CN106713114B - Verification information processing method and device - Google Patents

Verification information processing method and device Download PDF

Info

Publication number
CN106713114B
CN106713114B CN201510791585.8A CN201510791585A CN106713114B CN 106713114 B CN106713114 B CN 106713114B CN 201510791585 A CN201510791585 A CN 201510791585A CN 106713114 B CN106713114 B CN 106713114B
Authority
CN
China
Prior art keywords
verification
information
mail
server
picture
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510791585.8A
Other languages
Chinese (zh)
Other versions
CN106713114A (en
Inventor
段秉南
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba Group Holding Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201510791585.8A priority Critical patent/CN106713114B/en
Priority to PCT/CN2016/105006 priority patent/WO2017084513A1/en
Publication of CN106713114A publication Critical patent/CN106713114A/en
Application granted granted Critical
Publication of CN106713114B publication Critical patent/CN106713114B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/42Mailbox-related aspects, e.g. synchronisation of mailboxes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/04Real-time or near real-time messaging, e.g. instant messaging [IM]
    • H04L51/046Interoperability with other network applications or services

Abstract

The application discloses a verification information processing method. When the server receives the check mail, whether the check mail carries check information in a specified format is inquired, if the check mail carries the check information, the server sends the check information, the mailbox address and the specific identification information to a third-party system after the authenticity of a sending user of the check mail is verified according to the mailbox address of the check mail. Therefore, the user does not need to submit the verification information through the complicated processes of manual registration, logging in a filing network platform and the like, and the convenience and the efficiency of the verification process are improved.

