CN108108267A - The restoration methods and device of data - Google Patents
The restoration methods and device of data Download PDFInfo
- Publication number
- CN108108267A CN108108267A CN201611063862.4A CN201611063862A CN108108267A CN 108108267 A CN108108267 A CN 108108267A CN 201611063862 A CN201611063862 A CN 201611063862A CN 108108267 A CN108108267 A CN 108108267A
- Authority
- CN
- China
- Prior art keywords
- decoding
- algorithm
- coding
- encryption algorithm
- result
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1415—Saving, restoring, recovering or retrying at system level
Abstract
The invention discloses the restoration methods and device of a kind of data.Wherein, this method includes:Obtain the character string of data to be restored;The character string of data to be restored is encoded respectively using at least one encryption algorithm, obtains the coding result that each encryption algorithm encodes;The coding result encoded successively to each encryption algorithm using at least one decoding algorithm is decoded, and obtains multiple decoding results;Multiple decoding results are matched with the character repertoire to prestore, output meets the decoding result of preset condition.The present invention solves the technical issues of existing mess code restoration methods need to know the coding rule of mess code.
Description
Technical field
The present invention relates to field of computer data processing, in particular to the restoration methods and device of a kind of data.
Background technology
With the development of computer network, the electronic equipments such as computer, mobile phone have become what is be unable to do without for people's lives with work
Carry-on instrument.But when computer or some electronic document of mobile phone open or some webpage is used, often it is present with unrest
The situation that code, the page cannot normally be shown, this is because different systems, different application software take coding rule to Chinese character
(for example, UTF-8, UTF-16 big end, UTF-16 small ends, GBK, GB2312 etc.) is different, when character data in different software and is
When being transferred between system, not corresponding character set is used to be decoded source data, thus the Chinese character of display can be caused to become disorderly
Code.
At present, recovered for the data of code error, the scheme that the prior art uses is mainly according to Chinese Random Code
Coding mode is converted.And it needs to know the coding mode of Chinese Random Code using existing code error restoration methods, ability
Chinese Random Code is recovered.
For it is above-mentioned the problem of, currently no effective solution has been proposed.
The content of the invention
An embodiment of the present invention provides the restoration methods and device of a kind of data, at least to solve existing mess code recovery side
The technical issues of method needs to know the coding rule of mess code.
One side according to embodiments of the present invention provides a kind of restoration methods of data, including:Obtain number to be restored
According to character string;The character string of data to be restored is encoded respectively using at least one encryption algorithm, obtains each coding
The coding result that algorithm coding obtains;The coding knot encoded successively to each encryption algorithm using at least one decoding algorithm
Fruit is decoded, and obtains multiple decoding results;Multiple decoding results are matched with the character repertoire to prestore, output meets default
The decoding result of condition.
Further, encryption algorithm and decoding algorithm are the algorithm based on different coding rule, wherein, coding rule is at least
Including it is following any two:UTF-8, UTF-16 big end, UTF-16 small ends, GBK and GB2312.
Further, the character string of data to be restored is encoded respectively using at least one encryption algorithm, obtained every
The coding result that kind encryption algorithm encodes, including:Judge whether encryption algorithm is used encryption algorithm;If coding
Algorithm is not used encryption algorithm, then the character string of data to be restored is encoded using encryption algorithm, is obtained corresponding
Coding result;Encryption algorithm is labeled as used encryption algorithm;All encryption algorithms are traveled through, until by all volumes
Code algorithm is collectively labeled as used encryption algorithm.
Further, the coding result that each encryption algorithm encodes is carried out successively using at least one decoding algorithm
Decoding, obtains multiple decoding results, including:Based on each encryption algorithm, judge whether decoding algorithm is that used decoding is calculated
Method;If decoding algorithm is not used decoding algorithm, the coding knot that is obtained using decoding algorithm to each encryption algorithm
Fruit is decoded, and obtains corresponding decoding result;Decoding algorithm is labeled as used decoding algorithm;Travel through all decodings
Algorithm, until all decoding algorithms are collectively labeled as used decoding algorithm.
Further, multiple decoding results are matched with the character repertoire to prestore, output meets the decoding of preset condition
As a result include:Character in multiple decoding results with the multiple characters stored in character repertoire is matched, is counted from character repertoire
In be successfully matched to the number of characters of character;Accounting of the calculating character number in all characters of decoding result;Judge decoding
Whether accounting as a result is more than predetermined threshold value;If the accounting of decoding result is more than predetermined threshold value, decoding result is exported.
Further, if multiple decoding results matched with the character to prestore, the solution of preset condition is not met
Code is as a result, then export the prompt message that data to be restored recover failure.
Another aspect according to embodiments of the present invention additionally provides a kind of recovery device of data, including:Acquisition module,
For obtaining the character string of data to be restored;First coding module, for using at least one encryption algorithm respectively to be restored
The character string of data is encoded, and obtains the coding result that each encryption algorithm encodes;First decoder module, for using
The coding result that at least one decoding algorithm successively encodes each encryption algorithm is decoded, and obtains multiple decoding knots
Fruit;First output module, for multiple decoding results and the character repertoire to prestore to be carried out matching treatment, output meets preset condition
Decoding result.
Further, encryption algorithm and decoding algorithm are the algorithm based on different coding rule, wherein, coding rule is at least
Including it is following any two:UTF-8, UTF-16 big end, UTF-16 small ends, GBK and GB2312.
Further, above-mentioned first coding module includes:First judgment module, for judging whether encryption algorithm is use
The encryption algorithm crossed;Second coding module, if not being used encryption algorithm for encryption algorithm, using encryption algorithm
The character string of data to be restored is encoded, obtains corresponding coding result;First mark module, for by encryption algorithm mark
It is denoted as used encryption algorithm;First circulation module, for traveling through all encryption algorithms, until by all encryption algorithms
It is collectively labeled as used encryption algorithm.
Further, above-mentioned first decoder module includes:Second judgment module for being based on each encryption algorithm, judges
Whether decoding algorithm is used decoding algorithm;Second decoder module, if not being used decoding for decoding algorithm
Algorithm, the then coding result obtained using decoding algorithm to each encryption algorithm are decoded, and obtain corresponding decoding result;The
Two mark modules, for decoding algorithm to be labeled as used decoding algorithm;Second circulation module, for traveling through all solutions
Code algorithm, until all decoding algorithms are collectively labeled as used decoding algorithm.
