CN108346047A - Private key protection method and device for digital wallet, electronic equipment and storage medium - Google Patents
Private key protection method and device for digital wallet, electronic equipment and storage medium Download PDFInfo
- Publication number
- CN108346047A CN108346047A CN201810145978.5A CN201810145978A CN108346047A CN 108346047 A CN108346047 A CN 108346047A CN 201810145978 A CN201810145978 A CN 201810145978A CN 108346047 A CN108346047 A CN 108346047A
- Authority
- CN
- China
- Prior art keywords
- information
- private key
- user behavior
- user
- digital wallet
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
- G06Q20/363—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes with the personal data of a user
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
- G06Q20/367—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
- G06Q20/3674—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes involving authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
Landscapes
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Engineering & Computer Science (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The embodiment of the invention provides a method and a device for protecting a private key of a digital wallet, electronic equipment and a storage medium, wherein the method comprises the following steps: obtaining user behavior information affecting the security of a private key of the digital wallet; acquiring a safety level evaluation result of the user behavior by using a preset safety level evaluation standard and the acquired user behavior information; obtaining safety setting guide information based on the safety level evaluation result; the security setting guidance information is displayed to guide the user to improve the security of the private key of the digital wallet. By applying the embodiment of the invention, the safety level evaluation result of the user behavior can be obtained through the user behavior information analysis, so that the safety setting guide information can be obtained according to the safety level evaluation result, and the user is guided to carry out corresponding safety defense operation through the safety setting guide information, so that the safety of the private key of the digital wallet can be improved through the safety defense operation, and the safety of the assets in the digital wallet is ensured.
Description
Technical field
The present invention relates to digital wallet technical fields, more particularly to the private key protection method of digital wallet, device, electronics
Equipment and readable storage medium storing program for executing.
Background technology
With the development of technology, more and more users using digital wallet come manage digital cash (such as bit coin and
Lay spy's coin etc.).Wherein, digital wallet is the wallet based on block chain technology, and private key is the digital goods managed in digital wallet
The exclusive evidence of coin.
But there is presently no the schemes that the private key for digital wallet is protected so that private key faces stolen at any time
Risk.And the security risk that can cause digital cash stolen when private key is stolen, it can not ensure the assets security of user.
Invention content
The embodiment of the present invention be designed to provide a kind of private key protection method of digital wallet, device, electronic equipment and
Storage medium, to draw by user behavior information acquisition security setting guidance information, and by the security setting guidance information
Lead user and carry out corresponding Prevention-Security operation, to improve digital wallet private key safety, and then ensure digital wallet
The safety of middle assets.Specific technical solution is as follows:
In a first aspect, an embodiment of the present invention provides a kind of private key protection method of digital wallet, this method may include:
Obtain the user behavior information for the private key safety for influencing digital wallet;
Using default safe class evaluation criteria and the user behavior information obtained, the safe class of user behavior is obtained
Assessment result;
Based on safe class assessment result, security setting guidance information is obtained;
Security setting guidance information is shown, to guide the safety of the private key of user's raising digital wallet.
Optionally, the step of user behavior information of the private key safety of acquisition influence digital wallet may include:
Questionnaire is preset in display;Wherein, presetting to record in questionnaire has:Influence the pre- of the private key safety of digital wallet
If user behavior information, and the corresponding tick boxes of each pre-set user behavioural information;When a pre-set user behavioural information pair
When the tick boxes answered are selected, show that the pre-set user behavioural information is selected;
Obtain the Questionnaire results for presetting questionnaire;
The pre-set user behavioural information that will be selected in Questionnaire results is determined as influencing the private key safety of digital wallet
User behavior information.
Optionally, pre-set user behavioural information may include:Accessed behavioural information, the opened carrying disease of high-risk webpage
The behavioural information of the mail of poison is used as assets payment cipher by the behavioural information of screenshotss backup private key and merely with numerical ciphers
Behavioural information at least one of.
Optionally, be based on safe class assessment result, obtain security setting guidance information the step of may include:
Judge whether obtained safe class assessment result is low;
If so, determining the obtained corresponding security setting guidance information of user behavior information;
Wherein, when the user behavior information obtained includes:The behavioural information of high-risk webpage was accessed, and/or, it is opened
When taking the behavioural information of viruliferous mail, identified security setting guidance information includes:Checking and killing virus prompting message;Work as institute
The user behavior information of acquisition includes:When by the behavioural information of screenshotss backup private key, identified security setting guidance information
Including:Dispersion storage private key prompting message;When the user behavior information obtained includes:Merely with numerical ciphers as assets branch
When paying the behavioural information of password, identified security setting guidance information includes:It is paid using biological characteristic password as assets
Password prompting message.
