Language selection

Search

Patent 2998543 Summary

Third-party information liability

Some of the information on this Web page has been provided by external sources. The Government of Canada is not responsible for the accuracy, reliability or currency of the information supplied by external sources. Users wishing to rely upon this information should consult directly with the source of the information. Content provided by external sources is not subject to official languages, privacy and accessibility requirements.

Claims and Abstract availability

Any discrepancies in the text and image of the Claims and Abstract are due to differing posting times. Text of the Claims and Abstract are posted:

  • At the time the application is open to public inspection;
  • At the time of issue of the patent (grant).
(12) Patent: (11) CA 2998543
(54) English Title: PROCESSING METHOD FOR OBTAINING TARGET DATA, SERVER, AND ONLINE FINANCING METHOD
(54) French Title: PROCEDE DE TRAITEMENT POUR OBTENIR DES DONNEES CIBLES, SERVEUR, ET PROCEDE DE FINANCEMENT EN LIGNE
Status: Granted and Issued
Bibliographic Data
Abstracts

English Abstract

Provided are a processing method for obtaining target data, a terminal, a server, and an online financing method, the processing method for obtaining target data comprising: a first server receiving an exchange request sent by a first terminal to obtain target data, and sending said exchange request to a second terminal (S10); said exchange request containing description information and data values of said target data and also containing evaluation information, said evaluation information being generated by a second server when it detects that the user of the first terminal conforms to a range of levels preset by said second server. Using the described means, it is possible to provide to the exchange terminal the security level evaluation information of the data-obtaining party, thus improving target data security and exchange efficiency.


French Abstract

L'invention concerne un procédé de traitement pour obtenir des données cibles, un terminal, un serveur et un procédé de financement en ligne, le procédé de traitement pour obtenir des données cibles comprenant les étapes suivantes : un premier serveur reçoit une requête d'échange envoyée par un premier terminal pour obtenir des données cibles, et envoie ladite requête d'échange à un second terminal (S10) ; ladite requête d'échange contenant des informations de description et des valeurs de données desdites données cibles et contenant également des informations d'évaluation, lesdites informations d'évaluation étant générées par un second serveur lorsqu'il détecte que l'utilisateur du premier terminal est conforme à une plage de niveaux prédéterminée par ledit second serveur. Grâce à ces moyens, il est possible de fournir au terminal d'échange les informations d'évaluation de niveau de sécurité de la partie d'obtention de données, ce qui permet d'améliorer la sécurité de données cibles et l'efficacité d'échange.

Claims

Note: Claims are shown in the official language in which they were submitted.


CA 2,998,543
Blakes Ref: 15289/00004
Claims:
1. A computer server for online funds-raising comprising:
a receiving module configured to receive an interactive request for acquiring
target data,
the request being delivered by a first terminal, wherein the interactive
request includes a
data value, target data information as well as evaluation information, wherein
the
evaluation information is generated by a second server when the second server
verifies
whether a user corresponding to the first terminal conforms to a preset risk
level scope
for the second server and, based at least in part on the evaluation
information, providing
investment risk evaluation to a second terminal corresponding to one or more
investors
to promote progress of the online funds-raising project;
an interactive request delivering module configured to deliver the interactive
request to
the second terminal; and
a first data certificate acquisition module configured to acquire a first data
certificate, the
interactive request including a link address for storing the first data
certificate in the
second server, the link address further including a URL address that points to
the first
data certificate.
2. The computer server of claim 1, wherein the first data certificate includes
the data value of
the interactive request equal to the data value of target data.
3. The computer server of claim 1 or 2, wherein the first data certificate
includes information
corresponding to the interactive request.
4. The computer server of claim 1 further including a first data certificate
delivering module.
-18-
24100033.2
Date Recue/Date Received 2021-09-07

CA 2,998,543
Blakes Ref: 15289/00004
5. The computer server of claim 4, wherein the first data certificate
delivering module is
configured to deliver the first data certificate to the second terminal.
6. The computer server of any one of claims 1 to 5, wherein the interactive
request further
includes a pre-set time limit for acquiring the target data.
7. The computer server of any one of claims 1 to 6, wherein the target data
information includes
a purpose of the target data.
8. The computer server of any one of claims 1 to 7, wherein the link address
further includes
data initiator information.
9. The computer server of any one of claims 1 to 8, wherein the link address
further includes
basic information of the target data.
10. A terminal for online funds-raising comprising:
a plurality of computer processors for data processing;
a computer memory for storing data;
a plurality of applications; and
a plurality of programs configured to be stored in the computer memory and to
be
executed by the plurality of computer processors;
a plurality of instructions included in the plurality of programs, the
instructions
configured to:
-19-
24100033.2
Date Recue/Date Received 2021-09-07

CA 2,998,543
Blakes Ref: 15289/00004
receive an interactive request for acquiring target data, the request being
delivered by a
first terminal, wherein the interactive request includes a data value, target
data
information as well as evaluation information, wherein the evaluation
information is
generated by a second server if the second server verifies that a user
corresponding to the
first terminal conforms to a preset risk level scope for the second server
and, based at
least in part on the evaluation information, providing investment risk
evaluation to a
second terminal corresponding to one or more investors to promote progress of
the
online funds-raising project;
acquire a first data certificate for delivering the first data certificate to
the second
terminal, the interactive request including a link address for storing the
first data
certificate in the second server, the link address further including a URL
address that
points to the first data certificate; and
deliver the interactive request to the second terminal.
11. The terminal of claim 10, wherein the first data certificate includes the
data value of the
interactive request equal to the data value of the target data.
12. The terminal of claim 10 or 11, wherein the first data certificate
includes information
corresponding to the interactive request.
13. The terminal of any one of claims 10 to 12, wherein the interactive
request further includes a
pre-set time limit for acquiring the target data.
14. The terminal of any one of claims 10 to 13, wherein the target data
information includes a
purpose of the target data.
15. The terminal of any one of claims 10 to 14, wherein the link address
further includes data
initiator information.
-20-
24100033.2
Date Recue/Date Received 2021-09-07

CA 2,998,543
Blakes Ref: 15289/00004
16. The terminal of any one of claims 10 to 15, wherein the link address
further includes basic
information of the target data.
17. A data exchange processing method in an online funds-raising project,
comprising:
receiving, by a first server, an interactive request for acquiring target
data, the request
being delivered by a first terminal, wherein the interactive request includes
a data value,
target data information as well as evaluation information, wherein the
evaluation
information is generated by a second server if the second server verifies that
a user
corresponding to the first terminal conforms to a preset risk level scope for
the second
server and, based at least in part on the evaluation information, providing
investment risk
evaluation to a second terminal corresponding to one or more investors to
promote
progress of the online funds-raising project; and
acquiring by the first server a first data certificate for delivery to the
second terminal, the
interactive request including a link address for storing the first data
certificate in the
second server, the link address further including a URL address that points to
the first
data certificate.
18. The method of any claim 17, wherein the first data certificate includes
the data value of the
interactive request equal to the data value of the target data.
19. The method of claim 17 or 18, wherein the first data certificate includes
information
corresponding to the interactive request.
20. The method of any one of claims 17 to 19 further including that the first
server generates the
first data certificate included the evaluation information generated by the
second server when
the second server verifies that the user corresponding to the first terminal
conforms to the
preset risk level scope for the second server.
-21-
24100033.2
Date Recue/Date Received 2021-09-07

CA 2,998,543
Blakes Ref: 15289/00004
21. The method of any one of claims 17 to 20 further including that the first
server acquires the
first data certificate generated by the second server according to the
interactive request when
the second server verifies that the user corresponding to the first terminal
conforms to the
preset risk level scope for the second server.
22. The method of any one of claims 17 to 21 further including:
the second terminal delivers a first data to a third server when receiving the
first data
certificate; and
the third server transfers the first data value to the first terminal when the
third server
receives a sum of the first data value is greater than or equal to the target
data value.
23. The method of any one of claims 17 to 22 further including that the second
terminal delivers
a second data certificate to the third server when receiving the first data
certificate.
24. The method of claim 23, wherein the second data certificate is generated
by the third server
by locking the first data in an account of the second terminal according to a
request from the
second terminal.
25. The method of any one of claims 17 to 24 further including that the first
terminal delivers a
data interactive command to the third server when the first terminal receives
a sum of the
data value represented by all the second data certificates is greater than or
equal to the target
data value.
26. The method of claim 25, wherein all the second data certificates are
received by the second
terminal within a preset time.
27. The method of claim 26 further including that the third server responds
the data interactive
command to deliver the unlocked first data value in the account of the second
terminal to the
first terminal according to the data interactive command.
-22-
24100033.2
Date Recue/Date Received 2021-09-07

CA 2,998,543
Blakes Ref: 15289/00004
28. The method of claim 27 further including that the third server responds
the data interactive
command to deliver the unlocked first data value in the account of the second
terminal to a
forth server, to enable the forth server to deliver the unlocked first data
value to the first
terminal.
29. The method of any one of claims 17 to 28 further including that the first
terminal delivers a
data interactive failure command to the third server when the first terminal
receives a sum of
the data value represented by all the second data certificates is less than or
equal to the target
data value.
30. The method of claim 29 further including that the third server responds
the data interactive
failure command to unlock the locked first data value in the account of the
second terminal
according to the second data certificate.
31. The method of any one of claims 17 to 30, wherein the target data
information is a purpose of
the target data.
32. The method of any one of claims 17 to 31, wherein the link address further
includes data
initiator information.
33. The method of any one of claims 17 to 32, wherein the link address further
includes basic
information of the target data.
-23-
24100033.2
Date Recue/Date Received 2021-09-07

Description

Note: Descriptions are shown in the official language in which they were submitted.


CA 02998543 2018-03-13
CA Application
Nat'l Entry of PCT/CN2015/089733
Blakes Ref. 15289/00002
Processing Method For Obtaining Target Data, Server, And Online
Financing Method
[1] [Technical Field]
[2] The present invention relates to the field of Internet data interaction
technology, and in
particular, to a method for processing target data, a server, and an online
financing method.
[3] [Background Technology]
[4] With the development of Internet technology and especially mobile
Internet technology,
users can connect to the Internet through mobile devices using 2G, 3G, 4G or
WiFi to
conduct transactions and social activities. Users can conveniently and
effectively perform
online activities, this is an incomparable experience with offline.
[5] However, when users conduct transactions such as trading and social
networking through
the mobile Internet, their personal sensitive information is easily exposed
and may be
acquired by others in the process of interaction so that they can use their
information for
illegal purposes. This will provide network users a lot of risk.
[6] [Summary of the Invention]
[7] The technical problem to be solved by the present invention is to
provide a processing
method for acquiring target data, a server and a terminal device, and detect
whether a first
terminal user of an interaction meets a preset level range, and when meeting a
preset level
range interact with the target data to provide security audit evaluation
information to other
terminals before providing the requested data to improve the efficiency and
security of
network data interaction.
[8] The present invention provides a processing method for acquiring target
data, which
includes: The First Server receives an interactive request for acquiring
target data delivered
by a first terminal and delivers the interactive request to a second terminal,
where the
interactive request includes description information and data values of the
target data, and
further includes evaluation information, where the evaluation information is
generated
when the Second Server detects that the first terminal user meets a preset
level range of the
Second Server.
[9] The present invention also provides a server, including: a receiving
module, configured to
receive an interactive request for acquiring target data delivered by a first
terminal, wherein
the interactive request includes description information and data values of
the target data,
further comprising evaluation information generated when the Second Server
detects that
23333888.1

CA 02998543 2018-03-13
CA Application
Nat'l Entry of PCT/CN2015/089733
Blakes Ref. 15289/00002
the first terminal user meets a preset level range of the Second Server; and
an interactive
request delivering module, configured to deliver the interactive request to
the second
terminal.
[10] The present invention also provides a terminal device, comprising: one
or more processors;
a memory; a plurality of application programs; and one or more programs,
wherein the one
or more programs are stored in the memory and configured to be executed by the
one or
more processors, the one or more programs including instructions for:
receiving an
interactive request to obtain target data delivered by a first terminal;
wherein the interactive
request includes the description information and the data value of the target
data and
further includes security information generated when the Second Server detects
that the
target data meets the guarantee scope of the Second Server; and delivers the
interactive
request to the second terminal.
[11] In the above processing method for acquiring target data, the Second
Server detects the
first terminal user in advance and generates corresponding evaluation
information when
detecting that the Second Server matches a preset range of the Second Server,
and the First
Server will include the evaluation information. The interactive request is
delivered to the
second terminal to implement the interaction of the target data between the
first terminal
and the second terminal. Before providing the target data to the second
terminal, a security
verification mechanism is provided to improve target data security and
interaction
efficiency.
[12] Another object of the present invention is to provide an online
financing method that
allows the issuer to be audited when the publisher issues a target project in
need of raising
funds, and the evaluation information is added when the approval is passed,
thereby
providing the investor with the pre-investment. The reference information, and
promoted
the project financing progress.
[13] The present invention provides an online financing method, comprising:
The First Server
receives a fund raising request delivered by a first terminal for a target
project, and delivers
the fund raising request to a second terminal. The fund raising request
includes the
description information of the target project and the required fund raising
amount, and also
including the evaluation information; and the evaluation information is
generated when the
Second Server verifies that the first terminal user conforms to the preset
range of the
Second Server.
[14] In the above online fund raising method, the second terminal server
audits the first terminal
2
23333888.1

CA 02998543 2018-03-13
CAApplication
Nat'l Entry of PCT/CN2015/089733
Blakes Ref. 15289/00002
user in advance and adds the corresponding first terminal user evaluation
information for
the fund-raising project when the second terminal server meets the preset
second-class
default level. The First Server disseminate the funding request containing the
assessment
information so as to introduce the Second Server assessment into the project
financing,
provide investment risk assessment to other investors (the second terminal)
and promote
the progress of the project financing.
[15] [Brief Description]
[16] Figure 1 is a flowchart of a method for processing target data
according to a first example
of the present invention;
[17] Figure 2 is a flow chart of a method for processing target data in a
second implementation
manner of the present invention;
[18] Figure 3 is a schematic flowchart of a method for processing target
data according to a
third example of the present invention;
[19] Figure 4 is a schematic diagram of a processing relationship of
acquiring target data
according to an example of the present invention;
[20] Figure 5 is a schematic flowchart of a method for processing target
data according to a
fourth example of the present invention;
[21] Figure 6 is a schematic structural diagram of a server in an example
of the present
invention;
[22] Figure 7 is a schematic structural diagram of a terminal device in an
example of the present
invention;
[23] Figure 8 is a schematic flow chart of a method for online financing
according to a first
example of the present invention;
[24] Figure 9 is a schematic flow chart of a method for online fundraising
in a second example
of the present invention;
[25] Figure 10 is a schematic flowchart of a method for online financing
according to a third
example of the present invention;
[26] Figure 11 is a schematic diagram of the fund raising relationship in
the example of the
present invention.
[27] [Description of the Preferred Examples]
[28] The technical solution in the examples of the present invention will
be clearly and
completely described below with reference to the accompanying drawings in the
examples
of the present invention. Apparently, the described example are only a part
but not all of
3
23333888.1

CA 02998543 2018-03-13
CA Application
Nat'l Entry of PCT/CN2015/089733
Blakes Ref. 15289/00002
the examples of the present invention. All other examples obtained by persons
of ordinary
skill in the art based on the examples of the present invention without
creative efforts shall
fall within the protection scope of the present invention.
[29] Please refer to Figure 1, which is a schematic flowchart of a method
for acquiring target
data according to a first example of the present invention. The method
includes:
[30] In step S10, the First Server receives the interactive request for
acquiring the target data
delivered by the first terminal, and delivers the interactive request to the
second terminal.
[31] Wherein, the interactive request contains description of the target
data, data valuesand
evaluation information. The evaluation information is generated when the
Second Server
detects that the first terminal user meets a preset level range of Second
Server.
[32] In the above solution, the second terminal detects the first terminal
user in advance and
generates corresponding evaluation information when detecting the preset level
range that
meets the Second Server. The First Server delivers an interactive request
including the
evaluation information to the second terminal realizes the interaction of the
target data
between the first terminal and the second terminal, and adopts the security
check
mechanism before the first terminal issues the interactive request so as to
improve the
target data security and the interaction efficiency. When the first terminal
user passes the
detection and meets the preset range of the Second Server, that is, the first
terminal user
has the credibility recognized by the Second Server and the first terminal
user has high and
low levels of credibility according to the division of the Second Server
points, such as the
higher the rating, the higher the credibility. If the first terminal-user does
not meet the
second Server default level, the Second Server does not have the credibility
recognized by
Second Server and Second Server does not generate the assessment information.
[33] Please refer to Figure 2, which is a schematic flowchart of a method
for acquiring target
data according to a first example of the present invention. The method
includes:
[34] Step S20: the first terminal delivers an interactive request for
obtaining target data to the
First Server.
[35] Where the interactive request includes description information and
data values of the target
data, and further includes evaluation information generated by the Second
Server when
detecting that the first terminal user meets a preset level range of the
Second Server. The
request may also include a target date, which is the time period for obtaining
the target
data.
[36] The descriptive information of the target data can be the purpose of
the target data.
4
23333888.1

CA 02998543 2018-03-13
CA Application
Nat'l Entry of PCT/CN2015/089733
Blakes Ref. 15289/00002
[37] Specifically, the first terminal logs in and accesses the First
Server, and delivers an
interactive request for acquiring the target data.
[38] Step S21: the First Server obtains, according to the interactive
request, a first data
certificate whose data value is equal to the data value of the target data,
and delivers the
first data certificate to the second terminal. Wherein, the first data
certificate contains the
information of the interactive request.
[39] In the above solution, when an interactive request is delivered to
acquire the target data, the
second terminal detects the first terminal user and generates evaluation
information when
the detection succeeds, and releases the target in the form of a first data
certificate with the
evaluation information data. Therefore, before the first terminal issues the
interactive
request, the evaluation and verification mechanism is adopted to provide the
second
terminal with the function of evaluating the information.
[40] Please refer to Figure 3, which is a flowchart of a method for
processing target data
according to a third example of the present invention. The method flow shown
in this
example includes:
[41] Step S30: the first terminal initiates an interactive request for
acquiring target data to the
First Server.
[42] Where the interactive request includes description information and
data values of the target
data, and further includes evaluation information generated by the Second
Server when
detecting that the first terminal user meets a preset level range of the
Second Server.
[43] Specifically, the first terminal logs in to access the First Server
and delivers an interactive
request for acquiring the target data
[44] Step S31: the First Server obtains, according to the interactive
request, a first data
certificate whose data value is equal to the data value of the target data,
and delivers the
first data certificate to the second terminal. Wherein, the first data
certificate contains the
information of the interactive request.
[45] In an implementation manner, when the Second Server detects that the
first terminal user
meets the preset level range of the Second Server to generate the evaluation
information,
the First Server generates the first data certificate with the evaluation
information. The
Second Server detects the first terminal user and adds the evaluation
information in the
target data when it is determined that the detection meets the preset level
range and still
retains the evaluation information in the first data certificate generated by
the First Server.
The evaluation information may include a specific security level of the first
terminal user,
23333888.1

