CN113395290A - Mailbox login method and device, electronic equipment and readable storage medium - Google Patents

Mailbox login method and device, electronic equipment and readable storage medium Download PDF

Info

Publication number
CN113395290A
CN113395290A CN202110744264.8A CN202110744264A CN113395290A CN 113395290 A CN113395290 A CN 113395290A CN 202110744264 A CN202110744264 A CN 202110744264A CN 113395290 A CN113395290 A CN 113395290A
Authority
CN
China
Prior art keywords
authentication
information
login
single sign
mailbox
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110744264.8A
Other languages
Chinese (zh)
Inventor
汪凌峰
王中武
尹一桦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Westone Information Industry Inc
Original Assignee
Chengdu Westone Information Industry Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Westone Information Industry Inc filed Critical Chengdu Westone Information Industry Inc
Priority to CN202110744264.8A priority Critical patent/CN113395290A/en
Publication of CN113395290A publication Critical patent/CN113395290A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/42Mailbox-related aspects, e.g. synchronisation of mailboxes

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses a mailbox login method, a mailbox login device, electronic equipment and a readable storage medium, wherein the mailbox login method comprises the following steps: establishing connection with a mail client, and acquiring target user information obtained by the mail client by using service system login information; acquiring single sign-on authentication information sent by a mail client; authenticating the target user information and the single sign-on authentication information according to a target authentication mode corresponding to the single sign-on authentication information; allowing to log in a target mailbox address corresponding to the target user information after the authentication is passed; the method replaces the original mailbox password by using the single sign-on authentication information, replaces the authentication process of the mailbox password by using the authentication process of the target user information and the single sign-on authentication information, and can realize the effect of single sign-on by using a normal mail protocol. Because the HTTP protocol, the HTTPS protocol or other protocols are not required to be used, the complexity of the system is reduced, and the integration of the mail client and other third-party systems is facilitated.

Description

Mailbox login method and device, electronic equipment and readable storage medium
Technical Field
The present invention relates to the field of email technologies, and in particular, to a mailbox login method, a mailbox login apparatus, an electronic device, and a computer-readable storage medium.
Background
Electronic mail is a communication method for providing information exchange by electronic means, and is the most widely used service of the internet. The e-Mail client uses Mail protocols such as SMTP (Simple Mail Transfer Protocol), POP3(Post Office Protocol-Version 3), IMAP (Internet Mail Access Protocol) and the like to transmit and receive e-mails to and from the e-Mail server. In practical application, most users require the integration of an email client and an office platform, the office platform completes authorized login verification of the users, the application client including the email client uses authentication information provided by a mobile office platform to log in through single sign-on protocols such as SAML (Security and sales) and OAuth, and the user does not need to input a mailbox account password in the email client to complete the login of a mailbox. In order to implement the above functions, the related art uses HTTP (HyperText Transfer Protocol) or HTTPs (HyperText Transfer Protocol over Secure packet Layer) to transmit authentication data required for single sign-on between the client and the mail service, which makes both the mail client and the mail service need to develop a private mail Protocol based on the HTTP Protocol, HTTPs Protocol, or other protocols, or uses it to complete mailbox sign-on together with an existing mail Protocol, which makes it necessary to develop HTTP or HTTPs for the mail client and the mail server, increases system complexity and development workload, and is not conducive to integration of the mail client and other third party systems.
Therefore, the system complexity and development workload of the related art are large, which is not favorable for system integration, and the related art is a technical problem to be solved by those skilled in the art.
Disclosure of Invention
In view of the above, an object of the present invention is to provide a mailbox login method, a mailbox login apparatus, an electronic device and a computer readable storage medium, which can utilize a normal mail protocol to achieve a single sign-on effect, and do not need to use an HTTP protocol, an HTTPs protocol or other protocols to achieve the single sign-on, thereby reducing system complexity and facilitating integration of a mail client and other third party systems.
In order to solve the technical problem, the invention provides a mailbox login method, which comprises the following steps:
establishing connection with a mail client, and acquiring target user information obtained by the mail client by using service system login information;
acquiring single sign-on authentication information sent by the mail client;
authenticating the target user information and the single sign-on authentication information according to a target authentication mode corresponding to the single sign-on authentication information;
and allowing to log in a target mailbox address corresponding to the target user information after the authentication is passed.
Optionally, the establishing a connection with the mail client includes:
establishing SSL connection with the mail client and establishing a mail session;
acquiring and analyzing an authentication request sent by the mail client to obtain authentication mode information, and sending a user information input prompt to the mail client to complete the establishment of the connection;
correspondingly, before authenticating the target user information and the single sign-on authentication information according to the target authentication mode corresponding to the single sign-on authentication information, the method further includes:
and determining the target authentication mode according to the authentication mode information.
Optionally, before authenticating the target user information and the single sign-on authentication information according to the target authentication manner corresponding to the single sign-on authentication information, the method further includes:
analyzing the single sign-on authentication information to obtain an authentication mode identifier;
and determining the target authentication mode according to the authentication mode identifier.
Optionally, the obtaining the single sign-on authentication information sent by the mail client includes:
acquiring login authentication information sent by the mail client;
judging whether the login authentication information is in a target coding format or not;
if not, determining the login authentication information as the single sign-on authentication information.
Optionally, if the login authentication information is in the target encoding format, the method includes:
decoding the login authentication information to obtain a mailbox password;
and performing login verification by using the target user information and the mailbox password, and allowing the target mailbox address corresponding to the target user information to be logged in after the login verification is passed.
Optionally, the obtaining target user information obtained by the mail client using the service system login information includes:
and acquiring account information from the business system login information after the business system login information of the mail client passes the verification, and acquiring the target user information by using the account information.
Optionally, the authenticating the target user information and the single sign-on authentication information according to the target authentication manner corresponding to the single sign-on authentication information includes:
decrypting the single sign-on authentication information by using a security certificate to obtain data to be verified;
according to the target authentication mode, carrying out data verification on the target user information and the data to be verified;
and if the data passes the verification, determining that the authentication passes.
The present application further provides a mailbox login apparatus, including:
the connection establishing module is used for establishing connection with the mail client and acquiring target user information obtained by the mail client by utilizing the service system login information;
the authentication information acquisition module is used for acquiring single sign-on authentication information sent by the mail client;
the authentication module is used for authenticating the target user information and the single sign-on authentication information according to a target authentication mode corresponding to the single sign-on authentication information;
and the login allowing module is used for allowing the target mailbox address corresponding to the target user information to be logged in after the authentication is passed.
The present application further provides an electronic device comprising a memory and a processor, wherein:
the memory is used for storing a computer program;
the processor is used for executing the computer program to realize the mailbox login method.
The present application further provides a computer-readable storage medium for storing a computer program, wherein the computer program, when executed by a processor, implements the mailbox login method described above.
The mailbox login method provided by the application establishes connection with a mail client and acquires target user information obtained by the mail client by using the service system login information; acquiring single sign-on authentication information sent by a mail client; authenticating the target user information and the single sign-on authentication information according to a target authentication mode corresponding to the single sign-on authentication information; and allowing the target mailbox address corresponding to the target user information to be logged in after the authentication is passed.
Therefore, the mail server in the method establishes connection with the mail client by adopting normal mail protocols such as SMTP, POP3, IMAP and the like, and acquires the information of the target user sent by the mail server. Different from the traditional mailbox login mode, the method and the device for authenticating the mailbox access request acquire the single sign-on authentication information instead of the mailbox password after acquiring the target user information. After the single sign-on authentication information is obtained, the mail server can determine that the mail client needs to adopt a single sign-on mode, so that the single sign-on authentication information and the target user information are authenticated by using a corresponding target authentication mode. And if the authentication is passed, allowing the target user information to be logged in. The method replaces the original mailbox password by using the single sign-on authentication information, replaces the authentication process of the original mailbox password by using the authentication process of the target user information and the single sign-on authentication information, and can realize the effect of single sign-on by using a normal mail protocol. Because the single sign-on is realized without using an HTTP (hyper text transport protocol), an HTTPS (hypertext transfer protocol secure) protocol or other protocols, and the original mailbox protocol is still adopted for communication, the system complexity and the development workload are reduced, the integration of the mail client and other third-party systems is facilitated, and the problems of high system complexity and development workload and system integration inconvenience in the related technology are solved.
In addition, the application also provides a mailbox login device, electronic equipment and a computer readable storage medium, and the mailbox login device, the electronic equipment and the computer readable storage medium also have the beneficial effects.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
Fig. 1 is a flowchart of a mailbox login method according to an embodiment of the present invention;
fig. 2 is a timing diagram illustrating a mailbox login process according to a related art according to an embodiment of the present invention;
fig. 3 is a timing diagram of a specific mailbox login process according to an embodiment of the present invention;
fig. 4 is a timing diagram illustrating another specific mailbox login process according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of a mailbox login apparatus according to an embodiment of the present invention;
fig. 6 is a schematic structural diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, fig. 1 is a flowchart illustrating a mailbox login method according to an embodiment of the present invention. The method comprises the following steps:
s101: and establishing connection with the mail client, and acquiring target user information obtained by the mail client by utilizing the service system login information.
Referring to fig. 2, fig. 2 is a timing diagram illustrating a mailbox login process according to a related art according to an embodiment of the present invention. In the related art, a user inputs a mailbox address and a password in a mail client, the mail client locally stores the mailbox address and the password and starts to establish connection, the connection process is the process from the third step to the eighth step in fig. 2, and the specific connection establishment process is not described in detail. After the connection is established, the mail client sends a mail address and a mail password to the mail server in sequence so that the mail server can verify the mail address and the mail password and returns a login success prompt after the verification is successful. Therefore, in the related art, if mail protocols such as SMTP, IMAP, POP3 and the like are used for mailbox login, a mailbox address and a password are necessarily required to be input, and single-point login cannot be performed; if a single sign-on is required, a private mail protocol needs to be developed based on the HTTP protocol or the HTTPs protocol, or mailbox login needs to be completed together with an existing mail protocol, so that development workload is large. After the development is completed, if the mail client is integrated with other third-party systems (such as a mobile office system), certain adjustment needs to be performed on the other third-party systems, which is not favorable for the integration of the mail client with other systems.
It should be noted that, in this embodiment, part or all of the steps may be executed by a mail server, and the mail server may be a specific server, or may be a service cluster formed by a plurality of electronic devices, for example, a service cluster formed by a plurality of servers, gateway devices, computers, and the like. The mail client is located on a terminal used by each user, and may include a portable terminal and a non-portable terminal. When the mailbox needs to be logged in, the mail client actively establishes connection with the mail server so as to verify whether the mailbox can be logged in after connection. In the verification process, identity information for indicating who is verified, namely target user information, needs to be acquired first, and as the mail client is integrated with the service system for use in the method, the login and the identity verification of the service system adopt the login information of the service system, the target user information in the method is acquired by utilizing the login information of the service system. The embodiment does not limit the specific acquiring process of the target user information, and since the acquiring process is executed by the mail client, the step of acquiring the target user information obtained by the mail client by using the service system login information may be:
step 11: and after the login information of the business system passes the verification, the mail client acquires account information from the login information of the business system, and acquires the target user information by using the account information.
In this embodiment, the business system login information is obtained and verified by the electronic device to which the mail client belongs, specifically, the business system deployed on the electronic device may obtain and verify, and after the verification is passed, the account information is obtained from the business system login information. In this embodiment, the specific form of the user information is not limited, and may be, for example, a user name, a user number, a mailbox address corresponding to the user, and the like, and may be set according to actual needs. For example, when the user information is in the form of a mailbox address, the corresponding relationship between the account information and the mailbox address may be preset, so that the corresponding mailbox address is determined after the account information is acquired, and the mailbox address is determined as the target user information.
It should be noted that the present embodiment does not limit the specific way of establishing the connection with the mail client, and in a possible implementation, the connection may be established in the same way as in the related art. In another embodiment, the application adopts a single sign-on method to log in, and the single sign-on method needs to authenticate the single sign-on authentication information, and the single sign-on authentication information has various types, so that the authentication method of the single sign-on authentication information can be determined in the connection establishment process. In this case, the step of establishing a connection with the mail client may specifically include:
step 21: and establishing an SSL connection with the mail client and establishing a mail session.
Step 22: and acquiring and analyzing an authentication request sent by the mail client to obtain authentication mode information, and sending a user information input prompt to the mail client to complete the establishment of the connection.
After establishing an ssl (secure Socket layer) connection and establishing an email session, the email client needs to initiate a request for authentication, and the email server feeds back a user information input prompt after obtaining the authentication request, so that the client further sends user information and starts login authentication. In this embodiment, the authentication request sent by the mail client further includes authentication mode information, where the authentication mode information is used to identify a target authentication mode specifically adopted when the single sign-on authentication information is subsequently authenticated. Accordingly, before authenticating the target user information and the single sign-on authentication information in a subsequent target authentication manner corresponding to the single sign-on authentication information, the method may further include:
step 23: and determining a target authentication mode according to the authentication mode information.
The authentication mode information may specifically be a serial number corresponding to the authentication algorithm, or an algorithm name corresponding to the authentication algorithm, and the specific content is not limited. Taking SMTP protocol as an example, please refer to fig. 3, and fig. 3 is a specific timing diagram of mailbox login process provided in the embodiment of the present invention, wherein the seventh step employs an AUTH SSOLOGIN command to request authentication, and the AUTH SSOLOGIN command is specifically a command including authentication mode information corresponding to Security Assertion Markup Language (SAML) Response information. Therefore, after the mail server acquires the single sign-on authentication information in step 11, it can authenticate it by an authentication method corresponding to the SAML Response information. As shown in fig. 3, after the mail client and the mobile office client are connected, the user can complete the login of the mailbox by inputting the account and the password (i.e., the service system login information) of the mobile office client.
S102: and acquiring single sign-on authentication information sent by the mail client.
After the target user information is obtained, the user can be known to be authenticated for login, and the mail client is required to provide single sign-on authentication information during authentication, wherein the single sign-on authentication information is a certificate for the user to log in the mailbox, and the specific content and form of the single sign-on authentication information are not limited. For example, the single sign-on authentication information may specifically be SAML Response information, or may be OAuth (open authorization, which is a secure, open, and simple standard protocol) authentication information.
In an embodiment, different mail clients may log in different manners, including single sign-on and non-single sign-on, and if the target user information is in the form of a mailbox address and authentication manner information is not added to the authentication request, the login manner of the user cannot be directly determined, which may cause an authentication manner selection error and further cause authentication failure. In order to solve the above problem, the step of acquiring the single sign-on authentication information sent by the mail client may include:
step 31: and obtaining login authentication information sent by the mail client.
Step 32: and judging whether the login authentication information is in the target coding format.
Step 33: and if the login authentication information is not in the target coding format, determining the login authentication information as single-point login authentication information.
In the present embodiment, the information directly acquired from the mail client is determined as login authentication information, and after the login authentication information is acquired, it is determined whether it is in the target encoding format. The target encoding format is an encoding format of a mailbox password, and since the mailbox password is usually encoded by BASE64, the target encoding format may be a binary format. If the login authentication information is not in the target coding format, the login authentication information is determined to be single-point login authentication information because the login authentication information is not the mailbox password. The method can allow different mailbox clients to perform mailbox login in different modes. If the login authentication information is in the target encoding format, it is described as the mailbox password, and the embodiment is not limited to the specific steps executed in this case, for example, in an embodiment, the mailbox password may be extracted from the login authentication information and verified. Specifically, the following steps may be performed:
step 41: and decoding the login authentication information to obtain a mailbox password.
Step 42: and performing login verification by using the target user information and the mailbox password, and allowing a target mailbox address corresponding to the target user information to be logged in after the login verification is passed.
It is understood that the specific manner of decoding corresponds to the format of the login authentication information, and the specific process is not limited. And after the mailbox password is obtained, login verification is carried out by utilizing the target user information (namely the mailbox address) and the mailbox password, and the target mailbox address is allowed to log in after the verification is passed.
Further, in another embodiment, if the connection is not established by using the authentication request with the authentication method information, an authentication method identifier may be set in the single sign-on authentication information, so as to determine the type of the single sign-on authentication information and the corresponding target authentication method according to the identifier. Specifically, after the single sign-on authentication information is determined to be acquired, before the target user information and the single sign-on authentication information are authenticated according to the target authentication mode corresponding to the single sign-on authentication information, the method may further include:
step 51: and analyzing the single sign-on authentication information to obtain an authentication mode identifier.
Step 52: and determining a target authentication mode according to the authentication mode identifier.
In this embodiment, when the mail client generates the single sign-on authentication information, the mail client may insert an authentication method identifier therein. The specific form of the authentication method identifier is not limited, and may be, for example, ASCII code form, where different ASCII characters represent different authentication methods. Authentication due to different types of single sign-on authentication informationThe authentication mode is different inevitably, so the authentication mode identification can also be the type identification of single sign-on authentication information, for example, the authentication mode identification can adopt the ^ B' (00000010)2Shows SAML Response Single sign-on authentication information using "^ C" (00000011)2Indicating OAuth single sign-on authentication information. The mail server analyzes the single sign-on authentication information after acquiring the single sign-on authentication information to obtain an authentication mode identifier, and then determines a target authentication mode according to the identifier. Referring to fig. 4, fig. 4 is a timing diagram illustrating another specific mailbox LOGIN process according to the embodiment of the present invention, step (h) in fig. 4 still uses the AUTH LOGIN command to request for starting authentication, and step (11) obtains single sign-on authentication information with an authentication mode identifier.
S103: and authenticating the target user information and the single sign-on authentication information according to a target authentication mode corresponding to the single sign-on authentication information.
And after the target authentication mode is determined and the single sign-on authentication information is acquired, authenticating the target user information and the single sign-on authentication information according to the target authentication mode so as to judge whether the login is legal or not. The specific authentication process may be different according to the type and content of the single sign-on authentication information, which is not limited in this embodiment. For example, in one embodiment, to ensure login security and reliability, the mail client may encrypt the single sign-on authentication information when generating it. Correspondingly, the step of authenticating the target user information and the single sign-on authentication information may include:
step 61: and decrypting the single sign-on authentication information by using the security certificate to obtain the data to be verified.
Step 62: and according to the target authentication mode, carrying out data verification on the target user information and the data to be verified.
And step 63: and if the data passes the verification, determining that the authentication passes.
The security certificate is a certificate which is pre-stored or sent by a third party and corresponds to the mail client side sending the single sign-on authentication information. The single sign-on authentication information is decrypted by using the security certificate, so that data to be verified for verification can be obtained, and then data verification is performed. The detailed process of data verification is not described in detail. If the data passes the verification, the authentication can be determined to pass.
S104: and allowing the target mailbox address corresponding to the target user information to be logged in after the authentication is passed.
After the authentication is passed, the login is legal, so that the target mailbox address corresponding to the target user information can be allowed to be logged in.
By applying the mailbox login method provided by the embodiment of the invention, the mail server establishes connection with the mail client by adopting normal mail protocols such as SMTP, POP3, IMAP and the like, and acquires the information of the target user sent by the mail server. Different from the most traditional mailbox login mode, the method and the device for authenticating the mailbox access request acquire the single sign-on authentication information instead of the mailbox password after acquiring the target user information. After the single sign-on authentication information is obtained, the mail server can determine that the mail client needs to adopt a single sign-on mode, so that the single sign-on authentication information and the target user information are authenticated by using a corresponding target authentication mode. And if the authentication is passed, allowing the target user information to be logged in. The method replaces the original mailbox password by using the single sign-on authentication information, replaces the authentication process of the original mailbox password by using the authentication process of the target user information and the single sign-on authentication information, and can realize the effect of single sign-on by using a normal mail protocol. Because the single sign-on is realized without using an HTTP (hyper text transport protocol), an HTTPS (hypertext transfer protocol secure) protocol or other protocols, and the original mailbox protocol is still adopted for communication, the system complexity and the development workload are reduced, the integration of the mail client and other third-party systems is facilitated, and the problems of high system complexity and development workload and system integration inconvenience in the related technology are solved.
In the following, the mailbox login apparatus provided in the embodiment of the present invention is introduced, and the mailbox login apparatus described below and the mailbox login method described above may be referred to in a corresponding manner.
Referring to fig. 5, fig. 5 is a schematic structural diagram of a mailbox login apparatus according to an embodiment of the present invention, including:
a connection establishing module 110, configured to establish a connection with a mail client, and obtain target user information obtained by the mail client using the service system login information;
an authentication information obtaining module 120, configured to obtain single sign-on authentication information sent by the email client;
the authentication module 130 is configured to authenticate the target user information and the single sign-on authentication information according to a target authentication manner corresponding to the single sign-on authentication information;
and the login allowing module 140 is used for allowing a login of the target mailbox address corresponding to the target user information after the authentication is passed.
Optionally, the connection establishing module 110 includes:
the establishing unit is used for establishing SSL connection with the mail client and establishing mail conversation;
the authentication request acquisition unit is used for acquiring and analyzing an authentication request sent by the mail client to obtain authentication mode information, and sending a user information input prompt to the mail client to complete the establishment of connection;
correspondingly, the method also comprises the following steps:
and the first authentication mode determining module is used for determining a target authentication mode according to the authentication mode information.
Optionally, the method further comprises:
the single sign-on authentication information analysis module is used for analyzing the single sign-on authentication information to obtain an authentication mode identifier;
and the second authentication mode determining module is used for determining a target authentication mode according to the authentication mode identifier.
Optionally, the authentication information obtaining module 120 includes:
the acquisition unit is used for acquiring login authentication information sent by a mail client;
the format judging unit is used for judging whether the login authentication information is in a target coding format;
and the determining unit is used for determining the login authentication information as single-point login authentication information if the login authentication information is in the target coding format.
Optionally, comprising:
the login authentication information analysis module is used for decoding the login authentication information to obtain a mailbox password;
and the password verification module is used for performing login verification by using the target user information and the mailbox password and allowing a target mailbox address corresponding to the target user information to be logged in after the login verification is passed.
Optionally, the connection establishing module 110 includes:
and the target user information acquisition unit is used for acquiring the account information from the business system login information after the business system login information of the mail client passes the verification and acquiring the target user information by using the account information.
Optionally, the authentication module 130 includes:
the decryption unit is used for decrypting the single sign-on authentication information by using the security certificate to obtain data to be verified;
the verification unit is used for performing data verification on the target user information and the data to be verified according to a target authentication mode;
and the authentication pass determining unit is used for determining that the authentication passes if the data passes the verification.
In the following, the electronic device provided by the embodiment of the present invention is introduced, and the electronic device described below and the mailbox login method described above may be referred to correspondingly.
Referring to fig. 6, fig. 6 is a schematic structural diagram of an electronic device according to an embodiment of the present invention. Wherein the electronic device 100 may include a processor 101 and a memory 102, and may further include one or more of a multimedia component 103, an information input/information output (I/O) interface 104, and a communication component 105.
The processor 101 is configured to control the overall operation of the electronic device 100 to complete all or part of the steps in the mailbox login method; the memory 102 is used to store various types of data to support operation at the electronic device 100, such data may include, for example, instructions for any application or method operating on the electronic device 100, as well as application-related data. The Memory 102 may be implemented by any type or combination of volatile and non-volatile Memory devices, such as one or more of Static Random Access Memory (SRAM), Electrically Erasable Programmable Read-Only Memory (EEPROM), Erasable Programmable Read-Only Memory (EPROM), Programmable Read-Only Memory (PROM), Read-Only Memory (ROM), magnetic Memory, flash Memory, magnetic or optical disk.
The multimedia component 103 may include a screen and an audio component. Wherein the screen may be, for example, a touch screen and the audio component is used for outputting and/or inputting audio signals. For example, the audio component may include a microphone for receiving external audio signals. The received audio signal may further be stored in the memory 102 or transmitted through the communication component 105. The audio assembly also includes at least one speaker for outputting audio signals. The I/O interface 104 provides an interface between the processor 101 and other interface modules, such as a keyboard, mouse, buttons, etc. These buttons may be virtual buttons or physical buttons. The communication component 105 is used for wired or wireless communication between the electronic device 100 and other devices. Wireless Communication, such as Wi-Fi, bluetooth, Near Field Communication (NFC), 2G, 3G, or 4G, or a combination of one or more of them, so that the corresponding Communication component 105 may include: Wi-Fi part, Bluetooth part, NFC part.
The electronic Device 100 may be implemented by one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), controllers, microcontrollers, microprocessors or other electronic components, and is configured to perform the mailbox registration method described in the embodiments above.
In the following, the computer-readable storage medium provided by the embodiment of the present invention is introduced, and the computer-readable storage medium described below and the mailbox login method described above may be referred to correspondingly.
The invention further provides a computer readable storage medium, on which a computer program is stored, and the computer program, when executed by a processor, implements the steps of the mailbox logging method described above.
The computer-readable storage medium may include: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The embodiments are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same or similar parts among the embodiments are referred to each other. The device disclosed by the embodiment corresponds to the method disclosed by the embodiment, so that the description is simple, and the relevant points can be referred to the method part for description.
Those of skill would further appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that the various illustrative components and steps have been described above generally in terms of their functionality in order to clearly illustrate this interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may reside in Random Access Memory (RAM), memory, Read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art.
Finally, it should also be noted that, herein, relationships such as first and second, etc., are intended only to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms include, or any other variation is intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that includes a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
The mailbox login method, the mailbox login device, the electronic device and the computer readable storage medium provided by the present invention are introduced in detail, and a specific example is applied in the present document to explain the principle and the implementation of the present invention, and the description of the above embodiment is only used to help understanding the method and the core idea of the present invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.

Claims (10)

1. A mailbox login method is characterized by comprising the following steps:
establishing connection with a mail client, and acquiring target user information obtained by the mail client by using service system login information;
acquiring single sign-on authentication information sent by the mail client;
authenticating the target user information and the single sign-on authentication information according to a target authentication mode corresponding to the single sign-on authentication information;
and allowing to log in a target mailbox address corresponding to the target user information after the authentication is passed.
2. A mailbox login method according to claim 1, wherein said establishing connection with the mail client comprises:
establishing SSL connection with the mail client and establishing a mail session;
acquiring and analyzing an authentication request sent by the mail client to obtain authentication mode information, and sending a user information input prompt to the mail client to complete the establishment of the connection;
correspondingly, before authenticating the target user information and the single sign-on authentication information according to the target authentication mode corresponding to the single sign-on authentication information, the method further includes:
and determining the target authentication mode according to the authentication mode information.
3. A mailbox login method according to claim 1, wherein before said authenticating said target user information and said single sign-on authentication information according to a target authentication manner corresponding to said single sign-on authentication information, further comprising:
analyzing the single sign-on authentication information to obtain an authentication mode identifier;
and determining the target authentication mode according to the authentication mode identifier.
4. A mailbox login method according to claim 1, wherein said obtaining single sign-on authentication information sent by said mail client comprises:
acquiring login authentication information sent by the mail client;
judging whether the login authentication information is in a target coding format or not;
if not, determining the login authentication information as the single sign-on authentication information.
5. A mailbox login method according to claim 4, wherein if said login authentication information is in said target encoding format, it comprises:
decoding the login authentication information to obtain a mailbox password;
and performing login verification by using the target user information and the mailbox password, and allowing the target mailbox address corresponding to the target user information to be logged in after the login verification is passed.
6. A mailbox login method according to claim 1, wherein the step of obtaining the target user information obtained by the mail client using the service system login information comprises:
and acquiring account information from the business system login information after the business system login information of the mail client passes the verification, and acquiring the target user information by using the account information.
7. A mailbox login method according to any one of claims 1 to 6, wherein the authenticating the target user information and the single sign-on authentication information according to the target authentication mode corresponding to the single sign-on authentication information comprises:
decrypting the single sign-on authentication information by using a security certificate to obtain data to be verified;
according to the target authentication mode, carrying out data verification on the target user information and the data to be verified;
and if the data passes the verification, determining that the authentication passes.
8. A mailbox login apparatus, comprising:
the connection establishing module is used for establishing connection with the mail client and acquiring target user information obtained by the mail client by utilizing the service system login information;
the authentication information acquisition module is used for acquiring single sign-on authentication information sent by the mail client;
the authentication module is used for authenticating the target user information and the single sign-on authentication information according to a target authentication mode corresponding to the single sign-on authentication information;
and the login allowing module is used for allowing the target mailbox address corresponding to the target user information to be logged in after the authentication is passed.
9. An electronic device comprising a memory and a processor, wherein:
the memory is used for storing a computer program;
the processor, configured to execute the computer program to implement the mailbox logging method according to any one of claims 1 to 7.
10. A computer-readable storage medium for storing a computer program, wherein the computer program, when executed by a processor, implements the mailbox logging method as defined in any one of claims 1 to 7.
CN202110744264.8A 2021-06-30 2021-06-30 Mailbox login method and device, electronic equipment and readable storage medium Pending CN113395290A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110744264.8A CN113395290A (en) 2021-06-30 2021-06-30 Mailbox login method and device, electronic equipment and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110744264.8A CN113395290A (en) 2021-06-30 2021-06-30 Mailbox login method and device, electronic equipment and readable storage medium

Publications (1)

Publication Number Publication Date
CN113395290A true CN113395290A (en) 2021-09-14

Family

ID=77624900

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110744264.8A Pending CN113395290A (en) 2021-06-30 2021-06-30 Mailbox login method and device, electronic equipment and readable storage medium

Country Status (1)

Country Link
CN (1) CN113395290A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116132141A (en) * 2022-12-30 2023-05-16 中国人寿保险股份有限公司上海数据中心 System and method for integrating office mail system and multiple identity authentication modes

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101599919A (en) * 2008-06-02 2009-12-09 鸿富锦精密工业(深圳)有限公司 The system and method for single-sign-on mail server
CN109379369A (en) * 2018-11-09 2019-02-22 中国平安人寿保险股份有限公司 Single-point logging method, device, server and storage medium
KR20190114505A (en) * 2018-03-30 2019-10-10 (주)이스톰 Single sign on service authentication method and system using token management demon
CN110661695A (en) * 2019-08-27 2020-01-07 紫光云(南京)数字技术有限公司 Method for unified login of e-mail box to entrance
CN112039873A (en) * 2020-08-28 2020-12-04 浪潮云信息技术股份公司 Method for accessing business system by single sign-on

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101599919A (en) * 2008-06-02 2009-12-09 鸿富锦精密工业(深圳)有限公司 The system and method for single-sign-on mail server
KR20190114505A (en) * 2018-03-30 2019-10-10 (주)이스톰 Single sign on service authentication method and system using token management demon
CN109379369A (en) * 2018-11-09 2019-02-22 中国平安人寿保险股份有限公司 Single-point logging method, device, server and storage medium
CN110661695A (en) * 2019-08-27 2020-01-07 紫光云(南京)数字技术有限公司 Method for unified login of e-mail box to entrance
CN112039873A (en) * 2020-08-28 2020-12-04 浪潮云信息技术股份公司 Method for accessing business system by single sign-on

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116132141A (en) * 2022-12-30 2023-05-16 中国人寿保险股份有限公司上海数据中心 System and method for integrating office mail system and multiple identity authentication modes

Similar Documents

Publication Publication Date Title
US9722984B2 (en) Proximity-based authentication
US11165581B2 (en) System for improved identification and authentication
US9979719B2 (en) System and method for converting one-time passcodes to app-based authentication
US11134071B2 (en) Data exchange during multi factor authentication
US11252140B2 (en) Systems and methods for securely calling APIs on an API gateway from applications needing first party authentication
US9832642B2 (en) Simplified login for mobile devices
US11693936B2 (en) User authentication over an audio channel using a mobile device
US8826398B2 (en) Password changing
US8892885B2 (en) System and method for delivering a challenge response in an authentication protocol
US20110219427A1 (en) Smart Device User Authentication
CN108055238B (en) Account verification method and system
CN108322416B (en) Security authentication implementation method, device and system
US20160350751A1 (en) Provisioning a Mobile Device with a Code Generation Key to Enable Generation of One-Time Passcodes
US8191122B2 (en) Provisioning a network appliance
US11032275B2 (en) System for improved identification and authentication
CN105656850B (en) Data processing method, related device and system
US9882719B2 (en) Methods and systems for multi-factor authentication
US10938796B2 (en) Access key retrieval service for clients
WO2023050524A1 (en) Im-based user identity authentication method and apparatus, and server and storage medium
US20220182388A1 (en) Transfer of trust between authentication devices
CN113395290A (en) Mailbox login method and device, electronic equipment and readable storage medium
CN112966242A (en) User name and password authentication method, device and equipment and readable storage medium
KR20170099339A (en) System and method for providing security membership and login hosting service
TWM583082U (en) User identity verification system for safety transaction environment
US20230208838A1 (en) Device, Method and System of Handling Access Control

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB03 Change of inventor or designer information

Inventor after: Wang Lingfeng

Inventor after: Wang Zhongwu

Inventor after: Yin Yihua

Inventor before: Wang Lingfeng

Inventor before: Wang Zhongwu

Inventor before: Yin Yihua

CB03 Change of inventor or designer information
RJ01 Rejection of invention patent application after publication

Application publication date: 20210914

RJ01 Rejection of invention patent application after publication