CN110472978A - A kind of digital cash address tamper resistant method and system - Google Patents
A kind of digital cash address tamper resistant method and system Download PDFInfo
- Publication number
- CN110472978A CN110472978A CN201910782952.6A CN201910782952A CN110472978A CN 110472978 A CN110472978 A CN 110472978A CN 201910782952 A CN201910782952 A CN 201910782952A CN 110472978 A CN110472978 A CN 110472978A
- Authority
- CN
- China
- Prior art keywords
- digital cash
- address
- character string
- length
- type
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Computer Security & Cryptography (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of digital cash address tamper resistant method and systems, when the operation for monitoring to replicate digital cash address, obtain the digital cash address in target shear plate;According to digital cash address, judgement obtains digital cash type;According to the correspondence length of digital cash type and digital cash address, the first character string and the second character string are determined;First character string is copied to target position, and generates prompt information, prompt information is for prompting user's to input the second character string in target position.The digital cash address size pasted is replicated by limitation user; and prompt the character string of user's manual importation digital cash address; so that the behavior that hacker reaches modification digital cash address by kidnapping the content of shear plate is failed; so that hacker, which carries out shear plate abduction, loses meaning, the safety of the digital cash of user is protected.
Description
Technical field
The present invention relates to field of information security technology, more particularly to a kind of digital cash address tamper resistant method and are
System.
Background technique
In digital cash field, digital cash address is equivalent to Bank Account Number, and digital cash is basis in process of exchange
Digital cash address is transferred.Since digital cash address is usually the irregular word being made of letter and number symbol
Symbol string, purely manual input easily error and inconvenience.Therefore user can replicate digital cash address in regular job and arrive
Shear plate, then when being transferred to or being produced the operation of digital cash assets, directly from shear plate to the digital cash address
It is pasted.
In the actual operation process, hacker can monitor the clipbook of user using this process, and kidnap replacement user
The digital cash address of duplication is the digital cash address of hacker oneself, so that the account transferred accounts into hacker causes not to user
Repairable loss.Therefore, how to prevent hacker from being distorted by shear plate to digital cash address has been digital cash neck
Domain main problems faced at present.
Summary of the invention
It is directed to the above problem, the present invention provides a kind of digital cash address tamper resistant method and system, solves hacker
It seizes shear plate on both sides by the arms and the digital cash address of oneself is written come the problem of stealing digital cash.
To achieve the goals above, the present invention provides the following technical scheme that
A kind of digital cash address tamper resistant method, comprising:
When the operation for monitoring to replicate digital cash address, with obtaining the digital cash in target shear plate
Location;
According to the digital cash address, judgement obtains digital cash type;
According to the correspondence length of the digital cash type and the digital cash address, the first character string and second are determined
Character string;
First character string is copied to target position, and generates prompt information, the prompt information is used for prompting
Family inputs second character string in the target position, wherein the length of first character string and second character
The sum of length of string is equal to the length of the digital cash address.
Optionally, the correspondence length by according to the digital cash type and the digital cash address determines
One character string and the second character string, comprising:
By the digital cash address reproduction to specified memory position;
According to the digital cash type, the second character string is determined;
Second character string is deleted into the digital cash address of the specified memory position, obtains the first character string.
Optionally, described according to the digital cash address, judgement obtains digital cash type, comprising:
Obtain the identification information of the digital cash address;
According to the identification information, digital cash type is determined.
Optionally, this method further include:
Judge digital cash address size numeric address full-length whether corresponding with the digital cash type
Unanimously, if it is, determining the first character string and the second character string;
If not, judge whether the digital cash address constant is less than the numeric address full-length, if it is,
The digital cash address is determined as the first character string.
Optionally, this method further include:
Setting information is obtained, the length of second character string is determined according to the setting information, wherein the setting letter
Breath includes the configuration information according to the digital cash type configuration information automatically generated or user setting.