Description

Verification information processing method and device
Technical Field
The present application relates to the field of communications technologies, and in particular, to a verification information processing method. The application also relates to a verification information processing device.
Background
With the development of the internet, people increasingly rely on completing various services related to the people through the internet, one of the services is a function of verifying information, and the process of verifying information relates to multiple aspects of the user's verification information, a mailbox, a third-party system for verification and the like, so that the processing of the verification information often has a dilemma between user experience and security.
Taking ICP (Internet Content Provider) filing as an example, ICP filing is a kind of management of websites by the information industry sector to prevent illegal operation of websites. At present, submitting a website authenticity check list is an important process for ICP filing. When a certain user needs to carry out ICP filing, a website authenticity check list needs to be submitted through the following steps:
a, a user opens a browser to access a third-party system website;
b, registering and logging in by a user;
c, the user inputs a user name and a password to log in;
d, the website side jumps the user to a page for submitting a website authenticity check sheet;
e, the user clicks an upload button to upload the check sheet picture and waits for successful uploading;
and f, the website side confirms that the uploading is successful.
However, in the process of implementing the method, the user needs to register an account and a password belonging to the user on the third-party system website on the network, then use the account to register, manually upload a check list after registering, and then wait for a response in the website.
The inventor finds that, in the process of implementing the scheme of the application, not only ICP filing, but also existing information verification processes generally require a user to perform a series of manual processing steps (e.g., mailbox registration, mailbox login, and upload), which takes a long time, resulting in poor user experience, and has a high requirement on the processing speed of a third-party system, thereby seriously reducing the existing verification information processing efficiency.
Disclosure of Invention
In view of the problems in the background art, the present application discloses a verification information processing method for automatically processing verification information provided by a user and sending the verification information to a third-party system, so as to improve the existing verification information processing efficiency, wherein the method is applied to a server connected to the third-party system, and comprises the following steps:
when the server receives a check mail, the server inquires whether the check mail carries check information in a specified format or not, and the header information of the check mail carries specific identification information;
if the verification information is carried in the verification mail, the server sends the verification information, the mailbox address and the specific identification information to the third-party system after the authenticity verification of a sending user of the verification mail is passed according to the mailbox address of the verification mail.
Preferably, when the server receives the verification email, the server queries whether the verification email carries verification information in a specified format, specifically:
the server receives a mail from the sending user;
the server extracts the title information of the mail;
the server judges whether the header information contains specific identification information and whether the mail carries an attachment;
if the header information contains the specific identification information and the mail carries the attachment, the server determines whether the attachment carried by the mail conforms to the specified format;
and if the attachment conforms to the specified format, the server confirms that the mail is the verification mail, and the verification mail carries the verification information.
Preferably, the specified format is a check list picture, and the server determines whether the attachment carried by the mail conforms to the specified format, specifically:
the server judges whether the attachment contains a picture file or not;
if the attachment contains a picture file, the server judges whether the similarity between the picture file and a preset template check sheet picture exceeds a preset threshold value or not;
if yes, the server determines that the attachment conforms to the specified format.
Preferably, the server determines whether the header information includes specific identification information, specifically:
detecting whether the header information has information with the type of a domain name or not through a preset regular expression;
and if so, extracting the information through the regular expression, and taking the information as the specific identification information.
Preferably, the server determines whether the similarity between the picture file and a preset template verification form picture exceeds a preset threshold, specifically:
the server respectively extracts a specified number of features at random from the images at specified positions in the picture file and the template checking list picture;
the server respectively generates characteristic values of the picture file and the template checking list picture according to the characteristics;
the server judges whether the absolute value of the difference value between the characteristic values is smaller than the threshold value;
if so, the server confirms that the similarity between the picture file and a preset template checking list picture does not exceed a preset threshold value;
if not, the server confirms that the similarity between the picture file and a preset template checking list picture exceeds a preset threshold value.
Preferably, the mailbox address is used for registration in the third party system after being generated by the sending user registration; after the authenticity verification of the sending user of the verification mail is passed according to the mailbox address of the verification mail, the server sends the verification information, the mailbox address and the specific identification information to the third-party system, specifically:
the server inquires whether the sending user is registered in the third-party system or not according to the mailbox address;
if yes, the server sends the verification information, the mailbox address and the specific identification information to the third-party system through a message, so that the third-party system inquires the sending user according to the mailbox address after receiving the message, and puts the verification information into storage corresponding to the sending user;
if not, the server discards the message.
Correspondingly, the present application also proposes a server, where the server is applied as a node in a cluster including a plurality of nodes and a database, and the server includes:
