Detailed Description
Various exemplary embodiments of the present invention will now be described in detail with reference to the accompanying drawings. It should be noted that: the relative arrangement of the components and steps, the numerical expressions and numerical values set forth in these embodiments do not limit the scope of the present invention unless specifically stated otherwise.
The following description of at least one exemplary embodiment is merely illustrative in nature and is in no way intended to limit the invention, its application, or uses.
Techniques, methods, and apparatus known to those of ordinary skill in the relevant art may not be discussed in detail but are intended to be part of the specification where appropriate.
In all examples shown and discussed herein, any particular value should be construed as merely illustrative, and not limiting. Thus, other examples of the exemplary embodiments may have different values.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, further discussion thereof is not required in subsequent figures.
The general idea of the embodiment of the invention is to provide a new technical scheme for processing digital assets, which can determine the current asset processing mode according to the acquired user decryption information, show the disguised digital asset information of the user and do not respond to the asset processing operation implemented by the user when the asset processing mode is a disguised protection mode, and show the real digital asset information of the user for the user to normally implement asset processing when the asset processing mode is a normal processing mode, so that the user can provide the user decryption information to enter different asset processing modes to process assets according to the current state of the user, and can hide the real digital asset information by the disguised digital asset information when the user processes a dangerous state, thereby reducing the asset loss risk and effectively protecting the safety of the digital assets.
< first embodiment >
In this embodiment, a method for processing a digital asset is provided. A digital asset is an asset that a user can process through asset service software (e.g., an electronic wallet, a cell phone bank, etc.) installed or loaded in a mobile terminal, which provides asset processing services. Digital assets may include digitized forms of real-world assets such as real currency, financial products, etc., and may also include digitized rights such as account credits, virtual currency, etc.
As shown in fig. 1, the method for processing digital assets includes: steps S2100-S2400.
In step S2100, user decryption information of the target user is acquired.
The user decryption information is information for verifying whether the user can pass an encryption measure related to the digital asset service. In one example, the user decryption information includes at least decryption password information, decryption gesture information, or decryption biometric information. The decryption password information includes a password, a multiple password, or a dynamic password, etc., which can decrypt the corresponding encryption measure. The decryption gesture information is gesture operation information which can decrypt the corresponding encryption measures and is applied to the corresponding human-computer interaction interface. The decrypted biometric information is information which is uniquely corresponding to the user and is used for decrypting the corresponding encryption measure and is related to the biometric characteristics, and the decrypted biometric information can be the biometric characteristics specific to the user, for example, the decrypted biometric information at least comprises one of fingerprint information and face image information of the user, and can also comprise iris information, DNA information and the like.
In this embodiment, when asset service software (e.g., an electronic wallet, a mobile phone bank, etc.) providing digital asset processing service is started, a decryption information input interface is provided to prompt a user to input user decryption information for decryption, and the corresponding user decryption information is acquired through input operation performed in the decryption information input interface by the user. For example, a text input operation, a voice input operation, a gesture sliding operation performed by a user, or a face image information of the user in a specified action (for example, blinking, shaking, etc.) is captured by calling a camera through the decryption information input interface, and corresponding user decryption information is acquired.
Step S2200, according to the user decryption information, determining the current asset processing mode.
In this embodiment, the asset handling mode is a mode that currently allows a user to handle digital assets, including a masquerading protection mode and a normal handling mode. The different asset processing modes correspond to different user encryption measures, the disguised protection mode corresponds to the disguised encryption measure of the user, and the normal processing mode corresponds to the normal encryption measure of the user. The obtained user decryption information is used for decrypting the corresponding user encryption measures, and the current asset processing mode can be determined according to the types of the user encryption measures which can be decrypted by the user decryption information, so that the user can provide different user decryption information according to the current state of the user and enter different asset processing modes to process the digital assets.
In a more specific example, step S2200 may include: steps S2201-S2203.
Step S2201, triggering to verify the user decryption information, and determining a target encryption measure through which the user decryption information passes.
In this example, the verification of the user decryption information may be implemented by using a corresponding verification means according to a specific type of the user decryption information, and is not limited in detail herein. The authentication process of the user decryption information may be performed by the authentication means which is triggered locally by the device implementing this example, or may be performed by sending the user decryption information to a back-end device, such as a server, which provides a decryption information authentication service, which establishes a connection with the device. And verifying the user decryption information, and correspondingly determining the target encryption measure through which the user decryption information can pass.
Step S2202 determines that the current asset processing mode is the masquerading protection mode when the target encryption measure is the masquerading encryption measure of the target user.
In step S2203, when the target encryption measure is the normal encryption measure of the target user, it is determined that the current asset processing mode is the normal processing mode.
The current asset processing mode is determined through the type of user encryption measures which can be decrypted by the user decryption information, so that a user can provide different user decryption information according to the current state of the user and enter different asset processing modes to process the digital assets, the protection of the digital assets is implemented in a targeted manner, and the method is simple to implement and is more efficient.
In another example, the method for processing a digital asset provided in this embodiment may further include: steps S2010-S2030.
Step S2010, mode setting information of the target user is acquired.
The mode setting information is information related to the setting of the asset processing mode by the user. The mode setting information may include user encryption measures set by the user in different asset processing modes, including, for example, a normal encryption measure in a normal processing mode and a masquerading encryption measure in a masquerading protection mode. The user encryption measures include encryption type, corresponding decryption information, and the like. The specific content of the decryption information corresponds to the specific encryption type, and is similar to the range that the user decryption content can support, which is not described herein again.
In this example, the corresponding mode setting information obtained by providing a mode setting interface at asset service software (e.g., an electronic wallet, a mobile banking, etc.) providing digital asset processing services, prompting the user to set different asset processing modes, and receiving human-machine interaction operations performed by the user on the mode setting interface may be received. For example, the user may be prompted through the mode setting interface to set masquerading encryption measures, digital asset masquerading information, and the like, receive the user's operation performed on the mode setting interface, and obtain the mode setting information corresponding to the masquerading protection mode, or may be prompted through the mode setting interface to set normal encryption measures, receive the user's operation performed on the mode setting interface, and obtain the mode setting information corresponding to the normal processing mode.
Step S2020, when the mode setting information includes the disguised encryption measure of the target user, the disguised encryption measure is triggered and stored, and the disguised encryption measure is recorded to correspond to the disguised protection mode.
In this example, the masquerading encryption measure of the target user can be sent to a back-end device (for example, a server) with a data management function, which establishes connection with the device, by implementing the device of this example, to save and record the corresponding relation with the masquerading protection mode; or the device may trigger a local storage device (a cache, a memory, or a file that can be used for record saving) to perform the saving and recording steps.
In a more specific example, the mode setting information may further include disguised digital asset information of the target user. The masquerading digital asset information is digital asset related information of a falsely masquerading user and may include a type of digital asset, a balance of each digital asset, and the like. The camouflaged digital asset information may be used to hide the user's real digital assets. For example, no matter what the balance of the user's real digital asset is, the balance of the user's digital asset can be set to 0 or a decimal value close to 0 by setting the disguised digital asset information, so that when the disguised digital asset information is directly displayed in the disguised protection mode, the balance of the digital asset set to 0 or a decimal value close to 0 is displayed, and another person cannot know the user's real digital asset.
In this example, step S2020 may further include:
step S2021, when the mode setting information includes the disguised digital asset information of the target user, triggering and storing the disguised digital asset information, and recording the disguised digital asset information corresponding to the disguised protection mode.
In this example, after the user is prompted to set the masquerading encryption measure in the mode setting interface, the interface is continuously refreshed to prompt the user to set the masquerading digital asset information, and the human-computer interaction operation correspondingly implemented by the user is received to acquire the corresponding masquerading digital asset information. The user can set the disguised digital asset information meeting the digital asset protection requirement of the user aiming at the disguised protection mode, for example, by setting the disguised digital asset information, which types of digital assets can be displayed, the amount of disguised balance of the displayed digital assets and the like are indicated, so that the user can set the disguised digital asset information in a personalized manner according to the self requirement, and the digital asset protection requirement of the user is met accurately.
In this example, the masquerading encryption measure of the target user and the masquerading digital asset information can be transmitted to a back-end device (such as a server) with a data management function, which is connected with the device, to store and record the corresponding relation with the masquerading protection mode by implementing the device of this example; or the device may trigger a local storage device (a cache, a memory, or a file that can be used for record saving) to perform the saving and recording steps.
In step S2030, when the target encryption measure is the normal encryption measure of the target user, it is determined that the current asset processing mode is the normal processing mode.
In this example, by implementing the device of this example, the normal encryption measure of the target user is sent to the backend device (e.g., server) with data management function, which establishes connection with the device, to save and record the corresponding relation with the normal processing mode; or the device may trigger a local storage device (a cache, a memory, or a file that can be used for record saving) to perform the saving and recording steps.
Through the steps S2010-S2030, the user encryption measures corresponding to different asset processing modes can be correspondingly set by obtaining the mode setting information of the user, so that the user can provide corresponding mode setting information according to the personalized requirements of the user to set the asset processing mode, and the asset processing requirements of the user can be more accurately met.
After determining the current asset processing mode, the process proceeds to step S2300 or S2400, respectively, according to the asset processing mode.
Step S2300, when the asset processing mode is the masquerading protection mode, acquiring the masquerading digital asset information of the target user for display, and not responding to the digital asset processing operation performed by the target user.
The masquerading protection mode is an asset handling mode for masquerading a user's real digital assets to protect the digital assets.
The masquerading digital asset information is digital asset information of a masquerading non-real user. The masquerading digital asset information may be configured by default or preset by the user according to the above step S2020, and the masquerading digital asset information may be saved in the local storage of the device implementing the present embodiment for direct reading, and acquisition is requested by the device to the backend device (e.g., server) that establishes the connection.
Under a pretend protection mode, obtaining pretend digital asset information to display so as to hide real digital asset information of a user, avoiding disclosure to a third party to enable the third party to obtain assets of the user based on illegal means such as use stress caused by the real digital asset information and the like, and bringing asset loss to the user; meanwhile, in the pretend protection mode, digital asset processing operations (including operations related to digital asset processing such as extraction, payment, transfer, loan and overdraft) carried out by the user are not responded, so that the user can not process the digital assets even if the digital asset processing operations are carried out by illegal means such as coercion of a third party and the like, the third party can not consider that the value of crime implementation does not exist, and the digital assets are effectively protected.
In a more specific example, the step of not responding to the digital asset processing operation performed by the target user may comprise:
disabling application functionality associated with the digital asset processing operation;
alternatively, the response processing fails upon receipt of the digital asset processing operation.
In this example, the application functions related to the digital asset processing operation may include functions related to digital asset processing, such as transfer, payment, loan, overdraft, and withdrawal, and may further include functions related to a financial channel such as a bank card, a network loan function, and the like, and by disabling these application functions, it is possible to implement digital asset processing operations that cannot respond to a user, to make the user unable to process digital assets even if the user performs digital asset processing operations by an illegal means such as duress of a third party, and to make a third party think that there is no value for crime, thereby implementing effective protection of digital assets.
Or, when receiving the digital asset processing operation, responding to the processing failure, for example, directly returning a failure reason that the operation cannot be responded, such as network unavailability and application maintenance upgrade, when receiving the digital asset processing operation, which is simpler and more efficient to implement than the manner of disabling the application function related to the digital asset processing operation as described above.
And step S2400, when the asset processing mode is the normal processing mode, acquiring the real digital asset information of the target user for displaying, so that the target user can process the digital asset according to the real digital asset information.
The normal processing mode is an asset processing mode that supports normal processing of digital assets by a user.
The real digital asset information is information related to the user's real digital asset and may include the type of the user's digital asset, the real balance of each digital asset, and the like.
The real digital asset information of the user is acquired and displayed in the normal processing mode, so that the user can process the digital asset in a safe environment, and the safety of the digital asset is effectively protected.
< apparatus for processing digital assets >
In the present embodiment, there is provided a processing apparatus 3000 of a digital asset, as shown in fig. 2, comprising: the information obtaining unit 3100, the mode determining unit 3200, the first processing unit 3300, and the second processing unit 3400 are configured to implement the method for processing the digital asset provided in this embodiment, and are not described herein again.
An information obtaining unit 3100, configured to obtain user decryption information of a target user.
Optionally, the user decryption information at least includes one of decryption password information, decryption gesture information, or decryption biometric information; the decrypted biological characteristic information at least comprises one of user fingerprint information and face image information.
A mode determining unit 3200, configured to determine a current asset processing mode according to the user decryption information.
Optionally, the mode determination unit 3200 is configured to:
triggering and verifying the user decryption information, and determining a target encryption measure through which the user decryption information passes;
determining that a current asset processing mode is the masquerading protection mode when the target encryption measure is the masquerading encryption measure of the target user;
determining that a current asset processing mode is the normal processing mode when the target encryption measure is a normal encryption measure of the target user.
A first processing unit 3300, configured to, when the asset processing mode is a masquerading protection mode, obtain the masquerading digital asset information of a target user for presentation, and not respond to the digital asset processing operation performed by the target user.
Optionally, the first processing unit 3300 is further configured to:
disabling application functionality associated with the digital asset processing operation;
alternatively, the response processing fails upon receipt of the digital asset processing operation.
And the second processing unit 3400 is configured to, when the asset processing mode is the normal processing mode, obtain the real digital asset information of the target user and display the real digital asset information, so that the target user processes the digital asset according to the real digital asset information.
Optionally, the processing device 3000 of the digital asset further comprises:
means for obtaining mode setting information of the target user;
means for triggering and storing the masquerading encryption measure when the mode setting information includes the masquerading encryption measure of the target user, and recording the masquerading encryption measure corresponding to the masquerading protection mode;
and the device is used for triggering and storing the normal encryption measures when the mode setting information comprises the normal encryption measures of the target user, and recording the correspondence between the user encryption measures and the normal processing mode.
Optionally, the processing device 3000 of the digital asset further comprises:
and a device for triggering and storing the camouflaged digital asset information of the target user and recording the corresponding camouflaged digital asset information and the camouflaged protection mode when the mode setting information includes the camouflaged digital asset information of the target user.
It will be appreciated by those skilled in the art that the processing device 3000 of the digital asset may be implemented in various ways. For example, the processing device 3000 of the digital asset may be implemented by an instruction configuration processor. For example, the instructions may be stored in ROM and read from ROM into a programmable device when the device is started to implement the processing means 3000 of the digital asset. For example, the processing device 3000 of the digital asset may be solidified into a dedicated device (e.g., ASIC). The processing means 3000 of the digital assets can be divided into mutually independent units or they can be combined together for implementation. The processing means 3000 of the digital asset may be implemented by one of the various implementations described above, or may be implemented by a combination of two or more of the various implementations described above.
In this embodiment, the processing device 3000 of the digital asset may be application software, an applet, a system application, or the like providing a digital asset processing service, for example, an electronic wallet preset with a mobile phone operating system, a mobile phone bank downloadable from an application platform, or the like.
< Equipment for processing digital assets >
Fig. 3 is a block diagram showing a hardware configuration of a processing device 4000 of a digital asset, which can implement an embodiment of the present invention.
The processing device 4000 for digital assets may be a mobile terminal such as a laptop, a mobile phone, a tablet computer, or an electronic device such as a desktop computer, a central processing device, or the like. As shown in fig. 3, the processing apparatus 4000 of the digital asset may include a processor 4100, a memory 4200, an interface device 4300, a communication device 4400, a display device 4500, an input device 4600, a speaker 4700, a microphone 4800, and the like. The processor 4100 may be a central processing unit CPU, a microprocessor MCU, or the like. The memory 4200 includes, for example, a ROM (read only memory), a RAM (random access memory), a nonvolatile memory such as a hard disk, and the like. The interface 4300 includes, for example, a USB interface, a headphone interface, and the like. The communication device 4400 is capable of wired or wireless communication, for example, and may specifically include Wifi communication, bluetooth communication, 2G/3G/4G/5G communication, and the like. The display device 4500 is a liquid crystal display, a touch panel, or the like, for example. The input device 4600 may include, for example, a touch screen, a keyboard, a motion-sensing input, and the like. A user can input/output voice information through the speaker 4700 and the microphone 4800.
The digital asset processing device 4000 shown in fig. 3 is merely illustrative and is in no way meant to be any limitation on the application or use of the present embodiment. Although a plurality of devices are shown in fig. 3 for the processing apparatus 4000 of the digital asset, only some of the devices may be involved in the present embodiment, for example, the processing apparatus 4000 of the digital asset may involve only the processor 4100 and the storage 4200.
In a preferred example, the processing apparatus 4000 of the digital asset of the present embodiment may include:
a display device 4500;
a memory 4200 for storing executable instructions;
a processor 4400, configured to execute the processing device 4000 of the digital asset to execute the processing method of the digital asset according to any one of the embodiments, according to the control of the executable instruction.
The skilled person can design the instructions according to the disclosed solution. How the instructions control the operation of the processor is well known in the art and will not be described in detail herein.
In one specific example, the processing device 4000 for digital assets may be a cell phone that installs or loads application software, applets or system applications for the asset processing service.
< readable storage Medium >
In this embodiment, a readable storage medium is further provided, where a computer program readable and executable by a computer is stored, and when the computer program is read and executed by the computer, the computer program is configured to execute the processing method of the digital asset according to this embodiment.
The readable storage medium may be a tangible device that can hold and store instructions for use by an instruction execution device. The readable storage medium may be, for example, but not limited to, an electronic memory device, a magnetic memory device, an optical memory device, an electromagnetic memory device, a semiconductor memory device, or any suitable combination of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium include: a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), a Static Random Access Memory (SRAM), a portable compact disc read-only memory (CD-ROM), a Digital Versatile Disc (DVD), a memory stick, a floppy disk, a mechanical coding device, such as punch cards or in-groove projection structures having instructions stored thereon, and any suitable combination of the foregoing. A readable storage medium as used herein is not to be construed as a transitory signal per se, such as a radio wave or other freely propagating electromagnetic wave, an electromagnetic wave propagating through a waveguide or other transmission medium (e.g., a light pulse through a fiber optic cable), or an electrical signal transmitted through an electrical wire.
< example >
The processing method of the digital asset implemented by the processing device 3000 of the digital asset or the processing apparatus 4000 of the digital asset in the present embodiment will be further described below with reference to an example shown in fig. 4. Assume that this example is implemented by an electronic wallet device (i.e., a device in which an electronic wallet is installed) as the processing device 4000 of the digital asset.
As shown in fig. 4, the method for processing digital assets includes: steps S201-208 and S301-311.
S201, the user opens a mode setting interface provided by the electronic wallet device.
S202, the user sets normal encryption measures through the mode setting interface.
S203, the electronic wallet device saves the normal encryption measures and records that it corresponds to the normal processing mode.
S204, the electronic wallet device prompts the user that the normal processing mode setting is successful.
S205, the user sets the disguised encryption measure through the mode setting interface.
S206, the user sets the information of the disguised digital assets through the mode setting interface.
S207, the electronic wallet device stores the camouflage encryption measures and the camouflage digital asset information and records the information corresponding to the camouflage protection mode.
And S208, the electronic wallet device prompts the user that the setting of the camouflage protection mode is successful.
S301, the user starts the electronic wallet device.
And S302, the electronic wallet device provides a decryption information input interface and prompts a user to input decryption information.
S303, the user inputs the user decryption information.
S304, the electronic wallet device determines the asset processing mode according to the user decryption information, and proceeds to step S305 if the asset processing mode is the normal processing mode, otherwise, the asset processing mode is the masquerading protection mode, and proceeds to step S308.
S305, the electronic wallet equipment unlocks the real asset interface and displays the acquired real digital asset information of the user.
The real asset interface is a human-machine interaction interface provided by the electronic wallet device for presenting the user's real digital asset information.
S306, the user checks the real digital asset information and implements the digital asset processing operation.
S307, the electronic wallet device responds to the digital asset processing operation.
And S308, unlocking the disguised asset interface by the electronic wallet device, and displaying the preset disguised digital asset information of the user.
The masquerading asset interface is a human-machine interaction interface provided by the electronic wallet device for presenting the user's masquerading digital asset information.
S309, the user or the third party views the camouflaged digital asset information.
S310, the user or the third party carries out digital asset processing operation.
And S311, the electronic wallet equipment prompts network maintenance and operation fails.
The specific implementation of the above steps may be the same as the corresponding steps in the above embodiments, and will not be described herein again.
In this example, the user can set corresponding user encryption measures in different asset processing modes and disguised digital asset information in the disguised protection mode in the electronic wallet device according to the personalized setting requirement of the user, the electronic wallet device can determine the corresponding asset processing mode according to the user decryption information input by the user, display different digital asset information in different asset processing modes and take corresponding processing measures, so that the user can input the corresponding user decryption information into the disguised protection mode in an unsafe use environment (e.g. forced by people), trigger the electronic wallet to display the disguised digital asset information, and do not respond to the digital asset processing operation implemented by the user or a third party, thereby avoiding the loss of the digital asset of the user, and the user can enter the normal processing mode by providing the user decryption information in the safe use environment, the digital assets are normally processed, and the protection of the digital assets is effectively realized.
The digital asset processing method, apparatus, device and readable storage medium of the present embodiment have been described above with reference to the accompanying drawings and examples, and can determine a current asset processing mode according to the acquired user decryption information, and when the asset processing mode is a masquerading protection mode, display the masquerading digital asset information of the user and do not respond to the asset processing operation performed by the user, and when the asset processing mode is a normal processing mode, display the real digital asset information of the user for the user to normally perform asset processing, so that the user can provide corresponding user decryption information according to the current state of the user to enter different asset processing modes to process the asset, and when the user processes a dangerous state, the real digital asset information can be hidden by the masquerading digital asset information, thereby reducing the asset loss risk and effectively protecting the security of the digital asset.
< second embodiment >
In this embodiment, a method for processing a digital asset is provided. The specific definition of the digital assets has already been described in the first embodiment and will not be described in detail here.
As shown in fig. 5, the method for processing digital assets includes: steps S3100-S3300.
And S3100, determining an asset processing mode corresponding to the user decryption information according to the received user decryption information of the target user.
The user decryption information is information for verifying whether the user can pass an encryption measure related to the digital asset service. In one example, the user decryption information includes at least decryption password information, decryption gesture information, or decryption biometric information. The decryption password information includes a password, a multiple password, or a dynamic password, etc., which can decrypt the corresponding encryption measure. The decryption gesture information is gesture operation information which can decrypt the corresponding encryption measures and is applied to the corresponding human-computer interaction interface. The decrypted biometric information is information which is uniquely corresponding to the user and is used for decrypting the corresponding encryption measure and is related to the biometric characteristics, and the decrypted biometric information can be the biometric characteristics specific to the user, for example, the decrypted biometric information at least comprises one of fingerprint information and face image information of the user, and can also comprise iris information, DNA information and the like.
In this embodiment, the user decryption information may be obtained by receiving a message sent by a front-end device (e.g., a client) that establishes a connection with the device implementing this embodiment.
The asset handling mode is a mode that currently allows a user to handle digital assets, including a masquerading protection mode and a normal handling mode. The different asset processing modes correspond to different user encryption measures, the received user decryption information is used for decrypting the corresponding user encryption measures, the current asset processing mode can be determined according to the user encryption measures which can be decrypted by the user decryption information, and the disguised digital asset information or the real digital asset information is correspondingly provided for displaying in combination with the subsequent steps.
In one example, step S3100 may include: the steps are 3110-S3120.
Step S3110, verifying the user decryption information, and determining a target encryption measure that the user decryption information passes decryption.
Step S3120, determining that the current asset processing mode is a masquerading protection mode when the target encryption measure is a masquerading encryption measure of the target user.
Step S3130, when the target encryption measure is a normal encryption measure of the target user, determines that the current asset processing mode is a normal processing mode.
In this example, the steps S3110-S3130 may be implemented similarly to the steps S2201-S2203 in the first embodiment, and are not described herein again.
The received user decryption information is verified, so that a user encryption measure capable of decrypting the user decryption information is obtained, the current asset processing mode is determined, a user can provide different user decryption information according to the current state of the user, different asset processing modes are entered for processing the digital asset, the digital asset is protected in a targeted manner, and the method is simple to implement and is more efficient.
In one example, the method for processing a digital asset in this embodiment may further include: steps S3010-S3030.
S3010, receives mode setting information of the target user.
S3020, when the mode setting information includes the target user disguised encryption measure, storing the disguised encryption measure, and recording that the disguised encryption measure corresponds to the disguised protection mode.
S3030, when the mode setting information comprises the normal encryption measure of the target user, the normal encryption measure is stored, and the normal encryption measure is recorded to correspond to the normal processing mode.
In this example, the mode setting information is obtained by receiving a message sent by a front-end device (e.g., a client) that establishes a connection with a device implementing the embodiment, and steps S3010 to S3030 may refer to steps S2020 to S2030 in the first embodiment except that the obtaining source of the mode setting information may be different, and are not described herein again.
In a more specific example, step S3020 may further include:
step S3021, when the mode setting information includes the camouflaged digital asset information of the target user, storing the camouflaged digital asset information of the target user, and recording that the camouflaged digital asset information corresponds to the camouflaged protection mode.
In this example, the storage mode setting information includes the camouflaged digital asset information and the corresponding relationship between the record and the camouflaged protection, so that the user can set the camouflaged digital asset information meeting the digital asset protection requirement of the user by aiming at the camouflaged protection mode, for example, by setting the camouflaged digital asset information, indicating which types of digital assets can be displayed, how much camouflaged balance of the displayed digital assets is, and the like, thereby realizing that the user can individually set the camouflaged digital asset information according to the user's requirement, and accurately meeting the digital asset protection requirement of the user.
Through the steps S3010 to S3030, the user encryption measures corresponding to different asset processing modes can be correspondingly set through the received mode setting information of the user, so that the user can provide corresponding mode setting information according to the personalized requirements of the user to set the asset processing mode, and the asset processing requirements of the user can be met more accurately.
After step S3100, according to the current asset processing mode, S3200 or S3300 is entered, respectively.
S3200, when the asset processing mode is the masquerading protection mode, providing the masquerading digital asset information of the target user corresponding to the masquerading protection mode for display.
The masquerading protection mode is an asset handling mode for masquerading a user's real digital assets to protect the digital assets.
The masquerading digital asset information is digital asset information of a masquerading non-real user and may include the type of digital assets that the user sets to be presented in the masquerading digital mode, the masquerading balance of each digital asset. In this embodiment, the presentation may be performed by providing the masquerading digital asset information to a head-end device (e.g., client, etc.) that establishes a connection with the device implementing this embodiment.
In the pretend protection mode, pretend digital asset information is provided for display, so that the real digital asset information of a user is hidden, the condition that a third party is leaked to enable the third party to obtain the assets of the user by illegal means such as use coercion and the like based on the real digital asset information is avoided, and asset loss is brought to the user.
And S3300, when the asset processing mode is the normal processing mode, providing the real asset information of the target user for display.
The normal processing mode is an asset processing mode that supports normal processing of digital assets by a user.
The real digital asset information is information related to the user's real digital asset and may include the type of the user's digital asset, the real balance of each digital asset, and the like. In this embodiment, the presentation may be performed by providing the real digital asset information to a front-end device (e.g., a client, etc.) that establishes a connection with the device implementing this embodiment.
The real digital asset information of the user is provided for displaying in the normal processing mode, so that the user can process the digital asset in a safe environment, and the safety of the digital asset is effectively protected.
< apparatus for processing digital assets >
In the present embodiment, there is provided a processing apparatus 5000 for a digital asset, as shown in fig. 6, including: the information processing unit 5100, the first information providing unit 5200, and the second information providing unit 5300 are used to implement the processing method of the digital asset provided in this embodiment, and will not be described herein again.
The information processing unit 5100 is configured to determine an asset processing mode corresponding to the user decryption information according to the received user decryption information of the target user.
Optionally, the information processing unit 5100 is further configured to:
verifying the user decryption information, and determining a target encryption measure through which the user decryption information passes;
determining that a current asset processing mode is the masquerading protection mode when the target encryption measure is the masquerading encryption measure of the target user;
determining that a current asset processing mode is the normal processing mode when the target encryption measure is a normal encryption measure of the target user.
A first information providing unit 5200 is used for providing the disguised digital asset information of the target user corresponding to the disguised protection mode for presentation when the asset processing mode is the disguised protection mode.
The second information providing unit 5300, when the asset processing mode is the normal processing mode, provides real asset information of the target user for presentation.
Optionally, the processing apparatus 5000 of the digital asset further includes:
means for receiving mode setting information of the target user;
means for storing the masquerading encryption measure and recording that the masquerading encryption measure corresponds to the masquerading protection mode when the mode setting information includes the masquerading encryption measure by the target user;
and when the mode setting information comprises the normal encryption measures of the target user, storing the normal encryption measures and recording the correspondence between the normal encryption measures and the normal processing mode.
Optionally, the processing apparatus 5000 of the digital asset further includes:
and means for storing the camouflaged digital asset information of the target user and recording the camouflaged digital asset information corresponding to the camouflaged protection mode when the mode setting information includes the camouflaged digital asset information of the target user.
It will be appreciated by those skilled in the art that the processing means 5000 of the digital assets may be implemented in various ways. For example, the processing means 5000 of the digital assets may be implemented by an instruction configuration processor. For example, the instructions may be stored in ROM and read from ROM into a programmable device when the device is started up to implement the processing means 5000 of the digital asset. For example, the processing means 5000 of the digital assets may be solidified into a dedicated device (e.g. an ASIC). The processing means 5000 of the digital assets may be divided into mutually independent units or they may be implemented by being combined together. The processing means 5000 of the digital assets may be implemented by one of the various implementations described above, or may be implemented by a combination of two or more of the various implementations described above.
In this embodiment, the processing device 5000 of the digital asset may be a backend server of application software, an applet, or a system application providing a digital asset processing service.
< Equipment for processing digital assets >
Fig. 7 shows a block diagram of a hardware configuration of a processing device 6000 of a digital asset which may implement an embodiment of the invention.
The processing device 6000 of the digital asset may be, for example, a blade server, a cloud server, or a server cluster, etc. The processing device 6000 of the digital asset may be as shown in fig. 7, comprising a processor 6100, a memory 6200, interface means 6300, communication means 6400, display means 6500, input means 6600. Although the server may also include a speaker, a microphone, and the like, these components are not related to the present embodiment and are omitted here. The processor 6100 may be, for example, a central processing unit CPU, a microprocessor MCU, or the like. The memory 6200 includes, for example, a ROM (read only memory), a RAM (random access memory), a nonvolatile memory such as a hard disk, and the like. The interface device 6300 includes, for example, a USB interface, a serial interface, and the like. The communication device 6400 can perform wired or wireless communication, for example. The display device 6500 is, for example, a liquid crystal display. The input device 6600 may include, for example, a touch screen, a keyboard, and the like.
The server shown in fig. 7 is merely illustrative and in no way implies any limitation as to the application or use of the present embodiments. Although a plurality of devices are shown in fig. 7 for the processing apparatus 6000 of the digital asset, only a part of the devices may be referred to in the present embodiment, for example, the processing apparatus 6000 of the digital asset may refer only to the processor 6100 and the storage 6200.
In a preferred example, the processing device 6000 of the digital asset of the present embodiment may include:
a memory 6200 for storing executable instructions;
a processor 6100, configured to execute the processing device 6000 for operating the digital asset to perform the processing method of the digital asset according to any one of the embodiments.
The skilled person can design the instructions according to the disclosed solution. How the instructions control the operation of the processor is well known in the art and will not be described in detail herein.
In a specific example, the processing device 6000 for the digital assets can be a server providing back-end services for application software, applets or system applications of the asset processing service.
< readable storage Medium >
In this embodiment, a readable storage medium is further provided, where a computer program readable and executable by a computer is stored, and when the computer program is read and executed by the computer, the computer program is configured to execute the processing method of the digital asset according to this embodiment.
The readable storage medium may be a tangible device that can hold and store instructions for use by an instruction execution device. The readable storage medium may be, for example, but not limited to, an electronic memory device, a magnetic memory device, an optical memory device, an electromagnetic memory device, a semiconductor memory device, or any suitable combination of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium include: a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), a Static Random Access Memory (SRAM), a portable compact disc read-only memory (CD-ROM), a Digital Versatile Disc (DVD), a memory stick, a floppy disk, a mechanical coding device, such as punch cards or in-groove projection structures having instructions stored thereon, and any suitable combination of the foregoing. A readable storage medium as used herein is not to be construed as a transitory signal per se, such as a radio wave or other freely propagating electromagnetic wave, an electromagnetic wave propagating through a waveguide or other transmission medium (e.g., a light pulse through a fiber optic cable), or an electrical signal transmitted through an electrical wire.
The digital asset processing method, apparatus, device and readable storage medium of the embodiments have been described above with reference to the accompanying drawings, and may determine a current asset processing mode according to received user decryption information, and when the asset processing mode is a masquerading protection mode, provide the masquerading digital asset information of the user for display, and when the asset processing mode is a normal processing mode, provide the real digital asset information of the user for display, so that the user may provide corresponding user decryption information according to its current state to enter different asset processing modes to process assets, and when it processes a dangerous state, the real digital asset information may be hidden by the masquerading digital asset information, thereby reducing asset loss risk and effectively protecting the security of digital assets.
< third embodiment >
In this embodiment, a digital asset processing system 7000 is provided, comprising:
a processing device 3000 of a digital asset provided in the first embodiment and a processing device 5000 of a digital asset provided in the second embodiment;
or,
the processing apparatus 4000 of digital assets provided in the second embodiment and the processing apparatus 6000 of digital assets provided in the second embodiment.
< example >
The method of processing a digital asset as implemented by the digital asset processing system 7000 of this embodiment will be further illustrated with reference to fig. 8.
In this example, processing device 4000 of the digital asset included in processing system 7000 of the digital asset is an electronic wallet front-end device (or a client of an electronic wallet), and processing device 6000 of the digital asset is an electronic wallet back-end device (or a server of an electronic wallet).
As shown in fig. 8, the method for processing a digital asset includes: steps S401-S413 and S501-513.
S401, the user sets normal encryption measures through a mode setting interface provided by the front-end equipment of the electronic wallet.
S402, the front-end electronic wallet device sends the normal encryption measures to the back-end electronic wallet device.
And S403, the back-end equipment of the electronic wallet stores the normal encryption measures and records the corresponding normal processing mode.
S404, the back-end device returns a successful save to the front-end device.
S405, the electronic wallet front-end device prompts the user that the normal processing mode setting is successful.
S406, the user sets the camouflage encryption measures through the mode setting interface.
S407, the user sets the disguised digital asset information of the disguised protection mode through the mode setting interface.
S408, the electronic wallet front-end device transmits the masquerading encryption measure and the masquerading digital asset information to the electronic wallet back-end device.
And S409, the electronic wallet back-end equipment stores the camouflage encryption measures and the camouflage digital asset information and records the information corresponding to the camouflage protection mode.
And S410, the back-end equipment of the electronic wallet returns a successful storage to the front-end equipment of the electronic wallet.
S411, the electronic wallet divides the front-end equipment to prompt the user that the setting of the camouflage protection mode is successful.
S501, the user starts the front-end equipment of the electronic wallet.
And S502, the front-end equipment of the electronic wallet provides a decryption information input interface to prompt the user to input the decryption information.
S503, the user inputs the user decryption information.
And S504, the front-end electronic wallet device sends the user decryption information to the back-end electronic wallet device.
S505, the electronic wallet back end device user deciphers the information to determine the asset processing mode, if the asset processing mode is the normal processing mode, the step S506 is entered, otherwise, the asset processing mode is the disguised protection mode, and the step S509 is entered.
S506, the electronic wallet back-end device provides the real digital asset information to the electronic wallet front-end device.
And S507, unlocking the real asset interface by the front-end equipment of the electronic wallet, and displaying the acquired real digital asset information of the user.
The real asset interface is a human-machine interaction interface provided by the electronic wallet device for presenting the user's real digital asset information.
S508, the user views the real digital asset information and implements digital asset processing operation.
S509, the electronic wallet device responds to the digital asset processing operation.
S510, the electronic wallet back-end device provides the masquerading digital asset information to the electronic wallet front-end device.
And S511, unlocking the disguised asset interface by the front-end equipment of the electronic wallet, and displaying the preset disguised digital asset information of the user.
The masquerading asset interface is a human-machine interaction interface provided by the electronic wallet device for presenting the user's masquerading digital asset information.
And S512, the user or the third party views the information of the disguised digital assets.
S513, the user or the third party performs the digital asset processing operation.
And S514, the front-end equipment of the electronic wallet prompts network maintenance and operation fails.
The specific implementation of the above steps may be the same as the corresponding steps in the first or second embodiment, and will not be described herein again.
In this example, the user can set the corresponding user encryption measures in different asset processing modes and the disguised digital asset information in the disguised protection mode through the electronic wallet front-end device according to the personalized setting requirement of the user, the user encryption measures and the disguised digital asset information in the disguised protection mode are stored by the back-end device of the electronic wallet, the electronic wallet front-end device can send the user decryption information input by the user to the back-end device of the electronic wallet to determine the corresponding asset processing mode, correspondingly acquire the different digital asset information in the different asset processing modes for display, and adopt the corresponding processing measures, so that the user can input the corresponding user decryption information into the disguised protection mode in an unsafe use environment (such as being forced by people), trigger the electronic wallet to display the disguised digital asset information, and does not respond to the digital asset processing operation implemented by the user or a third party, thereby avoiding the, and under the safe use environment, the user can enter a normal processing mode by providing user decryption information to normally process the digital assets, thereby effectively realizing the protection of the digital assets.
The present invention may be a system, method and/or computer program product. The computer program product may include a computer-readable storage medium having computer-readable program instructions embodied therewith for causing a processor to implement various aspects of the present invention.
The computer readable storage medium may be a tangible device that can hold and store the instructions for use by the instruction execution device. The computer readable storage medium may be, for example, but not limited to, an electronic memory device, a magnetic memory device, an optical memory device, an electromagnetic memory device, a semiconductor memory device, or any suitable combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), a Static Random Access Memory (SRAM), a portable compact disc read-only memory (CD-ROM), a Digital Versatile Disc (DVD), a memory stick, a floppy disk, a mechanical coding device, such as punch cards or in-groove projection structures having instructions stored thereon, and any suitable combination of the foregoing. Computer-readable storage media as used herein is not to be construed as transitory signals per se, such as radio waves or other freely propagating electromagnetic waves, electromagnetic waves propagating through a waveguide or other transmission medium (e.g., optical pulses through a fiber optic cable), or electrical signals transmitted through electrical wires.
The computer-readable program instructions described herein may be downloaded from a computer-readable storage medium to a respective computing/processing device, or to an external computer or external storage device via a network, such as the internet, a local area network, a wide area network, and/or a wireless network. The network may include copper transmission cables, fiber optic transmission, wireless transmission, routers, firewalls, switches, gateway computers and/or edge servers. The network adapter card or network interface in each computing/processing device receives computer-readable program instructions from the network and forwards the computer-readable program instructions for storage in a computer-readable storage medium in the respective computing/processing device.
The computer program instructions for carrying out operations of the present invention may be assembler instructions, Instruction Set Architecture (ISA) instructions, machine-related instructions, microcode, firmware instructions, state setting data, or source or object code written in any combination of one or more programming languages, including an object oriented programming language such as Smalltalk, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The computer-readable program instructions may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider). In some embodiments, aspects of the present invention are implemented by personalizing an electronic circuit, such as a programmable logic circuit, a Field Programmable Gate Array (FPGA), or a Programmable Logic Array (PLA), with state information of computer-readable program instructions, which can execute the computer-readable program instructions.
Aspects of the present invention are described herein with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the invention. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer-readable program instructions.
These computer-readable program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks. These computer-readable program instructions may also be stored in a computer-readable storage medium that can direct a computer, programmable data processing apparatus, and/or other devices to function in a particular manner, such that the computer-readable medium storing the instructions comprises an article of manufacture including instructions which implement the function/act specified in the flowchart and/or block diagram block or blocks.
The computer readable program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other devices to cause a series of operational steps to be performed on the computer, other programmable apparatus or other devices to produce a computer implemented process such that the instructions which execute on the computer, other programmable apparatus or other devices implement the functions/acts specified in the flowchart and/or block diagram block or blocks.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of instructions, which comprises one or more executable instructions for implementing the specified logical function(s). In some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions. It is well known to those skilled in the art that implementation by hardware, by software, and by a combination of software and hardware are equivalent.
Having described embodiments of the present invention, the foregoing description is intended to be exemplary, not exhaustive, and not limited to the embodiments disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the described embodiments. The terminology used herein is chosen in order to best explain the principles of the embodiments, the practical application, or improvements made to the technology in the marketplace, or to enable others of ordinary skill in the art to understand the embodiments disclosed herein. The scope of the invention is defined by the appended claims.