Further, above-mentioned first output module includes:Comparing module, for by the character and word in multiple decoding results
The multiple characters stored in Fu Ku are matched, and count the number of characters that character is successfully matched to from decoding result;Calculate mould
Block, for accounting of the calculating character number in all characters of decoding result;Judgment module, for judging accounting for for decoding result
Than whether being more than predetermined threshold value;Second output module if being more than predetermined threshold value for the accounting of decoding result, exports decoding
As a result.
Further, above device further includes:3rd output module, if for by multiple decoding results and the word that prestores
Fu Ku is matched, and does not meet the decoding result of preset condition, then exports the prompt message that data to be restored recover failure.
In embodiments of the present invention, by obtaining the character strings of data to be restored;Distinguished using at least one encryption algorithm
The character string of data to be restored is encoded, obtains the coding result that each encryption algorithm encodes;Using at least one
The coding result that decoding algorithm successively encodes each encryption algorithm is decoded, and obtains multiple decoding results;It will be multiple
Decoding result is matched with the character repertoire to prestore, and output meets the decoding result of preset condition, has reached and has automatically attempted to be based on
The purpose that the character string of mess code is converted in the combination of the encryption algorithm and decoding algorithm of all coding rules, so as to fulfill
The technique effect that the character string of mess code is recovered automatically, and then solve existing mess code restoration methods and need to know unrest
The technical issues of coding rule of code.
Description of the drawings
Attached drawing described herein is used for providing a further understanding of the present invention, forms the part of the application, this hair
Bright schematic description and description does not constitute improper limitations of the present invention for explaining the present invention.In the accompanying drawings:
Fig. 1 is a kind of restoration methods flow chart of data according to embodiments of the present invention;
Fig. 2 is a kind of restoration methods flow chart of optional data according to embodiments of the present invention;
Fig. 3 is a kind of restoration methods flow chart of optional data according to embodiments of the present invention;
Fig. 4 is a kind of restoration methods flow chart of optional data according to embodiments of the present invention;
Fig. 5 is a kind of preferred mess code recovery device schematic diagram according to embodiments of the present invention;
Fig. 6 is a kind of preferred mess code restoration methods flow chart according to embodiments of the present invention;And
Fig. 7 is a kind of recovery device schematic diagram of data according to embodiments of the present invention.
Specific embodiment
In order to which those skilled in the art is made to more fully understand the present invention program, below in conjunction in the embodiment of the present invention
The technical solution in the embodiment of the present invention is clearly and completely described in attached drawing, it is clear that described embodiment is only
The embodiment of a part of the invention, instead of all the embodiments.Based on the embodiments of the present invention, ordinary skill people
Member's all other embodiments obtained without making creative work should all belong to the model that the present invention protects
It encloses.
It should be noted that term " first " in description and claims of this specification and above-mentioned attached drawing, "
Two " etc. be the object for distinguishing similar, without being used to describe specific order or precedence.It should be appreciated that it so uses
Data can exchange in the appropriate case, so as to the embodiment of the present invention described herein can with except illustrating herein or
Order beyond those of description is implemented.In addition, term " comprising " and " having " and their any deformation, it is intended that cover
Cover it is non-exclusive include, be not necessarily limited to for example, containing the process of series of steps or unit, method, system, product or equipment
Those steps or unit clearly listed, but may include not list clearly or for these processes, method, product
Or the intrinsic other steps of equipment or unit.
First, the part noun or term occurred during the embodiment of the present application is described is suitable for following solution
It releases:
Character:Single Chinese character, symbol or letter, such as " you ", " 3 ", " W " (being free of double quotation marks) are character.
Character string:Character string is made of multiple characters, and such as " hello ", " 2016 " are character string.
Coding rule:Character is expressed as binary system, character and binary correspondence in computer-internal and is advised for coding
Then, also it is character code.Such as, " tight " is encoded according to UTF-8 coding rules, corresponding to be represented in binary as 11100100
10111000 10100101。
Coding:According to certain coding rule, character or character string are converted into binary system, e.g., " tight " is encoded according to UTF-8
Rule can be encoded to 1,100,100 10,111,000 10100101.
Decoding:It is character or character string by Binary Conversion according to certain coding rule
Heuristic:Heuristic refers to a kind of rule of thumb rule that people is taken when solving the problems, such as and is found
Method.Its main feature is that when solving the problems, such as, using past experience, effective method rather than system are selected
Ground goes to seek answer with definite step.Specifically, in the embodiment of the present application, it is to judge according to word frequency is commonly used
Whether convert correctly rather than by some specific algorithm.
Embodiment 1
According to embodiments of the present invention, a kind of restoration methods embodiment of data is provided, it is necessary to illustrate, in attached drawing
The step of flow illustrates can perform in the computer system of such as a group of computer-executable instructions, although also,
Logical order is shown in flow chart, but in some cases, it can perform shown with the order being different from herein or retouch
The step of stating.
Fig. 1 is a kind of restoration methods flow chart of data according to embodiments of the present invention, as shown in Figure 1, this method includes
Following steps:
Step S102 obtains the character string of data to be restored.
Specifically, in above-mentioned steps, above-mentioned data to be restored can be as a result of unmatched with coding mode
Computer data of the decoding process without correctly showing or being shown as mess code, including with various forms such as text, picture, forms
The data of presentation;Above-mentioned character string can be one or more characters in a computer (for example, letter, number, Chinese character or symbol
Number) combination, before recovering to data to be restored, first have to obtain the character string of data to be restored.
In a kind of optional embodiment, above-mentioned data to be restored can be Chinese Random Code, can pass through webpage (Web ends)
Mode or application client) mode obtain the character strings of data to be restored.
Step S104 respectively encodes the character string of data to be restored using at least one encryption algorithm, obtains every
The coding result that kind encryption algorithm encodes.
Specifically, in above-mentioned steps, above-mentioned encryption algorithm can be computer to identify, store and process various words
Symbol, and encode used algorithm according to certain coding rule to character, common coding rule include ASCII codings,
GB2312 codings (simplified form of Chinese Character), GBK codings, BIG5 (Chinese-traditional), ANSI coding, UTF-16 and UTF-8 codings etc.;It is above-mentioned
Data to be restored can be as a result of random without correctly showing or being shown as with the unmatched decoding process of coding mode
The computer data of code, including the data presented with various forms such as text, picture, forms;Above-mentioned coding result can be meter
The data that calculation machine can identify, for example, binary data;After the character string (for example, Chinese Random Code) of data to be restored is obtained,
The character string of data to be restored is encoded respectively according at least one encryption algorithm, obtains the meter based on each encryption algorithm
The data that calculation machine can identify.
It, can be big according to UTF-8, UTF-16 by taking data to be restored are Chinese Random Code as an example in a kind of optional embodiment
Multiple common Chinese character coding rules such as end, UTF-16 small ends, GBK, GB2312, by the character string of the data to be restored received
Encoded, coding the result is that the binary data that computer can identify.
Step S106 successively carries out the coding result that each encryption algorithm encodes using at least one decoding algorithm
Decoding, obtains multiple decoding results.
Specifically, in above-mentioned steps, above-mentioned decoding algorithm can be computer by internal according to certain coding rule
The binary data of coding is decoded as the algorithm of corresponding character, and common coding rule includes ASCII codings, GB2312 codings
(simplified form of Chinese Character), GBK coding, BIG5 (Chinese-traditional), ANSI coding, UTF-16 and UTF-8 codings etc.;Above-mentioned decoding result can
Computer is thought by the internal decoded respective symbols of binary data encoded according to certain coding rule, these characters may
For the character correctly shown, it is also possible to for the character of mistake display.
In a kind of optional embodiment, by data to be restored for exemplified by Chinese Random Code, can according to UTF-8, UTF-16,
The string encoding of the data to be restored received is computer capacity by multiple common Chinese character coding rules such as GBK, GB2312
After the binary data enough identified, binary data is converted into corresponding character according still further to the decoding algorithm of certain coding rule
String.
Herein it should be noted that above-mentioned encryption algorithm can be the encryption algorithm based on any coding rule, on
It can be the decoding algorithm based on any coding rule to state decoding algorithm.For foregoing based on each coding rule
Encryption algorithm will attempt the decoding algorithm based on all coding rules and be decoded.
Step S108 matches multiple decoding results with the character repertoire to prestore, and output meets the decoding of preset condition
As a result.
Specifically, in above-mentioned steps, above-mentioned decoding result can be computer by internal according to certain coding rule
The decoded respective symbols of binary data of coding, these characters may be the character correctly shown, it is also possible to for mistake display
Character;Using the decoding algorithm based on all coding rules successively to the coding result that each encryption algorithm encodes into
Row decoding, after obtaining multiple decoding results, due to that may be correct character string in decoding result, it is also possible to for the character of mistake
String, multiple decoding results are matched with the character repertoire to prestore, and judge whether decoding result meets preset condition, finally will
The decoding result for meeting preset condition is exported and shown.
In a kind of optional embodiment, above-mentioned character repertoire may be employed《Modern Chinese commonly used word table》In all Chinese it is normal
Use word.
It is to be restored obtaining based on scheme disclosed in above-mentioned steps S102 to S108 in a kind of optional embodiment
Data character string (for example, mess code) after, coding based on any one coding rule (for example, UTF-8) may be employed and calculate
Method encodes the mess code, obtains coding result (for example, binary data) corresponding with the mess code, and reselection removes the coding
The decoding algorithm of another coding rule (for example, UTF-16 big ends) beyond rule, obtained binary data is solved
Code if the decoding result that decoding obtains meets preset condition, exports the decoding result, and stops execution procedures;If solution
The decoding result that code obtains does not meet preset condition, then reselects except coding rule (UTF-8) and used coding rule
The then solution of another coding rule (for example, any one in UTF-16 small ends, GBK and GB2312) beyond (UTF-16 big ends)
Obtained binary data is decoded by code algorithm, and whether the decoding result judged meets preset condition, if meeting pre-
If condition, then qualified decoding result is exported, and stopped execution procedures, if still ineligible, it tries other volumes
The decoding algorithm of code rule, the decoding algorithm until traveling through all coding rules in addition to coding rule (UTF-8).
The binary data encoded if based on the encryption algorithm of a certain coding rule of above-mentioned selection to mess code
Afterwards, after the decoding algorithm for traveling through all coding rules in addition to the coding rule, the solution for meeting preset condition is not all obtained
Code is as a result, then reselect another coding rule (for example, it may be the UTF-16 big ends, UTF-16 in addition to UTF-8 are small
Any one in end, GBK and GB2312) encryption algorithm mess code is encoded to obtain binary data, for selecting again
The encryption algorithm selected attempts the decoding algorithms of other coding rules in addition to the coding rule binary system to obtaining successively
Data are decoded, and whether the decoding result judged meets preset condition, will be qualified if meeting preset condition
Decoding result exports, and stops execution procedures;If still ineligible, the encryption algorithm pair of other coding rules is reselected
Mess code is encoded, until traveling through the encryption algorithm based on all coding rules.
In another optional embodiment, based on scheme disclosed in above-mentioned steps S102 to S108, treated in acquisition extensive
After the character string (for example, mess code) of multiple data, can the encryption algorithm based on all coding rules mess code encode
To binary data, the binary data then encoded for the encryption algorithm of each coding rule, using except the coding
The decoding algorithm of other all coding rules beyond rule is successively decoded obtained binary data, finally will decoding
Meet the decoding result output of preset condition in obtained multiple decoding results.
From the foregoing, it will be observed that in the above embodiments of the present application, by way of webpage (Web ends) or application client)
Mode obtain the character string of mess code, then using at least one encryption algorithm respectively by the string encoding of the mess code got
Be converted to binary data, then using one or more decoding algorithms successively to encoded based on each encryption algorithm two into
Data processed are decoded as corresponding character string, and finally all decoded character strings are compared with the character repertoire to prestore, will accord with
The character string for closing preset condition is exported and shown, has been reached and has been automatically attempted to the encryption algorithm based on all coding rules and decoding calculation
The purpose that the character string of mess code is converted in the combination of method, it is achieved thereby that the character string of mess code is recovered automatically
Technique effect, and then solve the technical issues of existing mess code restoration methods need to know the coding rule of mess code.
As a kind of optional embodiment, above-mentioned encryption algorithm is the calculation based on different coding rule with above-mentioned decoding algorithm
Method, wherein, coding rule include at least it is following any two:UTF-8, UTF-16 big end, UTF-16 small ends, GBK and GB2312.
As a kind of optional embodiment, as shown in Fig. 2, being distinguished in above-mentioned steps S104 using at least one encryption algorithm
The character string of data to be restored is encoded, obtains the coding result that each encryption algorithm encodes, can be included as follows
Step:
Step S202 judges whether encryption algorithm is used encryption algorithm;
Step S204, if encryption algorithm is not used encryption algorithm, using encryption algorithm to data to be restored
Character string encoded, obtain corresponding coding result;
Encryption algorithm is labeled as used encryption algorithm by step S206;
Step S208 travels through all encryption algorithms, until all encryption algorithms are collectively labeled as used coding
Algorithm.
Specifically, in above-mentioned steps, using at least one encryption algorithm respectively to the character strings of data to be restored into
During row coding, it can select arbitrarily to carry out the character string of data to be restored based on the encryption algorithm of any one coding rule
Coding, and judge that the encryption algorithm is to have been used for encoded character string to be restored.If the encryption algorithm by with
In the character string of encoded data to be restored, then the character string of data to be restored is encoded using another encryption algorithm;
If the encryption algorithm is not applied to the character string of encoded data to be restored, using encryption algorithm by data to be restored
Character string is encoded.Use each time encryption algorithm by data encoding to be restored for corresponding binary data after, will this
The secondary encryption algorithm used is labeled as used encryption algorithm.All encryption algorithms are traveled through, until all codings will be based on
The encryption algorithm of rule is collectively labeled as used encryption algorithm, i.e. using all coding rules to the character of mess code
String carried out coding, obtained multiple coding results based on a variety of encryption algorithms.
Pass through above-described embodiment, it is ensured that the character string of mess code is encoded based on all coding rules, also,
It is extensive for encoding to reduce mess code by repeatedly to avoid when the character string for a mess code is encoded some coding rule
The effect of complex velocity.
As a kind of optional embodiment, as shown in figure 3, in above-mentioned steps S106 using at least one decoding algorithm successively
The coding result encoded to each encryption algorithm is decoded, and is obtained multiple decoding results, be may include steps of:
Step S302 based on each encryption algorithm, judges whether decoding algorithm is used decoding algorithm;
Step S304 if decoding algorithm is not used decoding algorithm, calculates each coding using decoding algorithm
The coding result that method obtains is encoded, and obtains corresponding decoding result;
Decoding algorithm is labeled as used encryption algorithm by step S306;
Step S308 travels through all decoding algorithms, until all decoding algorithms are collectively labeled as used coding
Algorithm.
Specifically, in above-mentioned steps, successively each encryption algorithm is encoded to obtain using at least one decoding algorithm
Coding result when being decoded, can select to compile each encryption algorithm based on the decoding algorithm of any one coding rule
The coding result that code obtains is decoded, and judges that the decoding algorithm is to have been used for decoding above-mentioned coding result.If
The decoding algorithm has been used for decoding above-mentioned coding result, then is solved coding result using another decoding algorithm
Code;If the decoding algorithm is not applied to decode above-mentioned coding result, above-mentioned coding result is carried out using decoding algorithm
Decoding.After above-mentioned coding result is decoded as corresponding character string using decoding algorithm each time, decoding that this is used
Algorithm tag is used decoding algorithm.All decoding algorithms are traveled through, until will be calculated based on the decoding of all coding rules
Method is collectively labeled as used decoding algorithm, i.e. all decoding algorithms has been used to carry out decoding to coding result, have been obtained
Multiple decoding results based on a variety of decoding algorithms.
Herein it should be noted that for foregoing each coding, to attempt strictly all rules and be decoded.
By above-described embodiment, for the coding result of each encryption algorithm, all decoding algorithms are all traveled through to compiling
Code result is decoded, and can realize that any combination for automatically attempting to all encryption algorithms and decoding algorithm carrys out the character to mess code
The purpose that string is converted.
In a kind of optional embodiment, it is assumed that the coding rule used is tri- kinds of UTF-8, UTF-16, GBK, then based on this
There are three types of the encryption algorithm and decoding algorithm of three kinds of coding rules are each, the encryption algorithm based on these three coding rules is calculated with decoding
The combination of method has nine kinds, wherein, the encryption algorithm based on different coding rule has combined six kinds with decoding algorithm, as shown in table 1.
Encryption algorithm of the table 1 based on different coding rule is combined with decoding algorithm
Combine sequence number | Encryption algorithm | Decoding algorithm |
1 | UTF-8 | UTF-16 |
2 | UTF-8 | GBK |
3 | GBK | UTF-8 |
4 | GBK | UTF-16 |
5 | UTF-16 | UTF-8 |
6 | UTF-16 | GBK |
Based on above-described embodiment, it is assumed that a certain data to be restored are the character string " Ke Extern Cong Nao Fan Da " of mess code, can be adopted
The character string of mess code is recovered with the combination of above-mentioned six kinds of encryption algorithms and decoding algorithm.
First, attempt the character string of mess code is encoded using UTF-8 encryption algorithms, the result encoded be two into
Data processed, it is as follows:
11100111101111001000001011100110101000001010101111100111100010001001110011100
1111001000110011001111001011000101110101011111001011001111010101111。
Based on different decoding algorithms, which is decoded according to different modes trial.It is based on when utilizing
When the decoding algorithm of GBK coding rules is decoded, the decoded result of the binary data is " Ke Yong Niu Qi Destroy Sheng JunIt may determine that the decoding result is incorrect;When being decoded using the decoding algorithm based on UTF-16 coding rules,
The decoded result of the binary data isRen Jin shouldIt may determine that the decoding result is incorrect.Attempt all solutions
Code algorithm is decoded the binary data, and decoded result is incorrect (displaying is omited).
Then, attempt to encode the character string of mess code using the encryption algorithm based on GBK coding rules, coding obtains
Result for binary data, it is as follows:
11100111101111001001011011100111101000001000000111101000101001111000010011100
1011000100010011001。
Based on different decoding algorithms, which is decoded according to different modes trial.It is based on when utilizing
When the decoding algorithm of UTF-16 rules is decoded, the decoded result of the binary data isRubberFeedback ", decoding result is not
Correctly;When being decoded using the decoding algorithm based on UTF-8 coding rules, the decoded result of the binary data is
" coding rule " if according to preset condition, judges that the decoding result is correct, then exports correct decoding result.
As a kind of optional embodiment, as shown in figure 4, by multiple decoding results and the word to prestore in above-mentioned steps S108
Fu Ku is matched, and output meets the decoding result of preset condition, may include steps of:
Step S402 matches the character in multiple decoding results with the multiple characters stored in character repertoire, statistics
The number of characters of character is successfully matched to from character repertoire;
Step S404, accounting of the calculating character number in all characters of decoding result;
Step S406, whether the accounting for judging decoding result is more than predetermined threshold value;
Step S408 if the accounting of decoding result is more than predetermined threshold value, exports decoding result.
Specifically, in above-mentioned steps, above-mentioned character repertoire can be a default character repertoire for including correct characters, one
Can be a character repertoire comprising all conventional characters in kind of optional embodiment, using any one encryption algorithm and
The combination of decoding algorithm carries out the character string of mess code after being converted to multiple decoding results, by the character in multiple decoding results
Matching treatment is carried out with the character stored in the character repertoire that prestores, statistics can be successfully matched to the character of character from character repertoire
Number, and ratio shared in matched character character all in each decoding result is calculated successfully, if decoding result
The number of characters of middle successful match reaches certain threshold value, then it is assumed that decoding result is correct, which is exported and shown.
Herein it should be noted that scheme disclosed in the above embodiment of the present invention, using heuristic determination methods, for solution
Each character in character string after code, judges whether the character belongs to Chinese commonly used word, if the character appears in national language
The paperwork committee《Modern Chinese commonly used word table》In, then the character belongs to Chinese commonly used word;Otherwise, which is not belonging to
Chinese commonly used word.Finally, the ratio of commonly used word in the character string is counted, if the ratio is more than some threshold value (rule of thumb, threshold
It is preferable that value is arranged on 70%~80% effect), then it is assumed that transformed character string is correct, otherwise it is assumed that transformed word
Symbol string is incorrect.
Optionally, still by taking above-mentioned data to be restored is the character strings " Ke Extern Cong Nao Fan Da " of mess code as an example, it is based on when using
The encryption algorithm of GBK coding rules is encoded the character string of mess code to obtain binary data, and by being based on UTF-8 codings
For the decoding algorithm of rule when being decoded, the decoded result of the binary data is " coding rule ", by the decoding result with
After commonly used word storehouse matching, the character for finding in the decoding result 100% is commonly used word, then it is assumed that decoding result is correct, will decode
As a result export and show.
As a kind of optional embodiment, if multiple decoding results matched with the character to prestore, do not meet
The decoding result of preset condition then exports the prompt message that data to be restored recover failure.
In the above-described embodiments, if being combined the encryption algorithm based on all coding rules by mess code with decoding algorithm
After character string conversion, do not meet the decoding result of preset condition, then illustrate that mess code recovers failure, output mess code recovers failure
Prompt message.
As a preferred embodiment, it can illustrate the above embodiments of the present application with reference to Fig. 5 and Fig. 6, as shown in Figure 5
For a kind of preferred mess code recovery device schematic diagram, which includes:Data read module, coding module, decoder module, inspiration
Formula judgment module and output module.A kind of preferred mess code restoration methods flow chart is illustrated in figure 6, as shown in fig. 6, including such as
Lower step:
Step S602 reads mess code.
In above-mentioned steps, mess code is read by data read module, it can be in a manner of webpage (Web ends) or using journey
Sequence client) mode be read out, the content format of reading is character string.After reading, mess code character string is transferred to subsequently
Module is handled.
Step S604, judges whether all coding modes were all attempted.
In above-mentioned steps, judge whether the coding mode based on a variety of coding rules all has been used for encoding mess code
For binary data, all have been used for encoding mess code if all of coding mode, then perform step S616;If
In the presence of the coding mode being not attempt to, then step S606 is performed.
Step S606 selects a coding mode do not attempted that mess code is encoded to binary data.
In above-mentioned steps, any one coding mode is selected in the coding mode do not attempted, utilizes coding module
The character string of mess code is converted into binary data.Coding module receives the character string that aforementioned data read module transmits,
According to multiple common Chinese character coding rules such as UTF-8, UTF-16, GBK, GB2312, the character string received is encoded,
Coding the result is that binary data.
Step S608, judges whether all decoding processes were all attempted.
In above-mentioned steps, judge whether the decoding process based on a variety of coding rules all has been used for decoding, if
All decoding processes all have been used for being decoded binary data, then perform step S604;If there is not tasting
The decoding process tried then performs step S610.
Step S610 selects a decoding process do not attempted that binary data is decoded as character.
In above-mentioned steps, any one decoding process is selected in the decoding process do not attempted, utilizes decoder module
Binary data is converted into character string.Decoder module receives the binary data that afore-mentioned code module transfer comes, according to
The binary data received is decoded by multiple common Chinese character coding rules such as UTF-8, UTF-16, GBK, GB2312,
It is decoded the result is that character string.
Herein it should be noted that the coding rule that the coding rule that the decoder module uses is used with afore-mentioned code module
It is different.For foregoing each coding, to attempt strictly all rules and be decoded.
Step S612 judges whether transformation result is correct using heuristic.
In above-mentioned steps, judge whether transformed character string is correct using heuristic judgment module.This is heuristic to sentence
Disconnected module receives the character string decoded in a manner that foregoing decoder module transmits.For each word in character string
Symbol, judges whether the character belongs to Chinese commonly used word, if the character appears in State Language Work Committee《The modern Chinese
Language commonly used word table》In, then the character belongs to Chinese commonly used word;Otherwise it is assumed that the character is not belonging to Chinese commonly used word.Finally, unite
The ratio of commonly used word in the character string is counted, if the ratio is more than that (rule of thumb, which is arranged on 70%~80% to some threshold value
Effect is preferable), then it is assumed that the character string of conversion is correct, otherwise it is assumed that the character string of conversion is incorrect.
Step S614 exports transformation result.
In above-mentioned steps, if the character string of conversion is correct, the character string after being repaired using output module output can
By by being exported in a manner of identical with data read module.
Step S616 prompts repairing failure.
In above-mentioned steps, all fail if the attempt to the combination of all encryption algorithms and decoding algorithm carries out mess code reparation,
Then export the prompt message of repairing failure.
In scheme disclosed in the above embodiments of the present application, read mess code first, attempt by all coding modes with
The combination of decoding process is converted, and transformed character is judged, if correctly, the character after output turn;If
It is incorrect, it tries the combination of other encryption algorithms and decoding algorithm was all attempted if all of combination, then explanation turns
It changes unsuccessfully.
Following technique effect can be realized by above-described embodiment:Mess code is required no knowledge about when carrying out mess code Fault recovery
Original coding, but recovered by attempting various coding modes;Whether judge restoration result using heuristic
Correctly, without manually determining, efficiency is very high when character string is more.
Embodiment 2
According to embodiments of the present invention, a kind of recovery device embodiment of data is additionally provided.Number in the embodiment of the present invention 1
According to restoration methods can be performed in the device of the embodiment of the present invention 2.
Fig. 7 is a kind of recovery device schematic diagram of data according to embodiments of the present invention, as shown in fig. 7, the device includes:
Acquisition module 701, the first coding module 703, the first decoder module 705 and the first output module 707.
Wherein, acquisition module 701, for obtaining the character string of data to be restored;First coding module 703, for using
At least one encryption algorithm respectively encodes the character string of data to be restored, obtains the volume that each encryption algorithm encodes
Code result;First decoder module 705, for the volume encoded successively to each encryption algorithm using at least one decoding algorithm
Code result is decoded, and obtains multiple decoding results;First output module 707, for by multiple decoding results and the word that prestores
Fu Ku carries out matching treatment, and output meets the decoding result of preset condition.
From the foregoing, it will be observed that in the above embodiments of the present application, by way of webpage (Web ends) or application client)
Mode obtain the character string of mess code, then using at least one encryption algorithm respectively by the string encoding of the mess code got
Be converted to binary data, then using one or more decoding algorithms successively to encoded based on each encryption algorithm two into
Data processed are decoded as corresponding character string, and finally all decoded character strings are compared with the character repertoire to prestore, will accord with
The character string for closing preset condition is exported and shown, has been reached and has been automatically attempted to the encryption algorithm based on all coding rules and decoding calculation
The purpose that the character string of mess code is converted in the combination of method, it is achieved thereby that the character string of mess code is recovered automatically
Technique effect, and then solve the technical issues of existing mess code restoration methods need to know the coding rule of mess code.
In a kind of optional embodiment, above-mentioned encryption algorithm is the calculation based on different coding rule with above-mentioned decoding algorithm
Method, wherein, coding rule include at least it is following any two:UTF-8, UTF-16 big end, UTF-16 small ends, GBK and GB2312.
In a kind of optional embodiment, above-mentioned first coding module includes:First judgment module, for judging that coding is calculated
Whether method is used encryption algorithm;Second coding module, if not being used encryption algorithm for encryption algorithm,
The character string of data to be restored is encoded using encryption algorithm, obtains corresponding coding result;First mark module, is used for
Encryption algorithm is labeled as used encryption algorithm;First circulation module, for traveling through all encryption algorithms, until by institute
Some encryption algorithms are collectively labeled as used encryption algorithm.
In a kind of optional embodiment, above-mentioned first decoder module includes:Second judgment module, for being based on each volume
Code algorithm, judges whether decoding algorithm is used decoding algorithm;Second decoder module, if do not made for decoding algorithm
Used decoding algorithm, the then coding result obtained using decoding algorithm to each encryption algorithm are decoded, and are obtained corresponding
Decoding result;Second mark module, for decoding algorithm to be labeled as used decoding algorithm;Second circulation module, is used for
All decoding algorithms are traveled through, until all decoding algorithms are collectively labeled as used decoding algorithm.
In a kind of optional embodiment, above-mentioned first output module includes:Comparing module, for by multiple decoding results
In character matched with the multiple characters stored in character repertoire, count the character that character is successfully matched to from decoding result
Number;Computing module, for accounting of the calculating character number in all characters of decoding result;Judgment module, for judging
Whether the accounting of decoding result is more than predetermined threshold value;Second output module, if being more than default threshold for the accounting of decoding result
Value, then export decoding result.
In a kind of optional embodiment, above device further includes:3rd output module, if for multiple decodings to be tied
Fruit is matched with the character repertoire to prestore, does not meet the decoding result of preset condition, then exports data to be restored and recover failure
Prompt message.
The embodiments of the present invention are for illustration only, do not represent the quality of embodiment.
In the above embodiment of the present invention, all emphasize particularly on different fields to the description of each embodiment, do not have in some embodiment
The part of detailed description may refer to the associated description of other embodiment.
In several embodiments provided herein, it should be understood that disclosed technology contents can pass through others
Mode is realized.Wherein, the apparatus embodiments described above are merely exemplary, such as the division of the unit, Ke Yiwei
A kind of division of logic function, can there is an other dividing mode in actual implementation, for example, multiple units or component can combine or
Person is desirably integrated into another system or some features can be ignored or does not perform.Another, shown or discussed is mutual
Between coupling, direct-coupling or communication connection can be INDIRECT COUPLING or communication link by some interfaces, unit or module
It connects, can be electrical or other forms.
The unit illustrated as separating component may or may not be physically separate, be shown as unit
The component shown may or may not be physical location, you can be located at a place or can also be distributed to multiple
On unit.Some or all of unit therein can be selected to realize the purpose of this embodiment scheme according to the actual needs.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, it can also
That unit is individually physically present, can also two or more units integrate in a unit.Above-mentioned integrated list
The form that hardware had both may be employed in member is realized, can also be realized in the form of SFU software functional unit.
If the integrated unit is realized in the form of SFU software functional unit and is independent production marketing or use
When, it can be stored in a computer read/write memory medium.Based on such understanding, technical scheme is substantially
The part to contribute in other words to the prior art or all or part of the technical solution can be in the form of software products
It embodies, which is stored in a storage medium, is used including some instructions so that a computer
Equipment (can be personal computer, server or network equipment etc.) perform each embodiment the method for the present invention whole or
Part steps.And foregoing storage medium includes:USB flash disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited
Reservoir (RAM, Random Access Memory), mobile hard disk, magnetic disc or CD etc. are various can to store program code
Medium.
The above is only the preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art
For member, various improvements and modifications may be made without departing from the principle of the present invention, these improvements and modifications also should
It is considered as protection scope of the present invention.
Claims (10)
1. a kind of restoration methods of data, which is characterized in that including:
Obtain the character string of data to be restored;
The character string of the data to be restored is encoded respectively using at least one encryption algorithm, obtains each encryption algorithm
Encode obtained coding result;
The coding result encoded successively to each described encryption algorithm using at least one decoding algorithm is decoded, and is obtained
Multiple decoding results;
The multiple decoding result is matched with the character repertoire to prestore, output meets the decoding result of preset condition.
2. according to the method described in claim 1, it is characterized in that, the encryption algorithm and the decoding algorithm are based on difference
The algorithm of coding rule, wherein, the coding rule include at least it is following any two:UTF-8, UTF-16 big end, UTF-16
Small end, GBK and GB2312.
3. according to the method described in claim 2, it is characterized in that, using at least one encryption algorithm respectively to described to be restored
The character string of data is encoded, and obtains the coding result that each encryption algorithm encodes, including:
Judge whether the encryption algorithm is used encryption algorithm;
If the encryption algorithm is not the used encryption algorithm, using the encryption algorithm to the number to be restored
According to character string encoded, obtain corresponding coding result;
The encryption algorithm is labeled as the used encryption algorithm;
All encryption algorithms are traveled through, until all encryption algorithms are collectively labeled as the used encryption algorithm.
4. according to the method described in claim 3, it is characterized in that, using at least one decoding algorithm successively to each described volume
The coding result that code algorithm coding obtains is decoded, and obtains multiple decoding results, including:
Based on each described encryption algorithm, judge whether the decoding algorithm is used decoding algorithm;
If the decoding algorithm is not the used decoding algorithm, using the decoding algorithm to each encryption algorithm
Obtained coding result is decoded, and obtains corresponding decoding result;
The decoding algorithm is labeled as the used decoding algorithm;
All decoding algorithms are traveled through, until all decoding algorithms are collectively labeled as the used decoding algorithm.
5. according to the method described in claim 1, it is characterized in that, the multiple decoding result and the character repertoire to prestore are carried out
Matching, the decoding result that output meets preset condition include:
Character in the multiple decoding result with the multiple characters stored in the character repertoire is matched, is counted from described
The number of characters of character is successfully matched in character repertoire;
Calculate accounting of the number of characters in all characters of the decoding result;
Whether the accounting for judging the decoding result is more than predetermined threshold value;
If the accounting of the decoding result is more than predetermined threshold value, the decoding result is exported.
If 6. according to the method described in claim 5, it is characterized in that, by the multiple decoding result and the character that prestores into
Row matching does not meet the decoding result of preset condition, then exports the prompt message that data to be restored recover failure.
7. a kind of recovery device of data, which is characterized in that including:
Acquisition module, for obtaining the character string of data to be restored;
First coding module, for being compiled respectively to the character string of the data to be restored using at least one encryption algorithm
Code, obtains the coding result that each encryption algorithm encodes;
First decoder module, for the coding encoded successively to each described encryption algorithm using at least one decoding algorithm
As a result it is decoded, obtains multiple decoding results;
First output module, for the multiple decoding result and the character repertoire to prestore to be carried out matching treatment, output meets pre-
If the decoding result of condition.
8. device according to claim 7, which is characterized in that the encryption algorithm is based on difference with the decoding algorithm
The algorithm of coding rule, wherein, the coding rule include at least it is following any two:UTF-8, UTF-16 big end, UTF-16
Small end, GBK and GB2312.
9. device according to claim 8, which is characterized in that first coding module includes:
First judgment module, for judging whether the encryption algorithm is used encryption algorithm;
Second coding module, if not being the used encryption algorithm for the encryption algorithm, using the coding
Algorithm encodes the character string of the data to be restored, obtains corresponding coding result;
First mark module, for the encryption algorithm to be labeled as the used encryption algorithm;
First circulation module, for traveling through all encryption algorithms, until all encryption algorithms are collectively labeled as the use
The encryption algorithm crossed.
10. device according to claim 9, which is characterized in that first decoder module includes:
Second judgment module for being based on each described encryption algorithm, judges whether the decoding algorithm is used decoding
Algorithm;
Second decoder module, if not being the used decoding algorithm for the decoding algorithm, using the decoding
The coding result that algorithm obtains each encryption algorithm is decoded, and obtains corresponding decoding result;
Second mark module, for the decoding algorithm to be labeled as the used decoding algorithm;
Second circulation module, it is described until all decoding algorithms are collectively labeled as traveling through all decoding algorithms
Used decoding algorithm.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611063862.4A CN108108267B (en) | 2016-11-25 | 2016-11-25 | Data recovery method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611063862.4A CN108108267B (en) | 2016-11-25 | 2016-11-25 | Data recovery method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108108267A true CN108108267A (en) | 2018-06-01 |
CN108108267B CN108108267B (en) | 2021-06-22 |
Family
ID=62204621
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611063862.4A Active CN108108267B (en) | 2016-11-25 | 2016-11-25 | Data recovery method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108108267B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112151069A (en) * | 2020-08-20 | 2020-12-29 | 深圳市捷视飞通科技股份有限公司 | Voice data processing method and device, computer equipment and storage medium |
CN117391070A (en) * | 2023-12-08 | 2024-01-12 | 和元达信息科技有限公司 | Method and system for adjusting random character |
Citations (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070253548A1 (en) * | 2006-04-28 | 2007-11-01 | Fujitsu Limited | Data protection system, method, and program |
CN101325467A (en) * | 2007-06-14 | 2008-12-17 | 杭州华三通信技术有限公司 | Method and equipment for transmitting and receiving Ethernet data |
CN101763407A (en) * | 2009-11-19 | 2010-06-30 | 青岛海信移动通信技术股份有限公司 | Txt file reading method based on brew platform and reader thereof |
CN102722544A (en) * | 2012-05-24 | 2012-10-10 | 北京国双科技有限公司 | Method and device for decoding character strings |
CN102799572A (en) * | 2012-07-27 | 2012-11-28 | 深圳市万兴软件有限公司 | Text coding manner and text coding apparatus |
CN102880703A (en) * | 2012-09-25 | 2013-01-16 | 广州市动景计算机科技有限公司 | Methods and systems for encoding and decoding Chinese webpage data |
CN103092922A (en) * | 2012-12-28 | 2013-05-08 | 国家计算机网络与信息安全管理中心 | Post-coding automatic decoding method aiming at uniform resource locator (URL) comprising special characters |
CN103207877A (en) * | 2012-01-17 | 2013-07-17 | 阿里巴巴集团控股有限公司 | Decoding method and device |
CN103310255A (en) * | 2013-05-31 | 2013-09-18 | 曾芝渝 | Color character encoding method and decoding method |
US20140006897A1 (en) * | 2012-06-29 | 2014-01-02 | International Business Machines Corporation | Correction of structured burst errors in data |
CN103595415A (en) * | 2012-08-16 | 2014-02-19 | 中兴通讯股份有限公司 | Coding method, decoding method, coding system and decoding system |
CN103699841A (en) * | 2013-12-20 | 2014-04-02 | 北京奇虎科技有限公司 | Encoding bypassing intercepting method and device |
CN104182286A (en) * | 2014-06-24 | 2014-12-03 | 武汉传神信息技术有限公司 | Cross-platform Chinese character messy code recovery method |
CN104516862A (en) * | 2013-09-29 | 2015-04-15 | 北大方正集团有限公司 | Method and system for selecting and reading coded format of target document |
CN104750666A (en) * | 2015-03-12 | 2015-07-01 | 明博教育科技有限公司 | Text character encoding mode identification method and system |
CN105306063A (en) * | 2015-10-12 | 2016-02-03 | 浙江大学 | Optimization and recovery methods for record type data storage space |
US20160092300A1 (en) * | 2014-09-26 | 2016-03-31 | Intel Corporation | Using reliability information from multiple storage units and a parity storage unit to recover data for a failed one of the storage units |
CN105472107A (en) * | 2014-08-26 | 2016-04-06 | 中兴通讯股份有限公司 | Terminal information processing method and device |
CN105847931A (en) * | 2016-03-28 | 2016-08-10 | 深圳Tcl新技术有限公司 | Subtitle display method and subtitle display device |
-
2016
- 2016-11-25 CN CN201611063862.4A patent/CN108108267B/en active Active
Patent Citations (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070253548A1 (en) * | 2006-04-28 | 2007-11-01 | Fujitsu Limited | Data protection system, method, and program |
CN101325467A (en) * | 2007-06-14 | 2008-12-17 | 杭州华三通信技术有限公司 | Method and equipment for transmitting and receiving Ethernet data |
CN101763407A (en) * | 2009-11-19 | 2010-06-30 | 青岛海信移动通信技术股份有限公司 | Txt file reading method based on brew platform and reader thereof |
CN103207877A (en) * | 2012-01-17 | 2013-07-17 | 阿里巴巴集团控股有限公司 | Decoding method and device |
CN102722544A (en) * | 2012-05-24 | 2012-10-10 | 北京国双科技有限公司 | Method and device for decoding character strings |
US20140006897A1 (en) * | 2012-06-29 | 2014-01-02 | International Business Machines Corporation | Correction of structured burst errors in data |
CN102799572A (en) * | 2012-07-27 | 2012-11-28 | 深圳市万兴软件有限公司 | Text coding manner and text coding apparatus |
CN103595415A (en) * | 2012-08-16 | 2014-02-19 | 中兴通讯股份有限公司 | Coding method, decoding method, coding system and decoding system |
CN102880703A (en) * | 2012-09-25 | 2013-01-16 | 广州市动景计算机科技有限公司 | Methods and systems for encoding and decoding Chinese webpage data |
CN103092922A (en) * | 2012-12-28 | 2013-05-08 | 国家计算机网络与信息安全管理中心 | Post-coding automatic decoding method aiming at uniform resource locator (URL) comprising special characters |
CN103310255A (en) * | 2013-05-31 | 2013-09-18 | 曾芝渝 | Color character encoding method and decoding method |
CN104516862A (en) * | 2013-09-29 | 2015-04-15 | 北大方正集团有限公司 | Method and system for selecting and reading coded format of target document |
CN103699841A (en) * | 2013-12-20 | 2014-04-02 | 北京奇虎科技有限公司 | Encoding bypassing intercepting method and device |
CN104182286A (en) * | 2014-06-24 | 2014-12-03 | 武汉传神信息技术有限公司 | Cross-platform Chinese character messy code recovery method |
CN105472107A (en) * | 2014-08-26 | 2016-04-06 | 中兴通讯股份有限公司 | Terminal information processing method and device |
US20160092300A1 (en) * | 2014-09-26 | 2016-03-31 | Intel Corporation | Using reliability information from multiple storage units and a parity storage unit to recover data for a failed one of the storage units |
CN104750666A (en) * | 2015-03-12 | 2015-07-01 | 明博教育科技有限公司 | Text character encoding mode identification method and system |
CN105306063A (en) * | 2015-10-12 | 2016-02-03 | 浙江大学 | Optimization and recovery methods for record type data storage space |
CN105847931A (en) * | 2016-03-28 | 2016-08-10 | 深圳Tcl新技术有限公司 | Subtitle display method and subtitle display device |
Non-Patent Citations (2)
Title |
---|
闫静等: "应用开发中的中文乱码原因及其解决方案", 《成都信息工程学院学报》 * |
陈小瀚: "中文编码原理及其乱码问题的探讨", 《科技信息(科学教研)》 * |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112151069A (en) * | 2020-08-20 | 2020-12-29 | 深圳市捷视飞通科技股份有限公司 | Voice data processing method and device, computer equipment and storage medium |
CN112151069B (en) * | 2020-08-20 | 2024-03-15 | 深圳市捷视飞通科技股份有限公司 | Voice data processing method, device, computer equipment and storage medium |
CN117391070A (en) * | 2023-12-08 | 2024-01-12 | 和元达信息科技有限公司 | Method and system for adjusting random character |
CN117391070B (en) * | 2023-12-08 | 2024-03-22 | 和元达信息科技有限公司 | Method and system for adjusting random character |
Also Published As
Publication number | Publication date |
---|---|
CN108108267B (en) | 2021-06-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103514238B (en) | Sensitive word identifying processing method based on classification searching | |
CN102930192B (en) | Security information generates and acquisition methods and relevant apparatus | |
CN107025239B (en) | Sensitive word filtering method and device | |
CN107070852A (en) | Network attack detecting method and device | |
CN106612172A (en) | Data change recovery algorithm capable of restoring data authenticity in cloud storage | |
CN106682534A (en) | Method and device for verifying data integrity in data migration process | |
CN108197087A (en) | Character code recognition methods and device | |
CN108038484B (en) | Method for quickly identifying hollow verification code | |
CN103415007A (en) | Mobile phone two-dimensional code safe use method based on information hiding | |
CN110275940B (en) | Chinese address identification method and equipment | |
CN107832631A (en) | The method for secret protection and system of a kind of data publication | |
CN108053545A (en) | Certificate verification method and apparatus, server, storage medium | |
CN102194081A (en) | Method for hiding natural language information | |
CN108108267A (en) | The restoration methods and device of data | |
US20160283582A1 (en) | Device and method for detecting similar text, and application | |
CN105045676A (en) | Device and method for recovering lost data based on SQLite database | |
CN103793734B (en) | A kind of Quick Response Code segmentation method of calibration | |
JP6715316B2 (en) | Deep Learning Method Applying Hexadecimal Image Conversion and Incremental Learning for Web Traffic Learning | |
CN104714969A (en) | Detection method and device for attribute values | |
CN108932434B (en) | Data encryption method and device based on machine learning technology | |
CN110390001A (en) | A kind of viewpoint type machine reads the implementation method understood, device | |
CN106803116A (en) | A kind of method and device for generating Asset Tag | |
CN109597987A (en) | A kind of text restoring method, device and electronic equipment | |
WO2016206446A1 (en) | Character encoding method and character decoding method having error correction function and product thereof | |
CN113705164A (en) | Text processing method and device, computer equipment and readable storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: 100083 No. 401, 4th Floor, Haitai Building, 229 North Fourth Ring Road, Haidian District, Beijing Applicant after: Beijing Guoshuang Technology Co.,Ltd. Address before: 100086 Cuigong Hotel, 76 Zhichun Road, Shuangyushu District, Haidian District, Beijing Applicant before: Beijing Guoshuang Technology Co.,Ltd. |
|
CB02 | Change of applicant information | ||
GR01 | Patent grant | ||
GR01 | Patent grant |