the server comprises a query module, a storage module and a processing module, wherein the query module is used for querying whether the verification mail carries verification information in a specified format or not when the server receives the verification mail, and the header information of the verification mail carries specific identification information;
and the verification module is used for sending the verification information, the mailbox address and the specific identification information to the third-party system after the verification information is carried in the verification mail and the authenticity verification of the sending user of the verification mail is passed according to the mailbox address of the verification mail.
Preferably, the query module specifically includes:
a receiving submodule for receiving the mail from the sending user;
the extraction submodule extracts the title information of the mail;
the judging submodule judges whether the header information contains specific identification information and whether the mail carries an attachment;
and the confirming sub-module is used for confirming whether the attachment carried by the mail conforms to the specified format or not when the header information contains the specific identification information and the mail carries the attachment, and confirming that the mail is the verification mail when the attachment conforms to the specified format.
Preferably, the specified format is specifically a check sheet picture, and the confirmation submodule is specifically configured to:
judging whether the attachment contains a picture file, judging whether the similarity between the picture file and a preset template check sheet picture exceeds a preset threshold value when the attachment contains the picture file, and determining that the attachment conforms to the specified format if the judgment result is yes.
Preferably, the judgment sub-module is specifically configured to:
and detecting whether the header information has information of which the type is the domain name or not through a preset regular expression, extracting the information through the regular expression when the judgment result is that the header information exists, and taking the information as the specific identification information.
Preferably, the determining sub-module determines whether the similarity between the picture file and a preset template check sheet picture exceeds a preset threshold, specifically:
randomly extracting a specified number of features from the images at specified positions in the picture file and the template checking sheet picture respectively, and generating feature values of the picture file and the template checking sheet picture respectively according to the features;
judging whether the absolute value of the difference value between the characteristic values is smaller than the threshold value; if so, confirming that the similarity between the picture file and a preset template checking list picture does not exceed a preset threshold value; if not, determining that the similarity between the picture file and a preset template checking list picture exceeds a preset threshold value.
Preferably, the mailbox address is used for registering in the third-party system after being generated by the sending user registration, and the verification module is specifically configured to:
inquiring whether the sending user is registered in the third-party system according to the mailbox address, and when the inquiry result is yes and the inquiry result is yes, sending the verification information, the mailbox address and the specific identification information to the third-party system through a message, so that the third-party system inquires the sending user according to the mailbox address after receiving the message, performs warehousing processing on the verification information corresponding to the sending user, and discards the message when the inquiry result is no.
Therefore, by applying the technical scheme of the application, when the server receives the verification mail, the server inquires whether the verification mail carries verification information in a specified format, the verification information is carried in the verification mail, and after the authenticity verification of a sending user of the verification mail is passed according to the mailbox address of the verification mail, the verification information, the mailbox address and specific identification information are sent to a third-party system, the verification mail is checked and analyzed through the server, and the user can use any mail client to forward the website authenticity verification information related to the record to the third-party system through the server. Therefore, the complicated processes of manual registration, login of the verification network platform and the like are omitted, and the processing efficiency of the existing verification information is improved.
Drawings
Fig. 1 is a schematic flow chart of a verification information processing method proposed in the present application;
FIG. 2 is a diagram illustrating a method for processing filing information according to an embodiment of the present application;
FIG. 3 is a schematic diagram of a website record information authenticity check sheet in the prior art;
fig. 4 is a schematic structural diagram of a server according to the present application.
Detailed Description
In order to solve the technical problem in the prior art, the application provides a verification information processing method, through the method, a user can use any mailbox to send a special verification mail to a server special for processing the verification mail, the server can perform a series of automatic processing aiming at the verification mail and the content of an attachment, and finally, the verification information, the mailbox address of the user and specific identification information are forwarded to a third-party system. A series of uploading, registering and other processes which need to be executed by a user are omitted, the time for waiting page jump is reduced, and the processing efficiency of the verification information is greatly improved.
As shown in fig. 1, a schematic flow chart of a verification information processing method proposed by the present application includes the following steps:
s101, when the server receives the verification mail, the server inquires whether the verification mail carries verification information in a specified format, and the header information of the verification mail carries specific identification information.
The method aims to automatically process the verification information sent by the user and send the verification information to a third-party system, and therefore the user needs to send a verification mail which can be identified by a server through header information. It should be noted that, although the following embodiments are described by taking verification of the docket information as an example (where the third party system is the docket system), the present application is not limited to this, and all the information verification methods that need to verify the attachment sent by the user through the mail through the third party system may adopt the technical solution of the present application, and the specific form change does not affect the protection scope of the present application.
