CN113569224A - Method and device for optimizing data authentication and electronic equipment - Google Patents

Method and device for optimizing data authentication and electronic equipment Download PDF

Info

Publication number
CN113569224A
CN113569224A CN202110833623.7A CN202110833623A CN113569224A CN 113569224 A CN113569224 A CN 113569224A CN 202110833623 A CN202110833623 A CN 202110833623A CN 113569224 A CN113569224 A CN 113569224A
Authority
CN
China
Prior art keywords
user
screenshot
target page
authentication
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110833623.7A
Other languages
Chinese (zh)
Inventor
宋力程
吴晓彬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Qiyue Information Technology Co Ltd
Original Assignee
Shanghai Qiyue Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Qiyue Information Technology Co Ltd filed Critical Shanghai Qiyue Information Technology Co Ltd
Priority to CN202110833623.7A priority Critical patent/CN113569224A/en
Publication of CN113569224A publication Critical patent/CN113569224A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/955Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/958Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/107License processing; Key processing

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Computer Hardware Design (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention provides a method, a device and electronic equipment for optimizing data authentication, which relate to the technical field of Internet and comprise the steps of obtaining a target page; obtaining user authorization and screenshot based on the target page to obtain a complete long screenshot; and identifying the complete long screenshot to obtain character data, and optimizing authentication based on the character data. The method and the device can improve the safety of data authentication, and information such as accounts and passwords is not recorded in the authentication process.

Description

Method and device for optimizing data authentication and electronic equipment
Technical Field
The invention relates to the technical field of internet, in particular to a method and a device for optimizing data authentication and electronic equipment.
Background
A screenshot is a visual image captured by a computer that can be displayed on a screen or other display device. The screenshots may be taken by the operating system or by dedicated screenshots software, as well as by external devices such as a digital camera. The screenshot also includes static screenshot and dynamic screenshot, wherein the static screenshot and the dynamic screenshot obtain a bitmap file, such as BMP, PNG and JPEG. And the latter gets a piece of video file. The purpose of the screenshots is typically to expose program interface icons, game scenes, data, etc. in a particular state.
OCR (Optical Character Recognition) refers to a process in which an electronic device examines a Character printed on paper, determines its shape by detecting dark and light patterns, and then translates the shape into a computer text using a Character Recognition method.
At present, most data authentication processes log in a target website by acquiring information such as a user name and a password of the target website, so that potential safety hazards of information leakage of the user name, the password and the like and other safety risks and law related problems are easily generated.
Therefore, a method, an apparatus and an electronic device for optimizing data authentication are provided.
Disclosure of Invention
The specification provides a method, a device and electronic equipment for optimizing data authentication, which can improve the security of data authentication, and do not record information such as accounts and passwords in the authentication process.
The method for optimizing data authentication provided by the application adopts the following technical scheme that the method comprises the following steps:
acquiring a target page;
obtaining user authorization and screenshot based on the target page to obtain a complete long screenshot;
and identifying the complete long screenshot to obtain character data, and optimizing authentication based on the character data.
Optionally, the obtaining the target page includes:
assisting a user to enter a target website and log in through a prompt interface;
and assisting the user to enter a target page in the target website through the prompt interface.
Optionally, the obtaining the target page further includes:
assisting the user to jump to a target website from an application program through the prompt interface;
assisting a user to log in the target website through the prompt interface;
and assisting the user to enter a target page in the target website through the prompt interface.
Optionally, obtaining user authorization based on the target page and performing screenshot to obtain a complete long screenshot includes:
sending an authorization request to a user based on the target page;
and when the request result is successful, performing screenshot on the target page to obtain a complete long screenshot.
Optionally, the screenshot of the target page to obtain a complete long screenshot further includes:
converting the target page into a document format;
and converting the document format into a complete long screenshot.
Optionally, the optimizing authentication based on the text data includes applying the text data to authentication of the application program.
Optionally, the sending an authorization request to the user based on the target page includes:
and when the request result is failure, returning the authorization request sent to the user based on the target page to a set number of times, sending a prompt to the user and closing the target website, and filling authentication information by the user.
The device for optimizing data authentication provided by the application adopts the following technical scheme that the device comprises:
the acquisition module is used for acquiring a target page;
the screenshot module is used for obtaining user authorization based on the target page and carrying out screenshot to obtain a complete long screenshot;
and the identification module is used for identifying the complete long screenshot to obtain character data and optimizing authentication based on the character data.
Optionally, the obtaining module includes:
the login unit is used for assisting a user to enter a target website and log in through a prompt interface;
and the entry unit is used for assisting the user to enter a target page in the target website through the prompt interface.
Optionally, the obtaining module further includes:
the skipping unit is used for assisting a user to skip from an application program to a target website through the prompt interface;
the first assisting unit is used for assisting a user to log in the target website through the prompting interface;
and the second assisting unit is used for assisting the user to enter a target page in the target website through the prompting interface.
Optionally, the screenshot module includes:
the authorization unit is used for sending an authorization request to a user based on the target page;
and the screenshot unit is used for screenshot the target page when the request result is successful to obtain a complete long screenshot.
Optionally, the screenshot module further includes:
a first conversion unit configured to convert the target page into a document format;
and the second conversion unit is used for converting the document format into a complete long screenshot.
Optionally, the optimizing authentication based on the text data includes applying the text data to authentication of the application program.
Optionally, the authorization unit includes:
and when the request result is failure, returning the authorization request sent to the user based on the target page to a set number of times, sending a prompt to the user and closing the target website, and filling authentication information by the user.
The present specification also provides an electronic device, wherein the electronic device includes:
a processor; and the number of the first and second groups,
a memory storing computer-executable instructions that, when executed, cause the processor to perform any of the methods described above.
The present specification also provides a computer readable storage medium, wherein the computer readable storage medium stores one or more programs which, when executed by a processor, implement any of the methods described above.
In the invention, a target webpage is automatically opened and jumped, and the target webpage is opened through operation; requesting user authorization in modes of popup, page prompting and the like, and if the user authorization is successful, carrying out screenshot on the target webpage to obtain a complete long screenshot based on the target webpage; and identifying the complete long screenshot, extracting character data in the complete long screenshot, and using the character data in the authentication process. The process that the user opens the target page does not record information such as the user name and the password, and especially under the condition of jumping to the target page, the risk of revealing the information such as the user name and the password is reduced as well as the risk of other safety problems and legal problems.
Drawings
FIG. 1 is a schematic diagram illustrating a method for optimizing data authentication according to an embodiment of the present disclosure;
fig. 2 is a schematic structural diagram of an apparatus for optimizing data authentication according to an embodiment of the present disclosure;
fig. 3 is a schematic structural diagram of an electronic device provided in an embodiment of the present disclosure;
fig. 4 is a schematic diagram of a computer-readable medium provided in an embodiment of the present specification.
Detailed Description
The following description is presented to disclose the invention so as to enable any person skilled in the art to practice the invention. The preferred embodiments in the following description are given by way of example only, and other obvious variations will occur to those skilled in the art. The basic principles of the invention, as defined in the following description, may be applied to other embodiments, variations, modifications, equivalents, and other technical solutions without departing from the spirit and scope of the invention.
The present application is described in further detail below with reference to figures 1-4.
An embodiment of the present specification provides a method for optimizing data authentication, including:
acquiring a target page;
obtaining user authorization and screenshot based on the target page to obtain a complete long screenshot;
and identifying the complete long screenshot to obtain character data, and optimizing authentication based on the character data.
In the embodiment of the specification, a target webpage is automatically opened and jumped, and the target webpage is opened through operation; requesting user authorization in modes of popup, page prompting and the like, and if the user authorization is successful, carrying out screenshot on the target webpage to obtain a complete long screenshot based on the target webpage; and identifying the complete long screenshot, extracting character data in the complete long screenshot, and using the character data in the authentication process. The process that the user opens the target page does not record information such as the user name and the password, and especially under the condition of jumping to the target page, the risk of revealing the information such as the user name and the password is reduced as well as the risk of other safety problems and legal problems.
Exemplary embodiments of the present invention will now be described more fully with reference to the accompanying drawings. The exemplary embodiments, however, may be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. Rather, these exemplary embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of the invention to those skilled in the art. The same reference numerals denote the same or similar elements, components, or parts in the drawings, and thus their repetitive description will be omitted.
Features, structures, characteristics or other details described in a particular embodiment do not preclude the fact that the features, structures, characteristics or other details may be combined in a suitable manner in one or more other embodiments in accordance with the technical idea of the invention.
In describing particular embodiments, the present invention has been described with reference to features, structures, characteristics or other details that are within the purview of one skilled in the art to provide a thorough understanding of the embodiments. One skilled in the relevant art will recognize, however, that the invention may be practiced without one or more of the specific features, structures, characteristics, or other details.
The flow charts shown in the drawings are merely illustrative and do not necessarily include all of the contents and operations/steps, nor do they necessarily have to be performed in the order described. For example, some operations/steps may be decomposed, and some operations/steps may be combined or partially combined, so that the actual execution sequence may be changed according to the actual situation.
The block diagrams shown in the figures are functional entities only and do not necessarily correspond to physically separate entities. I.e. these functional entities may be implemented in the form of software, or in one or more hardware modules or integrated circuits, or in different networks and/or processor means and/or microcontroller means.
The term "and/or" and/or "includes all combinations of any one or more of the associated listed items.
Fig. 1 is a schematic diagram illustrating a method for optimizing data authentication according to an embodiment of the present disclosure, where the method may include:
s101: and acquiring a target page.
In the embodiment of the present specification, the target page includes a page where the target information is available to the user, such as a school address information page and an identity information page. The user can open the target webpage by self and open the target webpage by series of operations; the user can click and jump to the target webpage from the application program and the webpage, and the target webpage is opened through series of operations.
In an embodiment of this specification, the acquiring a target page includes:
assisting a user to enter a target website and log in through a prompt interface;
and assisting the user to enter a target page in the target website through the prompt interface.
In the embodiment of the present specification, the prompt interface includes a navigation bar, a prompt box, and the like, and the prompt interface can be guided by user-defined mode and has different settings according to actual use requirements. The user can independently open the target webpage, a prompt interface is displayed on the target webpage, the user is guided and assisted to quickly register and log in or log in the target webpage, the user name, the password and other information of the user do not need to be recorded in the registering and logging in process, and then the user is guided and assisted to enter the target webpage.
In an embodiment of this specification, the acquiring a target page further includes:
assisting the user to jump to a target website from an application program through the prompt interface;
assisting a user to log in the target website through the prompt interface;
and assisting the user to enter a target page in the target website through the prompt interface.
In the embodiment of the description, the user can click and jump to the target webpage from the application program and the webpage, a prompt interface is displayed on the target webpage to guide and assist the user to quickly register and log in or log in the target webpage, the user name, the password and other information of the user do not need to be recorded in the process of registering and logging in or the target webpage is not needed to be recorded, and then the user is guided and assisted to enter the target webpage.
S102: and obtaining user authorization and carrying out screenshot based on the target page to obtain a complete long screenshot.
In the embodiment of the description, the user authorization is requested through modes of popup, page prompting and the like so as to conveniently capture the screenshot of the page, and if the user authorization is successful, the screenshot of the target webpage is carried out, so that a complete long screenshot based on the target page is obtained.
In an embodiment of this specification, the obtaining of the user authorization based on the target page and the screenshot to obtain a complete long screenshot includes:
sending an authorization request to a user based on the target page;
and when the request result is successful, performing screenshot on the target page to obtain a complete long screenshot.
In the embodiment of the description, the user authorization is requested through a popup window, a prompt page and other modes so as to conveniently capture the screenshot of the target page, the user name, the password and other information of the user are not acquired in the process, and if the user authorization is successful, the screenshot of the target page is performed, so that the complete long screenshot based on the target page is obtained.
In an embodiment of this specification, the obtaining of the user authorization and the screenshot based on the target page to obtain a complete long screenshot further includes:
converting the target page into a document format;
and converting the document format into a complete long screenshot.
In the embodiment of the specification, a target page is converted into a document format by calling a system printing method, and then the document format is converted into a complete long screenshot.
In an embodiment of this specification, the sending an authorization request to a user based on the target page includes:
and when the request result is failure, returning the authorization request sent to the user based on the target page to a set number of times, sending a prompt to the user and closing the target website, and filling authentication information by the user.
In the embodiment of the description, the user authorization is requested through a popup window, a prompt page and other modes so as to conveniently capture the screenshot of the target page, the user name, the password and other information of the user are not acquired in the process, the user authorization fails, and the user returns to the interface for requesting the authorization screenshot again until the preset times are returned. The target website prompts the authorization failure in a prompting mode such as pop-up window prompting and the like, informs the user that the authorization failure needs to fill in the authentication information by oneself, and then automatically or guides the user to close the target website, and the user fills in the authentication information by oneself.
In an embodiment of the present specification, said optimizing authentication based on said literal data comprises applying said literal data to authentication of said application.
In the embodiment of the present specification, the text data is obtained and used in the authentication process of the application program.
S103: and identifying the complete long screenshot to obtain character data, and optimizing authentication based on the character data.
In the embodiment of the description, the long screenshot is completed through recognition of the recognition model, so that the character data is obtained, the character data comprises all the character data of the complete long screenshot, the character data required by a user in the complete long screenshot and the like, and then the character data is used for the authentication process. The recognition model comprises an OCR model, an OneNote model and an McRosoft office OneNote, and is a set of information acquisition and multi-user cooperation tools for free forms.
In the embodiment of the present specification, a user opens a student status information network (target website) by himself, the student status information network (target website) is provided with a prompt interface, the prompt interface assists and guides the user to register and log in the student status information network (target website), the user name and password information of the user are not recorded in the process, and the prompt interface assists and guides the user to jump to a student status information page (target page). Requesting user authorization through modes of popup, prompt page and the like so as to conveniently capture the picture of the student status information page (target page), wherein the picture capture of the student status information page (target page) is carried out after the authorization is successful, and the picture capture of the student status information page (target page) is carried out to obtain a complete long picture capture. And then, the OCR (image recognition model) is used for recognizing the complete long screenshot to obtain the student status information (character data) of the user, so that the user can complete the student status authentication process quickly and accurately.
In the embodiment of the present specification, a user opens a student status information network (target website) from an application program, the student status information network (target website) is provided with a prompt interface, the prompt interface assists and guides the user to register and log in the student status information network (target website), the user name and password information of the user are not recorded in the process, and the prompt interface assists and guides the user to jump to a student status information page (target page). Requesting user authorization through modes of popup, prompt page and the like so as to conveniently capture the picture of the student status information page (target page), wherein the picture capture of the student status information page (target page) is carried out after the authorization is successful, and the picture capture of the student status information page (target page) is carried out to obtain a complete long picture capture. And then, using an OCR (image recognition model) to recognize the complete long screenshot to obtain the student status information (character data) of the user, and using the student status information (character data) of the user in the authentication process of the application program, so that the user can quickly and accurately complete the student status authentication process.
Fig. 2 is a schematic structural diagram of an apparatus for optimizing data authentication provided in an embodiment of the present specification, where the apparatus may include:
the acquisition module is used for acquiring a target page;
the screenshot module is used for obtaining user authorization based on the target page and carrying out screenshot to obtain a complete long screenshot;
and the identification module is used for identifying the complete long screenshot to obtain character data and optimizing authentication based on the character data.
In an embodiment of the present specification, the obtaining module includes:
the login unit is used for assisting a user to enter a target website and log in through a prompt interface;
and the entry unit is used for assisting the user to enter a target page in the target website through the prompt interface.
In an embodiment of this specification, the obtaining module further includes:
the skipping unit is used for assisting a user to skip from an application program to a target website through the prompt interface;
the first assisting unit is used for assisting a user to log in the target website through the prompting interface;
and the second assisting unit is used for assisting the user to enter a target page in the target website through the prompting interface.
In an embodiment of this specification, the screenshot module includes:
the authorization unit is used for sending an authorization request to a user based on the target page;
and the screenshot unit is used for screenshot the target page when the request result is successful to obtain a complete long screenshot.
In an embodiment of this specification, the screenshot module further includes:
a first conversion unit configured to convert the target page into a document format;
and the second conversion unit is used for converting the document format into a complete long screenshot.
In an embodiment of the present specification, said optimizing authentication based on said literal data comprises applying said literal data to authentication of said application.
In an embodiment of the present specification, the authorization unit includes:
and when the request result is failure, returning the authorization request sent to the user based on the target page to a set number of times, sending a prompt to the user and closing the target website, and filling authentication information by the user.
The functions of the apparatus in the embodiment of the present invention have been described in the above method embodiments, so that reference may be made to the related descriptions in the foregoing embodiments for details that are not described in the present embodiment, and further details are not described herein.
Based on the same inventive concept, the embodiment of the specification further provides the electronic equipment.
In the following, embodiments of the electronic device of the present invention are described, which may be regarded as specific physical implementations for the above-described embodiments of the method and apparatus of the present invention. Details described in the embodiments of the electronic device of the invention should be considered supplementary to the embodiments of the method or apparatus described above; for details which are not disclosed in embodiments of the electronic device of the invention, reference may be made to the above-described embodiments of the method or the apparatus.
Fig. 3 is a schematic structural diagram of an electronic device provided in an embodiment of the present disclosure. An electronic device 300 according to this embodiment of the invention is described below with reference to fig. 3. The electronic device 300 shown in fig. 3 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present invention.
As shown in fig. 3, electronic device 300 is embodied in the form of a general purpose computing device. The components of electronic device 300 may include, but are not limited to: at least one processing unit 310, at least one memory unit 320, a bus 330 connecting the various system components (including the memory unit 320 and the processing unit 310), a display unit 340, and the like.
Wherein the storage unit stores program code executable by the processing unit 310 to cause the processing unit 310 to perform the steps according to various exemplary embodiments of the present invention described in the above-mentioned processing method section of the present specification. For example, the processing unit 310 may perform the steps as shown in fig. 1.
The storage unit 320 may include readable media in the form of volatile storage units, such as a random access memory unit (RAM)3201 and/or a cache storage unit 3202, and may further include a read only memory unit (ROM) 3203.
The storage unit 320 may also include a program/utility 3204 having a set (at least one) of program modules 3205, such program modules 3205 including, but not limited to: an operating system, one or more application programs, other program modules, and program data, each of which, or some combination thereof, may comprise an implementation of a network environment.
Bus 330 may be one or more of several types of bus structures, including a memory unit bus or memory unit controller, a peripheral bus, an accelerated graphics port, a processing unit, or a local bus using any of a variety of bus architectures.
The electronic device 300 may also communicate with one or more external devices 400 (e.g., keyboard, pointing device, bluetooth device, etc.), with one or more devices that enable a user to interact with the electronic device 300, and/or with any devices (e.g., router, modem, etc.) that enable the electronic device 300 to communicate with one or more other computing devices. Such communication may occur via an input/output (I/O) interface 350. Also, the electronic device 300 may communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network, such as the internet) via the network adapter 360. Network adapter 360 may communicate with other modules of electronic device 300 via bus 330. It should be appreciated that although not shown in FIG. 3, other hardware and/or software modules may be used in conjunction with electronic device 300, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, and data backup storage systems, among others.
Through the above description of the embodiments, those skilled in the art will readily understand that the exemplary embodiments of the present invention described herein may be implemented by software, or by software in combination with necessary hardware. Therefore, the technical solution according to the embodiment of the present invention can be embodied in the form of a software product, which can be stored in a computer-readable storage medium (which can be a CD-ROM, a usb disk, a removable hard disk, etc.) or on a network, and includes several instructions to make a computing device (which can be a personal computer, a server, or a network device, etc.) execute the above-mentioned method according to the present invention. The computer program, when executed by a data processing apparatus, enables the computer readable medium to implement the above-described method of the invention, namely: such as the method shown in fig. 1.
Fig. 4 is a schematic diagram of a computer-readable medium provided in an embodiment of the present specification.
A computer program implementing the method shown in fig. 1 may be stored on one or more computer readable media. The computer readable medium may be a readable signal medium or a readable storage medium. A readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium include: an electrical connection having one or more wires, a portable disk, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
The computer readable storage medium may include a propagated data signal with readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A readable storage medium may also be any readable medium that is not a readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a readable storage medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device and partly on a remote computing device, or entirely on the remote computing device or server. In the case of a remote computing device, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., through the internet using an internet service provider).
In summary, the invention may be implemented in hardware, or in software modules running on one or more processors, or in a combination thereof. Those skilled in the art will appreciate that some or all of the functionality of some or all of the components in embodiments in accordance with the invention may be implemented in practice using a general purpose data processing device such as a microprocessor or a Digital Signal Processor (DSP). The present invention may also be embodied as apparatus or device programs (e.g., computer programs and computer program products) for performing a portion or all of the methods described herein. Such programs implementing the present invention may be stored on computer-readable media or may be in the form of one or more signals. Such a signal may be downloaded from an internet website or provided on a carrier signal or in any other form.
While the foregoing embodiments have described the objects, aspects and advantages of the present invention in further detail, it should be understood that the present invention is not inherently related to any particular computer, virtual machine or electronic device, and various general-purpose machines may be used to implement the present invention. The invention is not to be considered as limited to the specific embodiments thereof, but is to be understood as being modified in all respects, all changes and equivalents that come within the spirit and scope of the invention.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (10)

1. A method for optimizing data authentication, comprising:
acquiring a target page;
obtaining user authorization and screenshot based on the target page to obtain a complete long screenshot;
and identifying the complete long screenshot to obtain character data, and optimizing authentication based on the character data.
2. The method of optimizing data authentication as recited in claim 1, wherein said obtaining a target page comprises:
assisting a user to enter a target website and log in through a prompt interface;
and assisting the user to enter a target page in the target website through the prompt interface.
3. The method of optimizing data authentication of claims 1-2, wherein the obtaining a target page further comprises:
assisting the user to jump to a target website from an application program through the prompt interface;
assisting a user to log in the target website through the prompt interface;
and assisting the user to enter a target page in the target website through the prompt interface.
4. The method for optimizing data authentication of claims 1-3, wherein obtaining user authorization and making a screenshot based on the target page to obtain a full long screenshot comprises:
sending an authorization request to a user based on the target page;
and when the request result is successful, performing screenshot on the target page to obtain a complete long screenshot.
5. The method for optimizing data authentication of claims 1-4, wherein said screenshot of said target page resulting in a full long screenshot further comprises:
converting the target page into a document format;
and converting the document format into a complete long screenshot.
6. The method of optimizing data authentication of claims 1-5, wherein the optimizing authentication based on the literal data comprises applying the literal data to authentication of the application.
7. The method for optimizing data authentication of claims 1-6, wherein said sending an authorization request to a user based on the target page comprises:
and when the request result is failure, returning the authorization request sent to the user based on the target page to a set number of times, sending a prompt to the user and closing the target website, and filling authentication information by the user.
8. An apparatus that optimizes authentication of data, comprising:
the acquisition module is used for acquiring a target page;
the screenshot module is used for obtaining user authorization based on the target page and carrying out screenshot to obtain a complete long screenshot;
and the identification module is used for identifying the complete long screenshot to obtain character data and optimizing authentication based on the character data.
9. An electronic device, wherein the electronic device comprises:
a processor;
and a memory storing computer-executable instructions that, when executed, cause the processor to perform the method of any of claims 1-7.
10. A computer readable storage medium, wherein the computer readable storage medium stores one or more programs which, when executed by a processor, implement the method of any of claims 1-7.
CN202110833623.7A 2021-07-22 2021-07-22 Method and device for optimizing data authentication and electronic equipment Pending CN113569224A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110833623.7A CN113569224A (en) 2021-07-22 2021-07-22 Method and device for optimizing data authentication and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110833623.7A CN113569224A (en) 2021-07-22 2021-07-22 Method and device for optimizing data authentication and electronic equipment

Publications (1)

Publication Number Publication Date
CN113569224A true CN113569224A (en) 2021-10-29

Family

ID=78166523

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110833623.7A Pending CN113569224A (en) 2021-07-22 2021-07-22 Method and device for optimizing data authentication and electronic equipment

Country Status (1)

Country Link
CN (1) CN113569224A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110889096A (en) * 2019-11-21 2020-03-17 望海康信(北京)科技股份公司 Login method, login device, computer equipment and storage medium
CN111783119A (en) * 2020-06-30 2020-10-16 平安国际智慧城市科技股份有限公司 Form data security control method and device, electronic equipment and storage medium
CN112394864A (en) * 2020-07-22 2021-02-23 招联消费金融有限公司 Information acquisition method and device, computer equipment and storage medium

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110889096A (en) * 2019-11-21 2020-03-17 望海康信(北京)科技股份公司 Login method, login device, computer equipment and storage medium
CN111783119A (en) * 2020-06-30 2020-10-16 平安国际智慧城市科技股份有限公司 Form data security control method and device, electronic equipment and storage medium
CN112394864A (en) * 2020-07-22 2021-02-23 招联消费金融有限公司 Information acquisition method and device, computer equipment and storage medium

Similar Documents

Publication Publication Date Title
CN106155686B (en) Interface generation method, device and system
CA3018196C (en) Visual regresssion testing tool
CN110825431B (en) Interface document processing method, device, system, storage medium and electronic equipment
US9600456B2 (en) Automatically performing a web service operation
US9766868B2 (en) Dynamic source code generation
US9772932B2 (en) Application test across platforms
US9619209B1 (en) Dynamic source code generation
US20160349928A1 (en) Generating summary of activity on computer gui
US8671389B1 (en) Web application resource manager on the web and localizable components
CN110647523B (en) Data quality analysis method and device, storage medium and electronic equipment
US9195653B2 (en) Identification of in-context resources that are not fully localized
CN110705235B (en) Information input method and device for business handling, storage medium and electronic equipment
US20230222391A1 (en) Self-learning ontology-based cognitive assignment engine
CN111598122B (en) Data verification method and device, electronic equipment and storage medium
US20170371652A1 (en) Automated generation and identification of screenshots for translation reference
CN113360737B (en) Page content acquisition method and device, electronic equipment and readable medium
CN113569224A (en) Method and device for optimizing data authentication and electronic equipment
US20170213544A1 (en) Training a cognitive agent using document output generated from a recorded process
CN111145143A (en) Problem image determination method and device, electronic equipment and storage medium
CN115113967A (en) Question feedback method and device, electronic equipment and storage medium
CN111931465B (en) Method and system for automatically generating user manual based on user operation
CN114064010A (en) Front-end code generation method, device, system and storage medium
US10970533B2 (en) Methods and systems for finding elements in optical character recognition documents
CN110083807B (en) Contract modification influence automatic prediction method, device, medium and electronic equipment
CN111151008A (en) Game operation data verification method, device, configuration background and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination