CN110276604A - Processing method, device, equipment, system and the readable storage medium storing program for executing of digital asset - Google Patents

Processing method, device, equipment, system and the readable storage medium storing program for executing of digital asset Download PDF

Info

Publication number
CN110276604A
CN110276604A CN201910414611.3A CN201910414611A CN110276604A CN 110276604 A CN110276604 A CN 110276604A CN 201910414611 A CN201910414611 A CN 201910414611A CN 110276604 A CN110276604 A CN 110276604A
Authority
CN
China
Prior art keywords
digital asset
information
user
assets
processing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910414611.3A
Other languages
Chinese (zh)
Inventor
陈科杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Advantageous New Technologies Co Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201910414611.3A priority Critical patent/CN110276604A/en
Publication of CN110276604A publication Critical patent/CN110276604A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/06Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
    • G06Q20/065Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • G06Q20/367Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
    • G06Q20/3674Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes involving authentication

Abstract

The invention discloses a kind of processing method of digital asset, device, equipment, system and readable storage medium storing program for executing.This method comprises: the user for obtaining target user solves confidential information;Confidential information is solved according to user, determines current assets tupe;When assets tupe is spoofing protection mode, the camouflage digital asset information for obtaining target user is shown, and is not responding to the digital asset processing operation of target user's implementation;When assets tupe is normal processing mode, the actual numbers assets information for obtaining target user is shown, and handles digital asset according to actual numbers assets information for target user.

Description

Processing method, device, equipment, system and the readable storage medium storing program for executing of digital asset
Technical field
The present invention relates to digital asset technical field, more particularly, to a kind of processing method of digital asset, device, Equipment, system and readable storage medium storing program for executing.
Background technique
With mobile payment and the digitized development of financial service, more and more user's selections in mobile terminal by pacifying Dress or load, offer assets processing service assets service software (such as stored value card, Mobile banking), possess it or control The processing operations such as the assets of system are paid, transferred accounts, managed money matters, borrowed or lent money, asset management, these can pass through assets service by user Software records save and the assets operated are exactly digital asset.Digital asset may include real money, finance product etc. The digitized forms of real assets can also include the digitlization equity such as account integral, ideal money.
The assets service software that user is installed or loaded by mobile terminal realizes the various processing operations to digital asset, The mobile terminal for installing or being loaded with assets service software is equivalent to the mobile banking that user handles digital asset, is greatly promoted The convenience and efficiency of related service, but great challenge also is brought to Services-Security simultaneously.
At present to the digital asset handled based on mobile terminal, the assets service on mobile terminal is mainly passed through by user Software carries out user terminal encryption (including password encryption, gesture encryption, encrypting fingerprint, recognition of face etc.), in conjunction with assets service The business risk control strategy of the provider of software is protected come the safety measure realized.But in user by the external world Stress is when causing personal safety to be on the hazard while being plundered (such as user), and above-mentioned safety measure can be solved easily by user itself It removes, the convenience at this time based on mobile terminal processing digital asset can enable user largely provide in extreme time internal loss instead It produces.Therefore, how the digital asset of effective protection user, be a current problem to be solved.
Summary of the invention
It is an object of the present invention to provide a kind of for handling the new solution of digital asset.
According to the first aspect of the invention, a kind of processing method of digital asset is provided, comprising:
The user for obtaining target user solves confidential information;
Confidential information is solved according to the user, determines current assets tupe;
When the assets tupe is spoofing protection mode, the camouflage digital asset information for obtaining target user is carried out It shows, and is not responding to the digital asset processing operation that the target user implements;
When the assets tupe is normal processing mode, the actual numbers assets information of the target user is obtained It is shown, digital asset is handled according to the actual numbers assets information for the target user.
According to the second aspect of the invention, a kind of processing method of digital asset is provided, comprising:
According to the user of received target user solve confidential information, at determining assets corresponding with user solution confidential information Reason mode;
When the assets tupe is spoofing protection mode, target corresponding with the spoofing protection mode is provided and is used The camouflage digital asset information at family is for displaying;
When the assets tupe is normal processing mode, provide the real estate information of the target user for It shows.
According to the third aspect of the invention we, a kind of processing unit of digital asset is provided, comprising:
Information acquisition unit, the user for obtaining target user solve confidential information;
Pattern determining unit determines current assets tupe for solving confidential information according to the user;
First processing units, for obtaining the puppet of target user when the assets tupe is spoofing protection mode Dress digital asset information is shown, and is not responding to the digital asset processing operation that the target user implements;
The second processing unit, for obtaining the target user when the assets tupe is normal processing mode Actual numbers assets information be shown, for the target user according to the actual numbers assets information handle number money It produces.
According to the fourth aspect of the invention, a kind of processing unit of digital asset is provided, comprising:
Information process unit, for according to the user of received target user solve confidential information, it is determining to be solved with the user The corresponding assets tupe of confidential information;
The first information provides unit, for providing and the puppet when the assets tupe is spoofing protection mode The camouflage digital asset information of the corresponding target user of protected mode is filled for showing;
Second information provider unit, for providing the target when the assets tupe is normal processing mode The real estate information of user is for displaying.
According to the fifth aspect of the invention, a kind of processing equipment of digital asset is provided, comprising:
Display device;
Memory, for storing executable instruction;
Processor, for the control according to the executable instruction, the processing equipment for running the digital asset is executed The processing method of digital asset as described in any one of the first aspect of the present invention.
According to the sixth aspect of the invention, a kind of processing equipment of digital asset is provided, comprising:
Memory, for storing executable instruction;
Processor, for the control according to the executable instruction, the processing equipment for running the digital asset is executed The processing method of digital asset as described in any one of the second aspect of the present invention.
According to the seventh aspect of the invention, a kind of readable storage medium storing program for executing is provided, execution can be readable by a computer for storing Computer program, after the computer program is read by the computer, execute any one such as the first aspect of the present invention The processing method of digital asset described in, alternatively, executing the number money as described in any one of the second aspect of the present invention The processing method of production.
According to the eighth aspect of the invention, a kind of processing system of digital asset is provided, comprising:
The processing unit of digital asset as according to the third aspect of the invention and as according to the fourth aspect of the invention Digital asset processing unit;
Alternatively,
The processing equipment of digital asset as described in the fifth aspect of the present invention and as described in the sixth aspect of the present invention Digital asset processing equipment.
According to one embodiment of the disclosure, confidential information can be solved according to acquired user and determines that current assets are handled Mode shows the camouflage digital asset information of user and is not responding to user when assets tupe is spoofing protection mode The assets processing operation of implementation, and when assets tupe is normal processing mode, show the actual numbers assets letter of user Breath normally implements assets processing for user, allows user according to itself current state, provides user and solve confidential information into not With assets tupe handle assets, can be hidden by camouflage digital asset information when itself handles precarious position Actual numbers assets information reduces loss of assets risk, the safety of effective protection digital asset.
By referring to the drawings to the detailed description of exemplary embodiment of the present invention, other feature of the invention and its Advantage will become apparent.
Detailed description of the invention
It is combined in the description and the attached drawing for constituting part of specification shows the embodiment of the present invention, and even With its explanation together principle for explaining the present invention.
Fig. 1 shows the flow chart of the processing method of the digital asset of the first embodiment of the present invention.
Fig. 2 shows the block diagrams of the processing unit 3000 of the digital asset of the first embodiment of the present invention.
Fig. 3 is to show that the hardware of the processing equipment 4000 for the digital asset that can be used for realizing the first embodiment of the present invention is matched The block diagram for the example set.
Fig. 4 is the schematic diagram of the example of the processing method of the digital asset of the first embodiment of the present invention.
Fig. 5 shows the flow chart of the processing method of the digital asset of the second embodiment of the present invention.
Fig. 6 shows the block diagram of the processing unit 5000 of the digital asset of the second embodiment of the present invention.
Fig. 7 is to show that the hardware of the processing equipment 6000 for the digital asset that can be used for realizing the second embodiment of the present invention is matched The block diagram for the example set.
Fig. 8 is the schematic diagram of the example of the processing method of the digital asset of the third embodiment of the present invention.
Specific embodiment
Carry out the various exemplary embodiments of detailed description of the present invention now with reference to attached drawing.It should also be noted that unless in addition having Body explanation, the unlimited system of component and the positioned opposite of step, numerical expression and the numerical value otherwise illustrated in these embodiments is originally The range of invention.
Be to the description only actually of at least one exemplary embodiment below it is illustrative, never as to the present invention And its application or any restrictions used.
Technology, method and apparatus known to person of ordinary skill in the relevant may be not discussed in detail, but suitable In the case of, the technology, method and apparatus should be considered as part of specification.
It is shown here and discuss all examples in, any occurrence should be construed as merely illustratively, without It is as limitation.Therefore, other examples of exemplary embodiment can have different values.
It should also be noted that similar label and letter indicate similar terms in following attached drawing, therefore, once a certain Xiang Yi It is defined in a attached drawing, then in subsequent attached drawing does not need that it is further discussed.
The general plotting of the embodiment of the present invention is to provide a kind of new technology side's scheme for handling digital asset, can be with Confidential information is solved according to acquired user and determines current assets tupe, is spoofing protection mode in assets tupe When, it shows the camouflage digital asset information of user and is not responding to the assets processing operation of user's implementation, and mould is handled in assets When formula is normal processing mode, show that the actual numbers assets information of user normally implements assets processing for user, so that user User's solution confidential information can be provided and enter different assets tupes to handle assets, at itself according to itself current state Actual numbers assets information can be hidden when handling precarious position by camouflage digital asset information, reduces loss of assets wind Danger, the safety of effective protection digital asset.
<first embodiment>
In the present embodiment, a kind of processing method of digital asset is provided.Digital asset is that user can be by mobile whole At assets service software (such as stored value card, Mobile banking) install or load in end, that assets processing service is provided The assets of reason.Digital asset may include the digitized forms of the real assets such as real money, finance product, can also include example Such as account integral, ideal money digitize equity.
As shown in Figure 1, the processing method of digital asset includes: step S2100-S2400.
Step S2100, the user for obtaining target user solve confidential information.
User solves confidential information is for verifying user whether can be by servicing the letters of relevant encryption measures to digital asset Breath.In one example, user solves confidential information and includes at least clear crytpographic key information, decryption gesture information or decryption biological characteristic Information.Clear crytpographic key information includes that can decrypt password password, multiple-enciphered or dynamic password of corresponding encryption measures etc.. Decryption gesture information is the gesture operation letter that can be decrypted corresponding encryption measures, be implemented on corresponding human-computer interaction interface Breath.Decryption biological information is unique corresponding, relevant for decrypting corresponding encryption measures and biological characteristic to user Information, decryption biological information can be the distinctive biological characteristic of user, for example, decryption biological information is included at least and used One of family finger print information, human face image information can also include iris information, DNA information etc..
It in the present embodiment, can be by providing assets service software (such as the electronic money of digital asset processing service Packet, Mobile banking etc.) on startup, decryption information input interface prompt user's input user's solution confidential information is provided and is decrypted, Implement the input operation in decryption information input interface by user, obtains corresponding user and solve confidential information.For example, can lead to It crosses decryption information input interface and receives text entry operation, the voice input operation, gesture slide or logical that user implements Cross calling camera shooting user under required movement (such as blink, shake the head) human face image information, obtain corresponding use Family solves confidential information.
Step S2200 solves confidential information according to user, determines current assets tupe.
In the present embodiment, assets tupe is the current mode for allowing user to handle digital asset, including camouflage is protected Shield mode and normal processing mode.Different assets tupes corresponds to different user encryption measures, spoofing protection mode Corresponding is the camouflage encryption measures of user, and it is the normal encryption measures of user that normal processing mode is corresponding.And the use obtained Family solution confidential information can solve the user encryption measure that confidential information can be decrypted according to user for decrypting corresponding user encryption measure Type, determine current assets tupe, enable user that can provide different user's decryption according to itself current state Information enters different assets tupes and handles digital asset.
In a more specific example, step S2200 may include: step S2201-S2203.
Step S2201, triggering verifying user solve confidential information, determine that user solves the target encryption that confidential information decryption passes through and arranges It applies.
In this example, the verifying that user solves confidential information can solve the concrete type of confidential information using correspondence according to user Verifying means implement, be not specifically limited herein.The verification process that user solves confidential information can be by implementing setting for this example The verifying device that standby triggering is locally located is implemented, or user can be solved confidential information be sent to the equipment establish connection, The rear end equipment such as server implementation of decryption information authentication service is provided.It verifies user and solves confidential information, correspondence just can determine that use Family solution confidential information decrypts the target encryption measures that can pass through.
Step S2202 determines current assets processing when target encryption measures are the camouflage encryption measures of target user Mode is spoofing protection mode.
Step S2203 determines current assets processing when target encryption measures are the normal encryption measures of target user Mode is normal processing mode.
The type that the user encryption measure that confidential information can be decrypted is solved by user, determines current assets tupe, enables User can provide different user's solution confidential informations and enter different assets tupes to number according to itself current state Assets are handled, and pointedly implement the protection to digital asset, are realized simply and more efficiently.
In another example, the processing method of the digital asset provided in the present embodiment can also include: step S2010-S2030。
Step S2010 obtains the mode setting information of target user.
Mode setting information is information relevant to setting of the user to assets tupe.Mode setting information can wrap The user encryption measure for including user setting under different assets tupes, for example including the normal encryption under normal processing mode Camouflage encryption measures under measure and spoofing protection mode.User encryption measure includes encryption type, corresponding solution confidential information Deng.The particular content for solving confidential information is corresponding with specific encryption type, and similar above-mentioned user decrypts the model that content can be supported It encloses, this will not be repeated here.
It in this example, can be by providing assets service software (such as the electronic money of digital asset processing service Packet, Mobile banking etc.) mode setting interface is provided, the assets tupe for prompting user setting different receives user and implements Man-machine interactive operation on mode setting interface, the associative mode setting information of acquisition.For example, mode setting interface can be passed through User setting camouflage encryption measures, digital asset camouflage information etc. are prompted, user is received and implements the behaviour on mode setting interface Make, the mode setting information of corresponding spoofing protection mode is obtained, alternatively, can be by mode setting interface prompt user setting just Normal encryption measures receive user and implement the operation on mode setting interface, obtain the mode setting of corresponding normal processing mode Information.
Step S2020, when mode setting information includes the camouflage encryption measures of target user, triggering saves camouflage encryption Measure, and it is corresponding with spoofing protection mode to record camouflage encryption measures.
In this example, the camouflage encryption measures of target user can be sent by implementing the equipment of this example Give the equipment establish connection, rear end equipment (such as server) with data management function saves and record and camouflage The corresponding relationship of protected mode;Either local storage device can also being triggered by the equipment, (caching, memory can be used for remembering Record the file saved) the step of implementing above-mentioned preservation, record.
In a more specific example, mode setting information can also include that the camouflage digital asset of target user is believed Breath.Camouflage digital asset information is the digital asset relevant information of the user of false camouflage, may include digital asset type, The remaining sum etc. of every kind of digital asset.Camouflage digital asset information can be used for hiding the true digital asset of user.For example, nothing Remaining sum by the true digital asset of user is how many, can be provided the number of user by setting camouflage digital asset information The remaining sum of production be set as 0 or close to 0 fractional value, so as under spoofing protection mode directly show camouflage digital asset When information, 0 will be set as or shown close to the digital asset remaining sum of 0 fractional value, another other people can not know user's True digital asset.
In this example, step S2020 can also include:
Step S2021, when mode setting information includes the camouflage digital asset information of target user, triggering saves camouflage Digital asset information, and it is corresponding with spoofing protection mode to record camouflage digital asset information.
In this example, after user setting can be prompted to pretend encryption measures in mode setting interface, continue to refresh Interface prompt user setting pretends digital asset information, receives the corresponding man-machine interactive operation implemented of user, obtains corresponding camouflage Digital asset information.User can meet the camouflage number of the digital asset protection demand of itself for spoofing protection mode setting Assets information, such as digital asset information is pretended by setting, indicate that the digital asset of which type can be demonstrated, be demonstrated The camouflage remaining sum of digital asset be how many etc., realize that camouflage number money can be arranged in user according to the demand personalization of itself Information is produced, the digital asset protection demand of user is accurately met.
In this example, can by implementing the equipment of this example, by the camouflage encryption measures of target user and Camouflage digital asset information be sent to together with the equipment establish connection, rear end equipment with data management function (such as Server) save and record the corresponding relationship with spoofing protection mode;Or local storage can also be triggered by the equipment The step of device (caching, memory or the file that can be used for recording preservation) implements above-mentioned preservation, record.
Step S2030 determines current assets processing when target encryption measures are the normal encryption measures of target user Mode is normal processing mode.
In this example, the normal encryption measures of target user can be sent by implementing the equipment of this example Give the equipment establish connection, rear end equipment (such as server) with data management function save and record with it is normal The corresponding relationship of tupe;Either local storage device can also being triggered by the equipment, (caching, memory can be used for remembering Record the file saved) the step of implementing above-mentioned preservation, record.
S2010-S2030 through the above steps can be correspondingly arranged difference by obtaining the mode setting information of user The corresponding user encryption measure of assets tupe, enable user that can provide corresponding mode according to the individual demand of itself Assets tupe is arranged in setting information, more precisely meets the assets process demand of user.
After the current assets tupe of determination, according to assets tupe respectively enter step S2300 or S2400。
Step S2300 obtains the camouflage digital asset letter of target user when assets tupe is spoofing protection mode Breath is shown, and is not responding to the digital asset processing operation of target user's implementation.
Spoofing protection mode is for pretending the true digital asset of user to protect the assets of digital asset to handle mould Formula.
Camouflage digital asset information is the digital asset information of the non-genuine user of camouflage.Pretending digital asset information can Be default configuration or according to above-mentioned steps S2020 it is pre-set by user, camouflage digital asset information can save For directly reading in being locally stored of equipment for implementing the present embodiment, obtain from the equipment to the rear end equipment for establishing connection (such as server) request.
It under spoofing protection mode, obtains camouflage digital asset information and is shown, to realize that hiding user really counts Word assets information avoids being leaked to third party third party is enabled to be based on true digital asset information and causes using illegal hands such as stress Section, obtains the assets of user, brings loss of assets to user;Meanwhile under spoofing protection mode, it is not responding to user itself implementation Digital asset processing operation (including extraction, pay, transfer accounts, borrow or lend money, overdraw etc. operation relevant to processing digital asset), Even if user can be enabled to implement digital asset processing operation in illegal means such as third-party stress, processing number can not be realized Assets enable third party think that, there is no the value for implementing crime, realization is effectively protected digital asset.
In a more specific example, be not responding to target user implementation digital asset processing operation the step of can wrap It includes:
Disable application function relevant to digital asset processing operation;
Alternatively, responding processing failure when receiving digital asset processing operation.
In this example, application function relevant to digital asset processing operation may include and digital asset handled The relevant functions such as transfer accounts, pay, borrowing or lending money, overdrawing, extracting financial channel functions and network can also borrow including bank card etc. Money function etc. may be implemented the digital asset processing operation that cannot respond to user's implementation, enable and using by disabling these application functions Even if digital asset processing operation is implemented in illegal means such as third-party stress in family, processing digital asset can not be realized, enable Third party thinks that, there is no the value for implementing crime, realization is effectively protected digital asset.
Alternatively, responding processing failure, such as receiving digital asset processing behaviour when receiving digital asset processing operation Make, the failure cause of operation cannot be responded by directly returning to unavailable, applicating maintenance upgrading of network etc., be compared such as above-mentioned disabling and number The mode of the relevant application function of word assets processing operation is realized more simple, efficient.
Step S2400 obtains the actual numbers assets letter of target user when assets tupe is normal processing mode Breath is shown, and handles digital asset according to actual numbers assets information for target user.
Normal processing mode is that user is supported normally to handle the assets tupe of digital asset.
Actual numbers assets information is the relevant information of the true digital asset of user, may include the digital asset of user Type, the true remaining sum of every kind of digital asset etc..
The actual numbers assets information for obtaining user in a normal, processing mode is shown, and user can be enabled to ensure to pacify The digital asset of itself, the safety of effective protection digital asset are handled in full environment.
<processing unit of digital asset>
In the present embodiment, a kind of processing unit 3000 of digital asset is provided, as shown in Figure 2, comprising: acquisition of information list Member 3100, pattern determining unit 3200, first processing units 3300 and the second processing unit 3400, for implementing the present embodiment The processing method of the digital asset of middle offer, details are not described herein.
Information acquisition unit 3100, the user for obtaining target user solve confidential information.
Optionally, the user solves confidential information and includes at least clear crytpographic key information, decryption gesture information or decryption biology One of characteristic information;The decryption biological information include at least user fingerprints information, human face image information wherein it One.
Pattern determining unit 3200 determines current assets tupe for solving confidential information according to the user.
Optionally, the pattern determining unit 3200 is used for:
Triggering verifies the user and solves confidential information, determines that the user solves confidential information and decrypts the target encryption measures passed through;
When the target encryption measures are the camouflage encryption measures of the target user, current assets processing mould is determined Formula is the spoofing protection mode;
When the target encryption measures are the normal encryption measures of the target user, current assets processing mould is determined Formula is the normal processing mode.