CA 02998543 2018-03-13
CA Application
Nat'l Entry of PCT/CN2015/089733
Blakes Ref. 15289/00002
identity information of Second Server, and so on.
[46] In another example, the First Server obtains the first data
certificate from the Second
Server according to the interactive request. The first data certificate is
generated by the
Second Server when the first terminal user detects a preset level range that
conforms to the
Second Server. The interactive request includes at least the storage address
of the first data
certificate in the Second Server. Specifically, the interactive request
delivered by the first
terminal to the First Server is a link address (that is, a storage address) of
the first data
certificate, and the link address includes a URL address that points to the
first data
certificate, and may further include information of the target data, data
initiator
information, basic information of the target data (e.g., data attributes,
format, etc.).
[47] Step S32: the second terminal receives the first data certificate
delivered by the First Server
and delivers the first data to the Third Server.
[48] In step S32, at least one second terminal is communicatively connected
to the First Server
over the network, and the First Server issues the first data certificate to
each second
terminal over the network.
[49] Specifically, the second terminal selects the first data from the data
stored in the second
terminal, and delivers the first data to the first terminal. The size of the
data value of the
first data may be larger than the size of the data value of the target data or
may be smaller
than the size of the data value of the target data.
[50] Step S33: When the sum of the sizes of the data values of all the data
delivered by the
second terminal and received by the third server within the target date is not
smaller than
the data value of the target data, the third server delivers the received data
to the first
terminal
[51] In the above solution, the First Server obtains the first data
certificate according to the
interactive request of obtaining the target data initiated by the first
terminal, and each
second terminal delivers the first data to the Third Server. When the Third
Server receives
the target data within the target date when the sum of the data sizes of all
the data delivered
by the second terminal is not less than the data value of the target data, the
received data is
delivered to the first terminal, so that the first terminal obtains the data
whose size is not
smaller than the value of the target data. Before performing the target data
interaction, the
second terminal detects and adds the evaluation information to the first
terminal user, and
pre-divides the target data into a plurality of sections and respectively
saves them in
different second terminals, in this way, the security risk of the target data
itself is reduced,
6
23333888.1

CA 02998543 2018-03-13
CAApplication
Nat'l Entry of PCT/CN2015/089733
Blakes Ref. 15289/00002
and in the process of interaction between the target data, its authority or
ownership is
guaranteed by risk.
[52] Please refer to Figure 5, which is a schematic flowchart of a method
for acquiring target
data according to a fourth example of the present invention, please also refer
to the
schematic diagram of data interaction shown in Figure 4. The method flow shown
in this
example includes:
[53] Step S40: the first terminal delivers an interactive request for
obtaining target data to the
First Server.
[54] Where the interactive request includes description information and
data values of the target
data, and further includes evaluation information generated by the Second
Server when
detecting that the first terminal user meets a preset level range of the
Second Server.
[55] Step S41: the First Server obtains, according to the interactive
request, a first data
certificate whose data value is equal to the data value of the target data,
and delivers the
first data certificate to the second terminal. Wherein, the first data
certificate contains the
information of the interactive request.
[56] Step S42: the second terminal receives the first data certificate
delivered by the First Server
and delivers a second data certificate to the first terminal. Wherein the
second data
certificate is generated by the Third Server to lock the first data in the
second terminal
according to the request of the second terminal.
[57] Step S43: Determine whether the sum of the sizes of the data values
represented by all the
second data certificates delivered by the second terminal and received by the
first terminal
within the target date is not smaller than the data value size of the target
data, and if yes,
enter Step S44, otherwise, go to step S47.
[58] Step S44: the first terminal delivers a data interaction instruction
to the third server.
[59] Step S45: the Third Server receives the data interaction instruction
and delivers the locked
data in the second terminal to the Fourth Server in response to the data
interaction
instruction.
[60] Step S46: the Fourth Server delivers the received data to the first
terminal, so that the first
terminal acquires the target data. Then, the process is over.
[61] Further, in response to the data interaction instruction, the third
server may directly deliver
the locked data in the second terminal to the first terminal, so that the
first terminal
acquires the target data.
[62] Step S47: the first terminal delivers an instruction to the third
server that the target data
7
23333888.1

CA 02998543 2018-03-13
CA Application
Nat'l Entry of PCT/CN2015/089733
Blakes Ref. 15289/00002
request fails.
[63] Step S48, in response to the instruction, the Third Server unlocks the
locked data in the
corresponding second terminal according to the second data certificate. Then,
the process is
over.
[64] In the above solution, after the Second Server detects the first
terminal user and adds the
assessment information, the First Server obtains the first data certificate
according to the
interactive request, and then delivers the first data certificate to the
second terminals. The
second terminal receives the first data certificate and accordingly delivers a
second data
certificate representing the first data value to the first terminal through
the Third Server
when acknowledging the interactive request responding to the first data
certificate, enable
the first terminal to collect enough second data certificate within target
date. Where the
second data certificate is generated by the third server by locking the first
data in the
second terminal according to the request of the second terminal, and when the
first terminal
obtains a sufficient second data certificate in the target date, Server
directly or indirectly
delivers the data locked by the second terminal to the first terminal, so that
the target
terminal finally obtains the target data. Before the target data exchange, the
target server
detects and adds security information to the target data, and pre-divides the
target data into
a plurality of parts and saves them in different second terminals
respectively, the target data
request that needs to be acquired is released in the form of the first data
certificate with the
safeguard information. In this way, security audits are conducted before the
first terminal
issues an interactive request, which ensures data security. At the same time,
the second
terminal delivers the corresponding data in the form of a second data
certificate, so as to
reduce the risk of being illegally tampered with, lost or intercepted by other
terminals
during data exchange, making the data exchange in the process of target data
storage and
transmission of a complete and comprehensive protection.
[65] The processing method of acquiring the target data in the example of
the present invention
is described below by way of example.
[66] For example, the first terminal is terminal A, and the second terminal
is terminal B1,
terminal B2, and terminal B3. Target Data Bit Client D's power-on password,
which is
divided in advance into three parts. Each of the terminal Bl, the terminal B2,
and the
terminal B3 stores a part of the data of the power-on password, and the data
formed can be
used to turn on the client D only when the data of the three sections are
grouped together
and arranged in the correct order. The terminals A, B1, B2, and B3 and the
client D may be
8
23333888.1

CA 02998543 2018-03-13
CAApplication
Nat'l Entry of PCT/CN2015/089733
Blakes Ref. 15289/00002
devices capable of data exchange with the server through a network, such as
personal
computers, tablet computers and smart phones.
[67] Terminal A initiates an interactive request for obtaining target data
(client D's power-on
password) through First Server, and Second Server detects terminal A users and
adds
evaluation information to generate three first data certificates, that is, the
first data
certificate a, the first data certificate b and the first data certificate c.
The detection of the
user of the terminal A by the Second Server includes detecting the information
of the user
of the terminal A (e.g., the account, the history of data interaction, and so
on).
[68] The reason for this setting is that terminal server A is detected by
Second Server to
evaluate the security level of terminal A, so as to ensure the security of
data and provide
terminals Bl, B2 and B3 with partial data respectively to provide security in
accordance
with.
[69] Wherein, Terminal A knows that the starting password of the client D
is divided into three
parts, so the request to be delivered includes the number of the first data
certificate and the
permission level of terminal A. Each of the three first data certificates
generated by Second
Server contains the permission level of the terminal A, while each first data
certificate also
represents the data corresponding to the target data that needs to be
obtained. For example,
the first data certificate a represents the first part of the required power-
on password, the
first data certificate b represents the second part of the required power-on
password, and
the first data certificate c represents the third part of the power-on
password that needs to
be obtained data.
[70] The First Server then delivers the first data certificate to the
terminal Bl, the terminal B2
and the terminal B3, respectively, so that the three terminals select the
matched first data
from the received three first data certificates according to the stored data
certificate, and
delivers the second data certificate to terminal A. Now, taking the terminal
B1 as an
example for description, the terminal BI stores the second part of the power-
on password,
and selects the first data certificate b representing the second part of the
data. And, the
second data certificate delivered by the terminal B1 is an electronic
certificate generated by
the third server by locking the second part data stored by the third server,
and the third
server is a supervisory computer that manages the terminals Bl, B2, and B3.
Wherein, the
second data certificate is the information representing the second portion of
the data that is
locked, and not the second portion of the data itself. The information
mentioned above may
be a preset symbol, a picture, and so on. Certainly, in other examples, the
terminal B1 may
9
23333888.1

CA 02998543 2018-03-13
CA Application
Nat'l Entry of PCT/CN2015/089733
Blakes Ref. 15289/00002
directly deliver the second part of data to the terminal A as well.
[71] Further, the terminal A receives all the second data certificates
constituting the power-on
password of the client D within the target date, and then requests the Third
Server to
deliver its locked data to the terminal A.
[72] Further, the target data may also be text data, audio data, video
data, program data or
financial data in the financial field, etc. In the case of fund data, such as
funds, the first
terminal is a fund-raising party at this time, the deliverer of the data is an
investor. First
Server is a platform for raising funds. The second, third and fourth servers
are
Funds-Management servers, for example, banks. In the case of audio data, such
as songs,
the data initiator and the data deliverer may be clients with multimedia
playing functions
such as mobile phones. First Server is a music search platform and the second,
third and
fourth servers are music website servers.
[73] Please refer to Figure 6, which is a schematic structural diagram of a
server according to an
example of the present invention. The server 50 shown in this example includes
a receiving
module 51 and an interactive request delivering module 52.
[74] The receiving module 51 is used to receive a first terminal initiated
interactive request for
acquiring target data. Where the interactive request includes description
information and
data values of the target data, and further includes evaluation information
generated by the
Second Server when detecting that the first terminal user meets a preset level
range of the
Second Server.
[75] The interactive request delivering module 52 is used to deliver the
interactive request to the
second terminal.
[76] In an example, the server 50 further includes a first data certificate
acquisition module 53
and a first data certificate delivering module 54. The first data certificate
acquisition
module 53 detects, at the Second Server, that the first terminal user conforms
to a preset
and increase the evaluation information, a first data certificate is generated
according to the
interactive request. The first data certificate delivering module 54 is used
to deliver the first
data certificate to the second terminal.
[77] In another example, the server 50 further includes a first data
certificate acquisition module
53 and a first data certificate delivering module 54. The first data
certificate acquisition
module 53 obtains, according to the interactive request, the second data
certificate from the
Second Server first data certificate. The first data certificate is generated
when the second
terminal detects the preset level range for the first terminal user. The
request includes at
23333888.1

CA 02998543 2018-03-13
CA Application
Nat'l Entry of PCT/CN2015/089733
Blakes Ref. 15289/00002
least the storage address of each first data certificate in the Second Server.
Specifically, the
first data certificate is generated in advance by the first terminal and
stored in the Second
Server. The request delivered by the first terminal to the First Server is a
link address (that
is, a storage address) of the first data certificate, and the link address
includes point to the
URL address corresponding to the first data certificate. It can also contain
information
about the target data, data initiator information, and basic information about
the target data
(e.g., data attributes, formats, etc.). The first data certificate delivering
module 54 is used to
deliver the first data certificate to the second terminal.
[78] Please refer to Figure 7, which is a schematic structural diagram of a
terminal device in an
example of the present invention, a terminal device 60 in this example is a
server. The
terminal device 60 includes a receiver 61, a processor 62, a transmitter 63, a
read only
memory 64, a random access memory 65, and a bus 66.
[79] The receiver 61 is used for receiving data.
[80] The processor 62 controls the operation of the terminal device 60. The
processor 62 may
also be a CPU (Central Processing Unit). The processor 62 may be an integrated
circuit
chip with signal processing capability. The processor 820 may also be a
general purpose
processor, a digital signal processor (DSP), an application specific
integrated circuit
(ASIC), a field programmable gate array (FPGA) or other programmable logic
device,
discrete gate or transistor logic, discrete hardware components. The general
purpose
processor may be a microprocessor or the processor may also be any
conventional
processor and so on.
[81] This transmitter 63 is used for transmitting data.
[82] The memory may include a read-only memory 64 and a random access
memory 65 and
provide instructions and data to the processor 62. A portion of the memory may
also
include non-volatile random access memory (NVRAM).
[83] The various components of the terminal device 60 are coupled together
by a bus 66, which
may include a power bus, a control bus, a status signal bus, etc., in addition
to the data bus.
However, for the sake of clarity, various buses are labelled as buses 66 in
the figure.
[84] The memory stores the following elements, executable modules or data
structures, or a
subset of them, or their extensions:
[85] Operation Instructions: Various operation instructions are included
for various operations.
[86] Operating System: Includes various system programs for implementing
various basic
services and handling hardware-based tasks.
11
23333888.1

CA 02998543 2018-03-13
CA Application
Nat'l Entry of PCT/CN2015/089733
Blakes Ref. 15289/00002
[87] In the example of the present invention, the processor 62 performs the
following operations
by invoking memory-stored operation instructions (the operation instructions
may be
stored in the operating system):
[88] Receive an interactive request for acquiring target data delivered by
a first terminal, where
the interactive request includes description information and data values of
the target data,
and the evaluation information is generated when Second Server detects that
the first
terminal user is in accordance with the preset range of the Second Server; and
[89] The interactive request is delivered to the second terminal.
[90] Optionally, the processor 62 generates a first data certificate
according to the interactive
request when the Second Server detects that the first terminal user meets a
preset level
range and adds the evaluation information.
[91] Optionally, the processor 62 obtains the first data certificate from
the Second Server
according to the interactive request. Where the first data certificate is
generated when the
second data server detects that the target data meets a target requirement,
and the request
includes at least the storage address of each first data certificate in the
Second Server.
Specifically, the first data certificate is generated in advance by the first
terminal and stored
in the Second Server. The request delivered by the first terminal to the
terminal device 60
is a link address (that is, a storage address) of the first data certificate,
and the link address
includes point to the URL address corresponding to the first data certificate.
It can also
contain information about the target data, AP, data initiator information, and
basic
information about the target data (e.g., data attributes, formats, etc.).
[92] Please refer to Figure 8, which is a schematic flowchart of a method
for online fund-raising
in a first example of the present invention, the method includes:
[93] Step S70: the First Server receives the fund raising request for the
target item delivered by
the first terminal, and delivers the fund raising request to the second
terminal.
[94] Wherein, the fund raising request includes description information of
the target project and
the amount of funds to be raised, and also includes the evaluation
information, which is
generated when Second Server audits the first terminal user to conform to the
default level
of the Second Server.
[95] In the above solution, the second terminal server audits the first
terminal user in advance
and adds the corresponding evaluation information for the fund-raising project
when the
second terminal server meets the preset second-class default level. The First
Server
disseminate the funding request containing the assessment information so as to
introduce
12
23333888.1

CA 02998543 2018-03-13
CAApplication
Nat'l Entry of PCT/CN2015/089733
Blakes Ref. 15289/00002
the Second Server assessment into the project financing, provide investment
risk level
reference to other investors (the second terminal) and promote the progress of
the project
financing.
[96] Please refer to Figure 9, which is a schematic flowchart of a method
for online fund-raising
in a second example of the present invention, the method includes:
[97] Step S80: the first terminal delivers a fund raising request for the
target item to the First
Server.
[98] Wherein, the fund raising request includes description information of
the target project and
the amount of funds to be raised, and also includes the evaluation
information, which is
generated when Second Server audits the first terminal user to conform to the
default level
of the Second Server.
[99] Step S81: the First Server obtains, according to the fund raising
request, a first electronic
certificate with a representative amount of money equal to a fund amount
required to be
raised by the target item, and delivers the plurality of first electronic
certificates to the
second terminal. Wherein, the first electronic certificate contains the
information of the
interactive request.
[100] In this example, the first electronic certificate is an Object Credit
Certificate and is an
electronic document that includes at least a financing amount, a target amount
of funds,
and a preset time.
[101] In the solution above, the First Server obtains the corresponding
first electronic certificate
according to the funding request for the target item delivered by the first
terminal. When
launching a funding project in the form of an electronic certificate, Second
Server is
introduced to review and evaluate the sponsors so as to provide a reference
for other
investors (the second terminal) with investment confidence and investment
risk.
[102] Please refer to Figure 10, which is a schematic flowchart of a method
for online financing
according to a third example of the present invention. Please refer to Figure
11, a
schematic diagram of a relationship for fund raising is also shown. The method
flow shown
in this example includes:
[103] Step S90: the first terminal delivers a fund raising request for the
target item to the First
Server.
[104] Wherein, the fund raising request includes description information of
the target project and
the amount of funds to be raised, and also includes the evaluation
information, which is
generated when Second Server audits the second terminal user to conform to the
default
13
23333888.1

CA 02998543 2018-03-13
CAApplication
Nat'l Entry of PCT/CN2015/089733
Blakes Ref. 15289/00002
level of the Second Server.
[105] Step S91: the First Server obtains, according to the fund raising
request, a first electronic
certificate equal to a quota of the funds required to be raised by the target
project, and
delivers the first electronic certificate to the second terminal. Wherein, the
first electronic
certificate contains the information of the interactive request.
[106] In this example, the first electronic certificate is an Object Credit
Certificate and is an
electronic document that includes at least a financing amount, a target amount
of funds,
and a preset time.
[107] In an implementation manner, when the Second Server generates the
evaluation
information by detecting that the first terminal user meets a preset level
range, the First
Server generates a first electronic certificate having the evaluation
information. The
Second Server examines the first terminal user and determines the level of the
first
terminal user. The evaluation content includes the account of the first
terminal user, the
credit record, and so on, adds the evaluation information of the first
terminal user to the
target item. The evaluation information is still retained in the first
electronic certificate
generated by First Server.
[108] In another example, the First Server obtains the first electronic
certificate from the Second
Server according to the funding request. The first data certificate is
generated when the
Second Server approves the first terminal user. The request includes at least
the storage
address of each first electronic certificate in Second Server.
[109] When the verification is passed, the identification information added
for the first electronic
certificate is the signature of the person or the signature of the
institution, so as to improve
the credibility of the first terminal user when raising funds to the second
terminal user,
reduce the difficulty of raising funds.
[110] In the above scenario, Second Server can be a bank management server
that generates an
Object Credit Certificate from the Crowd funding Project via an Object Credit
Certificate
generator loaded with a bank audit plug-in. Wherein, the bank will review the
crowd
funding promoters, and determine the level range.
[111] Step S92: the second terminal receives the first electronic mail
delivered by the First Server
and delivers a certain amount of money to the third server.
[112] Step S93: When the total amount of funds received by the third server
within the target
date is not less than the amount of money to be raised for the target item,
the third server
delivers the received funds to the first terminal, so that the first terminal
user obtains
14
23333888.1

CA 02998543 2018-03-13
CA Application
Nat'l Entry of PCT/CN2015/089733
Blakes Ref. 15289/00002
funding for the target project.
[113] In another implementation manner, the second terminal receives the
first electronic
certificate delivered by the First Server and delivers a second electronic
certificate to the
first terminal, and adds the second electronic certificate to the obtained
first electronic
certificate identification information.
[114] Wherein, the second electronic certificate is a Bank Credit
Certificate, which is opened by
the second terminal user with the guarantee of its bank account fund or credit
line, and the
bank promises to process the electronic credit certificate of payment and
settlement
according to the settlement conditions. That is, the Third Server is the Funds-
Management
server for the second terminal user. The second electronic certificate is
opened by the third
server for freezing the account funds or the credit limit of the second
terminal user, and the
frozen account or credit limit is the same as the quota represented by the
first electronic
certificate obtained.
[115] When the sum of the second electronic certificate funds amount received
by the first
terminal in the target date is not less than the amount of money required for
raising the
target item, the first terminal delivers a settlement request to the third
server, and the third
server delivers the settlement request in response to the settlement request.
The funds
frozen in the second terminal user account are allocated to the Fourth Server.
Correspondingly, the fourth server allocates this part of the funds to the
account of the first
terminal user, so that the first terminal user can obtain the funds required
for raising funds.
[116] Wherein, the Fourth Server is the Funds-Management server of the first
terminal.
[117] Further, the third server may further allocate the frozen funds in
the second terminal user
account to the account of the first terminal according to the solution
request, so that the
first terminal obtains the funds needed to be raised.
[118] When the amount of money received by the first terminal within the
target date is less than
the amount of money to be raised for the target item, the first terminal
delivers a funding
failure message to Third Server, and the Third Server responds to the
information to
unfreeze the corresponding Second terminal user's account funds.
[119] In the solution above, the First Server obtains the corresponding
first electronic certificate
according to the funding request for the target item delivered by the first
terminal. The
second terminal receives the first electronic certificate delivered by the
First Server and
allocates the corresponding fund to the account of the first terminal user, so
that the first
terminal can raise funds required by the target project within the target
date. When issuing
23333888.1

CA 02998543 2018-03-13
CA Application
Nat'l Entry of PCT/CN2015/089733
Blakes Ref. 15289/00002
a funding project in the form of an electronic certificate, Second Server
introduced the
crowd funding sponsor to provide a risk assessment reference for other
investors (the
second terminal).
[120] Further, after receiving the first electronic certificate, each
second terminal may further
deliver a second electronic certificate of equal amount of funds to the Funds-
Management
server of the first terminal, and release the second electronic certificate
after the project
financing is completed. Pay the second electronic certificate to transfer
funds to the first
terminal user's account. Using the second electronic certificate way with the
target
investment projects, the investment of funds is only temporarily frozen,
making investment
safer.
[121] The financing method in the examples of the present invention is
described below by way
of example.
[122] For example, the first terminal is a fund-raising initiator, the Second
Server is a bank, the
second terminal is an investor, and the First Server is an E-commerce
platform.
[123] When the funding initiator issues a request for a target of 1 million
fund-raising through
the E-commerce platform, the E-commerce platform generates an Object for the
crowd
funding project using the Object Credit Certificate generator provided by the
bank or
loaded with the bank audit plug-in Credit Certificate. This Object Credit
Certificate
represents a limit of 1 million. In one example, the Object Credit Certificate
generated by
the initiator is stored on the Second Server and the Object Server Certificate
is published
on the publishing platform via First Server. Wherein, the link information
includes a URL
address pointing to the Object Credit Certificate, and may also include item
introduction
information, sponsor information, commodity images, and so on.
[124] The other investors conduct the follow-up vote. Specifically, the
investor a acquires the
Object Credit Certificate from the initiator, and records the identity
information of the
investor a on the Object Credit Certificate. The investor can use the Bank
Credit Certificate
to purchase, it can also use other methods, such as bank transfer, Alipay and
other network
ways to pay. In the case of Bank Credit Certificate, Third Server freezes the
account of
investor a open the corresponding Bank Credit Certificate for purchasing the
Object Credit
Certificate.
[125] Judgement of successful fund-raising at the expiration of the funding
period and
completion of the transfer of funds. If the project financing is successful,
then enter the
implementation phase, Object Credit Certificate holder based Object Credit
Certificate for
16
23333888.1

CA 02998543 2018-03-13
CAApplication
Nat'l Entry of PCT/CN2015/089733
Blakes Ref. 15289/00002
a preset income. Wherein, if the investor a uses Bank Credit Certificate, the
funds of the
account of the third-party investor a will be paid to the sponsor's fund-
raising account. If
unsuccessful, the project financing fails, and the investment fund is returned
according to
the Object Credit Certificate. For example, in the case of a conventional
payment method,
the investment fund is returned to the last assignee of the Object Credit
Certificate. If Bank
Credit Certificate is used for payment, the investor opens a bank credit
certificate to the
financing account for unfreezing.
[126] In the above solution, the first terminal user through the bank's audit
and assessment, the
investment needs to purchase Object Credit Certificate by online banking
payment, bank
transfer or through the Bank Credit Certificate way to buy, and the success of
the target
project will be the corresponding of the funds allocated to the sponsor's bank
account. In
the case of Object Credit Certificate, the fund-raising project is launched
and introduced
into the bank to review the first terminal-user so as to provide other
investors with
information on investment risk. The investor purchases the target project by
means of Bank
Credit Certificate. The funds frozen due to the opening of the Bank Credit
Certificate are
not directly transferred to the sponsor's bank account but merely frozen by
the bank and
cannot be used. However, the funds are still invested by the investor Bank
account. As a
result, the risk to the investor is greatly reduced, and at the same time it
is also possible to
obtain additional benefits because the frozen funds remain their own.
[127] In the above examples, the present invention has been exemplary
described only, but
various modifications to the present invention can be made by those skilled in
the area after
reading this patent application without departing from the spirit and scope of
the present
invention.
17
23333888.1

Representative Drawing
A single figure which represents the drawing illustrating the invention.
Administrative Status

2024-08-01:As part of the Next Generation Patents (NGP) transition, the Canadian Patents Database (CPD) now contains a more detailed Event History, which replicates the Event Log of our new back-office solution.

Please note that "Inactive:" events refers to events no longer in use in our new back-office solution.

For a clearer understanding of the status of the application/patent presented on this page, the site Disclaimer , as well as the definitions for Patent , Event History , Maintenance Fee  and Payment History  should be consulted.

Event History

Description Date
Letter Sent 2022-05-17
Inactive: Grant downloaded 2022-05-17
Inactive: Grant downloaded 2022-05-17
Grant by Issuance 2022-05-17
Inactive: Cover page published 2022-05-16
Pre-grant 2022-03-24
Inactive: Final fee received 2022-03-24
Notice of Allowance is Issued 2022-02-28
Letter Sent 2022-02-28
Notice of Allowance is Issued 2022-02-28
Inactive: Approved for allowance (AFA) 2022-02-24
Inactive: Q2 passed 2022-02-24
Amendment Received - Response to Examiner's Requisition 2022-01-20
Amendment Received - Voluntary Amendment 2022-01-20
Examiner's Report 2021-09-20
Inactive: Report - No QC 2021-09-20
Change of Address or Method of Correspondence Request Received 2021-09-07
Amendment Received - Response to Examiner's Requisition 2021-09-07
Amendment Received - Voluntary Amendment 2021-09-07
Examiner's Report 2021-05-06
Inactive: Report - No QC 2021-05-05
Appointment of Agent Requirements Determined Compliant 2021-04-23
Revocation of Agent Requirements Determined Compliant 2021-04-23
Inactive: Associate patent agent removed 2021-04-23
Amendment Received - Response to Examiner's Requisition 2021-04-08
Amendment Received - Voluntary Amendment 2021-04-08
Revocation of Agent Request 2021-03-05
Appointment of Agent Request 2021-03-05
Examiner's Report 2020-12-09
Inactive: Report - No QC 2020-12-08
Common Representative Appointed 2020-11-07
Change of Address or Method of Correspondence Request Received 2020-10-23
Letter sent 2020-09-01
Advanced Examination Determined Compliant - paragraph 84(1)(a) of the Patent Rules 2020-09-01
Letter Sent 2020-09-01
All Requirements for Examination Determined Compliant 2020-08-28
Request for Examination Requirements Determined Compliant 2020-08-28
Inactive: Advanced examination (SO) fee processed 2020-08-28
Request for Examination Received 2020-08-28
Amendment Received - Voluntary Amendment 2020-08-28
Inactive: Advanced examination (SO) 2020-08-28
Inactive: Associate patent agent added 2020-04-29
Revocation of Agent Request 2020-03-17
Revocation of Agent Requirements Determined Compliant 2020-03-17
Appointment of Agent Requirements Determined Compliant 2020-03-17
Appointment of Agent Request 2020-03-17
Common Representative Appointed 2019-10-30
Common Representative Appointed 2019-10-30
Revocation of Agent Requirements Determined Compliant 2018-11-23
Inactive: Office letter 2018-11-23
Inactive: Office letter 2018-11-23
Appointment of Agent Requirements Determined Compliant 2018-11-23
Revocation of Agent Request 2018-11-13
Appointment of Agent Request 2018-11-13
Appointment of Agent Request 2018-10-15
Revocation of Agent Requirements Determined Compliant 2018-10-15
Appointment of Agent Requirements Determined Compliant 2018-10-15
Revocation of Agent Request 2018-10-15
Change of Address or Method of Correspondence Request Received 2018-10-15
Change of Address or Method of Correspondence Request Received 2018-07-12
Inactive: Cover page published 2018-04-20
Inactive: Notice - National entry - No RFE 2018-03-29
Letter Sent 2018-03-27
Inactive: First IPC assigned 2018-03-26
Inactive: IPC assigned 2018-03-26
Application Received - PCT 2018-03-26
National Entry Requirements Determined Compliant 2018-03-13
Application Published (Open to Public Inspection) 2017-03-23

Abandonment History

There is no abandonment history.

Maintenance Fee

The last payment was received on 2021-06-29

Note : If the full payment has not been received on or before the date indicated, a further fee may be required which may be one of the following

  • the reinstatement fee;
  • the late payment fee; or
  • additional fee to reverse deemed expiry.

Please refer to the CIPO Patent Fees web page to see all current fee amounts.

Fee History

Fee Type Anniversary Year Due Date Paid Date
MF (application, 2nd anniv.) - standard 02 2017-09-18 2018-03-13
Basic national fee - standard 2018-03-13
Registration of a document 2018-03-13
MF (application, 3rd anniv.) - standard 03 2018-09-17 2018-06-12
MF (application, 4th anniv.) - standard 04 2019-09-16 2019-01-15
MF (application, 5th anniv.) - standard 05 2020-09-16 2020-01-07
Advanced Examination 2020-08-28 2020-08-28
Request for examination - standard 2020-09-16 2020-08-28
MF (application, 6th anniv.) - standard 06 2021-09-16 2021-06-29
Final fee - standard 2022-06-28 2022-03-24
MF (patent, 7th anniv.) - standard 2022-09-16 2022-06-22
MF (patent, 8th anniv.) - standard 2023-09-18 2023-06-14
MF (patent, 9th anniv.) - standard 2024-09-16 2023-12-15
Owners on Record

Note: Records showing the ownership history in alphabetical order.

Current Owners on Record
10353744 CANADA LTD.
Past Owners on Record
None
Past Owners that do not appear in the "Owners on Record" listing will appear in other documentation within the application.
Documents

To view images, click a link in the Document Description column. To download the documents, select one or more checkboxes in the first column and then click the "Download Selected in PDF format (Zip Archive)" or the "Download Selected as Single PDF" button.

List of published and non-published patent-specific documents on the CPD .

If you have any difficulty accessing content, you can call the Client Service Centre at 1-866-997-1936 or send them an e-mail at CIPO Client Service Centre.