Note : Les descriptions sont présentées dans la langue officielle dans laquelle elles ont été soumises.
CA 02995916 2018-02-16
WO 2017/101001 PCT/CN2015/097391
Title: Data Exchange Processing Method, Server, Terminal Device, And
Online Transaction Method
[1] [Technical Field]
[2] The present invention relates to the field of Internet data interaction
technology, and in
particular, to a data interaction processing method, a server, a terminal
device, and an
online transaction method.
[3] [Background Technology]
[4] With the development of Internet technology and especially mobile
Internet technology,
users can connect to the Internet through mobile devices using 2G, 3G, 4G or
WiFi to
conduct transactions and social activities. Users can conveniently and
effectively perform
online activities, this is an incomparable experience with offline.
[5] However, when users perform transactions such as transaction and social
networking via
mobile Internet, transaction parties often violate the agreement to cancel the
transaction,
thus wasting network resources and reducing interaction efficiency.
[6] [Summary of the Invention]
[7] The technical problem mainly solved by the present invention is to
provide a data
interaction processing method, a server and a terminal device, and generate a
corresponding data certificate to ensure the efficiency of data interaction
before performing
target interaction.
[8] The present invention provides a data interaction processing method,
which includes: The
First Server generates a first data certificate associated with the target,
and the device
corresponding to the second account receives the first data certificate
according to the
agreement to obtain second data certificate information, where the second data
certificate
information is stored in the data certificate contains at least a first preset
data value in a
first account; the second data certificate is generated by the Second Server
for locking the
first preset data value in the first account, and is used to deliver the
target to the second
user terminal if the device corresponding to the first account fails to
deliver the target to the
second user account corresponding to the device, the first preset data value
is added to the
second account.
[9] The present invention also provides a data interaction processing
method, including: The
First Server generates a first data certificate associated with the target;
the device
corresponding to the second account receives the first data certificate
according to the
i
CA 02995916 2018-02-16
WO 2017/101001 PCT/CN2015/097391
agreement, and delivers a third data certificate establishment request to the
third server,
where the first data certificate includes the solicitation issuing request
includes a second
preset data value; the third data certificate establishment request is
generated when a
device corresponding to the second account responds to the solicitation /
issuing request;
and the Third Server in response to the third data certificate opening
request, lock the
second preset data value in the second account to generate the third data
certificate, and
deliver the information of the third data certificate to the Second Server;
wherein the third
data certificate is used to increase the second preset data value to the
target when the
device corresponding to the second account does not accept the target
delivered by the
device corresponding to the first account according to the agreement in the
first account.
[10] The present invention further provides a data interaction processing
method applied to a
Second Server, where the method includes: receiving, by the Second Server, a
second data
certificate establishment request delivered by a First Server, where the
second data
certificate on the first request is delivered when the first data server
generates a first data
certificate that is associated with the target or the First Server delivers
the first data
certificate to the second account according to the agreement; and the second
data certificate
opening request including a first preset data value; and generating the second
data
certificate in response to the second data certificate opening request locking
the first preset
data value in the first account, wherein the second data certificate is used
for adding the
first preset data value to the second account when the device corresponding to
the first
account does not deliver the target to the second account according to the
agreement.
[11] An example of the present invention further provides a data
interaction processing method
applied to a Third Server. The method includes: receiving, by the third
server, an
instruction that is delivered when a device corresponding to a second account
receives,
according to an agreement, a first data certificate delivered by a First
Server. Wherein the
first data certificate includes an invitation to issue a certificate request,
the request for
certificate issuing includes a second preset data value; and the third data
certificate opening
request is generated when the second account responds to the invitation for
issuance
request; and locking the second preset data value in the second account in
response to the
request; wherein the third data certificate is used to add the second preset
data value to the
target of the first account when the device corresponding to the second
account does not
accept the target delivered by the device corresponding to the first account
according to the
contract in an account.
[12] The present invention further provides a server, including: a
communication module is
used to receive a second data certificate opening request delivered by a First
Server, where
2
CA 02995916 2018-02-16
WO 2017/101001 PCT/CN2015/097391
the second data certificate opening request is a request message delivered by
the First
Server for generating. The first data certificate issued by the First Server
or the First Server
delivers the first data certificate to the second account according to the
agreement; the
second data certificate establishment request includes a first preset data
value; and the
second data certificate generating module is used to generate the second data
certificate in
response to the second data certificate opening request and lock the first
preset data value
in the first account; and an executing module is used to respond to the first
request
unlocking the first preset data value; and also responds to the second request
to unlock the
first preset data value and deliver the first preset data value to the Third
Server associated
with the second account, so as to increase the first preset data value to the
second account,
where the first request is generated when the first server determines that the
device
corresponding to the first account delivers the target to the device
corresponding to the
second account according to the agreement; and the second request generates
the first
Server determines that the device corresponding to the first account does not
deliver the
object to the device corresponding to the second account according to the
agreement.
[13] The present invention further provides a server, including: a
communication module,
configured to receive a third data certificate establishment request that is
delivered when a
device corresponding to a second account receives a first data certificate
delivered by a
First Server according to an agreement; where the first data certificate
includes a
solicitation contract issuing request, where the solicitation / issuing
certification request
includes a second preset data value; the third data certificate establishment
request is
generated when the second account responds to the solicitation / issuing
certification
request; and a third data certificate generation module is used for locking
the second preset
data value in the second account in response to the request to generate the
third data
certificate; and an execution module is used for unlocking the third request
in response to
the third request. A second preset data value; further used for unlocking the
second preset
data value in response to a fourth request and delivering the second preset
data value to a
Second Server associated with the first account to add the second preset data
value to the
account; wherein the third request is generated when the second account
accepts the target
according to the agreement; the fourth request is that the First Server
determines that the
device corresponding to the second account is not in accordance with the
contract arises
when the goal is accepted.
