Language selection

Search

Patent 2997631 Summary

Third-party information liability

Some of the information on this Web page has been provided by external sources. The Government of Canada is not responsible for the accuracy, reliability or currency of the information supplied by external sources. Users wishing to rely upon this information should consult directly with the source of the information. Content provided by external sources is not subject to official languages, privacy and accessibility requirements.

Claims and Abstract availability

Any discrepancies in the text and image of the Claims and Abstract are due to differing posting times. Text of the Claims and Abstract are posted:

  • At the time the application is open to public inspection;
  • At the time of issue of the patent (grant).
(12) Patent Application: (11) CA 2997631
(54) English Title: METHOD AND DEVICE FOR DATA EXCHANGE PROCESSING AND ONLINE FUNDING METHOD
(54) French Title: PROCEDE ET DISPOSITIF DE TRAITEMENT D'ECHANGE DE DONNEES ET PROCEDE DE FINANCEMENT EN LIGNE
Status: Pre-Grant
Bibliographic Data
(51) International Patent Classification (IPC):
  • G06Q 20/38 (2012.01)
  • G06Q 30/00 (2023.01)
  • H04L 67/561 (2022.01)
(72) Inventors :
  • ZHANG, YI (China)
(73) Owners :
  • 10353744 CANADA LTD.
(71) Applicants :
  • 10353744 CANADA LTD. (Canada)
(74) Agent: JAMES W. HINTONHINTON, JAMES W.
(74) Associate agent:
(45) Issued:
(86) PCT Filing Date: 2015-09-16
(87) Open to Public Inspection: 2017-03-23
Examination requested: 2020-08-27
Availability of licence: N/A
Dedicated to the Public: N/A
(25) Language of filing: English

Patent Cooperation Treaty (PCT): Yes
(86) PCT Filing Number: PCT/CN2015/089766
(87) International Publication Number: CN2015089766
(85) National Entry: 2018-03-06

(30) Application Priority Data: None

Abstracts

English Abstract

Method and device for data exchange processing and an online funding method. the method for data exchange processing comprises: when responding to an exchange request transmitted by a second terminal, first terminals transmit first data certificates to the second terminal (S403); when the sum of data values represented by all of the first data certificates received by the second terminal in the preset time is no less than the size of the data value of the target data, the second terminal transmits notification information to the first server (S404); and the first server, in response to the notification information, adds data identical in the size of the data values of data represented by the first data certificates to the second terminal (S405). The described solution increases the security of data exchange.


French Abstract

L'invention concerne un procédé et un dispositif de traitement d'échange de données, ainsi qu'un procédé de financement en ligne. Le procédé de traitement d'échange de données comprend les opérations suivantes : lors de la réponse à une requête d'échange transmise par un second terminal, des premiers terminaux transmettent des premiers certificats de données au second terminal (S403) ; lorsque la somme de valeurs de données représentées par l'ensemble des premiers certificats de données reçus par le second terminal dans le temps préréglé n'est pas inférieure à la taille de la valeur de données des données cibles, le second terminal transmet des informations de notification au premier serveur (S404) ; et le premier serveur, en réponse aux informations de notification, ajoute des données identiques de par leur taille aux valeurs de données des données représentées par les premiers certificats de données au second terminal (S405). La solution décrite augmente la sécurité d'échange de données.
Claims

Note: Claims are shown in the official language in which they were submitted.


The Claims
[Claim 1] A data interaction processing method, wherein the method
comprises:
The first terminal delivers a first data certificate to the second terminal
when
responding to the interaction request delivered by the second terminal, where
the
interactive request includes at least a data value of the target data and a
preset time;
and the first data certificate generated by the First Server by locking the
first data in
the first terminal according to the request of the first terminal;
When the total size of the data values represented by all the first data
certificates
that are received by the second terminal within the preset time is not smaller
than
the data value size of the target data, delivers notification information to
the First
Server;
In response to the notification information, the First Server adds data with
the same
size as the data value of the data represented by the first data certificate
to the
second terminal.
[Claim 2] The data interaction processing method according to Claim 1, its
characteristic in
that when confirming the response to the interactive request delivered by the
second
terminal, the first terminal delivers a first data certificate to the second
terminal
before the step, the method further includes:
The second terminal generates a plurality of second data certificates
according to
the interactive request of the target data, and delivers the plurality of
second data
certificates to the Second Server; wherein the second data certificate at
least
includes the data of the target data value and the preset time;
Second Server delivers most of the received second data certificate to a
number of
first terminals;
When the first terminal responds to the interactive request, delivering the
first data
certificate to the second terminal specifically includes:
The first terminal delivers the first data certificate to the second terminal
when it is
confirmed to accept at least one second data certificate.
[Claim 3] The data interaction processing method according to any one of
claims 1 or 2,
wherein the second terminal determines that the sum of the sizes of the data
values
of all the first data certificates received within the target date is smaller
than the
target when the data value of the data is large, the method further includes:
The second terminal delivers the instruction to the First Server to deliver
the target
28

data interaction failure;
Where the instruction of interaction failure is used to notify the First
Server to
unlock the first data certificate.
[Claim 4] A data interaction processing method, wherein the method
comprises:
The first terminal receives the interactive request delivered by the second
terminal;
wherein, the interaction request includes at least the data value of the
target data
and the preset time;
Sending, by the first terminal, a first data certificate to the second
terminal when
confirming the response to the interactive request; where the interactive
request
includes at least a data value of the target data and a preset time; and the
first data
certificate generated by the First Server by locking the first data in the
first
terminal according to the request of the first terminal.
[Claim 5] The method according to Claim 4, wherein when the first terminal
confirms the
response to the interactive request, the step of delivering the first data
certificate to
the second terminal specifically comprises:
Sending, by the first terminal, a request for generating the first data
certificate to
the First Server when confirming the response to the interactive request;
wherein
the request comprises at least information about the first data to be locked;
The First terminal delivers the First data certificate to the second terminal
when it
receives the First data certificate delivered by the First Server.
[Claim 6] A data interaction processing method, wherein the method
comprises:
The second terminal delivers an interactive request to the first terminal to
obtain
the target data; wherein, the interaction request includes at least the data
value of
the target data and the preset time;
Receiving, by the second terminal, a first data certificate that is delivered
by a first
terminal when confirming the response to the interactive request; wherein the
first
data certificate is generated by the First Server locking the first data in
the first
terminal;
When the sum of the sizes of the data values represented by all the first data
certificates that are received by the second terminal within the preset time
is not
less than the data value size of the target data, the first terminal notifies
the first
server adds data with the same size as the data value of the data represented
by the
first data certificate to the second terminal.
[Claim 7] The data interaction processing method according to Claim 6,
wherein the step of
the second terminal delivering the interactive request for acquiring the
target data
29

to the first terminal is specifically:
By the second terminal, a plurality of second data certificates according to
the
interactive request for acquiring target data, and delivering the plurality of
second
data certificates to the first terminal by using a Second Server, where the
second
data certificate at least includes the data value of the target data and the
preset time
The step of the second terminal receiving the first data certificate delivered
by the
first terminal specifically includes:
The second terminal receives the first data certificate that was delivered at
least
one of the second data certificates.
[Claim 8] The data interaction processing method according to Claim 6,
wherein a sum of
sizes of data values of all the first data certificates that are received by
the second
terminal within a target date is smaller than the target data when the size of
the
data value, the method further comprises:
The second terminal delivers the instruction to the First Server to deliver
the target
data interaction failure;
Where the instruction of interaction failure is used to notify the First
Server to
unlock the first data certificate.
[Claim 9] A data interaction processing device, comprising: a receiving
module and a
response module;
The receiving module is used to receive an interactive request delivered by a
second terminal, where the interactive request includes at least a data value
of the
target data and a preset time;
Wherein the response module is used to deliver a first data certificate to the
second terminal when confirming the response to the interactive request;
wherein
the interactive request includes at least a data value of the target data and
a preset
time; and the first data certificate generated by the First Server by locking
the first
data in the first terminal according to the request of the first terminal.
[Claim 10] A data interaction processing device, comprising: a delivering
module, an
acquisition module, a confirming module and a notification module;
The delivering module is used to deliver an interactive request for acquiring
target
data to a first terminal, where the interactive request includes at least a
data value
of the target data and a preset time;
Where the acquisition module is used to receive a first data certificate that
is
delivered by a first terminal when the first terminal responds to the
interactive
request delivered by the delivering module, where the first data certificate
is

delivered by the First Server according to the request of the first terminal
generated by locking the first data in the first terminal;
The confirming module is used to determine whether the sum of the sizes of the
data values represented by all the first data certificates that are received
by the
acquisition module within the preset time is not less than the data value size
of the
target data;
The notification module is used to notify the First Server when the
confirmation
result is that the sum of the sizes of the data values represented by all of
the first
data certificates is not smaller than the data value size of the target data,
notify the
First Server to be the same as the A data certificate data represented by the
data
value of the same size data to the second terminal.
[Claim 11] The data interaction processing device according to Claim 10,
wherein the
acquisition module is used to receive a first data certificate delivered by a
first
terminal when it is confirmed that at least one second data certificate is
accepted;
wherein, at least one second data certificate is at least one of a plurality
of second
data certificates that are generated by the second terminal according to an
interactive request of target data and is delivered by the Second Server to
the
acquisition module;
The notification module is further configured to, when the confirmation module
determines that the sum of the data size values of all the first data
certificates
received within the target date is smaller than the data value size of the
target data.
The First Server delivers an instruction that the target data exchange fails,
where
the instruction of interacting fails is used to notify the First Server to
unlock the
first data certificate.
[Claim 12] A method for online fund-raising, the method comprising:
When responding to a fund raising request delivered by a second terminal,
wherein the fund raising request comprises at least the target item
information, the
target fund amount and the preset time; the first electronic certificate is
that the
First Server froze the first user's funds account according to the request of
the first
terminal. And promises to settle the payment certificate of electronic credit
commitment of the first fund according to the agreed conditions; the First
Server is
an account management server of the first user;
When the sum of the funding amounts of all the first electronic certificates
that are
received by the second terminal within the preset time is not less than the
target
credit limit, notification information is delivered to the First Server;
31

