Auth method, apparatus and system based on intelligent equipment of tatooing
Technical field
The present invention relates to computer field, in particular to it is a kind of based on intelligence tatoo equipment auth method,
Apparatus and system.
Background technique
With various terminal applications, the especially application in the systems such as instant messaging, social platform, online game
Function is more and more abundant, the various operations carried out in systems, and the safety of the interaction of key message is carried out especially with respect to user
Problem is increasingly prominent, for example, system user account is stolen when logging in, the behavior of virtual assets is intercepted, Modify password behavior
The safety problems such as stolen are without restraint rampant, and the various networked assets of user are by increasingly severeer threat.
The prior art can be solved the above problems using identity validation technology, and identity validation technology mainly includes two rings
Section: identity registration and authentication two parts.Identity registration refers to the identity documents for negotiating " I is possessed " with Verification System,
Such as static password, dynamic password;Authentication refers to that Verification System is sentenced by " being possessed " voucher that verifying user submits
The authenticity of disconnected user.Wherein, existing authentication mainly may include static password generally based on password authentication, move
Two kinds of state password, but traditional static password is easy to be intercepted by keyboard wooden horse in safety, exists simultaneously the peace of Brute Force
Full blast danger.
From the foregoing, it will be observed that the specific implementation process of above-mentioned identity validation technology, can be through setting user login code
Mode confirms the identity of user, to guarantee that user executes the safety problem of various operations in systems, but setting is stepped on
The method of record password is easy to crack by modes such as violence trial, keyboard interception, screenshotss, thus only by verifying password
Carry out the legitimacy that authentication is not enough to prove active user.
The identity validation technology provided for above-mentioned the relevant technologies is easy to be cracked, and not can guarantee the reliable of user identity
Property, lead to the problem that security of system is low, currently no effective solution has been proposed.
Summary of the invention
The embodiment of the invention provides a kind of auth method, apparatus and systems based on intelligent equipment of tatooing, so that
The identity validation technology that the relevant technologies provide is solved less to be easy to be cracked, and not can guarantee the reliability of user identity, is led to system
The low technical problem of safety.
According to an aspect of an embodiment of the present invention, a kind of auth method based on intelligent equipment of tatooing is provided,
It tatoos equipment this method comprises: terminal device is found with the intelligence of terminal device binding, wherein by establishing terminal device
User Identity and intelligence are tatooed the corresponding relationship that the intelligence of equipment is tatooed between mark, to bind terminal device and intelligent line
Body equipment;The tatoo intelligence of equipment transmission of terminal device acquisition intelligence is tatooed information;Terminal device is obtained according to intelligent information of tatooing
Get safety verification result, it is determined whether execute the safety operation that terminal device issues and instruct corresponding safety operation, wherein
Safety verification result is in the case that intelligence tatoos information by verifying, to execute safety operation and instruct corresponding safety operation.
According to another aspect of an embodiment of the present invention, a kind of authentication dress based on intelligent equipment of tatooing is additionally provided
It sets, which includes: search module, and the intelligence for finding with terminal device binding is tatooed equipment, wherein is passed through and is established eventually
The User Identity of end equipment and intelligence are tatooed the corresponding relationship that the intelligence of equipment is tatooed between mark, to bind terminal device
With intelligent equipment of tatooing;Module is obtained, is tatooed information for obtaining the tatoo intelligence of equipment transmission of intelligence;Processing module is used for
Terminal device tatoos acquisition of information to safety verification result according to intelligence, it is determined whether executes the safety operation of terminal device sending
Instruct corresponding safety operation, wherein in the case where safety verification result is that intelligence tatoos information by verifying, execute safety
The corresponding safety operation of operational order.
Another aspect according to an embodiment of the present invention additionally provides a kind of authentication system based on intelligent equipment of tatooing
System, which includes: intelligent equipment of tatooing, for transmitting intelligent information of tatooing;Terminal device is established logical with intelligent equipment of tatooing
Gateway system, the intelligence for finding with terminal device binding are tatooed equipment, are tatooed the intelligence of equipment transmission getting intelligence
After information of tatooing, acquisition of information is tatooed to safety verification result according to intelligence, it is determined whether execute the peace of terminal device sending
Full operation instructs corresponding safety operation;Wherein, by establishing the User Identity of terminal device and equipment of intelligently tatooing
Corresponding relationship between mark of intelligently tatooing to bind terminal device and intelligent equipment of tatooing, and is intelligence in safety verification result
In the case that the information that can tatoo is by verifying, executes safety operation and instruct corresponding safety operation.
It is according to an embodiment of the present invention a kind of to be tatooed the authentication side of equipment based on intelligence in another aspect, additionally providing
Method, information and safety operation instruction this method comprises: the intelligence that server receives terminal device transmission is tatooed;Server is to intelligence
The information that can tatoo is verified, and safety verification result is generated;Server is according to safety verification result, it is determined whether executes terminal and sets
The safety operation that preparation goes out instructs corresponding safety operation, wherein passes through verifying in safety verification result for intelligent information of tatooing
In the case where, it executes safety operation and instructs corresponding safety operation, generate operation data.
It is according to an embodiment of the present invention in another aspect, additionally provide it is a kind of based on intelligence tatoo equipment authentication dress
Set, which includes: receiving module, for receive terminal device transmission intelligence tatoo information and safety operation instruction;It tests
Module is demonstrate,proved, for verifying to intelligent information of tatooing, generates safety verification result;Determining module, for according to safety verification
As a result, it is determined whether execute the safety operation that terminal device issues and instruct corresponding safety operation, wherein in safety verification result
In the case where tatooing information by verifying for intelligence, executes safety operation and instruct corresponding safety operation, generate operation data.
It is according to an embodiment of the present invention a kind of to be tatooed the authentication system of equipment based on intelligence in another aspect, additionally providing
System, which includes: intelligent equipment of tatooing, for generating intelligent information of tatooing;Terminal device is established logical with intelligent equipment of tatooing
Gateway system obtains intelligence and tatoos the intelligence of equipment transmission for being tatooed after equipment with the intelligence of terminal device binding finding
Can tatoo information;Server establishes correspondence with terminal device, and the intelligence for receiving terminal device transmission is tatooed information
It instructs, is verified to intelligent information of tatooing, after generating safety verification result, according to safety verification knot with safety operation
Fruit, it is determined whether execute the safety operation that terminal device issues and instruct corresponding safety operation, wherein be in safety verification result
In the case that intelligence tatoos information by verifying, executes safety operation and instruct corresponding safety operation, generate operation data.
In embodiments of the present invention, it is found using terminal device and is tatooed equipment with the intelligence of terminal device binding, wherein
By establish terminal device User Identity and intelligence tatoo equipment intelligence tatoo mark between corresponding relationship, to tie up
Determine terminal device and intelligent equipment of tatooing;The tatoo intelligence of equipment transmission of terminal device acquisition intelligence is tatooed information;Terminal device
Acquisition of information is tatooed to safety verification result according to intelligence, it is determined whether executes the safety operation instruction correspondence that terminal device issues
Safety operation, wherein safety verification result be intelligence tatoo information by verifying in the case where, execute safety operation instruction
The mode of corresponding safety operation is tatooed equipment by binding corresponding intelligence for terminal device, so that user is in registration terminal
Equipment carries out various operations and (grasps more particularly, to safety with sensibility such as Modify password, equipment transfer, critical data transaction
Make) before, it needs to tatoo equipment using the intelligence with present terminal apparatus bound to carry out additional authentication, main verifying is currently stepped on
Record the legitimacy of the user identity of terminal device.Since intelligent equipment of tatooing is that one kind can be attached on human skin with it only
One intelligence is tatooed the equipment of information, provides energy by human body, and have through communication modes and terminals such as bluetooth, wireless networks
Equipment (such as electronic equipment of mobile terminal, compunlcation etc.), therefore, equipment of intelligently tatooing can characterize the standard of active user
True identity information.Be easily noted that, tatoo equipment since terminal device is bundled with an intelligence so that when system searching to end
The intelligence of end equipment binding is tatooed equipment, and is got the tatoo intelligence of equipment transmission of intelligence and tatooed after information, device end
Acquisition of information can be tatooed to safety verification as a result, the safety verification result can determine current registration terminal equipment according to intelligence
User it is whether legal, the system that may thereby determine that whether can continue to execute terminal device sending safety operation instruction correspond to
Safety operation, at this point, if safety verification result be intelligence tatoo information by verifying in the case where, system, which can permit, to be worked as
Preceding user's using terminal equipment simultaneously triggers the corresponding safety operation of safety operation instruction, and above scheme solves correlation as a result,
The identity validation technology that technology provides is easy to be cracked, and not can guarantee the reliability of user identity, causes security of system low
Technical problem.
Detailed description of the invention
The drawings described herein are used to provide a further understanding of the present invention, constitutes part of this application, this hair
Bright illustrative embodiments and their description are used to explain the present invention, and are not constituted improper limitations of the present invention.In the accompanying drawings:
Fig. 1 is the structural schematic diagram of according to embodiments of the present invention one authentication system based on intelligent equipment of tatooing;
Fig. 2 is a kind of knot of according to embodiments of the present invention one authentication system optionally based on intelligent equipment of tatooing
Structure schematic diagram;
Fig. 3 is the flow diagram of according to embodiments of the present invention two auth method based on intelligent equipment of tatooing;
Fig. 4 is that the first of according to embodiments of the present invention two is optionally tatooed the auth method of equipment based on intelligence
Flow diagram;
Fig. 5 is according to embodiments of the present invention two second of auth method optionally based on intelligent equipment of tatooing
Flow diagram;
Fig. 6 is the structural schematic diagram of according to embodiments of the present invention three authentication means based on intelligent equipment of tatooing.
Fig. 7 is in a kind of according to embodiments of the present invention three authentication means of equipment of optionally being tatooed based on intelligence
Manage the structural schematic diagram of module;
Fig. 8 is according to embodiments of the present invention three authentication means of another equipment of optionally being tatooed based on intelligence
The structural schematic diagram of processing module;
Fig. 9 is the structural schematic diagram of according to embodiments of the present invention four authentication system based on intelligent equipment of tatooing;
Figure 10 is in a kind of according to embodiments of the present invention four authentication system for being preferably based on intelligent equipment of tatooing
The structural schematic diagram of server;
Figure 11 is the flow diagram of according to embodiments of the present invention five auth method based on intelligent equipment of tatooing;
And
Figure 12 is the structural schematic diagram of according to embodiments of the present invention six authentication means based on intelligent equipment of tatooing;
Specific embodiment
In order to enable those skilled in the art to better understand the solution of the present invention, below in conjunction in the embodiment of the present invention
Attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is only
The embodiment of a part of the invention, instead of all the embodiments.Based on the embodiments of the present invention, ordinary skill people
The model that the present invention protects all should belong in member's every other embodiment obtained without making creative work
It encloses.
It should be noted that description and claims of this specification and term " first " in above-mentioned attached drawing, "
Two " etc. be to be used to distinguish similar objects, without being used to describe a particular order or precedence order.It should be understood that using in this way
Data be interchangeable under appropriate circumstances, so as to the embodiment of the present invention described herein can in addition to illustrating herein or
Sequence other than those of description is implemented.In addition, term " includes " and " having " and their any deformation, it is intended that cover
Cover it is non-exclusive include, for example, the process, method, system, product or equipment for containing a series of steps or units are not necessarily limited to
Step or unit those of is clearly listed, but may include be not clearly listed or for these process, methods, product
Or other step or units that equipment is intrinsic.
Embodiment 1
Before the further details of description present embodiments, it will be described with reference to Figure 1 and can be used for realizing this Shen
The suitable counting system structure of one of principle please.In the following description, unless otherwise specified, will with reference to by one or
The symbol of movement and operation that multiple computers execute indicates to describe present embodiments.As such, it will be understood that sometimes
Referred to as computer execute this kind of movement and operation include computer processing unit indicate data to structured form
The manipulation of electric signal.This manipulation transforms data on the position in the storage system of computer safeguard it, this is with this
The mode that the technical staff in field understands reconfigures or changes the operation of computer.The data structure for safeguarding data is that have
The physical location of the memory of particular community defined in the format of data.However, although in above-mentioned this Shen of described in the text up and down
Please, but it does not mean restrictive, as understood by those skilled in the art, movement described below and operation
Various aspects can also be realized with hardware.
In its most basic configuration, Fig. 1 is according to embodiments of the present invention one to be tested based on the tatoo identity of equipment of intelligence
The structural schematic diagram of card system.For purposes of illustration, the architecture drawn is only an example of proper environment, not pair
The use scope or function of the application proposes any limitation.Also the computing system should not be construed to any group shown in FIG. 1
Part or combinations thereof has any dependence or demand.
As shown in Figure 1, should based on intelligence tatoo equipment authentication system may include: one intelligence tatoo equipment 10,
One terminal device 30.
Intelligence is tatooed equipment 10, is tatooed information for transmitting intelligence.Intelligence equipment 10 of tatooing is responsible for and the terminal of user
Equipment 30 is established connection and is interacted, and provides identity information for terminal device 30.
Terminal device 30 establishes correspondence with intelligent equipment 10 of tatooing, can be the equipment that user carries out sensitive operation,
Above-mentioned intelligence for finding with terminal device binding is tatooed equipment 10, is tatooed the intelligent line of equipment transmission getting intelligence
After body information, acquisition of information is tatooed to safety verification result according to intelligence, it is determined whether execute the safety of terminal device sending
The corresponding safety operation of operational order;Wherein, by establishing the User Identity of terminal device and the intelligence of intelligent equipment of tatooing
Corresponding relationship between the mark that can tatoo to bind terminal device and intelligent equipment of tatooing, and is intelligence in safety verification result
In the case that information of tatooing is by verifying, executes safety operation and instruct corresponding safety operation.
In the above embodiments of the present application one, tatooed equipment by binding corresponding intelligence for terminal device, so that user exists
Registration terminal equipment, which carries out various operations, (has sensibility more particularly, to Modify password, equipment transfer, critical data transaction etc.
Safety operation) before, need to tatoo equipment using the intelligence with present terminal apparatus bound to carry out additional authentication, mainly test
Demonstrate,prove the legitimacy of the user identity of current registration terminal equipment.Since intelligent equipment of tatooing is that one kind can be attached on human skin
Equipment with its unique intelligent information of tatooing provides energy by human body, and has through communication parties such as bluetooth, wireless networks
Formula and terminal device (such as electronic equipment of mobile terminal, compunlcation etc.), therefore, equipment of intelligently tatooing can characterize currently
The exact identity information of user.It is easily noted that, tatoos equipment since terminal device is bundled with an intelligence, so that when system is looked into
It finds and tatoos equipment with the intelligence of terminal device binding, and get the tatoo intelligence of equipment transmission of intelligence and tatoo after information,
Device end can tatoo acquisition of information to safety verification as a result, the safety verification result can determine current login according to intelligence
Whether the user of terminal device is legal, and whether the system that may thereby determine that can continue to execute the safety operation of terminal device sending
Corresponding safety operation is instructed, at this point, system can if safety verification result is in the case that intelligence tatoos information by verifying
To allow active user's using terminal equipment and trigger the corresponding safety operation of safety operation instruction, wherein system can lead to
Cross the User Identity for establishing terminal device and intelligence tatoo equipment intelligence tatoo mark between corresponding relationship, to bind
Terminal device and intelligent equipment of tatooing.
It follows that scheme provided by the embodiment of the present invention one can be applied in online game or payment system
In, since the tatoo intelligence information of tatooing of equipment offer of intelligence can be used as one and only belong to the voucher of a user and proves to use
The data of the legitimacy at family, therefore, the equipment that can tatoo by using intelligence carry out the login user of additional authentication terminal device
Legitimacy.I.e. the invention proposes a kind of tatoos equipment based on intelligence to verify the identity for the user for logging in present terminal equipment
Scheme reduces the input operation of user since verification process does not need that the information such as user name, password are manually entered, therefore,
Can it is quick, efficiently, easily the reliability of the identity of the user of using terminal equipment is confirmed on the basis of, also improve
The speed of verifying, to improve the safety of user's operation and improve the efficiency of authentication.
Preferably, as shown in Fig. 2, in the application the above system embodiment, above system can also include: a server
50。
Above-mentioned server 50, for obtaining the User Identity of terminal device, and the intelligent line of intelligent equipment of tatooing
The digital signature of body mark and intelligent mark of tatooing carries out sign test using digital signature of the identifying algorithm to intelligent mark of tatooing,
If sign test success, the tatoo intelligence mark of tatooing of equipment of the User Identity of terminal device and intelligence is bound,
And record terminal device User Identity and intelligence tatoo equipment intelligence tatoo mark between corresponding relationship.
Herein it should be noted that the server 50 in above scheme can obtain end using network communication mode automatically
The User Identity of end equipment, and the tatoo intelligence of equipment of intelligence tatoo mark and intelligence is tatooed the digital signature of mark,
The User Identity of terminal device, and the intelligent line of intelligent equipment of tatooing can also be obtained in such a way that user inputs
The digital signature of body mark and intelligent mark of tatooing.
It follows that the above embodiments of the present application one can provide, a kind of storage in the server is intelligent to tatoo equipment and end
The scheme of user's binding information between end equipment.Whether user pacifies in the operation using intelligent device authentication terminal device of tatooing
Before complete, the intelligence by equipment of intelligently tatooing is needed to tatoo the User Identity ID for identifying ID and terminal device in server
(for example, being related to the safety operations with sensibility such as Modify password, equipment transfer, critical data transaction for special disposal
Sensitive operation server) on bound, the tatoo intelligence of equipment of intelligence can be stored in the form of tables of data and is tatooed mark
The User Identity ID and the corresponding relationship between them of ID and terminal device.Herein it should be noted that the sensitivity is grasped
The sensitive operation system for making server offer may include following function: be responsible for saving the User Identity of each terminal device
The preservation of information;The binding relationship of storage User Identity information and intelligent identification information of tatooing;It is responsible for executing user's sensitivity
Operation, certification user identity.
Preferably, it tatoos the safety of mark to improve the intelligence got equipment transmission intelligence of tatooing, in the application
The scheme of stating, which additionally provides, a kind of to be received the tatoo intelligence of equipment transmission of intelligence in server and tatoos mark and intelligence is tatooed mark
Digital signature after, to above-mentioned intelligence tatoo mark carry out sign test function, the intelligence that only sign test passes through tatoo equipment
It can be bound with corresponding terminal device.
For example, active user needs a known intelligence tatooing apparatus bound into the terminal device held, it is first
First, user can by network by the intelligence for equipment of intelligently tatooing tatoo mark and voucher (i.e. digital signature) be sent collectively to it is quick
Feel operating system, sensitive operation system is set terminal in verifying by identifying algorithm verifying intelligent tatoo mark and Service Ticket
The tatoo intelligence mark of tatooing of equipment of standby User Identity ID and intelligence is bound, and binding relationship is stored in currently
Sensitive operation system in.
Preferably, in order to improve the safety of system, the application above-mentioned tests intelligence equipment of tatooing in addition to that can provide
Card process can also be further provided for currently needing the terminal device bound to carry out authentication, due to terminal device
Correspondence is established with server (such as sensitive operation server), therefore, can be used between terminal device and server
The modes such as short message verification code, static password authenticate the user identity of terminal device, after authenticating successfully, can execute terminal
The tatoo intelligence mark of tatooing of equipment of the User Identity ID of equipment and intelligence is bound.
It is above-mentioned to currently need the terminal device bound carry out authentication during, above-mentioned certification can be not only provided
Process, can also information format to the user identity being currently received and content test, for example, subscriber identity information
Format content only includes text formatting and/or number format, if detecting that the format for the information being currently received further includes spy
Different character or other, then illustrate that current user identities information is wrong.The process can be applied recognizes in the user identity of terminal device
Before card, it can also be executed after the user identity authentication of terminal device.
Herein it should be further noted that in the above embodiments of the present application, root can be done directly in terminal device
According to function of the acquisition of information to safety verification result of intelligently tatooing.In order to reduce the processing load and system peace of terminal device
Quan Xing, can also be above-mentioned according to function of the acquisition of information to safety verification result of intelligently tatooing by completing in conjunction with third party device
Can, it determines whether to execute the function that the safety operation that terminal device issues instructs corresponding safety operation.Below just with end
End equipment combination third party device is described in detail for example, and third party device herein can be above-mentioned server 50, knot
It closes shown in Fig. 1 and 2, at least may include the following two kinds embodiment:
Mode one: it tatoos in the intelligence of the User Identity and intelligent equipment of tatooing that save terminal device by server
In the application scenarios of corresponding relationship between mark, as shown in Fig. 2, system can be by being implemented as follows mode, Lai Zhihang terminal
Equipment tatoos acquisition of information to safety verification result according to intelligence, it is determined whether executes the corresponding safety operation of safety operation instruction
Function:
Firstly, terminal device will intelligently tatoo, information and safety operation instruction are sent to server.Preferably, which holds
Before row, the tatoo intelligence of equipment of terminal device acquisition intelligence is tatooed information, and acquisition mode may include: network transmission, equipment
Scanning, user's input etc..Wherein, safety operation instruction, which can be, is related to the tools such as Modify password, equipment transfer, critical data transaction
There is the sensitive operation of sensibility.
Then, terminal device receives the operation data of the safety operation of server return, wherein detects in server
In the case that intelligence tatoos information including at least intelligent mark of tatooing, safety verification result is intelligent information of tatooing by verifying,
And execute safety operation and instruct corresponding safety operation, generate operation data.
In above-mentioned steps, since what is stored in server is the User Identity of terminal device and equipment of intelligently tatooing
Intelligence is tatooed the corresponding relationship between mark, therefore, when the intelligence that server receives terminal device transmission is tatooed information and peace
After full operation instruction, information mainly is tatooed by comparing the intelligence that receives and stored intelligence is tatooed and identified to determine
Safety verification as a result, at this point, intelligence tatoo information can tatoo with the intelligence being saved identify it is identical, as long as be also possible to packet
It includes intelligence to tatoo the information of mark, so that it may determine that current intelligence information of tatooing passes through verifying.Pass through in information of intelligently tatooing
After verifying, server can execute safety operation and instruct corresponding safety operation.
Mode two: it tatoos in the intelligence of the User Identity and intelligent equipment of tatooing that save terminal device by server
In the application scenarios of corresponding relationship between mark, as shown in Fig. 2, system can be by being implemented as follows mode, Lai Zhihang terminal
Equipment tatoos acquisition of information to safety verification result according to intelligence, it is determined whether executes the corresponding safety operation of safety operation instruction
Function:
Firstly, information of intelligently tatooing is sent to server by terminal device.Preferably, before which executes, terminal is set
The tatoo intelligence of equipment of standby acquisition intelligence is tatooed information, and acquisition mode may include: network transmission, equipment scanning, user's input
Deng.Wherein, safety operation instruction, which can be, is related to Modify password, equips transfer, critical data transaction etc. have the quick of sensibility
Sense operation.
Then, terminal device obtains the safety verification result that server returns, wherein detects that intelligence is tatooed in server
In the case that information includes at least intelligent mark of tatooing, safety verification result is that intelligent information of tatooing passes through verifying.In the step,
Due to stored in server be terminal device User Identity and intelligence tatoo equipment intelligence tatoo mark between
Corresponding relationship, therefore, after the intelligence that server receives terminal device transmission tatoos information and safety operation instruction, mainly
Tatoo information by comparing the intelligence that receives and stored intelligence tatoo identify determine safety verification as a result, at this point,
As long as intelligence tatoo information tatoo with the intelligence being saved identify the identical or intelligence tatoo information include intelligence tatoo
The information of mark, so that it may determine that current intelligence information of tatooing passes through verifying.After information of intelligently tatooing is by verifying, clothes
Business device can execute safety operation and instruct corresponding safety operation.
Secondly, terminal device is by safety operation in the case where safety verification result is that intelligence tatoos information by verifying
Instruction is sent to server.
Finally, terminal device receives the operation data of the safety operation of server return, wherein server executes safety
The corresponding safety operation of operational order generates operation data.
Herein it should be noted that the server provided in aforesaid way one and mode two can be sensitive operation service
Device, sensitive operation service can verify intelligent information of tatooing, and in the case where being verified, be mentioned according to the user of terminal device
The information of the sensitive operation of friendship carries out sensitive operation.
And the difference that scheme is provided in aforesaid way one and mode two is, in the scheme that mode one provides, terminal is set
Standby will intelligently tatoo while being sent to server at information and safety operation instruction, after server receives above- mentioned information, first
Intelligent information of tatooing is verified, when obtained safety verification result is in the case that intelligence tatoos information by verifying, to take
Business device executes safety operation and instructs corresponding safety operation, generates operation data, and operation data is returned to terminal device.
And mode two provide scheme in, terminal device first by collected intelligence tatoo information be sent to server carry out
Safety operation can just be instructed after being verified and be sent to server, generate corresponding operation data by verifying.Mode two compares
Mode one can reduce the burden in network transmission process, save Internet resources.
In summary, the above system embodiment one provided by the present application can be applied and need to be implemented more sensitive operation
The terminal device of (such as consumption in game application, transfer accounts, shift the operational orders such as game article), is tatooed by using intelligence
The intelligence that equipment provides tatoos information to determine the user identity of the terminal device bound therewith (such as computer, mobile phone etc.), into
And determine whether to carry out the Client-initiated sensitive operation of terminal device, guarantee the safety of the user's operation of terminal device.
It avoids user and is stolen and bring the loss of money, privacy after password to user.
Embodiment 2
According to embodiments of the present invention, it additionally provides a kind of for implementing the embodiment of the method for the above system embodiment, needs
Illustrate, step shown in the flowchart of the accompanying drawings can be in a computer system such as a set of computer executable instructions
It executes, although also, logical order is shown in flow charts, and it in some cases, can be to be different from herein suitable
Sequence executes shown or described step.
Fig. 3 is the flow diagram of according to embodiments of the present invention two auth method based on intelligent equipment of tatooing.
Method provided by the above embodiments of the present application can be run on terminal device 30.It is set as shown in figure 3, should be tatooed based on intelligence
Standby auth method may include that step is implemented as follows:
Step S30 can be used the terminal device 30 in Fig. 1 and find the intelligence bound with terminal device 30 and tatoos equipment
10, wherein by establish the User Identity of terminal device and intelligence tatoo equipment intelligence tatoo it is corresponding between mark
Relationship, to bind terminal device and intelligent equipment of tatooing.
Intelligence in step equipment 10 of tatooing is responsible for establishing connection with the terminal device 30 of user and be interacted, for end
End equipment 30 provides identity information.Terminal device 30 is to establish correspondence with intelligent equipment 10 of tatooing, and can be user's progress
The equipment of sensitive operation,
Step S32, can be used the terminal device 30 in Fig. 1 acquire above-mentioned intelligence tatoo equipment 10 transmission intelligence tatoo
Information.
Step S34, can be used terminal device 30 in Fig. 1 acquisition of information tatooed to safety verification according to intelligence as a result,
Determine whether that executing the safety operation that above-mentioned terminal device 30 issues instructs corresponding safety operation, wherein in safety verification knot
Fruit is in the case that intelligence tatoos information by verifying, to execute safety operation and instruct corresponding safety operation.
In the above embodiments of the present application two, tatooed equipment 10 by binding corresponding intelligence for terminal device 30, so that with
Family carries out various operations in registration terminal equipment (to be had quick more particularly, to Modify password, equipment transfer, critical data transaction etc.
The safety operation of perception) before, it needs to tatoo equipment using the intelligence with present terminal apparatus bound to carry out additional authentication, it is main
Verify the legitimacy of the user identity of current registration terminal equipment.Since intelligent equipment of tatooing is that one kind can be attached to human body skin
Equipment with its unique intelligent information of tatooing on skin, provides energy by human body, and have logical by bluetooth, wireless network etc.
Letter mode and terminal device (such as electronic equipment of mobile terminal, compunlcation etc.), therefore, equipment of intelligently tatooing can characterize
The exact identity information of active user.It is easily noted that, tatoos equipment since terminal device is bundled with an intelligence, so that when be
System is found tatoos equipment with the intelligence of terminal device binding, and get intelligence tatoo equipment transmission intelligence tatoo information it
Afterwards, device end can tatoo acquisition of information to safety verification as a result, the safety verification result can determine currently according to intelligence
Whether the user of registration terminal equipment is legal, and whether the system that may thereby determine that can continue to execute the safety of terminal device sending
The corresponding safety operation of operational order, at this point, if safety verification result is in the case that intelligence tatoos information by verifying, to be
System can permit active user's using terminal equipment and trigger the corresponding safety operation of safety operation instruction, wherein system can
With by the User Identity for establishing terminal device and intelligence tatoo equipment intelligence tatoo mark between corresponding relationship, come
Binding terminal device and intelligent equipment of tatooing.
It follows that scheme provided by the embodiment of the present invention two can be applied in online game or payment system
In, since the tatoo intelligence information of tatooing of equipment offer of intelligence can be used as one and only belong to the voucher of a user and proves to use
The data of the legitimacy at family, therefore, the equipment that can tatoo by using intelligence carry out the login user of additional authentication terminal device
Legitimacy.I.e. the invention proposes a kind of tatoos equipment based on intelligence to verify the identity for the user for logging in present terminal equipment
Scheme reduces the input operation of user since verification process does not need that the information such as user name, password are manually entered, therefore,
Can it is quick, efficiently, easily the reliability of the identity of the user of using terminal equipment is confirmed on the basis of, also improve
The speed of verifying, to improve the safety of user's operation and improve the efficiency of authentication.
Preferably, it in the above embodiments of the present application, is found and terminal device binding executing step S30 terminal device
Intelligence is tatooed before equipment, can also include that step is implemented as follows:
Step S101 can obtain the User Identity of terminal device 30 by the server 50 in Fig. 2.
Step S103 can obtain the tatoo intelligence of equipment 10 of intelligence by the server 50 in Fig. 2 and tatoo mark, and
The digital signature for mark of intelligently tatooing.
Step S105 can be signed by the server 50 in Fig. 2 using number of the identifying algorithm to intelligent mark of tatooing
Name carries out sign test, if sign test success, the User Identity of above-mentioned terminal device 30 and above-mentioned intelligence are tatooed equipment 10
Intelligence mark of tatooing bound, and record the User Identity of terminal device and the tatoo intelligence of equipment of intelligence is tatooed mark
Corresponding relationship between knowledge.
Above-mentioned server 50, equipment 10 of tatooing respectively with intelligence and terminal device 30 establish correspondence, above-described embodiment
Two step S101 to step S105 can provide one kind, create in the server and keep intelligence tatoo equipment and terminal device it
Between user's binding information scheme.User is tatooed the operation whether before safety of device authentication terminal device using intelligence,
Need the intelligence by equipment of intelligently tatooing tatoo identify the User Identity ID of ID and terminal device server (for example, with
It is related to the sensitive operation of the safety operations with sensibility such as Modify password, equipment transfer, critical data transaction in special disposal
Server) on bound, the tatoo intelligence of equipment of intelligence can be stored in the form of tables of data and tatoos and identifies ID and terminal
The User Identity ID and the corresponding relationship between them of equipment.Herein it should be noted that the sensitive operation server
The sensitive operation system of offer may include following function: be responsible for saving the guarantor of the User Identity information of each terminal device
It deposits;The binding relationship of storage User Identity information and intelligent identification information of tatooing;It is responsible for executing user's sensitive operation, certification
User identity.
Preferably, it tatoos the safety of mark to improve the intelligence got equipment transmission intelligence of tatooing, in the application
The scheme of stating, which additionally provides, a kind of to be received the tatoo intelligence of equipment transmission of intelligence in server and tatoos mark and intelligence is tatooed mark
Digital signature after, to above-mentioned intelligence tatoo mark carry out sign test function, the intelligence that only sign test passes through tatoo equipment
It can be bound with corresponding terminal device.
For example, active user needs a known intelligence tatooing apparatus bound into the terminal device held, it is first
First, user can by network by the intelligence for equipment of intelligently tatooing tatoo mark and voucher (i.e. digital signature) be sent collectively to it is quick
Feel operating system, sensitive operation system is set terminal in verifying by identifying algorithm verifying intelligent tatoo mark and Service Ticket
The tatoo intelligence mark of tatooing of equipment of standby User Identity ID and intelligence is bound, and binding relationship is stored in currently
Sensitive operation system in.
Preferably, in order to improve the safety of system, the application above-mentioned tests intelligence equipment of tatooing in addition to that can provide
Card process can also be further provided for currently needing the terminal device bound to carry out authentication, due to terminal device
Correspondence is established with server (such as sensitive operation server), therefore, can be used between terminal device and server
The modes such as short message verification code, static password authenticate the user identity of terminal device, after authenticating successfully, can execute terminal
The tatoo intelligence mark of tatooing of equipment of the User Identity ID of equipment and intelligence is bound.
It is above-mentioned to currently need the terminal device bound carry out authentication during, above-mentioned certification can be not only provided
Process, can also information format to the user identity being currently received and content test, for example, subscriber identity information
Format content only includes text formatting and/or number format, if detecting that the format for the information being currently received further includes spy
Different character or other, then illustrate that current user identities information is wrong.The process can be applied recognizes in the user identity of terminal device
Before card, it can also be executed after the user identity authentication of terminal device.
Herein it should be further noted that in the above embodiments of the present application, root can be done directly in terminal device
According to function of the acquisition of information to safety verification result of intelligently tatooing.In order to reduce the processing load and system peace of terminal device
Quan Xing, can also be above-mentioned according to function of the acquisition of information to safety verification result of intelligently tatooing by completing in conjunction with third party device
Can, it determines whether to execute the function that the safety operation that terminal device issues instructs corresponding safety operation.Third herein
Method, apparatus can be a server, and the tatoo intelligence of equipment of the User Identity and intelligence for saving terminal device is tatooed
Corresponding relationship between mark.It is just described in detail below using terminal device combination third party device as example, it at least can be with
Including the following two kinds embodiment:
In the first optional embodiment, tatoo in the User Identity for saving terminal device by server with intelligence
The intelligence of equipment tatoo mark between corresponding relationship application scenarios in, as shown in figure 4, above-mentioned steps S34, terminal device root
Tatoo acquisition of information to safety verification result according to intelligence, it is determined whether execute the safety operation that terminal device issues instruct it is corresponding
The step of safety operation may include that step is implemented as follows:
Step S401a, terminal device will intelligently tatoo information and safety operation instruction be sent to server.Preferably, should
Before step executes, terminal device can acquire the tatoo intelligence of equipment of intelligence and tatoo information, and acquisition mode may include: network
Transmission, equipment scanning, user's input etc..Wherein, safety operation instruction, which can be, is related to Modify password, equipment transfer, crucial number
Sensitive operation according to transaction etc. with sensibility.
Step S403a, terminal device receive the operation data of the safety operation of server return, wherein in server
In the case where detecting that intelligence tatoos information including at least intelligent mark of tatooing, safety verification result is that intelligent information of tatooing passes through
Verifying, and execute safety operation and instruct corresponding safety operation, generate operation data.
In above-mentioned steps S403a, due to stored in server be terminal device User Identity with intelligence tatoo
The intelligence of equipment is tatooed the corresponding relationship between mark, therefore, when the intelligence that server receives terminal device transmission is tatooed letter
After breath and safety operation instruction, mark that the main intelligence received by comparison tatoos information and stored intelligence is tatooed
Safety verification is determined as a result, information can tatoo with the intelligence being saved and identify identical at this point, intelligence is tatooed, is also possible to
As long as tatooing the information of mark including intelligence, so that it may determine that current intelligence information of tatooing passes through verifying.In letter of intelligently tatooing
After breath is by verifying, server can execute safety operation and instruct corresponding safety operation.
In second of alternative embodiment, as shown in figure 5, by server save terminal device User Identity with
Intelligence tatoo equipment intelligence tatoo mark between corresponding relationship application scenarios in, above-mentioned steps S34, terminal device according to
Intelligence tatoos acquisition of information to safety verification result, it is determined whether executes the corresponding peace of safety operation instruction that terminal device issues
The step of full operation includes:
Information of intelligently tatooing is sent to server by step S401b, terminal device.Preferably, step S401b executes it
Before, the tatoo intelligence of equipment of terminal device acquisition intelligence is tatooed information, acquisition mode may include: network transmission, equipment scanning,
User's input etc..Wherein, safety operation instruction, which can be, is related to Modify password, equipment transfer, critical data transaction etc. with quick
The sensitive operation of perception.
Step S403b, terminal device obtain the safety verification result that server returns, wherein detect intelligence in server
In the case that the information that can tatoo includes at least intelligent mark of tatooing, safety verification result is that intelligent information of tatooing passes through verifying.
In step S403b, since what is stored in server is that the User Identity of terminal device is tatooed and set with intelligence
Standby intelligence is tatooed the corresponding relationship between mark, therefore, when the intelligence that server receives terminal device transmission is tatooed information
After safety operation instruction, mainly tatoo information by comparing the intelligence that receives and stored intelligence tatoo identify come
Safety verification is determined as a result, information identifies the identical or intelligence line tatooing with the intelligence being saved at this point, intelligence is tatooed
As long as body information includes that intelligence is tatooed the information of mark, so that it may determine that current intelligence information of tatooing passes through verifying.In intelligence
After information of tatooing is by verifying, server can execute safety operation and instruct corresponding safety operation.
Step S405b, in the case where safety verification result is that intelligence tatoos information by verifying, terminal device will be safe
Operational order is sent to server.
Step S407b, terminal device receive the operation data of the safety operation of server return, wherein server is held
Row safety operation instructs corresponding safety operation, generates operation data.
Herein it should be noted that the server provided in above two embodiment can be sensitive operation server,
Sensitive operation service can verify intelligent information of tatooing, and in the case where being verified, be submitted according to the user of terminal device
Sensitive operation information carry out sensitive operation.
And the difference of above two embodiment is, in the scheme that the first embodiment provides, terminal device will
Information of intelligently tatooing and safety operation instruct while being sent to server, after server receives above- mentioned information, first to intelligence
The information that can tatoo is verified, when obtained safety verification result is server in the case that intelligence tatoos information by verifying
It executes safety operation and instructs corresponding safety operation, generate operation data, and operation data is returned into terminal device.
And in the scheme that second of embodiment provides, collected intelligence information of tatooing first is sent to by terminal device
Server is verified, and can just be instructed safety operation after being verified and is sent to server, generate corresponding operation data.
Second of embodiment, which compares the first embodiment, can reduce burden in network transmission process, save Internet resources.
In summary, the above system embodiment two provided by the present application can be applied and need to be implemented more sensitive operation
The terminal device of (such as consumption in game application, transfer accounts, shift the operational orders such as game article), is tatooed by using intelligence
The intelligence that equipment provides tatoos information to determine the user identity of the terminal device bound therewith (such as computer, mobile phone etc.), into
And determine whether to carry out the Client-initiated sensitive operation of terminal device, guarantee the safety of the user's operation of terminal device.
It avoids user and is stolen and bring the loss of money, privacy after password to user.
It should be noted that for the various method embodiments described above, for simple description, therefore, it is stated as a series of
Combination of actions, but those skilled in the art should understand that, the present invention is not limited by the sequence of acts described because
According to the present invention, some steps may be performed in other sequences or simultaneously.Secondly, those skilled in the art should also know
It knows, the embodiments described in the specification are all preferred embodiments, and related actions and modules is not necessarily of the invention
It is necessary.
Through the above description of the embodiments, those skilled in the art can be understood that according to above-mentioned implementation
The method of example can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but it is very much
In the case of the former be more preferably embodiment.Based on this understanding, technical solution of the present invention is substantially in other words to existing
The part that technology contributes can be embodied in the form of software products, which is stored in a storage
In medium (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal device (can be mobile phone, calculate
Machine, server or network equipment etc.) execute method described in each embodiment of the present invention.
Embodiment 3
In its most basic configuration, Fig. 6 is according to embodiments of the present invention three to be tested based on the tatoo identity of equipment of intelligence
The structural schematic diagram of card device.For purposes of illustration, the device architecture drawn is only an example of proper environment, and
Non- use scope or function to the application proposes any limitation.Also the computing system should not be construed to shown in fig. 6
One component or combinations thereof has any dependence or demand.
Device provided by the above embodiments of the present application can be run on terminal device 30 as shown in Figure 1, such as Fig. 6 institute
Show, the apparatus may include: a search module 61, one obtains module 63, a processing module 65.
Wherein, search module 61, for the intelligence with terminal device binding can be found by the terminal device 30 in Fig. 1
Can tatoo equipment, wherein tatooed by the intelligence of the User Identity and equipment of intelligently tatooing of establishing terminal device and identify it
Between corresponding relationship, tatoo equipment to bind terminal device and intelligence;Module 63 is obtained, for the terminal in Fig. 1 can be passed through
Equipment 30 is tatooed information to obtain the tatoo intelligence of equipment transmission of intelligence;Processing module 65, for the terminal in Fig. 1 can be passed through
Equipment 30 tatoos acquisition of information to safety verification result according to intelligence, it is determined whether executes the safety operation of terminal device sending
Instruct corresponding safety operation, wherein in the case where safety verification result is that intelligence tatoos information by verifying, execute safety
The corresponding safety operation of operational order.
Intelligence of the above-mentioned apparatus embodiment in equipment 10 of tatooing is responsible for establishing connection with the terminal device 30 of user and goes forward side by side
Row interaction provides identity information for terminal device 30.Terminal device 30 is to establish correspondence with intelligence equipment 10 of tatooing, can be with
It is the equipment that user carries out sensitive operation,
In the above embodiments of the present application three, tatooed equipment 10 by binding corresponding intelligence for terminal device 30, so that with
Family carries out various operations in registration terminal equipment (to be had quick more particularly, to Modify password, equipment transfer, critical data transaction etc.
The safety operation of perception) before, it needs to tatoo equipment using the intelligence with present terminal apparatus bound to carry out additional authentication, it is main
Verify the legitimacy of the user identity of current registration terminal equipment.Since intelligent equipment of tatooing is that one kind can be attached to human body skin
Equipment with its unique intelligent information of tatooing on skin, provides energy by human body, and have logical by bluetooth, wireless network etc.
Letter mode and terminal device (such as electronic equipment of mobile terminal, compunlcation etc.), therefore, equipment of intelligently tatooing can characterize
The exact identity information of active user.It is easily noted that, tatoos equipment since terminal device is bundled with an intelligence, so that when be
System is found tatoos equipment with the intelligence of terminal device binding, and get intelligence tatoo equipment transmission intelligence tatoo information it
Afterwards, device end can tatoo acquisition of information to safety verification as a result, the safety verification result can determine currently according to intelligence
Whether the user of registration terminal equipment is legal, and whether the system that may thereby determine that can continue to execute the safety of terminal device sending
The corresponding safety operation of operational order, at this point, if safety verification result is in the case that intelligence tatoos information by verifying, to be
System can permit active user's using terminal equipment and trigger the corresponding safety operation of safety operation instruction, wherein system can
With by the User Identity for establishing terminal device and intelligence tatoo equipment intelligence tatoo mark between corresponding relationship, come
Binding terminal device and intelligent equipment of tatooing.
It follows that scheme provided by the embodiment of the present invention three can be applied in online game or payment system
In, since the tatoo intelligence information of tatooing of equipment offer of intelligence can be used as one and only belong to the voucher of a user and proves to use
The data of the legitimacy at family, therefore, the equipment that can tatoo by using intelligence carry out the login user of additional authentication terminal device
Legitimacy.I.e. the invention proposes a kind of tatoos equipment based on intelligence to verify the identity for the user for logging in present terminal equipment
Method reduces the input operation of user since verification process does not need that the information such as user name, password are manually entered, therefore,
Can it is quick, efficiently, easily the reliability of the identity of the user of using terminal equipment is confirmed on the basis of, also improve
The speed of verifying, to improve the safety of user's operation and improve the efficiency of authentication.
From the foregoing, it will be observed that above-mentioned search module 61, acquisition module 63, processing module 65 correspond to the step in embodiment two
S30 to step S34, three modules are identical as example and application scenarios that corresponding step is realized, but are not limited to above-mentioned implementation
Two disclosure of that of example.It is provided it should be noted that above-mentioned module may operate in embodiment one as a part of device
Terminal device 30 in, hardware realization can also be passed through by software realization.
Preferably, it in the above embodiments of the present application, finds in above-mentioned search module 61 execution terminal device and is set with terminal
The intelligence of standby binding is tatooed before equipment, and the equipment 10 that can also be tatooed by the intelligence in Fig. 1 is realized: first obtain module,
For obtaining the User Identity of terminal device and the digital signature of User Identity;Second obtains module, for obtaining
The tatoo intelligence of equipment of intelligence is tatooed mark;Sign test module, for using identifying algorithm to the digital signature of User Identity
Sign test is carried out, if sign test success, the tatoo intelligence of equipment of the User Identity of terminal device and intelligence is tatooed mark
It is bound, and records the User Identity of terminal device and intelligence and tatoo intelligence corresponding the closing of tatooing between mark of equipment
System.
Herein it should be noted that above-mentioned first obtains module, the second acquisition module, sign test module corresponding to embodiment two
In step S101 to step S105, the example and application scenarios that three modules and corresponding step are realized be identical but unlimited
In two disclosure of that of above-described embodiment.It should be noted that above-mentioned module may operate in reality as a part of device
The intelligence for applying the offer of example one is tatooed in equipment 10, can also pass through hardware realization by software realization.
In a kind of optional embodiment provided by the present application, the user identity mark of terminal device can be saved by server
Know and intelligence tatoo equipment intelligence tatoo mark between corresponding relationship, it is preferable that as shown in fig. 7, above-mentioned processing module 65
It may include: the first sending module 701 and the first receiving module 702.
First sending module 701, for will intelligently tatoo information and safety operation instruction be sent to server.
First receiving module 702, the operation data of the safety operation for receiving server return, wherein servicing
In the case that device detects that intelligence tatoos information including at least intelligent mark of tatooing, safety verification result is that intelligent information of tatooing is logical
Verifying is crossed, and executes safety operation and instructs corresponding safety operation, generates operation data.
Herein it should be noted that above-mentioned first sending module 701 and the first receiving module 702 correspond in embodiment two
Step S401a to step S403a, the example and application scenarios that two modules and corresponding step are realized be identical but unlimited
In two disclosure of that of above-described embodiment.It should be noted that above-mentioned module may operate in reality as a part of device
In the terminal device 30 that the offer of example one is provided, hardware realization can also be passed through by software realization.
In an alternative embodiment provided by the present application, the user identity of terminal device can be saved by server
Mark and intelligence tatoo equipment intelligence tatoo mark between corresponding relationship, it is preferable that as shown in figure 8, above-mentioned processing module
65 may include: the second sending module 801, sub-acquisition module 803, third sending module 805 and the second receiving module 807.
Second sending module 801, for information of intelligently tatooing to be sent to server.
Sub-acquisition module 803, for obtaining the safety verification result of server return, wherein detect intelligence in server
In the case that the information that can tatoo includes at least intelligent mark of tatooing, safety verification result is that intelligent information of tatooing passes through verifying.
Third sending module 805, for will pacify in the case where safety verification result is that intelligence tatoos information by verifying
Full operation instruction is sent to server.
Second receiving module 807, the operation data of the safety operation for receiving server return, wherein server
It executes safety operation and instructs corresponding safety operation, generate operation data.
Herein it should be noted that above-mentioned second sending module 801, sub-acquisition module 803,805 and of third sending module
Second receiving module 807 corresponds to the step S401b to step S407b in embodiment two, four modules and corresponding step institute
The example of realization is identical with application scenarios, but is not limited to the above embodiments two disclosure of that.It should be noted that above-mentioned mould
Block is may operate in as a part of device in the terminal device 30 of the offer of embodiment one, can be by software realization, can also
To pass through hardware realization.
Embodiment 4
The application can also provide another system embodiment shown in Fig. 9, and Fig. 9 is according to embodiments of the present invention four base
In the structural schematic diagram of the authentication system for equipment of intelligently tatooing.For purposes of illustration, the architecture drawn is only to close
One example of suitable environment, not proposes any limitation to the use scope of the application or function.It also should not be by the computing system
It is construed to that there is any dependence or demand to any component shown in Fig. 9 or combinations thereof.
As shown in figure 9, the authentication system based on intelligent equipment of tatooing that the embodiment of the present application four provides may include:
Intelligence is tatooed equipment 90, terminal device 92 and server 94.
Wherein, it intelligently tatoos equipment 90, tatoos information for generating intelligence;Terminal device 92, with intelligent equipment 90 of tatooing
Correspondence is established, for being tatooed after equipment with the intelligence of terminal device binding finding, intelligence is obtained and tatoos equipment biography
The intelligence sent is tatooed information;Server 94 establishes correspondence with terminal device 92, for receiving the intelligence of terminal device transmission
The information that can tatoo and safety operation instruction, are verified to intelligent information of tatooing, after generating safety verification result, according to peace
Full verification result, it is determined whether execute the safety operation that terminal device issues and instruct corresponding safety operation, wherein tested in safety
Card result is in the case that intelligence tatoos information by verifying, to execute safety operation and instruct corresponding safety operation, generate operation
Data.
In the above embodiments of the present application four, tatooed equipment by binding corresponding intelligence for terminal device, so that user exists
Registration terminal equipment, which carries out various operations, (has sensibility more particularly, to Modify password, equipment transfer, critical data transaction etc.
Safety operation) before, need to tatoo equipment using the intelligence with present terminal apparatus bound to carry out additional authentication, mainly test
Demonstrate,prove the legitimacy of the user identity of current registration terminal equipment.Since intelligent equipment of tatooing is that one kind can be attached on human skin
Equipment with its unique intelligent information of tatooing provides energy by human body, and has through communication parties such as bluetooth, wireless networks
Formula and terminal device (such as electronic equipment of mobile terminal, compunlcation etc.), therefore, equipment of intelligently tatooing can characterize currently
The exact identity information of user.It is easily noted that, tatoos equipment since terminal device is bundled with an intelligence, so that when system is looked into
Find and tatoo equipment with the intelligence of terminal device binding, and terminal device acquisition intelligence tatoo equipment intelligence tatoo information it
Afterwards, the intelligence that terminal device transmission can be received by server is tatooed information and safety operation instruction, and to intelligent line
Body information is verified, and generates safety verification as a result, since the safety verification result can determine current registration terminal equipment
Whether user is legal, so that server can be according to safety verification as a result, setting to determine whether system can continue to execute terminal
The safety operation that preparation goes out instructs corresponding safety operation, at this point, if safety verification result is that intelligence tatoos information by testing
In the case where card, system can permit active user's using terminal equipment and trigger the corresponding safety behaviour of safety operation instruction
Make, wherein system can be tatooed by the intelligence of the User Identity and equipment of intelligently tatooing of establishing terminal device and identify it
Between corresponding relationship, tatoo equipment to bind terminal device and intelligence.
It follows that scheme provided by the embodiment of the present invention four can be applied in online game or payment system
In, since the tatoo intelligence information of tatooing of equipment offer of intelligence can be used as one and only belong to the voucher of a user and proves to use
The data of the legitimacy at family, therefore, the equipment that can tatoo by using intelligence carry out the login user of additional authentication terminal device
Legitimacy.I.e. the invention proposes a kind of tatoos equipment based on intelligence to verify the identity for the user for logging in present terminal equipment
Scheme reduces the input operation of user since verification process does not need that the information such as user name, password are manually entered, therefore,
Can it is quick, efficiently, easily the reliability of the identity of the user of using terminal equipment is confirmed on the basis of, also improve
The speed of verifying, to improve the safety of user's operation and improve the efficiency of authentication.
Preferably, as shown in Figure 10, the server 94 in the above embodiments of the present application four may include: receiving module
1001, processor 1003 and memory 1005.
Reception device 1001, for obtaining the User Identity of terminal device, and the intelligent line of intelligent equipment of tatooing
The digital signature of body mark and intelligent mark of tatooing.
Processor 1003, establishes a connection with reception device, for the number using identifying algorithm to intelligent mark of tatooing
Word signature carries out sign test, if sign test success, by the intelligent line of the User Identity of terminal device and intelligent equipment of tatooing
Body mark bound, and record terminal device User Identity and intelligence tatoo equipment intelligence tatoo mark between
Corresponding relationship.
Memory 1005, establishes a connection with processor, for saving the User Identity and intelligence of terminal device
The intelligence for equipment of tatooing tatoo mark between corresponding relationship.
It follows that the above embodiments of the present application four can provide one kind, in the server storage intelligence tatoo equipment with
The scheme of user's binding information between terminal device.User using intelligence tatoo device authentication terminal device operation whether
Before safety, the intelligence by equipment of intelligently tatooing is needed to tatoo the User Identity ID for identifying ID and terminal device in server
(for example, being related to the safety operations with sensibility such as Modify password, equipment transfer, critical data transaction for special disposal
Sensitive operation server) on bound, the tatoo intelligence of equipment of intelligence can be stored in the form of tables of data and is tatooed mark
The User Identity ID and the corresponding relationship between them of ID and terminal device.Herein it should be noted that the sensitivity is grasped
The sensitive operation system for making server offer may include following function: be responsible for saving the User Identity of each terminal device
The preservation of information;The binding relationship of storage User Identity information and intelligent identification information of tatooing;It is responsible for executing user's sensitivity
Operation, certification user identity.
Preferably, it tatoos the safety of mark to improve the intelligence got equipment transmission intelligence of tatooing, in the application
The scheme of stating, which additionally provides, a kind of to be received the tatoo intelligence of equipment transmission of intelligence in server and tatoos mark and intelligence is tatooed mark
Digital signature after, to above-mentioned intelligence tatoo mark carry out sign test function, the intelligence that only sign test passes through tatoo equipment
It can be bound with corresponding terminal device.
For example, active user needs a known intelligence tatooing apparatus bound into the terminal device held, it is first
First, user can by network by the intelligence for equipment of intelligently tatooing tatoo mark and voucher (i.e. digital signature) be sent collectively to it is quick
Feel operating system, sensitive operation system is set terminal in verifying by identifying algorithm verifying intelligent tatoo mark and Service Ticket
The tatoo intelligence mark of tatooing of equipment of standby User Identity ID and intelligence is bound, and binding relationship is stored in currently
Sensitive operation system in.
Herein it should be further noted that being related to each preferred embodiment and reality in the above embodiments of the present application four
Preferred embodiment and the application scenarios implementation process for applying the offer of example one are identical, but not limited to the examples scheme provided by one.
Embodiment 5
According to embodiments of the present invention, the implementation of another auth method based on intelligent equipment of tatooing is additionally provided
Example, it should be noted that step shown in the flowchart of the accompanying drawings can be in the calculating of such as a group of computer-executable instructions
It is executed in machine system, although also, logical order is shown in flow charts, and it in some cases, can be to be different from
Sequence herein executes shown or described step.
Figure 11 is the flow diagram of according to embodiments of the present invention five auth method based on intelligent equipment of tatooing.
Method provided by the above embodiments of the present application five can be run on server 94.As shown in figure 11, the application
The auth method based on intelligent equipment of tatooing that embodiment five provides may include that step is implemented as follows:
Step S1101, the intelligence that terminal device transmission can be received by server 94 provided by Figure 10 are tatooed
Information and safety operation instruction.
Step S1103 can verify intelligent information of tatooing by server 94 provided by Figure 10, generate peace
Full verification result;
Step S1105, can be by server 94 provided by Figure 10 come according to safety verification result, it is determined whether executes
The safety operation that terminal device issues instructs corresponding safety operation, wherein logical for intelligent information of tatooing in safety verification result
In the case where crossing verifying, executes safety operation and instruct corresponding safety operation, generate operation data.
The step S1101 to step S1105 provided in the above embodiments of the present application five may be implemented, by for terminal device
Corresponding intelligence is bound to tatoo equipment so that user registration terminal equipment carry out various operations (more particularly, to Modify password,
Equipment transfer, critical data transaction etc. with sensibility safety operation) before, need using with present terminal apparatus bound
Intelligence tatoos equipment to carry out additional authentication, mainly verifies the legitimacy of the user identity of current registration terminal equipment.Due to intelligence
The equipment that can tatoo is a kind of equipment that can be attached to its unique intelligent information of tatooing on human skin, provides energy by human body
Amount, and have that (such as the electronics of mobile terminal, compunlcation is set by the communication modes such as bluetooth, wireless network and terminal device
It is standby etc.), therefore, equipment of intelligently tatooing can characterize the exact identity information of active user.It is easily noted that, due to terminal device
An intelligence is bundled with to tatoo equipment, so that when system searching to the intelligence bound with terminal device is tatooed equipment, and terminal is set
The intelligence of the standby intelligent equipment of tatooing of acquisition is tatooed after information, and the intelligence of terminal device transmission can be received by server
Information of tatooing and safety operation instruction, and intelligent information of tatooing is verified, safety verification is generated as a result, since the safety is tested
Card result can determine whether the user of current registration terminal equipment legal, thus server can according to safety verification as a result,
Corresponding safety operation is instructed to determine whether system can continue to execute the safety operation that terminal device issues, at this point, if
Safety verification result is in the case that intelligence tatoos information by verifying, and system can permit active user's using terminal equipment simultaneously
Trigger the corresponding safety operation of safety operation instruction, wherein system can be by establishing the User Identity of terminal device
It tatoos the corresponding relationship that the intelligence of equipment tatoos between mark with intelligence, tatoos equipment to bind terminal device and intelligence.
It follows that scheme provided by the embodiment of the present invention five can be applied in online game or payment system
In, since the tatoo intelligence information of tatooing of equipment offer of intelligence can be used as one and only belong to the voucher of a user and proves to use
The data of the legitimacy at family, therefore, the equipment that can tatoo by using intelligence carry out the login user of additional authentication terminal device
Legitimacy.I.e. the invention proposes a kind of tatoos equipment based on intelligence to verify the identity for the user for logging in present terminal equipment
Scheme reduces the input operation of user since verification process does not need that the information such as user name, password are manually entered, therefore,
Can it is quick, efficiently, easily the reliability of the identity of the user of using terminal equipment is confirmed on the basis of, also improve
The speed of verifying, to improve the safety of user's operation and improve the efficiency of authentication.
Herein it should be noted that being related to each preferred embodiment and embodiment two in the above embodiments of the present application five
The scheme and application scenarios implementation process of offer are identical, but not limited to the examples scheme provided by two.
Embodiment 6
Figure 12 is the structural schematic diagram of according to embodiments of the present invention six authentication means based on intelligent equipment of tatooing.
Device provided by the above embodiments of the present application can be run on server 94 as shown in Figure 10.
As shown in figure 12, the authentication means provided by the present application based on intelligent equipment of tatooing may include: reception mould
Block 1201, authentication module 1203 and determining module 1205.
Wherein, receiving module 1201, for receive terminal device transmission intelligence tatoo information and safety operation instruction;
Authentication module 1203 generates safety verification result for verifying to intelligent information of tatooing;Determining module 1205 is used for root
According to safety verification result, it is determined whether execute the safety operation that terminal device issues and instruct corresponding safety operation, wherein pacifying
Full verification result is in the case that intelligence tatoos information by verifying, to execute safety operation and instruct corresponding safety operation, generate
Operation data.
In the above embodiments of the present application stream, tatooed equipment by binding corresponding intelligence for terminal device, so that user exists
Registration terminal equipment, which carries out various operations, (has sensibility more particularly, to Modify password, equipment transfer, critical data transaction etc.
Safety operation) before, need to tatoo equipment using the intelligence with present terminal apparatus bound to carry out additional authentication, mainly test
Demonstrate,prove the legitimacy of the user identity of current registration terminal equipment.Since intelligent equipment of tatooing is that one kind can be attached on human skin
Equipment with its unique intelligent information of tatooing provides energy by human body, and has through communication parties such as bluetooth, wireless networks
Formula and terminal device (such as electronic equipment of mobile terminal, compunlcation etc.), therefore, equipment of intelligently tatooing can characterize currently
The exact identity information of user.It is easily noted that, tatoos equipment since terminal device is bundled with an intelligence, so that when system is looked into
Find and tatoo equipment with the intelligence of terminal device binding, and terminal device acquisition intelligence tatoo equipment intelligence tatoo information it
Afterwards, the intelligence that terminal device transmission can be received by server is tatooed information and safety operation instruction, and to intelligent line
Body information is verified, and generates safety verification as a result, since the safety verification result can determine current registration terminal equipment
Whether user is legal, so that server can be according to safety verification as a result, setting to determine whether system can continue to execute terminal
The safety operation that preparation goes out instructs corresponding safety operation, at this point, if safety verification result is that intelligence tatoos information by testing
In the case where card, system can permit active user's using terminal equipment and trigger the corresponding safety behaviour of safety operation instruction
Make, wherein system can be tatooed by the intelligence of the User Identity and equipment of intelligently tatooing of establishing terminal device and identify it
Between corresponding relationship, tatoo equipment to bind terminal device and intelligence.
It follows that scheme provided by the embodiment of the present invention six can be applied in online game or payment system
In, since the tatoo intelligence information of tatooing of equipment offer of intelligence can be used as one and only belong to the voucher of a user and proves to use
The data of the legitimacy at family, therefore, the equipment that can tatoo by using intelligence carry out the login user of additional authentication terminal device
Legitimacy.I.e. the invention proposes a kind of tatoos equipment based on intelligence to verify the identity for the user for logging in present terminal equipment
Scheme reduces the input operation of user since verification process does not need that the information such as user name, password are manually entered, therefore,
Can it is quick, efficiently, easily the reliability of the identity of the user of using terminal equipment is confirmed on the basis of, also improve
The speed of verifying, to improve the safety of user's operation and improve the efficiency of authentication.
Herein it should be further noted that being related to each preferred embodiment and reality in the above embodiments of the present application six
Preferred embodiment and the application scenarios implementation process for applying the offer of example three are identical, but not limited to the examples scheme provided by three.
The serial number of the above embodiments of the invention is only for description, does not represent the advantages or disadvantages of the embodiments.
In the above embodiment of the invention, it all emphasizes particularly on different fields to the description of each embodiment, does not have in some embodiment
The part of detailed description, reference can be made to the related descriptions of other embodiments.
In several embodiments provided herein, it should be understood that disclosed client, it can be by others side
Formula is realized.Wherein, the apparatus embodiments described above are merely exemplary, such as the division of unit, and only one kind is patrolled
Volume function division, there may be another division manner in actual implementation, such as multiple units or components can combine or can be with
It is integrated into another system, or some features can be ignored or not executed.Another point, it is shown or discussed mutual
Coupling, direct-coupling or communication connection can be through some interfaces, the indirect coupling or communication connection of unit or module, can
To be electrically or in the form of others.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit
The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple
In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme
's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit
It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list
Member both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated unit is realized in the form of SFU software functional unit and sells or use as independent product
When, it can store in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially
The all or part of the part that contributes to existing technology or the technical solution can be in the form of software products in other words
It embodies, which is stored in a storage medium, including some instructions are used so that a computer
Equipment (can for personal computer, server or network equipment etc.) execute each embodiment the method for the present invention whole or
Part steps.And storage medium above-mentioned includes: that USB flash disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited
Reservoir (RAM, Random Access Memory), mobile hard disk, magnetic or disk etc. be various to can store program code
Medium.
The above is only a preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art
For member, various improvements and modifications may be made without departing from the principle of the present invention, these improvements and modifications are also answered
It is considered as protection scope of the present invention.