CN112651214B - Method for converting data table plaintext into binary ciphertext convenient for program to read - Google Patents
Method for converting data table plaintext into binary ciphertext convenient for program to read Download PDFInfo
- Publication number
- CN112651214B CN112651214B CN202010888427.5A CN202010888427A CN112651214B CN 112651214 B CN112651214 B CN 112651214B CN 202010888427 A CN202010888427 A CN 202010888427A CN 112651214 B CN112651214 B CN 112651214B
- Authority
- CN
- China
- Prior art keywords
- data
- data table
- row
- field
- program
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F40/00—Handling natural language data
- G06F40/10—Text processing
- G06F40/12—Use of codes for handling textual entities
- G06F40/151—Transformation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Bioethics (AREA)
- Artificial Intelligence (AREA)
- Audiology, Speech & Language Pathology (AREA)
- Computational Linguistics (AREA)
- Devices For Executing Special Programs (AREA)
Abstract
The invention discloses a method for converting a data table plaintext into a binary ciphertext convenient for program reading, which is combined with open source Protobuf (version 3.11. X) provided by Google and is based on a cross-platform programming language Python. Protobuf is an open-source data definition format provided by Google, each column of a data table can be mapped to a specified field in a data structure defined in Protobuf by using the Protobuf, a converted binary file is read in a program and converted into an array corresponding to the data structure type of the Protobuf, and the array can be operated, so that the data implicit in the data table such as a main key, a maximum value, a minimum value and the like can be packaged, and data access can be directly performed through reading an Excel file according to a row number and a column number, so that the code readability and the development efficiency are improved.
Description
Technical Field
The invention relates to a method for reading data in an Excel data table (xlsx, csv and the like) by a program, in particular to a method for converting a data table plaintext into a binary ciphertext which is convenient for the program to read.
Background
The existing method for reading data in Excel data table (xlsx, csv, etc.) by program is relatively cluttered because different programming languages are different for reading Excel data table.
For example, for the C + + programming language, under the Windows platform, the specified Excel file may be accessed using ODBC, or may be accessed through a COM object provided by Excel; firstly, creating an ODBC or COM object, opening a file, creating an Excel object, and accessing data by a row number and a column number. Under a non-Windows platform, such as Linux, a third-party library libxls needs to be installed, and the use method is similar to that under the Windows platform. As another example, as for the Java programming language, windows and non-Windows platforms are not involved because Java is a cross-platform programming language. One common method is to refer to an Apache POI-related class library, realize a method Parser for analyzing specified Excel content, realize a method Reader for reading Excel, then read an Excel file through the Reader, and return a result set.
At present, methods for reading Excel files for different programming languages and different platforms analyze Excel files through corresponding libraries provided by Excel, but access is performed on access cell data through rows and columns; therefore, a large amount of hard codes can be generated due to relative rigid comparison in the program development process, and if the rows and columns of Excel are transformed, the program codes also need to be correspondingly changed; if the data table files are packaged into the corresponding application programs, the data table files exist in a plain text, and certain danger is also brought to the safety of the application programs. Therefore, the existing mainstream method for reading Excel data by a program is not a very friendly way for a demand side and a development side. Therefore, the present invention provides a method for converting the plaintext of the data table into a binary ciphertext that is easy to read by the program, so as to solve the problems mentioned above in the background art.
Disclosure of Invention
The present invention is directed to a method for converting a plaintext of a data table into a binary ciphertext that is readable by a program, so as to solve the above-mentioned problems in the background art.
In order to achieve the purpose, the invention provides the following technical scheme:
the method for converting the plain text of the data table into the binary plain text which is convenient to read by a program comprises the following steps:
1) The data table is transmitted into a Python program, the Class of the corresponding data interface is found through the name of the data table, the content of the data table is read into the program through xlrd, and a null array List is declared and used for storing an object converted from the data table into the Class;
2) Traversing the content of the data table, if the data table has no content, jumping to step 7), if the data table has content, starting traversing from the third row of the data table (the first row is a custom header, and the second row is a mapping name of the data structure defined by the column of data and Protobuf);
3) After data of a row is obtained, declaring an object Ins of a Class, continuously traversing the row of data from the 1 st column to obtain cell information, obtaining a second row of data Field of the current cell in the column, and obtaining the data Value of the cell, wherein the Field is the Field name mapped by the data table and the data structure;
4) If the Field does not contain middle brackets, obtaining the type of the Field in the Ins, and converting the cell data Value into a corresponding type Value emod; assigning the member corresponding to the Field in the Ins as ValueMod, if the Field contains middle brackets, indicating that the cell data is one item of a section of continuous data in the data table and corresponding to the data structure as an array; obtaining the data type of the array corresponding to the Field in the Ins, converting the Value into a Value memory R of a corresponding type, and adding the Value memory R to the tail of the array type member corresponding to the Field in the Ins;
5) After the data traversal of the row is finished, obtaining a complete data mapping object Ins, adding Ins to the tail of the List array, and then continuously traversing the content of the data table according to the rows;
6) After traversing the data table, returning an array List of the obtained Class object for binarization and writing into a file for use;
7) Traversing the returned Class object array List;
8) Each member of the List is an object of Class type (i.e., python type for Protobuf) that contains a method SerializeToString that serializes the object into a binary string. Serializing the object into a binary character string BinStr to obtain the length Len of the BinStr, writing the Len (the length is 4 bytes) into a file, and continuously writing the BinStr into the file;
9) And after the traversal of the List is completed, the data table is converted into the ciphertext and then written into the binary file, and the program is ended.
As a further scheme of the invention: the contents of the data table need to start with the third row, the data of the second row being the field names of the mapping between the columns of the data table and the data structure.
As a still further scheme of the invention: the definition names of the data structure and the definition names of the data table need to be consistent.
As a still further scheme of the invention: when parsing is performed between the type defined in the data structure and the data mapped in the data table, type conversion is required.
As a still further scheme of the invention: before a binary system of a row of data is converted into a file, the length of the binary system needs to be written into the file before the binary character string.
Compared with the prior art, the invention has the beneficial effects that:
1. when data is read for Excel, data does not need to be accessed through line numbers and column numbers, the change of codes caused by the change of a data table in the development process is reduced, the readability of the codes is improved, and the development efficiency is increased.
2. When the data table is packed by the application program, the data table of the plaintext is changed into the binary format of the ciphertext, and the safety of the application program is improved.
3. When the demander provides the data table, the meaning of each column does not need to be explained in detail, the mapping relation of each column only needs to be explained, and the sequence of the columns of the data table does not need to be defined forcibly; the developer can process the data sheet only by analyzing the converted file, and the members of the operation object can process the data sheet, thereby reducing the communication cost of the demander and the developer.
Drawings
FIG. 1 is a diagram of a client information data table illustrating a method for converting plaintext data into binary data that is easily readable by a program.
FIG. 2 is a flow chart of a method for converting plaintext data form into binary ciphertext that is readable by a program.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In the embodiment of the present invention, a method for converting a plaintext of a data table into a binary ciphertext that is convenient for a program to read needs to be combined with an open-source Protobuf (version 3.11. X) provided by Google, based on a cross-platform programming language Python, where the Protobuf is an open-source data definition format provided by Google, each column of the data table may be mapped to a specified field in a data structure defined in the Protobuf using the Protobuf, and a third-party library xlrd (version 1.1.0) provided by Python needs to be used for parsing a data table of Excel.
Referring to fig. 1, there is an Excel data table with a file name of corporation, xssel, which records information of clients of a company, and Protobuf is used to define a data structure of the corporation data table, where the name of the defined data structure needs to be consistent with the name of the data table, and the data structure definition is generated into a corresponding Python definition through a tool provided by Google.
