CN108108267A - The restoration methods and device of data - Google Patents

The restoration methods and device of data Download PDF

Info

Publication number
CN108108267A
CN108108267A CN201611063862.4A CN201611063862A CN108108267A CN 108108267 A CN108108267 A CN 108108267A CN 201611063862 A CN201611063862 A CN 201611063862A CN 108108267 A CN108108267 A CN 108108267A
Authority
CN
China
Prior art keywords
decoding
algorithm
coding
encryption algorithm
result
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201611063862.4A
Other languages
Chinese (zh)
Other versions
CN108108267B (en
Inventor
焦惠达
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Gridsum Technology Co Ltd
Original Assignee
Beijing Gridsum Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Gridsum Technology Co Ltd filed Critical Beijing Gridsum Technology Co Ltd
Priority to CN201611063862.4A priority Critical patent/CN108108267B/en
Publication of CN108108267A publication Critical patent/CN108108267A/en
Application granted granted Critical
Publication of CN108108267B publication Critical patent/CN108108267B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1415Saving, restoring, recovering or retrying at system level

Abstract

The invention discloses the restoration methods and device of a kind of data.Wherein, this method includes:Obtain the character string of data to be restored;The character string of data to be restored is encoded respectively using at least one encryption algorithm, obtains the coding result that each encryption algorithm encodes;The coding result encoded successively to each encryption algorithm using at least one decoding algorithm is decoded, and obtains multiple decoding results;Multiple decoding results are matched with the character repertoire to prestore, output meets the decoding result of preset condition.The present invention solves the technical issues of existing mess code restoration methods need to know the coding rule of mess code.