A kind of digital cash address tamper resistant systems, comprising:
Acquiring unit, for obtaining in target shear plate when the operation for monitoring to replicate digital cash address
Digital cash address;
Judging unit, for according to the digital cash address, judgement to obtain digital cash type;
Determination unit determines for the correspondence length according to the digital cash type and the digital cash address
One character string and the second character string;
Generation unit for first character string to be copied to target position, and generates prompt information, the prompt letter
Breath is for prompting user's to input second character string in the target position, wherein the length of first character string with
The sum of length of second character string is equal to the length of the digital cash address.
Optionally, the determination unit includes:
Subelement is replicated, is used for the digital cash address reproduction to specified memory position;
First determines subelement, for determining the second character string according to the digital cash type;
Subelement is deleted, for second character string to be deleted in the digital cash address of the specified memory position,
Obtain the first character string.
Optionally, the judging unit includes:
Mark obtains subelement, for obtaining the identification information of the digital cash address;
Second determines subelement, for determining digital cash type according to the identification information.
Optionally, the system further include:
First length judgment sub-unit, for judge the digital cash address size whether with the digital cash type
Corresponding numeric address full-length is consistent, if it is, determining the first character string and the second character string;
Second length judgment sub-unit, for if not, judging whether the digital cash address constant is less than the number
Word address full-length, if it is, the digital cash address is determined as the first character string.
Optionally, the system further include:
Information acquisition unit determines the length of second character string according to the setting information for obtaining setting information
Degree, wherein the setting information includes the configuration information automatically generated according to the digital cash type or user setting
Configuration information.
Compared to the prior art, the present invention provides a kind of digital cash address tamper resistant method and system, when monitoring
When the operation that digital cash address is replicated, the digital cash address in target shear plate is obtained;According to digital cash
Location, judgement obtain digital cash type;According to the correspondence length of digital cash type and digital cash address, the first character is determined
String and the second character string;First character string is copied to target position, and generates prompt information, prompt information is for prompting user
Son inputs the second character string in target position.The digital cash address size pasted is replicated by limitation user, and prompts to use
Family is manually entered the character string of part number currency address, so that hacker reaches the digital goods of modification by kidnapping the content of shear plate
The behavior of coin address is failed, so that hacker, which carries out shear plate abduction, loses meaning, protects the peace of the digital cash of user
Quan Xing.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
The embodiment of invention for those of ordinary skill in the art without creative efforts, can also basis
The attached drawing of offer obtains other attached drawings.
Fig. 1 is a kind of flow diagram of digital cash address tamper resistant method provided in an embodiment of the present invention;
Fig. 2 is a kind of structural schematic diagram of digital cash address tamper resistant systems provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall within the protection scope of the present invention.
Term " first " and " second " in description and claims of this specification and above-mentioned attached drawing etc. are for area
Not different objects, rather than for describing specific sequence.Furthermore term " includes " and " having " and their any deformations,
It is intended to cover and non-exclusive includes.Such as it contains the process, method of a series of steps or units, system, product or sets
It is standby not to be set in listed step or unit, but may include the step of not listing or unit.
A kind of digital cash address tamper resistant method is provided in embodiments of the present invention, and digital cash is electronic money shape
The sabstitute money of formula can be understood as a kind of ideal money based on meshed network and digital Encryption Algorithm.Ideal money
Including the dedicated currency such as game money, Q coin, Q point and bit coin ether mill digital encryption currency.When these currency are traded
It waits, the digital cash address for needing to input digital and electronic wallet carries out the operation such as transfer accounts.Specifically, this method may include following
Step:
S101, the digital goods when the operation for monitoring to replicate digital cash address, in acquisition target shear plate
Coin address.
Since the corresponding digital cash address of digital wallet is usually to be made of irregular number and letter, Yong Huwei
It is easy to use, digital cash address can first copy to the preset place such as shear plate or memorandum, when using
It is replicated again from shear plate.When monitoring that user operates the digital cash address in shear plate, i.e., from shear plate
When middle duplication digital cash address, controller can first obtain the digital cash address in target shear plate, rather than directly to cutting
The step of after digital cash address progress in cutting plate, operates, the purpose for the arrangement is that, it will not change and be deposited in user's shear plate
The content of storage prevents from impacting other threads.
