Note: Descriptions are shown in the official language in which they were submitted.
Title: Data Exchange Processing Method, Apparatus, And System
[1] [Technical Field]
[2] The present invention relates to the field of Internet data interaction
technology, and in
particular, to a data interaction processing method, device, and system.
[3] [Background Technology]
[4] With the development of Internet technology and especially mobile Internet
technology,
users can connect to the Internet through mobile devices using 2G, 3G, 4G or
WiFi to
conduct transactions and social activities. Users can conveniently and
effectively perform
online activities, this is an incomparable experience with offline.
[5] However, when the user performs payment transactions, social networking
and other
activities on mobile devices via the Internet, each transaction is generally
transferred
between two parties eventually, even though involvement of multiple parties.
In this way,
the transaction method is not applied for multiple parties, and it is also
limited for lack of
the circulation of transaction information or the commodity for multiple
parties. For
example, in the case of fund-raising, once investment is made, the funds
invested with the
fund cannot be circulated even if the time limit set for the fund-raising
project has not
expired, which not only brings economic losses to the investors, but also
gives the investors
a lot of economic risk.
[6] [Summary of the Invention]
[7] An object of examples of the present invention is to provide a data
interaction processing
method, device, and system capable of transmitting data in the form of an
electronic
certificate during data interaction, thereby enriching data exchange modes. In
addition, a
data certificate to increase the flow of data records, but also improve the
security of data
exchange network.
[8] In order to solve the above technical problem, the first technical
solution adopted in the
examples of the present invention is: providing a data interaction processing
method,
including: First Participant receives a request for obtaining at least one
first data certificate
of the First Participant; in response to the request, adds identity
information of a Second
Participant to the first data certificate; and delivers a first data
certificate.
[9] In order to solve the above technical problem, a second technical solution
adopted by the
present invention is to provide a data interaction processing method,
comprising: deliver a
request to obtain at least one First data certificate for the First
Participant; the first data
1
Date Recue/Date Received 2023-06-19
certificate that receives the identity identification information with the
Second Participant.
[10] In order to solve the above technical problem, a third technical
solution adopted by the
present invention is to provide a data interaction processing method, where
the method
includes: delivering, by a Second Participant, to a First Participant within a
preset period,
acquiring at least one of the First Participants; the First Participant adds
the identity
infolination of the Second Participant to the first data certificate in
response to the request;
and the First Participant delivers the first data certificate corresponding to
the request to the
Second Participant.
[11] In order to solve the above technical problem, a fourth technical
solution adopted by the
present invention is that: a terminal is provided, where the terminal includes
a receiving
module, a receiving module, and a delivering module. The receiving module is
used to
receive requests for at least one first data certificate for the terminal. The
response module
is used to respond to the request and add the identity information of the
Second Participant
to the first data certificate; the delivering module is used to deliver the
first data certificate
corresponding to the request.
[12] In order to solve the above technical problem, a fifth technical
solution adopted by the
present invention is to provide a data interaction processing system,
comprising: a first
terminal and a second terminal, wherein the second terminal is used to:
delivering, by the
first terminal, a request for obtaining at least one first data certificate of
the first terminal;
the first terminal is used to: add the second Participant's identity
information to the first
data certificate in response to the request; the first terminal is further
configured to deliver
a first data certificate corresponding to the request to the second terminal.
[13] Different from the existing technology, after receiving a request for
acquiring at least one
first data certificate delivered by a second participant within a preset time
limit, the first
participant in this implementation mode adds identity infolination of the
first terminal into
the first data certificate, and delivers the first data certificate with the
identity information
of the second participant to respond the request. In this way, not only can it
transmit data in
the form of first data certificate in the process of data interaction, enrich
the way of data
interaction, but also increase the security of network data interaction by
recording data
information during a data flow.
[14] [Brief Description]
[15] Figure 1 is a schematic structural diagram of a data interaction
processing system in an
example of the present invention;
[16] Figure 2 is a schematic flow chart of a data interaction processing
method in example one
of the present invention;
2
Date Recue/Date Received 2021-12-24
[17] Figure 3 is a schematic flow chart of a data interaction processing
method in a another
example of the present invention;
[18] Figure 4 is a schematic flow chart of a data interaction processing
method and example of
the present invention;
[19] Figure 5 is a schematic flow chart of an example of a terminal
according to the present
invention;
[20] Figure 6 is a schematic flow chart of an example of a terminal device
according to the
present invention.
[21] [Description of the Preferred Examples]
[22] In the following description, in order to illustrate, not to qualify,
specific details such as
specific system structure, interfaces, and technology are presented to make a
thorough
understanding of this invention. However, technical personnel in this field
should be aware
that this invention can be implemented in other implementation ways without
these specific
details. In other instances, omit the detailed instructions on the well-known
devices,
circuits, and methods to avoid unnecessary details that prevent the
description of the
invention.
[23] Please refer to Figure 1 it is a schematic structural diagram of a
data interaction processing
system in an example of the present invention. The data interaction processing
system
includes a first terminal 101, a second terminal 102, a first terminal 101 and
a second
terminal 102 that can communicate with each other. Wherein, the first terminal
101 and the
second terminal 102 are at least one device of a smart phone, a tablet PC, or
a PC. In other
examples, it can also be used for other communication equipment, and do not
limited here.
[24] The second terminal 102 is used to send a request to the first
terminal 101 to obtain the first
data certificate when the first data certificate stored in the first terminal
101 is obtained
from the first terminal 101. The first data certificate is an electronic
certificate having an
identification code and an interactive interface, and records data
information, where the
interactive interface includes an interface for editing holder information,
and the data
information includes data value information. Specifically, the first data
certificate is used to
prove the electronic certificate of the obligation to pay after completing the
data foundation
interaction.
[25] The first terminal 101 receives and responds to the request and adds
the identity
information of the second terminal 102 to the first data certificate selected
by the second
terminal 102. Specifically, the second terminal 102 changes the identity
information of the
first terminal 101 recorded in the first data certificate to the peripheral
identity information
of the second terminal 102, or adds the first data 101 to the first data
certificate, adds the
3
Date Recue/Date Received 2021-12-24
first data certificate transfer record transferred to the second terminal 102.
The first
terminal 101 delivers the first data certificate to the second terminal 102.
In other
examples, the first terminal 101 may also authorize the second terminal 102 or
a third party
to add the identity information of the second terminal 102, which is not
limited herein.
[26] Please refer to Figure 2, Figure 2 is a schematic flow chart of third
example of a data
interaction processing method according to the present invention. The data
interaction
processing method in this example may be applied to the system shown in Figure
1.
Specifically, the First Participant in this example is executed by the first
terminal 101
shown in Figure 1 and includes the following steps. 201: The First Participant
receives a
request for obtaining at least one first data certificate for the First
Participant.
[27] Wherein, the first data certificate records the amount of funds
subscribed.
[28] Specifically, in order to obtain the funds to be raised corresponding
to the fund-raising
project, Third Participant generates or generates multiple first data
certificates according to
the fund to be raised or through the server and issues the multiple first data
certificates
through the network. Each first data certificate records the amount of funds
subscribed and
subscription shares. The amount of funds raised for the financing items and
the preset
deadline, the amount of funds subscribed recorded in each first data
certificate may or may
not be equal, and each first data certificate contains a unique identification
code. The sum
of the amount of subscribed funds recorded in the first data certificate is
the same as the
amount of funds raised by the fund.
[29] Wherein, the information of fund-raising project includes project
attributes, keywords and
corresponding image information, which is not limited herein. The first data
certificate is
an electronic certificate having an identification code and an interactive
interface and
capable of recording data information. The interactive interface includes an
interface for
editing the holder infomiation for verifying that the target data basic
interaction is
completed and the post-payment to the obligation of electronic certificate.
Wherein, the
basic interaction includes commodity information, logistics information,
insurance
information and trading rules and other information. In addition, the basic
exchange can
also be funds flow information.