In response to the notification information, the First Server transfers the
funds
represented by the first electronic certificate to the funds account of the
second
user.
[Claim 13] The method for online fund-raising according to Claim 12,
wherein the first
terminal delivers the first electronic certificate to the second terminal when
responding to the fund raising request delivered by the second terminal
before, the
method further includes:
The second terminal generates multiple second electronic certificates
according to
the fund raising request information of the target item and delivers the
multiple
second electronic certificates to the First Server, where the second
electronic
certificate at least includes the target item information, the funding limit,
target
amount of funds and the default time;
The first server delivers the received second electronic certificates to a
plurality of
first terminals;
The step of the first terminal delivering the first electronic certificate to
the second
terminal when responding to the delivering fund-raising request of the second
terminal specifically comprises:
The first terminal delivers the first electronic certificate to the second
terminal
when it is confirmed that the second terminal receives the at least one second
electronic certificate.
[Claim 14] The method for online fund-raising according to any one of
claims 12 or 13,
wherein the second terminal determines that the amount of funds of all the
first
electronic certificates received within the target date is less than the
target amount
of money, the method further comprises:
The second terminal delivers instructions to the First Server to fail to raise
funds;
The First Server responds to the fund raising failure instruction, and
unfreezes all
the first electronic certificates.
[Claim 15] A method for online fund-raising, the method comprising:
Receiving, by the first terminal, a fund-raising request delivered by a second
terminal, where the fund-raising request at least includes the target item
information, the target fund amount and the preset time;
The first terminal delivers the first electronic certificate to the second
terminal
when it confirms the financing request of the response; wherein the first
electronic
certificate is that the First Server froze the first user's funds account
according to
the request of the first terminal. And promises to settle the payment credit
of
32

electronic credit commitment according to the agreed conditions; and the First
Server is an account management server of the first user.
[Claim 16] The online financing method according to Claim 15, wherein when
confirming the
request for fund raising delivered by the second terminal, the first terminal
delivers the first electronic certificate to the second terminal, steps are as
follows:
Sending, by the first terminal, a request for generating the first electronic
certificate to the First Server when confirming a response to the fund raising
request delivered by the second terminal; wherein the request comprises at
least
information about the first fund to be frozen;
The First terminal, when receiving the First electronic certificate delivered
by the
First Server, delivers the First electronic certificate to the second
terminal.
[Claim 17] A method for online fund-raising, the method comprising:
The second terminal delivers a fund raising request to the first terminal,
where the
fund raising request at least includes the target item information, the target
fund
amount and the preset time;
Receiving, by the second terminal, a first electronic certificate that is
delivered by
a first terminal when the first terminal confirms the response to the fund-
raising
request; wherein the first electronic certificate is that the First Server
froze the first
user's funds account according to the request of the first terminal. And
promises to
settle the payment credit of electronic credit commitment according to the
agreed
conditions; and the First Server is an account Funds-Management server of the
first user;
Sending, by the first terminal, notification information to the First Server
when the
sum of the funds amounts of all the first electronic certificates received
within the
preset time is not less than the target amount of funds; wherein the
notification
information is used to notify the First Server to allocate the funds
represented by
the first electronic certificate to the funds account of the second user.
[Claim 18] The online financing method according to Claim 17, wherein the
step of the
second terminal delivering the fund raising request to the first terminal
comprises:
The Second terminal generates multiple second electronic certificates based on
the
financing request, and delivers the Second electronic certificate to the first
terminal through Second Server; wherein, the second electronic certificate
includes at least the target project information, financing amount, target
fund
amount and preset time;
The second terminal receives the first electronic certificate that is
delivered by the
33

first terminal when confirming the response to the fund-raising request, the
steps
specifically includes:
The second terminal receives the first terminal to receive the first
electronic
certificate delivered at least one of the second electronic certificate.
[Claim 19] The method for online fund-raising according to any one of
claims 17 or 18,
wherein all the funds of the first electronic certificate received by the
second
terminal within the preset time when the sum of quotas is less than the target
amount of funds, the method further comprises:
The second terminal delivers instructions to the First Server to fail to raise
funds;
wherein, the instructions for the failure of the financing are used to inform
the
First Server response to the financing failure instructions and to unfreeze
the First
electronic certificate.
34

Description

Note: Descriptions are shown in the official language in which they were submitted.

