Unlock instant, AI-driven research and patent intelligence for your innovation.
Method and system for clicking verification code through code receiving platform and selenium breakthrough
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A verification code and breakthrough point technology, applied in the field of data protection, to achieve the effect of broadening data sources, improving capabilities and effectiveness
Pending Publication Date: 2021-12-17
浪潮卓数大数据产业发展有限公司
View PDF0 Cites 0 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
[0004] The premise of big data technology is that the data scale is large and the d
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Example Embodiment
[0034] Example 1:
[0035] This embodiment proposes a method for breaking through the click verification code through the code receiving platform and selenium, using selenium to drive the browser, sending the click verification code picture to the third-party code receiving platform, obtaining the coordinates of the click position, and then driving selenium according to the Return the coordinates to break through and click on the verification code.
[0036] combined with figure 1 , a method for breaking through a verification code through a code receiving platform and selenium in this embodiment, and the specific implementation process includes:
[0037] Step S1, analyze and locate the xpath path of the verification image in the source code of the browser webpage;
[0038] Step S2, according to the xpath path of step S1, use selenium to take a screenshot of the verification code picture specified by the page where the verification code is clicked;
[0039] Step S3, serializ...
Example Embodiment
[0044] Embodiment 2:
[0045] combined with figure 1 , this embodiment proposes a system for breaking through a verification code through a code receiving platform and selenium, and its realization is based on selenium and a third-party code receiving platform;
[0046] Use selenium to drive the browser, send the click verification code picture to the third-party code receiving platform, obtain the click position coordinates, and then drive selenium to break through the click verification code according to the returned coordinates.
[0047] A system for breaking through a verification code through a code receiving platform and selenium in this embodiment is based on selenium and a third-party code receiving platform, and the specific implementation process includes:
[0048] Step S1, analyze and locate the xpath path of the verification image in the source code of the browser webpage;
[0049] Step S2, according to the xpath path of step S1, use selenium to take a screenshot...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
PUM
Login to View More
Abstract
The invention discloses a method and system for clicking a verification code through a code receiving platform and selenium breakthrough, and relates to the technical field of data protection, and the method specifically comprises the steps: S1, analyzing and positioning an xpath of a clicking verification picture in a browser webpage source code; S2, according to the xpath in the S1, performing screenshot on the verification code picture specified by the page with the click verification code by using selenium; S3, sending the screenshot in the step S2 to a third-party code receiving platform, and receiving a return result; S4, analyzing a returned result in the step S3, and formatting result coordinates in sequence; S5, according to the xpath in the step S1, a selenium control browser positions a mouse on the verification code picture; and S6, according to the coordinates in the step S4, enabling the selenium to click the corresponding positions of the picture verification code in sequence to complete verification. The method and system can improve the capability and effectiveness of the crawler to collect data, and widens the data source.
Description
technical field [0001] The invention relates to the technical field of data protection, in particular to a method and a system for selecting verification codes through code access platforms and selenium breakthrough points. Background technique [0002] With the deep development of Internet technology, big data technology has become a new science with unique charm. [0003] With the vigorous development of big data technology, data has shown explosive growth. The richness and diversity of data and the continuity of data make big data an important means of production and productivity. By processing and analyzing large-scale data, the level of decision-making can be effectively improved, and resources can be integrated more effectively. [0004] The premise of big data technology is that the data scale is large and the data types are rich, which brings greater challenges to data collection and storage. Crawler technology is an important source of data, but it also faces man...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.