CN108346047A - Private key protection method and device for digital wallet, electronic equipment and storage medium - Google Patents

Private key protection method and device for digital wallet, electronic equipment and storage medium Download PDF

Info

Publication number
CN108346047A
CN108346047A CN201810145978.5A CN201810145978A CN108346047A CN 108346047 A CN108346047 A CN 108346047A CN 201810145978 A CN201810145978 A CN 201810145978A CN 108346047 A CN108346047 A CN 108346047A
Authority
CN
China
Prior art keywords
information
private key
user behavior
user
digital wallet
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810145978.5A
Other languages
Chinese (zh)
Inventor
张康宗
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Kingsoft Internet Security Software Co Ltd
Original Assignee
Beijing Kingsoft Internet Security Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Kingsoft Internet Security Software Co Ltd filed Critical Beijing Kingsoft Internet Security Software Co Ltd
Priority to CN201810145978.5A priority Critical patent/CN108346047A/en
Publication of CN108346047A publication Critical patent/CN108346047A/en
Priority to PCT/CN2018/110222 priority patent/WO2019153779A1/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • G06Q20/363Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes with the personal data of a user
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • G06Q20/367Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
    • G06Q20/3674Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes involving authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions

Abstract

The embodiment of the invention provides a method and a device for protecting a private key of a digital wallet, electronic equipment and a storage medium, wherein the method comprises the following steps: obtaining user behavior information affecting the security of a private key of the digital wallet; acquiring a safety level evaluation result of the user behavior by using a preset safety level evaluation standard and the acquired user behavior information; obtaining safety setting guide information based on the safety level evaluation result; the security setting guidance information is displayed to guide the user to improve the security of the private key of the digital wallet. By applying the embodiment of the invention, the safety level evaluation result of the user behavior can be obtained through the user behavior information analysis, so that the safety setting guide information can be obtained according to the safety level evaluation result, and the user is guided to carry out corresponding safety defense operation through the safety setting guide information, so that the safety of the private key of the digital wallet can be improved through the safety defense operation, and the safety of the assets in the digital wallet is ensured.

Description

Private key protection method, device, electronic equipment and the storage medium of digital wallet
Technical field
The present invention relates to digital wallet technical fields, more particularly to the private key protection method of digital wallet, device, electronics Equipment and readable storage medium storing program for executing.
Background technology
With the development of technology, more and more users using digital wallet come manage digital cash (such as bit coin and Lay spy's coin etc.).Wherein, digital wallet is the wallet based on block chain technology, and private key is the digital goods managed in digital wallet The exclusive evidence of coin.
But there is presently no the schemes that the private key for digital wallet is protected so that private key faces stolen at any time Risk.And the security risk that can cause digital cash stolen when private key is stolen, it can not ensure the assets security of user.
Invention content
The embodiment of the present invention be designed to provide a kind of private key protection method of digital wallet, device, electronic equipment and Storage medium, to draw by user behavior information acquisition security setting guidance information, and by the security setting guidance information Lead user and carry out corresponding Prevention-Security operation, to improve digital wallet private key safety, and then ensure digital wallet The safety of middle assets.Specific technical solution is as follows:
In a first aspect, an embodiment of the present invention provides a kind of private key protection method of digital wallet, this method may include:
Obtain the user behavior information for the private key safety for influencing digital wallet;
Using default safe class evaluation criteria and the user behavior information obtained, the safe class of user behavior is obtained Assessment result;
Based on safe class assessment result, security setting guidance information is obtained;
Security setting guidance information is shown, to guide the safety of the private key of user's raising digital wallet.
Optionally, the step of user behavior information of the private key safety of acquisition influence digital wallet may include:
Questionnaire is preset in display;Wherein, presetting to record in questionnaire has:Influence the pre- of the private key safety of digital wallet If user behavior information, and the corresponding tick boxes of each pre-set user behavioural information;When a pre-set user behavioural information pair When the tick boxes answered are selected, show that the pre-set user behavioural information is selected;
Obtain the Questionnaire results for presetting questionnaire;
The pre-set user behavioural information that will be selected in Questionnaire results is determined as influencing the private key safety of digital wallet User behavior information.
Optionally, pre-set user behavioural information may include:Accessed behavioural information, the opened carrying disease of high-risk webpage The behavioural information of the mail of poison is used as assets payment cipher by the behavioural information of screenshotss backup private key and merely with numerical ciphers Behavioural information at least one of.
Optionally, be based on safe class assessment result, obtain security setting guidance information the step of may include:
Judge whether obtained safe class assessment result is low;
If so, determining the obtained corresponding security setting guidance information of user behavior information;
Wherein, when the user behavior information obtained includes:The behavioural information of high-risk webpage was accessed, and/or, it is opened When taking the behavioural information of viruliferous mail, identified security setting guidance information includes:Checking and killing virus prompting message;Work as institute The user behavior information of acquisition includes:When by the behavioural information of screenshotss backup private key, identified security setting guidance information Including:Dispersion storage private key prompting message;When the user behavior information obtained includes:Merely with numerical ciphers as assets branch When paying the behavioural information of password, identified security setting guidance information includes:It is paid using biological characteristic password as assets Password prompting message.
Optionally, using default safe class evaluation criteria and the user behavior information obtained, user behavior is obtained The step of safe class assessment result, may include:
Determine the quantity of obtained user behavior information;
The quantitative range that quantification is located in default safe class evaluation criteria;Wherein, default safe class is commented Estimating standard includes:The correspondence of quantitative range and safe class;
The corresponding safe class of quantitative range that quantity is located at is determined as the safe class assessment knot of user behavior Fruit.
Second aspect, the embodiment of the present invention additionally provide a kind of private key protective device of digital wallet, which can wrap It includes:
First obtains unit, the user behavior information for obtaining the private key safety for influencing digital wallet;
Second obtaining unit, for using the user behavior information preset safe class evaluation criteria and obtained, obtaining The safe class assessment result of user behavior;
Third obtaining unit obtains security setting guidance information for being based on safe class assessment result;
Display unit, for showing security setting guidance information, to guide the safety of the private key of user's raising digital wallet Property.
Optionally, in embodiments of the present invention, first obtains unit may include:
Subelement is shown, for showing default questionnaire;Wherein, presetting to record in questionnaire has:Influence digital money The pre-set user behavioural information of the private key safety of packet, and the corresponding tick boxes of each pre-set user behavioural information;When one it is pre- If the corresponding tick boxes of user behavior information are selected, show that the pre-set user behavioural information is selected;
Obtain subelement, the Questionnaire results for obtaining default questionnaire;
First determination subelement, the pre-set user behavioural information for will be selected in Questionnaire results, is determined as shadow Ring the user behavior information of the private key safety of digital wallet.
Optionally, pre-set user behavioural information may include:Accessed behavioural information, the opened carrying disease of high-risk webpage The behavioural information of the mail of poison is used as assets payment cipher by the behavioural information of screenshotss backup private key and merely with numerical ciphers Behavioural information at least one of.
Optionally, in embodiments of the present invention, third obtaining unit may include:
Judgment sub-unit, for judging whether obtained safe class assessment result is low;
Second determination subelement, for when judgment sub-unit judges that obtained safe class assessment result is low, really Fixed the obtained corresponding security setting guidance information of user behavior information;
Wherein, when the user behavior information obtained includes:The behavioural information of high-risk webpage was accessed, and/or, it is opened When taking the behavioural information of viruliferous mail, identified security setting guidance information includes:Checking and killing virus prompting message;Work as institute The user behavior information of acquisition includes:When by the behavioural information of screenshotss backup private key, identified security setting guidance information Including:Dispersion storage private key prompting message;When the user behavior information obtained includes:Merely with numerical ciphers as assets branch When paying the behavioural information of password, identified security setting guidance information includes:It is paid using biological characteristic password as assets Password prompting message.
Optionally, in embodiments of the present invention, the second obtaining unit may include:
Third determination subelement, the quantity for determining obtained user behavior information;
4th determination subelement, the quantitative range being located in default safe class evaluation criteria for quantification; Wherein, presetting safe class evaluation criteria includes:The correspondence of quantitative range and safe class;
5th determination subelement, the corresponding safe class of quantitative range for quantity to be located at, is determined as user's row For safe class assessment result.
The third aspect, the embodiment of the present invention additionally provide a kind of electronic equipment, which may include processor, leads to Believe interface, memory and communication bus, wherein processor, communication interface, memory complete mutual lead to by communication bus Letter;
Memory, for storing computer program;
Processor when for executing the program stored on memory, realizes any one of first aspect digital wallet The method and step that private key protection method embodiment provides.
Fourth aspect, the embodiment of the present invention additionally provide a kind of storage medium, and computer journey is stored in the storage medium Sequence, the private key protection method embodiment of any one of first aspect digital wallet provides when computer program is executed by processor Method and step.
In embodiments of the present invention, the digital wallet on electronic equipment can obtain the private key safety for influencing the digital wallet User behavior information.It is then possible to using safe class evaluation criteria and the user behavior information is preset, to the electronic equipment The performed user behavior crossed of user carry out safe class assessment, obtain safe class assessment result.It later, can be according to this Safe class assessment result obtains the security setting guidance information for the electronic equipment, and guides the security setting and believe Breath is shown.Wherein, since the security setting guidance information is the safety of the private key for guiding user's raising digital wallet The information of property.Thus, by the security setting guidance information, user can be known anti-for eliminating the stolen safety threatened of private key Imperial operation, and then the safety of the private key to improve digital wallet can be operated by the Prevention-Security, it ensure that digital wallet The safety of middle assets.
Description of the drawings
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with Obtain other attached drawings according to these attached drawings.
Fig. 1 is a kind of private key protection method flow chart of digital wallet provided in an embodiment of the present invention;
Fig. 2 is a kind of structural schematic diagram of the private key protective device of digital wallet provided in an embodiment of the present invention;
Fig. 3 is the structural schematic diagram of a kind of electronic equipment provided in an embodiment of the present invention.
Specific implementation mode
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation describes, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
In order to solve the problems, such as the private key of digital wallet in the prior art exist it is stolen threaten, the embodiment of the present invention is from user The angle of behavior safety provides a kind of private key protection method of digital wallet, device, electronic equipment and storage medium.
The private key protection method of digital wallet provided in an embodiment of the present invention is illustrated first below.
It should be noted that the executive agent of the private key protection method of digital wallet provided in an embodiment of the present invention is number Wallet client end can also be referred to as digital wallet.Wherein, in the electronic device, which sets the installation of digital wallet client Standby including but not limited to mobile phone and tablet computer.
Referring to Fig. 1, the private key protection method of digital wallet provided in an embodiment of the present invention may include steps of:
S101:Obtain the user behavior information for the private key safety for influencing digital wallet;
Inventor has found that user, can be to installing to the usage behavior of electronic equipment, i.e. user behavior in the electronic equipment The safety of the private key of digital wallet impacts.For example, when user is opened take viruliferous mail when, the opened carrying The user behavior of the mail of virus can threaten to the safety of private key.Wherein, the virus entrained by the mail is to steal private The virus of key can all influence private key alternatively, when viral subversive entrained by the mail Prevention-Security function of the electronic equipment Safety.Thus in embodiments of the present invention, in order to ensure the safety of private key, the user's row for influencing private key safety can be obtained For corresponding user behavior information.
In one implementation, it can detect which operation user performs by user behavior detection plug-in unit, from And all user behavior information for the user for operating the electronic equipment can be obtained.Then, each user detected is utilized Behavioural information is matched with the user behavior information stored in default behavioural information table.Wherein, in the default behavioural information table The user behavior information of storage is:The user behavior information that the safety of the private key of digital wallet can be impacted.
When the user behavior information stored in the user behavior information that detection obtains and default behavioural information table When matching, then show that the user behavior corresponding to the user behavior information detected can threaten to the safety of private key. At this point it is possible to which the user behavior information that this is detected is determined as to influence the user behavior information of the private key safety of digital wallet.
In another implementation, the user behavior for influencing private key safety can also be obtained by presetting questionnaire Information.Wherein, it can have been recorded in the default questionnaire:It can influence the pre-set user behavior letter of the private key safety of digital wallet Breath, and the corresponding tick boxes of each pre-set user behavioural information.Also, it is chosen when a pre-set user behavioural information is corresponding When frame is selected, show that the pre-set user behavioural information is selected.
In this kind of realization method, digital wallet, which can first be shown to user, presets questionnaire.Then, user can root The default questionnaire is filled according to the user behavior operated.In turn, digital wallet can obtain asking for default questionnaire Roll up investigation result.Then, the pre-set user behavioural information that digital wallet can will be selected in Questionnaire results, is determined as shadow Ring the user behavior information of the private key safety of digital wallet.
Wherein, the pre-set user behavioural information recorded in questionnaire may include:Accessed the behavior letter of high-risk webpage Breath, the opened behavioural information for taking viruliferous mail, by the behavioural information of screenshotss backup private key and merely with numerical ciphers As at least one in the behavioural information of assets payment cipher.Certainly, which can also include:Pass through The behavioural information of handwriting mode backup private key, and fed back the behavioural information etc. that account number cipher is stolen, certainly not office It is limited to this.Also, pre-set user behavioural information can be arranged according to actual conditions in those skilled in the art, do not do herein in detail It states.
Wherein, when by screenshotss or handwriting mode, come when backing up private key, private key is progress full storage, full storage is private Key is easier that private key is caused to be stolen by criminal, both storage modes can also influence the safety of private key.
S102:Using default safe class evaluation criteria and the user behavior information obtained, the peace of user behavior is obtained Congruent grade assessment result;
After the user behavior information for acquiring the private key safety for influencing digital wallet, in one implementation, It can determine the quantity of obtained user behavior information.Then, it is determined that quantity institute position in default safe class evaluation criteria In quantitative range.Wherein, presetting safe class evaluation criteria includes:The correspondence of quantitative range and safe class.It Afterwards, the corresponding safe class of quantitative range that can be located at quantity, is determined as the safe class assessment result of user behavior.
For example, the user behavior information of the private key safety of acquisition influence digital wallet is:Accessed high-risk webpage Behavioural information, the opened behavioural information for taking viruliferous mail and when by the behavioural information of screenshotss backup private key, can be with Determine that the quantity of obtained user behavior information is 3.
Where it is assumed that in default safe class evaluation criteria, quantitative range quantity < 1 has corresponding with high safety grade Relationship;Quantitative range 1≤quantity≤2 have correspondence with intermediate security grade;Quantitative range quantity >=3 and lower security grade With correspondence.
In this way, the corresponding lower security grade in quantitative range quantity >=3 that can will determine that obtained quantity 3 is located at, really It is set to the safe class assessment result of user behavior, that is, determines that the security level of the user behavior of the user is low.
In another implementation, default grade form is also based on to determine the total of obtained user behavior information Score.Wherein, presetting to record in grade form has:The correspondence of user behavior information and score.It is then possible to determine total score The fraction range being located in default safe class evaluation criteria.In this kind of realization method, safe class assessment mark is preset Standard includes:The correspondence of fraction range and safe class.Later, the quantitative range that can be located at total score is corresponding Safe class is determined as the safe class assessment result of user behavior, and this is also rational.
S103:Based on safe class assessment result, security setting guidance information is obtained;
After obtaining the safe class assessment result of user behavior, it can be determined that the safe class assessment result obtained Whether it is low.If being judged as low, in one implementation, preset security setting guidance information can be obtained.Wherein, should Preset security setting guidance information may include:Checking and killing virus prompting message and dispersion storage private key prompting message.
It in another implementation, can be according to the user behavior information obtained, to determine obtained user's row For the corresponding security setting guidance information of information.Specifically, when the user behavior information obtained includes:Accessed high-risk webpage Behavioural information, and/or, when the opened behavioural information for taking viruliferous mail, identified security setting guidance information can To include:Checking and killing virus prompting message.When the user behavior information obtained includes:Pass through the behavioural information of screenshotss backup private key When, identified security setting guidance information may include:Dispersion storage private key prompting message.When the user behavior letter obtained Breath includes:When merely with behavioural information of the numerical ciphers as assets payment cipher, identified security setting guidance information can To include:Using biological characteristic password as assets payment cipher prompting message.It is understood that security setting guiding letter Breath is:For guiding user to eliminate the stolen prompt message threatened of private key caused by obtained user behavior information.
In addition, dispersion storage private key can refer to:By pre-determined threshold algorithm, private key is divided into several parts, then Distributing storage is carried out to various pieces.In this way, illegal molecule can be made to be difficult to obtain complete secret key, and increase illegal point Son obtains the cost of complete secret key, so as to improve the safety of secret key.
Further, since the mode stored at present to private key is mostly full storage mode, thus when safe class is commented When to estimate result be high or medium, in order to further increase the safety of private key, security setting guidance information can be obtained:Dispersion is deposited Private key prompting message is stored up, alternatively, security setting guidance information can be obtained:Dispersion stores private key to a hardware core for default safety The prompting message of piece, this is also rational.
S104:Security setting guidance information is shown, to guide the safety of the private key of user's raising digital wallet.
After obtaining security setting guidance information, the security setting guidance information of acquisition can be shown.Due to Security setting guidance information is according to obtained from user behavior information, it is thus achieved that being obtained from user behavior level analysis: For eliminating the stolen Prevention-Security operation threatened of private key, and user can be guided to execute Prevention-Security operation to improve number The safety of the private key of wallet ensure that the safety of assets in digital wallet.
In embodiments of the present invention, the digital wallet on electronic equipment can obtain the private key safety for influencing the digital wallet User behavior information.It is then possible to using safe class evaluation criteria and the user behavior information is preset, to the electronic equipment The performed user behavior crossed of user carry out safe class assessment, obtain safe class assessment result.It later, can be according to this Safe class assessment result obtains the security setting guidance information for the electronic equipment, and guides the security setting and believe Breath is shown.Wherein, since the security setting guidance information is the safety of the private key for guiding user's raising digital wallet The information of property.Thus, by the security setting guidance information, user can be known anti-for eliminating the stolen safety threatened of private key Imperial operation, and then the safety of the private key to improve digital wallet can be operated by the Prevention-Security, it ensure that digital wallet The safety of middle assets.
Corresponding to above method embodiment, the embodiment of the present invention additionally provides a kind of private key protective device of digital wallet, Referring to Fig. 2, which may include:
First obtains unit 201, the user behavior information for obtaining the private key safety for influencing digital wallet;
Second obtaining unit 202, for using the user behavior information preset safe class evaluation criteria and obtained, obtaining Obtain the safe class assessment result of user behavior;
Third obtaining unit 203 obtains security setting guidance information for being based on safe class assessment result;
Display unit 204, for showing security setting guidance information, to guide the peace of the private key of user's raising digital wallet Quan Xing.
Using device provided in an embodiment of the present invention, the digital wallet on electronic equipment, which can obtain, influences the digital wallet Private key safety user behavior information.It is then possible to using safe class evaluation criteria and the user behavior information is preset, it is right The performed user behavior crossed of the user of the electronic equipment carries out safe class assessment, obtains safe class assessment result.Later, The security setting guidance information for the electronic equipment can be obtained, and to the safety according to the safe class assessment result Setting guidance information is shown.Wherein, since the security setting guidance information is for guiding user to improve digital wallet The information of the safety of private key.Thus, by the security setting guidance information, user can be known is stolen prestige for eliminating private key The Prevention-Security of the side of body operates, and then the safety of the private key to improve digital wallet can be operated by the Prevention-Security, ensures The safety of assets in digital wallet.
Optionally, in embodiments of the present invention, first obtains unit 201 may include:
Subelement is shown, for showing default questionnaire;Wherein, presetting to record in questionnaire has:Influence digital money The pre-set user behavioural information of the private key safety of packet, and the corresponding tick boxes of each pre-set user behavioural information;When one it is pre- If the corresponding tick boxes of user behavior information are selected, show that the pre-set user behavioural information is selected;
Obtain subelement, the Questionnaire results for obtaining default questionnaire;
First determination subelement, the pre-set user behavioural information for will be selected in Questionnaire results, is determined as shadow Ring the user behavior information of the private key safety of digital wallet.
Optionally, in embodiments of the present invention, pre-set user behavioural information may include:Accessed the behavior of high-risk webpage It is information, the opened behavioural information for taking viruliferous mail, close by the behavioural information of screenshotss backup private key and merely with number Code is as at least one in the behavioural information of assets payment cipher.
Optionally, in embodiments of the present invention, third obtaining unit 203 may include:
Judgment sub-unit, for judging whether obtained safe class assessment result is low;
Second determination subelement, for when judgment sub-unit judges that obtained safe class assessment result is low, really Fixed the obtained corresponding security setting guidance information of user behavior information;
Wherein, when the user behavior information obtained includes:The behavioural information of high-risk webpage was accessed, and/or, it is opened When taking the behavioural information of viruliferous mail, identified security setting guidance information includes:Checking and killing virus prompting message;Work as institute The user behavior information of acquisition includes:When by the behavioural information of screenshotss backup private key, identified security setting guidance information Including:Dispersion storage private key prompting message;When the user behavior information obtained includes:Merely with numerical ciphers as assets branch When paying the behavioural information of password, identified security setting guidance information includes:It is paid using biological characteristic password as assets Password prompting message.
Optionally, in embodiments of the present invention, the second obtaining unit 202 may include:
Third determination subelement, the quantity for determining obtained user behavior information;
4th determination subelement, the quantitative range for quantification place in default safe class evaluation criteria;Its In, default safe class evaluation criteria includes:The correspondence of quantitative range and safe class;
5th determination subelement, for by the corresponding safe class of quantitative range where quantity, determining user behavior Safe class assessment result.
Corresponding to above method embodiment, the embodiment of the present invention additionally provides a kind of electronic equipment, referring to Fig. 3, the electronics Equipment includes processor 301, communication interface 302, memory 303 and communication bus 304, wherein processor 301, communication interface 302, memory 303 completes mutual communication by communication bus 304;
Memory 303, for storing computer program;
Processor 301 when for executing the program stored on memory 303, realizes any of the above-described digital wallet The method and step that private key protection method embodiment provides.
In embodiments of the present invention, the digital wallet on electronic equipment can obtain the private key safety for influencing the digital wallet User behavior information.It is then possible to using safe class evaluation criteria and the user behavior information is preset, to the electronic equipment The performed user behavior crossed of user carry out safe class assessment, obtain safe class assessment result.It later, can be according to this Safe class assessment result obtains the security setting guidance information for the electronic equipment, and guides the security setting and believe Breath is shown.Wherein, since the security setting guidance information is the safety of the private key for guiding user's raising digital wallet The information of property.Thus, by the security setting guidance information, user can be known anti-for eliminating the stolen safety threatened of private key Imperial operation, and then the safety of the private key to improve digital wallet can be operated by the Prevention-Security, it ensure that digital wallet The safety of middle assets.
The communication bus that above-mentioned electronic equipment is mentioned can be Peripheral Component Interconnect standard (Peripheral Component Interconnect, PCI) bus or expanding the industrial standard structure (Extended Industry Standard Architecture, EISA) bus etc..The communication bus can be divided into address bus, data/address bus, controlling bus etc..For just It is only indicated with a thick line in expression, figure, it is not intended that an only bus or a type of bus.
Communication interface is for the communication between above-mentioned electronic equipment and other equipment.
Memory may include random access memory (Random Access Memory, RAM), can also include non-easy The property lost memory (Non-Volatile Memory, NVM), for example, at least a magnetic disk storage.Optionally, memory may be used also To be at least one storage device for being located remotely from aforementioned processor.
Above-mentioned processor can be general processor, including central processing unit (Central Processing Unit, CPU), network processing unit (Network Processor, NP) etc.;It can also be digital signal processor (Digital Signal Processing, DSP), it is application-specific integrated circuit (Application Specific Integrated Circuit, ASIC), existing It is field programmable gate array (Field-Programmable Gate Array, FPGA) or other programmable logic device, discrete Door or transistor logic, discrete hardware components.
Corresponding to above method embodiment, the embodiment of the present invention additionally provides a kind of storage medium, which is meter Calculation machine readable storage medium storing program for executing is stored with computer program in the storage medium, is realized when computer program is executed by processor State the method and step that the private key protection method embodiment of any one digital wallet provides.
After the computer program stored in storage medium provided in an embodiment of the present invention is executed by the processor of electronic equipment,
Digital wallet on electronic equipment can obtain the user behavior information for the private key safety for influencing the digital wallet.So Afterwards, default safe class evaluation criteria and the user behavior information can be utilized, is crossed performed by the user to the electronic equipment User behavior carries out safe class assessment, obtains safe class assessment result.Later, it can be assessed and be tied according to the safe class Fruit obtains the security setting guidance information for the electronic equipment, and is shown to the security setting guidance information.Its In, since the security setting guidance information is the information of the safety of the private key for guiding user's raising digital wallet.Thus, By the security setting guidance information, user can be known for eliminating the stolen Prevention-Security operation threatened of private key, Jin Erke To operate the safety of the private key to improve digital wallet by the Prevention-Security, the safety of assets in digital wallet ensure that.
It should be noted that herein, relational terms such as first and second and the like are used merely to a reality Body or operation are distinguished with another entity or operation, are deposited without necessarily requiring or implying between these entities or operation In any actual relationship or order or sequence.Moreover, the terms "include", "comprise" or its any other variant are intended to Non-exclusive inclusion, so that the process, method, article or equipment including a series of elements is not only wanted including those Element, but also include other elements that are not explicitly listed, or further include for this process, method, article or equipment Intrinsic element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that There is also other identical elements in process, method, article or equipment including the element.
Each embodiment in this specification is all made of relevant mode and describes, identical similar portion between each embodiment Point just to refer each other, and each embodiment focuses on the differences from other embodiments.Especially for device, For electronic equipment and storage medium embodiment, since it is substantially similar to the method embodiment, so fairly simple, the phase of description Place is closed referring to the part of embodiment of the method to illustrate.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the scope of the present invention.It is all Any modification, equivalent replacement, improvement and so within the spirit and principles in the present invention, are all contained in protection scope of the present invention It is interior.

Claims (10)

1. a kind of private key protection method of digital wallet, which is characterized in that the method includes:
Obtain the user behavior information for the private key safety for influencing digital wallet;
Using default safe class evaluation criteria and the user behavior information obtained, the safe class assessment of user behavior is obtained As a result;
Based on the safe class assessment result, security setting guidance information is obtained;
The security setting guidance information is shown, to guide the safety of the private key of user's raising digital wallet.
2. according to the method described in claim 1, it is characterized in that, the user for obtaining the private key safety for influencing digital wallet The step of behavioural information includes:
Questionnaire is preset in display;Wherein, being recorded in the default questionnaire has:Influence the pre- of the private key safety of digital wallet If user behavior information, and the corresponding tick boxes of each pre-set user behavioural information;When a pre-set user behavioural information pair When the tick boxes answered are selected, show that the pre-set user behavioural information is selected;
Obtain the Questionnaire results of the default questionnaire;
The pre-set user behavioural information that will be selected in the Questionnaire results, is determined as influencing the private key of the digital wallet The user behavior information of safety.
3. according to the method described in claim 2, it is characterized in that, the pre-set user behavioural information includes:It accessed high-risk The behavioural information of webpage, the opened behavioural information for taking viruliferous mail, by the behavioural information of screenshotss backup private key and only Using numerical ciphers as at least one in the behavioural information of assets payment cipher.
4. according to the method described in claim 3, it is characterized in that, it is described be based on the safe class assessment result, pacified The step of setting guidance information includes entirely:
Judge whether obtained safe class assessment result is low;
If so, determining the obtained corresponding security setting guidance information of user behavior information;
Wherein, when the user behavior information obtained includes:The behavioural information of high-risk webpage was accessed, and/or, opened carrying When the behavioural information of the mail of virus, identified security setting guidance information includes:Checking and killing virus prompting message;When being obtained User behavior information include:When by the behavioural information of screenshotss backup private key, identified security setting guidance information includes: Dispersion storage private key prompting message;When the user behavior information obtained includes:It is close as assets payment merely with numerical ciphers When the behavioural information of code, identified security setting guidance information includes:Using biological characteristic password as assets payment cipher Prompting message.
5. according to the method described in claim 1, it is characterized in that, described utilize is preset safe class evaluation criteria and is obtained User behavior information, the step of obtaining the safe class assessment result of user behavior, including:
Determine the quantity of obtained user behavior information;
Determine the quantitative range that the quantity is located in default safe class evaluation criteria;Wherein, described default safety etc. Grade evaluation criteria include:The correspondence of quantitative range and safe class;
The corresponding safe class of quantitative range that the quantity is located at is determined as the safe class assessment knot of user behavior Fruit.
6. a kind of private key protective device of digital wallet, which is characterized in that described device includes:
First obtains unit, the user behavior information for obtaining the private key safety for influencing digital wallet;
Second obtaining unit, for using the user behavior information preset safe class evaluation criteria and obtained, obtaining user The safe class assessment result of behavior;
Third obtaining unit obtains security setting guidance information for being based on the safe class assessment result;
Display unit, for showing the security setting guidance information, to guide the safety of the private key of user's raising digital wallet Property.
7. device according to claim 6, which is characterized in that the first obtains unit includes:
Subelement is shown, for showing default questionnaire;Wherein, being recorded in the default questionnaire has:Influence digital money The pre-set user behavioural information of the private key safety of packet, and the corresponding tick boxes of each pre-set user behavioural information;When one it is pre- If the corresponding tick boxes of user behavior information are selected, show that the pre-set user behavioural information is selected;
Obtain subelement, the Questionnaire results for obtaining the default questionnaire;
First determination subelement, the pre-set user behavioural information for will be selected in the Questionnaire results, is determined as shadow Ring the user behavior information of the private key safety of the digital wallet.
8. device according to claim 7, which is characterized in that the pre-set user behavioural information includes:It accessed high-risk The behavioural information of webpage, the opened behavioural information for taking viruliferous mail, by the behavioural information of screenshotss backup private key and only Using numerical ciphers as at least one in the behavioural information of assets payment cipher.
9. a kind of electronic equipment, which is characterized in that including processor, communication interface, memory and communication bus, wherein processing Device, communication interface, memory complete mutual communication by communication bus;
Memory, for storing computer program;
Processor when for executing the program stored on memory, realizes any method step in claim 1-5 Suddenly.
10. a kind of storage medium, which is characterized in that be stored with computer program, the computer program in the storage medium Any method and step in claim 1-5 is realized when being executed by processor.
CN201810145978.5A 2018-02-12 2018-02-12 Private key protection method and device for digital wallet, electronic equipment and storage medium Pending CN108346047A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201810145978.5A CN108346047A (en) 2018-02-12 2018-02-12 Private key protection method and device for digital wallet, electronic equipment and storage medium
PCT/CN2018/110222 WO2019153779A1 (en) 2018-02-12 2018-10-15 Private key protection method and apparatus for digital wallet, electronic device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810145978.5A CN108346047A (en) 2018-02-12 2018-02-12 Private key protection method and device for digital wallet, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN108346047A true CN108346047A (en) 2018-07-31

Family

ID=62959473

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810145978.5A Pending CN108346047A (en) 2018-02-12 2018-02-12 Private key protection method and device for digital wallet, electronic equipment and storage medium

Country Status (2)

Country Link
CN (1) CN108346047A (en)
WO (1) WO2019153779A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019153779A1 (en) * 2018-02-12 2019-08-15 北京金山安全软件有限公司 Private key protection method and apparatus for digital wallet, electronic device and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101131760A (en) * 2006-08-25 2008-02-27 阿里巴巴公司 Method and system for checking account security
CN105787732A (en) * 2016-02-22 2016-07-20 邓迪 Realization method of digital currency secure wallet, and secure wallet system
CN106548345A (en) * 2016-12-07 2017-03-29 北京信任度科技有限公司 The method and system of block chain private key protection are realized based on Secret splitting
US20170161738A1 (en) * 2015-08-31 2017-06-08 American Express Travel Related Services Company, Inc. Next expected session key
EP3200167A1 (en) * 2016-01-29 2017-08-02 Mastercard International Incorporated Information transaction infrastructure

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103020524B (en) * 2012-12-11 2015-08-05 北京奇虎科技有限公司 Computer virus supervisory system
CN103049695B (en) * 2012-12-11 2015-12-09 北京奇虎科技有限公司 A kind of method for supervising of computer virus and device
CN108346047A (en) * 2018-02-12 2018-07-31 北京金山安全软件有限公司 Private key protection method and device for digital wallet, electronic equipment and storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101131760A (en) * 2006-08-25 2008-02-27 阿里巴巴公司 Method and system for checking account security
US20170161738A1 (en) * 2015-08-31 2017-06-08 American Express Travel Related Services Company, Inc. Next expected session key
EP3200167A1 (en) * 2016-01-29 2017-08-02 Mastercard International Incorporated Information transaction infrastructure
CN105787732A (en) * 2016-02-22 2016-07-20 邓迪 Realization method of digital currency secure wallet, and secure wallet system
CN106548345A (en) * 2016-12-07 2017-03-29 北京信任度科技有限公司 The method and system of block chain private key protection are realized based on Secret splitting

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019153779A1 (en) * 2018-02-12 2019-08-15 北京金山安全软件有限公司 Private key protection method and apparatus for digital wallet, electronic device and storage medium

Also Published As

Publication number Publication date
WO2019153779A1 (en) 2019-08-15

Similar Documents

Publication Publication Date Title
CN108320154A (en) Digital wallet asset protection method and device, electronic equipment and storage medium
US10715515B2 (en) Generating code for a multimedia item
US7162456B2 (en) Method for private personal identification number management
CN106534572A (en) Information display method and device and terminal
CN104966199B (en) Data processing method, client and payment platform
Vasek et al. The bitcoin brain drain: Examining the use and abuse of bitcoin brain wallets
CN109670974A (en) A kind of risk monitoring and control method and device, electric terminal
CN102098315A (en) Secure login method, device and system for client
CN107085791A (en) A kind of electric paying method and terminal
CN108280647A (en) Private key protection method and device for digital wallet, electronic equipment and storage medium
WO2003104953A2 (en) Method and apparatus for protecting against side channel attacks on personal identification numbers
AU2018220785B8 (en) An apparatus, computer program and method
CN109272317A (en) Block chain private key obtaining method and device and electronic equipment
CN108346047A (en) Private key protection method and device for digital wallet, electronic equipment and storage medium
US7167843B2 (en) Apparatus for private personal identification number management
CA2961274C (en) Method of auto-detection of an attempted piracy of an electronic payment card, corresponding card, terminal and program
CN107944871A (en) Identity identifying method, device, computer equipment and computer-readable recording medium
CN106548351A (en) A kind of optimization method and terminal of fingerprint payment flow
Prem et al. Phishing and anti-phishing techniques
CN106778219A (en) A kind of cipher code protection method and terminal
CN102780686A (en) Credible resource based method and device for protecting bank user information
CN107889102A (en) The method and apparatus of information encryption and decryption in a kind of short message
CN106056378B (en) Electronic payment terminal method for anti-counterfeit and its system
CN109583233A (en) Data leak monitoring method and device
CN107844975A (en) Mobile terminal safety payment administrative system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180731

RJ01 Rejection of invention patent application after publication