CN107172087A - Verification method, device and storage medium based on checking mail - Google Patents

Verification method, device and storage medium based on checking mail Download PDF

Info

Publication number
CN107172087A
CN107172087A CN201710527120.0A CN201710527120A CN107172087A CN 107172087 A CN107172087 A CN 107172087A CN 201710527120 A CN201710527120 A CN 201710527120A CN 107172087 A CN107172087 A CN 107172087A
Authority
CN
China
Prior art keywords
checking
mail
client
confirmation email
login
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710527120.0A
Other languages
Chinese (zh)
Inventor
张晓亮
刘书文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Priority to CN201710527120.0A priority Critical patent/CN107172087A/en
Publication of CN107172087A publication Critical patent/CN107172087A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/42Mailbox-related aspects, e.g. synchronisation of mailboxes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Transfer Between Computers (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

This disclosure relates to a kind of verification method, device and storage medium based on checking mail, this method sends the checking request for verifying the first user by user end to server, and obtain the address of the confirmation email of server transmission, afterwards according to the login password of the address of confirmation email and confirmation email login authentication mailbox on the client, then checking mail is searched in confirmation email, after checking mail is found, verification operation is carried out using the checking information verified in mail on the client.Checking mail is got by connectivity verification mailbox on the client, and determine checking information to complete verification operation on the client, verification operation need not be carried out by the special login authentication mailbox of user again, so as in the case where ensuring information security, simplify the verification operation to user identity.

Description

Verification method, device and storage medium based on checking mail
Technical field
This disclosure relates to network technique field, more particularly to a kind of verification method, device and storage based on checking mail Medium.
Background technology
In correlation technique, new user carries out e-mail registry or in wholesale network payment, and these are deemed likely to occur not In the abnormal behaviour of safety factor, the mailbox specified to user of mail that checking user identity can be sent, the interior meeting of the checking mail Comprising some checking informations, e.g. identifying code or a checking network address for checking are, it is necessary to which user obtains after opening mail Take identifying code and inputted or for checking network address, the click of checking network address is carried out, so as to user's body of current operation Part is verified, realizes verification operation, reduces the stolen possibility of user identity.
The content of the invention
To overcome problem present in correlation technique, the disclosure provides a kind of verification method, device based on checking mail And storage medium.
According to the first aspect of the embodiment of the present disclosure there is provided a kind of verification method based on checking mail, applied to terminal, Including:
Checking request for verifying the first user is sent by user end to server;
After the server sends checking mail to the confirmation email of first user, obtained by the client The address for the confirmation email that server is sent;
Described in being logged according to the login password of the address of the confirmation email and the confirmation email in the client Confirmation email;
The checking mail is searched in the confirmation email by the client;
After the checking mail is found, carried out in the client using the checking information in the checking mail Verification operation.
Optionally, it is described after the server sends checking mail to the confirmation email of first user, pass through institute The address that client obtains the confirmation email is stated, including:
After the server sends checking mail to the confirmation email of first user, received by the client The checking notification message that the server is sent, the checking notification message includes the address of the confirmation email.
Optionally, it is described after the server sends checking mail to the confirmation email of first user, pass through institute The address that client obtains the confirmation email is stated, including:
Confirmation email from the server to first user send checking mail after, according to first user with The binding relationship of the confirmation email, obtains the address of the confirmation email, the binding relationship is to be pre-configured in the visitor In the end of family.
Optionally, it is described checking notification message in also include checking information template, it is described by the client described The checking mail is searched in confirmation email, including:
After confirmation email described in Successful login, the mail server of confirmation email is connected to by the client;
According to the checking information template, the keyword of the checking information is determined;
Described in being searched in the mail server according to the keyword and the default search restrictive condition Mail is verified, the search restrictive condition includes default mail reception time range, and/or mail look-up quantity.
Optionally, checking information template corresponding with the confirmation email is also included in the binding relationship, it is described to pass through The client searches the checking mail in the confirmation email, including:
After confirmation email described in Successful login, the mail server of confirmation email is connected to by the client;
The checking information template is obtained according to the binding relationship;
According to the checking information template, the keyword of the checking information is determined;
Described in being searched in the mail server according to the keyword and the default search restrictive condition Mail is verified, the search restrictive condition includes default mail reception time range, and/or mail look-up quantity.
Optionally, it is described checking notification message in also include checking information template, it is described by the client described The checking mail is searched in confirmation email, including:
After confirmation email described in Successful login, the mail server of confirmation email is connected to by the client;
According to the checking information template, the keyword of the checking information is determined;
Described in being searched in the mail server according to the keyword and the default search restrictive condition Mail is verified, the search restrictive condition includes default mail reception time range, and/or mail look-up quantity.
Optionally, checking information template corresponding with the confirmation email is also included in the binding relationship, it is described to pass through The client searches the checking mail in the confirmation email, including:
After confirmation email described in Successful login, the mail server of confirmation email is connected to by the client;
The checking information template is obtained according to the binding relationship;
According to the checking information template, the keyword of the checking information is determined;
Described in being searched in the mail server according to the keyword and the default search restrictive condition Mail is verified, the search restrictive condition includes default mail reception time range, and/or mail look-up quantity.
Optionally, it is described according to the address of the confirmation email and the login password of the confirmation email in the client The upper login confirmation email, including:
According to the address of the confirmation email, the login interface of the confirmation email is generated in the client, it is described Login interface includes the address of the confirmation email of Auto-writing and the input frame for inputting the login password;
Receive the login password inputted in the input frame;
According to the address of the confirmation email and the login password, the confirmation email is carried out on the login interface Login.
Optionally, it is described according to the address of the confirmation email and the login password of the confirmation email in the client The upper login confirmation email, including:
According to the address of the confirmation email, the login interface of the confirmation email is generated in the client, it is described Login interface includes the address of the confirmation email of Auto-writing and the input frame for inputting the login password;
Determine whether to have stored the corresponding login password in address of the confirmation email in the client;
When having stored the login password in the client, the login stored in the client is obtained close Code;When not storing the login password in the client, the login password inputted in the input frame is received;
According to the address of the confirmation email and the login password, the confirmation email is carried out on the login interface Login.
Optionally, it is described after the checking mail is found, using in the checking mail in the client Checking information carries out verification operation, including:
After the checking mail is found, the internal memory of preset capacity is distributed by the client;
The checking mail is downloaded in the client from the mail server of the confirmation email, and is stored in In the internal memory;
Content to the checking mail in the internal memory of the client carries out filter analysis, to obtain described test Demonstrate,prove information;
Verification operation is carried out using the checking information by the client.
Optionally, methods described also includes:
When first user logs off in the client, or the client stops fortune in the terminal Row constantly, empties the internal memory.
According to the second aspect of the embodiment of the present disclosure there is provided a kind of verification method based on checking mail, applied to service Device, including:
What receiving terminal was sent is used for the checking request of the first user of checking;
In response to the checking request, checking mail, the checking mail are sent to the confirmation email of first user Including checking information;
The address of the confirmation email is sent to the terminal, is tested for the terminal by the client according to The address template of card mailbox obtains checking information from the confirmation email;
The verification operation initiated by the terminal in the client using the checking information is obtained on described The result of checking information;
The result is sent to the terminal, so as to which the result is sent into the client.
Optionally, the checking information include identifying code and checking network address, it is described by the terminal in the client The upper verification operation initiated using the checking information obtains the result on the checking information, including:
When the checking information is the checking network address, obtain the terminal and the checking is accessed by the client The result that network address is obtained;Or,
When the checking information is the identifying code, the checking that the terminal is sent by the client is received Code;
Verification operation is carried out according to the identifying code received, result is verified.
According to the third aspect of the embodiment of the present disclosure there is provided a kind of checking device based on checking mail, applied to terminal, Described device includes:
Sending module, is configured as sending the checking request for verifying the first user by user end to server;
Acquisition module, is configured as after the server sends checking mail to the confirmation email of first user, The address for the confirmation email that server is sent is obtained by the client;
Mailbox login module, is configured as being existed according to the address of the confirmation email and the login password of the confirmation email The confirmation email is logged in the client;
Mail look-up module, is configured as searching the checking mail in the confirmation email by the client;
Authentication module, is configured as after the checking mail is found, the checking postal is utilized in the client Checking information in part carries out verification operation.
Optionally, the acquisition module, is configured as:
After the server sends checking mail to the confirmation email of first user, received by the client The checking notification message that the server is sent, the checking notification message includes the address of the confirmation email.
Optionally, the acquisition module, is additionally configured to:
Confirmation email from the server to first user send checking mail after, according to first user with The binding relationship of the confirmation email, obtains the address of the confirmation email, the binding relationship is to be pre-configured in the visitor In the end of family.
Optionally, described verify also includes checking information template in notification message, the mail look-up module, including:
Server connects submodule, is configured as after confirmation email described in Successful login, is connected by the client To the mail server of confirmation email;
Keyword determination sub-module, is configured as, according to the checking information template, determining the key of the checking information Word;
Mail look-up submodule, is configured as in the mail server according to the keyword and described default Search restrictive condition searches the checking mail, and the search restrictive condition includes default mail reception time range, and/ Or mail look-up quantity.
Optionally, checking information template corresponding with the confirmation email, the mail are also included in the binding relationship Searching modul, including:
Server connects submodule, is configured as after confirmation email described in Successful login, is connected by the client To the mail server of confirmation email;
Template acquisition submodule, is configured as obtaining the checking information template according to the binding relationship;
Keyword determination sub-module, is configured as, according to the checking information template, determining the key of the checking information Word;
Mail look-up submodule, is configured as in the mail server according to the keyword and described default Search restrictive condition searches the checking mail, and the search restrictive condition includes default mail reception time range, and/ Or mail look-up quantity.
Optionally, the mailbox login module, including:
Interface generates submodule, is configured as the address according to the confirmation email, is generated in the client described The login interface of confirmation email, the login interface includes the address of the confirmation email of Auto-writing and described for inputting The input frame of login password;
Password acceptance submodule, is configured as receiving the login password inputted in the input frame;
Mailbox logs in submodule, is configured as the address according to the confirmation email and the login password, is stepped on described The login of the confirmation email is carried out on record interface.
Optionally, the mailbox login module, including:
Interface generates submodule, is additionally configured to the address according to the confirmation email, institute is generated in the client The login interface of confirmation email is stated, the login interface includes the address of the confirmation email of Auto-writing and for inputting State the input frame of login password;
Password determination sub-module, is configured to determine that the address pair that the confirmation email whether has been stored in the client The login password answered;
Password acceptance submodule, is additionally configured to when having stored the login password in the client, obtains in institute State the login password stored in client;When not storing the login password in the client, receive described defeated Enter the login password inputted in frame;
Mailbox logs in submodule, the address according to the confirmation email and the login password is additionally configured to, described The login of the confirmation email is carried out on login interface.
Optionally, the authentication module, including:
Memory Allocation submodule, is configured to after the checking mail is found, is distributed by the client default The internal memory of capacity;
Mail downloads submodule, is configured as from the mail server of the confirmation email downloading in the checking mail Onto the client, and it is stored in the internal memory;
Checking information acquisition submodule, is configured as in the internal memory of the client in the checking mail Hold and carry out filter analysis, to obtain the checking information;
Verification operation implementation sub-module, is configured as carrying out checking behaviour using the checking information by the client Make.
Optionally, the authentication module also includes:
Internal memory clears up submodule, is configured as first user and is logged off in the client, or described Client in the terminal it is out of service constantly, empty the internal memory.
According to the fourth aspect of the embodiment of the present disclosure there is provided a kind of checking device based on checking mail, applied to service Device, described device includes:
Receiving module, is configured as the checking request for being used to verify the first user of receiving terminal transmission;
Sending module, is configured to respond to the checking request, sends and verifies to the confirmation email of first user Mail, the checking mail includes checking information;
Sending module, is additionally configured to send the address of the confirmation email to the terminal, passes through for the terminal The client obtains checking information according to the address of the confirmation email from the confirmation email;
The result acquisition module, is configured as sending out using the checking information in the client by the terminal The verification operation risen obtains the result on the checking information;
Sending module, is additionally configured to the result being sent to the terminal, so as to which the result is sent out Give the client.
Optionally, the checking information includes identifying code and verifies network address, the result acquisition module, including:
The result acquisition submodule, when being configured as the checking information for the checking network address, obtains the end Hold and the result that the checking network address is obtained is accessed by the client;Or,
Identifying code acquisition submodule, when being configured as the checking information for the identifying code, receives the terminal and leads to Cross the identifying code that the client is sent;
The result acquisition submodule, is additionally configured to carry out verification operation according to the identifying code received, obtains The result.
According to the 5th of the embodiment of the present disclosure the aspect there is provided a kind of checking device based on checking mail, applied to terminal, Including:
Processor;
Memory for storing processor-executable instruction;
Wherein, the processor is configured as:
Checking request for verifying the first user is sent by user end to server;
After the server sends checking mail to the confirmation email of first user, obtained by the client The address for the confirmation email that server is sent;
Described in being logged according to the login password of the address of the confirmation email and the confirmation email in the client Confirmation email;
The checking mail is searched in the confirmation email by the client;
After the checking mail is found, carried out in the client using the checking information in the checking mail Verification operation.
According to the 6th of the embodiment of the present disclosure the aspect there is provided a kind of checking device based on checking mail, applied to service Device, including:
Processor;
Memory for storing processor-executable instruction;
Wherein, the processor is configured as:
What receiving terminal was sent is used for the checking request of the first user of checking;
In response to the checking request, checking mail, the checking mail are sent to the confirmation email of first user Including checking information;
The address of the confirmation email and the template of the checking information are sent to the terminal, is passed through for the terminal The client obtains checking according to the address of the confirmation email and the template of the checking information from the confirmation email Information;
The verification operation initiated by the terminal in the client using the checking information is obtained on described The result of checking information;
The result is sent to the terminal, so as to which the result is sent into the client.
According to the 7th of the embodiment of the present disclosure the aspect there is provided a kind of computer-readable recording medium, calculating is stored thereon with Machine programmed instruction, the programmed instruction realizes the testing based on checking mail that disclosure first aspect is provided when being executed by processor The step of card method.
According to the eighth aspect of the embodiment of the present disclosure there is provided a kind of computer-readable recording medium, calculating is stored thereon with Machine programmed instruction, the programmed instruction realizes the testing based on checking mail that disclosure second aspect is provided when being executed by processor The step of card method.
The technical scheme provided by this disclosed embodiment can include the following benefits:
Checking request for verifying the first user is sent by user end to server, in the server to described the The confirmation email of one user is sent after checking mail, and the ground for the confirmation email that server is sent is obtained by the client Location, the checking postal is logged according to the login password of the address of the confirmation email and the confirmation email in the client Case, the checking mail is searched by the client in the confirmation email, after the checking mail is found, in institute State and the checking information progress verification operation in the checking mail is utilized in client.The disclosure provide technical scheme by Connectivity verification mailbox gets checking mail in client, and determines checking information to complete checking behaviour on the client Make, it is not necessary to verification operation is carried out by the special login authentication mailbox of user again, it is simple so as in the case where ensuring information security Change the verification operation to user identity.
It should be appreciated that the general description of the above and detailed description hereinafter are only exemplary and explanatory, not The disclosure can be limited.
Brief description of the drawings
Accompanying drawing herein is merged in specification and constitutes the part of this specification, shows the implementation for meeting the disclosure Example, and be used to together with specification to explain the principle of the disclosure.
Fig. 1 is a kind of flow chart of verification method based on checking mail according to an exemplary embodiment;
Fig. 2 is the flow chart of another verification method based on checking mail according to an exemplary embodiment;
Fig. 3 is the flow chart of another verification method based on checking mail according to an exemplary embodiment;
Fig. 4 is the flow chart of another verification method based on checking mail according to an exemplary embodiment;
Fig. 5 is the flow chart of another verification method based on checking mail according to an exemplary embodiment;
Fig. 6 is the flow chart of another verification method based on checking mail according to an exemplary embodiment;
Fig. 7 is a kind of flow chart of verification method based on checking mail according to another exemplary embodiment;
Fig. 8 is the flow chart of another verification method based on checking mail according to another exemplary embodiment;
Fig. 9 is a kind of checking device block diagram based on checking mail according to an exemplary embodiment;
Figure 10 is a kind of mail look-up module frame chart according to an exemplary embodiment;
Figure 11 is a kind of mail look-up module frame chart according to an exemplary embodiment;
Figure 12 is a kind of mailbox login module block diagram according to an exemplary embodiment;
Figure 13 is another mailbox login module block diagram according to an exemplary embodiment;
Figure 14 is a kind of authentication module block diagram according to an exemplary embodiment;
Figure 15 is another authentication module block diagram according to an exemplary embodiment;
Figure 16 is a kind of checking device block diagram based on checking mail according to another exemplary embodiment;
Figure 17 is a kind of the result acquisition module block diagram according to another exemplary embodiment;
Figure 18 is a kind of block diagram of checking device based on checking mail according to further example embodiment;
Figure 19 is a kind of block diagram of checking device based on checking mail according to further example embodiment.
Embodiment
Here exemplary embodiment will be illustrated in detail, its example is illustrated in the accompanying drawings.Following description is related to During accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represent same or analogous key element.Following exemplary embodiment Described in embodiment do not represent all embodiments consistent with the disclosure.On the contrary, they be only with it is such as appended The example of the consistent apparatus and method of some aspects be described in detail in claims, the disclosure.
Fig. 1 is a kind of flow chart of verification method based on checking mail according to an exemplary embodiment, such as Fig. 1 Shown, this method is applied in terminal, is comprised the following steps:
In step 110, the checking request for verifying the first user is sent by user end to server.
Illustratively, client can be an application program, when needing to carry out the checking of user identity, for example, user Login behavior either a payment behavior, it is necessary to by the application program to server send checking request, to carry out Following subscriber authentication operation.
In the step 120, after server sends checking mail to the confirmation email of the first user, obtained by client The address for the confirmation email that server is sent.
Illustratively, after checking request is have sent in step 110, server can be used according to the checking request to first first The confirmation email at family, which sends one, is used for the checking mail of authentication, then in the first implementation, can perform with Lower step obtains the address of confirmation email:
After server sends checking mail to the confirmation email of the first user, sent by client the reception server Notification message is verified, checking notification message includes the address of confirmation email.
I.e. after server have sent checking mail to confirmation email, it is notified that client will be carried out used in authentication The address of confirmation email.
Or, in second of implementation, following steps can be performed to obtain the address of confirmation email:
After server sends checking mail to the confirmation email of the first user, according to tying up for the first user and confirmation email Determine relation, obtain the address of confirmation email, the binding relationship is pre-configured with the client.Optionally, server to The confirmation email of first user is sent after checking mail, can receive server transmission in client to be used to indicate to testing Demonstrate,prove after the notification message that mailbox sends checking mail, according to the first user and the binding relationship of confirmation email, obtain confirmation email Address.
In step 130, according to the login password of the address of confirmation email and confirmation email login authentication on the client Mailbox.
Illustratively, it is real with reference to the login password of the confirmation email by the address of the confirmation email obtained in step 120 The register of existing confirmation email.Wherein, the login password can be user's input or once be inputted from user Password in obtain.
In step 140, checking mail is searched in confirmation email by client.
Example, server can also send checking information after checking mail is sent to the confirmation email to client Template, or (can be believed according to the keyword of the default checking information template determination search in client such as sender Breath), in addition the type (identifying code still verifies network address) of checking information can also set mail reception time range, from And accurately find checking mail.
In step 150, after checking mail is found, carried out on the client using the checking information verified in mail Verification operation.
Example, after checking mail is found, client can be determined according to checking information template in checking mail Interior checking information is identifying code or checking network address, then obtains and is verified accordingly using identifying code or checking network address Operation, so as to realize the checking to user identity.
In summary, the verification method based on checking mail that the disclosure is provided, is sent by user end to server and used In the checking request of the first user of checking, and the address of the confirmation email of server transmission is obtained, afterwards according to confirmation email The login password of address and confirmation email login authentication mailbox on the client, then searches checking mail in confirmation email, After checking mail is found, verification operation is carried out using the checking information verified in mail on the client.The disclosure is provided Technical scheme checking mail is got by connectivity verification mailbox on the client, and determine checking information so as in client On can complete verification operation, it is not necessary to verification operation is carried out by the special login authentication mailbox of user again, so as to ensure letter In the case of ceasing safety, simplify the verification operation to user identity.
Illustratively, Fig. 2 is the stream of another verification method based on checking mail according to an exemplary embodiment Cheng Tu, as shown in Fig. 2 the login password according to the address of confirmation email and confirmation email described in step 130 is on the client The step of login authentication mailbox, it may comprise steps of:
In step 1301, according to the address of confirmation email, the login interface of confirmation email is generated on the client, this is stepped on Record the address of confirmation email of the interface including Auto-writing and the input frame for inputting login password.
Illustratively, client can generate one for user is used for the login interface of login authentication mailbox, wherein verifying postal The address of case is, according to described in step 120, to be sent to client by server, Auto-writing is good on login interface , from the point of view of the safety of accounts information, part can be carried out to the address of the confirmation email and hidden, for example, can shown It is shown as:alia***g@163.com;Being additionally provided with one on the login interface simultaneously needs user to carry out filling in stepping on for confirmation email The input frame of password is recorded, waits user to carry out the input of login password.
In step 1302, the login password inputted in input frame is received.
User's corresponding login password of input validation mailbox in the input frame of the login interface, to carry out confirmation email Login.If this be user for the first time on the client login authentication mailbox, it is necessary to which user carries out E-mail address first carries For the POP3 (English of business:Post Office Protocol-Version 3, Chinese:Post office protocol-version 3) agreement/IMAP (English:Internet Mail Access Protocol, Chinese:Network mail access protocol) setting, due to same electronics Mailbox provider for same mail protocol set be typically it is general, therefore for same suffix domain name mailbox setting all It is the same, for example, is set for suffix domain name for@163.com mailbox using same agreement, therefore client can be Set to set the agreement during POP3/IMAP for the first time and preserved, so as to avoid repeating next time to set, after accessing again When sewing the same mailbox or different mailboxes that domain name is@163.com, directly obtain the POP3/IMAP preserved and set.
In step 1303, according to the address of confirmation email and login password, confirmation email is carried out on login interface Log in.
Got by step 1301 and step 1302 after address and the login password of confirmation email, it is possible to tested Demonstrate,prove the register of mailbox.
Illustratively, Fig. 3 is the stream of another verification method based on checking mail according to an exemplary embodiment Cheng Tu, as shown in figure 3, the login password according to the address of confirmation email and confirmation email described in step 130 is on the client Login authentication mailbox, comprises the following steps:
In step 1304, according to the address of confirmation email, the login interface of confirmation email is generated on the client, this is stepped on Record the address of confirmation email of the interface including Auto-writing and the input frame for inputting login password.
The step 1301 of the step and embodiment illustrated in fig. 3 is identical, and here is omitted.
In step 1305, determine the corresponding login password in address of confirmation email whether has been stored in client.
Wherein, the login method of the confirmation email shown in Fig. 2 embodiment can be when user utilizes the client for the first time End carries out what is used during the login of confirmation email, and when user not uses the client login authentication mailbox first, is based on The corresponding login password of the confirmation email has been stored in register client before.Therefore, when logging in, first determine With the presence or absence of the login password stored, the operation of step 1306 or step 1307 is carried out further according to judged result.
In step 1306, when having stored login password in client, the login password stored on the client is obtained.
When the login password is stored on the client, client directly gets the login password and can be with automatically Fill in corresponding login password input frame, to carry out the operation of step 1308, otherwise carry out step 1307.
In step 1307, when not storing login password in client, the login password inputted in input frame is received.
The login password is stored if having no, illustrates that user carries out the login of the confirmation email or in last login for the first time The preservation of login password is not carried out, now, the step 1302 of the step and Fig. 3 embodiments is identical, and here is omitted.
In step 1308, according to the address of confirmation email and login password, confirmation email is carried out on login interface Log in.
The step 1303 of the step and Fig. 3 embodiments is identical, and here is omitted.
In addition, illustratively, the login authentication mailbox on the client described in Fig. 1 steps 130 can also be by answering with other Quick registration is realized with program association, such as confirmation email can use the user name and login password of the affiliate application Register is carried out, the quick login of confirmation email is carried out by one other application program of client associate.For example, as visitor Family end has been got after the address of confirmation email, and confirmation has associated application program, for example, associated with the confirmation email Mailbox application program, directly opens the affiliate application, and the login username and login password of the usual confirmation email are all Have been saved on the affiliate application, and the confirmation email is probably the shape having logged in the affiliate application State, now the client mandate of the affiliate application is directly obtained by backstage and then quick registration is carried out, or directly The register for taking login password to carry out confirmation email is obtained, so as to can realize quick registration checking postal on the client Case.
Fig. 4 is the flow chart of another verification method based on checking mail according to an exemplary embodiment, such as Shown in Fig. 4, if using the address that the first implementation obtains the confirmation email in the step 120, step 120 institute Checking information template can also be included in the checking notification message stated, in this case, client is passed through described in step 140 Checking mail is searched in confirmation email, be may comprise steps of:
In step 1401, after success login authentication mailbox, the mail service of confirmation email is connected to by client Device.
Illustratively, after the login that confirmation email is carried out by the method described in Fig. 2 or Fig. 3 embodiments, then according to above-mentioned The agreement set in embodiment to confirmation email, is connected on the server of confirmation email, then carry out the operation of next step.
In step 1402, according to checking information template, the keyword of checking information is determined.
Illustratively, can specify that in the template of checking information this verification operation need obtain information be identifying code also Be checking network address, and can specify that the keyword of this verification operation, for example, in title comprising " client validation of rice coin ", Sender is " millet payment ", or it is " mail center " etc., the key that " login authentication ", sender are included in title The search key that word can verify mail as being searched in below step.
Illustratively, it is " millet payment " comprising " client validation of rice coin ", sender in checking information template is title, The keyword that checking information can be determined is " rice coin " " checking " " millet payment ", so as to search checking mail.
In step 1403, checking is searched according to keyword and default search restrictive condition in mail server Mail.
Wherein, the search restrictive condition includes default mail reception time range, and/or mail look-up quantity.
Illustratively, default search restrictive condition can be:It is at nearest 10 minutes in 10 envelope mails before confirmation email The mail inside collected, so as to directly exclude reception time longer mail, simplifies search step.In combination with step 1402 institute The keyword of determination:" rice coin " " checking " " millet payment ", carry out checking mail lookup, then the checking mail should meet with Lower condition:Above-mentioned keyword is included in content, and was collected in nearest 10 minutes, and positioned at preceding 10 envelope of confirmation email In mail.Or, default search restrictive condition can also only arrange mail reception time range or mail look-up quantity. For example, search restrictive condition is the mail that receives in nearest 10 minutes, or search restrictive condition for search preceding 20 envelope mail (because It is typically what is arranged according to the reception time for the sequence of mail in mailbox, before the usual newest mail received can come most Face), the lookup of checking mail can also be realized then in conjunction with keyword determined by step 142.When find checking mail it After the step of be further continued for being determined checking information, i.e. step 150.
Fig. 5 is the flow chart of another verification method based on checking mail according to an exemplary embodiment, such as Shown in Fig. 5, if using the address that second of implementation obtains the confirmation email in the step 120, in step 120 Also include in described binding relationship:Checking information template corresponding with the confirmation email, then pass through client described in step 140 Checking mail is searched at end in confirmation email, may comprise steps of:
In step 1404, after success login authentication mailbox, the mail service of confirmation email is connected to by client Device.
In step 1405, checking information template is obtained according to the binding relationship.
In step 1406, according to checking information template, the keyword of checking information is determined.
In step 1407, checking is searched according to keyword and default search restrictive condition in mail server Mail.
Wherein, search restrictive condition includes default mail reception time range, and/or mail look-up quantity.
That is, after server have sent checking mail, notifying client to carry out authentication, client first It according to the binding relationship pre-set, can just get the address for the confirmation email bound with first user, and root The corresponding checking information template of the confirmation email can also be obtained according to the binding relationship.It is understood that usual confirmation email The checking information template that is used of mail service provider be usually fixed, the type of its checking information, either verify Code either confirmation email is generally all to determine, while verifying that keyword is also to fix in mail.For example, for small It in title comprising " client validation of rice coin ", sender is " millet payment " that rice payment verification information model, which is, and checking information is Network address is verified, therefore user oneself can set checking information template corresponding with the confirmation email in the client.
The step 1404 in embodiment shown in Fig. 5,1406,1407, step 1401,1402 Hes can be respectively referred to 1403, here is omitted.
Fig. 6 is the flow chart of another verification method based on checking mail according to an exemplary embodiment, such as Shown in Fig. 6, described in step 150 find checking mail after, entered on the client using the checking information verified in mail Row verification operation, comprises the following steps:
In step 1501, after checking mail is found, the internal memory of preset capacity is distributed by the client.
Illustratively, client can distribute the internal memory of preset capacity for the download of the checking mail to terminal application, be used for The interim storage checking mail, or can also be distributed in the internal memory that the terminal has taken preset capacity come interim storage should Verify mail.
In step 1502, checking mail is downloaded in client from the mail server of confirmation email, and stores In the internal memory.
The checking mail for meeting search condition determined in step 1403 is downloaded into client, so as on the client Carry out the analysis of checking information.Illustratively, client is got after the internal memory of terminal distribution in step 1501, specially interior with this The checking mail for carrying out interim storage download is deposited, and client can be exited in user, log off or closes client During interface, interim storage is used for this and verifies that the internal memory of mail is emptied, that is, the e-mail messages downloaded can be lost automatically, So as to save the memory space of terminal.
In step 1503, to verifying that the content of mail carries out filter analysis in the internal memory of client, tested with obtaining Demonstrate,prove information.
Client directly to verify mail content carry out filter analysis, it is determined that now checking mail in include be used for test The checking information of the first user is demonstrate,proved, to carry out the operation of below step.
In step 1504, verification operation is carried out using checking information by client.
Illustratively, this step can be divided into according to the type of specific checking information when checking information is identifying code and believes when verifying Cease for checking two kinds of website situation:
When checking information is identifying code, the identifying code that step 1503 is obtained is sent directly to server by client, with The result on identifying code that the reception server is sent afterwards.Finally the result is shown on the client.By the result Be shown to user be used for inform user whether good authentication, when the result for be proved to be successful when, can directly carry out the checking Subsequent operation after operating successfully, while completing the operation for emptying internal memory described in step 1505.Otherwise, checking is displayed for a user The information of failure, and the checking request again for verifying the first user again is sent by user end to server.It may now obtain When the identifying code got can not realize the operation of good authentication, it may be possible to because the expired either checking mail of identifying code Obtain abnormal, now need to re-start the acquisition of identifying code, that is, need server to re-issue once new identifying code, For verifying again.
When checking information is checking network address, access to enter in the checking network address acquired in step 1503 by client first Row checking.Subsequent client can directly invoke predefined browser application, for example, can be " webview ", for opening Verify network address.The result on verifying network address that then the reception server is sent again.No matter verify that network address shows the checking Operate successfully or fail, user is still rested on the interface of client, now obtains the result, client by server End then carries out the confirmation of the result from trend server, so as to complete verification operation.The result is shown on the client, When the result when being proved to be successful, can directly to carry out the subsequent operation after verification operation success, while completing step 1505 The described operation for emptying internal memory.Otherwise, the information of authentication failed is displayed for a user, and is sent again by user end to server The checking request again of the first user of secondary checking.
In step 1505, when the first user logs off on the client, or client is out of service in terminal Constantly, the internal memory is emptied.
In summary, the verification method based on checking mail that the disclosure is provided, is sent by user end to server and used In the checking request of the first user of checking, and the address of the confirmation email of server transmission is obtained, afterwards according to confirmation email The login password of address and confirmation email login authentication mailbox on the client, then searches checking mail in confirmation email, After checking mail is found, verification operation is carried out using the checking information verified in mail on the client.The disclosure is provided Technical scheme checking mail is got by connectivity verification mailbox on the client, and determine checking information so as in client On can complete verification operation, it is not necessary to verification operation is carried out by the special login authentication mailbox of user again, so as to ensure letter In the case of ceasing safety, simplify the verification operation to user identity.
Fig. 7 is a kind of flow chart of verification method based on checking mail according to another exemplary embodiment, such as Shown in Fig. 7, this method is applied to server, comprises the following steps:
In step 720, the checking request for being used to verify the first user that receiving terminal is sent.
For example, when either one time payment behavior of once login behavior of user occurs abnormal, client can be to service Device sends checking request, it is desirable to which server sends checking mail to a confirmation email, for the identity progress to the first user Verification operation.
In step 720, in response to checking request, checking mail, the checking postal are sent to the confirmation email of the first user Part includes checking information.
In response to checking request, server directly sends checking mail to confirmation email, is different from general transmission in one's hands The corresponding terminal of machine number, checking mail eliminates the reliance on cell-phone number either terminal in itself, even if cell-phone number or terminal are lost The situation of mistake, is also not in potential safety hazard or situation about can not receive.In addition, cell-phone number, which receives short message, also suffers from mobile phone The strong and weak influence of communication signal, the problem of verifying that mail will not then be influenceed by communication signal, and seldom delay occur.And Free Email, also saves cost.
In step 730, the address of confirmation email is sent to terminal, for terminal by client according to confirmation email Address obtains checking information from confirmation email.
Illustratively, the step can include sending checking notification message to terminal, and the checking notification message includes checking The address of mailbox.
Optionally, it can also include in the checking notification message:Checking information template, for terminal by client according to The address of confirmation email and checking information template obtain checking information from confirmation email.
It can be understood as:Server is after checking mail is sent to confirmation email, it is necessary to send confirmation email to terminal Address and the template of checking information, for informing the operation that user will be verified, and inform which mailbox is client remove, and lead to The checking mail sent just now can be got by crossing which information, so that being obtained in the step of client is easier after To the checking mail.
In step 740, the verification operation initiated on the client using checking information by terminal is obtained on checking The result of information.
Illustratively, checking information includes identifying code or checking network address, and client will be tested according to different checking informations Card operation, and confirm the result.Wherein, the method that the method for client progress verification operation can be as shown in Figure 6, no longer goes to live in the household of one's in-laws on getting married State.
In step 750, the result is sent to terminal, to transmit verification result to client.
Fig. 8 is the flow chart of another verification method based on checking mail according to another exemplary embodiment, As shown in figure 8, the verification operation initiated on the client using checking information by terminal described in step 740 is obtained on testing The result of information is demonstrate,proved, is comprised the following steps:
In step 7401, when checking information is checking network address, obtain terminal and obtained by client access checking network address The result arrived.Or,
In step 7402, when checking information is identifying code, the identifying code that receiving terminal is sent.
In step 7403, verification operation is carried out according to the identifying code received, result is verified.
I.e. in the case of two kinds of different checking informations, server fit end is respectively completed different type checking behaviour Make.When checking information is checking network address, the result can be obtained from checking network address after the checking network address is accessed;Work as checking When information is identifying code, server first receives client and is sent to identifying code, then by the identifying code received with being sent to before The identifying code of terminal is compared, and so can determine whether to be proved to be successful.
In summary, the verification method based on checking mail that the disclosure is provided, server is sent by receiving terminal Checking request for verifying the first user, checking mail is sent to the confirmation email of the first user, and checking postal is sent to terminal The address of case and the template of checking information, by terminal on the client using checking information initiate verification operation obtain on The result of checking information, terminal is sent to by the result.The technical scheme that the disclosure is provided by connecting on the client Connect confirmation email and get checking mail, and determine checking information to complete verification operation on the client, it is not necessary to again Verification operation is carried out by the special login authentication mailbox of user, so as in the case where ensuring information security, simplify to user The verification operation of identity.
Fig. 9 is a kind of checking device block diagram based on checking mail according to an exemplary embodiment.Reference picture 9, Applied to terminal, the device 900 includes:
Sending module 910, is configured as sending the checking request for verifying the first user by user end to server.
Acquisition module 920, is configured as after server sends checking mail to the confirmation email of the first user, passes through visitor Family end obtains the address for the confirmation email that server is sent.
Mailbox login module 930, is configured as according to the address of confirmation email and the login password of confirmation email in client Login authentication mailbox on end.
Mail look-up module 940, is configured as searching checking mail in confirmation email by client.
Authentication module 950, is configured as after checking mail is found, the checking verified in mail is utilized on the client Information carries out verification operation.
Illustratively, the acquisition module 920, is configured as:
After server sends checking mail to the confirmation email of the first user, sent by client the reception server Notification message is verified, the checking notification message includes the address of confirmation email.
Illustratively, the acquisition module 920, is additionally configured to:
After server sends checking mail to the confirmation email of the first user, according to tying up for the first user and confirmation email Determine relation, obtain the address of confirmation email, the binding relationship is pre-configured with the client.
Optionally, Figure 10 is a kind of mail look-up module frame chart according to an exemplary embodiment.Reference picture 10, should Mail look-up module 940 includes:
Server connects submodule 941, is configured as after Successful login confirmation email, checking is connected to by client The mail server of mailbox.
Keyword determination sub-module 942, is configured as determining the keyword of checking information according to checking information template.
Mail look-up submodule 943, is configured as in mail server according to keyword and default search limitation Condition searches checking mail, and search restrictive condition includes default mail reception time range, and/or mail look-up quantity.
Optionally, checking information template corresponding with confirmation email is also included in the binding relationship, Figure 11 is shown according to one Example property implements a kind of mail look-up module frame chart exemplified.Reference picture 11, the mail look-up module 940 includes:
Server connects submodule 941, is configured as after confirmation email described in Successful login, is connected to by client The mail server of confirmation email.
Template acquisition submodule 944, is configured as obtaining checking information template according to binding relationship.
Keyword determination sub-module 942, is configured as determining the keyword of checking information according to checking information template.
Mail look-up submodule 943, is configured as in mail server according to keyword and default search limitation Condition searches checking mail, and search restrictive condition includes default mail reception time range, and/or mail look-up quantity.
Figure 12 is a kind of mailbox login module block diagram according to an exemplary embodiment.Reference picture 12, the mailbox is stepped on Record module 930 includes:
Interface generates submodule 931, is configured as the address according to confirmation email, and confirmation email is generated on the client Login interface, login interface includes the address of the confirmation email of Auto-writing and the input frame for inputting login password.
Password acceptance submodule 932, is configured as receiving the login password inputted in input frame.
Mailbox logs in submodule 933, is configured as the address according to confirmation email and login password, enterprising in login interface The login of row confirmation email.
Figure 13 is another mailbox login module block diagram according to an exemplary embodiment.Reference picture 13, the mailbox Login module 930 includes:
Interface generates submodule 931, is additionally configured to the address according to confirmation email, confirmation email is generated on the client Login interface, the address of the confirmation email of login interface including Auto-writing and the input frame for inputting login password.
Password determination sub-module 934, is configured to determine that the address that confirmation email whether has been stored in client is corresponding Login password.
Password acceptance submodule 935, is additionally configured to when having stored login password in client, obtains on the client The login password of storage;When not storing login password in client, the login password inputted in input frame is received.
Mailbox logs in submodule 933, the address according to confirmation email and login password is additionally configured to, on login interface Carry out the login of confirmation email.
Figure 14 is a kind of authentication module block diagram according to an exemplary embodiment.Reference picture 14, the authentication module 950 Including:
Memory Allocation submodule 951, is configured to after checking mail is found, preset capacity is distributed by client Internal memory.
Mail downloads submodule 952, is configured as from the mail server of confirmation email checking mail downloading to visitor On the end of family, and it is stored in internal memory.
Checking information acquisition submodule 953, is configured as in the internal memory of client to verifying that the content of mail was carried out Filter analysis, information is tested to obtain.
Verification operation implementation sub-module 954, is configured as carrying out verification operation using checking information by client.
Figure 15 is another authentication module block diagram according to an exemplary embodiment.Reference picture 15, the authentication module 950, in addition to:
Internal memory clears up submodule 955, is configured as the first user and logs off on the client, or client is at end On end it is out of service constantly, empty internal memory.
In summary, the checking device based on checking mail that the disclosure is provided, is sent by user end to server and used In the checking request of the first user of checking, and the address of the confirmation email of server transmission is obtained, afterwards according to confirmation email The login password of address and confirmation email login authentication mailbox on the client, then searches checking mail in confirmation email, After checking mail is found, verification operation is carried out using the checking information verified in mail on the client.It can be seen that, by Connectivity verification mailbox gets checking mail in client, and determines checking information to complete checking behaviour on the client Make, it is not necessary to verification operation is carried out by the special login authentication mailbox of user again, it is simple so as in the case where ensuring information security Change the verification operation to user identity.
Figure 16 is a kind of checking device block diagram based on checking mail according to another exemplary embodiment.Reference picture 16, applied to server, the device 1600 includes:
Receiving module 1610, is configured as the checking request for being used to verify the first user of receiving terminal transmission.
Sending module 1620, is configured to respond to checking request, and checking mail is sent to the confirmation email of the first user, Verify that mail includes checking information.
Sending module 1620, is additionally configured to send the address of confirmation email to terminal, client root is passed through for terminal Checking information is obtained from confirmation email according to the address of confirmation email.
The result acquisition module 1630, is configured as the checking initiated on the client using checking information by terminal Operation obtains the result on checking information.
Sending module 1620, is additionally configured to the result being sent to terminal, to transmit verification result to client End.
Optionally, sending module 1620, are additionally configured to:
Checking notification message is sent to terminal, checking notification message includes address and the checking information mould of confirmation email Plate, checking letter is obtained for terminal according to the address and checking information template of confirmation email by client from confirmation email Breath.
Figure 17 is a kind of the result acquisition module block diagram according to another exemplary embodiment.Reference picture 17, is tested Demonstrate,proving information includes identifying code and checking network address, and the result acquisition module 1630 includes:
Network address acquisition submodule 1631 is verified, when being configured as checking information for checking network address, terminal is obtained and passes through visitor Family end accesses the result that checking network address is obtained.Or,
Identifying code acquisition submodule 1632, when being configured as checking information for identifying code, the checking that receiving terminal is sent Code.
The result acquisition submodule 1633, is additionally configured to carry out verification operation according to the identifying code received, obtains The result.
In summary, the disclosure provide based on checking mail checking device, by receiving terminal send be used for test The checking request of the first user is demonstrate,proved, checking mail is sent to the confirmation email of the first user, the ground of confirmation email is sent to terminal Location and the template of checking information, the verification operation initiated on the client using checking information by terminal is obtained to be believed on checking The result of breath, terminal is sent to by the result.It can be seen that, checking postal is got by connectivity verification mailbox on the client Part, and determine checking information to complete verification operation on the client, it is not necessary to again by the special login authentication mailbox of user Verification operation is carried out, so as in the case where ensuring information security, simplify the verification operation to user identity.
The disclosure also provides a kind of computer-readable recording medium, is stored thereon with computer program instructions, and the program refers to The verification method based on checking mail that the disclosure is provided is realized in order when being executed by processor the step of.
Figure 18 is a kind of block diagram of checking device 1800 based on checking mail according to further example embodiment. For example, device 1800 can be mobile phone, computer, digital broadcast terminal, messaging devices, game console, flat board Equipment, Medical Devices, body-building equipment, personal digital assistant etc..
Reference picture 18, device 1800 can include following one or more assemblies:Processing assembly 1802, memory 1804, Electric power assembly 1806, multimedia groupware 1808, audio-frequency assembly 1810, the interface 1812 of input/output (I/O), sensor cluster 1814, and communication component 1816.
The integrated operation of the usual control device 1800 of processing assembly 1802, such as with display, call, data communication, The camera operation operation associated with record operation.Processing assembly 1802 can include one or more processors 1820 to perform Instruction, to complete all or part of step of the verification method based on checking mail.In addition, processing assembly 1802 can include one Individual or multiple modules, are easy to the interaction between processing assembly 1802 and other assemblies.For example, processing assembly 1802 can include it is many Media module, to facilitate the interaction between multimedia groupware 1808 and processing assembly 1802.
Memory 1804 is configured as storing various types of data supporting the operation in device 1800.These data Example includes the instruction of any application program or method for being used to operate on device 1800, contact data, telephone book data, Message, picture, video etc..Memory 1804 can by any kind of volatibility or non-volatile memory device or they Combination realize, such as static RAM (SRAM), Electrically Erasable Read Only Memory (EEPROM), it is erasable can Program read-only memory (EPROM), programmable read only memory (PROM), read-only storage (ROM), magnetic memory, flash memory Reservoir, disk or CD.
Electric power assembly 1806 provides electric power for the various assemblies of device 1800.Electric power assembly 1806 can include power management System, one or more power supplys, and other components associated with generating, managing and distributing electric power for device 1800.
Multimedia groupware 1808 is included in the screen of one output interface of offer between described device 1800 and user. In some embodiments, screen can include liquid crystal display (LCD) and touch panel (TP).If screen includes touch panel, Screen may be implemented as touch-screen, to receive the input signal from user.Touch panel includes one or more touch and passed Sensor is with the gesture on sensing touch, slip and touch panel.The touch sensor can not only sensing touch or slip be dynamic The border of work, but also the detection duration related to the touch or slide and pressure.In certain embodiments, it is many Media component 1808 includes a front camera and/or rear camera.When device 1800 is in operation template, mould is such as shot When plate or video template, front camera and/or rear camera can receive the multi-medium data of outside.Each preposition shooting Head and rear camera can be a fixed optical lens systems or with focusing and optical zoom capabilities.
Audio-frequency assembly 1810 is configured as output and/or input audio signal.For example, audio-frequency assembly 1810 includes a wheat Gram wind (MIC), when device 1800 is in operation template, such as calling template, logging template and speech recognition template, microphone quilt It is configured to receive external audio signal.The audio signal received can be further stored in memory 1804 or via communication Component 1816 is sent.In certain embodiments, audio-frequency assembly 1810 also includes a loudspeaker, for exports audio signal.
I/O interfaces 1812 are that interface, above-mentioned peripheral interface module are provided between processing assembly 1802 and peripheral interface module Can be keyboard, click wheel, button etc..These buttons may include but be not limited to:Home button, volume button, start button and Locking press button.
Sensor cluster 1814 includes one or more sensors, and the state for providing various aspects for device 1800 is commented Estimate.For example, sensor cluster 1814 can detect opening/closed mode of device 1800, the relative positioning of component, such as institute Display and keypad that component is device 1800 are stated, sensor cluster 1814 can be with detection means 1800 or device 1,800 1 The position of individual component changes, the existence or non-existence that user contacts with device 1800, the orientation of device 1800 or acceleration/deceleration and dress Put 1800 temperature change.Sensor cluster 1814 can include proximity transducer, be configured in not any physics The presence of object nearby is detected during contact.Sensor cluster 1814 can also include optical sensor, such as CMOS or ccd image sensing Device, for being used in imaging applications.In certain embodiments, the sensor cluster 1814 can also include acceleration sensing Device, gyro sensor, Magnetic Sensor, pressure sensor or temperature sensor.
Communication component 1816 is configured to facilitate the communication of wired or wireless way between device 1800 and other equipment.Dress The wireless network based on communication standard, such as WiFi, 2G or 3G, or combinations thereof can be accessed by putting 1800.It is exemplary at one In embodiment, communication component 1816 receives broadcast singal or broadcast correlation from external broadcasting management system via broadcast channel Information.In one exemplary embodiment, the communication component 1816 also includes near-field communication (NFC) module, to promote short distance Communication.For example, radio frequency identification (RFID) technology, Infrared Data Association (IrDA) technology, ultra wide band can be based in NFC module (UWB) technology, bluetooth (BT) technology and other technologies are realized.
In the exemplary embodiment, device 1800 can be by one or more application specific integrated circuits (ASIC), numeral Signal processor (DSP), digital signal processing appts (DSPD), PLD (PLD), field programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic components are realized, for performing the checking based on checking mail Method.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instructing, example are additionally provided Such as include the memory 1804 of instruction, above-mentioned instruction can be performed to complete based on checking mail by the processor 1820 of device 1800 Verification method.For example, the non-transitorycomputer readable storage medium can be ROM, random access memory (RAM), CD-ROM, tape, floppy disk and optical data storage devices etc..
Figure 19 is a kind of block diagram of checking device 1900 based on checking mail according to further example embodiment. For example, device 1900 may be provided in a server.Reference picture 19, device 1900 includes processing assembly 1922, and its is further , can be by processing assembly for storing including one or more processors, and as the memory resource representated by memory 1932 The instruction of 1922 execution, such as application program.The application program stored in memory 1932 can include one or one with On each correspond to the module of one group of instruction.In addition, processing assembly 1922 is configured as execute instruction, it is based on testing to perform Demonstrate,prove the verification method of mail.
Device 1900 can also include the power management that a power supply module 1926 is configured as performs device 1900, one Wired or wireless network interface 1950 is configured as device 1900 being connected to network, and input and output (I/O) interface 1958.Device 1900 can be operated based on the operating system for being stored in memory 1932, such as Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM or similar.
Those skilled in the art will readily occur to other embodiment party of the disclosure after considering specification and putting into practice the disclosure Case.The application is intended to any modification, purposes or the adaptations of the disclosure, these modifications, purposes or adaptability Change follows the general principle of the disclosure and including the undocumented common knowledge or usual skill in the art of the disclosure Art means.Description and embodiments are considered only as exemplary, and the true scope of the disclosure and spirit are by following claim Point out.
It should be appreciated that the precision architecture that the disclosure is not limited to be described above and is shown in the drawings, and And various modifications and changes can be being carried out without departing from the scope.The scope of the present disclosure is only limited by appended claim.

Claims (20)

1. a kind of verification method based on checking mail, applied to terminal, it is characterised in that methods described includes:
Checking request for verifying the first user is sent by user end to server;
After the server sends checking mail to the confirmation email of first user, obtain described by the client The address of confirmation email;
The checking is logged in the client according to the login password of the address of the confirmation email and the confirmation email Mailbox;
The checking mail is searched in the confirmation email by the client;
After the checking mail is found, verified in the client using the checking information in the checking mail Operation.
2. according to the method described in claim 1, it is characterised in that it is described checking from the server to first user Mailbox is sent after checking mail, and the address of the confirmation email is obtained by the client, including:
After the server sends checking mail to the confirmation email of first user, receive described by the client The checking notification message that server is sent, the checking notification message includes the address of the confirmation email.
3. according to the method described in claim 1, it is characterised in that it is described checking from the server to first user Mailbox is sent after checking mail, and the address of the confirmation email is obtained by the client, including:
Confirmation email from the server to first user send checking mail after, according to first user with it is described The binding relationship of confirmation email, obtains the address of the confirmation email, the binding relationship is to be pre-configured in the client In.
4. method according to claim 2, it is characterised in that also include checking information mould in the checking notification message Plate, it is described that the checking mail is searched in the confirmation email by the client, including:
After confirmation email described in Successful login, the mail server of confirmation email is connected to by the client;
According to the checking information template, the keyword of the checking information is determined;
The checking is searched according to the keyword and the default search restrictive condition in the mail server Mail, the search restrictive condition includes default mail reception time range, and/or mail look-up quantity.
5. method according to claim 3, it is characterised in that also include in the binding relationship:With the confirmation email Corresponding checking information template, it is described that the checking mail is searched in the confirmation email by the client, including:
After confirmation email described in Successful login, the mail server of confirmation email is connected to by the client;
The checking information template is obtained according to the binding relationship;
According to the checking information template, the keyword of the checking information is determined;
The checking is searched according to the keyword and the default search restrictive condition in the mail server Mail, the search restrictive condition includes default mail reception time range, and/or mail look-up quantity.
6. according to the method described in claim 1, it is characterised in that the address according to the confirmation email and the checking The login password of mailbox logs in the confirmation email in the client, including:
According to the address of the confirmation email, the login interface of the confirmation email, the login are generated in the client Interface includes the address of the confirmation email of Auto-writing and the input frame for inputting the login password;
Receive the login password inputted in the input frame;
According to the address of the confirmation email and the login password, stepping on for the confirmation email is carried out on the login interface Record.
7. according to the method described in claim 1, it is characterised in that the address according to the confirmation email and the checking The login password of mailbox logs in the confirmation email in the client, including:
According to the address of the confirmation email, the login interface of the confirmation email, the login are generated in the client Interface includes the address of the confirmation email of Auto-writing and the input frame for inputting the login password;
Determine whether to have stored the corresponding login password in address of the confirmation email in the client;
When having stored the login password in the client, the login password stored in the client is obtained;
When not storing the login password in the client, the login password inputted in the input frame is received;
According to the address of the confirmation email and the login password, stepping on for the confirmation email is carried out on the login interface Record.
8. according to the method described in claim 1, it is characterised in that described after the checking mail is found, in the visitor Verification operation is carried out using the checking information in the checking mail on the end of family, including:
After the checking mail is found, the internal memory of preset capacity is distributed by the client;
The checking mail is downloaded in the client from the mail server of the confirmation email, and is stored in described In internal memory;
Content to the checking mail in the internal memory of the client carries out filter analysis, is believed with obtaining the checking Breath;
Verification operation is carried out using the checking information by the client.
9. method according to claim 8, it is characterised in that methods described also includes:
When first user logs off in the client, or the client it is out of service in the terminal when When, empty the internal memory.
10. a kind of checking device based on checking mail, applied to terminal, it is characterised in that described device includes:
Sending module, is configured as sending the checking request for verifying the first user by user end to server;
Acquisition module, is configured as after the server sends checking mail to the confirmation email of first user, passes through The client obtains the address of the confirmation email;
Mailbox login module, is configured as according to the address of the confirmation email and the login password of the confirmation email described The confirmation email is logged in client;
Mail look-up module, is configured as searching the checking mail in the confirmation email by the client;
Authentication module, is configured as after the checking mail is found, using in the checking mail in the client Checking information carry out verification operation.
11. device according to claim 10, it is characterised in that the acquisition module, is configured as:
After the server sends checking mail to the confirmation email of first user, receive described by the client The checking notification message that server is sent, the checking notification message includes the address of the confirmation email.
12. device according to claim 10, it is characterised in that the acquisition module, is additionally configured to:
Confirmation email from the server to first user send checking mail after, according to first user with it is described The binding relationship of confirmation email, obtains the address of the confirmation email, the binding relationship is to be pre-configured in the client In.
13. also including checking information template in device according to claim 11, the checking notification message, its feature exists In, the mail look-up module, including:
Server connects submodule, is configured as after confirmation email described in Successful login, is connected to and tested by the client Demonstrate,prove the mail server of mailbox;
Keyword determination sub-module, is configured as, according to the checking information template, determining the keyword of the checking information;
Mail look-up submodule, is configured as in the mail server according to the keyword and the default search Restrictive condition searches the checking mail, and the search restrictive condition includes default mail reception time range, and/or postal Part searches quantity.
14. device according to claim 12, it is characterised in that also include in the binding relationship:With the checking postal The corresponding checking information template of case, the mail look-up module, including:
Server connects submodule, is configured as after confirmation email described in Successful login, is connected to and tested by the client Demonstrate,prove the mail server of mailbox;
Template acquisition submodule, is configured as obtaining the checking information template according to the binding relationship;
Keyword determination sub-module, is configured as, according to the checking information template, determining the keyword of the checking information;
Mail look-up submodule, is configured as in the mail server according to the keyword and the default search Restrictive condition searches the checking mail, and the search restrictive condition includes default mail reception time range, and/or postal Part searches quantity.
15. device according to claim 10, it is characterised in that the mailbox login module, including:
Interface generates submodule, is configured as the address according to the confirmation email, the checking is generated in the client The login interface of mailbox, the login interface includes the address of the confirmation email of Auto-writing and for inputting the login The input frame of password;
Password acceptance submodule, is configured as receiving the login password inputted in the input frame;
Mailbox logs in submodule, the address according to the confirmation email and the login password is configured as, in login circle The login of the confirmation email is carried out on face.
16. device according to claim 10, it is characterised in that the mailbox login module, including:
Interface generates submodule, is additionally configured to the address according to the confirmation email, is tested in the client described in generation The login interface of mailbox is demonstrate,proved, the login interface includes the address of the confirmation email of Auto-writing and for inputting described step on Record the input frame of password;
Password determination sub-module, is configured to determine that the address that the confirmation email whether has been stored in the client is corresponding The login password;
Password acceptance submodule, is additionally configured to when having stored the login password in the client, obtains in the visitor The login password stored on the end of family;When not storing the login password in the client, receive in the input frame The login password of middle input;
Mailbox logs in submodule, is additionally configured to the address according to the confirmation email and the login password, is logged in described The login of the confirmation email is carried out on interface.
17. device according to claim 10, it is characterised in that the authentication module, including:
Memory Allocation submodule, is configured to after the checking mail is found, preset capacity is distributed by the client Internal memory;
Mail downloads submodule, is configured as from the mail server of the confirmation email checking mail downloading to institute State in client, and be stored in the internal memory;
Checking information acquisition submodule, is configured as the content to the checking mail in the internal memory of the client and enters Row filter analysis, to obtain the checking information;
Verification operation implementation sub-module, is configured as carrying out verification operation using the checking information by the client.
18. device according to claim 17, it is characterised in that the authentication module also includes:
Internal memory clears up submodule, is configured as first user and is logged off in the client, or the client End in the terminal it is out of service constantly, empty the internal memory.
19. a kind of checking device based on checking mail, applied to terminal, it is characterised in that including:
Processor;
Memory for storing processor-executable instruction;
Wherein, the processor is configured as:
Checking request for verifying the first user is sent by user end to server;
After the server sends checking mail to the confirmation email of first user, obtain described by the client The address of confirmation email;
The checking is logged in the client according to the login password of the address of the confirmation email and the confirmation email Mailbox;
The checking mail is searched in the confirmation email by the client;
After the checking mail is found, verified in the client using the checking information in the checking mail Operation.
20. a kind of computer-readable recording medium, is stored thereon with computer program instructions, it is characterised in that the computer The step of method any one of claim 1-9 is realized when programmed instruction is executed by processor.
CN201710527120.0A 2017-06-30 2017-06-30 Verification method, device and storage medium based on checking mail Pending CN107172087A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710527120.0A CN107172087A (en) 2017-06-30 2017-06-30 Verification method, device and storage medium based on checking mail

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710527120.0A CN107172087A (en) 2017-06-30 2017-06-30 Verification method, device and storage medium based on checking mail

Publications (1)

Publication Number Publication Date
CN107172087A true CN107172087A (en) 2017-09-15

Family

ID=59827732

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710527120.0A Pending CN107172087A (en) 2017-06-30 2017-06-30 Verification method, device and storage medium based on checking mail

Country Status (1)

Country Link
CN (1) CN107172087A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109327445A (en) * 2018-10-22 2019-02-12 顺丰科技有限公司 Administrator's identity authentication method, device, server and storage medium
CN109362079A (en) * 2018-11-05 2019-02-19 北京小米移动软件有限公司 Data processing method and device
CN110445754A (en) * 2019-07-02 2019-11-12 平安科技(深圳)有限公司 The domain Windows account processing method, server and computer readable storage medium
CN112153059A (en) * 2020-09-27 2020-12-29 闻泰通讯股份有限公司 Mail verification code acquisition method and device, electronic equipment and storage medium
WO2021004057A1 (en) * 2019-07-10 2021-01-14 创新先进技术有限公司 Information processing method, apparatus and device and a computer readable storage medium
CN113067823A (en) * 2021-03-22 2021-07-02 西安电子科技大学 Mail user identity authentication and key distribution method, system, device and medium
CN114978552A (en) * 2022-06-15 2022-08-30 中国联合网络通信集团有限公司 Safe management method, device, equipment and medium for mailbox verification code
US11431694B2 (en) 2019-07-10 2022-08-30 Advanced New Technologies Co., Ltd. Secure account modification

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1620065A (en) * 2003-11-17 2005-05-25 佳能株式会社 Communication apparatus, electronic mail transmitting method, and electronic mail transmitting program
CN103401685A (en) * 2013-07-24 2013-11-20 惠州Tcl移动通信有限公司 Mobile terminal and information processing method thereof
CN106656986A (en) * 2016-11-01 2017-05-10 上海摩软通讯技术有限公司 Method and device for biological feature authentication
CN106713114A (en) * 2015-11-17 2017-05-24 阿里巴巴集团控股有限公司 Verification information processing method and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1620065A (en) * 2003-11-17 2005-05-25 佳能株式会社 Communication apparatus, electronic mail transmitting method, and electronic mail transmitting program
CN103401685A (en) * 2013-07-24 2013-11-20 惠州Tcl移动通信有限公司 Mobile terminal and information processing method thereof
CN106713114A (en) * 2015-11-17 2017-05-24 阿里巴巴集团控股有限公司 Verification information processing method and device
CN106656986A (en) * 2016-11-01 2017-05-10 上海摩软通讯技术有限公司 Method and device for biological feature authentication

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109327445A (en) * 2018-10-22 2019-02-12 顺丰科技有限公司 Administrator's identity authentication method, device, server and storage medium
CN109362079A (en) * 2018-11-05 2019-02-19 北京小米移动软件有限公司 Data processing method and device
CN109362079B (en) * 2018-11-05 2023-09-12 北京小米移动软件有限公司 Data processing method and device
CN110445754A (en) * 2019-07-02 2019-11-12 平安科技(深圳)有限公司 The domain Windows account processing method, server and computer readable storage medium
CN110445754B (en) * 2019-07-02 2023-04-28 平安科技(深圳)有限公司 Windows domain account processing method, server and computer readable storage medium
WO2021004057A1 (en) * 2019-07-10 2021-01-14 创新先进技术有限公司 Information processing method, apparatus and device and a computer readable storage medium
US11431694B2 (en) 2019-07-10 2022-08-30 Advanced New Technologies Co., Ltd. Secure account modification
CN112153059A (en) * 2020-09-27 2020-12-29 闻泰通讯股份有限公司 Mail verification code acquisition method and device, electronic equipment and storage medium
CN113067823A (en) * 2021-03-22 2021-07-02 西安电子科技大学 Mail user identity authentication and key distribution method, system, device and medium
CN113067823B (en) * 2021-03-22 2021-11-23 西安电子科技大学 Mail user identity authentication and key distribution method, system, device and medium
CN114978552A (en) * 2022-06-15 2022-08-30 中国联合网络通信集团有限公司 Safe management method, device, equipment and medium for mailbox verification code

Similar Documents

Publication Publication Date Title
CN107172087A (en) Verification method, device and storage medium based on checking mail
CN104780155B (en) Apparatus bound method and device
CN104270404B (en) A kind of login method and device based on terminal iidentification
CN104243155B (en) The method and device of safety verification
US20160021610A1 (en) Network connection method and apparatus
CN104468463B (en) Verification method, device and system
CN106453245A (en) Method and apparatus for verifying identity
CN109407528A (en) Safety access method, device, server and storage medium
CN105100096B (en) Verification method and device
CN104717622A (en) Information forwarding method and device, terminal and server
CN106454800A (en) Identity verification method, device and system
CN109040049B (en) User registration method and device and electronic equipment
CN102904860A (en) Mobile terminal and login method for user of mobile terminal
CN106130735A (en) The processing method of a kind of communication information, device and mobile terminal
CN109660531A (en) A kind of auth method, server and customer service terminal
CN105392141A (en) Device control method and device
CN108712435A (en) A kind of verification system and method for login application program
KR20170012872A (en) Method and apparatus for acquiring search results
CN107230060A (en) The method and apparatus that a kind of account is reported the loss
US20140243045A1 (en) Method for provisioning of a sim card
CN109560986A (en) Test method, device and the test macro of things-internet gateway equipment
CN107395624A (en) Information processing method and device
CN110730446A (en) Login method, terminal and computer storage medium
CN105337937B (en) Network verification method, device and computer readable storage medium
CN114915923A (en) 5G message-as-a-service triggering method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170915