[30] The First Participant obtains at least one of the first data
certificates. Specifically, the First
Participant selects at least one first data certificate from the plurality of
first data
certificates produced and distributed by the Third Participant, and transfers
to the
designated account of the Third Participant an amount equal to the amount of
funds
recorded by the first data certificate funds.
[31] Then, the Third Participant or First Participant authorized by the
Third Participant adds
4
Date Recue/Date Received 2021-12-24
the identity information of the First Participant into the First data
certificate. Specifically,
since there are multiple first data certificates, and the data values of the
first data
certificates are not completely the same, the number of First Participants
that receive the
first data certificate may also be multiple. The first data certificate
selected adds
information about the identity of the First Participant receiving the first
data certificate. In
other examples, the Third Participant may also authorize the First Participant
or the third
party to add the identifier of the First Participant that obtains the first
data certificate to the
first data certificate.
[32] In another example, the First Participant may also pay through a third
data certificate, and
the third data certificate records the amount of money equal to the quota of
the first data
certificate obtained by the First Participant. Specifically, the First Server
corresponding to
the First Participant blocks funds in the designated account of the First
Participant equal to
the amount of the second data certificate, generates a third data certificate,
and delivers the
third data certificate to the Third Server corresponding to the Third
Participant. First Server
is First Participant's bank Funds-Management server, and Third Server is Third
Participant's bank Funds-Management server.
[33] When the Second Participant needs to obtain at least one data
certificate owned by the First
Participant, the Second Participant delivers a request to the First
Participant for at least one
data certificate within a preset period of time.
[34] Correspondingly, the First Participant receives the request for
obtaining at least one first
data certificate of the First Participant.
[35] 202: In response to the request, add an identifier of Second
Participant to the first data
certificate.
[36] The First Participant receives the request delivered by the Second
Participant and adds the
identity information of the Second Participant to the first data certificate
when it is
determined that the request is responded to. Specifically, the identity
information of the
First Participant recorded in the first data certificate is modified as the
identity infonnation
of the Second Participant. In another implementation manner, the identity
information of
the First Participant recorded in the first data certificate is modified as
the identity
information of the Second Participant.
[37] 203: Deliver a first data certificate corresponding to the request.
[38] In other examples, the First Participant may also deliver the first
data certificate to the
Second Participant, authorize the Second Participant or a third party to add
the identifier of
the Second Participant to the first data certificate, and do not limited here.
[39] Upon receipt of the first data certificate, the Second Participant
delivers a pre-defined
Date Recue/Date Received 2021-12-24
amount of funds to the designated account of First Participant.
[40] In another example, the Second Participant may also pay via the second
data certificate.
The amount of money represented by the second data certificate is preset by
First
Participant and Second Participant. Specifically, the Second Server
corresponding to the
Second Participant blocks funds in the designated account of the Second
Participant equal
to the quota recorded in the second data certificate, generates a second data
certificate, and
delivers the second data certificate to the First Participant corresponding to
First Server.
Wherein, Second Server is Second Participant's bank Funds-Management server.
[41] When the First Participant pays the Third Participant with the third
data certificate and the
Second Participant pays the First Participant with the second data
certificate, if the
subscription money acquired by the Third Participant is not reached when the
preset term
expires. The First Server corresponding to the First Participant pays the
third data
certificate and transfers the third data certificate from the designated
account of the First
Participant to the designated account of the third participant recorded by the
Second
Participant; the Second Server corresponds to Second Server to pay for the
second data
certificate, and to transfer the amount of funds from the specified account of
the Second
Participant to the specified account of the First Participant to the second
data certificate
record.
[42] And, the Third Participant adds a preset revenue, such as interest,
etc. to the corresponding
account according to the identity information recorded in the first data
certificate according
to the subscription share, which is not limited herein.
[43] When the First Participant pays an amount of funds to the Third
Participant by using the
third data certificate, and the second participant pays an amount of funds to
the First
Participant by using the second data certificate, and where if the
subscription money
acquired by the Third Participant is less than the total funding amount for
the online
fund-raising project, the First Server corresponding to the First Participant
unfreezes the
frozen funds in the account of the First Participant based on the second data
certificate;
and the Second Server corresponding to the Second Participant unfreeze the
frozen funds
in the account of Second Participant based on the third data certificate.
[44] In the above manner, when the First Participant pays an amount of
funds to the Third
Participant by using the second data certificate, and the second participant
pays an amount
of funds to the First Participant by using the third data certificate, where
if the fund-raising
project succeeds, the second data certificate and the third data certificate
are proceeded to
transfer funds at the same time, and where if the financing project fails, the
second data
certificate and the third data certificate are both proceeded to unfrozen
funds at the same
6
Date Recue/Date Received 2021-12-24
time, to effectively ensure the stability of capital flows between First
Participant, Second
Participant and Third Participant and avoid loss of each party.
[45] Different from the existing technology, after receiving a request for
acquiring at least one
first data certificate delivered by a second participant within a preset time
limit, the first
participant in this implementation mode adds identity information of the first
terminal into
the first data certificate, and delivers the first data certificate with the
identity information
of the second participant to respond the request. In this way, not only can it
transmit data in
the form of first data certificate in the process of data interaction, enrich
the way of data
interaction, but also increase the security of network data interaction by
recording data
information during a data flow..
[46] Please refer to Figure 3, Figure 3 is a schematic flow chart of
another example of a data
interaction processing method according to the present invention. The
execution body in
this example is a Second Participant. The Second Participant is executed by
the second
terminal 102 shown in Figure 1 and includes the following steps:
[47] 301: Deliver a request for obtaining at least one first data
certificate of the First Participant.
[48] Wherein, the first data certificate is an electronic certificate
having an identification code
and an interactive interface and capable of recording data information. The
interactive
interface includes an interface for editing the holder information for
verifying that the
target data basic interaction is completed and the post-payment to the
obligation of
electronic certificate. Wherein, the basic interaction includes commodity
infolmation,
logistics information, insurance information and trading rules and other
infoimation. In
addition, the basic exchange can also be funds flow information.
[49] In order to obtain the fund to be raised corresponding to the fund-
raising project, Third
Participant generates a plurality of first data certificates according to the
fund to be raised
or generated by a server and issues the plurality of first data certificates
through the
network, wherein each of the first data certificate records the amount of
funds subscribed,
the financing amount of the financing item and the preset deadline, the
amounts of funds
subscribed recorded by the multiple first data certificates may be equal or
not equal, and
each first data certificate contains a unique identification code. The sum of
the amount of
subscribed funds recorded in the first data certificate is the same as the
amount of funds
raised by the fund.
[50] The First Participant obtains at least one of the first data
certificates, and transfers funds
equal to the amount of funds recorded by the first data certificate to the
designated account
of the Third Participant.
[51] Third Participant adds First Participant's identity information to the
first data certificate. In
7
Date Recue/Date Received 2021-12-24
other examples, the Third Participant may also authorize the First Participant
or the third
party to add the identifier of the First Participant that obtains the first
data certificate to the
first data certificate.
[52] In another example, the First Participant may also pay through a third
data certificate, and
the third data certificate records the amount of money equal to the quota of
the first data
certificate obtained by the First Participant. Specifically, the First Server
corresponding to
the First Participant blocks funds in the designated account of the First
Participant equal to
the amount of the second data certificate, generates a third data certificate,
and delivers the
third data certificate to the Third Server corresponding to the Third
Participant. First Server
is First Participant's bank Funds-Management server, and Third Server is Third
Participant's bank Funds-Management server.
[53] When the Second Participant needs to obtain at least one data
certificate owned by the First
Participant, the Second Participant delivers a request to the First
Participant for at least one
data certificate within a preset period of time.
[54] 302: The first data certificate that receives the identity
identification information with the
Second Participant.
[55] The First Participant receives the request delivered by the Second
Participant, adds the
Second Participant's identity information to the first data certificate in
response to the
request, and delivers the first data corresponding to the request certificate
to the Second
Participant. Specifically, the identity information of the First Participant
recorded in the
first data certificate is modified as the identity information of the Second
Participant. In
another implementation manner, the identity information of the First
Participant recorded
in the first data certificate is modified as the identity information of the
Second Participant.
[56] Correspondingly, the Second Participant receives the first data
certificate that adds the
identity identification information for the Second Participant.
[57] Upon receipt of the first data certificate, the Second Participant
delivers a pre-defined
amount of funds to the designated account of First Participant.
[58] In another example, the Second Participant may also pay via the second
data certificate.
The amount of money represented by the second data certificate is preset by
First
Participant and Second Participant. Specifically, the Second Server
corresponding to the
Second Participant blocks funds in the designated account of the Second
Participant equal
to the quota recorded in the second data certificate, generates a second data
certificate, and
delivers the second data certificate to the First Participant corresponding to
First Server.
Wherein, Second Server is Second Participant's bank Funds-Management server.
[59] When the First Participant pays the Third Participant with the third
data certificate and the
8
Date Recue/Date Received 2021-12-24
Second Participant pays the First Participant with the second data
certificate, if the
subscription money acquired by the Third Participant is not reached when the
preset term
expires. The First Server corresponding to the First Participant pays the
third data
certificate and transfers the third data certificate from the designated
account of the First
Participant to the designated account of the third participant recorded by the
Second
Participant; the Second Server corresponds to Second Server to pay for the
second data
certificate, and to transfer the amount of funds from the specified account of
the Second
Participant to the specified account of the First Participant to the second
data certificate
record.
[60] And, the Third Participant adds a preset revenue, such as interest,
etc. to the corresponding
account according to the identity information recorded in the first data
certificate according
to the subscription share, which is not limited herein.
[61] When the First Participant pays an amount of funds to the Third
Participant by using the
third data certificate, and the second participant pays an amount of funds to
the First
Participant by using the second data certificate, and where if the
subscription money
acquired by the Third Participant is less than the total funding amount for
the online
fund-raising project, the First Server corresponding to the First Participant
unfreezes the
frozen funds in the account of the First Participant based on the second data
certificate;
and the Second Server corresponding to the Second Participant unfreeze the
frozen funds
in the account of Second Participant based on the third data certificate.
[62] In the above manner, when the First Participant pays an amount of
funds to the Third
Participant by using the second data certificate, and the second participant
pays an amount
of funds to the First Participant by using the third data certificate, where
if the fund-raising
project succeeds, the second data certificate and the third data certificate
are proceeded to
transfer funds at the same time, and where if the financing project fails, the
second data
certificate and the third data certificate are both proceeded to unfrozen
funds at the same
time, to effectively ensure the stability of capital flows between First
Participant, Second
Participant and Third Participant and avoid loss of each party. [63] Different
from the
existing technology, after receiving a request for acquiring at least one
first data certificate
delivered by a second participant within a preset time limit, the first
participant in this
implementation mode adds identity information of the first terminal into the
first data
certificate, and delivers the first data certificate with the identity
information of the second
participant to respond the request. In this way, not only can it transmit data
in the form of
first data certificate in the process of data interaction, enrich the way of
data interaction,
but also increase the security of network data interaction by recording data
information
9
Date Recue/Date Received 2021-12-24
during a data flow. [64] Different from the existing technology, the Second
Participant in
this example delivers a request for acquiring at least one first data
certificate of the First
Participant within a preset period, and adds a Second Participant to the first
data certificate
by the First Participant of the identity information, receive the first data
certificate. In this
way, it cannot only transmit data in the form of first data certificate in the
process of data
interaction, enrich the way of data interaction, but also increase the
security of network
data interaction by adding data flow records on the first data certificate.
[65] Please refer to Figure 4, Figure 4 is a schematic flow chart of
example of a data interaction
processing method according to the present invention. The data interaction
processing
method according to the present example is applied to the system shown in
Figure 1
described above. The First Participant in this example is executed by the
first terminal 101
shown in Figure 1 and the second Participant is executed by the second
terminal 102. The
method comprises the following steps:
[66] 401: Second Participant delivers a request to the First Participant to
obtain at least one first
data certificate of the First Participant within a preset period.
[67] Specifically, in order to obtain the funds to be raised corresponding
to the funding item,
Third Participant is generated based on the funds to be raised or generated by
the server. A
first data certificate, and publish the plurality of first data certificates
over a network;
wherein each first data certificate records an amount of funds subscribed, a
financing
amount of the funding item, and a preset deadline, and a plurality of first
data certificates.
The recorded amount of money subscribed may be equal or unequal, and each
first data
certificate includes a unique identification code. The sum of the amount of
subscribed
funds recorded in the first data certificate is the same as the amount of
funds raised by the
fund.
[68] Wherein, the information of fund-raising project includes project
attributes, keywords and
corresponding image information, which is not limited herein. The first data
certificate is
an electronic certificate having an identification code and an interactive
interface and
capable of recording data information. The interactive interface includes an
interface for
editing the holder information for verifying that the target data basic
interaction is
completed and the post-payment to the obligation of electronic certificate.
Wherein, the
basic interaction includes commodity information, logistics information,
insurance
information and trading rules and other information. In addition, the basic
exchange can
also be funds flow information.
[69] The First Participant obtains at least one of the first data
certificates. Specifically, the First
Participant selects at least one first data certificate from the plurality of
first data
Date Recue/Date Received 2021-12-24
certificates produced and distributed by the Third Participant, and transfers
to the
designated account of the Third Participant an amount equal to the amount of
funds
recorded by the first data certificate funds.
[70] And add First Participant's identity information to the first data
certificate. Specifically,
since there are multiple first data certificates, and the data values of the
first data
certificates are not completely the same, the number of First Participants
that receive the
first data certificate may also be multiple. The first data certificate
selected adds
information about the identity of the First Participant receiving the first
data certificate. In
other examples, the Third Participant may also authorize the First Participant
or the third
party to add the identifier of the First Participant that obtains the first
data certificate to the
first data certificate.
[71] In another example, the First Participant may also pay through a third
data certificate, and
the third data certificate records the amount of money equal to the quota of
the first data
certificate obtained by the First Participant. Specifically, the First Server
corresponding to
the First Participant blocks funds in the designated account of the First
Participant equal to
the amount of the second data certificate, generates a third data certificate,
and delivers the
third data certificate to the Third Server corresponding to the Third
Participant. First Server
is First Participant's bank Funds-Management server, and Third Server is Third
Participant's bank Funds-Management server.
[72] When the Second Participant needs to obtain at least one data
certificate owned by the First
Participant, the Second Participant delivers a request to the First
Participant for at least one
data certificate within a preset period of time.
[73] 402: In response to the request, the First Participant adds the
identity information of the
Second Participant to the first data certificate.
[74] The First Participant receives the request for obtaining at least one
first data certificate of
the First Participant. And when determining to respond to the request, add the
identity
information of the Second Participant to the first data certificate.
Specifically, the identity
infoimation of the First Participant recorded in the first data certificate is
modified as the
identity information of the Second Participant. In another implementation
manner, the
identity information of the First Participant recorded in the first data
certificate is modified
as the identity information of the Second Participant.
[75] 403: the First Participant delivers a first data certificate
corresponding to the request to the
Second Participant.
[76] In other examples, the First Participant may also deliver the first
data certificate to the
Second Participant, authorize the Second Participant or a third party to add
the identifier of
11
Date Recue/Date Received 2021-12-24
the Second Participant to the first data certificate, and do not limited here.
[77] Upon receipt of the first data certificate, the Second Participant
delivers a pre-defined
amount of funds to the designated account of First Participant.
[78] In another example, the Second Participant may also pay via the second
data certificate.
The amount of money represented by the second data certificate is preset by
First
Participant and Second Participant. Specifically, the Second Server
corresponding to the
Second Participant blocks funds in the designated account of the Second
Participant equal
to the quota recorded in the second data certificate, generates a second data
certificate, and
delivers the second data certificate to the First Participant corresponding to
First Server.
Wherein, Second Server is Second Participant's bank Funds-Management server.
[79] When the First Participant pays the Third Participant with the third
data certificate and the
Second Participant pays the First Participant with the second data
certificate, if the
subscription money acquired by the Third Participant is not reached when the
preset term
expires. The First Server corresponding to the First Participant pays the
third data
certificate and transfers the third data certificate from the designated
account of the First
Participant to the designated account of the third participant recorded by the
Second
Participant; the Second Server corresponds to Second Server to pay for the
second data
certificate, and to transfer the amount of funds from the specified account of
the Second
Participant to the specified account of the First Participant to the second
data certificate
record.
[80] And, the Third Participant adds a preset revenue, such as interest,
etc. to the corresponding
account according to the identity information recorded in the first data
certificate according
to the subscription share, which is not limited herein.
[81] When the First Participant pays an amount of funds to the Third
Participant by using the
third data certificate, and the second participant pays an amount of funds to
the First
Participant by using the second data certificate, and where if the
subscription money
acquired by the Third Participant is less than the total funding amount for
the online
fund-raising project, the First Server corresponding to the First Participant
unfreezes the
frozen funds in the account of the First Participant based on the second data
certificate;
and the Second Server corresponding to the Second Participant unfreeze the
frozen funds
in the account of Second Participant based on the third data certificate.
[82] In the above manner, when the First Participant pays an amount of
funds to the Third
Participant by using the second data certificate, and the second participant
pays an amount
of funds to the First Participant by using the third data certificate, where
if the fund-raising
project succeeds, the second data certificate and the third data certificate
are proceeded to
12
Date Recue/Date Received 2021-12-24
transfer funds at the same time, and where if the financing project fails, the
second data
certificate and the third data certificate are both proceeded to unfrozen
funds at the same
time, to effectively ensure the stability of capital flows between First
Participant, Second
Participant and Third Participant and avoid loss of each party.
[83] Different from the existing technology, after receiving a request for
acquiring at least one
first data certificate delivered by a second participant within a preset time
limit, the first
participant in this implementation mode adds identity information of the first
terminal into
the first data certificate, and delivers the first data certificate with the
identity information
of the second participant to respond the request. In this way, not only can it
transmit data in
the form of first data certificate in the process of data interaction, enrich
the way of data
interaction, but also increase the security of network data interaction by
recording data
information during a data flow. [84] Please refer to Figure 5, Figure 5 is a
schematic
structural diagram of an example of a teiiiiinal according to the present
invention, in which
the terminal in this example corresponds to the first terminal in Figure 1,
and the first
terminal in this example corresponds to the second terminal in Figure 1. Which
is applied
to the example corresponding to FIGS. 2 to 4 and FIGS. 2 to 4. The terminal
includes a
receiving module 501, a response module 502, and a delivering module 503.
[85] The receiving module 501 is used to receive a request for acquiring at
least one first data
certificate of the terminal.
[86] Specifically, when the first terminal needs to acquire at least one
data certificate owned by
the terminal, the first terminal delivers a request for obtaining at least one
data certificate to
the terminal, where the request includes an identification code of the first
data certificate.
Wherein the first data certificate records identity information of a terminal,
and the first
data certificate further includes a size of a data value represented by the
first data
certificate and publisher information of the first data certificate.
[87] Correspondingly, the receiving module 501 receives the request.
[88] The response module 502 is used to add, in response to the request,
the identity
information of the first terminal to the first data certificate.
[89] Specifically, the response module 502 modifies the identity
information of the terminal
recorded in the first data certificate as the identity information of the
first terminal. In
another example, the identity information of the terminal recorded in the
first data
certificate is modified into the identity information of the first
[90] The delivering module 503 is used to deliver a first data certificate
corresponding to the
request.
13
Date Recue/Date Received 2021-12-24
[91] Different from the existing technology, after the receiving module in
this implementation
mode receiving a request for acquiring at least one first data certificate
delivered by a first
terminal within a preset time limit, the responding module adds identity
information of the
first terminal into the first data certificate, and delivers the first data
certificate with the
identity information of the first terminal to respond the request. In this
way, not only can it
transmit data in the form of first data certificate in the process of data
interaction, enrich
the way of data interaction, but also increase the security of network data
interaction by
recording data information during a data flow.
[92] Please refer to Figure 6, Figure 6 is a schematic structural diagram
of an example of a
terminal device according to the present invention. The terminal device in
this example
corresponds to the first terminal in Figure 1, and the first terminal in this
example
corresponds to the second terminal in Figure 1 terminal. Which is applied to
the example
corresponding to FIGS. 2 to 4 and FIGS. 2 to 4. The terminal device includes a
receiver
601, a processor 602, and a transmitter 603.
[93] The receiver 601 is used to receive a request for acquiring at least
one first data certificate
of the terminal.
[94] The processor 602 is used to add, in response to the request, the
identity information of the
first terminal to the first data certificate;
[95] The transmitter 603 is used to deliver a first data certificate
corresponding to the request.
[96] The switch in the present example further includes a memory 604, which
may include a
read only memory and a random access memory, and provide instructions and data
to the
processor 602. A portion of memory 604 may also include non-volatile random
access
memory (NVRAM).
[97] The memory 604 stores the following elements, executable modules or
data structures, or a
subset of them, or their extensions:
[98] Operation Instructions: Various operation instructions are included
for various operations.
[99] Operating System: Includes various system programs for implementing
various basic
services and handling hardware-based tasks.
[100] In this example of the present invention, the processor 602 performs the
foregoing
operation by invoking an operation instruction stored in the memory 604 (the
operation
instruction may be stored in an operating system).
[101] The processor 602 may also be referred to as a CPU (Central Processing
Unit). Memory
604 may include read only memory and random access memory, and provide
instructions
and data to the processor 602. A portion of memory 604 may also include non-
volatile
random access memory (NVRAM). In a specific application, the components of the
14
Date Recue/Date Received 2021-12-24
controller are coupled together through a bus system 605. The bus system 605
may include
a power bus, a control bus, a status signal bus, and so on in addition to a
data bus.
However, for the sake of clarity, various buses are labelled bus system 605 in
the figure.
[102] The method disclosed in the foregoing example of the present invention
may be applied to
the processor 602 or be implemented by the processor 602. The processor 602
may be an
integrated circuit chip with signal processing capabilities. In the
implementation process,
the steps of the above method may be implemented by integrated logic circuits
of hardware
in the processor 602 or software instructions. The processor 602 described
above may be a
general purpose processor, a digital signal processor (DSP), an application
specific
integrated circuit (ASIC), a programmable gate array (FPGA) or other
programmable logic
device, a discrete gate or a transistor logic device, discrete hardware
components. The
disclosed methods, steps, and logic blocks in the examples of the present
invention may be
implemented or implemented. The general purpose processor may be a
microprocessor or
the processor may also be any conventional processor and so on. The steps of
the method
disclosed in conjunction with the examples of the present invention may be
directly
implemented as completion of execution by a hardware decoding processor or by
combination of hardware and software modules in a decoding processor. The
software
module may be located in a storage medium well-established in the art, such as
a random
access memory, a flash memory, a read only memory, a programmable read only
memory,
an electrically erasable programmable memory, or a register. The storage
medium is
located in the memory 604. The processor 602 reads the information in the
memory 604
and completes the steps of the above method in combination with its hardware.
[103] Different from the existing technology, after the receiver in this
implementation mode
receiving a request for acquiring at least one first data certificate
delivered by a first
terminal within a preset time limit, the processor adds identity information
of the first
terminal into the first data certificate, and delivers the first data
certificate with the identity
information of the first terminal to respond the request. In this way, it
cannot only transmit
data in the form of first data certificate in the process of data interaction,
enrich the way of
data interaction, but also increase the security of network data interaction
by recording data
information during a data flow [104] The above is only an example of the
present
invention and is not intended to limit the scope of the invention as a matter
of limitation,
either by way of equivalent construction or equivalent process transformation
using the
present specification and the accompanying drawings, directly or indirectly
used in other
related technical fields, which are included in the scope of the patent
protection of the
present invention.
Date Recue/Date Received 2021-12-24