Optionally, using default safe class evaluation criteria and the user behavior information obtained, user behavior is obtained
The step of safe class assessment result, may include:
Determine the quantity of obtained user behavior information;
The quantitative range that quantification is located in default safe class evaluation criteria;Wherein, default safe class is commented
Estimating standard includes:The correspondence of quantitative range and safe class;
The corresponding safe class of quantitative range that quantity is located at is determined as the safe class assessment knot of user behavior
Fruit.
Second aspect, the embodiment of the present invention additionally provide a kind of private key protective device of digital wallet, which can wrap
It includes:
First obtains unit, the user behavior information for obtaining the private key safety for influencing digital wallet;
Second obtaining unit, for using the user behavior information preset safe class evaluation criteria and obtained, obtaining
The safe class assessment result of user behavior;
Third obtaining unit obtains security setting guidance information for being based on safe class assessment result;
Display unit, for showing security setting guidance information, to guide the safety of the private key of user's raising digital wallet
Property.
Optionally, in embodiments of the present invention, first obtains unit may include:
Subelement is shown, for showing default questionnaire;Wherein, presetting to record in questionnaire has:Influence digital money
The pre-set user behavioural information of the private key safety of packet, and the corresponding tick boxes of each pre-set user behavioural information;When one it is pre-
If the corresponding tick boxes of user behavior information are selected, show that the pre-set user behavioural information is selected;
Obtain subelement, the Questionnaire results for obtaining default questionnaire;
First determination subelement, the pre-set user behavioural information for will be selected in Questionnaire results, is determined as shadow
Ring the user behavior information of the private key safety of digital wallet.
Optionally, pre-set user behavioural information may include:Accessed behavioural information, the opened carrying disease of high-risk webpage
The behavioural information of the mail of poison is used as assets payment cipher by the behavioural information of screenshotss backup private key and merely with numerical ciphers
Behavioural information at least one of.
Optionally, in embodiments of the present invention, third obtaining unit may include:
Judgment sub-unit, for judging whether obtained safe class assessment result is low;
Second determination subelement, for when judgment sub-unit judges that obtained safe class assessment result is low, really
Fixed the obtained corresponding security setting guidance information of user behavior information;
Wherein, when the user behavior information obtained includes:The behavioural information of high-risk webpage was accessed, and/or, it is opened
When taking the behavioural information of viruliferous mail, identified security setting guidance information includes:Checking and killing virus prompting message;Work as institute
The user behavior information of acquisition includes:When by the behavioural information of screenshotss backup private key, identified security setting guidance information
Including:Dispersion storage private key prompting message;When the user behavior information obtained includes:Merely with numerical ciphers as assets branch
When paying the behavioural information of password, identified security setting guidance information includes:It is paid using biological characteristic password as assets
Password prompting message.
Optionally, in embodiments of the present invention, the second obtaining unit may include:
Third determination subelement, the quantity for determining obtained user behavior information;
4th determination subelement, the quantitative range being located in default safe class evaluation criteria for quantification;
Wherein, presetting safe class evaluation criteria includes:The correspondence of quantitative range and safe class;
5th determination subelement, the corresponding safe class of quantitative range for quantity to be located at, is determined as user's row
For safe class assessment result.
The third aspect, the embodiment of the present invention additionally provide a kind of electronic equipment, which may include processor, leads to
Believe interface, memory and communication bus, wherein processor, communication interface, memory complete mutual lead to by communication bus
Letter;
Memory, for storing computer program;
Processor when for executing the program stored on memory, realizes any one of first aspect digital wallet
The method and step that private key protection method embodiment provides.
Fourth aspect, the embodiment of the present invention additionally provide a kind of storage medium, and computer journey is stored in the storage medium
Sequence, the private key protection method embodiment of any one of first aspect digital wallet provides when computer program is executed by processor
Method and step.
In embodiments of the present invention, the digital wallet on electronic equipment can obtain the private key safety for influencing the digital wallet
User behavior information.It is then possible to using safe class evaluation criteria and the user behavior information is preset, to the electronic equipment
The performed user behavior crossed of user carry out safe class assessment, obtain safe class assessment result.It later, can be according to this
Safe class assessment result obtains the security setting guidance information for the electronic equipment, and guides the security setting and believe
Breath is shown.Wherein, since the security setting guidance information is the safety of the private key for guiding user's raising digital wallet
The information of property.Thus, by the security setting guidance information, user can be known anti-for eliminating the stolen safety threatened of private key
Imperial operation, and then the safety of the private key to improve digital wallet can be operated by the Prevention-Security, it ensure that digital wallet
The safety of middle assets.
Description of the drawings
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with
Obtain other attached drawings according to these attached drawings.
Fig. 1 is a kind of private key protection method flow chart of digital wallet provided in an embodiment of the present invention;
Fig. 2 is a kind of structural schematic diagram of the private key protective device of digital wallet provided in an embodiment of the present invention;
Fig. 3 is the structural schematic diagram of a kind of electronic equipment provided in an embodiment of the present invention.
Specific implementation mode
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation describes, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall within the protection scope of the present invention.
In order to solve the problems, such as the private key of digital wallet in the prior art exist it is stolen threaten, the embodiment of the present invention is from user
The angle of behavior safety provides a kind of private key protection method of digital wallet, device, electronic equipment and storage medium.
The private key protection method of digital wallet provided in an embodiment of the present invention is illustrated first below.
It should be noted that the executive agent of the private key protection method of digital wallet provided in an embodiment of the present invention is number
Wallet client end can also be referred to as digital wallet.Wherein, in the electronic device, which sets the installation of digital wallet client
Standby including but not limited to mobile phone and tablet computer.
Referring to Fig. 1, the private key protection method of digital wallet provided in an embodiment of the present invention may include steps of:
S101:Obtain the user behavior information for the private key safety for influencing digital wallet;
Inventor has found that user, can be to installing to the usage behavior of electronic equipment, i.e. user behavior in the electronic equipment
The safety of the private key of digital wallet impacts.For example, when user is opened take viruliferous mail when, the opened carrying
The user behavior of the mail of virus can threaten to the safety of private key.Wherein, the virus entrained by the mail is to steal private
The virus of key can all influence private key alternatively, when viral subversive entrained by the mail Prevention-Security function of the electronic equipment
Safety.Thus in embodiments of the present invention, in order to ensure the safety of private key, the user's row for influencing private key safety can be obtained
For corresponding user behavior information.
In one implementation, it can detect which operation user performs by user behavior detection plug-in unit, from
And all user behavior information for the user for operating the electronic equipment can be obtained.Then, each user detected is utilized
Behavioural information is matched with the user behavior information stored in default behavioural information table.Wherein, in the default behavioural information table
The user behavior information of storage is:The user behavior information that the safety of the private key of digital wallet can be impacted.
When the user behavior information stored in the user behavior information that detection obtains and default behavioural information table
When matching, then show that the user behavior corresponding to the user behavior information detected can threaten to the safety of private key.
At this point it is possible to which the user behavior information that this is detected is determined as to influence the user behavior information of the private key safety of digital wallet.
In another implementation, the user behavior for influencing private key safety can also be obtained by presetting questionnaire
Information.Wherein, it can have been recorded in the default questionnaire:It can influence the pre-set user behavior letter of the private key safety of digital wallet
Breath, and the corresponding tick boxes of each pre-set user behavioural information.Also, it is chosen when a pre-set user behavioural information is corresponding
When frame is selected, show that the pre-set user behavioural information is selected.
In this kind of realization method, digital wallet, which can first be shown to user, presets questionnaire.Then, user can root
The default questionnaire is filled according to the user behavior operated.In turn, digital wallet can obtain asking for default questionnaire
Roll up investigation result.Then, the pre-set user behavioural information that digital wallet can will be selected in Questionnaire results, is determined as shadow
Ring the user behavior information of the private key safety of digital wallet.
Wherein, the pre-set user behavioural information recorded in questionnaire may include:Accessed the behavior letter of high-risk webpage
Breath, the opened behavioural information for taking viruliferous mail, by the behavioural information of screenshotss backup private key and merely with numerical ciphers
As at least one in the behavioural information of assets payment cipher.Certainly, which can also include:Pass through
The behavioural information of handwriting mode backup private key, and fed back the behavioural information etc. that account number cipher is stolen, certainly not office
It is limited to this.Also, pre-set user behavioural information can be arranged according to actual conditions in those skilled in the art, do not do herein in detail
It states.
Wherein, when by screenshotss or handwriting mode, come when backing up private key, private key is progress full storage, full storage is private
Key is easier that private key is caused to be stolen by criminal, both storage modes can also influence the safety of private key.
S102:Using default safe class evaluation criteria and the user behavior information obtained, the peace of user behavior is obtained
Congruent grade assessment result;
After the user behavior information for acquiring the private key safety for influencing digital wallet, in one implementation,
It can determine the quantity of obtained user behavior information.Then, it is determined that quantity institute position in default safe class evaluation criteria
In quantitative range.Wherein, presetting safe class evaluation criteria includes:The correspondence of quantitative range and safe class.It
Afterwards, the corresponding safe class of quantitative range that can be located at quantity, is determined as the safe class assessment result of user behavior.
