CN107172087A - Verification method, device and storage medium based on checking mail - Google Patents
Verification method, device and storage medium based on checking mail Download PDFInfo
- Publication number
- CN107172087A CN107172087A CN201710527120.0A CN201710527120A CN107172087A CN 107172087 A CN107172087 A CN 107172087A CN 201710527120 A CN201710527120 A CN 201710527120A CN 107172087 A CN107172087 A CN 107172087A
- Authority
- CN
- China
- Prior art keywords
- checking
- client
- confirmation email
- login
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/42—Mailbox-related aspects, e.g. synchronisation of mailboxes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Information Transfer Between Computers (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
This disclosure relates to a kind of verification method, device and storage medium based on checking mail, this method sends the checking request for verifying the first user by user end to server, and obtain the address of the confirmation email of server transmission, afterwards according to the login password of the address of confirmation email and confirmation email login authentication mailbox on the client, then checking mail is searched in confirmation email, after checking mail is found, verification operation is carried out using the checking information verified in mail on the client.Checking mail is got by connectivity verification mailbox on the client, and determine checking information to complete verification operation on the client, verification operation need not be carried out by the special login authentication mailbox of user again, so as in the case where ensuring information security, simplify the verification operation to user identity.
Description
Technical field
This disclosure relates to network technique field, more particularly to a kind of verification method, device and storage based on checking mail
Medium.
Background technology
In correlation technique, new user carries out e-mail registry or in wholesale network payment, and these are deemed likely to occur not
In the abnormal behaviour of safety factor, the mailbox specified to user of mail that checking user identity can be sent, the interior meeting of the checking mail
Comprising some checking informations, e.g. identifying code or a checking network address for checking are, it is necessary to which user obtains after opening mail
Take identifying code and inputted or for checking network address, the click of checking network address is carried out, so as to user's body of current operation
Part is verified, realizes verification operation, reduces the stolen possibility of user identity.
The content of the invention
To overcome problem present in correlation technique, the disclosure provides a kind of verification method, device based on checking mail
And storage medium.
According to the first aspect of the embodiment of the present disclosure there is provided a kind of verification method based on checking mail, applied to terminal,
Including:
Checking request for verifying the first user is sent by user end to server;
After the server sends checking mail to the confirmation email of first user, obtained by the client
The address for the confirmation email that server is sent;
Described in being logged according to the login password of the address of the confirmation email and the confirmation email in the client
Confirmation email;
The checking mail is searched in the confirmation email by the client;
After the checking mail is found, carried out in the client using the checking information in the checking mail
Verification operation.
Optionally, it is described after the server sends checking mail to the confirmation email of first user, pass through institute
The address that client obtains the confirmation email is stated, including:
After the server sends checking mail to the confirmation email of first user, received by the client
The checking notification message that the server is sent, the checking notification message includes the address of the confirmation email.
Optionally, it is described after the server sends checking mail to the confirmation email of first user, pass through institute
The address that client obtains the confirmation email is stated, including:
Confirmation email from the server to first user send checking mail after, according to first user with
The binding relationship of the confirmation email, obtains the address of the confirmation email, the binding relationship is to be pre-configured in the visitor
In the end of family.
Optionally, it is described checking notification message in also include checking information template, it is described by the client described
The checking mail is searched in confirmation email, including:
After confirmation email described in Successful login, the mail server of confirmation email is connected to by the client;
According to the checking information template, the keyword of the checking information is determined;
Described in being searched in the mail server according to the keyword and the default search restrictive condition
Mail is verified, the search restrictive condition includes default mail reception time range, and/or mail look-up quantity.
Optionally, checking information template corresponding with the confirmation email is also included in the binding relationship, it is described to pass through
The client searches the checking mail in the confirmation email, including:
After confirmation email described in Successful login, the mail server of confirmation email is connected to by the client;
The checking information template is obtained according to the binding relationship;
According to the checking information template, the keyword of the checking information is determined;
Described in being searched in the mail server according to the keyword and the default search restrictive condition
Mail is verified, the search restrictive condition includes default mail reception time range, and/or mail look-up quantity.
Optionally, it is described checking notification message in also include checking information template, it is described by the client described
The checking mail is searched in confirmation email, including:
After confirmation email described in Successful login, the mail server of confirmation email is connected to by the client;
According to the checking information template, the keyword of the checking information is determined;
Described in being searched in the mail server according to the keyword and the default search restrictive condition
Mail is verified, the search restrictive condition includes default mail reception time range, and/or mail look-up quantity.
Optionally, checking information template corresponding with the confirmation email is also included in the binding relationship, it is described to pass through
The client searches the checking mail in the confirmation email, including:
After confirmation email described in Successful login, the mail server of confirmation email is connected to by the client;
The checking information template is obtained according to the binding relationship;
According to the checking information template, the keyword of the checking information is determined;
Described in being searched in the mail server according to the keyword and the default search restrictive condition
Mail is verified, the search restrictive condition includes default mail reception time range, and/or mail look-up quantity.
Optionally, it is described according to the address of the confirmation email and the login password of the confirmation email in the client
The upper login confirmation email, including:
According to the address of the confirmation email, the login interface of the confirmation email is generated in the client, it is described
Login interface includes the address of the confirmation email of Auto-writing and the input frame for inputting the login password;
Receive the login password inputted in the input frame;
According to the address of the confirmation email and the login password, the confirmation email is carried out on the login interface
Login.
Optionally, it is described according to the address of the confirmation email and the login password of the confirmation email in the client
The upper login confirmation email, including:
According to the address of the confirmation email, the login interface of the confirmation email is generated in the client, it is described
Login interface includes the address of the confirmation email of Auto-writing and the input frame for inputting the login password;
Determine whether to have stored the corresponding login password in address of the confirmation email in the client;
When having stored the login password in the client, the login stored in the client is obtained close
Code;When not storing the login password in the client, the login password inputted in the input frame is received;
According to the address of the confirmation email and the login password, the confirmation email is carried out on the login interface
Login.
Optionally, it is described after the checking mail is found, using in the checking mail in the client
Checking information carries out verification operation, including:
After the checking mail is found, the internal memory of preset capacity is distributed by the client;
The checking mail is downloaded in the client from the mail server of the confirmation email, and is stored in
In the internal memory;
Content to the checking mail in the internal memory of the client carries out filter analysis, to obtain described test
Demonstrate,prove information;
Verification operation is carried out using the checking information by the client.
Optionally, methods described also includes:
When first user logs off in the client, or the client stops fortune in the terminal
Row constantly, empties the internal memory.
According to the second aspect of the embodiment of the present disclosure there is provided a kind of verification method based on checking mail, applied to service
Device, including:
What receiving terminal was sent is used for the checking request of the first user of checking;
In response to the checking request, checking mail, the checking mail are sent to the confirmation email of first user
Including checking information;
The address of the confirmation email is sent to the terminal, is tested for the terminal by the client according to
The address template of card mailbox obtains checking information from the confirmation email;
The verification operation initiated by the terminal in the client using the checking information is obtained on described
The result of checking information;
The result is sent to the terminal, so as to which the result is sent into the client.
Optionally, the checking information include identifying code and checking network address, it is described by the terminal in the client
The upper verification operation initiated using the checking information obtains the result on the checking information, including:
When the checking information is the checking network address, obtain the terminal and the checking is accessed by the client
The result that network address is obtained;Or,
When the checking information is the identifying code, the checking that the terminal is sent by the client is received
Code;
Verification operation is carried out according to the identifying code received, result is verified.
According to the third aspect of the embodiment of the present disclosure there is provided a kind of checking device based on checking mail, applied to terminal,
Described device includes:
Sending module, is configured as sending the checking request for verifying the first user by user end to server;
Acquisition module, is configured as after the server sends checking mail to the confirmation email of first user,
The address for the confirmation email that server is sent is obtained by the client;
Mailbox login module, is configured as being existed according to the address of the confirmation email and the login password of the confirmation email
The confirmation email is logged in the client;
Mail look-up module, is configured as searching the checking mail in the confirmation email by the client;
Authentication module, is configured as after the checking mail is found, the checking postal is utilized in the client
Checking information in part carries out verification operation.
Optionally, the acquisition module, is configured as:
After the server sends checking mail to the confirmation email of first user, received by the client
The checking notification message that the server is sent, the checking notification message includes the address of the confirmation email.
