Specific embodiment
Carry out the various exemplary embodiments of detailed description of the present invention now with reference to attached drawing.It should also be noted that unless in addition having
Body explanation, the unlimited system of component and the positioned opposite of step, numerical expression and the numerical value otherwise illustrated in these embodiments is originally
The range of invention.
Be to the description only actually of at least one exemplary embodiment below it is illustrative, never as to the present invention
And its application or any restrictions used.
Technology, method and apparatus known to person of ordinary skill in the relevant may be not discussed in detail, but suitable
In the case of, the technology, method and apparatus should be considered as part of specification.
It is shown here and discuss all examples in, any occurrence should be construed as merely illustratively, without
It is as limitation.Therefore, other examples of exemplary embodiment can have different values.
It should also be noted that similar label and letter indicate similar terms in following attached drawing, therefore, once a certain Xiang Yi
It is defined in a attached drawing, then in subsequent attached drawing does not need that it is further discussed.
The general plotting of the embodiment of the present invention is to provide a kind of new technology side's scheme for handling digital asset, can be with
Confidential information is solved according to acquired user and determines current assets tupe, is spoofing protection mode in assets tupe
When, it shows the camouflage digital asset information of user and is not responding to the assets processing operation of user's implementation, and mould is handled in assets
When formula is normal processing mode, show that the actual numbers assets information of user normally implements assets processing for user, so that user
User's solution confidential information can be provided and enter different assets tupes to handle assets, at itself according to itself current state
Actual numbers assets information can be hidden when handling precarious position by camouflage digital asset information, reduces loss of assets wind
Danger, the safety of effective protection digital asset.
<first embodiment>
In the present embodiment, a kind of processing method of digital asset is provided.Digital asset is that user can be by mobile whole
At assets service software (such as stored value card, Mobile banking) install or load in end, that assets processing service is provided
The assets of reason.Digital asset may include the digitized forms of the real assets such as real money, finance product, can also include example
Such as account integral, ideal money digitize equity.
As shown in Figure 1, the processing method of digital asset includes: step S2100-S2400.
Step S2100, the user for obtaining target user solve confidential information.
User solves confidential information is for verifying user whether can be by servicing the letters of relevant encryption measures to digital asset
Breath.In one example, user solves confidential information and includes at least clear crytpographic key information, decryption gesture information or decryption biological characteristic
Information.Clear crytpographic key information includes that can decrypt password password, multiple-enciphered or dynamic password of corresponding encryption measures etc..
Decryption gesture information is the gesture operation letter that can be decrypted corresponding encryption measures, be implemented on corresponding human-computer interaction interface
Breath.Decryption biological information is unique corresponding, relevant for decrypting corresponding encryption measures and biological characteristic to user
Information, decryption biological information can be the distinctive biological characteristic of user, for example, decryption biological information is included at least and used
One of family finger print information, human face image information can also include iris information, DNA information etc..
It in the present embodiment, can be by providing assets service software (such as the electronic money of digital asset processing service
Packet, Mobile banking etc.) on startup, decryption information input interface prompt user's input user's solution confidential information is provided and is decrypted,
Implement the input operation in decryption information input interface by user, obtains corresponding user and solve confidential information.For example, can lead to
It crosses decryption information input interface and receives text entry operation, the voice input operation, gesture slide or logical that user implements
Cross calling camera shooting user under required movement (such as blink, shake the head) human face image information, obtain corresponding use
Family solves confidential information.
Step S2200 solves confidential information according to user, determines current assets tupe.
In the present embodiment, assets tupe is the current mode for allowing user to handle digital asset, including camouflage is protected
Shield mode and normal processing mode.Different assets tupes corresponds to different user encryption measures, spoofing protection mode
Corresponding is the camouflage encryption measures of user, and it is the normal encryption measures of user that normal processing mode is corresponding.And the use obtained
Family solution confidential information can solve the user encryption measure that confidential information can be decrypted according to user for decrypting corresponding user encryption measure
Type, determine current assets tupe, enable user that can provide different user's decryption according to itself current state
Information enters different assets tupes and handles digital asset.
In a more specific example, step S2200 may include: step S2201-S2203.
Step S2201, triggering verifying user solve confidential information, determine that user solves the target encryption that confidential information decryption passes through and arranges
It applies.
In this example, the verifying that user solves confidential information can solve the concrete type of confidential information using correspondence according to user
Verifying means implement, be not specifically limited herein.The verification process that user solves confidential information can be by implementing setting for this example
The verifying device that standby triggering is locally located is implemented, or user can be solved confidential information be sent to the equipment establish connection,
The rear end equipment such as server implementation of decryption information authentication service is provided.It verifies user and solves confidential information, correspondence just can determine that use
Family solution confidential information decrypts the target encryption measures that can pass through.
Step S2202 determines current assets processing when target encryption measures are the camouflage encryption measures of target user
Mode is spoofing protection mode.
Step S2203 determines current assets processing when target encryption measures are the normal encryption measures of target user
Mode is normal processing mode.
The type that the user encryption measure that confidential information can be decrypted is solved by user, determines current assets tupe, enables
User can provide different user's solution confidential informations and enter different assets tupes to number according to itself current state
Assets are handled, and pointedly implement the protection to digital asset, are realized simply and more efficiently.
In another example, the processing method of the digital asset provided in the present embodiment can also include: step
S2010-S2030。
Step S2010 obtains the mode setting information of target user.
Mode setting information is information relevant to setting of the user to assets tupe.Mode setting information can wrap
The user encryption measure for including user setting under different assets tupes, for example including the normal encryption under normal processing mode
Camouflage encryption measures under measure and spoofing protection mode.User encryption measure includes encryption type, corresponding solution confidential information
Deng.The particular content for solving confidential information is corresponding with specific encryption type, and similar above-mentioned user decrypts the model that content can be supported
It encloses, this will not be repeated here.