Proto, data structure definition file of company customer information data sheet:
and recording data of the data table from the third row, wherein the first row is a self-defined header, and the second row is a mapping relation between the columns of the data table and a data structure defined by Protobuf.
Referring to FIG. 2, the data table is converted into a binary ciphertext file format for easy program reading, comprising the steps of:
1) The data table is transmitted into a Python program, the Class of the corresponding data interface is found through the name of the data table, the content of the data table is read into the program through xlrd, and a null array List is declared and used for storing an object converted from the data table into the Class;
2) Traversing the content of the data table, if the data table has no content, jumping to step 7), if the data table has content, starting traversing from the third row of the data table (the first row is a self-defined header, and the second row is a mapping name of the data structure defined by the column of data and Protobuf);
3) After data of a row is obtained, declaring an object Ins of a Class, continuously traversing the row of data from the 1 st column to obtain cell information, obtaining a second row of data Field of the current cell in the column, and obtaining the data Value of the cell, wherein the Field is the Field name mapped by the data table and the data structure;
4) If the Field does not contain middle brackets, obtaining the type of the Field in the Ins, and converting the cell data Value into a corresponding type Value emod; assigning the member corresponding to the Field in the Ins as ValueMod, if the Field contains middle brackets, indicating that the cell data is one item of a section of continuous data in the data table and corresponding to the data structure as an array; obtaining the data type of the array corresponding to the Field in the Ins, converting the Value into a Value emodr of a corresponding type, and adding the Value emodr to the tail of the array type member corresponding to the Field in the Ins;
5) After the data traversal of the row is finished, obtaining a complete data mapping object Ins, adding Ins to the tail of the List array, and then continuously traversing the content of the data table according to the rows;
6) After traversing the data table, returning an array List of the obtained Class object for binarization and writing into a file for use;
7) Traversing the returned Class object array List;
8) Each member of the List is an object of Class type (i.e., python type for Protobuf) that contains a method SerializeToString that serializes the object into a binary string. Serializing the object into a binary character string BinStr to obtain the length Len of the BinStr, writing Len (the length is 4 bytes) into a file, and continuously writing the BinStr into the file;
9) And after the traversal of the List is completed, the data table is converted into the ciphertext and then written into the binary file, and the program is ended.
The method provides a file conversion process through Python, and partial codes of a data table conversion ciphertext binary system are as follows:
the algorithm code for ciphertext binary reading and parsing is as follows:
the converted binary file is read in the program and converted into an array corresponding to the data structure type of the Protobuf, the array can be operated, the data implicit in the data tables such as a main key, a maximum value, a minimum value and the like can be packaged, data access is not required to be carried out by reading the Excel file according to the row number and the column number, the access can be directly carried out through members of the mapped data structure, and the code readability and the development efficiency are improved.
The implementation mode of the invention is as follows:
1. language environment Python, library to be installed, protobuf (version 3.11.2), xlrd (version 1.1.0);
2. tool protoc to install Protobuf (version 3.11.2);
3. defining a Protobuf data structure mapped by a data table;
4. generating the type of Python of the data structure through a tool protoc of the Protobuf;
5. executing Python program, introducing protobuf library and xlrd library, and generating class defined by data structure. Transmitting the data table file into a program through parameters, and transmitting the generated binary file path into the program;
6. and executing the program, analyzing the data table and generating a ciphertext binary file.
The above description is only for the preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art should be considered to be within the technical scope of the present invention, and the technical solutions and the inventive concepts thereof according to the present invention should be equivalent or changed within the scope of the present invention.