Optionally, the acquisition module, is additionally configured to:
Confirmation email from the server to first user send checking mail after, according to first user with
The binding relationship of the confirmation email, obtains the address of the confirmation email, the binding relationship is to be pre-configured in the visitor
In the end of family.
Optionally, described verify also includes checking information template in notification message, the mail look-up module, including:
Server connects submodule, is configured as after confirmation email described in Successful login, is connected by the client
To the mail server of confirmation email;
Keyword determination sub-module, is configured as, according to the checking information template, determining the key of the checking information
Word;
Mail look-up submodule, is configured as in the mail server according to the keyword and described default
Search restrictive condition searches the checking mail, and the search restrictive condition includes default mail reception time range, and/
Or mail look-up quantity.
Optionally, checking information template corresponding with the confirmation email, the mail are also included in the binding relationship
Searching modul, including:
Server connects submodule, is configured as after confirmation email described in Successful login, is connected by the client
To the mail server of confirmation email;
Template acquisition submodule, is configured as obtaining the checking information template according to the binding relationship;
Keyword determination sub-module, is configured as, according to the checking information template, determining the key of the checking information
Word;
Mail look-up submodule, is configured as in the mail server according to the keyword and described default
Search restrictive condition searches the checking mail, and the search restrictive condition includes default mail reception time range, and/
Or mail look-up quantity.
Optionally, the mailbox login module, including:
Interface generates submodule, is configured as the address according to the confirmation email, is generated in the client described
The login interface of confirmation email, the login interface includes the address of the confirmation email of Auto-writing and described for inputting
The input frame of login password;
Password acceptance submodule, is configured as receiving the login password inputted in the input frame;
Mailbox logs in submodule, is configured as the address according to the confirmation email and the login password, is stepped on described
The login of the confirmation email is carried out on record interface.
Optionally, the mailbox login module, including:
Interface generates submodule, is additionally configured to the address according to the confirmation email, institute is generated in the client
The login interface of confirmation email is stated, the login interface includes the address of the confirmation email of Auto-writing and for inputting
State the input frame of login password;
Password determination sub-module, is configured to determine that the address pair that the confirmation email whether has been stored in the client
The login password answered;
Password acceptance submodule, is additionally configured to when having stored the login password in the client, obtains in institute
State the login password stored in client;When not storing the login password in the client, receive described defeated
Enter the login password inputted in frame;
Mailbox logs in submodule, the address according to the confirmation email and the login password is additionally configured to, described
The login of the confirmation email is carried out on login interface.
Optionally, the authentication module, including:
Memory Allocation submodule, is configured to after the checking mail is found, is distributed by the client default
The internal memory of capacity;
Mail downloads submodule, is configured as from the mail server of the confirmation email downloading in the checking mail
Onto the client, and it is stored in the internal memory;
Checking information acquisition submodule, is configured as in the internal memory of the client in the checking mail
Hold and carry out filter analysis, to obtain the checking information;
Verification operation implementation sub-module, is configured as carrying out checking behaviour using the checking information by the client
Make.
Optionally, the authentication module also includes:
Internal memory clears up submodule, is configured as first user and is logged off in the client, or described
Client in the terminal it is out of service constantly, empty the internal memory.
According to the fourth aspect of the embodiment of the present disclosure there is provided a kind of checking device based on checking mail, applied to service
Device, described device includes:
Receiving module, is configured as the checking request for being used to verify the first user of receiving terminal transmission;
Sending module, is configured to respond to the checking request, sends and verifies to the confirmation email of first user
Mail, the checking mail includes checking information;
Sending module, is additionally configured to send the address of the confirmation email to the terminal, passes through for the terminal
The client obtains checking information according to the address of the confirmation email from the confirmation email;
The result acquisition module, is configured as sending out using the checking information in the client by the terminal
The verification operation risen obtains the result on the checking information;
Sending module, is additionally configured to the result being sent to the terminal, so as to which the result is sent out
Give the client.
Optionally, the checking information includes identifying code and verifies network address, the result acquisition module, including:
The result acquisition submodule, when being configured as the checking information for the checking network address, obtains the end
Hold and the result that the checking network address is obtained is accessed by the client;Or,
Identifying code acquisition submodule, when being configured as the checking information for the identifying code, receives the terminal and leads to
Cross the identifying code that the client is sent;
The result acquisition submodule, is additionally configured to carry out verification operation according to the identifying code received, obtains
The result.
According to the 5th of the embodiment of the present disclosure the aspect there is provided a kind of checking device based on checking mail, applied to terminal,
Including:
Processor;
Memory for storing processor-executable instruction;
Wherein, the processor is configured as:
Checking request for verifying the first user is sent by user end to server;
After the server sends checking mail to the confirmation email of first user, obtained by the client
The address for the confirmation email that server is sent;
Described in being logged according to the login password of the address of the confirmation email and the confirmation email in the client
Confirmation email;
The checking mail is searched in the confirmation email by the client;
After the checking mail is found, carried out in the client using the checking information in the checking mail
Verification operation.
According to the 6th of the embodiment of the present disclosure the aspect there is provided a kind of checking device based on checking mail, applied to service
Device, including:
Processor;
Memory for storing processor-executable instruction;
Wherein, the processor is configured as:
What receiving terminal was sent is used for the checking request of the first user of checking;
In response to the checking request, checking mail, the checking mail are sent to the confirmation email of first user
Including checking information;
The address of the confirmation email and the template of the checking information are sent to the terminal, is passed through for the terminal
The client obtains checking according to the address of the confirmation email and the template of the checking information from the confirmation email
Information;
The verification operation initiated by the terminal in the client using the checking information is obtained on described
The result of checking information;
The result is sent to the terminal, so as to which the result is sent into the client.
According to the 7th of the embodiment of the present disclosure the aspect there is provided a kind of computer-readable recording medium, calculating is stored thereon with
Machine programmed instruction, the programmed instruction realizes the testing based on checking mail that disclosure first aspect is provided when being executed by processor
The step of card method.
According to the eighth aspect of the embodiment of the present disclosure there is provided a kind of computer-readable recording medium, calculating is stored thereon with
Machine programmed instruction, the programmed instruction realizes the testing based on checking mail that disclosure second aspect is provided when being executed by processor
The step of card method.
The technical scheme provided by this disclosed embodiment can include the following benefits:
Checking request for verifying the first user is sent by user end to server, in the server to described the
The confirmation email of one user is sent after checking mail, and the ground for the confirmation email that server is sent is obtained by the client
Location, the checking postal is logged according to the login password of the address of the confirmation email and the confirmation email in the client
Case, the checking mail is searched by the client in the confirmation email, after the checking mail is found, in institute
State and the checking information progress verification operation in the checking mail is utilized in client.The disclosure provide technical scheme by
Connectivity verification mailbox gets checking mail in client, and determines checking information to complete checking behaviour on the client
Make, it is not necessary to verification operation is carried out by the special login authentication mailbox of user again, it is simple so as in the case where ensuring information security
Change the verification operation to user identity.
It should be appreciated that the general description of the above and detailed description hereinafter are only exemplary and explanatory, not
The disclosure can be limited.
Brief description of the drawings
Accompanying drawing herein is merged in specification and constitutes the part of this specification, shows the implementation for meeting the disclosure
Example, and be used to together with specification to explain the principle of the disclosure.
Fig. 1 is a kind of flow chart of verification method based on checking mail according to an exemplary embodiment;
Fig. 2 is the flow chart of another verification method based on checking mail according to an exemplary embodiment;
Fig. 3 is the flow chart of another verification method based on checking mail according to an exemplary embodiment;
Fig. 4 is the flow chart of another verification method based on checking mail according to an exemplary embodiment;
Fig. 5 is the flow chart of another verification method based on checking mail according to an exemplary embodiment;
Fig. 6 is the flow chart of another verification method based on checking mail according to an exemplary embodiment;
Fig. 7 is a kind of flow chart of verification method based on checking mail according to another exemplary embodiment;
Fig. 8 is the flow chart of another verification method based on checking mail according to another exemplary embodiment;
Fig. 9 is a kind of checking device block diagram based on checking mail according to an exemplary embodiment;
Figure 10 is a kind of mail look-up module frame chart according to an exemplary embodiment;
Figure 11 is a kind of mail look-up module frame chart according to an exemplary embodiment;
Figure 12 is a kind of mailbox login module block diagram according to an exemplary embodiment;
Figure 13 is another mailbox login module block diagram according to an exemplary embodiment;
Figure 14 is a kind of authentication module block diagram according to an exemplary embodiment;
Figure 15 is another authentication module block diagram according to an exemplary embodiment;
Figure 16 is a kind of checking device block diagram based on checking mail according to another exemplary embodiment;
Figure 17 is a kind of the result acquisition module block diagram according to another exemplary embodiment;
Figure 18 is a kind of block diagram of checking device based on checking mail according to further example embodiment;
Figure 19 is a kind of block diagram of checking device based on checking mail according to further example embodiment.
Embodiment
Here exemplary embodiment will be illustrated in detail, its example is illustrated in the accompanying drawings.Following description is related to
During accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represent same or analogous key element.Following exemplary embodiment
Described in embodiment do not represent all embodiments consistent with the disclosure.On the contrary, they be only with it is such as appended
The example of the consistent apparatus and method of some aspects be described in detail in claims, the disclosure.
Fig. 1 is a kind of flow chart of verification method based on checking mail according to an exemplary embodiment, such as Fig. 1
Shown, this method is applied in terminal, is comprised the following steps:
In step 110, the checking request for verifying the first user is sent by user end to server.
Illustratively, client can be an application program, when needing to carry out the checking of user identity, for example, user
Login behavior either a payment behavior, it is necessary to by the application program to server send checking request, to carry out
Following subscriber authentication operation.
In the step 120, after server sends checking mail to the confirmation email of the first user, obtained by client
The address for the confirmation email that server is sent.
Illustratively, after checking request is have sent in step 110, server can be used according to the checking request to first first
The confirmation email at family, which sends one, is used for the checking mail of authentication, then in the first implementation, can perform with
Lower step obtains the address of confirmation email:
After server sends checking mail to the confirmation email of the first user, sent by client the reception server
Notification message is verified, checking notification message includes the address of confirmation email.
I.e. after server have sent checking mail to confirmation email, it is notified that client will be carried out used in authentication
The address of confirmation email.
Or, in second of implementation, following steps can be performed to obtain the address of confirmation email:
After server sends checking mail to the confirmation email of the first user, according to tying up for the first user and confirmation email
Determine relation, obtain the address of confirmation email, the binding relationship is pre-configured with the client.Optionally, server to
The confirmation email of first user is sent after checking mail, can receive server transmission in client to be used to indicate to testing
Demonstrate,prove after the notification message that mailbox sends checking mail, according to the first user and the binding relationship of confirmation email, obtain confirmation email
Address.
In step 130, according to the login password of the address of confirmation email and confirmation email login authentication on the client
Mailbox.
Illustratively, it is real with reference to the login password of the confirmation email by the address of the confirmation email obtained in step 120
The register of existing confirmation email.Wherein, the login password can be user's input or once be inputted from user
Password in obtain.
In step 140, checking mail is searched in confirmation email by client.
Example, server can also send checking information after checking mail is sent to the confirmation email to client
Template, or (can be believed according to the keyword of the default checking information template determination search in client such as sender
Breath), in addition the type (identifying code still verifies network address) of checking information can also set mail reception time range, from
And accurately find checking mail.
In step 150, after checking mail is found, carried out on the client using the checking information verified in mail
Verification operation.
Example, after checking mail is found, client can be determined according to checking information template in checking mail
Interior checking information is identifying code or checking network address, then obtains and is verified accordingly using identifying code or checking network address
Operation, so as to realize the checking to user identity.
In summary, the verification method based on checking mail that the disclosure is provided, is sent by user end to server and used
In the checking request of the first user of checking, and the address of the confirmation email of server transmission is obtained, afterwards according to confirmation email
The login password of address and confirmation email login authentication mailbox on the client, then searches checking mail in confirmation email,
After checking mail is found, verification operation is carried out using the checking information verified in mail on the client.The disclosure is provided
Technical scheme checking mail is got by connectivity verification mailbox on the client, and determine checking information so as in client
On can complete verification operation, it is not necessary to verification operation is carried out by the special login authentication mailbox of user again, so as to ensure letter
In the case of ceasing safety, simplify the verification operation to user identity.
Illustratively, Fig. 2 is the stream of another verification method based on checking mail according to an exemplary embodiment
Cheng Tu, as shown in Fig. 2 the login password according to the address of confirmation email and confirmation email described in step 130 is on the client
The step of login authentication mailbox, it may comprise steps of:
In step 1301, according to the address of confirmation email, the login interface of confirmation email is generated on the client, this is stepped on
Record the address of confirmation email of the interface including Auto-writing and the input frame for inputting login password.
Illustratively, client can generate one for user is used for the login interface of login authentication mailbox, wherein verifying postal
The address of case is, according to described in step 120, to be sent to client by server, Auto-writing is good on login interface
, from the point of view of the safety of accounts information, part can be carried out to the address of the confirmation email and hidden, for example, can shown
It is shown as:alia***g@163.com;Being additionally provided with one on the login interface simultaneously needs user to carry out filling in stepping on for confirmation email
The input frame of password is recorded, waits user to carry out the input of login password.
In step 1302, the login password inputted in input frame is received.
User's corresponding login password of input validation mailbox in the input frame of the login interface, to carry out confirmation email
Login.If this be user for the first time on the client login authentication mailbox, it is necessary to which user carries out E-mail address first carries
For the POP3 (English of business:Post Office Protocol-Version 3, Chinese:Post office protocol-version 3) agreement/IMAP
(English:Internet Mail Access Protocol, Chinese:Network mail access protocol) setting, due to same electronics
Mailbox provider for same mail protocol set be typically it is general, therefore for same suffix domain name mailbox setting all
It is the same, for example, is set for suffix domain name for@163.com mailbox using same agreement, therefore client can be
Set to set the agreement during POP3/IMAP for the first time and preserved, so as to avoid repeating next time to set, after accessing again
When sewing the same mailbox or different mailboxes that domain name is@163.com, directly obtain the POP3/IMAP preserved and set.
In step 1303, according to the address of confirmation email and login password, confirmation email is carried out on login interface
Log in.
Got by step 1301 and step 1302 after address and the login password of confirmation email, it is possible to tested
Demonstrate,prove the register of mailbox.
Illustratively, Fig. 3 is the stream of another verification method based on checking mail according to an exemplary embodiment
Cheng Tu, as shown in figure 3, the login password according to the address of confirmation email and confirmation email described in step 130 is on the client
Login authentication mailbox, comprises the following steps:
In step 1304, according to the address of confirmation email, the login interface of confirmation email is generated on the client, this is stepped on
Record the address of confirmation email of the interface including Auto-writing and the input frame for inputting login password.
The step 1301 of the step and embodiment illustrated in fig. 3 is identical, and here is omitted.
In step 1305, determine the corresponding login password in address of confirmation email whether has been stored in client.
Wherein, the login method of the confirmation email shown in Fig. 2 embodiment can be when user utilizes the client for the first time
End carries out what is used during the login of confirmation email, and when user not uses the client login authentication mailbox first, is based on
The corresponding login password of the confirmation email has been stored in register client before.Therefore, when logging in, first determine
With the presence or absence of the login password stored, the operation of step 1306 or step 1307 is carried out further according to judged result.
In step 1306, when having stored login password in client, the login password stored on the client is obtained.
When the login password is stored on the client, client directly gets the login password and can be with automatically
Fill in corresponding login password input frame, to carry out the operation of step 1308, otherwise carry out step 1307.
In step 1307, when not storing login password in client, the login password inputted in input frame is received.
The login password is stored if having no, illustrates that user carries out the login of the confirmation email or in last login for the first time
The preservation of login password is not carried out, now, the step 1302 of the step and Fig. 3 embodiments is identical, and here is omitted.
In step 1308, according to the address of confirmation email and login password, confirmation email is carried out on login interface
Log in.
The step 1303 of the step and Fig. 3 embodiments is identical, and here is omitted.
In addition, illustratively, the login authentication mailbox on the client described in Fig. 1 steps 130 can also be by answering with other
Quick registration is realized with program association, such as confirmation email can use the user name and login password of the affiliate application
Register is carried out, the quick login of confirmation email is carried out by one other application program of client associate.For example, as visitor
Family end has been got after the address of confirmation email, and confirmation has associated application program, for example, associated with the confirmation email
Mailbox application program, directly opens the affiliate application, and the login username and login password of the usual confirmation email are all
Have been saved on the affiliate application, and the confirmation email is probably the shape having logged in the affiliate application
State, now the client mandate of the affiliate application is directly obtained by backstage and then quick registration is carried out, or directly
The register for taking login password to carry out confirmation email is obtained, so as to can realize quick registration checking postal on the client
Case.
Fig. 4 is the flow chart of another verification method based on checking mail according to an exemplary embodiment, such as
Shown in Fig. 4, if using the address that the first implementation obtains the confirmation email in the step 120, step 120 institute
Checking information template can also be included in the checking notification message stated, in this case, client is passed through described in step 140
Checking mail is searched in confirmation email, be may comprise steps of:
In step 1401, after success login authentication mailbox, the mail service of confirmation email is connected to by client
Device.
Illustratively, after the login that confirmation email is carried out by the method described in Fig. 2 or Fig. 3 embodiments, then according to above-mentioned
The agreement set in embodiment to confirmation email, is connected on the server of confirmation email, then carry out the operation of next step.
In step 1402, according to checking information template, the keyword of checking information is determined.
Illustratively, can specify that in the template of checking information this verification operation need obtain information be identifying code also
Be checking network address, and can specify that the keyword of this verification operation, for example, in title comprising " client validation of rice coin ",
Sender is " millet payment ", or it is " mail center " etc., the key that " login authentication ", sender are included in title
The search key that word can verify mail as being searched in below step.
Illustratively, it is " millet payment " comprising " client validation of rice coin ", sender in checking information template is title,
The keyword that checking information can be determined is " rice coin " " checking " " millet payment ", so as to search checking mail.
In step 1403, checking is searched according to keyword and default search restrictive condition in mail server
Mail.
Wherein, the search restrictive condition includes default mail reception time range, and/or mail look-up quantity.
Illustratively, default search restrictive condition can be:It is at nearest 10 minutes in 10 envelope mails before confirmation email
The mail inside collected, so as to directly exclude reception time longer mail, simplifies search step.In combination with step 1402 institute
The keyword of determination:" rice coin " " checking " " millet payment ", carry out checking mail lookup, then the checking mail should meet with
Lower condition:Above-mentioned keyword is included in content, and was collected in nearest 10 minutes, and positioned at preceding 10 envelope of confirmation email
In mail.Or, default search restrictive condition can also only arrange mail reception time range or mail look-up quantity.
For example, search restrictive condition is the mail that receives in nearest 10 minutes, or search restrictive condition for search preceding 20 envelope mail (because
It is typically what is arranged according to the reception time for the sequence of mail in mailbox, before the usual newest mail received can come most
Face), the lookup of checking mail can also be realized then in conjunction with keyword determined by step 142.When find checking mail it
After the step of be further continued for being determined checking information, i.e. step 150.
Fig. 5 is the flow chart of another verification method based on checking mail according to an exemplary embodiment, such as
Shown in Fig. 5, if using the address that second of implementation obtains the confirmation email in the step 120, in step 120
Also include in described binding relationship:Checking information template corresponding with the confirmation email, then pass through client described in step 140
Checking mail is searched at end in confirmation email, may comprise steps of:
In step 1404, after success login authentication mailbox, the mail service of confirmation email is connected to by client
Device.
In step 1405, checking information template is obtained according to the binding relationship.
In step 1406, according to checking information template, the keyword of checking information is determined.
In step 1407, checking is searched according to keyword and default search restrictive condition in mail server
Mail.
Wherein, search restrictive condition includes default mail reception time range, and/or mail look-up quantity.
That is, after server have sent checking mail, notifying client to carry out authentication, client first
It according to the binding relationship pre-set, can just get the address for the confirmation email bound with first user, and root
The corresponding checking information template of the confirmation email can also be obtained according to the binding relationship.It is understood that usual confirmation email
The checking information template that is used of mail service provider be usually fixed, the type of its checking information, either verify
Code either confirmation email is generally all to determine, while verifying that keyword is also to fix in mail.For example, for small
It in title comprising " client validation of rice coin ", sender is " millet payment " that rice payment verification information model, which is, and checking information is
Network address is verified, therefore user oneself can set checking information template corresponding with the confirmation email in the client.
The step 1404 in embodiment shown in Fig. 5,1406,1407, step 1401,1402 Hes can be respectively referred to
1403, here is omitted.
Fig. 6 is the flow chart of another verification method based on checking mail according to an exemplary embodiment, such as
Shown in Fig. 6, described in step 150 find checking mail after, entered on the client using the checking information verified in mail
Row verification operation, comprises the following steps:
In step 1501, after checking mail is found, the internal memory of preset capacity is distributed by the client.
Illustratively, client can distribute the internal memory of preset capacity for the download of the checking mail to terminal application, be used for
The interim storage checking mail, or can also be distributed in the internal memory that the terminal has taken preset capacity come interim storage should
Verify mail.
In step 1502, checking mail is downloaded in client from the mail server of confirmation email, and stores
In the internal memory.
The checking mail for meeting search condition determined in step 1403 is downloaded into client, so as on the client
Carry out the analysis of checking information.Illustratively, client is got after the internal memory of terminal distribution in step 1501, specially interior with this
The checking mail for carrying out interim storage download is deposited, and client can be exited in user, log off or closes client
During interface, interim storage is used for this and verifies that the internal memory of mail is emptied, that is, the e-mail messages downloaded can be lost automatically,
So as to save the memory space of terminal.
In step 1503, to verifying that the content of mail carries out filter analysis in the internal memory of client, tested with obtaining
Demonstrate,prove information.
Client directly to verify mail content carry out filter analysis, it is determined that now checking mail in include be used for test
The checking information of the first user is demonstrate,proved, to carry out the operation of below step.
In step 1504, verification operation is carried out using checking information by client.
Illustratively, this step can be divided into according to the type of specific checking information when checking information is identifying code and believes when verifying
Cease for checking two kinds of website situation:
When checking information is identifying code, the identifying code that step 1503 is obtained is sent directly to server by client, with
The result on identifying code that the reception server is sent afterwards.Finally the result is shown on the client.By the result
Be shown to user be used for inform user whether good authentication, when the result for be proved to be successful when, can directly carry out the checking
Subsequent operation after operating successfully, while completing the operation for emptying internal memory described in step 1505.Otherwise, checking is displayed for a user
The information of failure, and the checking request again for verifying the first user again is sent by user end to server.It may now obtain
When the identifying code got can not realize the operation of good authentication, it may be possible to because the expired either checking mail of identifying code
Obtain abnormal, now need to re-start the acquisition of identifying code, that is, need server to re-issue once new identifying code,
For verifying again.
When checking information is checking network address, access to enter in the checking network address acquired in step 1503 by client first
Row checking.Subsequent client can directly invoke predefined browser application, for example, can be " webview ", for opening
Verify network address.The result on verifying network address that then the reception server is sent again.No matter verify that network address shows the checking
Operate successfully or fail, user is still rested on the interface of client, now obtains the result, client by server
End then carries out the confirmation of the result from trend server, so as to complete verification operation.The result is shown on the client,
When the result when being proved to be successful, can directly to carry out the subsequent operation after verification operation success, while completing step 1505
The described operation for emptying internal memory.Otherwise, the information of authentication failed is displayed for a user, and is sent again by user end to server
The checking request again of the first user of secondary checking.
In step 1505, when the first user logs off on the client, or client is out of service in terminal
Constantly, the internal memory is emptied.
In summary, the verification method based on checking mail that the disclosure is provided, is sent by user end to server and used
In the checking request of the first user of checking, and the address of the confirmation email of server transmission is obtained, afterwards according to confirmation email
The login password of address and confirmation email login authentication mailbox on the client, then searches checking mail in confirmation email,
After checking mail is found, verification operation is carried out using the checking information verified in mail on the client.The disclosure is provided
Technical scheme checking mail is got by connectivity verification mailbox on the client, and determine checking information so as in client
On can complete verification operation, it is not necessary to verification operation is carried out by the special login authentication mailbox of user again, so as to ensure letter
In the case of ceasing safety, simplify the verification operation to user identity.
Fig. 7 is a kind of flow chart of verification method based on checking mail according to another exemplary embodiment, such as
Shown in Fig. 7, this method is applied to server, comprises the following steps:
In step 720, the checking request for being used to verify the first user that receiving terminal is sent.
For example, when either one time payment behavior of once login behavior of user occurs abnormal, client can be to service
Device sends checking request, it is desirable to which server sends checking mail to a confirmation email, for the identity progress to the first user
Verification operation.
In step 720, in response to checking request, checking mail, the checking postal are sent to the confirmation email of the first user
Part includes checking information.
In response to checking request, server directly sends checking mail to confirmation email, is different from general transmission in one's hands
The corresponding terminal of machine number, checking mail eliminates the reliance on cell-phone number either terminal in itself, even if cell-phone number or terminal are lost
The situation of mistake, is also not in potential safety hazard or situation about can not receive.In addition, cell-phone number, which receives short message, also suffers from mobile phone
The strong and weak influence of communication signal, the problem of verifying that mail will not then be influenceed by communication signal, and seldom delay occur.And
Free Email, also saves cost.
In step 730, the address of confirmation email is sent to terminal, for terminal by client according to confirmation email
Address obtains checking information from confirmation email.
Illustratively, the step can include sending checking notification message to terminal, and the checking notification message includes checking
The address of mailbox.
Optionally, it can also include in the checking notification message:Checking information template, for terminal by client according to
The address of confirmation email and checking information template obtain checking information from confirmation email.
It can be understood as:Server is after checking mail is sent to confirmation email, it is necessary to send confirmation email to terminal
Address and the template of checking information, for informing the operation that user will be verified, and inform which mailbox is client remove, and lead to
The checking mail sent just now can be got by crossing which information, so that being obtained in the step of client is easier after
To the checking mail.
In step 740, the verification operation initiated on the client using checking information by terminal is obtained on checking
The result of information.
Illustratively, checking information includes identifying code or checking network address, and client will be tested according to different checking informations
Card operation, and confirm the result.Wherein, the method that the method for client progress verification operation can be as shown in Figure 6, no longer goes to live in the household of one's in-laws on getting married
State.
In step 750, the result is sent to terminal, to transmit verification result to client.
Fig. 8 is the flow chart of another verification method based on checking mail according to another exemplary embodiment,
As shown in figure 8, the verification operation initiated on the client using checking information by terminal described in step 740 is obtained on testing
The result of information is demonstrate,proved, is comprised the following steps:
In step 7401, when checking information is checking network address, obtain terminal and obtained by client access checking network address
The result arrived.Or,
In step 7402, when checking information is identifying code, the identifying code that receiving terminal is sent.
In step 7403, verification operation is carried out according to the identifying code received, result is verified.
I.e. in the case of two kinds of different checking informations, server fit end is respectively completed different type checking behaviour
Make.When checking information is checking network address, the result can be obtained from checking network address after the checking network address is accessed;Work as checking
When information is identifying code, server first receives client and is sent to identifying code, then by the identifying code received with being sent to before
The identifying code of terminal is compared, and so can determine whether to be proved to be successful.
In summary, the verification method based on checking mail that the disclosure is provided, server is sent by receiving terminal
Checking request for verifying the first user, checking mail is sent to the confirmation email of the first user, and checking postal is sent to terminal
The address of case and the template of checking information, by terminal on the client using checking information initiate verification operation obtain on
The result of checking information, terminal is sent to by the result.The technical scheme that the disclosure is provided by connecting on the client
Connect confirmation email and get checking mail, and determine checking information to complete verification operation on the client, it is not necessary to again
Verification operation is carried out by the special login authentication mailbox of user, so as in the case where ensuring information security, simplify to user
The verification operation of identity.
Fig. 9 is a kind of checking device block diagram based on checking mail according to an exemplary embodiment.Reference picture 9,
Applied to terminal, the device 900 includes:
Sending module 910, is configured as sending the checking request for verifying the first user by user end to server.
Acquisition module 920, is configured as after server sends checking mail to the confirmation email of the first user, passes through visitor
Family end obtains the address for the confirmation email that server is sent.
Mailbox login module 930, is configured as according to the address of confirmation email and the login password of confirmation email in client
Login authentication mailbox on end.
Mail look-up module 940, is configured as searching checking mail in confirmation email by client.
Authentication module 950, is configured as after checking mail is found, the checking verified in mail is utilized on the client
Information carries out verification operation.
Illustratively, the acquisition module 920, is configured as:
After server sends checking mail to the confirmation email of the first user, sent by client the reception server
Notification message is verified, the checking notification message includes the address of confirmation email.
Illustratively, the acquisition module 920, is additionally configured to:
After server sends checking mail to the confirmation email of the first user, according to tying up for the first user and confirmation email
Determine relation, obtain the address of confirmation email, the binding relationship is pre-configured with the client.
Optionally, Figure 10 is a kind of mail look-up module frame chart according to an exemplary embodiment.Reference picture 10, should
Mail look-up module 940 includes:
Server connects submodule 941, is configured as after Successful login confirmation email, checking is connected to by client
The mail server of mailbox.
Keyword determination sub-module 942, is configured as determining the keyword of checking information according to checking information template.
Mail look-up submodule 943, is configured as in mail server according to keyword and default search limitation
Condition searches checking mail, and search restrictive condition includes default mail reception time range, and/or mail look-up quantity.
Optionally, checking information template corresponding with confirmation email is also included in the binding relationship, Figure 11 is shown according to one
Example property implements a kind of mail look-up module frame chart exemplified.Reference picture 11, the mail look-up module 940 includes:
Server connects submodule 941, is configured as after confirmation email described in Successful login, is connected to by client
The mail server of confirmation email.
Template acquisition submodule 944, is configured as obtaining checking information template according to binding relationship.
Keyword determination sub-module 942, is configured as determining the keyword of checking information according to checking information template.
Mail look-up submodule 943, is configured as in mail server according to keyword and default search limitation
Condition searches checking mail, and search restrictive condition includes default mail reception time range, and/or mail look-up quantity.
Figure 12 is a kind of mailbox login module block diagram according to an exemplary embodiment.Reference picture 12, the mailbox is stepped on
Record module 930 includes:
Interface generates submodule 931, is configured as the address according to confirmation email, and confirmation email is generated on the client
Login interface, login interface includes the address of the confirmation email of Auto-writing and the input frame for inputting login password.
Password acceptance submodule 932, is configured as receiving the login password inputted in input frame.
Mailbox logs in submodule 933, is configured as the address according to confirmation email and login password, enterprising in login interface
The login of row confirmation email.
Figure 13 is another mailbox login module block diagram according to an exemplary embodiment.Reference picture 13, the mailbox
Login module 930 includes:
Interface generates submodule 931, is additionally configured to the address according to confirmation email, confirmation email is generated on the client
Login interface, the address of the confirmation email of login interface including Auto-writing and the input frame for inputting login password.
Password determination sub-module 934, is configured to determine that the address that confirmation email whether has been stored in client is corresponding
Login password.
Password acceptance submodule 935, is additionally configured to when having stored login password in client, obtains on the client
The login password of storage;When not storing login password in client, the login password inputted in input frame is received.
Mailbox logs in submodule 933, the address according to confirmation email and login password is additionally configured to, on login interface
Carry out the login of confirmation email.
Figure 14 is a kind of authentication module block diagram according to an exemplary embodiment.Reference picture 14, the authentication module 950
Including:
Memory Allocation submodule 951, is configured to after checking mail is found, preset capacity is distributed by client
Internal memory.
Mail downloads submodule 952, is configured as from the mail server of confirmation email checking mail downloading to visitor
On the end of family, and it is stored in internal memory.
Checking information acquisition submodule 953, is configured as in the internal memory of client to verifying that the content of mail was carried out
Filter analysis, information is tested to obtain.
Verification operation implementation sub-module 954, is configured as carrying out verification operation using checking information by client.
Figure 15 is another authentication module block diagram according to an exemplary embodiment.Reference picture 15, the authentication module
950, in addition to:
Internal memory clears up submodule 955, is configured as the first user and logs off on the client, or client is at end
On end it is out of service constantly, empty internal memory.
In summary, the checking device based on checking mail that the disclosure is provided, is sent by user end to server and used
In the checking request of the first user of checking, and the address of the confirmation email of server transmission is obtained, afterwards according to confirmation email
The login password of address and confirmation email login authentication mailbox on the client, then searches checking mail in confirmation email,
After checking mail is found, verification operation is carried out using the checking information verified in mail on the client.It can be seen that, by
Connectivity verification mailbox gets checking mail in client, and determines checking information to complete checking behaviour on the client
Make, it is not necessary to verification operation is carried out by the special login authentication mailbox of user again, it is simple so as in the case where ensuring information security
Change the verification operation to user identity.
Figure 16 is a kind of checking device block diagram based on checking mail according to another exemplary embodiment.Reference picture
16, applied to server, the device 1600 includes:
Receiving module 1610, is configured as the checking request for being used to verify the first user of receiving terminal transmission.
Sending module 1620, is configured to respond to checking request, and checking mail is sent to the confirmation email of the first user,
Verify that mail includes checking information.
Sending module 1620, is additionally configured to send the address of confirmation email to terminal, client root is passed through for terminal
Checking information is obtained from confirmation email according to the address of confirmation email.
The result acquisition module 1630, is configured as the checking initiated on the client using checking information by terminal
Operation obtains the result on checking information.
Sending module 1620, is additionally configured to the result being sent to terminal, to transmit verification result to client
End.
Optionally, sending module 1620, are additionally configured to:
Checking notification message is sent to terminal, checking notification message includes address and the checking information mould of confirmation email
Plate, checking letter is obtained for terminal according to the address and checking information template of confirmation email by client from confirmation email
Breath.
Figure 17 is a kind of the result acquisition module block diagram according to another exemplary embodiment.Reference picture 17, is tested
Demonstrate,proving information includes identifying code and checking network address, and the result acquisition module 1630 includes:
Network address acquisition submodule 1631 is verified, when being configured as checking information for checking network address, terminal is obtained and passes through visitor
Family end accesses the result that checking network address is obtained.Or,
Identifying code acquisition submodule 1632, when being configured as checking information for identifying code, the checking that receiving terminal is sent
Code.
The result acquisition submodule 1633, is additionally configured to carry out verification operation according to the identifying code received, obtains
The result.
In summary, the disclosure provide based on checking mail checking device, by receiving terminal send be used for test
The checking request of the first user is demonstrate,proved, checking mail is sent to the confirmation email of the first user, the ground of confirmation email is sent to terminal
Location and the template of checking information, the verification operation initiated on the client using checking information by terminal is obtained to be believed on checking
The result of breath, terminal is sent to by the result.It can be seen that, checking postal is got by connectivity verification mailbox on the client
Part, and determine checking information to complete verification operation on the client, it is not necessary to again by the special login authentication mailbox of user
Verification operation is carried out, so as in the case where ensuring information security, simplify the verification operation to user identity.
The disclosure also provides a kind of computer-readable recording medium, is stored thereon with computer program instructions, and the program refers to
The verification method based on checking mail that the disclosure is provided is realized in order when being executed by processor the step of.
Figure 18 is a kind of block diagram of checking device 1800 based on checking mail according to further example embodiment.
For example, device 1800 can be mobile phone, computer, digital broadcast terminal, messaging devices, game console, flat board
Equipment, Medical Devices, body-building equipment, personal digital assistant etc..
Reference picture 18, device 1800 can include following one or more assemblies:Processing assembly 1802, memory 1804,
Electric power assembly 1806, multimedia groupware 1808, audio-frequency assembly 1810, the interface 1812 of input/output (I/O), sensor cluster
1814, and communication component 1816.
The integrated operation of the usual control device 1800 of processing assembly 1802, such as with display, call, data communication,
The camera operation operation associated with record operation.Processing assembly 1802 can include one or more processors 1820 to perform
Instruction, to complete all or part of step of the verification method based on checking mail.In addition, processing assembly 1802 can include one
Individual or multiple modules, are easy to the interaction between processing assembly 1802 and other assemblies.For example, processing assembly 1802 can include it is many
Media module, to facilitate the interaction between multimedia groupware 1808 and processing assembly 1802.
Memory 1804 is configured as storing various types of data supporting the operation in device 1800.These data
Example includes the instruction of any application program or method for being used to operate on device 1800, contact data, telephone book data,
Message, picture, video etc..Memory 1804 can by any kind of volatibility or non-volatile memory device or they
Combination realize, such as static RAM (SRAM), Electrically Erasable Read Only Memory (EEPROM), it is erasable can
Program read-only memory (EPROM), programmable read only memory (PROM), read-only storage (ROM), magnetic memory, flash memory
Reservoir, disk or CD.
Electric power assembly 1806 provides electric power for the various assemblies of device 1800.Electric power assembly 1806 can include power management
System, one or more power supplys, and other components associated with generating, managing and distributing electric power for device 1800.
Multimedia groupware 1808 is included in the screen of one output interface of offer between described device 1800 and user.
In some embodiments, screen can include liquid crystal display (LCD) and touch panel (TP).If screen includes touch panel,
Screen may be implemented as touch-screen, to receive the input signal from user.Touch panel includes one or more touch and passed
Sensor is with the gesture on sensing touch, slip and touch panel.The touch sensor can not only sensing touch or slip be dynamic
The border of work, but also the detection duration related to the touch or slide and pressure.In certain embodiments, it is many
Media component 1808 includes a front camera and/or rear camera.When device 1800 is in operation template, mould is such as shot
When plate or video template, front camera and/or rear camera can receive the multi-medium data of outside.Each preposition shooting
Head and rear camera can be a fixed optical lens systems or with focusing and optical zoom capabilities.
Audio-frequency assembly 1810 is configured as output and/or input audio signal.For example, audio-frequency assembly 1810 includes a wheat
Gram wind (MIC), when device 1800 is in operation template, such as calling template, logging template and speech recognition template, microphone quilt
It is configured to receive external audio signal.The audio signal received can be further stored in memory 1804 or via communication
Component 1816 is sent.In certain embodiments, audio-frequency assembly 1810 also includes a loudspeaker, for exports audio signal.
I/O interfaces 1812 are that interface, above-mentioned peripheral interface module are provided between processing assembly 1802 and peripheral interface module
Can be keyboard, click wheel, button etc..These buttons may include but be not limited to:Home button, volume button, start button and
Locking press button.
Sensor cluster 1814 includes one or more sensors, and the state for providing various aspects for device 1800 is commented
Estimate.For example, sensor cluster 1814 can detect opening/closed mode of device 1800, the relative positioning of component, such as institute
Display and keypad that component is device 1800 are stated, sensor cluster 1814 can be with detection means 1800 or device 1,800 1
The position of individual component changes, the existence or non-existence that user contacts with device 1800, the orientation of device 1800 or acceleration/deceleration and dress
Put 1800 temperature change.Sensor cluster 1814 can include proximity transducer, be configured in not any physics
The presence of object nearby is detected during contact.Sensor cluster 1814 can also include optical sensor, such as CMOS or ccd image sensing
Device, for being used in imaging applications.In certain embodiments, the sensor cluster 1814 can also include acceleration sensing
Device, gyro sensor, Magnetic Sensor, pressure sensor or temperature sensor.
Communication component 1816 is configured to facilitate the communication of wired or wireless way between device 1800 and other equipment.Dress
The wireless network based on communication standard, such as WiFi, 2G or 3G, or combinations thereof can be accessed by putting 1800.It is exemplary at one
In embodiment, communication component 1816 receives broadcast singal or broadcast correlation from external broadcasting management system via broadcast channel
Information.In one exemplary embodiment, the communication component 1816 also includes near-field communication (NFC) module, to promote short distance
Communication.For example, radio frequency identification (RFID) technology, Infrared Data Association (IrDA) technology, ultra wide band can be based in NFC module
(UWB) technology, bluetooth (BT) technology and other technologies are realized.
In the exemplary embodiment, device 1800 can be by one or more application specific integrated circuits (ASIC), numeral
Signal processor (DSP), digital signal processing appts (DSPD), PLD (PLD), field programmable gate array
(FPGA), controller, microcontroller, microprocessor or other electronic components are realized, for performing the checking based on checking mail
Method.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instructing, example are additionally provided
Such as include the memory 1804 of instruction, above-mentioned instruction can be performed to complete based on checking mail by the processor 1820 of device 1800
Verification method.For example, the non-transitorycomputer readable storage medium can be ROM, random access memory (RAM),
CD-ROM, tape, floppy disk and optical data storage devices etc..
Figure 19 is a kind of block diagram of checking device 1900 based on checking mail according to further example embodiment.
For example, device 1900 may be provided in a server.Reference picture 19, device 1900 includes processing assembly 1922, and its is further
, can be by processing assembly for storing including one or more processors, and as the memory resource representated by memory 1932
The instruction of 1922 execution, such as application program.The application program stored in memory 1932 can include one or one with
On each correspond to the module of one group of instruction.In addition, processing assembly 1922 is configured as execute instruction, it is based on testing to perform
Demonstrate,prove the verification method of mail.
Device 1900 can also include the power management that a power supply module 1926 is configured as performs device 1900, one
Wired or wireless network interface 1950 is configured as device 1900 being connected to network, and input and output (I/O) interface
1958.Device 1900 can be operated based on the operating system for being stored in memory 1932, such as Windows ServerTM, Mac
OS XTM, UnixTM, LinuxTM, FreeBSDTM or similar.
Those skilled in the art will readily occur to other embodiment party of the disclosure after considering specification and putting into practice the disclosure
Case.The application is intended to any modification, purposes or the adaptations of the disclosure, these modifications, purposes or adaptability
Change follows the general principle of the disclosure and including the undocumented common knowledge or usual skill in the art of the disclosure
Art means.Description and embodiments are considered only as exemplary, and the true scope of the disclosure and spirit are by following claim
Point out.
It should be appreciated that the precision architecture that the disclosure is not limited to be described above and is shown in the drawings, and
And various modifications and changes can be being carried out without departing from the scope.The scope of the present disclosure is only limited by appended claim.
Claims (20)
1. a kind of verification method based on checking mail, applied to terminal, it is characterised in that methods described includes:
Checking request for verifying the first user is sent by user end to server;
After the server sends checking mail to the confirmation email of first user, obtain described by the client
The address of confirmation email;
The checking is logged in the client according to the login password of the address of the confirmation email and the confirmation email
Mailbox;
The checking mail is searched in the confirmation email by the client;
After the checking mail is found, verified in the client using the checking information in the checking mail
Operation.
2. according to the method described in claim 1, it is characterised in that it is described checking from the server to first user
Mailbox is sent after checking mail, and the address of the confirmation email is obtained by the client, including:
After the server sends checking mail to the confirmation email of first user, receive described by the client
The checking notification message that server is sent, the checking notification message includes the address of the confirmation email.
3. according to the method described in claim 1, it is characterised in that it is described checking from the server to first user
Mailbox is sent after checking mail, and the address of the confirmation email is obtained by the client, including:
Confirmation email from the server to first user send checking mail after, according to first user with it is described
The binding relationship of confirmation email, obtains the address of the confirmation email, the binding relationship is to be pre-configured in the client
In.
4. method according to claim 2, it is characterised in that also include checking information mould in the checking notification message
Plate, it is described that the checking mail is searched in the confirmation email by the client, including:
After confirmation email described in Successful login, the mail server of confirmation email is connected to by the client;
According to the checking information template, the keyword of the checking information is determined;
The checking is searched according to the keyword and the default search restrictive condition in the mail server
Mail, the search restrictive condition includes default mail reception time range, and/or mail look-up quantity.
5. method according to claim 3, it is characterised in that also include in the binding relationship:With the confirmation email
Corresponding checking information template, it is described that the checking mail is searched in the confirmation email by the client, including:
After confirmation email described in Successful login, the mail server of confirmation email is connected to by the client;
The checking information template is obtained according to the binding relationship;
According to the checking information template, the keyword of the checking information is determined;
The checking is searched according to the keyword and the default search restrictive condition in the mail server
Mail, the search restrictive condition includes default mail reception time range, and/or mail look-up quantity.
6. according to the method described in claim 1, it is characterised in that the address according to the confirmation email and the checking
The login password of mailbox logs in the confirmation email in the client, including:
According to the address of the confirmation email, the login interface of the confirmation email, the login are generated in the client
Interface includes the address of the confirmation email of Auto-writing and the input frame for inputting the login password;
Receive the login password inputted in the input frame;
According to the address of the confirmation email and the login password, stepping on for the confirmation email is carried out on the login interface
Record.
7. according to the method described in claim 1, it is characterised in that the address according to the confirmation email and the checking
The login password of mailbox logs in the confirmation email in the client, including:
According to the address of the confirmation email, the login interface of the confirmation email, the login are generated in the client
Interface includes the address of the confirmation email of Auto-writing and the input frame for inputting the login password;
Determine whether to have stored the corresponding login password in address of the confirmation email in the client;
When having stored the login password in the client, the login password stored in the client is obtained;
When not storing the login password in the client, the login password inputted in the input frame is received;
According to the address of the confirmation email and the login password, stepping on for the confirmation email is carried out on the login interface
Record.
8. according to the method described in claim 1, it is characterised in that described after the checking mail is found, in the visitor
Verification operation is carried out using the checking information in the checking mail on the end of family, including:
After the checking mail is found, the internal memory of preset capacity is distributed by the client;
The checking mail is downloaded in the client from the mail server of the confirmation email, and is stored in described
In internal memory;
Content to the checking mail in the internal memory of the client carries out filter analysis, is believed with obtaining the checking
Breath;
Verification operation is carried out using the checking information by the client.
9. method according to claim 8, it is characterised in that methods described also includes:
When first user logs off in the client, or the client it is out of service in the terminal when
When, empty the internal memory.
10. a kind of checking device based on checking mail, applied to terminal, it is characterised in that described device includes:
Sending module, is configured as sending the checking request for verifying the first user by user end to server;
Acquisition module, is configured as after the server sends checking mail to the confirmation email of first user, passes through
The client obtains the address of the confirmation email;
Mailbox login module, is configured as according to the address of the confirmation email and the login password of the confirmation email described
The confirmation email is logged in client;
Mail look-up module, is configured as searching the checking mail in the confirmation email by the client;
Authentication module, is configured as after the checking mail is found, using in the checking mail in the client
Checking information carry out verification operation.
11. device according to claim 10, it is characterised in that the acquisition module, is configured as:
After the server sends checking mail to the confirmation email of first user, receive described by the client
The checking notification message that server is sent, the checking notification message includes the address of the confirmation email.
12. device according to claim 10, it is characterised in that the acquisition module, is additionally configured to:
Confirmation email from the server to first user send checking mail after, according to first user with it is described
The binding relationship of confirmation email, obtains the address of the confirmation email, the binding relationship is to be pre-configured in the client
In.
13. also including checking information template in device according to claim 11, the checking notification message, its feature exists
In, the mail look-up module, including:
Server connects submodule, is configured as after confirmation email described in Successful login, is connected to and tested by the client
Demonstrate,prove the mail server of mailbox;
Keyword determination sub-module, is configured as, according to the checking information template, determining the keyword of the checking information;
Mail look-up submodule, is configured as in the mail server according to the keyword and the default search
Restrictive condition searches the checking mail, and the search restrictive condition includes default mail reception time range, and/or postal
Part searches quantity.
14. device according to claim 12, it is characterised in that also include in the binding relationship:With the checking postal
The corresponding checking information template of case, the mail look-up module, including:
Server connects submodule, is configured as after confirmation email described in Successful login, is connected to and tested by the client
Demonstrate,prove the mail server of mailbox;
Template acquisition submodule, is configured as obtaining the checking information template according to the binding relationship;
Keyword determination sub-module, is configured as, according to the checking information template, determining the keyword of the checking information;
Mail look-up submodule, is configured as in the mail server according to the keyword and the default search
Restrictive condition searches the checking mail, and the search restrictive condition includes default mail reception time range, and/or postal
Part searches quantity.
15. device according to claim 10, it is characterised in that the mailbox login module, including:
Interface generates submodule, is configured as the address according to the confirmation email, the checking is generated in the client
The login interface of mailbox, the login interface includes the address of the confirmation email of Auto-writing and for inputting the login
The input frame of password;
Password acceptance submodule, is configured as receiving the login password inputted in the input frame;
Mailbox logs in submodule, the address according to the confirmation email and the login password is configured as, in login circle
The login of the confirmation email is carried out on face.
16. device according to claim 10, it is characterised in that the mailbox login module, including:
Interface generates submodule, is additionally configured to the address according to the confirmation email, is tested in the client described in generation
The login interface of mailbox is demonstrate,proved, the login interface includes the address of the confirmation email of Auto-writing and for inputting described step on
Record the input frame of password;
Password determination sub-module, is configured to determine that the address that the confirmation email whether has been stored in the client is corresponding
The login password;
Password acceptance submodule, is additionally configured to when having stored the login password in the client, obtains in the visitor
The login password stored on the end of family;When not storing the login password in the client, receive in the input frame
The login password of middle input;
Mailbox logs in submodule, is additionally configured to the address according to the confirmation email and the login password, is logged in described
The login of the confirmation email is carried out on interface.
17. device according to claim 10, it is characterised in that the authentication module, including:
Memory Allocation submodule, is configured to after the checking mail is found, preset capacity is distributed by the client
Internal memory;
Mail downloads submodule, is configured as from the mail server of the confirmation email checking mail downloading to institute
State in client, and be stored in the internal memory;
Checking information acquisition submodule, is configured as the content to the checking mail in the internal memory of the client and enters
Row filter analysis, to obtain the checking information;
Verification operation implementation sub-module, is configured as carrying out verification operation using the checking information by the client.
18. device according to claim 17, it is characterised in that the authentication module also includes:
Internal memory clears up submodule, is configured as first user and is logged off in the client, or the client
End in the terminal it is out of service constantly, empty the internal memory.
19. a kind of checking device based on checking mail, applied to terminal, it is characterised in that including:
Processor;
Memory for storing processor-executable instruction;
Wherein, the processor is configured as:
Checking request for verifying the first user is sent by user end to server;
After the server sends checking mail to the confirmation email of first user, obtain described by the client
The address of confirmation email;
The checking is logged in the client according to the login password of the address of the confirmation email and the confirmation email
Mailbox;
The checking mail is searched in the confirmation email by the client;
After the checking mail is found, verified in the client using the checking information in the checking mail
Operation.
20. a kind of computer-readable recording medium, is stored thereon with computer program instructions, it is characterised in that the computer
The step of method any one of claim 1-9 is realized when programmed instruction is executed by processor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710527120.0A CN107172087A (en) | 2017-06-30 | 2017-06-30 | Verification method, device and storage medium based on checking mail |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710527120.0A CN107172087A (en) | 2017-06-30 | 2017-06-30 | Verification method, device and storage medium based on checking mail |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107172087A true CN107172087A (en) | 2017-09-15 |
Family
ID=59827732
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710527120.0A Pending CN107172087A (en) | 2017-06-30 | 2017-06-30 | Verification method, device and storage medium based on checking mail |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107172087A (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109327445A (en) * | 2018-10-22 | 2019-02-12 | 顺丰科技有限公司 | Administrator's identity authentication method, device, server and storage medium |
CN109362079A (en) * | 2018-11-05 | 2019-02-19 | 北京小米移动软件有限公司 | Data processing method and device |
CN110445754A (en) * | 2019-07-02 | 2019-11-12 | 平安科技(深圳)有限公司 | The domain Windows account processing method, server and computer readable storage medium |
CN112153059A (en) * | 2020-09-27 | 2020-12-29 | 闻泰通讯股份有限公司 | Mail verification code acquisition method and device, electronic equipment and storage medium |
WO2021004057A1 (en) * | 2019-07-10 | 2021-01-14 | 创新先进技术有限公司 | Information processing method, apparatus and device and a computer readable storage medium |
CN113067823A (en) * | 2021-03-22 | 2021-07-02 | 西安电子科技大学 | Mail user identity authentication and key distribution method, system, device and medium |
CN114978552A (en) * | 2022-06-15 | 2022-08-30 | 中国联合网络通信集团有限公司 | Safe management method, device, equipment and medium for mailbox verification code |
US11431694B2 (en) | 2019-07-10 | 2022-08-30 | Advanced New Technologies Co., Ltd. | Secure account modification |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1620065A (en) * | 2003-11-17 | 2005-05-25 | 佳能株式会社 | Communication apparatus, electronic mail transmitting method, and electronic mail transmitting program |
CN103401685A (en) * | 2013-07-24 | 2013-11-20 | 惠州Tcl移动通信有限公司 | Mobile terminal and information processing method thereof |
CN106656986A (en) * | 2016-11-01 | 2017-05-10 | 上海摩软通讯技术有限公司 | Method and device for biological feature authentication |
CN106713114A (en) * | 2015-11-17 | 2017-05-24 | 阿里巴巴集团控股有限公司 | Verification information processing method and device |
-
2017
- 2017-06-30 CN CN201710527120.0A patent/CN107172087A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1620065A (en) * | 2003-11-17 | 2005-05-25 | 佳能株式会社 | Communication apparatus, electronic mail transmitting method, and electronic mail transmitting program |
CN103401685A (en) * | 2013-07-24 | 2013-11-20 | 惠州Tcl移动通信有限公司 | Mobile terminal and information processing method thereof |
CN106713114A (en) * | 2015-11-17 | 2017-05-24 | 阿里巴巴集团控股有限公司 | Verification information processing method and device |
CN106656986A (en) * | 2016-11-01 | 2017-05-10 | 上海摩软通讯技术有限公司 | Method and device for biological feature authentication |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109327445A (en) * | 2018-10-22 | 2019-02-12 | 顺丰科技有限公司 | Administrator's identity authentication method, device, server and storage medium |
CN109362079A (en) * | 2018-11-05 | 2019-02-19 | 北京小米移动软件有限公司 | Data processing method and device |
CN109362079B (en) * | 2018-11-05 | 2023-09-12 | 北京小米移动软件有限公司 | Data processing method and device |
CN110445754A (en) * | 2019-07-02 | 2019-11-12 | 平安科技(深圳)有限公司 | The domain Windows account processing method, server and computer readable storage medium |
CN110445754B (en) * | 2019-07-02 | 2023-04-28 | 平安科技(深圳)有限公司 | Windows domain account processing method, server and computer readable storage medium |
WO2021004057A1 (en) * | 2019-07-10 | 2021-01-14 | 创新先进技术有限公司 | Information processing method, apparatus and device and a computer readable storage medium |
US11431694B2 (en) | 2019-07-10 | 2022-08-30 | Advanced New Technologies Co., Ltd. | Secure account modification |
CN112153059A (en) * | 2020-09-27 | 2020-12-29 | 闻泰通讯股份有限公司 | Mail verification code acquisition method and device, electronic equipment and storage medium |
CN113067823A (en) * | 2021-03-22 | 2021-07-02 | 西安电子科技大学 | Mail user identity authentication and key distribution method, system, device and medium |
CN113067823B (en) * | 2021-03-22 | 2021-11-23 | 西安电子科技大学 | Mail user identity authentication and key distribution method, system, device and medium |
CN114978552A (en) * | 2022-06-15 | 2022-08-30 | 中国联合网络通信集团有限公司 | Safe management method, device, equipment and medium for mailbox verification code |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107172087A (en) | Verification method, device and storage medium based on checking mail | |
CN104780155B (en) | Apparatus bound method and device | |
CN104270404B (en) | A kind of login method and device based on terminal iidentification | |
CN104243155B (en) | The method and device of safety verification | |
US20160021610A1 (en) | Network connection method and apparatus | |
CN104468463B (en) | Verification method, device and system | |
CN106453245A (en) | Method and apparatus for verifying identity | |
CN109407528A (en) | Safety access method, device, server and storage medium | |
CN105100096B (en) | Verification method and device | |
CN104717622A (en) | Information forwarding method and device, terminal and server | |
CN106454800A (en) | Identity verification method, device and system | |
CN109040049B (en) | User registration method and device and electronic equipment | |
CN102904860A (en) | Mobile terminal and login method for user of mobile terminal | |
CN106130735A (en) | The processing method of a kind of communication information, device and mobile terminal | |
CN109660531A (en) | A kind of auth method, server and customer service terminal | |
CN105392141A (en) | Device control method and device | |
CN108712435A (en) | A kind of verification system and method for login application program | |
KR20170012872A (en) | Method and apparatus for acquiring search results | |
CN107230060A (en) | The method and apparatus that a kind of account is reported the loss | |
US20140243045A1 (en) | Method for provisioning of a sim card | |
CN109560986A (en) | Test method, device and the test macro of things-internet gateway equipment | |
CN107395624A (en) | Information processing method and device | |
CN110730446A (en) | Login method, terminal and computer storage medium | |
CN105337937B (en) | Network verification method, device and computer readable storage medium | |
CN114915923A (en) | 5G message-as-a-service triggering method and device, electronic equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170915 |