It in this example, can be by providing assets service software (such as the electronic money of digital asset processing service
Packet, Mobile banking etc.) mode setting interface is provided, the assets tupe for prompting user setting different receives user and implements
Man-machine interactive operation on mode setting interface, the associative mode setting information of acquisition.For example, mode setting interface can be passed through
User setting camouflage encryption measures, digital asset camouflage information etc. are prompted, user is received and implements the behaviour on mode setting interface
Make, the mode setting information of corresponding spoofing protection mode is obtained, alternatively, can be by mode setting interface prompt user setting just
Normal encryption measures receive user and implement the operation on mode setting interface, obtain the mode setting of corresponding normal processing mode
Information.
Step S2020, when mode setting information includes the camouflage encryption measures of target user, triggering saves camouflage encryption
Measure, and it is corresponding with spoofing protection mode to record camouflage encryption measures.
In this example, the camouflage encryption measures of target user can be sent by implementing the equipment of this example
Give the equipment establish connection, rear end equipment (such as server) with data management function saves and record and camouflage
The corresponding relationship of protected mode;Either local storage device can also being triggered by the equipment, (caching, memory can be used for remembering
Record the file saved) the step of implementing above-mentioned preservation, record.
In a more specific example, mode setting information can also include that the camouflage digital asset of target user is believed
Breath.Camouflage digital asset information is the digital asset relevant information of the user of false camouflage, may include digital asset type,
The remaining sum etc. of every kind of digital asset.Camouflage digital asset information can be used for hiding the true digital asset of user.For example, nothing
Remaining sum by the true digital asset of user is how many, can be provided the number of user by setting camouflage digital asset information
The remaining sum of production be set as 0 or close to 0 fractional value, so as under spoofing protection mode directly show camouflage digital asset
When information, 0 will be set as or shown close to the digital asset remaining sum of 0 fractional value, another other people can not know user's
True digital asset.
In this example, step S2020 can also include:
Step S2021, when mode setting information includes the camouflage digital asset information of target user, triggering saves camouflage
Digital asset information, and it is corresponding with spoofing protection mode to record camouflage digital asset information.
In this example, after user setting can be prompted to pretend encryption measures in mode setting interface, continue to refresh
Interface prompt user setting pretends digital asset information, receives the corresponding man-machine interactive operation implemented of user, obtains corresponding camouflage
Digital asset information.User can meet the camouflage number of the digital asset protection demand of itself for spoofing protection mode setting
Assets information, such as digital asset information is pretended by setting, indicate that the digital asset of which type can be demonstrated, be demonstrated
The camouflage remaining sum of digital asset be how many etc., realize that camouflage number money can be arranged in user according to the demand personalization of itself
Information is produced, the digital asset protection demand of user is accurately met.
In this example, can by implementing the equipment of this example, by the camouflage encryption measures of target user and
Camouflage digital asset information be sent to together with the equipment establish connection, rear end equipment with data management function (such as
Server) save and record the corresponding relationship with spoofing protection mode;Or local storage can also be triggered by the equipment
The step of device (caching, memory or the file that can be used for recording preservation) implements above-mentioned preservation, record.
Step S2030 determines current assets processing when target encryption measures are the normal encryption measures of target user
Mode is normal processing mode.
In this example, the normal encryption measures of target user can be sent by implementing the equipment of this example
Give the equipment establish connection, rear end equipment (such as server) with data management function save and record with it is normal
The corresponding relationship of tupe;Either local storage device can also being triggered by the equipment, (caching, memory can be used for remembering
Record the file saved) the step of implementing above-mentioned preservation, record.
S2010-S2030 through the above steps can be correspondingly arranged difference by obtaining the mode setting information of user
The corresponding user encryption measure of assets tupe, enable user that can provide corresponding mode according to the individual demand of itself
Assets tupe is arranged in setting information, more precisely meets the assets process demand of user.
After the current assets tupe of determination, according to assets tupe respectively enter step S2300 or
S2400。
Step S2300 obtains the camouflage digital asset letter of target user when assets tupe is spoofing protection mode
Breath is shown, and is not responding to the digital asset processing operation of target user's implementation.
Spoofing protection mode is for pretending the true digital asset of user to protect the assets of digital asset to handle mould
Formula.
Camouflage digital asset information is the digital asset information of the non-genuine user of camouflage.Pretending digital asset information can
Be default configuration or according to above-mentioned steps S2020 it is pre-set by user, camouflage digital asset information can save
For directly reading in being locally stored of equipment for implementing the present embodiment, obtain from the equipment to the rear end equipment for establishing connection
(such as server) request.
It under spoofing protection mode, obtains camouflage digital asset information and is shown, to realize that hiding user really counts
Word assets information avoids being leaked to third party third party is enabled to be based on true digital asset information and causes using illegal hands such as stress
Section, obtains the assets of user, brings loss of assets to user;Meanwhile under spoofing protection mode, it is not responding to user itself implementation
Digital asset processing operation (including extraction, pay, transfer accounts, borrow or lend money, overdraw etc. operation relevant to processing digital asset),
Even if user can be enabled to implement digital asset processing operation in illegal means such as third-party stress, processing number can not be realized
Assets enable third party think that, there is no the value for implementing crime, realization is effectively protected digital asset.
In a more specific example, be not responding to target user implementation digital asset processing operation the step of can wrap
It includes:
Disable application function relevant to digital asset processing operation;
Alternatively, responding processing failure when receiving digital asset processing operation.
In this example, application function relevant to digital asset processing operation may include and digital asset handled
The relevant functions such as transfer accounts, pay, borrowing or lending money, overdrawing, extracting financial channel functions and network can also borrow including bank card etc.