First processing units 3300, for obtaining target user when the assets tupe is spoofing protection mode Camouflage digital asset information be shown, and be not responding to the digital asset processing operation that the target user implements.
Optionally, the first processing units 3300 are also used to:
Disable application function relevant to the digital asset processing operation;
Alternatively, responding processing failure when receiving the digital asset processing operation.
The second processing unit 3400, for obtaining the target when the assets tupe is normal processing mode The actual numbers assets information of user is shown, and handles number according to the actual numbers assets information for the target user Assets.
Optionally, the processing unit 3000 of the digital asset further include:
For obtaining the device of the mode setting information of the target user;
When for including the camouflage encryption measures of the target user in the mode setting information, triggering saves the puppet Encryption measures are filled, and record camouflage encryption measures device corresponding with the spoofing protection mode;
For when the mode setting information includes the normal encryption measures of the target user, triggering preservation to be described just Normal encryption measures, and record user encryption measure device corresponding with the normal processing mode.
Optionally, the processing unit 3000 of the digital asset further include:
When for including the camouflage digital asset information of the target user in the mode setting information, triggering saves institute The camouflage digital asset information of target user is stated, and it is corresponding with the spoofing protection mode to record the camouflage digital asset information Device.
It will be appreciated by those skilled in the art that the processing unit 3000 of digital asset can be realized by various modes. For example, can realize the processing unit 3000 of digital asset by instruction configuration processor.For example, instruction can be stored in In ROM, and when starting the device, instruction is read in programming device to the processing unit for realizing digital asset from ROM 3000.For example, the processing unit 3000 of digital asset can be cured in dedicated devices (such as ASIC).Number can be provided The processing unit 3000 of production is divided into mutually independent unit, or they can be merged to realization.The place of digital asset Reason device 3000 can be realized by one of above-mentioned various implementations, or can pass through above-mentioned various implementations In the combinations of two or more modes realize.
In the present embodiment, the processing unit 3000 of digital asset can be to provide digital asset processing service using soft Part, small routine or system application etc., for example, it may be the stored value card of the preset installation of mobile phone operating system, can be from application The Mobile banking etc. of platform downloading.
<processing equipment of digital asset>
Fig. 3 is the frame for showing the hardware configuration of processing equipment 4000 for the digital asset that the embodiment of the present invention may be implemented Figure.
The processing equipment 4000 of digital asset can be the mobile terminals such as portable computer, mobile phone, tablet computer, can also be with It is the electronic equipments such as desktop computer, central processor equipment.As shown in figure 3, the processing equipment 4000 of digital asset may include Processor 4100, interface arrangement 4300, communication device 4400, display device 4500, input unit 4600, is raised memory 4200 Sound device 4700, microphone 4800 etc..Wherein, processor 4100 can be central processor CPU, Micro-processor MCV etc..Storage Device 4200 is for example including ROM (read-only memory), RAM (random access memory), nonvolatile memory of hard disk etc.. Interface arrangement 4300 is for example including USB interface, earphone interface etc..Communication device 4400 is for example able to carry out wired or wireless logical Letter specifically may include Wifi communication, Bluetooth communication, 2G/3G/4G/5G communication etc..Display device 4500 is, for example, liquid crystal Display screen, touch display screen etc..Input unit 4600 is such as may include touch screen, keyboard, body-sensing input.User can pass through 4800 inputting/outputting voice information of loudspeaker 4700 and microphone.
The processing equipment 4000 of digital asset shown in Fig. 3 is merely illustrative and is in no way intended to the present embodiment Application or any restrictions that use.Although showing multiple devices to the processing equipment of digital asset 4000 in Fig. 3, It is that partial devices therein can be only related in the present embodiment, for example, the processing equipment 4000 of digital asset pertains only to processor 4100 and storage device 4200.
In a preferred example, the processing equipment 4000 of the digital asset of the present embodiment may include:
Display device 4500;
Memory 4200, for storing executable instruction;
Processor 4400 runs the processing equipment of the digital asset for the control according to the executable instruction 4000 execute the processing method of the digital asset as described in any one in the present embodiment.
Technical staff can disclosed conceptual design instruction according to the present invention.How control processor is operated for instruction, This is it is known in the art that therefore being not described in detail herein.
In a specific example, the processing equipment 4000 of digital asset can be installation or load assets processing service Application software, small routine or system application mobile phone.
<readable storage medium storing program for executing>
In the present embodiment, a kind of readable storage medium storing program for executing is also provided, readable storage medium storing program for executing, which is stored with, to be readable by a computer And the computer program run, the computer program are used to execute such as the present embodiment when reading operation by the computer The processing method of the digital asset.
Readable storage medium storing program for executing can be the tangible device that can keep and store the instruction used by instruction execution equipment.It can Reading storage medium, which for example can be ,-- but is not limited to-- storage device electric, magnetic storage apparatus, light storage device, electromagnetism storage Equipment, semiconductor memory apparatus or above-mentioned any appropriate combination.The more specific example of readable storage medium storing program for executing is (non exhaustive List) include: that portable computer diskette, hard disk, random access memory (RAM), read-only memory (ROM), erasable type can Program read-only memory (EPROM or flash memory), static random access memory (SRAM), Portable compressed disk read-only memory (CD-ROM), digital versatile disc (DVD), memory stick, floppy disk, mechanical coding equipment, the punching for being for example stored thereon with instruction Card or groove internal projection structure and above-mentioned any appropriate combination.Readable storage medium storing program for executing used herein above is not explained For instantaneous signal itself, the electromagnetic wave of such as radio wave or other Free propagations is passed by waveguide or other transmission mediums The electromagnetic wave (for example, the light pulse for passing through fiber optic cables) broadcast or the electric signal transmitted by electric wire.
<example>
The processing unit 3000 of the digital asset in the present embodiment is further illustrated below with reference to example as shown in Figure 4 Or the processing method of the digital asset of the implementation of processing equipment 4000 of digital asset.Assuming that this example is by as digital asset Processing equipment 4000 electronic wallet device (being equipped with the equipment of stored value card) come what is implemented.
As shown in figure 4, the processing method of digital asset includes: step S201-208 and S301-S311.
S201, user open the mode setting interface that electronic wallet device provides.
Normal encryption measures are arranged by mode setting interface in S202, user.
S203, electronic wallet device saves normal encryption measures, and records corresponding with normal processing mode.
S204, electronic wallet device prompt user's normal processing mode are arranged successfully.
S205, user pass through mode setting interface setting camouflage encryption measures.
S206, user pass through mode setting interface setting camouflage digital asset information.
S207, electronic wallet device saves camouflage encryption measures and camouflage digital asset information, and records and protect with camouflage Shield mode is corresponding.
S208, electronic wallet device prompt the success of user's spoofing protection mode setting.
S301, user start electronic wallet device.
S302, electronic wallet device provide decryption information input interface, prompt user to input user and solve confidential information.
S303, user input user and solve confidential information.
S304, electronic wallet device solves confidential information according to user and determines assets tupe, if assets tupe is Normal processing mode enters step S305, and otherwise, assets tupe is spoofing protection mode, enters step S308.
S305, electronic wallet device unlock real estate interface, show the actual numbers assets information of the user of acquisition.
Real estate interface be provided by electronic wallet device, the people of actual numbers assets information for showing user Machine interactive interface.
S306, user check actual numbers assets information, implement digital asset processing operation.
S307, electronic wallet device responding digital assets processing operation.
S308, electronic wallet device unlock camouflage assets interface, shows the pre-set camouflage digital asset information of user.
Camouflage assets interface is the people for pretending digital asset information provided by electronic wallet device, for showing user Machine interactive interface.
S309, user or third party check camouflage digital asset information.
S310, user or third party implement digital asset processing operation.
S311, electronic wallet device prompt network operation, operation failure.
The specific implementation of above-mentioned steps can be with the corresponding steps in above-described embodiment, and details are not described herein.
In this example, user can be arranged different according to the personal settings demand of itself in electronic wallet device Camouflage digital asset information under assets tupe under corresponding user encryption measure and spoofing protection mode, stored value card The user that equipment can be inputted according to user solves confidential information, determines corresponding assets tupe, handles mould in different assets Different digital asset information is shown under formula and takes corresponding treatment measures, enables user can be in unsafe use environment (such as coercing by people) inputs corresponding user's solution confidential information and enters spoofing protection mode, and triggering stored value card shows camouflage number Word assets information, and it is not responding to the digital asset processing operation that user or third party implement, avoid the digital asset of user from damaging It loses, and user is under the use environment of safety, moreover it is possible to enter normal processing mode by providing user's solution confidential information, it is normal to handle Digital asset effectively realizes the protection of digital asset.
It has been combined attached drawing above and example illustrates the digital asset processing method of the present embodiment, device, equipment and readable Storage medium can solve confidential information according to acquired user and determine current assets tupe, be in assets tupe When spoofing protection mode, shows the camouflage digital asset information of user and be not responding to the assets processing operation of user's implementation, and When assets tupe is normal processing mode, show that the actual numbers assets information of user is normally implemented at assets for user Reason allows user according to itself current state, provides corresponding user's solution confidential information and enter different assets tupes Assets are handled, actual numbers assets letter can be hidden by camouflage digital asset information when itself handles precarious position Breath reduces loss of assets risk, the safety of effective protection digital asset.
<second embodiment>
In the present embodiment, a kind of processing method of digital asset is provided.Digital asset is specifically defined for the first implementation It is had been described in example, details are not described herein.
As shown in figure 5, the processing method of digital asset includes: step S3100-S3300.
S3100, according to the user of received target user solve confidential information, determining assets corresponding with user's solution confidential information Tupe.
User solves confidential information is for verifying user whether can be by servicing the letters of relevant encryption measures to digital asset Breath.In one example, user solves confidential information and includes at least clear crytpographic key information, decryption gesture information or decryption biological characteristic Information.Clear crytpographic key information includes that can decrypt password password, multiple-enciphered or dynamic password of corresponding encryption measures etc.. Decryption gesture information is the gesture operation letter that can be decrypted corresponding encryption measures, be implemented on corresponding human-computer interaction interface Breath.Decryption biological information is unique corresponding, relevant for decrypting corresponding encryption measures and biological characteristic to user Information, decryption biological information can be the distinctive biological characteristic of user, for example, decryption biological information is included at least and used One of family finger print information, human face image information can also include iris information, DNA information etc..
In the present embodiment, before user's solution confidential information can establish connection by the equipment for receiving with implementing the present embodiment It is obtained in the message that end equipment (such as client etc.) is sent.
Assets tupe is the current mode for allowing user to handle digital asset, including spoofing protection mode and normal Tupe.Different assets tupes corresponds to different user encryption measures, and received user solves confidential information for solving Close corresponding user encryption measure can solve the user encryption measure that confidential information can be decrypted according to user, determine current assets Tupe, in conjunction with subsequent step, corresponding offer camouflage digital asset information or actual numbers assets information are shown.
In one example, it is 3110-S3120 that step S3100, which may include: step,.
Step S3110 verifies user and solves confidential information, determines that user solves confidential information and decrypts the target encryption measures passed through.
Step S3120 determines current assets processing when target encryption measures are the camouflage encryption measures of target user Mode is spoofing protection mode.
Step S3130 determines current assets processing when target encryption measures are the normal encryption measures of target user Mode is normal processing mode.
In this example, the implementation of step S3110-S3130, can be similar to the step S2201- in first embodiment S2203 is implemented, and details are not described herein.
It is verified by solving confidential information to received user, the user encryption that obtaining user's solution confidential information can decrypt is arranged It applies, determines current assets tupe, can enable user that can provide different user's decryption according to itself current state Information enters different assets tupes and handles digital asset, pointedly implements the protection to digital asset, real Now simply and more efficiently.
In one example, the processing method of the digital asset in the present embodiment can also include: step S3010- S3030。
S3010 receives the mode setting information of target user.
S3020 includes target user when pretending encryption measures in mode setting information, saves camouflage encryption measures, and Record camouflage encryption measures are corresponding with spoofing protection mode.
S3030 saves normal encryption measures when mode setting information includes the normal encryption measures of target user, and It is corresponding with normal processing mode to record normal encryption measures.
In this example, mode setting information is set by the front end that the equipment for receiving with implementing the present embodiment establishes connection It is obtained in the message that standby (such as client etc.) sends, step S3010-S3030 can in addition to the acquisition source of mode setting information Other than energy is different, other are referred to the implementation of the step S2020-S2030 in first embodiment, and details are not described herein.
In a more specific example, step S3020 can also include:
Step S3021 saves target user when mode setting information includes the camouflage digital asset information of target user Camouflage digital asset information, and record camouflage digital asset information it is corresponding with spoofing protection mode.
In this example, the camouflage digital asset information and record for including in preservation mode setting information are protected with camouflage Corresponding relationship between shield enables user that can meet the digital asset of itself for spoofing protection mode setting by progress The camouflage digital asset information of protection demand, such as digital asset information is pretended by setting, indicate the number money of which type Produce can be demonstrated, the camouflage remaining sum of digital asset that is demonstrated is how many etc., realization user can be according to itself demand Personal settings pretend digital asset information, accurately meet the digital asset protection demand of user.
S3010-S3030 through the above steps can be correspondingly arranged not by the mode setting information of received user The same corresponding user encryption measure of assets tupe enables user that can provide corresponding mould according to the individual demand of itself Assets tupe is arranged in formula setting information, more precisely meets the assets process demand of user.
After step S3100, according to current assets tupe, S3200 or S3300 is respectively enterd.
S3200 provides target user corresponding with spoofing protection mode when assets tupe is spoofing protection mode Camouflage digital asset information for show.
Spoofing protection mode is for pretending the true digital asset of user to protect the assets of digital asset to handle mould Formula.
Camouflage digital asset information is the digital asset information of the non-genuine user of camouflage, may include that user setting exists Type, the camouflage remaining sum of every kind of digital asset of the digital asset shown under camouflage figure pattern.In the present embodiment, Ke Yitong Digital asset information will be pretended and is supplied to establish headend equipment (such as the client of connection with the equipment for implementing the present embodiment by crossing Deng) show.
Under spoofing protection mode, camouflage digital asset information is provided and is shown, realizes that hiding user is really digital Assets information avoids being leaked to third party third party is enabled to be based on true digital asset information and causes using illegal means such as stress The assets for obtaining user, bring loss of assets to user.
S3300 provides the real estate information of target user when assets tupe is normal processing mode for exhibition Show.
Normal processing mode is that user is supported normally to handle the assets tupe of digital asset.
Actual numbers assets information is the relevant information of the true digital asset of user, may include the digital asset of user Type, the true remaining sum of every kind of digital asset etc..It in the present embodiment, can be by the way that actual numbers assets information be supplied to The headend equipment (such as client etc.) of connection is established with the equipment for implementing the present embodiment to show.
The actual numbers assets information for providing user in a normal, processing mode is shown, and user can be enabled to ensure to pacify The digital asset of itself, the safety of effective protection digital asset are handled in full environment.
<processing unit of digital asset>
In the present embodiment, a kind of processing unit 5000 of digital asset is provided, as shown in Figure 6, comprising: information processing list Member 5100, the first information provide unit 5200 and the second information provider unit 5300, for implement to provide in the present embodiment The processing method of digital asset, details are not described herein.
Information process unit 5100, for according to the user of received target user solve confidential information, it is determining to be solved with user The corresponding assets tupe of confidential information.
Optionally, the information process unit 5100 is also used to:
It verifies the user and solves confidential information, determine that the user solves confidential information and decrypts the target encryption measures passed through;
When the target encryption measures are the camouflage encryption measures of the target user, current assets processing mould is determined Formula is the spoofing protection mode;
When the target encryption measures are the normal encryption measures of the target user, current assets processing mould is determined Formula is the normal processing mode.
The first information provides unit 5200, protects for providing when assets tupe is spoofing protection mode with camouflage The camouflage digital asset information of the corresponding target user of shield mode is for displaying.
Second information provider unit 5300, for providing target user when assets tupe is normal processing mode Real estate information for show.
Optionally, the processing unit 5000 of the digital asset further include:
For receiving the device of the mode setting information of the target user;
For including the target user in the camouflage encryption measures in the mode setting information, the puppet is saved Encryption measures are filled, and record camouflage encryption measures device corresponding with the spoofing protection mode;
For when the mode setting information includes the normal encryption measures of the target user, save it is described normal plus Close measure, and record normal encryption measures device corresponding with the normal processing mode.
Optionally, the processing unit 5000 of the digital asset further include:
When for including the camouflage digital asset information of the target user in the mode setting information, the mesh is saved The camouflage digital asset information of user is marked, and records camouflage digital asset information dress corresponding with the spoofing protection mode It sets.
It will be appreciated by those skilled in the art that the processing unit 5000 of digital asset can be realized by various modes. For example, can realize the processing unit 5000 of digital asset by instruction configuration processor.For example, instruction can be stored in In ROM, and when starting the device, instruction is read in programming device to the processing unit for realizing digital asset from ROM 5000.For example, the processing unit 5000 of digital asset can be cured in dedicated devices (such as ASIC).Number can be provided The processing unit 5000 of production is divided into mutually independent unit, or they can be merged to realization.The place of digital asset Reason device 5000 can be realized by one of above-mentioned various implementations, or can pass through above-mentioned various implementations In the combinations of two or more modes realize.
In the present embodiment, the processing unit 5000 of digital asset can be to provide digital asset processing service using soft The back-end services end of part, small routine or system application.
<processing equipment of digital asset>
Fig. 7 shows the frame that the hardware configuration of processing equipment 6000 of the digital asset of the embodiment of the present invention may be implemented Figure.
The processing equipment 6000 of digital asset for example can be blade server, cloud server or server cluster Deng.The processing equipment 6000 of digital asset can be as shown in fig. 7, comprises processor 6100, memory 6200, interface arrangement 6300, communication device 6400, display device 6500, input unit 6600.Although server also may include loudspeaker, microphone Etc., still, these components are unrelated with the present embodiment, therefore omit herein.Wherein, processor 6100 for example can be central processing Device CPU, Micro-processor MCV etc..Memory 6200 is for example including ROM (read-only memory), RAM (random access memory), all The nonvolatile memory of such as hard disk.Interface arrangement 6300 is for example including USB interface, serial line interface etc..Communication device 6400 Such as it is able to carry out wired or wireless communication.Display device 6500 is, for example, liquid crystal display.Input unit 6600 for example can be with Including touch screen, keyboard etc..
Times that server shown in Fig. 7 is merely illustrative and is in no way intended to the application to the present embodiment or uses What is limited.Although showing multiple devices to the processing equipment of digital asset 6000 in Fig. 7, can be only related in the present embodiment Partial devices therein, for example, the processing equipment 6000 of digital asset pertains only to processor 6100 and storage device 6200.
In a preferred example, the processing equipment 6000 of the digital asset of the present embodiment may include:
Memory 6200, for storing executable instruction;
Processor 6100 runs the processing equipment of the digital asset for the control according to the executable instruction 6000 execute the processing method of the digital asset as described in any one in the present embodiment.
Technical staff can disclosed conceptual design instruction according to the present invention.How control processor is operated for instruction, This is it is known in the art that therefore being not described in detail herein.
In a specific example, the processing equipment 6000 of digital asset can be to provide assets processing service using soft The server of the back-end services of part, small routine or system application.
<readable storage medium storing program for executing>
In the present embodiment, a kind of readable storage medium storing program for executing is also provided, readable storage medium storing program for executing, which is stored with, to be readable by a computer And the computer program run, the computer program are used to execute such as the present embodiment when reading operation by the computer The processing method of the digital asset.
Readable storage medium storing program for executing can be the tangible device that can keep and store the instruction used by instruction execution equipment.It can Reading storage medium, which for example can be ,-- but is not limited to-- storage device electric, magnetic storage apparatus, light storage device, electromagnetism storage Equipment, semiconductor memory apparatus or above-mentioned any appropriate combination.The more specific example of readable storage medium storing program for executing is (non exhaustive List) include: that portable computer diskette, hard disk, random access memory (RAM), read-only memory (ROM), erasable type can Program read-only memory (EPROM or flash memory), static random access memory (SRAM), Portable compressed disk read-only memory (CD-ROM), digital versatile disc (DVD), memory stick, floppy disk, mechanical coding equipment, the punching for being for example stored thereon with instruction Card or groove internal projection structure and above-mentioned any appropriate combination.Readable storage medium storing program for executing used herein above is not explained For instantaneous signal itself, the electromagnetic wave of such as radio wave or other Free propagations is passed by waveguide or other transmission mediums The electromagnetic wave (for example, the light pulse for passing through fiber optic cables) broadcast or the electric signal transmitted by electric wire.
The digital asset processing method, device, equipment and readable storage medium of Detailed description of the invention the present embodiment are had been combined above Matter, can according to received user solve confidential information and determine current assets tupe, be that camouflage is protected in assets tupe When shield mode, the camouflage digital asset information of user is provided for showing, and when assets tupe is normal processing mode, The actual numbers assets information of user is provided for showing, allows user according to itself current state, corresponding user is provided Solution confidential information enters different assets tupes to handle assets, can pass through camouflage number when itself handles precarious position Assets information hides actual numbers assets information, reduces loss of assets risk, the safety of effective protection digital asset.
<3rd embodiment>
In the present embodiment, a kind of processing system 7000 of digital asset is provided, comprising:
Digital asset is provided in the processing unit 3000 and second embodiment of the digital asset provided in first embodiment Processing unit 5000;
Alternatively,
Digital asset is provided in the processing equipment 4000 and second embodiment of the digital asset provided in second embodiment Processing equipment 6000.
<example>
The number implemented below with reference to Fig. 8 processing system 7000 that digital asset in the present embodiment is further illustrated The processing method of assets.
In this example, the processing equipment 4000 for the digital asset for including in the processing system 7000 of digital asset is electronic money Packet headend equipment (or client of stored value card), the processing equipment 6000 of digital asset are stored value card rear end equipments (or server of stored value card).
As shown in figure 8, the processing method of digital asset includes: step S401-S413 and S501-513.
Normal encryption measures are arranged by the mode setting interface that stored value card headend equipment provides in S401, user.
Normal encryption measures are sent to stored value card rear end equipment by S402, stored value card headend equipment.
S403, stored value card rear end equipment saves normal encryption measures, and records corresponding with normal processing mode.
S404, stored value card rear end equipment save successfully to the return of stored value card headend equipment.
S405, stored value card headend equipment prompt user's normal processing mode are arranged successfully.
S406, user pass through mode setting interface setting camouflage encryption measures.
The camouflage digital asset information of spoofing protection mode is arranged by mode setting interface by S407, user.
S408, stored value card headend equipment will pretend encryption measures and camouflage digital asset information is sent to stored value card Rear end equipment.
S409, stored value card rear end equipment preservation camouflage encryption measures and camouflage digital asset information, and record and puppet It is corresponding to fill protected mode.
S410, stored value card rear end equipment save successfully to the return of stored value card headend equipment.
S411, the success of stored value card sub-headend device prompts user's spoofing protection mode setting.
S501, user start stored value card headend equipment.
S502, stored value card headend equipment provide decryption information input interface, prompt user to input user and solve confidential information.
S503, user input user and solve confidential information.
User's solution confidential information is sent to stored value card rear end equipment by S504, stored value card headend equipment.
S505, stored value card rear end equipment user solves confidential information and determines assets tupe, if assets tupe is Normal processing mode enters step S506, and otherwise, assets tupe is spoofing protection mode, enters step S509.
S506, stored value card rear end equipment provide actual numbers assets information to stored value card headend equipment.
S507, stored value card headend equipment unlock real estate interface, show the actual numbers assets letter of the user of acquisition Breath.
Real estate interface be provided by electronic wallet device, the people of actual numbers assets information for showing user Machine interactive interface.
S508, user check actual numbers assets information, implement digital asset processing operation.
S509, electronic wallet device responding digital assets processing operation.
S510, stored value card rear end equipment provide camouflage digital asset information to stored value card headend equipment.
S511, stored value card headend equipment unlock camouflage assets interface, shows the pre-set camouflage digital asset of user Information.
Camouflage assets interface is the people for pretending digital asset information provided by electronic wallet device, for showing user Machine interactive interface.
S512, user or third party check camouflage digital asset information.
S513, user or third party implement digital asset processing operation.
S514, stored value card headend equipment prompt network operation, operation failure.
The specific implementation of above-mentioned steps can be no longer superfluous herein with the corresponding steps in above-mentioned first or second embodiments It states.
In this example, user can be arranged not according to the personal settings demand of itself by stored value card headend equipment With assets tupe under camouflage digital asset information under corresponding user encryption measure and spoofing protection mode, by electricity The rear end equipment of sub- wallet saves, and the user that stored value card headend equipment can be inputted according to user solves confidential information, is sent to electricity The rear end equipment of sub- wallet determines corresponding assets tupe, corresponding to obtain number different under different assets tupes Word assets information is shown, and takes corresponding treatment measures, enable user can in unsafe use environment (such as by people Stress), it inputs corresponding user's solution confidential information and enters spoofing protection mode, triggering stored value card shows camouflage digital asset letter Breath, and it is not responding to the digital asset processing operation that user or third party implement, avoid the digital asset of user from losing, and user Under the use environment of safety, moreover it is possible to enter normal processing mode by providing user's solution confidential information, normally handles digital asset, Effectively realize the protection of digital asset.
The present invention can be system, method and/or computer program product.Computer program product may include computer Readable storage medium storing program for executing, containing for making processor realize the computer-readable program instructions of various aspects of the invention.
Computer readable storage medium, which can be, can keep and store the tangible of the instruction used by instruction execution equipment Equipment.Computer readable storage medium for example can be-- but it is not limited to-- storage device electric, magnetic storage apparatus, optical storage Equipment, electric magnetic storage apparatus, semiconductor memory apparatus or above-mentioned any appropriate combination.Computer readable storage medium More specific example (non exhaustive list) includes: portable computer diskette, hard disk, random access memory (RAM), read-only deposits It is reservoir (ROM), erasable programmable read only memory (EPROM or flash memory), static random access memory (SRAM), portable Compact disk read-only memory (CD-ROM), digital versatile disc (DVD), memory stick, floppy disk, mechanical coding equipment, for example thereon It is stored with punch card or groove internal projection structure and the above-mentioned any appropriate combination of instruction.Calculating used herein above Machine readable storage medium storing program for executing is not interpreted that instantaneous signal itself, the electromagnetic wave of such as radio wave or other Free propagations lead to It crosses the electromagnetic wave (for example, the light pulse for passing through fiber optic cables) of waveguide or the propagation of other transmission mediums or is transmitted by electric wire Electric signal.
Computer-readable program instructions as described herein can be downloaded to from computer readable storage medium it is each calculate/ Processing equipment, or outer computer or outer is downloaded to by network, such as internet, local area network, wide area network and/or wireless network Portion stores equipment.Network may include copper transmission cable, optical fiber transmission, wireless transmission, router, firewall, interchanger, gateway Computer and/or Edge Server.Adapter or network interface in each calculating/processing equipment are received from network to be counted Calculation machine readable program instructions, and the computer-readable program instructions are forwarded, for the meter being stored in each calculating/processing equipment In calculation machine readable storage medium storing program for executing.
Computer program instructions for executing operation of the present invention can be assembly instruction, instruction set architecture (ISA) instructs, Machine instruction, machine-dependent instructions, microcode, firmware instructions, condition setup data or with one or more programming languages The source code or object code that any combination is write, the programming language include the programming language-of object-oriented such as Smalltalk, C++ etc., and conventional procedural programming languages-such as " C " language or similar programming language.Computer Readable program instructions can be executed fully on the user computer, partly execute on the user computer, be only as one Vertical software package executes, part executes on the remote computer or completely in remote computer on the user computer for part Or it is executed on server.In situations involving remote computers, remote computer can pass through network-packet of any kind It includes local area network (LAN) or wide area network (WAN)-is connected to subscriber computer, or, it may be connected to outer computer (such as benefit It is connected with ISP by internet).In some embodiments, by utilizing computer-readable program instructions Status information carry out personalized customization electronic circuit, such as programmable logic circuit, field programmable gate array (FPGA) or can Programmed logic array (PLA) (PLA), the electronic circuit can execute computer-readable program instructions, to realize each side of the invention Face.
Referring herein to according to the method for the embodiment of the present invention, the flow chart of device (system) and computer program product and/ Or block diagram describes various aspects of the invention.It should be appreciated that flowchart and or block diagram each box and flow chart and/ Or in block diagram each box combination, can be realized by computer-readable program instructions.
These computer-readable program instructions can be supplied to general purpose computer, special purpose computer or other programmable datas The processor of processing unit, so that a kind of machine is produced, so that these instructions are passing through computer or other programmable datas When the processor of processing unit executes, function specified in one or more boxes in implementation flow chart and/or block diagram is produced The device of energy/movement.These computer-readable program instructions can also be stored in a computer-readable storage medium, these refer to It enables so that computer, programmable data processing unit and/or other equipment work in a specific way, thus, it is stored with instruction Computer-readable medium then includes a manufacture comprising in one or more boxes in implementation flow chart and/or block diagram The instruction of the various aspects of defined function action.
Computer-readable program instructions can also be loaded into computer, other programmable data processing units or other In equipment, so that series of operation steps are executed in computer, other programmable data processing units or other equipment, to produce Raw computer implemented process, so that executed in computer, other programmable data processing units or other equipment Instruct function action specified in one or more boxes in implementation flow chart and/or block diagram.
The flow chart and block diagram in the drawings show the system of multiple embodiments according to the present invention, method and computer journeys The architecture, function and operation in the cards of sequence product.In this regard, each box in flowchart or block diagram can generation One module of table, program segment or a part of instruction, the module, program segment or a part of instruction include one or more use The executable instruction of the logic function as defined in realizing.In some implementations as replacements, function marked in the box It can occur in a different order than that indicated in the drawings.For example, two continuous boxes can actually be held substantially in parallel Row, they can also be executed in the opposite order sometimes, and this depends on the function involved.It is also noted that block diagram and/or The combination of each box in flow chart and the box in block diagram and or flow chart, can the function as defined in executing or dynamic The dedicated hardware based system made is realized, or can be realized using a combination of dedicated hardware and computer instructions.It is right For those skilled in the art it is well known that, by hardware mode realize, by software mode realize and pass through software and It is all of equal value that the mode of combination of hardware, which is realized,.
Various embodiments of the present invention are described above, above description is exemplary, and non-exclusive, and It is not limited to disclosed each embodiment.Without departing from the scope and spirit of illustrated each embodiment, for this skill Many modifications and changes are obvious for the those of ordinary skill in art field.The selection of term used herein, purport In principle, the practical application or to the technological improvement in market for best explaining each embodiment, or make the art its Its those of ordinary skill can understand each embodiment disclosed herein.The scope of the present invention is defined by the appended claims.

Claims (16)

1. a kind of processing method of digital asset characterized by comprising
The user for obtaining target user solves confidential information;
Confidential information is solved according to the user, determines current assets tupe;
When the assets tupe is spoofing protection mode, the camouflage digital asset information for obtaining target user is opened up Show, and is not responding to the digital asset processing operation that the target user implements;
When the assets tupe is normal processing mode, the actual numbers assets information for obtaining the target user is carried out It shows, digital asset is handled according to the actual numbers assets information for the target user.
2. the method according to claim 1, wherein the method also includes:
Obtain the mode setting information of the target user;
When the mode setting information includes the camouflage encryption measures of the target user, triggering saves the camouflage encryption and arranges It applies, and it is corresponding with the spoofing protection mode to record the camouflage encryption measures;
When the mode setting information includes the normal encryption measures of the target user, triggering saves the normal encryption and arranges It applies, and it is corresponding with the normal processing mode to record the normal encryption measures.
3. the method according to claim 1, wherein the method also includes:
When the mode setting information includes the camouflage digital asset information of the target user, triggering saves the camouflage number Word assets information, and it is corresponding with the spoofing protection mode to record the camouflage digital asset information.
4. being determined currently the method according to claim 1, wherein described solve confidential information according to the user The step of assets tupe includes:
Triggering verifies the user and solves confidential information, determines that the user solves confidential information and decrypts the target encryption measures passed through;
When the target encryption measures are the camouflage encryption measures of the target user, determine that current assets tupe is The spoofing protection mode;
When the target encryption measures are the normal encryption measures of the target user, determine that current assets tupe is The normal processing mode.
5. the method according to claim 1, wherein the digital asset for being not responding to the target user and implementing The step of processing operation includes:
Disable application function relevant to the digital asset processing operation;
Alternatively, responding processing failure when receiving the digital asset processing operation.
6. the method according to claim 1, wherein
The user solves confidential information and includes at least clear crytpographic key information, decryption gesture information or decryption biological information wherein One of;The decryption biological information includes at least one of user fingerprints information, human face image information.
7. a kind of processing method of digital asset characterized by comprising
According to the user of received target user solve confidential information, it is determining that the corresponding assets processing mould of confidential information is solved with the user Formula;
When the assets tupe is spoofing protection mode, provide target user's corresponding with the spoofing protection mode Pretend digital asset information for showing;
When the assets tupe is normal processing mode, the real estate information of the target user is provided for exhibition Show.
8. the method according to the description of claim 7 is characterized in that
Receive the mode setting information of the target user;
When the mode setting information includes the camouflage encryption measures of the target user, the camouflage encryption measures are saved, And it is corresponding with the spoofing protection mode to record the camouflage encryption measures;
When the mode setting information includes the normal encryption measures of the target user, the normal encryption measures are saved, And it is corresponding with the normal processing mode to record the normal encryption measures.
9. according to the method described in claim 8, it is characterized in that,
When the mode setting information includes the camouflage digital asset information of the target user, save the target user's Pretend digital asset information, and it is corresponding with the spoofing protection mode to record the camouflage digital asset information.
10. the method according to the description of claim 7 is characterized in that it is described according to received target user user decrypt The step of information, determining assets tupe corresponding with user solution confidential information includes:
It verifies the user and solves confidential information, determine that the user solves confidential information and decrypts the target encryption measures passed through;
When the target encryption measures are the camouflage encryption measures of the target user, determine that current assets tupe is The spoofing protection mode;
When the target encryption measures are the normal encryption measures of the target user, determine that current assets tupe is The normal processing mode.
11. a kind of processing unit of digital asset characterized by comprising
Information acquisition unit, the user for obtaining target user solve confidential information;
Pattern determining unit determines current assets tupe for solving confidential information according to the user;
First processing units, for obtaining the camouflage number of target user when the assets tupe is spoofing protection mode Word assets information is shown, and is not responding to the digital asset processing operation that the target user implements;
The second processing unit, for obtaining the true of the target user when the assets tupe is normal processing mode Real digital assets information is shown, and handles digital asset according to the actual numbers assets information for the target user.
12. a kind of processing unit of digital asset characterized by comprising
Information process unit, for according to the user of received target user solve confidential information, it is determining with the user Xie Mixin Cease corresponding assets tupe;
The first information provides unit, protects for providing when the assets tupe is spoofing protection mode with the camouflage The camouflage digital asset information of the corresponding target user of shield mode is for displaying;
Second information provider unit, for providing the target user when the assets tupe is normal processing mode Real estate information for show.
13. a kind of processing equipment of digital asset characterized by comprising
Display device;
Memory, for storing executable instruction;
Processor, for the control according to the executable instruction, the processing equipment for running the digital asset is executed as weighed Benefit requires the processing method of digital asset described in 1-6 any one.
14. a kind of processing equipment of digital asset characterized by comprising
Memory, for storing executable instruction;
Processor, for the control according to the executable instruction, the processing equipment for running the digital asset is executed as weighed Benefit requires the processing method of digital asset described in 7-10 any one.
15. a kind of readable storage medium storing program for executing, which is characterized in that the readable storage medium storing program for executing can be readable by a computer execution for storing Computer program, the computer program by the computer read after, execute as claimed in any one of claims 1 to 6 The processing method of digital asset, alternatively, executing the processing method of the digital asset as described in claim 7-10 any one.
16. a kind of processing system of digital asset characterized by comprising
The processing unit of digital asset as claimed in claim 11 and the processing of digital asset as claimed in claim 12 Device;
Alternatively,
The processing equipment of digital asset as claimed in claim 13 and the processing of digital asset as claimed in claim 14 Equipment.
CN201910414611.3A 2019-05-17 2019-05-17 Processing method, device, equipment, system and the readable storage medium storing program for executing of digital asset Pending CN110276604A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910414611.3A CN110276604A (en) 2019-05-17 2019-05-17 Processing method, device, equipment, system and the readable storage medium storing program for executing of digital asset

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910414611.3A CN110276604A (en) 2019-05-17 2019-05-17 Processing method, device, equipment, system and the readable storage medium storing program for executing of digital asset

Publications (1)

Publication Number Publication Date
CN110276604A true CN110276604A (en) 2019-09-24

Family

ID=67959970

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910414611.3A Pending CN110276604A (en) 2019-05-17 2019-05-17 Processing method, device, equipment, system and the readable storage medium storing program for executing of digital asset

Country Status (1)

Country Link
CN (1) CN110276604A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112202793A (en) * 2020-09-30 2021-01-08 中国银行股份有限公司 Method, device, equipment and medium for logging in mobile phone bank through fingerprint
CN112528310A (en) * 2020-12-21 2021-03-19 北京百度网讯科技有限公司 Encrypted content display method, device, equipment and storage medium
CN112748794A (en) * 2019-10-30 2021-05-04 武汉科天路智能科技有限公司 Intelligent asset management system
CN114356202A (en) * 2022-03-18 2022-04-15 广州世安信息技术股份有限公司 Portable mobile storage data exchange equipment
CN114640438A (en) * 2022-03-21 2022-06-17 重庆市规划和自然资源信息中心 Full-factor informatization management method based on informatization assets

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090259588A1 (en) * 2006-04-24 2009-10-15 Jeffrey Dean Lindsay Security systems for protecting an asset
CN108431847A (en) * 2015-10-27 2018-08-21 万事达卡国际股份有限公司 Determine digital wallet Client-initiated be currently based on wallet transaction whether be fraudulent method

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090259588A1 (en) * 2006-04-24 2009-10-15 Jeffrey Dean Lindsay Security systems for protecting an asset
CN108431847A (en) * 2015-10-27 2018-08-21 万事达卡国际股份有限公司 Determine digital wallet Client-initiated be currently based on wallet transaction whether be fraudulent method

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112748794A (en) * 2019-10-30 2021-05-04 武汉科天路智能科技有限公司 Intelligent asset management system
CN112202793A (en) * 2020-09-30 2021-01-08 中国银行股份有限公司 Method, device, equipment and medium for logging in mobile phone bank through fingerprint
CN112528310A (en) * 2020-12-21 2021-03-19 北京百度网讯科技有限公司 Encrypted content display method, device, equipment and storage medium
CN114356202A (en) * 2022-03-18 2022-04-15 广州世安信息技术股份有限公司 Portable mobile storage data exchange equipment
CN114640438A (en) * 2022-03-21 2022-06-17 重庆市规划和自然资源信息中心 Full-factor informatization management method based on informatization assets
CN114640438B (en) * 2022-03-21 2023-09-22 重庆市规划和自然资源信息中心 Full-element informatization management method based on informationized asset

Similar Documents

Publication Publication Date Title
CN110276604A (en) Processing method, device, equipment, system and the readable storage medium storing program for executing of digital asset
CN106663161B (en) Security host interaction
CN105391840B (en) Automatically create destination application
CN105453483B (en) For method and apparatus derived from the key based on image
CN104823207B (en) The Personal Identification Number for mobile payment application program is protected by combining with random element
CN102638447B (en) Method and device for system login based on autonomously generated password of user
CN103353931B (en) Security-enhanced computer system and method
CN104704505B (en) Protect the assets in equipment
CN103390124B (en) Safety input and the equipment, system and method for processing password
CN110462658A (en) For providing system and method for the digital identity record to verify the identity of user
CN104915832B (en) Mobile payment, verification method and its device and system
US20140258132A1 (en) System and method for secure electronic transaction
JP2020531981A (en) Computer implementation methods, computer programs and systems for identity verification using biometric data and irreversible functions over the blockchain
CN104285229A (en) Enhancing security of sensor data for a system via an embedded controller
CA3142324A1 (en) Method, device and system for transferring data
CN108199852A (en) A kind of method for authenticating, right discriminating system and computer readable storage medium
CN108399318A (en) The generation method of executable file executes method and electronic equipment
CN103353973B (en) Banking transaction authentication method and system based on audio authentication
CN106255976A (en) Confidential data management method and device and safety certifying method and system
CN106503996A (en) Payment transaction based on web provides equipment, method and system
CN109412812A (en) Data safe processing system, method, apparatus and storage medium
CN104537300A (en) Safe password setting and verifying mode
CN109644196A (en) Message protection
CN104408363A (en) Safe password system
CN104346550B (en) A kind of information processing method and a kind of electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20200923

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant before: Advanced innovation technology Co.,Ltd.

Effective date of registration: 20200923

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant after: Advanced innovation technology Co.,Ltd.

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Applicant before: Alibaba Group Holding Ltd.