Description

The restoration methods and device of data
Technical field
The present invention relates to field of computer data processing, in particular to the restoration methods and device of a kind of data.
Background technology
With the development of computer network, the electronic equipments such as computer, mobile phone have become what is be unable to do without for people's lives with work Carry-on instrument.But when computer or some electronic document of mobile phone open or some webpage is used, often it is present with unrest The situation that code, the page cannot normally be shown, this is because different systems, different application software take coding rule to Chinese character (for example, UTF-8, UTF-16 big end, UTF-16 small ends, GBK, GB2312 etc.) is different, when character data in different software and is When being transferred between system, not corresponding character set is used to be decoded source data, thus the Chinese character of display can be caused to become disorderly Code.
At present, recovered for the data of code error, the scheme that the prior art uses is mainly according to Chinese Random Code Coding mode is converted.And it needs to know the coding mode of Chinese Random Code using existing code error restoration methods, ability Chinese Random Code is recovered.
For it is above-mentioned the problem of, currently no effective solution has been proposed.
The content of the invention
An embodiment of the present invention provides the restoration methods and device of a kind of data, at least to solve existing mess code recovery side The technical issues of method needs to know the coding rule of mess code.
One side according to embodiments of the present invention provides a kind of restoration methods of data, including:Obtain number to be restored According to character string;The character string of data to be restored is encoded respectively using at least one encryption algorithm, obtains each coding The coding result that algorithm coding obtains;The coding knot encoded successively to each encryption algorithm using at least one decoding algorithm Fruit is decoded, and obtains multiple decoding results;Multiple decoding results are matched with the character repertoire to prestore, output meets default The decoding result of condition.
Further, encryption algorithm and decoding algorithm are the algorithm based on different coding rule, wherein, coding rule is at least Including it is following any two:UTF-8, UTF-16 big end, UTF-16 small ends, GBK and GB2312.
Further, the character string of data to be restored is encoded respectively using at least one encryption algorithm, obtained every The coding result that kind encryption algorithm encodes, including:Judge whether encryption algorithm is used encryption algorithm;If coding Algorithm is not used encryption algorithm, then the character string of data to be restored is encoded using encryption algorithm, is obtained corresponding Coding result;Encryption algorithm is labeled as used encryption algorithm;All encryption algorithms are traveled through, until by all volumes Code algorithm is collectively labeled as used encryption algorithm.
Further, the coding result that each encryption algorithm encodes is carried out successively using at least one decoding algorithm Decoding, obtains multiple decoding results, including:Based on each encryption algorithm, judge whether decoding algorithm is that used decoding is calculated Method;If decoding algorithm is not used decoding algorithm, the coding knot that is obtained using decoding algorithm to each encryption algorithm Fruit is decoded, and obtains corresponding decoding result;Decoding algorithm is labeled as used decoding algorithm;Travel through all decodings Algorithm, until all decoding algorithms are collectively labeled as used decoding algorithm.
Further, multiple decoding results are matched with the character repertoire to prestore, output meets the decoding of preset condition As a result include:Character in multiple decoding results with the multiple characters stored in character repertoire is matched, is counted from character repertoire In be successfully matched to the number of characters of character;Accounting of the calculating character number in all characters of decoding result;Judge decoding Whether accounting as a result is more than predetermined threshold value;If the accounting of decoding result is more than predetermined threshold value, decoding result is exported.
Further, if multiple decoding results matched with the character to prestore, the solution of preset condition is not met Code is as a result, then export the prompt message that data to be restored recover failure.
Another aspect according to embodiments of the present invention additionally provides a kind of recovery device of data, including:Acquisition module, For obtaining the character string of data to be restored;First coding module, for using at least one encryption algorithm respectively to be restored The character string of data is encoded, and obtains the coding result that each encryption algorithm encodes;First decoder module, for using The coding result that at least one decoding algorithm successively encodes each encryption algorithm is decoded, and obtains multiple decoding knots Fruit;First output module, for multiple decoding results and the character repertoire to prestore to be carried out matching treatment, output meets preset condition Decoding result.
Further, encryption algorithm and decoding algorithm are the algorithm based on different coding rule, wherein, coding rule is at least Including it is following any two:UTF-8, UTF-16 big end, UTF-16 small ends, GBK and GB2312.
Further, above-mentioned first coding module includes:First judgment module, for judging whether encryption algorithm is use The encryption algorithm crossed;Second coding module, if not being used encryption algorithm for encryption algorithm, using encryption algorithm The character string of data to be restored is encoded, obtains corresponding coding result;First mark module, for by encryption algorithm mark It is denoted as used encryption algorithm;First circulation module, for traveling through all encryption algorithms, until by all encryption algorithms It is collectively labeled as used encryption algorithm.
Further, above-mentioned first decoder module includes:Second judgment module for being based on each encryption algorithm, judges Whether decoding algorithm is used decoding algorithm;Second decoder module, if not being used decoding for decoding algorithm Algorithm, the then coding result obtained using decoding algorithm to each encryption algorithm are decoded, and obtain corresponding decoding result;The Two mark modules, for decoding algorithm to be labeled as used decoding algorithm;Second circulation module, for traveling through all solutions Code algorithm, until all decoding algorithms are collectively labeled as used decoding algorithm.
Further, above-mentioned first output module includes:Comparing module, for by the character and word in multiple decoding results The multiple characters stored in Fu Ku are matched, and count the number of characters that character is successfully matched to from decoding result;Calculate mould Block, for accounting of the calculating character number in all characters of decoding result;Judgment module, for judging accounting for for decoding result Than whether being more than predetermined threshold value;Second output module if being more than predetermined threshold value for the accounting of decoding result, exports decoding As a result.
Further, above device further includes:3rd output module, if for by multiple decoding results and the word that prestores Fu Ku is matched, and does not meet the decoding result of preset condition, then exports the prompt message that data to be restored recover failure.
In embodiments of the present invention, by obtaining the character strings of data to be restored;Distinguished using at least one encryption algorithm The character string of data to be restored is encoded, obtains the coding result that each encryption algorithm encodes;Using at least one The coding result that decoding algorithm successively encodes each encryption algorithm is decoded, and obtains multiple decoding results;It will be multiple Decoding result is matched with the character repertoire to prestore, and output meets the decoding result of preset condition, has reached and has automatically attempted to be based on The purpose that the character string of mess code is converted in the combination of the encryption algorithm and decoding algorithm of all coding rules, so as to fulfill The technique effect that the character string of mess code is recovered automatically, and then solve existing mess code restoration methods and need to know unrest The technical issues of coding rule of code.
Description of the drawings
Attached drawing described herein is used for providing a further understanding of the present invention, forms the part of the application, this hair Bright schematic description and description does not constitute improper limitations of the present invention for explaining the present invention.In the accompanying drawings:
Fig. 1 is a kind of restoration methods flow chart of data according to embodiments of the present invention;
Fig. 2 is a kind of restoration methods flow chart of optional data according to embodiments of the present invention;
Fig. 3 is a kind of restoration methods flow chart of optional data according to embodiments of the present invention;
Fig. 4 is a kind of restoration methods flow chart of optional data according to embodiments of the present invention;
Fig. 5 is a kind of preferred mess code recovery device schematic diagram according to embodiments of the present invention;
Fig. 6 is a kind of preferred mess code restoration methods flow chart according to embodiments of the present invention;And
Fig. 7 is a kind of recovery device schematic diagram of data according to embodiments of the present invention.
Specific embodiment
In order to which those skilled in the art is made to more fully understand the present invention program, below in conjunction in the embodiment of the present invention The technical solution in the embodiment of the present invention is clearly and completely described in attached drawing, it is clear that described embodiment is only The embodiment of a part of the invention, instead of all the embodiments.Based on the embodiments of the present invention, ordinary skill people Member's all other embodiments obtained without making creative work should all belong to the model that the present invention protects It encloses.
It should be noted that term " first " in description and claims of this specification and above-mentioned attached drawing, " Two " etc. be the object for distinguishing similar, without being used to describe specific order or precedence.It should be appreciated that it so uses Data can exchange in the appropriate case, so as to the embodiment of the present invention described herein can with except illustrating herein or Order beyond those of description is implemented.In addition, term " comprising " and " having " and their any deformation, it is intended that cover Cover it is non-exclusive include, be not necessarily limited to for example, containing the process of series of steps or unit, method, system, product or equipment Those steps or unit clearly listed, but may include not list clearly or for these processes, method, product Or the intrinsic other steps of equipment or unit.
First, the part noun or term occurred during the embodiment of the present application is described is suitable for following solution It releases:
Character:Single Chinese character, symbol or letter, such as " you ", " 3 ", " W " (being free of double quotation marks) are character.
Character string:Character string is made of multiple characters, and such as " hello ", " 2016 " are character string.
Coding rule:Character is expressed as binary system, character and binary correspondence in computer-internal and is advised for coding Then, also it is character code.Such as, " tight " is encoded according to UTF-8 coding rules, corresponding to be represented in binary as 11100100 10111000 10100101。
Coding:According to certain coding rule, character or character string are converted into binary system, e.g., " tight " is encoded according to UTF-8 Rule can be encoded to 1,100,100 10,111,000 10100101.
Decoding:It is character or character string by Binary Conversion according to certain coding rule
Heuristic:Heuristic refers to a kind of rule of thumb rule that people is taken when solving the problems, such as and is found Method.Its main feature is that when solving the problems, such as, using past experience, effective method rather than system are selected Ground goes to seek answer with definite step.Specifically, in the embodiment of the present application, it is to judge according to word frequency is commonly used Whether convert correctly rather than by some specific algorithm.
Embodiment 1
According to embodiments of the present invention, a kind of restoration methods embodiment of data is provided, it is necessary to illustrate, in attached drawing The step of flow illustrates can perform in the computer system of such as a group of computer-executable instructions, although also, Logical order is shown in flow chart, but in some cases, it can perform shown with the order being different from herein or retouch The step of stating.
Fig. 1 is a kind of restoration methods flow chart of data according to embodiments of the present invention, as shown in Figure 1, this method includes Following steps:
Step S102 obtains the character string of data to be restored.
Specifically, in above-mentioned steps, above-mentioned data to be restored can be as a result of unmatched with coding mode Computer data of the decoding process without correctly showing or being shown as mess code, including with various forms such as text, picture, forms The data of presentation;Above-mentioned character string can be one or more characters in a computer (for example, letter, number, Chinese character or symbol Number) combination, before recovering to data to be restored, first have to obtain the character string of data to be restored.
In a kind of optional embodiment, above-mentioned data to be restored can be Chinese Random Code, can pass through webpage (Web ends) Mode or application client) mode obtain the character strings of data to be restored.
Step S104 respectively encodes the character string of data to be restored using at least one encryption algorithm, obtains every The coding result that kind encryption algorithm encodes.
Specifically, in above-mentioned steps, above-mentioned encryption algorithm can be computer to identify, store and process various words Symbol, and encode used algorithm according to certain coding rule to character, common coding rule include ASCII codings, GB2312 codings (simplified form of Chinese Character), GBK codings, BIG5 (Chinese-traditional), ANSI coding, UTF-16 and UTF-8 codings etc.;It is above-mentioned Data to be restored can be as a result of random without correctly showing or being shown as with the unmatched decoding process of coding mode The computer data of code, including the data presented with various forms such as text, picture, forms;Above-mentioned coding result can be meter The data that calculation machine can identify, for example, binary data;After the character string (for example, Chinese Random Code) of data to be restored is obtained, The character string of data to be restored is encoded respectively according at least one encryption algorithm, obtains the meter based on each encryption algorithm The data that calculation machine can identify.
It, can be big according to UTF-8, UTF-16 by taking data to be restored are Chinese Random Code as an example in a kind of optional embodiment Multiple common Chinese character coding rules such as end, UTF-16 small ends, GBK, GB2312, by the character string of the data to be restored received Encoded, coding the result is that the binary data that computer can identify.
Step S106 successively carries out the coding result that each encryption algorithm encodes using at least one decoding algorithm Decoding, obtains multiple decoding results.
Specifically, in above-mentioned steps, above-mentioned decoding algorithm can be computer by internal according to certain coding rule The binary data of coding is decoded as the algorithm of corresponding character, and common coding rule includes ASCII codings, GB2312 codings (simplified form of Chinese Character), GBK coding, BIG5 (Chinese-traditional), ANSI coding, UTF-16 and UTF-8 codings etc.;Above-mentioned decoding result can Computer is thought by the internal decoded respective symbols of binary data encoded according to certain coding rule, these characters may For the character correctly shown, it is also possible to for the character of mistake display.
In a kind of optional embodiment, by data to be restored for exemplified by Chinese Random Code, can according to UTF-8, UTF-16, The string encoding of the data to be restored received is computer capacity by multiple common Chinese character coding rules such as GBK, GB2312 After the binary data enough identified, binary data is converted into corresponding character according still further to the decoding algorithm of certain coding rule String.
Herein it should be noted that above-mentioned encryption algorithm can be the encryption algorithm based on any coding rule, on It can be the decoding algorithm based on any coding rule to state decoding algorithm.For foregoing based on each coding rule Encryption algorithm will attempt the decoding algorithm based on all coding rules and be decoded.
Step S108 matches multiple decoding results with the character repertoire to prestore, and output meets the decoding of preset condition As a result.
Specifically, in above-mentioned steps, above-mentioned decoding result can be computer by internal according to certain coding rule The decoded respective symbols of binary data of coding, these characters may be the character correctly shown, it is also possible to for mistake display Character;Using the decoding algorithm based on all coding rules successively to the coding result that each encryption algorithm encodes into Row decoding, after obtaining multiple decoding results, due to that may be correct character string in decoding result, it is also possible to for the character of mistake String, multiple decoding results are matched with the character repertoire to prestore, and judge whether decoding result meets preset condition, finally will The decoding result for meeting preset condition is exported and shown.
In a kind of optional embodiment, above-mentioned character repertoire may be employed《Modern Chinese commonly used word table》In all Chinese it is normal Use word.
It is to be restored obtaining based on scheme disclosed in above-mentioned steps S102 to S108 in a kind of optional embodiment Data character string (for example, mess code) after, coding based on any one coding rule (for example, UTF-8) may be employed and calculate Method encodes the mess code, obtains coding result (for example, binary data) corresponding with the mess code, and reselection removes the coding The decoding algorithm of another coding rule (for example, UTF-16 big ends) beyond rule, obtained binary data is solved Code if the decoding result that decoding obtains meets preset condition, exports the decoding result, and stops execution procedures;If solution The decoding result that code obtains does not meet preset condition, then reselects except coding rule (UTF-8) and used coding rule The then solution of another coding rule (for example, any one in UTF-16 small ends, GBK and GB2312) beyond (UTF-16 big ends) Obtained binary data is decoded by code algorithm, and whether the decoding result judged meets preset condition, if meeting pre- If condition, then qualified decoding result is exported, and stopped execution procedures, if still ineligible, it tries other volumes The decoding algorithm of code rule, the decoding algorithm until traveling through all coding rules in addition to coding rule (UTF-8).
The binary data encoded if based on the encryption algorithm of a certain coding rule of above-mentioned selection to mess code Afterwards, after the decoding algorithm for traveling through all coding rules in addition to the coding rule, the solution for meeting preset condition is not all obtained Code is as a result, then reselect another coding rule (for example, it may be the UTF-16 big ends, UTF-16 in addition to UTF-8 are small Any one in end, GBK and GB2312) encryption algorithm mess code is encoded to obtain binary data, for selecting again The encryption algorithm selected attempts the decoding algorithms of other coding rules in addition to the coding rule binary system to obtaining successively Data are decoded, and whether the decoding result judged meets preset condition, will be qualified if meeting preset condition Decoding result exports, and stops execution procedures;If still ineligible, the encryption algorithm pair of other coding rules is reselected Mess code is encoded, until traveling through the encryption algorithm based on all coding rules.
In another optional embodiment, based on scheme disclosed in above-mentioned steps S102 to S108, treated in acquisition extensive After the character string (for example, mess code) of multiple data, can the encryption algorithm based on all coding rules mess code encode To binary data, the binary data then encoded for the encryption algorithm of each coding rule, using except the coding The decoding algorithm of other all coding rules beyond rule is successively decoded obtained binary data, finally will decoding Meet the decoding result output of preset condition in obtained multiple decoding results.
From the foregoing, it will be observed that in the above embodiments of the present application, by way of webpage (Web ends) or application client) Mode obtain the character string of mess code, then using at least one encryption algorithm respectively by the string encoding of the mess code got Be converted to binary data, then using one or more decoding algorithms successively to encoded based on each encryption algorithm two into Data processed are decoded as corresponding character string, and finally all decoded character strings are compared with the character repertoire to prestore, will accord with The character string for closing preset condition is exported and shown, has been reached and has been automatically attempted to the encryption algorithm based on all coding rules and decoding calculation The purpose that the character string of mess code is converted in the combination of method, it is achieved thereby that the character string of mess code is recovered automatically Technique effect, and then solve the technical issues of existing mess code restoration methods need to know the coding rule of mess code.
As a kind of optional embodiment, above-mentioned encryption algorithm is the calculation based on different coding rule with above-mentioned decoding algorithm Method, wherein, coding rule include at least it is following any two:UTF-8, UTF-16 big end, UTF-16 small ends, GBK and GB2312.
As a kind of optional embodiment, as shown in Fig. 2, being distinguished in above-mentioned steps S104 using at least one encryption algorithm The character string of data to be restored is encoded, obtains the coding result that each encryption algorithm encodes, can be included as follows Step:
Step S202 judges whether encryption algorithm is used encryption algorithm;
Step S204, if encryption algorithm is not used encryption algorithm, using encryption algorithm to data to be restored Character string encoded, obtain corresponding coding result;
Encryption algorithm is labeled as used encryption algorithm by step S206;
Step S208 travels through all encryption algorithms, until all encryption algorithms are collectively labeled as used coding Algorithm.
Specifically, in above-mentioned steps, using at least one encryption algorithm respectively to the character strings of data to be restored into During row coding, it can select arbitrarily to carry out the character string of data to be restored based on the encryption algorithm of any one coding rule Coding, and judge that the encryption algorithm is to have been used for encoded character string to be restored.If the encryption algorithm by with In the character string of encoded data to be restored, then the character string of data to be restored is encoded using another encryption algorithm; If the encryption algorithm is not applied to the character string of encoded data to be restored, using encryption algorithm by data to be restored Character string is encoded.Use each time encryption algorithm by data encoding to be restored for corresponding binary data after, will this The secondary encryption algorithm used is labeled as used encryption algorithm.All encryption algorithms are traveled through, until all codings will be based on The encryption algorithm of rule is collectively labeled as used encryption algorithm, i.e. using all coding rules to the character of mess code String carried out coding, obtained multiple coding results based on a variety of encryption algorithms.
Pass through above-described embodiment, it is ensured that the character string of mess code is encoded based on all coding rules, also, It is extensive for encoding to reduce mess code by repeatedly to avoid when the character string for a mess code is encoded some coding rule The effect of complex velocity.
As a kind of optional embodiment, as shown in figure 3, in above-mentioned steps S106 using at least one decoding algorithm successively The coding result encoded to each encryption algorithm is decoded, and is obtained multiple decoding results, be may include steps of:
Step S302 based on each encryption algorithm, judges whether decoding algorithm is used decoding algorithm;
Step S304 if decoding algorithm is not used decoding algorithm, calculates each coding using decoding algorithm The coding result that method obtains is encoded, and obtains corresponding decoding result;
Decoding algorithm is labeled as used encryption algorithm by step S306;
Step S308 travels through all decoding algorithms, until all decoding algorithms are collectively labeled as used coding Algorithm.
Specifically, in above-mentioned steps, successively each encryption algorithm is encoded to obtain using at least one decoding algorithm Coding result when being decoded, can select to compile each encryption algorithm based on the decoding algorithm of any one coding rule The coding result that code obtains is decoded, and judges that the decoding algorithm is to have been used for decoding above-mentioned coding result.If The decoding algorithm has been used for decoding above-mentioned coding result, then is solved coding result using another decoding algorithm Code;If the decoding algorithm is not applied to decode above-mentioned coding result, above-mentioned coding result is carried out using decoding algorithm Decoding.After above-mentioned coding result is decoded as corresponding character string using decoding algorithm each time, decoding that this is used Algorithm tag is used decoding algorithm.All decoding algorithms are traveled through, until will be calculated based on the decoding of all coding rules Method is collectively labeled as used decoding algorithm, i.e. all decoding algorithms has been used to carry out decoding to coding result, have been obtained Multiple decoding results based on a variety of decoding algorithms.
Herein it should be noted that for foregoing each coding, to attempt strictly all rules and be decoded.
By above-described embodiment, for the coding result of each encryption algorithm, all decoding algorithms are all traveled through to compiling Code result is decoded, and can realize that any combination for automatically attempting to all encryption algorithms and decoding algorithm carrys out the character to mess code The purpose that string is converted.
In a kind of optional embodiment, it is assumed that the coding rule used is tri- kinds of UTF-8, UTF-16, GBK, then based on this There are three types of the encryption algorithm and decoding algorithm of three kinds of coding rules are each, the encryption algorithm based on these three coding rules is calculated with decoding The combination of method has nine kinds, wherein, the encryption algorithm based on different coding rule has combined six kinds with decoding algorithm, as shown in table 1.
Encryption algorithm of the table 1 based on different coding rule is combined with decoding algorithm
Combine sequence number Encryption algorithm Decoding algorithm
1 UTF-8 UTF-16
2 UTF-8 GBK
3 GBK UTF-8
4 GBK UTF-16
5 UTF-16 UTF-8
6 UTF-16 GBK
Based on above-described embodiment, it is assumed that a certain data to be restored are the character string " Ke Extern Cong Nao Fan Da " of mess code, can be adopted The character string of mess code is recovered with the combination of above-mentioned six kinds of encryption algorithms and decoding algorithm.
First, attempt the character string of mess code is encoded using UTF-8 encryption algorithms, the result encoded be two into Data processed, it is as follows:
11100111101111001000001011100110101000001010101111100111100010001001110011100 1111001000110011001111001011000101110101011111001011001111010101111。
Based on different decoding algorithms, which is decoded according to different modes trial.It is based on when utilizing When the decoding algorithm of GBK coding rules is decoded, the decoded result of the binary data is " Ke Yong Niu Qi Destroy Sheng JunIt may determine that the decoding result is incorrect;When being decoded using the decoding algorithm based on UTF-16 coding rules, The decoded result of the binary data isRen Jin shouldIt may determine that the decoding result is incorrect.Attempt all solutions Code algorithm is decoded the binary data, and decoded result is incorrect (displaying is omited).
Then, attempt to encode the character string of mess code using the encryption algorithm based on GBK coding rules, coding obtains Result for binary data, it is as follows:
11100111101111001001011011100111101000001000000111101000101001111000010011100 1011000100010011001。
Based on different decoding algorithms, which is decoded according to different modes trial.It is based on when utilizing When the decoding algorithm of UTF-16 rules is decoded, the decoded result of the binary data isRubberFeedback ", decoding result is not Correctly;When being decoded using the decoding algorithm based on UTF-8 coding rules, the decoded result of the binary data is " coding rule " if according to preset condition, judges that the decoding result is correct, then exports correct decoding result.
As a kind of optional embodiment, as shown in figure 4, by multiple decoding results and the word to prestore in above-mentioned steps S108 Fu Ku is matched, and output meets the decoding result of preset condition, may include steps of:
Step S402 matches the character in multiple decoding results with the multiple characters stored in character repertoire, statistics The number of characters of character is successfully matched to from character repertoire;
Step S404, accounting of the calculating character number in all characters of decoding result;
Step S406, whether the accounting for judging decoding result is more than predetermined threshold value;
Step S408 if the accounting of decoding result is more than predetermined threshold value, exports decoding result.
Specifically, in above-mentioned steps, above-mentioned character repertoire can be a default character repertoire for including correct characters, one Can be a character repertoire comprising all conventional characters in kind of optional embodiment, using any one encryption algorithm and The combination of decoding algorithm carries out the character string of mess code after being converted to multiple decoding results, by the character in multiple decoding results Matching treatment is carried out with the character stored in the character repertoire that prestores, statistics can be successfully matched to the character of character from character repertoire Number, and ratio shared in matched character character all in each decoding result is calculated successfully, if decoding result The number of characters of middle successful match reaches certain threshold value, then it is assumed that decoding result is correct, which is exported and shown.
Herein it should be noted that scheme disclosed in the above embodiment of the present invention, using heuristic determination methods, for solution Each character in character string after code, judges whether the character belongs to Chinese commonly used word, if the character appears in national language The paperwork committee《Modern Chinese commonly used word table》In, then the character belongs to Chinese commonly used word;Otherwise, which is not belonging to Chinese commonly used word.Finally, the ratio of commonly used word in the character string is counted, if the ratio is more than some threshold value (rule of thumb, threshold It is preferable that value is arranged on 70%~80% effect), then it is assumed that transformed character string is correct, otherwise it is assumed that transformed word Symbol string is incorrect.
Optionally, still by taking above-mentioned data to be restored is the character strings " Ke Extern Cong Nao Fan Da " of mess code as an example, it is based on when using The encryption algorithm of GBK coding rules is encoded the character string of mess code to obtain binary data, and by being based on UTF-8 codings For the decoding algorithm of rule when being decoded, the decoded result of the binary data is " coding rule ", by the decoding result with After commonly used word storehouse matching, the character for finding in the decoding result 100% is commonly used word, then it is assumed that decoding result is correct, will decode As a result export and show.
As a kind of optional embodiment, if multiple decoding results matched with the character to prestore, do not meet The decoding result of preset condition then exports the prompt message that data to be restored recover failure.
In the above-described embodiments, if being combined the encryption algorithm based on all coding rules by mess code with decoding algorithm After character string conversion, do not meet the decoding result of preset condition, then illustrate that mess code recovers failure, output mess code recovers failure Prompt message.
As a preferred embodiment, it can illustrate the above embodiments of the present application with reference to Fig. 5 and Fig. 6, as shown in Figure 5 For a kind of preferred mess code recovery device schematic diagram, which includes:Data read module, coding module, decoder module, inspiration Formula judgment module and output module.A kind of preferred mess code restoration methods flow chart is illustrated in figure 6, as shown in fig. 6, including such as Lower step:
Step S602 reads mess code.
In above-mentioned steps, mess code is read by data read module, it can be in a manner of webpage (Web ends) or using journey Sequence client) mode be read out, the content format of reading is character string.After reading, mess code character string is transferred to subsequently Module is handled.
Step S604, judges whether all coding modes were all attempted.
In above-mentioned steps, judge whether the coding mode based on a variety of coding rules all has been used for encoding mess code For binary data, all have been used for encoding mess code if all of coding mode, then perform step S616;If In the presence of the coding mode being not attempt to, then step S606 is performed.
Step S606 selects a coding mode do not attempted that mess code is encoded to binary data.
In above-mentioned steps, any one coding mode is selected in the coding mode do not attempted, utilizes coding module The character string of mess code is converted into binary data.Coding module receives the character string that aforementioned data read module transmits, According to multiple common Chinese character coding rules such as UTF-8, UTF-16, GBK, GB2312, the character string received is encoded, Coding the result is that binary data.
Step S608, judges whether all decoding processes were all attempted.
In above-mentioned steps, judge whether the decoding process based on a variety of coding rules all has been used for decoding, if All decoding processes all have been used for being decoded binary data, then perform step S604;If there is not tasting The decoding process tried then performs step S610.
Step S610 selects a decoding process do not attempted that binary data is decoded as character.
In above-mentioned steps, any one decoding process is selected in the decoding process do not attempted, utilizes decoder module Binary data is converted into character string.Decoder module receives the binary data that afore-mentioned code module transfer comes, according to The binary data received is decoded by multiple common Chinese character coding rules such as UTF-8, UTF-16, GBK, GB2312, It is decoded the result is that character string.
Herein it should be noted that the coding rule that the coding rule that the decoder module uses is used with afore-mentioned code module It is different.For foregoing each coding, to attempt strictly all rules and be decoded.
Step S612 judges whether transformation result is correct using heuristic.
In above-mentioned steps, judge whether transformed character string is correct using heuristic judgment module.This is heuristic to sentence Disconnected module receives the character string decoded in a manner that foregoing decoder module transmits.For each word in character string Symbol, judges whether the character belongs to Chinese commonly used word, if the character appears in State Language Work Committee《The modern Chinese Language commonly used word table》In, then the character belongs to Chinese commonly used word;Otherwise it is assumed that the character is not belonging to Chinese commonly used word.Finally, unite The ratio of commonly used word in the character string is counted, if the ratio is more than that (rule of thumb, which is arranged on 70%~80% to some threshold value Effect is preferable), then it is assumed that the character string of conversion is correct, otherwise it is assumed that the character string of conversion is incorrect.
Step S614 exports transformation result.
In above-mentioned steps, if the character string of conversion is correct, the character string after being repaired using output module output can By by being exported in a manner of identical with data read module.
Step S616 prompts repairing failure.
In above-mentioned steps, all fail if the attempt to the combination of all encryption algorithms and decoding algorithm carries out mess code reparation, Then export the prompt message of repairing failure.
In scheme disclosed in the above embodiments of the present application, read mess code first, attempt by all coding modes with The combination of decoding process is converted, and transformed character is judged, if correctly, the character after output turn;If It is incorrect, it tries the combination of other encryption algorithms and decoding algorithm was all attempted if all of combination, then explanation turns It changes unsuccessfully.
Following technique effect can be realized by above-described embodiment:Mess code is required no knowledge about when carrying out mess code Fault recovery Original coding, but recovered by attempting various coding modes;Whether judge restoration result using heuristic Correctly, without manually determining, efficiency is very high when character string is more.
Embodiment 2
According to embodiments of the present invention, a kind of recovery device embodiment of data is additionally provided.Number in the embodiment of the present invention 1 According to restoration methods can be performed in the device of the embodiment of the present invention 2.
Fig. 7 is a kind of recovery device schematic diagram of data according to embodiments of the present invention, as shown in fig. 7, the device includes: Acquisition module 701, the first coding module 703, the first decoder module 705 and the first output module 707.
Wherein, acquisition module 701, for obtaining the character string of data to be restored;First coding module 703, for using At least one encryption algorithm respectively encodes the character string of data to be restored, obtains the volume that each encryption algorithm encodes Code result;First decoder module 705, for the volume encoded successively to each encryption algorithm using at least one decoding algorithm Code result is decoded, and obtains multiple decoding results;First output module 707, for by multiple decoding results and the word that prestores Fu Ku carries out matching treatment, and output meets the decoding result of preset condition.
From the foregoing, it will be observed that in the above embodiments of the present application, by way of webpage (Web ends) or application client) Mode obtain the character string of mess code, then using at least one encryption algorithm respectively by the string encoding of the mess code got Be converted to binary data, then using one or more decoding algorithms successively to encoded based on each encryption algorithm two into Data processed are decoded as corresponding character string, and finally all decoded character strings are compared with the character repertoire to prestore, will accord with The character string for closing preset condition is exported and shown, has been reached and has been automatically attempted to the encryption algorithm based on all coding rules and decoding calculation The purpose that the character string of mess code is converted in the combination of method, it is achieved thereby that the character string of mess code is recovered automatically Technique effect, and then solve the technical issues of existing mess code restoration methods need to know the coding rule of mess code.
In a kind of optional embodiment, above-mentioned encryption algorithm is the calculation based on different coding rule with above-mentioned decoding algorithm Method, wherein, coding rule include at least it is following any two:UTF-8, UTF-16 big end, UTF-16 small ends, GBK and GB2312.
In a kind of optional embodiment, above-mentioned first coding module includes:First judgment module, for judging that coding is calculated Whether method is used encryption algorithm;Second coding module, if not being used encryption algorithm for encryption algorithm, The character string of data to be restored is encoded using encryption algorithm, obtains corresponding coding result;First mark module, is used for Encryption algorithm is labeled as used encryption algorithm;First circulation module, for traveling through all encryption algorithms, until by institute Some encryption algorithms are collectively labeled as used encryption algorithm.
In a kind of optional embodiment, above-mentioned first decoder module includes:Second judgment module, for being based on each volume Code algorithm, judges whether decoding algorithm is used decoding algorithm;Second decoder module, if do not made for decoding algorithm Used decoding algorithm, the then coding result obtained using decoding algorithm to each encryption algorithm are decoded, and are obtained corresponding Decoding result;Second mark module, for decoding algorithm to be labeled as used decoding algorithm;Second circulation module, is used for All decoding algorithms are traveled through, until all decoding algorithms are collectively labeled as used decoding algorithm.
In a kind of optional embodiment, above-mentioned first output module includes:Comparing module, for by multiple decoding results In character matched with the multiple characters stored in character repertoire, count the character that character is successfully matched to from decoding result Number;Computing module, for accounting of the calculating character number in all characters of decoding result;Judgment module, for judging Whether the accounting of decoding result is more than predetermined threshold value;Second output module, if being more than default threshold for the accounting of decoding result Value, then export decoding result.
In a kind of optional embodiment, above device further includes:3rd output module, if for multiple decodings to be tied Fruit is matched with the character repertoire to prestore, does not meet the decoding result of preset condition, then exports data to be restored and recover failure Prompt message.
The embodiments of the present invention are for illustration only, do not represent the quality of embodiment.
In the above embodiment of the present invention, all emphasize particularly on different fields to the description of each embodiment, do not have in some embodiment The part of detailed description may refer to the associated description of other embodiment.
In several embodiments provided herein, it should be understood that disclosed technology contents can pass through others Mode is realized.Wherein, the apparatus embodiments described above are merely exemplary, such as the division of the unit, Ke Yiwei A kind of division of logic function, can there is an other dividing mode in actual implementation, for example, multiple units or component can combine or Person is desirably integrated into another system or some features can be ignored or does not perform.Another, shown or discussed is mutual Between coupling, direct-coupling or communication connection can be INDIRECT COUPLING or communication link by some interfaces, unit or module It connects, can be electrical or other forms.
The unit illustrated as separating component may or may not be physically separate, be shown as unit The component shown may or may not be physical location, you can be located at a place or can also be distributed to multiple On unit.Some or all of unit therein can be selected to realize the purpose of this embodiment scheme according to the actual needs.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, it can also That unit is individually physically present, can also two or more units integrate in a unit.Above-mentioned integrated list The form that hardware had both may be employed in member is realized, can also be realized in the form of SFU software functional unit.
If the integrated unit is realized in the form of SFU software functional unit and is independent production marketing or use When, it can be stored in a computer read/write memory medium.Based on such understanding, technical scheme is substantially The part to contribute in other words to the prior art or all or part of the technical solution can be in the form of software products It embodies, which is stored in a storage medium, is used including some instructions so that a computer Equipment (can be personal computer, server or network equipment etc.) perform each embodiment the method for the present invention whole or Part steps.And foregoing storage medium includes:USB flash disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited Reservoir (RAM, Random Access Memory), mobile hard disk, magnetic disc or CD etc. are various can to store program code Medium.
The above is only the preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art For member, various improvements and modifications may be made without departing from the principle of the present invention, these improvements and modifications also should It is considered as protection scope of the present invention.

Claims (10)

1. a kind of restoration methods of data, which is characterized in that including:
Obtain the character string of data to be restored;
The character string of the data to be restored is encoded respectively using at least one encryption algorithm, obtains each encryption algorithm Encode obtained coding result;
The coding result encoded successively to each described encryption algorithm using at least one decoding algorithm is decoded, and is obtained Multiple decoding results;
The multiple decoding result is matched with the character repertoire to prestore, output meets the decoding result of preset condition.
2. according to the method described in claim 1, it is characterized in that, the encryption algorithm and the decoding algorithm are based on difference The algorithm of coding rule, wherein, the coding rule include at least it is following any two:UTF-8, UTF-16 big end, UTF-16 Small end, GBK and GB2312.
3. according to the method described in claim 2, it is characterized in that, using at least one encryption algorithm respectively to described to be restored The character string of data is encoded, and obtains the coding result that each encryption algorithm encodes, including:
Judge whether the encryption algorithm is used encryption algorithm;
If the encryption algorithm is not the used encryption algorithm, using the encryption algorithm to the number to be restored According to character string encoded, obtain corresponding coding result;
The encryption algorithm is labeled as the used encryption algorithm;
All encryption algorithms are traveled through, until all encryption algorithms are collectively labeled as the used encryption algorithm.
4. according to the method described in claim 3, it is characterized in that, using at least one decoding algorithm successively to each described volume The coding result that code algorithm coding obtains is decoded, and obtains multiple decoding results, including:
Based on each described encryption algorithm, judge whether the decoding algorithm is used decoding algorithm;
If the decoding algorithm is not the used decoding algorithm, using the decoding algorithm to each encryption algorithm Obtained coding result is decoded, and obtains corresponding decoding result;
The decoding algorithm is labeled as the used decoding algorithm;
All decoding algorithms are traveled through, until all decoding algorithms are collectively labeled as the used decoding algorithm.
5. according to the method described in claim 1, it is characterized in that, the multiple decoding result and the character repertoire to prestore are carried out Matching, the decoding result that output meets preset condition include:
Character in the multiple decoding result with the multiple characters stored in the character repertoire is matched, is counted from described The number of characters of character is successfully matched in character repertoire;
Calculate accounting of the number of characters in all characters of the decoding result;
Whether the accounting for judging the decoding result is more than predetermined threshold value;
If the accounting of the decoding result is more than predetermined threshold value, the decoding result is exported.
If 6. according to the method described in claim 5, it is characterized in that, by the multiple decoding result and the character that prestores into Row matching does not meet the decoding result of preset condition, then exports the prompt message that data to be restored recover failure.
7. a kind of recovery device of data, which is characterized in that including:
Acquisition module, for obtaining the character string of data to be restored;
First coding module, for being compiled respectively to the character string of the data to be restored using at least one encryption algorithm Code, obtains the coding result that each encryption algorithm encodes;
First decoder module, for the coding encoded successively to each described encryption algorithm using at least one decoding algorithm As a result it is decoded, obtains multiple decoding results;
First output module, for the multiple decoding result and the character repertoire to prestore to be carried out matching treatment, output meets pre- If the decoding result of condition.
8. device according to claim 7, which is characterized in that the encryption algorithm is based on difference with the decoding algorithm The algorithm of coding rule, wherein, the coding rule include at least it is following any two:UTF-8, UTF-16 big end, UTF-16 Small end, GBK and GB2312.
9. device according to claim 8, which is characterized in that first coding module includes:
First judgment module, for judging whether the encryption algorithm is used encryption algorithm;
Second coding module, if not being the used encryption algorithm for the encryption algorithm, using the coding Algorithm encodes the character string of the data to be restored, obtains corresponding coding result;
First mark module, for the encryption algorithm to be labeled as the used encryption algorithm;
First circulation module, for traveling through all encryption algorithms, until all encryption algorithms are collectively labeled as the use The encryption algorithm crossed.
10. device according to claim 9, which is characterized in that first decoder module includes:
Second judgment module for being based on each described encryption algorithm, judges whether the decoding algorithm is used decoding Algorithm;
Second decoder module, if not being the used decoding algorithm for the decoding algorithm, using the decoding The coding result that algorithm obtains each encryption algorithm is decoded, and obtains corresponding decoding result;
Second mark module, for the decoding algorithm to be labeled as the used decoding algorithm;
Second circulation module, it is described until all decoding algorithms are collectively labeled as traveling through all decoding algorithms Used decoding algorithm.
CN201611063862.4A 2016-11-25 2016-11-25 Data recovery method and device Active CN108108267B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611063862.4A CN108108267B (en) 2016-11-25 2016-11-25 Data recovery method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611063862.4A CN108108267B (en) 2016-11-25 2016-11-25 Data recovery method and device

Publications (2)

Publication Number Publication Date
CN108108267A true CN108108267A (en) 2018-06-01
CN108108267B CN108108267B (en) 2021-06-22

Family

ID=62204621

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611063862.4A Active CN108108267B (en) 2016-11-25 2016-11-25 Data recovery method and device

Country Status (1)

Country Link
CN (1) CN108108267B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112151069A (en) * 2020-08-20 2020-12-29 深圳市捷视飞通科技股份有限公司 Voice data processing method and device, computer equipment and storage medium
CN117391070A (en) * 2023-12-08 2024-01-12 和元达信息科技有限公司 Method and system for adjusting random character

Citations (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070253548A1 (en) * 2006-04-28 2007-11-01 Fujitsu Limited Data protection system, method, and program
CN101325467A (en) * 2007-06-14 2008-12-17 杭州华三通信技术有限公司 Method and equipment for transmitting and receiving Ethernet data
CN101763407A (en) * 2009-11-19 2010-06-30 青岛海信移动通信技术股份有限公司 Txt file reading method based on brew platform and reader thereof
CN102722544A (en) * 2012-05-24 2012-10-10 北京国双科技有限公司 Method and device for decoding character strings
CN102799572A (en) * 2012-07-27 2012-11-28 深圳市万兴软件有限公司 Text coding manner and text coding apparatus
CN102880703A (en) * 2012-09-25 2013-01-16 广州市动景计算机科技有限公司 Methods and systems for encoding and decoding Chinese webpage data
CN103092922A (en) * 2012-12-28 2013-05-08 国家计算机网络与信息安全管理中心 Post-coding automatic decoding method aiming at uniform resource locator (URL) comprising special characters
CN103207877A (en) * 2012-01-17 2013-07-17 阿里巴巴集团控股有限公司 Decoding method and device
CN103310255A (en) * 2013-05-31 2013-09-18 曾芝渝 Color character encoding method and decoding method
US20140006897A1 (en) * 2012-06-29 2014-01-02 International Business Machines Corporation Correction of structured burst errors in data
CN103595415A (en) * 2012-08-16 2014-02-19 中兴通讯股份有限公司 Coding method, decoding method, coding system and decoding system
CN103699841A (en) * 2013-12-20 2014-04-02 北京奇虎科技有限公司 Encoding bypassing intercepting method and device
CN104182286A (en) * 2014-06-24 2014-12-03 武汉传神信息技术有限公司 Cross-platform Chinese character messy code recovery method
CN104516862A (en) * 2013-09-29 2015-04-15 北大方正集团有限公司 Method and system for selecting and reading coded format of target document
CN104750666A (en) * 2015-03-12 2015-07-01 明博教育科技有限公司 Text character encoding mode identification method and system
CN105306063A (en) * 2015-10-12 2016-02-03 浙江大学 Optimization and recovery methods for record type data storage space
US20160092300A1 (en) * 2014-09-26 2016-03-31 Intel Corporation Using reliability information from multiple storage units and a parity storage unit to recover data for a failed one of the storage units
CN105472107A (en) * 2014-08-26 2016-04-06 中兴通讯股份有限公司 Terminal information processing method and device
CN105847931A (en) * 2016-03-28 2016-08-10 深圳Tcl新技术有限公司 Subtitle display method and subtitle display device

Patent Citations (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070253548A1 (en) * 2006-04-28 2007-11-01 Fujitsu Limited Data protection system, method, and program
CN101325467A (en) * 2007-06-14 2008-12-17 杭州华三通信技术有限公司 Method and equipment for transmitting and receiving Ethernet data
CN101763407A (en) * 2009-11-19 2010-06-30 青岛海信移动通信技术股份有限公司 Txt file reading method based on brew platform and reader thereof
CN103207877A (en) * 2012-01-17 2013-07-17 阿里巴巴集团控股有限公司 Decoding method and device
CN102722544A (en) * 2012-05-24 2012-10-10 北京国双科技有限公司 Method and device for decoding character strings
US20140006897A1 (en) * 2012-06-29 2014-01-02 International Business Machines Corporation Correction of structured burst errors in data
CN102799572A (en) * 2012-07-27 2012-11-28 深圳市万兴软件有限公司 Text coding manner and text coding apparatus
CN103595415A (en) * 2012-08-16 2014-02-19 中兴通讯股份有限公司 Coding method, decoding method, coding system and decoding system
CN102880703A (en) * 2012-09-25 2013-01-16 广州市动景计算机科技有限公司 Methods and systems for encoding and decoding Chinese webpage data
CN103092922A (en) * 2012-12-28 2013-05-08 国家计算机网络与信息安全管理中心 Post-coding automatic decoding method aiming at uniform resource locator (URL) comprising special characters
CN103310255A (en) * 2013-05-31 2013-09-18 曾芝渝 Color character encoding method and decoding method
CN104516862A (en) * 2013-09-29 2015-04-15 北大方正集团有限公司 Method and system for selecting and reading coded format of target document
CN103699841A (en) * 2013-12-20 2014-04-02 北京奇虎科技有限公司 Encoding bypassing intercepting method and device
CN104182286A (en) * 2014-06-24 2014-12-03 武汉传神信息技术有限公司 Cross-platform Chinese character messy code recovery method
CN105472107A (en) * 2014-08-26 2016-04-06 中兴通讯股份有限公司 Terminal information processing method and device
US20160092300A1 (en) * 2014-09-26 2016-03-31 Intel Corporation Using reliability information from multiple storage units and a parity storage unit to recover data for a failed one of the storage units
CN104750666A (en) * 2015-03-12 2015-07-01 明博教育科技有限公司 Text character encoding mode identification method and system
CN105306063A (en) * 2015-10-12 2016-02-03 浙江大学 Optimization and recovery methods for record type data storage space
CN105847931A (en) * 2016-03-28 2016-08-10 深圳Tcl新技术有限公司 Subtitle display method and subtitle display device

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
闫静等: "应用开发中的中文乱码原因及其解决方案", 《成都信息工程学院学报》 *
陈小瀚: "中文编码原理及其乱码问题的探讨", 《科技信息(科学教研)》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112151069A (en) * 2020-08-20 2020-12-29 深圳市捷视飞通科技股份有限公司 Voice data processing method and device, computer equipment and storage medium
CN112151069B (en) * 2020-08-20 2024-03-15 深圳市捷视飞通科技股份有限公司 Voice data processing method, device, computer equipment and storage medium
CN117391070A (en) * 2023-12-08 2024-01-12 和元达信息科技有限公司 Method and system for adjusting random character
CN117391070B (en) * 2023-12-08 2024-03-22 和元达信息科技有限公司 Method and system for adjusting random character

Also Published As

Publication number Publication date
CN108108267B (en) 2021-06-22

Similar Documents

Publication Publication Date Title
CN103514238B (en) Sensitive word identifying processing method based on classification searching
CN102930192B (en) Security information generates and acquisition methods and relevant apparatus
CN107025239B (en) Sensitive word filtering method and device
CN107070852A (en) Network attack detecting method and device
CN106612172A (en) Data change recovery algorithm capable of restoring data authenticity in cloud storage
CN106682534A (en) Method and device for verifying data integrity in data migration process
CN108197087A (en) Character code recognition methods and device
CN108038484B (en) Method for quickly identifying hollow verification code
CN103415007A (en) Mobile phone two-dimensional code safe use method based on information hiding
CN110275940B (en) Chinese address identification method and equipment
CN107832631A (en) The method for secret protection and system of a kind of data publication
CN108053545A (en) Certificate verification method and apparatus, server, storage medium
CN102194081A (en) Method for hiding natural language information
CN108108267A (en) The restoration methods and device of data
US20160283582A1 (en) Device and method for detecting similar text, and application
CN105045676A (en) Device and method for recovering lost data based on SQLite database
CN103793734B (en) A kind of Quick Response Code segmentation method of calibration
JP6715316B2 (en) Deep Learning Method Applying Hexadecimal Image Conversion and Incremental Learning for Web Traffic Learning
CN104714969A (en) Detection method and device for attribute values
CN108932434B (en) Data encryption method and device based on machine learning technology
CN110390001A (en) A kind of viewpoint type machine reads the implementation method understood, device
CN106803116A (en) A kind of method and device for generating Asset Tag
CN109597987A (en) A kind of text restoring method, device and electronic equipment
WO2016206446A1 (en) Character encoding method and character decoding method having error correction function and product thereof
CN113705164A (en) Text processing method and device, computer equipment and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 100083 No. 401, 4th Floor, Haitai Building, 229 North Fourth Ring Road, Haidian District, Beijing

Applicant after: Beijing Guoshuang Technology Co.,Ltd.

Address before: 100086 Cuigong Hotel, 76 Zhichun Road, Shuangyushu District, Haidian District, Beijing

Applicant before: Beijing Guoshuang Technology Co.,Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant