CN107169340A - A kind of behavior formula identifying code processing method and processing device - Google Patents
A kind of behavior formula identifying code processing method and processing device Download PDFInfo
- Publication number
- CN107169340A CN107169340A CN201710335099.4A CN201710335099A CN107169340A CN 107169340 A CN107169340 A CN 107169340A CN 201710335099 A CN201710335099 A CN 201710335099A CN 107169340 A CN107169340 A CN 107169340A
- Authority
- CN
- China
- Prior art keywords
- background
- verified
- pixel
- identifying code
- full
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/958—Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T7/00—Image analysis
- G06T7/20—Analysis of motion
- G06T7/254—Analysis of motion involving subtraction of images
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T7/00—Image analysis
- G06T7/90—Determination of colour characteristics
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2133—Verifying human interaction, e.g., Captcha
Abstract
The invention discloses a kind of behavior formula identifying code processing method and processing device, the behavior formula identifying code processing method includes procedure below:Driving renders, loads webpage, by web page element selector locating verification code picture, and obtains full Background and Background to be verified respectively using picture splicing and recovery mode;Full Background and Background to be verified are contrasted, target location is found using pixel difference;Suitable sample trace is selected according to target location and is loaded onto in JS scripts, operation JS scripts start to drag, discharge mouse, and ip addresses where when server is according to track characteristic and the checking of dragging are judged the result.Execution efficiency of the present invention is high, target identification accuracy rate is up to more than 90%, and dragging success rate single machine test is up to 80%, has largely cleared away obstacle for the automatic data collection of network data, the improvement also for behavior formula identifying code provides corresponding thinking simultaneously, with certain practical value and application prospect.
Description
Technical field
The present invention relates to field of computer data processing, more particularly to a kind of behavior formula identifying code processing method and processing device.
Background technology
Identifying code is the life for guarantee website information security, it is necessary to withstand the test of automatic cracking programs, because
This needs the security that height is can be only achieved by various automatic tests.Under the trend of machine learning artificial intelligence, crack
Traditional character type identifying code non-difficult matter, the behavior formula identifying code in the epoch of identifying code 2.0 arises at the historic moment.Behavior formula identifying code refers to
Be that checking is completed by the operation behavior of user, the picture character without going to understand distortion.Its core concept is to utilize
" behavioural characteristic " of user differentiates to do checking safety.
The checking of pure behavior formula, behavior formula identifying code as depicted in figs. 1 and 2, it combines action trail, network rings
Border, unit type are man-machine to distinguish, wherein, the identification of target location is must to cross the outpost of the tax office first.Current behavior formula identifying code
Treatment technology is generally verified a yard picture by the way of sectional drawing again is first clicked on, due to including the interference of picture mosaic in sectional drawing,
The identification of target location can be then caused to there is certain boundary error to remove interference;In addition, when realizing dragging, directly invoking
Webdriver built-in function movebyoffset (), but the time that the function is consumed under Linux and Windows differ
Cause, be easily caused percent of pass and substantially reduce, problems above all increases the difficulty of network data acquisition.
Therefore, a kind of behavior formula identifying code processing method and processing device is needed badly.
The content of the invention
The purpose of invention:There is error, execution efficiency to solve existing behavior formula identifying code treatment technology target identification
Low, professional platform independence can not enough the not high technical problem of good and percent of pass be there is provided a kind of identifying code processing method and processing device, by testing
The attribute of card code picture selector obtains and goes back original picture, and using simple Target Recognition Algorithms, target identification accuracy rate is reachable
More than 90%, and simulate using JS scripts the dragging of real human, it can reach in the test of automation and to be verified by behavior formula
Technique effect.So as to solve the identification of behavior formula identifying code and crack problem.
To reach above-mentioned purpose, the technical solution adopted by the present invention is:There is provided a kind of behavior formula identifying code processing method,
Including procedure below:
Step 1:Driving renders, loads webpage, by web page element selector locating verification code picture, and is spelled using picture
Connect reduction mode and obtain full Background and Background to be verified respectively;The web page element selector is CSS selector or Xpath
Selector;
Step 2:Full Background and Background to be verified are contrasted, target location is found using pixel difference;
Step 3:Suitable sample trace is selected according to target location and is loaded onto in JS scripts, operation JS scripts start to drag
Dynamic, release mouse, ip addresses where when server is according to track characteristic and the checking of dragging are judged the result;When
When dividing > 0, it is proved to be successful, output result;When score≤0, authentication failed, repeat step 1-3 are until be proved to be successful, Huo Zheda
Stop checking during to default checking number of times.
