Embodiment
The present invention program is understood better in order to make those skilled in the art person, below in conjunction with the accompanying drawing in the embodiment of the present invention, technical scheme in the embodiment of the present invention is clearly and completely described, obviously, described embodiment is only the embodiment of a part of the present invention, instead of whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art, not making the every other embodiment obtained under creative work prerequisite, should belong to the scope of protection of the invention.
It should be noted that, term " first ", " second " etc. in specification of the present invention and claims and above-mentioned accompanying drawing are for distinguishing similar object, and need not be used for describing specific order or precedence.Should be appreciated that the data used like this can be exchanged in the appropriate case, so as embodiments of the invention described herein can with except here diagram or describe those except order implement.In addition, term " comprises " and " having " and their any distortion, intention is to cover not exclusive comprising, such as, contain those steps or unit that the process of series of steps or unit, method, system, product or equipment is not necessarily limited to clearly list, but can comprise clearly do not list or for intrinsic other step of these processes, method, product or equipment or unit.
Embodiment 1
Before the further details of each embodiment describing the application, the counting system structure that of the principle that can be used for realizing the application is suitable is described with reference to Fig. 1.In the following description, except as otherwise noted, the symbol otherwise with reference to the action performed by one or more computer and operation represents each embodiment describing the application.Thus, be appreciated that processing unit that this kind of action performed sometimes referred to as computer and operation comprise computer is to the manipulation of the signal of telecommunication representing data with structured form.It is safeguarded in this manipulation transforms data or the position in the accumulator system of computer, and this reshuffles or changes the operation of computer in the mode that those skilled in the art understands.The data structure of service data is the physical location of the memory of the particular community that the form with data defines.But although describe the application in above-mentioned context, it does not also mean that restrictive, as understood by those skilled in the art, hereinafter described action and each side of operation also can realize with hardware.
In the configuration that it is the most basic, Fig. 1 is the structural representation of authentication system of the equipment of tatooing based on intelligence according to the embodiment of the present invention one.For purposes of illustration, the architecture of painting is only an example of proper environment, not proposes any limitation to the scope of application of the application or function.This computing system should be interpreted as, to the arbitrary assembly shown in Fig. 1 or its combination, there is any dependence or demand yet.
As shown in Figure 1, can should comprise based on the tatoo authentication system of equipment of intelligence: an intelligence is tatooed equipment 10, one terminal equipment 30.
Intelligence is tatooed equipment 10, to tatoo information for transmitting intelligence.This intelligence is tatooed, and equipment 10 is responsible to connect with the terminal equipment 30 of user and carries out mutual, for terminal equipment 30 provides identity information.
Terminal equipment 30, correspondence is set up with intelligence equipment 10 of tatooing, can be the equipment that user carries out sensitive operation, to tatoo equipment 10 for finding the above-mentioned intelligence of binding with terminal equipment, tatoo after information getting the intelligence that intelligence equipment of tatooing transmits, tatoo acquisition of information to safety verification result according to intelligence, determines whether to perform safety operation corresponding to the safety operation instruction that sends of terminal equipment; Wherein, to be tatooed the corresponding relation between identifying by the tatoo intelligence of equipment of the User Identity and intelligence setting up terminal equipment, come binding terminal equipment and intelligence to tatoo equipment, and when safety verification result be intelligence tatoo information by checking, perform the safety operation that safety operation instruction is corresponding.
In the above embodiments of the present application one, by equipment of tatooing for the intelligence of terminal equipment binding correspondence, make user before registration terminal equipment carries out various operation (especially relating to the safety operation that Modify password, equipment transfer, critical data transaction etc. have sensitiveness), need to use the intelligence with present terminal apparatus bound to tatoo equipment to carry out additional authentication, the legitimacy of the user identity of the current registration terminal equipment of main checking.Because the intelligence equipment of tatooing is that a kind of can being attached to human body skin has its unique intelligence and to tatoo the equipment of information, energy is provided by human body, and have by the communication mode such as bluetooth, wireless network and terminal equipment (such as the electronic equipment etc. of mobile terminal, compunlcation), therefore, the intelligence equipment of tatooing can characterize the exact identity information of active user.Easily notice, bind an intelligence due to terminal equipment to tatoo equipment, make when system searching to be tatooed equipment to the intelligence of binding with terminal equipment, and get the intelligence that intelligence equipment of tatooing transmits and tatoo after information, device end can tatoo acquisition of information to safety verification result according to intelligence, this safety verification result can determine that whether the user of current registration terminal equipment is legal, thus can whether can continue to perform safety operation corresponding to the safety operation instruction that sends of terminal equipment by certainty annuity, now, if when information of tatooing that safety verification result is intelligence passes through checking, system can allow active user to use terminal equipment and safety operation corresponding to triggering secure operational order, wherein, can be tatooed by the User Identity and intelligence the setting up terminal equipment intelligence of equipment of system is tatooed the corresponding relation between identifying, come binding terminal equipment and intelligence to tatoo equipment.
It can thus be appreciated that, the scheme that the embodiment of the present invention one provides can be applied in online game or payment system, the voucher that the intelligence information of tatooing provided due to the intelligence equipment of tatooing can only belong to a user as one is to prove the data of the legitimacy of user, therefore, can by the legitimacy adopting the intelligence equipment of tatooing to carry out the login user of additional authentication terminal equipment.Namely the present invention proposes a kind of scheme verifying the identity of the user logging in present terminal equipment based on the intelligence equipment of tatooing, because proof procedure does not need manually to input the information such as user name, password, decrease the input operation of user, therefore, on the basis that can confirm the reliability of the identity using the user of terminal equipment fast, efficiently, easily, also improve the speed of checking, thus improve the fail safe of user operation and improve the efficiency of authentication.
Preferably, as shown in Figure 2, in the application's said system embodiment, said system can also comprise: a server 50.
Above-mentioned server 50, for obtaining the User Identity of terminal equipment, and intelligence tatoo mark and intelligence of the intelligence of equipment of tatooing is tatooed the digital signature of mark, use identifying algorithm to intelligence tatoo mark digital signature carry out sign test, if sign test success, the intelligence of equipment of then User Identity of terminal equipment and intelligence being tatooed mark of tatooing is bound, and records the tatoo intelligence of equipment of the User Identity of terminal equipment and intelligence and to tatoo the corresponding relation between identifying.
It should be noted that herein, server 50 in such scheme can adopt network communication mode to carry out the User Identity of automatic acquisition terminal equipment, and intelligence tatoo mark and intelligence of the intelligence of equipment of tatooing is tatooed the digital signature of mark, the mode that also can be inputted by user obtains the User Identity of terminal equipment, and intelligence tatoo mark and intelligence of the intelligence of equipment of tatooing is tatooed the digital signature of mark.
It can thus be appreciated that the above embodiments of the present application one can provide a kind of scheme storing the intelligent user's binding information between equipment and terminal equipment of tatooing in the server.User is before whether the operation of the intelligent device authentication terminal equipment of tatooing of use is safe, need the intelligence of equipment that intelligence tatooed tatoo mark ID and terminal equipment User Identity ID at server (such as, sensitive operation server for special disposal relates to Modify password, equipment transfer, critical data transaction etc. have the safety operation of sensitiveness) on bind, the intelligence that the form of tables of data can be adopted to store intelligent equipment of tatooing is tatooed and is identified the User Identity ID of ID and terminal equipment, and the corresponding relation between them.It should be noted that, the sensitive operation system that this sensitive operation server provides can comprise following function herein: the preservation being responsible for the User Identity information of preserving each terminal equipment; Store the binding relationship of User Identity information and intelligent identification information of tatooing; Be responsible for performing user's sensitive operation, authenticated user identity.
Preferably, in order to improve the intelligence got tatoo device transmission intelligence tatoo mark fail safe, the application's such scheme additionally provide a kind of server receive intelligence tatoo equipment send intelligence tatoo mark and intelligence tatoo mark digital signature after, carry out the function of sign test to above-mentioned intelligence mark of tatooing, the intelligence only having sign test to pass through equipment of tatooing just can be bound with corresponding terminal equipment.
Such as, active user needs a known intelligence to tatoo apparatus bound in held terminal equipment, first, user can be sent to sensitive operation system by the network intelligence of equipment mark of tatooing of intelligence being tatooed together with voucher (i.e. digital signature), sensitive operation system is tatooed by identifying algorithm checking intelligence and is identified and Service Ticket, bind in the checking User Identity ID of terminal equipment and intelligence the tatooed intelligence of equipment mark of tatooing, and binding relationship is stored in current sensitive operation system.
Preferably, in order to improve the fail safe of system, the application is except providing the proof procedure of above-mentioned equipment of tatooing to intelligence, can also provide further and authentication is carried out to the current terminal equipment of binding that needs, because terminal equipment establishes correspondence with server (such as sensitive operation server), therefore, short message verification code can be adopted between terminal equipment and server, the modes such as static password carry out the user identity of certification terminal equipment, after authentication success, the intelligence of equipment of the User Identity ID of terminal equipment and intelligence being tatooed mark of tatooing can be performed bind.
The above-mentioned terminal equipment to current needs binding carries out in the process of authentication, not only can provide above-mentioned verification process, can also test to the information format of the user identity be currently received and content, such as, the format content of subscriber identity information only comprises text formatting and/or number format, if detect the form of the information be currently received also comprise spcial character or other, then illustrate that current user identities information is wrong.Before this process can be applied in the authenticating user identification of terminal equipment, also can perform after the authenticating user identification of terminal equipment.
Need to further illustrate herein, in the above embodiments of the present application, directly can complete in terminal equipment and tatoo the function of acquisition of information to safety verification result according to intelligence.In order to reduce the processing load of terminal equipment, and security of system, above-mentionedly can also to tatoo the function of acquisition of information to safety verification result according to intelligence by completing in conjunction with third party device, thus determine whether to perform the function of safety operation corresponding to safety operation instruction that terminal equipment sends.Below just with terminal equipment in conjunction with third party device for example is described in detail, third party device herein can be above-mentioned server 50, shown in Fig. 1 and 2, at least can comprise the following two kinds execution mode:
Mode one: tatoo in the application scenarios of the corresponding relation between identifying being preserved the tatoo intelligence of equipment of the User Identity of terminal equipment and intelligence by server, as shown in Figure 2, system can pass through following execution mode, perform terminal equipment and tatoo acquisition of information to safety verification result according to intelligence, determine whether the function performing safety operation corresponding to safety operation instruction:
First, intelligence tatooed information and safety operation instruction of terminal equipment is sent to server.Preferably, before this step performs, the tatoo intelligence of equipment of terminal equipment collection intelligence is tatooed information, and acquisition mode can comprise: Internet Transmission, device scan, user's input etc.Wherein, safety operation instruction can relate to the sensitive operation that Modify password, equipment transfer, critical data transaction etc. have sensitiveness.
Then, terminal equipment receives the operating data of the safety operation that server returns, wherein, when server detect intelligence information of tatooing at least comprise intelligence tatoo mark, safety verification result is that intelligence tatoos information by checking, and perform safety operation corresponding to safety operation instruction, generating run data.
In above-mentioned steps, that the tatoo intelligence of equipment of the User Identity of terminal equipment and intelligence is tatooed the corresponding relation between identifying due to what store in server, therefore, tatoo after information and safety operation instruction when server receives the intelligence that terminal equipment sends, tatoo mark to determine safety verification result mainly through contrasting tatoo information and the intelligence that stored of the intelligence that receives, now, the intelligence information of tatooing can tatoo with the intelligence of preserving identify identical, as long as also can be comprise intelligence tatoo mark information, just can determine that current intelligence tatoos information by checking.After intelligence information of tatooing passes through checking, server can perform safety operation corresponding to safety operation instruction.
Mode two: tatoo in the application scenarios of the corresponding relation between identifying being preserved the tatoo intelligence of equipment of the User Identity of terminal equipment and intelligence by server, as shown in Figure 2, system can pass through following execution mode, perform terminal equipment and tatoo acquisition of information to safety verification result according to intelligence, determine whether the function performing safety operation corresponding to safety operation instruction:
First, the intelligence information of tatooing is sent to server by terminal equipment.Preferably, before this step performs, the tatoo intelligence of equipment of terminal equipment collection intelligence is tatooed information, and acquisition mode can comprise: Internet Transmission, device scan, user's input etc.Wherein, safety operation instruction can relate to the sensitive operation that Modify password, equipment transfer, critical data transaction etc. have sensitiveness.
Then, terminal equipment obtains the safety verification result that returns of server, wherein, when server detect intelligence information of tatooing at least comprise intelligence tatoo mark, safety verification result is that intelligence tatoos information by checking.In this step, that the tatoo intelligence of equipment of the User Identity of terminal equipment and intelligence is tatooed the corresponding relation between identifying due to what store in server, therefore, tatoo after information and safety operation instruction when server receives the intelligence that terminal equipment sends, tatoo mark to determine safety verification result mainly through contrasting tatoo information and the intelligence that stored of the intelligence that receives, now, intelligence tatoo information with the intelligence of preserving tatoo identify identical, as long as or this intelligence information of tatooing comprise intelligence tatoo mark information, just can determine that current intelligence tatoos information by checking.After intelligence information of tatooing passes through checking, server can perform safety operation corresponding to safety operation instruction.
Secondly, when safety verification result be intelligence tatoo information by checking, safety operation instruction is sent to server by terminal equipment.
Finally, terminal equipment receives the operating data of the safety operation that server returns, and wherein, server performs safety operation corresponding to safety operation instruction, generating run data.
It should be noted that herein, the server provided in aforesaid way one and mode two can be sensitive operation server, sensitive operation service can verify that intelligence is tatooed information, and when being verified, and the information of the sensitive operation submitted to according to the user of terminal equipment carries out sensitive operation.
And provide the difference of scheme to be in aforesaid way one and mode two, in the scheme that mode one provides, intelligence tatooed information and safety operation instruction of terminal equipment is sent to server simultaneously, after server receives above-mentioned information, first the intelligence information of tatooing is verified, when the safety verification result obtained be intelligence tatoo information by checking when, server performs safety operation corresponding to safety operation instruction, generating run data, and operating data is returned to terminal equipment.
And in the scheme that mode two provides, the intelligence information of tatooing collected first sends to server to verify by terminal equipment, after being verified, just safety operation instruction can be sent to server, generate corresponding operating data.Mode two manner of comparison one can reduce the burden in network transmission process, saves Internet resources.
In summary, the said system embodiment one that the application provides, the terminal equipment needing to perform more sensitive operation (consumption in such as game application, transfer accounts, shift the operational orders such as game article) can be applied in, the intelligence information of tatooing provided by using the intelligence equipment of tatooing determines the user identity of the terminal equipment (such as computer, mobile phone etc.) bound with it, and then determine whether the Client-initiated sensitive operation will carrying out terminal equipment, ensure the fail safe of the user operation of terminal equipment.Avoid user to be stolen and to bring the loss of money, privacy after password to user.
Embodiment 2
According to the embodiment of the present invention, additionally provide a kind of embodiment of the method for implementing said system embodiment, it should be noted that, can perform in the computer system of such as one group of computer executable instructions in the step shown in the flow chart of accompanying drawing, and, although show logical order in flow charts, in some cases, can be different from the step shown or described by order execution herein.
Fig. 3 is the schematic flow sheet of auth method of the equipment of tatooing based on intelligence according to the embodiment of the present invention two.The method that the above embodiments of the present application provide can be run on terminal equipment 30.As shown in Figure 3, following implementation step can should be comprised based on the tatoo auth method of equipment of intelligence:
Step S30, the terminal equipment 30 in Fig. 1 can be used to find the intelligence of binding with terminal equipment 30 to tatoo equipment 10, wherein, to be tatooed the corresponding relation between identifying by the tatoo intelligence of equipment of the User Identity and intelligence setting up terminal equipment, come binding terminal equipment and intelligence and to tatoo equipment.
Intelligence in this step is tatooed, and equipment 10 is responsible to connect with the terminal equipment 30 of user and carries out mutual, for terminal equipment 30 provides identity information.Terminal equipment 30 is that equipment 10 of tatooing with intelligence sets up correspondence, can be the equipment that user carries out sensitive operation,
Step S32, can use the terminal equipment 30 in Fig. 1 to gather the above-mentioned intelligence intelligence that equipment 10 transmits of tatooing and to tatoo information.
Step S34, the terminal equipment 30 in Fig. 1 can be used to tatoo acquisition of information to safety verification result according to intelligence, determine whether to perform the safety operation that safety operation instruction that above-mentioned terminal equipment 30 sends is corresponding, wherein, when safety verification result be intelligence tatoo information by checking, perform the safety operation that safety operation instruction is corresponding.
In the above embodiments of the present application two, to tatoo equipment 10 by binding corresponding intelligence for terminal equipment 30, make user before registration terminal equipment carries out various operation (especially relating to the safety operation that Modify password, equipment transfer, critical data transaction etc. have sensitiveness), need to use the intelligence with present terminal apparatus bound to tatoo equipment to carry out additional authentication, the legitimacy of the user identity of the current registration terminal equipment of main checking.Because the intelligence equipment of tatooing is that a kind of can being attached to human body skin has its unique intelligence and to tatoo the equipment of information, energy is provided by human body, and have by the communication mode such as bluetooth, wireless network and terminal equipment (such as the electronic equipment etc. of mobile terminal, compunlcation), therefore, the intelligence equipment of tatooing can characterize the exact identity information of active user.Easily notice, bind an intelligence due to terminal equipment to tatoo equipment, make when system searching to be tatooed equipment to the intelligence of binding with terminal equipment, and get the intelligence that intelligence equipment of tatooing transmits and tatoo after information, device end can tatoo acquisition of information to safety verification result according to intelligence, this safety verification result can determine that whether the user of current registration terminal equipment is legal, thus can whether can continue to perform safety operation corresponding to the safety operation instruction that sends of terminal equipment by certainty annuity, now, if when information of tatooing that safety verification result is intelligence passes through checking, system can allow active user to use terminal equipment and safety operation corresponding to triggering secure operational order, wherein, can be tatooed by the User Identity and intelligence the setting up terminal equipment intelligence of equipment of system is tatooed the corresponding relation between identifying, come binding terminal equipment and intelligence to tatoo equipment.
It can thus be appreciated that, the scheme that the embodiment of the present invention two provides can be applied in online game or payment system, the voucher that the intelligence information of tatooing provided due to the intelligence equipment of tatooing can only belong to a user as one is to prove the data of the legitimacy of user, therefore, can by the legitimacy adopting the intelligence equipment of tatooing to carry out the login user of additional authentication terminal equipment.Namely the present invention proposes a kind of scheme verifying the identity of the user logging in present terminal equipment based on the intelligence equipment of tatooing, because proof procedure does not need manually to input the information such as user name, password, decrease the input operation of user, therefore, on the basis that can confirm the reliability of the identity using the user of terminal equipment fast, efficiently, easily, also improve the speed of checking, thus improve the fail safe of user operation and improve the efficiency of authentication.
Preferably, in the above embodiments of the present application, find the intelligence of binding with terminal equipment at execution step S30 terminal equipment and tatoo before equipment, following implementation step can also be comprised:
Step S101, can obtain the User Identity of terminal equipment 30 by the server 50 in Fig. 2.
Step S103, can be obtained the tatoo intelligence of equipment 10 of intelligence and to tatoo mark by the server 50 in Fig. 2, and intelligence is tatooed the digital signature of mark.
Step S105, can be used by the server 50 in Fig. 2 identifying algorithm to intelligence tatoo mark digital signature carry out sign test, if sign test success, the intelligence of equipment 10 of then User Identity of above-mentioned terminal equipment 30 and above-mentioned intelligence being tatooed mark of tatooing is bound, and records the tatoo intelligence of equipment of the User Identity of terminal equipment and intelligence and to tatoo the corresponding relation between identifying.
Above-mentioned server 50, correspondence set up by tatoo with intelligence respectively equipment 10 and terminal equipment 30, above-described embodiment two step S101 to step S105 can provide a kind of, creates in the server and keeps the scheme of the intelligent user's binding information between equipment and terminal equipment of tatooing.User is before whether the operation of the intelligent device authentication terminal equipment of tatooing of use is safe, need the intelligence of equipment that intelligence tatooed tatoo mark ID and terminal equipment User Identity ID at server (such as, sensitive operation server for special disposal relates to Modify password, equipment transfer, critical data transaction etc. have the safety operation of sensitiveness) on bind, the intelligence that the form of tables of data can be adopted to store intelligent equipment of tatooing is tatooed and is identified the User Identity ID of ID and terminal equipment, and the corresponding relation between them.It should be noted that, the sensitive operation system that this sensitive operation server provides can comprise following function herein: the preservation being responsible for the User Identity information of preserving each terminal equipment; Store the binding relationship of User Identity information and intelligent identification information of tatooing; Be responsible for performing user's sensitive operation, authenticated user identity.
Preferably, in order to improve the intelligence got tatoo device transmission intelligence tatoo mark fail safe, the application's such scheme additionally provide a kind of server receive intelligence tatoo equipment send intelligence tatoo mark and intelligence tatoo mark digital signature after, carry out the function of sign test to above-mentioned intelligence mark of tatooing, the intelligence only having sign test to pass through equipment of tatooing just can be bound with corresponding terminal equipment.
Such as, active user needs a known intelligence to tatoo apparatus bound in held terminal equipment, first, user can be sent to sensitive operation system by the network intelligence of equipment mark of tatooing of intelligence being tatooed together with voucher (i.e. digital signature), sensitive operation system is tatooed by identifying algorithm checking intelligence and is identified and Service Ticket, bind in the checking User Identity ID of terminal equipment and intelligence the tatooed intelligence of equipment mark of tatooing, and binding relationship is stored in current sensitive operation system.
Preferably, in order to improve the fail safe of system, the application is except providing the proof procedure of above-mentioned equipment of tatooing to intelligence, can also provide further and authentication is carried out to the current terminal equipment of binding that needs, because terminal equipment establishes correspondence with server (such as sensitive operation server), therefore, short message verification code can be adopted between terminal equipment and server, the modes such as static password carry out the user identity of certification terminal equipment, after authentication success, the intelligence of equipment of the User Identity ID of terminal equipment and intelligence being tatooed mark of tatooing can be performed bind.
The above-mentioned terminal equipment to current needs binding carries out in the process of authentication, not only can provide above-mentioned verification process, can also test to the information format of the user identity be currently received and content, such as, the format content of subscriber identity information only comprises text formatting and/or number format, if detect the form of the information be currently received also comprise spcial character or other, then illustrate that current user identities information is wrong.Before this process can be applied in the authenticating user identification of terminal equipment, also can perform after the authenticating user identification of terminal equipment.
Need to further illustrate herein, in the above embodiments of the present application, directly can complete in terminal equipment and tatoo the function of acquisition of information to safety verification result according to intelligence.In order to reduce the processing load of terminal equipment, and security of system, above-mentionedly can also to tatoo the function of acquisition of information to safety verification result according to intelligence by completing in conjunction with third party device, thus determine whether to perform the function of safety operation corresponding to safety operation instruction that terminal equipment sends.Third party device herein can be a server, and the tatoo intelligence of equipment of User Identity and intelligence for preserving terminal equipment is tatooed the corresponding relation between identifying.Below just with terminal equipment in conjunction with third party device for example is described in detail, at least can comprise the following two kinds execution mode:
In the first optional embodiment, tatoo in the application scenarios of the corresponding relation between identifying being preserved the tatoo intelligence of equipment of the User Identity of terminal equipment and intelligence by server, as shown in Figure 4, above-mentioned steps S34, terminal equipment tatoos acquisition of information to safety verification result according to intelligence, determine whether the step performing safety operation corresponding to the safety operation instruction that sends of terminal equipment, following implementation step can be comprised:
Step S401a, intelligence tatooed information and safety operation instruction of terminal equipment is sent to server.Preferably, before this step performs, terminal equipment can gather the tatoo intelligence of equipment of intelligence and to tatoo information, and acquisition mode can comprise: Internet Transmission, device scan, user's input etc.Wherein, safety operation instruction can relate to the sensitive operation that Modify password, equipment transfer, critical data transaction etc. have sensitiveness.
Step S403a, terminal equipment receives the operating data of the safety operation that server returns, wherein, when server detect intelligence information of tatooing at least comprise intelligence tatoo mark, safety verification result is that intelligence tatoos information by checking, and perform safety operation corresponding to safety operation instruction, generating run data.
In above-mentioned steps S403a, that the tatoo intelligence of equipment of the User Identity of terminal equipment and intelligence is tatooed the corresponding relation between identifying due to what store in server, therefore, tatoo after information and safety operation instruction when server receives the intelligence that terminal equipment sends, tatoo mark to determine safety verification result mainly through contrasting tatoo information and the intelligence that stored of the intelligence that receives, now, the intelligence information of tatooing can tatoo with the intelligence of preserving identify identical, as long as also can be comprise intelligence tatoo mark information, just can determine that current intelligence tatoos information by checking.After intelligence information of tatooing passes through checking, server can perform safety operation corresponding to safety operation instruction.
In the second embodiment, as shown in Figure 5, tatoo in the application scenarios of the corresponding relation between identifying being preserved the tatoo intelligence of equipment of the User Identity of terminal equipment and intelligence by server, above-mentioned steps S34, terminal equipment tatoos acquisition of information to safety verification result according to intelligence, determines whether that the step performing safety operation corresponding to the safety operation instruction that sends of terminal equipment comprises:
Step S401b, the intelligence information of tatooing is sent to server by terminal equipment.Preferably, before this step S401b performs, the tatoo intelligence of equipment of terminal equipment collection intelligence is tatooed information, and acquisition mode can comprise: Internet Transmission, device scan, user's input etc.Wherein, safety operation instruction can relate to the sensitive operation that Modify password, equipment transfer, critical data transaction etc. have sensitiveness.
Step S403b, terminal equipment obtains the safety verification result that returns of server, wherein, when server detect intelligence information of tatooing at least comprise intelligence tatoo mark, safety verification result is that intelligence tatoos information by checking.
In this step S403b, that the tatoo intelligence of equipment of the User Identity of terminal equipment and intelligence is tatooed the corresponding relation between identifying due to what store in server, therefore, tatoo after information and safety operation instruction when server receives the intelligence that terminal equipment sends, tatoo mark to determine safety verification result mainly through contrasting tatoo information and the intelligence that stored of the intelligence that receives, now, intelligence tatoo information with the intelligence of preserving tatoo identify identical, as long as or this intelligence information of tatooing comprise intelligence tatoo mark information, just can determine that current intelligence tatoos information by checking.After intelligence information of tatooing passes through checking, server can perform safety operation corresponding to safety operation instruction.
Step S405b, when safety verification result be intelligence tatoo information by checking, safety operation instruction is sent to server by terminal equipment.
Step S407b, terminal equipment receives the operating data of the safety operation that server returns, and wherein, server performs safety operation corresponding to safety operation instruction, generating run data.
It should be noted that herein, the server provided in above-mentioned two kinds of execution modes can be sensitive operation server, sensitive operation service can verify that intelligence is tatooed information, and when being verified, and the information of the sensitive operation submitted to according to the user of terminal equipment carries out sensitive operation.
And the difference of above-mentioned two kinds of execution modes is, in the scheme that the first execution mode provides, intelligence tatooed information and safety operation instruction of terminal equipment is sent to server simultaneously, after server receives above-mentioned information, first the intelligence information of tatooing is verified, when the safety verification result obtained be intelligence tatoo information by checking when, server performs safety operation corresponding to safety operation instruction, generating run data, and operating data is returned to terminal equipment.
And in the scheme provided at the second execution mode, the intelligence information of tatooing collected first sends to server to verify by terminal equipment, just safety operation instruction can be sent to server after being verified, generate corresponding operating data.The second execution mode compares the first execution mode can reduce burden in network transmission process, saves Internet resources.
In summary, the said system embodiment two that the application provides, the terminal equipment needing to perform more sensitive operation (consumption in such as game application, transfer accounts, shift the operational orders such as game article) can be applied in, the intelligence information of tatooing provided by using the intelligence equipment of tatooing determines the user identity of the terminal equipment (such as computer, mobile phone etc.) bound with it, and then determine whether the Client-initiated sensitive operation will carrying out terminal equipment, ensure the fail safe of the user operation of terminal equipment.Avoid user to be stolen and to bring the loss of money, privacy after password to user.
It should be noted that, for aforesaid each embodiment of the method, in order to simple description, therefore it is all expressed as a series of combination of actions, but those skilled in the art should know, the present invention is not by the restriction of described sequence of movement, because according to the present invention, some step can adopt other orders or carry out simultaneously.Secondly, those skilled in the art also should know, the embodiment described in specification all belongs to preferred embodiment, and involved action and module might not be that the present invention is necessary.
Through the above description of the embodiments, those skilled in the art can be well understood to the mode that can add required general hardware platform by software according to the method for above-described embodiment and realize, hardware can certainly be passed through, but in a lot of situation, the former is better execution mode.Based on such understanding, technical scheme of the present invention can embody with the form of software product the part that prior art contributes in essence in other words, this computer software product is stored in a storage medium (as ROM/RAM, magnetic disc, CD), comprising some instructions in order to make a station terminal equipment (can be mobile phone, computer, server, or the network equipment etc.) perform method described in each embodiment of the present invention.
Embodiment 3
In the configuration that it is the most basic, Fig. 6 is the structural representation of authentication means of the equipment of tatooing based on intelligence according to the embodiment of the present invention three.For purposes of illustration, the apparatus body architecture of painting is only an example of proper environment, not proposes any limitation to the scope of application of the application or function.This computing system should be interpreted as, to the arbitrary assembly shown in Fig. 6 or its combination, there is any dependence or demand yet.
The device that the above embodiments of the present application provide can run on terminal equipment 30 as shown in Figure 1, and as shown in Figure 6, this device can comprise: search module 61, acquisition module 63, processing module 65.
Wherein, search module 61, to tatoo equipment for can be found the intelligence of binding with terminal equipment by the terminal equipment 30 in Fig. 1, wherein, to be tatooed the corresponding relation between identifying by the tatoo intelligence of equipment of the User Identity and intelligence setting up terminal equipment, come binding terminal equipment and intelligence and to tatoo equipment; Acquisition module 63, the intelligence transmitted for can be obtained intelligence equipment of tatooing by the terminal equipment 30 in Fig. 1 is tatooed information; Processing module 65, for acquisition of information can be tatooed to safety verification result by the terminal equipment 30 in Fig. 1 according to intelligence, determine whether to perform safety operation corresponding to the safety operation instruction that sends of terminal equipment, wherein, when safety verification result be intelligence tatoo information by checking, perform the safety operation that safety operation instruction is corresponding.
Said apparatus embodiment in tatoo equipment 10 of intelligence be responsible for connecting with the terminal equipment 30 of user and carrying out mutual, for terminal equipment 30 provides identity information.Terminal equipment 30 is that equipment 10 of tatooing with intelligence sets up correspondence, can be the equipment that user carries out sensitive operation,
In the above embodiments of the present application three, to tatoo equipment 10 by binding corresponding intelligence for terminal equipment 30, make user before registration terminal equipment carries out various operation (especially relating to the safety operation that Modify password, equipment transfer, critical data transaction etc. have sensitiveness), need to use the intelligence with present terminal apparatus bound to tatoo equipment to carry out additional authentication, the legitimacy of the user identity of the current registration terminal equipment of main checking.Because the intelligence equipment of tatooing is that a kind of can being attached to human body skin has its unique intelligence and to tatoo the equipment of information, energy is provided by human body, and have by the communication mode such as bluetooth, wireless network and terminal equipment (such as the electronic equipment etc. of mobile terminal, compunlcation), therefore, the intelligence equipment of tatooing can characterize the exact identity information of active user.Easily notice, bind an intelligence due to terminal equipment to tatoo equipment, make when system searching to be tatooed equipment to the intelligence of binding with terminal equipment, and get the intelligence that intelligence equipment of tatooing transmits and tatoo after information, device end can tatoo acquisition of information to safety verification result according to intelligence, this safety verification result can determine that whether the user of current registration terminal equipment is legal, thus can whether can continue to perform safety operation corresponding to the safety operation instruction that sends of terminal equipment by certainty annuity, now, if when information of tatooing that safety verification result is intelligence passes through checking, system can allow active user to use terminal equipment and safety operation corresponding to triggering secure operational order, wherein, can be tatooed by the User Identity and intelligence the setting up terminal equipment intelligence of equipment of system is tatooed the corresponding relation between identifying, come binding terminal equipment and intelligence to tatoo equipment.
It can thus be appreciated that, the scheme that the embodiment of the present invention three provides can be applied in online game or payment system, the voucher that the intelligence information of tatooing provided due to the intelligence equipment of tatooing can only belong to a user as one is to prove the data of the legitimacy of user, therefore, can by the legitimacy adopting the intelligence equipment of tatooing to carry out the login user of additional authentication terminal equipment.Namely the present invention proposes a kind of method verifying the identity of the user logging in present terminal equipment based on the intelligence equipment of tatooing, because proof procedure does not need manually to input the information such as user name, password, decrease the input operation of user, therefore, on the basis that can confirm the reliability of the identity using the user of terminal equipment fast, efficiently, easily, also improve the speed of checking, thus improve the fail safe of user operation and improve the efficiency of authentication.
As from the foregoing, above-mentioned search module 61, acquisition module 63, processing module 65 correspond to step S30 in embodiment two to step S34, the example that three modules and corresponding step realize is identical with application scenarios, but is not limited to the content disclosed in above-described embodiment two.It should be noted that, above-mentioned module may operate in the terminal equipment 30 that embodiment one provides as the part of device, can pass through software simulating, also can pass through hardware implementing.
Preferably, in the above embodiments of the present application, perform terminal equipment in above-mentioned search module 61 to find the intelligence of binding with terminal equipment and tatoo before equipment, equipment 10 of can also being tatooed by the intelligence in Fig. 1 is realized: the first acquisition module, for the digital signature of the User Identity and User Identity that obtain terminal equipment; Second acquisition module, to tatoo mark for obtaining the tatoo intelligence of equipment of intelligence; Sign test module, for using identifying algorithm, sign test is carried out to the digital signature of User Identity, if sign test success, the intelligence of equipment of then User Identity of terminal equipment and intelligence being tatooed mark of tatooing is bound, and records the tatoo intelligence of equipment of the User Identity of terminal equipment and intelligence and to tatoo the corresponding relation between identifying.
It should be noted that herein, above-mentioned first acquisition module, the second acquisition module, sign test module correspond to step S101 in embodiment two to step S105, the example that three modules and corresponding step realize is identical with application scenarios, but is not limited to the content disclosed in above-described embodiment two.It should be noted that, the intelligence that above-mentioned module may operate in embodiment one provide as the part of device is tatooed in equipment 10, can pass through software simulating, also can pass through hardware implementing.
In a kind of optional embodiment that the application provides, the tatoo intelligence of equipment of the User Identity of terminal equipment and intelligence can be preserved by server to tatoo the corresponding relation between identifying, preferably, as shown in Figure 7, above-mentioned processing module 65 can comprise: the first sending module 701 and the first receiver module 702.
First sending module 701, for intelligence being tatooed, information and safety operation instruction are sent to server.
First receiver module 702, for receiving the operating data of the safety operation that server returns, wherein, when server detect intelligence information of tatooing at least comprise intelligence tatoo mark, safety verification result is that intelligence tatoos information by checking, and perform safety operation corresponding to safety operation instruction, generating run data.
It should be noted that herein, above-mentioned first sending module 701 and the first receiver module 702 correspond to step S401a in embodiment two to step S403a, the example that two modules and corresponding step realize is identical with application scenarios, but is not limited to the content disclosed in above-described embodiment two.It should be noted that, above-mentioned module may operate in the terminal equipment 30 that embodiment one provides as the part of device, can pass through software simulating, also can pass through hardware implementing.
In the another kind of optional embodiment that the application provides, the tatoo intelligence of equipment of the User Identity of terminal equipment and intelligence can be preserved by server to tatoo the corresponding relation between identifying, preferably, as shown in Figure 8, above-mentioned processing module 65 can comprise: the second sending module 801, sub-acquisition module 803, the 3rd sending module 805 and the second receiver module 807.
Second sending module 801, for being sent to server by the intelligence information of tatooing.
Sub-acquisition module 803, for obtaining the safety verification result that server returns, wherein, when server detect intelligence information of tatooing at least comprise intelligence tatoo mark, safety verification result be intelligence tatoo information by checking.
3rd sending module 805, in safety verification result be intelligence tatoo information by checking, safety operation instruction is sent to server.
Second receiver module 807, for receiving the operating data of the safety operation that server returns, wherein, server performs safety operation corresponding to safety operation instruction, generating run data.
It should be noted that herein, above-mentioned second sending module 801, sub-acquisition module 803, the 3rd sending module 805 and the second receiver module 807 correspond to step S401b in embodiment two to step S407b, the example that four modules and corresponding step realize is identical with application scenarios, but is not limited to the content disclosed in above-described embodiment two.It should be noted that, above-mentioned module may operate in the terminal equipment 30 that embodiment one provides as the part of device, can pass through software simulating, also can pass through hardware implementing.
Embodiment 4
The application can also provide the another kind of system embodiment shown in Fig. 9, and Fig. 9 is the structural representation of authentication system of the equipment of tatooing based on intelligence according to the embodiment of the present invention four.For purposes of illustration, the architecture of painting is only an example of proper environment, not proposes any limitation to the scope of application of the application or function.This computing system should be interpreted as, to the arbitrary assembly shown in Fig. 9 or its combination, there is any dependence or demand yet.
As shown in Figure 9, what the embodiment of the present application four provided can comprise based on the tatoo authentication system of equipment of intelligence: intelligence is tatooed equipment 90, terminal equipment 92 and server 94.
Wherein, intelligence is tatooed equipment 90, to tatoo information for generating intelligence; Terminal equipment 92, sets up correspondence with intelligence equipment 90 of tatooing, and for tatooing after equipment finding the intelligence of binding with terminal equipment, obtaining intelligence that intelligence equipment of tatooing transmits and to tatoo information; Server 94, correspondence is set up with terminal equipment 92, the intelligence transmitted for receiving terminal equipment is tatooed information and safety operation instruction, is verifying the intelligence information of tatooing, after generating safety verification result, according to safety verification result, determine whether to perform safety operation corresponding to the safety operation instruction that sends of terminal equipment, wherein, when safety verification result be intelligence tatoo information by checking, perform the safety operation that safety operation instruction is corresponding, generating run data.
In the above embodiments of the present application four, by equipment of tatooing for the intelligence of terminal equipment binding correspondence, make user before registration terminal equipment carries out various operation (especially relating to the safety operation that Modify password, equipment transfer, critical data transaction etc. have sensitiveness), need to use the intelligence with present terminal apparatus bound to tatoo equipment to carry out additional authentication, the legitimacy of the user identity of the current registration terminal equipment of main checking.Because the intelligence equipment of tatooing is that a kind of can being attached to human body skin has its unique intelligence and to tatoo the equipment of information, energy is provided by human body, and have by the communication mode such as bluetooth, wireless network and terminal equipment (such as the electronic equipment etc. of mobile terminal, compunlcation), therefore, the intelligence equipment of tatooing can characterize the exact identity information of active user.Easily notice, bind an intelligence due to terminal equipment to tatoo equipment, make when system searching to be tatooed equipment to the intelligence of binding with terminal equipment, and the intelligence of the intelligent equipment of tatooing of terminal equipment collection is tatooed after information, can receive by server the intelligence that terminal equipment transmits to tatoo information and safety operation instruction, and the intelligence information of tatooing is verified, generate safety verification result, because this safety verification result can determine that whether the user of current registration terminal equipment is legal, thus server can according to safety verification result, carry out certainty annuity whether can continue to perform safety operation corresponding to the safety operation instruction that sends of terminal equipment, now, if when information of tatooing that safety verification result is intelligence passes through checking, system can allow active user to use terminal equipment and safety operation corresponding to triggering secure operational order, wherein, can be tatooed by the User Identity and intelligence the setting up terminal equipment intelligence of equipment of system is tatooed the corresponding relation between identifying, come binding terminal equipment and intelligence to tatoo equipment.
It can thus be appreciated that, the scheme that the embodiment of the present invention four provides can be applied in online game or payment system, the voucher that the intelligence information of tatooing provided due to the intelligence equipment of tatooing can only belong to a user as one is to prove the data of the legitimacy of user, therefore, can by the legitimacy adopting the intelligence equipment of tatooing to carry out the login user of additional authentication terminal equipment.Namely the present invention proposes a kind of scheme verifying the identity of the user logging in present terminal equipment based on the intelligence equipment of tatooing, because proof procedure does not need manually to input the information such as user name, password, decrease the input operation of user, therefore, on the basis that can confirm the reliability of the identity using the user of terminal equipment fast, efficiently, easily, also improve the speed of checking, thus improve the fail safe of user operation and improve the efficiency of authentication.
Preferably, as shown in Figure 10, the server 94 in the above embodiments of the present application four can comprise: receiver module 1001, processor 1003 and memory 1005.
Receiving system 1001, for obtaining the User Identity of terminal equipment, and intelligence tatoo mark and intelligence of the intelligence of equipment of tatooing is tatooed the digital signature of mark.
Processor 1003, establish a connection with receiving system, for use identifying algorithm to intelligence tatoo mark digital signature carry out sign test, if sign test success, the intelligence of equipment of then User Identity of terminal equipment and intelligence being tatooed mark of tatooing is bound, and records the tatoo intelligence of equipment of the User Identity of terminal equipment and intelligence and to tatoo the corresponding relation between identifying.
Memory 1005, establishes a connection with processor, and the tatoo intelligence of equipment of User Identity and intelligence for preserving terminal equipment is tatooed the corresponding relation between identifying.
It can thus be appreciated that the above embodiments of the present application four can provide a kind of, store the scheme of the intelligent user's binding information between equipment and terminal equipment of tatooing in the server.User is before whether the operation of the intelligent device authentication terminal equipment of tatooing of use is safe, need the intelligence of equipment that intelligence tatooed tatoo mark ID and terminal equipment User Identity ID at server (such as, sensitive operation server for special disposal relates to Modify password, equipment transfer, critical data transaction etc. have the safety operation of sensitiveness) on bind, the intelligence that the form of tables of data can be adopted to store intelligent equipment of tatooing is tatooed and is identified the User Identity ID of ID and terminal equipment, and the corresponding relation between them.It should be noted that, the sensitive operation system that this sensitive operation server provides can comprise following function herein: the preservation being responsible for the User Identity information of preserving each terminal equipment; Store the binding relationship of User Identity information and intelligent identification information of tatooing; Be responsible for performing user's sensitive operation, authenticated user identity.
Preferably, in order to improve the intelligence got tatoo device transmission intelligence tatoo mark fail safe, the application's such scheme additionally provide a kind of server receive intelligence tatoo equipment send intelligence tatoo mark and intelligence tatoo mark digital signature after, carry out the function of sign test to above-mentioned intelligence mark of tatooing, the intelligence only having sign test to pass through equipment of tatooing just can be bound with corresponding terminal equipment.
Such as, active user needs a known intelligence to tatoo apparatus bound in held terminal equipment, first, user can be sent to sensitive operation system by the network intelligence of equipment mark of tatooing of intelligence being tatooed together with voucher (i.e. digital signature), sensitive operation system is tatooed by identifying algorithm checking intelligence and is identified and Service Ticket, bind in the checking User Identity ID of terminal equipment and intelligence the tatooed intelligence of equipment mark of tatooing, and binding relationship is stored in current sensitive operation system.
Need to further illustrate herein, relate to each preferred embodiment in the above embodiments of the present application four identical with the preferred version that embodiment one provides and application scenarios implementation process, but be not limited to the scheme that embodiment one provides.
Embodiment 5
According to the embodiment of the present invention, additionally provide the embodiment of auth method of another equipment of tatooing based on intelligence, it should be noted that, can perform in the computer system of such as one group of computer executable instructions in the step shown in the flow chart of accompanying drawing, and, although show logical order in flow charts, in some cases, can be different from the step shown or described by order execution herein.
Figure 11 is the schematic flow sheet of auth method of the equipment of tatooing based on intelligence according to the embodiment of the present invention five.
The method that the above embodiments of the present application five provide can be run on server 94.As shown in figure 11, what the embodiment of the present application five provided can comprise following implementation step based on the tatoo auth method of equipment of intelligence:
Step S1101, the server 94 that can be provided by Figure 10 is received the intelligence that terminal equipment transmits and to tatoo information and safety operation instruction.
Step S1103, the server 94 that can be provided by Figure 10 is verified the intelligence information of tatooing, and generates safety verification result;
Step S1105, the server 94 that can be provided by Figure 10 is according to safety verification result, determine whether to perform safety operation corresponding to the safety operation instruction that sends of terminal equipment, wherein, when safety verification result be intelligence tatoo information by checking, perform the safety operation that safety operation instruction is corresponding, generating run data.
The step S1101 provided in the above embodiments of the present application five to step S1105 can realize, by equipment of tatooing for the intelligence of terminal equipment binding correspondence, make user before registration terminal equipment carries out various operation (especially relating to the safety operation that Modify password, equipment transfer, critical data transaction etc. have sensitiveness), need to use the intelligence with present terminal apparatus bound to tatoo equipment to carry out additional authentication, the legitimacy of the user identity of the current registration terminal equipment of main checking.Because the intelligence equipment of tatooing is that a kind of can being attached to human body skin has its unique intelligence and to tatoo the equipment of information, energy is provided by human body, and have by the communication mode such as bluetooth, wireless network and terminal equipment (such as the electronic equipment etc. of mobile terminal, compunlcation), therefore, the intelligence equipment of tatooing can characterize the exact identity information of active user.Easily notice, bind an intelligence due to terminal equipment to tatoo equipment, make when system searching to be tatooed equipment to the intelligence of binding with terminal equipment, and the intelligence of the intelligent equipment of tatooing of terminal equipment collection is tatooed after information, can receive by server the intelligence that terminal equipment transmits to tatoo information and safety operation instruction, and the intelligence information of tatooing is verified, generate safety verification result, because this safety verification result can determine that whether the user of current registration terminal equipment is legal, thus server can according to safety verification result, carry out certainty annuity whether can continue to perform safety operation corresponding to the safety operation instruction that sends of terminal equipment, now, if when information of tatooing that safety verification result is intelligence passes through checking, system can allow active user to use terminal equipment and safety operation corresponding to triggering secure operational order, wherein, can be tatooed by the User Identity and intelligence the setting up terminal equipment intelligence of equipment of system is tatooed the corresponding relation between identifying, come binding terminal equipment and intelligence to tatoo equipment.
It can thus be appreciated that, the scheme that the embodiment of the present invention five provides can be applied in online game or payment system, the voucher that the intelligence information of tatooing provided due to the intelligence equipment of tatooing can only belong to a user as one is to prove the data of the legitimacy of user, therefore, can by the legitimacy adopting the intelligence equipment of tatooing to carry out the login user of additional authentication terminal equipment.Namely the present invention proposes a kind of scheme verifying the identity of the user logging in present terminal equipment based on the intelligence equipment of tatooing, because proof procedure does not need manually to input the information such as user name, password, decrease the input operation of user, therefore, on the basis that can confirm the reliability of the identity using the user of terminal equipment fast, efficiently, easily, also improve the speed of checking, thus improve the fail safe of user operation and improve the efficiency of authentication.
It should be noted that herein, relate to each preferred embodiment in the above embodiments of the present application five identical with the scheme that embodiment two provides and application scenarios implementation process, but be not limited to the scheme that embodiment two provides.
Embodiment 6
Figure 12 is the structural representation of authentication means of the equipment of tatooing based on intelligence according to the embodiment of the present invention six.The device that the above embodiments of the present application provide can run on server 94 as shown in Figure 10.
As shown in figure 12, what the application provided can comprise based on the tatoo authentication means of equipment of intelligence: receiver module 1201, authentication module 1203 and determination module 1205.
Wherein, receiver module 1201, the intelligence transmitted for receiving terminal equipment is tatooed information and safety operation instruction; Authentication module 1203, for verifying the intelligence information of tatooing, generates safety verification result; Determination module 1205, for according to safety verification result, determine whether to perform safety operation corresponding to the safety operation instruction that sends of terminal equipment, wherein, when safety verification result be intelligence tatoo information by checking, perform the safety operation that safety operation instruction is corresponding, generating run data.
In the above embodiments of the present application stream, by equipment of tatooing for the intelligence of terminal equipment binding correspondence, make user before registration terminal equipment carries out various operation (especially relating to the safety operation that Modify password, equipment transfer, critical data transaction etc. have sensitiveness), need to use the intelligence with present terminal apparatus bound to tatoo equipment to carry out additional authentication, the legitimacy of the user identity of the current registration terminal equipment of main checking.Because the intelligence equipment of tatooing is that a kind of can being attached to human body skin has its unique intelligence and to tatoo the equipment of information, energy is provided by human body, and have by the communication mode such as bluetooth, wireless network and terminal equipment (such as the electronic equipment etc. of mobile terminal, compunlcation), therefore, the intelligence equipment of tatooing can characterize the exact identity information of active user.Easily notice, bind an intelligence due to terminal equipment to tatoo equipment, make when system searching to be tatooed equipment to the intelligence of binding with terminal equipment, and the intelligence of the intelligent equipment of tatooing of terminal equipment collection is tatooed after information, can receive by server the intelligence that terminal equipment transmits to tatoo information and safety operation instruction, and the intelligence information of tatooing is verified, generate safety verification result, because this safety verification result can determine that whether the user of current registration terminal equipment is legal, thus server can according to safety verification result, carry out certainty annuity whether can continue to perform safety operation corresponding to the safety operation instruction that sends of terminal equipment, now, if when information of tatooing that safety verification result is intelligence passes through checking, system can allow active user to use terminal equipment and safety operation corresponding to triggering secure operational order, wherein, can be tatooed by the User Identity and intelligence the setting up terminal equipment intelligence of equipment of system is tatooed the corresponding relation between identifying, come binding terminal equipment and intelligence to tatoo equipment.
It can thus be appreciated that, the scheme that the embodiment of the present invention six provides can be applied in online game or payment system, the voucher that the intelligence information of tatooing provided due to the intelligence equipment of tatooing can only belong to a user as one is to prove the data of the legitimacy of user, therefore, can by the legitimacy adopting the intelligence equipment of tatooing to carry out the login user of additional authentication terminal equipment.Namely the present invention proposes a kind of scheme verifying the identity of the user logging in present terminal equipment based on the intelligence equipment of tatooing, because proof procedure does not need manually to input the information such as user name, password, decrease the input operation of user, therefore, on the basis that can confirm the reliability of the identity using the user of terminal equipment fast, efficiently, easily, also improve the speed of checking, thus improve the fail safe of user operation and improve the efficiency of authentication.
Need to further illustrate herein, relate to each preferred embodiment in the above embodiments of the present application six identical with the preferred version that embodiment three provides and application scenarios implementation process, but be not limited to the scheme that embodiment three provides.
The invention described above embodiment sequence number, just to describing, does not represent the quality of embodiment.
In the above embodiment of the present invention, the description of each embodiment is all emphasized particularly on different fields, in certain embodiment, there is no the part described in detail, can see the associated description of other embodiments.
In several embodiments that the application provides, should be understood that, disclosed client, the mode by other realizes.Wherein, device embodiment described above is only schematic, the division of such as unit, be only a kind of logic function to divide, actual can have other dividing mode when realizing, such as multiple unit or assembly can in conjunction with or another system can be integrated into, or some features can be ignored, or do not perform.Another point, shown or discussed coupling each other or direct-coupling or communication connection can be by some interfaces, and the indirect coupling of unit or module or communication connection can be electrical or other form.
The described unit illustrated as separating component or can may not be and physically separates, and the parts as unit display can be or may not be physical location, namely can be positioned at a place, or also can be distributed in multiple network element.Some or all of unit wherein can be selected according to the actual needs to realize the object of the present embodiment scheme.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, also can be that the independent physics of unit exists, also can two or more unit in a unit integrated.Above-mentioned integrated unit both can adopt the form of hardware to realize, and the form of SFU software functional unit also can be adopted to realize.
If described integrated unit using the form of SFU software functional unit realize and as independently production marketing or use time, can be stored in a computer read/write memory medium.Based on such understanding, the part that technical scheme of the present invention contributes to prior art in essence in other words or all or part of of this technical scheme can embody with the form of software product, this computer software product is stored in a storage medium, comprises all or part of step of some instructions in order to make a computer equipment (can be personal computer, server or the network equipment etc.) perform method described in each embodiment of the present invention.And aforesaid storage medium comprises: USB flash disk, read-only memory (ROM, Read-OnlyMemory), random access memory (RAM, Random Access Memory), portable hard drive, magnetic disc or CD etc. various can be program code stored medium.
The above is only the preferred embodiment of the present invention; it should be pointed out that for those skilled in the art, under the premise without departing from the principles of the invention; can also make some improvements and modifications, these improvements and modifications also should be considered as protection scope of the present invention.