CN104935548B - Auth method, apparatus and system based on intelligent equipment of tatooing - Google Patents

Auth method, apparatus and system based on intelligent equipment of tatooing Download PDF

Info

Publication number
CN104935548B
CN104935548B CN201410099222.3A CN201410099222A CN104935548B CN 104935548 B CN104935548 B CN 104935548B CN 201410099222 A CN201410099222 A CN 201410099222A CN 104935548 B CN104935548 B CN 104935548B
Authority
CN
China
Prior art keywords
intelligence
equipment
terminal device
information
tatoo
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410099222.3A
Other languages
Chinese (zh)
Other versions
CN104935548A (en
Inventor
王小叶
郭计伟
秦雷
林陆一
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Tencent Cloud Computing Beijing Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201410099222.3A priority Critical patent/CN104935548B/en
Publication of CN104935548A publication Critical patent/CN104935548A/en
Application granted granted Critical
Publication of CN104935548B publication Critical patent/CN104935548B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina

Abstract

The invention discloses a kind of auth method, apparatus and systems based on intelligent equipment of tatooing.Wherein, it tatoos equipment this method comprises: terminal device is found with the intelligence of terminal device binding, wherein, it is tatooed the corresponding relationship that the intelligence of equipment tatoos between mark by the User Identity and intelligence of establishing terminal device, is tatooed equipment to bind terminal device and intelligence;The tatoo intelligence of equipment transmission of terminal device acquisition intelligence is tatooed information;Terminal device tatoos acquisition of information to safety verification result according to intelligence, determine whether that executing the safety operation that terminal device issues instructs corresponding safety operation, wherein, it in the case where safety verification result is that intelligence tatoos information by verifying, executes safety operation and instructs corresponding safety operation.The identity validation technology that the present invention solves the relevant technologies offer is easy to be cracked, and not can guarantee the reliability of user identity, leads to the technical problem that security of system is low.

Description

Auth method, apparatus and system based on intelligent equipment of tatooing
Technical field
The present invention relates to computer field, in particular to it is a kind of based on intelligence tatoo equipment auth method, Apparatus and system.
Background technique
With various terminal applications, the especially application in the systems such as instant messaging, social platform, online game Function is more and more abundant, the various operations carried out in systems, and the safety of the interaction of key message is carried out especially with respect to user Problem is increasingly prominent, for example, system user account is stolen when logging in, the behavior of virtual assets is intercepted, Modify password behavior The safety problems such as stolen are without restraint rampant, and the various networked assets of user are by increasingly severeer threat.
The prior art can be solved the above problems using identity validation technology, and identity validation technology mainly includes two rings Section: identity registration and authentication two parts.Identity registration refers to the identity documents for negotiating " I is possessed " with Verification System, Such as static password, dynamic password;Authentication refers to that Verification System is sentenced by " being possessed " voucher that verifying user submits The authenticity of disconnected user.Wherein, existing authentication mainly may include static password generally based on password authentication, move Two kinds of state password, but traditional static password is easy to be intercepted by keyboard wooden horse in safety, exists simultaneously the peace of Brute Force Full blast danger.
From the foregoing, it will be observed that the specific implementation process of above-mentioned identity validation technology, can be through setting user login code Mode confirms the identity of user, to guarantee that user executes the safety problem of various operations in systems, but setting is stepped on The method of record password is easy to crack by modes such as violence trial, keyboard interception, screenshotss, thus only by verifying password Carry out the legitimacy that authentication is not enough to prove active user.
The identity validation technology provided for above-mentioned the relevant technologies is easy to be cracked, and not can guarantee the reliable of user identity Property, lead to the problem that security of system is low, currently no effective solution has been proposed.
Summary of the invention
The embodiment of the invention provides a kind of auth method, apparatus and systems based on intelligent equipment of tatooing, so that The identity validation technology that the relevant technologies provide is solved less to be easy to be cracked, and not can guarantee the reliability of user identity, is led to system The low technical problem of safety.
According to an aspect of an embodiment of the present invention, a kind of auth method based on intelligent equipment of tatooing is provided, It tatoos equipment this method comprises: terminal device is found with the intelligence of terminal device binding, wherein by establishing terminal device User Identity and intelligence are tatooed the corresponding relationship that the intelligence of equipment is tatooed between mark, to bind terminal device and intelligent line Body equipment;The tatoo intelligence of equipment transmission of terminal device acquisition intelligence is tatooed information;Terminal device is obtained according to intelligent information of tatooing Get safety verification result, it is determined whether execute the safety operation that terminal device issues and instruct corresponding safety operation, wherein Safety verification result is in the case that intelligence tatoos information by verifying, to execute safety operation and instruct corresponding safety operation.
According to another aspect of an embodiment of the present invention, a kind of authentication dress based on intelligent equipment of tatooing is additionally provided It sets, which includes: search module, and the intelligence for finding with terminal device binding is tatooed equipment, wherein is passed through and is established eventually The User Identity of end equipment and intelligence are tatooed the corresponding relationship that the intelligence of equipment is tatooed between mark, to bind terminal device With intelligent equipment of tatooing;Module is obtained, is tatooed information for obtaining the tatoo intelligence of equipment transmission of intelligence;Processing module is used for Terminal device tatoos acquisition of information to safety verification result according to intelligence, it is determined whether executes the safety operation of terminal device sending Instruct corresponding safety operation, wherein in the case where safety verification result is that intelligence tatoos information by verifying, execute safety The corresponding safety operation of operational order.
Another aspect according to an embodiment of the present invention additionally provides a kind of authentication system based on intelligent equipment of tatooing System, which includes: intelligent equipment of tatooing, for transmitting intelligent information of tatooing;Terminal device is established logical with intelligent equipment of tatooing Gateway system, the intelligence for finding with terminal device binding are tatooed equipment, are tatooed the intelligence of equipment transmission getting intelligence After information of tatooing, acquisition of information is tatooed to safety verification result according to intelligence, it is determined whether execute the peace of terminal device sending Full operation instructs corresponding safety operation;Wherein, by establishing the User Identity of terminal device and equipment of intelligently tatooing Corresponding relationship between mark of intelligently tatooing to bind terminal device and intelligent equipment of tatooing, and is intelligence in safety verification result In the case that the information that can tatoo is by verifying, executes safety operation and instruct corresponding safety operation.
It is according to an embodiment of the present invention a kind of to be tatooed the authentication side of equipment based on intelligence in another aspect, additionally providing Method, information and safety operation instruction this method comprises: the intelligence that server receives terminal device transmission is tatooed;Server is to intelligence The information that can tatoo is verified, and safety verification result is generated;Server is according to safety verification result, it is determined whether executes terminal and sets The safety operation that preparation goes out instructs corresponding safety operation, wherein passes through verifying in safety verification result for intelligent information of tatooing In the case where, it executes safety operation and instructs corresponding safety operation, generate operation data.
It is according to an embodiment of the present invention in another aspect, additionally provide it is a kind of based on intelligence tatoo equipment authentication dress Set, which includes: receiving module, for receive terminal device transmission intelligence tatoo information and safety operation instruction;It tests Module is demonstrate,proved, for verifying to intelligent information of tatooing, generates safety verification result;Determining module, for according to safety verification As a result, it is determined whether execute the safety operation that terminal device issues and instruct corresponding safety operation, wherein in safety verification result In the case where tatooing information by verifying for intelligence, executes safety operation and instruct corresponding safety operation, generate operation data.
It is according to an embodiment of the present invention a kind of to be tatooed the authentication system of equipment based on intelligence in another aspect, additionally providing System, which includes: intelligent equipment of tatooing, for generating intelligent information of tatooing;Terminal device is established logical with intelligent equipment of tatooing Gateway system obtains intelligence and tatoos the intelligence of equipment transmission for being tatooed after equipment with the intelligence of terminal device binding finding Can tatoo information;Server establishes correspondence with terminal device, and the intelligence for receiving terminal device transmission is tatooed information It instructs, is verified to intelligent information of tatooing, after generating safety verification result, according to safety verification knot with safety operation Fruit, it is determined whether execute the safety operation that terminal device issues and instruct corresponding safety operation, wherein be in safety verification result In the case that intelligence tatoos information by verifying, executes safety operation and instruct corresponding safety operation, generate operation data.
In embodiments of the present invention, it is found using terminal device and is tatooed equipment with the intelligence of terminal device binding, wherein By establish terminal device User Identity and intelligence tatoo equipment intelligence tatoo mark between corresponding relationship, to tie up Determine terminal device and intelligent equipment of tatooing;The tatoo intelligence of equipment transmission of terminal device acquisition intelligence is tatooed information;Terminal device Acquisition of information is tatooed to safety verification result according to intelligence, it is determined whether executes the safety operation instruction correspondence that terminal device issues Safety operation, wherein safety verification result be intelligence tatoo information by verifying in the case where, execute safety operation instruction The mode of corresponding safety operation is tatooed equipment by binding corresponding intelligence for terminal device, so that user is in registration terminal Equipment carries out various operations and (grasps more particularly, to safety with sensibility such as Modify password, equipment transfer, critical data transaction Make) before, it needs to tatoo equipment using the intelligence with present terminal apparatus bound to carry out additional authentication, main verifying is currently stepped on Record the legitimacy of the user identity of terminal device.Since intelligent equipment of tatooing is that one kind can be attached on human skin with it only One intelligence is tatooed the equipment of information, provides energy by human body, and have through communication modes and terminals such as bluetooth, wireless networks Equipment (such as electronic equipment of mobile terminal, compunlcation etc.), therefore, equipment of intelligently tatooing can characterize the standard of active user True identity information.Be easily noted that, tatoo equipment since terminal device is bundled with an intelligence so that when system searching to end The intelligence of end equipment binding is tatooed equipment, and is got the tatoo intelligence of equipment transmission of intelligence and tatooed after information, device end Acquisition of information can be tatooed to safety verification as a result, the safety verification result can determine current registration terminal equipment according to intelligence User it is whether legal, the system that may thereby determine that whether can continue to execute terminal device sending safety operation instruction correspond to Safety operation, at this point, if safety verification result be intelligence tatoo information by verifying in the case where, system, which can permit, to be worked as Preceding user's using terminal equipment simultaneously triggers the corresponding safety operation of safety operation instruction, and above scheme solves correlation as a result, The identity validation technology that technology provides is easy to be cracked, and not can guarantee the reliability of user identity, causes security of system low Technical problem.
Detailed description of the invention
The drawings described herein are used to provide a further understanding of the present invention, constitutes part of this application, this hair Bright illustrative embodiments and their description are used to explain the present invention, and are not constituted improper limitations of the present invention.In the accompanying drawings:
Fig. 1 is the structural schematic diagram of according to embodiments of the present invention one authentication system based on intelligent equipment of tatooing;
Fig. 2 is a kind of knot of according to embodiments of the present invention one authentication system optionally based on intelligent equipment of tatooing Structure schematic diagram;
Fig. 3 is the flow diagram of according to embodiments of the present invention two auth method based on intelligent equipment of tatooing;
Fig. 4 is that the first of according to embodiments of the present invention two is optionally tatooed the auth method of equipment based on intelligence Flow diagram;
Fig. 5 is according to embodiments of the present invention two second of auth method optionally based on intelligent equipment of tatooing Flow diagram;
Fig. 6 is the structural schematic diagram of according to embodiments of the present invention three authentication means based on intelligent equipment of tatooing.
Fig. 7 is in a kind of according to embodiments of the present invention three authentication means of equipment of optionally being tatooed based on intelligence Manage the structural schematic diagram of module;
Fig. 8 is according to embodiments of the present invention three authentication means of another equipment of optionally being tatooed based on intelligence The structural schematic diagram of processing module;
Fig. 9 is the structural schematic diagram of according to embodiments of the present invention four authentication system based on intelligent equipment of tatooing;
Figure 10 is in a kind of according to embodiments of the present invention four authentication system for being preferably based on intelligent equipment of tatooing The structural schematic diagram of server;
Figure 11 is the flow diagram of according to embodiments of the present invention five auth method based on intelligent equipment of tatooing; And
Figure 12 is the structural schematic diagram of according to embodiments of the present invention six authentication means based on intelligent equipment of tatooing;
Specific embodiment
In order to enable those skilled in the art to better understand the solution of the present invention, below in conjunction in the embodiment of the present invention Attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is only The embodiment of a part of the invention, instead of all the embodiments.Based on the embodiments of the present invention, ordinary skill people The model that the present invention protects all should belong in member's every other embodiment obtained without making creative work It encloses.
It should be noted that description and claims of this specification and term " first " in above-mentioned attached drawing, " Two " etc. be to be used to distinguish similar objects, without being used to describe a particular order or precedence order.It should be understood that using in this way Data be interchangeable under appropriate circumstances, so as to the embodiment of the present invention described herein can in addition to illustrating herein or Sequence other than those of description is implemented.In addition, term " includes " and " having " and their any deformation, it is intended that cover Cover it is non-exclusive include, for example, the process, method, system, product or equipment for containing a series of steps or units are not necessarily limited to Step or unit those of is clearly listed, but may include be not clearly listed or for these process, methods, product Or other step or units that equipment is intrinsic.
Embodiment 1
Before the further details of description present embodiments, it will be described with reference to Figure 1 and can be used for realizing this Shen The suitable counting system structure of one of principle please.In the following description, unless otherwise specified, will with reference to by one or The symbol of movement and operation that multiple computers execute indicates to describe present embodiments.As such, it will be understood that sometimes Referred to as computer execute this kind of movement and operation include computer processing unit indicate data to structured form The manipulation of electric signal.This manipulation transforms data on the position in the storage system of computer safeguard it, this is with this The mode that the technical staff in field understands reconfigures or changes the operation of computer.The data structure for safeguarding data is that have The physical location of the memory of particular community defined in the format of data.However, although in above-mentioned this Shen of described in the text up and down Please, but it does not mean restrictive, as understood by those skilled in the art, movement described below and operation Various aspects can also be realized with hardware.
In its most basic configuration, Fig. 1 is according to embodiments of the present invention one to be tested based on the tatoo identity of equipment of intelligence The structural schematic diagram of card system.For purposes of illustration, the architecture drawn is only an example of proper environment, not pair The use scope or function of the application proposes any limitation.Also the computing system should not be construed to any group shown in FIG. 1 Part or combinations thereof has any dependence or demand.
As shown in Figure 1, should based on intelligence tatoo equipment authentication system may include: one intelligence tatoo equipment 10, One terminal device 30.
Intelligence is tatooed equipment 10, is tatooed information for transmitting intelligence.Intelligence equipment 10 of tatooing is responsible for and the terminal of user Equipment 30 is established connection and is interacted, and provides identity information for terminal device 30.
Terminal device 30 establishes correspondence with intelligent equipment 10 of tatooing, can be the equipment that user carries out sensitive operation, Above-mentioned intelligence for finding with terminal device binding is tatooed equipment 10, is tatooed the intelligent line of equipment transmission getting intelligence After body information, acquisition of information is tatooed to safety verification result according to intelligence, it is determined whether execute the safety of terminal device sending The corresponding safety operation of operational order;Wherein, by establishing the User Identity of terminal device and the intelligence of intelligent equipment of tatooing Corresponding relationship between the mark that can tatoo to bind terminal device and intelligent equipment of tatooing, and is intelligence in safety verification result In the case that information of tatooing is by verifying, executes safety operation and instruct corresponding safety operation.
In the above embodiments of the present application one, tatooed equipment by binding corresponding intelligence for terminal device, so that user exists Registration terminal equipment, which carries out various operations, (has sensibility more particularly, to Modify password, equipment transfer, critical data transaction etc. Safety operation) before, need to tatoo equipment using the intelligence with present terminal apparatus bound to carry out additional authentication, mainly test Demonstrate,prove the legitimacy of the user identity of current registration terminal equipment.Since intelligent equipment of tatooing is that one kind can be attached on human skin Equipment with its unique intelligent information of tatooing provides energy by human body, and has through communication parties such as bluetooth, wireless networks Formula and terminal device (such as electronic equipment of mobile terminal, compunlcation etc.), therefore, equipment of intelligently tatooing can characterize currently The exact identity information of user.It is easily noted that, tatoos equipment since terminal device is bundled with an intelligence, so that when system is looked into It finds and tatoos equipment with the intelligence of terminal device binding, and get the tatoo intelligence of equipment transmission of intelligence and tatoo after information, Device end can tatoo acquisition of information to safety verification as a result, the safety verification result can determine current login according to intelligence Whether the user of terminal device is legal, and whether the system that may thereby determine that can continue to execute the safety operation of terminal device sending Corresponding safety operation is instructed, at this point, system can if safety verification result is in the case that intelligence tatoos information by verifying To allow active user's using terminal equipment and trigger the corresponding safety operation of safety operation instruction, wherein system can lead to Cross the User Identity for establishing terminal device and intelligence tatoo equipment intelligence tatoo mark between corresponding relationship, to bind Terminal device and intelligent equipment of tatooing.
It follows that scheme provided by the embodiment of the present invention one can be applied in online game or payment system In, since the tatoo intelligence information of tatooing of equipment offer of intelligence can be used as one and only belong to the voucher of a user and proves to use The data of the legitimacy at family, therefore, the equipment that can tatoo by using intelligence carry out the login user of additional authentication terminal device Legitimacy.I.e. the invention proposes a kind of tatoos equipment based on intelligence to verify the identity for the user for logging in present terminal equipment Scheme reduces the input operation of user since verification process does not need that the information such as user name, password are manually entered, therefore, Can it is quick, efficiently, easily the reliability of the identity of the user of using terminal equipment is confirmed on the basis of, also improve The speed of verifying, to improve the safety of user's operation and improve the efficiency of authentication.
Preferably, as shown in Fig. 2, in the application the above system embodiment, above system can also include: a server 50。
Above-mentioned server 50, for obtaining the User Identity of terminal device, and the intelligent line of intelligent equipment of tatooing The digital signature of body mark and intelligent mark of tatooing carries out sign test using digital signature of the identifying algorithm to intelligent mark of tatooing, If sign test success, the tatoo intelligence mark of tatooing of equipment of the User Identity of terminal device and intelligence is bound, And record terminal device User Identity and intelligence tatoo equipment intelligence tatoo mark between corresponding relationship.
Herein it should be noted that the server 50 in above scheme can obtain end using network communication mode automatically The User Identity of end equipment, and the tatoo intelligence of equipment of intelligence tatoo mark and intelligence is tatooed the digital signature of mark, The User Identity of terminal device, and the intelligent line of intelligent equipment of tatooing can also be obtained in such a way that user inputs The digital signature of body mark and intelligent mark of tatooing.
It follows that the above embodiments of the present application one can provide, a kind of storage in the server is intelligent to tatoo equipment and end The scheme of user's binding information between end equipment.Whether user pacifies in the operation using intelligent device authentication terminal device of tatooing Before complete, the intelligence by equipment of intelligently tatooing is needed to tatoo the User Identity ID for identifying ID and terminal device in server (for example, being related to the safety operations with sensibility such as Modify password, equipment transfer, critical data transaction for special disposal Sensitive operation server) on bound, the tatoo intelligence of equipment of intelligence can be stored in the form of tables of data and is tatooed mark The User Identity ID and the corresponding relationship between them of ID and terminal device.Herein it should be noted that the sensitivity is grasped The sensitive operation system for making server offer may include following function: be responsible for saving the User Identity of each terminal device The preservation of information;The binding relationship of storage User Identity information and intelligent identification information of tatooing;It is responsible for executing user's sensitivity Operation, certification user identity.
Preferably, it tatoos the safety of mark to improve the intelligence got equipment transmission intelligence of tatooing, in the application The scheme of stating, which additionally provides, a kind of to be received the tatoo intelligence of equipment transmission of intelligence in server and tatoos mark and intelligence is tatooed mark Digital signature after, to above-mentioned intelligence tatoo mark carry out sign test function, the intelligence that only sign test passes through tatoo equipment It can be bound with corresponding terminal device.
For example, active user needs a known intelligence tatooing apparatus bound into the terminal device held, it is first First, user can by network by the intelligence for equipment of intelligently tatooing tatoo mark and voucher (i.e. digital signature) be sent collectively to it is quick Feel operating system, sensitive operation system is set terminal in verifying by identifying algorithm verifying intelligent tatoo mark and Service Ticket The tatoo intelligence mark of tatooing of equipment of standby User Identity ID and intelligence is bound, and binding relationship is stored in currently Sensitive operation system in.
Preferably, in order to improve the safety of system, the application above-mentioned tests intelligence equipment of tatooing in addition to that can provide Card process can also be further provided for currently needing the terminal device bound to carry out authentication, due to terminal device Correspondence is established with server (such as sensitive operation server), therefore, can be used between terminal device and server The modes such as short message verification code, static password authenticate the user identity of terminal device, after authenticating successfully, can execute terminal The tatoo intelligence mark of tatooing of equipment of the User Identity ID of equipment and intelligence is bound.
It is above-mentioned to currently need the terminal device bound carry out authentication during, above-mentioned certification can be not only provided Process, can also information format to the user identity being currently received and content test, for example, subscriber identity information Format content only includes text formatting and/or number format, if detecting that the format for the information being currently received further includes spy Different character or other, then illustrate that current user identities information is wrong.The process can be applied recognizes in the user identity of terminal device Before card, it can also be executed after the user identity authentication of terminal device.
Herein it should be further noted that in the above embodiments of the present application, root can be done directly in terminal device According to function of the acquisition of information to safety verification result of intelligently tatooing.In order to reduce the processing load and system peace of terminal device Quan Xing, can also be above-mentioned according to function of the acquisition of information to safety verification result of intelligently tatooing by completing in conjunction with third party device Can, it determines whether to execute the function that the safety operation that terminal device issues instructs corresponding safety operation.Below just with end End equipment combination third party device is described in detail for example, and third party device herein can be above-mentioned server 50, knot It closes shown in Fig. 1 and 2, at least may include the following two kinds embodiment:
Mode one: it tatoos in the intelligence of the User Identity and intelligent equipment of tatooing that save terminal device by server In the application scenarios of corresponding relationship between mark, as shown in Fig. 2, system can be by being implemented as follows mode, Lai Zhihang terminal Equipment tatoos acquisition of information to safety verification result according to intelligence, it is determined whether executes the corresponding safety operation of safety operation instruction Function:
Firstly, terminal device will intelligently tatoo, information and safety operation instruction are sent to server.Preferably, which holds Before row, the tatoo intelligence of equipment of terminal device acquisition intelligence is tatooed information, and acquisition mode may include: network transmission, equipment Scanning, user's input etc..Wherein, safety operation instruction, which can be, is related to the tools such as Modify password, equipment transfer, critical data transaction There is the sensitive operation of sensibility.
Then, terminal device receives the operation data of the safety operation of server return, wherein detects in server In the case that intelligence tatoos information including at least intelligent mark of tatooing, safety verification result is intelligent information of tatooing by verifying, And execute safety operation and instruct corresponding safety operation, generate operation data.
In above-mentioned steps, since what is stored in server is the User Identity of terminal device and equipment of intelligently tatooing Intelligence is tatooed the corresponding relationship between mark, therefore, when the intelligence that server receives terminal device transmission is tatooed information and peace After full operation instruction, information mainly is tatooed by comparing the intelligence that receives and stored intelligence is tatooed and identified to determine Safety verification as a result, at this point, intelligence tatoo information can tatoo with the intelligence being saved identify it is identical, as long as be also possible to packet It includes intelligence to tatoo the information of mark, so that it may determine that current intelligence information of tatooing passes through verifying.Pass through in information of intelligently tatooing After verifying, server can execute safety operation and instruct corresponding safety operation.
Mode two: it tatoos in the intelligence of the User Identity and intelligent equipment of tatooing that save terminal device by server In the application scenarios of corresponding relationship between mark, as shown in Fig. 2, system can be by being implemented as follows mode, Lai Zhihang terminal Equipment tatoos acquisition of information to safety verification result according to intelligence, it is determined whether executes the corresponding safety operation of safety operation instruction Function:
Firstly, information of intelligently tatooing is sent to server by terminal device.Preferably, before which executes, terminal is set The tatoo intelligence of equipment of standby acquisition intelligence is tatooed information, and acquisition mode may include: network transmission, equipment scanning, user's input Deng.Wherein, safety operation instruction, which can be, is related to Modify password, equips transfer, critical data transaction etc. have the quick of sensibility Sense operation.
Then, terminal device obtains the safety verification result that server returns, wherein detects that intelligence is tatooed in server In the case that information includes at least intelligent mark of tatooing, safety verification result is that intelligent information of tatooing passes through verifying.In the step, Due to stored in server be terminal device User Identity and intelligence tatoo equipment intelligence tatoo mark between Corresponding relationship, therefore, after the intelligence that server receives terminal device transmission tatoos information and safety operation instruction, mainly Tatoo information by comparing the intelligence that receives and stored intelligence tatoo identify determine safety verification as a result, at this point, As long as intelligence tatoo information tatoo with the intelligence being saved identify the identical or intelligence tatoo information include intelligence tatoo The information of mark, so that it may determine that current intelligence information of tatooing passes through verifying.After information of intelligently tatooing is by verifying, clothes Business device can execute safety operation and instruct corresponding safety operation.
Secondly, terminal device is by safety operation in the case where safety verification result is that intelligence tatoos information by verifying Instruction is sent to server.
Finally, terminal device receives the operation data of the safety operation of server return, wherein server executes safety The corresponding safety operation of operational order generates operation data.
Herein it should be noted that the server provided in aforesaid way one and mode two can be sensitive operation service Device, sensitive operation service can verify intelligent information of tatooing, and in the case where being verified, be mentioned according to the user of terminal device The information of the sensitive operation of friendship carries out sensitive operation.
And the difference that scheme is provided in aforesaid way one and mode two is, in the scheme that mode one provides, terminal is set Standby will intelligently tatoo while being sent to server at information and safety operation instruction, after server receives above- mentioned information, first Intelligent information of tatooing is verified, when obtained safety verification result is in the case that intelligence tatoos information by verifying, to take Business device executes safety operation and instructs corresponding safety operation, generates operation data, and operation data is returned to terminal device.
And mode two provide scheme in, terminal device first by collected intelligence tatoo information be sent to server carry out Safety operation can just be instructed after being verified and be sent to server, generate corresponding operation data by verifying.Mode two compares Mode one can reduce the burden in network transmission process, save Internet resources.
In summary, the above system embodiment one provided by the present application can be applied and need to be implemented more sensitive operation The terminal device of (such as consumption in game application, transfer accounts, shift the operational orders such as game article), is tatooed by using intelligence The intelligence that equipment provides tatoos information to determine the user identity of the terminal device bound therewith (such as computer, mobile phone etc.), into And determine whether to carry out the Client-initiated sensitive operation of terminal device, guarantee the safety of the user's operation of terminal device. It avoids user and is stolen and bring the loss of money, privacy after password to user.
Embodiment 2
According to embodiments of the present invention, it additionally provides a kind of for implementing the embodiment of the method for the above system embodiment, needs Illustrate, step shown in the flowchart of the accompanying drawings can be in a computer system such as a set of computer executable instructions It executes, although also, logical order is shown in flow charts, and it in some cases, can be to be different from herein suitable Sequence executes shown or described step.
Fig. 3 is the flow diagram of according to embodiments of the present invention two auth method based on intelligent equipment of tatooing. Method provided by the above embodiments of the present application can be run on terminal device 30.It is set as shown in figure 3, should be tatooed based on intelligence Standby auth method may include that step is implemented as follows:
Step S30 can be used the terminal device 30 in Fig. 1 and find the intelligence bound with terminal device 30 and tatoos equipment 10, wherein by establish the User Identity of terminal device and intelligence tatoo equipment intelligence tatoo it is corresponding between mark Relationship, to bind terminal device and intelligent equipment of tatooing.
Intelligence in step equipment 10 of tatooing is responsible for establishing connection with the terminal device 30 of user and be interacted, for end End equipment 30 provides identity information.Terminal device 30 is to establish correspondence with intelligent equipment 10 of tatooing, and can be user's progress The equipment of sensitive operation,
Step S32, can be used the terminal device 30 in Fig. 1 acquire above-mentioned intelligence tatoo equipment 10 transmission intelligence tatoo Information.
Step S34, can be used terminal device 30 in Fig. 1 acquisition of information tatooed to safety verification according to intelligence as a result, Determine whether that executing the safety operation that above-mentioned terminal device 30 issues instructs corresponding safety operation, wherein in safety verification knot Fruit is in the case that intelligence tatoos information by verifying, to execute safety operation and instruct corresponding safety operation.
In the above embodiments of the present application two, tatooed equipment 10 by binding corresponding intelligence for terminal device 30, so that with Family carries out various operations in registration terminal equipment (to be had quick more particularly, to Modify password, equipment transfer, critical data transaction etc. The safety operation of perception) before, it needs to tatoo equipment using the intelligence with present terminal apparatus bound to carry out additional authentication, it is main Verify the legitimacy of the user identity of current registration terminal equipment.Since intelligent equipment of tatooing is that one kind can be attached to human body skin Equipment with its unique intelligent information of tatooing on skin, provides energy by human body, and have logical by bluetooth, wireless network etc. Letter mode and terminal device (such as electronic equipment of mobile terminal, compunlcation etc.), therefore, equipment of intelligently tatooing can characterize The exact identity information of active user.It is easily noted that, tatoos equipment since terminal device is bundled with an intelligence, so that when be System is found tatoos equipment with the intelligence of terminal device binding, and get intelligence tatoo equipment transmission intelligence tatoo information it Afterwards, device end can tatoo acquisition of information to safety verification as a result, the safety verification result can determine currently according to intelligence Whether the user of registration terminal equipment is legal, and whether the system that may thereby determine that can continue to execute the safety of terminal device sending The corresponding safety operation of operational order, at this point, if safety verification result is in the case that intelligence tatoos information by verifying, to be System can permit active user's using terminal equipment and trigger the corresponding safety operation of safety operation instruction, wherein system can With by the User Identity for establishing terminal device and intelligence tatoo equipment intelligence tatoo mark between corresponding relationship, come Binding terminal device and intelligent equipment of tatooing.
It follows that scheme provided by the embodiment of the present invention two can be applied in online game or payment system In, since the tatoo intelligence information of tatooing of equipment offer of intelligence can be used as one and only belong to the voucher of a user and proves to use The data of the legitimacy at family, therefore, the equipment that can tatoo by using intelligence carry out the login user of additional authentication terminal device Legitimacy.I.e. the invention proposes a kind of tatoos equipment based on intelligence to verify the identity for the user for logging in present terminal equipment Scheme reduces the input operation of user since verification process does not need that the information such as user name, password are manually entered, therefore, Can it is quick, efficiently, easily the reliability of the identity of the user of using terminal equipment is confirmed on the basis of, also improve The speed of verifying, to improve the safety of user's operation and improve the efficiency of authentication.
Preferably, it in the above embodiments of the present application, is found and terminal device binding executing step S30 terminal device Intelligence is tatooed before equipment, can also include that step is implemented as follows:
Step S101 can obtain the User Identity of terminal device 30 by the server 50 in Fig. 2.
Step S103 can obtain the tatoo intelligence of equipment 10 of intelligence by the server 50 in Fig. 2 and tatoo mark, and The digital signature for mark of intelligently tatooing.
Step S105 can be signed by the server 50 in Fig. 2 using number of the identifying algorithm to intelligent mark of tatooing Name carries out sign test, if sign test success, the User Identity of above-mentioned terminal device 30 and above-mentioned intelligence are tatooed equipment 10 Intelligence mark of tatooing bound, and record the User Identity of terminal device and the tatoo intelligence of equipment of intelligence is tatooed mark Corresponding relationship between knowledge.
Above-mentioned server 50, equipment 10 of tatooing respectively with intelligence and terminal device 30 establish correspondence, above-described embodiment Two step S101 to step S105 can provide one kind, create in the server and keep intelligence tatoo equipment and terminal device it Between user's binding information scheme.User is tatooed the operation whether before safety of device authentication terminal device using intelligence, Need the intelligence by equipment of intelligently tatooing tatoo identify the User Identity ID of ID and terminal device server (for example, with It is related to the sensitive operation of the safety operations with sensibility such as Modify password, equipment transfer, critical data transaction in special disposal Server) on bound, the tatoo intelligence of equipment of intelligence can be stored in the form of tables of data and tatoos and identifies ID and terminal The User Identity ID and the corresponding relationship between them of equipment.Herein it should be noted that the sensitive operation server The sensitive operation system of offer may include following function: be responsible for saving the guarantor of the User Identity information of each terminal device It deposits;The binding relationship of storage User Identity information and intelligent identification information of tatooing;It is responsible for executing user's sensitive operation, certification User identity.
Preferably, it tatoos the safety of mark to improve the intelligence got equipment transmission intelligence of tatooing, in the application The scheme of stating, which additionally provides, a kind of to be received the tatoo intelligence of equipment transmission of intelligence in server and tatoos mark and intelligence is tatooed mark Digital signature after, to above-mentioned intelligence tatoo mark carry out sign test function, the intelligence that only sign test passes through tatoo equipment It can be bound with corresponding terminal device.
For example, active user needs a known intelligence tatooing apparatus bound into the terminal device held, it is first First, user can by network by the intelligence for equipment of intelligently tatooing tatoo mark and voucher (i.e. digital signature) be sent collectively to it is quick Feel operating system, sensitive operation system is set terminal in verifying by identifying algorithm verifying intelligent tatoo mark and Service Ticket The tatoo intelligence mark of tatooing of equipment of standby User Identity ID and intelligence is bound, and binding relationship is stored in currently Sensitive operation system in.
Preferably, in order to improve the safety of system, the application above-mentioned tests intelligence equipment of tatooing in addition to that can provide Card process can also be further provided for currently needing the terminal device bound to carry out authentication, due to terminal device Correspondence is established with server (such as sensitive operation server), therefore, can be used between terminal device and server The modes such as short message verification code, static password authenticate the user identity of terminal device, after authenticating successfully, can execute terminal The tatoo intelligence mark of tatooing of equipment of the User Identity ID of equipment and intelligence is bound.
It is above-mentioned to currently need the terminal device bound carry out authentication during, above-mentioned certification can be not only provided Process, can also information format to the user identity being currently received and content test, for example, subscriber identity information Format content only includes text formatting and/or number format, if detecting that the format for the information being currently received further includes spy Different character or other, then illustrate that current user identities information is wrong.The process can be applied recognizes in the user identity of terminal device Before card, it can also be executed after the user identity authentication of terminal device.
Herein it should be further noted that in the above embodiments of the present application, root can be done directly in terminal device According to function of the acquisition of information to safety verification result of intelligently tatooing.In order to reduce the processing load and system peace of terminal device Quan Xing, can also be above-mentioned according to function of the acquisition of information to safety verification result of intelligently tatooing by completing in conjunction with third party device Can, it determines whether to execute the function that the safety operation that terminal device issues instructs corresponding safety operation.Third herein Method, apparatus can be a server, and the tatoo intelligence of equipment of the User Identity and intelligence for saving terminal device is tatooed Corresponding relationship between mark.It is just described in detail below using terminal device combination third party device as example, it at least can be with Including the following two kinds embodiment:
In the first optional embodiment, tatoo in the User Identity for saving terminal device by server with intelligence The intelligence of equipment tatoo mark between corresponding relationship application scenarios in, as shown in figure 4, above-mentioned steps S34, terminal device root Tatoo acquisition of information to safety verification result according to intelligence, it is determined whether execute the safety operation that terminal device issues instruct it is corresponding The step of safety operation may include that step is implemented as follows:
Step S401a, terminal device will intelligently tatoo information and safety operation instruction be sent to server.Preferably, should Before step executes, terminal device can acquire the tatoo intelligence of equipment of intelligence and tatoo information, and acquisition mode may include: network Transmission, equipment scanning, user's input etc..Wherein, safety operation instruction, which can be, is related to Modify password, equipment transfer, crucial number Sensitive operation according to transaction etc. with sensibility.
Step S403a, terminal device receive the operation data of the safety operation of server return, wherein in server In the case where detecting that intelligence tatoos information including at least intelligent mark of tatooing, safety verification result is that intelligent information of tatooing passes through Verifying, and execute safety operation and instruct corresponding safety operation, generate operation data.
In above-mentioned steps S403a, due to stored in server be terminal device User Identity with intelligence tatoo The intelligence of equipment is tatooed the corresponding relationship between mark, therefore, when the intelligence that server receives terminal device transmission is tatooed letter After breath and safety operation instruction, mark that the main intelligence received by comparison tatoos information and stored intelligence is tatooed Safety verification is determined as a result, information can tatoo with the intelligence being saved and identify identical at this point, intelligence is tatooed, is also possible to As long as tatooing the information of mark including intelligence, so that it may determine that current intelligence information of tatooing passes through verifying.In letter of intelligently tatooing After breath is by verifying, server can execute safety operation and instruct corresponding safety operation.
In second of alternative embodiment, as shown in figure 5, by server save terminal device User Identity with Intelligence tatoo equipment intelligence tatoo mark between corresponding relationship application scenarios in, above-mentioned steps S34, terminal device according to Intelligence tatoos acquisition of information to safety verification result, it is determined whether executes the corresponding peace of safety operation instruction that terminal device issues The step of full operation includes:
Information of intelligently tatooing is sent to server by step S401b, terminal device.Preferably, step S401b executes it Before, the tatoo intelligence of equipment of terminal device acquisition intelligence is tatooed information, acquisition mode may include: network transmission, equipment scanning, User's input etc..Wherein, safety operation instruction, which can be, is related to Modify password, equipment transfer, critical data transaction etc. with quick The sensitive operation of perception.
Step S403b, terminal device obtain the safety verification result that server returns, wherein detect intelligence in server In the case that the information that can tatoo includes at least intelligent mark of tatooing, safety verification result is that intelligent information of tatooing passes through verifying.
In step S403b, since what is stored in server is that the User Identity of terminal device is tatooed and set with intelligence Standby intelligence is tatooed the corresponding relationship between mark, therefore, when the intelligence that server receives terminal device transmission is tatooed information After safety operation instruction, mainly tatoo information by comparing the intelligence that receives and stored intelligence tatoo identify come Safety verification is determined as a result, information identifies the identical or intelligence line tatooing with the intelligence being saved at this point, intelligence is tatooed As long as body information includes that intelligence is tatooed the information of mark, so that it may determine that current intelligence information of tatooing passes through verifying.In intelligence After information of tatooing is by verifying, server can execute safety operation and instruct corresponding safety operation.
Step S405b, in the case where safety verification result is that intelligence tatoos information by verifying, terminal device will be safe Operational order is sent to server.
Step S407b, terminal device receive the operation data of the safety operation of server return, wherein server is held Row safety operation instructs corresponding safety operation, generates operation data.
Herein it should be noted that the server provided in above two embodiment can be sensitive operation server, Sensitive operation service can verify intelligent information of tatooing, and in the case where being verified, be submitted according to the user of terminal device Sensitive operation information carry out sensitive operation.
And the difference of above two embodiment is, in the scheme that the first embodiment provides, terminal device will Information of intelligently tatooing and safety operation instruct while being sent to server, after server receives above- mentioned information, first to intelligence The information that can tatoo is verified, when obtained safety verification result is server in the case that intelligence tatoos information by verifying It executes safety operation and instructs corresponding safety operation, generate operation data, and operation data is returned into terminal device.
And in the scheme that second of embodiment provides, collected intelligence information of tatooing first is sent to by terminal device Server is verified, and can just be instructed safety operation after being verified and is sent to server, generate corresponding operation data. Second of embodiment, which compares the first embodiment, can reduce burden in network transmission process, save Internet resources.
In summary, the above system embodiment two provided by the present application can be applied and need to be implemented more sensitive operation The terminal device of (such as consumption in game application, transfer accounts, shift the operational orders such as game article), is tatooed by using intelligence The intelligence that equipment provides tatoos information to determine the user identity of the terminal device bound therewith (such as computer, mobile phone etc.), into And determine whether to carry out the Client-initiated sensitive operation of terminal device, guarantee the safety of the user's operation of terminal device. It avoids user and is stolen and bring the loss of money, privacy after password to user.
It should be noted that for the various method embodiments described above, for simple description, therefore, it is stated as a series of Combination of actions, but those skilled in the art should understand that, the present invention is not limited by the sequence of acts described because According to the present invention, some steps may be performed in other sequences or simultaneously.Secondly, those skilled in the art should also know It knows, the embodiments described in the specification are all preferred embodiments, and related actions and modules is not necessarily of the invention It is necessary.
Through the above description of the embodiments, those skilled in the art can be understood that according to above-mentioned implementation The method of example can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but it is very much In the case of the former be more preferably embodiment.Based on this understanding, technical solution of the present invention is substantially in other words to existing The part that technology contributes can be embodied in the form of software products, which is stored in a storage In medium (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal device (can be mobile phone, calculate Machine, server or network equipment etc.) execute method described in each embodiment of the present invention.
Embodiment 3
In its most basic configuration, Fig. 6 is according to embodiments of the present invention three to be tested based on the tatoo identity of equipment of intelligence The structural schematic diagram of card device.For purposes of illustration, the device architecture drawn is only an example of proper environment, and Non- use scope or function to the application proposes any limitation.Also the computing system should not be construed to shown in fig. 6 One component or combinations thereof has any dependence or demand.
Device provided by the above embodiments of the present application can be run on terminal device 30 as shown in Figure 1, such as Fig. 6 institute Show, the apparatus may include: a search module 61, one obtains module 63, a processing module 65.
Wherein, search module 61, for the intelligence with terminal device binding can be found by the terminal device 30 in Fig. 1 Can tatoo equipment, wherein tatooed by the intelligence of the User Identity and equipment of intelligently tatooing of establishing terminal device and identify it Between corresponding relationship, tatoo equipment to bind terminal device and intelligence;Module 63 is obtained, for the terminal in Fig. 1 can be passed through Equipment 30 is tatooed information to obtain the tatoo intelligence of equipment transmission of intelligence;Processing module 65, for the terminal in Fig. 1 can be passed through Equipment 30 tatoos acquisition of information to safety verification result according to intelligence, it is determined whether executes the safety operation of terminal device sending Instruct corresponding safety operation, wherein in the case where safety verification result is that intelligence tatoos information by verifying, execute safety The corresponding safety operation of operational order.
Intelligence of the above-mentioned apparatus embodiment in equipment 10 of tatooing is responsible for establishing connection with the terminal device 30 of user and goes forward side by side Row interaction provides identity information for terminal device 30.Terminal device 30 is to establish correspondence with intelligence equipment 10 of tatooing, can be with It is the equipment that user carries out sensitive operation,
In the above embodiments of the present application three, tatooed equipment 10 by binding corresponding intelligence for terminal device 30, so that with Family carries out various operations in registration terminal equipment (to be had quick more particularly, to Modify password, equipment transfer, critical data transaction etc. The safety operation of perception) before, it needs to tatoo equipment using the intelligence with present terminal apparatus bound to carry out additional authentication, it is main Verify the legitimacy of the user identity of current registration terminal equipment.Since intelligent equipment of tatooing is that one kind can be attached to human body skin Equipment with its unique intelligent information of tatooing on skin, provides energy by human body, and have logical by bluetooth, wireless network etc. Letter mode and terminal device (such as electronic equipment of mobile terminal, compunlcation etc.), therefore, equipment of intelligently tatooing can characterize The exact identity information of active user.It is easily noted that, tatoos equipment since terminal device is bundled with an intelligence, so that when be System is found tatoos equipment with the intelligence of terminal device binding, and get intelligence tatoo equipment transmission intelligence tatoo information it Afterwards, device end can tatoo acquisition of information to safety verification as a result, the safety verification result can determine currently according to intelligence Whether the user of registration terminal equipment is legal, and whether the system that may thereby determine that can continue to execute the safety of terminal device sending The corresponding safety operation of operational order, at this point, if safety verification result is in the case that intelligence tatoos information by verifying, to be System can permit active user's using terminal equipment and trigger the corresponding safety operation of safety operation instruction, wherein system can With by the User Identity for establishing terminal device and intelligence tatoo equipment intelligence tatoo mark between corresponding relationship, come Binding terminal device and intelligent equipment of tatooing.
It follows that scheme provided by the embodiment of the present invention three can be applied in online game or payment system In, since the tatoo intelligence information of tatooing of equipment offer of intelligence can be used as one and only belong to the voucher of a user and proves to use The data of the legitimacy at family, therefore, the equipment that can tatoo by using intelligence carry out the login user of additional authentication terminal device Legitimacy.I.e. the invention proposes a kind of tatoos equipment based on intelligence to verify the identity for the user for logging in present terminal equipment Method reduces the input operation of user since verification process does not need that the information such as user name, password are manually entered, therefore, Can it is quick, efficiently, easily the reliability of the identity of the user of using terminal equipment is confirmed on the basis of, also improve The speed of verifying, to improve the safety of user's operation and improve the efficiency of authentication.
From the foregoing, it will be observed that above-mentioned search module 61, acquisition module 63, processing module 65 correspond to the step in embodiment two S30 to step S34, three modules are identical as example and application scenarios that corresponding step is realized, but are not limited to above-mentioned implementation Two disclosure of that of example.It is provided it should be noted that above-mentioned module may operate in embodiment one as a part of device Terminal device 30 in, hardware realization can also be passed through by software realization.
Preferably, it in the above embodiments of the present application, finds in above-mentioned search module 61 execution terminal device and is set with terminal The intelligence of standby binding is tatooed before equipment, and the equipment 10 that can also be tatooed by the intelligence in Fig. 1 is realized: first obtain module, For obtaining the User Identity of terminal device and the digital signature of User Identity;Second obtains module, for obtaining The tatoo intelligence of equipment of intelligence is tatooed mark;Sign test module, for using identifying algorithm to the digital signature of User Identity Sign test is carried out, if sign test success, the tatoo intelligence of equipment of the User Identity of terminal device and intelligence is tatooed mark It is bound, and records the User Identity of terminal device and intelligence and tatoo intelligence corresponding the closing of tatooing between mark of equipment System.
Herein it should be noted that above-mentioned first obtains module, the second acquisition module, sign test module corresponding to embodiment two In step S101 to step S105, the example and application scenarios that three modules and corresponding step are realized be identical but unlimited In two disclosure of that of above-described embodiment.It should be noted that above-mentioned module may operate in reality as a part of device The intelligence for applying the offer of example one is tatooed in equipment 10, can also pass through hardware realization by software realization.
In a kind of optional embodiment provided by the present application, the user identity mark of terminal device can be saved by server Know and intelligence tatoo equipment intelligence tatoo mark between corresponding relationship, it is preferable that as shown in fig. 7, above-mentioned processing module 65 It may include: the first sending module 701 and the first receiving module 702.
First sending module 701, for will intelligently tatoo information and safety operation instruction be sent to server.
First receiving module 702, the operation data of the safety operation for receiving server return, wherein servicing In the case that device detects that intelligence tatoos information including at least intelligent mark of tatooing, safety verification result is that intelligent information of tatooing is logical Verifying is crossed, and executes safety operation and instructs corresponding safety operation, generates operation data.
Herein it should be noted that above-mentioned first sending module 701 and the first receiving module 702 correspond in embodiment two Step S401a to step S403a, the example and application scenarios that two modules and corresponding step are realized be identical but unlimited In two disclosure of that of above-described embodiment.It should be noted that above-mentioned module may operate in reality as a part of device In the terminal device 30 that the offer of example one is provided, hardware realization can also be passed through by software realization.
In an alternative embodiment provided by the present application, the user identity of terminal device can be saved by server Mark and intelligence tatoo equipment intelligence tatoo mark between corresponding relationship, it is preferable that as shown in figure 8, above-mentioned processing module 65 may include: the second sending module 801, sub-acquisition module 803, third sending module 805 and the second receiving module 807.
Second sending module 801, for information of intelligently tatooing to be sent to server.
Sub-acquisition module 803, for obtaining the safety verification result of server return, wherein detect intelligence in server In the case that the information that can tatoo includes at least intelligent mark of tatooing, safety verification result is that intelligent information of tatooing passes through verifying.
Third sending module 805, for will pacify in the case where safety verification result is that intelligence tatoos information by verifying Full operation instruction is sent to server.
Second receiving module 807, the operation data of the safety operation for receiving server return, wherein server It executes safety operation and instructs corresponding safety operation, generate operation data.
Herein it should be noted that above-mentioned second sending module 801, sub-acquisition module 803,805 and of third sending module Second receiving module 807 corresponds to the step S401b to step S407b in embodiment two, four modules and corresponding step institute The example of realization is identical with application scenarios, but is not limited to the above embodiments two disclosure of that.It should be noted that above-mentioned mould Block is may operate in as a part of device in the terminal device 30 of the offer of embodiment one, can be by software realization, can also To pass through hardware realization.
Embodiment 4
The application can also provide another system embodiment shown in Fig. 9, and Fig. 9 is according to embodiments of the present invention four base In the structural schematic diagram of the authentication system for equipment of intelligently tatooing.For purposes of illustration, the architecture drawn is only to close One example of suitable environment, not proposes any limitation to the use scope of the application or function.It also should not be by the computing system It is construed to that there is any dependence or demand to any component shown in Fig. 9 or combinations thereof.
As shown in figure 9, the authentication system based on intelligent equipment of tatooing that the embodiment of the present application four provides may include: Intelligence is tatooed equipment 90, terminal device 92 and server 94.
Wherein, it intelligently tatoos equipment 90, tatoos information for generating intelligence;Terminal device 92, with intelligent equipment 90 of tatooing Correspondence is established, for being tatooed after equipment with the intelligence of terminal device binding finding, intelligence is obtained and tatoos equipment biography The intelligence sent is tatooed information;Server 94 establishes correspondence with terminal device 92, for receiving the intelligence of terminal device transmission The information that can tatoo and safety operation instruction, are verified to intelligent information of tatooing, after generating safety verification result, according to peace Full verification result, it is determined whether execute the safety operation that terminal device issues and instruct corresponding safety operation, wherein tested in safety Card result is in the case that intelligence tatoos information by verifying, to execute safety operation and instruct corresponding safety operation, generate operation Data.
In the above embodiments of the present application four, tatooed equipment by binding corresponding intelligence for terminal device, so that user exists Registration terminal equipment, which carries out various operations, (has sensibility more particularly, to Modify password, equipment transfer, critical data transaction etc. Safety operation) before, need to tatoo equipment using the intelligence with present terminal apparatus bound to carry out additional authentication, mainly test Demonstrate,prove the legitimacy of the user identity of current registration terminal equipment.Since intelligent equipment of tatooing is that one kind can be attached on human skin Equipment with its unique intelligent information of tatooing provides energy by human body, and has through communication parties such as bluetooth, wireless networks Formula and terminal device (such as electronic equipment of mobile terminal, compunlcation etc.), therefore, equipment of intelligently tatooing can characterize currently The exact identity information of user.It is easily noted that, tatoos equipment since terminal device is bundled with an intelligence, so that when system is looked into Find and tatoo equipment with the intelligence of terminal device binding, and terminal device acquisition intelligence tatoo equipment intelligence tatoo information it Afterwards, the intelligence that terminal device transmission can be received by server is tatooed information and safety operation instruction, and to intelligent line Body information is verified, and generates safety verification as a result, since the safety verification result can determine current registration terminal equipment Whether user is legal, so that server can be according to safety verification as a result, setting to determine whether system can continue to execute terminal The safety operation that preparation goes out instructs corresponding safety operation, at this point, if safety verification result is that intelligence tatoos information by testing In the case where card, system can permit active user's using terminal equipment and trigger the corresponding safety behaviour of safety operation instruction Make, wherein system can be tatooed by the intelligence of the User Identity and equipment of intelligently tatooing of establishing terminal device and identify it Between corresponding relationship, tatoo equipment to bind terminal device and intelligence.
It follows that scheme provided by the embodiment of the present invention four can be applied in online game or payment system In, since the tatoo intelligence information of tatooing of equipment offer of intelligence can be used as one and only belong to the voucher of a user and proves to use The data of the legitimacy at family, therefore, the equipment that can tatoo by using intelligence carry out the login user of additional authentication terminal device Legitimacy.I.e. the invention proposes a kind of tatoos equipment based on intelligence to verify the identity for the user for logging in present terminal equipment Scheme reduces the input operation of user since verification process does not need that the information such as user name, password are manually entered, therefore, Can it is quick, efficiently, easily the reliability of the identity of the user of using terminal equipment is confirmed on the basis of, also improve The speed of verifying, to improve the safety of user's operation and improve the efficiency of authentication.
Preferably, as shown in Figure 10, the server 94 in the above embodiments of the present application four may include: receiving module 1001, processor 1003 and memory 1005.
Reception device 1001, for obtaining the User Identity of terminal device, and the intelligent line of intelligent equipment of tatooing The digital signature of body mark and intelligent mark of tatooing.
Processor 1003, establishes a connection with reception device, for the number using identifying algorithm to intelligent mark of tatooing Word signature carries out sign test, if sign test success, by the intelligent line of the User Identity of terminal device and intelligent equipment of tatooing Body mark bound, and record terminal device User Identity and intelligence tatoo equipment intelligence tatoo mark between Corresponding relationship.
Memory 1005, establishes a connection with processor, for saving the User Identity and intelligence of terminal device The intelligence for equipment of tatooing tatoo mark between corresponding relationship.
It follows that the above embodiments of the present application four can provide one kind, in the server storage intelligence tatoo equipment with The scheme of user's binding information between terminal device.User using intelligence tatoo device authentication terminal device operation whether Before safety, the intelligence by equipment of intelligently tatooing is needed to tatoo the User Identity ID for identifying ID and terminal device in server (for example, being related to the safety operations with sensibility such as Modify password, equipment transfer, critical data transaction for special disposal Sensitive operation server) on bound, the tatoo intelligence of equipment of intelligence can be stored in the form of tables of data and is tatooed mark The User Identity ID and the corresponding relationship between them of ID and terminal device.Herein it should be noted that the sensitivity is grasped The sensitive operation system for making server offer may include following function: be responsible for saving the User Identity of each terminal device The preservation of information;The binding relationship of storage User Identity information and intelligent identification information of tatooing;It is responsible for executing user's sensitivity Operation, certification user identity.
Preferably, it tatoos the safety of mark to improve the intelligence got equipment transmission intelligence of tatooing, in the application The scheme of stating, which additionally provides, a kind of to be received the tatoo intelligence of equipment transmission of intelligence in server and tatoos mark and intelligence is tatooed mark Digital signature after, to above-mentioned intelligence tatoo mark carry out sign test function, the intelligence that only sign test passes through tatoo equipment It can be bound with corresponding terminal device.
For example, active user needs a known intelligence tatooing apparatus bound into the terminal device held, it is first First, user can by network by the intelligence for equipment of intelligently tatooing tatoo mark and voucher (i.e. digital signature) be sent collectively to it is quick Feel operating system, sensitive operation system is set terminal in verifying by identifying algorithm verifying intelligent tatoo mark and Service Ticket The tatoo intelligence mark of tatooing of equipment of standby User Identity ID and intelligence is bound, and binding relationship is stored in currently Sensitive operation system in.
Herein it should be further noted that being related to each preferred embodiment and reality in the above embodiments of the present application four Preferred embodiment and the application scenarios implementation process for applying the offer of example one are identical, but not limited to the examples scheme provided by one.
Embodiment 5
According to embodiments of the present invention, the implementation of another auth method based on intelligent equipment of tatooing is additionally provided Example, it should be noted that step shown in the flowchart of the accompanying drawings can be in the calculating of such as a group of computer-executable instructions It is executed in machine system, although also, logical order is shown in flow charts, and it in some cases, can be to be different from Sequence herein executes shown or described step.
Figure 11 is the flow diagram of according to embodiments of the present invention five auth method based on intelligent equipment of tatooing.
Method provided by the above embodiments of the present application five can be run on server 94.As shown in figure 11, the application The auth method based on intelligent equipment of tatooing that embodiment five provides may include that step is implemented as follows:
Step S1101, the intelligence that terminal device transmission can be received by server 94 provided by Figure 10 are tatooed Information and safety operation instruction.
Step S1103 can verify intelligent information of tatooing by server 94 provided by Figure 10, generate peace Full verification result;
Step S1105, can be by server 94 provided by Figure 10 come according to safety verification result, it is determined whether executes The safety operation that terminal device issues instructs corresponding safety operation, wherein logical for intelligent information of tatooing in safety verification result In the case where crossing verifying, executes safety operation and instruct corresponding safety operation, generate operation data.
The step S1101 to step S1105 provided in the above embodiments of the present application five may be implemented, by for terminal device Corresponding intelligence is bound to tatoo equipment so that user registration terminal equipment carry out various operations (more particularly, to Modify password, Equipment transfer, critical data transaction etc. with sensibility safety operation) before, need using with present terminal apparatus bound Intelligence tatoos equipment to carry out additional authentication, mainly verifies the legitimacy of the user identity of current registration terminal equipment.Due to intelligence The equipment that can tatoo is a kind of equipment that can be attached to its unique intelligent information of tatooing on human skin, provides energy by human body Amount, and have that (such as the electronics of mobile terminal, compunlcation is set by the communication modes such as bluetooth, wireless network and terminal device It is standby etc.), therefore, equipment of intelligently tatooing can characterize the exact identity information of active user.It is easily noted that, due to terminal device An intelligence is bundled with to tatoo equipment, so that when system searching to the intelligence bound with terminal device is tatooed equipment, and terminal is set The intelligence of the standby intelligent equipment of tatooing of acquisition is tatooed after information, and the intelligence of terminal device transmission can be received by server Information of tatooing and safety operation instruction, and intelligent information of tatooing is verified, safety verification is generated as a result, since the safety is tested Card result can determine whether the user of current registration terminal equipment legal, thus server can according to safety verification as a result, Corresponding safety operation is instructed to determine whether system can continue to execute the safety operation that terminal device issues, at this point, if Safety verification result is in the case that intelligence tatoos information by verifying, and system can permit active user's using terminal equipment simultaneously Trigger the corresponding safety operation of safety operation instruction, wherein system can be by establishing the User Identity of terminal device It tatoos the corresponding relationship that the intelligence of equipment tatoos between mark with intelligence, tatoos equipment to bind terminal device and intelligence.
It follows that scheme provided by the embodiment of the present invention five can be applied in online game or payment system In, since the tatoo intelligence information of tatooing of equipment offer of intelligence can be used as one and only belong to the voucher of a user and proves to use The data of the legitimacy at family, therefore, the equipment that can tatoo by using intelligence carry out the login user of additional authentication terminal device Legitimacy.I.e. the invention proposes a kind of tatoos equipment based on intelligence to verify the identity for the user for logging in present terminal equipment Scheme reduces the input operation of user since verification process does not need that the information such as user name, password are manually entered, therefore, Can it is quick, efficiently, easily the reliability of the identity of the user of using terminal equipment is confirmed on the basis of, also improve The speed of verifying, to improve the safety of user's operation and improve the efficiency of authentication.
Herein it should be noted that being related to each preferred embodiment and embodiment two in the above embodiments of the present application five The scheme and application scenarios implementation process of offer are identical, but not limited to the examples scheme provided by two.
Embodiment 6
Figure 12 is the structural schematic diagram of according to embodiments of the present invention six authentication means based on intelligent equipment of tatooing. Device provided by the above embodiments of the present application can be run on server 94 as shown in Figure 10.
As shown in figure 12, the authentication means provided by the present application based on intelligent equipment of tatooing may include: reception mould Block 1201, authentication module 1203 and determining module 1205.
Wherein, receiving module 1201, for receive terminal device transmission intelligence tatoo information and safety operation instruction; Authentication module 1203 generates safety verification result for verifying to intelligent information of tatooing;Determining module 1205 is used for root According to safety verification result, it is determined whether execute the safety operation that terminal device issues and instruct corresponding safety operation, wherein pacifying Full verification result is in the case that intelligence tatoos information by verifying, to execute safety operation and instruct corresponding safety operation, generate Operation data.
In the above embodiments of the present application stream, tatooed equipment by binding corresponding intelligence for terminal device, so that user exists Registration terminal equipment, which carries out various operations, (has sensibility more particularly, to Modify password, equipment transfer, critical data transaction etc. Safety operation) before, need to tatoo equipment using the intelligence with present terminal apparatus bound to carry out additional authentication, mainly test Demonstrate,prove the legitimacy of the user identity of current registration terminal equipment.Since intelligent equipment of tatooing is that one kind can be attached on human skin Equipment with its unique intelligent information of tatooing provides energy by human body, and has through communication parties such as bluetooth, wireless networks Formula and terminal device (such as electronic equipment of mobile terminal, compunlcation etc.), therefore, equipment of intelligently tatooing can characterize currently The exact identity information of user.It is easily noted that, tatoos equipment since terminal device is bundled with an intelligence, so that when system is looked into Find and tatoo equipment with the intelligence of terminal device binding, and terminal device acquisition intelligence tatoo equipment intelligence tatoo information it Afterwards, the intelligence that terminal device transmission can be received by server is tatooed information and safety operation instruction, and to intelligent line Body information is verified, and generates safety verification as a result, since the safety verification result can determine current registration terminal equipment Whether user is legal, so that server can be according to safety verification as a result, setting to determine whether system can continue to execute terminal The safety operation that preparation goes out instructs corresponding safety operation, at this point, if safety verification result is that intelligence tatoos information by testing In the case where card, system can permit active user's using terminal equipment and trigger the corresponding safety behaviour of safety operation instruction Make, wherein system can be tatooed by the intelligence of the User Identity and equipment of intelligently tatooing of establishing terminal device and identify it Between corresponding relationship, tatoo equipment to bind terminal device and intelligence.
It follows that scheme provided by the embodiment of the present invention six can be applied in online game or payment system In, since the tatoo intelligence information of tatooing of equipment offer of intelligence can be used as one and only belong to the voucher of a user and proves to use The data of the legitimacy at family, therefore, the equipment that can tatoo by using intelligence carry out the login user of additional authentication terminal device Legitimacy.I.e. the invention proposes a kind of tatoos equipment based on intelligence to verify the identity for the user for logging in present terminal equipment Scheme reduces the input operation of user since verification process does not need that the information such as user name, password are manually entered, therefore, Can it is quick, efficiently, easily the reliability of the identity of the user of using terminal equipment is confirmed on the basis of, also improve The speed of verifying, to improve the safety of user's operation and improve the efficiency of authentication.
Herein it should be further noted that being related to each preferred embodiment and reality in the above embodiments of the present application six Preferred embodiment and the application scenarios implementation process for applying the offer of example three are identical, but not limited to the examples scheme provided by three.
The serial number of the above embodiments of the invention is only for description, does not represent the advantages or disadvantages of the embodiments.
In the above embodiment of the invention, it all emphasizes particularly on different fields to the description of each embodiment, does not have in some embodiment The part of detailed description, reference can be made to the related descriptions of other embodiments.
In several embodiments provided herein, it should be understood that disclosed client, it can be by others side Formula is realized.Wherein, the apparatus embodiments described above are merely exemplary, such as the division of unit, and only one kind is patrolled Volume function division, there may be another division manner in actual implementation, such as multiple units or components can combine or can be with It is integrated into another system, or some features can be ignored or not executed.Another point, it is shown or discussed mutual Coupling, direct-coupling or communication connection can be through some interfaces, the indirect coupling or communication connection of unit or module, can To be electrically or in the form of others.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme 's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list Member both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated unit is realized in the form of SFU software functional unit and sells or use as independent product When, it can store in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially The all or part of the part that contributes to existing technology or the technical solution can be in the form of software products in other words It embodies, which is stored in a storage medium, including some instructions are used so that a computer Equipment (can for personal computer, server or network equipment etc.) execute each embodiment the method for the present invention whole or Part steps.And storage medium above-mentioned includes: that USB flash disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited Reservoir (RAM, Random Access Memory), mobile hard disk, magnetic or disk etc. be various to can store program code Medium.
The above is only a preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art For member, various improvements and modifications may be made without departing from the principle of the present invention, these improvements and modifications are also answered It is considered as protection scope of the present invention.

Claims (14)

1. a kind of auth method based on intelligent equipment of tatooing characterized by comprising
Terminal device is found tatoos equipment with the intelligence of terminal device binding, wherein by establishing the terminal device User Identity and the intelligence tatoo equipment intelligence tatoo mark between corresponding relationship, set to bind the terminal The standby and described intelligence is tatooed equipment, and intelligence equipment of tatooing is attached on the skin of human body, is passed through the human body and is provided energy, tool There is unique intelligence of the human body to tatoo information;
The terminal device acquires the tatoo intelligence of equipment transmission of the intelligence and tatoos information;
The terminal device tatoos acquisition of information to safety verification result according to the intelligence, it is determined whether executes the terminal and sets The safety operation that preparation goes out instructs corresponding safety operation, wherein in the safety verification result is that the intelligence is tatooed information In the case where by verifying, executes the safety operation and instruct corresponding safety operation.
2. the method according to claim 1, wherein being found and terminal device binding in terminal device Intelligence is tatooed before equipment, the method also includes:
Obtain the User Identity of the terminal device;
It obtains the tatoo intelligence of equipment of the intelligence and tatoos mark and the intelligence is tatooed the digital signature of mark;
Using identifying algorithm to the intelligence tatoo mark digital signature carry out sign test, if sign test success, by the end The tatoo intelligence mark of tatooing of equipment of the User Identity of end equipment and the intelligence is bound, and is recorded the terminal and set Standby User Identity and the intelligence tatoo equipment intelligence tatoo mark between corresponding relationship.
3. method according to claim 1 or 2, which is characterized in that save the user of the terminal device by server Identity and the intelligence tatoo equipment intelligence tatoo mark between corresponding relationship, wherein the terminal device according to The intelligence tatoos acquisition of information to safety verification result, it is determined whether executes the safety operation instruction that the terminal device issues The step of corresponding safety operation includes:
The terminal device by the intelligence tatoo information and the safety operation instruction be sent to the server;
The terminal device receives the operation data for the safety operation that the server returns, wherein in the service Device detects that intelligence information of tatooing is tatooed in the case where mark including at least the intelligence, and the safety verification result is institute It states intelligence and tatoos information by verifying, and execute the safety operation and instruct corresponding safety operation, generate the operation data.
4. method according to claim 1 or 2, which is characterized in that save the user of the terminal device by server Identity and the intelligence tatoo equipment intelligence tatoo mark between corresponding relationship, wherein the terminal device according to The intelligence tatoos acquisition of information to safety verification result, it is determined whether executes the safety operation instruction that the terminal device issues The step of corresponding safety operation includes:
Intelligence information of tatooing is sent to the server by the terminal device;
The terminal device obtains the safety verification result that the server returns, wherein detects in the server Intelligence information of tatooing is tatooed in the case where mark including at least the intelligence, and the safety verification result is the intelligent line Body information passes through verifying;
In the case where the safety verification result is that the intelligence tatoos information by verifying, the terminal device is by the peace Full operation instruction is sent to the server;
The terminal device receives the operation data for the safety operation that the server returns, wherein the server It executes the safety operation and instructs corresponding safety operation, generate the operation data.
5. a kind of authentication means based on intelligent equipment of tatooing characterized by comprising
Search module, the intelligence for finding with terminal device binding are tatooed equipment, wherein by establishing the terminal device User Identity and the intelligence tatoo equipment intelligence tatoo mark between corresponding relationship, set to bind the terminal The standby and described intelligence is tatooed equipment, and intelligence equipment of tatooing is attached on the skin of human body, is passed through the human body and is provided energy, tool There is unique intelligence of the human body to tatoo information;
Module is obtained, is tatooed information for obtaining the tatoo intelligence of equipment transmission of the intelligence;
Processing module tatoos acquisition of information to safety verification result according to the intelligence for the terminal device, it is determined whether It executes the safety operation that the terminal device issues and instructs corresponding safety operation, wherein in the safety verification result be institute In the case where intelligent information of tatooing is stated by verifying, executes the safety operation and instruct corresponding safety operation.
6. device according to claim 5, which is characterized in that save the user identity of the terminal device by server Mark and the intelligence are tatooed the corresponding relationship that the intelligence of equipment is tatooed between mark, wherein the processing module includes:
First sending module, for by the intelligence tatoo information and the safety operation instruction be sent to the server;
First receiving module, for receiving the operation data for the safety operation that the server returns, wherein described Server detects that intelligence information of tatooing is tatooed in the case where mark including at least the intelligence, the safety verification result Information is tatooed by verifying for the intelligence, and executes the safety operation and instructs corresponding safety operation, generates the operation Data.
7. device according to claim 5, which is characterized in that save the user identity of the terminal device by server Mark and the intelligence are tatooed the corresponding relationship that the intelligence of equipment is tatooed between mark, wherein the processing module includes:
Second sending module, for intelligence information of tatooing to be sent to the server;
Sub-acquisition module, the safety verification result returned for obtaining the server, wherein detected in the server It tatoos in the case where mark to intelligence information of tatooing including at least the intelligence, the safety verification result is the intelligence Information of tatooing passes through verifying;
Third sending module, for inciting somebody to action in the case where the safety verification result is that the intelligence tatoos information by verifying The safety operation instruction is sent to the server;
Second receiving module, for receiving the operation data for the safety operation that the server returns, wherein the clothes Business device executes the safety operation and instructs corresponding safety operation, generates the operation data.
8. a kind of authentication system based on intelligent equipment of tatooing characterized by comprising
Intelligence is tatooed equipment, is attached on the skin of human body, provides energy by the human body, unique intelligence with the human body Can tatoo information, and intelligence equipment of tatooing is tatooed information for transmitting the intelligence;
Terminal device establishes correspondence with intelligence equipment of tatooing, for finding the institute with terminal device binding It states intelligence to tatoo equipment, tatoo after information getting the tatoo intelligence of equipment transmission of the intelligence, according to the intelligence Acquisition of information can be tatooed to safety verification result, it is determined whether it is corresponding to execute the safety operation instruction that the terminal device issues Safety operation;
Wherein, it tatoos by the tatoo intelligence of equipment of the User Identity and the intelligence of establishing the terminal device and identifies it Between corresponding relationship, to bind the terminal device and the intelligence is tatooed equipment, and be described in the safety verification result In the case that intelligence tatoos information by verifying, executes the safety operation and instruct corresponding safety operation.
9. system according to claim 8, which is characterized in that found and terminal device binding in terminal device Intelligence is tatooed before equipment, the system also includes:
Server, equipment of tatooing respectively with the intelligence and the terminal device establish correspondence, for obtaining the terminal The tatoo intelligence of equipment of the User Identity of equipment and the intelligence tatoos mark and the intelligence is tatooed the number of mark Signature, using identifying algorithm to the intelligence tatoo mark digital signature carry out sign test, if sign test success, by the end The tatoo intelligence mark of tatooing of equipment of the User Identity of end equipment and the intelligence is bound, and is recorded the terminal and set Standby User Identity and the intelligence tatoo equipment intelligence tatoo mark between corresponding relationship.
10. a kind of auth method based on intelligent equipment of tatooing characterized by comprising
The intelligence that server receives terminal device transmission is tatooed information and safety operation instruction, wherein the intelligence is tatooed letter Breath sends the terminal device to for intelligence equipment of tatooing, and intelligence equipment of tatooing is attached on the skin of human body, passes through institute It states human body and energy is provided, unique intelligence with the human body is tatooed information;
The server verifies intelligence information of tatooing, and generates safety verification result;
The server is according to the safety verification result, it is determined whether executes the safety operation instruction that the terminal device issues Corresponding safety operation, wherein in the case where the safety verification result is that the intelligence tatoos information by verifying, execute The safety operation instructs corresponding safety operation, generates operation data.
11. according to the method described in claim 10, it is characterized in that, receiving the intelligent line of terminal device transmission in server Before body information and safety operation instruction, the method also includes:
The terminal device is found tatoos equipment with the intelligence of terminal device binding, wherein described in establishing The User Identity of terminal device and the intelligence tatoo equipment intelligence tatoo mark between corresponding relationship, to bind It states terminal device and the intelligence is tatooed equipment;
The terminal device acquires the tatoo intelligence of equipment transmission of the intelligence and tatoos information.
12. a kind of authentication means based on intelligent equipment of tatooing characterized by comprising
Receiving module, for receive terminal device transmission intelligence tatoo information and safety operation instruction, wherein the intelligence Information of tatooing is that intelligence equipment of tatooing sends the terminal device to, and intelligence equipment of tatooing is attached on the skin of human body, Energy is provided by the human body, unique intelligence with the human body is tatooed information;
Authentication module generates safety verification result for verifying to intelligence information of tatooing;
Determining module, for according to the safety verification result, it is determined whether execute the safety operation that the terminal device issues Instruct corresponding safety operation, wherein in the case where the safety verification result is that the intelligence tatoos information by verifying, It executes the safety operation and instructs corresponding safety operation, generate operation data.
13. a kind of authentication system based on intelligent equipment of tatooing characterized by comprising
Intelligence is tatooed equipment, is attached on the skin of human body, provides energy by the human body, unique intelligence with the human body Can tatoo information, and the intelligence tatoos equipment for generating intelligent information of tatooing;
Terminal device establishes correspondence with intelligence equipment of tatooing, for finding and terminal device binding The intelligence is tatooed after equipment, is obtained the tatoo intelligence of equipment transmission of the intelligence and is tatooed information;
Server establishes correspondence with the terminal device, and the intelligence for receiving terminal device transmission is tatooed letter Breath and safety operation instruction, are verified to intelligence information of tatooing, after generating safety verification result, according to the peace Full verification result, it is determined whether execute the safety operation that the terminal device issues and instruct corresponding safety operation, wherein in institute Stating safety verification result is in the case that the intelligence tatoos information by verifying, to execute the safety operation and instruct corresponding peace Full operation generates operation data.
14. system according to claim 13, which is characterized in that the server includes:
Reception device, User Identity and the intelligence for obtaining the terminal device are tatooed the intelligent line of equipment The digital signature for mark that body identifies, the intelligence is tatooed;
Processor establishes a connection with the reception device, for being tatooed the number of mark using identifying algorithm to the intelligence Word signature carries out sign test, if sign test success, the User Identity of the terminal device and the intelligence are tatooed equipment Intelligence mark of tatooing bound, and record the User Identity of the terminal device and the intelligence is tatooed the intelligence of equipment Corresponding relationship between the mark that can tatoo;
Memory establishes a connection with the processor, for save the User Identity of the terminal device with it is described Intelligence tatoo equipment intelligence tatoo mark between corresponding relationship.
CN201410099222.3A 2014-03-17 2014-03-17 Auth method, apparatus and system based on intelligent equipment of tatooing Active CN104935548B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410099222.3A CN104935548B (en) 2014-03-17 2014-03-17 Auth method, apparatus and system based on intelligent equipment of tatooing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410099222.3A CN104935548B (en) 2014-03-17 2014-03-17 Auth method, apparatus and system based on intelligent equipment of tatooing

Publications (2)

Publication Number Publication Date
CN104935548A CN104935548A (en) 2015-09-23
CN104935548B true CN104935548B (en) 2019-05-24

Family

ID=54122521

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410099222.3A Active CN104935548B (en) 2014-03-17 2014-03-17 Auth method, apparatus and system based on intelligent equipment of tatooing

Country Status (1)

Country Link
CN (1) CN104935548B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104363094B (en) * 2014-10-30 2018-04-20 广东欧珀移动通信有限公司 A kind of methods, devices and systems of authentication application program user identity
CN106302743A (en) * 2016-08-17 2017-01-04 成都市极米科技有限公司 The matching method of projector and mobile terminal and system
CN110536273B (en) * 2018-05-25 2022-08-09 九阳股份有限公司 Connection pairing method of intelligent equipment
CN110852163A (en) * 2019-10-08 2020-02-28 云知声智能科技股份有限公司 Binding method and device
CN111182497A (en) * 2019-12-27 2020-05-19 国家计算机网络与信息安全管理中心 V2X anonymous authentication method, device and storage medium
CN113806723A (en) * 2021-09-27 2021-12-17 三星电子(中国)研发中心 Double-factor authentication method and device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101329791A (en) * 2008-07-10 2008-12-24 大连新中连软件工程有限公司 Identification verification system using finger print
CN101702223A (en) * 2009-11-27 2010-05-05 吴剑 Mobile phone POS payment method and system
CN102790674A (en) * 2011-05-20 2012-11-21 阿里巴巴集团控股有限公司 Authentication method, equipment and system
CN103258270A (en) * 2013-04-12 2013-08-21 李霆 Bank paying method and device
CN103297392A (en) * 2012-02-27 2013-09-11 深圳市嘉乐祥珠宝饰品有限公司 Fingerprint identity authentication system and authentication method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101329791A (en) * 2008-07-10 2008-12-24 大连新中连软件工程有限公司 Identification verification system using finger print
CN101702223A (en) * 2009-11-27 2010-05-05 吴剑 Mobile phone POS payment method and system
CN102790674A (en) * 2011-05-20 2012-11-21 阿里巴巴集团控股有限公司 Authentication method, equipment and system
CN103297392A (en) * 2012-02-27 2013-09-11 深圳市嘉乐祥珠宝饰品有限公司 Fingerprint identity authentication system and authentication method
CN103258270A (en) * 2013-04-12 2013-08-21 李霆 Bank paying method and device

Also Published As

Publication number Publication date
CN104935548A (en) 2015-09-23

Similar Documents

Publication Publication Date Title
CN104935548B (en) Auth method, apparatus and system based on intelligent equipment of tatooing
CN104767613B (en) Signature verification method, apparatus and system
CN104579649B (en) Personal identification method and system
CN105554037B (en) Authentication processing method and service platform
CN111241517B (en) Method and device for constructing biological feature verification question-answer library
CN109257342A (en) Authentication method, system, server and readable storage medium storing program for executing of the block chain across chain
CN106713241B (en) A kind of auth method, device and system
CN103929411B (en) Information displaying method, terminal, safety server and system
CN104618315B (en) A kind of method, apparatus and system of verification information push and Information Authentication
CN106453205B (en) identity verification method and device
EP3534584A1 (en) Service implementation method and apparatus
CN102281138B (en) Method and system for improving safety of verification code
CN104967553B (en) Method for message interaction and relevant apparatus and communication system
CN105323253A (en) Identity verification method and device
CN105791246B (en) Verification method, the apparatus and system of verification information
CN108965222A (en) Identity identifying method, system and computer readable storage medium
CN104125230B (en) A kind of short message certification service system and authentication method
CN103929425B (en) A kind of identity registration, identity authentication method, equipment and system
CN110290150A (en) A kind of login validation method and login authentication device of Virtual Private Network VPN
CN105337739B (en) Safe login method, device, server and terminal
CN105992204A (en) Access authentication method of applications of mobile intelligent terminal and device
CN110414271A (en) A kind of private data guard method, device and computer readable storage medium
CN107113613A (en) Server, mobile terminal, real-name network authentication system and method
CN104104657A (en) Information validation method, server, terminal and system
CN105635075A (en) Method of registering cloud terminal, cloud terminal, cloud server and cloud system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20190806

Address after: 518000 Nanshan District science and technology zone, Guangdong, Zhejiang Province, science and technology in the Tencent Building on the 1st floor of the 35 layer

Co-patentee after: Tencent cloud computing (Beijing) limited liability company

Patentee after: Tencent Technology (Shenzhen) Co., Ltd.

Address before: Shenzhen Futian District City, Guangdong province 518000 Zhenxing Road, SEG Science Park 2 East Room 403

Patentee before: Tencent Technology (Shenzhen) Co., Ltd.