CA 02997631 2018-03-06 WO 2017/045160 PCT/CN2015/089766 Title: Method And Device For Data Exchange Processing And Online Funding Method [Technical Field] [2] The present invention relates to the field of Internet data interaction technology, and in particular, to a data interaction processing method and device, and an online funding method. [3] [Background Technology] [4] With the development of Internet technology and especially mobile Internet technology, users can connect to the Internet through mobile devices using 2G, 3G, 4G or WiFi to conduct transactions and social activities. Users can conveniently and effectively perform online activities, this is an incomparable experience with offline. [5] However, when users conduct transactions such as trading and social networking through the mobile Internet, their personal sensitive information is easily exposed and may be acquired by others in the process of interaction so that they can use their information for illegal purposes. This will provide network users a lot of risk. [6] [Summary of the Invention] [7] It is an object of the present invention to provide a data interaction processing method and device for transmitting data in the form of data certificate during data interaction and completing data interaction when the terminal meets a preset condition so as to improve network data interaction security. [8] In order to solve thc above problem, a first technical solution adopted by the present invention is to provide a data interaction processing method, where the method includes: when a first terminal responds to an interactive request delivered by a second terminal, delivering, by the sccond terminal, a first data certificate; wherein the interactive request at least includes the data value of the target data and a preset time; and delivering, by the First Server, the first data certificate to the first terminal according to the request of the first terminal; and when all the data size values represented by all the first data certificates that are received by the second terminal within the preset time are not smaller than the data size of the target data, delivering, by the First Server, notification information; and in response to the notification information, adding, by the First Server, data with the same size as the data value of the data represented by the first data certificate to the second terminal. [9] In order to solve the above problem, a second technical solution adopted by the present CA 02997631 2018-03-06 WO 2017/045160 PCT/CN2015/089766 invention is to provide a data interaction processing method, where the method includes: receiving, by a first terminal, an interactive request delivered by a second terminal; wherein, the interactive request at least including the data value of the target data and the preset time; delivering, by the first terminal, a first data certificate to the second terminal when confirming the response to the interactive request; wherein the interactive request includes at least data of the target data value, and a preset time, where the first data certificate is generated by the First Server by locking the first data in the first terminal according to the request of the first terminal. [1 0] In order to solve the above problem, a third technical solution adopted by the present invention is to provide a data interaction processing method, where the method includes: delivering, by a second terminal, an interactive request for acquiring target data to a first terminal, where the interactive request includes at least the data value of the target data and a preset time; receiving, by the second terminal, a first data certificate that is delivered by the first terminal when confirming the response to the interactive request; wherein the first data certificate is a First Server generated by the first terminal; the sum of sizes of all data values represented by all the first data certificates that the second terminal receives within the preset time is not less than the target data. The First Server is notified to add the data with the same size as the data value of the data represented by the first data certificate to the second terminal. [11] In order to solve the above problem, a fourth technical solution adopted by the present invention is to provide a data interaction processing device, where the device includes a receiving module and a response module. The receiving module is used to receive an interaction delivered by a second terminal request, wherein the interactive request at least includes a data value of the target data and a preset time; and the response module is used to deliver a first data certificate to the second terminal when confirming the response to the interactive request; wherein, the interactive request comprises at least a data value of the target data and a preset time, and the first data certificate is generated by the First Server according to the first terminal locking the first data in the first terminal. In order to solve the above problem, the fifth technical solution adopted by the present invention is to provide a data interaction processing device, where the device includes a delivering module, an acquisition module, a confirmation module, and a notification module; the delivering module is used to deliver an interactive request to the first terminal to obtain the target data; wherein the interactive request includes at least a data value of the target data and a preset time; and the acquisition module is used to receive, by the first terminal, an acknowledgement response to thc request delivered by the delivering module 2 CA 02997631 2018-03-06 WO 2017/045160 PCT/CN2015/089766 wherein the first data certificate is generated when the First Server locks the first data in the first terminal according to the request of the first terminal; and the confirmation module is used to: Judging whether a sum of sizes of data valuesrepresented by all the first data certificates that are received by the acquisition module in the preset time is not less than a data value size of the target data; and the notifying module is used to, when the confirmation result of the confirmation module is that the sum of the sizes of the data values represented by all the first data certificates is not less than the data value of the target data. Notify the First Server to add data with the same size as the data value of the data represented by the first data certificate to the second terminal. [13] In the above solution, when responding to the interactive request delivered by the second terminal, the first terminal delivers a first data certificate to the second terminal; all the data represented by all thc first data certificates that the second terminal receives within a preset time when the sum of the sizes is not less than the size of the data value of the target data, a notification message is delivered to the First Server to notify the First Server to add data with the same size as the data value of the data represented by the first data certificate to the second terminal. In the foregoing manner, data is transmitted in the form of data certificate during data exchange. When the first terminal completes the data interaction according to the preset condition, the second terminal can successfully obtain the data provided by the first terminal, thereby improving data exchange security. [14] In order to solve the above problem, the sixth technical solution adopted by the present invention is to provide a method for online financing, the method comprising: when responding to a fund raising request delivered by a second terminal, wherein the fund raising request comprises at least the target item information, the target fund amount and the preset time; the first electronic certificate is that the First Server froze the first user's funds account according to the request of the first terminal. And promises to settle the payment certificate of electronic credit commitment of the first fund according to the agreed conditions; the First Server is an account management server of the first user; and the first terminal delivers notification information to the first server when the sum of the funds amounts of all the first electronic certificates received by the second terminal within the preset time is not less than the target amount of funds; notifying information, and allocating the funds represented by the first electronic certificate to the second user's funds account. [15] In order to solve the above problem, a seventh technical solution adopted by the present invention is to provide an online financing method, wherein the method comprises: receiving, by a first terminal, a fund raising request delivered by a sccond terminal; 3 CA 02997631 2018-03-06 WO 2017/045160 PCT/CN2015/089766 wherein, the fund raising request comprises at least target project information, a target fund amount and a preset time; and when confirming the response to the fund raising request, the first terminal delivers a first electronic certificate to the second terminal, wherein the first the electronic certificate is a payment certificate of electronic credit commitment generated by the First Server and frozen in the funds account of the first user according to the request of the first terminal and promised to be settled according to the agreed conditions; the First Server is the account management server of the first user. [16] In order to solve the above problem, an eighth technical solution adopted by the present invention is to provide an online financing method, wherein the method comprises: delivering, by a second terminal, a fund raising request to a first terminal; wherein, the fund raising request comprises at least the target item information, the target fund amount and the preset time; receiving, by the second terminal, a first electronic certificate delivered by the first terminal when confirming the response to the fund raising request; wherein the first electronic certificate is First Server generates a payment certificate of electronic credit commitment that is generated by freezing the first fund in the capital account of the first user according to the request of the first terminal and promises to be settled according to the agreed conditions; and the First Server is the first account of the user Funds-Management server; and when the sum of the funds of all the first electronic certificates received by the second terminal within the preset time is not less than the target fund limit, the second terminal delivers the sum to the First Server where the notification information is used to notify the First Server to deliver the first electronic certificate. The funds allocated to the second user's financial accounts. [17] In the solution above, when the first terminal confirms that it is responding .to the fund raising request delivered by the second terminal, it delivers the first electronic certificate to the second terminal and all the first electronic certificates received by the second terminal within the preset time when the total amount of funds is not less than the target amount of funds, First Server delivers the notification information, and First Server responds to the notification information and allocates the funds represented by the first electronic certificate to the funds account of the second terminal. In the above way, the second user can obtain the funds represented by the electronic certificate when the second terminal finishes the fund-raising in the form of electronic certificate during the fund-raising process and can raise the security of network fund-raising, and the funds represented by the first electronic certificate during the funding period can also generate interest rates and increase the profits of the second user. [ 1 8] [Brief Description] 4 CA 02997631 2018-03-06 WO 2017/045160 PCT/CN2015/089766 [19] Figure 1 is a schematic flow chart of an example of an online financing method according to the present invention; [20] Figure 2 is a schematic flow chart of another example of the online financing method of the present invention; [21] Figure 3 is a schematic flow chart of still another example of the online financing method of the present invention; [22] Figure 4 is a schematic flow chart of an example of a data interaction processing method according to the present invention; [23] Figure 5 is a schematic flow chart of another example of a data interaction processing method according to the present invention; [24] Figure 6 is a schematic flow chart of another example of a data interaction processing method according to the present invention; [25] Figure 7 is a schematic structural diagram of an example of a data interaction processing device according to the present invention; [26] Figure 8 is a schematic structural diagram of an example of a data interaction processing device according to the present invention; [27] Figure 9 is a schematic structural diagram of an example of a data interaction processing device according to the present invention; [28] Figure 10 is a schematic structural diagram of an example of a data interaction processing device according to the present invention. [29] [Description of the Preferred Examples] [30] In the following description, in order to illustrate, not to qualify, specific details such as specific system structurc, interfaces, and technology are presented to make a thorough understanding of this invention. However, technical personnel in this field should be aware that this invention can be implemented in other implementation ways without these specific details. In othcr instances, omit the detailed instructions on the well-known devices, circuits, and methods to avoid unnecessary details that prevent the description of the invention. [31] Please refer to Figure 1, Figure 1 is a schematic flowchart of an online financing method according to an example of the present invention. The online financing method of this example includes the following stcps: [32] S101: thc second terminal delivers a fund raising request of the target item to the first terminal. [33] Whcn the second terminal needs to initiate fund-raising for the target project, the fund-raising request is delivered to the plurality of first terminals. CA 02997631 2018-03-06 WO 2017/045160 PCT/CN2015/089766 [34] Wherein, the funding request includes at least the target project information, the target amount of funds and the default time. The information of the target project is the information of the project that needs to be raised, and the target fund is the fund needed to start or finish the target project. The preset time is the funding period. [35] Further, the target project information may also include the way of reporting, that is, the way of reporting the object of financing to the object of financing after the target project is started or completed, the way of reporting may be cash or non-cash, for example, shares, bonuses, membership privileges, etc., which is not limited herein. [36] It can be understood that the fund-raising request may be delivered by the second terminal directly to the first terminal that meets the requirement, or it may be that the second terminal delivers the fund-raising request to the electricity supplier platform, and the electricity supplier platform screens the first terminal, and delivers the funding request to the first terminal that meets the requirement, which is not limited herein. The E-commerce platform is a server with integrated E-commerce capabilities. The E-commerce platform can be integrated with First Server or with two independent servers. [37] It is understandable that, in this example, the fund raising request may be delivered in the form of information and webpage links, and may also be delivered in the form of an electronic certificate, which is not limited hcrcin. [38] Further, when the second terminal delivers the fund raising request in the form of an electronic certificate, step S101 is specifically: [39] The second terminal generates a plurality of second electronic certificates according to the fund raising request information of the target item, and delivers the plurality of second electronic certificates to the Second Server; and the Second Server delivers the received multiple second electronic certificates to the multiple first terminals. [40] Wherein, the second electronic certificate at least includes the amount of funds represented by the second electronic certificate, the target item information, the target amount of funds and the preset time. The sum of the financing quotas represented by the multiple second electronic certificates is greater than or equal to the target funding limit. [41] Wherein, the second electronic certificate may bc an Object Credit Certificate, and the Object Credit Certificate is an electronic certificate that integrates the project identifier and the E-commerce function and records the project information. [42] S102: the first terminal receives the fund raising request and confirms whether to respond to the fund raising request. [43] The first terminal receives the fund raising request delivered by the second terminal, and confirms whether to respond to the fund raising request according to the information 6 CA 02997631 2018-03-06 WO 2017/045160 PCT/CN2015/089766 contained in the fund raising request. [44] Further, when the second terminal delivers the fund raising request in the form of an electronic certificate, step S102 is specifically: receiving, by the first terminal, a plurality of second electronic certificates delivered by the second terminal, and confirming, according to the second electronic certificate information, whether accept at least one second electronic certificate. [45] When the first terminal confirms the response to the fund-raising request, step S102 is executed; and when the first terminal confirms not to respond to the fund- raising request, the process ends. [46] S103: the first terminal delivers a first electronic certificate to the second terminal when confirming the response to the fund-raising request. [47] When the first terminal acknowledges responding to the fund raising request delivered by the second terminal, the first terminal delivers a first electronic certificate to the second terminal. [48] The first electronic certificate is generated by the First Server according to the first terminal's request to freeze the first funds in the first user's funds account and promises to settle the payment certificate of electronic credit commitment of the first fund according to the agreed conditions. The first user is a user of the first terminal, the amount of money represented by the first electronic certificate is a first amount of money, and the First Server is an account management server of the first user. [49] Further, when the second terminal delivers the fund raising request in the form of an electronic certificate, step 8103 is specifically: the first terminal delivers the first electronic certificate to the second terminal when it is confirmed that the second terminal receives at least one second electronic certificate; wherein, the amount of investment represented by the first electronic certificate equals the sum of the financing amount represented by at least one second electronic certificate accepted by the second terminal. [50] S104: When thc sum of the funding amounts of all the first electronic certificates that are received by the second terminal within the preset time is not less than the target credit limit, notification information is delivered to the First Server. [51] For example, when the second terminal confirms that the sum of the funding amounts of all the first electronic certificates received within the preset time is greater than or equal to the target funding amount, for the successful financing of the target project, the second terminal delivers thc notification message to First Server, which is received by the First electronic certificate. [52] Further, when the second terminal confirms that the sum of the funds of all the first 7 CA 02997631 2018-03-06 WO 2017/045160 PCT/CN2015/089766 electronic certificates received within the preset time is less than the target amount of money, the fund-raising for the target item fails. The second terminal delivers an instruction to raise funds to the First Server corresponding to the received first electronic certificate, and delivers the received first electronic certificate to the corresponding First Server. [53] When the First Server receives the instruction of the fund raising failure delivered by the second terminal and the first electronic certificate, in response to the instruction of the fund raising failure, the First Server releases all the received first electronic certificates to deliver the first electronic certificate. The funds are returned to the funds account of the first terminal. [54] S105: In response to the notification information, the First Server transfers the funds represented by the first electronic certificate to the funds account of the second user. [55] Upon receiving the notification information delivered by the second terminal, the First Server releases the funds represented by the first electronic certificate in response to the notification message and transfers the unfrozen funds from the first user's funds account to thc second user's funds account. The second user is the uscr of the second terminal. [56] Wherein, First Server may directly transfer the unfrozen funds to the second user's funds account, or may allocate the unfrozen funds to thc second terminal's funds account by other means, which is not limited herein. [57] Further, the step of the First Server, in response to the notification information, allocating the fund represented by the first electronic certificate to the fund account of the second user specifically includes: [58] In response to the notification message, First Server allocates the funds represented by the first electronic certificate to the funds account of Third Server. After Server allocates the funds represented by the first electronic certificate to thc funds account of Third Server, notify Third Server to transfcr funds not less than the target funds amount to the second user's funds account so that the second terminal can use the funds raised to start the target project. [59] In the solution above, the first terminal confirms that it is responding to the fund raising request delivered by the second terminal, it delivers the first electronic certificate to the second terminal and all the first electronic certificates received by the second terminal within the preset time when the total amount of funds is not less than the target amount of funds, First Server delivers the notification information, and First Server responds to the notification information and allocates the funds represented by the first electronic certificate to the funds account of the second user. In the above way, the second user can 8 CA 02997631 2018-03-06 WO 2017/045160 PCT/CN2015/089766 obtain the funds represented by the electronic certificate when the second terminal finishes the fund-raising in the form of electronic certificate during the fund-raising process and can raise the security of network fund-raising, and the funds represented by the first electronic certificate during the funding period can also generate interest rates and increase the profits of the first user. [60] Please refer to Figure 2, Figure 2 is a schematic flowchart of an online financing method according to an example of the present invention. The executive body in this example is a second terminal. The online financing method of this example includes the following steps: [61] S201: the second terminal delivers a fund raising request of the target item to the first terminal. [62] When the second terminal needs to initiate fund-raising for the target projcct, the second terminal delivers the fund-raising request to the plurality of first terminals. [63] Wherein, the funding request includes at least the target project information, the target amount of funds and the default time. The information of the target project is the information of the project that needs to be raised, and the target fund is the fund needed to start or finish the target project. The preset time is the funding period. [64] Further, the target project information may also include the way of reporting, that is, the way of reporting the object of financing to the object of financing after the target project is started or completed, the way of reporting may be cash or non-cash, for example, shares, bonuses, membership privileges, etc., which is not limited herein. [65] It can be understood that the fund-raising request may be delivered by the second terminal directly to the first terminal that meets the requirement, or it may be that thc second terminal delivers the fund-raising request to the electricity supplier platform, and the electricity supplier platform screens the first terminal, and delivers the funding request to the first terminal that meets thc requirement, which is not limited herein. The E-commerce platform is a server with integrated E-commerce capabilities. The E-commerce platform can be integrated with First Server or with two independent servers. [66] It is understandable that, in this example, the fund raising request may be delivered in the form of information and webpage links, and may also be delivered in the form of an electronic certificate, which is not limited herein. [67] Further, when the second terminal delivers the fund raising request in the form of an electronic certificate, step S201 is specifically: [68] The second terminal generates a plurality of second electronic certificates according to the fund raising request information of the target item, and delivers the plurality of second electronic certificates to the Second Server; and the Second Server delivers the received 9 CA 02997631 2018-03-06 WO 2017/045160 PCT/CN2015/089766 multiple second electronic certificates to the multiple first terminals. [69] Wherein, the second electronic certificate at least includes the amount of funds represented by the second electronic certificate, the target item information, the target amount of funds and the preset time. The sum of thc financing quotas represented by the multiple second electronic certificates is greater than or equal to the target funding limit. The second electronic certificate may be an Object Credit Certificate, and the Object Credit Certificate is an electronic certificate that integrates the project identifier and the E- commerce function and records the project information. [70] S202: the second terminal receives the first electronic certificate that is delivered by the first terminal when confirming the responsc to the fund-raising request. [71] Wherein, the first electronic certificate is delivered by thc first terminal to the second terminal when the first terminal confirms the response to the fund raising request delivered by the second terminal, and the request for fund raising includes at least the target item information, the target amount of money and the preset time. The information of the target projcct is the information of the project that needs to be raised, and the target fund is the fund needed to start or finish the target project. The preset time is the funding period. [72] The first electronic certificate is generated by the First Server according to the first terminal's request to freeze the first funds in the first user's funds account and promises to settle the payment certificate of electronic credit commitment of the first fund according to the agreed conditions. The first user is a user of the first terminal, the amount of money represented by the first electronic certificate is a first amount of money, and the First Server is an account management server of the first user. [73] When the second terminal delivers thc fund raising request in the form of an electronic certificate, step S202 is specifically: receiving, by the second terminal, a first electronic certificate that is delivered when the first terminal confirms accepting the at least one second electronic certificate. [74] Wherein, the second electronic certificate is generated by the second terminal according to the target item information, and there are multiple second electronic certificates. [75] The amount of money frozen on behalf of the first electronic certificate equals the sum of the financing amount represented by the second electronic certificate accepted by the first terminal. [76] S203: When the sum of the funding amounts of all the first electronic certificates that arc received by the second terminal within the preset time is not less than the target credit limit, notification information is delivered to the First Server. [77] For example, when the second terminal confirms that the sum of the funding amounts of all CA 02997631 2018-03-06 WO 2017/045160 PCT/CN2015/089766 the first electronic certificates received within the preset time is greater than or equal to the target funding amount, for the successful financing of the target project, the second terminal delivers the notification message to First Server, which is received by the First electronic certificate, so that to notify First Server to unfreeze the funds represented by the First electronic certificate and transfer the unfrozen funds to the second user's funds account so that the second user can use the funds raised to start the target project. The second user is a second terminal user. [78] Wherein, First Server may directly transfer the unfrozen funds to the second terminal's funds account, or may allocate the unfrozen funds to the second terminal's funds account by other means, which is not limited herein. [79] Further, when the second terminal confirms that the sum of the funds of all the first electronic certificates received within the preset time is less than the target amount of money, the fund-raising for the target item fails. [80] For example, when the second terminal confirms that the funds of all the first electronic certificates received within thc preset time is less than the target amount of money, the fund-raising for the target item fails. The sccond terminal delivers an instruction for fund raising failure to thc received First Server corresponding to the first electronic certificate and delivers the received first electronic certificate to the corresponding First Server so that the First Server receives the instruction of the fund raising failure and the first electronic certificate, in response to the instruction of the funding failure, unfreezing all the received first electronic certificates to return the funds represented by the first electronic certificate to the second user's funds account. [81] In the solution above, the second terminal delivers financing information to the multiple first terminals, and receives the first electronic certificate that is delivered by the first terminal when confirming the response to the fund-raising request. The second terminal receives all when the sum of the funds of the first electronic certificate is greater than or equal to the target amount of funds, the first electronic certificate delivers notification information to First Server. The notification information is used to notify the First Server to allocate the funds represented by the first electronic certificate to the second terminal's funds account. In the above way, the second user can obtain the funds represented by the electronic certificate when the second terminal finishes the fund-raising in the form of electronic certificate during the fund-raising process and can raise the security of network fund-raising, and the funds represented by the first electronic certificate during the funding period can also generate interest rates and increase the profits of the first user. [82] Please refer to Figure 3, Figure 3 is a schematic flowchart of an online financing method 11 CA 02997631 2018-03-06 WO 2017/045160 PCT/CN2015/089766 according to another example of the present invention. The executive body in this example is a first terminal. The online financing method of this example includes the following steps: [83] S301: the first terminal receives a fund raising request delivered by a second terminal. [84] The first terminal receives a fund raising request initiated by the second terminal for the target item. Wherein, the funding request includes at least the target project information, the target amount of funds and the default time. The information of the target project is the information of the project that needs to be raised, and the target fund is the fund needed to start or finish thc target project. The preset timc is the funding period. [85] Further, the target project information may also include the way of reporting, that is, the way of reporting the object of financing to the object of financing after the target project is started or completed, the way of reporting may be cash or non-cash, for example, shares, bonuses, membership privileges, etc., which is not limited herein. [86] It can be understood that the fund-raising request may be delivered by the second terminal directly to the first terminal that meets the requirement, or it may be that the second terminal delivers the fund-raising request to the electricity supplier platform, and the electricity supplier platform screens the first terminal, and delivers the funding request to the first terminal that meets the requirement, which is not limited herein. The E-commerce platform is a server with integrated E-commerce capabilities. The E-commerce platform can be integrated with First Server or with two independent servers. [87] It is understandable that, in this example, the fund raising request may be delivered in the form of information and wcbpage links, and may also be delivered in the form of an electronic certificate, which is not limited herein. [88] Further, when the second terminal delivers the fund raising request in thc form of an electronic certificate, step S301 is specifically: [89] The first terminal receives multiple second electronic certificates that are delivered by the second terminal through the Second Server. [90] Wherein, the plurality of second electronic ccrtificates arc generated by the second terminal according to the fund raising request information of the target item. The second electronic certificate at least includes the amount of funds represented by the second electronic certificate, the target item information, thc target amount of funds, and the preset time. The sum of the financing quotas represented by thc multiple second electronic certificates is greater than or equal to thc target funding limit. The second electronic certificate may be an Object Credit Certificate, and the Object Credit Certificate is an electronic certificate that integrates the project identifier and the E- commerce function and 12 CA 02997631 2018-03-06 WO 2017/045160 PCT/CN2015/089766 records the project information. [91] S302: the first terminal delivers a first electronic certificate to the second terminal when confirming the response to the fund-raising request. [92] When receiving the fund raising request delivered by the second terminal, the first terminal confirms whether to respond to the fund raising request and delivers a first electronic certificate to the second terminal when confirming the response to the fund raising request delivered by the second terminal. [93] Wherein, the first electronic certificate is generated by the First Server freezing the first fund in the fund account of the first user according to the request of the first terminal, and promises to settle the payment certificate of electronic credit commitment of the first fund according to the agreed conditions. The first user is a user of the first terminal, the amount of money represented by the first electronic certificate is a first amount of money, and the First Server is an account management server of the first user. [94] Further, step 302 is specifically: delivering, by the first terminal, a request for generating the first electronic certificate to the First Server in response to determining that the fund raising request is delivered in response to the second terminal; wherein the request is at least Includes information of a first fund to be frozen; and when receiving the first electronic certificate delivered by the First Server, the first terminal delivers the first electronic certificate to the second terminal. [95] Further, when thc second terminal delivers the fund raising request in the form of an electronic certificate, step S302 is specifically: the first terminal delivers the first electronic certificate to the second terminal when it is confirmed that the second terminal receives at least one second electronic certificate; wherein, the amount of investment represented by the first electronic certificate equals the sum of the financing amount represented by at least one second electronic certificate accepted by the second terminal. [96] In the solution above, when confirming that the second terminal responds to the fund raising request delivered by the first terminal, the second terminal delivers the first electronic certificate to the first terminal. In the above way, the second user can obtain the funds represented by the electronic certificate when the second terminal finishes the fund-raising in the form of electronic certificate during the fund-raising process and can raise the security of network fund-raising, and thc funds represented by the first electronic certificate during the funding period can also generate interest rates and increase the profits of the second user. [97] Please refer to Figure 4, Figure 4 is a schematic flow chart of third example of a data interaction processing method according to the present invention. The data interaction 13 CA 02997631 2018-03-06 WO 2017/045160 PCT/CN2015/089766 processing method in this example includes the following steps: [98] S401: the second terminal delivers the interactive request for acquiring the target data to the multiple first terminals. [99] When the second terminal needs to acquire the target data, the second terminal delivers an interactive request for acquiring the target data to the multiple first terminals. The interactive request includes at least the data value of the target data and the preset time. [100] It is understandable that the interactive request may be delivered in the form of information, but is not limited thereto, and may also be delivered in the form of data certificate, which is not limited herein. [101] When the interactive request is delivered in the form of data certificate, step S401 is specifically: [102] The second terminal generates a plurality of second data certificates according to the interactive request of the target data, and delivers the plurality of second data certificates to the Second Server, and the Second Server delivers the received second data certificates to the plurality of first 'terminal. [103] Wherein, the second data certificate at least includes the data represented by the second data certificate, the data value of the target data, and the preset time, and the sum of the data values of the data represented by the multiple second data certificates is greater than or equal to the sum of the data values of the target data. The second data certificate rcpresents that the data is the first data of the target data. [104] S402: the first terminal receives the interactive request, and confirms whether to respond to the interactive request. [105] When receiving the interactive request delivered by the second terminal, the first terminal confirms whether to respond to the interactive request. Further, when the interactive request is delivered in the form of data certificate, step S402 is specifically: receiving, by the first terminal, a plurality of second data certificates delivered by the second terminal, and confirming to accept at least one second data certificate according to the second data certificate information. [106] When responding to the interactive request, step S403 is executed; and when the interactive request is not responded, the procedure ends. Step 107: the first terminal delivers a first data certificate to the second terminal when responding to the interactive request delivered by the second terminal. [108] The first data certificate is generated by the First Server by locking the first data in the first terminal according to the request of the first terminal. [109] Furthcr, when the interactive request is delivered in the form of data certificate, step S403 14 CA 02997631 2018-03-06 WO 2017/045160 PCT/CN2015/089766 is specifically: the first terminal delivers the first data certificate to the second terminal when confirming the acceptance of at least one second data certificate. [110] The size of the data value of the locked data represented by the first data certificate is equal to the sum of the data values of the data represented by the second data certificate accepted by the first terminal. [111] S404: When the total size of the data values represented by all the first data certificates that are received by the second terminal within the preset time is not smaller than the data value size of the target data, delivers notification information to the First Server. [112] For example, when the second terminal confirms that the sum of the sizes of the data valuesrepresented by all the first data certificates received within the preset time is greater than or equal to the size of the data value of the target data, the received second data certificate corresponding First Server, and delivers a notification to the First Server that the target data exchange was successful. The notification information includes at least thc first data certificate information. [113] Further, when the second terminal confirms that the sum of the sizes of the data values represented by all the first data certificates that are received within the preset time is less than the data value size of the target data, thc method further includes: the second terminal delivers an instruction to the First Server to cxchange failed target data, where an instruction for failing to interact is used to notify the First Server to unlock all the first data certificates. [114] For example, when the second terminal confirms that the sum of the data value sizes represented by all the first data certificates received within the preset time is smaller than thc data value size of the target data included in the interactive request, the acquiring, by the second terminal, the received first data server corresponding to the first data certificate delivers an instruction that the target data exchange fails, and delivers the received first data certificate to thc corresponding First Server. [115] When the First Server receives the instruction of the interaction failure and the first data certificate delivered by the second tenninal, the First Server unlocks the received first data certificate and responds to the instruction of the interaction failure, and the data represented by the first data certificate is added to the first terminal. [116] S405: In response to the notification information, the First Server adds data with the same size as the data value of the data represented by the first data certificate to the second terminal. [1 17] When receiving the notification information delivered by the second terminal, the First Server unlocks the data of the same size as the data value of the data represented by the CA 02997631 2018-03-06 WO 2017/045160 PCT/CN2015/089766 first data certificate in response to the notification message, and adds the unlocked data to the second terminal. [118] Wherein, the First Server may directly add the unlocked data to the second terminal, or may add the unlock data to the second terminal by other means, which is not limited herein. [119] The data interaction processing method in the example of the present invention is described below by way of example. [120] For example, the first terminal is User B, the second terminal is user C, and the first terminal is multiple, that is, Bl, B2, Bn. User B is an administrator for more than one client and has a corresponding password for each client for administrator privileges. Clients can bc personal computers, tablets, smart phones and other devices that can exchange data with servers through the network. The user C initiates an interactive request that needs target data to the User B. The target data includes first data, second data,..., N th data, and the first data is a password for requesting administrator rights of one of the clients, and the second data is a password for requesting management rights of another client. In other words, the user C requests the User B I the password of the administrator's authority of the Client 2 and the password of the administrator's authority of the Client 3 to the User B2. [121] When the User B determines that the interactive request for acquiring the target data delivered by the user C is to be responded to, the User B issues a data certificate to the user C through the First Server and delivers the data certificate to the user C. The user C may set a preset time for requesting the User B to respond to the interactive request. For example, user C sets that User B needs to deliver the administrator rights of clients 2 and 3 to User B within a month. [122] Wherein, User B's administrator password is saved in the First Service Party, and for each client, the corresponding administrator privileges have different levels of importance. For example, Client I is a corporate server, Client 2 is a tablet, and Client 3 is a personal computer. Therefore, you need to set the highest level of administrator privileges for Client 1, the most important level for administrator permissions for Client 3, and secondly, the importance level for Client 2's administrator permissions. [123] When User B1 agrees to give the Client 2's administrator authority to user C, the corresponding data certificate is provided to First Server. The data certificate may be an operation log when thc User B I manages the Client 2, so as to prove the security and reliability of the User Bl. [124] When User B2 agrees to give the Client 3's administrator authority to user C, the 16 CA 02997631 2018-03-06 WO 2017/045160 PCT/CN2015/089766 corresponding data certificate is provided to First Server. The data certificate may be an operation log when the User B2 manages the Client 3, so as to prove the security and reliability of the User B2. [125] When the user C receives the data certificate submitted by the User B1, the user C blocks the administrator right of the User B1 on the Client 2 according to the content of the data certificate submitted by B1, that is, the User B I cannot use the corresponding password to decrypt the Client 2 to manage. When the First Server receives the data certificate submitted by the User B2, the First Server 2 blocks the administrator rights of the Client 3 to the Client 3 according to the content of the data certificate submitted by the B2, that is, the user B2 cannot manage the Client 3 by using the corrcsponding password. [126] When the user C confirms that only the data certificate issued by the User B1 or the User B2 is acquired within the preset time, the target data fails to be obtained. User C notifies First Server to return the data certificate delivered by B1 to User B1 to return the password of Client 2's administrator right and thc data certificate returned by B2 to User B2 to return the password of Client 3's administrator. [127] When the user C confirms that both the data certificates issued by the users B1 and B2 are obtained within the preset time, the user C delivers an instruction to the First Server to obtain the target data to notify the First Server to acquire the Client 2 and the Client 3 and delivers the password of the administrator authority of the Client 2 and the Client 3 to the user C and opens the authority of the first data in the Client 2 for the user C and the password of the second user in the open Client 3 data permissions. [128] In the above, when the User B (data provider) receives a request from the user C (data requesting party) for obtaining the administrator authority password of the Client 2 or 3, the First Server confirms whether it is the uscr C according to the instruction delivered by the user C open Client 2, 3 administrator privileges. On the one hand, User B1 and B2 give administrators authority to the process of user C. Risk management is controlled through First Server. User data and certificate of B1 and B2 are guaranteed as guarantee, so that administrators' rights will not be transferred arbitrarily. On the other hand, when the First Server confirms that the user C successfully acquires the target data within the preset time, the administrator delivers the administrator authority of the Client 2 or 3 storing the target data to the user C; and when the target data is failed to be acquired, the First Server returns Users B1 and B2 have their own administrator rights on their respective clients so as to ensure that there is only one administrator's authority on the clients so as not to cause confusion in the client's data management and avoid the risk of client data sccurity. [129] Further, the requested data may also be text data, audio data, video data, program data or 17 CA 02997631 2018-03-06 WO 2017/045160 PCT/CN2015/089766 financial data in the financial field, etc. In the case of financial data, such as funds, the User B is now connected to the user, the user C is the sponsor of funding, the server is Funds-Management server, for example, bank. If it is audio data, such as a song, the data requester and the data initiator may be clients with multimedia playing functions such as mobile phones, and the server is a music website server. [130] In the above solution, when responding to the interactive request delivered by the second terminal, the first terminal delivers a first data certificate to the second terminal; all the data represented by all the first data certificates that the second terminal receives within a preset time when the sum of the sizes is more or equal to thc size of the data value of the target data, a notification message is delivered to thc First Server to notify the First Server to add data with the same size as the data value of thc data represented by the first data certificate to the second terminal. In the foregoing manner, data is transmitted in the form of data certificate during data exchange. When the first terminal completes the data interaction according to the preset condition, the second terminal can successfully obtain the data provided by the first terminal, thereby improving data exchange security. [131] Please refer to Figure 5, Figure 5 is a schematic flowchart of another example of a data interaction processing method according to the present invention. The executive body in this example is a second terminal. The data interaction processing method in this example includes the following steps: [132] S501: the second terminal delivers the interactive request for acquiring the target data to the multiple first terminals. [133] When it is needed to acquire the target data, the second terminal delivers an interactive request for acquiring the target data to the multiple first terminals. The interactive request includes at least the data value of the target data and the preset time. [134] It is understandable that the interactive request may be delivered in the form of information, but is not limited thereto, and may also be delivered in the form of data certificate, which is not limited herein. [135] When the interactive request is delivered in the form of data certificate, step S501 is specifically as follows: [136] The second terminal generates a plurality of second data certificates according to the interactive request of the target data, and delivers the plurality of second data certificates to the Second Server, and the Second Server delivers the received second data certificates to the plurality of first 'terminal. [137] Wherein, the second data certificate at least includes the data represented by the second data certificate, the data value of the target data, and the preset time, and the sum of the 18 CA 02997631 2018-03-06 WO 2017/045160 PCT/CN2015/089766 data values of the data represented by the multiple second data certificates is greater than or equal to the sum of the data values of the target data. The data represented by the second data certificate is the first data of the target data. [138] S502: the second terminal receives the first data certificate delivered by the first terminal. [139] Wherein, the first data certificate is delivered by the first terminal to the second terminal in response to the interactive request for acquiring the target data delivered by the second terminal, where the target data includes at least the data value of the target data and the preset time, and the first A data certificate is generated for the First Server to lock the first data in the first terminal according to the request of the first terminal. [140] Further, when the interactive request is delivered in the form of data certificate, step S502 is specifically: receiving, by the second terminal, the first data certificate that is delivered by the first terminal when confirming the acceptance of the at least one second data certificate. Where the at least one second data certificate is at least one of a plurality of second data certificates that the Second Server delivers to the second terminal. [141] The size of the data value of thc locked data represented by the first data certificate is equal to the sum of the data values of the data represented by the second data certificate accepted by the first terminal. [142] S503: When the sum of the sizes of the data values represented by all the first data certificates that arc received by the second terminal within the preset time is not less than the data value size of the target data, the first terminal notifies the first server adds data with the same size as the data value of the data represented by the first data certificate to the second terminal. [143] For example, when the second terminal confirms that the sum of the sizes of the data values represented by all the first data certificates that are received within the preset time is greater than or equal to the size of the data value of the target data, the received first data certificate corresponding and delivers the First Server a notification message indicating that the target data exchange succeeds, so as to notify the First Server to add the data of the same size as the data value of the data represented by the first data certificate to the second terminal. The notification information includes at least the first data certificate information. [144] Further, when the second terminal confirms that the sum of the sizes of the data values represented by all the first data certificates that are received within the preset time is less than the data value size of the target data, the method further includes: the second terminal delivers an instruction to the First Server to exchange failed target data, where an instruction for failing to interact is used to notify the First Server to unlock all the first data certificates. 19 CA 02997631 2018-03-06 WO 2017/045160 PCT/CN2015/089766 [145] For example, when the second terminal confirms that the sum of the data value sizes represented by all the first data certificates received within the preset time is smaller than the data value size of the target data included in the interactive request, the acquiring, by the second terminal, the received first data server corresponding to the first data certificate delivers an instruction that the target data exchange fails, and delivers the received first data certificate to the corresponding First Server. [146] When the First Server receives the instruction of the interaction failure and the first data certificate delivered by the second terminal, the First Server unlocks the received first data certificate and responds to the instruction of the interaction failure, and the data represented by the first data certificate is added to the first terminal. [147] In the solution above, the second terminal receives the first data certificate delivered by the first terminal, and confirms that the sum of the sizes of the data values represented by all the first data certificates received within the preset time is not smaller than the data value of the target data to notify First Server to add the data of the same size as the data value of the data represented by the first data certificate to the second terminal. In the foregoing manner, data is transmitted in the form of data certificate during data exchange. When the first terminal completes the data interaction according to the preset condition, the second terminal can successfully obtain the data provided by the first terminal, thereby improving data exchange security. [148] Please refer to Figure 6, Figure 6 is a schematic flow chart of example of a data interaction processing method according to the present invention. The executive body in this example is a first terminal. The data interaction processing method in this example includes the following steps: [149] S601: the first terminal receives the interactive request delivered by the second terminal. [150] The first terminal receives an interactive request for acquiring targct data delivered by a second terminal, and confirms whether to respond to the interactive request. The interactive request includes at least the data value of the target data and the preset time. [151] It is understandable that the interactive request may be delivered in the form of information, but is not limited thereto, and may also be delivered in the form of data certificate, which is not limited herein. [152] When the interactive request is delivered in the form of data certificate, step S601 is specifically: receiving, by the first terminal, a plurality of second data certificates delivered by the second terminal, and confirming whether to accept at least one second data certificate according to the second data certificate information. [153] The second data certificate is generated by the second terminal according to the interactive CA 02997631 2018-03-06 WO 2017/045160 PCT/CN2015/089766 request of the target data, where the second data certificate is generated, and delivered by the Second Server to the first terminal. [154] Wherein, the second data certificate at least includes the data represented by the second data certificate, the data value of the target data, and the preset time, and the sum of thc data values of the data represented by the multiple second data certificates is greater than or equal to the sum of the data values of the target data. The data represented by the sccond data certificate is the first data of the target data. [155] When responding to the interactive request, step S602 is executed; and when the interactive request is not responded, the process ends. [156] S602: the first terminal delivers a first data certificate to the second terminal when confirming the response to the interactive request. [157] Wherein, the interactive request includes at least the data value of the target data and the preset time. The first data certificate is generated by the First Server by locking the first data in the first terminal according to the request of the first terminal. [158] Further, when the interactive request is delivered in the form of data certificate, step S602 is specifically: the first terminal delivers the first data certificate to the second terminal when confirming the acceptance of at least one second data certificate. [159] The size of the data value of the locked data represented by the first data certificate is equal to the sum of the data values of the data represented by the second data certificate accepted by the first terminal. [160] Further, the step of the first terminal delivering the first data certificate to the second terminal when confirming the response to the interactive request is specifically: [161] Thc first terminal delivers a request for generating a first data certificate to the First Server when confirming the response to the interactive request delivered by the second terminal. The request for generating the first data certificate includes at least the information of the first data to be locked. When receiving the first data certificate delivered by the First Server, the first terminal delivers the first data certificate to the second terminal. [162] In the solution above, when confirming thc response to the interactive request delivered by the second terminal, the first terminal delivers the first data certificate to the first terminal. In the foregoing manner, data is transmitted in the form of data certificate during data exchange. When the first terminal completes the data interaction according to the preset condition, the second terminal can successfully obtain the data provided by the first terminal, thereby improving data exchange security. [163] Please refer to Figure 7, Figure 7 is a schematic structural diagram of an example of a data interaction processing device according to the present invention. Each module included in 21 CA 02997631 2018-03-06 WO 2017/045160 PCT/CN2015/089766 the data interaction processing device in this example is used to execute each step in the example corresponding to Figure 5 and Figure 5. For details, reference may be made to related descriptions in the examples corresponding to Figure 5 and Figure 5, and details are not described herein again. The data interaction processing device in this example is a second terminal. The data interaction processing device in this example includes a delivering module 710, an acquisition module 720, a confirming module 730, and a notification module 740. [164] The delivering module 710 is used to deliver an interactive request for acquiring target data to a first terminal, where the interactive request includes at least a data value of the target data and a preset time. [165] The acquisition module 720 is used to receive a first data certificate delivered by a first terminal, where the first data certificatc is delivered when the first terminal confirms to respond to an interactive request delivered by a sccond terminal, where the interaction request includes at least the data value of the target data and the preset time, and the first data certificate is generated by the First Server locking the first data in the first terminal. [166] Further, the acquisition module 720 is used to receive the first data certificate delivered by the first terminal when confirming the acceptance of the at least one second data certificate, where the at least one second data certificate is delivered by the second terminal according to the target second data certificate generated by the interactive request for the data and delivered by the Second Server to the acquisition module 720. [167] The confirming module 730 is used to determine whether the sum of the sizes of the data values represented by all the first data certificates that are received by the acquisition module within the preset time is not less than the data value size of the target data. [168] The notification module 740 is used to notify the First Server to notify, when the confirmation result of thc confirmation module 730 is that the sum of the sizes of the data valuesrepresented by all the first data certificates is not smaller than the data value size of the target data. The data of the same size as the data value of the data represented by the first data certificate is added to the data interaction processing device. [169] Further, the notification module 740 is further configured to, when the confirmation module 730 determines that the sum of the data size values of all the first data certificates received within the target date is smaller than the data value size of the target data. The First Server delivers an instruction that the target data exchange fails, where the instruction of interacting fails is used to notify the First Server to unlock the first data certificate. [170] In the above solution, the data interaction processing device receives the first data certificate delivered by the first terminal and confirms that thc sum of the sizes of the data 22 CA 02997631 2018-03-06 WO 2017/045160 PCT/CN2015/089766 valuesrepresented by all the first data certificates received within the preset time is not less than the data value of the target data size, notify the First Server to add the data of the same size as the data value of thc data representcd by the first data certificate to the data interaction processing device. In the foregoing manner, data is transmitted in the form of data certificate during data exchangc. When the first terminal completes the data interaction according to the preset condition, the second terminal can successfully obtain the data provided by the first terminal, thereby improving data exchange security. [171] Please refer to Figure 8, Figure 8 is a schematic structural diagram of an example of a data interaction processing device according to the present invention. Each module included in the data interaction processing device in this example is used to execute each step in the example corresponding to Figure 6 and Figure 6. For details, reference may be made to related descriptions in the examples corresponding to Figure 6 and Figure 6, and details are not described herein again. The data interaction processing device in this example is a first terminal. The data interaction processing device in this example includes a receiving module 810 and a response module 820. [172] The receiving module 810 is used to receive an interactive request delivered by a second terminal, where the interactive request includes at least a data value of the target data and a preset time. [173] The response module 820 is used to deliver a first data certificate to the second terminal when confirming the interactive request received by the response receiving module 810, where the interactive request at least includes the data value of the target data and a preset time; the first data certificate is generated by the First Server by locking the first data in the first terminal according to the request of the first terminal. [174] In the solution above, when confirming the response to the interactive request delivered by the second terminal, the data interaction processing device delivers the first data certificate to the first terminal. In the foregoing manner, data is transmitted in the form of data certificate during data exchange. When the first terminal completes the data interaction according to the preset condition, the second terminal can successfully obtain the data provided by the first terminal, thereby improving data exchange security. [175] Please refer to Figure 9, Figurc 9 is a schematic structural diagram of an example of a data interaction processing device according to the present invention. The data interaction processing device in this example is a second terminal. The data interaction processing device in this example includes a receiver 910, a processor 920, a transmitter 930, a read-only memory 940, a random access memory 950, and a bus 960. [176] The receiver 910 is used for receiving data. 23 CA 02997631 2018-03-06 WO 201'7/045160 PCT/CN2015/089766 [1 77] The processor 920 controls the operation of the data interaction processing device. The processor 920 may also be referred to as a CPU (Central Processing Unit). The processor 920 may be an integrated circuit chip with signal processing capabilities. The processor 820 may also be a general purpose processor, a digital signal processor (DSP), an application specific integrated circuit (ASIC), a field programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components. The general purpose processor may be a microprocessor or the processor may also be any conventional processor and so on. [178] This transmitter 930 is used for transmitting data. [179] The memory may include a read only memory 940 and a random access memory 950 and provide instructions and data to the processor 920. A portion of the memory may also include non-volatile random access memory (NVRAM). [180] The various components of the data interaction processing device are coupled together by a bus 960, which may include a power bus, a control bus, a status signal bus, and so on in addition to a data bus. However, for the sake of clarity, various buses are labelled bus 960 in the figure. [181] The memory stores the following elements, executable modules or data structures, or a subset of them, or their extensions: [182] Operation Instructions: Various operation instructions are included for various operations. [183] Operating System: Includes various system programs for implementing various basic services and handling hardware-based tasks. [184] In the example of the present invention, the processor 920 performs the following operations by invoking memory-stored operation instructions (the operation instructions may be stored in the operating system): [185] The processor 920 is uscd to control thc receiver 910 receiver 810 to receive the first data certificate sent by the first terminal, where the first data certificate is delivered by the first terminal after confirming that the second terminal delivers the acknowledgement. The first data certificate is generated by the First Server according to a request of the first terminal for locking the first data in the first terminal, and the first data certificate is generated when the first data certificate is delivered by the first terminal; [186] The processor 920 is used to determine whether the sum of the sizes of the data values represented by all the first data certificates that are received by the acquisition module within the preset time is not less than the data value size of the target data. [187] The processor 920 is used to, when the confirmation result is that the sum of the sizes of the data valuesrepresented by all of the first data certificates is not smaller than the data 24 CA 02997631 2018-03-06 WO 2017/045160 PCT/CN2015/089766 value size of the target data, notify the First Server to be the same as the A data certificate data represented by the data value of the same size data to the second terminal. [188] Further, the processor 920 is used to control the receiver 910 to receive, by the receiver 810, a first data certificate that is delivered whcn the first terminal confirms to accept the at least one second data certificate. Where the at least one second data certificate is delivered by the second terminal according to the target second data certificate generated by the interactive request for the data and delivered by the Second Server to the acquisition module. [189] The processor 920 is further configured to deliver the target data to the received First Server if the sum of the data value sizes of all the first data certificates received within the target date is smaller than the data value size of the target data. Wherein the instruction failed to interact is used to notify the First Server to unlock the first data certificate. [190] ln the above solution, the data interaction processing device receives the first data certificate delivered by the first terminal and confirms that the sum of the sizes of the data valuesrepresented by all the first data certificates received within the preset time is not less than the data value of the target data size, notify the First Server to add the data of the same size as the data value of the data represented by the first data certificate to the data interaction processing device. In the foregoing manner, data is transmitted in the form of data certificate during data exchange. When the first terminal completes the data interaction according to the preset condition, the second terminal can successfully obtain the data provided by the first terminal, thereby improving data exchange security. [191] Please refer to Figure 10, Figure 10 is a schematic structural diagram of an example of a data interaction processing device according to the present invention. The data interaction processing device in this example is a first terminal. The data interaction processing device in this example includes a receiver 1010, a processor 1020, a transmitter 1030, a read-only memory 1040, a random access memory 1050, and a bus 1060. [192] The receiver 1010 is used for receiving data. [193] The processor 1020 controls the operation of the data interaction processing device. The processor 1020 may also be referred to as a CPU (Central Processing Unit). The processor 1020 may be an integrated circuit chip with signal processing capabilities. The processor 1020 may also be a general purpose processor, a digital signal processor (DSP), an application specific integrated circuit (ASIC), a field programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components. The general purpose processor may be a microprocessor or the processor may also be any conventional processor and so on. CA 02997631 2018-03-06 WO 2017/045160 PCT/CN2015/089766 [194] This transmitter 1030 is used for transmitting data. [195] The memory may include a read-only memory 1040 and a random access memory 1050 and provide instructions and data to the processor 1020. A portion of the memory may also include non-volatile random access memory (NVRAM). [196] The various components of the data interaction processing device are coupled together via a bus 1060, which may include a power bus, a control bus, a status signal bus, ctc., in addition to the data bus. However, for the sake of clarity, various buses are labelled as buses 1060 in the figure. [197] The memory stores the following elements, executable modules or data structures, or a subset of them, or their extensions: [198] Operation Instructions: Various operation instructions are included for various operations. [199] Operating System: Includes various system programs for implementing various basic services and handling hardware-based tasks. [200] In the example of thc present invention, the processor 1020 performs the following operations by invoking memory-stored operation instructions (the operation instructions may be stored in thc operating system): [201] The processor 1020 is used to control the receiver 1010 to receive an interactive request delivered by a second terminal, where the interactive request includes at least a data value of the target data and a preset time. [202] The processor 1020 is used to control the transmitter 1030 to deliver a first data certificate to the second terminal whcn confirming the response to the interactive request. The interactive request includes at least the data value of the target data and a preset time; and the first data certificate is generated by the First Server by locking the first data in the first terminal according to the request of the first terminal. [203] Further, the processor 1020 is specifically configured to control the deliverer 1030 to deliver, to the First Server, a request for generating the first data certificate when confirming the response to the interactive request, and is used to: after receiving the first Server delivers the first data certificate to the second terminal, where the request includes at least information about the first data to be locked. [204] ln the solution above, the data interaction processing device receives an interactive request delivered by a second terminal, and delivers a first data certificate to the second terminal when confirming the response to the interactive request. In the foregoing manner, data is transmitted in the form of data certificate during data exchange. When the first terminal completes the data interaction according to the preset condition, the second terminal can successfully obtain the data provided by the first terminal, thereby improving data 26 CA 02997631 2018-03-06 WO 2017/045160 PCT/CN2015/089766 exchange security. [205] In the several examples provided in the present invention, it should be understood that the disclosed system, device, and method may be implemented in other manners. For example, the device implementation described above is merely exemplary. For example, the division of the modules or units is merely logical function division and may be other division in actual implementation. For example, a plurality of units or components may be Combining or may be integrated into another system, or some of the features may be ignored or not performed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be electrical, mechanical or other forms. [206] The units described as separate components may be or may not be physically separated. The components displayed as units may or may not be physical units, that is, may be located in one place or may be distributed to multiple networks unit. Some or all of the units may be selected according to actual needs to achieve the objectives of the solution of the examples. [207] In addition, each of the functional units in the examples of the present invention may be integrated in one processing unit, or each of the units may exist alone physically, or two or more units may be integrated in one unit. The above-mentioned integrated unit can be implemented in the form of hardware or in the form of software functional unit. [208] When the integrated unit is implemented in the form of a softwarc functional unit and is sold or used as an independent commodity, the integrated unit may be stored in a computer-readable storage medium. Based on such understanding, the technical solution of the present invention essentially, or the part contributing to the prior art, or all or part of the technical solution may be embodied in the form of a software commodity stored in a storage medium Includes several instructions for causing a computer device (which may be a personal computer, a server, a network device, etc.) or a processor to execute all or part of the steps of the method according to the examples of the present invention. The foregoing storage medium includes various media capable of storing program codes, such as a USB flash disk, a removable hard disk, a read only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk. 27
Representative Drawing
A single figure which represents the drawing illustrating the invention.
Administrative Status

2024-08-01:As part of the Next Generation Patents (NGP) transition, the Canadian Patents Database (CPD) now contains a more detailed Event History, which replicates the Event Log of our new back-office solution.

Please note that "Inactive:" events refers to events no longer in use in our new back-office solution.

For a clearer understanding of the status of the application/patent presented on this page, the site Disclaimer , as well as the definitions for Patent , Event History , Maintenance Fee  and Payment History  should be consulted.

Event History

Description Date
Pre-grant 2024-06-13
Inactive: Final fee received 2024-06-13
Letter Sent 2024-05-08
Notice of Allowance is Issued 2024-05-08
Inactive: Q2 passed 2024-05-06
Inactive: Approved for allowance (AFA) 2024-05-06
Amendment Received - Response to Examiner's Requisition 2024-01-02
Amendment Received - Voluntary Amendment 2024-01-02
Examiner's Report 2023-09-06
Inactive: Report - No QC 2023-09-05
Amendment Received - Response to Examiner's Requisition 2023-08-02
Amendment Received - Voluntary Amendment 2023-08-02
Inactive: Report - No QC 2023-06-19
Examiner's Report 2023-06-19
Inactive: IPC assigned 2023-04-14
Inactive: IPC removed 2023-04-13
Inactive: First IPC assigned 2023-04-13
Inactive: IPC assigned 2023-04-13
Inactive: IPC assigned 2023-04-13
Inactive: IPC removed 2023-04-13
Inactive: IPC removed 2023-04-13
Inactive: IPC removed 2023-04-13
Inactive: IPC removed 2023-04-13
Inactive: IPC removed 2023-04-13
Inactive: IPC removed 2023-04-13
Amendment Received - Response to Examiner's Requisition 2023-03-29
Amendment Received - Voluntary Amendment 2023-03-29
Inactive: IPC from PCS 2023-01-28
Inactive: IPC from PCS 2023-01-28
Inactive: IPC from PCS 2023-01-28
Inactive: IPC from PCS 2023-01-28
Inactive: IPC from PCS 2023-01-28
Inactive: IPC from PCS 2023-01-28
Inactive: IPC from PCS 2023-01-28
Inactive: IPC expired 2023-01-01
Inactive: IPC removed 2022-12-31
Examiner's Report 2022-11-29
Inactive: Report - No QC 2022-11-25
Amendment Received - Voluntary Amendment 2022-06-23
Amendment Received - Response to Examiner's Requisition 2022-06-23
Examiner's Report 2022-02-23
Inactive: Report - No QC 2022-02-23
Amendment Received - Response to Examiner's Requisition 2021-11-08
Amendment Received - Voluntary Amendment 2021-11-08
Examiner's Report 2021-07-22
Inactive: Report - No QC 2021-07-21
Amendment Received - Response to Examiner's Requisition 2021-04-15
Amendment Received - Voluntary Amendment 2021-04-15
Examiner's Report 2021-02-17
Inactive: Report - No QC 2021-02-15
Common Representative Appointed 2020-11-07
Amendment Received - Voluntary Amendment 2020-09-23
Examiner's Report 2020-09-04
Inactive: Report - No QC 2020-09-03
Letter sent 2020-08-31
Letter Sent 2020-08-31
Advanced Examination Determined Compliant - paragraph 84(1)(a) of the Patent Rules 2020-08-31
All Requirements for Examination Determined Compliant 2020-08-27
Request for Examination Requirements Determined Compliant 2020-08-27
Inactive: Advanced examination (SO) fee processed 2020-08-27
Amendment Received - Voluntary Amendment 2020-08-27
Request for Examination Received 2020-08-27
Inactive: Advanced examination (SO) 2020-08-27
Common Representative Appointed 2019-10-30
Common Representative Appointed 2019-10-30
Change of Address or Method of Correspondence Request Received 2019-01-31
Revocation of Agent Request 2018-10-15
Appointment of Agent Request 2018-10-15
Change of Address or Method of Correspondence Request Received 2018-10-15
Revocation of Agent Requirements Determined Compliant 2018-10-15
Appointment of Agent Requirements Determined Compliant 2018-10-15
Change of Address or Method of Correspondence Request Received 2018-07-12
Inactive: Cover page published 2018-04-17
Inactive: Notice - National entry - No RFE 2018-03-21
Application Received - PCT 2018-03-19
Letter Sent 2018-03-19
Inactive: IPC assigned 2018-03-19
Inactive: First IPC assigned 2018-03-19
National Entry Requirements Determined Compliant 2018-03-06
Application Published (Open to Public Inspection) 2017-03-23

Abandonment History

There is no abandonment history.

Maintenance Fee

The last payment was received on 2023-12-15

Note : If the full payment has not been received on or before the date indicated, a further fee may be required which may be one of the following

  • the reinstatement fee;
  • the late payment fee; or
  • additional fee to reverse deemed expiry.

Patent fees are adjusted on the 1st of January every year. The amounts above are the current amounts if received by December 31 of the current year.
Please refer to the CIPO Patent Fees web page to see all current fee amounts.

Fee History

Fee Type Anniversary Year Due Date Paid Date
Registration of a document 2018-03-06
Basic national fee - standard 2018-03-06
MF (application, 2nd anniv.) - standard 02 2017-09-18 2018-03-06
MF (application, 3rd anniv.) - standard 03 2018-09-17 2018-08-14
MF (application, 4th anniv.) - standard 04 2019-09-16 2019-01-11
MF (application, 5th anniv.) - standard 05 2020-09-16 2020-01-08
Request for examination - standard 2020-09-16 2020-08-27
Advanced Examination 2020-08-27 2020-08-27
MF (application, 6th anniv.) - standard 06 2021-09-16 2021-06-25
MF (application, 7th anniv.) - standard 07 2022-09-16 2022-06-22
MF (application, 8th anniv.) - standard 08 2023-09-18 2023-06-14
MF (application, 9th anniv.) - standard 09 2024-09-16 2023-12-15
Final fee - standard 2024-06-13
Owners on Record

Note: Records showing the ownership history in alphabetical order.

Current Owners on Record
10353744 CANADA LTD.
Past Owners on Record
YI ZHANG
Past Owners that do not appear in the "Owners on Record" listing will appear in other documentation within the application.
Documents

To view selected files, please enter reCAPTCHA code :



To view images, click a link in the Document Description column. To download the documents, select one or more checkboxes in the first column and then click the "Download Selected in PDF format (Zip Archive)" or the "Download Selected as Single PDF" button.

List of published and non-published patent-specific documents on the CPD .

If you have any difficulty accessing content, you can call the Client Service Centre at 1-866-997-1936 or send them an e-mail at CIPO Client Service Centre.


Document
Description 
Date
(yyyy-mm-dd) 
Number of pages   Size of Image (KB) 
Representative drawing 2024-08-11 1 158
Representative drawing 2024-07-02 1 11
Claims 2024-01-01 5 206
Claims 2023-08-01 5 206
Description 2018-03-05 27 1,478
Claims 2018-03-05 7 303
Abstract 2018-03-05 1 92
Drawings 2018-03-05 4 82
Representative drawing 2018-04-16 1 24
Description 2020-08-26 27 1,515
Claims 2020-08-26 13 467
Claims 2020-09-22 6 202
Claims 2021-04-14 6 214
Claims 2021-11-07 6 215
Claims 2022-06-22 9 479
Claims 2023-03-28 6 201
Final fee 2024-06-12 3 63
Amendment / response to report 2024-01-01 23 898
Commissioner's Notice - Application Found Allowable 2024-05-07 1 581
Courtesy - Certificate of registration (related document(s)) 2018-03-18 1 106
Notice of National Entry 2018-03-20 1 195
Courtesy - Acknowledgement of Request for Examination 2020-08-30 1 432
Examiner requisition 2023-06-18 4 238
Amendment / response to report 2023-08-01 19 766
Examiner requisition 2023-09-05 8 443
National entry request 2018-03-05 9 352
Patent cooperation treaty (PCT) 2018-03-05 1 59
International search report 2018-03-05 2 65
Advanced examination (SO) / Request for examination / Amendment / response to report 2020-08-26 20 720
Courtesy - Advanced Examination Request - Compliant (SO) 2020-08-30 1 164
Examiner requisition 2020-09-03 4 227
Amendment / response to report 2020-09-22 11 361
Examiner requisition 2021-02-16 6 305
Amendment / response to report 2021-04-14 23 888
Examiner requisition 2021-07-21 6 342
Amendment / response to report 2021-11-07 24 971
Examiner requisition 2022-02-22 9 566
Amendment / response to report 2022-06-22 35 2,010
Examiner requisition 2022-11-28 4 238
Amendment / response to report 2023-03-28 25 855