Virtual asset protection method and device and server

A technology of virtual assets and protection devices, applied in the direction of user identity/authority verification, etc., can solve problems such as inability to provide, and achieve the effect of preventing illegal theft and protecting personal rights and interests

Active Publication Date: 2019-06-28
EIDLINK INFORMATION TECH CO LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] The purpose of the present invention is to at least solve one of the above-mentioned technical defects, especially for technical defects that cannot provide corresponding protection and support with legal evidence

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Virtual asset protection method and device and server
  • Virtual asset protection method and device and server
  • Virtual asset protection method and device and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0080] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention.

[0081] Those skilled in the art will understand that unless otherwise stated, the singular forms "a", "an", "said" and "the" used herein may also include plural forms. It should be further understood that the word "comprising" used in the description of the present invention refers to the presence of said features, integers, steps, operations, elements and / or components, but does not exclude the presence or addition of one or more other features, Integers, steps, operations, elements, components, and / or groups thereof. It will be unders...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a virtual asset protection method and device and a server, and the method comprises the steps: receiving a preservation request of virtual asset data, and enabling the preservation request to carry an electronic signature; verifying the electronic signature; and, when the electronic signature verification is passed, generating a digital signature of the virtual asset data, and generating a preservation order comprising the virtual asset data based on the digital signature. According to the method provided by the embodiment of the invention, the virtualassets can be effectively prevented from being illegally stolen by verifying the electronic signature, the virtual assets of the user can be subjected to right confirmation protection, the personal rights and interests of the user are effectively guaranteed, and meanwhile, guarantee and support in the aspect of legal evidence are provided for the virtual assets of the user.

Description

technical field [0001] The present invention relates to the technical field of computer information processing, in particular, the present invention relates to a virtual asset protection method, device and server. Background technique [0002] With the development of online games and virtual transactions, the security of virtual assets has become increasingly prominent. On the one hand, driven by interests, game player accounts are stolen and equipment is lost. The phenomenon of account theft has formed a huge gray industrial chain. The economic losses amounted to hundreds of millions. Some players blamed the problem of account theft on the game operator’s ineffective anti-theft, and even suspected that the operator was guarding against theft, which led to frequent disputes over virtual assets. On the other hand, game companies use their absolute control over the game system to manage virtual assets such as game players' accounts, equipment, records, game coins, and other ri...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32
Inventor 王强吴志明郭宏杰刘海龙
Owner EIDLINK INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products