Money function etc. may be implemented the digital asset processing operation that cannot respond to user's implementation, enable and using by disabling these application functions
Even if digital asset processing operation is implemented in illegal means such as third-party stress in family, processing digital asset can not be realized, enable
Third party thinks that, there is no the value for implementing crime, realization is effectively protected digital asset.
Alternatively, responding processing failure, such as receiving digital asset processing behaviour when receiving digital asset processing operation
Make, the failure cause of operation cannot be responded by directly returning to unavailable, applicating maintenance upgrading of network etc., be compared such as above-mentioned disabling and number
The mode of the relevant application function of word assets processing operation is realized more simple, efficient.
Step S2400 obtains the actual numbers assets letter of target user when assets tupe is normal processing mode
Breath is shown, and handles digital asset according to actual numbers assets information for target user.
Normal processing mode is that user is supported normally to handle the assets tupe of digital asset.
Actual numbers assets information is the relevant information of the true digital asset of user, may include the digital asset of user
Type, the true remaining sum of every kind of digital asset etc..
The actual numbers assets information for obtaining user in a normal, processing mode is shown, and user can be enabled to ensure to pacify
The digital asset of itself, the safety of effective protection digital asset are handled in full environment.
<processing unit of digital asset>
In the present embodiment, a kind of processing unit 3000 of digital asset is provided, as shown in Figure 2, comprising: acquisition of information list
Member 3100, pattern determining unit 3200, first processing units 3300 and the second processing unit 3400, for implementing the present embodiment
The processing method of the digital asset of middle offer, details are not described herein.
Information acquisition unit 3100, the user for obtaining target user solve confidential information.
Optionally, the user solves confidential information and includes at least clear crytpographic key information, decryption gesture information or decryption biology
One of characteristic information;The decryption biological information include at least user fingerprints information, human face image information wherein it
One.
Pattern determining unit 3200 determines current assets tupe for solving confidential information according to the user.
Optionally, the pattern determining unit 3200 is used for:
Triggering verifies the user and solves confidential information, determines that the user solves confidential information and decrypts the target encryption measures passed through;
When the target encryption measures are the camouflage encryption measures of the target user, current assets processing mould is determined
Formula is the spoofing protection mode;
When the target encryption measures are the normal encryption measures of the target user, current assets processing mould is determined
Formula is the normal processing mode.
First processing units 3300, for obtaining target user when the assets tupe is spoofing protection mode
Camouflage digital asset information be shown, and be not responding to the digital asset processing operation that the target user implements.
Optionally, the first processing units 3300 are also used to:
Disable application function relevant to the digital asset processing operation;
Alternatively, responding processing failure when receiving the digital asset processing operation.
The second processing unit 3400, for obtaining the target when the assets tupe is normal processing mode
The actual numbers assets information of user is shown, and handles number according to the actual numbers assets information for the target user
Assets.
Optionally, the processing unit 3000 of the digital asset further include:
For obtaining the device of the mode setting information of the target user;
When for including the camouflage encryption measures of the target user in the mode setting information, triggering saves the puppet
Encryption measures are filled, and record camouflage encryption measures device corresponding with the spoofing protection mode;
For when the mode setting information includes the normal encryption measures of the target user, triggering preservation to be described just
Normal encryption measures, and record user encryption measure device corresponding with the normal processing mode.
Optionally, the processing unit 3000 of the digital asset further include:
When for including the camouflage digital asset information of the target user in the mode setting information, triggering saves institute
The camouflage digital asset information of target user is stated, and it is corresponding with the spoofing protection mode to record the camouflage digital asset information
Device.
It will be appreciated by those skilled in the art that the processing unit 3000 of digital asset can be realized by various modes.
For example, can realize the processing unit 3000 of digital asset by instruction configuration processor.For example, instruction can be stored in
In ROM, and when starting the device, instruction is read in programming device to the processing unit for realizing digital asset from ROM
3000.For example, the processing unit 3000 of digital asset can be cured in dedicated devices (such as ASIC).Number can be provided
The processing unit 3000 of production is divided into mutually independent unit, or they can be merged to realization.The place of digital asset
Reason device 3000 can be realized by one of above-mentioned various implementations, or can pass through above-mentioned various implementations
In the combinations of two or more modes realize.
In the present embodiment, the processing unit 3000 of digital asset can be to provide digital asset processing service using soft
Part, small routine or system application etc., for example, it may be the stored value card of the preset installation of mobile phone operating system, can be from application
The Mobile banking etc. of platform downloading.
<processing equipment of digital asset>
Fig. 3 is the frame for showing the hardware configuration of processing equipment 4000 for the digital asset that the embodiment of the present invention may be implemented
Figure.
The processing equipment 4000 of digital asset can be the mobile terminals such as portable computer, mobile phone, tablet computer, can also be with
It is the electronic equipments such as desktop computer, central processor equipment.As shown in figure 3, the processing equipment 4000 of digital asset may include
Processor 4100, interface arrangement 4300, communication device 4400, display device 4500, input unit 4600, is raised memory 4200
Sound device 4700, microphone 4800 etc..Wherein, processor 4100 can be central processor CPU, Micro-processor MCV etc..Storage
Device 4200 is for example including ROM (read-only memory), RAM (random access memory), nonvolatile memory of hard disk etc..
Interface arrangement 4300 is for example including USB interface, earphone interface etc..Communication device 4400 is for example able to carry out wired or wireless logical
Letter specifically may include Wifi communication, Bluetooth communication, 2G/3G/4G/5G communication etc..Display device 4500 is, for example, liquid crystal
Display screen, touch display screen etc..Input unit 4600 is such as may include touch screen, keyboard, body-sensing input.User can pass through
4800 inputting/outputting voice information of loudspeaker 4700 and microphone.
The processing equipment 4000 of digital asset shown in Fig. 3 is merely illustrative and is in no way intended to the present embodiment
Application or any restrictions that use.Although showing multiple devices to the processing equipment of digital asset 4000 in Fig. 3,
It is that partial devices therein can be only related in the present embodiment, for example, the processing equipment 4000 of digital asset pertains only to processor
4100 and storage device 4200.
In a preferred example, the processing equipment 4000 of the digital asset of the present embodiment may include:
Display device 4500;
Memory 4200, for storing executable instruction;
Processor 4400 runs the processing equipment of the digital asset for the control according to the executable instruction
4000 execute the processing method of the digital asset as described in any one in the present embodiment.
Technical staff can disclosed conceptual design instruction according to the present invention.How control processor is operated for instruction,
This is it is known in the art that therefore being not described in detail herein.
In a specific example, the processing equipment 4000 of digital asset can be installation or load assets processing service
Application software, small routine or system application mobile phone.
<readable storage medium storing program for executing>
In the present embodiment, a kind of readable storage medium storing program for executing is also provided, readable storage medium storing program for executing, which is stored with, to be readable by a computer
And the computer program run, the computer program are used to execute such as the present embodiment when reading operation by the computer
The processing method of the digital asset.
Readable storage medium storing program for executing can be the tangible device that can keep and store the instruction used by instruction execution equipment.It can
Reading storage medium, which for example can be ,-- but is not limited to-- storage device electric, magnetic storage apparatus, light storage device, electromagnetism storage
Equipment, semiconductor memory apparatus or above-mentioned any appropriate combination.The more specific example of readable storage medium storing program for executing is (non exhaustive
List) include: that portable computer diskette, hard disk, random access memory (RAM), read-only memory (ROM), erasable type can
Program read-only memory (EPROM or flash memory), static random access memory (SRAM), Portable compressed disk read-only memory
(CD-ROM), digital versatile disc (DVD), memory stick, floppy disk, mechanical coding equipment, the punching for being for example stored thereon with instruction
Card or groove internal projection structure and above-mentioned any appropriate combination.Readable storage medium storing program for executing used herein above is not explained
For instantaneous signal itself, the electromagnetic wave of such as radio wave or other Free propagations is passed by waveguide or other transmission mediums
The electromagnetic wave (for example, the light pulse for passing through fiber optic cables) broadcast or the electric signal transmitted by electric wire.
<example>
The processing unit 3000 of the digital asset in the present embodiment is further illustrated below with reference to example as shown in Figure 4
Or the processing method of the digital asset of the implementation of processing equipment 4000 of digital asset.Assuming that this example is by as digital asset
Processing equipment 4000 electronic wallet device (being equipped with the equipment of stored value card) come what is implemented.
As shown in figure 4, the processing method of digital asset includes: step S201-208 and S301-S311.
S201, user open the mode setting interface that electronic wallet device provides.
Normal encryption measures are arranged by mode setting interface in S202, user.
S203, electronic wallet device saves normal encryption measures, and records corresponding with normal processing mode.
S204, electronic wallet device prompt user's normal processing mode are arranged successfully.
S205, user pass through mode setting interface setting camouflage encryption measures.
S206, user pass through mode setting interface setting camouflage digital asset information.
S207, electronic wallet device saves camouflage encryption measures and camouflage digital asset information, and records and protect with camouflage
Shield mode is corresponding.
S208, electronic wallet device prompt the success of user's spoofing protection mode setting.
S301, user start electronic wallet device.
S302, electronic wallet device provide decryption information input interface, prompt user to input user and solve confidential information.
S303, user input user and solve confidential information.
S304, electronic wallet device solves confidential information according to user and determines assets tupe, if assets tupe is
Normal processing mode enters step S305, and otherwise, assets tupe is spoofing protection mode, enters step S308.
S305, electronic wallet device unlock real estate interface, show the actual numbers assets information of the user of acquisition.
Real estate interface be provided by electronic wallet device, the people of actual numbers assets information for showing user
Machine interactive interface.
S306, user check actual numbers assets information, implement digital asset processing operation.
S307, electronic wallet device responding digital assets processing operation.
S308, electronic wallet device unlock camouflage assets interface, shows the pre-set camouflage digital asset information of user.
Camouflage assets interface is the people for pretending digital asset information provided by electronic wallet device, for showing user
Machine interactive interface.
S309, user or third party check camouflage digital asset information.
S310, user or third party implement digital asset processing operation.
S311, electronic wallet device prompt network operation, operation failure.
The specific implementation of above-mentioned steps can be with the corresponding steps in above-described embodiment, and details are not described herein.
In this example, user can be arranged different according to the personal settings demand of itself in electronic wallet device
Camouflage digital asset information under assets tupe under corresponding user encryption measure and spoofing protection mode, stored value card
The user that equipment can be inputted according to user solves confidential information, determines corresponding assets tupe, handles mould in different assets
Different digital asset information is shown under formula and takes corresponding treatment measures, enables user can be in unsafe use environment
(such as coercing by people) inputs corresponding user's solution confidential information and enters spoofing protection mode, and triggering stored value card shows camouflage number
Word assets information, and it is not responding to the digital asset processing operation that user or third party implement, avoid the digital asset of user from damaging
It loses, and user is under the use environment of safety, moreover it is possible to enter normal processing mode by providing user's solution confidential information, it is normal to handle
Digital asset effectively realizes the protection of digital asset.
It has been combined attached drawing above and example illustrates the digital asset processing method of the present embodiment, device, equipment and readable
Storage medium can solve confidential information according to acquired user and determine current assets tupe, be in assets tupe
When spoofing protection mode, shows the camouflage digital asset information of user and be not responding to the assets processing operation of user's implementation, and
When assets tupe is normal processing mode, show that the actual numbers assets information of user is normally implemented at assets for user
Reason allows user according to itself current state, provides corresponding user's solution confidential information and enter different assets tupes
Assets are handled, actual numbers assets letter can be hidden by camouflage digital asset information when itself handles precarious position
Breath reduces loss of assets risk, the safety of effective protection digital asset.
<second embodiment>
In the present embodiment, a kind of processing method of digital asset is provided.Digital asset is specifically defined for the first implementation
It is had been described in example, details are not described herein.
As shown in figure 5, the processing method of digital asset includes: step S3100-S3300.
S3100, according to the user of received target user solve confidential information, determining assets corresponding with user's solution confidential information
Tupe.
User solves confidential information is for verifying user whether can be by servicing the letters of relevant encryption measures to digital asset
Breath.In one example, user solves confidential information and includes at least clear crytpographic key information, decryption gesture information or decryption biological characteristic
Information.Clear crytpographic key information includes that can decrypt password password, multiple-enciphered or dynamic password of corresponding encryption measures etc..
Decryption gesture information is the gesture operation letter that can be decrypted corresponding encryption measures, be implemented on corresponding human-computer interaction interface
Breath.Decryption biological information is unique corresponding, relevant for decrypting corresponding encryption measures and biological characteristic to user
Information, decryption biological information can be the distinctive biological characteristic of user, for example, decryption biological information is included at least and used
One of family finger print information, human face image information can also include iris information, DNA information etc..
In the present embodiment, before user's solution confidential information can establish connection by the equipment for receiving with implementing the present embodiment
It is obtained in the message that end equipment (such as client etc.) is sent.
Assets tupe is the current mode for allowing user to handle digital asset, including spoofing protection mode and normal
Tupe.Different assets tupes corresponds to different user encryption measures, and received user solves confidential information for solving
Close corresponding user encryption measure can solve the user encryption measure that confidential information can be decrypted according to user, determine current assets
Tupe, in conjunction with subsequent step, corresponding offer camouflage digital asset information or actual numbers assets information are shown.
In one example, it is 3110-S3120 that step S3100, which may include: step,.
Step S3110 verifies user and solves confidential information, determines that user solves confidential information and decrypts the target encryption measures passed through.
Step S3120 determines current assets processing when target encryption measures are the camouflage encryption measures of target user
Mode is spoofing protection mode.
Step S3130 determines current assets processing when target encryption measures are the normal encryption measures of target user
Mode is normal processing mode.
In this example, the implementation of step S3110-S3130, can be similar to the step S2201- in first embodiment
S2203 is implemented, and details are not described herein.
It is verified by solving confidential information to received user, the user encryption that obtaining user's solution confidential information can decrypt is arranged
It applies, determines current assets tupe, can enable user that can provide different user's decryption according to itself current state
Information enters different assets tupes and handles digital asset, pointedly implements the protection to digital asset, real
Now simply and more efficiently.
In one example, the processing method of the digital asset in the present embodiment can also include: step S3010-
S3030。
S3010 receives the mode setting information of target user.
S3020 includes target user when pretending encryption measures in mode setting information, saves camouflage encryption measures, and
Record camouflage encryption measures are corresponding with spoofing protection mode.
S3030 saves normal encryption measures when mode setting information includes the normal encryption measures of target user, and
It is corresponding with normal processing mode to record normal encryption measures.
In this example, mode setting information is set by the front end that the equipment for receiving with implementing the present embodiment establishes connection
It is obtained in the message that standby (such as client etc.) sends, step S3010-S3030 can in addition to the acquisition source of mode setting information
Other than energy is different, other are referred to the implementation of the step S2020-S2030 in first embodiment, and details are not described herein.
In a more specific example, step S3020 can also include:
Step S3021 saves target user when mode setting information includes the camouflage digital asset information of target user
Camouflage digital asset information, and record camouflage digital asset information it is corresponding with spoofing protection mode.
In this example, the camouflage digital asset information and record for including in preservation mode setting information are protected with camouflage
Corresponding relationship between shield enables user that can meet the digital asset of itself for spoofing protection mode setting by progress
The camouflage digital asset information of protection demand, such as digital asset information is pretended by setting, indicate the number money of which type
Produce can be demonstrated, the camouflage remaining sum of digital asset that is demonstrated is how many etc., realization user can be according to itself demand
Personal settings pretend digital asset information, accurately meet the digital asset protection demand of user.
S3010-S3030 through the above steps can be correspondingly arranged not by the mode setting information of received user
The same corresponding user encryption measure of assets tupe enables user that can provide corresponding mould according to the individual demand of itself
Assets tupe is arranged in formula setting information, more precisely meets the assets process demand of user.
After step S3100, according to current assets tupe, S3200 or S3300 is respectively enterd.
S3200 provides target user corresponding with spoofing protection mode when assets tupe is spoofing protection mode
Camouflage digital asset information for show.
Spoofing protection mode is for pretending the true digital asset of user to protect the assets of digital asset to handle mould
Formula.
Camouflage digital asset information is the digital asset information of the non-genuine user of camouflage, may include that user setting exists
Type, the camouflage remaining sum of every kind of digital asset of the digital asset shown under camouflage figure pattern.In the present embodiment, Ke Yitong
Digital asset information will be pretended and is supplied to establish headend equipment (such as the client of connection with the equipment for implementing the present embodiment by crossing
Deng) show.
Under spoofing protection mode, camouflage digital asset information is provided and is shown, realizes that hiding user is really digital
Assets information avoids being leaked to third party third party is enabled to be based on true digital asset information and causes using illegal means such as stress
The assets for obtaining user, bring loss of assets to user.
S3300 provides the real estate information of target user when assets tupe is normal processing mode for exhibition
Show.
