Second Service Party delivers the data certificate information
received to the
third interactive party, enabling the third user to obtain the data
certificate information.
[13] In order to solve the above technical problem, a fourth technical
solution adopted by the
present invention is to provide a data interaction processing method, where
the method
including: The First Service Party receives a request delivered by a first
interacting party to
increase a data value of at least a part of data of a second interacting party
data unit to a
target data unit and performs identity verification on the first interacting
party, and
confirming that the data value to be added needs to include at least part of
the data values
of the data certificate of the second interacting party, unlock the first data
whose data value
is not greater than the data certificate to add a data value equal to the
first data size to the
target data unit; and deliver the data certificate information whose data
value is changed to
a Second Service Party.
[14] In order to solve the above technical problem, a fifth technical
solution adopted by the
present invention is to provide a data interaction processing device, where
the device
includes the receiving module, which is used to receive the request that the
first interacting
party delivers at least part of the data of the second interactive data unit
to a target data
unit; a verification module is used to verify the identity of the first
interacting party and
confirm whether the data value to be added includes the second interacting
party; the
processing module is used to pass the identity verification by the
verification module and
confirm that the data value that needs to be added includes at least a part of
data values of
the data certificate of the second interacting party unlocking first data not
larger than the
data certificate data value to add a data value equal to the first data size
to the target data
unit; and a delivery module is used deliver the data certificate information
to the Second
Service Party, which has been changed by the data value.
[15] In the above solution, when the data flow of the second interacting
party is abnormal, the
first interacting party increases the target data unit specified by the first
interacting party
from the data unit of the second interacting party by requesting the service
party of the
second interacting party data; after the service party of the second
interacting party calls
data certificate to successfully add data to the target data unit, the change
information of
3
CA 02993034 2018-01-19
WO 2017/012001 PCT/CN2015/084568
the data certificate of the second interacting party is notified to the third
interacting party
through the service party of the third interacting party, when the data
exchange between the
two parties is abnormal, the third party is notified promptly to effectively
avoid the data
security risk of the third party.
[16] [Brief Description]
[17] Figure 1 is a schematic flow chart of an example of an online fund
management method
according to the present invention;
[18] Figure 2 is a schematic diagram of online funds management
relationship in the example of
the present invention;
[19] Figure 3 is a schematic flow chart of another example of an online
fund management
method according to the present invention;
[20] Figure 4 is a schematic flow chart of an example of a data interaction
processing method
according to the present invention;
[21] Figure 5 is a schematic flow chart of another example of a data
interaction processing
method according to the present invention;
[22] Figure 6 is a schematic structural diagram of an example of a data
interaction processing
system according to the present invention;
[23] Figure 7 is a schematic structural diagram of an example of a data
interaction processing
device according to the present invention. Figure
[24] [Description of the Preferred Examples]
[25] In order to explain on the technical content, construction
characteristics, the purpose and
effect of the invention, the following combination of the attached drawings
and the
embodiment of the invention are explained in detail.
[26] Please refer to Figure 1, it is a schematic flow chart of an example
of an online fund
management method according to the present invention. Please refer to Figure 2
together.
Figure 2 is a schematic diagram of online funds management according to an
example of
the present invention. The online funds management method includes the
following steps:
[27] S101: First Participant delivers a request to the first Funds-
Management server to deduct
funds from a Second Participant account to a target account.
[28] When the Second Participant purchases the commodity/services from
Third Participant, the
funds flow of the Second Participant account is abnormal (for example, when
the Second
Participant falls into a civil economic dispute), the First Participant
intervenes.
[29] First Participant delivers a request to the First Funds-Management
server to deduct funds
from a Second Participant account to a target account. The target account is
an account
designated by First Participant, and the first Funds-Management server is an
account
4
CA 02993034 2018-01-19
WO 2017/012001 PCT/CN2015/084568
management server of Second Participant.
[30] Further, First Participant is a third-party institution that has the
authority to deduct funds.
Third-party agency is either the court, the customs, or any of the taxes.
[31] S102: In response to the request, the first Funds-Management server
performs identity
verification on the First Participant.
[32] After receiving the request delivered by First Participant, the first
Funds-Management
server responds to the request, and performs identity verification on the
First Participant's
identity information to confirm whether First Participant's identity
information is valid and
confirm whether the funds required to be deducted include at least some of the
funds for
the Second Participant's electronic certificate.
