Note: Descriptions are shown in the official language in which they were submitted.
CA 02998543 2018-03-13
CA Application
Nat'l Entry of PCT/CN2015/089733
Blakes Ref. 15289/00002
Processing Method For Obtaining Target Data, Server, And Online
Financing Method
[1] [Technical Field]
[2] The present invention relates to the field of Internet data interaction
technology, and in
particular, to a method for processing target data, a server, and an online
financing method.
[3] [Background Technology]
[4] With the development of Internet technology and especially mobile
Internet technology,
users can connect to the Internet through mobile devices using 2G, 3G, 4G or
WiFi to
conduct transactions and social activities. Users can conveniently and
effectively perform
online activities, this is an incomparable experience with offline.
[5] However, when users conduct transactions such as trading and social
networking through
the mobile Internet, their personal sensitive information is easily exposed
and may be
acquired by others in the process of interaction so that they can use their
information for
illegal purposes. This will provide network users a lot of risk.
[6] [Summary of the Invention]
[7] The technical problem to be solved by the present invention is to
provide a processing
method for acquiring target data, a server and a terminal device, and detect
whether a first
terminal user of an interaction meets a preset level range, and when meeting a
preset level
range interact with the target data to provide security audit evaluation
information to other
terminals before providing the requested data to improve the efficiency and
security of
network data interaction.
[8] The present invention provides a processing method for acquiring target
data, which
includes: The First Server receives an interactive request for acquiring
target data delivered
by a first terminal and delivers the interactive request to a second terminal,
where the
interactive request includes description information and data values of the
target data, and
further includes evaluation information, where the evaluation information is
generated
when the Second Server detects that the first terminal user meets a preset
level range of the
Second Server.
[9] The present invention also provides a server, including: a receiving
module, configured to
receive an interactive request for acquiring target data delivered by a first
terminal, wherein
the interactive request includes description information and data values of
the target data,
further comprising evaluation information generated when the Second Server
detects that
23333888.1
CA 02998543 2018-03-13
CA Application
Nat'l Entry of PCT/CN2015/089733
Blakes Ref. 15289/00002
the first terminal user meets a preset level range of the Second Server; and
an interactive
request delivering module, configured to deliver the interactive request to
the second
terminal.
[10] The present invention also provides a terminal device, comprising: one
or more processors;
a memory; a plurality of application programs; and one or more programs,
wherein the one
or more programs are stored in the memory and configured to be executed by the
one or
more processors, the one or more programs including instructions for:
receiving an
interactive request to obtain target data delivered by a first terminal;
wherein the interactive
request includes the description information and the data value of the target
data and
further includes security information generated when the Second Server detects
that the
target data meets the guarantee scope of the Second Server; and delivers the
interactive
request to the second terminal.
[11] In the above processing method for acquiring target data, the Second
Server detects the
first terminal user in advance and generates corresponding evaluation
information when
detecting that the Second Server matches a preset range of the Second Server,
and the First
Server will include the evaluation information. The interactive request is
delivered to the
second terminal to implement the interaction of the target data between the
first terminal
and the second terminal. Before providing the target data to the second
terminal, a security
verification mechanism is provided to improve target data security and
interaction
efficiency.
[12] Another object of the present invention is to provide an online
financing method that
allows the issuer to be audited when the publisher issues a target project in
need of raising
funds, and the evaluation information is added when the approval is passed,
thereby
providing the investor with the pre-investment. The reference information, and
promoted
the project financing progress.
[13] The present invention provides an online financing method, comprising:
The First Server
receives a fund raising request delivered by a first terminal for a target
project, and delivers
the fund raising request to a second terminal. The fund raising request
includes the
description information of the target project and the required fund raising
amount, and also
including the evaluation information; and the evaluation information is
generated when the
Second Server verifies that the first terminal user conforms to the preset
range of the
Second Server.
[14] In the above online fund raising method, the second terminal server
audits the first terminal
2
23333888.1
CA 02998543 2018-03-13
CAApplication
Nat'l Entry of PCT/CN2015/089733
Blakes Ref. 15289/00002
user in advance and adds the corresponding first terminal user evaluation
information for
the fund-raising project when the second terminal server meets the preset
second-class
default level. The First Server disseminate the funding request containing the
assessment
information so as to introduce the Second Server assessment into the project
financing,
provide investment risk assessment to other investors (the second terminal)
and promote
the progress of the project financing.
[15] [Brief Description]
[16] Figure 1 is a flowchart of a method for processing target data
according to a first example
of the present invention;
[17] Figure 2 is a flow chart of a method for processing target data in a
second implementation
manner of the present invention;
[18] Figure 3 is a schematic flowchart of a method for processing target
data according to a
third example of the present invention;
[19] Figure 4 is a schematic diagram of a processing relationship of
acquiring target data
according to an example of the present invention;
[20] Figure 5 is a schematic flowchart of a method for processing target
data according to a
fourth example of the present invention;
[21] Figure 6 is a schematic structural diagram of a server in an example
of the present
invention;
[22] Figure 7 is a schematic structural diagram of a terminal device in an
example of the present
invention;
[23] Figure 8 is a schematic flow chart of a method for online financing
according to a first
example of the present invention;
[24] Figure 9 is a schematic flow chart of a method for online fundraising
in a second example
of the present invention;
[25] Figure 10 is a schematic flowchart of a method for online financing
according to a third
example of the present invention;
[26] Figure 11 is a schematic diagram of the fund raising relationship in
the example of the
present invention.
[27] [Description of the Preferred Examples]
[28] The technical solution in the examples of the present invention will
be clearly and
completely described below with reference to the accompanying drawings in the
examples
of the present invention. Apparently, the described example are only a part
but not all of
3
23333888.1
CA 02998543 2018-03-13
CA Application
Nat'l Entry of PCT/CN2015/089733
Blakes Ref. 15289/00002
the examples of the present invention. All other examples obtained by persons
of ordinary
skill in the art based on the examples of the present invention without
creative efforts shall
fall within the protection scope of the present invention.
[29] Please refer to Figure 1, which is a schematic flowchart of a method
for acquiring target
data according to a first example of the present invention. The method
includes:
[30] In step S10, the First Server receives the interactive request for
acquiring the target data
delivered by the first terminal, and delivers the interactive request to the
second terminal.
[31] Wherein, the interactive request contains description of the target
data, data valuesand
evaluation information. The evaluation information is generated when the
Second Server
detects that the first terminal user meets a preset level range of Second
Server.
[32] In the above solution, the second terminal detects the first terminal
user in advance and
generates corresponding evaluation information when detecting the preset level
range that
meets the Second Server. The First Server delivers an interactive request
including the
evaluation information to the second terminal realizes the interaction of the
target data
between the first terminal and the second terminal, and adopts the security
check
mechanism before the first terminal issues the interactive request so as to
improve the
target data security and the interaction efficiency. When the first terminal
user passes the
detection and meets the preset range of the Second Server, that is, the first
terminal user
has the credibility recognized by the Second Server and the first terminal
user has high and
low levels of credibility according to the division of the Second Server
points, such as the
higher the rating, the higher the credibility. If the first terminal-user does
not meet the
second Server default level, the Second Server does not have the credibility
recognized by
Second Server and Second Server does not generate the assessment information.
[33] Please refer to Figure 2, which is a schematic flowchart of a method
for acquiring target
data according to a first example of the present invention. The method
includes:
[34] Step S20: the first terminal delivers an interactive request for
obtaining target data to the
First Server.
[35] Where the interactive request includes description information and
data values of the target
data, and further includes evaluation information generated by the Second
Server when
detecting that the first terminal user meets a preset level range of the
Second Server. The
request may also include a target date, which is the time period for obtaining
the target
data.
[36] The descriptive information of the target data can be the purpose of
the target data.
4
23333888.1
CA 02998543 2018-03-13
CA Application
Nat'l Entry of PCT/CN2015/089733
Blakes Ref. 15289/00002
[37] Specifically, the first terminal logs in and accesses the First
Server, and delivers an
interactive request for acquiring the target data.
[38] Step S21: the First Server obtains, according to the interactive
request, a first data
certificate whose data value is equal to the data value of the target data,
and delivers the
first data certificate to the second terminal. Wherein, the first data
certificate contains the
information of the interactive request.
[39] In the above solution, when an interactive request is delivered to
acquire the target data, the
second terminal detects the first terminal user and generates evaluation
information when
the detection succeeds, and releases the target in the form of a first data
certificate with the
evaluation information data. Therefore, before the first terminal issues the
interactive
request, the evaluation and verification mechanism is adopted to provide the
second
terminal with the function of evaluating the information.
[40] Please refer to Figure 3, which is a flowchart of a method for
processing target data
according to a third example of the present invention. The method flow shown
in this
example includes:
[41] Step S30: the first terminal initiates an interactive request for
acquiring target data to the
First Server.
[42] Where the interactive request includes description information and
data values of the target
data, and further includes evaluation information generated by the Second
Server when
detecting that the first terminal user meets a preset level range of the
Second Server.
[43] Specifically, the first terminal logs in to access the First Server
and delivers an interactive
request for acquiring the target data
[44] Step S31: the First Server obtains, according to the interactive
request, a first data
certificate whose data value is equal to the data value of the target data,
and delivers the
first data certificate to the second terminal. Wherein, the first data
certificate contains the
information of the interactive request.
[45] In an implementation manner, when the Second Server detects that the
first terminal user
meets the preset level range of the Second Server to generate the evaluation
information,
the First Server generates the first data certificate with the evaluation
information. The
Second Server detects the first terminal user and adds the evaluation
information in the
target data when it is determined that the detection meets the preset level
range and still
retains the evaluation information in the first data certificate generated by
the First Server.
The evaluation information may include a specific security level of the first
terminal user,
23333888.1
CA 02998543 2018-03-13
CA Application
Nat'l Entry of PCT/CN2015/089733
Blakes Ref. 15289/00002
identity information of Second Server, and so on.
[46] In another example, the First Server obtains the first data
certificate from the Second
Server according to the interactive request. The first data certificate is
generated by the
Second Server when the first terminal user detects a preset level range that
conforms to the
Second Server. The interactive request includes at least the storage address
of the first data
certificate in the Second Server. Specifically, the interactive request
delivered by the first
terminal to the First Server is a link address (that is, a storage address) of
the first data
certificate, and the link address includes a URL address that points to the
first data
certificate, and may further include information of the target data, data
initiator
information, basic information of the target data (e.g., data attributes,
format, etc.).
[47] Step S32: the second terminal receives the first data certificate
delivered by the First Server
and delivers the first data to the Third Server.
[48] In step S32, at least one second terminal is communicatively connected
to the First Server
over the network, and the First Server issues the first data certificate to
each second
terminal over the network.
[49] Specifically, the second terminal selects the first data from the data
stored in the second
terminal, and delivers the first data to the first terminal. The size of the
data value of the
first data may be larger than the size of the data value of the target data or
may be smaller
than the size of the data value of the target data.
[50] Step S33: When the sum of the sizes of the data values of all the data
delivered by the
second terminal and received by the third server within the target date is not
smaller than
the data value of the target data, the third server delivers the received data
to the first
terminal
[51] In the above solution, the First Server obtains the first data
certificate according to the
interactive request of obtaining the target data initiated by the first
terminal, and each
second terminal delivers the first data to the Third Server. When the Third
Server receives
the target data within the target date when the sum of the data sizes of all
the data delivered
by the second terminal is not less than the data value of the target data, the
received data is
delivered to the first terminal, so that the first terminal obtains the data
whose size is not
smaller than the value of the target data. Before performing the target data
interaction, the
second terminal detects and adds the evaluation information to the first
terminal user, and
pre-divides the target data into a plurality of sections and respectively
saves them in
different second terminals, in this way, the security risk of the target data
itself is reduced,
6
23333888.1
CA 02998543 2018-03-13
CAApplication
Nat'l Entry of PCT/CN2015/089733
Blakes Ref. 15289/00002
and in the process of interaction between the target data, its authority or
ownership is
guaranteed by risk.
[52] Please refer to Figure 5, which is a schematic flowchart of a method
for acquiring target
data according to a fourth example of the present invention, please also refer
to the
schematic diagram of data interaction shown in Figure 4. The method flow shown
in this
example includes:
[53] Step S40: the first terminal delivers an interactive request for
obtaining target data to the
First Server.
[54] Where the interactive request includes description information and
data values of the target
data, and further includes evaluation information generated by the Second
Server when
detecting that the first terminal user meets a preset level range of the
Second Server.
[55] Step S41: the First Server obtains, according to the interactive
request, a first data
certificate whose data value is equal to the data value of the target data,
and delivers the
first data certificate to the second terminal. Wherein, the first data
certificate contains the
information of the interactive request.
[56] Step S42: the second terminal receives the first data certificate
delivered by the First Server
and delivers a second data certificate to the first terminal. Wherein the
second data
certificate is generated by the Third Server to lock the first data in the
second terminal
according to the request of the second terminal.
[57] Step S43: Determine whether the sum of the sizes of the data values
represented by all the
second data certificates delivered by the second terminal and received by the
first terminal
within the target date is not smaller than the data value size of the target
data, and if yes,
enter Step S44, otherwise, go to step S47.
[58] Step S44: the first terminal delivers a data interaction instruction
to the third server.
[59] Step S45: the Third Server receives the data interaction instruction
and delivers the locked
data in the second terminal to the Fourth Server in response to the data
interaction
instruction.
[60] Step S46: the Fourth Server delivers the received data to the first
terminal, so that the first
terminal acquires the target data. Then, the process is over.
[61] Further, in response to the data interaction instruction, the third
server may directly deliver
the locked data in the second terminal to the first terminal, so that the
first terminal
acquires the target data.
[62] Step S47: the first terminal delivers an instruction to the third
server that the target data
7
23333888.1
CA 02998543 2018-03-13
CA Application
Nat'l Entry of PCT/CN2015/089733
Blakes Ref. 15289/00002
request fails.
[63] Step S48, in response to the instruction, the Third Server unlocks the
locked data in the
corresponding second terminal according to the second data certificate. Then,
the process is
over.
[64] In the above solution, after the Second Server detects the first
terminal user and adds the
assessment information, the First Server obtains the first data certificate
according to the
interactive request, and then delivers the first data certificate to the
second terminals. The
second terminal receives the first data certificate and accordingly delivers a
second data
certificate representing the first data value to the first terminal through
the Third Server
when acknowledging the interactive request responding to the first data
certificate, enable
the first terminal to collect enough second data certificate within target
date. Where the
second data certificate is generated by the third server by locking the first
data in the
second terminal according to the request of the second terminal, and when the
first terminal
obtains a sufficient second data certificate in the target date, Server
directly or indirectly
delivers the data locked by the second terminal to the first terminal, so that
the target
terminal finally obtains the target data. Before the target data exchange, the
target server
detects and adds security information to the target data, and pre-divides the
target data into
a plurality of parts and saves them in different second terminals
respectively, the target data
request that needs to be acquired is released in the form of the first data
certificate with the
safeguard information. In this way, security audits are conducted before the
first terminal
issues an interactive request, which ensures data security. At the same time,
the second
terminal delivers the corresponding data in the form of a second data
certificate, so as to
reduce the risk of being illegally tampered with, lost or intercepted by other
terminals
during data exchange, making the data exchange in the process of target data
storage and
transmission of a complete and comprehensive protection.
[65] The processing method of acquiring the target data in the example of
the present invention
is described below by way of example.
[66] For example, the first terminal is terminal A, and the second terminal
is terminal B1,
terminal B2, and terminal B3. Target Data Bit Client D's power-on password,
which is
divided in advance into three parts. Each of the terminal Bl, the terminal B2,
and the
terminal B3 stores a part of the data of the power-on password, and the data
formed can be
used to turn on the client D only when the data of the three sections are
grouped together
and arranged in the correct order. The terminals A, B1, B2, and B3 and the
client D may be
8
23333888.1
CA 02998543 2018-03-13
CAApplication
Nat'l Entry of PCT/CN2015/089733
Blakes Ref. 15289/00002
devices capable of data exchange with the server through a network, such as
personal
computers, tablet computers and smart phones.
[67] Terminal A initiates an interactive request for obtaining target data
(client D's power-on
password) through First Server, and Second Server detects terminal A users and
adds
evaluation information to generate three first data certificates, that is, the
first data
certificate a, the first data certificate b and the first data certificate c.
The detection of the
user of the terminal A by the Second Server includes detecting the information
of the user
of the terminal A (e.g., the account, the history of data interaction, and so
on).
[68] The reason for this setting is that terminal server A is detected by
Second Server to
evaluate the security level of terminal A, so as to ensure the security of
data and provide
terminals Bl, B2 and B3 with partial data respectively to provide security in
accordance
with.
[69] Wherein, Terminal A knows that the starting password of the client D
is divided into three
parts, so the request to be delivered includes the number of the first data
certificate and the
permission level of terminal A. Each of the three first data certificates
generated by Second
Server contains the permission level of the terminal A, while each first data
certificate also
represents the data corresponding to the target data that needs to be
obtained. For example,
the first data certificate a represents the first part of the required power-
on password, the
first data certificate b represents the second part of the required power-on
password, and
the first data certificate c represents the third part of the power-on
password that needs to
be obtained data.
[70] The First Server then delivers the first data certificate to the
terminal Bl, the terminal B2
and the terminal B3, respectively, so that the three terminals select the
matched first data
from the received three first data certificates according to the stored data
certificate, and
delivers the second data certificate to terminal A. Now, taking the terminal
B1 as an
example for description, the terminal BI stores the second part of the power-
on password,
and selects the first data certificate b representing the second part of the
data. And, the
second data certificate delivered by the terminal B1 is an electronic
certificate generated by
the third server by locking the second part data stored by the third server,
and the third
server is a supervisory computer that manages the terminals Bl, B2, and B3.
Wherein, the
second data certificate is the information representing the second portion of
the data that is
locked, and not the second portion of the data itself. The information
mentioned above may
be a preset symbol, a picture, and so on. Certainly, in other examples, the
terminal B1 may
9
23333888.1
CA 02998543 2018-03-13
CA Application
Nat'l Entry of PCT/CN2015/089733
Blakes Ref. 15289/00002
directly deliver the second part of data to the terminal A as well.
[71] Further, the terminal A receives all the second data certificates
constituting the power-on
password of the client D within the target date, and then requests the Third
Server to
deliver its locked data to the terminal A.
[72] Further, the target data may also be text data, audio data, video
data, program data or
financial data in the financial field, etc. In the case of fund data, such as
funds, the first
terminal is a fund-raising party at this time, the deliverer of the data is an
investor. First
Server is a platform for raising funds. The second, third and fourth servers
are
Funds-Management servers, for example, banks. In the case of audio data, such
as songs,
the data initiator and the data deliverer may be clients with multimedia
playing functions
such as mobile phones. First Server is a music search platform and the second,
third and
fourth servers are music website servers.
[73] Please refer to Figure 6, which is a schematic structural diagram of a
server according to an
example of the present invention. The server 50 shown in this example includes
a receiving
module 51 and an interactive request delivering module 52.
[74] The receiving module 51 is used to receive a first terminal initiated
interactive request for
acquiring target data. Where the interactive request includes description
information and
data values of the target data, and further includes evaluation information
generated by the
Second Server when detecting that the first terminal user meets a preset level
range of the
Second Server.
[75] The interactive request delivering module 52 is used to deliver the
interactive request to the
second terminal.
[76] In an example, the server 50 further includes a first data certificate
acquisition module 53
and a first data certificate delivering module 54. The first data certificate
acquisition
module 53 detects, at the Second Server, that the first terminal user conforms
to a preset
and increase the evaluation information, a first data certificate is generated
according to the
interactive request. The first data certificate delivering module 54 is used
to deliver the first
data certificate to the second terminal.
[77] In another example, the server 50 further includes a first data
certificate acquisition module
53 and a first data certificate delivering module 54. The first data
certificate acquisition
module 53 obtains, according to the interactive request, the second data
certificate from the
Second Server first data certificate. The first data certificate is generated
when the second
terminal detects the preset level range for the first terminal user. The
request includes at
23333888.1
CA 02998543 2018-03-13
CA Application
Nat'l Entry of PCT/CN2015/089733
Blakes Ref. 15289/00002
least the storage address of each first data certificate in the Second Server.
Specifically, the
first data certificate is generated in advance by the first terminal and
stored in the Second
Server. The request delivered by the first terminal to the First Server is a
link address (that
is, a storage address) of the first data certificate, and the link address
includes point to the
URL address corresponding to the first data certificate. It can also contain
information
about the target data, data initiator information, and basic information about
the target data
(e.g., data attributes, formats, etc.). The first data certificate delivering
module 54 is used to
deliver the first data certificate to the second terminal.
[78] Please refer to Figure 7, which is a schematic structural diagram of a
terminal device in an
example of the present invention, a terminal device 60 in this example is a
server. The
terminal device 60 includes a receiver 61, a processor 62, a transmitter 63, a
read only
memory 64, a random access memory 65, and a bus 66.
[79] The receiver 61 is used for receiving data.
[80] The processor 62 controls the operation of the terminal device 60. The
processor 62 may
also be a CPU (Central Processing Unit). The processor 62 may be an integrated
circuit
chip with signal processing capability. The processor 820 may also be a
general purpose
processor, a digital signal processor (DSP), an application specific
integrated circuit
(ASIC), a field programmable gate array (FPGA) or other programmable logic
device,
discrete gate or transistor logic, discrete hardware components. The general
purpose
processor may be a microprocessor or the processor may also be any
conventional
processor and so on.
[81] This transmitter 63 is used for transmitting data.
[82] The memory may include a read-only memory 64 and a random access
memory 65 and
provide instructions and data to the processor 62. A portion of the memory may
also
include non-volatile random access memory (NVRAM).
[83] The various components of the terminal device 60 are coupled together
by a bus 66, which
may include a power bus, a control bus, a status signal bus, etc., in addition
to the data bus.
However, for the sake of clarity, various buses are labelled as buses 66 in
the figure.
[84] The memory stores the following elements, executable modules or data
structures, or a
subset of them, or their extensions:
[85] Operation Instructions: Various operation instructions are included
for various operations.
[86] Operating System: Includes various system programs for implementing
various basic
services and handling hardware-based tasks.
11
23333888.1
CA 02998543 2018-03-13
CA Application
Nat'l Entry of PCT/CN2015/089733
Blakes Ref. 15289/00002
[87] In the example of the present invention, the processor 62 performs the
following operations
by invoking memory-stored operation instructions (the operation instructions
may be
stored in the operating system):
[88] Receive an interactive request for acquiring target data delivered by
a first terminal, where
the interactive request includes description information and data values of
the target data,
and the evaluation information is generated when Second Server detects that
the first
terminal user is in accordance with the preset range of the Second Server; and
[89] The interactive request is delivered to the second terminal.
[90] Optionally, the processor 62 generates a first data certificate
according to the interactive
request when the Second Server detects that the first terminal user meets a
preset level
range and adds the evaluation information.
[91] Optionally, the processor 62 obtains the first data certificate from
the Second Server
according to the interactive request. Where the first data certificate is
generated when the
second data server detects that the target data meets a target requirement,
and the request
includes at least the storage address of each first data certificate in the
Second Server.
Specifically, the first data certificate is generated in advance by the first
terminal and stored
in the Second Server. The request delivered by the first terminal to the
terminal device 60
is a link address (that is, a storage address) of the first data certificate,
and the link address
includes point to the URL address corresponding to the first data certificate.
It can also
contain information about the target data, AP, data initiator information, and
basic
information about the target data (e.g., data attributes, formats, etc.).
[92] Please refer to Figure 8, which is a schematic flowchart of a method
for online fund-raising
in a first example of the present invention, the method includes:
[93] Step S70: the First Server receives the fund raising request for the
target item delivered by
the first terminal, and delivers the fund raising request to the second
terminal.
[94] Wherein, the fund raising request includes description information of
the target project and
the amount of funds to be raised, and also includes the evaluation
information, which is
generated when Second Server audits the first terminal user to conform to the
default level
of the Second Server.
[95] In the above solution, the second terminal server audits the first
terminal user in advance
and adds the corresponding evaluation information for the fund-raising project
when the
second terminal server meets the preset second-class default level. The First
Server
disseminate the funding request containing the assessment information so as to
introduce
12
23333888.1
CA 02998543 2018-03-13
CAApplication
Nat'l Entry of PCT/CN2015/089733
Blakes Ref. 15289/00002
the Second Server assessment into the project financing, provide investment
risk level
reference to other investors (the second terminal) and promote the progress of
the project
financing.
[96] Please refer to Figure 9, which is a schematic flowchart of a method
for online fund-raising
in a second example of the present invention, the method includes:
[97] Step S80: the first terminal delivers a fund raising request for the
target item to the First
Server.
[98] Wherein, the fund raising request includes description information of
the target project and
the amount of funds to be raised, and also includes the evaluation
information, which is
generated when Second Server audits the first terminal user to conform to the
default level
of the Second Server.
[99] Step S81: the First Server obtains, according to the fund raising
request, a first electronic
certificate with a representative amount of money equal to a fund amount
required to be
raised by the target item, and delivers the plurality of first electronic
certificates to the
second terminal. Wherein, the first electronic certificate contains the
information of the
interactive request.
[100] In this example, the first electronic certificate is an Object Credit
Certificate and is an
electronic document that includes at least a financing amount, a target amount
of funds,
and a preset time.
[101] In the solution above, the First Server obtains the corresponding
first electronic certificate
according to the funding request for the target item delivered by the first
terminal. When
launching a funding project in the form of an electronic certificate, Second
Server is
introduced to review and evaluate the sponsors so as to provide a reference
for other
investors (the second terminal) with investment confidence and investment
risk.
[102] Please refer to Figure 10, which is a schematic flowchart of a method
for online financing
according to a third example of the present invention. Please refer to Figure
11, a
schematic diagram of a relationship for fund raising is also shown. The method
flow shown
in this example includes:
[103] Step S90: the first terminal delivers a fund raising request for the
target item to the First
Server.
[104] Wherein, the fund raising request includes description information of
the target project and
the amount of funds to be raised, and also includes the evaluation
information, which is
generated when Second Server audits the second terminal user to conform to the
default
13
23333888.1
CA 02998543 2018-03-13
CAApplication
Nat'l Entry of PCT/CN2015/089733
Blakes Ref. 15289/00002
level of the Second Server.
[105] Step S91: the First Server obtains, according to the fund raising
request, a first electronic
certificate equal to a quota of the funds required to be raised by the target
project, and
delivers the first electronic certificate to the second terminal. Wherein, the
first electronic
certificate contains the information of the interactive request.
[106] In this example, the first electronic certificate is an Object Credit
Certificate and is an
electronic document that includes at least a financing amount, a target amount
of funds,
and a preset time.
[107] In an implementation manner, when the Second Server generates the
evaluation
information by detecting that the first terminal user meets a preset level
range, the First
Server generates a first electronic certificate having the evaluation
information. The
Second Server examines the first terminal user and determines the level of the
first
terminal user. The evaluation content includes the account of the first
terminal user, the
credit record, and so on, adds the evaluation information of the first
terminal user to the
target item. The evaluation information is still retained in the first
electronic certificate
generated by First Server.
[108] In another example, the First Server obtains the first electronic
certificate from the Second
Server according to the funding request. The first data certificate is
generated when the
Second Server approves the first terminal user. The request includes at least
the storage
address of each first electronic certificate in Second Server.
[109] When the verification is passed, the identification information added
for the first electronic
certificate is the signature of the person or the signature of the
institution, so as to improve
the credibility of the first terminal user when raising funds to the second
terminal user,
reduce the difficulty of raising funds.
[110] In the above scenario, Second Server can be a bank management server
that generates an
Object Credit Certificate from the Crowd funding Project via an Object Credit
Certificate
generator loaded with a bank audit plug-in. Wherein, the bank will review the
crowd
funding promoters, and determine the level range.
[111] Step S92: the second terminal receives the first electronic mail
delivered by the First Server
and delivers a certain amount of money to the third server.
[112] Step S93: When the total amount of funds received by the third server
within the target
date is not less than the amount of money to be raised for the target item,
the third server
delivers the received funds to the first terminal, so that the first terminal
user obtains
14
23333888.1
CA 02998543 2018-03-13
CA Application
Nat'l Entry of PCT/CN2015/089733
Blakes Ref. 15289/00002
funding for the target project.
[113] In another implementation manner, the second terminal receives the
first electronic
certificate delivered by the First Server and delivers a second electronic
certificate to the
first terminal, and adds the second electronic certificate to the obtained
first electronic
certificate identification information.
[114] Wherein, the second electronic certificate is a Bank Credit
Certificate, which is opened by
the second terminal user with the guarantee of its bank account fund or credit
line, and the
bank promises to process the electronic credit certificate of payment and
settlement
according to the settlement conditions. That is, the Third Server is the Funds-
Management
server for the second terminal user. The second electronic certificate is
opened by the third
server for freezing the account funds or the credit limit of the second
terminal user, and the
frozen account or credit limit is the same as the quota represented by the
first electronic
certificate obtained.
[115] When the sum of the second electronic certificate funds amount received
by the first
terminal in the target date is not less than the amount of money required for
raising the
target item, the first terminal delivers a settlement request to the third
server, and the third
server delivers the settlement request in response to the settlement request.
The funds
frozen in the second terminal user account are allocated to the Fourth Server.
Correspondingly, the fourth server allocates this part of the funds to the
account of the first
terminal user, so that the first terminal user can obtain the funds required
for raising funds.
[116] Wherein, the Fourth Server is the Funds-Management server of the first
terminal.
[117] Further, the third server may further allocate the frozen funds in
the second terminal user
account to the account of the first terminal according to the solution
request, so that the
first terminal obtains the funds needed to be raised.
[118] When the amount of money received by the first terminal within the
target date is less than
the amount of money to be raised for the target item, the first terminal
delivers a funding
failure message to Third Server, and the Third Server responds to the
information to
unfreeze the corresponding Second terminal user's account funds.
[119] In the solution above, the First Server obtains the corresponding
first electronic certificate
according to the funding request for the target item delivered by the first
terminal. The
second terminal receives the first electronic certificate delivered by the
First Server and
allocates the corresponding fund to the account of the first terminal user, so
that the first
terminal can raise funds required by the target project within the target
date. When issuing
23333888.1
CA 02998543 2018-03-13
CA Application
Nat'l Entry of PCT/CN2015/089733
Blakes Ref. 15289/00002
a funding project in the form of an electronic certificate, Second Server
introduced the
crowd funding sponsor to provide a risk assessment reference for other
investors (the
second terminal).
[120] Further, after receiving the first electronic certificate, each
second terminal may further
deliver a second electronic certificate of equal amount of funds to the Funds-
Management
server of the first terminal, and release the second electronic certificate
after the project
financing is completed. Pay the second electronic certificate to transfer
funds to the first
terminal user's account. Using the second electronic certificate way with the
target
investment projects, the investment of funds is only temporarily frozen,
making investment
safer.
[121] The financing method in the examples of the present invention is
described below by way
of example.
[122] For example, the first terminal is a fund-raising initiator, the Second
Server is a bank, the
second terminal is an investor, and the First Server is an E-commerce
platform.
[123] When the funding initiator issues a request for a target of 1 million
fund-raising through
the E-commerce platform, the E-commerce platform generates an Object for the
crowd
funding project using the Object Credit Certificate generator provided by the
bank or
loaded with the bank audit plug-in Credit Certificate. This Object Credit
Certificate
represents a limit of 1 million. In one example, the Object Credit Certificate
generated by
the initiator is stored on the Second Server and the Object Server Certificate
is published
on the publishing platform via First Server. Wherein, the link information
includes a URL
address pointing to the Object Credit Certificate, and may also include item
introduction
information, sponsor information, commodity images, and so on.
[124] The other investors conduct the follow-up vote. Specifically, the
investor a acquires the
Object Credit Certificate from the initiator, and records the identity
information of the
investor a on the Object Credit Certificate. The investor can use the Bank
Credit Certificate
to purchase, it can also use other methods, such as bank transfer, Alipay and
other network
ways to pay. In the case of Bank Credit Certificate, Third Server freezes the
account of
investor a open the corresponding Bank Credit Certificate for purchasing the
Object Credit
Certificate.
[125] Judgement of successful fund-raising at the expiration of the funding
period and
completion of the transfer of funds. If the project financing is successful,
then enter the
implementation phase, Object Credit Certificate holder based Object Credit
Certificate for
16
23333888.1
CA 02998543 2018-03-13
CAApplication
Nat'l Entry of PCT/CN2015/089733
Blakes Ref. 15289/00002
a preset income. Wherein, if the investor a uses Bank Credit Certificate, the
funds of the
account of the third-party investor a will be paid to the sponsor's fund-
raising account. If
unsuccessful, the project financing fails, and the investment fund is returned
according to
the Object Credit Certificate. For example, in the case of a conventional
payment method,
the investment fund is returned to the last assignee of the Object Credit
Certificate. If Bank
Credit Certificate is used for payment, the investor opens a bank credit
certificate to the
financing account for unfreezing.
[126] In the above solution, the first terminal user through the bank's audit
and assessment, the
investment needs to purchase Object Credit Certificate by online banking
payment, bank
transfer or through the Bank Credit Certificate way to buy, and the success of
the target
project will be the corresponding of the funds allocated to the sponsor's bank
account. In
the case of Object Credit Certificate, the fund-raising project is launched
and introduced
into the bank to review the first terminal-user so as to provide other
investors with
information on investment risk. The investor purchases the target project by
means of Bank
Credit Certificate. The funds frozen due to the opening of the Bank Credit
Certificate are
not directly transferred to the sponsor's bank account but merely frozen by
the bank and
cannot be used. However, the funds are still invested by the investor Bank
account. As a
result, the risk to the investor is greatly reduced, and at the same time it
is also possible to
obtain additional benefits because the frozen funds remain their own.
[127] In the above examples, the present invention has been exemplary
described only, but
various modifications to the present invention can be made by those skilled in
the area after
reading this patent application without departing from the spirit and scope of
the present
invention.
17
23333888.1