Language selection

Search

Patent 2998517 Summary

Third-party information liability

Some of the information on this Web page has been provided by external sources. The Government of Canada is not responsible for the accuracy, reliability or currency of the information supplied by external sources. Users wishing to rely upon this information should consult directly with the source of the information. Content provided by external sources is not subject to official languages, privacy and accessibility requirements.

Claims and Abstract availability

Any discrepancies in the text and image of the Claims and Abstract are due to differing posting times. Text of the Claims and Abstract are posted:

  • At the time the application is open to public inspection;
  • At the time of issue of the patent (grant).
(12) Patent: (11) CA 2998517
(54) English Title: PROCESSING METHOD FOR ACQUIRING TARGET DATA, SERVER, AND ONLINE FUNDING METHOD
(54) French Title: PROCEDE DE TRAITEMENT POUR ACQUERIR DES DONNEES CIBLES, SERVEUR, ET PROCEDE DE FINANCEMENT EN LIGNE
Status: Granted and Issued
Bibliographic Data
(51) International Patent Classification (IPC):
  • H4L 9/40 (2022.01)
  • G6Q 20/38 (2012.01)
  • G6Q 40/00 (2023.01)
  • H4L 9/32 (2006.01)
(72) Inventors :
  • ZHANG, YI (China)
(73) Owners :
  • 10353744 CANADA LTD.
(71) Applicants :
  • 10353744 CANADA LTD. (Canada)
(74) Agent: BLAKE, CASSELS & GRAYDON LLP
(74) Associate agent:
(45) Issued: 2023-04-25
(86) PCT Filing Date: 2015-09-16
(87) Open to Public Inspection: 2017-03-23
Examination requested: 2020-08-28
Availability of licence: N/A
Dedicated to the Public: N/A
(25) Language of filing: English

Patent Cooperation Treaty (PCT): Yes
(86) PCT Filing Number: PCT/CN2015/089732
(87) International Publication Number: CN2015089732
(85) National Entry: 2018-03-13

(30) Application Priority Data: None

Abstracts

English Abstract

A processing method for acquiring target data, a terminal, a server, and an online funding method. The processing method for acquiring target data comprises: a first server receives an exchange request transmitted by a first terminal for acquiring target data and transmits the exchange request to a second terminal (S10), where the exchange request comprises descriptive information and a data value of the target data and also comprises coverage information, and the coverage information is generated when the second server detects that the target data complies with a coverage range of the second server. By such means, security guarantee can be provided before the target data is provided to the exchanging terminals, thus increasing the security and exchange efficiency of the target data.


French Abstract

L'invention concerne un procédé de traitement pour acquérir des données cibles, un terminal, un serveur et un procédé de financement en ligne. Le procédé de traitement pour acquérir des données cibles comprend les étapes suivantes : un premier serveur reçoit une requête d'échange transmise par un premier terminal pour acquérir des données cibles et transmet la requête d'échange à un second terminal (S10), la requête d'échange comprenant des informations descriptives et une valeur de donnée des données cibles et comprenant également des informations de couverture, et les informations de couverture étant générées lorsque le second serveur détecte que les données cibles sont conformes à une plage de couverture du second serveur. Par ce moyen, une garantie de sécurité peut être fournie avant que les données cibles soient fournies aux terminaux d'échange, ce qui augmente la sécurité et l'efficacité d'échange des données cibles.

Claims

Note: Claims are shown in the official language in which they were submitted.


Claims:
1. A computer server for facilitating online data exchange, the server
comprising:
a receiving module configured to receive an interactive request for acquiring
target data,
the request being delivered by a first terminal, wherein the interactive
request includes a
data value, target data information as well as fraud risk information, wherein
the fraud
risk information is generated by a second server when the second server
verifies whether
the target data conforms to a fraud risk level scope for the second server
and, based at
least in part on the fraud risk information, providing fraud risk evaluation
to a second
terminal to promote progress of the online data exchange;
an interactive request delivering module configured to deliver the interactive
request to
the second terminal; and
a first data certificate acquisition module configured to acquire a first data
certificate, the
interactive request including a link address for storing the first data
certificate in the
second server, the link address further including a URL address that points to
the first
data certificate.
2. The computer server of claim 1, wherein the first data certificate includes
the data value of
the interactive request equal to the data value of target data.
3. The computer server of claim 1 or 2, wherein the first data certificate
includes information
corresponding to the interactive request.
4. The computer server of claim 1 further including a first data
certificate delivering module.
5. The computer server of claim 4, wherein the first data certificate
delivering module is
configured to deliver the first data certificate to the second terminal.
17

6. The computer server of any one of claims 1 to 5, wherein the interactive
request further
includes a pre-set time limit for acquiring the target data.
7. The computer server of any one of claims 1 to 6, wherein the target
data information includes
a purpose of the target data.
8. The computer server of any one of claims 1 to 7, wherein the link address
further includes
data initiator information.
9. The computer server of any one of claims 1 to 8, wherein the link address
further includes
basic information of the target data.
10. A terminal for facilitating online data exchange comprising:
a plurality of computer processors for data processing;
a computer memory for storing data;
a plurality of applications; and
a plurality of programs configured to be stored in the computer memory and to
be
executed by the plurality of computer processors;
a plurality of instructions included in the plurality of programs, the
instructions
configured to:
18

receive an interactive request for acquiring target data, the request being
delivered by a
first terminal, wherein the interactive request includes a data value, target
data
information as well as fraud risk information, wherein the fraud risk
information is
generated by a second server if the second server verifies that the target
data conforms to
a fraud risk level scope for the second server and, based at least in part on
the fraud risk
information, providing fraud risk evaluation to a second terminal to promote
progress of
the online data exchange;
acquire a first data certificate for delivering the first data certificate to
the second
terminal, the interactive request including a link address for storing the
first data
certificate in the second server, the link address further including a URL
address that
points to the first data certificate; and
deliver the interactive request to the second terminal.
11. The terminal of claim 10, wherein the first data certificate includes the
data value of the
interactive request equal to the data value of the target data.
12. The terminal of claim 10 or 11, wherein the first data certificate
includes information
corresponding to the interactive request.
13. The terminal of any one of claims 10 to 12, wherein the interactive
request further includes a
pre-set time limit for acquiring the target data.
14. The terminal of any one of claims 10 to 13, wherein the target data
information includes a
purpose of the target data.
15. The terminal of any one of claims 10 to 14, wherein the link address
further includes data
initiator infoimation.
19

16. The terminal of any one of claims 10 to 15, wherein the link address
further includes basic
information of the target data.

Description

Note: Descriptions are shown in the official language in which they were submitted.


CA 2,998,517
Blakes Ref. 15289/00003
Title: Processing Method For Acquiring Target Data, Server, And Online
Funding Method
[11 [Technical Field]
[2] The present invention relates to the field of Internet data interaction
technology, and in
particular, to a method for processing target data, a server, and an online
financing method.
[31 [Background Technology]
[4] With the development of Internet technology and especially mobile
Internet technology,
users can connect to the Internet through mobile devices using 2G, 3G, 4G or
WiFi to
conduct transactions and social activities. Users can conveniently and
effectively perform
online activities, this is an incomparable experience with offline.
[51 However, when users conduct transactions such as trading and social
networking through
the mobile Internet, their personal sensitive information is easily exposed
and may be
acquired by others in the process of interaction so that they can use their
information for
illegal purposes. This will provide network users a lot of risk.
[6] [Summary of the Invention]
[71 The technical problem to be solved by the present invention is to
provide a processing
method for acquiring target data, a server and a terminal device, to detect
whether target
data required for interaction meets a guarantee range (i.e., assurance scope)
and to interact
with the target data when the target data meets the assurance scope, improving
the
efficiency and security of network data interaction.
[8] The present invention provides a processing method for acquiring target
data, which
includes: receiving, by a First Server, an interactive request for acquiring
target data
delivered by a first terminal, and delivering the interactive request to a
second terminal,
where the interactive request includes description information and a data
value of the target
data, and further includes assurance information generated by a Second Server
if the
Second Server detects that the target data meets an assurance scope of the
Second Server.
[91 The present invention also provides a server, including: a receiving
module, configured to
receive an interactive request for acquiring target data delivered by a first
terminal, wherein
the interactive request includes description information and data values of
the target data,
and further includes assurance information generated by a Second Server if the
Second
Server detects that the target data meets an assurance scope of the Second
Server; and an
interactive request delivering module configured to deliver the interactive
request to the
1
24126705.2
Date Recue/Date Received 2021-05-25

CA 2,998,517
Blakes Ref. 15289/00003
second terminal.
[10] The present invention also provides a terminal device, comprising: one
or more processors;
a memory; a plurality of application programs; and one or more programs,
wherein the one
or more programs are stored in the memory and configured to be executed by the
one or
more processors, the one or more programs including instructions for:
receiving an
interactive request to obtain target data delivered by a first terminal;
wherein the interactive
request includes the description information and the data value of the target
data and
further includes assurance information generated if the Second Server detects
that the
target data meets an assurance scope of the Second Server; and delivers the
interactive
request to the second terminal.
[11] In the above processing method for acquiring target data, the Second
Server detects the
target data in advance and generates corresponding guarantee information when
detecting
the Second Server's coverage, and the First Server delivers an interactive
request including
the guarantee information to the second terminal realizes the interaction of
the target data
between the first terminal and the second terminal and provides the security
guarantee
before providing the target terminal for the second terminal so as to improve
the target data
security and the interaction efficiency.
[12] Another object of the present invention is to provide an online
financing method that can
be used to examine the target project in need of fund raising and increase the
insurance
information when the approval is passed, thereby reducing the funds risk of
the investor
and promoting the project financing progress.
[13] The present invention provides an online financing method, comprising:
The First Server
receives a fund raising request delivered by a first terminal for a target
project, and delivers
the fund raising request to a second terminal. The fund raising request
includes the
description information of the target project and the required fund raising
amount, and also
including the insurance information; and the insurance information is
generated when the
second Server verifies that the target item conforms to the scope of the
Second Server.
[14] The above method of online fund-raising, which is reviewed by Second
Server in advance
and raised the corresponding insurance information for the financing item when
it meets
the scope of Second Server, first Server issues the financing request
containing the
insurance information so as to introduce the assessment and guarantee of
Second Server
when funding the project, provide investment risk protection for other
investors (the
second terminal) and promote the progress of project financing.
[15] [Brief Description]
2
24126705.2
Date Recue/Date Received 2021-05-25

CA 2,998,517
Blakes Ref. 15289/00003
[16] Figure 1 is a flowchart of a method for processing target data
according to a first example
of the present invention;
[17] Figure 2 is a flow chart of a method for processing target data in a
second implementation
manner of the present invention;
[18] Figure 3 is a schematic flowchart of a method for processing target
data according to a
third example of the present invention;
[19] Figure 4 is a schematic diagram of a processing relationship of
acquiring target data
according to an example of the present invention;
[20] Figure 5 is a schematic flowchart of a method for processing target
data according to a
fourth example of the present invention;
[21] Figure 6 is a schematic structural diagram of a server in an example
of the present
invention;
[22] Figure 7 is a schematic structural diagram of a terminal device in an
example of the present
invention;
[23] Figure 8 is a schematic flow chart of a method for online financing
according to a first
example of the present invention;
[24] Figure 9 is a schematic flow chart of a method for online fundraising
in a second example
of the present invention;
[25] Figure 10 is a schematic flowchart of a method for online financing
according to a third
example of the present invention;
[26] Figure 11 is a schematic diagram of the fund raising relationship in
the example of the
present invention.
[27] [Description of the Preferred Examples]
[28] The technical solution in the examples of the present invention will
be clearly and
completely described below with reference to the accompanying drawings in the
examples
of the present invention. Apparently, the described example are only a part
but not all of the
examples of the present invention. All other examples obtained by persons of
ordinary skill
in the art based on the examples of the present invention without creative
efforts shall fall
within the protection scope of the present invention.
[29] Please refer to Figure 1, which is a schematic flowchart of a method
for acquiring target
data according to a first example of the present invention. The method
includes:
[30] In step S10, the First Server receives the interactive request for
acquiring the target data
delivered by the first terminal, and delivers the interactive request to the
second terminal.
[31] Wherein, the interactive request contains description of the target
data, data values and
3
24126705.2
Date Recue/Date Received 2021-05-25

CA 2,998,517
Blakes Ref. 15289/00003
assurance (e.g., insurance coverage, security, permission level of first
terminal)
information. The assurance information is generated when Second Server detects
that the
target data meets an assurance scope of Second Server.
[32] In the above solution, the Second Server detects the target data in
advance and generates
corresponding assurance information to be compared against the Second Server's
assurance
(e.g., insurance) coverage/scope, and the First Server delivers an interactive
request
including the assurance information to the second terminal thus realizing the
interaction of
the target data between the first terminal and the second terminal and
providing assurance
for the second terminal before providing the target data so as to improve the
target data
security and the interaction efficiency.
[33] Please refer to Figure 2, which is a schematic flowchart of a method
for acquiring target
data according to a first example of the present invention. The method
includes:
[34] Step S20: the first terminal delivers an interactive request for
obtaining target data to the
First Server.
[35] Wherein, the interactive request includes description information and
data values of the
target data, and further includes security information, which is generated
when Second
Server detects that the target data conforms to the scope of the Second
Server. The request
may also include a target date, which is the time period for obtaining the
target data.
[36] The descriptive information of the target data can be the purpose of
the target data.
[37] Specifically, the first terminal logs in and accesses the First
Server, and delivers an
interactive request for acquiring the target data.
[38] Step S21: the First Server obtains, according to the interactive
request, a first data
certificate whose data value is equal to the data value of the target data,
and delivers the
first data certificate to the second terminal. Wherein, the first data
certificate contains the
information of the interactive request.
[39] In the above solution, when an interactive request is delivered to
acquire the target data, the
Second Server detects the target data and generates the protection information
when the
detection succeeds, and releases the target data in the form of the first data
certificate with
the guarantee information. Therefore, before providing the requested data to
the second
terminal, a security verification mechanism is provided, which has a role of
transferring the
data security risk.
[40] Please refer to Figure 3, which is a flowchart of a method for
processing target data
according to a third example of the present invention. The method flow shown
in this
example includes:
4
24126705.2
Date Recue/Date Received 2021-05-25

CA 2,998,517
Blakes Ref. 15289/00003
[41] Step S30: the first terminal initiates an interactive request for
acquiring target data to the
First Server.
[42] Wherein, the interactive request includes description information and
data values of the
target data, and further includes security information, which is generated
when Second
Server detects that the target data conforms to the scope of the Second
Server.
[43] Specifically, the first terminal logs in and accesses the First
Server, and delivers an
interactive request for acquiring the target data.
[44] Step S31: the First Server obtains, according to the interactive
request, a first data
certificate whose data value is equal to the data value of the target data,
and delivers the
first data certificate to the second terminal. Wherein, the first data
certificate contains the
information of the interactive request.
[45] In an implementation manner, when the Second Server detects that the
target data meets
the guarantee scope of the Second Server and generates the safeguard
information, the First
Server generates the first data certificate with the safeguard information.
The Second
Server detects the target data and adds the guarantee information to the
target data when it
is determined that the detection meets the guarantee range and still retains
the guarantee
information in the first data certificate generated by the First Server. The
safeguard
information may include backup information of the target data, identity
information of
Second Server, and so on.
[46] In another example, the First Server obtains the first data
certificate from the Second
Server according to the interactive request. Wherein, the first data
certificate is generated
when the second data server detects that the target data meets the scope of
Second Server
and the interactive request includes at least the storage address of the first
data certificate in
the Second Server. Specifically, the interactive request delivered by the
first terminal to the
First Server is a link address (that is, a storage address) of the first data
certificate, and the
link address includes a URL address that points to the first data certificate,
and may further
include information of the target data, data initiator information, basic
information of the
target data (e.g., data attributes, format, etc.).
[47] Step S32: the second terminal receives the first data certificate
delivered by the First Server
and delivers the first data to the Third Server.
[48] In step S32, at least one second terminal is communicatively connected
to the First Server
over the network, and the First Server issues the first data certificate to
each second
terminal over the network.
[49] Specifically, the second terminal selects the first data from the data
stored in the second
24126705.2
Date Recue/Date Received 2021-05-25

CA 2,998,517
Blakes Ref. 15289/00003
terminal, and delivers the first data to the first terminal. The size of the
data value of the
first data may be larger than the size of the data value of the target data or
may be smaller
than the size of the data value of the target data.
[50] Step S33: When the sum of the sizes of the data values of all the data
delivered by the
second terminal and received by the third server within the target date is not
smaller than
the data value of the target data, the third server delivers the received data
to the first
terminal
[51] In the above solution, the First Server obtains the first data
certificate according to the
interactive request of obtaining the target data initiated by the first
terminal, and each
second terminal delivers the first data to the Third Server. When the Third
Server receives
the target data within the target date when the sum of the data sizes of all
the data delivered
by the second terminal is not less than the data value of the target data, the
received data is
delivered to the first terminal, so that the first terminal obtains the data
whose size is not
smaller than the value of the target data. Before the target data interaction,
the target data is
detected and added by the Second Server, and pre-divides the target data into
a plurality of
sections and respectively saves them in different second terminals, in this
way, the security
risk of the target data itself is reduced, and in the process of interaction
between the target
data, its authority or ownership is guaranteed by risk.
[52] Please refer to Figure 5, which is a schematic flowchart of a method
for acquiring target
data according to a fourth example of the present invention, please also refer
to the
schematic diagram of data interaction shown in Figure 4. The method flow shown
in this
example includes:
[53] Step S40: the first terminal delivers an interactive request for
obtaining target data to the
First Server.
[54] Wherein, the interactive request includes description information and
data values of the
target data, and further includes security information, which is generated
when Second
Server detects that the target data conforms to the scope of the Second
Server.
[55] Step S41: the First Server obtains, according to the interactive
request, a first data
certificate whose data value is equal to the data value of the target data,
and delivers the
first data certificate to the second terminal. Wherein, the first data
certificate contains the
information of the interactive request.
[56] Step S42: the second terminal receives the first data certificate
delivered by the First Server
and delivers a second data certificate to the first terminal. Wherein the
second data
certificate is generated by the Third Server to lock the first data in the
second terminal
6
24126705.2
Date Recue/Date Received 2021-05-25

CA 2,998,517
Blakes Ref. 15289/00003
according to the request of the second terminal.
[57] Step S43: Determine whether the sum of the sizes of the data values
represented by all the
second data certificates delivered by the second terminal and received by the
first terminal
within the target date is not smaller than the data value size of the target
data, and if yes,
enter Step S44, otherwise, go to step S47.
[58] Step S44: the first terminal delivers a data interaction instruction
to the third server.
[59] Step S45: the Third Server receives the data interaction instruction
and delivers the locked
data in the second terminal to the Fourth Server in response to the data
interaction
instruction.
[60] Step S46: the Fourth Server delivers the received data to the first
terminal, so that the first
terminal acquires the target data. Then, the process is over.
[61] Further, in response to the data interaction instruction, the third
server may directly deliver
the locked data in the second terminal to the first terminal, so that the
first terminal
acquires the target data.
[62] Step S47: the first terminal delivers an instruction to the third
server that the target data
request fails.
[63] Step S48, in response to the instruction, the Third Server unlocks the
locked data in the
corresponding second terminal according to the second data certificate. Then,
the process is
over.
[64] In the above solution, after the Second Server detects the target data
that needs to be
obtained by the first terminal and adds the protection information, the First
Server obtains
the first data certificate according to the interactive request, and then
delivers the first data
certificate to the second terminals. The second terminal receives the first
data certificate
and accordingly delivers a second data certificate representing the first data
value to the
first terminal through the Third Server when acknowledging the interactive
request
responding to the first data certificate, enable the first terminal to collect
enough second
data certificate within target date. Where the second data certificate is
generated by the
third server by locking the first data in the second terminal according to the
request of the
second terminal, and when the first terminal obtains a sufficient second data
certificate in
the target date, Server directly or indirectly delivers the data locked by the
second terminal
to the first terminal, so that the target terminal finally obtains the target
data. Before the
target data exchange, the target server detects and adds security information
to the target
data, and pre-divides the target data into a plurality of parts and saves them
in different
second terminals respectively, the target data request that needs to be
acquired is released
7
24126705.2
Date Recue/Date Received 2021-05-25

CA 2,998,517
Blakes Ref. 15289/00003
in the form of the first data certificate with the safeguard information. In
this way, the data
for other terminals are reviewed before the requested data, and it has data
security. At the
same time, the second terminal delivers the corresponding data in the form of
a second data
certificate, so as to reduce the risk of being illegally tampered with, lost
or intercepted by
other terminals during data exchange, making the data exchange in the process
of target
data storage and transmission of a complete and comprehensive protection.
[65] The processing method of acquiring the target data in the example of
the present invention
is described below by way of example.
[66] For example, the first terminal is terminal A, and the second terminal
is terminal Bl,
terminal B2, and terminal B3. Target Data Bit Client D's power-on password,
which is
divided in advance into three parts. Each of the terminal Bl, the terminal B2,
and the
terminal B3 stores a part of the data of the power-on password, and the data
formed can be
used to turn on the client D only when the data of the three sections are
grouped together
and arranged in the correct order. The terminals A, Bl, B2, and B3 and the
client D may be
devices capable of data exchange with the server through a network, such as
personal
computers, tablet computers and smart phones.
[67] Terminal A initiates an interactive request for obtaining target data
(client D's power-on
password) through First Server, and the Second Server detects the target data
and adds
security information to generate three first data certificates, that is, the
first data certificate
a, the first data certificate b and the first data certificate c. The
detection of the target data
by the Second Server includes detecting information (such as format,
description
information, security level, etc.) of the target data, and may further include
detecting
terminal A (to determine information such as a permission level of terminal A)
for
acquiring target data.
[68] The reason for this setting is that the target data or the terminal A
is detected by the Second
Server to ensure whether the target data is allowed to be interacted with
before the target
data is transmitted or whether the terminal A is qualified to use the target
data to ensure that
the data security, and provide a security basis for the terminal Bl, B2, and
B3 to provide
their own saved part of the data.
[69] Wherein, Terminal A knows that the starting password of the client D
is divided into three
parts, so the request to be delivered includes the number of the first data
certificate and the
permission level of terminal A. Each of the three first data certificates
generated by Second
Server contains the permission level of the terminal A, while each first data
certificate also
represents the data corresponding to the target data that needs to be
obtained. For example,
8
24126705.2
Date Recue/Date Received 2021-05-25

CA 2,998,517
Blakes Ref. 15289/00003
the first data certificate a represents the first part of the required power-
on password, the
first data certificate b represents the second part of the required power-on
password, and
the first data certificate c represents the third part of the power-on
password that needs to
be obtained data.
[70] The First Server then delivers the first data certificate to the
terminal Bl, the terminal B2
and the terminal B3, respectively, so that the three terminals select the
matched first data
from the received three first data certificates according to the stored data
certificate, and
delivers the second data certificate to terminal A. Now, taking the terminal
B1 as an
example for description, the terminal B1 stores the second part of the power-
on password,
and selects the first data certificate b representing the second part of the
data. And, the
second data certificate delivered by the terminal B1 is an electronic
certificate generated by
the third server by locking the second part data stored by the third server,
and the third
server is a supervisory computer that manages the terminals Bl, B2, and B3.
Wherein, the
second data certificate is the information representing the second portion of
the data that is
locked, and not the second portion of the data itself. The infoimation
mentioned above may
be a preset symbol, a picture, and so on. Certainly, in other examples, the
terminal B1 may
directly deliver the second part of data to the terminal A as well.
[71] Further, the terminal A receives all the second data certificates
constituting the power-on
password of the client D within the target date, and then requests the Third
Server to
deliver its locked data to the terminal A.
[72] Further, the target data may also be text data, audio data, video
data, program data or
financial data in the financial field, etc. In the case of fund data, such as
funds, the first
terminal is a fund-raising party at this time, the deliverer of the data is an
investor. First
Server is a platform for raising funds. The second, third and fourth servers
are
Funds-Management servers, for example, banks. In the case of audio data, such
as songs,
the data initiator and the data deliverer may be clients with multimedia
playing functions
such as mobile phones. First Server is a music search platform and the second,
third and
fourth servers are music website servers.
[73] Please refer to Figure 6, which is a schematic structural diagram of a
server according to an
example of the present invention. The server 50 shown in this example includes
a receiving
module 51 and an interactive request delivering module 52.
[74] The receiving module 51 is used to receive a first terminal initiated
interactive request for
acquiring target data. Wherein, the interactive request includes description
information and
data values of the target data, and further includes security information,
which is generated
9
24126705.2
Date Recue/Date Received 2021-05-25

CA 2,998,517
Blakes Ref. 15289/00003
when Second Server detects that the target data conforms to the scope of the
Second
Server.
[75] The interactive request delivering module 52 is used to deliver the
interactive request to the
second terminal.
[76] In an example, the server 50 further includes a first data certificate
acquisition module 53
and a first data certificate delivering module 54. The first data certificate
acquisition
module 53 detects that the target data meets the coverage requirement and
increases when
securing the information, a first data certificate is generated according to
the interactive
request. The first data certificate delivering module 54 is used to deliver
the first data
certificate to the second terminal.
[77] In another example, the server 50 further includes a first data
certificate acquisition module
53 and a first data certificate delivering module 54. The first data
certificate acquisition
module 53 obtains, according to the interactive request, the second data
certificate from the
Second Server first data certificate. Wherein, the first data certificate is
generated when the
second data server detects that the target data meets the guaranteed range,
and the request
includes at least the storage address of each first data certificate in the
Second Server.
Specifically, the first data certificate is generated in advance by the first
terminal and stored
in the Second Server. The request delivered by the first terminal to the First
Server is a link
address (that is, a storage address) of the first data certificate, and the
link address includes
point to the URL address corresponding to the first data certificate. It can
also contain
information about the target data, data initiator information, and basic
information about
the target data (e.g., data attributes, formats, etc.). The first data
certificate delivering
module 54 is used to deliver the first data certificate to the second
terminal.
[78] Please refer to Figure 7, which is a schematic structural diagram of a
terminal device in an
example of the present invention. The terminal device 60 in this example is a
server. The
terminal device 60 includes a receiver 61, a processor 62, a transmitter 63, a
read only
memory 64, a random access memory 65, and a bus 66.
[79] The receiver 61 is used for receiving data.
[80] The processor 62 controls the operation of the terminal device 60. The
processor 62 may
also be a CPU (Central Processing Unit). The processor 62 may be an integrated
circuit
chip with signal processing capability. The processor 62 may also be a general
purpose
processor, a digital signal processor (DSP), an application specific
integrated circuit
(ASIC), a field programmable gate array (FPGA) or other programmable logic
device,
discrete gate or transistor logic, discrete hardware components. The general
purpose
24126705.2
Date Recue/Date Received 2021-05-25

CA 2,998,517
Blakes Ref. 15289/00003
processor may be a microprocessor or the processor may also be any
conventional
processor and so on.
[81] This transmitter 63 is used for transmitting data.
[82] The memory may include a read-only memory 64 and a random access
memory 65 and
provide instructions and data to the processor 62. A portion of the memory may
also
include non-volatile random access memory (NVRAM).
[83] The various components of the terminal device 60 are coupled together
by a bus 66, which
may include a power bus, a control bus, a status signal bus, etc., in addition
to the data bus.
However, for the sake of clarity, various buses are labelled as buses 66 in
the figure.
[84] The memory stores the following elements, executable modules or data
structures, or a
subset of them, or their extensions:
[85] Operation Instructions: Various operation instructions are included
for various operations.
[86] Operating System: Includes various system programs for implementing
various basic
services and handling hardware-based tasks.
[87] In the example of the present invention, the processor 62 performs the
following operations
by invoking memory-stored operation instructions (the operation instructions
may be
stored in the operating system):
[88] Receive an interactive request for acquiring target data delivered by
a first terminal,
wherein, the interactive request includes description information and data
values of the
target data, and further includes security information, which is generated
when Second
Server detects that the target data conforms to the scope of the Second
Server. And
[89] The interactive request is delivered to the second terminal.
[90] Optionally, the processor 62 generates a first data certificate
according to the interactive
request when the Second Server detects that the target data meets the coverage
range and
adds the protection information.
[91] Optionally, the processor 62 obtains the first data certificate from
the Second Server
according to the interactive request. Wherein, the first data certificate is
generated when the
second data server detects that the target data meets the guaranteed range,
and the request
includes at least the storage address of each first data certificate in the
Second Server.
Specifically, the first data certificate is generated in advance by the first
terminal and stored
in the Second Server. The request delivered by the first terminal to the
terminal device 60 is
a link address (that is, a storage address) of the first data certificate, and
the link address
includes point to the URL address corresponding to the first data certificate.
It can also
contain information about the target data, data initiator information, and
basic information
11
24126705.2
Date Recue/Date Received 2021-05-25

CA 2,998,517
Blakes Ref. 15289/00003
about the target data (e.g., data attributes, formats, etc.).
[92] Please refer to Figure 8, which is a schematic flowchart of a method
for online fund-raising
in a first example of the present invention, the method includes:
[93] Step S70: the First Server receives the fund raising request for the
target item delivered by
the first terminal, and delivers the fund raising request to the second
terminal.
[94] Wherein, the funding request includes descriptive information of the
target project and the
amount of funds to be raised, and also includes insurance information
generated when
Second Server verifies that the target project meets the scope of the Second
Server.
[95] In the above scheme, Second Server pre-audits the fund-raising project
and adds
corresponding insurance information to the fund-raising project when it meets
the scope of
Second Server. First Server publishes the fund-raising request containing the
insurance
information so that at Second Funds will be introduced into the project to
assess and
guarantee the investment, guarantee investment risks to other investors
(second terminal)
and promote the progress of project financing.
[96] Please refer to Figure 9, which is a schematic flowchart of a method
for online fund-raising
in a second example of the present invention, the method includes:
[97] Step S80: the first terminal delivers a fund raising request for the
target item to the First
Server.
[98] Wherein, the funding request includes descriptive information of the
target project and the
amount of funds to be raised, and also includes insurance information
generated when
Second Server verifies that the target project meets the scope of the Second
Server.
[99] Step S81: the First Server obtains, according to the fund raising
request, a first electronic
certificate with a representative amount of money equal to a fund amount
required to be
raised by the target item, and delivers the plurality of first electronic
certificates to the
second terminal. Wherein, the first electronic certificate contains the
information of the
interactive request.
[100] In this example, the first electronic certificate is an Object Credit
Certificate and is an
electronic document that includes at least a financing amount, a target amount
of funds,
and a preset time.
[101] In the solution above, the First Server obtains the corresponding
first electronic certificate
according to the funding request for the target item delivered by the first
terminal. When
launching a financing project in the form of electronic certificate, Second
Server is
introduced to review and insure the sponsored projects so as to provide
investment trust
and investment risk protection for other investors (the second terminal).
12
24126705.2
Date Recue/Date Received 2021-05-25

CA 2,998,517
Blakes Ref. 15289/00003
[102] Please refer to Figure 10, which is a schematic flowchart of a method
for online financing
according to a third example of the present invention. Please refer to Figure
11, a schematic
diagram of a relationship for fund raising is also shown. The method flow
shown in this
example includes:
[103] Step S90: the first terminal delivers a fund raising request for the
target item to the First
Server.
[104] Wherein, the funding request includes descriptive information of the
target project and the
amount of funds to be raised, and also includes insurance information
generated when
Second Server verifies that the target project meets the scope of the Second
Server.
[105] Step S91: the First Server obtains, according to the fund raising
request, a first electronic
certificate equal to a quota of the funds required to be raised by the target
project, and
delivers the first electronic certificate to the second terminal. Wherein, the
first electronic
certificate contains the information of the interactive request.
[106] In this example, the first electronic certificate is an Object Credit
Certificate and is an
electronic document that includes at least a financing amount, a target amount
of funds,
and a preset time.
[107] In an implementation manner, when the Second Server detects that the
target item meets
the coverage requirement and the insurance information is generated, the First
Server
generates a first electronic certificate with the insurance information. The
Second Server
verifies the target item and determines the guarantee information such as the
insurance fee
and the claim amount when the verification is approved and adds the insurance
information
to the target item and still retains the insurance in the first electronic
certificate generated
by the First Server information.
[108] In another example, the First Server obtains the first electronic
certificate from the Second
Server according to the funding request. The first data certificate is
generated when Second
Server verifies the target project. The request includes at least the storage
address of each
first electronic certificate in the Second Server.
[109] The identification information added for the first electronic
certificate when the test is
passed is the signature of the person or the signature of the institution, so
as to improve the
authority and credibility of the target item when raising funds to the second
terminal user,
reduce the difficulty of raising funds.
[110] In the scenario above, Second Server can be an insurance company
management server that
generates an Object Credit Certificate from an Crowd funding Project via an
Object Credit
Certificate generator loaded with an insurance company audit plug-in. Wherein,
the
13
24126705.2
Date Recue/Date Received 2021-05-25

CA 2,998,517
Blakes Ref. 15289/00003
insurance company will crowd funding project audit, and determine the
insurance costs,
claims amount and so on.
[111] Step S92: the second terminal receives the first electronic mail
delivered by the First Server
and delivers a certain amount of money to the third server.
[112] Step S93: When the total amount of funds received by the third server
within the target
date is not less than the amount of money to be raised for the target item,
the third server
delivers the received funds to the first terminal, so that the first terminal
user obtains
funding for the target project.
[113] In another implementation manner, the second terminal receives the first
electronic
certificate delivered by the First Server and delivers a second electronic
certificate to the
first terminal, and adds the second electronic certificate to the obtained
first electronic
certificate identification information.
[114] Wherein, the second electronic certificate is a Bank Credit
Certificate, which is opened by
the second terminal user with the guarantee of its bank account fund or credit
line, and the
bank promises to process the electronic credit certificate of payment and
settlement
according to the settlement conditions. That is, the Third Server is the Funds-
Management
server for the second terminal user. The second electronic certificate is
opened by the third
server for freezing the account funds or the credit limit of the second
terminal user, and the
frozen account or credit limit is the same as the quota represented by the
first electronic
certificate obtained.
[115] When the sum of the second electronic certificate funds amount received
by the first
terminal in the target date is not less than the amount of money required for
raising the
target item, the first terminal delivers a settlement request to the third
server, and the third
server delivers the settlement request in response to the settlement request.
The funds
frozen in the second terminal user account are allocated to the Fourth Server.
Correspondingly, the fourth server allocates this part of the funds to the
account of the first
terminal user, so that the first terminal user can obtain the funds required
for raising funds.
[116] Wherein, the Fourth Server is the Funds-Management server of the first
terminal.
[117] Further, the third server may further allocate the frozen funds in
the second terminal user
account to the account of the first terminal according to the solution
request, so that the
first terminal obtains the funds needed to be raised.
[118] When the amount of money received by the first terminal within the
target date is less than
the amount of money to be raised for the target item, the first terminal
delivers a funding
failure message to Third Server, and the Third Server responds to the
information to
14
24126705.2
Date Recue/Date Received 2021-05-25

CA 2,998,517
Blakes Ref. 15289/00003
unfreeze the corresponding Second terminal user's account funds.
[119] In the solution above, the First Server obtains the corresponding
first electronic certificate
according to the funding request for the target item delivered by the first
terminal. The
second terminal receives the first electronic certificate delivered by the
First Server and
allocates the corresponding fund to the account of the first terminal user, so
that the first
terminal can raise funds required by the target project within the target
date. When issuing
a financing project in the form of electronic certificate, Second Server is
introduced to
evaluate and guarantee the project so as to provide risk protection to other
investors (the
second terminal).
[120] Further, after receiving the first electronic certificate, each
second terminal may further
deliver a second electronic certificate of equal amount of funds to the Funds-
Management
server of the first terminal, and release the second electronic certificate
after the project
financing is completed. Pay the second electronic certificate to transfer
funds to the first
terminal user's account. Using the second electronic certificate way with the
target
investment projects, the investment of funds is only temporarily frozen,
making investment
safer.
[121] The financing method in the examples of the present invention is
described below by way
of example.
[122] For example, the first terminal is a fund-raising initiator, the Second
Server is an insurance
company, the second terminal is an investor, and the First Server is an E-
commerce
platform.
[123] When the funding initiator issues a request for a target of 1 million
fund-raising through the
E-commerce platform, the E-commerce platform utilizes the Object Credit
Certificate
generator provided by the insurance company or loaded with the insurance
company
review plug-in for this crowd funding item generate Object Credit Certificate.
This Object
Credit Certificate represents a limit of 1 million. Further, the premiums may
be paid by the
sponsor or by the individual. In one example, the Object Credit Certificate
generated by the
initiator is stored on the Second Server and the Object Server Certificate is
published on
the publishing platform via First Server. Wherein, the link information
includes a URL
address pointing to the Object Credit Certificate, and may also include item
introduction
information, sponsor information, commodity images, and so on.
[124] The other investors conduct the follow-up vote. Specifically, the
investor a acquires the
Object Credit Certificate from the initiator, and records the identity
information of the
investor a on the Object Credit Certificate. The investor can use the Bank
Credit Certificate
24126705.2
Date Recue/Date Received 2021-05-25

CA 2,998,517
Blakes Ref. 15289/00003
to purchase, it can also use other methods, such as bank transfer, Alipay and
other network
ways to pay. In the case of Bank Credit Certificate, Third Server freezes the
account of
investor a open the corresponding Bank Credit Certificate for purchasing the
Object Credit
Certificate.
[125] Judgement of successful fund-raising at the expiration of the funding
period and
completion of the transfer of funds. If the project financing is successful,
then enter the
implementation phase, Object Credit Certificate holder based Object Credit
Certificate for
a preset income. Wherein, if the investor a uses Bank Credit Certificate, the
funds of the
account of the third-party investor a will be paid to the sponsor's fund-
raising account. If
unsuccessful, the project financing fails, and the investment fund is returned
according to
the Object Credit Certificate. For example, in the case of a conventional
payment method,
the investment fund is returned to the last assignee of the Object Credit
Certificate. If Bank
Credit Certificate is used for payment, the investor opens a bank credit
certificate to the
financing account for unfreezing.
[126] In the above scheme, the target project is insured by the insurance
company and secured by
the insurance company. The investment needs to purchase Object Credit
Certificate by
online banking payment, bank transfer or through the Bank Credit Certificate
way to buy,
and the success of the target project will be the corresponding of the funds
allocated to the
sponsor's bank account. Use Object Credit Certificate to issue financing
projects and
introduce insurance guarantees for the projects audited by insurance companies
so as to
provide investment risk protection for other investors. The investor purchases
the target
project by means of Bank Credit Certificate. The funds frozen due to the
opening of the
Bank Credit Certificate are not directly transferred to the sponsor's bank
account but
merely frozen by the bank and cannot be used. However, the funds are still
invested by the
investor Bank account. As a result, the risk to the investor is greatly
reduced, and at the
same time it is also possible to obtain additional benefits because the frozen
funds remain
their own.
[127] In the above examples, the present invention has been exemplary
described only, but
various modifications to the present invention can be made by those skilled in
the area after
reading this patent application without departing from the spirit and scope of
the present
invention.
16
24126705.2
Date Recue/Date Received 2021-05-25

Representative Drawing
A single figure which represents the drawing illustrating the invention.
Administrative Status

2024-08-01:As part of the Next Generation Patents (NGP) transition, the Canadian Patents Database (CPD) now contains a more detailed Event History, which replicates the Event Log of our new back-office solution.

Please note that "Inactive:" events refers to events no longer in use in our new back-office solution.

For a clearer understanding of the status of the application/patent presented on this page, the site Disclaimer , as well as the definitions for Patent , Event History , Maintenance Fee  and Payment History  should be consulted.

Event History

Description Date
Inactive: Grant downloaded 2023-04-26
Inactive: Grant downloaded 2023-04-26
Letter Sent 2023-04-25
Grant by Issuance 2023-04-25
Inactive: Cover page published 2023-04-24
Inactive: IPC removed 2023-03-27
Inactive: IPC assigned 2023-03-27
Inactive: IPC assigned 2023-03-27
Inactive: IPC removed 2023-03-27
Inactive: IPC removed 2023-03-27
Inactive: First IPC assigned 2023-03-24
Inactive: IPC removed 2023-03-24
Inactive: IPC removed 2023-03-24
Inactive: IPC removed 2023-03-24
Inactive: IPC removed 2023-03-24
Inactive: IPC assigned 2023-03-24
Pre-grant 2023-03-13
Inactive: Final fee received 2023-03-13
Inactive: IPC from PCS 2023-01-28
Inactive: IPC from PCS 2023-01-28
Inactive: IPC from PCS 2023-01-28
Inactive: IPC from PCS 2023-01-28
Inactive: IPC from PCS 2023-01-28
Inactive: IPC from PCS 2023-01-28
Inactive: IPC from PCS 2023-01-28
Inactive: IPC expired 2023-01-01
Inactive: IPC removed 2022-12-31
Letter Sent 2022-11-14
4 2022-11-14
Notice of Allowance is Issued 2022-11-14
Inactive: Q2 passed 2022-11-10
Inactive: Approved for allowance (AFA) 2022-11-10
Amendment Received - Response to Examiner's Requisition 2022-07-11
Amendment Received - Voluntary Amendment 2022-07-11
Examiner's Report 2022-03-11
Inactive: Report - QC failed - Minor 2022-03-10
Amendment Received - Response to Examiner's Requisition 2021-10-25
Inactive: Request Received Change of Agent File No. 2021-10-25
Amendment Received - Voluntary Amendment 2021-10-25
Examiner's Report 2021-09-09
Inactive: Report - No QC 2021-09-08
Amendment Received - Response to Examiner's Requisition 2021-05-25
Amendment Received - Voluntary Amendment 2021-05-25
Change of Address or Method of Correspondence Request Received 2021-05-25
Inactive: Associate patent agent removed 2021-04-23
Appointment of Agent Requirements Determined Compliant 2021-04-23
Revocation of Agent Requirements Determined Compliant 2021-04-23
Inactive: Office letter 2021-04-23
Inactive: Office letter 2021-04-23
Revocation of Agent Request 2021-03-05
Appointment of Agent Request 2021-03-05
Examiner's Report 2021-01-25
Inactive: Report - No QC 2021-01-20
Inactive: IPC removed 2020-11-12
Inactive: IPC removed 2020-11-12
Inactive: First IPC assigned 2020-11-12
Inactive: IPC assigned 2020-11-12
Common Representative Appointed 2020-11-07
Inactive: IPC assigned 2020-11-06
Change of Address or Method of Correspondence Request Received 2020-10-23
Letter sent 2020-09-01
Letter Sent 2020-09-01
Advanced Examination Determined Compliant - paragraph 84(1)(a) of the Patent Rules 2020-09-01
Request for Examination Received 2020-08-28
Request for Examination Requirements Determined Compliant 2020-08-28
Inactive: Advanced examination (SO) fee processed 2020-08-28
All Requirements for Examination Determined Compliant 2020-08-28
Amendment Received - Voluntary Amendment 2020-08-28
Inactive: Advanced examination (SO) 2020-08-28
Inactive: Associate patent agent added 2020-04-29
Revocation of Agent Request 2020-03-17
Revocation of Agent Requirements Determined Compliant 2020-03-17
Appointment of Agent Requirements Determined Compliant 2020-03-17
Appointment of Agent Request 2020-03-17
Common Representative Appointed 2019-10-30
Common Representative Appointed 2019-10-30
Appointment of Agent Requirements Determined Compliant 2018-11-23
Inactive: Office letter 2018-11-23
Inactive: Office letter 2018-11-23
Revocation of Agent Requirements Determined Compliant 2018-11-23
Appointment of Agent Request 2018-11-13
Revocation of Agent Request 2018-11-13
Inactive: Office letter 2018-10-29
Change of Address or Method of Correspondence Request Received 2018-10-15
Revocation of Agent Requirements Determined Compliant 2018-10-15
Appointment of Agent Requirements Determined Compliant 2018-10-15
Revocation of Agent Request 2018-10-15
Appointment of Agent Request 2018-10-15
Change of Address or Method of Correspondence Request Received 2018-07-12
Inactive: Cover page published 2018-04-20
Inactive: Notice - National entry - No RFE 2018-03-29
Inactive: IPC assigned 2018-03-26
Letter Sent 2018-03-26
Inactive: IPC assigned 2018-03-26
Application Received - PCT 2018-03-26
Inactive: First IPC assigned 2018-03-26
National Entry Requirements Determined Compliant 2018-03-13
Application Published (Open to Public Inspection) 2017-03-23

Abandonment History

There is no abandonment history.

Maintenance Fee

The last payment was received on 2022-06-22

Note : If the full payment has not been received on or before the date indicated, a further fee may be required which may be one of the following

  • the reinstatement fee;
  • the late payment fee; or
  • additional fee to reverse deemed expiry.

Patent fees are adjusted on the 1st of January every year. The amounts above are the current amounts if received by December 31 of the current year.
Please refer to the CIPO Patent Fees web page to see all current fee amounts.

Fee History

Fee Type Anniversary Year Due Date Paid Date
MF (application, 2nd anniv.) - standard 02 2017-09-18 2018-03-13
Basic national fee - standard 2018-03-13
Registration of a document 2018-03-13
MF (application, 3rd anniv.) - standard 03 2018-09-17 2018-06-12
MF (application, 4th anniv.) - standard 04 2019-09-16 2019-01-15
MF (application, 5th anniv.) - standard 05 2020-09-16 2020-01-07
Advanced Examination 2020-08-28 2020-08-28
Request for examination - standard 2020-09-16 2020-08-28
MF (application, 6th anniv.) - standard 06 2021-09-16 2021-06-29
MF (application, 7th anniv.) - standard 07 2022-09-16 2022-06-22
Final fee - standard 2023-03-13
MF (patent, 8th anniv.) - standard 2023-09-18 2023-06-14
MF (patent, 9th anniv.) - standard 2024-09-16 2023-12-15
Owners on Record

Note: Records showing the ownership history in alphabetical order.

Current Owners on Record
10353744 CANADA LTD.
Past Owners on Record
YI ZHANG
Past Owners that do not appear in the "Owners on Record" listing will appear in other documentation within the application.
Documents

To view selected files, please enter reCAPTCHA code :



To view images, click a link in the Document Description column (Temporarily unavailable). To download the documents, select one or more checkboxes in the first column and then click the "Download Selected in PDF format (Zip Archive)" or the "Download Selected as Single PDF" button.

List of published and non-published patent-specific documents on the CPD .

If you have any difficulty accessing content, you can call the Client Service Centre at 1-866-997-1936 or send them an e-mail at CIPO Client Service Centre.


Document
Description 
Date
(yyyy-mm-dd) 
Number of pages   Size of Image (KB) 
Abstract 2018-03-12 1 19
Claims 2018-03-12 5 232
Drawings 2018-03-12 6 139
Description 2018-03-12 17 906
Representative drawing 2018-04-19 1 15
Cover Page 2018-04-19 1 42
Claims 2020-08-27 9 292
Description 2021-05-24 16 995
Claims 2021-05-24 7 271
Claims 2021-10-24 3 92
Claims 2022-07-10 4 144
Representative drawing 2023-03-30 1 6
Cover Page 2023-03-30 1 42
Courtesy - Certificate of registration (related document(s)) 2018-03-25 1 106
Notice of National Entry 2018-03-28 1 195
Courtesy - Acknowledgement of Request for Examination 2020-08-31 1 432
Commissioner's Notice - Application Found Allowable 2022-11-13 1 580
Electronic Grant Certificate 2023-04-24 1 2,527
Change of agent 2018-11-12 3 87
Courtesy - Office Letter 2018-11-22 1 24
Courtesy - Office Letter 2018-11-22 1 27
Amendment - Abstract 2018-03-12 1 81
National entry request 2018-03-12 10 402
International search report 2018-03-12 2 71
Request for examination / Advanced examination (SO) / Amendment / response to report 2020-08-27 18 673
Courtesy - Advanced Examination Request - Compliant (SO) 2020-08-31 1 164
Examiner requisition 2021-01-24 5 272
Amendment / response to report 2021-05-24 55 2,844
Change to the Method of Correspondence 2021-05-24 6 165
Examiner requisition 2021-09-08 4 200
Amendment / response to report 2021-10-24 17 1,029
Change agent file no. 2021-10-24 6 148
Examiner requisition 2022-03-10 5 292
Amendment / response to report 2022-07-10 15 524
Final fee 2023-03-12 5 107