For example, the user behavior information of the private key safety of acquisition influence digital wallet is:Accessed high-risk webpage
Behavioural information, the opened behavioural information for taking viruliferous mail and when by the behavioural information of screenshotss backup private key, can be with
Determine that the quantity of obtained user behavior information is 3.
Where it is assumed that in default safe class evaluation criteria, quantitative range quantity < 1 has corresponding with high safety grade
Relationship;Quantitative range 1≤quantity≤2 have correspondence with intermediate security grade;Quantitative range quantity >=3 and lower security grade
With correspondence.
In this way, the corresponding lower security grade in quantitative range quantity >=3 that can will determine that obtained quantity 3 is located at, really
It is set to the safe class assessment result of user behavior, that is, determines that the security level of the user behavior of the user is low.
In another implementation, default grade form is also based on to determine the total of obtained user behavior information
Score.Wherein, presetting to record in grade form has:The correspondence of user behavior information and score.It is then possible to determine total score
The fraction range being located in default safe class evaluation criteria.In this kind of realization method, safe class assessment mark is preset
Standard includes:The correspondence of fraction range and safe class.Later, the quantitative range that can be located at total score is corresponding
Safe class is determined as the safe class assessment result of user behavior, and this is also rational.
S103:Based on safe class assessment result, security setting guidance information is obtained;
After obtaining the safe class assessment result of user behavior, it can be determined that the safe class assessment result obtained
Whether it is low.If being judged as low, in one implementation, preset security setting guidance information can be obtained.Wherein, should
Preset security setting guidance information may include:Checking and killing virus prompting message and dispersion storage private key prompting message.
It in another implementation, can be according to the user behavior information obtained, to determine obtained user's row
For the corresponding security setting guidance information of information.Specifically, when the user behavior information obtained includes:Accessed high-risk webpage
Behavioural information, and/or, when the opened behavioural information for taking viruliferous mail, identified security setting guidance information can
To include:Checking and killing virus prompting message.When the user behavior information obtained includes:Pass through the behavioural information of screenshotss backup private key
When, identified security setting guidance information may include:Dispersion storage private key prompting message.When the user behavior letter obtained
Breath includes:When merely with behavioural information of the numerical ciphers as assets payment cipher, identified security setting guidance information can
To include:Using biological characteristic password as assets payment cipher prompting message.It is understood that security setting guiding letter
Breath is:For guiding user to eliminate the stolen prompt message threatened of private key caused by obtained user behavior information.
In addition, dispersion storage private key can refer to:By pre-determined threshold algorithm, private key is divided into several parts, then
Distributing storage is carried out to various pieces.In this way, illegal molecule can be made to be difficult to obtain complete secret key, and increase illegal point
Son obtains the cost of complete secret key, so as to improve the safety of secret key.
Further, since the mode stored at present to private key is mostly full storage mode, thus when safe class is commented
When to estimate result be high or medium, in order to further increase the safety of private key, security setting guidance information can be obtained:Dispersion is deposited
Private key prompting message is stored up, alternatively, security setting guidance information can be obtained:Dispersion stores private key to a hardware core for default safety
The prompting message of piece, this is also rational.
S104:Security setting guidance information is shown, to guide the safety of the private key of user's raising digital wallet.
After obtaining security setting guidance information, the security setting guidance information of acquisition can be shown.Due to
Security setting guidance information is according to obtained from user behavior information, it is thus achieved that being obtained from user behavior level analysis:
For eliminating the stolen Prevention-Security operation threatened of private key, and user can be guided to execute Prevention-Security operation to improve number
The safety of the private key of wallet ensure that the safety of assets in digital wallet.
In embodiments of the present invention, the digital wallet on electronic equipment can obtain the private key safety for influencing the digital wallet
User behavior information.It is then possible to using safe class evaluation criteria and the user behavior information is preset, to the electronic equipment
The performed user behavior crossed of user carry out safe class assessment, obtain safe class assessment result.It later, can be according to this
Safe class assessment result obtains the security setting guidance information for the electronic equipment, and guides the security setting and believe
Breath is shown.Wherein, since the security setting guidance information is the safety of the private key for guiding user's raising digital wallet
The information of property.Thus, by the security setting guidance information, user can be known anti-for eliminating the stolen safety threatened of private key
Imperial operation, and then the safety of the private key to improve digital wallet can be operated by the Prevention-Security, it ensure that digital wallet
The safety of middle assets.
Corresponding to above method embodiment, the embodiment of the present invention additionally provides a kind of private key protective device of digital wallet,
Referring to Fig. 2, which may include:
First obtains unit 201, the user behavior information for obtaining the private key safety for influencing digital wallet;
Second obtaining unit 202, for using the user behavior information preset safe class evaluation criteria and obtained, obtaining
Obtain the safe class assessment result of user behavior;
Third obtaining unit 203 obtains security setting guidance information for being based on safe class assessment result;
Display unit 204, for showing security setting guidance information, to guide the peace of the private key of user's raising digital wallet
Quan Xing.
Using device provided in an embodiment of the present invention, the digital wallet on electronic equipment, which can obtain, influences the digital wallet
Private key safety user behavior information.It is then possible to using safe class evaluation criteria and the user behavior information is preset, it is right
The performed user behavior crossed of the user of the electronic equipment carries out safe class assessment, obtains safe class assessment result.Later,
The security setting guidance information for the electronic equipment can be obtained, and to the safety according to the safe class assessment result
Setting guidance information is shown.Wherein, since the security setting guidance information is for guiding user to improve digital wallet
The information of the safety of private key.Thus, by the security setting guidance information, user can be known is stolen prestige for eliminating private key
The Prevention-Security of the side of body operates, and then the safety of the private key to improve digital wallet can be operated by the Prevention-Security, ensures
The safety of assets in digital wallet.
Optionally, in embodiments of the present invention, first obtains unit 201 may include:
Subelement is shown, for showing default questionnaire;Wherein, presetting to record in questionnaire has:Influence digital money
The pre-set user behavioural information of the private key safety of packet, and the corresponding tick boxes of each pre-set user behavioural information;When one it is pre-
If the corresponding tick boxes of user behavior information are selected, show that the pre-set user behavioural information is selected;
Obtain subelement, the Questionnaire results for obtaining default questionnaire;
First determination subelement, the pre-set user behavioural information for will be selected in Questionnaire results, is determined as shadow
Ring the user behavior information of the private key safety of digital wallet.
Optionally, in embodiments of the present invention, pre-set user behavioural information may include:Accessed the behavior of high-risk webpage
It is information, the opened behavioural information for taking viruliferous mail, close by the behavioural information of screenshotss backup private key and merely with number
Code is as at least one in the behavioural information of assets payment cipher.
Optionally, in embodiments of the present invention, third obtaining unit 203 may include:
Judgment sub-unit, for judging whether obtained safe class assessment result is low;
Second determination subelement, for when judgment sub-unit judges that obtained safe class assessment result is low, really
Fixed the obtained corresponding security setting guidance information of user behavior information;
Wherein, when the user behavior information obtained includes:The behavioural information of high-risk webpage was accessed, and/or, it is opened
When taking the behavioural information of viruliferous mail, identified security setting guidance information includes:Checking and killing virus prompting message;Work as institute
The user behavior information of acquisition includes:When by the behavioural information of screenshotss backup private key, identified security setting guidance information
Including:Dispersion storage private key prompting message;When the user behavior information obtained includes:Merely with numerical ciphers as assets branch
When paying the behavioural information of password, identified security setting guidance information includes:It is paid using biological characteristic password as assets
Password prompting message.
Optionally, in embodiments of the present invention, the second obtaining unit 202 may include:
Third determination subelement, the quantity for determining obtained user behavior information;
4th determination subelement, the quantitative range for quantification place in default safe class evaluation criteria;Its
In, default safe class evaluation criteria includes:The correspondence of quantitative range and safe class;
5th determination subelement, for by the corresponding safe class of quantitative range where quantity, determining user behavior
Safe class assessment result.
Corresponding to above method embodiment, the embodiment of the present invention additionally provides a kind of electronic equipment, referring to Fig. 3, the electronics
Equipment includes processor 301, communication interface 302, memory 303 and communication bus 304, wherein processor 301, communication interface
302, memory 303 completes mutual communication by communication bus 304;
Memory 303, for storing computer program;
Processor 301 when for executing the program stored on memory 303, realizes any of the above-described digital wallet
The method and step that private key protection method embodiment provides.
In embodiments of the present invention, the digital wallet on electronic equipment can obtain the private key safety for influencing the digital wallet
User behavior information.It is then possible to using safe class evaluation criteria and the user behavior information is preset, to the electronic equipment
The performed user behavior crossed of user carry out safe class assessment, obtain safe class assessment result.It later, can be according to this
Safe class assessment result obtains the security setting guidance information for the electronic equipment, and guides the security setting and believe
Breath is shown.Wherein, since the security setting guidance information is the safety of the private key for guiding user's raising digital wallet
The information of property.Thus, by the security setting guidance information, user can be known anti-for eliminating the stolen safety threatened of private key
Imperial operation, and then the safety of the private key to improve digital wallet can be operated by the Prevention-Security, it ensure that digital wallet
The safety of middle assets.
The communication bus that above-mentioned electronic equipment is mentioned can be Peripheral Component Interconnect standard (Peripheral Component
Interconnect, PCI) bus or expanding the industrial standard structure (Extended Industry Standard
Architecture, EISA) bus etc..The communication bus can be divided into address bus, data/address bus, controlling bus etc..For just
It is only indicated with a thick line in expression, figure, it is not intended that an only bus or a type of bus.
Communication interface is for the communication between above-mentioned electronic equipment and other equipment.
Memory may include random access memory (Random Access Memory, RAM), can also include non-easy
The property lost memory (Non-Volatile Memory, NVM), for example, at least a magnetic disk storage.Optionally, memory may be used also
To be at least one storage device for being located remotely from aforementioned processor.
Above-mentioned processor can be general processor, including central processing unit (Central Processing Unit,
CPU), network processing unit (Network Processor, NP) etc.;It can also be digital signal processor (Digital Signal
Processing, DSP), it is application-specific integrated circuit (Application Specific Integrated Circuit, ASIC), existing
It is field programmable gate array (Field-Programmable Gate Array, FPGA) or other programmable logic device, discrete
Door or transistor logic, discrete hardware components.
Corresponding to above method embodiment, the embodiment of the present invention additionally provides a kind of storage medium, which is meter
Calculation machine readable storage medium storing program for executing is stored with computer program in the storage medium, is realized when computer program is executed by processor
State the method and step that the private key protection method embodiment of any one digital wallet provides.
After the computer program stored in storage medium provided in an embodiment of the present invention is executed by the processor of electronic equipment,
Digital wallet on electronic equipment can obtain the user behavior information for the private key safety for influencing the digital wallet.So
Afterwards, default safe class evaluation criteria and the user behavior information can be utilized, is crossed performed by the user to the electronic equipment
User behavior carries out safe class assessment, obtains safe class assessment result.Later, it can be assessed and be tied according to the safe class
Fruit obtains the security setting guidance information for the electronic equipment, and is shown to the security setting guidance information.Its
In, since the security setting guidance information is the information of the safety of the private key for guiding user's raising digital wallet.Thus,
By the security setting guidance information, user can be known for eliminating the stolen Prevention-Security operation threatened of private key, Jin Erke
To operate the safety of the private key to improve digital wallet by the Prevention-Security, the safety of assets in digital wallet ensure that.
It should be noted that herein, relational terms such as first and second and the like are used merely to a reality
Body or operation are distinguished with another entity or operation, are deposited without necessarily requiring or implying between these entities or operation
In any actual relationship or order or sequence.Moreover, the terms "include", "comprise" or its any other variant are intended to
Non-exclusive inclusion, so that the process, method, article or equipment including a series of elements is not only wanted including those
Element, but also include other elements that are not explicitly listed, or further include for this process, method, article or equipment
Intrinsic element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that
There is also other identical elements in process, method, article or equipment including the element.
Each embodiment in this specification is all made of relevant mode and describes, identical similar portion between each embodiment
Point just to refer each other, and each embodiment focuses on the differences from other embodiments.Especially for device,
For electronic equipment and storage medium embodiment, since it is substantially similar to the method embodiment, so fairly simple, the phase of description
Place is closed referring to the part of embodiment of the method to illustrate.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the scope of the present invention.It is all
Any modification, equivalent replacement, improvement and so within the spirit and principles in the present invention, are all contained in protection scope of the present invention
It is interior.
Claims (10)
1. a kind of private key protection method of digital wallet, which is characterized in that the method includes:
Obtain the user behavior information for the private key safety for influencing digital wallet;
Using default safe class evaluation criteria and the user behavior information obtained, the safe class assessment of user behavior is obtained
As a result;
Based on the safe class assessment result, security setting guidance information is obtained;
The security setting guidance information is shown, to guide the safety of the private key of user's raising digital wallet.
2. according to the method described in claim 1, it is characterized in that, the user for obtaining the private key safety for influencing digital wallet
The step of behavioural information includes:
Questionnaire is preset in display;Wherein, being recorded in the default questionnaire has:Influence the pre- of the private key safety of digital wallet
If user behavior information, and the corresponding tick boxes of each pre-set user behavioural information;When a pre-set user behavioural information pair
When the tick boxes answered are selected, show that the pre-set user behavioural information is selected;
Obtain the Questionnaire results of the default questionnaire;
The pre-set user behavioural information that will be selected in the Questionnaire results, is determined as influencing the private key of the digital wallet
The user behavior information of safety.
3. according to the method described in claim 2, it is characterized in that, the pre-set user behavioural information includes:It accessed high-risk
The behavioural information of webpage, the opened behavioural information for taking viruliferous mail, by the behavioural information of screenshotss backup private key and only
Using numerical ciphers as at least one in the behavioural information of assets payment cipher.
4. according to the method described in claim 3, it is characterized in that, it is described be based on the safe class assessment result, pacified
The step of setting guidance information includes entirely:
Judge whether obtained safe class assessment result is low;
If so, determining the obtained corresponding security setting guidance information of user behavior information;
Wherein, when the user behavior information obtained includes:The behavioural information of high-risk webpage was accessed, and/or, opened carrying
When the behavioural information of the mail of virus, identified security setting guidance information includes:Checking and killing virus prompting message;When being obtained
User behavior information include:When by the behavioural information of screenshotss backup private key, identified security setting guidance information includes:
Dispersion storage private key prompting message;When the user behavior information obtained includes:It is close as assets payment merely with numerical ciphers
When the behavioural information of code, identified security setting guidance information includes:Using biological characteristic password as assets payment cipher
Prompting message.
5. according to the method described in claim 1, it is characterized in that, described utilize is preset safe class evaluation criteria and is obtained
User behavior information, the step of obtaining the safe class assessment result of user behavior, including:
Determine the quantity of obtained user behavior information;
Determine the quantitative range that the quantity is located in default safe class evaluation criteria;Wherein, described default safety etc.
Grade evaluation criteria include:The correspondence of quantitative range and safe class;
The corresponding safe class of quantitative range that the quantity is located at is determined as the safe class assessment knot of user behavior
Fruit.
6. a kind of private key protective device of digital wallet, which is characterized in that described device includes:
First obtains unit, the user behavior information for obtaining the private key safety for influencing digital wallet;
Second obtaining unit, for using the user behavior information preset safe class evaluation criteria and obtained, obtaining user
The safe class assessment result of behavior;
Third obtaining unit obtains security setting guidance information for being based on the safe class assessment result;
Display unit, for showing the security setting guidance information, to guide the safety of the private key of user's raising digital wallet
Property.
7. device according to claim 6, which is characterized in that the first obtains unit includes:
Subelement is shown, for showing default questionnaire;Wherein, being recorded in the default questionnaire has:Influence digital money
The pre-set user behavioural information of the private key safety of packet, and the corresponding tick boxes of each pre-set user behavioural information;When one it is pre-
If the corresponding tick boxes of user behavior information are selected, show that the pre-set user behavioural information is selected;
Obtain subelement, the Questionnaire results for obtaining the default questionnaire;
First determination subelement, the pre-set user behavioural information for will be selected in the Questionnaire results, is determined as shadow
Ring the user behavior information of the private key safety of the digital wallet.
8. device according to claim 7, which is characterized in that the pre-set user behavioural information includes:It accessed high-risk
The behavioural information of webpage, the opened behavioural information for taking viruliferous mail, by the behavioural information of screenshotss backup private key and only
Using numerical ciphers as at least one in the behavioural information of assets payment cipher.
9. a kind of electronic equipment, which is characterized in that including processor, communication interface, memory and communication bus, wherein processing
Device, communication interface, memory complete mutual communication by communication bus;
Memory, for storing computer program;
Processor when for executing the program stored on memory, realizes any method step in claim 1-5
Suddenly.
10. a kind of storage medium, which is characterized in that be stored with computer program, the computer program in the storage medium
Any method and step in claim 1-5 is realized when being executed by processor.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810145978.5A CN108346047A (en) | 2018-02-12 | 2018-02-12 | Private key protection method and device for digital wallet, electronic equipment and storage medium |
PCT/CN2018/110222 WO2019153779A1 (en) | 2018-02-12 | 2018-10-15 | Private key protection method and apparatus for digital wallet, electronic device and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810145978.5A CN108346047A (en) | 2018-02-12 | 2018-02-12 | Private key protection method and device for digital wallet, electronic equipment and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108346047A true CN108346047A (en) | 2018-07-31 |
Family
ID=62959473
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810145978.5A Pending CN108346047A (en) | 2018-02-12 | 2018-02-12 | Private key protection method and device for digital wallet, electronic equipment and storage medium |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN108346047A (en) |
WO (1) | WO2019153779A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019153779A1 (en) * | 2018-02-12 | 2019-08-15 | 北京金山安全软件有限公司 | Private key protection method and apparatus for digital wallet, electronic device and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101131760A (en) * | 2006-08-25 | 2008-02-27 | 阿里巴巴公司 | Method and system for checking account security |
CN105787732A (en) * | 2016-02-22 | 2016-07-20 | 邓迪 | Realization method of digital currency secure wallet, and secure wallet system |
CN106548345A (en) * | 2016-12-07 | 2017-03-29 | 北京信任度科技有限公司 | The method and system of block chain private key protection are realized based on Secret splitting |
US20170161738A1 (en) * | 2015-08-31 | 2017-06-08 | American Express Travel Related Services Company, Inc. | Next expected session key |
EP3200167A1 (en) * | 2016-01-29 | 2017-08-02 | Mastercard International Incorporated | Information transaction infrastructure |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103020524B (en) * | 2012-12-11 | 2015-08-05 | 北京奇虎科技有限公司 | Computer virus supervisory system |
CN103049695B (en) * | 2012-12-11 | 2015-12-09 | 北京奇虎科技有限公司 | A kind of method for supervising of computer virus and device |
CN108346047A (en) * | 2018-02-12 | 2018-07-31 | 北京金山安全软件有限公司 | Private key protection method and device for digital wallet, electronic equipment and storage medium |
-
2018
- 2018-02-12 CN CN201810145978.5A patent/CN108346047A/en active Pending
- 2018-10-15 WO PCT/CN2018/110222 patent/WO2019153779A1/en active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101131760A (en) * | 2006-08-25 | 2008-02-27 | 阿里巴巴公司 | Method and system for checking account security |
US20170161738A1 (en) * | 2015-08-31 | 2017-06-08 | American Express Travel Related Services Company, Inc. | Next expected session key |
EP3200167A1 (en) * | 2016-01-29 | 2017-08-02 | Mastercard International Incorporated | Information transaction infrastructure |
CN105787732A (en) * | 2016-02-22 | 2016-07-20 | 邓迪 | Realization method of digital currency secure wallet, and secure wallet system |
CN106548345A (en) * | 2016-12-07 | 2017-03-29 | 北京信任度科技有限公司 | The method and system of block chain private key protection are realized based on Secret splitting |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019153779A1 (en) * | 2018-02-12 | 2019-08-15 | 北京金山安全软件有限公司 | Private key protection method and apparatus for digital wallet, electronic device and storage medium |
Also Published As
Publication number | Publication date |
---|---|
WO2019153779A1 (en) | 2019-08-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108320154A (en) | Digital wallet asset protection method and device, electronic equipment and storage medium | |
US10715515B2 (en) | Generating code for a multimedia item | |
US7162456B2 (en) | Method for private personal identification number management | |
Vasek et al. | The bitcoin brain drain: Examining the use and abuse of bitcoin brain wallets | |
CN102098315A (en) | Secure login method, device and system for client | |
CN109670974A (en) | A kind of risk monitoring and control method and device, electric terminal | |
Vasek et al. | The Bitcoin brain drain: a short paper on the use and abuse of bitcoin brain wallets | |
CN104853030B (en) | The method and mobile terminal of a kind of information processing | |
CN113657989A (en) | System, method, and computer-accessible medium for early merchant default fraud detection | |
CN108280647A (en) | Private key protection method and device for digital wallet, electronic equipment and storage medium | |
CN106504086A (en) | A kind of method and bank account system for protecting bank account safety | |
AU2018220785B2 (en) | An apparatus, computer program and method | |
CN109272317A (en) | Block chain private key obtaining method and device and electronic equipment | |
CN108346047A (en) | Private key protection method and device for digital wallet, electronic equipment and storage medium | |
US7167843B2 (en) | Apparatus for private personal identification number management | |
CN106548351A (en) | A kind of optimization method and terminal of fingerprint payment flow | |
CA2961274C (en) | Method of auto-detection of an attempted piracy of an electronic payment card, corresponding card, terminal and program | |
CN107944871A (en) | Identity identifying method, device, computer equipment and computer-readable recording medium | |
Prem et al. | Phishing and anti-phishing techniques | |
CN106778219A (en) | A kind of cipher code protection method and terminal | |
CN102780686A (en) | Credible resource based method and device for protecting bank user information | |
CN107889102A (en) | The method and apparatus of information encryption and decryption in a kind of short message | |
JP2019169070A (en) | User management system and user management method | |
CN106056378B (en) | Electronic payment terminal method for anti-counterfeit and its system | |
CN109583233A (en) | Data leak monitoring method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180731 |
|
RJ01 | Rejection of invention patent application after publication |