[14] The present invention also provides a terminal device, including: one
or more processors; a
memory; a plurality of application programs; and one or more programs, wherein
the one
or more programs are stored in the memory and used to be executed by the one
or more
3
CA 02995916 2018-02-16
WO 2017/101001 PCT/CN2015/097391
processors, the one or more programs including instructions is used for: the
Second Server
receiving a second data certificate opening request delivered by a First
Server; wherein the
second data certificate opening request is delivered when the First Server
generates a first
data certificate that is associated with the target or the First Server
delivers the first data
certificate to the second account according to the agreement; the second data
certificate
opening request includes a first preset data value; and generate the second
data certificate
in response to the second data certificate opening request locking the first
preset data value
in the first account; wherein , the second data certificate is used to, when
the device
corresponding to the first account does not deliver the target to the second
account
according to the agreement, add the first preset data value to the second
account.
[15] The present invention also provides a terminal device, including: one
or more processors; a
memory; a plurality of application programs; and one or more programs, wherein
the one
or more programs are stored in the memory and configured to be executed by the
one or
more processors, the one or more programs including instructions used for:
receiving, by
the third server, an instruction that is delivered when a device corresponding
to a second
account receives, according to an agreement, a first data certificate
delivered by a First
Server. Wherein the first data certificate includes an invitation to issue a
certificate request,
the request for certificate issuing includes a second preset data value; and
the third data
certificate opening request is generated when the second account responds to
the invitation
for issuance request; and locking the second preset data value in the second
account in
response to the request; wherein the third data certificate is used to add the
second preset
data value to the target of the first account when the device corresponding to
the second
account does not accept the target delivered by the device corresponding to
the first
account according to the contract in an account.
[16] In the above data interaction processing method, the information of
the second data
certificate is recorded in the first data certificate associated with the
target, and the first
data certificate containing the second data certificate information is
delivered to the second
account that requests the interaction target. The second data certificate is
used to add the
first preset data value to the second account when the first account does not
deliver the
target to the second account according to the agreement. Therefore, when the
target / data
interaction occurs, the first preset data value is not delivered according to
the preset
interaction target / data, and the network resource is avoided by arbitrarily
violating the
agreement of the target / data interaction, so as to improve the efficiency of
the target / data
interaction.
[17] Another object of the present invention is to provide an online
transaction method in which
4
CA 02995916 2018-02-16
WO 2017/101001 PCT/CN2015/097391
records the electronic certificate information used to compensate the other
party when the
transaction fails, so as to improve the transaction success rate.
[18] The present invention provides an online transaction method including:
First Server
generates electronic commitment certificate; wherein the electronic commitment
certificate
is a network electronic certificate integrated with the required functions of
the target
commodity / service E-commerce; the device corresponding to the second account
receives
the electronic commitment certificate as agreed to acquire the first
electronic certificate
information; wherein the first electronic certificate information is stored in
the electronic
commitment certificate, and includes at least a first preset amount of a first
account; and
the first electronic certificate is generated by the Second Server for
freezing the first preset
amount of funds in the first account and is used for providing the second
account with the
target commodity / service if the first account does not provide the second
commodity
according to the agreement account, allocate the first preset amount of funds
to the second
account.
[19] The present invention also provides an online transaction method,
including: First Server
generates an electronic commitment certificate; wherein the electronic
commitment
certificate is a network electronic certificate integrated with the required
functions of the
target commodity / services electronic commerce; and the second account
receives the
electronic commitment certificate according to the agreement, and delivers the
electronic
commitment certificate to the third server wherein the electronic proof of
commitment
includes a solicitation of an offer for issuance, the solicitation of issuing
of a solicitation
includes a second preset amount of funds; and the second electronic
certificate opening
request is responded to by the second account and the third server is used to
freeze the
second preset amount of funds in the second account in response to the second
electronic
certificate opening request to generate the second electronic certificate and
deliver the
second electronic certificate where the second electronic certificate is used
to, when the
second account does not accept the target commodity / service provided by the
first
account according to the agreement, deliver the second electronic certificate
to the Second
Server; the second preset amount of funds is added to the first account.
[20] In the above online transaction method, an electronic certificate is
used for a security
deposit of the first account and / or the second account is attached to the
electronic proof of
commitment, and when either party fails to fulfil the agreement, the security
deposit is paid
to the other party for use to ensure the performance of transactions and
protect the interests
of both parties. Further, the margin does not need to be paid in advance to
each other, nor
does it need to be handed over to a third party for safekeeping in advance,
which avoids the
S
CA 02995916 2018-02-16
WO 2017/101001
PCT/CN2015/097391
situation that the payer cannot recover the deposit after performing the
contract, so as to
protect the fair rights and interests of both online transaction parties and
promote the
development of E-commerce.
[21] [Brief Description]
[22] Figure 1 is a schematic flow chart of a data interaction processing
method in a first
example of the present invention;
[23] Figure 2 is a schematic diagram of data interaction in an example of
the present invention;
[24] Figure 3 is a schematic flowchart of a data interaction processing in
a second example of
the present invention;
[25] Figure 4 is a schematic flowchart of a data interaction processing
method in a third
example of the present invention;
[26] Figure 5 is a schematic flow chart of a data interaction processing
method in a fourth
example of the present invention.
[27] Figure 6 is a schematic flow chart of a data interaction processing
method in a fifth
example of the present invention.
[28] Figure 7 is a schematic flow chart of a data interaction processing
method in a sixth
example of the present invention;
[29] Figure 8 is a schematic structural diagram of a server in a first
implementation manner of
the present invention;
[30] Figure 9 is a schematic structural diagram of a server in a second
example of the present
invention;
[31] Figure 10 is a schematic structural diagram of a terminal device in a
first example of the
present invention.
[32] Figure 11 is a schematic structural diagram of a terminal device in a
second
implementation manner of the present invention;
[33] Figure 12 is a schematic flowchart of an online transaction method in
a first
implementation manner of the present invention;
[34] Figure 13 is a schematic flowchart of an online transaction method in
a second example of
the present invention.
[35] [Description of the Preferred Examples]
[36] The technical solutions in the examples of the present invention will
be described clearly
and completely below with reference to the accompanying drawings in the
examples of the
present invention. Apparently, the described examples are only a part but not
all of the
examples of the present invention the way. All other examples obtained by
persons of
ordinary skill in the art based on the examples of the present invention
without creative
6
CA 02995916 2018-02-16
,
WO 2017/101001
PCT/CN2015/097391
efforts shall fall within the protection scope of the present invention.
[37] Please refer to Figure 1, which is a schematic flowchart of a data
interaction processing
method according to a first example of the present invention. Please refer to
Figure 2, a
schematic diagram of data interaction is shown. First Server is used to
generate, manage,
update, and store the first data certificate. The Second Server is associated
with the first
account and is used to manage the data in the first account. The third server
is associated
with the second account and is used to manage the data in the second account.
The method
flow shown in this example includes:
[38] In step S10, the First Server generates a first data certificate that
is associated with the
target.
[39] Step 511, the device corresponding to the second account receives the
first data certificate
according to the agreement to obtain the second data certificate information.
[4o[ Wherein, the second data certificate information is stored in
the first data certificate and
contains at least the first preset data value in the first account. Where the
second data
certificate is generated by the Second Server locking the first preset data
value in the first
account and is used to: when the device corresponding to the first account
does not deliver
the target to the device corresponding to the second account according to the
agreement,
the first preset data value is added to the second account.
[41] In an example, the second data certificate is requested by Second
Server for First Server
while generating the first data certificate. Specifically, the First Server
delivers a second
data certificate opening request to the Second Server, so that the Second
Server generates
the second data certificate by locking the first preset data value in the
first account in
response to the request. Further, the First Server obtains the information of
the second data
certificate, records the information of the second data certificate in the
first data certificate,
and publishes the first data certificate over the network for other terminal /
account
interaction.
[42] In another example, after the second data certificate is generated by
the First Server by the
First Server, the device corresponding to the second account generates the
first data
certificate according to the agreement. That is, the First Server generates
the second data
certificate after generating the first data certificate and receives the
request for obtaining
the first data certificate delivered by the second account. The First Server
issues the first
data certificate through the network. When the second account needs to obtain
the target
associated with the first data certificate, the First Server delivers an
interactive request to
the First Server, so that the First Server delivers the second data
certificate to the Second
Server in response to the interactive request. In response to the request, the
Second Server
7
CA 02995916 2018-02-16
WO 2017/101001 PCT/CN2015/097391
locks the first preset data value in the first account and generates the
second data
certificate. Further, the First Server obtains the information of the second
data certificate,
records the information of the second data certificate in the first data
certificate, and
delivers the first data certificate containing the second data certificate
information to the
second account.
[43] Specifically, the convention described in step Sll may include a
target date, a target
interaction rule, and a communication rule. The information of the second data
certificate
includes at least a first preset data value size, and may further include
information of a
validity period, a status parameter and a first data certificate, where the
first data certificate
information may be a name of a target, a data format of a target, and so on.
[44] Further, the device corresponding to the second account further
requests the third server to
verify the second data certificate according to the second data certificate
information. Third
Server verifies the second data certificate according to the second data
certificate
information specifically as follows: The third server verifies whether the
information of the
second data certificate meets the target requirement, for example, verifying
whether the
validity period of the second data certificate has expired or whether the
status parameter of
the Second Server is receivable.
[45] Further, after the third server verifies that the information of the
second data certificate
meets the target requirement, modifies the state parameter in the information
of the second
data certificate to the received certificate and delivers the modified second
data certificate
to the Second Server information. After receiving the modified second data
certificate
information, Second Server modifies the original second data certificate
information stored
by Second Server according to the modification content.
[46] In the above solution, the information of the second data certificate
is recorded in the first
data certificate associated with the target, and the first data certificate
containing the
second data certificate information is delivered to the second account that
requests the
interaction target. The second data certificate is used to add the first
preset data value to the
second account when the device corresponding to the first account fails to
deliver the target
to the device corresponding to the second account according to the agreement.
Therefore,
when the target / data interaction occurs, the first preset data value is not
delivered
according to the preset interaction target / data, and the network resource is
avoided by
arbitrarily violating the agreement of the target / data interaction, so as to
improve the
efficiency of the target / data interaction.
[47] Please refer to Figure 3, which is a schematic flowchart of a data
interaction processing
method according to a second example of the present invention. The method
shown in this
8
CA 02995916 2018-02-16
WO 2017/101001 PCT/CN2015/097391
example also includes the following steps with respect to the method shown in
Figure 1:
[48] In step S22, the First Server determines whether the second account
generates a request for
rejecting the target according to the agreement. If yes, go to step S23;
otherwise, go to step
S24.
[49] Specifically, when determining that the third server verifies that the
second data certificate
is valid, the First Server determines whether the second account has a request
for refusal to
accept the target according to the agreement.
[50] In step S23, the First Server requests the Second Server to unlock the
first preset data
value. Then, the process is over.
[51] Specifically, in this implementation manner, the second data
certificate is generated for
locking the first preset data value in the first account, and the first preset
data value is
added to the second account when the device corresponding to the first account
does not
deliver the target to the device corresponding to the second account according
to the
agreement. If the second account first generates a request for refusal to
accept the target
according to the agreement, it is determined that the second account violates
the
agreement, and the first preset data value does not need to be added to the
second account
to directly unlock the first preset data value and still save in the first
account.
[52] In step S24, the First Server determines whether the device
corresponding to the first
account delivers the object to the device corresponding to the second account
according to
the agreement. If yes, go to step S25; otherwise, go to step S26.
[53] In step S25, the First Server requests the Second Server to unlock the
first preset data
value. Then, the process is over.
[54] In step S26, the First Server requests the Second Server to unlock the
first preset data value
and deliver the first preset data value to the third server to add the first
preset data value to
the second account. Then, the process is over.
[55] Please refer to Figure 4, it is a data interaction processing method
according to a third
example of the present invention. The method and process shown in this example
includes:
[56] In step S30, the First Server generates a first data certificate that
is associated with the
target.
[57] Step S31: The device corresponding to the second account receives the
first data certificate
according to the agreement to obtain the second data certificate information.
[58] Wherein, the second data certificate information is stored in the
first data certificate and
contains at least the first preset data value in the first account. Where the
second data
certificate is generated by the Second Server locking the first preset data
value in the first
account and is used to: when the device corresponding to the first account
does not deliver
9
CA 02995916 2018-02-16
,
WO 2017/101001
PCT/CN2015/097391
the target to the device corresponding to the second account according to the
agreement,
the first preset data value is added to the second account.
[59] In an example, the second data certificate is requested by Second
Server for First Server
while generating the first data certificate.
[60] In another example, after the second data certificate is generated by
the First Server by the
First Server, the device corresponding to the second account generates the
first data
certificate according to the agreement.
[61] Step S32: The device corresponding to the second account delivers a
third data certificate
establishment request to the third server. Wherein, the first data certificate
includes a
solicitation / issuance certification request, and the solicitation / issuance
certification
request includes a second preset data value. The third data certificate open
request is
generated by the device corresponding to the second account in response to the
request for
issuing a certificate.
[62] Step S33: In response to the request, the third server locks the
second preset data value in
the second account to generate the third data certificate, and delivers the
information of the
third data certificate to the Second Server.
[63] Further, Third Server also requests Second Server to verify the third
data certificate
according to the information of the third data certificate.
[64] The third data certificate is used to add the second preset data value
to the first account
when the device corresponding to the second account fails to accept the target
delivered by
the device corresponding to the first account according to the contract.
[65] In the present example, while the first account provides a second data
certificate that locks
the first preset data value, the second account also provides a third data
certificate that
locks the second preset data value to constrain both the interaction of the
target / data. Of
course, in other examples, only the first account may provide the second data
certificate, or
only the second account may provide the third data certificate, and
accordingly only the
first account or the second account of the target / data interaction may be
performed
constraint.
[66] In step S34, the First Server determines whether the second account
has generated a
request for rejecting the target according to the agreement. If yes, go to
step S35;
otherwise, go to step S36.
[67] Specifically, when the First Server determines that the Second Server
verifies that the third
data certificate is valid and the third server validates the second data
certificate, it
determines whether the second account has a request for rejecting the target
according to
the agreement.
CA 02995916 2018-02-16
W020171101001 PCT/CN2015/097391
[68] In step S35, the First Server requests the Second Server to unlock the
first preset data value
and requests the third server to unlock the second preset data value and
delivers the second
preset data value to the Second Server to increase the second preset data
value to First
account. Then, the process is over.
[69] In step S35, since the second account refuses to accept the target
according to the contract,
the second preset data value in the second account needs to be added to the
first account.
[70] In step S36, the First Server requests the third server to unlock the
second preset data
value, and determines whether the device corresponding to the first account
delivers the
target to the device corresponding to the second account according to the
agreement. If yes,
go to step S37; otherwise, go to step S38.
[71] In step S37, the First Server requests the Second Server to unlock the
first preset data
value. Then, the process is over.
[72] In step S38, the First Server requests the Second Server to unlock the
first preset data value
and deliver the first preset data value to the third server to add the first
preset data value to
the second account.
[73] In the above solution, the first preset data value and the second
preset data value in the first
account and the second account are respectively locked, and the second data
certificate and
the third data certificate are generated accordingly. When the first account
violates the
agreement, the first preset data value is added to the second account
according to the
second data certificate. When the second account violates the agreement, the
second preset
data value is added to the first account according to the third data
certificate. Thus, when
either party fails to follow the intended interaction goal / data during the
goal / data
interaction, the preset data value is added to the other party's account based
on the
corresponding data certificate.
[74] Further, the second preset data value is divided into the first sub
data value and the second
sub data value and only the first sub data value is increased when the device
corresponding
to the second account does not accept the target delivered by the device
corresponding to
the first account as agreed to the first account.
[75] Further, when it is determined that the device corresponding to the
first account delivers
the target to the device corresponding to the second account according to the
agreement,
the Third Server further determines whether the data value that is not locked
in the second
account is not less than the data value of the target. If so, Third Server
delivers the target's
data value to Second Server and adds it to the first account. Otherwise, the
third server
unlocks the second preset data value and delivers the target data value to the
Second Server
to be added to the first account.
11
CA 02995916 2018-02-16
WO 2017/101001 PCT/CN2015/097391
[76] Please refer to Figure 5, which is a data interaction processing
method in a fourth example
of the present invention, the method shown in this example includes the
following steps:
[77] In step S50, the First Server generates a first data certificate that
is associated with the
target.
[78] Step S51: The device corresponding to the second account receives the
first data certificate
according to the agreement, and delivers a third data certificate
establishment request to the
third server.
[79] Wherein, the first data certificate includes a solicitation / issuance
certification request, and
the solicitation / issuance certification request includes a second preset
data value. The
third data certificate open request is generated by the device corresponding
to the second
account in response to the request for issuing a certificate.
[80] Step S52: In response to the third data certificate opening request,
the third server locks the
second preset data value in the second account to generate a third data
certificate, and
delivers the information of the third data certificate to the Second Server.
[81] The third data certificate is used to add the second preset data value
to the first account
when the device corresponding to the second account fails to accept the target
delivered by
the device corresponding to the first account according to the contract.
[82] Further, the method further includes:
[83] In step S53, the First Server determines whether the second account
has generated a
request for rejecting the target according to the agreement. If yes, go to
step S54.
Otherwise, step S55 is performed.
[84] In step S54, the First Server requests the third server to unlock the
second preset data value
and delivers the second preset data value to the Second Server to add the
second preset data
value to the first account.
[85] In step S55, the First Server requests the third server to unlock the
second preset data
value.
[86] Please refer to Figure 6, which is a data interaction processing
method in a fifth example of
the present invention. The method shown in this example is applied to a Second
Server,
and includes the following steps:
[87] In step S60, the Second Server receives the second data certificate
opening request
delivered by the First Server.
[88] The second data certificate opening request is delivered when the
First Server generates the
first data certificate that is associated with the target, or the First Server
delivers the first
data certificate to the second account according to the agreement. The second
data
certificate opening request includes the first preset data value.
12
CA 02995916 2018-02-16
WO 2017/101001
PCT/CN2015/097391
[89] Step S61: Generate a second data certificate in response to the second
data certificate
opening request for locking the first preset data value in the first account.
[90] The second data certificate is used to add the first preset data value
to the second account
when the device corresponding to the first account does not deliver the target
to the second
account according to the agreement.
[91] Further, the Second Server unlocks the first preset data value in
response to the first
request; unlocks the first preset data value in response to the second request
and delivers
the first preset data value to a Third Server to add the first preset data
value to the second
account.
[92] Wherein, the first request is generated when the First Server
determines that the device
corresponding to the first account delivers the target to the device
corresponding to the
second account according to the agreement; and the second request determines
that the
First Server determines that the first device corresponding to the account is
not generated
when the target is not delivered to the device corresponding to the second
account
according to the agreement.
[93] Please refer to Figure 7, which is a data interaction processing
method in a sixth example
of the present invention. The method shown in this example is applied to a
Third Server
and includes the following steps:
[94] Step S70: The third server receives the third data certificate
establishment request that is
delivered when the device corresponding to the second account receives the
first data
certificate delivered by the First Server according to the agreement.
[95] Wherein, the first data certificate includes a solicitation / issuance
certification request, and
the solicitation / issuance certification request includes a second preset
data value. The
third data certificate open request is generated by the second account in
response to an
invitation to issue a certificate.
[96] Step S71: Lock the second preset data value in the second account to
generate a third data
certificate in response to the request.
[97] The third data certificate is used to add the second preset data value
to the first account
when the device corresponding to the second account fails to accept the target
delivered by
the device corresponding to the first account according to the contract.
[98] Further, the third server delivers the third data certificate
information to the Second Server
associated with the first account, and requests the Second Server to verify
the third data
certificate according to the third data certificate information.
[99] Further, the third server unlocks the second preset data value in
response to the third
request; in response to the fourth request, unlocks the second preset data
value and delivers
13
CA 02995916 2018-02-16
WO 2017/101001 PCT/CN2015/097391
the second preset data value to Second Server to add the second preset data
value to the
first account.
[100] Where the third request is generated when the second account accepts the
target according
to the contract; and the fourth request is generated when the First Server
determines that
the device corresponding to the second account fails to accept the target
according to the
contract.
[101] Please refer to Figure 8, it is a schematic structural diagram of a
server in a first example of
the present invention. The server 80 includes a communication module 81, a
second data
certificate generation module 82, and an execution module 83. In this example,
the server
80 is a Second Server.
[102] The communication module 81 is used to receive a second data certificate
establishment
request delivered by the First Server. The second data certificate opening
request is
delivered when the first data server generates the first data certificate that
is associated with
the target or the First Server delivers the first data certificate to the
second account
according to the agreement. The second data certificate opening request
includes the first
preset data value.
[103] The second data certificate generating module 82 is used to generate a
second data
certificate in response to the second data certificate opening request for
locking the first
preset data value in the first account. The second data certificate is used to
add the first
preset data value to the second account when the device corresponding to the
first account
fails to deliver the target to the second account according to the agreement.
[104] The execution module 83 is used to unlock the first preset data value
in response to the first
request; unlocks the first preset data value in response to the second request
and delivers
the first preset data value to a Third Server to add the first preset data
value to the second
account.
[105] Wherein, the first request is generated when the First Server
determines that the device
corresponding to the first account delivers the target to the device
corresponding to the
second account according to the agreement; and the second request determines
that the
First Server determines that the first device corresponding to the account is
not generated
when the target is not delivered to the device corresponding to the second
account
according to the agreement.
[106] Figure 9 is a schematic structural diagram of a server in a second
example of the present
invention. The server 90 includes a communication module 91, a third data
certificate
generation module 92, and an execution module 93. In this example, the server
90 is a
Third Server.
14
CA 02995916 2018-02-16
WO 2017/101001 PCT/CN2015/097391
[107] The communication module 91 is used to receive a third data certificate
opening request
that is delivered when the device corresponding to the second account receives
the first
data certificate delivered by the First Server according to the agreement.
[108] Wherein, the first data certificate includes a solicitation /
issuance certification request, and
the solicitation / issuance certification request includes a second preset
data value. The
third data certificate open request is generated by the second account in
response to an
invitation to issue a certificate.
[109] The third data certificate generation module 92 is used to lock the
second preset data value
in the second account to generate the third data certificate in response to
the request.
Wherein the third data certificate is used to add the second preset data value
to the first
account when the device corresponding to the second account fails to accept
the target
delivered by the device corresponding to the first account according to the
contract.
[110] In an example, while the first account provides a second data
certificate that locks the first
preset data value, the second account also provides a third data certificate
that locks in the
second preset data value to constrain the target/data interaction. In other
examples, only the
first account may provide the second data certificate, or only the second
account may
provide the third data certificate, and accordingly only the first account or
the second
account of the target / data interaction may be constrained.
[111] The execution module 93 is used to unlock the second preset data
value in response to the
third request; and further configured to, in response to the fourth request,
unlock the second
preset data value and deliver the second preset data value to the first
account associated
Second Server to add the second preset data value to the first account.
[112] Where the third request is generated when the second account accepts the
target according
to the contract; and the fourth request is generated when the First Server
determines that
the device corresponding to the second account fails to accept the target
according to the
contract.
[11 3] Please refer to Figure 10, which is a schematic structural diagram
of a terminal device in a
first example of the present invention. The terminal device 100 in this
example is a Second
Server. The terminal device 100 includes a receiver 101, a processor 102, a
transmitter 103,
a read only memory 104, a random access memory 105, and a bus 106.
[114] The receiver 101 is used for receiving data.
[115] The processor 102 controls the operation of the terminal device 100.
The processor 102
may also be a CPU (Central Processing Unit). The processor 102 may be an
integrated
circuit chip with signal processing capability. The processor 102 may also be
a general
purpose processor, a digital signal processor (DSP), an application specific
integrated
CA 02995916 2018-02-16
WO 2017/101001
PCT/CN2015/097391
circuit (ASIC), a field programmable gate array (FPGA) or other programmable
logic
device, discrete gate or transistor logic, discrete hardware components. The
general
purpose processor may be a microprocessor or the processor may also be any
conventional
processor and so on.
[116] The transmitter 103 is for transmitting data.
[117] The memory may include a read-only memory 104 and a random access memory
105 and
provide instructions and data to the processor 102. A portion of the memory
may also
include non-volatile random access memory (NVRAM).
[118] The various components of the terminal device 100 are coupled together
via a bus 106,
where the bus 106 may include a power bus, a control bus, a status signal bus,
and so on in
addition to a data bus. However, for the sake of clarity, various buses are
labelled as buses
106 in the figure.
[119] The memory stores the following elements, executable modules or data
structures, or a
subset of them, or their extensions:
[120] Operation Instructions: Various operation instructions are included
for various operations.
[121] Operating System: Includes various system programs for implementing
various basic
services and handling hardware-based tasks.
[122] In the example of the present invention, the processor 102 performs
the following
operations by invoking memory-stored operation instructions (the operation
instructions
may be stored in the operating system):
[123] Receive the second data certificate request from First Server. The
second data certificate
opening request is delivered when the first data server generates the first
data certificate
that is associated with the target or the First Server delivers the first data
certificate to the
second account according to the agreement. The second data certificate opening
request
includes the first preset data value. And
[124] In response to the second data certificate, open the request to lock
the first preset data value
in the first account to generate the second data certificate. The second data
certificate is
used to add the first preset data value to the second account when the device
corresponding
to the first account fails to deliver the target to the second account
according to the
agreement.
[125] Optionally, the processor 102 is also used to: unlock the first
preset data value in response
to the first request; unlocks the first preset data value in response to the
second request and
delivers the first preset data value to a Third Server to add the first preset
data value to the
second account.
[126] Wherein, the first request is generated when the First Server
determines that the device
16
CA 02995916 2018-02-16
WO 2017/101001
PCT/CN2015/097391
corresponding to the first account delivers the target to the device
corresponding to the
second account according to the agreement; and the second request determines
that the
First Server determines that the first device corresponding to the account is
not generated
when the target is not delivered to the device corresponding to the second
account
according to the agreement.
[127] Please refer to Figure 11, which is a schematic structural diagram of
a terminal device in a
second example of the present invention. The terminal device 110 in this
example is a
Third Server. The terminal device 110 includes a receiver 111, a processor
112, a
transmitter 113, a read only memory 114, a random access memory 115, and a bus
116.
[128] The receiver 111 is used for receiving data.