In a preferred embodiment of the present application, the server identifies, in receiving the mail sent by the user, by:
step a) the server receiving a mail from the sending user;
step b) the server extracts the title information of the mail;
step c) the server judges whether the header information contains specific identification information and whether the mail carries an attachment;
since the specific identification information is in most cases in the form of a domain name, in a preferred embodiment of the present application, the retrieval of the specific identification information may be implemented in a manner of, for example, a keyword or a specified feature based on a naming rule that verifies the domain name. In this specific embodiment, it is detected whether information of a type of a domain name exists in the header information through a preset regular expression, and if so, the information is extracted through the regular expression, and the information is used as the specific identification information.
Step d) if the header information contains the specific identification information and the mail carries the attachment, the server determines whether the attachment carried by the mail conforms to the specified format;
in the current verification processing process, the verification order copies required to be submitted by the user are generally in the form of pictures, so that the preferred embodiment of the application provides a specific processing flow for the case that the specified format is used for verifying the verification order pictures. Specifically, the server first judges whether the attachment contains a picture file; if the attachment contains a picture file, the server further judges whether the similarity between the picture file and a preset template check sheet picture exceeds a preset threshold value, and if the similarity exceeds the threshold value, the server determines that the attachment conforms to the specified format.
It should be noted that, as a fast and convenient similarity determination method, the existing picture feature comparison technology may be adopted for determining the similarity between two picture files, and the server first extracts a specified number of features from images at specified positions in the picture files and the template verification sheet pictures at random, then generates feature values of the picture files and the template verification sheet pictures according to the features, and after obtaining the feature values of the two, the server may determine whether an absolute value of a difference between the feature values is smaller than a threshold, if so, it is determined that the similarity between the picture files and the preset template verification sheet pictures does not exceed a preset threshold, and if not, it is determined that the similarity between the picture files and the preset template verification sheet pictures exceeds a preset threshold.
And e) if the attachment conforms to the specified format, the server confirms that the mail is the verification mail.
S102, if the verification information is carried in the verification mail, the server sends the verification information, the mailbox address and the specific identification information to the third-party system after the authenticity verification of the sending user of the verification mail according to the mailbox address of the verification mail is passed.
Because the existing third-party system requires the user to register by taking the mailbox of the user as the user name, the mailbox addresses obtained by the mail in the S101 are used for registering in the third-party system after being generated by the registration of the sending user, and in order to avoid the malicious registration of illegal users and ensure the authenticity of the recorded information, the verification method combines each mailbox address with the third-party system to verify. In a preferred embodiment of the present application, the server firstly queries whether the sending user is registered in the third-party system according to the mailbox address, and if so, sends the verification information, the mailbox address and the specific identification information to the third-party system through a message, so that the third-party system queries the sending user according to the mailbox address after receiving the message, and puts the verification information in storage corresponding to the sending user; if not, the message is discarded.
Therefore, by applying the technical scheme, the user only needs to utilize the mailbox of the user to directly send the recorded information to the server through the special verification mail, and the server can automatically complete the processing flow of the recorded information and upload the recorded information to the third-party system, so that the existing verification processing speed is greatly improved.
To further illustrate the technical idea of the present application, the technical solution of the present application will now be described with reference to a specific application scenario shown in fig. 2. This embodiment comprises the steps of:
step S201, the user registers a special mailbox for performing website filing.
In step S202, the user registers in the filing system using the mailbox address of the private mailbox registered in step S201.
Step S203, the user scans the paper real check sheet and generates an electronic edition picture corresponding to the paper real check sheet.
And step S204, the user sends the mail to the record mailbox cloud server through any other mailbox client, the check list picture is used as an attachment of the mail, and the title is set as the domain name needing to be recorded.
Step S205, after the cloud mail server receives the mail, checking whether the header contains the domain name, checking whether the attachment contains a picture, comparing the picture with the check single-board picture, and checking whether the addressee is the record user.
In the process of checking and extracting the docketing domain name in the header by this step, the detection and acquisition of the docketing domain name can be performed by a regular expression, and assuming that the header of the mail is set as the domain name to be docketed (e.g., xxx. com) when the user sends the mail in the above step, this step is performed by the regular expression "[ a-zA-Z0-9] [ -a-zA-Z0-9] {0,62} (\\\ [ a-zA-Z0-9] [ -a-zA-Z0-9] {0,62} + \? And checking whether the domain name exists in the title, if so, performing matching processing by using a regular expression, and extracting the matched domain name.
As shown in fig. 3, for the website record information authenticity checklist in the prior art, when identifying whether the attached picture is the checklist, some kind of image processing library is required to be used for picture processing, because the picture of the checklist is a fixed picture. The user to be verified only needs to fill in a plurality of fixed information, so that the similarity recognition rate is high, and the user can be determined as a verification list picture when the similarity reaches 95%. The image recognition algorithms are more, and here, an ORB feature extraction algorithm based on OpenCV is described, an OpenCV library is used to extract images (generally including basic information of website sponsors and website record information verification content) on the upper side and the middle left side of an inspected image, N features are randomly extracted, because the two features are fixed and unchanged, the comparison accuracy is higher, feature values of the two images are compared, and accordingly, the similarity is judged.
In addition, the filing system opens an interface for the server to inquire according to the user name, and the server inquires whether the user is registered in the filing system according to the mail address.
S206, if the mail is judged to be an authenticity check mail, the address of the received mail, the domain name in the mail header and the attachment are sent to the filing system.
Specifically, the server may send the verification information, the mailbox address, and the docket domain name information to the docket system in a message queue using MetaQ.
And S207, after receiving the message, the filing system searches for the user according to the mailbox address and puts the filing information of the user into a warehouse.
In order to achieve the above object, the present application further proposes a server, where the server is applied as a node in a cluster including a plurality of nodes and a database, as shown in fig. 4, the server includes:
the server comprises a query module, a storage module and a processing module, wherein the query module is used for querying whether the verification mail carries verification information in a specified format or not when the server receives the verification mail, and the header information of the verification mail carries specific identification information;
and the verification module is used for sending the verification information, the mailbox address and the specific identification information to the third-party system after the verification information is carried in the verification mail and the authenticity verification of the sending user of the verification mail is passed according to the mailbox address of the verification mail.
In a preferred embodiment, the query module specifically includes:
a receiving submodule for receiving the mail from the sending user;
the extraction submodule extracts the title information of the mail;
the judging submodule judges whether the header information contains specific identification information and whether the mail carries an attachment;
and the confirming sub-module is used for confirming whether the attachment carried by the mail conforms to the specified format or not when the header information contains the specific identification information and the mail carries the attachment, and confirming that the mail is the verification mail when the attachment conforms to the specified format.
In a preferred embodiment, the specified format is specifically a check sheet picture, and the confirmation submodule is specifically configured to:
judging whether the attachment contains a picture file, judging whether the similarity between the picture file and a preset template check sheet picture exceeds a preset threshold value when the attachment contains the picture file, and determining that the attachment conforms to the specified format if the judgment result is yes.
In a preferred embodiment, the determining sub-module is specifically configured to:
and detecting whether the header information has information of which the type is the domain name or not through a preset regular expression, extracting the information through the regular expression when the judgment result is that the header information exists, and taking the information as the specific identification information.
In a preferred embodiment, the determining sub-module determines whether the similarity between the picture file and a preset template check sheet picture exceeds a preset threshold, specifically:
randomly extracting a specified number of features from the images at specified positions in the picture file and the template checking sheet picture respectively, and generating feature values of the picture file and the template checking sheet picture respectively according to the features;
judging whether the absolute value of the difference value between the characteristic values is smaller than the threshold value; if so, confirming that the similarity between the picture file and a preset template checking list picture does not exceed a preset threshold value; if not, determining that the similarity between the picture file and a preset template checking list picture exceeds a preset threshold value.
In a preferred embodiment, the mailbox address is used for registering in the third-party system after being generated by the sending user registration, and the verification module is specifically configured to:
inquiring whether the sending user is registered in the third-party system according to the mailbox address, and when the inquiry result is yes and the inquiry result is yes, sending the verification information, the mailbox address and the specific identification information to the third-party system through a message, so that the third-party system inquires the sending user according to the mailbox address after receiving the message, performs warehousing processing on the verification information corresponding to the sending user, and discards the message when the inquiry result is no.
Through the above description of the embodiments, those skilled in the art will clearly understand that the present application can be implemented by hardware, and also by software plus a necessary general hardware platform. Based on such understanding, the technical solution of the present application may be embodied in the form of a software product, which may be stored in a non-volatile storage medium (which may be a CD-ROM, a usb disk, a removable hard disk, etc.), and includes several instructions for enabling a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the method according to the implementation scenarios of the present application.
Those skilled in the art will appreciate that the figures are merely schematic representations of one preferred implementation scenario and that the blocks or flow diagrams in the figures are not necessarily required to practice the present application.
Those skilled in the art will appreciate that the modules in the devices in the implementation scenario may be distributed in the devices in the implementation scenario according to the description of the implementation scenario, or may be located in one or more devices different from the present implementation scenario with corresponding changes. The modules of the implementation scenario may be combined into one module, or may be further split into a plurality of sub-modules.
The above application serial numbers are for description purposes only and do not represent the superiority or inferiority of the implementation scenarios.
The above disclosure is only a few specific implementation scenarios of the present application, but the present application is not limited thereto, and any variations that can be made by those skilled in the art are intended to fall within the scope of the present application.

Claims (8)

1. A verification information processing method is applied to a server connected with a third-party system, and comprises the following steps:
when the server receives a check mail, the server inquires whether the check mail carries check information in a specified format or not, and the header information of the check mail carries specific identification information;
if the verification information is carried in the verification mail, the server sends the verification information, the mailbox address and the specific identification information to the third-party system after the authenticity verification of a sending user of the verification mail is passed according to the mailbox address of the verification mail;
wherein the mailbox address is used for registration in the third party system after being generated by the sending user registration; after the authenticity verification of the sending user of the verification mail is passed according to the mailbox address of the verification mail, the server sends the verification information, the mailbox address and the specific identification information to the third-party system, specifically:
the server inquires whether the sending user is registered in the third-party system or not according to the mailbox address;
if yes, the server sends the verification information, the mailbox address and the specific identification information to the third-party system through a message, so that the third-party system inquires the sending user according to the mailbox address after receiving the message, and puts the verification information into storage corresponding to the sending user;
if not, the server discards the message;
when the server receives the verification mail, the server inquires whether the verification mail carries verification information in a specified format, specifically:
the server receives a mail from the sending user;
the server extracts the title information of the mail;
the server judges whether the header information contains specific identification information and whether the mail carries an attachment;
if the header information contains the specific identification information and the mail carries the attachment, the server determines whether the attachment carried by the mail conforms to the specified format;
and if the attachment conforms to the specified format, the server confirms that the mail is the verification mail.
2. The method according to claim 1, wherein the specified format is in particular a checklist picture, and the server determines whether the attachment carried by the mail conforms to the specified format, in particular:
the server judges whether the attachment contains a picture file or not;
if the attachment contains a picture file, the server judges whether the similarity between the picture file and a preset template check sheet picture exceeds a preset threshold value or not;
if yes, the server determines that the attachment conforms to the specified format.
3. The method according to claim 1, wherein the server determines whether the header information includes specific identification information, specifically:
detecting whether the header information has information with the type of a domain name or not through a preset regular expression;
and if so, extracting the information through the regular expression, and taking the information as the specific identification information.
4. The method of claim 2, wherein the server determines whether the similarity between the picture file and a preset template verification sheet picture exceeds a preset threshold, specifically:
the server respectively extracts a specified number of features at random from the images at specified positions in the picture file and the template checking list picture;
the server respectively generates characteristic values of the picture file and the template checking list picture according to the characteristics;
the server judges whether the absolute value of the difference value between the characteristic values is smaller than the threshold value;
if so, the server confirms that the similarity between the picture file and a preset template checking list picture does not exceed a preset threshold value;
if not, the server confirms that the similarity between the picture file and a preset template checking list picture exceeds a preset threshold value.
5. A server, applied as a node in a cluster including a plurality of nodes and a database, comprising:
the system comprises a query module, a verification module and a verification module, wherein the query module is used for querying whether a verification mail carries verification information in a specified format or not when receiving the verification mail, and the header information of the verification mail carries specific identification information;
the verification module is used for sending the verification information, the mailbox address and the specific identification information to a third-party system after the verification information is carried in the verification email and the authenticity verification of a sending user of the verification email is passed according to the mailbox address of the verification email;
wherein the mailbox address is used for registering in the third party system after being generated by the sending user registration, and the verification module is specifically used for:
inquiring whether the sending user is registered in the third-party system or not according to the mailbox address, and sending the verification information, the mailbox address and the specific identification information to the third-party system through a message when the inquiry result is yes, so that the third-party system inquires the sending user according to the mailbox address after receiving the message, performs warehousing processing on the verification information corresponding to the sending user, and discards the message when the inquiry result is no;
wherein, the query module specifically comprises:
a receiving submodule for receiving the mail from the sending user;
the extraction submodule extracts the title information of the mail;
the judging submodule judges whether the header information contains specific identification information and whether the mail carries an attachment;
and the confirming sub-module is used for confirming whether the attachment carried by the mail conforms to the specified format or not when the header information contains the specific identification information and the mail carries the attachment, and confirming that the mail is the verification mail when the attachment conforms to the specified format.
6. The server according to claim 5, wherein the specified format is in particular a check sheet picture, the validation submodule being in particular configured to:
judging whether the attachment contains a picture file, judging whether the similarity between the picture file and a preset template check sheet picture exceeds a preset threshold value when the attachment contains the picture file, and determining that the attachment conforms to the specified format if the judgment result is yes.
7. The server according to claim 5, wherein the determining sub-module is specifically configured to:
and detecting whether the header information has information of which the type is the domain name or not through a preset regular expression, extracting the information through the regular expression when the judgment result is that the header information exists, and taking the information as the specific identification information.
8. The server according to claim 6, wherein the determining sub-module determines whether the similarity between the picture file and a preset template verification sheet picture exceeds a preset threshold, specifically:
randomly extracting a specified number of features from the images at specified positions in the picture file and the template checking sheet picture respectively, and generating feature values of the picture file and the template checking sheet picture respectively according to the features;
judging whether the absolute value of the difference value between the characteristic values is smaller than the threshold value;
if so, confirming that the similarity between the picture file and a preset template checking list picture does not exceed a preset threshold value; if not, determining that the similarity between the picture file and a preset template checking list picture exceeds a preset threshold value.
CN201510791585.8A 2015-11-17 2015-11-17 Verification information processing method and device Active CN106713114B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201510791585.8A CN106713114B (en) 2015-11-17 2015-11-17 Verification information processing method and device
PCT/CN2016/105006 WO2017084513A1 (en) 2015-11-17 2016-11-08 Method and server for processing verification information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510791585.8A CN106713114B (en) 2015-11-17 2015-11-17 Verification information processing method and device

Publications (2)

Publication Number Publication Date
CN106713114A CN106713114A (en) 2017-05-24
CN106713114B true CN106713114B (en) 2020-12-11

Family

ID=58717313

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510791585.8A Active CN106713114B (en) 2015-11-17 2015-11-17 Verification information processing method and device

Country Status (2)

Country Link
CN (1) CN106713114B (en)
WO (1) WO2017084513A1 (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107172087A (en) * 2017-06-30 2017-09-15 北京小米移动软件有限公司 Verification method, device and storage medium based on checking mail
CN111353744B (en) * 2020-03-05 2023-12-08 深圳市赤狐软件技术有限公司 Goods signing and receiving order data storage method and device based on image recognition
CN113329016A (en) * 2021-05-28 2021-08-31 北京天空卫士网络安全技术有限公司 Method and device for processing mail

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102195989A (en) * 2011-06-15 2011-09-21 中国电信股份有限公司 Email processing method and system
CN103220213A (en) * 2013-04-23 2013-07-24 国网信息通信有限公司 E-mail filtering method and device thereof
CN103581151A (en) * 2012-08-07 2014-02-12 百度在线网络技术(北京)有限公司 Method, system and client side for testing mailbox validity on line
CN103634420A (en) * 2013-11-22 2014-03-12 北京极客优才科技有限公司 Resume e-mail screening system and method
CN104935492A (en) * 2014-03-18 2015-09-23 阿里巴巴集团控股有限公司 E-mail verification method, device and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102195989A (en) * 2011-06-15 2011-09-21 中国电信股份有限公司 Email processing method and system
CN103581151A (en) * 2012-08-07 2014-02-12 百度在线网络技术(北京)有限公司 Method, system and client side for testing mailbox validity on line
CN103220213A (en) * 2013-04-23 2013-07-24 国网信息通信有限公司 E-mail filtering method and device thereof
CN103634420A (en) * 2013-11-22 2014-03-12 北京极客优才科技有限公司 Resume e-mail screening system and method
CN104935492A (en) * 2014-03-18 2015-09-23 阿里巴巴集团控股有限公司 E-mail verification method, device and system

Also Published As

Publication number Publication date
CN106713114A (en) 2017-05-24
WO2017084513A1 (en) 2017-05-26

Similar Documents

Publication Publication Date Title
US11005779B2 (en) Method of and server for detecting associated web resources
US10785254B2 (en) Network attack defense method, apparatus, and system
KR101484023B1 (en) Malware detection via reputation system
US10721245B2 (en) Method and device for automatically verifying security event
WO2017202214A1 (en) File verification method and apparatus
CN108881263B (en) Network attack result detection method and system
US9210189B2 (en) Method, system and client terminal for detection of phishing websites
CN109768992B (en) Webpage malicious scanning processing method and device, terminal device and readable storage medium
CN107733581B (en) Rapid internet asset feature detection method and device based on whole network environment
US20130145466A1 (en) System And Method For Detecting Malware In Documents
US10462257B2 (en) Method and apparatus for obtaining user account
CN110798488B (en) Web application attack detection method
KR102110642B1 (en) Password protection question setting method and device
CN105635064B (en) CSRF attack detection method and device
CN106713114B (en) Verification information processing method and device
US20190268373A1 (en) System, method, apparatus, and computer program product to detect page impersonation in phishing attacks
US20160299971A1 (en) Identifying Search Engine Crawlers
CN108449348B (en) Online authentication system and method supporting user identity privacy protection
US8910281B1 (en) Identifying malware sources using phishing kit templates
CN112751804A (en) Method, device and equipment for identifying counterfeit domain name
JPWO2018143097A1 (en) Judgment apparatus, judgment method, and judgment program
CN110837646A (en) Risk investigation device of unstructured database
US9332031B1 (en) Categorizing accounts based on associated images
US20130275384A1 (en) System, method, and computer program product for determining whether an electronic mail message is unwanted based on processing images associated with a link in the electronic mail message
CN109672678B (en) Phishing website identification method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant