CN106789856A - A kind of information coding method, coding/decoding method and device - Google Patents

A kind of information coding method, coding/decoding method and device Download PDF

Info

Publication number
CN106789856A
CN106789856A CN201510831601.1A CN201510831601A CN106789856A CN 106789856 A CN106789856 A CN 106789856A CN 201510831601 A CN201510831601 A CN 201510831601A CN 106789856 A CN106789856 A CN 106789856A
Authority
CN
China
Prior art keywords
information
server
picture
resolved
coding
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510831601.1A
Other languages
Chinese (zh)
Inventor
方腾飞
朱乐
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Advantageous New Technologies Co Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201510831601.1A priority Critical patent/CN106789856A/en
Publication of CN106789856A publication Critical patent/CN106789856A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/146Tracing the source of attacks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0478Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key

Abstract

The embodiment of the application one discloses a kind of information coding, coding/decoding method, code device and decoding apparatus.The method includes:Server obtains the first information of targeted customer;Server inquiry in preset rules obtains the coded system corresponding to the first information of the acquisition;The coded system inquired described in server by utilizing is encoded to targeted website information, and the information after coding is sent to the target terminal user.Disclosed herein as well is the embodiment of information decoding method, code device and decoding apparatus.The application solves the problems, such as that after data are divulged a secret by sectional drawing in the prior art sectional drawing blabber cannot be found.

Description

A kind of information coding method, coding/decoding method and device
Technical field
The application is related to data security arts, more particularly to a kind of information coding method, coding/decoding method and device.
Background technology
In recent years, the important info web or intra-company's info web of some websites are frequently compromised, Many websites or company are caused with huge economic losses, info web is increasingly taken seriously safely.
For the webpage of some websites, especially intra-company's webpage, info web includes important information. When user cannot be prevented to reveal info web, the user of leakage info web can be smoothly found, be urgently Problem to be solved.
In the prior art, user can be limited by web technologies and directly replicates info web, but with cutting The development of figure software, user by info web sectional drawing and can be blazed abroad by the way of sectional drawing.
At present, some websites or company be to after info web is compromised, find out info web leakage person, Can watermark of the addition with certain mark in the background of important info web.For example, by increasing comprising clear Look at the information when employee job number information watermark to the background of information in.With continuing to develop for technology, skill Art personnel can rely on certain class software to remove the watermark of these tape identification.After watermark removal, user passes through sectional drawing Mode propagate info web, company still cannot find the user of leakage info web.
The content of the invention
The purpose of the embodiment of the present application is to provide a kind of information coding method, coding/decoding method and device, is used to solve The problem of blabber cannot be found after certainly the network information is divulged a secret in the prior art.
A kind of information coding method, including:
Server obtains the first information of targeted customer;
Server inquiry in preset rules obtains the coding staff corresponding to the first information of the acquisition Formula;
The coded system inquired described in server by utilizing is encoded to targeted website information.
A kind of information decoding method, including:
Server receives the picture to be decoded for uploading;
The server is split and is numbered to the picture to be decoded, and is solved with treating after numbering to splitting Analysing small picture parse obtaining analysis result;
The server is to be resolved small with described in data base querying according to the number order of small picture to be resolved The corresponding character information of analysis result of picture;
The server is extracted in the corresponding character information of analysis result of the small picture to be resolved Effective information, and the effective information is mapped as the first information according to preset rules;Effective letter Breath, one or two combination in the font or character that are included in the character information.
A kind of information coding device, including:
Acquisition module, the first information for obtaining targeted customer;
Enquiry module, the coding corresponding to the first information of the acquisition is obtained for the inquiry in preset rules Mode;
Coding module, the coded system for being inquired described in is encoded to targeted website information;
Sending module, for the information after coding to be sent to the target terminal user.
A kind of information decoding device, including:
Receiver module, for receiving picture to be decoded;
Parsing module, for the picture to be decoded to be split and is numbered, and to segmentation with numbering after Small picture to be resolved parse obtaining analysis result;
Enquiry module, it is to be resolved with described in data base querying for the number order according to small picture to be resolved The corresponding character information of analysis result of small picture;
Mapping block, having in the corresponding character information of analysis result according to the small picture to be resolved Effect information, the first information is mapped as by the effective information according to preset rules.
The technical scheme provided from above the embodiment of the present application, is obtained in the embodiment of the present application by server The first information at family is taken, and the first information that will be got corresponds to coded system by preset rules, profit Targeted website information is encoded with the coded system for obtaining.Due to make use of user's when coding The first information, after obtaining the picture comprising leakage information, the first information of user can be decoded by decoding, So as to find out the user of leakage info web.
Brief description of the drawings
In order to illustrate more clearly of the embodiment of the present application or technical scheme of the prior art, below will be to implementing Example or the accompanying drawing to be used needed for description of the prior art are briefly described, it should be apparent that, describe below In accompanying drawing be only some embodiments described in the application, for those of ordinary skill in the art, Without having to pay creative labor, other accompanying drawings can also be obtained according to these accompanying drawings.
The schematic flow sheet of the information coding that Fig. 1 is provided for the embodiment of the application one;
The uncoded site information that Fig. 2 is browsed for targeted customer's needs in the embodiment of the application one;
Fig. 3 is the site information after being encoded in the embodiment of the application one;
Fig. 4 is the site information after being encoded in the embodiment of the application one;
The schematic flow sheet of the information decoding that Fig. 5 is provided for the embodiment of the application one;
The specific stream that Fig. 6 is decoded for server that the embodiment of the application one is provided to the picture to be decoded Journey schematic diagram;
The pixel schematic diagram that Fig. 7 is provided for the embodiment of the application one;
The module diagram of the device of the information coding that Fig. 8 is provided for the embodiment of the application one;
The module diagram of the device of the information decoding that Fig. 9 is provided for the embodiment of the application one.
Specific embodiment
In order that those skilled in the art more fully understand the technical scheme in the application, below in conjunction with this Accompanying drawing in application embodiment, is clearly and completely described to the technical scheme in the embodiment of the present application, Obviously, described embodiment is only some embodiments of the present application, rather than whole embodiments.Base Embodiment in the application, those of ordinary skill in the art are obtained under the premise of creative work is not made The every other embodiment for taking, should all belong to the scope of the application protection.
Webpage is the basic element for constituting website, is the platform for carrying various website applications.Generally, net Stand and be made up of webpage, if only domain name and fictitious host computer is without making any webpage, use Family cannot still access the website.
Webpage is a text-only file comprising html tag, and it can be stored in certain corner of the world A certain computer in, be one " page " in WWW, be HTML form (standard lead to With an application of markup language, file extent entitled .html or .htm).Webpage is generally carried with image shelves For picture.Webpage will be read by web browser.
Word is to constitute the two of webpage most basic elements with picture.Can simply be interpreted as:Text Word, is exactly the content of webpage.Picture, is exactly the attractive in appearance of webpage.In addition, the element of webpage also includes Animation, music, program etc..These web page elements can be referred to " data " or " information " herein Generation.
Through the discussion of exemplary, it should be understood that term " data " and " information " can be herein In be interchangeably used to refer to may be present in text in computer based environment, picture, audio, video or The information of any other form.
The method of the information coding that Fig. 1 is provided for the embodiment of the application one, specifically includes following steps:
S110:Server obtains the first information of targeted customer;
The server, or internet site server of the server, e.g. company Intranet.With As a example by company Intranet, on the server of company Intranet, there is intra-company's info web.Most company in order to Prevent company internal information from revealing, only to intra-company employee open interior info web and company Intranet service Device.
The targeted customer, can be logged on Website server or the information user that browses web sites.E.g. company Interior employee, or the VIP user of certain internet site.Certain novel website, only supplements VIP with money Afterwards, Website server can be just logged in, info web is checked, VIP user is exactly targeted customer.
Specifically, server obtains the first information of the targeted customer, in the embodiment of the application one, institute State server and check instruction in response to what the target terminal user sent, the server obtains the target The first information of user.The targeted customer input the information such as user name, password, Website login clothes in terminal Business device.As targeted customer has the demand for checking site information, the site information checked, the mesh are wanted in click The terminal that mark user uses sends and checks instruction.
The server obtains the first information of targeted customer, e.g. user's job number, and user identity demonstrate,proves number, Address name, phone number, any one or the combination of several in webpage VIP grades.
The server obtains the first information of targeted customer, can be with direct access, it is also possible to indirect gain.
Specifically, the targeted customer can input the information such as user name password when logging in targeted website.It is described Direct access, can obtain the targeted customer to log in the information being input into during targeted website.For example, described When targeted customer logs in targeted website, comprising use in the information such as login name being input under the prompting of targeted website Family job number, so, server directly can obtain user's job number from the information of targeted customer input.
The indirect gain, such as not comprising required for server in the information of targeted customer's input when logging in The first information, so described server cannot from the targeted customer input information in directly obtain first Information.Server can be inquired about to Subscriber Management System according to the information of user input and obtain the target and use The first information at family.
For example, the first information is user's job number;During User logs in, input is name " Zhang San ", is not wrapped Job number containing the employee.Now, server cannot the direct access first information (should from the information of user input User's job number of employee).Server can be according to the name " Zhang San " of user input to Subscriber Management System Inquire about and obtain user's job number of " Zhang San ", for example, 104.
By the first information, targeted customer can be corresponded to.The first information is in a specific model In enclosing, for example, in intra-company, the first information of Existence and uniquenss, i.e., only corresponds to a targeted customer.
For example, the first information is user's job number.User's job number is usually company according to different departments, difference Position, the character combination that different hiring date etc. is arranged.The use of all employees of same company The rules of arrangement of family job number is the same, so may insure user's job number in in-company uniqueness.Example Such as, job number 150203,15 representative therein is to enter company's registration in 2015, and 02 represents human resources Portion, 03 represents 15 years the 3rd people for entering Human Resource Department, so in this intra-company, does not have The first information (job number) for repeating occurs.
Specifically, server obtains the first information of the targeted customer, in another embodiment of the application, The server periodically obtains the first information of targeted customer.
For example, certain company's site, needs to push company's weekly to the targeted customer weekly.Server according to Built-in clock, the first information of the targeted customer is obtained in regular time weekly.In the company of push week Before report, server extracts the list information for pushing targeted customer, by the list information, obtains described The first information of targeted customer.
S120:Server inquiry in preset rules obtains the volume corresponding to the first information of the acquisition Code mode.
The preset rules, are that the first information is corresponded into coded system, are in the embodiment of the present application by Each bit digital corresponds to coded fonts and is encoded in one information (user's job number), as shown in table 1.
Table 1
First information numeral Coded fonts
0 The Song typeface
1 Black matrix
2 Lishu
3 Microsoft is refined black
4 Regular script
5 Imitation Song-Dynasty-style typeface
6 It is Chinese-language thin black
7 Chinese-language regular script
8 The Chinese-language Song typeface
9 Chinese-language imitation Song-Dynasty-style typeface
Specifically, preset rules as shown in table 1, each numeral a kind of font of correspondence, in the present embodiment In, after server obtains first information user's job number, by the coding corresponding to each bit digital of user's job number Font is all calculated.For example, job number is 104, it is exactly respectively black matrix to calculate coded fonts, the Song typeface, Regular script;During next coding, server is encoded according to coded fonts to targeted website information.
The mapping of numeral and font is one for example, specific rules can be by web editor people in table 1 Member's setting, need to only ensure that the first information is corresponded with coded system.
130:The coded system inquired described in server by utilizing is encoded to targeted website information.
The first information can be corresponded to coded system, Ji Jiang by preset rules as described in Table 1, server Each bit digital in one information corresponds to coded fonts.Server can be using these coded fonts to target Presupposed information position is encoded in website.
In the present embodiment, the length of the presupposed information position can be consistent with first information length, presupposed information Position could be arranged to the preceding first information length digit of every a line.
Information shown in Fig. 2, the first information of targeted customer is user's job number 104.In the present embodiment, in advance If the length of information bit is three characters.Server is right according to the coded system inquired in step S230 Information shown in Fig. 2 is encoded.Preceding 3 characters i.e. to every a line of information shown in Fig. 2 are encoded, It is black matrix, the Song typeface, regular script that the font of these characters is separately encoded.Information after coding as shown in figure 3, The corresponding font of first three character per a line is respectively black matrix, the Song typeface, regular script.
In the application other embodiment, full detail can be encoded, it is also possible to certain to a few rows Several character informations are encoded.In order to not allow the divulge a secret employee of idea to find that its information for browsing has been entered Coding is gone, selection can compare the information of concealed location and encoded as far as possible.
Finally, the information after coding can be returned to the targeted customer by the server.The target User may browse through the information after coding.
Find the use of leakage information in method in the present embodiment, the website that some information can be helped to be compromised Family.Coded system is corresponded to by by user's first information, and information is encoded using coded system, The information for finally being returned after coding to user is browsed for it, can quickly be found out after information is compromised and let out Dew user.
The method of the information coding that following another embodiment of the application is provided, specifically includes following steps:
S210:Server obtains the first information of targeted customer.
S220:Server inquiry in preset rules obtains the volume corresponding to the first information of the acquisition Code mode.
In the present embodiment, the first information of acquisition is converted to server the binary representation side of preset length Formula, the corresponding relation according to table 2, coded system is corresponded to by the first information.
Table 2
First information numeral Coded system
0 Without space
1 Addition space
Specifically, the first information is user's job number, and it is ten's digit representation, server gets use After the job number of family, user's job number is scaled into binary representation mode, i.e. user's job number can be converted into numeral 1 and digital 0 combination.
In order to ensure the uniqueness of coding, the length of the binary representation mode of the first information must be with institute State preset length identical, the preset length as described in curtailment, then to the left with 0 polishing, for example, default length It is 6 to spend, and the binary representation of numeral 6 is 110, and length is 3, not enough preset length, then to the left with 0 Representation after polishing is 000110.
For example, 110 and 110000, in the case that length is differed, to add space or without space Coded system is encoded to site information, the information after coding, may be completely the same, it is impossible to ensure coding Uniqueness.
S230:The coded system inquired described in server by utilizing is encoded to targeted website information, and will Information after coding is sent to the target terminal user.
Preset rules as described in Table 2, server can be by the binary representation of the preset length of the first information Mode corresponds to coded system, and each bit digital that will be in the first information corresponds to addition space or do not add Plus space.The server can be compiled using these coded systems to presupposed information position in targeted website Code.
In the present embodiment, the length of the presupposed information position can be equal to the preset length.
In the present embodiment, the preset length is 6 characters, and presupposed information position could be arranged to every a line Preceding 6 characters.Preceding 6 character of the coded system that server by utilizing is inquired to every a line of site information Encoded, for example, the decimal representation of user's job number is 5, it is that two after 6 enter to be converted into preset length Tabulation is shown as 000101, the coded system of representative be exactly without space, without space, without space, Addition space, adds space, without space.Information as shown in Figure 2, user's job number is 5 company personnel, Read the information.Server calculates binary user job number and is expressed as 000101, root according to user's job number 5 According to preset rules, job number 000101 is corresponded into coded system, i.e., without space, without space, Without space, space is added, space is added, without space, at the 4th of every a line and the 6th Space is added after character, without space after first, second and third, five characters.
Information after coding as shown in Figure 4, the first six character of server to every a line of the site information Encoded, added space per the 4th of a line and after the 6th character in the present embodiment, first, 2nd, without space after three, five characters.
Finally, the information after coding is returned to the targeted customer by server.The targeted customer can be with Browse the information after coding.
Method in the present embodiment can help website that leakage user is quickly found out after information is compromised.
Fig. 5 is the detailed process of the embodiment information of the application one decoding, specifically includes following steps:
S510:Server receives picture to be decoded.
The picture to be decoded, is the picture of the site information of the doubtful leakage that portal management personnel have found.Such as Portal management personnel need to find out the user of leakage site information, the picture to be decoded can be uploaded into institute State server.After portal management user uploads the picture to be decoded, the server can receive described Picture to be decoded.
S520:The server is split and is numbered to the picture to be decoded, and to segmentation with numbering after To be resolved small picture parse obtaining analysis result.
Join Fig. 6, step S520 can specifically include:
S601:The server carries out the picture to be decoded to be divided into several small pictures to be resolved, and Segmentation numbering is carried out to the small picture to be resolved.
In a computer, each picture is made up of many pixels, and each point is exactly 1 pixel, One pixel is exactly a kind of color lump of color, and (i.e. picture size is 100 pictures to such as 10 pixel X10 pixels Element) figure, be exactly in fact to combine per 10, side point (small color lump).
In a computer, one pixel of black white image is with 1 byte representation, for example, the pixel of black It is to be represented by 0, the pixel of white is represented by 1.One pixel of coloured image is with three table of bytes Show, three bytes represent three primary colors (R is red, and G is green, and B is blue) red green blue value of color respectively.In computer, So-called " how many " of RGB refer to just brightness, and are represented using integer.Under normal circumstances, RGB is each There are 256 grades of brightness, be expressed as from 0,1,2... until 255 with numeral.R represents red component, and G is represented Green component, B represents blue component.In each component, numerical value is smaller, and brightness is lower, and numerical value is bigger, bright Degree is higher.For example, the pixel of black is expressed as (0,0,0), i.e. rgb value in colored image It is R=0, G=0, B=0;White pixel point is expressed as (255,255,255) in colored image, And rgb value is R=255, G=255, B=255.
It is after the server receives picture to be decoded, the picture segmentation to be decoded is to be resolved small into several Picture, and the small picture to be resolved is numbered.
The server can be solved according to by picture segmentation to be decoded into several treating comprising character Analyse small picture.For example, the to be resolved small picture shown in Fig. 7, comprising a letter V.
Specifically, the server can scan the white pixel between character and character in picture to be decoded Point is split, for example, in the picture to be decoded, each two character has small―gap suture between up and down, The small―gap suture is constituted by by some rows or several columns white pixel point.The white pixel point, refer to Rgb value is the pixel of (255,255,255).The server be all according to these rgb values (255, 255,255) row or column that pixel is represented is split, by picture segmentation to be decoded into only comprising one The to be resolved small picture of character.If it is pointed out that there is space between character and character, server Automatically the white pixel point shared by space can be divided into an independent to be resolved small picture.Specifically, Representation of the space in picture, is the pixel of N rows and M row whites, space white in picture Row of the numerical value of the row and column of pixel more than the white pixel point of the small―gap suture between above-mentioned character and character With the numerical value of row.Server can automatically identify space according to the line number of white pixel point and columns, and Pixel shared by space is divided into a small picture to be resolved.
The server by the picture segmentation to be decoded into after small picture to be resolved several described, to described Small picture to be resolved is numbered, for example, can be according to from left to right, order from top to bottom is numbered, The character picture number of the first row first row is 1, and the character picture number of the first row secondary series is 2, numbering Can by that analogy, until to last column, last character picture number for arranging terminates.
S602:The server to the segmentation after to be resolved small picture parse obtaining analysis result.
Each described small picture to be resolved is also made up of several pixels, and each pixel has RGB Value.When parsing the small picture to be resolved, the server is by each picture in the small picture to be resolved Vegetarian refreshments, represents, wherein X represents that the pixel is treated described with a three-dimensional array (X, Y, RGB) The line number in small picture is parsed, Y represents columns of the pixel in the small picture to be resolved, RGB Value is exactly the red green blue value of color of the pixel.The pixel of the first row secondary series in Fig. 7, close to white, In computer, its rgb value, for example, (253,252,254).Parse the small picture to be resolved When, the analysis result of the pixel of the first row secondary series is【1,2, (253,252,254)】.Finally, Each small picture to be resolved, the analysis result is the set of several three-dimensional arrays.For example, one is treated Parsing small picture has 5*5 pixel, and finally, the analysis result described in small picture to be resolved, is exactly 25 The set of individual three-dimensional array, for example:
【1,1, (115,88,33)】【1,2, (11,188,133)】【1,3, (112,88, 123)】【Isosorbide-5-Nitrae, (115,77,233)】【1,5, (11,18,23)】
【2,1, (85,212,56)】【2,2, (98,59,53)】【2,3, (255,255,255)】 【2,4, (0,0,0)】【2,5, (96,77,78)】
【3,1, (253,252,254)】【3,2, (1,33,56)】【3,3, (8,255,255)】 【3,4, (0,88,67)】【3,5, (85,0,0)】
【4,1, (196,144,122)】【4,2, (11,56,33)】【4,3, (51,74,0)】 【4,4, (255,255,0)】【4,5, (255,0,89)】
【5,1, (77,88,33)】【5,2, (66,85,0)】【5,3, (11,14,133)】 【5,4, (0,255,255)】【5,5, (5,8,3)】
S530:The server is waited to solve in data base querying according to the number order of small picture to be resolved with described Analyse the corresponding character information of analysis result of small picture.
In the database, the corresponding three-dimensional array set of all character informations is stored.
Compiled with character comprising character (Chinese character, numeral, English, symbol, space etc.) in the character information Code word body.
For example, in database, the character information of the expression of three-dimensional array set as follows is, (word Body:Black matrix, character:With).
【1,1, (110,188,33)】【1,2, (116,188,13)】【1,3, (112,88, 123)】【Isosorbide-5-Nitrae, (115,77,233)】【1,5, (11,18,23)】
【2,1, (85,212,56)】【2,2, (98,59,53)】【2,3, (245,255,255)】 【2,4, (0,0,0)】【2,5, (96,177,78)】
【3,1, (253,252,254)】【3,2, (1,33,56)】【3,3, (8,255,255)】 【3,4, (0,88,67)】【3,5, (85,255,0)】
【4,1, (196,144,122)】【4,2, (11,56,33)】【4,3, (51,74,0)】 【4,4, (255,255,0)】【4,5, (255,255,89)】
【5,1, (77,88,33)】【5,2, (66,85,0)】【5,3, (11,14,133)】 【5,4, (0,255,255)】【5,5, (5,8,3)】
The server is to be resolved small with described in data base querying according to the number order of small picture to be resolved The corresponding character information of analysis result of picture.
Picture to be decoded as shown in Figure 3, is divided into after some small pictures, the character of the first row first row " and " where the numbering of to be resolved small picture be 1, the three-dimensional array for obtaining of parsing is【1,1, (110, 188,33)】【1,2, (116,188,13)】【1,3, (112,88,123)】【Isosorbide-5-Nitrae, (115, 77,233)】【1,5, (11,18,23)】
【2,1, (85,212,56)】【2,2, (98,59,53)】【2,3, (245,255,255)】 【2,4, (0,0,0)】【2,5, (96,177,78)】
【3,1, (253,252,254)】【3,2, (1,33,56)】【3,3, (8,255,255)】 【3,4, (0,88,67)】【3,5, (85,255,0)】
【4,1, (196,144,122)】【4,2, (11,56,33)】【4,3, (51,74,0)】 【4,4, (255,255,0)】【4,5, (255,255,89)】
【5,1, (77,88,33)】【5,2, (66,85,0)】【5,3, (11,14,133)】 【5,4, (0,255,255)】【5,5, (5,8,3)】
The server inquires about the corresponding character information of the three-dimensional array in database, can inquire about To (font:Black matrix, character:With).Finally, the server obtains the solution of all small pictures to be resolved The corresponding character information of analysis result.
S540:The server extracts the corresponding character information of analysis result of the small picture to be resolved In effective information, and the effective information is mapped as the first information according to preset rules.
The effective information, can be one or two in the font or character included in the character information Combination.
In the embodiment of the application one, the effective information is font.
The server, extracts the corresponding effective information (font) of character of the presupposed information position, Preset rules according to table 1, the first information is mapped as by the effective information (font).Example Such as, in the present embodiment, Fig. 3 is picture to be decoded, and the presupposed information position is first three character of every a line, The corresponding effective information (font) of first three character of the every a line of the server extraction is respectively black matrix, The Song typeface, regular script, according to the preset rules of table 1, maps out the first information i.e. user's job number 104.
In the another embodiment of the application, the effective information that the server is extracted is character.
The server extracts the corresponding effective information (character) of the small picture to be resolved, and judges each Whether there is space character after the character of the unblank of capable preceding described preset length, according to the preset rules of table 2, Numeral 1 is mapped as if any space, no space is mapped as numeral 0, can obtain length is preset length 1 Combination with 0, described 1 and 0 combination is exactly the binary representation mode of the first information.Such as Fig. 4 Shown picture to be decoded, the server can be solved, first, second and third, five non-NULLs per a line There is no space, have space after the 4th and the 6th nonspace character after lattice character, according to the preset rules of table 2, The binary representation mode for mapping out the first information is exactly 000101, and it is exactly 5 to be converted to the decimal system, finally may be used It is the user that user's job number is 5 with the user for finding leakage site information.
Method in the present embodiment can help website that leakage user is quickly found out after information is compromised.
The device of the information coding that Fig. 8 is provided for the embodiment of the application one, including:
Acquisition module 800, the first information for obtaining targeted customer;
Enquiry module 810, obtains corresponding to the first information of the acquisition for the inquiry in preset rules Coded system;
Coding module 820, the coded system for being inquired described in is encoded to targeted website information;
Sending module 830, for the information after coding to be sent to the target terminal user.
The device of the information decoding that Fig. 9 is provided for the embodiment of the application one, including:
Receiver module 900, for receiving picture to be decoded.
Parsing module 910, for the picture to be decoded to be split and numbered, and to segmentation and numbering To be resolved small picture afterwards parse obtaining analysis result.
The parsing module 910, can be comprising segmentation module and numbering module:
The segmentation module, for by picture segmentation to be decoded into several small pictures to be resolved;
The numbering module, is numbered for the to be resolved small picture after to segmentation.
Enquiry module 920, treats in data base querying for the number order according to small picture to be resolved with described Parse the corresponding character information of analysis result of small picture.
Mapping block 930, in the corresponding character information of analysis result according to the small picture to be resolved Effective information, the effective information is mapped as the first information according to preset rules.
The effective information, can be one or two in the font or character included in the character information Combination.
The embodiment of the present application provides data encoding information coding method, coding/decoding method and device, by by target The first information of user is converted to coded system, and targeted website information is encoded, so that user browses Site information there is the feature of user.After user's sectional drawing leakage site information, can be revealed by decoding The picture of information, corresponds to the user of leakage site information, facilitates portal management personnel to rapidly find out leakage and uses Family, prevents it from revealing site information again.
In the nineties in 20th century, it is changing on hardware that can clearly be distinguished for the improvement of a technology The improvement entered on (for example, the improvement to circuit structures such as diode, transistor, switches) or software is (right In the improvement of method flow).However, with the development of technology, the improvement of current many method flows is Through directly improving for hardware circuit can be considered as.Designer is nearly all by by improved method flow It is programmed into hardware circuit to obtain corresponding hardware circuit.Therefore, it cannot be said that method flow Improvement cannot be realized with hardware entities module.For example, PLD (Programmable Logic Device, PLD) (for example field programmable gate array (Field Programmable Gate Array, FPGA it is exactly)) such a integrated circuit, its logic function is determined by user to device programming.By setting Meter personnel are voluntarily programmed a digital display circuit " integrated " on a piece of PLD, without asking chip system Manufacturer is made to design and make special IC chip.And, nowadays, substitution manually makes integrated Circuit chip, this programming also uses " logic compiler (logic compiler) " software instead to realize mostly, Software compiler used is similar when it writes with program development, and the source code before compiling also is obtained Write with specific programming language, this is referred to as hardware description language (Hardware Description Language, HDL), and HDL is also not only a kind of, but have many kinds, such as ABEL (Advanced Boolean Expression Language)、AHDL(Altera Hardware Description Language)、 Confluence、CUPL(Cornell University Programming Language)、HDCal、JHDL (Java Hardware Description Language)、Lava、Lola、MyHDL、PALASM、RHDL (Ruby Hardware Description Language) etc., that most commonly use at present is VHDL (Very-High-Speed Integrated Circuit Hardware Description Language) with Verilog.Those skilled in the art also will be apparent to the skilled artisan that and only need to method flow with above-mentioned several hardware descriptions Language slightly programming in logic and is programmed into integrated circuit, it is possible to is readily available and is realized the logical method stream The hardware circuit of journey.
Controller can be implemented in any suitable manner, for example, controller can take such as microprocessor Or processor and storage can be by computer readable program code (such as softwares of (micro-) computing device Or firmware) computer-readable medium, gate, switch, application specific integrated circuit (Application Specific Integrated Circuit, ASIC), the form of programmable logic controller (PLC) and embedded microcontroller, controller Example include but is not limited to following microcontroller:ARC 625D、Atmel AT91SAM、Microchip PIC18F26K20 and Silicone Labs C8051F320, Memory Controller is also implemented as depositing A part for the control logic of reservoir.It is also known in the art that except with pure computer-readable program Code means are realized beyond controller, can cause to control by the way that method and step is carried out into programming in logic completely Device is with the shape of gate, switch, application specific integrated circuit, programmable logic controller (PLC) and embedded microcontroller etc. Formula realizes identical function.Therefore this controller is considered a kind of hardware component, and to bag in it The structure that the device for realizing various functions for including can also be considered as in hardware component.Or even, can be with To be used to realizing that the device of various functions is considered as not only being the software module of implementation method but also can be hardware Structure in part.
System, device, module or unit that above-described embodiment is illustrated, specifically can be by computer chip or reality Body is realized, or is realized by the product with certain function.
For convenience of description, it is divided into various units with function during description apparatus above to describe respectively.Certainly, The function of each unit can be realized in same or multiple softwares and/or hardware when the application is implemented.
It should be understood by those skilled in the art that, embodiments of the invention can be provided as method, system or meter Calculation machine program product.Therefore, the present invention can be using complete hardware embodiment, complete software embodiment or knot Close the form of the embodiment in terms of software and hardware.And, the present invention can be used and wherein wrapped at one or more Containing computer usable program code computer-usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) on implement computer program product form.
The present invention is produced with reference to method according to embodiments of the present invention, equipment (system) and computer program The flow chart and/or block diagram of product is described.It should be understood that can by computer program instructions realize flow chart and / or block diagram in each flow and/or the flow in square frame and flow chart and/or block diagram and/ Or the combination of square frame.These computer program instructions to all-purpose computer, special-purpose computer, insertion can be provided The processor of formula processor or other programmable data processing devices is producing a machine so that by calculating The instruction of the computing device of machine or other programmable data processing devices is produced for realizing in flow chart one The device of the function of being specified in individual flow or multiple one square frame of flow and/or block diagram or multiple square frames.
These computer program instructions may be alternatively stored in can guide computer or the treatment of other programmable datas to set In the standby computer-readable memory for working in a specific way so that storage is in the computer-readable memory Instruction produce include the manufacture of command device, the command device realization in one flow of flow chart or multiple The function of being specified in one square frame of flow and/or block diagram or multiple square frames.
These computer program instructions can be also loaded into computer or other programmable data processing devices, made Obtain and series of operation steps is performed on computer or other programmable devices to produce computer implemented place Reason, so as to the instruction performed on computer or other programmable devices is provided for realizing in flow chart one The step of function of being specified in flow or multiple one square frame of flow and/or block diagram or multiple square frames.
In a typical configuration, computing device includes one or more processors (CPU), input/defeated Outgoing interface, network interface and internal memory.
Internal memory potentially includes the volatile memory in computer-readable medium, random access memory And/or the form, such as read-only storage (ROM) or flash memory (flash RAM) such as Nonvolatile memory (RAM). Internal memory is the example of computer-readable medium.
Computer-readable medium includes that permanent and non-permanent, removable and non-removable media can be by appointing What method or technique realizes information Store.Information can be computer-readable instruction, data structure, program Module or other data.The example of the storage medium of computer includes, but are not limited to phase transition internal memory (PRAM), static RAM (SRAM), dynamic random access memory (DRAM), its The random access memory (RAM) of his type, read-only storage (ROM), electrically erasable are read-only Memory (EEPROM), fast flash memory bank or other memory techniques, read-only optical disc read-only storage (CD-ROM), digital versatile disc (DVD) or other optical storages, magnetic cassette tape, tape magnetic Disk storage or other magnetic storage apparatus or any other non-transmission medium, can be used for storage can be calculated The information that equipment is accessed.Defined according to herein, computer-readable medium does not include temporary computer-readable matchmaker Body (transitory media), such as data-signal and carrier wave of modulation.
Also, it should be noted that term " including ", "comprising" or its any other variant be intended to non-row His property is included, so that process, method, commodity or equipment including a series of key elements not only include Those key elements, but also other key elements including being not expressly set out, or also include for this process, Method, commodity or the intrinsic key element of equipment.In the absence of more restrictions, by sentence " including One ... " key element that limits, it is not excluded that in the process including the key element, method, commodity or set Also there is other identical element in standby.
It will be understood by those skilled in the art that embodiments herein can be provided as method, system or computer journey Sequence product.Therefore, the application can using complete hardware embodiment, complete software embodiment or combine software and The form of the embodiment of hardware aspect.And, the application can be used and wherein include calculating at one or more Machine usable program code computer-usable storage medium (including but not limited to magnetic disk storage, CD-ROM, Optical memory etc.) on implement computer program product form.
The application can be described in the general context of computer executable instructions, example Such as program module.Usually, program module includes performing particular task or realizes particular abstract data type Routine, program, object, component, data structure etc..This can also in a distributed computing environment be put into practice Application, in these DCEs, by the remote processing devices connected by communication network come Execution task.In a distributed computing environment, program module may be located at including local including storage device In remote computer storage medium.
Each embodiment in this specification is described by the way of progressive, identical phase between each embodiment As part mutually referring to, what each embodiment was stressed be it is different from other embodiment it Place.For especially for system embodiment, because it is substantially similar to embodiment of the method, so description Fairly simple, the relevent part can refer to the partial explaination of embodiments of method.
Embodiments herein is the foregoing is only, the application is not limited to.For this area skill For art personnel, the application can have various modifications and variations.All institutes within spirit herein and principle Any modification, equivalent substitution and improvements of work etc., within the scope of should be included in claims hereof.

Claims (13)

1. a kind of information coding method, it is characterised in that including:
Server obtains the first information of targeted customer;
Server inquiry in preset rules obtains the coding staff corresponding to the first information of the acquisition Formula;
The coded system inquired described in server by utilizing is encoded to targeted website information.
2. the method for claim 1, it is characterised in that the server obtains the target and uses The first information at family, including:
Instruction is checked in response to what target terminal user sent, server obtains first letter of the targeted customer Breath;
Or,
Server periodically obtains the first information of targeted customer.
3. the method for claim 1, it is characterised in that the preset rules include:
Character in the first information is corresponded into different fonts.
4. method as claimed in claim 3, it is characterised in that inquired described in the server by utilizing Coded system targeted website information is encoded, including:
The coded system inquired described in server by utilizing is compiled to presupposed information position in the information of targeted website Code.
5. method as claimed in claim 4, it is characterised in that inquired described in the server by utilizing Coded system in the information of targeted website presupposed information position encode, including:
The coded system inquired described in server by utilizing by the information of targeted website presupposed information position character It is set to different fonts.
6. method as claimed in claim 5, it is characterised in that the length of the presupposed information position and the One message length is identical.
7. the method for claim 1, it is characterised in that the preset rules include:
In the binary representation mode of the preset length of the first information 0 and 1 is corresponded into addition space or not Addition space.
8. method as claimed in claim 7, it is characterised in that inquired described in the server by utilizing Coded system targeted website information is encoded, including:
0 and 1 and addition space of the server in the binary representation mode of the preset length of the first information Or without space correspondence setting described in whether add after predeterminated position character in the information of targeted website Plus space.
9. method as claimed in claim 8, it is characterised in that the length of the presupposed information position and institute State preset length identical.
10. a kind of information decoding method, it is characterised in that including:
Server receives the picture to be decoded for uploading;
The server is split and is numbered to the picture to be decoded, and is solved with treating after numbering to splitting Analysing small picture parse obtaining analysis result;
The server is to be resolved small with described in data base querying according to the number order of small picture to be resolved The corresponding character information of analysis result of picture;
The server is extracted in the corresponding character information of analysis result of the small picture to be resolved Effective information, and the effective information is mapped as the first information according to preset rules;Effective letter Breath, one or two combination in the font or character that are included in the character information.
11. methods as claimed in claim 10, the server is parsed to the picture to be decoded, It is characterised in that it includes:
The server carries out the picture to be decoded to be divided into several small pictures to be resolved, and to described Small picture to be resolved carries out segmentation numbering;
The server to the segmentation after to be resolved small picture parse obtaining analysis result.
A kind of 12. information coding devices, it is characterised in that including:
Acquisition module, the first information for obtaining targeted customer;
Enquiry module, the coding corresponding to the first information of the acquisition is obtained for the inquiry in preset rules Mode;
Coding module, the coded system for being inquired described in is encoded to targeted website information;
Sending module, for the information after coding to be sent to the target terminal user.
A kind of 13. information decoding devices, it is characterised in that including:
Receiver module, for receiving picture to be decoded;
Parsing module, for the picture to be decoded to be split and is numbered, and to segmentation with numbering after Small picture to be resolved parse obtaining analysis result;
Enquiry module, it is to be resolved with described in data base querying for the number order according to small picture to be resolved The corresponding character information of analysis result of small picture;
Mapping block, having in the corresponding character information of analysis result according to the small picture to be resolved Effect information, the first information is mapped as by the effective information according to preset rules.
CN201510831601.1A 2015-11-25 2015-11-25 A kind of information coding method, coding/decoding method and device Pending CN106789856A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510831601.1A CN106789856A (en) 2015-11-25 2015-11-25 A kind of information coding method, coding/decoding method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510831601.1A CN106789856A (en) 2015-11-25 2015-11-25 A kind of information coding method, coding/decoding method and device

Publications (1)

Publication Number Publication Date
CN106789856A true CN106789856A (en) 2017-05-31

Family

ID=58963536

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510831601.1A Pending CN106789856A (en) 2015-11-25 2015-11-25 A kind of information coding method, coding/decoding method and device

Country Status (1)

Country Link
CN (1) CN106789856A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108259563A (en) * 2017-12-12 2018-07-06 平安普惠企业管理有限公司 Data cache method, device, server and storage medium
CN110321675A (en) * 2018-03-29 2019-10-11 中移(苏州)软件技术有限公司 Generation, source tracing method and device based on webpage watermark
CN111191414A (en) * 2019-11-11 2020-05-22 苏州亿歌网络科技有限公司 Page watermark generation method, identification method, device, equipment and storage medium
CN115987682A (en) * 2023-02-02 2023-04-18 浙江网商银行股份有限公司 Data processing method
CN116340909A (en) * 2023-03-31 2023-06-27 北京百度网讯科技有限公司 Information coding method, information tracing method and device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1674055A (en) * 2004-07-26 2005-09-28 刘�东 Text digital water mark technology based on symbol redundancy encoding
CN101031915A (en) * 2004-06-30 2007-09-05 Google公司 Enhanced document browsing with automatically generated links based on user information and context
CN101937438A (en) * 2009-06-30 2011-01-05 富士通株式会社 Method and device for extracting webpage content
CN101980240A (en) * 2010-11-19 2011-02-23 北京巨网汇通信息技术有限公司 Method and equipment for preventing data from being stolen
CN102024028A (en) * 2010-11-22 2011-04-20 百度在线网络技术(北京)有限公司 Method and equipment for distinctly displaying main contents of webpage on mobile terminal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101031915A (en) * 2004-06-30 2007-09-05 Google公司 Enhanced document browsing with automatically generated links based on user information and context
CN1674055A (en) * 2004-07-26 2005-09-28 刘�东 Text digital water mark technology based on symbol redundancy encoding
CN101937438A (en) * 2009-06-30 2011-01-05 富士通株式会社 Method and device for extracting webpage content
CN101980240A (en) * 2010-11-19 2011-02-23 北京巨网汇通信息技术有限公司 Method and equipment for preventing data from being stolen
CN102024028A (en) * 2010-11-22 2011-04-20 百度在线网络技术(北京)有限公司 Method and equipment for distinctly displaying main contents of webpage on mobile terminal

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108259563A (en) * 2017-12-12 2018-07-06 平安普惠企业管理有限公司 Data cache method, device, server and storage medium
CN110321675A (en) * 2018-03-29 2019-10-11 中移(苏州)软件技术有限公司 Generation, source tracing method and device based on webpage watermark
CN111191414A (en) * 2019-11-11 2020-05-22 苏州亿歌网络科技有限公司 Page watermark generation method, identification method, device, equipment and storage medium
CN115987682A (en) * 2023-02-02 2023-04-18 浙江网商银行股份有限公司 Data processing method
CN116340909A (en) * 2023-03-31 2023-06-27 北京百度网讯科技有限公司 Information coding method, information tracing method and device

Similar Documents

Publication Publication Date Title
US11562099B1 (en) Sanitization of content displayed by web-based applications
US11157830B2 (en) Automated customized web portal template generation systems and methods
CN106789856A (en) A kind of information coding method, coding/decoding method and device
CN106605220A (en) Method and system for selective document redaction
EP2472428B1 (en) Response determining device, response determining method, response determining program, recording medium and response determining system
CN103399885B (en) Mining method and device of POI (point of interest) representing images and server
US10395022B2 (en) Access control for a resource
US11079987B2 (en) Creation of component templates
CN106453359A (en) Dedicated cloud desktop for education based on cloud services
CN101526963A (en) Method for identifying web page coding, device and terminal equipment
US20190087442A1 (en) Method and apparatus for displaying map information and storage medium
CN111683098B (en) Anti-crawler method and device, electronic equipment and storage medium
CN110096276A (en) Source of houses displayed page configuration method, equipment, storage medium and device
CN104239067B (en) The preparation method and device of miniature client
CN111309578A (en) Method and device for identifying object
CN111339548B (en) Data processing method and device for anticreep, computer equipment and storage medium
CN108256360A (en) The display methods and terminal of a kind of sensitive information
US9442898B2 (en) Electronic document that inhibits automatic text extraction
CN103902711A (en) Method and system for embedding two-dimension code images into webpages
CN113268949B (en) Form display method and device based on dynamic fields, computer equipment and medium
CN115048599A (en) Enterprise product interface configuration method, device, equipment and medium
CN107016303A (en) A kind of method and device of presentation of information
US20160155034A1 (en) Method and system for providing information from print
CN106708882A (en) Webpage tagging and community sharing system
US11847405B1 (en) Encoding hyperlink data in a printed document

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20200922

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Applicant after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Applicant before: Advanced innovation technology Co.,Ltd.

Effective date of registration: 20200922

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Applicant after: Advanced innovation technology Co.,Ltd.

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Applicant before: Alibaba Group Holding Ltd.

TA01 Transfer of patent application right
RJ01 Rejection of invention patent application after publication

Application publication date: 20170531

RJ01 Rejection of invention patent application after publication