[129] The processor 112 controls the operation of the terminal device 110. The
processor 112
may also be a CPU (Central Processing Unit). The processor 112 may be an
integrated
circuit chip with signal processing capability. The processor 102 may also be
a general
purpose processor, a digital signal processor (DSP), an application specific
integrated
circuit (ASIC), a field programmable gate array (FPGA) or other programmable
logic
device, discrete gate or transistor logic, discrete hardware components. The
general
purpose processor may be a microprocessor or the processor may also be any
conventional
processor and so on.
[130] The transmitter 113 is for transmitting data.
[131] The memory may include a read-only memory 114 and a random access memory
115 and
provide instructions and data to the processor 112. A portion of the memory
may also
include non-volatile random access memory (NVRAM).
[132] The various components of the terminal device 110 are coupled together
via a bus 116,
where the bus 116 may include a power bus, a control bus, a status signal bus,
and so on in
addition to a data bus. However, for the sake of clarity, various buses are
labelled as buses
116 in the figure.
[133] The memory stores the following elements, executable modules or data
structures, or a
subset of them, or their extensions:
[134] Operation Instructions: Various operation instructions are included
for various operations.
[135] Operating System: Includes various system programs for implementing
various basic
services and handling hardware-based tasks.
[136] In the example of the present invention, the processor 102 performs the
following
operations by invoking memory-stored operation instructions (the operation
instructions
may be stored in the operating system):
[137] Receive a third data certificate opening request that is delivered
when the device
17
CA 02995916 2018-02-16
WO 201 7/1 01 001 PCT/CN2015/097391
corresponding to the second account receives the first data certificate
delivered by the First
Server according to the agreement. Wherein, the first data certificate
includes a solicitation
/ issuance certification request, and the solicitation / issuance
certification request includes
a second preset data value. The third data certificate open request is
generated by the
second account in response to an invitation to issue a certificate.
[138] In response to the request, lock the second preset data value in the
second account to
generate the third data certificate. Wherein the third data certificate is
used to add the
second preset data value to the first account when the device corresponding to
the second
account fails to accept the target delivered by the device corresponding to
the first account
according to the contract.
[139] Further, the third server delivers the third data certificate
information to the Second Server
associated with the first account, and requests the Second Server to verify
the third data
certificate according to the third data certificate information.
[140] Optionally, the processor 112 is also used to execute: unlocking the
second preset data
value in response to the third request; unlocking the second preset data value
in response to
the fourth request and delivering the second preset data value to the Second
Server
associated with the first account to add the second preset data value to the
first account.
[141] Where the third request is generated when the second account accepts the
target according
to the contract; and the fourth request is generated when the First Server
determines that
the device corresponding to the second account fails to accept the target
according to the
contract.
[142] Please refer to Figure 12, which is a schematic flowchart of an
online transaction method
according to a first example of the present invention. The method includes:
[143] In step S120, the First Server generates the electronic commitment
certificate.
[144] Wherein, E-commitment certificate is the network electronic
certificate that integrates the
essential functions of the target commodity/service E-business.
[145] Step S121: The device corresponding to the second account receives
the electronic
commitment certificate according to the agreement to obtain the first
electronic certificate
information.
[146] Wherein, the first electronic certificate information is stored in
the electronic commitment
certificate and includes at least a first preset amount of the first account.
The first electronic
certificate is generated by the Second Server freezing the first preset amount
of money in
the first account and is used for providing the target account to the second
account when
the first account does not provide the target account / service to the second
account
according to the agreement. The first preset amount of funds is allocated to
the second
18
CA 02995916 2018-02-16
WO 2017/101001 PCT/CN2015/097391
account.
[147] In one example, the first electronic certificate requests the First
Server to generate the
electronic commitment certificate for the First Server.
[148] In another example, after the first electronic certificate generates
the electronic
commitment certificate for the First Server, the device corresponding to the
second account
generates the electronic commitment certificate according to the agreement.
[149] Specifically, the contract described in step S121 may include a
target date, a transaction
amount of a target commodity / service, a trading rule, and so on. The
information of the
first electronic certificate includes at least the size of the first preset
amount of funds, and
may further include information of the validity period, the status parameter,
and the
electronic proof of commitment. In this example, the electronic commitment
certificate
information may be a certificate number, an amount of a target commodity, and
so on.
[150] Further, the device corresponding to the second account further
requests the third server to
verify the first electronic certificate according to the first electronic
certificate information.
The third server verifies the first electronic certificate according to the
first electronic
certificate information specifically as follows: The Third Server verifies
whether the
information of the first electronic certificate meets the target requirement,
for example,
verifying whether the validity period of the first electronic certificate has
expired or
whether the status parameter thereof is a recertification certificate.
Further, after verifying
that the information of the first electronic certificate meets the target
requirement, the third
server modifies the status parameter in the information of the first
electronic certificate as
received and delivers the modified first electronic certificate message to
Second Server.
After receiving the modified first electronic certificate information, Second
Server
modifies the original first electronic certificate information stored by
Second Server
according to the modification content. Further, the method also includes the
following
steps:
[151] In step S122, the First Server determines whether the second account
generates a request
for rejecting the target! item according to the agreement. If yes, go to step
S123; otherwise,
go to step S124.
[152] Step S123, requesting the Second Server to unfreeze the first preset
amount of funds.
[153] Step S124: The First Server determines whether the first account
provides the target! item
to the second account according to the agreement. If yes, go to step S125;
otherwise, go to
step S126.
[154] In step S125, the First Server requests the Second Server to unfreeze
the first preset amount
of funds. Then, the process is over.
19
CA 02995916 2018-02-16
WO 2017/101001 PCT/CN2015/097391
[155] In step S126, the First Server requests the Second Server to unfreeze
the first preset amount
of funds and allocate the third amount of funds to the third server, so as to
allocate the
funds to the second account. Then, the process is over.
[156] Further, in an example, while the first account provides for freezing
a first electronic
certificate of a first preset amount, the second account also provides a
second electronic
certificate that will freeze the second preset amount to bind both parties to
the transaction.
[157] Specifically, the second account delivers a second electronic
certificate opening request to
the third server, and the third server, in response to the request, blocks a
second preset
amount of funds in the second account to generate the second electronic
certificate and
delivers the second electronic certificate electronic certificate to the
Second Server to
request the Second Server to verify the second electronic certificate
according to the
information of the second electronic certificate. The second electronic
certificate is used to
allocate a second preset amount of funds to the first account when the second
account does
not accept the target commodity / service delivered by the first account as
agreed upon.
Also, the electronic proof of commitment includes an offer for issuing request
that includes
a second preset amount of money. The second electronic certificate opening
request is
generated by the second account in response to an invitation to issue a
certificate.
Specifically, the second account applies for establishment of the second
electronic
certificate to Third Server according to the solicitation and issuance
information contained
in the electronic proof of commitment. That is, the first account records the
invitation for
offer in advance in the electronic proof of commitment. The solicitation and
issuing request
includes the information such as the issuing amount, expiration date,
receiving bank,
collecting account and so on. The second account will be delivered to Third
Server directly
after obtaining the request for issuing the certificate, no need to fill out
the opening content
again. Second Server information is included in the solicitation / issuing
request. After the
third server is issued, the third server can be issued to the Second Server
without the need
of the second account and then the first account.
[158] Further, when the first account provides a first electronic
certificate for freezing a first
preset amount and the second account also provides a second electronic
certificate for
freezing a second preset amount, the first account determines that the second
account is
generated. The First Server requests the Second Server to unfreeze the first
preset amount
of money and requests the third server to unfreeze the second preset amount of
money and
refuses the second preset amount of money to the Second Server. The second
preset
amount of funds allocated to the first account. When the First Server
determines that the
second account does not generate a request for rejecting the target / item
according to the
CA 02995916 2018-02-16
WO 2017/101001 PCT/CN2015/097391
agreement, the First Server requests the third server to unfreeze the second
preset amount
of funds. When the First Server also determines that the first account
provides the target /
item to the second account according to the agreement, the First Server
requests the Second
Server to unfreeze the first preset amount of funds. Otherwise, the First
Server requests the
Second Server to unfreeze the first preset amount of funds and allocates the
first preset
amount of funds to the Third Server to add the first preset amount of funds to
the second
account.
[159] Further, when it is determined that the first account delivers the
target / commodity to the
second account according to the agreement, the Third Server determines whether
the
amount of the unfrozen funds in the second account is not less than the target
/ commodity
of amount : If yes, funds equal to the target / commodity amount will be
allocated to the
Second Server, and the funds will be allocated to the first account;
otherwise, the funds of
the second preset amount will be unfrozen, the same amount of target /
commodity funds
allocated to the Second Server, the funds allocated to the first account.
[160] Further, the second account cancels the transaction by way of a request
to First Server for
the return of the electronic proof of commit or a request for refund to Third
Server. Further,
when Third Server pays for the payment with electronic certificate. The refund
request may
be withdrawal of the electronic certificate request.
[161] Further, the First Server may directly deliver to the third server
information that the first
account has delivered the target / item to the second account according to the
agreement, or
may entrust a third party (such as a logistics company, a tenancy registration
authority, etc.)
to deliver the information.
[162] Of course, in other examples, only the first account may provide the
second data
certificate, or only the second account may provide the third data
certificate, and
accordingly only the first account or the second account of the target / data
interaction may
be constrained.
[163] Please refer to Figure 13, which is a schematic flowchart of an
online transaction method in
a second example of the present invention. The method includes:
[164] In step S130, the First Server generates the electronic commitment
certificate.
[165] Wherein, E-commitment certificate is the network electronic
certificate that integrates the
essential functions of the target commodity/service E-business.
[166] Step S131: The second account receives the electronic commitment
certificate according to
the agreement, and delivers a second electronic certificate establishment
request to the
Third Server.
[167] Wherein, the electronic proof of commitment includes an offer for
issuing request that
21
CA 02995916 2018-02-16
WO 2017/101001 PCT/CN2015/097391
includes a second preset amount of money. The second electronic certificate
opening
request is generated by the second account in response to an invitation to
issue a certificate.
[168] Step S132: In response to the second electronic certificate opening
request, the third server
may freeze the second preset amount of funds in the second account to generate
a second
electronic certificate, and deliver the information of the second electronic
certificate to the
Second Server.
[169] The second electronic certificate is used to add a second preset amount
of funds to the first
account when the second account does not accept the target commodity /
services provided
by the first account as agreed upon.
[170] In the above scheme, the electronic certificate for margin bond with
the first account and /
or the second account attached to the electronic proof of promise, when one of
the parties
fails to perform the agreement, pays a security deposit to the other party to
guarantee the
transaction fulfilment and safeguard the interests of both parties. Further,
the margin does
not need to be paid in advance to each other, nor does it need to be handed
over to a third
party for safekeeping in advance, which avoids the situation that the payer
cannot recover
the deposit after performing the contract, so as to protect the fair rights
and interests of
both online transaction parties and promote the development of E-commerce.
[171] In the above examples, the present invention has been exemplary
described only, but
various modifications to the present invention can be made by those skilled in
the area after
reading this patent application without departing from the spirit and scope of
the present
invention.
22