Claims (5)
1. A method for converting a plaintext of a data table into a binary ciphertext that is readable by a program, comprising the steps of:
1) The data table is transmitted into a Python program, the Class of the corresponding data interface is found through the name of the data table, the content of the data table is read into the program through xlrd, and a null array List is declared and used for storing the object converted from the data table into the Class;
2) Traversing the content of the data table, if the data table has no content, jumping to step 7), if the data table has content, traversing from the third row of the data table, wherein the first row is a custom header, and the second row is the mapping name of the data structure defined by the column data and Protobuf;
3) After data of a row is obtained, declaring an object Ins of a Class, continuously traversing the row of data from the 1 st column, obtaining a second row of data Field of the current cell column after cell information is obtained, and obtaining the data Value of the cell, wherein the Field is the Field name mapped by the data table and the data structure;
4) If the Field does not contain a middle bracket, acquiring the type of the Field in the Ins, and converting the cell data Value into a corresponding type of ValueMod; assigning the member corresponding to the Field in the Ins as ValueMod, if the Field contains middle brackets, indicating that the cell data is one item of a section of continuous data in the data table and corresponding to the data structure as an array; obtaining the data type of the array corresponding to the Field in the Ins, converting the Value into a Value emodr of a corresponding type, and adding the Value emodr to the tail of the array type member corresponding to the Field in the Ins;
5) After the data traversal of the row is finished, obtaining a complete data mapping object Ins, adding Ins to the tail of the List array, and then continuously traversing the content of the data table according to the rows;
6) After traversing the data table, returning an array List of the obtained Class object for binarization and writing into a file for use;
7) Traversing the returned Class object array List;
8) Each member in the List is an object of a Class type, namely a Python type corresponding to Protobuf, and the object contains a method SerializeToString, the method serializes the object into a binary character string, serializes the object into a binary character string BinStr to obtain the length Len of the BinStr, writes the Len into a file, has the length of 4 bytes, and continuously writes the BinStr into the file;
9) And after the traversal of the List is completed, the data table is converted into the ciphertext and then written into the binary file, and the program is ended.
2. The method of claim 1, wherein the contents of the data table start with a third row, and the data in the second row is a field name of a mapping between a column of the data table and a data structure.
3. The method of claim 1, wherein the data structure has a definition name that is consistent with a definition name of the data table.
4. The method of claim 1, wherein the type conversion is performed between the type defined in the data structure and the data mapped in the data table during parsing.
5. The method of claim 1, wherein the binary string is written to the file before the binary string is written to the file.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010888427.5A CN112651214B (en) | 2020-08-28 | 2020-08-28 | Method for converting data table plaintext into binary ciphertext convenient for program to read |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010888427.5A CN112651214B (en) | 2020-08-28 | 2020-08-28 | Method for converting data table plaintext into binary ciphertext convenient for program to read |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112651214A CN112651214A (en) | 2021-04-13 |
CN112651214B true CN112651214B (en) | 2023-03-28 |
Family
ID=75346100
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010888427.5A Active CN112651214B (en) | 2020-08-28 | 2020-08-28 | Method for converting data table plaintext into binary ciphertext convenient for program to read |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112651214B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115033546A (en) * | 2022-06-27 | 2022-09-09 | 深圳市万维云数字科技有限公司 | Digital model universal format, conversion method, system, terminal and storage medium |
Citations (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101625702A (en) * | 2009-07-03 | 2010-01-13 | 无敌科技(西安)有限公司 | Encryption method of data file with file allocation table format |
CN102306255A (en) * | 2011-08-29 | 2012-01-04 | 飞天诚信科技股份有限公司 | Document protection method and system |
CN102722682A (en) * | 2012-04-28 | 2012-10-10 | 飞天诚信科技股份有限公司 | Protection method for Excel document |
CN103580857A (en) * | 2012-08-06 | 2014-02-12 | 重庆电子工程职业学院 | Compression method for Chinese character message data based on knapsack encryption |
CN105787128A (en) * | 2016-03-29 | 2016-07-20 | 四川秘无痕信息安全技术有限责任公司 | Method for recovering Java serialized file data |
CN105871542A (en) * | 2016-03-25 | 2016-08-17 | 贵州大学 | Encryption and decryption method of ciphertext |
CN106294017A (en) * | 2016-08-11 | 2017-01-04 | 苏州华兴源创电子科技有限公司 | A kind of information security back-up method |
CN107871082A (en) * | 2016-11-15 | 2018-04-03 | 平安科技(深圳)有限公司 | The method of data encryption and control extension terminal in oracle database |
CN108256807A (en) * | 2018-02-10 | 2018-07-06 | 西安科技大学 | Courier's article receiving and sending system and method based on Quick Response Code identification |
CN108804091A (en) * | 2018-05-25 | 2018-11-13 | 广州小天软件有限公司 | A kind of software code generation method |
CN109302400A (en) * | 2018-10-17 | 2019-02-01 | 成都安恒信息技术有限公司 | A kind of cryptographic asset deriving method for O&M auditing system |
CN109409101A (en) * | 2018-09-17 | 2019-03-01 | 平安科技(深圳)有限公司 | The method and terminal device of data encryption |
CN109697374A (en) * | 2018-12-28 | 2019-04-30 | 东信和平科技股份有限公司 | A kind of encryption method, decryption method and device |
CN110299989A (en) * | 2019-06-10 | 2019-10-01 | 南通大学 | A kind of encryption and decryption method of Chinese and English character string |
CN110535646A (en) * | 2018-05-24 | 2019-12-03 | 广东技术师范学院 | A kind of data information security management method |
CN110585724A (en) * | 2019-09-24 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Table data updating method and device in game client |
CN110704854A (en) * | 2019-09-27 | 2020-01-17 | 上海易点时空网络有限公司 | Stream type encryption method aiming at text data reserved format |
CN111488277A (en) * | 2020-04-08 | 2020-08-04 | 矩阵元技术(深圳)有限公司 | Node matching method, device, equipment and system |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11038677B2 (en) * | 2019-01-31 | 2021-06-15 | Re Formsnet, Llc | Systems and methods for encryption and authentication |
-
2020
- 2020-08-28 CN CN202010888427.5A patent/CN112651214B/en active Active
Patent Citations (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101625702A (en) * | 2009-07-03 | 2010-01-13 | 无敌科技(西安)有限公司 | Encryption method of data file with file allocation table format |
CN102306255A (en) * | 2011-08-29 | 2012-01-04 | 飞天诚信科技股份有限公司 | Document protection method and system |
CN102722682A (en) * | 2012-04-28 | 2012-10-10 | 飞天诚信科技股份有限公司 | Protection method for Excel document |
CN103580857A (en) * | 2012-08-06 | 2014-02-12 | 重庆电子工程职业学院 | Compression method for Chinese character message data based on knapsack encryption |
CN105871542A (en) * | 2016-03-25 | 2016-08-17 | 贵州大学 | Encryption and decryption method of ciphertext |
CN105787128A (en) * | 2016-03-29 | 2016-07-20 | 四川秘无痕信息安全技术有限责任公司 | Method for recovering Java serialized file data |
CN106294017A (en) * | 2016-08-11 | 2017-01-04 | 苏州华兴源创电子科技有限公司 | A kind of information security back-up method |
CN107871082A (en) * | 2016-11-15 | 2018-04-03 | 平安科技(深圳)有限公司 | The method of data encryption and control extension terminal in oracle database |
CN108256807A (en) * | 2018-02-10 | 2018-07-06 | 西安科技大学 | Courier's article receiving and sending system and method based on Quick Response Code identification |
CN110535646A (en) * | 2018-05-24 | 2019-12-03 | 广东技术师范学院 | A kind of data information security management method |
CN108804091A (en) * | 2018-05-25 | 2018-11-13 | 广州小天软件有限公司 | A kind of software code generation method |
CN109409101A (en) * | 2018-09-17 | 2019-03-01 | 平安科技(深圳)有限公司 | The method and terminal device of data encryption |
CN109302400A (en) * | 2018-10-17 | 2019-02-01 | 成都安恒信息技术有限公司 | A kind of cryptographic asset deriving method for O&M auditing system |
CN109697374A (en) * | 2018-12-28 | 2019-04-30 | 东信和平科技股份有限公司 | A kind of encryption method, decryption method and device |
CN110299989A (en) * | 2019-06-10 | 2019-10-01 | 南通大学 | A kind of encryption and decryption method of Chinese and English character string |
CN110585724A (en) * | 2019-09-24 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Table data updating method and device in game client |
CN110704854A (en) * | 2019-09-27 | 2020-01-17 | 上海易点时空网络有限公司 | Stream type encryption method aiming at text data reserved format |
CN111488277A (en) * | 2020-04-08 | 2020-08-04 | 矩阵元技术(深圳)有限公司 | Node matching method, device, equipment and system |
Non-Patent Citations (6)
Title |
---|
[python]使用xlrd对Excel表格进行读写操作;navyofficer;《https://blog.csdn.net/hitwangpeng/article/details/51364770》;20160510;全文 * |
Python xlrd 读取 Excel 表格基础(一):获取sheet、行、列对象,读取数据类型等;YouMi Chou;《https://blog.csdn.net/zhouz92/article/details/106883774》;20200621;全文 * |
python之明密文转换;a568005784;《https://blog.csdn.net/a568005784/article/details/19932125》;20140225;全文 * |
基于 N F C 的智能防伪电子铅封系统研究;包先雨等;《现代电子技术》;20140601;第37卷(第11期);107-110 * |
基于汉字的背包公钥加密算法;王俊峰等;《2006北京地区高校研究生学术交流会》;20161201;1722-1727 * |
批量 E x c e l 校准曲线文件自动加密解密的软件设计;郭永林等;《现代电子技术》;20130715;第36卷(第14期);38-40 * |
Also Published As
Publication number | Publication date |
---|---|
CN112651214A (en) | 2021-04-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110502227B (en) | Code complement method and device, storage medium and electronic equipment | |
CN106796525B (en) | On-demand loading dynamic script language codes are to reduce memory use | |
CN111176996A (en) | Test case generation method and device, computer equipment and storage medium | |
CN110688122A (en) | Method and device for compiling and executing intelligent contract | |
CN113312108B (en) | SWIFT message verification method and device, electronic equipment and storage medium | |
CN110704064A (en) | Method and device for compiling and executing intelligent contract | |
CN107229616B (en) | Language identification method, device and system | |
CN114594933A (en) | Front-end code generation method and device based on file scanning and storage medium | |
CN112651214B (en) | Method for converting data table plaintext into binary ciphertext convenient for program to read | |
CN117093224A (en) | Code editing method, device and medium supporting TypeScript intelligent perception | |
CN101202736A (en) | Method for realizing encoding-decoding in communication network | |
CN103235757B (en) | Several apparatus and method that input domain tested object is tested are made based on robotization | |
CN101201750B (en) | Method of providing data for encoding/decoding using syntax lexical analysis tool | |
CN106293862B (en) | A kind of analysis method and device of expandable mark language XML data | |
CN116662161A (en) | Function debugging method, device, equipment and storage medium | |
CN115495082A (en) | TLV format data automatic conversion method and related equipment | |
CN114895914A (en) | Log output code generation method and device, electronic equipment and storage medium | |
CN112765252A (en) | Data transmission method, client, terminal, server and storage medium | |
CN111783482A (en) | Text translation method and device, computer equipment and storage medium | |
CN114020278A (en) | Data processing method, device, equipment and storage medium | |
CN111475403A (en) | Dynamic generation method of test script and related device | |
CN117270962B (en) | Method and device for processing coloring language, storage medium and electronic equipment | |
CN112650479A (en) | Webpage CSS structure automatic generation method and storage medium | |
CN112148581A (en) | Code specification checking method, device, system and storage medium | |
EP1183596B1 (en) | Generating optimized computer data field conversion routines |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |