CN101594350A - The verifying E-mail password system and method - Google Patents

The verifying E-mail password system and method Download PDF

Info

Publication number
CN101594350A
CN101594350A CNA2008103017742A CN200810301774A CN101594350A CN 101594350 A CN101594350 A CN 101594350A CN A2008103017742 A CNA2008103017742 A CN A2008103017742A CN 200810301774 A CN200810301774 A CN 200810301774A CN 101594350 A CN101594350 A CN 101594350A
Authority
CN
China
Prior art keywords
user
password
secondary verification
verification password
authentication file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2008103017742A
Other languages
Chinese (zh)
Inventor
孙擎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hongfujin Precision Industry Shenzhen Co Ltd
Hon Hai Precision Industry Co Ltd
Original Assignee
Hongfujin Precision Industry Shenzhen Co Ltd
Hon Hai Precision Industry Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hongfujin Precision Industry Shenzhen Co Ltd, Hon Hai Precision Industry Co Ltd filed Critical Hongfujin Precision Industry Shenzhen Co Ltd
Priority to CNA2008103017742A priority Critical patent/CN101594350A/en
Publication of CN101594350A publication Critical patent/CN101594350A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Information Transfer Between Computers (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

A kind of verifying E-mail password method, this method comprise the steps: to receive ID and the password that the user inputs; Judge whether the ID and the password that are received be legal; When described ID and password are illegal, prompting user cipher authentication error, and withdraw from; Perhaps, visit the user side of this mailbox if described ID and password are legal; Receive the secondary verification password that the user imported; From server database, obtain the user rs authentication file; And when secondary verification password that the user imported is consistent with secondary verification password in the described user rs authentication file, visit this E-mail address; Perhaps when secondary verification password that the user imported and the secondary verification password in the described user rs authentication file are inconsistent, prompting user cipher authentication error.In addition, the present invention also provides a kind of verifying E-mail password system.

Description

The verifying E-mail password system and method
Technical field
The present invention relates to a kind of verifying E-mail password system and method.
Background technology
The authority managing and controlling of a lot of mailboxes is to control by Access Control List (ACL) (ACL, Access Control List).That ACL sets is exactly user's ID, and only open affiliated user ID and the server ID of giving of the reading authority of individual mailbox is because operations such as server need be copied mailbox, compressions.With Lotus Notes for instance,, not only comprise the Notes address in the ID document, also comprise password, private key and voucher etc. because user's ID is archives, and must be installed in user side.The ID archives can arbitrarily duplicate, and separate.Yet ACL only can verify ID, as long as this just means the copy of taking ID and obtain password that even the user has changed password, appropriator can also be opened letter box with the ID that steals on arbitrary computer, obtain secret mail.Can cause losing of vital document like this, the leakage of enterprise's classified papers.
Summary of the invention
In view of above content, be necessary to provide the system of a kind of effective checking E-mail address password.
In view of above content, also be necessary to provide the method for a kind of effective checking E-mail address password.
Described verifying E-mail password system, run on the mail server, this mail server comprises server database, comprise the user rs authentication file in this server database, this user rs authentication file be with user's mailbox ID one to one, store the secondary verification password of this E-mail address in this user rs authentication file, described verifying E-mail password system comprises: receiver module is used to receive ID and the password that the user inputs; Judge module is used to judge whether the ID and the password that are received be legal; Executive Module is used for working as described ID and password is legal, visits the user side of this mailbox; Described receiver module also is used to receive the secondary verification password that the user imports; Acquisition module is used for obtaining the user rs authentication file from server database; Described judge module is used for also judging whether the secondary verification password that the user imports is consistent with the secondary verification password of described user rs authentication file; And described Executive Module, the secondary verification password that also is used for when the user imported is consistent with the secondary verification password of described user rs authentication file, visit this E-mail address, perhaps when above-mentioned ID and password is illegal or the user imported secondary verification password and the secondary verification password in the described user rs authentication file are inconsistent, prompting user cipher authentication error.
Described verifying E-mail password method, this method comprise the steps: to receive ID and the password that the user inputs; Judge whether the ID and the password that are received be legal; When described ID and password are illegal, prompting user cipher authentication error, and withdraw from; Perhaps, visit the user side of this mailbox if described ID and password are legal; Receive the secondary verification password that the user imported; From server database, obtain the user rs authentication file; And when secondary verification password that the user imported is consistent with secondary verification password in the described user rs authentication file, visit this E-mail address; Perhaps when secondary verification password that the user imported and the secondary verification password in the described user rs authentication file are inconsistent, prompting user cipher authentication error.
Compared to prior art, described verifying E-mail password system and method can be verified the password of E-mail address to prevent losing of enterprise-essential mail effectively.
Description of drawings
Fig. 1 is the hardware structure figure of verifying E-mail password of the present invention system preferred embodiment.
Fig. 2 is the functional block diagram of verifying E-mail password system 4 preferred embodiments among Fig. 1.
Fig. 3 is the operation process chart of verifying E-mail password method of the present invention preferred embodiment.
Embodiment
As shown in Figure 1, be the hardware structure figure of verifying E-mail password of the present invention system preferred embodiment.The present invention is applicable to the mailbox that the mailbox authority managing and controlling is controlled by ACL.This verifying E-mail password system 4 runs on the mail server 1, and this mail server 1 is connected in a plurality of personal computers 2.This mail server 1 comprises a server database 3, and this server database 3 is used to store the IP of password, user rs authentication file and described a plurality of personal computer 2 of user's mailbox ID and this ID correspondence.Described user rs authentication file comprises: secondary verification password.Described user rs authentication file also can comprise: allow to open the IP of personal computer of described user's electronic mailbox and the validity date of described secondary verification password, when described E-mail address is a mailbox, when public user is a lot, the described IP that allows to open the personal computer of this E-mail address can be set.The corresponding user rs authentication file of each ID.
As shown in Figure 2, be the functional block diagram of verifying E-mail password system 4 preferred embodiments among Fig. 1.This verifying E-mail password system 4 comprises: acquisition module 10, preservation module 12, receiver module 14, judge module 16 and Executive Module 18.
Acquisition module 10 is used for obtaining the IP of this personal computer 2 when the user logins the E-mail address on personal computer 2.
Preserve module 12 and be used for preserving the IP of described personal computer 2 to server database 3.
Receiver module 14 is used to receive subscriber mailbox ID and the password that the user inputs.
Judge module 16 is used to judge whether the ID and the password that are received be legal, and promptly whether ID that is received and password be identical with the pairing password of this ID of storage in the server database 3.
It is not legal that Executive Module 18 is used to work as the ID and the password that are received, prompting user rs authentication mistake; It is legal also being used to work as the ID and the password that are received, visits the user side of this mailbox.
Described receiver module 14 also is used to receive the secondary verification password that the user imports.
Described acquisition module 10 also is used for obtaining the user rs authentication file from server database 3.
Described judge module 16 is used for also judging whether the secondary verification password that the user imports is consistent with the secondary verification password of described user rs authentication file.When recording the IP of the personal computer that allows to land described E-mail address in the described user rs authentication file, this judge module 16 is used for also judging whether the IP that acquisition module 10 is obtained exists at described user rs authentication file.
Whether consistent with the secondary verification password of described user rs authentication file described Executive Module 18 also be used for the secondary verification password imported as the user when, visit this E-mail address, also being used for working as the IP that obtained is when existing at described user rs authentication file, visits this E-mail address.
This judge module 16 also is used for when described user rs authentication file is provided with the validity date of secondary verification password, judges whether secondary verification password that described user imports exceeds the validity date of this secondary verification password.
Described Executive Module 18 also is used for when described secondary verification password exceeds the validity date of this secondary verification password, this secondary verification password of prompting user's modification, when described secondary verification password does not exceed the validity date of this secondary verification password, visit this E-mail address.
As shown in Figure 3, be the operation process chart of verifying E-mail password method of the present invention preferred embodiment.
Step S30, when the user logined mailbox on personal computer 2, acquisition module 10 obtained the IP of this personal computer 2.
Step S32 preserves module 12 and preserves the IP of described personal computer 2 to server database 3.
Step S34, receiver module 14 receives subscriber mailbox ID and the password that the user inputed.
Step S36, judge module 16 judge whether the ID and the password that are received legal, promptly ID that is received and password whether with server database 3 in storage this ID with and pairing password identical.
Step S38, when the ID that is received and password are legal, the user side of Executive Module 18 these mailboxes of visit.
Step S40, described receiver module 14 receives the secondary verification password that the user imported.
Step S42, described acquisition module 10 obtains the user rs authentication file from server database 3.
Step S44, described judge module 16 judge that secondary verification password that the user imports is whether consistent with secondary verification password in the described user rs authentication file.If secondary verification password that the user imported is consistent with secondary verification password in the user rs authentication file, Executive Module 18 is visited these E-mail addresses.
Step S46, when recording the IP of the personal computer that allows to land described E-mail address in the described user rs authentication file, this judge module 16 is used for also judging whether the IP that acquisition module 10 is obtained exists at described user rs authentication file, when the IP that is obtained exists in described user rs authentication file, described Executive Module 18 these E-mail addresses of visit.
Step S48, when being provided with the validity date of secondary verification password in the described user rs authentication file, judge module 16 judges whether secondary verification password that described user imports exceeds the validity date of this secondary verification password, when described secondary verification password does not exceed validity date of this secondary verification password, described Executive Module 18 these E-mail addresses of visit.
Step S50, when described secondary verification password exceeds validity date of this secondary verification password, described Executive Module 18 these secondary verification password of prompting user's modification, and after revising this secondary verification password this E-mail address of visit.
Step S52, in above-mentioned steps S36, when the ID that is received and password illegal, Executive Module 18 prompting user rs authentication mistakes.
In above-mentioned steps S44,, go to step S52 if when secondary verification password that the user imported and the secondary verification password in the described user rs authentication file are inconsistent.
In above-mentioned steps S46,, go to step S52 in described user rs authentication file if the IP that is obtained does not exist.
It should be noted last that, above embodiment is only unrestricted in order to technical scheme of the present invention to be described, although the present invention is had been described in detail with reference to preferred embodiment, those of ordinary skill in the art is to be understood that, can make amendment or be equal to replacement technical scheme of the present invention, and not break away from the spirit and scope of technical solution of the present invention.

Claims (8)

1. verifying E-mail password system, run on the mail server, this mail server comprises server database, it is characterized in that, comprise the user rs authentication file in this server database, this user rs authentication file be with user's mailbox ID one to one, store the secondary verification password of this E-mail address in this user rs authentication file, described verifying E-mail password system comprises:
Receiver module is used to receive ID and the password that the user inputs;
Judge module is used to judge whether the ID and the password that are received be legal;
Executive Module is used for working as described ID and password is legal, visits the user side of this mailbox;
Described receiver module also is used to receive the secondary verification password that the user imports;
Acquisition module is used for obtaining the user rs authentication file from server database;
Described judge module is used for also judging whether the secondary verification password that the user imports is consistent with the secondary verification password of described user rs authentication file; And
Described Executive Module, the secondary verification password that also is used for when the user imported is consistent with the secondary verification password of described user rs authentication file, visit this E-mail address, perhaps when above-mentioned ID and password is illegal or the user imported secondary verification password and the secondary verification password in the described user rs authentication file are inconsistent, prompting user cipher authentication error.
2. verifying E-mail password as claimed in claim 1 system is characterized in that, described acquisition module also is used to obtain the IP of the personal computer of this mailbox that the user lands.
3. verifying E-mail password as claimed in claim 2 system, it is characterized in that, described judge module, also be used for when described user rs authentication file records the IP of the personal computer that allows to land described E-mail address, judge further whether the IP that is obtained exists in described user rs authentication file; And
Described Executive Module also is used for working as the IP that obtained when described user rs authentication file exists, and visits this E-mail address, when perhaps working as the IP that is obtained and in described user rs authentication file, not existing, and prompting user cipher authentication error.
4. verifying E-mail password as claimed in claim 1 system, it is characterized in that, described judge module also is used for when described user rs authentication file is provided with the validity date of secondary verification password, and whether the secondary verification password of further judging described user and being imported exceeds the validity date of this secondary verification password; And
Described Executive Module, also be used for surpassing described two-pass cipher during validity date when described secondary verification password, revise this secondary verification password, and behind the modification password, visit this E-mail address, perhaps surpass described two-pass cipher during validity date when described secondary verification password, visit this E-mail address.
5. a verifying E-mail password method is characterized in that, this method comprises the steps:
Receive ID and password that the user inputed;
Judge whether the ID and the password that are received be legal;
When described ID and password are illegal, prompting user cipher authentication error, and withdraw from; Perhaps
If described ID and password are legal, visit the user side of this mailbox;
Receive the secondary verification password that the user imported;
From server database, obtain the user rs authentication file; And
When secondary verification password that the user imported is consistent with secondary verification password in the described user rs authentication file, visit this E-mail address; Perhaps
When secondary verification password that the user imported and the secondary verification password in the described user rs authentication file are inconsistent, prompting user cipher authentication error.
6. verifying E-mail password method as claimed in claim 5 is characterized in that, also comprises before described step reception ID that the user inputed and password:
Obtain the IP of the personal computer of this mailbox that the user lands.
7. verifying E-mail password method as claimed in claim 6 is characterized in that, when secondary verification password that the user imported was consistent with secondary verification password in the described user rs authentication file, this method also comprised:
When recording the IP of the personal computer that allows to land described E-mail address in the described user rs authentication file, judge further whether the IP that is obtained exists in described user rs authentication file; And
If the IP that is obtained exists, visit this E-mail address in described user rs authentication file; Perhaps
If the IP that is obtained does not exist in described user rs authentication file, prompting user cipher authentication error.
8. verifying E-mail password method as claimed in claim 5 is characterized in that, when secondary verification password that the user imported was consistent with secondary verification password in the described user rs authentication file, this method also comprised:
When being provided with the validity date of secondary verification password in the described user rs authentication file, whether the secondary verification password of further judging described user and being imported exceeds the validity date of this secondary verification password; And
When described secondary verification password does not surpass described two-pass cipher during validity date, visit this E-mail address; Perhaps
When described secondary verification password surpasses described two-pass cipher during validity date, revise this secondary verification password, this E-mail address of visit behind the modification password.
CNA2008103017742A 2008-05-26 2008-05-26 The verifying E-mail password system and method Pending CN101594350A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA2008103017742A CN101594350A (en) 2008-05-26 2008-05-26 The verifying E-mail password system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA2008103017742A CN101594350A (en) 2008-05-26 2008-05-26 The verifying E-mail password system and method

Publications (1)

Publication Number Publication Date
CN101594350A true CN101594350A (en) 2009-12-02

Family

ID=41408793

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2008103017742A Pending CN101594350A (en) 2008-05-26 2008-05-26 The verifying E-mail password system and method

Country Status (1)

Country Link
CN (1) CN101594350A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102025506A (en) * 2010-12-20 2011-04-20 中国联合网络通信集团有限公司 User authentication method and device
CN102204194A (en) * 2011-05-11 2011-09-28 华为技术有限公司 Method and system for sharing files
CN103166924A (en) * 2011-12-14 2013-06-19 中国银联股份有限公司 Security information interactive system and security information interactive method based on characteristic parameters
WO2016019535A1 (en) * 2014-08-06 2016-02-11 深圳市银信网银科技有限公司 Mailbox payment method and mailbox payment system
WO2017071496A1 (en) * 2015-10-26 2017-05-04 阿里巴巴集团控股有限公司 Method and device for realizing session identifier synchronization
CN106874738A (en) * 2017-01-25 2017-06-20 广东欧珀移动通信有限公司 The response method and mobile terminal of a kind of touch control operation

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102025506A (en) * 2010-12-20 2011-04-20 中国联合网络通信集团有限公司 User authentication method and device
CN102204194A (en) * 2011-05-11 2011-09-28 华为技术有限公司 Method and system for sharing files
WO2011124168A2 (en) * 2011-05-11 2011-10-13 华为技术有限公司 Method and system for sharing files
WO2011124168A3 (en) * 2011-05-11 2012-04-12 华为技术有限公司 Method and system for sharing files
CN102204194B (en) * 2011-05-11 2014-05-07 华为技术有限公司 Method and system for sharing files
CN103166924A (en) * 2011-12-14 2013-06-19 中国银联股份有限公司 Security information interactive system and security information interactive method based on characteristic parameters
CN103166924B (en) * 2011-12-14 2017-11-03 中国银联股份有限公司 The security information interaction system and method for feature based Parameter analysis
WO2016019535A1 (en) * 2014-08-06 2016-02-11 深圳市银信网银科技有限公司 Mailbox payment method and mailbox payment system
WO2017071496A1 (en) * 2015-10-26 2017-05-04 阿里巴巴集团控股有限公司 Method and device for realizing session identifier synchronization
US10719602B2 (en) 2015-10-26 2020-07-21 Alibaba Group Holding Limited Method and device for realizing session identifier synchronization
CN106874738A (en) * 2017-01-25 2017-06-20 广东欧珀移动通信有限公司 The response method and mobile terminal of a kind of touch control operation
CN106874738B (en) * 2017-01-25 2020-03-17 Oppo广东移动通信有限公司 Response method for touch operation and mobile terminal

Similar Documents

Publication Publication Date Title
US5774552A (en) Method and apparatus for retrieving X.509 certificates from an X.500 directory
US10313136B2 (en) Method and a system for verifying the authenticity of a certificate in a web browser using the SSL/TLS protocol in an encrypted internet connection to an HTTPS website
US8635671B2 (en) Systems and methods for a security delegate module to select appropriate security services for web applications
Tardo et al. SPX: Global authentication using public key certificates
US8392702B2 (en) Token-based management system for PKI personalization process
US10754826B2 (en) Techniques for securely sharing files from a cloud storage
CN102420690B (en) Fusion and authentication method and system of identity and authority in industrial control system
CN107493174B (en) SSL certificate intelligent binding and management method based on CDN
US8844009B2 (en) Resilient device authentication system
CN102546664A (en) User and authority management method and system for distributed file system
EP2047646B1 (en) Method and system for electronic delivery of essential mail items
CN103109298A (en) Authentication collaboration system and id provider device
CN103384198B (en) A kind of authenticating user identification method of servicing based on mailbox and system
US20140075524A1 (en) System and method to establish and use credentials for a common lightweight identity through digital certificates
CN101321064A (en) Information system access control method and apparatus based on digital certificate technique
CN101594350A (en) The verifying E-mail password system and method
CN101202737B (en) Method and system for managing third party mail account
US9154310B1 (en) Resilient device authentication system
US20090094460A1 (en) Method and system for signer self-managed, encryption-based identification and signature secret management to verify signer and to legitimize basic digital signature without the use of certificates, tokens or PKI (private key infrastructure)
US8312266B2 (en) Methods and apparatus for verifying electronic mail
CN108377244A (en) A kind of Intranet uniform authentication method
CN101741561A (en) Method and system for authenticating two-way hardware
US20180082287A1 (en) Cryptocurrency lock for online accounts
CN106657125A (en) Flow control mechanism suitable for online identity authentication
CN104866774A (en) Method and system for managing account authorities

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20091202