Normal processing mode is that user is supported normally to handle the assets tupe of digital asset.
Actual numbers assets information is the relevant information of the true digital asset of user, may include the digital asset of user
Type, the true remaining sum of every kind of digital asset etc..It in the present embodiment, can be by the way that actual numbers assets information be supplied to
The headend equipment (such as client etc.) of connection is established with the equipment for implementing the present embodiment to show.
The actual numbers assets information for providing user in a normal, processing mode is shown, and user can be enabled to ensure to pacify
The digital asset of itself, the safety of effective protection digital asset are handled in full environment.
<processing unit of digital asset>
In the present embodiment, a kind of processing unit 5000 of digital asset is provided, as shown in Figure 6, comprising: information processing list
Member 5100, the first information provide unit 5200 and the second information provider unit 5300, for implement to provide in the present embodiment
The processing method of digital asset, details are not described herein.
Information process unit 5100, for according to the user of received target user solve confidential information, it is determining to be solved with user
The corresponding assets tupe of confidential information.
Optionally, the information process unit 5100 is also used to:
It verifies the user and solves confidential information, determine that the user solves confidential information and decrypts the target encryption measures passed through;
When the target encryption measures are the camouflage encryption measures of the target user, current assets processing mould is determined
Formula is the spoofing protection mode;
When the target encryption measures are the normal encryption measures of the target user, current assets processing mould is determined
Formula is the normal processing mode.
The first information provides unit 5200, protects for providing when assets tupe is spoofing protection mode with camouflage
The camouflage digital asset information of the corresponding target user of shield mode is for displaying.
Second information provider unit 5300, for providing target user when assets tupe is normal processing mode
Real estate information for show.
Optionally, the processing unit 5000 of the digital asset further include:
For receiving the device of the mode setting information of the target user;
For including the target user in the camouflage encryption measures in the mode setting information, the puppet is saved
Encryption measures are filled, and record camouflage encryption measures device corresponding with the spoofing protection mode;
For when the mode setting information includes the normal encryption measures of the target user, save it is described normal plus
Close measure, and record normal encryption measures device corresponding with the normal processing mode.
Optionally, the processing unit 5000 of the digital asset further include:
When for including the camouflage digital asset information of the target user in the mode setting information, the mesh is saved
The camouflage digital asset information of user is marked, and records camouflage digital asset information dress corresponding with the spoofing protection mode
It sets.
It will be appreciated by those skilled in the art that the processing unit 5000 of digital asset can be realized by various modes.
For example, can realize the processing unit 5000 of digital asset by instruction configuration processor.For example, instruction can be stored in
In ROM, and when starting the device, instruction is read in programming device to the processing unit for realizing digital asset from ROM
5000.For example, the processing unit 5000 of digital asset can be cured in dedicated devices (such as ASIC).Number can be provided
The processing unit 5000 of production is divided into mutually independent unit, or they can be merged to realization.The place of digital asset
Reason device 5000 can be realized by one of above-mentioned various implementations, or can pass through above-mentioned various implementations
In the combinations of two or more modes realize.
In the present embodiment, the processing unit 5000 of digital asset can be to provide digital asset processing service using soft
The back-end services end of part, small routine or system application.
<processing equipment of digital asset>
Fig. 7 shows the frame that the hardware configuration of processing equipment 6000 of the digital asset of the embodiment of the present invention may be implemented
Figure.
The processing equipment 6000 of digital asset for example can be blade server, cloud server or server cluster
Deng.The processing equipment 6000 of digital asset can be as shown in fig. 7, comprises processor 6100, memory 6200, interface arrangement
6300, communication device 6400, display device 6500, input unit 6600.Although server also may include loudspeaker, microphone
Etc., still, these components are unrelated with the present embodiment, therefore omit herein.Wherein, processor 6100 for example can be central processing
Device CPU, Micro-processor MCV etc..Memory 6200 is for example including ROM (read-only memory), RAM (random access memory), all
The nonvolatile memory of such as hard disk.Interface arrangement 6300 is for example including USB interface, serial line interface etc..Communication device 6400
Such as it is able to carry out wired or wireless communication.Display device 6500 is, for example, liquid crystal display.Input unit 6600 for example can be with
Including touch screen, keyboard etc..
Times that server shown in Fig. 7 is merely illustrative and is in no way intended to the application to the present embodiment or uses
What is limited.Although showing multiple devices to the processing equipment of digital asset 6000 in Fig. 7, can be only related in the present embodiment
Partial devices therein, for example, the processing equipment 6000 of digital asset pertains only to processor 6100 and storage device 6200.
In a preferred example, the processing equipment 6000 of the digital asset of the present embodiment may include:
Memory 6200, for storing executable instruction;
Processor 6100 runs the processing equipment of the digital asset for the control according to the executable instruction
6000 execute the processing method of the digital asset as described in any one in the present embodiment.
Technical staff can disclosed conceptual design instruction according to the present invention.How control processor is operated for instruction,
This is it is known in the art that therefore being not described in detail herein.
In a specific example, the processing equipment 6000 of digital asset can be to provide assets processing service using soft
The server of the back-end services of part, small routine or system application.
<readable storage medium storing program for executing>
In the present embodiment, a kind of readable storage medium storing program for executing is also provided, readable storage medium storing program for executing, which is stored with, to be readable by a computer
And the computer program run, the computer program are used to execute such as the present embodiment when reading operation by the computer
The processing method of the digital asset.
Readable storage medium storing program for executing can be the tangible device that can keep and store the instruction used by instruction execution equipment.It can
Reading storage medium, which for example can be ,-- but is not limited to-- storage device electric, magnetic storage apparatus, light storage device, electromagnetism storage
Equipment, semiconductor memory apparatus or above-mentioned any appropriate combination.The more specific example of readable storage medium storing program for executing is (non exhaustive
List) include: that portable computer diskette, hard disk, random access memory (RAM), read-only memory (ROM), erasable type can
Program read-only memory (EPROM or flash memory), static random access memory (SRAM), Portable compressed disk read-only memory
(CD-ROM), digital versatile disc (DVD), memory stick, floppy disk, mechanical coding equipment, the punching for being for example stored thereon with instruction
Card or groove internal projection structure and above-mentioned any appropriate combination.Readable storage medium storing program for executing used herein above is not explained
For instantaneous signal itself, the electromagnetic wave of such as radio wave or other Free propagations is passed by waveguide or other transmission mediums
The electromagnetic wave (for example, the light pulse for passing through fiber optic cables) broadcast or the electric signal transmitted by electric wire.
The digital asset processing method, device, equipment and readable storage medium of Detailed description of the invention the present embodiment are had been combined above
Matter, can according to received user solve confidential information and determine current assets tupe, be that camouflage is protected in assets tupe
When shield mode, the camouflage digital asset information of user is provided for showing, and when assets tupe is normal processing mode,
The actual numbers assets information of user is provided for showing, allows user according to itself current state, corresponding user is provided
Solution confidential information enters different assets tupes to handle assets, can pass through camouflage number when itself handles precarious position
Assets information hides actual numbers assets information, reduces loss of assets risk, the safety of effective protection digital asset.
<3rd embodiment>
In the present embodiment, a kind of processing system 7000 of digital asset is provided, comprising:
Digital asset is provided in the processing unit 3000 and second embodiment of the digital asset provided in first embodiment
Processing unit 5000;
Alternatively,
Digital asset is provided in the processing equipment 4000 and second embodiment of the digital asset provided in second embodiment
Processing equipment 6000.
<example>
The number implemented below with reference to Fig. 8 processing system 7000 that digital asset in the present embodiment is further illustrated
The processing method of assets.
In this example, the processing equipment 4000 for the digital asset for including in the processing system 7000 of digital asset is electronic money
Packet headend equipment (or client of stored value card), the processing equipment 6000 of digital asset are stored value card rear end equipments
(or server of stored value card).
As shown in figure 8, the processing method of digital asset includes: step S401-S413 and S501-513.
Normal encryption measures are arranged by the mode setting interface that stored value card headend equipment provides in S401, user.
Normal encryption measures are sent to stored value card rear end equipment by S402, stored value card headend equipment.
S403, stored value card rear end equipment saves normal encryption measures, and records corresponding with normal processing mode.
S404, stored value card rear end equipment save successfully to the return of stored value card headend equipment.
S405, stored value card headend equipment prompt user's normal processing mode are arranged successfully.
S406, user pass through mode setting interface setting camouflage encryption measures.
The camouflage digital asset information of spoofing protection mode is arranged by mode setting interface by S407, user.
S408, stored value card headend equipment will pretend encryption measures and camouflage digital asset information is sent to stored value card
Rear end equipment.
S409, stored value card rear end equipment preservation camouflage encryption measures and camouflage digital asset information, and record and puppet
It is corresponding to fill protected mode.
S410, stored value card rear end equipment save successfully to the return of stored value card headend equipment.
S411, the success of stored value card sub-headend device prompts user's spoofing protection mode setting.
S501, user start stored value card headend equipment.
S502, stored value card headend equipment provide decryption information input interface, prompt user to input user and solve confidential information.
S503, user input user and solve confidential information.
User's solution confidential information is sent to stored value card rear end equipment by S504, stored value card headend equipment.
S505, stored value card rear end equipment user solves confidential information and determines assets tupe, if assets tupe is
Normal processing mode enters step S506, and otherwise, assets tupe is spoofing protection mode, enters step S509.
S506, stored value card rear end equipment provide actual numbers assets information to stored value card headend equipment.
S507, stored value card headend equipment unlock real estate interface, show the actual numbers assets letter of the user of acquisition
Breath.
Real estate interface be provided by electronic wallet device, the people of actual numbers assets information for showing user
Machine interactive interface.
S508, user check actual numbers assets information, implement digital asset processing operation.
S509, electronic wallet device responding digital assets processing operation.
S510, stored value card rear end equipment provide camouflage digital asset information to stored value card headend equipment.
S511, stored value card headend equipment unlock camouflage assets interface, shows the pre-set camouflage digital asset of user
Information.
Camouflage assets interface is the people for pretending digital asset information provided by electronic wallet device, for showing user
Machine interactive interface.
S512, user or third party check camouflage digital asset information.
S513, user or third party implement digital asset processing operation.
S514, stored value card headend equipment prompt network operation, operation failure.
The specific implementation of above-mentioned steps can be no longer superfluous herein with the corresponding steps in above-mentioned first or second embodiments
It states.
In this example, user can be arranged not according to the personal settings demand of itself by stored value card headend equipment
With assets tupe under camouflage digital asset information under corresponding user encryption measure and spoofing protection mode, by electricity
The rear end equipment of sub- wallet saves, and the user that stored value card headend equipment can be inputted according to user solves confidential information, is sent to electricity
The rear end equipment of sub- wallet determines corresponding assets tupe, corresponding to obtain number different under different assets tupes
Word assets information is shown, and takes corresponding treatment measures, enable user can in unsafe use environment (such as by people
Stress), it inputs corresponding user's solution confidential information and enters spoofing protection mode, triggering stored value card shows camouflage digital asset letter
Breath, and it is not responding to the digital asset processing operation that user or third party implement, avoid the digital asset of user from losing, and user
Under the use environment of safety, moreover it is possible to enter normal processing mode by providing user's solution confidential information, normally handles digital asset,
Effectively realize the protection of digital asset.
The present invention can be system, method and/or computer program product.Computer program product may include computer
Readable storage medium storing program for executing, containing for making processor realize the computer-readable program instructions of various aspects of the invention.
Computer readable storage medium, which can be, can keep and store the tangible of the instruction used by instruction execution equipment
Equipment.Computer readable storage medium for example can be-- but it is not limited to-- storage device electric, magnetic storage apparatus, optical storage
Equipment, electric magnetic storage apparatus, semiconductor memory apparatus or above-mentioned any appropriate combination.Computer readable storage medium
More specific example (non exhaustive list) includes: portable computer diskette, hard disk, random access memory (RAM), read-only deposits
It is reservoir (ROM), erasable programmable read only memory (EPROM or flash memory), static random access memory (SRAM), portable
Compact disk read-only memory (CD-ROM), digital versatile disc (DVD), memory stick, floppy disk, mechanical coding equipment, for example thereon
It is stored with punch card or groove internal projection structure and the above-mentioned any appropriate combination of instruction.Calculating used herein above
Machine readable storage medium storing program for executing is not interpreted that instantaneous signal itself, the electromagnetic wave of such as radio wave or other Free propagations lead to
It crosses the electromagnetic wave (for example, the light pulse for passing through fiber optic cables) of waveguide or the propagation of other transmission mediums or is transmitted by electric wire
Electric signal.
Computer-readable program instructions as described herein can be downloaded to from computer readable storage medium it is each calculate/
Processing equipment, or outer computer or outer is downloaded to by network, such as internet, local area network, wide area network and/or wireless network
Portion stores equipment.Network may include copper transmission cable, optical fiber transmission, wireless transmission, router, firewall, interchanger, gateway
Computer and/or Edge Server.Adapter or network interface in each calculating/processing equipment are received from network to be counted
Calculation machine readable program instructions, and the computer-readable program instructions are forwarded, for the meter being stored in each calculating/processing equipment
In calculation machine readable storage medium storing program for executing.
Computer program instructions for executing operation of the present invention can be assembly instruction, instruction set architecture (ISA) instructs,
Machine instruction, machine-dependent instructions, microcode, firmware instructions, condition setup data or with one or more programming languages
The source code or object code that any combination is write, the programming language include the programming language-of object-oriented such as
Smalltalk, C++ etc., and conventional procedural programming languages-such as " C " language or similar programming language.Computer
Readable program instructions can be executed fully on the user computer, partly execute on the user computer, be only as one
Vertical software package executes, part executes on the remote computer or completely in remote computer on the user computer for part
Or it is executed on server.In situations involving remote computers, remote computer can pass through network-packet of any kind
It includes local area network (LAN) or wide area network (WAN)-is connected to subscriber computer, or, it may be connected to outer computer (such as benefit
It is connected with ISP by internet).In some embodiments, by utilizing computer-readable program instructions
Status information carry out personalized customization electronic circuit, such as programmable logic circuit, field programmable gate array (FPGA) or can
Programmed logic array (PLA) (PLA), the electronic circuit can execute computer-readable program instructions, to realize each side of the invention
Face.
Referring herein to according to the method for the embodiment of the present invention, the flow chart of device (system) and computer program product and/
Or block diagram describes various aspects of the invention.It should be appreciated that flowchart and or block diagram each box and flow chart and/
Or in block diagram each box combination, can be realized by computer-readable program instructions.
These computer-readable program instructions can be supplied to general purpose computer, special purpose computer or other programmable datas
The processor of processing unit, so that a kind of machine is produced, so that these instructions are passing through computer or other programmable datas
When the processor of processing unit executes, function specified in one or more boxes in implementation flow chart and/or block diagram is produced
The device of energy/movement.These computer-readable program instructions can also be stored in a computer-readable storage medium, these refer to
It enables so that computer, programmable data processing unit and/or other equipment work in a specific way, thus, it is stored with instruction
Computer-readable medium then includes a manufacture comprising in one or more boxes in implementation flow chart and/or block diagram
The instruction of the various aspects of defined function action.
Computer-readable program instructions can also be loaded into computer, other programmable data processing units or other
In equipment, so that series of operation steps are executed in computer, other programmable data processing units or other equipment, to produce
Raw computer implemented process, so that executed in computer, other programmable data processing units or other equipment
Instruct function action specified in one or more boxes in implementation flow chart and/or block diagram.
The flow chart and block diagram in the drawings show the system of multiple embodiments according to the present invention, method and computer journeys
The architecture, function and operation in the cards of sequence product.In this regard, each box in flowchart or block diagram can generation
One module of table, program segment or a part of instruction, the module, program segment or a part of instruction include one or more use
The executable instruction of the logic function as defined in realizing.In some implementations as replacements, function marked in the box
It can occur in a different order than that indicated in the drawings.For example, two continuous boxes can actually be held substantially in parallel
Row, they can also be executed in the opposite order sometimes, and this depends on the function involved.It is also noted that block diagram and/or
The combination of each box in flow chart and the box in block diagram and or flow chart, can the function as defined in executing or dynamic
The dedicated hardware based system made is realized, or can be realized using a combination of dedicated hardware and computer instructions.It is right
For those skilled in the art it is well known that, by hardware mode realize, by software mode realize and pass through software and
It is all of equal value that the mode of combination of hardware, which is realized,.
Various embodiments of the present invention are described above, above description is exemplary, and non-exclusive, and
It is not limited to disclosed each embodiment.Without departing from the scope and spirit of illustrated each embodiment, for this skill
Many modifications and changes are obvious for the those of ordinary skill in art field.The selection of term used herein, purport
In principle, the practical application or to the technological improvement in market for best explaining each embodiment, or make the art its
Its those of ordinary skill can understand each embodiment disclosed herein.The scope of the present invention is defined by the appended claims.