Further, the use picture splicing and recovery mode obtains full Background and Background to be verified respectively, including
Procedure below:
Load Webdriver and identifying code picture selector;The identifying code picture selector is full Background selector
Or Background selector to be verified;
Obtain the style attributes of identifying code picture selector;
Take out the url of the pixel coordinate and complete out of order picture in identifying code picture selector style attributes;
Out of order picture is obtained by the url of complete out of order picture, and passes through the pixel coordinate pair of identifying code picture selector
Out of order picture is reduced;
Respectively obtain full Background, the top half of Background to be verified and the latter half after reduction;
Respectively by full Background, the top half of Background to be verified and the latter half split, complete full Background and treat
Verify the reduction of Background.
Further, it is described to be contrasted full Background and Background to be verified, find target position using pixel difference
Put, including procedure below:
Load full Background and Background to be verified;
Initialized target position is set;
Travel through tri- components of RGB of each pixel of each row of full Background, Background to be verified, and by full Background with
Tri- components of RGB of the corresponding pixel of Background to be verified make the difference respectively;
When three differences of tri- components of RGB are all higher than predetermined threshold, then judge that color is different;
Return to the row abscissa for first color different pixels point occur and be used as target location.
Further, it is described to be contrasted full Background and Background to be verified, find target position using pixel difference
Put, including procedure below:
Load full Background and Background to be verified;
The pixel difference of full Background and Background to be verified is calculated, is stored after sequence;
Known target position area is x, then the maximum pixel of difference in x pixel before taking;
The pixels different to each column in the preceding x pixel that is taken are counted;
Return to the abscissa of the most row of different pixels point number, as target location.
Further, the pixel difference for calculating full Background and Background to be verified, including procedure below:Traversal takes
To full Background, each pixel of Background to be verified, by the pixel of full Background pixel corresponding with Background to be verified
Value Pixel makes the difference respectively, obtains overall difference.
Present invention also offers a kind of behavior formula identifying code processing unit, including:
Picture acquisition module, renders for driving, loads webpage, by web page element selector locating verification code picture,
And full Background and Background to be verified are obtained using picture splicing and recovery mode respectively;
Target location identification module, for full Background and Background to be verified to be contrasted, is looked for using pixel difference
To target location;
Mobile authentication module, for selecting suitable sample trace according to target location and being loaded onto in JS scripts, runs
JS scripts start to drag, discharge mouse, and ip addresses are to the result where when server is according to track characteristic and the checking of dragging
Judged;As score > 0, it is proved to be successful, output result;When score≤0, authentication failed, repeat step 1-3 are until test
Stop checking when demonstrate,proving successfully, or reaching default checking number of times.
Further, the picture acquisition module, specifically for:
Load Webdriver and identifying code picture selector;The identifying code picture selector is full Background selector
Or Background selector to be verified;
Obtain the style attributes of identifying code picture selector;
Take out the url of the pixel coordinate and complete out of order picture in identifying code picture selector style attributes;
Out of order picture is obtained by the url of complete out of order picture, and passes through the pixel coordinate pair of identifying code picture selector
Out of order picture is reduced;
Respectively obtain full Background, the top half of Background to be verified and the latter half after reduction;
Respectively by full Background, the top half of Background to be verified and the latter half split, complete full Background and treat
Verify the reduction of Background.
Further, the target location identification module, specifically for:
Load full Background and Background to be verified;
Initialized target position is set;
Travel through tri- components of RGB of each pixel of each row of full Background, Background to be verified, and by full Background with
Tri- components of RGB of the corresponding pixel of Background to be verified make the difference respectively;
When three differences of tri- components of RGB are all higher than predetermined threshold, then judge that color is different;
Return to the row abscissa for first color different pixels point occur and be used as target location.
Further, the target location identification module, specifically for:
Load full Background and Background to be verified;
The pixel difference of full Background and Background to be verified is calculated, is stored after sequence;
Known target position area is x, then the maximum pixel of difference in x pixel before taking;
The pixels different to each column in the preceding x pixel that is taken are counted;
Return to the abscissa of the most row of different pixels point number, as target location.
Further, in the target location identification module, the pixel difference of full Background and Background to be verified is calculated,
Including procedure below:Traversal gets each pixel of full Background, Background to be verified, by full Background and Background to be verified
The pixel value Pixel of corresponding pixel makes the difference respectively, obtains overall difference.
The beneficial effects of the invention are as follows:The present invention can be cross-platform and supports high concurrent, using PhantomJS browsers or
The driving of Chrome browsers is rendered to webpage, and by CSS selector locating verification code picture, execution efficiency is high;Using
Picture splicing and recovery mode obtains full Background and Background to be verified, with sectional drawing mode comparative benefits substantially, be conducive into
The target identification of one step;Using simple Target Recognition Algorithms, target identification accuracy rate is up to more than 90%;Using JS script moulds
Intend the dragging of real human, dragging success rate single machine test is up to 80%, and the present invention is largely the automatic of network data
Obstacle has been cleared away in collection, while also the improvement for behavior formula identifying code provides corresponding thinking, with certain practical value with answer
Use prospect.
Brief description of the drawings
Fig. 1 is the full background illustrated example of existing behavior formula identifying code.
Fig. 2 is the background illustrated example to be verified of existing behavior formula identifying code.
Fig. 3 is the broad flow diagram of the behavior formula identifying code processing method of embodiment 1.
Fig. 4 is the particular flow sheet of step 1 in the behavior formula identifying code processing method of embodiment 1.
Fig. 5 is the Background to be verified of step 1 reduction in the behavior formula identifying code processing method of embodiment 1.
Fig. 6 is the particular flow sheet of step 2 in the behavior formula identifying code processing method of embodiment 1.
Fig. 7 is the particular flow sheet of step 3 in the behavior formula identifying code processing method of embodiment 1.
Fig. 8 is the particular flow sheet of the behavior formula identifying code process method step 2 of embodiment 2.
Fig. 9 is the structured flowchart of the behavior formula identifying code processing unit of embodiment 3.
Embodiment
For make present invention solves the technical problem that, the technical scheme that uses and the technique effect that reaches it is clearer, below
The present invention is described in further detail in conjunction with the accompanying drawings and embodiments.It is understood that specific implementation described herein
Example is used only for explaining the present invention, rather than limitation of the invention.
Embodiment 1
Reference picture 3-7, a kind of behavior formula identifying code processing method, including:
Step 1:Rendered using ChromeDriver, load webpage, and by CSS selector locating verification code picture, adopt
Full Background and Background to be verified are respectively obtained with picture splicing and recovery mode;
The use picture splicing and recovery mode obtains full Background and Background to be verified, including procedure below respectively:
Step 1.1:Webdriver attributes are set and Webdriver is loaded, loaded etc. code to be verified picture selector
Entirely;The identifying code picture selector is full Background selector or Background selector to be verified;
Step 1.2:Obtain the style attributes of identifying code picture selector;
Step 1.3:Take out the url of the pixel coordinate and complete out of order picture in identifying code picture selector style attributes;
Step 1.4:Out of order picture is obtained according to acquired url, and according to the pixel coordinate of identifying code picture selector
Out of order picture is reduced;
Step 1.5:Respectively obtain full Background, the top half of Background to be verified and the latter half after reduction;
Step 1.6:Respectively by full Background, the top half of Background to be verified and the latter half split, the full back of the body is completed
The reduction of scape figure and Background to be verified;Wherein, the full Background (Fig. 1) of also artwork and the prior art of the full Background of the present invention
Unanimously, but the obtained Background to be verified (Fig. 2) of Background to be verified (Fig. 5) and existing sectional drawing mode has significant difference, this hair
Bright picture splicing and recovery mode only reduces target location, and no picture mosaic interference substantially increases the accuracy of target location identification.
Step 2:Full Background and Background to be verified are contrasted, target location is found using pixel difference, specifically
It can include:
Step 2.1:Load full Background and Background to be verified;
Step 2.2:Traversal gets each pixel of full Background, Background to be verified, by full Background and the back of the body to be verified
The pixel value Pixel of the corresponding pixel of scape figure makes the difference respectively, obtains overall difference, is stored after sequence;
Step 2.3:Known target position area is x, then takes the maximum pixel of difference, pixel difference in preceding x pixel
At value maximum is most likely to be where target location;The target location area is picture mosaic area to be dragged;
Step 2.4:The pixels different to each column in the preceding x pixel that is taken are counted;
Step 2.5:Return to the abscissa of the most row of different pixels point number, as target location.
Step 3:Suitable sample trace is selected according to target location and is loaded onto in JS scripts, operation JS scripts start to drag
Dynamic, release mouse, server ip addresses according to where the track characteristic of dragging and checking are judged the result, specifically may be used
With including:
Step 3.1:The loading track sample in internal memory;
Step 3.2:Suitable sample trace is selected according to target location;
Step 3.3:Sample trace is loaded onto in JS scripts, the dragging of operation JS scripts, release mouse;
Step 3.4:Server ip addresses according to where the track characteristic of dragging and checking are judged the result, when
During score > 0, it is proved to be successful, output result;When score≤0, authentication failed, repeat step 1-3 until be proved to be successful, or
Stop checking when reaching default checking number of times.
Embodiment 2
Reference picture 8, a kind of behavior formula identifying code processing method, including:
Step 1:Rendered using PhantomJS browsers without a head, load webpage, pass through Xpath selectors locating verification code
Picture, full Background and Background to be verified are respectively obtained using picture splicing and recovery;The PhantomJS is a scripting
Without interface WebKit, various functions are realized by script of JavaScript, the usage scenario that official is enumerated includes:It is unbounded
Face is tested, page automation, screenshot capture and network monitoring;
The use picture splicing and recovery mode obtains full Background and Background to be verified, including procedure below respectively:
Step 1.1:Webdriver attributes are set and Webdriver is loaded, loaded etc. code to be verified picture selector
Entirely;The identifying code picture selector is full Background selector or Background selector to be verified;
Step 1.2:Obtain the style attributes of identifying code picture selector;
Step 1.3:Take out the url of the pixel coordinate and complete out of order picture in identifying code picture selector style attributes;
Step 1.4:Out of order picture is obtained according to acquired url, and according to the pixel coordinate of identifying code picture selector
Out of order picture is reduced;
Step 1.5:Respectively obtain full Background, the top half of Background to be verified and the latter half after reduction;
Step 1.6:Respectively by full Background, the top half of Background to be verified and the latter half split, the full back of the body is completed
The reduction of scape figure and Background to be verified;
Step 2:Full Background and Background to be verified are contrasted, target location is found using pixel difference, specifically
It can include:
Step 2.1:Load full Background and Background to be verified;
Step 2.2:It is -1 to set initialized target position;
Step 2.3:Tri- components of RGB of each each pixel of row of full Background, Background to be verified are traveled through, and will be complete
Tri- components of RGB of Background pixel corresponding with Background to be verified make the difference respectively;
Step 2.4:It is 60 to set rgb color discrepancy threshold, if the equal > 60 of three differences of tri- components of RGB, judges
Face
Color is different;
Step 2.5:Return to the row abscissa for first color different pixels point occur and be used as target location.
Step 3:Suitable sample trace is selected according to target location and is loaded onto in JS scripts, operation JS scripts start to drag
Dynamic, release mouse, server ip addresses according to where the track characteristic of dragging and checking are judged the result;The step
It can specifically include:
Step 3.1:The loading track sample in internal memory;
Step 3.2:Suitable sample trace is selected according to target location;
Step 3.3:Sample trace is loaded onto in JS scripts, dragged according to track operation mouse, discharge mouse;
Step 3.4:Server ip addresses according to where the track characteristic of dragging and checking are judged the result, when
During score > 0, it is proved to be successful, output result;When score≤0, authentication failed, repeat step 1-3 until be proved to be successful, or
Stop checking when reaching default checking number of times.Wherein, mouse drag part can select to use PhantomJS browsers without a head,
But due to PhantomJS under Linux and windows platform environment performance difference, therefore percent of pass have it is larger
Difference.
The method of the present embodiment 2 can be opened multithreading under Windows and Linux, set url, incoming
Webdriver, call method is simultaneously performed, you can be verified result.Daily record output is as follows:
mv_size:201
mv_size:199
mv_size:206
Target location:180 sample record length:18
FindTarget target locations:180resultText:Have again:
The result:tryNo.0:Have again:
Target location:139 sample record length:139
FindTarget target locations:139resultText:It is verified:
The result:tryNo.1:It is verified:
It is proved to be successful!
mv_size:208
Target location:188 sample record length:188
FindTarget target locations:188resultText:It is verified:
The result:tryNo.0:It is verified:
It is proved to be successful!
Do not pass through yet if said process retries 8 times, abandon this checking.
Embodiment 3
Reference picture 9, a kind of behavior formula identifying code processing unit of the present embodiment, including:
Picture acquisition module, for being rendered by PhantomJS browsers without a head or the driving of Chrome browsers, loading net
Page, by web page element selector locating verification code picture, and using picture splicing and recovery mode obtain respectively full Background and
Background to be verified;
Target location identification module, for full Background and Background to be verified to be contrasted, is looked for using pixel difference
To target location;
Mobile authentication module, for selecting suitable sample trace according to target location and being loaded onto in JS scripts, runs
JS scripts start to drag, discharge mouse, and ip addresses are to the result where when server is according to track characteristic and the checking of dragging
Judged;As score > 0, it is proved to be successful, output result;When score≤0, authentication failed, repeat step 1-3 are until test
Stop checking when demonstrate,proving successfully, or reaching default checking number of times.
The picture acquisition module, specifically for:
Load Webdriver and identifying code picture selector;The identifying code picture selector is full Background selector
Or Background selector to be verified;
Obtain the style attributes of identifying code picture selector;
Take out the url of the pixel coordinate and complete out of order picture in identifying code picture selector style attributes;
Out of order picture is obtained by the url of complete out of order picture, and passes through the pixel coordinate pair of identifying code picture selector
Out of order picture is reduced;
Respectively obtain full Background, the top half of Background to be verified and the latter half after reduction;
Respectively by full Background, the top half of Background to be verified and the latter half split, complete full Background and treat
Verify the reduction of Background.
The target location identification module, specifically for:
Load full Background and Background to be verified;
Initialized target position is set;
Travel through tri- components of RGB of each pixel of each row of full Background, Background to be verified, and by full Background with
Tri- components of RGB of the corresponding pixel of Background to be verified make the difference respectively;
When three differences of tri- components of RGB are all higher than predetermined threshold, then judge that color is different;
Return to the row abscissa for first color different pixels point occur and be used as target location.
The target location identification module, specifically for:
Load full Background and Background to be verified;
The pixel difference of full Background and Background to be verified is calculated, is stored after sequence;
Known picture mosaic area to be dragged is x, then the maximum pixel of difference in x pixel before taking;
The pixels different to each column in the preceding x pixel that is taken are counted;
Return to the abscissa of the most row of different pixels point number, as target location.
In the target location identification module, the pixel difference of full Background and Background to be verified is calculated, including it is following
Process:Traversal gets each pixel of full Background, Background to be verified, by full Background picture corresponding with Background to be verified
The pixel value Pixel of vegetarian refreshments makes the difference respectively, obtains overall difference.
Note, the above is only presently preferred embodiments of the present invention.It will be appreciated by those skilled in the art that the invention is not restricted to
Specific embodiment described here, can carry out various obvious changes, readjust and replace for a person skilled in the art
In generation, is without departing from protection scope of the present invention.Therefore, although the present invention has been carried out by above example more detailed
Illustrate, but the present invention is not limited only to above example, without departing from the inventive concept, can also include more
Other equivalent embodiments, and the scope of the present invention is determined by scope of the appended claims.
Claims (10)
1. a kind of behavior formula identifying code processing method, it is characterised in that including procedure below:
Step 1:Driving renders, loads webpage, by web page element selector locating verification code picture, and using picture splicing also
Former mode obtains full Background and Background to be verified respectively;
Step 2:Full Background and Background to be verified are contrasted, target location is found using pixel difference;
Step 3:Suitable sample trace is selected according to target location and is loaded onto in JS scripts, operation JS scripts start dragging,
Mouse is discharged, ip addresses where when server is according to track characteristic and the checking of dragging are judged the result;Work as score
During > 0, it is proved to be successful, output result;When score≤0, authentication failed, repeat step 1-3 are until be proved to be successful, or reach
Stop checking during default checking number of times.
2. behavior formula identifying code processing method according to claim 1, it is characterised in that the use picture splicing and recovery
Mode obtains full Background and Background to be verified, including procedure below respectively:
Load Webdriver and identifying code picture selector;The identifying code picture selector is full Background selector or treated
Verify Background selector;
Obtain the style attributes of identifying code picture selector;
Take out the url of the pixel coordinate and complete out of order picture in identifying code picture selector style attributes;
Out of order picture is obtained by the url of complete out of order picture, and by the pixel coordinate of identifying code picture selector to out of order
Picture is reduced;
Respectively obtain full Background, the top half of Background to be verified and the latter half after reduction;
Respectively by full Background, the top half of Background to be verified and the latter half split, full Background is completed and to be verified
The reduction of Background.
3. behavior formula identifying code processing method according to claim 1, it is characterised in that described by full Background and to be tested
Card Background is contrasted, and target location, including procedure below are found using pixel difference:
Load full Background and Background to be verified;
Initialized target position is set;
Travel through tri- components of RGB of each pixel of each row of full Background, Background to be verified, and by full Background with it is to be tested
Tri- components of RGB of the corresponding pixel of card Background make the difference respectively;
When three differences of tri- components of RGB are all higher than predetermined threshold, then judge that color is different;
Return to the row abscissa for first color different pixels point occur and be used as target location.
4. behavior formula identifying code processing method according to claim 1, it is characterised in that described by full Background and to be tested
Card Background is contrasted, and target location, including procedure below are found using pixel difference:
Load full Background and Background to be verified;
The pixel difference of full Background and Background to be verified is calculated, is stored after sequence;
Known target position area is x, then the maximum pixel of difference in x pixel before taking;
The pixels different to each column in the preceding x pixel that is taken are counted;
Return to the abscissa of the most row of different pixels point number, as target location.
5. behavior formula identifying code processing method according to claim 4, it is characterised in that the full Background of calculating and treat
Verify the pixel difference of Background, including procedure below:Traversal gets each pixel of full Background, Background to be verified, will
The pixel value Pixel of full Background pixel corresponding with Background to be verified makes the difference respectively, obtains overall difference.
6. a kind of behavior formula identifying code processing unit, it is characterised in that including:
Picture acquisition module, renders for driving, loads webpage, by web page element selector locating verification code picture, and adopts
Full Background and Background to be verified are obtained respectively with picture splicing and recovery mode;
Target location identification module, for full Background and Background to be verified to be contrasted, mesh is found using pixel difference
Cursor position;
Mobile authentication module, for selecting suitable sample trace according to target location and being loaded onto in JS scripts, runs JS pin
This starts to drag, discharge mouse, and ip addresses where when server is according to track characteristic and the checking of dragging are carried out to the result
Judge;As score > 0, it is proved to be successful, output result;When score≤0, authentication failed, repeat step 1-3 are until verify into
Work(, or stop checking when reaching default checking number of times.
7. behavior formula identifying code processing unit according to claim 6, it is characterised in that the picture acquisition module, tool
Body is used for:
Load Webdriver and identifying code picture selector;The identifying code picture selector is full Background selector or treated
Verify Background selector;
Obtain the style attributes of identifying code picture selector;
Take out the url of the pixel coordinate and complete out of order picture in identifying code picture selector style attributes;
Out of order picture is obtained by the url of complete out of order picture, and by the pixel coordinate of identifying code picture selector to out of order
Picture is reduced;
Respectively obtain full Background, the top half of Background to be verified and the latter half after reduction;
Respectively by full Background, the top half of Background to be verified and the latter half split, full Background is completed and to be verified
The reduction of Background.
8. behavior formula identifying code processing unit according to claim 6, it is characterised in that the target location recognizes mould
Block, specifically for:
Load full Background and Background to be verified;
Initialized target position is set;
Travel through tri- components of RGB of each pixel of each row of full Background, Background to be verified, and by full Background with it is to be tested
Tri- components of RGB of the corresponding pixel of card Background make the difference respectively;
When three differences of tri- components of RGB are all higher than predetermined threshold, then judge that color is different;
Return to the row abscissa for first color different pixels point occur and be used as target location.
9. behavior formula identifying code processing unit according to claim 6, it is characterised in that the target location recognizes mould
Block, specifically for:
Load full Background and Background to be verified;
The pixel difference of full Background and Background to be verified is calculated, is stored after sequence;
Known target position area is x, then the maximum pixel of difference in x pixel before taking;
The pixels different to each column in the preceding x pixel that is taken are counted;
Return to the abscissa of the most row of different pixels point number, as target location.
10. behavior formula identifying code processing unit according to claim 9, it is characterised in that the target location recognizes mould
In block, the pixel difference of full Background and Background to be verified, including procedure below are calculated:Traversal get full Background, it is to be tested
Each pixel of Background is demonstrate,proved, the pixel value Pixel of full Background pixel corresponding with Background to be verified is made the difference respectively,
Obtain overall difference.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710335099.4A CN107169340A (en) | 2017-05-12 | 2017-05-12 | A kind of behavior formula identifying code processing method and processing device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710335099.4A CN107169340A (en) | 2017-05-12 | 2017-05-12 | A kind of behavior formula identifying code processing method and processing device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107169340A true CN107169340A (en) | 2017-09-15 |
Family
ID=59814881
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710335099.4A Pending CN107169340A (en) | 2017-05-12 | 2017-05-12 | A kind of behavior formula identifying code processing method and processing device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107169340A (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108008898A (en) * | 2017-12-13 | 2018-05-08 | 东软集团股份有限公司 | Page info acquisition methods, device, computer equipment and storage medium |
CN108280338A (en) * | 2018-01-12 | 2018-07-13 | 上海大学 | A kind of crack method of sliding identifying code |
CN108376218A (en) * | 2018-02-28 | 2018-08-07 | 北京奇艺世纪科技有限公司 | Generation method, device and the verification method of image authentication code, device and system |
CN108985041A (en) * | 2018-05-17 | 2018-12-11 | 厦门二五八网络科技集团股份有限公司 | A kind of identifying code identification input method and system based on sliding verifying |
CN110942062A (en) * | 2019-11-21 | 2020-03-31 | 网易(杭州)网络有限公司 | Image verification code generation method, medium, device and computing equipment |
CN111428229A (en) * | 2020-03-05 | 2020-07-17 | 广东睿江云计算股份有限公司 | Method and system for generating jigsaw puzzle and default picture |
CN111681280A (en) * | 2020-06-03 | 2020-09-18 | 中国建设银行股份有限公司 | Sliding verification code notch positioning method and device |
CN109800559B (en) * | 2019-01-02 | 2024-01-16 | 平安科技(深圳)有限公司 | Method and device for generating slider verification code, computer equipment and storage medium |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104200150A (en) * | 2014-09-01 | 2014-12-10 | 湖北盛天网络技术股份有限公司 | Method and device for processing verification codes |
CN104852885A (en) * | 2014-02-14 | 2015-08-19 | 腾讯科技(深圳)有限公司 | Method, device and system for verifying verification code |
CN106127836A (en) * | 2016-06-30 | 2016-11-16 | 北京奇艺世纪科技有限公司 | Identifying code Picture Generation Method and device |
-
2017
- 2017-05-12 CN CN201710335099.4A patent/CN107169340A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104852885A (en) * | 2014-02-14 | 2015-08-19 | 腾讯科技(深圳)有限公司 | Method, device and system for verifying verification code |
CN104200150A (en) * | 2014-09-01 | 2014-12-10 | 湖北盛天网络技术股份有限公司 | Method and device for processing verification codes |
CN106127836A (en) * | 2016-06-30 | 2016-11-16 | 北京奇艺世纪科技有限公司 | Identifying code Picture Generation Method and device |
Non-Patent Citations (3)
Title |
---|
QQ2883585: "极验验证码破解", 《码迷》 * |
我来了007: "极验验证码的破解2-图片还原和滑块位置求解", 《CSDN》 * |
我来了007: "极验验证码的破解-开篇", 《CSDN》 * |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108008898B (en) * | 2017-12-13 | 2020-04-28 | 东软集团股份有限公司 | Page information acquisition method and device, computer equipment and storage medium |
CN108008898A (en) * | 2017-12-13 | 2018-05-08 | 东软集团股份有限公司 | Page info acquisition methods, device, computer equipment and storage medium |
CN108280338A (en) * | 2018-01-12 | 2018-07-13 | 上海大学 | A kind of crack method of sliding identifying code |
CN108376218A (en) * | 2018-02-28 | 2018-08-07 | 北京奇艺世纪科技有限公司 | Generation method, device and the verification method of image authentication code, device and system |
CN108376218B (en) * | 2018-02-28 | 2021-01-22 | 北京奇艺世纪科技有限公司 | Image verification code generation method and device, and verification method, device and system |
CN108985041A (en) * | 2018-05-17 | 2018-12-11 | 厦门二五八网络科技集团股份有限公司 | A kind of identifying code identification input method and system based on sliding verifying |
CN108985041B (en) * | 2018-05-17 | 2020-12-11 | 厦门二五八网络科技集团股份有限公司 | Verification code identification input method and system based on sliding verification |
CN109800559B (en) * | 2019-01-02 | 2024-01-16 | 平安科技(深圳)有限公司 | Method and device for generating slider verification code, computer equipment and storage medium |
CN110942062A (en) * | 2019-11-21 | 2020-03-31 | 网易(杭州)网络有限公司 | Image verification code generation method, medium, device and computing equipment |
CN110942062B (en) * | 2019-11-21 | 2022-12-23 | 杭州网易智企科技有限公司 | Image verification code generation method, medium, device and computing equipment |
CN111428229A (en) * | 2020-03-05 | 2020-07-17 | 广东睿江云计算股份有限公司 | Method and system for generating jigsaw puzzle and default picture |
CN111428229B (en) * | 2020-03-05 | 2023-06-02 | 广东睿江云计算股份有限公司 | Method and system for generating jigsaw and default picture |
CN111681280A (en) * | 2020-06-03 | 2020-09-18 | 中国建设银行股份有限公司 | Sliding verification code notch positioning method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107169340A (en) | A kind of behavior formula identifying code processing method and processing device | |
CN108595583B (en) | Dynamic graph page data crawling method, device, terminal and storage medium | |
US10146753B2 (en) | Visual regression testing tool | |
CN105955881B (en) | A kind of automatic test step is recorded and back method and device | |
CN106603264A (en) | Method and equipment for positioning fault root | |
CN110399291A (en) | User Page test method and relevant device based on image recognition | |
CN104899016B (en) | Allocating stack Relation acquisition method and device | |
CN111209185B (en) | Keyword-based automated testing method and computer-readable storage medium | |
CN104809062B (en) | A kind of method of testing and system of artificial intelligence response system | |
CN107729936B (en) | Automatic error correction review method and system | |
CN106021257A (en) | Method, device, and system for crawler to capture data supporting online programming | |
CN101894266A (en) | Handwriting recognition method and system | |
CN110909229A (en) | Webpage data acquisition and storage system based on simulated browser access | |
CN109194689B (en) | Abnormal behavior recognition method, device, server and storage medium | |
CN109657431A (en) | The method of user identity for identification | |
CN103246566B (en) | The resource monitoring method and device of application program | |
CN111310155A (en) | System architecture for automatic identification of slider verification code and implementation method | |
CN110532776B (en) | Android malicious software efficient detection method, system and medium based on runtime data analysis | |
CN107547944A (en) | Interface realizing method and device, set top box | |
CN109542546A (en) | A kind of throwing screen method and device at application process window and interface | |
CN111125704B (en) | Webpage Trojan horse recognition method and system | |
CN108399129A (en) | H5 page method for testing performance | |
CN104407979B (en) | script detection method and device | |
CN105187443A (en) | System and method for testing WEB verification code | |
CN107329883A (en) | The automatic calculating method and system of intelligent terminal application program interaction response time delay |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170915 |