S102, according to the digital cash address, judgement obtains digital cash type.
After getting digital cash address, digital cash class can be judged by the composed structure of digital cash address
Type can have the identification information for indicating its type in usual digital cash address, digital cash class is obtained by identification information
Type.Specifically, identification information, which can pass through beginning letter and string length, to be indicated, it can by the digital cash of acquisition
The beginning letter of the character string of location judges that current digital cash address belongs to which type of digital goods with string length
Coin.
S103, according to the correspondence length of the digital cash type and the digital cash address, determine the first character string
With the second character string.
S104, first character string is copied to target position, and generates prompt information.
Due to be in the embodiment of the present application by user duplication digital cash address paste when using segmentation mould
Formula is completed, it is therefore desirable to determine the first character string and the second character string first, wherein the first character string is used to be copied directly to mesh
Cursor position, the second character string need user to be manually entered.
And the length of corresponding first character string and the second character string can according to digital cash type and digital cash
The physical length of location determines.For the ease of being manually entered for user, usual second character string can be set as 6 characters, certainly
Flexible setting can also be carried out according to the use habit of user, i.e., the length of the second character string is set according to the input habit of user
Degree.First character string can directly be copied to target position, which can be pair for needing to input digital cash address
Frame is talked about, the address field of digital wallet is also possible to.And it can generate and mention while the first character string is copied to target position
Show information, so as to which user is prompted to input remaining second character string.
The present invention provides a kind of digital cash address tamper resistant methods to replicate the digital cash pasted by limitation user
Address size, and the character string of user's manual importation digital cash address is prompted, so that hacker is by kidnapping shear plate
Content reach modification digital cash address behavior failure so that hacker carry out shear plate abduction lose meaning, protect
The safety of the digital cash of user.
On the basis of the above embodiments, when determining the first character string and the second character string, the embodiment of the present invention
Method specifically include:
S201, by the digital cash address reproduction to specified memory position;
S202, according to the digital cash type, determine the second character string;
S203, the digital cash address of the specified memory position is deleted to second character string, obtains the first word
Symbol string.
First by digital cash address reproduction to specified memory position, it should be noted that the core position is to be different from cutting
The memory of cutting plate storage location can be operated in this way in order to the corresponding character string in logarithm word currency address, for example, deleting certain
Available first character string after a little character strings.It is inserted for example, method provided in an embodiment of the present invention is generated a kind of wallet
Part, by the wallet plug-in application to digital cash field, when monitoring that user replicates digital cash address, first by digital cash
Address reproduction is wiped to plug-in unit memory, and the content after erasing is directly then pasted address input field from plug-in unit memory
In, the content of shearing board memory will not be changed in this way, prevent from impacting other threads.For example, wallet is in running background
Meanwhile user also wants to write a text document, replicates a bit coin address at this time, the content for shearing board memory will not be wiped
It removes, and the content of wallet plug-in unit memory is wiped free of 6 afterwards.Transfer operation is carried out at this time from plug-in unit memory reading of content, is erasing
Content afterwards;Text editing is carried out at this time, is from shearing board memory reading of content, is the raw content of duplication.
Different digital currency has the digital cash address of different-format.It can be according to the beginning letter of the character string of acquisition
Judge which kind of type currency address belongs on current shear plate with string length, for example, bit coin always with " 1 " or
" 3 " beginning and length are generally 34, and ether mill is always started with " 0x " and length is 40, and Lay spy coin is always with " L "
Start and length is 34.When data are on shear plate to be judged as bit coin address when " 1 " beginning, when number on shear plate
It is judged as ether mill address when " 0x " starts accordingly, other currency addresses judge similarly.The format of common currency address is such as
Shown in table 1.
Table 1
On the basis of the above embodiments, this method further include:
Judge digital cash address size numeric address full-length whether corresponding with the digital cash type
Unanimously, if it is, determining the first character string and the second character string;
If not, judge whether the digital cash address constant is less than the numeric address full-length, if it is,
The digital cash address is determined as the first character string.
It should be noted that being first determined whether when monitoring that user replicates the digital cash address on shear plate
Whether the length of its digital cash address replicated and the full-length L of corresponding types are consistent, if it is, proving that user carries out
Be whole duplications, then in order to guarantee that safety determines the first character string and the second character string.If it is less than full-length, then
Prove that part is replicated when user's duplication, then using the digital cash address of the duplication as the first character string.For example, if setting
For the length 6 of the second character string, then confirm that the content replicated on shear plate is character on calculating shear plate after certain currency type
String length l compares the value of l and L-6, if l >=L-6, six erasings processing after being carried out to the character string in plug-in unit memory, when with
When family executes paste operation, the content after erasing is directly pasted wallet address field from plug-in unit memory, and user is reminded " to ask
Six after being manually entered ".
It should be noted that for the ease of the operation of user, in the method for the embodiment of the present invention further include:
Setting information is obtained, the length of second character string is determined according to the setting information, wherein the setting letter
Breath includes the configuration information according to the digital cash type configuration information automatically generated or user setting.
It can be when determining the length of the second character string according to the length of the digital cash address of the type come automatic
Determining, be also possible to the information based on user setting to determine, i.e., if user does not set the string length of input,
Length using the length of default as the second character string.Such as, 6 are set by the length of the second character string.Bit coin wallet
Address is usually 34, then the length that user can replicate stickup is 28;Ether mill wallet address is usually 40, then
The length that user can replicate stickup is 34.
If setting same length for the first character string, longer that currency needs in address were manually entered
It is more.For example, if according to bit coin standard, setting can replicate the length of stickup and be fixed as 28, then user carry out with
When too mill wallet is transferred accounts, it is necessary to be manually entered 12, input is too long to will cause the also easy error of unnecessary trouble.
It should be noted that being for for multifunctional comprehensive wallet above, this wallet can carry out a variety of simultaneously
The transfer operation of currency.But if for certain specific wallet, such as the wallet of only bit coin, or only ether mill
Wallet, then regular length can be set into.
The present invention limits the length that can replicate stickup, user by judging that the content of user's duplication determines currency type
Six after must being manually entered, it is safe that length and six key passwords of bank are isometric;When hacker has kidnapped shear plate, and
When the address of oneself is written, latter six due to hacker address are wiped free of new latter six for having changed user into and being manually entered, newly
Address and be no longer hacker address, hacker will not obtain any benefit, and hacker carries out shear plate abduction and lost at this time
Meaning fundamentally can prevent shear plate from kidnapping.
It is corresponding, a kind of digital cash address tamper resistant systems are additionally provided in another embodiment of the invention, referring to
Fig. 2, the system include:
Acquiring unit 10, for obtaining target shear plate when the operation for monitoring to replicate digital cash address
In digital cash address;
Judging unit 20, for according to the digital cash address, judgement to obtain digital cash type;
Determination unit 30 is determined for the correspondence length according to the digital cash type and the digital cash address
First character string and the second character string;
Generation unit 40 for first character string to be copied to target position, and generates prompt information, the prompt
Information is for prompting user's to input second character string in the target position, wherein the length of first character string
It is equal to the length of the digital cash address with the sum of the length of second character string.
The present invention provides a kind of digital cash address tamper resistant systems, acquiring unit, which is worked as, to be monitored digital cash address
When the operation replicated, the digital cash address in target shear plate is obtained;Judging unit is according to digital cash address, judgement
Obtain digital cash type;Correspondence length of the determination unit according to digital cash type and digital cash address, determines the first word
Symbol string and the second character string;First character string is copied to target position by generation unit, and generates prompt information, and prompt information is used
The second character string is inputted in target position in prompt user's.The digital cash address size pasted is replicated by limitation user,
And the character string of user's manual importation digital cash address is prompted, so that hacker reaches by kidnapping the content of shear plate
The behavior failure of digital cash address is modified, so that hacker, which carries out shear plate abduction, loses meaning, protects the number of user
The safety of word currency.
On the basis of the above embodiments, the determination unit includes:
Subelement is replicated, is used for the digital cash address reproduction to specified memory position;
First determines subelement, for determining the second character string according to the digital cash type;
Subelement is deleted, for second character string to be deleted in the digital cash address of the specified memory position,
Obtain the first character string.
On the basis of the above embodiments, the judging unit includes:
Mark obtains subelement, for obtaining the identification information of the digital cash address;
Second determines subelement, for determining digital cash type according to the identification information.
On the basis of the above embodiments, the system further include:
First length judgment sub-unit, for judge the digital cash address size whether with the digital cash type
Corresponding numeric address full-length is consistent, if it is, determining the first character string and the second character string;
Second length judgment sub-unit, for if not, judging whether the digital cash address constant is less than the number
Word address full-length, if it is, the digital cash address is determined as the first character string.
On the basis of the above embodiments, the system further include:
Information acquisition unit determines the length of second character string according to the setting information for obtaining setting information
Degree, wherein the setting information includes the configuration information automatically generated according to the digital cash type or user setting
Configuration information.
The embodiment of the invention provides a kind of storage mediums, are stored thereon with program, real when which is executed by processor
Existing digital cash address tamper resistant method.
The embodiment of the invention provides a kind of processor, the processor is for running program, wherein described program operation
Digital cash address tamper resistant method described in Shi Zhihang.
The embodiment of the invention provides a kind of equipment, equipment include processor, memory and storage on a memory and can
The program run on a processor, processor perform the steps of when executing program
When the operation for monitoring to replicate digital cash address, with obtaining the digital cash in target shear plate
Location;
According to the digital cash address, judgement obtains digital cash type;
According to the correspondence length of the digital cash type and the digital cash address, the first character string and second are determined
Character string;
First character string is copied to target position, and generates prompt information, the prompt information is used for prompting
Family inputs second character string in the target position, wherein the length of first character string and second character
The sum of length of string is equal to the length of the digital cash address.
Further, the correspondence length by according to the digital cash type and the digital cash address determines
First character string and the second character string, comprising:
By the digital cash address reproduction to specified memory position;
According to the digital cash type, the second character string is determined;
Second character string is deleted into the digital cash address of the specified memory position, obtains the first character string.
Further, described according to the digital cash address, judgement obtains digital cash type, comprising:
Obtain the identification information of the digital cash address;
According to the identification information, digital cash type is determined.
Further, this method further include:
Judge digital cash address size numeric address full-length whether corresponding with the digital cash type
Unanimously, if it is, determining the first character string and the second character string;
If not, judge whether the digital cash address constant is less than the numeric address full-length, if it is,
The digital cash address is determined as the first character string.
Further, this method further include:
Setting information is obtained, the length of second character string is determined according to the setting information, wherein the setting letter
Breath includes the configuration information according to the digital cash type configuration information automatically generated or user setting.
Equipment herein can be server, PC, PAD, mobile phone etc..
Present invention also provides a kind of computer program products, when executing on data processing equipment, are adapted for carrying out just
The program of beginningization there are as below methods step:
When the operation for monitoring to replicate digital cash address, with obtaining the digital cash in target shear plate
Location;
According to the digital cash address, judgement obtains digital cash type;
According to the correspondence length of the digital cash type and the digital cash address, the first character string and second are determined
Character string;
First character string is copied to target position, and generates prompt information, the prompt information is used for prompting
Family inputs second character string in the target position, wherein the length of first character string and second character
The sum of length of string is equal to the length of the digital cash address.
Further, the correspondence length by according to the digital cash type and the digital cash address determines
First character string and the second character string, comprising:
By the digital cash address reproduction to specified memory position;
According to the digital cash type, the second character string is determined;
Second character string is deleted into the digital cash address of the specified memory position, obtains the first character string.
Further, described according to the digital cash address, judgement obtains digital cash type, comprising:
Obtain the identification information of the digital cash address;
According to the identification information, digital cash type is determined.
Further, this method further include:
Judge digital cash address size numeric address full-length whether corresponding with the digital cash type
Unanimously, if it is, determining the first character string and the second character string;
If not, judge whether the digital cash address constant is less than the numeric address full-length, if it is,
The digital cash address is determined as the first character string.
Further, this method further include:
Setting information is obtained, the length of second character string is determined according to the setting information, wherein the setting letter
Breath includes the configuration information according to the digital cash type configuration information automatically generated or user setting.
It should be understood by those skilled in the art that, embodiments herein can provide as method, system or computer program
Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the application
Apply the form of example.Moreover, it wherein includes the computer of computer usable program code that the application, which can be used in one or more,
The computer program implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) produces
The form of product.
The application is referring to method, the process of equipment (system) and computer program product according to the embodiment of the present application
Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions
The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs
Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce
A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real
The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates,
Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or
The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting
Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or
The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one
The step of function of being specified in a box or multiple boxes.
In a typical configuration, calculating equipment includes one or more processors (CPU), input/output interface, net
Network interface and memory.
Memory may include the non-volatile memory in computer-readable medium, random access memory (RAM) and/
Or the forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is computer-readable Jie
The example of matter.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method
Or technology come realize information store.Information can be computer readable instructions, data structure, the module of program or other data.
The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), moves
State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable
Programmable read only memory (EEPROM), flash memory or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM),
Digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or other magnetic storage devices
Or any other non-transmission medium, can be used for storage can be accessed by a computing device information.As defined in this article, it calculates
Machine readable medium does not include temporary computer readable media (transitory media), such as the data-signal and carrier wave of modulation.
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability
It include so that the process, method, commodity or the equipment that include a series of elements not only include those elements, but also to wrap
Include other elements that are not explicitly listed, or further include for this process, method, commodity or equipment intrinsic want
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including element
There is also other identical elements in process, method, commodity or equipment.
It will be understood by those skilled in the art that embodiments herein can provide as method, system or computer program product.
Therefore, complete hardware embodiment, complete software embodiment or embodiment combining software and hardware aspects can be used in the application
Form.It is deposited moreover, the application can be used to can be used in the computer that one or more wherein includes computer usable program code
The shape for the computer program product implemented on storage media (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.)
Formula.
The above is only embodiments herein, are not intended to limit this application.To those skilled in the art,
Various changes and changes are possible in this application.It is all within the spirit and principles of the present application made by any modification, equivalent replacement,
Improve etc., it should be included within the scope of the claims of this application.
Claims (10)
1. a kind of digital cash address tamper resistant method characterized by comprising
When the operation for monitoring to replicate digital cash address, the digital cash address in target shear plate is obtained;
According to the digital cash address, judgement obtains digital cash type;
According to the correspondence length of the digital cash type and the digital cash address, the first character string and the second character are determined
String;
First character string is copied to target position, and generates prompt information, the prompt information is for prompting user sub
Second character string is inputted in the target position, wherein the length of first character string and second character string
The sum of length is equal to the length of the digital cash address.
2. the method according to claim 1, wherein described will be according to the digital cash type and the number
The correspondence length of currency address, determines the first character string and the second character string, comprising:
By the digital cash address reproduction to specified memory position;
According to the digital cash type, the second character string is determined;
Second character string is deleted into the digital cash address of the specified memory position, obtains the first character string.
3. judgement is counted the method according to claim 1, wherein described according to the digital cash address
Word currency type, comprising:
Obtain the identification information of the digital cash address;
According to the identification information, digital cash type is determined.
4. the method according to claim 1, wherein this method further include:
Judge that whether corresponding with the digital cash type digital cash address size numeric address full-length be consistent,
If it is, determining the first character string and the second character string;
If not, judging whether the digital cash address constant is less than the numeric address full-length, if it is, by institute
It states digital cash address and is determined as the first character string.
5. the method according to claim 1, wherein this method further include:
Setting information is obtained, the length of second character string is determined according to the setting information, wherein the setting information packet
Include the configuration information according to the digital cash type configuration information automatically generated or user setting.
6. a kind of digital cash address tamper resistant systems characterized by comprising
Acquiring unit, for obtaining the number in target shear plate when the operation for monitoring to replicate digital cash address
Word currency address;
Judging unit, for according to the digital cash address, judgement to obtain digital cash type;
Determination unit determines the first word for the correspondence length according to the digital cash type and the digital cash address
Symbol string and the second character string;
Generation unit for first character string to be copied to target position, and generates prompt information, and the prompt information is used
Input second character string in the target position in prompt user's, wherein the length of first character string with it is described
The sum of length of second character string is equal to the length of the digital cash address.
7. system according to claim 6, which is characterized in that the determination unit includes:
Subelement is replicated, is used for the digital cash address reproduction to specified memory position;
First determines subelement, for determining the second character string according to the digital cash type;
Subelement is deleted, for second character string to be deleted in the digital cash address of the specified memory position, is obtained
First character string.
8. system according to claim 6, which is characterized in that the judging unit includes:
Mark obtains subelement, for obtaining the identification information of the digital cash address;
Second determines subelement, for determining digital cash type according to the identification information.
9. system according to claim 6, which is characterized in that the system further include:
First length judgment sub-unit, for judging whether the digital cash address size is corresponding with the digital cash type
Numeric address full-length it is consistent, if it is, determining the first character string and the second character string;
Second length judgment sub-unit, for if not, judge the digital cash address constant whether be less than it is described digitally
Location full-length, if it is, the digital cash address is determined as the first character string.
10. system according to claim 6, which is characterized in that the system further include:
Information acquisition unit determines the length of second character string according to the setting information for obtaining setting information,
In, the setting information includes the configuration information automatically generated according to the digital cash type or user setting with confidence
Breath.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910782952.6A CN110472978B (en) | 2019-08-23 | 2019-08-23 | Digital currency address tamper-proof method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910782952.6A CN110472978B (en) | 2019-08-23 | 2019-08-23 | Digital currency address tamper-proof method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110472978A true CN110472978A (en) | 2019-11-19 |
CN110472978B CN110472978B (en) | 2022-03-08 |
Family
ID=68512157
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910782952.6A Active CN110472978B (en) | 2019-08-23 | 2019-08-23 | Digital currency address tamper-proof method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110472978B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112182605A (en) * | 2020-09-24 | 2021-01-05 | 建信金融科技有限责任公司 | Operation request processing method and device, electronic equipment and readable storage medium |
CN112492015A (en) * | 2020-11-23 | 2021-03-12 | 中国联合网络通信集团有限公司 | Block chain-based distributed storage tamper-proof method and system |
CN112528276A (en) * | 2020-11-23 | 2021-03-19 | 中国联合网络通信集团有限公司 | Block chain-based distributed storage tamper-proof method and system |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2854088A1 (en) * | 2013-09-26 | 2015-04-01 | Kaspersky Lab, ZAO | A system and method for ensuring safety of online transactions |
US20170124562A1 (en) * | 2015-07-01 | 2017-05-04 | Liveensure, Inc. | System and method for securing and monetizing peer-to-peer digital content |
CN106897155A (en) * | 2016-08-29 | 2017-06-27 | 阿里巴巴集团控股有限公司 | A kind of method for showing interface and device |
CN107992371A (en) * | 2017-11-30 | 2018-05-04 | 努比亚技术有限公司 | Replicate method of attaching, device and computer-readable recording medium |
CN109117670A (en) * | 2018-08-16 | 2019-01-01 | 海南新软软件有限公司 | A kind of realization shear plate data encryption and decryption method, apparatus and hardware device |
CN109255598A (en) * | 2018-09-25 | 2019-01-22 | 海南新软软件有限公司 | Reminding method, device and terminal are distorted in a kind of digital asset address |
-
2019
- 2019-08-23 CN CN201910782952.6A patent/CN110472978B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2854088A1 (en) * | 2013-09-26 | 2015-04-01 | Kaspersky Lab, ZAO | A system and method for ensuring safety of online transactions |
US20170124562A1 (en) * | 2015-07-01 | 2017-05-04 | Liveensure, Inc. | System and method for securing and monetizing peer-to-peer digital content |
CN106897155A (en) * | 2016-08-29 | 2017-06-27 | 阿里巴巴集团控股有限公司 | A kind of method for showing interface and device |
CN107992371A (en) * | 2017-11-30 | 2018-05-04 | 努比亚技术有限公司 | Replicate method of attaching, device and computer-readable recording medium |
CN109117670A (en) * | 2018-08-16 | 2019-01-01 | 海南新软软件有限公司 | A kind of realization shear plate data encryption and decryption method, apparatus and hardware device |
CN109255598A (en) * | 2018-09-25 | 2019-01-22 | 海南新软软件有限公司 | Reminding method, device and terminal are distorted in a kind of digital asset address |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112182605A (en) * | 2020-09-24 | 2021-01-05 | 建信金融科技有限责任公司 | Operation request processing method and device, electronic equipment and readable storage medium |
CN112492015A (en) * | 2020-11-23 | 2021-03-12 | 中国联合网络通信集团有限公司 | Block chain-based distributed storage tamper-proof method and system |
CN112528276A (en) * | 2020-11-23 | 2021-03-19 | 中国联合网络通信集团有限公司 | Block chain-based distributed storage tamper-proof method and system |
CN112492015B (en) * | 2020-11-23 | 2021-12-07 | 中国联合网络通信集团有限公司 | Block chain-based distributed storage tamper-proof method and system |
CN112528276B (en) * | 2020-11-23 | 2023-06-09 | 中国联合网络通信集团有限公司 | Distributed storage tamper-proof method and system based on block chain |
Also Published As
Publication number | Publication date |
---|---|
CN110472978B (en) | 2022-03-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110472978A (en) | A kind of digital cash address tamper resistant method and system | |
US10922425B2 (en) | Establishment of a confidential blockchain network | |
WO2020040937A2 (en) | Blockchain-based service rental method, apparatus, and system, and electronic device | |
CN107395665A (en) | A kind of block chain service handling and business common recognition method and device | |
CN107016542A (en) | A kind of business data processing method, verification method, apparatus and system | |
CN111694841A (en) | Order mark generation method, device, server and storage medium | |
CN109343790A (en) | A kind of date storage method based on NAND FLASH, terminal device and storage medium | |
WO2019226297A1 (en) | Edit transactions for blockchains | |
CN108629207A (en) | The system and method that information based on peripheral equipment generates encryption key | |
JPH03503220A (en) | Method and mobile device for checking message integrity | |
WO2021066954A1 (en) | Subscription to dependencies in smart contracts | |
CN106302720A (en) | A kind of for block chain Survivable storage system and method | |
CN104714957B (en) | A kind of variation and device of table structure | |
WO2019217213A1 (en) | Front-end user interface for confidential transactions | |
CN110795400A (en) | File management method, device, equipment and medium | |
CN102346925B (en) | Electronic ticket storage equipment, electronic ticket checking system and method | |
CN113032001A (en) | Intelligent contract classification method and device | |
CN101763318B (en) | Data dumping method and data dumping device | |
US20110119497A1 (en) | Smart card and access method thereof | |
CN108090364B (en) | Method and system for positioning data leakage source | |
CN109559235A (en) | Asset reallocation method and device, storage medium and electronic equipment | |
CN105138378B (en) | A kind of BIOS writes with a brush dipped in Chinese ink method and electronic equipment | |
WO2020247115A1 (en) | Subscription to edits of blockchain transaction | |
CN107341389A (en) | The method and device for preventing equipment to be multiplexed | |
CN109858903A (en) | A kind of comment information credibility evaluation method and device based on block chain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |