CN107169340A - A kind of behavior formula identifying code processing method and processing device - Google Patents

A kind of behavior formula identifying code processing method and processing device Download PDF

Info

Publication number
CN107169340A
CN107169340A CN201710335099.4A CN201710335099A CN107169340A CN 107169340 A CN107169340 A CN 107169340A CN 201710335099 A CN201710335099 A CN 201710335099A CN 107169340 A CN107169340 A CN 107169340A
Authority
CN
China
Prior art keywords
background
verified
pixel
identifying code
full
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710335099.4A
Other languages
Chinese (zh)
Inventor
周忠诚
廖姝洁
陈俊良
李丹
张圣栋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Gaodig Information Technology Co Ltd
Original Assignee
Beijing Gaodig Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Gaodig Information Technology Co Ltd filed Critical Beijing Gaodig Information Technology Co Ltd
Priority to CN201710335099.4A priority Critical patent/CN107169340A/en
Publication of CN107169340A publication Critical patent/CN107169340A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/958Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T7/00Image analysis
    • G06T7/20Analysis of motion
    • G06T7/254Analysis of motion involving subtraction of images
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T7/00Image analysis
    • G06T7/90Determination of colour characteristics
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2133Verifying human interaction, e.g., Captcha

Abstract

The invention discloses a kind of behavior formula identifying code processing method and processing device, the behavior formula identifying code processing method includes procedure below:Driving renders, loads webpage, by web page element selector locating verification code picture, and obtains full Background and Background to be verified respectively using picture splicing and recovery mode;Full Background and Background to be verified are contrasted, target location is found using pixel difference;Suitable sample trace is selected according to target location and is loaded onto in JS scripts, operation JS scripts start to drag, discharge mouse, and ip addresses where when server is according to track characteristic and the checking of dragging are judged the result.Execution efficiency of the present invention is high, target identification accuracy rate is up to more than 90%, and dragging success rate single machine test is up to 80%, has largely cleared away obstacle for the automatic data collection of network data, the improvement also for behavior formula identifying code provides corresponding thinking simultaneously, with certain practical value and application prospect.

Description

A kind of behavior formula identifying code processing method and processing device
Technical field
The present invention relates to field of computer data processing, more particularly to a kind of behavior formula identifying code processing method and processing device.
Background technology
Identifying code is the life for guarantee website information security, it is necessary to withstand the test of automatic cracking programs, because This needs the security that height is can be only achieved by various automatic tests.Under the trend of machine learning artificial intelligence, crack Traditional character type identifying code non-difficult matter, the behavior formula identifying code in the epoch of identifying code 2.0 arises at the historic moment.Behavior formula identifying code refers to Be that checking is completed by the operation behavior of user, the picture character without going to understand distortion.Its core concept is to utilize " behavioural characteristic " of user differentiates to do checking safety.
The checking of pure behavior formula, behavior formula identifying code as depicted in figs. 1 and 2, it combines action trail, network rings Border, unit type are man-machine to distinguish, wherein, the identification of target location is must to cross the outpost of the tax office first.Current behavior formula identifying code Treatment technology is generally verified a yard picture by the way of sectional drawing again is first clicked on, due to including the interference of picture mosaic in sectional drawing, The identification of target location can be then caused to there is certain boundary error to remove interference;In addition, when realizing dragging, directly invoking Webdriver built-in function movebyoffset (), but the time that the function is consumed under Linux and Windows differ Cause, be easily caused percent of pass and substantially reduce, problems above all increases the difficulty of network data acquisition.
Therefore, a kind of behavior formula identifying code processing method and processing device is needed badly.
The content of the invention
The purpose of invention:There is error, execution efficiency to solve existing behavior formula identifying code treatment technology target identification Low, professional platform independence can not enough the not high technical problem of good and percent of pass be there is provided a kind of identifying code processing method and processing device, by testing The attribute of card code picture selector obtains and goes back original picture, and using simple Target Recognition Algorithms, target identification accuracy rate is reachable More than 90%, and simulate using JS scripts the dragging of real human, it can reach in the test of automation and to be verified by behavior formula Technique effect.So as to solve the identification of behavior formula identifying code and crack problem.
To reach above-mentioned purpose, the technical solution adopted by the present invention is:There is provided a kind of behavior formula identifying code processing method, Including procedure below:
Step 1:Driving renders, loads webpage, by web page element selector locating verification code picture, and is spelled using picture Connect reduction mode and obtain full Background and Background to be verified respectively;The web page element selector is CSS selector or Xpath Selector;
Step 2:Full Background and Background to be verified are contrasted, target location is found using pixel difference;
Step 3:Suitable sample trace is selected according to target location and is loaded onto in JS scripts, operation JS scripts start to drag Dynamic, release mouse, ip addresses where when server is according to track characteristic and the checking of dragging are judged the result;When When dividing > 0, it is proved to be successful, output result;When score≤0, authentication failed, repeat step 1-3 are until be proved to be successful, Huo Zheda Stop checking during to default checking number of times.
Further, the use picture splicing and recovery mode obtains full Background and Background to be verified respectively, including Procedure below:
Load Webdriver and identifying code picture selector;The identifying code picture selector is full Background selector Or Background selector to be verified;
Obtain the style attributes of identifying code picture selector;
Take out the url of the pixel coordinate and complete out of order picture in identifying code picture selector style attributes;
Out of order picture is obtained by the url of complete out of order picture, and passes through the pixel coordinate pair of identifying code picture selector Out of order picture is reduced;
Respectively obtain full Background, the top half of Background to be verified and the latter half after reduction;
Respectively by full Background, the top half of Background to be verified and the latter half split, complete full Background and treat Verify the reduction of Background.
Further, it is described to be contrasted full Background and Background to be verified, find target position using pixel difference Put, including procedure below:
Load full Background and Background to be verified;
Initialized target position is set;
Travel through tri- components of RGB of each pixel of each row of full Background, Background to be verified, and by full Background with Tri- components of RGB of the corresponding pixel of Background to be verified make the difference respectively;
When three differences of tri- components of RGB are all higher than predetermined threshold, then judge that color is different;
Return to the row abscissa for first color different pixels point occur and be used as target location.
Further, it is described to be contrasted full Background and Background to be verified, find target position using pixel difference Put, including procedure below:
Load full Background and Background to be verified;
The pixel difference of full Background and Background to be verified is calculated, is stored after sequence;
Known target position area is x, then the maximum pixel of difference in x pixel before taking;
The pixels different to each column in the preceding x pixel that is taken are counted;
Return to the abscissa of the most row of different pixels point number, as target location.
Further, the pixel difference for calculating full Background and Background to be verified, including procedure below:Traversal takes To full Background, each pixel of Background to be verified, by the pixel of full Background pixel corresponding with Background to be verified Value Pixel makes the difference respectively, obtains overall difference.
Present invention also offers a kind of behavior formula identifying code processing unit, including:
Picture acquisition module, renders for driving, loads webpage, by web page element selector locating verification code picture, And full Background and Background to be verified are obtained using picture splicing and recovery mode respectively;
Target location identification module, for full Background and Background to be verified to be contrasted, is looked for using pixel difference To target location;
Mobile authentication module, for selecting suitable sample trace according to target location and being loaded onto in JS scripts, runs JS scripts start to drag, discharge mouse, and ip addresses are to the result where when server is according to track characteristic and the checking of dragging Judged;As score > 0, it is proved to be successful, output result;When score≤0, authentication failed, repeat step 1-3 are until test Stop checking when demonstrate,proving successfully, or reaching default checking number of times.
Further, the picture acquisition module, specifically for:
Load Webdriver and identifying code picture selector;The identifying code picture selector is full Background selector Or Background selector to be verified;
Obtain the style attributes of identifying code picture selector;
Take out the url of the pixel coordinate and complete out of order picture in identifying code picture selector style attributes;
Out of order picture is obtained by the url of complete out of order picture, and passes through the pixel coordinate pair of identifying code picture selector Out of order picture is reduced;
Respectively obtain full Background, the top half of Background to be verified and the latter half after reduction;
Respectively by full Background, the top half of Background to be verified and the latter half split, complete full Background and treat Verify the reduction of Background.
Further, the target location identification module, specifically for:
Load full Background and Background to be verified;
Initialized target position is set;
Travel through tri- components of RGB of each pixel of each row of full Background, Background to be verified, and by full Background with Tri- components of RGB of the corresponding pixel of Background to be verified make the difference respectively;
When three differences of tri- components of RGB are all higher than predetermined threshold, then judge that color is different;
Return to the row abscissa for first color different pixels point occur and be used as target location.
Further, the target location identification module, specifically for:
Load full Background and Background to be verified;
The pixel difference of full Background and Background to be verified is calculated, is stored after sequence;
Known target position area is x, then the maximum pixel of difference in x pixel before taking;
The pixels different to each column in the preceding x pixel that is taken are counted;
Return to the abscissa of the most row of different pixels point number, as target location.
Further, in the target location identification module, the pixel difference of full Background and Background to be verified is calculated, Including procedure below:Traversal gets each pixel of full Background, Background to be verified, by full Background and Background to be verified The pixel value Pixel of corresponding pixel makes the difference respectively, obtains overall difference.
The beneficial effects of the invention are as follows:The present invention can be cross-platform and supports high concurrent, using PhantomJS browsers or The driving of Chrome browsers is rendered to webpage, and by CSS selector locating verification code picture, execution efficiency is high;Using Picture splicing and recovery mode obtains full Background and Background to be verified, with sectional drawing mode comparative benefits substantially, be conducive into The target identification of one step;Using simple Target Recognition Algorithms, target identification accuracy rate is up to more than 90%;Using JS script moulds Intend the dragging of real human, dragging success rate single machine test is up to 80%, and the present invention is largely the automatic of network data Obstacle has been cleared away in collection, while also the improvement for behavior formula identifying code provides corresponding thinking, with certain practical value with answer Use prospect.
Brief description of the drawings
Fig. 1 is the full background illustrated example of existing behavior formula identifying code.
Fig. 2 is the background illustrated example to be verified of existing behavior formula identifying code.
Fig. 3 is the broad flow diagram of the behavior formula identifying code processing method of embodiment 1.
Fig. 4 is the particular flow sheet of step 1 in the behavior formula identifying code processing method of embodiment 1.
Fig. 5 is the Background to be verified of step 1 reduction in the behavior formula identifying code processing method of embodiment 1.
Fig. 6 is the particular flow sheet of step 2 in the behavior formula identifying code processing method of embodiment 1.
Fig. 7 is the particular flow sheet of step 3 in the behavior formula identifying code processing method of embodiment 1.
Fig. 8 is the particular flow sheet of the behavior formula identifying code process method step 2 of embodiment 2.
Fig. 9 is the structured flowchart of the behavior formula identifying code processing unit of embodiment 3.
Embodiment
For make present invention solves the technical problem that, the technical scheme that uses and the technique effect that reaches it is clearer, below The present invention is described in further detail in conjunction with the accompanying drawings and embodiments.It is understood that specific implementation described herein Example is used only for explaining the present invention, rather than limitation of the invention.
Embodiment 1
Reference picture 3-7, a kind of behavior formula identifying code processing method, including:
Step 1:Rendered using ChromeDriver, load webpage, and by CSS selector locating verification code picture, adopt Full Background and Background to be verified are respectively obtained with picture splicing and recovery mode;
The use picture splicing and recovery mode obtains full Background and Background to be verified, including procedure below respectively:
Step 1.1:Webdriver attributes are set and Webdriver is loaded, loaded etc. code to be verified picture selector Entirely;The identifying code picture selector is full Background selector or Background selector to be verified;
Step 1.2:Obtain the style attributes of identifying code picture selector;
Step 1.3:Take out the url of the pixel coordinate and complete out of order picture in identifying code picture selector style attributes;
Step 1.4:Out of order picture is obtained according to acquired url, and according to the pixel coordinate of identifying code picture selector Out of order picture is reduced;
Step 1.5:Respectively obtain full Background, the top half of Background to be verified and the latter half after reduction;
Step 1.6:Respectively by full Background, the top half of Background to be verified and the latter half split, the full back of the body is completed The reduction of scape figure and Background to be verified;Wherein, the full Background (Fig. 1) of also artwork and the prior art of the full Background of the present invention Unanimously, but the obtained Background to be verified (Fig. 2) of Background to be verified (Fig. 5) and existing sectional drawing mode has significant difference, this hair Bright picture splicing and recovery mode only reduces target location, and no picture mosaic interference substantially increases the accuracy of target location identification.
Step 2:Full Background and Background to be verified are contrasted, target location is found using pixel difference, specifically It can include:
Step 2.1:Load full Background and Background to be verified;
Step 2.2:Traversal gets each pixel of full Background, Background to be verified, by full Background and the back of the body to be verified The pixel value Pixel of the corresponding pixel of scape figure makes the difference respectively, obtains overall difference, is stored after sequence;
Step 2.3:Known target position area is x, then takes the maximum pixel of difference, pixel difference in preceding x pixel At value maximum is most likely to be where target location;The target location area is picture mosaic area to be dragged;
Step 2.4:The pixels different to each column in the preceding x pixel that is taken are counted;
Step 2.5:Return to the abscissa of the most row of different pixels point number, as target location.
Step 3:Suitable sample trace is selected according to target location and is loaded onto in JS scripts, operation JS scripts start to drag Dynamic, release mouse, server ip addresses according to where the track characteristic of dragging and checking are judged the result, specifically may be used With including:
Step 3.1:The loading track sample in internal memory;
Step 3.2:Suitable sample trace is selected according to target location;
Step 3.3:Sample trace is loaded onto in JS scripts, the dragging of operation JS scripts, release mouse;
Step 3.4:Server ip addresses according to where the track characteristic of dragging and checking are judged the result, when During score > 0, it is proved to be successful, output result;When score≤0, authentication failed, repeat step 1-3 until be proved to be successful, or Stop checking when reaching default checking number of times.
Embodiment 2
Reference picture 8, a kind of behavior formula identifying code processing method, including:
Step 1:Rendered using PhantomJS browsers without a head, load webpage, pass through Xpath selectors locating verification code Picture, full Background and Background to be verified are respectively obtained using picture splicing and recovery;The PhantomJS is a scripting Without interface WebKit, various functions are realized by script of JavaScript, the usage scenario that official is enumerated includes:It is unbounded Face is tested, page automation, screenshot capture and network monitoring;
The use picture splicing and recovery mode obtains full Background and Background to be verified, including procedure below respectively:
Step 1.1:Webdriver attributes are set and Webdriver is loaded, loaded etc. code to be verified picture selector Entirely;The identifying code picture selector is full Background selector or Background selector to be verified;
Step 1.2:Obtain the style attributes of identifying code picture selector;
Step 1.3:Take out the url of the pixel coordinate and complete out of order picture in identifying code picture selector style attributes;
Step 1.4:Out of order picture is obtained according to acquired url, and according to the pixel coordinate of identifying code picture selector Out of order picture is reduced;
Step 1.5:Respectively obtain full Background, the top half of Background to be verified and the latter half after reduction;
Step 1.6:Respectively by full Background, the top half of Background to be verified and the latter half split, the full back of the body is completed The reduction of scape figure and Background to be verified;
Step 2:Full Background and Background to be verified are contrasted, target location is found using pixel difference, specifically It can include:
Step 2.1:Load full Background and Background to be verified;
Step 2.2:It is -1 to set initialized target position;
Step 2.3:Tri- components of RGB of each each pixel of row of full Background, Background to be verified are traveled through, and will be complete Tri- components of RGB of Background pixel corresponding with Background to be verified make the difference respectively;
Step 2.4:It is 60 to set rgb color discrepancy threshold, if the equal > 60 of three differences of tri- components of RGB, judges Face
Color is different;
Step 2.5:Return to the row abscissa for first color different pixels point occur and be used as target location.
Step 3:Suitable sample trace is selected according to target location and is loaded onto in JS scripts, operation JS scripts start to drag Dynamic, release mouse, server ip addresses according to where the track characteristic of dragging and checking are judged the result;The step It can specifically include:
Step 3.1:The loading track sample in internal memory;
Step 3.2:Suitable sample trace is selected according to target location;
Step 3.3:Sample trace is loaded onto in JS scripts, dragged according to track operation mouse, discharge mouse;
Step 3.4:Server ip addresses according to where the track characteristic of dragging and checking are judged the result, when During score > 0, it is proved to be successful, output result;When score≤0, authentication failed, repeat step 1-3 until be proved to be successful, or Stop checking when reaching default checking number of times.Wherein, mouse drag part can select to use PhantomJS browsers without a head, But due to PhantomJS under Linux and windows platform environment performance difference, therefore percent of pass have it is larger Difference.
The method of the present embodiment 2 can be opened multithreading under Windows and Linux, set url, incoming Webdriver, call method is simultaneously performed, you can be verified result.Daily record output is as follows:
mv_size:201
mv_size:199
mv_size:206
Target location:180 sample record length:18
FindTarget target locations:180resultText:Have again:
The result:tryNo.0:Have again:
Target location:139 sample record length:139
FindTarget target locations:139resultText:It is verified:
The result:tryNo.1:It is verified:
It is proved to be successful!
mv_size:208
Target location:188 sample record length:188
FindTarget target locations:188resultText:It is verified:
The result:tryNo.0:It is verified:
It is proved to be successful!
Do not pass through yet if said process retries 8 times, abandon this checking.
Embodiment 3
Reference picture 9, a kind of behavior formula identifying code processing unit of the present embodiment, including:
Picture acquisition module, for being rendered by PhantomJS browsers without a head or the driving of Chrome browsers, loading net Page, by web page element selector locating verification code picture, and using picture splicing and recovery mode obtain respectively full Background and Background to be verified;
Target location identification module, for full Background and Background to be verified to be contrasted, is looked for using pixel difference To target location;
Mobile authentication module, for selecting suitable sample trace according to target location and being loaded onto in JS scripts, runs JS scripts start to drag, discharge mouse, and ip addresses are to the result where when server is according to track characteristic and the checking of dragging Judged;As score > 0, it is proved to be successful, output result;When score≤0, authentication failed, repeat step 1-3 are until test Stop checking when demonstrate,proving successfully, or reaching default checking number of times.
The picture acquisition module, specifically for:
Load Webdriver and identifying code picture selector;The identifying code picture selector is full Background selector Or Background selector to be verified;
Obtain the style attributes of identifying code picture selector;
Take out the url of the pixel coordinate and complete out of order picture in identifying code picture selector style attributes;
Out of order picture is obtained by the url of complete out of order picture, and passes through the pixel coordinate pair of identifying code picture selector Out of order picture is reduced;
Respectively obtain full Background, the top half of Background to be verified and the latter half after reduction;
Respectively by full Background, the top half of Background to be verified and the latter half split, complete full Background and treat Verify the reduction of Background.
The target location identification module, specifically for:
Load full Background and Background to be verified;
Initialized target position is set;
Travel through tri- components of RGB of each pixel of each row of full Background, Background to be verified, and by full Background with Tri- components of RGB of the corresponding pixel of Background to be verified make the difference respectively;
When three differences of tri- components of RGB are all higher than predetermined threshold, then judge that color is different;
Return to the row abscissa for first color different pixels point occur and be used as target location.
The target location identification module, specifically for:
Load full Background and Background to be verified;
The pixel difference of full Background and Background to be verified is calculated, is stored after sequence;
Known picture mosaic area to be dragged is x, then the maximum pixel of difference in x pixel before taking;
The pixels different to each column in the preceding x pixel that is taken are counted;
Return to the abscissa of the most row of different pixels point number, as target location.
In the target location identification module, the pixel difference of full Background and Background to be verified is calculated, including it is following Process:Traversal gets each pixel of full Background, Background to be verified, by full Background picture corresponding with Background to be verified The pixel value Pixel of vegetarian refreshments makes the difference respectively, obtains overall difference.
Note, the above is only presently preferred embodiments of the present invention.It will be appreciated by those skilled in the art that the invention is not restricted to Specific embodiment described here, can carry out various obvious changes, readjust and replace for a person skilled in the art In generation, is without departing from protection scope of the present invention.Therefore, although the present invention has been carried out by above example more detailed Illustrate, but the present invention is not limited only to above example, without departing from the inventive concept, can also include more Other equivalent embodiments, and the scope of the present invention is determined by scope of the appended claims.

Claims (10)

1. a kind of behavior formula identifying code processing method, it is characterised in that including procedure below:
Step 1:Driving renders, loads webpage, by web page element selector locating verification code picture, and using picture splicing also Former mode obtains full Background and Background to be verified respectively;
Step 2:Full Background and Background to be verified are contrasted, target location is found using pixel difference;
Step 3:Suitable sample trace is selected according to target location and is loaded onto in JS scripts, operation JS scripts start dragging, Mouse is discharged, ip addresses where when server is according to track characteristic and the checking of dragging are judged the result;Work as score During > 0, it is proved to be successful, output result;When score≤0, authentication failed, repeat step 1-3 are until be proved to be successful, or reach Stop checking during default checking number of times.
2. behavior formula identifying code processing method according to claim 1, it is characterised in that the use picture splicing and recovery Mode obtains full Background and Background to be verified, including procedure below respectively:
Load Webdriver and identifying code picture selector;The identifying code picture selector is full Background selector or treated Verify Background selector;
Obtain the style attributes of identifying code picture selector;
Take out the url of the pixel coordinate and complete out of order picture in identifying code picture selector style attributes;
Out of order picture is obtained by the url of complete out of order picture, and by the pixel coordinate of identifying code picture selector to out of order Picture is reduced;
Respectively obtain full Background, the top half of Background to be verified and the latter half after reduction;
Respectively by full Background, the top half of Background to be verified and the latter half split, full Background is completed and to be verified The reduction of Background.
3. behavior formula identifying code processing method according to claim 1, it is characterised in that described by full Background and to be tested Card Background is contrasted, and target location, including procedure below are found using pixel difference:
Load full Background and Background to be verified;
Initialized target position is set;
Travel through tri- components of RGB of each pixel of each row of full Background, Background to be verified, and by full Background with it is to be tested Tri- components of RGB of the corresponding pixel of card Background make the difference respectively;
When three differences of tri- components of RGB are all higher than predetermined threshold, then judge that color is different;
Return to the row abscissa for first color different pixels point occur and be used as target location.
4. behavior formula identifying code processing method according to claim 1, it is characterised in that described by full Background and to be tested Card Background is contrasted, and target location, including procedure below are found using pixel difference:
Load full Background and Background to be verified;
The pixel difference of full Background and Background to be verified is calculated, is stored after sequence;
Known target position area is x, then the maximum pixel of difference in x pixel before taking;
The pixels different to each column in the preceding x pixel that is taken are counted;
Return to the abscissa of the most row of different pixels point number, as target location.
5. behavior formula identifying code processing method according to claim 4, it is characterised in that the full Background of calculating and treat Verify the pixel difference of Background, including procedure below:Traversal gets each pixel of full Background, Background to be verified, will The pixel value Pixel of full Background pixel corresponding with Background to be verified makes the difference respectively, obtains overall difference.
6. a kind of behavior formula identifying code processing unit, it is characterised in that including:
Picture acquisition module, renders for driving, loads webpage, by web page element selector locating verification code picture, and adopts Full Background and Background to be verified are obtained respectively with picture splicing and recovery mode;
Target location identification module, for full Background and Background to be verified to be contrasted, mesh is found using pixel difference Cursor position;
Mobile authentication module, for selecting suitable sample trace according to target location and being loaded onto in JS scripts, runs JS pin This starts to drag, discharge mouse, and ip addresses where when server is according to track characteristic and the checking of dragging are carried out to the result Judge;As score > 0, it is proved to be successful, output result;When score≤0, authentication failed, repeat step 1-3 are until verify into Work(, or stop checking when reaching default checking number of times.
7. behavior formula identifying code processing unit according to claim 6, it is characterised in that the picture acquisition module, tool Body is used for:
Load Webdriver and identifying code picture selector;The identifying code picture selector is full Background selector or treated Verify Background selector;
Obtain the style attributes of identifying code picture selector;
Take out the url of the pixel coordinate and complete out of order picture in identifying code picture selector style attributes;
Out of order picture is obtained by the url of complete out of order picture, and by the pixel coordinate of identifying code picture selector to out of order Picture is reduced;
Respectively obtain full Background, the top half of Background to be verified and the latter half after reduction;
Respectively by full Background, the top half of Background to be verified and the latter half split, full Background is completed and to be verified The reduction of Background.
8. behavior formula identifying code processing unit according to claim 6, it is characterised in that the target location recognizes mould Block, specifically for:
Load full Background and Background to be verified;
Initialized target position is set;
Travel through tri- components of RGB of each pixel of each row of full Background, Background to be verified, and by full Background with it is to be tested Tri- components of RGB of the corresponding pixel of card Background make the difference respectively;
When three differences of tri- components of RGB are all higher than predetermined threshold, then judge that color is different;
Return to the row abscissa for first color different pixels point occur and be used as target location.
9. behavior formula identifying code processing unit according to claim 6, it is characterised in that the target location recognizes mould Block, specifically for:
Load full Background and Background to be verified;
The pixel difference of full Background and Background to be verified is calculated, is stored after sequence;
Known target position area is x, then the maximum pixel of difference in x pixel before taking;
The pixels different to each column in the preceding x pixel that is taken are counted;
Return to the abscissa of the most row of different pixels point number, as target location.
10. behavior formula identifying code processing unit according to claim 9, it is characterised in that the target location recognizes mould In block, the pixel difference of full Background and Background to be verified, including procedure below are calculated:Traversal get full Background, it is to be tested Each pixel of Background is demonstrate,proved, the pixel value Pixel of full Background pixel corresponding with Background to be verified is made the difference respectively, Obtain overall difference.
CN201710335099.4A 2017-05-12 2017-05-12 A kind of behavior formula identifying code processing method and processing device Pending CN107169340A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710335099.4A CN107169340A (en) 2017-05-12 2017-05-12 A kind of behavior formula identifying code processing method and processing device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710335099.4A CN107169340A (en) 2017-05-12 2017-05-12 A kind of behavior formula identifying code processing method and processing device

Publications (1)

Publication Number Publication Date
CN107169340A true CN107169340A (en) 2017-09-15

Family

ID=59814881

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710335099.4A Pending CN107169340A (en) 2017-05-12 2017-05-12 A kind of behavior formula identifying code processing method and processing device

Country Status (1)

Country Link
CN (1) CN107169340A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108008898A (en) * 2017-12-13 2018-05-08 东软集团股份有限公司 Page info acquisition methods, device, computer equipment and storage medium
CN108280338A (en) * 2018-01-12 2018-07-13 上海大学 A kind of crack method of sliding identifying code
CN108376218A (en) * 2018-02-28 2018-08-07 北京奇艺世纪科技有限公司 Generation method, device and the verification method of image authentication code, device and system
CN108985041A (en) * 2018-05-17 2018-12-11 厦门二五八网络科技集团股份有限公司 A kind of identifying code identification input method and system based on sliding verifying
CN110942062A (en) * 2019-11-21 2020-03-31 网易(杭州)网络有限公司 Image verification code generation method, medium, device and computing equipment
CN111428229A (en) * 2020-03-05 2020-07-17 广东睿江云计算股份有限公司 Method and system for generating jigsaw puzzle and default picture
CN111681280A (en) * 2020-06-03 2020-09-18 中国建设银行股份有限公司 Sliding verification code notch positioning method and device
CN109800559B (en) * 2019-01-02 2024-01-16 平安科技(深圳)有限公司 Method and device for generating slider verification code, computer equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104200150A (en) * 2014-09-01 2014-12-10 湖北盛天网络技术股份有限公司 Method and device for processing verification codes
CN104852885A (en) * 2014-02-14 2015-08-19 腾讯科技(深圳)有限公司 Method, device and system for verifying verification code
CN106127836A (en) * 2016-06-30 2016-11-16 北京奇艺世纪科技有限公司 Identifying code Picture Generation Method and device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104852885A (en) * 2014-02-14 2015-08-19 腾讯科技(深圳)有限公司 Method, device and system for verifying verification code
CN104200150A (en) * 2014-09-01 2014-12-10 湖北盛天网络技术股份有限公司 Method and device for processing verification codes
CN106127836A (en) * 2016-06-30 2016-11-16 北京奇艺世纪科技有限公司 Identifying code Picture Generation Method and device

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
QQ2883585: "极验验证码破解", 《码迷》 *
我来了007: "极验验证码的破解2-图片还原和滑块位置求解", 《CSDN》 *
我来了007: "极验验证码的破解-开篇", 《CSDN》 *

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108008898B (en) * 2017-12-13 2020-04-28 东软集团股份有限公司 Page information acquisition method and device, computer equipment and storage medium
CN108008898A (en) * 2017-12-13 2018-05-08 东软集团股份有限公司 Page info acquisition methods, device, computer equipment and storage medium
CN108280338A (en) * 2018-01-12 2018-07-13 上海大学 A kind of crack method of sliding identifying code
CN108376218A (en) * 2018-02-28 2018-08-07 北京奇艺世纪科技有限公司 Generation method, device and the verification method of image authentication code, device and system
CN108376218B (en) * 2018-02-28 2021-01-22 北京奇艺世纪科技有限公司 Image verification code generation method and device, and verification method, device and system
CN108985041A (en) * 2018-05-17 2018-12-11 厦门二五八网络科技集团股份有限公司 A kind of identifying code identification input method and system based on sliding verifying
CN108985041B (en) * 2018-05-17 2020-12-11 厦门二五八网络科技集团股份有限公司 Verification code identification input method and system based on sliding verification
CN109800559B (en) * 2019-01-02 2024-01-16 平安科技(深圳)有限公司 Method and device for generating slider verification code, computer equipment and storage medium
CN110942062A (en) * 2019-11-21 2020-03-31 网易(杭州)网络有限公司 Image verification code generation method, medium, device and computing equipment
CN110942062B (en) * 2019-11-21 2022-12-23 杭州网易智企科技有限公司 Image verification code generation method, medium, device and computing equipment
CN111428229A (en) * 2020-03-05 2020-07-17 广东睿江云计算股份有限公司 Method and system for generating jigsaw puzzle and default picture
CN111428229B (en) * 2020-03-05 2023-06-02 广东睿江云计算股份有限公司 Method and system for generating jigsaw and default picture
CN111681280A (en) * 2020-06-03 2020-09-18 中国建设银行股份有限公司 Sliding verification code notch positioning method and device

Similar Documents

Publication Publication Date Title
CN107169340A (en) A kind of behavior formula identifying code processing method and processing device
CN108595583B (en) Dynamic graph page data crawling method, device, terminal and storage medium
US10146753B2 (en) Visual regression testing tool
CN105955881B (en) A kind of automatic test step is recorded and back method and device
CN106603264A (en) Method and equipment for positioning fault root
CN110399291A (en) User Page test method and relevant device based on image recognition
CN104899016B (en) Allocating stack Relation acquisition method and device
CN111209185B (en) Keyword-based automated testing method and computer-readable storage medium
CN104809062B (en) A kind of method of testing and system of artificial intelligence response system
CN107729936B (en) Automatic error correction review method and system
CN106021257A (en) Method, device, and system for crawler to capture data supporting online programming
CN101894266A (en) Handwriting recognition method and system
CN110909229A (en) Webpage data acquisition and storage system based on simulated browser access
CN109194689B (en) Abnormal behavior recognition method, device, server and storage medium
CN109657431A (en) The method of user identity for identification
CN103246566B (en) The resource monitoring method and device of application program
CN111310155A (en) System architecture for automatic identification of slider verification code and implementation method
CN110532776B (en) Android malicious software efficient detection method, system and medium based on runtime data analysis
CN107547944A (en) Interface realizing method and device, set top box
CN109542546A (en) A kind of throwing screen method and device at application process window and interface
CN111125704B (en) Webpage Trojan horse recognition method and system
CN108399129A (en) H5 page method for testing performance
CN104407979B (en) script detection method and device
CN105187443A (en) System and method for testing WEB verification code
CN107329883A (en) The automatic calculating method and system of intelligent terminal application program interaction response time delay

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170915