CN106709315B - Login information verification method and device of application system - Google Patents

Login information verification method and device of application system Download PDF

Info

Publication number
CN106709315B
CN106709315B CN201510780018.2A CN201510780018A CN106709315B CN 106709315 B CN106709315 B CN 106709315B CN 201510780018 A CN201510780018 A CN 201510780018A CN 106709315 B CN106709315 B CN 106709315B
Authority
CN
China
Prior art keywords
picture
application system
source
login information
detected
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510780018.2A
Other languages
Chinese (zh)
Other versions
CN106709315A (en
Inventor
陈文博
李云龙
高峰
张建军
苏砫
王星亮
张威
周建波
王秀娟
张晓琳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Shenzhou Taiyue Software Co Ltd
Original Assignee
Beijing Shenzhou Taiyue Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Shenzhou Taiyue Software Co Ltd filed Critical Beijing Shenzhou Taiyue Software Co Ltd
Priority to CN201510780018.2A priority Critical patent/CN106709315B/en
Publication of CN106709315A publication Critical patent/CN106709315A/en
Application granted granted Critical
Publication of CN106709315B publication Critical patent/CN106709315B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Debugging And Monitoring (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses a login information verification method and a device of an application system, wherein the method comprises the following steps: logging in an application system by using initial login information of the application system, intercepting a picture from a specified page of the application system as a source picture, and storing the picture; after the login information of the application system is modified, logging in the application system according to the modified login information, and intercepting a picture from a specified page of the logged in application system according to the position of a source picture to obtain a picture to be detected; matching the picture to be detected with the stored source picture; if the matching result is consistent, the corrected login information is confirmed to be correct; and if the matching results are inconsistent, confirming that the modified login information is wrong. According to the embodiment of the invention, the picture to be tested is matched with the source picture so as to verify whether the modified login information is correct and identify whether the currently logged-in application system is the target application system corresponding to the login information, so that the usability of the login information of the application system is dialed and tested, and the method is more intuitive.

Description

Login information verification method and device of application system
Technical Field
The invention relates to the technical field of computers, in particular to a login information verification method and device of an application system.
Background
The centralized asset Authentication platform, namely the 4A platform (Authentication, Account number, Authorization, and Audit Audit), can provide a user with fast resource access, and centrally present a resource (e.g., application system) list to which the user has access, so that the user can directly log in resources by clicking resource connection on the resource list without respectively authenticating and accessing to different resource systems, thereby realizing that the user can log in multiple resources at one Authentication time on the centralized Authentication platform.
The account number of the user logging in the 4A platform is divided into a primary account number and a secondary account number, the primary account number is associated with an application system which is authorized to access, one primary account number can comprise a plurality of secondary account numbers, and each secondary account number corresponds to one target application system. In practice, the 4A platform will periodically modify the password of the slave account that logs in to the application system according to a certain password policy, and in order to ensure that the password of each account that logs in to the application system is usable, it is necessary to test the usability between the password modified by the slave account and the application system, dial the account with the wrong password, modify the password in time, and ensure the correct password of the account and the usability of logging in to the application system.
In the existing dial testing technology, whether the home page of the application system is successfully communicated or not is judged by capturing Header title keywords of the home page of the target application system, and the returned result is an HTML webpage source code which is not intuitive and is difficult to analyze and understand. In addition, the technology is not suitable for the availability dial testing of the account number and the password of the application system developed by the Silverlight technology, and has use limitation. Silverlight is a Web rendering technology that merges Microsoft's technologies. It provides a development framework and supports seamless integration of images of any size by using vector-based image layer techniques. The Silverlight enables development designers to better cooperate to effectively create Web application programs (namely Silverlight application programs) which are rich in content and gorgeous in interface and can run in various browsers such as Windows and Macintosh.
Disclosure of Invention
The invention provides a login information verification method and device of an application system, and aims to solve the problems that in the prior art, usability detection results are not visual and use limitations exist.
According to an aspect of the present invention, there is provided a login information verification method for an application system, the method including:
logging in an application system by using initial login information of the application system, intercepting a picture from a specified page of the application system as a source picture, and storing the picture;
after the login information of the application system is modified, logging in the application system according to the modified login information, and capturing a picture from a specified page of the logged in application system according to the position of the source picture to obtain a picture to be detected;
matching the picture to be detected with a stored source picture;
if the matching result is consistent, the corrected login information is confirmed to be correct;
and if the matching results are inconsistent, confirming that the modified login information is wrong.
Optionally, the method further comprises: and when the modified login information is confirmed to be wrong, displaying the source picture and the picture to be detected, and prompting a login failure result.
Optionally, the capturing the picture from the specified page of the application system as the source picture includes: analyzing the appointed page of the application system by using a hypertext markup language (HTML) analyzer to obtain HTML marks, generating corresponding pictures according to the obtained HTML marks, and intercepting the pictures from the generated pictures as source pictures;
the step of intercepting the picture from the specified page of the logged-in application system according to the position of the source picture comprises the following steps: analyzing the appointed page of the logged application system by using a hypertext markup language (HTML) analyzer to obtain HTML marks, generating corresponding pictures according to the obtained HTML marks, and intercepting the pictures from the generated pictures as the pictures to be detected.
Optionally, the matching the picture to be tested with the stored source picture includes:
selecting a preset number of source pixel points from the source picture, extracting RGB color components of each source pixel point to obtain RGB color component arrays corresponding to each source pixel point, and arranging the RGB color component arrays of the source pixel points according to a preset sequence;
selecting the same number of pixels to be detected at the corresponding positions of the picture to be detected according to the positions of the source pixels, extracting the RGB color component of each pixel to be detected to obtain an RGB color component array corresponding to the pixel to be detected, and arranging the RGB color component arrays of the pixels to be detected according to the corresponding sequence;
and comparing the RGB color component of each source pixel point with the RGB color component of the corresponding pixel point to be detected.
Optionally, the designated page is a top page.
According to another aspect of the present invention, there is provided a login information verification apparatus for an application system, the apparatus including:
the source picture obtaining unit is used for logging in the application system by using initial login information of the application system, intercepting a picture from a specified page of the application system as a source picture and storing the source picture;
the picture to be tested obtaining unit is used for logging in the application system according to the modified login information after the login information of the application system is modified, and capturing a picture from a specified page of the logged in application system according to the position of the source picture to obtain a picture to be tested;
the picture matching unit is used for matching the picture to be detected with the stored source picture;
the information confirmation unit is used for confirming that the modified login information is correct if the matching results are consistent; and if the matching results are inconsistent, confirming that the modified login information is wrong.
Optionally, the information confirming unit is further configured to, when it is confirmed that the modified login information is incorrect, display the source picture and the picture to be tested, and prompt a login failure result.
Optionally, the source picture obtaining unit is specifically configured to parse a specified page of the application system by using a hypertext markup language HTML parser to obtain an HTML tag, generate a corresponding picture according to the obtained HTML tag, and capture the picture from the generated picture as the source picture;
the picture to be detected obtaining unit is specifically configured to analyze the specified page of the logged-in application system by using a hypertext markup language (HTML) parser to obtain an HTML tag, generate a corresponding picture according to the obtained HTML tag, and intercept the picture from the generated picture as the picture to be detected.
Optionally, the image matching unit is specifically configured to select a predetermined number of source pixels in the source image, extract RGB color components of each source pixel, obtain an RGB color component array corresponding to each source pixel, and arrange the RGB color component arrays of the source pixels according to a predetermined sequence;
selecting the same number of pixels to be detected at the corresponding positions of the picture to be detected according to the positions of the source pixels, extracting the RGB color component of each pixel to be detected to obtain an RGB color component array corresponding to the pixel to be detected, and arranging the RGB color component arrays of the pixels to be detected according to the corresponding sequence;
and comparing the RGB color component of each source pixel point with the RGB color component of the corresponding pixel point to be detected.
Optionally, the designated page is a top page.
The invention has the beneficial effects that: the technical scheme of the embodiment of the invention is based on the image matching technology, the modified login information is used for logging in the application system and capturing the picture to obtain the picture to be detected, the picture to be detected is matched with the stored source picture, whether the modified login information is correct or not (namely whether the modified login information can be logged in the target application system or not) is determined according to the matching result, the usability detection between the login information and the target application system is realized, and the picture matching mode is more visual compared with an HTML source code and is easy to distinguish and understand. More importantly, the technical scheme of the embodiment of the invention is that a picture matching method is adopted, and the page of the Silverlight application system is developed by a vector-based image layer technology, so that the embodiment of the invention is also suitable for the Silverlight application system, and the problem of usability detection of the application system developed by the Silverlight technology is solved.
Drawings
Fig. 1 is a flowchart of a login information verification method of an application system according to an embodiment of the present invention;
fig. 2 is a flowchart illustrating a login information verification method for an application system according to another embodiment of the present invention;
fig. 3 is a block diagram of a login information verification apparatus of an application system according to an embodiment of the present invention.
Detailed Description
The core idea of the invention is as follows: aiming at the technical problems in the prior art, based on the picture interception and picture matching technology, the source picture of the specified page is intercepted and stored after the initial login information is used for logging in the target application system; and intercepting the picture to be tested of the specified page of the logged application system by using the modified login information, and matching the picture to be tested with the source picture to obtain a verification result.
According to an aspect of the present invention, there is provided a login information verification method for an application system, fig. 1 is a flowchart of a login information verification method for an application system according to an embodiment of the present invention, and referring to fig. 1, the method includes:
s11, logging in the application system by using the initial login information of the application system, intercepting a picture from the appointed page of the application system as a source picture, and storing the picture;
s12, when the login information of the application system is modified, logging in the application system according to the modified login information, and capturing a picture from the specified page of the logged in application system according to the position of the source picture to obtain a picture to be detected;
s13, matching the picture to be detected with a stored source picture;
s14, if the matching result is consistent, the modified login information is confirmed to be correct; and if the matching results are inconsistent, confirming that the modified login information is wrong.
As can be seen from the steps shown in fig. 1, in the embodiment of the present invention, the initial login information is first used to log in the target application system to obtain and store the source picture, then the modified login information is used to log in the application system and the picture is captured to obtain the picture to be detected, the picture to be detected is matched with the stored source picture, and whether the modified login information is correct or not is determined according to the matching result, so that the usability detection between the login information and the target application system is realized, and the picture matching mode is more intuitive compared with the HTML source code and is easy to distinguish and understand. In addition, the technical scheme of the embodiment of the invention is also suitable for the Silverlight application system, and fills the blank of the availability detection field of the Silverlight application system.
Fig. 2 is a schematic flowchart of a login information verification method of an application system according to another embodiment of the present invention, and referring to fig. 2, in this embodiment, the method shown in fig. 1 further includes: and when the modified login information is confirmed to be wrong, displaying the source picture and the picture to be detected, and prompting a login failure result.
The login information verification method of the application system of the present embodiment includes steps S21 to S26, and the following describes steps S21 to S26 with reference to fig. 2.
Step S21, initial login information login (target application system)
First, the method logs in (target application system) using initial login information for subsequent acquisition of a source picture.
In practice, the login account of the user on the centralized asset authentication 4A platform includes a primary account and a secondary account. Often, one primary account is associated with a plurality of application systems (e.g., application system a, application system B, and application system C), and each secondary account corresponds to one application system, i.e., a target application system. The 4A platform may periodically modify login information (i.e. password of the slave account) and login the application system using the password modified from the slave account, and may log in the application system B corresponding to the slave account of the application system a, and in order to verify the availability of the modified password of the slave account and the application system, i.e. whether the modified password can be successfully logged in to the target application system, the modified password needs to be verified.
Step S22, intercepting the picture on the appointed page of the application system to obtain the source picture
After logging in a target application system, capturing a picture on a specified page of the application system as a source picture for subsequent matching.
In this embodiment, after the application system is normally logged in, the home page of the application system is often displayed, and therefore, in order to save the time for capturing the picture, the page is designated as the home page. It is understood that the designated page may be other pages of the application system, and is not limited thereto.
In this embodiment, capturing the picture at the designated page of the application system includes: analyzing the appointed page of the application system by using a hypertext markup language (HTML) analyzer to obtain HTML marks, generating corresponding pictures according to the obtained HTML marks, and intercepting the pictures from the generated pictures as source pictures.
When initial login information is used for login specifically, the centralized asset management platform acquires a designated page returned by a server of an application system, self-analyzes the designated page by using an HTML (hypertext markup language) analyzer, realizes corresponding analysis one by one to obtain HTML marks, generates corresponding pictures according to the obtained HTML marks, and intercepts the pictures from the generated pictures as source pictures.
The HTML parser is used for parsing the source code of the specified page returned by the application system server, finding the HTML mark describing the picture information in the source code, generating a picture according to the HTML mark, and intercepting and storing a picture from the generated picture as a source picture. It is understood that the HTML tag is information describing, in the form of code, the length, width, height, content, and the like of pictures set in a specific web page (a web page developed by the Silverlight technology has a plurality of pictures therein). And generating a corresponding picture according to the description information (namely HTML marks), intercepting the picture on the generated picture to respectively obtain a source picture or a picture to be detected, and performing picture matching operation.
It should be noted that how to generate the picture according to the HTML tag can be implemented by means in the prior art, and is not limited thereto.
Step S23, login (application system) using the modified login information
Here, when logging in using the modified password, the application system to which the login is likely to be made is not the target application system, and therefore, it is necessary to perform usability detection.
Step S24, intercepting the picture according to the position of the source picture at the appointed page of the logged application system to obtain the picture to be tested
After the modified login information logs in an application system, a picture is intercepted on the specified page of the login application system according to the position of the source picture acquired in the step S22, and the picture to be detected is obtained. The step of obtaining the to-be-detected picture may refer to the step of obtaining the source picture, which is not described herein again.
It should be emphasized that the position where the picture to be detected is captured is ensured to correspond to the position where the source picture is captured, for example, the source picture is captured at the lower left corner of the home page of the target application system, and then the picture to be detected is also captured at the lower left corner of the home page of the login application system. During specific implementation, a rectangular coordinate system can be constructed according to the front page of the application system, and the intercepted position is determined through the position coordinate.
Step S25, matching the source picture with the picture to be tested
In this embodiment, matching the source picture with the picture to be tested includes: selecting a preset number of source pixel points in a source picture, extracting RGB color components of each source pixel point to obtain RGB color component arrays corresponding to each source pixel point, and arranging the RGB color component arrays of the source pixel points according to a preset sequence; selecting the same number of pixels to be detected at the corresponding positions of the picture to be detected according to the positions of the selected source pixels, extracting the RGB color component of each pixel to be detected to obtain the RGB color component array corresponding to the pixel to be detected, and arranging the RGB color component arrays of the pixels to be detected according to the corresponding sequence; and comparing the RGB color component of each source pixel point with the RGB color component of the corresponding pixel point to be detected.
The predetermined sequence here may be arranged according to the RGB color component size sequence of the collected pixel points.
And according to the matching result, if the matching result is consistent, the login information is confirmed to be correct, namely the modified password can log in the target application system. If the matching results are not consistent, the method of the present embodiment further includes step S26.
Step S26, displaying the source picture and the picture to be tested, and prompting the result of the login failure
Unlike the usability detection scheme in the prior art, which only returns the result of the login failure (and the result is displayed in the form of HTML source code), the method in the embodiment of the present invention also displays the source picture and the picture to be tested, and prompts the user of the result of the login failure.
Not only can the login failure result be more intuitively prompted, but also the user can know which application system the modified password currently logs in through the display of the source picture and the picture to be detected, or know which difference exists between the picture to be detected and the source picture according to the comparison of RGB color components (specific numerical values) of pixel points of the source picture and the picture to be detected, so that the user can more conveniently understand and subsequently modify the operation.
In addition, an embodiment of the present invention further provides a login information verification apparatus for an application system, fig. 3 is a block diagram of the login information verification apparatus for the application system, and referring to fig. 3, the login information verification apparatus 30 for the application system includes:
a source picture obtaining unit 301, configured to log in an application system by using initial login information of the application system, intercept a picture from a specified page of the application system as a source picture, and store the source picture;
a to-be-detected picture obtaining unit 302, configured to, after login information of the application system is modified, log in the application system according to the modified login information, and capture a picture from a specified page of the logged-in application system according to a position of the source picture to obtain a to-be-detected picture;
a picture matching unit 303, configured to match the picture to be detected with the stored source picture;
an information confirmation unit 304, configured to confirm that the modified login information is correct if the matching results are consistent; and if the matching results are inconsistent, confirming that the modified login information is wrong.
In this embodiment, the information confirming unit 304 is further configured to, when it is confirmed that the modified login information is incorrect, display the source picture and the picture to be tested, and prompt a login failure result.
In this embodiment, the source picture obtaining unit 301 is specifically configured to analyze a specified page of an application system by using an HTML parser to obtain an HTML tag, generate a corresponding picture according to the obtained HTML tag, and capture the picture from the generated picture as a source picture;
the to-be-detected picture obtaining unit 302 is specifically configured to parse, by using a hypertext markup language HTML parser, the specified page of the logged-in application system to obtain an HTML tag, generate a corresponding picture according to the obtained HTML tag, and capture the picture from the generated picture as the to-be-detected picture.
In this embodiment, the picture matching unit 303 is specifically configured to select a predetermined number of source pixel points in a source picture, extract RGB color components of each source pixel point, obtain an RGB color component array corresponding to each source pixel point, and arrange the RGB color component arrays of the source pixel points according to a predetermined sequence;
selecting the same number of pixels to be detected at corresponding positions of the picture to be detected according to the positions of the source pixels, extracting RGB color components of each pixel to be detected to obtain RGB color component arrays corresponding to the pixels to be detected, and arranging the RGB color component arrays of the pixels to be detected according to the corresponding sequence;
and comparing the RGB color component of each source pixel point with the RGB color component of the corresponding pixel point to be detected.
In this embodiment, the designated page is a top page.
As can be seen from the above, the login information verification apparatus for an application system shown in fig. 3 logs in a target application system by using initial login information, captures a source picture by using an image capture technology, and selects and marks several pixel points in the source picture for storage. And subsequently, when the password of the login account is modified periodically, logging in the application system according to the modified password, capturing the picture at the corresponding position to obtain the picture to be tested, selecting corresponding pixel points on the picture to be tested, and comparing the pixel points to check whether the logged-in application system is the target application system or not and whether the modified password is correct or not. And the task drive is utilized, so that the usability detection of the login information of the application system is realized regularly.
It should be noted that, in this embodiment, a working process of the login information verification apparatus for accessing an application system corresponds to the implementation steps of the login information verification method for an application system, and therefore, reference may be made to the foregoing description for a specific working process of the login information verification apparatus for an application system in this embodiment, which is not described herein again.
In summary, the technical scheme of the embodiment of the invention is based on the image matching technology, the modified login information is used for logging in the application system and capturing the picture to obtain the picture to be detected, the picture to be detected is matched with the stored source picture, whether the modified login information is correct or not is determined according to the matching result (namely whether the modified login information can be logged in the target application system or not), the usability detection between the login information and the target application system is realized, and the picture matching mode is more visual than the code processing mode of extracting the Header keywords, and is easy to distinguish and understand. More importantly, the technical scheme of the embodiment of the invention is picture matching, and the page of the Silverlight application system is developed by a vector-based image layer technology, so the embodiment of the invention is also suitable for the Silverlight application system, and the problem of usability detection of the Silverlight application system is solved.
The above description is only for the preferred embodiment of the present invention, and is not intended to limit the scope of the present invention. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention shall fall within the protection scope of the present invention.

Claims (10)

1. A login information verification method of an application system is characterized in that the application system is one of multiple systems, and the method comprises the following steps:
logging in an application system by using initial login information of the application system, intercepting a picture from a specified page of the application system as a source picture, and storing the picture;
after the login information of the application system is modified, logging in the application system according to the modified login information, and capturing a picture from a specified page of the logged in application system according to the position of the source picture to obtain a picture to be detected;
matching the picture to be detected with a stored source picture;
if the matching result is consistent, confirming that the modified login information can be successfully logged in the application system;
and if the matching results are inconsistent, confirming that the modified login information is not logged in the application system but is logged in other application systems in the multiple systems.
2. The method of claim 1, further comprising: and when the modified login information is confirmed not to be logged in the application system, displaying the source picture and the picture to be tested, and prompting a login failure result.
3. The method of claim 1 or 2,
the intercepting of the picture from the specified page of the application system as the source picture comprises: analyzing the appointed page of the application system by using a hypertext markup language (HTML) analyzer to obtain HTML marks, generating corresponding pictures according to the obtained HTML marks, and intercepting the pictures from the generated pictures as source pictures;
the step of intercepting the picture from the specified page of the logged-in application system according to the position of the source picture comprises the following steps: analyzing the appointed page of the logged application system by using a hypertext markup language (HTML) analyzer to obtain HTML marks, generating corresponding pictures according to the obtained HTML marks, and intercepting the pictures from the generated pictures as the pictures to be detected.
4. The method of claim 1 or 2, wherein the matching the picture under test with the saved source picture comprises:
selecting a preset number of source pixel points from the source picture, extracting RGB color components of each source pixel point to obtain RGB color component arrays corresponding to each source pixel point, and arranging the RGB color component arrays of the source pixel points according to a preset sequence;
selecting the same number of pixels to be detected at the corresponding positions of the picture to be detected according to the positions of the source pixels, extracting the RGB color component of each pixel to be detected to obtain an RGB color component array corresponding to the pixel to be detected, and arranging the RGB color component arrays of the pixels to be detected according to the corresponding sequence;
and comparing the RGB color component of each source pixel point with the RGB color component of the corresponding pixel point to be detected.
5. The method of claim 1, wherein the designated page is a top page.
6. A login information verification device of an application system, wherein the application system is one of multiple systems, the device comprising:
the source picture obtaining unit is used for logging in the application system by using initial login information of the application system, intercepting a picture from a specified page of the application system as a source picture and storing the source picture;
the picture to be tested obtaining unit is used for logging in the application system according to the modified login information after the login information of the application system is modified, and capturing a picture from a specified page of the logged in application system according to the position of the source picture to obtain a picture to be tested;
the picture matching unit is used for matching the picture to be detected with the stored source picture;
the information confirmation unit is used for confirming that the modified login information can be successfully logged in the application system if the matching results are consistent; and if the matching results are inconsistent, confirming that the modified login information is not logged in the application system but is logged in other application systems in the multiple systems.
7. The apparatus of claim 6, wherein the information confirmation unit is further configured to, when it is confirmed that the modified login information is not logged in to the application system, display the source picture and the picture to be tested, and prompt a login failure result.
8. The apparatus according to claim 6 or 7, wherein the source picture obtaining unit is specifically configured to parse a specified page of the application system by using a hypertext markup language HTML parser to obtain HTML tags, generate corresponding pictures according to the obtained HTML tags, and intercept the pictures from the generated pictures as source pictures;
the picture to be detected obtaining unit is specifically configured to analyze the specified page of the logged-in application system by using a hypertext markup language (HTML) parser to obtain an HTML tag, generate a corresponding picture according to the obtained HTML tag, and intercept the picture from the generated picture as the picture to be detected.
9. The apparatus according to claim 6 or 7, wherein the image matching unit is specifically configured to select a predetermined number of source pixels from the source image, extract RGB color components of each of the source pixels, obtain RGB color component arrays corresponding to each of the source pixels, and arrange the RGB color component arrays of the source pixels according to a predetermined sequence;
selecting the same number of pixels to be detected at the corresponding positions of the picture to be detected according to the positions of the source pixels, extracting the RGB color component of each pixel to be detected to obtain an RGB color component array corresponding to the pixel to be detected, and arranging the RGB color component arrays of the pixels to be detected according to the corresponding sequence;
and comparing the RGB color component of each source pixel point with the RGB color component of the corresponding pixel point to be detected.
10. The apparatus of claim 6, wherein the designated page is a top page.
CN201510780018.2A 2015-11-13 2015-11-13 Login information verification method and device of application system Active CN106709315B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510780018.2A CN106709315B (en) 2015-11-13 2015-11-13 Login information verification method and device of application system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510780018.2A CN106709315B (en) 2015-11-13 2015-11-13 Login information verification method and device of application system

Publications (2)

Publication Number Publication Date
CN106709315A CN106709315A (en) 2017-05-24
CN106709315B true CN106709315B (en) 2020-03-06

Family

ID=58930880

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510780018.2A Active CN106709315B (en) 2015-11-13 2015-11-13 Login information verification method and device of application system

Country Status (1)

Country Link
CN (1) CN106709315B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110602076B (en) * 2019-08-15 2021-11-26 中国人民银行数字货币研究所 Identity using method, device and system based on master identity multiple authentication
CN110751861B (en) * 2019-11-28 2021-07-02 张丽丽 Network remote education system based on cloud platform

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103777989A (en) * 2012-10-25 2014-05-07 阿里巴巴集团控股有限公司 Method and system for generating HTML mark for vision draft source file
CN104506542A (en) * 2014-12-29 2015-04-08 深圳中兴网信科技有限公司 Security certification method and security certification system
CN104965881A (en) * 2015-06-12 2015-10-07 北京奇虎科技有限公司 Method and device for extracting selected area from page

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030041110A1 (en) * 2000-07-28 2003-02-27 Storymail, Inc. System, Method and Structure for generating and using a compressed digital certificate

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103777989A (en) * 2012-10-25 2014-05-07 阿里巴巴集团控股有限公司 Method and system for generating HTML mark for vision draft source file
CN104506542A (en) * 2014-12-29 2015-04-08 深圳中兴网信科技有限公司 Security certification method and security certification system
CN104965881A (en) * 2015-06-12 2015-10-07 北京奇虎科技有限公司 Method and device for extracting selected area from page

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
统一认正授权审计管理平台的研究与实现;贺嘉;《中国优秀硕士学位论文全文数据库 信息科技辑》;20130615;正文第3页,第30-43页 *

Also Published As

Publication number Publication date
CN106709315A (en) 2017-05-24

Similar Documents

Publication Publication Date Title
CN110324311B (en) Vulnerability detection method and device, computer equipment and storage medium
CN101242279B (en) Automatic penetration testing system and method for WEB system
CN103678105B (en) A kind of test method and device of page code
US9690923B2 (en) Method, apparatus and system for verifying terminal
US9178899B2 (en) Detecting automated site scans
CN102739663A (en) Detection method and scanning engine of web pages
CN108989355B (en) Vulnerability detection method and device
CN105989268A (en) Safety access method and system for human-computer identification
CN106776319B (en) Automatic test method and device
US10192042B2 (en) User verifying method, terminal device, server and storage medium
CN107085549B (en) Method and device for generating fault information
CN110798445B (en) Public gateway interface testing method and device, computer equipment and storage medium
CN104601573A (en) Verification method and device for Android platform URL (Uniform Resource Locator) access result
CN110933103A (en) Anti-crawler method, device, equipment and medium
CN110659569A (en) Electronic signature method, device, storage medium and electronic equipment
CN111460356A (en) Automatic login method, device, medium and equipment
CN106294317A (en) The form information method of calibration at a kind of cloud platform interface and system
KR20220124271A (en) Fault detection method, device, electronic device and readable storage medium of live traffic
CN105635064A (en) CSRF attack detection method and device
CN106709315B (en) Login information verification method and device of application system
CN107332805B (en) Method, device and system for detecting vulnerability
CN104375935A (en) Method and device for testing SQL injection attack
CN107888451B (en) Method and device for testing Web server
CN111801652A (en) Recording and recreating interface navigation processes
CN105404796A (en) JavaScript source file protection method and apparatus

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP02 Change in the address of a patent holder
CP02 Change in the address of a patent holder

Address after: Room 818, 8 / F, 34 Haidian Street, Haidian District, Beijing 100080

Patentee after: BEIJING ULTRAPOWER SOFTWARE Co.,Ltd.

Address before: 100089 Beijing city Haidian District wanquanzhuang Road No. 28 Wanliu new building 6 storey block A Room 601

Patentee before: BEIJING ULTRAPOWER SOFTWARE Co.,Ltd.