CN110472978B - Digital currency address tamper-proof method and system - Google Patents

Digital currency address tamper-proof method and system Download PDF

Info

Publication number
CN110472978B
CN110472978B CN201910782952.6A CN201910782952A CN110472978B CN 110472978 B CN110472978 B CN 110472978B CN 201910782952 A CN201910782952 A CN 201910782952A CN 110472978 B CN110472978 B CN 110472978B
Authority
CN
China
Prior art keywords
digital currency
address
character string
length
digital
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910782952.6A
Other languages
Chinese (zh)
Other versions
CN110472978A (en
Inventor
王忠儒
蒋劭捷
李斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Digapis Technology Co ltd
Original Assignee
Beijing Digapis Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Digapis Technology Co ltd filed Critical Beijing Digapis Technology Co ltd
Priority to CN201910782952.6A priority Critical patent/CN110472978B/en
Publication of CN110472978A publication Critical patent/CN110472978A/en
Application granted granted Critical
Publication of CN110472978B publication Critical patent/CN110472978B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a digital currency address tamper-proofing method and a digital currency address tamper-proofing system, wherein when the operation of copying a digital currency address is monitored, the digital currency address in a target shear plate is obtained; judging to obtain the digital currency type according to the digital currency address; determining a first character string and a second character string according to the corresponding length of the digital currency type and the digital currency address; and copying the first character string to the target position, and generating prompt information for prompting a user to input a second character string at the target position. By limiting the length of the digital currency address copied and pasted by the user and prompting the user to manually input the character string of part of the digital currency address, the behavior that a hacker modifies the digital currency address by hijacking the content of the clipboard is invalid, so that the hacker loses significance by carrying out clipboard hijacking, and the safety of the digital currency of the user is protected.

Description

Digital currency address tamper-proof method and system
Technical Field
The invention relates to the technical field of information security, in particular to a digital currency address tamper-proof method and a digital currency address tamper-proof system.
Background
In the field of digital currency, the digital currency address corresponds to a bank account number, and digital currency is transferred according to the digital currency address during a transaction. Since numeric currency addresses are typically an irregular string of letters and numeric symbols, purely manual entry is highly error prone and inconvenient. Therefore, the user copies the digital currency address to the clipboard during daily operations and then directly pastes the digital currency address from the clipboard when performing operations to transfer in or out digital currency assets.
In the actual operation process, a hacker can utilize the process to monitor the user's clipboard and hijack the digital currency address copied by the replacement user as the hacker's own digital currency address, so that the transfer into the hacker's account causes irreparable loss to the user. Therefore, how to prevent hackers from tampering with the digital currency address through the clipboard is a major current problem in the field of digital currency.
Disclosure of Invention
Aiming at the problems, the invention provides a method and a system for preventing the digital currency address from being tampered, which solve the problem that a hacker steals the digital currency by holding a clipboard to write the digital currency address of the hacker.
In order to achieve the purpose, the invention provides the following technical scheme:
a digital currency address tamper-resistant method, comprising:
when the operation of copying the digital currency address is monitored, acquiring the digital currency address in the target shear plate;
judging to obtain the digital currency type according to the digital currency address;
determining a first character string and a second character string according to the corresponding lengths of the digital currency type and the digital currency address;
copying the first character string to a target position, and generating prompt information for prompting a user to input the second character string at the target position, wherein the sum of the length of the first character string and the length of the second character string is equal to the length of the digital currency address.
Optionally, the determining a first character string and a second character string according to the corresponding lengths of the numeric currency type and the numeric currency address comprises:
copying the digital currency address to a specified memory location;
determining a second character string according to the digital currency type;
and deleting the second character string from the digital currency address of the appointed memory position to obtain a first character string.
Optionally, the determining, according to the digital currency address, a digital currency type includes:
obtaining identification information of the digital currency address;
and determining the digital currency type according to the identification information.
Optionally, the method further comprises:
judging whether the address length of the digital currency is consistent with the standard address length corresponding to the digital currency type, and if so, determining a first character string and a second character string;
if not, judging whether the length of the digital currency address is smaller than the standard length of the digital address, and if so, determining the digital currency address as a first character string.
Optionally, the method further comprises:
and acquiring setting information, and determining the length of the second character string according to the setting information, wherein the setting information comprises configuration information automatically generated according to the digital currency type or configuration information set by a user.
A digital currency address tamper-resistant system comprising:
an acquisition unit configured to acquire a digital currency address in a target clipboard when an operation of copying the digital currency address is monitored;
the judging unit is used for judging the type of the digital currency according to the digital currency address;
a determination unit configured to determine a first character string and a second character string in accordance with the numeric currency type and the corresponding length of the numeric currency address;
a generating unit configured to copy the first character string to a target location, and generate a prompt message for prompting a user to input the second character string at the target location, wherein a sum of a length of the first character string and a length of the second character string is equal to a length of the digital currency address.
Optionally, the determining unit includes:
a copy subunit configured to copy the digital currency address to a specified memory location;
a first determining subunit configured to determine a second character string in accordance with the digital money type;
and the deleting subunit is used for deleting the second character string from the digital currency address of the specified memory location to obtain a first character string.
Optionally, the determining unit includes:
an identification acquisition subunit operable to acquire identification information of the digital money address;
and a second determining subunit, configured to determine the digital currency type according to the identification information.
Optionally, the system further comprises:
a first length judging subunit, configured to judge whether the numeric currency address length is consistent with a numeric address standard length corresponding to the numeric currency type, and if so, determine a first character string and a second character string;
and the second length judging subunit is used for judging whether the length of the digital currency address is smaller than the standard length of the digital address if the length of the digital currency address is not smaller than the standard length of the digital address, and determining the digital currency address as a first character string if the length of the digital currency address is smaller than the standard length of the digital address.
Optionally, the system further comprises:
an information acquisition unit configured to acquire setting information including configuration information automatically generated according to the digital money type or configuration information set by a user, and determine a length of the second character string according to the setting information.
Compared with the prior art, the invention provides a digital currency address tamper-proofing method and system, when the operation of copying the digital currency address is monitored, the digital currency address in the target clipboard is obtained; judging to obtain the digital currency type according to the digital currency address; determining a first character string and a second character string according to the corresponding length of the digital currency type and the digital currency address; and copying the first character string to the target position, and generating prompt information for prompting a user to input the second character string at the target position. By limiting the length of the digital currency address copied and pasted by the user and prompting the user to manually input the character string of part of the digital currency address, the behavior that a hacker modifies the digital currency address by hijacking the content of the clipboard is invalid, so that the hacker loses significance by carrying out clipboard hijacking, and the safety of the digital currency of the user is protected.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
FIG. 1 is a flow chart illustrating a method for tamper-proofing a digital currency address according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of a digital currency address tamper-proofing system according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terms "first" and "second," and the like in the description and claims of the present invention and the above-described drawings are used for distinguishing between different objects and not for describing a particular order. Furthermore, the terms "comprising" and "having," as well as any variations thereof, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not set forth for a listed step or element but may include steps or elements not listed.
In the embodiment of the invention, a digital currency address tamper-proofing method is provided, and digital currency is alternative currency in the form of electronic currency, which can be understood as virtual currency based on a node network and a digital encryption algorithm. The virtual currency comprises special currency such as game currency, Q point and the like and bit currency Etfang digital encryption currency. When the money is transacted, the digital money address of the digital electronic purse needs to be input for transferring and the like. Specifically, the method may comprise the steps of:
s101, when the operation of copying the digital currency address is monitored, the digital currency address in the target clipboard is obtained.
Since the digital money address corresponding to the digital wallet is generally composed of irregular numbers and letters, the user may copy the digital money address to a preset place such as a clipboard or a memo for use, and then copy the address from the clipboard when using. When the fact that the user operates the digital currency address in the clipboard is monitored, namely the digital currency address is copied from the clipboard, the controller can firstly acquire the digital currency address in the target clipboard instead of directly performing subsequent step operation on the digital currency address in the clipboard, and the purpose of doing so is that the content stored in the clipboard of the user cannot be changed, and other threads are prevented from being influenced.
And S102, judging to obtain the digital currency type according to the digital currency address.
After the digital currency address is acquired, the type of the digital currency is judged according to the composition structure of the digital currency address, and usually, identification information indicating the type of the digital currency address exists in the digital currency address, and the type of the digital currency is acquired through the identification information. Specifically, the identification information may be represented by the initial letter and the character string length, that is, it may be determined which type of digital money the current digital money address belongs to, from the initial letter and the character string length of the character string of the acquired digital money address.
S103, determining a first character string and a second character string according to the digital currency type and the corresponding length of the digital currency address.
And S104, copying the first character string to a target position, and generating prompt information.
Since the digital currency address copied by the user is completed in a segmented mode during pasting in the embodiment of the application, a first character string and a second character string need to be determined firstly, wherein the first character string is used for directly copying to a target position, and the second character string needs to be manually input by the user.
And the lengths of the corresponding first and second character strings may be determined according to the type of the numeric currency and the actual length of the numeric currency address. In order to facilitate manual input of the user, the second character string is usually set to be 6 characters, and of course, the length of the second character string may be flexibly set according to the use habit of the user, that is, the length of the second character string is set according to the input habit of the user. The first string is copied directly to the target location, which may be a dialog box that requires entry of a digital currency address or an address bar of a digital wallet. And generating prompt information while copying the first character string to the target position so as to prompt the user to input the remaining second character string.
The invention provides a digital currency address tamper-proof method, which limits the length of a digital currency address copied and pasted by a user and prompts the user to manually input character strings of part of the digital currency address, so that a hacker can lose the behavior of modifying the digital currency address by hijacking the content of a clipboard, the hacker can hijack the clipboard to lose significance, and the safety of the digital currency of the user is protected.
On the basis of the above embodiment, when determining the first character string and the second character string, the method of the embodiment of the present invention specifically includes:
s201, copying the digital currency address to a specified memory location;
s202, determining a second character string according to the digital currency type;
s203, deleting the second character string from the digital currency address of the specified memory location to obtain a first character string.
Firstly, the digital currency address is copied to a specified memory location, it should be noted that the memory location is a memory different from the memory location of the clipboard, so that the character strings corresponding to the digital currency address can be conveniently operated, for example, the first character string can be obtained after deleting some character strings. For example, the method provided by the embodiment of the invention generates a wallet plug-in, applies the wallet plug-in to the field of digital currency, copies the digital currency address to the plug-in memory for erasing when it is monitored that the user copies the digital currency address, and then pastes the erased content into the address input field directly from the plug-in memory, so that the content of the memory of the clipboard is not changed, and the influence on other threads is prevented. For example, when the wallet runs in the background and the user wants to write a text document, a bitcoin address is copied, the content in the clipboard memory is not erased, and the content in the wallet plug-in memory is erased 6 bits later. At the moment, the transfer operation is carried out to read the content from the plug-in memory, namely the content after being erased; at this time, text editing is performed, namely, the content is read from the memory of the clipboard and is the copied original content.
Different digital currencies have different formats of digital currency address. It can be judged which type of currency the address on the current clipboard belongs to from the beginning letters of the acquired character string and the character string length, for example, bitcoin always starts with "1" or "3" and is generally 34 bits in length, etherhouse always starts with "0 x" and is 40 bits in length, and ledebut coin always starts with "L" and is 34 bits in length. When the data on the clipboard starts with '1', the data is judged to be the bitcoin address, when the data on the clipboard starts with '0 x', the data is judged to be the Ethengfang address, and other currency addresses are judged in the same way. The format of a common currency address is shown in table 1.
TABLE 1
Figure GDA0003493915160000071
On the basis of the above embodiment, the method further includes:
judging whether the address length of the digital currency is consistent with the standard address length corresponding to the digital currency type, and if so, determining a first character string and a second character string;
if not, judging whether the length of the digital currency address is smaller than the standard length of the digital address, and if so, determining the digital currency address as a first character string.
It should be noted that when it is monitored that the user copies the digital currency address on the clipboard, it is first determined whether the length of the copied digital currency address is consistent with the standard length L of the corresponding type, if so, it is verified that the user has made all copies, and then the first character string and the second character string are determined in order to ensure security. If the length is less than the standard length, the user is certified that the user partially copies at the time of copying, and the copied numeric currency address is taken as a first character string. For example, if the length of the second character string is set to 6, after the content copied on the clipboard is confirmed to be of a certain currency type, the length L of the character string on the clipboard is calculated, the value of L is compared with the value of L-6, if L is larger than or equal to L-6, the character string in the plug-in memory is subjected to six-bit erasing processing, and when a user performs a pasting operation, the erased content is directly pasted to the wallet address bar from the plug-in memory, and the user is reminded to 'please manually input six bits later'.
It should be noted that, in order to facilitate the operation of the user, the method in the embodiment of the present invention further includes:
and acquiring setting information, and determining the length of the second character string according to the setting information, wherein the setting information comprises configuration information automatically generated according to the digital currency type or configuration information set by a user.
That is, the length of the second character string may be automatically determined according to the length of the numeric currency address of the type, or may be determined based on information set by the user, that is, if the user does not set the length of the input character string, a default length is adopted as the length of the second character string. For example, the length of the second string is set to 6 bits. The bit coin wallet address is typically 34 bits, so the length that the user can copy and paste is 28 bits; the ether house wallet address is typically 40 bits, then the length that the user can copy and paste is 34 bits.
If the first string is set to the same length, then the currency with the longer address would need to be manually entered too much. For example, if the length of the copy and paste is set to be 28 bits according to the standard of bitcoin, 12 bits need to be manually input when the user performs the ether house wallet transfer, and the input is too long, which causes unnecessary troubles and is easy to make mistakes.
It should be noted that the above is directed to a multifunctional integrated wallet, which can transfer multiple currencies at the same time. But may be set to a fixed length if for a particular wallet, such as a bitcoin-only wallet, or an etherhouse-only wallet.
The invention limits the length which can be copied and pasted by judging the content copied by the user to determine the currency type, and the user has to manually input six digits, and the length is as long as the six-digit key password of the bank, so that the invention is safe; when a hacker hijacks the clipboard and writes the address of the hacker, the hacker can not obtain any benefit because the last six bits of the address of the hacker are erased and replaced by the new last six bits manually input by the user, and the new address is not the address of the hacker any more, and the hacker has lost significance in carrying out the clipboard hijack at the moment, so that the clipboard hijack can be fundamentally prevented.
Correspondingly, in another embodiment of the present invention, there is also provided a digital currency address tamper-proofing system, see fig. 2, comprising:
an acquisition unit 10 configured to acquire a digital money address in a target clipboard when an operation of copying the digital money address is monitored;
a judging unit 20 for judging the type of the digital currency according to the digital currency address;
a determination unit 30 for determining a first character string and a second character string in accordance with the digital money type and the corresponding length of the digital money address;
a generating unit 40 configured to copy the first character string to a target location, and generate a prompt message for prompting a user to input the second character string at the target location, wherein a sum of a length of the first character string and a length of the second character string is equal to a length of the digital currency address.
The invention provides a digital currency address tamper-proof system.A digital currency address in a target shear plate is acquired when an acquisition unit monitors the operation of copying the digital currency address; the judging unit judges the type of the digital currency according to the digital currency address; the determining unit determines a first character string and a second character string according to the type of the digital currency and the corresponding length of the address of the digital currency; the generation unit copies the first character string to a target position and generates prompt information for prompting a user to input a second character string at the target position. By limiting the length of the digital currency address copied and pasted by the user and prompting the user to manually input the character string of part of the digital currency address, the behavior that a hacker modifies the digital currency address by hijacking the content of the clipboard is invalid, so that the hacker loses significance by carrying out clipboard hijacking, and the safety of the digital currency of the user is protected.
On the basis of the above embodiment, the determining unit includes:
a copy subunit configured to copy the digital currency address to a specified memory location;
a first determining subunit configured to determine a second character string in accordance with the digital money type;
and the deleting subunit is used for deleting the second character string from the digital currency address of the specified memory location to obtain a first character string.
On the basis of the above embodiment, the judging unit includes:
an identification acquisition subunit operable to acquire identification information of the digital money address;
and a second determining subunit, configured to determine the digital currency type according to the identification information.
On the basis of the above embodiment, the system further includes:
a first length judging subunit, configured to judge whether the numeric currency address length is consistent with a numeric address standard length corresponding to the numeric currency type, and if so, determine a first character string and a second character string;
and the second length judging subunit is used for judging whether the length of the digital currency address is smaller than the standard length of the digital address if the length of the digital currency address is not smaller than the standard length of the digital address, and determining the digital currency address as a first character string if the length of the digital currency address is smaller than the standard length of the digital address.
On the basis of the above embodiment, the system further includes:
an information acquisition unit configured to acquire setting information including configuration information automatically generated according to the digital money type or configuration information set by a user, and determine a length of the second character string according to the setting information.
An embodiment of the present invention provides a storage medium having a program stored thereon, the program implementing the digital currency address tamper-proofing method when executed by a processor.
The embodiment of the invention provides a processor, which is used for running a program, wherein the program executes the digital currency address tamper-proofing method during running.
The embodiment of the invention provides equipment, which comprises a processor, a memory and a program which is stored on the memory and can run on the processor, wherein the processor executes the program and realizes the following steps:
when the operation of copying the digital currency address is monitored, acquiring the digital currency address in the target shear plate;
judging to obtain the digital currency type according to the digital currency address;
determining a first character string and a second character string according to the corresponding lengths of the digital currency type and the digital currency address;
copying the first character string to a target position, and generating prompt information for prompting a user to input the second character string at the target position, wherein the sum of the length of the first character string and the length of the second character string is equal to the length of the digital currency address.
Further, the determining the first character string and the second character string according to the corresponding lengths of the digital currency type and the digital currency address includes:
copying the digital currency address to a specified memory location;
determining a second character string according to the digital currency type;
and deleting the second character string from the digital currency address of the appointed memory position to obtain a first character string.
Further, the determining the digital currency type according to the digital currency address includes:
obtaining identification information of the digital currency address;
and determining the digital currency type according to the identification information.
Further, the method further comprises:
judging whether the address length of the digital currency is consistent with the standard address length corresponding to the digital currency type, and if so, determining a first character string and a second character string;
if not, judging whether the length of the digital currency address is smaller than the standard length of the digital address, and if so, determining the digital currency address as a first character string.
Further, the method further comprises:
and acquiring setting information, and determining the length of the second character string according to the setting information, wherein the setting information comprises configuration information automatically generated according to the digital currency type or configuration information set by a user.
The device herein may be a server, a PC, a PAD, a mobile phone, etc.
The present application further provides a computer program product adapted to perform a program for initializing the following method steps when executed on a data processing device:
when the operation of copying the digital currency address is monitored, acquiring the digital currency address in the target shear plate;
judging to obtain the digital currency type according to the digital currency address;
determining a first character string and a second character string according to the corresponding lengths of the digital currency type and the digital currency address;
copying the first character string to a target position, and generating prompt information for prompting a user to input the second character string at the target position, wherein the sum of the length of the first character string and the length of the second character string is equal to the length of the digital currency address.
Further, the determining the first character string and the second character string according to the corresponding lengths of the digital currency type and the digital currency address includes:
copying the digital currency address to a specified memory location;
determining a second character string according to the digital currency type;
and deleting the second character string from the digital currency address of the appointed memory position to obtain a first character string.
Further, the determining the digital currency type according to the digital currency address includes:
obtaining identification information of the digital currency address;
and determining the digital currency type according to the identification information.
Further, the method further comprises:
judging whether the address length of the digital currency is consistent with the standard address length corresponding to the digital currency type, and if so, determining a first character string and a second character string;
if not, judging whether the length of the digital currency address is smaller than the standard length of the digital address, and if so, determining the digital currency address as a first character string.
Further, the method further comprises:
and acquiring setting information, and determining the length of the second character string according to the setting information, wherein the setting information comprises configuration information automatically generated according to the digital currency type or configuration information set by a user.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). The memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, computer readable media does not include transitory computer readable media (transmyedia) such as modulated data signals and carrier waves.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in the process, method, article, or apparatus that comprises the element.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The above are merely examples of the present application and are not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (8)

1. A method for tamper-proofing a digital currency address, comprising:
when the operation of copying the digital currency address is monitored, acquiring the digital currency address in the target shear plate;
judging to obtain the digital currency type according to the digital currency address;
copying the digital currency address to a specified memory location;
determining a second character string according to the digital currency type;
deleting the second character string from the digital currency address of the appointed memory position to obtain a first character string;
copying the first character string to a target position, and generating prompt information, wherein the prompt information is used for prompting a user to input the second character string at the target position.
2. The method of claim 1, wherein said determining a digital currency type based on said digital currency address comprises:
obtaining identification information of the digital currency address;
and determining the digital currency type according to the identification information.
3. The method of claim 1, further comprising:
judging whether the address length of the digital currency is consistent with the standard address length corresponding to the digital currency type, and if so, determining a first character string and a second character string;
if not, judging whether the length of the digital currency address is smaller than the standard length of the digital address, and if so, determining the digital currency address as a first character string.
4. The method of claim 1, further comprising:
and acquiring setting information, and determining the length of the second character string according to the setting information, wherein the setting information comprises configuration information automatically generated according to the digital currency type or configuration information set by a user.
5. A digital currency address tamper-resistant system, comprising:
an acquisition unit configured to acquire a digital currency address in a target clipboard when an operation of copying the digital currency address is monitored;
the judging unit is used for judging the type of the digital currency according to the digital currency address;
a copy subunit configured to copy the digital currency address to a specified memory location;
a first determining subunit configured to determine a second character string in accordance with the digital money type;
a deleting subunit, configured to delete the second character string from the digital currency address of the specified memory location, to obtain a first character string;
and the generating unit is used for copying the first character string to a target position and generating prompt information, and the prompt information is used for prompting a user to input the second character string at the target position.
6. The system according to claim 5, wherein the judging unit includes:
an identification acquisition subunit operable to acquire identification information of the digital money address;
and a second determining subunit, configured to determine the digital currency type according to the identification information.
7. The system of claim 5, further comprising:
a first length judging subunit, configured to judge whether the numeric currency address length is consistent with a numeric address standard length corresponding to the numeric currency type, and if so, determine a first character string and a second character string;
and the second length judging subunit is used for judging whether the length of the digital currency address is smaller than the standard length of the digital address if the length of the digital currency address is not smaller than the standard length of the digital address, and determining the digital currency address as a first character string if the length of the digital currency address is smaller than the standard length of the digital address.
8. The system of claim 5, further comprising:
an information acquisition unit configured to acquire setting information including configuration information automatically generated according to the digital money type or configuration information set by a user, and determine a length of the second character string according to the setting information.
CN201910782952.6A 2019-08-23 2019-08-23 Digital currency address tamper-proof method and system Active CN110472978B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910782952.6A CN110472978B (en) 2019-08-23 2019-08-23 Digital currency address tamper-proof method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910782952.6A CN110472978B (en) 2019-08-23 2019-08-23 Digital currency address tamper-proof method and system

Publications (2)

Publication Number Publication Date
CN110472978A CN110472978A (en) 2019-11-19
CN110472978B true CN110472978B (en) 2022-03-08

Family

ID=68512157

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910782952.6A Active CN110472978B (en) 2019-08-23 2019-08-23 Digital currency address tamper-proof method and system

Country Status (1)

Country Link
CN (1) CN110472978B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112182605A (en) * 2020-09-24 2021-01-05 建信金融科技有限责任公司 Operation request processing method and device, electronic equipment and readable storage medium
CN112492015B (en) * 2020-11-23 2021-12-07 中国联合网络通信集团有限公司 Block chain-based distributed storage tamper-proof method and system
CN112528276B (en) * 2020-11-23 2023-06-09 中国联合网络通信集团有限公司 Distributed storage tamper-proof method and system based on block chain

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2854088B1 (en) * 2013-09-26 2017-09-27 AO Kaspersky Lab A system and method for ensuring safety of online transactions
US10395253B2 (en) * 2015-07-01 2019-08-27 Liveensure, Inc. System and method for securing and monetizing peer-to-peer digital content
CN106897155B (en) * 2016-08-29 2019-11-05 阿里巴巴集团控股有限公司 A kind of method for showing interface and device
CN107992371A (en) * 2017-11-30 2018-05-04 努比亚技术有限公司 Replicate method of attaching, device and computer-readable recording medium
CN109117670A (en) * 2018-08-16 2019-01-01 海南新软软件有限公司 A kind of realization shear plate data encryption and decryption method, apparatus and hardware device
CN109255598A (en) * 2018-09-25 2019-01-22 海南新软软件有限公司 Reminding method, device and terminal are distorted in a kind of digital asset address

Also Published As

Publication number Publication date
CN110472978A (en) 2019-11-19

Similar Documents

Publication Publication Date Title
CN110472978B (en) Digital currency address tamper-proof method and system
CN110096857B (en) Authority management method, device, equipment and medium for block chain system
CN105337928B (en) Method for identifying ID, safety protection problem generation method and device
US6880037B2 (en) Method of data caching on a smartcard
CN107395665A (en) A kind of block chain service handling and business common recognition method and device
US20130081144A1 (en) Storage device and writing device
KR20180020248A (en) Method and device for obtaining payment threshold
JP2005327255A5 (en)
CN107943596A (en) Way of Process Communication, apparatus and system
CN106815528A (en) A kind of file management method and device, storage device
CN111143309A (en) Method, equipment and medium for sharing enterprise financial data based on block chain
CN107678872A (en) The processing method and processing device of electronic whiteboard
US10586295B2 (en) Updateable electronic digital assets will or trust method and systems with real time access for updated designated will or trust elements
CN111143891A (en) Method, equipment and medium for sharing enterprise financial data based on block chain
CN112036125A (en) Document management method and device and computer equipment
CN111444216A (en) Data block deleting method based on centralized block chain type account book
US8281150B2 (en) Smart card and access method thereof
TW539945B (en) Method and apparatus for protecting data using lock values in a computer system
CN108133026B (en) Multi-data processing method, system and storage medium
WO2018113603A1 (en) Resource processing method and apparatus
CN109255598A (en) Reminding method, device and terminal are distorted in a kind of digital asset address
CN107483186A (en) Key updating method, device and storage medium
JP5972455B2 (en) How to delete information
CN110175036B (en) Upgrading method and device for soft lock permission
CN111274321A (en) Block chain-based electronic ticket protection method, device and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant