Disclosure of Invention
Therefore, it is necessary to provide a method, an apparatus, a computer device and a readable storage medium for logging in a website by a platform, aiming at the problem of difficulty in research and development of automatic website logging in the conventional technology.
A method for a platform to log on to a website, the method comprising:
acquiring login parameters generated when a user logs in a website, wherein the login parameters comprise a website identifier, a login account and a password of the website which the user logs in;
acquiring a corresponding website address according to the website identification;
inputting the login account and the password into a webpage loaded by a browser and corresponding to the website address through a script injected into a browser operated by a platform in advance;
generating a login request according to a login account and a password input into the webpage;
and sending the login request to a website server, and realizing login through a login account and a password carried by the login request.
In one embodiment, before the step of generating the login request according to the login account and the password input into the web page, the method further includes:
sending a verification code request to a website server, and generating a verification code according to the verification code request through the website server;
acquiring the verification code returned by the website server sent by the user terminal;
inputting the verification code into the webpage through a script which is injected into the browser operated by the platform in advance;
and verifying through the verification code, and if the verification is passed, entering the step of generating a login request according to the login account and the password input into the webpage.
In one embodiment, the step of inputting the verification code into the web page through a script pre-injected into the browser running on the platform includes:
inquiring whether a file corresponding to the verification code request exists in a file system or not through a script injected into a browser operated by a platform in advance;
and when the file corresponding to the verification code request exists in the file system and is in an available state, inputting the verification code in the file corresponding to the verification code request into a webpage loaded by the browser and corresponding to the website address.
In one embodiment, the method further comprises:
when a file corresponding to the verification code request exists in the file system and the file corresponding to the verification code request is in an unavailable state, setting a first timeout period;
and after the first overtime period, when the file corresponding to the verification code request is still in an unavailable state, the verification code request is sent to the website server again.
In one embodiment, the login is realized through a login account and a password carried by the login request, including:
detecting whether a login response returned by the website server is received;
when the login response returned by the website server is not received, setting a second timeout period;
and when the login response returned by the website server is not received after the second timeout period, the login request is sent to the website server again until login is realized through a login account and a password carried by the login request.
A platform login website apparatus, the apparatus comprising:
the system comprises an acquisition module, a storage module and a processing module, wherein the acquisition module is used for acquiring login parameters generated when a user logs in a website, and the login parameters comprise a website identifier, a login account and a password of the website which the user logs in; acquiring a corresponding website address according to the website identification;
the input module is used for inputting the login account and the password into a webpage loaded by the browser and corresponding to the website address through a script injected into a browser operated by a platform in advance;
the generation module is used for generating a login request according to the login account and the password input into the webpage;
and the sending module is used for sending the login request to a website server and realizing login through a login account and a password carried by the login request.
In one embodiment, the sending module is further configured to send a verification code request to a website server, and generate a verification code according to the verification code request by the website server;
the acquisition module is also used for acquiring the verification code fed back by the user terminal through the interactive server;
the input module is also used for acquiring the verification code returned by the website server sent by the user terminal;
the device further comprises:
and the verification module is used for verifying through the verification code, and if the verification is passed, a login request is generated according to a login account and a password which are input into the webpage.
In one embodiment, the input module comprises:
the query unit is used for querying whether a file corresponding to the verification code request exists in a file system or not through a script injected into a browser operated by a platform in advance;
and the input unit is used for inputting the verification code in the file corresponding to the verification code request into the webpage loaded by the browser and corresponding to the website address when the file corresponding to the verification code request exists in the file system and is in an available state.
A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the steps of the above method when executing the program.
A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the above-mentioned method.
According to the method, the device, the computer equipment and the readable storage medium for logging in the website by the platform, the website is automatically logged in by the script which is injected into the browser running on the platform in advance, complex compiling and deploying processes of the browser are not needed, research and development difficulty is reduced, the position, the authority and the like of the script are not needed to be checked when the script is executed, the situation that loading of the script fails due to a security defense mechanism of the browser is prevented, and therefore smooth automatic logging in of the website can be guaranteed.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
Before describing in detail embodiments that are in accordance with the present invention, it should be observed that the embodiments reside primarily in combinations of steps and system components related to a platform login web site method, apparatus, computer device, and readable storage medium. Accordingly, the system components and method steps have been represented where appropriate by conventional symbols in the drawings, showing only those details that are pertinent to understanding the embodiments of the present invention so as not to obscure the disclosure with details that will be readily apparent to those of ordinary skill in the art having the benefit of the description herein.
In this document, relational terms such as left and right, top and bottom, front and back, first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. The terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
Referring to fig. 1, fig. 1 is an application environment diagram of a website login method by a platform in an embodiment, where the application environment diagram includes a user terminal, a platform, and a website server, where the user terminal may communicate with the platform and the website server, and the platform may also communicate with the website server, and the user terminal may send a login account and a password for logging in the website server to the platform for storage, so that the platform may log in to the website server according to the login account and the password, and the platform may capture service data of a user from the website server.
Referring to fig. 2, in an embodiment, a method for platform login to a website is provided, and the embodiment is exemplified by applying the method to a platform in the platform login website system in fig. 1. The platform is operated with a platform website login program, and the platform website login method is implemented through the platform website login program. The method specifically comprises the following steps:
s202: the method comprises the steps of obtaining login parameters generated when a user logs in a website, wherein the login parameters comprise a website identification, a login account and a password of the website which the user logs in.
Specifically, when a user logs in a website server at a user terminal, the user needs to input a login account and a password, so that the user can successfully log in the website server. When the platform logs in the website server, a user does not input a login account and a password, but obtains login parameters generated when the user logs in the website at a user terminal, and the obtaining process needs authorization of the user.
The login parameters include a website identifier of a website that the user logs in, for example, a url address (uniform resource Locator) of the website, a login account and a password, that is, an account that has been registered in the website server and a password corresponding to the login account.
S204: and acquiring a corresponding website address according to the website identification.
Specifically, the website identification is an identification capable of uniquely determining a certain website, and the corresponding website address can be obtained through the website identification.
S206: and inputting the login account and the password into a webpage loaded by the browser and corresponding to the website address through a script injected into a browser operated by the platform in advance.
Specifically, the browser may open a corresponding web page according to the website address, that is, the browser may download the network data from the website server according to the website address, render and display the corresponding web page according to the network data, and execute the script in the network data when the script exists in the network data, thereby completing some post-rendering interactive actions of the platform, such as enlarging a certain picture, setting a certain background, and the like. However, since the standard browser does not allow the third-party script to be embedded, in order to implement the script injection behavior into the browser, a specific browser may be developed as required, which may inject a script that may input a login account number and a password into the browser, and the login account number and the password may be input into the browser by the script that is pre-injected into the browser run by the platform. Since scripts are generally directly repaired and quickly updated, inputting a login account and a password into a browser by injecting the scripts can conveniently adapt to the upgrade change of a login webpage of a website, for example, when the original button name "login _ button" is modified to "login _ button 2", the scheme of inputting the login account and the password into the browser through non-scripts needs to modify and recompile codes of the browser, and then upload the compiled codes to adapt to the change. The method for inputting the login account and the password into the browser in the script injection mode can directly modify the script in the existing program to be changed into the 'logic _ button 2' and directly store the script, does not need to recompile and deploy the original browser, and saves a large amount of time.
S208: and generating a login request according to the login account and the password input into the webpage.
Specifically, the browser running in the platform may generate a login request according to a login account and a password input into the web page, for example, the login account and the password may be encrypted, and then a login request token packet may be generated, where the login request token packet may be generated based on a certain communication protocol, for example, a header flag, a browser version, a command, a packet sequence number, the login account and the password, a body and a tail of the packet may be protected.
S210: and sending the login request to a website server, and realizing login through a login account and a password carried by the login request.
Specifically, the platform sends the login request to the website server, after receiving the login request, the website server first reads the encrypted login account and password, then decrypts the encrypted login account and password according to a specific decryption rule to obtain the login account and password, then queries the password of the corresponding login account stored in the website server, compares the password sent by the platform with the password stored in the website server, and when the password sent by the platform is the same as the password stored in the website server, the platform can realize login through the login account and the password carried in the login request.
According to the method for logging in the website by the platform, the website is automatically logged in by the script which is injected into the browser running on the platform in advance, the browser does not need to be complied and compiled and deployed, the research and development difficulty is reduced, the position, the authority and the like of the script do not need to be checked when the script is executed, the situation that the script loading fails due to a security defense mechanism of the browser is prevented, and therefore the website can be guaranteed to be automatically logged in smoothly.
Referring to fig. 3, fig. 3 is a flowchart of an authentication step in an embodiment, where the authentication step may be performed before step S208 in the embodiment shown in fig. 2, that is, before the step of generating a login request according to a login account number and a password input into a web page, the method may further include:
s302: and sending a verification code request to the website server, and generating a verification code according to the verification code request through the website server.
Specifically, in order to further protect the security of the account number and prevent the account number from being logged in by automation software and the like, the verification code is introduced, and the verification code is repeatedly verified in a short time in the login of the automation software, so that a wind control mechanism is triggered, login failure is caused, and the like. In order to prevent the occurrence of the situation, firstly, the platform sends an authentication code request to the website server, so that the website server generates an authentication code according to the authentication code request and feeds the authentication code back to the user, for example, the authentication code is fed back to a mobile phone of the user through a short message or is fed back to a mailbox of the user through an email.
S304: and acquiring the verification code returned by the website server sent by the user terminal.
Specifically, the website server feeds back the verification code to the user terminal instead of the platform, so that in order to obtain the verification code fed back by the website server, the verification code can be directly fed back to the platform through the user terminal, or a transit server is introduced, and the transit server can obtain the verification code sent by the website server and fed back by the user terminal, so that the platform can obtain the verification code sent by the website server and sent by the user terminal in a communication manner with the transit server.
S306: and inputting the verification code into the webpage through a script which is injected into a browser operated by the platform in advance.
Specifically, when the platform acquires the verification code, the verification code can be input into a webpage of the browser through a script which is injected into the browser operated by the platform in advance, and since the script is generally directly subjected to hot repair and quick update, the verification code can be conveniently input into the browser in a script injection mode to adapt to the upgrade change of the login webpage of the website, for example, when the original button name "Security code button" is modified to "Security code button 2", the scheme of inputting the verification code into the browser through a non-script mode needs to modify the code of the browser, recompile the code, and upload the compiled code to adapt to the change. The method for inputting the verification code into the browser in the script injection mode can directly modify the script in the existing program to be changed into 'Security code _ button 2' and directly store the 'Security code _ button 2', does not need to recompile and deploy the original browser, and saves a large amount of time.
S308: and verifying through the verification code, and if the verification is passed, performing a step of generating a login request according to the login account and the password input into the webpage.
Specifically, after the verification code is successfully verified, that is, the verification code input into the webpage is sent to the website server, the website server compares the verification code sent by the platform with the verification code stored in the website server, the website server returns information that the verification is passed to the platform, the platform passes the verification, and then a login request is generated according to a login account number and a password input into the webpage to realize login.
According to the method for logging in the website by the platform, the verification code is input by the script which is injected into the browser running on the platform in advance, the browser does not need to be complied and deployed, the research and development difficulty is reduced, the position, the authority and the like of the script do not need to be checked when the script is executed, the situation that the script loading fails due to a security defense mechanism of the browser is prevented, and therefore the website can be guaranteed to log in automatically and smoothly.
In one embodiment, the step of inputting the verification code into the web page through a script pre-injected into the browser run by the platform, that is, step S306, may include: inquiring whether a file corresponding to the verification code request exists in a file system or not through a script which is injected into a browser running on the platform in advance; and when the file corresponding to the verification code request exists in the file system and is in an available state, inputting the verification code in the file corresponding to the verification code request into a webpage loaded by the browser and corresponding to the website address. In one embodiment, when a file corresponding to the verification code request exists in the file system and the file corresponding to the verification code request is in an unavailable state, a first timeout period is set; and after the first overtime period, when the file corresponding to the verification code request is still in an unavailable state, the verification code request is sent to the website server again.
Referring to fig. 4, fig. 4 is a flowchart of step S206 in the embodiment shown in fig. 2, in which whether a corresponding verification code has been obtained is determined by querying whether a file corresponding to the verification code request exists in the platform file system, and step S206 may include:
s402: and inquiring whether the file system has a file corresponding to the verification code through a script injected into a browser operated by the platform in advance.
In particular, a file system refers to methods and data structures used by an operating system to manifest files on a disk or partition; i.e. a method of organizing files on a disk. Also referred to as disks or partitions for storing files. The software mechanism in the operating system that is responsible for managing and storing file information is called a file management system, referred to as a file system for short. The file system consists of three parts: software related to file management, managed files, and data structures necessary to implement file management.
The file corresponding to the verification code may be obtained by a login account and a website identifier, for example, the name of the file includes the login account and the website identifier, and a script pre-injected into a browser running on the platform directly queries whether the file system has a file with a file name including the login account and the website identifier.
S404: and when the file corresponding to the verification code request exists in the file system and is in an available state, inputting the verification code in the file corresponding to the verification code request into a webpage loaded by the browser and corresponding to the website address.
Specifically, when the file system always has a file corresponding to the request for the verification code, and the file is in an available state, that is, the file has been established in the file system, and the content of the file is complete, in other words, the file system has received and stored the verification code corresponding to the request for the verification code, so that the verification code in the file is directly input to the corresponding web page.
Whether a file is available or not can be identified by an identification bit, for example, the identification bit is 1 when the file is completely transferred, that is, the file is available, and the identification bit is 0 when the file is not completely transferred, that is, the file is not available.
S406: and when the file corresponding to the verification code request exists in the file system and is in an unavailable state, setting a first timeout period.
Specifically, when the file system always has a file corresponding to the request for the verification code, but the file is in an unavailable state, that is, the file has been established in the file system, but the content of the file is still incomplete, that is, the file system has not received the verification code corresponding to the request for the verification code, which may be that the file is not received due to file loss during transmission, or that the file is not received due to a problem of transmission time, when the file is queried to be in an unavailable state, a first timeout is set, the first timeout is the maximum value of the tolerable reception time of the verification code, for example, the verification code may fail within 5 minutes, the first timeout may be set to be 4 minutes 30 seconds, 4 minutes 40 seconds, 4 minutes 50 seconds, 3 minutes, and so as to ensure that before the verification code fails, the verification code may be entered into the corresponding web page through a script pre-injected into a browser run by the platform.
S408: and after the first overtime period, when the file corresponding to the verification code request is still in an unavailable state, the verification code request is sent to the website server again.
Specifically, after the first timeout period, the file in the file system corresponding to the verification code request is still in an unavailable state, that is, the verification code is failed to be received, and then, in order to successfully log in the web server, the platform will send the verification code request to the web server again to log in the web server again.
In the above embodiment, the platform determines whether the verification code sent by the user terminal is received through the file system, the operation is simple, and when the verification code is failed to be received, that is, the file in the file system is still unavailable after the first timeout period, the platform sends the verification code request to the web server again, and the retry mechanism can improve the applicability of the platform, so that the platform can obtain the verification code returned by the web server.
Referring to fig. 5, fig. 5 is a flowchart of step S210 in the embodiment shown in fig. 2, where step S210, that is, the step of implementing login by using the login account and the password carried in the login request, may include:
s502: and detecting whether a login response returned by the website server is received.
Specifically, in the process of logging in the website server, the platform first needs to send a login request to the website server, the website server determines whether a login account and a password carried in the login request are correct, only when the login account and the password are correct, that is, the login account and the password are stored in the website server, and when the login account and the password are matched, the website server returns a login response to the platform, so that the platform determines whether the login is successful according to the login response, for example, when the login response indicates that the login is successful, the platform continues to download corresponding network data from the website server, and when the login response indicates that the login is failed, the login failure can be prompted.
S504: and when the login response returned by the website server is not received, setting a second timeout period.
Specifically, the login response returned by the website server may be lost in the transmission process, so that the platform cannot receive the login response in time, and therefore a second timeout period may be set, where the second timeout period is website login time that the platform can tolerate, and when the login time passes, the platform does not log in the website yet, which indicates that the website login fails, and the second timeout period may be set to 1 minute, 50 seconds, 2 minutes, 1.5 minutes, and the like, which is not limited herein.
S506: and after a second overtime period, if the login response returned by the website server is not received, the login request is sent to the website server again until login is realized through the login account and the password carried by the login request.
Specifically, after a second timeout period, if the platform still does not receive a login response returned by the website server, it indicates that the website login fails, so that network data can be acquired, the platform sends a login request to the website server again until login is achieved through a login account and a password carried by the login request, and through a retry mechanism, the occurrence of login failure caused by data loss in the transmission process can be reduced. If the login response returned by the web server still cannot be received after retrying for a plurality of times, an error may be reported, for example, if the login response returned by the web server still cannot be received after retrying for 2 times, 3 times, 6 times, etc., an error may be reported.
In the embodiment, after the login response returned by the website server is not received, the login failure caused by data loss in the transmission process is avoided by sending the login request to the website server again, and the operation is simple.
Referring to fig. 6, fig. 6 is a schematic diagram of a platform website login device in an embodiment, where the platform website login device 100 includes:
the acquisition module 110 is configured to acquire login parameters generated when a user logs in a website, where the login parameters include a website identifier, a login account, and a password of the website where the user logs in; and acquiring a corresponding website address according to the website identification.
The input module 120 is configured to input the login account and the password into a webpage loaded by the browser and corresponding to the website address through a script pre-injected into a browser running on the platform.
The generating module 130 is configured to generate a login request according to the login account and the password input into the webpage.
And the sending module 140 is configured to send the login request to the website server, and implement login through a login account and a password carried in the login request.
In one embodiment, referring to fig. 7, fig. 7 is a schematic diagram of a platform login website device in another embodiment, wherein the sending module 140 may be further configured to send an authentication code request to a website server, and generate an authentication code according to the authentication code request by the website server.
The obtaining module 110 may also be configured to obtain, through the interaction server, the verification code fed back by the user terminal.
The input module 120 may also be configured to obtain an authentication code returned by the web server sent by the user terminal.
The apparatus may further comprise: and the verification module 150 is configured to perform verification through the verification code, and if the verification is passed, generate a login request according to a login account and a password input to the webpage.
In one embodiment, the input module 120 may include:
the query unit 121 is configured to query whether a file corresponding to the verification code request exists in the file system through a script injected into a browser running on the platform in advance.
The input unit 122 is configured to, when a file corresponding to the request for the verification code exists in the file system and the file corresponding to the request for the verification code is in an available state, input the verification code in the file corresponding to the request for the verification code into a webpage loaded by the browser and corresponding to the website address.
In one embodiment, the apparatus may further include:
the setting module is used for setting a first timeout period when the file corresponding to the verification code request exists in the file system and the file corresponding to the verification code request is in an unavailable state.
And the resending module is used for resending the verification code request to the website server when the file corresponding to the verification code request is still in an unavailable state after the first overtime period.
In one embodiment, the sending module 140 may include:
a checking unit 141, configured to detect whether a login response returned by the website server is received.
The setting unit 142 is configured to set a second timeout period when a login response returned by the website server is not received.
And the sending unit 143, configured to send the login request to the website server again until login is achieved through the login account and the password carried in the login request when the login response returned by the website server is not received after the second timeout period elapses.
For specific limitations of the platform login website device, reference may be made to the above limitations of the platform login website method, which is not described herein again.
Referring to fig. 8, fig. 8 is a schematic structural diagram of a computer device in an embodiment, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, where the memory may include a nonvolatile storage medium and an internal memory, the computer program may be stored in the nonvolatile storage medium, and the processor executes the program to implement the following steps: acquiring login parameters generated when a user logs in a website, wherein the login parameters comprise a website identifier, a login account and a password of the website which the user logs in; acquiring a corresponding website address according to the website identification; inputting a login account and a password into a webpage loaded by a browser and corresponding to a website address through a script injected into a browser operated by a platform in advance; generating a login request according to a login account and a password input into a webpage; and sending the login request to a website server, and realizing login through a login account and a password carried by the login request.
In one embodiment, the processor when executing the program may further implement the following steps: sending a verification code request to a website server, and generating a verification code according to the verification code request through the website server; acquiring a verification code returned by a website server sent by a user terminal; inputting the verification code into a webpage through a script injected into a browser operated by the platform in advance; and verifying through the verification code, and if the verification is passed, performing a step of generating a login request according to the login account and the password input into the webpage.
In one embodiment, the processor when executing the program may further implement the following steps: inquiring whether a file corresponding to the verification code request exists in a file system or not through a script which is injected into a browser running on the platform in advance; and when the file corresponding to the verification code request exists in the file system and is in an available state, inputting the verification code in the file corresponding to the verification code request into a webpage loaded by the browser and corresponding to the website address.
In one embodiment, the processor when executing the program may further implement the following steps: when a file corresponding to the verification code request exists in the file system and the file corresponding to the verification code request is in an unavailable state, setting a first timeout period; and after the first overtime period, when the file corresponding to the verification code request is still in an unavailable state, the verification code request is sent to the website server again.
In one embodiment, the processor when executing the program may further implement the following steps: detecting whether a login response returned by the website server is received; when a login response returned by the website server is not received, setting a second timeout period; and after a second overtime period, if the login response returned by the website server is not received, the login request is sent to the website server again until login is realized through the login account and the password carried by the login request.
The above definition of the computer device may refer to the above specific definition of the agent screen recording method, and is not described herein again.
With continuing reference to fig. 8, there is also provided a computer readable storage medium having stored thereon a computer program, such as the non-volatile storage medium shown in fig. 8, wherein the program when executed by a processor implements the steps of: acquiring login parameters generated when a user logs in a website, wherein the login parameters comprise a website identifier, a login account and a password of the website which the user logs in; acquiring a corresponding website address according to the website identification; inputting a login account and a password into a webpage loaded by a browser and corresponding to a website address through a script injected into a browser operated by a platform in advance; generating a login request according to a login account and a password input into a webpage; and sending the login request to a website server, and realizing login through a login account and a password carried by the login request.
In one embodiment, the program when executed by the processor further performs the steps of: sending a verification code request to a website server, and generating a verification code according to the verification code request through the website server; acquiring a verification code returned by a website server sent by a user terminal; inputting the verification code into a webpage through a script injected into a browser operated by the platform in advance; and verifying through the verification code, and if the verification is passed, performing a step of generating a login request according to the login account and the password input into the webpage.
In one embodiment, the program when executed by the processor further performs the steps of: inquiring whether a file corresponding to the verification code request exists in a file system or not through a script which is injected into a browser running on the platform in advance; and when the file corresponding to the verification code request exists in the file system and is in an available state, inputting the verification code in the file corresponding to the verification code request into a webpage loaded by the browser and corresponding to the website address.
In one embodiment, the program when executed by the processor further performs the steps of: when a file corresponding to the verification code request exists in the file system and the file corresponding to the verification code request is in an unavailable state, setting a first timeout period; and after the first overtime period, when the file corresponding to the verification code request is still in an unavailable state, the verification code request is sent to the website server again.
In one embodiment, the program when executed by the processor further performs the steps of: detecting whether a login response returned by the website server is received; when a login response returned by the website server is not received, setting a second timeout period; and after a second overtime period, if the login response returned by the website server is not received, the login request is sent to the website server again until login is realized through the login account and the password carried by the login request.
The above-mentioned limitations on the computer-readable storage medium can be referred to the above specific limitations on the method for platform login to the website, and are not described herein again.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a non-volatile computer-readable storage medium, and can include the processes of the embodiments of the methods described above when the program is executed. The storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), or the like.
The technical features of the embodiments described above may be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the embodiments described above are not described, but should be considered as being within the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present invention, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the inventive concept, which falls within the scope of the present invention. Therefore, the protection scope of the present patent shall be subject to the appended claims.