[33] Wherein, when the first Funds-Management server confirms that the
funds except the
electronic certificate in the Second Participant account are less than the
funds that need to
be deducted, the funds that need to be deducted include at least part of the
funds of the
Second Participant's electronic certificate.
[34] When First Funds-Management server confirms that First Participant's
identity information
is untrue, it delivers First Participant an error message indicating that
First Participant's
identity information is incorrect.
[35] When the first Funds-Management server confirms that the identity
information of the First
Participant is valid and confirms that the funds to be deducted include at
least part of the
funds of the second Participant's electronic certificate, step S103 is
performed.
[36] S103: After the first Funds-Management server verifies the identity
information of the First
Participant and confirms that the funds that need to be deducted include at
least part of the
funds of the second Participant's electronic certificate, release the funds
which is not
greater than the amount of the electronic certificate, so as to deduct funds
from the target
account and deliver the electronic certificate information after the funds are
deducted to the
second Funds-Management server; wherein the electronic certificate information
at least
includes The amount of funds.
[37] When the first Funds-Management server confirms that the First
Participant's identity
information is valid and confirms that the funds to be deducted include at
least part of the
funds of the Second Participant's electronic certificate, invoke the pre-saved
electronic
signature of the Second Participant to read the information in the electronic
certificate and
release funds not more than electronic certificate to deduct funds from the
target account
designated by First Participant. After that, the funds certificate will be
delivered to the
second Funds-Management server.
[38] Wherein, the electronic certificate involved in the example of the
present invention may be
CA 02993034 2018-01-19
WO 2017/012001 PCT/CN2015/084568
referred to as "Bank Credit Certificate". Bank Credit Certificate is a payment
certificate of
electronic credit commitment which is based on the application of the first
participant by
the funds management institution to freeze the applicant's funds or credit
limit and opened
in the name of the bank and commits to settle in accordance with the agreed
conditions.
Electronic certificate Information includes at least the funds limit. The
second
Funds-Management server is the account administration server for the Third
Participant.
[39] Further, the first Funds-Management server is the Funds-Management
server of the first
bank, the second Funds-Management server is the Funds-Management server of the
second
bank; the released funds are the deposits of the Second Participant on the
first
Funds-Management server or the credits of the Second Participant on the first
Funds-Management server or the funds corresponding to the real estate
mortgaged by the
Second Participant on the first Funds-Management server.
[40] Further, in another example, the first Funds-Management server and the
second
Funds-Management server may be the same Funds-Management server.
[41] Further, after releasing funds not exceeding the amount of the
electronic certificate, the
state of the electronic certificate is changed to a failure state and the
information of the
funds deduction is recorded. Wherein, the withholding information includes at
least one of
the First Participant information, the deducted amount of funds and the target
account
information.
[42] S104: the second Funds-Management server delivers the received
electronic certificate
information to the Third Participant.
[43] The second Funds-Management server delivers the received electronic
certificate
information delivered by the first Funds-Management server to the Third
Participant.
[44] S105: the Third Participant obtains the electronic certificate
information.
[45] Third Participant after confirming the information of the electronic
certificate delivered by
the second Funds-Management server, confirm whether to continue the
transaction with the
Second Participant.
[46] For example, the Third Participant refuses to continue trading with
the Second Participant
when the amount of funds in the second Participant's electronic certificate is
less than the
amount corresponding to the commodity / services purchased by Second
Participant. Third
Participant may not ship to Second Participant, or may recall commodity that
have already
been issued.
[47] In the above solution, when the circulation of the Second Participant
is abnormal, the First
Participant deduct funds from the Second Participant account to the account
designated by
First Participant through the account management server that requests the
Second
6
CA 02993034 2018-01-19
WO 2017/012001 PCT/CN2015/084568
Participant; after successful fund transfer, the Second Participant The
account management
server notifies Third Participant of the change information through Third
Participant's
account management server so that Third Participant can be promptly notified
when the
flow of Second Participant is abnormal, so as to effectively ensure that Third
Participant's
funds interests are not impaired.
[48] Please refer to Figure 3, Figure 3 is a schematic flowchart of an
online funds management
method according to an example of the present invention. The executive body in
this
example is a first Funds-Management server. The online fund management method
in this
example includes the following steps:
[49] S201: the first Funds-Management server receives a request delivered
by the First
Participant for deducting funds from a Second Participant account to a target
account, and
performs identity verification on the First Participant.
[50] When the Second Participant purchases the commodity/services from
Third Participant, the
funds flow of the Second Participant account is abnormal (for example, when
the Second
Participant falls into a civil economic dispute), the First Participant
intervenes.
[51] When First Participant delivers a request to the first Funds-
Management server for a fund
transfer from the Second Participant account to a target account, the first
Funds-Management server receives the request, verifies the First Participant
to confirm
First Whether Participant's identity information is truly legal, and whether
the funds
required to be deducted include at least part of the funds of the Second
Participant's
electronic certificate.
[52] Wherein, when the first Funds-Management server confirms that the
funds except the
electronic certificate in the Second Participant account are less than the
funds that need to
be deducted, the funds that need to be deducted include at least part of the
funds of the
Second Participant's electronic certificate.
[53] The target account is the account designated by First Participant. The
first
Funds-Management server is the account manager of Second Participant.
[54] When First Funds-Management server confirms that First Participant's
identity information
is untrue, it delivers First Participant an error message indicating that
First Participant's
identity information is incorrect.
[55] Step S202 is executed when the first Funds-Management server confirms
that the identity
information of the First Participant is valid and confirms that the funds that
need to be
deducted include at least part of the funds of the Second Participant's
electronic certificate.
[56] S202: When the identity verification passes and confirming that the
funds required to be
deducted include at least a part of the funds of the Second Participant's
electronic
7
CA 02993034 2018-01-19
WO 2017/012001 PCT/CN2015/084568
certificate, the released funds is not greater than the amount of the
electronic certificate so
that to deduct funds from the target account.
[57] When the first Funds-Management server confirms that the identity
information of the First
Participant is valid and confirms that the funds to be deducted include at
least part of the
funds of the second Participant's electronic certificate, the pre-stored
Second Participant's
electronic certificate is invoked to read the information in the electronic
certificate.
[58] Wherein, the electronic certificate involved in the example of the
present invention may be
referred to as "Bank Credit Certificate". Bank Credit Certificate is a payment
certificate of
electronic credit commitment which is based on the application of the first
participant by
the funds management institution to freeze the applicant's funds or credit
limit and opened
in the name of the bank and commits to settle in accordance with the agreed
conditions.
Electronic certificate Information includes at least the funds limit.
[59] After reading the information in the electronic certificate, the first
Funds-Management
server will release no more than the amount of the electronic certificate to
deduct funds to
the target account designated by First Participant.
[60] Further, after releasing funds not exceeding the amount of the
electronic certificate, the
state of the electronic certificate is changed to a failure state and the
information of the
funds deduction is recorded. Wherein, the withholding information includes at
least one of
the First Participant information, the deducted amount of funds and the target
account
information.
[61] S203: Deliver the electronic certificate information after the funds
are deducted to the
second Funds-Management server.
[62] After the First Funds-Management server deducted Funds from the target
account specified
by First Participant, deliver the electronic certificate information after the
deduction of
funds to the second Funds-Management server, so that the Third Participant
confirms
whether to continue the transaction with the Second Participant after
obtaining the
electronic certificate information. The electronic certificate information
includes at least
the credit limit, and the second Funds-Management server is the account
administration
server of the Third Participant.
[63] In the above solution, the first Funds-Management server responds to
the request delivered
by First Participant for deducting funds from the Second Participant account
to the First
Participant when the flow of funds of the Second Participant is abnormal;
after successfully
deducting the funds from the specified account, the change information of the
Second
Participant account is notified to Third Participant through the account
management server
of Third Participant so that Third Participant can be promptly notified when
the flow of
CA 02993034 2018-01-19
WO 2017/012001 PCT/CN2015/084568
Second Participant funds is abnormal, so as to effectively ensure that Third
Participant's
funds interests are not impaired.
[64] Please refer to Figure 4, Figure 4 is a schematic flow chart of third
example of a data
interaction processing method according to the present invention. The data
interaction
processing method in this example includes the following steps:
[65] S301: The First interacting party delivers a request to the First
Service Party to increase the
data value of at least part of the data of the second interactive data unit to
a target data unit.
[66] When the second interacting party performs data interaction with the
third interacting party
and an abnormality occurs in the data unit of the second interacting party,
the first
interacting party delivers a request to the First Service Party to increase
the data value of at
least part of the data of the second interactive data unit to a target data
unit. The target data
unit is specified by the first interacting party.
[67] S302: the First Service Party, upon receiving the request, performs
identity verification on
the first interacting party.
[68] Upon receiving the request, the First Service Party performs identity
verification on the
identity information of the first interacting party to confirm whether the
identity
information of the first interacting party is true and confirm whether the
data values that
need to be added include at least part of the data value of the data
certificate of the second
interactive party.
[69] Where, when the First Service Party verifies that the data value of
the second interacting
party data unit except the data value of the data certificate is smaller than
the data value to
be added, the data value that needs to be added includes at least a part of
the data value of
the data certificate of the second interacting party.
[70] When the First Service Party confirms that the identity information of
the First Participant
is not true, it delivers an identity error message to First Participant to
indicate that the First
Participant identity information is incorrect.
[71] When the First Service Party confirms the identity information of the
First interacting
party, and confirms that the data value that needs to be increased includes at
least part of
the data value of the data certificate of the second interactive Party, the
execution step
S303.
[72] S303: When the First Server party passes the identity verification for
the first interacting
party and confirms that the data value that needs to be added includes at
least a part of the
data value of the data certificate of the second interacting party, the first
data to be
unlocked is not larger than the data value of the data certificate, so as to
increase the data
that is equal to the first data size to the target data unit, and transmit the
data certificate
9
CA 02993034 2018-01-19
=
WO 2017/012001
PCT/CN2015/084568
information that is changed by data value to Second Service Party; wherein,
the data
certificate information at least includes a data value.
[73] When the First Service Party confirms that the identity information of
the first interacting
party is real, it invokes the data certificate of the second interacting party
saved in advance
to obtain the information contained in the data certificate and unlocks the
first data that is
not larger than the data value of the data certificate, to increase the data
size equal to the
first data size to the target data unit specified by the first interacting
party. After that, the
data certificate information that is changed by the data value is delivered to
the Second
Service Party. Wherein, the data certificate information includes at least the
data value.
[74] S304: the Second Service Party delivers the received data certificate
information to a third
interactive party.
[75] The Second Service Party delivers the received data certificate
information to the third
interactive party.
[76] S305: the third interaction party obtains the data certificate
information.
[77] The third party obtains the data certificate information delivered by
the Second Service
Party to confirm whether to continue interacting with the Second Participant.
[78] The data interaction processing method in the example of the present
invention is described
below by way of example.
[79] For example, the first Interacting Party is User A, the second
interacting party is User B,
User B corresponds to First Service Party, the third interacting party is for
C, and user C
corresponds to Second Service Party. User B is an administrator for more than
one client
and has a corresponding password for each client for administrator privileges.
User A has
higher administrative privileges than User B. Clients can be personal
computers, tablets,
smart phones and other devices that can exchange data with servers through the
network.
[80] When the user C obtains the password of the management authority of
the Client 2 from
the User B, applies for the data certificate of the User B from the First
Server party through
the Second Service Party, and when User B's data flow appears abnormal, User A
with
higher administrative authority is involved in management. User A delivers to
the First
Service Party a request to add a password for administrative privileges to at
least some
clients of a user B data unit to a target data unit.
[81] When the First Service Party passes identity verification for user A
and confirms that the
password of the client that needs additional management authority includes the
password
of the management authority of at least part of the client in the data
certificate of user B,
calling user B's data certificate to obtain the password for managing all
clients managed by
user B, the password for unlocking some client's administrative privileges,
and adding the
CA 02993034 2018-01-19
WO 2017/012001 PCT/CN2015/084568
password for managing the privileged clients for unlocked clients to the
target data unit. At
this point, User B's data certificate does not contain the password to unlock
some of the
client's administrative permissions.
[82] The First Service Party delivers the updated data certificate
information of User B to the
Second Service Party so that the Second Service Party notifies User C of the
change
information, so that after obtaining the change information of User B's data
certificate, it is
possible to confirm whether or not the password of the management authority of
the Client
2 can also be obtained. When the password of the Client 2 can not be obtained,
the User A
cannot interact with the data.
[83] In the above, User A has higher management authority than User B. When
User B has
abnormal account information, User A performs risk control on the data
interaction
between user C and User B, It avoids the problem that the user C can't get the
client data
and avoid the risk of the security of the client data.
[84] Further, the requested data may also be text data, audio data, video
data, program data or
financial data in the fmancial field, etc. if it is the financial data, such
as funds, then the
second parties have the authority institutions of third party (such as the
court, the customs,
the tax authorities), the first interactive party is the buyer, the third
interaction is the seller,
the First Service Party is the First Funds-Management server, Second Service
Party is the
Second Funds-Management server, for example, the bank. If it is audio data,
such as a
song, the data requester and the data initiator may be clients with multimedia
playing
functions such as mobile phones, and the server is a music website server.
[85] In the above solution, when the data flow of the second interacting
party is abnormal, the
first interacting party increases the target data unit specified by the first
interacting party
from the data unit of the second interacting party by requesting the service
party of the
second interacting party data; after the service party of the second
interacting party calls
data certificate to successfully add data to the target data unit, the change
information of
the data certificate of the second interacting party is notified to the third
interacting party
through the service party of the third interacting party, when the data
exchange between the
two parties is abnormal, the third party is notified promptly to effectively
avoid the data
security risk of the third party.
[86] Please refer to Figure 5, Figure 5 is a schematic flowchart of another
example of a data
interaction processing method according to the present invention. The
executive body of
this example is First Service Party. The data interaction processing method in
this example
includes the following steps:
[87] S401: The First Service Party receives a request delivered by a first
interacting party to
11
CA 02993034 2018-01-19
WO 2017/012001 PCT/CN2015/084568
increase a data value of at least a part of data of a second interacting party
data unit to a
target data unit, and performs identity verification on the first interacting
party.
[88] When the second interacting party performs data interaction with the
third interacting party
and an abnormality occurs in the data unit of the second interacting party,
the first
interacting party delivers a request to the First Service Party to increase
the data value of at
least part of the data of the second interactive data unit to a target data
unit. The target data
unit is specified by the first interacting party. The First Service Party
manages the data of
the Second Participant's data unit.
[89] Upon receiving the request, the First Service Party performs identity
verification on the
information of the first interacting party to confirm whether the identity
information of the
first interacting party is true and confirm whether the data values that need
to be added
include at least part of the data value of the data certificate of the second
interactive party.
[90] Where, when the First Service Party verifies that the data value of
the second interacting
party data unit except the data value of the data certificate is smaller than
the data value to
be added, the data value that needs to be added includes at least a part of
the data value of
the data certificate of the second interacting party.
[91] When the First Service Party confirms that the identity information of
the First Participant
is not true, it delivers an identity error message to First Participant to
indicate that the First
Participant identity information is incorrect.
[92] When the First Service Party confirms the identity information of the
First interacting
party, and the data value that needs to be increased includes at least part of
the data value of
the data certificate of the second interactive Party, the execution step S402.
[93] S402: When the identity verification passes and it is confirmed that
the data value that
needs to be added includes at least a part of the data value of the data
certificate of the
second interacting party, the first data not greater than the data certificate
data value is
unlocked to add a data value equal to the first data size to the target data
unit.
[94] When the First Service Party confirms that the identity information of
the first interacting
party is real and confirms that the data value to be added needs to include at
least part of
the data valuesof the data certificate of the second interacting party, the
data certificate of
the second interacting party that is saved in advance is called to get the
information
contained in the data certificate. The data certificate information includes
at least the data
value.
[95] After acquiring the information contained in the data certificate, the
First Service Party
unlocks the first data whose size is not larger than the data certificate data
value and adds
the data with the same size as the first data to the target data unit
designated by the first
12
CA 02993034 2018-01-19
WO 2017/012001 PCT/CN2015/084568
interacting party.
[96] S403: Deliver the data certificate information from the data value
change to the Second
Service Party.
[97] After that, the First Service Party delivers data certificate
information whose data value is
changed to the Second Service Party, so that when the third party receives the
data
certificate information delivered by the Second Service Party, the third party
obtains the
data certificate information, and then confirms whether to continue with the
second
interaction data exchange. Wherein, the data certificate information includes
at least the
data value.
[98] In the above solution, when the data flow of the second interacting
party is abnormal, the
First Service Party receives the data delivered from the first interacting
party from the data
unit of the second interacting party and adds the data to the target data unit
designated by
the first interacting party; after the First Service Party calls the data
certificate of the
second interacting party to successfully add data to the target data unit, the
First Service
Party notifies the third interacting party of the change information of the
data certificate of
the second interacting party through the service party of the third
interacting party, when
the data flow of the party is abnormal, it promptly notifies the third party
to effectively
avoid the data security risk problem of the third party.
[99] Please refer to Figure 6, Figure 6 is a schematic structural diagram
of an example of a data
interaction processing system according to the present invention. The data
interaction
processing system in this example includes a first interactive party, a second
interactive
party, a First Service Party, a Second Service Party, and a third interactive
party. Each
interactive party and the service party included in the data interaction
processing system in
this example are used to execute each step in the example corresponding to
Figure 4 and
Figure 4. For specific details, refer to the examples corresponding to Figure
4 and Figure 4,
which are not covered here.
[100] The first interacting party is used to deliver a request to the First
Service Party to increase
the data value of at least part of the data of the second interactive data
unit to a target data
unit.
[101] The First Service Party is used to receive the request and perform
identity verification on
the first interacting party. When the identity verification of the first
interacting party passes
and it is confirmed that the data value to be added needs to include at least
a part of the
data value of the data certificate of the second interacting party, the first
data not greater
than the data certificate data value is unlocked, the target data unit adds a
data value equal
to the first data size and delivers the data certificate information whose
data value is
13
CA 02993034 2018-01-19
WO 2017/012001 PCT/CN2015/084568
changed to the Second Service Party, where the data certificate information at
least
includes the data value.
[102] Second Service Party is used to deliver the received data certificate
information to the third
party.
[103] The third party is used to obtain data certificate information.
[104] In the above solution, when the data flow of the second interacting
party is abnormal, the
First Service Party receives the data delivered from the first interacting
party from the data
unit of the second interacting party and adds the data to the target data unit
designated by
the first interacting party; after the First Service Party calls the data
certificate of the
second interacting party to successfully add data to the target data unit, the
First Service
Party notifies the third interacting party of the change information of the
data certificate of
the second interacting party through the service party of the third
interacting party, when
the data flow of the party is abnormal, it promptly notifies the third party
to effectively
avoid the data security risk problem of the third party.
[105] Please refer to Figure 7, Figure 7 is a schematic structural diagram of
an example of a data
interaction processing device according to the present invention. Each module
included in
the data interaction processing device in this example is used to execute each
step in the
example corresponding to Figure 5 and Figure 5. For details, refer to the
example
corresponding to Figure 5 and Figure 5, and details are not described herein
again. The data
interaction processing device 700 in this example includes a receiving module
710, a
verification module 720, a processing module 730, and a delivery module 740.
[106] The receiving module 710 is used to receive a request delivered by a
first interacting party
to increase a data value of at least a part of data of a second interacting
party to a target
data unit.
[107] The verification module 720 is used to perform identity verification on
the first interacting
party received by the receiving module 710 and confirm whether the data value
that needs
to be added includes at least a part of the data value of the data certificate
of the second
interacting party.
[108] The processing module 730 is used to: when the verification module 720
passes the
identity verification and confirms that the data value that needs to be added
includes at
least a part of the data value of the data certificate of the second
interacting party, the first
data not greater than the data certificate data value is unlocked to add a
data value equal to
the first data size to the target data unit.
[109] The delivery module 740 is used to deliver data certificate information
that is changed by
data value to Second Service Party, where data certificate information
includes at least data
14
value.
[110] In the solution above, when the data flow of the second interaction
party is abnormal, the
data interaction processing device receives the data unit from the second
interactive party
sent by the first interaction party, and adds data to the target data unit
specified by the first
interactive party; After the data exchange processing device calls the data
certificate of the
second interacting party to successfully add data to the target data unit, the
data interaction
processing device notifies the third interacting party of the change
information of the data
certificate of the second interacting party through the service party of the
third interacting
party, when the data exchange between the two parties is abnormal, the third
party is
notified in time to effectively avoid the data security risk of the third
party.
[111] A person of skill in the art considers the problems disclosed herein and
sought to be solved
by the present disclosure to be exclusively computer problems and contemplates
only
solutions to those problems that include essential computer elements. Abstract
ideas, mere
schemes, plans, rules, or mental processes that do not include computer
elements are
expressly excluded from this application.
[112] The above is only an example of the present invention and is not
intended to limit the scope
of the invention as a matter of limitation, either by way of equivalent
construction or
equivalent process transformation using the present specification and the
accompanying
drawings, directly or indirectly used in other related technical fields, which
are included in
the scope of the patent protection of the present invention.
Date Recue/Date Received 2020-06-02