CN104935548A - Identity verification method, device and system based on intelligent tattooing equipment - Google Patents

Identity verification method, device and system based on intelligent tattooing equipment Download PDF

Info

Publication number
CN104935548A
CN104935548A CN201410099222.3A CN201410099222A CN104935548A CN 104935548 A CN104935548 A CN 104935548A CN 201410099222 A CN201410099222 A CN 201410099222A CN 104935548 A CN104935548 A CN 104935548A
Authority
CN
China
Prior art keywords
intelligence
equipment
tatoo
terminal equipment
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410099222.3A
Other languages
Chinese (zh)
Other versions
CN104935548B (en
Inventor
王小叶
郭计伟
秦雷
林陆一
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Tencent Cloud Computing Beijing Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201410099222.3A priority Critical patent/CN104935548B/en
Publication of CN104935548A publication Critical patent/CN104935548A/en
Application granted granted Critical
Publication of CN104935548B publication Critical patent/CN104935548B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina

Abstract

The invention discloses an identity verification method, device and system based on intelligent tattooing equipment. The method comprises the steps: terminal equipment finds the intelligent tattooing equipment bound with the terminal equipment, wherein the binding of the terminal equipment with the intelligent tattooing equipment is achieved through the corresponding relation between user identity verification of the terminal equipment and intelligent tattoo identification of the intelligent tattooing equipment; terminal equipment collects intelligent tattoo information transmitted by the intelligent tattooing equipment; terminal equipment obtains safety verification results according to the intelligent tattoo information, determines whether safety operation corresponding to a safety operation instruction sent by the terminal equipment is carried out or not, and carrying out the safety operation corresponding to the safety operation instruction when the safety verification results are that the intelligent tattoo information passes the verification. According to the invention, the method solves a technical problem of low system safety caused by that the technology of identification provided by related technologies is liable to be cracked and the reliability of user identities cannot be guaranteed.

Description

To tatoo based on intelligence auth method, the Apparatus and system of equipment
Technical field
The present invention relates to computer realm, in particular to a kind of auth method, Apparatus and system of equipment of tatooing based on intelligence.
Background technology
Along with various terminal is applied, especially the application function in the systems such as instant messaging, social platform, online game is more and more abundanter, the various operations carried out in systems in which, the mutual safety problem of especially carrying out key message about user highlights day by day, such as, system user account is stolen when logging in, the safety problems such as behavior is intercepted, Modify password behavior is stolen of virtual assets are without restraint rampant, and the various networked assets of user are subject to more and more severeer threat.
Prior art can adopt identity validation technology to solve the problems referred to above, and identity validation technology mainly comprises two links: identity registration and authentication two parts.Identity registration refers to the identity documents of consulting " I has " with Verification System, as static password, dynamic password etc.; Authentication refers to that Verification System judges the authenticity of user by " having " voucher that authentication of users is submitted to.Wherein, existing authentication, generally based on password authentication, mainly can comprise static password, dynamic password two kinds, but traditional static password is easily intercepted by keyboard wooden horse in fail safe, there is the security risk of Brute Force simultaneously.
As from the foregoing, the specific implementation process of above-mentioned identity validation technology, can be that the identity of the mode by arranging user login code to user confirms, thus ensure that user performs the safety problem of various operation in systems in which, but the method arranging login password cracks easily via modes such as violence trial, keyboard intercepting, screenshotss, carry out only by authentication password the legitimacy that authentication is not enough to prove active user for this reason.
The identity validation technology provided for above-mentioned correlation technique is easily cracked, and cannot ensure the reliability of user identity, causes the problem that security of system is low, not yet proposes effective solution at present.
Summary of the invention
Embodiments provide a kind of auth method, Apparatus and system of equipment of tatooing based on intelligence, the identity validation technology provided at least to solve correlation technique is easily cracked, the reliability of user identity cannot be ensured, cause the technical problem that security of system is low.
According to an aspect of the embodiment of the present invention, provide a kind of auth method of equipment of tatooing based on intelligence, the method comprises: terminal equipment finds the intelligence of binding with terminal equipment and to tatoo equipment, wherein, to be tatooed the corresponding relation between identifying by the tatoo intelligence of equipment of the User Identity and intelligence setting up terminal equipment, come binding terminal equipment and intelligence and to tatoo equipment; The intelligence that terminal equipment collection intelligence equipment of tatooing transmits is tatooed information; Terminal equipment tatoos acquisition of information to safety verification result according to intelligence, determine whether to perform safety operation corresponding to the safety operation instruction that sends of terminal equipment, wherein, when safety verification result be intelligence tatoo information by checking, perform the safety operation that safety operation instruction is corresponding.
According to the another aspect of the embodiment of the present invention, additionally provide a kind of authentication means of equipment of tatooing based on intelligence, this device comprises: search module, to tatoo equipment for finding the intelligence of binding with terminal equipment, wherein, to be tatooed the corresponding relation between identifying by the tatoo intelligence of equipment of the User Identity and intelligence setting up terminal equipment, come binding terminal equipment and intelligence and to tatoo equipment; Acquisition module, the intelligence transmitted for obtaining intelligence equipment of tatooing is tatooed information; Processing module, tatoo acquisition of information to safety verification result according to intelligence for terminal equipment, determine whether to perform safety operation corresponding to the safety operation instruction that sends of terminal equipment, wherein, when safety verification result be intelligence tatoo information by checking, perform the safety operation that safety operation instruction is corresponding.
According to the another aspect of the embodiment of the present invention, additionally provide a kind of authentication system of equipment of tatooing based on intelligence, this system comprises: intelligence is tatooed equipment, to tatoo information for transmitting intelligence; Terminal equipment, correspondence is set up with the intelligence equipment of tatooing, to tatoo equipment for finding the intelligence of binding with terminal equipment, tatoo after information getting the intelligence that intelligence equipment of tatooing transmits, tatoo acquisition of information to safety verification result according to intelligence, determines whether to perform safety operation corresponding to the safety operation instruction that sends of terminal equipment; Wherein, to be tatooed the corresponding relation between identifying by the tatoo intelligence of equipment of the User Identity and intelligence setting up terminal equipment, come binding terminal equipment and intelligence to tatoo equipment, and when safety verification result be intelligence tatoo information by checking, perform the safety operation that safety operation instruction is corresponding.
According to the embodiment of the present invention more on the one hand, additionally provide a kind of auth method of equipment of tatooing based on intelligence, the method comprises: server receives intelligence that terminal equipment transmits and to tatoo information and safety operation instruction; Server is verified the intelligence information of tatooing, and generates safety verification result; Server is according to safety verification result, determine whether to perform safety operation corresponding to the safety operation instruction that sends of terminal equipment, wherein, when safety verification result be intelligence tatoo information by checking, perform the safety operation that safety operation instruction is corresponding, generating run data.
According to the embodiment of the present invention more on the one hand, additionally provide a kind of authentication means of equipment of tatooing based on intelligence, this device comprises: receiver module, and the intelligence transmitted for receiving terminal equipment is tatooed information and safety operation instruction; Authentication module, for verifying the intelligence information of tatooing, generates safety verification result; Determination module, for according to safety verification result, determines whether to perform the safety operation that safety operation instruction that terminal equipment sends is corresponding, wherein, when safety verification result be intelligence tatoo information by checking, perform the safety operation that safety operation instruction is corresponding, generating run data.
According to the embodiment of the present invention more on the one hand, additionally provide a kind of authentication system of equipment of tatooing based on intelligence, this system comprises: intelligence is tatooed equipment, to tatoo information for generating intelligence; Terminal equipment, sets up correspondence with the intelligence equipment of tatooing, and for tatooing after equipment finding the intelligence of binding with terminal equipment, obtaining intelligence that intelligence equipment of tatooing transmits and to tatoo information; Server, correspondence is set up with terminal equipment, the intelligence transmitted for receiving terminal equipment is tatooed information and safety operation instruction, is verifying the intelligence information of tatooing, after generating safety verification result, according to safety verification result, determine whether to perform safety operation corresponding to the safety operation instruction that sends of terminal equipment, wherein, when safety verification result be intelligence tatoo information by checking, perform the safety operation that safety operation instruction is corresponding, generating run data.
In embodiments of the present invention, adopt terminal equipment to find the intelligence of binding with terminal equipment to tatoo equipment, wherein, to be tatooed the corresponding relation between identifying by the tatoo intelligence of equipment of the User Identity and intelligence setting up terminal equipment, come binding terminal equipment and intelligence and to tatoo equipment, the intelligence that terminal equipment collection intelligence equipment of tatooing transmits is tatooed information, terminal equipment tatoos acquisition of information to safety verification result according to intelligence, determine whether to perform safety operation corresponding to the safety operation instruction that sends of terminal equipment, wherein, when safety verification result be intelligence tatoo information by checking, perform the mode of safety operation corresponding to safety operation instruction, by equipment of tatooing for the intelligence of terminal equipment binding correspondence, make user carry out various operation at registration terminal equipment and (especially relate to Modify password, equipment transfer, critical data transaction etc. has the safety operation of sensitiveness) before, need to use the intelligence with present terminal apparatus bound to tatoo equipment to carry out additional authentication, the legitimacy of the user identity of the current registration terminal equipment of main checking.Because the intelligence equipment of tatooing is that a kind of can being attached to human body skin has its unique intelligence and to tatoo the equipment of information, energy is provided by human body, and have by the communication mode such as bluetooth, wireless network and terminal equipment (such as the electronic equipment etc. of mobile terminal, compunlcation), therefore, the intelligence equipment of tatooing can characterize the exact identity information of active user.Easily notice, bind an intelligence due to terminal equipment to tatoo equipment, make when system searching to be tatooed equipment to the intelligence of binding with terminal equipment, and get the intelligence that intelligence equipment of tatooing transmits and tatoo after information, device end can tatoo acquisition of information to safety verification result according to intelligence, this safety verification result can determine that whether the user of current registration terminal equipment is legal, thus can whether can continue to perform safety operation corresponding to the safety operation instruction that sends of terminal equipment by certainty annuity, now, if when information of tatooing that safety verification result is intelligence passes through checking, system can allow active user to use terminal equipment and safety operation corresponding to triggering secure operational order, thus, the identity validation technology that such scheme solves correlation technique to be provided easily is cracked, the reliability of user identity cannot be ensured, cause the technical problem that security of system is low.
Accompanying drawing explanation
Accompanying drawing described herein is used to provide a further understanding of the present invention, and form a application's part, schematic description and description of the present invention, for explaining the present invention, does not form inappropriate limitation of the present invention.In the accompanying drawings:
Fig. 1 is the structural representation of authentication system of the equipment of tatooing based on intelligence according to the embodiment of the present invention one;
Fig. 2 is the structural representation of authentication system of a kind of equipment of optionally tatooing based on intelligence according to the embodiment of the present invention one;
Fig. 3 is the schematic flow sheet of auth method of the equipment of tatooing based on intelligence according to the embodiment of the present invention two;
Fig. 4 is the schematic flow sheet of auth method of the first equipment of optionally tatooing based on intelligence according to the embodiment of the present invention two;
Fig. 5 is the schematic flow sheet of auth method of equipment of optionally tatooing based on intelligence according to the second of the embodiment of the present invention two;
Fig. 6 is the structural representation of authentication means of the equipment of tatooing based on intelligence according to the embodiment of the present invention three.
Fig. 7 be according to the embodiment of the present invention three a kind of optionally based on intelligence tatoo equipment authentication means in the structural representation of processing module;
Fig. 8 be according to the another kind of the embodiment of the present invention three optionally based on intelligence tatoo equipment authentication means in the structural representation of processing module;
Fig. 9 is the structural representation of authentication system of the equipment of tatooing based on intelligence according to the embodiment of the present invention four;
Figure 10 be according to the embodiment of the present invention four a kind of preferably based on intelligence tatoo equipment authentication system in the structural representation of server;
Figure 11 is the schematic flow sheet of auth method of the equipment of tatooing based on intelligence according to the embodiment of the present invention five; And
Figure 12 is the structural representation of authentication means of the equipment of tatooing based on intelligence according to the embodiment of the present invention six;
Embodiment
The present invention program is understood better in order to make those skilled in the art person, below in conjunction with the accompanying drawing in the embodiment of the present invention, technical scheme in the embodiment of the present invention is clearly and completely described, obviously, described embodiment is only the embodiment of a part of the present invention, instead of whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art, not making the every other embodiment obtained under creative work prerequisite, should belong to the scope of protection of the invention.
It should be noted that, term " first ", " second " etc. in specification of the present invention and claims and above-mentioned accompanying drawing are for distinguishing similar object, and need not be used for describing specific order or precedence.Should be appreciated that the data used like this can be exchanged in the appropriate case, so as embodiments of the invention described herein can with except here diagram or describe those except order implement.In addition, term " comprises " and " having " and their any distortion, intention is to cover not exclusive comprising, such as, contain those steps or unit that the process of series of steps or unit, method, system, product or equipment is not necessarily limited to clearly list, but can comprise clearly do not list or for intrinsic other step of these processes, method, product or equipment or unit.
Embodiment 1
Before the further details of each embodiment describing the application, the counting system structure that of the principle that can be used for realizing the application is suitable is described with reference to Fig. 1.In the following description, except as otherwise noted, the symbol otherwise with reference to the action performed by one or more computer and operation represents each embodiment describing the application.Thus, be appreciated that processing unit that this kind of action performed sometimes referred to as computer and operation comprise computer is to the manipulation of the signal of telecommunication representing data with structured form.It is safeguarded in this manipulation transforms data or the position in the accumulator system of computer, and this reshuffles or changes the operation of computer in the mode that those skilled in the art understands.The data structure of service data is the physical location of the memory of the particular community that the form with data defines.But although describe the application in above-mentioned context, it does not also mean that restrictive, as understood by those skilled in the art, hereinafter described action and each side of operation also can realize with hardware.
In the configuration that it is the most basic, Fig. 1 is the structural representation of authentication system of the equipment of tatooing based on intelligence according to the embodiment of the present invention one.For purposes of illustration, the architecture of painting is only an example of proper environment, not proposes any limitation to the scope of application of the application or function.This computing system should be interpreted as, to the arbitrary assembly shown in Fig. 1 or its combination, there is any dependence or demand yet.
As shown in Figure 1, can should comprise based on the tatoo authentication system of equipment of intelligence: an intelligence is tatooed equipment 10, one terminal equipment 30.
Intelligence is tatooed equipment 10, to tatoo information for transmitting intelligence.This intelligence is tatooed, and equipment 10 is responsible to connect with the terminal equipment 30 of user and carries out mutual, for terminal equipment 30 provides identity information.
Terminal equipment 30, correspondence is set up with intelligence equipment 10 of tatooing, can be the equipment that user carries out sensitive operation, to tatoo equipment 10 for finding the above-mentioned intelligence of binding with terminal equipment, tatoo after information getting the intelligence that intelligence equipment of tatooing transmits, tatoo acquisition of information to safety verification result according to intelligence, determines whether to perform safety operation corresponding to the safety operation instruction that sends of terminal equipment; Wherein, to be tatooed the corresponding relation between identifying by the tatoo intelligence of equipment of the User Identity and intelligence setting up terminal equipment, come binding terminal equipment and intelligence to tatoo equipment, and when safety verification result be intelligence tatoo information by checking, perform the safety operation that safety operation instruction is corresponding.
In the above embodiments of the present application one, by equipment of tatooing for the intelligence of terminal equipment binding correspondence, make user before registration terminal equipment carries out various operation (especially relating to the safety operation that Modify password, equipment transfer, critical data transaction etc. have sensitiveness), need to use the intelligence with present terminal apparatus bound to tatoo equipment to carry out additional authentication, the legitimacy of the user identity of the current registration terminal equipment of main checking.Because the intelligence equipment of tatooing is that a kind of can being attached to human body skin has its unique intelligence and to tatoo the equipment of information, energy is provided by human body, and have by the communication mode such as bluetooth, wireless network and terminal equipment (such as the electronic equipment etc. of mobile terminal, compunlcation), therefore, the intelligence equipment of tatooing can characterize the exact identity information of active user.Easily notice, bind an intelligence due to terminal equipment to tatoo equipment, make when system searching to be tatooed equipment to the intelligence of binding with terminal equipment, and get the intelligence that intelligence equipment of tatooing transmits and tatoo after information, device end can tatoo acquisition of information to safety verification result according to intelligence, this safety verification result can determine that whether the user of current registration terminal equipment is legal, thus can whether can continue to perform safety operation corresponding to the safety operation instruction that sends of terminal equipment by certainty annuity, now, if when information of tatooing that safety verification result is intelligence passes through checking, system can allow active user to use terminal equipment and safety operation corresponding to triggering secure operational order, wherein, can be tatooed by the User Identity and intelligence the setting up terminal equipment intelligence of equipment of system is tatooed the corresponding relation between identifying, come binding terminal equipment and intelligence to tatoo equipment.
It can thus be appreciated that, the scheme that the embodiment of the present invention one provides can be applied in online game or payment system, the voucher that the intelligence information of tatooing provided due to the intelligence equipment of tatooing can only belong to a user as one is to prove the data of the legitimacy of user, therefore, can by the legitimacy adopting the intelligence equipment of tatooing to carry out the login user of additional authentication terminal equipment.Namely the present invention proposes a kind of scheme verifying the identity of the user logging in present terminal equipment based on the intelligence equipment of tatooing, because proof procedure does not need manually to input the information such as user name, password, decrease the input operation of user, therefore, on the basis that can confirm the reliability of the identity using the user of terminal equipment fast, efficiently, easily, also improve the speed of checking, thus improve the fail safe of user operation and improve the efficiency of authentication.
Preferably, as shown in Figure 2, in the application's said system embodiment, said system can also comprise: a server 50.
Above-mentioned server 50, for obtaining the User Identity of terminal equipment, and intelligence tatoo mark and intelligence of the intelligence of equipment of tatooing is tatooed the digital signature of mark, use identifying algorithm to intelligence tatoo mark digital signature carry out sign test, if sign test success, the intelligence of equipment of then User Identity of terminal equipment and intelligence being tatooed mark of tatooing is bound, and records the tatoo intelligence of equipment of the User Identity of terminal equipment and intelligence and to tatoo the corresponding relation between identifying.
It should be noted that herein, server 50 in such scheme can adopt network communication mode to carry out the User Identity of automatic acquisition terminal equipment, and intelligence tatoo mark and intelligence of the intelligence of equipment of tatooing is tatooed the digital signature of mark, the mode that also can be inputted by user obtains the User Identity of terminal equipment, and intelligence tatoo mark and intelligence of the intelligence of equipment of tatooing is tatooed the digital signature of mark.
It can thus be appreciated that the above embodiments of the present application one can provide a kind of scheme storing the intelligent user's binding information between equipment and terminal equipment of tatooing in the server.User is before whether the operation of the intelligent device authentication terminal equipment of tatooing of use is safe, need the intelligence of equipment that intelligence tatooed tatoo mark ID and terminal equipment User Identity ID at server (such as, sensitive operation server for special disposal relates to Modify password, equipment transfer, critical data transaction etc. have the safety operation of sensitiveness) on bind, the intelligence that the form of tables of data can be adopted to store intelligent equipment of tatooing is tatooed and is identified the User Identity ID of ID and terminal equipment, and the corresponding relation between them.It should be noted that, the sensitive operation system that this sensitive operation server provides can comprise following function herein: the preservation being responsible for the User Identity information of preserving each terminal equipment; Store the binding relationship of User Identity information and intelligent identification information of tatooing; Be responsible for performing user's sensitive operation, authenticated user identity.
Preferably, in order to improve the intelligence got tatoo device transmission intelligence tatoo mark fail safe, the application's such scheme additionally provide a kind of server receive intelligence tatoo equipment send intelligence tatoo mark and intelligence tatoo mark digital signature after, carry out the function of sign test to above-mentioned intelligence mark of tatooing, the intelligence only having sign test to pass through equipment of tatooing just can be bound with corresponding terminal equipment.
Such as, active user needs a known intelligence to tatoo apparatus bound in held terminal equipment, first, user can be sent to sensitive operation system by the network intelligence of equipment mark of tatooing of intelligence being tatooed together with voucher (i.e. digital signature), sensitive operation system is tatooed by identifying algorithm checking intelligence and is identified and Service Ticket, bind in the checking User Identity ID of terminal equipment and intelligence the tatooed intelligence of equipment mark of tatooing, and binding relationship is stored in current sensitive operation system.
Preferably, in order to improve the fail safe of system, the application is except providing the proof procedure of above-mentioned equipment of tatooing to intelligence, can also provide further and authentication is carried out to the current terminal equipment of binding that needs, because terminal equipment establishes correspondence with server (such as sensitive operation server), therefore, short message verification code can be adopted between terminal equipment and server, the modes such as static password carry out the user identity of certification terminal equipment, after authentication success, the intelligence of equipment of the User Identity ID of terminal equipment and intelligence being tatooed mark of tatooing can be performed bind.
The above-mentioned terminal equipment to current needs binding carries out in the process of authentication, not only can provide above-mentioned verification process, can also test to the information format of the user identity be currently received and content, such as, the format content of subscriber identity information only comprises text formatting and/or number format, if detect the form of the information be currently received also comprise spcial character or other, then illustrate that current user identities information is wrong.Before this process can be applied in the authenticating user identification of terminal equipment, also can perform after the authenticating user identification of terminal equipment.
Need to further illustrate herein, in the above embodiments of the present application, directly can complete in terminal equipment and tatoo the function of acquisition of information to safety verification result according to intelligence.In order to reduce the processing load of terminal equipment, and security of system, above-mentionedly can also to tatoo the function of acquisition of information to safety verification result according to intelligence by completing in conjunction with third party device, thus determine whether to perform the function of safety operation corresponding to safety operation instruction that terminal equipment sends.Below just with terminal equipment in conjunction with third party device for example is described in detail, third party device herein can be above-mentioned server 50, shown in Fig. 1 and 2, at least can comprise the following two kinds execution mode:
Mode one: tatoo in the application scenarios of the corresponding relation between identifying being preserved the tatoo intelligence of equipment of the User Identity of terminal equipment and intelligence by server, as shown in Figure 2, system can pass through following execution mode, perform terminal equipment and tatoo acquisition of information to safety verification result according to intelligence, determine whether the function performing safety operation corresponding to safety operation instruction:
First, intelligence tatooed information and safety operation instruction of terminal equipment is sent to server.Preferably, before this step performs, the tatoo intelligence of equipment of terminal equipment collection intelligence is tatooed information, and acquisition mode can comprise: Internet Transmission, device scan, user's input etc.Wherein, safety operation instruction can relate to the sensitive operation that Modify password, equipment transfer, critical data transaction etc. have sensitiveness.
Then, terminal equipment receives the operating data of the safety operation that server returns, wherein, when server detect intelligence information of tatooing at least comprise intelligence tatoo mark, safety verification result is that intelligence tatoos information by checking, and perform safety operation corresponding to safety operation instruction, generating run data.
In above-mentioned steps, that the tatoo intelligence of equipment of the User Identity of terminal equipment and intelligence is tatooed the corresponding relation between identifying due to what store in server, therefore, tatoo after information and safety operation instruction when server receives the intelligence that terminal equipment sends, tatoo mark to determine safety verification result mainly through contrasting tatoo information and the intelligence that stored of the intelligence that receives, now, the intelligence information of tatooing can tatoo with the intelligence of preserving identify identical, as long as also can be comprise intelligence tatoo mark information, just can determine that current intelligence tatoos information by checking.After intelligence information of tatooing passes through checking, server can perform safety operation corresponding to safety operation instruction.
Mode two: tatoo in the application scenarios of the corresponding relation between identifying being preserved the tatoo intelligence of equipment of the User Identity of terminal equipment and intelligence by server, as shown in Figure 2, system can pass through following execution mode, perform terminal equipment and tatoo acquisition of information to safety verification result according to intelligence, determine whether the function performing safety operation corresponding to safety operation instruction:
First, the intelligence information of tatooing is sent to server by terminal equipment.Preferably, before this step performs, the tatoo intelligence of equipment of terminal equipment collection intelligence is tatooed information, and acquisition mode can comprise: Internet Transmission, device scan, user's input etc.Wherein, safety operation instruction can relate to the sensitive operation that Modify password, equipment transfer, critical data transaction etc. have sensitiveness.
Then, terminal equipment obtains the safety verification result that returns of server, wherein, when server detect intelligence information of tatooing at least comprise intelligence tatoo mark, safety verification result is that intelligence tatoos information by checking.In this step, that the tatoo intelligence of equipment of the User Identity of terminal equipment and intelligence is tatooed the corresponding relation between identifying due to what store in server, therefore, tatoo after information and safety operation instruction when server receives the intelligence that terminal equipment sends, tatoo mark to determine safety verification result mainly through contrasting tatoo information and the intelligence that stored of the intelligence that receives, now, intelligence tatoo information with the intelligence of preserving tatoo identify identical, as long as or this intelligence information of tatooing comprise intelligence tatoo mark information, just can determine that current intelligence tatoos information by checking.After intelligence information of tatooing passes through checking, server can perform safety operation corresponding to safety operation instruction.
Secondly, when safety verification result be intelligence tatoo information by checking, safety operation instruction is sent to server by terminal equipment.
Finally, terminal equipment receives the operating data of the safety operation that server returns, and wherein, server performs safety operation corresponding to safety operation instruction, generating run data.
It should be noted that herein, the server provided in aforesaid way one and mode two can be sensitive operation server, sensitive operation service can verify that intelligence is tatooed information, and when being verified, and the information of the sensitive operation submitted to according to the user of terminal equipment carries out sensitive operation.
And provide the difference of scheme to be in aforesaid way one and mode two, in the scheme that mode one provides, intelligence tatooed information and safety operation instruction of terminal equipment is sent to server simultaneously, after server receives above-mentioned information, first the intelligence information of tatooing is verified, when the safety verification result obtained be intelligence tatoo information by checking when, server performs safety operation corresponding to safety operation instruction, generating run data, and operating data is returned to terminal equipment.
And in the scheme that mode two provides, the intelligence information of tatooing collected first sends to server to verify by terminal equipment, after being verified, just safety operation instruction can be sent to server, generate corresponding operating data.Mode two manner of comparison one can reduce the burden in network transmission process, saves Internet resources.
In summary, the said system embodiment one that the application provides, the terminal equipment needing to perform more sensitive operation (consumption in such as game application, transfer accounts, shift the operational orders such as game article) can be applied in, the intelligence information of tatooing provided by using the intelligence equipment of tatooing determines the user identity of the terminal equipment (such as computer, mobile phone etc.) bound with it, and then determine whether the Client-initiated sensitive operation will carrying out terminal equipment, ensure the fail safe of the user operation of terminal equipment.Avoid user to be stolen and to bring the loss of money, privacy after password to user.
Embodiment 2
According to the embodiment of the present invention, additionally provide a kind of embodiment of the method for implementing said system embodiment, it should be noted that, can perform in the computer system of such as one group of computer executable instructions in the step shown in the flow chart of accompanying drawing, and, although show logical order in flow charts, in some cases, can be different from the step shown or described by order execution herein.
Fig. 3 is the schematic flow sheet of auth method of the equipment of tatooing based on intelligence according to the embodiment of the present invention two.The method that the above embodiments of the present application provide can be run on terminal equipment 30.As shown in Figure 3, following implementation step can should be comprised based on the tatoo auth method of equipment of intelligence:
Step S30, the terminal equipment 30 in Fig. 1 can be used to find the intelligence of binding with terminal equipment 30 to tatoo equipment 10, wherein, to be tatooed the corresponding relation between identifying by the tatoo intelligence of equipment of the User Identity and intelligence setting up terminal equipment, come binding terminal equipment and intelligence and to tatoo equipment.
Intelligence in this step is tatooed, and equipment 10 is responsible to connect with the terminal equipment 30 of user and carries out mutual, for terminal equipment 30 provides identity information.Terminal equipment 30 is that equipment 10 of tatooing with intelligence sets up correspondence, can be the equipment that user carries out sensitive operation,
Step S32, can use the terminal equipment 30 in Fig. 1 to gather the above-mentioned intelligence intelligence that equipment 10 transmits of tatooing and to tatoo information.
Step S34, the terminal equipment 30 in Fig. 1 can be used to tatoo acquisition of information to safety verification result according to intelligence, determine whether to perform the safety operation that safety operation instruction that above-mentioned terminal equipment 30 sends is corresponding, wherein, when safety verification result be intelligence tatoo information by checking, perform the safety operation that safety operation instruction is corresponding.
In the above embodiments of the present application two, to tatoo equipment 10 by binding corresponding intelligence for terminal equipment 30, make user before registration terminal equipment carries out various operation (especially relating to the safety operation that Modify password, equipment transfer, critical data transaction etc. have sensitiveness), need to use the intelligence with present terminal apparatus bound to tatoo equipment to carry out additional authentication, the legitimacy of the user identity of the current registration terminal equipment of main checking.Because the intelligence equipment of tatooing is that a kind of can being attached to human body skin has its unique intelligence and to tatoo the equipment of information, energy is provided by human body, and have by the communication mode such as bluetooth, wireless network and terminal equipment (such as the electronic equipment etc. of mobile terminal, compunlcation), therefore, the intelligence equipment of tatooing can characterize the exact identity information of active user.Easily notice, bind an intelligence due to terminal equipment to tatoo equipment, make when system searching to be tatooed equipment to the intelligence of binding with terminal equipment, and get the intelligence that intelligence equipment of tatooing transmits and tatoo after information, device end can tatoo acquisition of information to safety verification result according to intelligence, this safety verification result can determine that whether the user of current registration terminal equipment is legal, thus can whether can continue to perform safety operation corresponding to the safety operation instruction that sends of terminal equipment by certainty annuity, now, if when information of tatooing that safety verification result is intelligence passes through checking, system can allow active user to use terminal equipment and safety operation corresponding to triggering secure operational order, wherein, can be tatooed by the User Identity and intelligence the setting up terminal equipment intelligence of equipment of system is tatooed the corresponding relation between identifying, come binding terminal equipment and intelligence to tatoo equipment.
It can thus be appreciated that, the scheme that the embodiment of the present invention two provides can be applied in online game or payment system, the voucher that the intelligence information of tatooing provided due to the intelligence equipment of tatooing can only belong to a user as one is to prove the data of the legitimacy of user, therefore, can by the legitimacy adopting the intelligence equipment of tatooing to carry out the login user of additional authentication terminal equipment.Namely the present invention proposes a kind of scheme verifying the identity of the user logging in present terminal equipment based on the intelligence equipment of tatooing, because proof procedure does not need manually to input the information such as user name, password, decrease the input operation of user, therefore, on the basis that can confirm the reliability of the identity using the user of terminal equipment fast, efficiently, easily, also improve the speed of checking, thus improve the fail safe of user operation and improve the efficiency of authentication.
Preferably, in the above embodiments of the present application, find the intelligence of binding with terminal equipment at execution step S30 terminal equipment and tatoo before equipment, following implementation step can also be comprised:
Step S101, can obtain the User Identity of terminal equipment 30 by the server 50 in Fig. 2.
Step S103, can be obtained the tatoo intelligence of equipment 10 of intelligence and to tatoo mark by the server 50 in Fig. 2, and intelligence is tatooed the digital signature of mark.
Step S105, can be used by the server 50 in Fig. 2 identifying algorithm to intelligence tatoo mark digital signature carry out sign test, if sign test success, the intelligence of equipment 10 of then User Identity of above-mentioned terminal equipment 30 and above-mentioned intelligence being tatooed mark of tatooing is bound, and records the tatoo intelligence of equipment of the User Identity of terminal equipment and intelligence and to tatoo the corresponding relation between identifying.
Above-mentioned server 50, correspondence set up by tatoo with intelligence respectively equipment 10 and terminal equipment 30, above-described embodiment two step S101 to step S105 can provide a kind of, creates in the server and keeps the scheme of the intelligent user's binding information between equipment and terminal equipment of tatooing.User is before whether the operation of the intelligent device authentication terminal equipment of tatooing of use is safe, need the intelligence of equipment that intelligence tatooed tatoo mark ID and terminal equipment User Identity ID at server (such as, sensitive operation server for special disposal relates to Modify password, equipment transfer, critical data transaction etc. have the safety operation of sensitiveness) on bind, the intelligence that the form of tables of data can be adopted to store intelligent equipment of tatooing is tatooed and is identified the User Identity ID of ID and terminal equipment, and the corresponding relation between them.It should be noted that, the sensitive operation system that this sensitive operation server provides can comprise following function herein: the preservation being responsible for the User Identity information of preserving each terminal equipment; Store the binding relationship of User Identity information and intelligent identification information of tatooing; Be responsible for performing user's sensitive operation, authenticated user identity.
Preferably, in order to improve the intelligence got tatoo device transmission intelligence tatoo mark fail safe, the application's such scheme additionally provide a kind of server receive intelligence tatoo equipment send intelligence tatoo mark and intelligence tatoo mark digital signature after, carry out the function of sign test to above-mentioned intelligence mark of tatooing, the intelligence only having sign test to pass through equipment of tatooing just can be bound with corresponding terminal equipment.
Such as, active user needs a known intelligence to tatoo apparatus bound in held terminal equipment, first, user can be sent to sensitive operation system by the network intelligence of equipment mark of tatooing of intelligence being tatooed together with voucher (i.e. digital signature), sensitive operation system is tatooed by identifying algorithm checking intelligence and is identified and Service Ticket, bind in the checking User Identity ID of terminal equipment and intelligence the tatooed intelligence of equipment mark of tatooing, and binding relationship is stored in current sensitive operation system.
Preferably, in order to improve the fail safe of system, the application is except providing the proof procedure of above-mentioned equipment of tatooing to intelligence, can also provide further and authentication is carried out to the current terminal equipment of binding that needs, because terminal equipment establishes correspondence with server (such as sensitive operation server), therefore, short message verification code can be adopted between terminal equipment and server, the modes such as static password carry out the user identity of certification terminal equipment, after authentication success, the intelligence of equipment of the User Identity ID of terminal equipment and intelligence being tatooed mark of tatooing can be performed bind.
The above-mentioned terminal equipment to current needs binding carries out in the process of authentication, not only can provide above-mentioned verification process, can also test to the information format of the user identity be currently received and content, such as, the format content of subscriber identity information only comprises text formatting and/or number format, if detect the form of the information be currently received also comprise spcial character or other, then illustrate that current user identities information is wrong.Before this process can be applied in the authenticating user identification of terminal equipment, also can perform after the authenticating user identification of terminal equipment.
Need to further illustrate herein, in the above embodiments of the present application, directly can complete in terminal equipment and tatoo the function of acquisition of information to safety verification result according to intelligence.In order to reduce the processing load of terminal equipment, and security of system, above-mentionedly can also to tatoo the function of acquisition of information to safety verification result according to intelligence by completing in conjunction with third party device, thus determine whether to perform the function of safety operation corresponding to safety operation instruction that terminal equipment sends.Third party device herein can be a server, and the tatoo intelligence of equipment of User Identity and intelligence for preserving terminal equipment is tatooed the corresponding relation between identifying.Below just with terminal equipment in conjunction with third party device for example is described in detail, at least can comprise the following two kinds execution mode:
In the first optional embodiment, tatoo in the application scenarios of the corresponding relation between identifying being preserved the tatoo intelligence of equipment of the User Identity of terminal equipment and intelligence by server, as shown in Figure 4, above-mentioned steps S34, terminal equipment tatoos acquisition of information to safety verification result according to intelligence, determine whether the step performing safety operation corresponding to the safety operation instruction that sends of terminal equipment, following implementation step can be comprised:
Step S401a, intelligence tatooed information and safety operation instruction of terminal equipment is sent to server.Preferably, before this step performs, terminal equipment can gather the tatoo intelligence of equipment of intelligence and to tatoo information, and acquisition mode can comprise: Internet Transmission, device scan, user's input etc.Wherein, safety operation instruction can relate to the sensitive operation that Modify password, equipment transfer, critical data transaction etc. have sensitiveness.
Step S403a, terminal equipment receives the operating data of the safety operation that server returns, wherein, when server detect intelligence information of tatooing at least comprise intelligence tatoo mark, safety verification result is that intelligence tatoos information by checking, and perform safety operation corresponding to safety operation instruction, generating run data.
In above-mentioned steps S403a, that the tatoo intelligence of equipment of the User Identity of terminal equipment and intelligence is tatooed the corresponding relation between identifying due to what store in server, therefore, tatoo after information and safety operation instruction when server receives the intelligence that terminal equipment sends, tatoo mark to determine safety verification result mainly through contrasting tatoo information and the intelligence that stored of the intelligence that receives, now, the intelligence information of tatooing can tatoo with the intelligence of preserving identify identical, as long as also can be comprise intelligence tatoo mark information, just can determine that current intelligence tatoos information by checking.After intelligence information of tatooing passes through checking, server can perform safety operation corresponding to safety operation instruction.
In the second embodiment, as shown in Figure 5, tatoo in the application scenarios of the corresponding relation between identifying being preserved the tatoo intelligence of equipment of the User Identity of terminal equipment and intelligence by server, above-mentioned steps S34, terminal equipment tatoos acquisition of information to safety verification result according to intelligence, determines whether that the step performing safety operation corresponding to the safety operation instruction that sends of terminal equipment comprises:
Step S401b, the intelligence information of tatooing is sent to server by terminal equipment.Preferably, before this step S401b performs, the tatoo intelligence of equipment of terminal equipment collection intelligence is tatooed information, and acquisition mode can comprise: Internet Transmission, device scan, user's input etc.Wherein, safety operation instruction can relate to the sensitive operation that Modify password, equipment transfer, critical data transaction etc. have sensitiveness.
Step S403b, terminal equipment obtains the safety verification result that returns of server, wherein, when server detect intelligence information of tatooing at least comprise intelligence tatoo mark, safety verification result is that intelligence tatoos information by checking.
In this step S403b, that the tatoo intelligence of equipment of the User Identity of terminal equipment and intelligence is tatooed the corresponding relation between identifying due to what store in server, therefore, tatoo after information and safety operation instruction when server receives the intelligence that terminal equipment sends, tatoo mark to determine safety verification result mainly through contrasting tatoo information and the intelligence that stored of the intelligence that receives, now, intelligence tatoo information with the intelligence of preserving tatoo identify identical, as long as or this intelligence information of tatooing comprise intelligence tatoo mark information, just can determine that current intelligence tatoos information by checking.After intelligence information of tatooing passes through checking, server can perform safety operation corresponding to safety operation instruction.
Step S405b, when safety verification result be intelligence tatoo information by checking, safety operation instruction is sent to server by terminal equipment.
Step S407b, terminal equipment receives the operating data of the safety operation that server returns, and wherein, server performs safety operation corresponding to safety operation instruction, generating run data.
It should be noted that herein, the server provided in above-mentioned two kinds of execution modes can be sensitive operation server, sensitive operation service can verify that intelligence is tatooed information, and when being verified, and the information of the sensitive operation submitted to according to the user of terminal equipment carries out sensitive operation.
And the difference of above-mentioned two kinds of execution modes is, in the scheme that the first execution mode provides, intelligence tatooed information and safety operation instruction of terminal equipment is sent to server simultaneously, after server receives above-mentioned information, first the intelligence information of tatooing is verified, when the safety verification result obtained be intelligence tatoo information by checking when, server performs safety operation corresponding to safety operation instruction, generating run data, and operating data is returned to terminal equipment.
And in the scheme provided at the second execution mode, the intelligence information of tatooing collected first sends to server to verify by terminal equipment, just safety operation instruction can be sent to server after being verified, generate corresponding operating data.The second execution mode compares the first execution mode can reduce burden in network transmission process, saves Internet resources.
In summary, the said system embodiment two that the application provides, the terminal equipment needing to perform more sensitive operation (consumption in such as game application, transfer accounts, shift the operational orders such as game article) can be applied in, the intelligence information of tatooing provided by using the intelligence equipment of tatooing determines the user identity of the terminal equipment (such as computer, mobile phone etc.) bound with it, and then determine whether the Client-initiated sensitive operation will carrying out terminal equipment, ensure the fail safe of the user operation of terminal equipment.Avoid user to be stolen and to bring the loss of money, privacy after password to user.
It should be noted that, for aforesaid each embodiment of the method, in order to simple description, therefore it is all expressed as a series of combination of actions, but those skilled in the art should know, the present invention is not by the restriction of described sequence of movement, because according to the present invention, some step can adopt other orders or carry out simultaneously.Secondly, those skilled in the art also should know, the embodiment described in specification all belongs to preferred embodiment, and involved action and module might not be that the present invention is necessary.
Through the above description of the embodiments, those skilled in the art can be well understood to the mode that can add required general hardware platform by software according to the method for above-described embodiment and realize, hardware can certainly be passed through, but in a lot of situation, the former is better execution mode.Based on such understanding, technical scheme of the present invention can embody with the form of software product the part that prior art contributes in essence in other words, this computer software product is stored in a storage medium (as ROM/RAM, magnetic disc, CD), comprising some instructions in order to make a station terminal equipment (can be mobile phone, computer, server, or the network equipment etc.) perform method described in each embodiment of the present invention.
Embodiment 3
In the configuration that it is the most basic, Fig. 6 is the structural representation of authentication means of the equipment of tatooing based on intelligence according to the embodiment of the present invention three.For purposes of illustration, the apparatus body architecture of painting is only an example of proper environment, not proposes any limitation to the scope of application of the application or function.This computing system should be interpreted as, to the arbitrary assembly shown in Fig. 6 or its combination, there is any dependence or demand yet.
The device that the above embodiments of the present application provide can run on terminal equipment 30 as shown in Figure 1, and as shown in Figure 6, this device can comprise: search module 61, acquisition module 63, processing module 65.
Wherein, search module 61, to tatoo equipment for can be found the intelligence of binding with terminal equipment by the terminal equipment 30 in Fig. 1, wherein, to be tatooed the corresponding relation between identifying by the tatoo intelligence of equipment of the User Identity and intelligence setting up terminal equipment, come binding terminal equipment and intelligence and to tatoo equipment; Acquisition module 63, the intelligence transmitted for can be obtained intelligence equipment of tatooing by the terminal equipment 30 in Fig. 1 is tatooed information; Processing module 65, for acquisition of information can be tatooed to safety verification result by the terminal equipment 30 in Fig. 1 according to intelligence, determine whether to perform safety operation corresponding to the safety operation instruction that sends of terminal equipment, wherein, when safety verification result be intelligence tatoo information by checking, perform the safety operation that safety operation instruction is corresponding.
Said apparatus embodiment in tatoo equipment 10 of intelligence be responsible for connecting with the terminal equipment 30 of user and carrying out mutual, for terminal equipment 30 provides identity information.Terminal equipment 30 is that equipment 10 of tatooing with intelligence sets up correspondence, can be the equipment that user carries out sensitive operation,
In the above embodiments of the present application three, to tatoo equipment 10 by binding corresponding intelligence for terminal equipment 30, make user before registration terminal equipment carries out various operation (especially relating to the safety operation that Modify password, equipment transfer, critical data transaction etc. have sensitiveness), need to use the intelligence with present terminal apparatus bound to tatoo equipment to carry out additional authentication, the legitimacy of the user identity of the current registration terminal equipment of main checking.Because the intelligence equipment of tatooing is that a kind of can being attached to human body skin has its unique intelligence and to tatoo the equipment of information, energy is provided by human body, and have by the communication mode such as bluetooth, wireless network and terminal equipment (such as the electronic equipment etc. of mobile terminal, compunlcation), therefore, the intelligence equipment of tatooing can characterize the exact identity information of active user.Easily notice, bind an intelligence due to terminal equipment to tatoo equipment, make when system searching to be tatooed equipment to the intelligence of binding with terminal equipment, and get the intelligence that intelligence equipment of tatooing transmits and tatoo after information, device end can tatoo acquisition of information to safety verification result according to intelligence, this safety verification result can determine that whether the user of current registration terminal equipment is legal, thus can whether can continue to perform safety operation corresponding to the safety operation instruction that sends of terminal equipment by certainty annuity, now, if when information of tatooing that safety verification result is intelligence passes through checking, system can allow active user to use terminal equipment and safety operation corresponding to triggering secure operational order, wherein, can be tatooed by the User Identity and intelligence the setting up terminal equipment intelligence of equipment of system is tatooed the corresponding relation between identifying, come binding terminal equipment and intelligence to tatoo equipment.
It can thus be appreciated that, the scheme that the embodiment of the present invention three provides can be applied in online game or payment system, the voucher that the intelligence information of tatooing provided due to the intelligence equipment of tatooing can only belong to a user as one is to prove the data of the legitimacy of user, therefore, can by the legitimacy adopting the intelligence equipment of tatooing to carry out the login user of additional authentication terminal equipment.Namely the present invention proposes a kind of method verifying the identity of the user logging in present terminal equipment based on the intelligence equipment of tatooing, because proof procedure does not need manually to input the information such as user name, password, decrease the input operation of user, therefore, on the basis that can confirm the reliability of the identity using the user of terminal equipment fast, efficiently, easily, also improve the speed of checking, thus improve the fail safe of user operation and improve the efficiency of authentication.
As from the foregoing, above-mentioned search module 61, acquisition module 63, processing module 65 correspond to step S30 in embodiment two to step S34, the example that three modules and corresponding step realize is identical with application scenarios, but is not limited to the content disclosed in above-described embodiment two.It should be noted that, above-mentioned module may operate in the terminal equipment 30 that embodiment one provides as the part of device, can pass through software simulating, also can pass through hardware implementing.
Preferably, in the above embodiments of the present application, perform terminal equipment in above-mentioned search module 61 to find the intelligence of binding with terminal equipment and tatoo before equipment, equipment 10 of can also being tatooed by the intelligence in Fig. 1 is realized: the first acquisition module, for the digital signature of the User Identity and User Identity that obtain terminal equipment; Second acquisition module, to tatoo mark for obtaining the tatoo intelligence of equipment of intelligence; Sign test module, for using identifying algorithm, sign test is carried out to the digital signature of User Identity, if sign test success, the intelligence of equipment of then User Identity of terminal equipment and intelligence being tatooed mark of tatooing is bound, and records the tatoo intelligence of equipment of the User Identity of terminal equipment and intelligence and to tatoo the corresponding relation between identifying.
It should be noted that herein, above-mentioned first acquisition module, the second acquisition module, sign test module correspond to step S101 in embodiment two to step S105, the example that three modules and corresponding step realize is identical with application scenarios, but is not limited to the content disclosed in above-described embodiment two.It should be noted that, the intelligence that above-mentioned module may operate in embodiment one provide as the part of device is tatooed in equipment 10, can pass through software simulating, also can pass through hardware implementing.
In a kind of optional embodiment that the application provides, the tatoo intelligence of equipment of the User Identity of terminal equipment and intelligence can be preserved by server to tatoo the corresponding relation between identifying, preferably, as shown in Figure 7, above-mentioned processing module 65 can comprise: the first sending module 701 and the first receiver module 702.
First sending module 701, for intelligence being tatooed, information and safety operation instruction are sent to server.
First receiver module 702, for receiving the operating data of the safety operation that server returns, wherein, when server detect intelligence information of tatooing at least comprise intelligence tatoo mark, safety verification result is that intelligence tatoos information by checking, and perform safety operation corresponding to safety operation instruction, generating run data.
It should be noted that herein, above-mentioned first sending module 701 and the first receiver module 702 correspond to step S401a in embodiment two to step S403a, the example that two modules and corresponding step realize is identical with application scenarios, but is not limited to the content disclosed in above-described embodiment two.It should be noted that, above-mentioned module may operate in the terminal equipment 30 that embodiment one provides as the part of device, can pass through software simulating, also can pass through hardware implementing.
In the another kind of optional embodiment that the application provides, the tatoo intelligence of equipment of the User Identity of terminal equipment and intelligence can be preserved by server to tatoo the corresponding relation between identifying, preferably, as shown in Figure 8, above-mentioned processing module 65 can comprise: the second sending module 801, sub-acquisition module 803, the 3rd sending module 805 and the second receiver module 807.
Second sending module 801, for being sent to server by the intelligence information of tatooing.
Sub-acquisition module 803, for obtaining the safety verification result that server returns, wherein, when server detect intelligence information of tatooing at least comprise intelligence tatoo mark, safety verification result be intelligence tatoo information by checking.
3rd sending module 805, in safety verification result be intelligence tatoo information by checking, safety operation instruction is sent to server.
Second receiver module 807, for receiving the operating data of the safety operation that server returns, wherein, server performs safety operation corresponding to safety operation instruction, generating run data.
It should be noted that herein, above-mentioned second sending module 801, sub-acquisition module 803, the 3rd sending module 805 and the second receiver module 807 correspond to step S401b in embodiment two to step S407b, the example that four modules and corresponding step realize is identical with application scenarios, but is not limited to the content disclosed in above-described embodiment two.It should be noted that, above-mentioned module may operate in the terminal equipment 30 that embodiment one provides as the part of device, can pass through software simulating, also can pass through hardware implementing.
Embodiment 4
The application can also provide the another kind of system embodiment shown in Fig. 9, and Fig. 9 is the structural representation of authentication system of the equipment of tatooing based on intelligence according to the embodiment of the present invention four.For purposes of illustration, the architecture of painting is only an example of proper environment, not proposes any limitation to the scope of application of the application or function.This computing system should be interpreted as, to the arbitrary assembly shown in Fig. 9 or its combination, there is any dependence or demand yet.
As shown in Figure 9, what the embodiment of the present application four provided can comprise based on the tatoo authentication system of equipment of intelligence: intelligence is tatooed equipment 90, terminal equipment 92 and server 94.
Wherein, intelligence is tatooed equipment 90, to tatoo information for generating intelligence; Terminal equipment 92, sets up correspondence with intelligence equipment 90 of tatooing, and for tatooing after equipment finding the intelligence of binding with terminal equipment, obtaining intelligence that intelligence equipment of tatooing transmits and to tatoo information; Server 94, correspondence is set up with terminal equipment 92, the intelligence transmitted for receiving terminal equipment is tatooed information and safety operation instruction, is verifying the intelligence information of tatooing, after generating safety verification result, according to safety verification result, determine whether to perform safety operation corresponding to the safety operation instruction that sends of terminal equipment, wherein, when safety verification result be intelligence tatoo information by checking, perform the safety operation that safety operation instruction is corresponding, generating run data.
In the above embodiments of the present application four, by equipment of tatooing for the intelligence of terminal equipment binding correspondence, make user before registration terminal equipment carries out various operation (especially relating to the safety operation that Modify password, equipment transfer, critical data transaction etc. have sensitiveness), need to use the intelligence with present terminal apparatus bound to tatoo equipment to carry out additional authentication, the legitimacy of the user identity of the current registration terminal equipment of main checking.Because the intelligence equipment of tatooing is that a kind of can being attached to human body skin has its unique intelligence and to tatoo the equipment of information, energy is provided by human body, and have by the communication mode such as bluetooth, wireless network and terminal equipment (such as the electronic equipment etc. of mobile terminal, compunlcation), therefore, the intelligence equipment of tatooing can characterize the exact identity information of active user.Easily notice, bind an intelligence due to terminal equipment to tatoo equipment, make when system searching to be tatooed equipment to the intelligence of binding with terminal equipment, and the intelligence of the intelligent equipment of tatooing of terminal equipment collection is tatooed after information, can receive by server the intelligence that terminal equipment transmits to tatoo information and safety operation instruction, and the intelligence information of tatooing is verified, generate safety verification result, because this safety verification result can determine that whether the user of current registration terminal equipment is legal, thus server can according to safety verification result, carry out certainty annuity whether can continue to perform safety operation corresponding to the safety operation instruction that sends of terminal equipment, now, if when information of tatooing that safety verification result is intelligence passes through checking, system can allow active user to use terminal equipment and safety operation corresponding to triggering secure operational order, wherein, can be tatooed by the User Identity and intelligence the setting up terminal equipment intelligence of equipment of system is tatooed the corresponding relation between identifying, come binding terminal equipment and intelligence to tatoo equipment.
It can thus be appreciated that, the scheme that the embodiment of the present invention four provides can be applied in online game or payment system, the voucher that the intelligence information of tatooing provided due to the intelligence equipment of tatooing can only belong to a user as one is to prove the data of the legitimacy of user, therefore, can by the legitimacy adopting the intelligence equipment of tatooing to carry out the login user of additional authentication terminal equipment.Namely the present invention proposes a kind of scheme verifying the identity of the user logging in present terminal equipment based on the intelligence equipment of tatooing, because proof procedure does not need manually to input the information such as user name, password, decrease the input operation of user, therefore, on the basis that can confirm the reliability of the identity using the user of terminal equipment fast, efficiently, easily, also improve the speed of checking, thus improve the fail safe of user operation and improve the efficiency of authentication.
Preferably, as shown in Figure 10, the server 94 in the above embodiments of the present application four can comprise: receiver module 1001, processor 1003 and memory 1005.
Receiving system 1001, for obtaining the User Identity of terminal equipment, and intelligence tatoo mark and intelligence of the intelligence of equipment of tatooing is tatooed the digital signature of mark.
Processor 1003, establish a connection with receiving system, for use identifying algorithm to intelligence tatoo mark digital signature carry out sign test, if sign test success, the intelligence of equipment of then User Identity of terminal equipment and intelligence being tatooed mark of tatooing is bound, and records the tatoo intelligence of equipment of the User Identity of terminal equipment and intelligence and to tatoo the corresponding relation between identifying.
Memory 1005, establishes a connection with processor, and the tatoo intelligence of equipment of User Identity and intelligence for preserving terminal equipment is tatooed the corresponding relation between identifying.
It can thus be appreciated that the above embodiments of the present application four can provide a kind of, store the scheme of the intelligent user's binding information between equipment and terminal equipment of tatooing in the server.User is before whether the operation of the intelligent device authentication terminal equipment of tatooing of use is safe, need the intelligence of equipment that intelligence tatooed tatoo mark ID and terminal equipment User Identity ID at server (such as, sensitive operation server for special disposal relates to Modify password, equipment transfer, critical data transaction etc. have the safety operation of sensitiveness) on bind, the intelligence that the form of tables of data can be adopted to store intelligent equipment of tatooing is tatooed and is identified the User Identity ID of ID and terminal equipment, and the corresponding relation between them.It should be noted that, the sensitive operation system that this sensitive operation server provides can comprise following function herein: the preservation being responsible for the User Identity information of preserving each terminal equipment; Store the binding relationship of User Identity information and intelligent identification information of tatooing; Be responsible for performing user's sensitive operation, authenticated user identity.
Preferably, in order to improve the intelligence got tatoo device transmission intelligence tatoo mark fail safe, the application's such scheme additionally provide a kind of server receive intelligence tatoo equipment send intelligence tatoo mark and intelligence tatoo mark digital signature after, carry out the function of sign test to above-mentioned intelligence mark of tatooing, the intelligence only having sign test to pass through equipment of tatooing just can be bound with corresponding terminal equipment.
Such as, active user needs a known intelligence to tatoo apparatus bound in held terminal equipment, first, user can be sent to sensitive operation system by the network intelligence of equipment mark of tatooing of intelligence being tatooed together with voucher (i.e. digital signature), sensitive operation system is tatooed by identifying algorithm checking intelligence and is identified and Service Ticket, bind in the checking User Identity ID of terminal equipment and intelligence the tatooed intelligence of equipment mark of tatooing, and binding relationship is stored in current sensitive operation system.
Need to further illustrate herein, relate to each preferred embodiment in the above embodiments of the present application four identical with the preferred version that embodiment one provides and application scenarios implementation process, but be not limited to the scheme that embodiment one provides.
Embodiment 5
According to the embodiment of the present invention, additionally provide the embodiment of auth method of another equipment of tatooing based on intelligence, it should be noted that, can perform in the computer system of such as one group of computer executable instructions in the step shown in the flow chart of accompanying drawing, and, although show logical order in flow charts, in some cases, can be different from the step shown or described by order execution herein.
Figure 11 is the schematic flow sheet of auth method of the equipment of tatooing based on intelligence according to the embodiment of the present invention five.
The method that the above embodiments of the present application five provide can be run on server 94.As shown in figure 11, what the embodiment of the present application five provided can comprise following implementation step based on the tatoo auth method of equipment of intelligence:
Step S1101, the server 94 that can be provided by Figure 10 is received the intelligence that terminal equipment transmits and to tatoo information and safety operation instruction.
Step S1103, the server 94 that can be provided by Figure 10 is verified the intelligence information of tatooing, and generates safety verification result;
Step S1105, the server 94 that can be provided by Figure 10 is according to safety verification result, determine whether to perform safety operation corresponding to the safety operation instruction that sends of terminal equipment, wherein, when safety verification result be intelligence tatoo information by checking, perform the safety operation that safety operation instruction is corresponding, generating run data.
The step S1101 provided in the above embodiments of the present application five to step S1105 can realize, by equipment of tatooing for the intelligence of terminal equipment binding correspondence, make user before registration terminal equipment carries out various operation (especially relating to the safety operation that Modify password, equipment transfer, critical data transaction etc. have sensitiveness), need to use the intelligence with present terminal apparatus bound to tatoo equipment to carry out additional authentication, the legitimacy of the user identity of the current registration terminal equipment of main checking.Because the intelligence equipment of tatooing is that a kind of can being attached to human body skin has its unique intelligence and to tatoo the equipment of information, energy is provided by human body, and have by the communication mode such as bluetooth, wireless network and terminal equipment (such as the electronic equipment etc. of mobile terminal, compunlcation), therefore, the intelligence equipment of tatooing can characterize the exact identity information of active user.Easily notice, bind an intelligence due to terminal equipment to tatoo equipment, make when system searching to be tatooed equipment to the intelligence of binding with terminal equipment, and the intelligence of the intelligent equipment of tatooing of terminal equipment collection is tatooed after information, can receive by server the intelligence that terminal equipment transmits to tatoo information and safety operation instruction, and the intelligence information of tatooing is verified, generate safety verification result, because this safety verification result can determine that whether the user of current registration terminal equipment is legal, thus server can according to safety verification result, carry out certainty annuity whether can continue to perform safety operation corresponding to the safety operation instruction that sends of terminal equipment, now, if when information of tatooing that safety verification result is intelligence passes through checking, system can allow active user to use terminal equipment and safety operation corresponding to triggering secure operational order, wherein, can be tatooed by the User Identity and intelligence the setting up terminal equipment intelligence of equipment of system is tatooed the corresponding relation between identifying, come binding terminal equipment and intelligence to tatoo equipment.
It can thus be appreciated that, the scheme that the embodiment of the present invention five provides can be applied in online game or payment system, the voucher that the intelligence information of tatooing provided due to the intelligence equipment of tatooing can only belong to a user as one is to prove the data of the legitimacy of user, therefore, can by the legitimacy adopting the intelligence equipment of tatooing to carry out the login user of additional authentication terminal equipment.Namely the present invention proposes a kind of scheme verifying the identity of the user logging in present terminal equipment based on the intelligence equipment of tatooing, because proof procedure does not need manually to input the information such as user name, password, decrease the input operation of user, therefore, on the basis that can confirm the reliability of the identity using the user of terminal equipment fast, efficiently, easily, also improve the speed of checking, thus improve the fail safe of user operation and improve the efficiency of authentication.
It should be noted that herein, relate to each preferred embodiment in the above embodiments of the present application five identical with the scheme that embodiment two provides and application scenarios implementation process, but be not limited to the scheme that embodiment two provides.
Embodiment 6
Figure 12 is the structural representation of authentication means of the equipment of tatooing based on intelligence according to the embodiment of the present invention six.The device that the above embodiments of the present application provide can run on server 94 as shown in Figure 10.
As shown in figure 12, what the application provided can comprise based on the tatoo authentication means of equipment of intelligence: receiver module 1201, authentication module 1203 and determination module 1205.
Wherein, receiver module 1201, the intelligence transmitted for receiving terminal equipment is tatooed information and safety operation instruction; Authentication module 1203, for verifying the intelligence information of tatooing, generates safety verification result; Determination module 1205, for according to safety verification result, determine whether to perform safety operation corresponding to the safety operation instruction that sends of terminal equipment, wherein, when safety verification result be intelligence tatoo information by checking, perform the safety operation that safety operation instruction is corresponding, generating run data.
In the above embodiments of the present application stream, by equipment of tatooing for the intelligence of terminal equipment binding correspondence, make user before registration terminal equipment carries out various operation (especially relating to the safety operation that Modify password, equipment transfer, critical data transaction etc. have sensitiveness), need to use the intelligence with present terminal apparatus bound to tatoo equipment to carry out additional authentication, the legitimacy of the user identity of the current registration terminal equipment of main checking.Because the intelligence equipment of tatooing is that a kind of can being attached to human body skin has its unique intelligence and to tatoo the equipment of information, energy is provided by human body, and have by the communication mode such as bluetooth, wireless network and terminal equipment (such as the electronic equipment etc. of mobile terminal, compunlcation), therefore, the intelligence equipment of tatooing can characterize the exact identity information of active user.Easily notice, bind an intelligence due to terminal equipment to tatoo equipment, make when system searching to be tatooed equipment to the intelligence of binding with terminal equipment, and the intelligence of the intelligent equipment of tatooing of terminal equipment collection is tatooed after information, can receive by server the intelligence that terminal equipment transmits to tatoo information and safety operation instruction, and the intelligence information of tatooing is verified, generate safety verification result, because this safety verification result can determine that whether the user of current registration terminal equipment is legal, thus server can according to safety verification result, carry out certainty annuity whether can continue to perform safety operation corresponding to the safety operation instruction that sends of terminal equipment, now, if when information of tatooing that safety verification result is intelligence passes through checking, system can allow active user to use terminal equipment and safety operation corresponding to triggering secure operational order, wherein, can be tatooed by the User Identity and intelligence the setting up terminal equipment intelligence of equipment of system is tatooed the corresponding relation between identifying, come binding terminal equipment and intelligence to tatoo equipment.
It can thus be appreciated that, the scheme that the embodiment of the present invention six provides can be applied in online game or payment system, the voucher that the intelligence information of tatooing provided due to the intelligence equipment of tatooing can only belong to a user as one is to prove the data of the legitimacy of user, therefore, can by the legitimacy adopting the intelligence equipment of tatooing to carry out the login user of additional authentication terminal equipment.Namely the present invention proposes a kind of scheme verifying the identity of the user logging in present terminal equipment based on the intelligence equipment of tatooing, because proof procedure does not need manually to input the information such as user name, password, decrease the input operation of user, therefore, on the basis that can confirm the reliability of the identity using the user of terminal equipment fast, efficiently, easily, also improve the speed of checking, thus improve the fail safe of user operation and improve the efficiency of authentication.
Need to further illustrate herein, relate to each preferred embodiment in the above embodiments of the present application six identical with the preferred version that embodiment three provides and application scenarios implementation process, but be not limited to the scheme that embodiment three provides.
The invention described above embodiment sequence number, just to describing, does not represent the quality of embodiment.
In the above embodiment of the present invention, the description of each embodiment is all emphasized particularly on different fields, in certain embodiment, there is no the part described in detail, can see the associated description of other embodiments.
In several embodiments that the application provides, should be understood that, disclosed client, the mode by other realizes.Wherein, device embodiment described above is only schematic, the division of such as unit, be only a kind of logic function to divide, actual can have other dividing mode when realizing, such as multiple unit or assembly can in conjunction with or another system can be integrated into, or some features can be ignored, or do not perform.Another point, shown or discussed coupling each other or direct-coupling or communication connection can be by some interfaces, and the indirect coupling of unit or module or communication connection can be electrical or other form.
The described unit illustrated as separating component or can may not be and physically separates, and the parts as unit display can be or may not be physical location, namely can be positioned at a place, or also can be distributed in multiple network element.Some or all of unit wherein can be selected according to the actual needs to realize the object of the present embodiment scheme.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, also can be that the independent physics of unit exists, also can two or more unit in a unit integrated.Above-mentioned integrated unit both can adopt the form of hardware to realize, and the form of SFU software functional unit also can be adopted to realize.
If described integrated unit using the form of SFU software functional unit realize and as independently production marketing or use time, can be stored in a computer read/write memory medium.Based on such understanding, the part that technical scheme of the present invention contributes to prior art in essence in other words or all or part of of this technical scheme can embody with the form of software product, this computer software product is stored in a storage medium, comprises all or part of step of some instructions in order to make a computer equipment (can be personal computer, server or the network equipment etc.) perform method described in each embodiment of the present invention.And aforesaid storage medium comprises: USB flash disk, read-only memory (ROM, Read-OnlyMemory), random access memory (RAM, Random Access Memory), portable hard drive, magnetic disc or CD etc. various can be program code stored medium.
The above is only the preferred embodiment of the present invention; it should be pointed out that for those skilled in the art, under the premise without departing from the principles of the invention; can also make some improvements and modifications, these improvements and modifications also should be considered as protection scope of the present invention.

Claims (14)

1. to tatoo based on intelligence the auth method of equipment, it is characterized in that, comprising:
Terminal equipment finds the intelligence of binding with described terminal equipment and to tatoo equipment, wherein, to be tatooed the corresponding relation between identifying by the tatoo intelligence of equipment of the User Identity and described intelligence setting up described terminal equipment, bind described terminal equipment and described intelligence and to tatoo equipment;
Described terminal equipment gathers the intelligence that described intelligence equipment of tatooing transmits and to tatoo information;
Described terminal equipment tatoos acquisition of information to safety verification result according to described intelligence, determine whether to perform the safety operation that safety operation instruction that described terminal equipment sends is corresponding, wherein, when described safety verification result be described intelligence tatoo information by checking, perform the safety operation that described safety operation instruction is corresponding.
2. method according to claim 1, is characterized in that, find the intelligence of binding with described terminal equipment at terminal equipment and tatoo before equipment, described method also comprises:
Obtain the User Identity of described terminal equipment;
Obtain described intelligence tatoo mark and described intelligence of the intelligence of equipment of tatooing to tatoo the digital signature of mark;
Use identifying algorithm to described intelligence tatoo mark digital signature carry out sign test, if sign test success, the intelligence of equipment of then User Identity of described terminal equipment and described intelligence being tatooed mark of tatooing is bound, and records the tatoo intelligence of equipment of the User Identity of described terminal equipment and described intelligence and to tatoo the corresponding relation between identifying.
3. method according to claim 1 and 2, it is characterized in that, preserve the tatoo intelligence of equipment of the User Identity of described terminal equipment and described intelligence by server to tatoo the corresponding relation between identifying, wherein, described terminal equipment tatoos acquisition of information to safety verification result according to described intelligence, and the step determining whether to perform safety operation corresponding to safety operation instruction that described terminal equipment sends comprises:
Described intelligence tatooed information and the described safety operation instruction of described terminal equipment is sent to described server;
Described terminal equipment receives the operating data of the described safety operation that described server returns, wherein, when described server detect described intelligence information of tatooing at least comprise described intelligence tatoo mark, described safety verification result is that described intelligence tatoos information by checking, and perform safety operation corresponding to described safety operation instruction, generate described operating data.
4. method according to claim 1 and 2, it is characterized in that, preserve the tatoo intelligence of equipment of the User Identity of described terminal equipment and described intelligence by server to tatoo the corresponding relation between identifying, wherein, described terminal equipment tatoos acquisition of information to safety verification result according to described intelligence, and the step determining whether to perform safety operation corresponding to safety operation instruction that described terminal equipment sends comprises:
The described intelligence information of tatooing is sent to described server by described terminal equipment;
Described terminal equipment obtains the described safety verification result that described server returns, wherein, when described server detect described intelligence information of tatooing at least comprise described intelligence tatoo mark, described safety verification result be described intelligence tatoo information by checking;
When described safety verification result be described intelligence tatoo information by checking, described safety operation instruction is sent to described server by described terminal equipment;
Described terminal equipment receives the operating data of the described safety operation that described server returns, and wherein, described server performs safety operation corresponding to described safety operation instruction, generates described operating data.
5. to tatoo based on intelligence the authentication means of equipment, it is characterized in that, comprising:
Search module, to tatoo equipment for finding the intelligence of binding with terminal equipment, wherein, to be tatooed the corresponding relation between identifying by the tatoo intelligence of equipment of the User Identity and described intelligence setting up described terminal equipment, bind described terminal equipment and described intelligence and to tatoo equipment;
Acquisition module, the intelligence transmitted for obtaining described intelligence equipment of tatooing is tatooed information;
Processing module, tatoo acquisition of information to safety verification result according to described intelligence for described terminal equipment, determine whether to perform the safety operation that safety operation instruction that described terminal equipment sends is corresponding, wherein, when described safety verification result be described intelligence tatoo information by checking, perform the safety operation that described safety operation instruction is corresponding.
6. device according to claim 5, is characterized in that, preserve the tatoo intelligence of equipment of the User Identity of described terminal equipment and described intelligence by server and to tatoo the corresponding relation between identifying, wherein, described processing module comprises:
First sending module, for described intelligence being tatooed, information and described safety operation instruction are sent to described server;
First receiver module, for receiving the operating data of the described safety operation that described server returns, wherein, when described server detect described intelligence information of tatooing at least comprise described intelligence tatoo mark, described safety verification result is that described intelligence tatoos information by checking, and perform safety operation corresponding to described safety operation instruction, generate described operating data.
7. device according to claim 5, is characterized in that, preserve the tatoo intelligence of equipment of the User Identity of described terminal equipment and described intelligence by server and to tatoo the corresponding relation between identifying, wherein, described processing module comprises:
Second sending module, for being sent to described server by the described intelligence information of tatooing;
Sub-acquisition module, for obtaining the described safety verification result that described server returns, wherein, when described server detect described intelligence information of tatooing at least comprise described intelligence tatoo mark, described safety verification result be described intelligence tatoo information by checking;
3rd sending module, in described safety verification result be described intelligence tatoo information by checking, described safety operation instruction is sent to described server;
Second receiver module, for receiving the operating data of the described safety operation that described server returns, wherein, described server performs safety operation corresponding to described safety operation instruction, generates described operating data.
8. to tatoo based on intelligence the authentication system of equipment, it is characterized in that, comprising:
Intelligence is tatooed equipment, to tatoo information for transmitting intelligence;
Terminal equipment, correspondence is set up with the described intelligence equipment of tatooing, to tatoo equipment for finding the described intelligence of binding with described terminal equipment, tatoo after information getting the described intelligence that described intelligence equipment of tatooing transmits, tatoo acquisition of information to safety verification result according to described intelligence, determines whether to perform the safety operation that safety operation instruction that described terminal equipment sends is corresponding;
Wherein, to be tatooed the corresponding relation between identifying by the tatoo intelligence of equipment of the User Identity and described intelligence setting up described terminal equipment, bind described terminal equipment and described intelligence to tatoo equipment, and when described safety verification result be described intelligence tatoo information by checking, perform the safety operation that described safety operation instruction is corresponding.
9. system according to claim 8, is characterized in that, find the intelligence of binding with described terminal equipment at terminal equipment and tatoo before equipment, described system also comprises:
Server, correspondence set up by tatoo with described intelligence respectively equipment and described terminal equipment, for obtaining the User Identity of described terminal equipment, and described intelligence tatoo mark and described intelligence of the intelligence of equipment of tatooing is tatooed the digital signature of mark, use identifying algorithm to described intelligence tatoo mark digital signature carry out sign test, if sign test success, the intelligence of equipment of then User Identity of described terminal equipment and described intelligence being tatooed mark of tatooing is bound, and record the tatoo intelligence of equipment of the User Identity of described terminal equipment and described intelligence and to tatoo the corresponding relation between identifying.
10. to tatoo based on intelligence the auth method of equipment, it is characterized in that, comprising:
Server receives the intelligence that terminal equipment transmits and to tatoo information and safety operation instruction;
Described server is verified the described intelligence information of tatooing, and generates safety verification result;
Described server is according to described safety verification result, determine whether to perform the safety operation that safety operation instruction that described terminal equipment sends is corresponding, wherein, when described safety verification result be described intelligence tatoo information by checking, perform the safety operation that described safety operation instruction is corresponding, generating run data.
11. methods according to claim 10, is characterized in that, receive at server the intelligence that terminal equipment transmits and tatoo before information and safety operation instruction, described method also comprises:
Described terminal equipment finds the intelligence of binding with described terminal equipment and to tatoo equipment, wherein, to be tatooed the corresponding relation between identifying by the tatoo intelligence of equipment of the User Identity and described intelligence setting up described terminal equipment, bind described terminal equipment and described intelligence and to tatoo equipment;
Described terminal equipment gathers the intelligence that described intelligence equipment of tatooing transmits and to tatoo information.
The authentication means of 12. 1 kinds of equipment of tatooing based on intelligence, is characterized in that, comprising:
Receiver module, the intelligence transmitted for receiving terminal equipment is tatooed information and safety operation instruction;
Authentication module, for verifying the described intelligence information of tatooing, generates safety verification result;
Determination module, for according to described safety verification result, determine whether to perform the safety operation that safety operation instruction that described terminal equipment sends is corresponding, wherein, when described safety verification result be described intelligence tatoo information by checking, perform the safety operation that described safety operation instruction is corresponding, generating run data.
The authentication system of 13. 1 kinds of equipment of tatooing based on intelligence, is characterized in that, comprising:
Intelligence is tatooed equipment, to tatoo information for generating intelligence;
Terminal equipment, sets up correspondence with the described intelligence equipment of tatooing, and for tatooing after equipment finding the intelligence of binding with described terminal equipment, obtaining described intelligence that described intelligence equipment of tatooing transmits and to tatoo information;
Server, correspondence is set up with described terminal equipment, the intelligence transmitted for receiving described terminal equipment is tatooed information and safety operation instruction, the described intelligence information of tatooing is being verified, after generating safety verification result, according to described safety verification result, determine whether to perform the safety operation that safety operation instruction that described terminal equipment sends is corresponding, wherein, when described safety verification result be described intelligence tatoo information by checking, perform the safety operation that described safety operation instruction is corresponding, generating run data.
14. systems according to claim 13, is characterized in that, described server comprises:
Receiving system, for obtaining the User Identity of described terminal equipment, and described intelligence tatoo mark, described intelligence of the intelligence of equipment of tatooing is tatooed the digital signature of mark;
Processor, establish a connection with described receiving system, for use identifying algorithm to described intelligence tatoo mark digital signature carry out sign test, if sign test success, the intelligence of equipment of then User Identity of described terminal equipment and described intelligence being tatooed mark of tatooing is bound, and records the tatoo intelligence of equipment of the User Identity of described terminal equipment and described intelligence and to tatoo the corresponding relation between identifying;
Memory, establishes a connection with described processor, and the tatoo intelligence of equipment of User Identity and described intelligence for preserving described terminal equipment is tatooed the corresponding relation between identifying.
CN201410099222.3A 2014-03-17 2014-03-17 Auth method, apparatus and system based on intelligent equipment of tatooing Active CN104935548B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410099222.3A CN104935548B (en) 2014-03-17 2014-03-17 Auth method, apparatus and system based on intelligent equipment of tatooing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410099222.3A CN104935548B (en) 2014-03-17 2014-03-17 Auth method, apparatus and system based on intelligent equipment of tatooing

Publications (2)

Publication Number Publication Date
CN104935548A true CN104935548A (en) 2015-09-23
CN104935548B CN104935548B (en) 2019-05-24

Family

ID=54122521

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410099222.3A Active CN104935548B (en) 2014-03-17 2014-03-17 Auth method, apparatus and system based on intelligent equipment of tatooing

Country Status (1)

Country Link
CN (1) CN104935548B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104363094A (en) * 2014-10-30 2015-02-18 广东欧珀移动通信有限公司 Method, device and system for authenticating identities of users of application programs
CN106302743A (en) * 2016-08-17 2017-01-04 成都市极米科技有限公司 The matching method of projector and mobile terminal and system
CN110536273A (en) * 2018-05-25 2019-12-03 九阳股份有限公司 A kind of connection matching method of smart machine
CN110852163A (en) * 2019-10-08 2020-02-28 云知声智能科技股份有限公司 Binding method and device
CN111182497A (en) * 2019-12-27 2020-05-19 国家计算机网络与信息安全管理中心 V2X anonymous authentication method, device and storage medium
CN113806723A (en) * 2021-09-27 2021-12-17 三星电子(中国)研发中心 Double-factor authentication method and device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101329791A (en) * 2008-07-10 2008-12-24 大连新中连软件工程有限公司 Identification verification system using finger print
CN101702223A (en) * 2009-11-27 2010-05-05 吴剑 Mobile phone POS payment method and system
CN102790674A (en) * 2011-05-20 2012-11-21 阿里巴巴集团控股有限公司 Authentication method, equipment and system
CN103258270A (en) * 2013-04-12 2013-08-21 李霆 Bank paying method and device
CN103297392A (en) * 2012-02-27 2013-09-11 深圳市嘉乐祥珠宝饰品有限公司 Fingerprint identity authentication system and authentication method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101329791A (en) * 2008-07-10 2008-12-24 大连新中连软件工程有限公司 Identification verification system using finger print
CN101702223A (en) * 2009-11-27 2010-05-05 吴剑 Mobile phone POS payment method and system
CN102790674A (en) * 2011-05-20 2012-11-21 阿里巴巴集团控股有限公司 Authentication method, equipment and system
CN103297392A (en) * 2012-02-27 2013-09-11 深圳市嘉乐祥珠宝饰品有限公司 Fingerprint identity authentication system and authentication method
CN103258270A (en) * 2013-04-12 2013-08-21 李霆 Bank paying method and device

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104363094A (en) * 2014-10-30 2015-02-18 广东欧珀移动通信有限公司 Method, device and system for authenticating identities of users of application programs
CN104363094B (en) * 2014-10-30 2018-04-20 广东欧珀移动通信有限公司 A kind of methods, devices and systems of authentication application program user identity
CN106302743A (en) * 2016-08-17 2017-01-04 成都市极米科技有限公司 The matching method of projector and mobile terminal and system
CN110536273A (en) * 2018-05-25 2019-12-03 九阳股份有限公司 A kind of connection matching method of smart machine
CN110852163A (en) * 2019-10-08 2020-02-28 云知声智能科技股份有限公司 Binding method and device
CN111182497A (en) * 2019-12-27 2020-05-19 国家计算机网络与信息安全管理中心 V2X anonymous authentication method, device and storage medium
CN113806723A (en) * 2021-09-27 2021-12-17 三星电子(中国)研发中心 Double-factor authentication method and device

Also Published As

Publication number Publication date
CN104935548B (en) 2019-05-24

Similar Documents

Publication Publication Date Title
CN104144419B (en) Identity authentication method, device and system
CN108989346B (en) Third-party valid identity escrow agile authentication access method based on account hiding
CN109450649A (en) Gateway verification method and device based on application program interface and electronic equipment
CN104935548A (en) Identity verification method, device and system based on intelligent tattooing equipment
CN104618315B (en) A kind of method, apparatus and system of verification information push and Information Authentication
CN107294721A (en) The method and apparatus of identity registration, certification based on biological characteristic
CN103986725A (en) Client side, server side and identity authentication system and method
CN106330850A (en) Biological characteristic-based security verification method, client and server
CN108683667B (en) Account protection method, device, system and storage medium
CN103927464A (en) Common validation method, and method, device and system for generating two dimensional code
CN105024986A (en) Account login method, device and system
Bernabe et al. ARIES: Evaluation of a reliable and privacy-preserving European identity management framework
CN103888255A (en) Identity authentication method, device and system
CN103929411B (en) Information displaying method, terminal, safety server and system
CN104184705A (en) Verification method, apparatus, server, user data center and system
CN103475484B (en) USB key authentication methods and system
CN105516133A (en) User identity verification method, server and client
CN107113613A (en) Server, mobile terminal, real-name network authentication system and method
CN103024706A (en) Short message based device and short message based method for bidirectional multiple-factor dynamic identity authentication
CN107347049A (en) A kind of account method for authenticating and server
CN103905194A (en) Identity traceability authentication method and system
CN105827571A (en) UAF (Universal Authentication Framework) protocol based multi-modal biological characteristic authentication method and equipment
CN104104657A (en) Information validation method, server, terminal and system
CN113569263A (en) Secure processing method and device for cross-private-domain data and electronic equipment
CN104092653A (en) Data processing method and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20190806

Address after: 518000 Nanshan District science and technology zone, Guangdong, Zhejiang Province, science and technology in the Tencent Building on the 1st floor of the 35 layer

Co-patentee after: Tencent cloud computing (Beijing) limited liability company

Patentee after: Tencent Technology (Shenzhen) Co., Ltd.

Address before: Shenzhen Futian District City, Guangdong province 518000 Zhenxing Road, SEG Science Park 2 East Room 403

Patentee before: Tencent Technology (Shenzhen) Co., Ltd.

TR01 Transfer of patent right