CN112307489B - Character display method, device, electronic equipment and computer readable storage medium - Google Patents

Character display method, device, electronic equipment and computer readable storage medium Download PDF

Info

Publication number
CN112307489B
CN112307489B CN202010592403.5A CN202010592403A CN112307489B CN 112307489 B CN112307489 B CN 112307489B CN 202010592403 A CN202010592403 A CN 202010592403A CN 112307489 B CN112307489 B CN 112307489B
Authority
CN
China
Prior art keywords
target
field
character
information
target data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010592403.5A
Other languages
Chinese (zh)
Other versions
CN112307489A (en
Inventor
李登峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhou Rongan Technology Beijing Co ltd
Original Assignee
Shenzhou Rongan Technology Beijing Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhou Rongan Technology Beijing Co ltd filed Critical Shenzhou Rongan Technology Beijing Co ltd
Priority to CN202010592403.5A priority Critical patent/CN112307489B/en
Publication of CN112307489A publication Critical patent/CN112307489A/en
Application granted granted Critical
Publication of CN112307489B publication Critical patent/CN112307489B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/248Presentation of query results
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Abstract

The embodiment of the application provides a character display method, a character display device, electronic equipment and a computer readable storage medium, and relates to the technical field of network security. The method comprises the following steps: the first equipment receives a query request, wherein the query request carries information of target characters; the first equipment queries a field to which a target character belongs in a pre-constructed word stock as a target field, wherein the word stock comprises field information of at least one field, and the field information carries character information in a corresponding field; the first device sends target data to the second device so that the second device displays target characters according to the target data, and the target data carries character information in a target field. According to the embodiment of the application, the external independent chip stored with the word stock is stored in other equipment, so that the cost of the second equipment is reduced, and the safety in the data transmission process is ensured.

Description

Character display method, device, electronic equipment and computer readable storage medium
Technical Field
The present application relates to the field of network security technologies, and in particular, to a character display method, a device, an electronic apparatus, and a computer readable storage medium.
Background
At present, in a banking system, a user finishes information verification during transfer by issuing a priority to the user so as to ensure the transfer correctness.
The advantage shield not only can verify the transfer information, but also can display related transfer information on a display screen, for example, the transfer amount is one ten thousand yuan. The information is displayed in a mode that a character matrix of the information to be displayed is searched in a character library stored in the excellent shield, and then the information is displayed on a screen according to the dot matrix position relation shown by the character matrix.
In the prior art, because the memory occupied by the word stock is large, the word stock is usually placed in an independent external chip in the eushield, that is, the independent external chip is a component part of the eushield, but the hardware structure of the independent external chip causes the cost of the eushield to increase.
Disclosure of Invention
The application provides a character display method, a device, electronic equipment and a computer readable storage medium, which can solve the problem of increased cost of a priority shield due to a hardware structure comprising an independent external chip in the priority shield. The technical scheme is as follows:
in a first aspect, there is provided a character display method, the method comprising:
the first equipment receives a query request, wherein the query request carries information of target characters;
The first equipment queries a field to which a target character belongs in a pre-constructed word stock as a target field, wherein the word stock comprises field information of at least one field, and the field information carries character information in a corresponding field;
the first device sends target data to the second device so that the second device displays target characters according to the target data, and the target data carries character information in a target field.
The first device sending target data to the second device, comprising:
the first equipment performs preset operation on the target field;
or, performing a preset operation on the target field and the target character and/or the position information, wherein the position information characterizes the storage position of the target field in the word stock.
The preset operation is compression operation, or compression operation is performed before encryption operation, or hash operation is performed before encryption operation is performed.
In a second aspect, the present application further provides a character display method, including:
the second equipment sends a query request which carries information of the target character;
the second device receives the target data sent by the first device and displays target characters according to the target data;
the target data carries character information in a target field, wherein the target field is a field to which a target character obtained by inquiring in a pre-constructed word stock by the first device belongs, the word stock comprises field information of at least one field, and the field information carries character information in a corresponding field.
The target data are obtained by the first equipment performing preset operation on the target field;
or the target data is obtained by the first device performing preset operation on the target field, the target character and/or the position information, and the position information represents the storage position of the target field in the word stock.
The preset operation is compression operation, or compression operation is performed before encryption operation, or hash operation is performed before encryption operation is performed.
Displaying the target character according to the target data, comprising:
verifying the target data to verify whether a target field carried by the target data is a field to which a target character actually belongs;
and after the verification is successful, displaying the target character according to the target field in the target data.
The second device stores part of character information in a field to which the target character actually belongs;
verifying the target data, including:
acquiring character information of a target field from target data;
if part of the character information belongs to the character information in the target field, determining that verification is passed.
Verifying the target data, further comprising:
acquiring a target field from target data;
carrying out hash calculation on the target field to obtain a first hash value;
If the first hash value is the same as a second hash value stored by the second device, determining that verification is passed, wherein the second hash value is obtained by performing hash calculation on a field to which the target character actually belongs.
The target data carries the position information of the target field stored in the word stock; before determining that the verification is passed, further comprising:
judging whether the position information carried by the target field received by the second equipment is consistent with the position information of the field to which the target character actually belongs, which is stored by the second equipment; if yes, determining that the verification is passed.
In a third aspect, the present application provides a character display device, which is a first device, including:
the first receiving module is used for receiving a query request, wherein the query request carries information of target characters;
the query module is used for querying a field to which a target character belongs in a pre-constructed word stock as a target field, wherein the word stock comprises field information of at least one field, and the field information carries character information in a corresponding field;
and the operation module is used for sending the target data to the second equipment so that the second equipment displays target characters according to the target data, and the target data carries character information in a target field.
The operation module is specifically used for:
performing preset operation on the target field;
or, performing a preset operation on the target field and the target character and/or the position information, wherein the position information characterizes the storage position of the target field in the word stock.
In a fourth aspect, the present application further provides a character display device, which is a second device, including:
the sending module is used for sending a query request, wherein the query request carries information of target characters;
the second receiving module is used for receiving the target data sent by the first equipment;
the display module is used for displaying target characters according to the target data;
the target data carries character information in a target field, wherein the target field is a field to which a target character obtained by inquiring in a pre-constructed word stock by the first device belongs, the word stock comprises field information of at least one field, and the field information carries character information in a corresponding field.
The verification display module comprises a verification sub-module and a display sub-module, wherein:
the verification sub-module is used for verifying the target data to verify whether the target field carried by the target data is the field to which the target character actually belongs;
And the display sub-module is used for displaying the target characters according to the target fields in the target data after the verification is successful.
The second device stores part of character information in a field to which the target character actually belongs; the verification sub-module is specifically used for:
acquiring character information of a target field from target data;
if part of character information belongs to character information in a target field, performing preset operation on the target field to obtain a first operation value; if the first operation value is the same as a second operation value stored by the second device, determining that verification is passed, wherein the second operation value is obtained by performing preset operation on an actual field of the target character.
The verification sub-module is specifically used for:
acquiring a target field from target data;
carrying out hash calculation on the target field to obtain a first hash value;
if the first hash value is the same as a second hash value stored by the second device, determining that verification is passed, wherein the second hash value is obtained by performing hash calculation on a field to which the target character actually belongs.
The target data carries the storage position information of the target field in the word stock; the verification sub-module is further configured to:
before verification is confirmed to pass, judging whether the position information carried by the target field received by the second equipment is consistent with the position information of the field to which the target character actually belongs, which is stored by the second equipment;
If yes, determining that the verification is passed.
In a fourth aspect, the present application provides an electronic device, which includes:
one or more processors;
a memory;
one or more applications, wherein the one or more applications are stored in the memory and configured to be executed by the one or more processors, the one or more applications configured to: one of the two character display methods described above may be performed.
In a fifth aspect, the present application also provides a computer-readable storage medium having stored thereon a computer program, characterized in that the program, when executed by a processor, implements one of the two character display methods described above.
The beneficial effects that this application provided technical scheme brought are:
in the technical scheme provided by the application, the first device can be a device capable of transmitting information such as a mobile phone and a computer, and the second device can be a device requiring verification such as a priority shield. The external independent chip which is positioned in the excellent shield and stores the word stock is arranged in the first equipment, so that the cost of the first equipment, namely the excellent shield, can be reduced from the hardware structure; meanwhile, because the memory required by the word stock is larger, when the external independent chip is separated from the first device, the use of the internal storage space of the first device can be reduced. When the method is used, in order to prevent the first device from being tampered maliciously when sending related information to the second device, a word stock in the first device can be divided into at least one field, and when sending target data carrying target fields, the target data needs to be subjected to corresponding operations such as encryption, compression or hash operation. And after the second equipment receives the target data, the second equipment can perform verification according to the information carried by the target data, and after the verification is passed, the target character is displayed according to the target data. The method can still ensure the safety of the information in the transmission process under the condition that the independent chip is separated from the excellent shield, so that the cost of the excellent shield can be reduced, and the safety of the information can be ensured.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings that are required to be used in the description of the embodiments of the present application will be briefly described below.
Fig. 1 is a schematic flow chart of a character display method according to an embodiment of the present application;
FIG. 2 is a flowchart of another character display method according to an embodiment of the present disclosure;
fig. 3 is a schematic structural diagram of a character display device according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of another character display device according to an embodiment of the present disclosure;
fig. 5 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
Embodiments of the present application are described in detail below, examples of which are illustrated in the accompanying drawings, wherein the same or similar reference numerals refer to the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the drawings are exemplary only for the purpose of illustrating the present application and are not to be construed as limiting the invention.
As used herein, the singular forms "a", "an", "the" and "the" are intended to include the plural forms as well, unless expressly stated otherwise, as understood by those skilled in the art. It will be further understood that the terms "comprises" and/or "comprising," when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. It will be understood that when an element is referred to as being "connected" or "coupled" to another element, it can be directly connected or coupled to the other element or intervening elements may also be present. Further, "connected" or "coupled" as used herein may include wirelessly connected or wirelessly coupled. The term "and/or" as used herein includes all or any element and all combination of one or more of the associated listed items.
For the purpose of making the objects, technical solutions and advantages of the present application more apparent, the embodiments of the present application will be described in further detail below with reference to the accompanying drawings.
The terms referred to in this application are first introduced and explained:
dividing the word stock according to a preset dividing mode, so that the word stock stores at least one field, and each field contains at least one character information, wherein the character information is used for expressing a lattice structure of the character when the character is displayed on a screen.
The character display method, the character display device, the electronic equipment and the computer readable storage medium aim to solve the technical problems in the prior art.
The following describes the technical solutions of the present application and how the technical solutions of the present application solve the above technical problems in detail with specific embodiments. The following embodiments may be combined with each other, and the same or similar concepts or processes may not be described in detail in some embodiments. Embodiments of the present application will be described below with reference to the accompanying drawings.
The embodiment of the application provides a method for displaying characters, which is implemented by a first device, as shown in fig. 1, and includes:
Step S11, a first device receives a query request, wherein the query request carries information of a target character;
in the step, when the second device needs to acquire character information of a certain character, a query request carrying information of a target character is sent to the first device. For example, the second device is to query the character information of "Zhang", and the query request carries the related information of the target character "Zhang".
Step S12, the first equipment inquires a field to which a target character belongs in a pre-constructed word stock, and takes the field as a target field;
in the step, in order to ensure the safety of the subsequent transmission information, dividing a word stock according to actual needs, wherein the divided word stock comprises field information of at least one field, and the field information carries character information in a corresponding field;
for example, if a field in the word stock includes four character information of "Zhang Wangli Zhao", the field is regarded as the target field
In step S13, the first device sends the target data to the second device, so that the second device displays the target character according to the target data, and the target data carries the character information in the target field.
In the step, after receiving the target data, the second device can display the "sheet" on the screen according to the character information of the "sheet" carried by the target data;
In this step, in order to ensure the security of information transfer, a corresponding operation needs to be performed on the target field, so that the first device sends the target data to the second device specifically includes one of the following two ways:
first, a first device performs a preset operation on a target field; in the step, only the target field Zhang Wangli is subjected to preset operation;
second, the first device performs preset operation on the target field, the target character and/or the position information, wherein the position information characterizes the storage position of the target field in the word stock; in the step, the target field Zhang Wangli and the target character sheet and/or the position information of the target field are subjected to preset operation;
the preset operation in the first and second schemes may be a compression operation, or a compression operation followed by an encryption operation, or a hash operation followed by an encryption operation.
In the process, the word stock is stored in the first equipment, so that the hardware cost of the second equipment can be reduced; and the word stock is divided into at least one field, so that the safety of the transmitted information can be ensured in the transmission process, and the second equipment can correctly display the required characters.
The embodiment of the application provides a possible implementation manner, wherein the first device pre-stores a position relation table, and the position relation table is used for representing the position of a field where a character is located; after the first device receives the query request sent by the second device, searching the position of the field corresponding to the target character in the pre-stored position relation table, and querying the field containing the target character according to the position.
In an embodiment of the present application, another method for displaying characters is provided, where the method is implemented by a second device, as shown in fig. 2, and the method includes:
step S21, the second equipment sends a query request, wherein the query request carries information of target characters;
specifically, in this step, the information that the target character carried by the query request sent by the second device is "Zhang", that is, the second device needs to query the word stock of the first device for the character information of "Zhang", so as to display on the screen;
after the first device finds the target field where the 'sheet' is located, the first device sends target data to the second device;
step S22, the second device receives the target data sent by the first device;
in this step, the target data carries "Zhang" character information in the target field "Zhang Wangli Zhao", where the target field is obtained by querying a first device in a pre-built word stock, the target field is a field to which the queried target character belongs, the word stock includes field information of at least one field, and the field information carries the character information in the corresponding field.
The target data in this step is obtained in one of two ways:
first, the target field Zhang Wangli Zhao is obtained by the first device performing the preset operation;
second, the first device performs a preset operation on the target field Zhang Wangli and the target character Zhao and/or position information, which characterizes the storage position of the target field in the word stock.
The preset operation in the first and second modes is a compression operation, or a compression operation is performed before an encryption operation, or a hash operation is performed before an encryption operation.
Step S23, displaying target characters according to the target data; the method specifically comprises the following steps:
verifying the target data to verify whether a target field carried by the target data is a field to which a target character actually belongs; when the verification is confirmed to pass, displaying target characters according to target fields in target data;
the second device pre-stores part of character information in a field to which the target character actually belongs; for example, the partial character information stored for the character information of the target field "Zhang Wangli" in the second device is "Wang Zhao", and the selection of the partial character information may be set according to actual needs, and preferably, one character information may be selected every predetermined number, and the selected character information is used as the partial character information.
Specifically, the verification of the target data includes one of the following ways:
firstly, acquiring character information of a target field, namely character information of 'Zhang Wangli Zhao' from target data; if part of character information, namely 'Wang Zhao', belongs to character information in a target field, performing preset operation, namely MAC operation, on the target field to obtain a first operation value; if the first operation value is the same as a second operation stored in the second device, determining that verification is passed, wherein the second operation value is obtained by performing preset operation on a field to which the target character actually belongs.
Second, obtaining a target field from target data; carrying out hash calculation on the target field to obtain a first hash value; if the first hash value is the same as a second hash value stored by the second device, determining that verification is passed, wherein the second hash value is obtained by performing hash calculation on a field to which the target character actually belongs.
In the above process, a verification step of the position information can be added: when the second device receives the position information of the target field in the word stock, which is carried in the target data, the received position information is compared with the position information of the field to which the target character actually belongs, which is stored by the second device, and if the received position information is consistent with the position information of the field to which the target character actually belongs, verification is determined to pass.
In the solution provided in the foregoing embodiment, the first device may be any device that may transfer information and has a certain storage space, for example, a mobile phone, a computer, etc.; the second device may be any device that can transfer information and perform verification, such as a eushield; the compression operation may be a mac operation.
According to the embodiment, malicious tampering of information can be prevented, the word stock in the first device is divided into at least one field, and when target data carrying the target field is sent, corresponding operations such as encryption, compression or hash operation are needed to be carried out on the target data. And after the second equipment receives the target data, checking according to the information carried by the target data, and displaying target characters according to the target data after the verification is confirmed to pass. The method can still ensure the authenticity and the integrity of the information source and the safety in the transmission process under the condition that the independent external chip is separated from the priority shield.
The following is a detailed description of specific embodiments involving a first device and a second device. The first device stores a pre-built word stock, the word stock has been divided into at least one field according to a preset division mode, wherein the field information of the field corresponding to the target character is 'Zhang Wangli Zhao'; the target character required by the second device is "Zhang", the second device stores in advance the compressed value corresponding to each field in the word stock of the first device, i.e. the mac value, or the hash value, and the partial verification information corresponding to each field information, for example, "Zhang Wangli Zhao" corresponds to "Wang Zhao"; the second device stores the storage position information in the word stock where the target character's' is located. The specific process is as follows:
Step A, a second device sends a query request to a first device, wherein the query request carries information of a target character;
step B, after receiving the inquiry request, the first device searches the field of the target character in the word stock according to the position relation table stored by the first device, and takes the searched field as a target field, namely 'Zhang Wangli Zhao';
step C, the first device performs one of the following two ways:
step C01, the first device performs a preset operation on the target field, namely, performs a preset operation on 'Zhang Wangli Zhao';
step C02, the first device performs a preset operation on the target field Zhang Wangli Zhao and the position information of the target character Zhao and/or the target field;
the preset operation in step C01 and step C02 is a mac operation or a hash operation;
step D, the first device encrypts the data after the preset operation is completed, and sends the encrypted data to the second device as target data;
in another embodiment, the encryption operation may be performed first, and then the mac operation or the hash operation may be performed.
E, after receiving the target data, the second equipment decrypts the target data;
step D, the second device verifies the decrypted target data, wherein the specific verification mode comprises one of the following two modes:
Step D01, when the target data sent by the first device is data subjected to the mac operation, comparing partial character data stored by the first device with the received character information of the target field, namely comparing 'Wang Zhao' and 'Zhang Wangli Zhao', and when the character information of the target field contains partial character information, determining that the verification is passed;
when the above method, that is, the MAC method is used, after decrypting the target data, it is necessary to perform a preset operation on the target field, that is, a MAC operation, in addition to comparing whether part of the character data is consistent, specifically, the method is as follows: the second device needs to calculate the target data by using the pre-stored symmetric key to obtain a first operation value, and compares the first operation value with a second operation value pre-stored by the second device, and when the comparison results are consistent, the verification is confirmed. The symmetric key pre-stored by the second device is also derived from the mac calculation key. The second operation value is obtained by carrying out preset operation on the field of the target character.
Step D02, when the target data sent by the first device is data subjected to hash operation, calculating a hash value of a target field in the target data to obtain a first hash value, and when the first hash value is consistent with a second hash value stored in advance by the second device, determining that verification is passed, wherein the second hash value is a hash value of a field to which the target character actually belongs;
In order to further obtain a more accurate verification result, the verification method may further include:
step D03, when the second device determines that the position information carried in the target data is consistent with the position information actually belonged to the target character stored by the second device, determining that verification is passed;
the sequence of the steps D01, D02 and D03 can be adjusted according to the actual situation.
And E, after the verification is confirmed to pass, the second device displays the target characters according to the character information in the target field carried by the target data, namely, displaying a 'sheet' on a display screen of the second device.
In the technical scheme provided by the application, the first device can be a device capable of transmitting information such as a mobile phone and a computer, and the second device can be a device requiring verification such as a priority shield. The external independent chip which is positioned in the U-shaped shield and stores the word stock is arranged in the first equipment, so that the cost of the U-shaped shield can be reduced from the hardware structure, and meanwhile, the use of the internal storage space of the U-shaped shield can be reduced when the external independent chip is separated from the U-shaped shield due to the large memory required by the word stock. When the method is used, in order to prevent malicious tampering, a word stock in the first device can be divided into at least one field, and when target data carrying the target field is sent, corresponding operations such as encryption, compression or hash operation are required to be performed on the target data. And after the second equipment receives the target data, the second equipment can perform verification according to the information carried by the target data, and after the verification is passed, the target character is displayed according to the target data. The method can still ensure the safety of the information in the transmission process under the condition that the independent chip is separated from the excellent shield, so that the cost of the excellent shield can be reduced, and the safety of the information can be ensured.
The embodiment of the application provides a character display device, which is a first device, as shown in fig. 3, and includes:
the first receiving module 31 is configured to receive a query request, where the query request carries information of a target character;
the query module 32 is configured to query a field to which a target character belongs in a pre-constructed word stock, where the word stock includes field information of at least one field, and the field information carries character information in a corresponding field;
and an operation module 33, configured to send the target data to the second device, so that the second device displays the target character according to the target data, and the target data carries the character information in the target field.
The operation module 33 is specifically configured to:
performing preset operation on the target field;
or, performing preset operation on the target field by using target characters and/or position information, wherein the position information characterizes the storage position of the target characters in a word stock.
The embodiment of the application provides another character display device, which is a second device, as shown in fig. 4, and includes:
a sending module 41, configured to send a query request, where the query request carries information of a target character;
A second receiving module 42, configured to receive the target data sent by the first device;
a display module 43 for displaying target characters according to the target data;
the target data carries character information in a target field, wherein the target field is a field to which a target character obtained by inquiring in a pre-constructed word stock by the first device belongs, the word stock comprises field information of at least one field, and the field information carries character information in a corresponding field.
The display module 43 includes a verification sub-module and a display sub-module;
a verification sub-module 44, configured to verify the target data to verify whether the target field carried by the target data is a field to which the target character actually belongs;
and the display sub-module 45 is used for displaying the target characters according to the target fields in the target data after the verification is successful.
The second device stores part of character information in a field to which the target character actually belongs; the verification sub-module 44 is specifically configured to: acquiring character information of a target field from target data; if part of character information belongs to character information in a target field, performing preset operation on the target field to obtain a first operation value; if the first operation value is the same as a second operation value stored by the second device, determining that verification is passed, wherein the second operation value is obtained by performing preset operation on an actual field of the target character.
The verification sub-module 44 is specifically configured to: acquiring a target field from target data; carrying out hash calculation on the target field to obtain a first hash value; if the first hash value is the same as a second hash value stored by the second device, determining that verification is passed, wherein the second hash value is obtained by performing hash calculation on a field to which the target character actually belongs.
The target data carries the position information of the target field stored in the word stock; the verification sub-module 44 is further configured to determine, before determining that verification is passed, whether the location information carried by the target field received by the second device is consistent with the location information of the field to which the target character actually belongs, where the location information is stored by the second device itself; if yes, determining that the verification is passed.
An embodiment of the present application provides an electronic device, including: a memory and a processor; at least one program stored in the memory for execution by the processor, which, when executed by the processor, performs: the external independent chip which is positioned in the U-shaped shield and stores the word stock is arranged in the first equipment, so that the cost of the U-shaped shield can be reduced from the hardware structure, and meanwhile, the use of the internal storage space of the U-shaped shield can be reduced when the external independent chip is separated from the U-shaped shield due to the large memory required by the word stock. The method can prevent malicious tampering, can divide a word stock in the first device into a plurality of sections of fields, and needs to perform corresponding operations such as encryption, compression or hash operation on target data when the target data carrying the target fields is sent. And after the second equipment receives the target data, checking according to the information carried by the target data, and displaying target characters according to the target data after the checking is successful. The method can still ensure the safety of the information in the transmission process under the condition that the independent chip is separated from the priority shield.
In an alternative embodiment, there is provided an electronic device, as shown in fig. 5, the electronic device 4000 shown in fig. 5 includes: a processor 4001 and a memory 4003. Wherein the processor 4001 is coupled to the memory 4003, such as via a bus 4002. Optionally, the electronic device 4000 may also include a transceiver 4004. It should be noted that, in practical applications, the transceiver 4004 is not limited to one, and the structure of the electronic device 4000 is not limited to the embodiment of the present application.
The processor 4001 may be a CPU (Central Processing Unit ), general purpose processor, DSP (Digital Signal Processor, data signal processor), ASIC (Application Specific Integrated Circuit ), FPGA (Field Programmable Gate Array, field programmable gate array) or other programmable logic device, transistor logic device, hardware components, or any combination thereof. Which may implement or perform the various exemplary logic blocks, modules, and circuits described in connection with this disclosure. The processor 4001 may also be a combination that implements computing functionality, e.g., comprising one or more microprocessor combinations, a combination of a DSP and a microprocessor, etc.
Bus 4002 may include a path to transfer information between the aforementioned components. Bus 4002 may be a PCI (Peripheral Component Interconnect, peripheral component interconnect standard) bus or an EISA (Extended Industry Standard Architecture ) bus, or the like. The bus 4002 can be divided into an address bus, a data bus, a control bus, and the like. For ease of illustration, fig. 5 is shown with a bold line, but does not represent only one bus or one type of bus.
Memory 4003 may be, but is not limited to, ROM (Read Only Memory) or other type of static storage device that can store static information and instructions, RAM (Random Access Memory ) or other type of dynamic storage device that can store information and instructions, EEPROM (Electrically Erasable Programmable Read Only Memory ), CD-ROM (Compact Disc Read Only Memory, compact disc Read Only Memory) or other optical disk storage, optical disk storage (including compact discs, laser discs, optical discs, digital versatile discs, blu-ray discs, etc.), magnetic disk storage media or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer.
The memory 4003 is used for storing application program codes for executing the present application, and execution is controlled by the processor 4001. The processor 4001 is configured to execute application program codes stored in the memory 4003 to realize what is shown in the foregoing method embodiment.
Among them, electronic devices include, but are not limited to: computers, cell phones, shields, etc.
The present application provides a computer readable storage medium having a computer program stored thereon, which when run on a computer, causes the computer to perform the corresponding method embodiments described above. Compared with the prior art, the method has the advantages that the external independent chip which is positioned in the U-shaped shield and stores the word stock is arranged in the first device, so that the cost of the U-shaped shield can be reduced from the hardware structure, and meanwhile, the use of the internal storage space of the U-shaped shield can be reduced when the external independent chip is separated from the U-shaped shield due to the fact that the memory required by the word stock is large. But the way in which the word stock is stored may lead to malicious tampering when the first device sends relevant information to the second device. In order to prevent malicious tampering from being sent, the word stock in the first device may be divided into multiple segments of fields, and when the target data carrying the target field is sent, operations such as corresponding encryption, compression or hash operation need to be performed on the target data. And after the second equipment receives the target data, checking according to the information carried by the target data, and displaying target characters according to the target data after the checking is successful. The method can still ensure the safety of the information in the transmission process under the condition that the independent chip is separated from the priority shield.
It should be understood that, although the steps in the flowcharts of the figures are shown in order as indicated by the arrows, these steps are not necessarily performed in order as indicated by the arrows. The steps are not strictly limited in order and may be performed in other orders, unless explicitly stated herein. Moreover, at least some of the steps in the flowcharts of the figures may include a plurality of sub-steps or stages that are not necessarily performed at the same time, but may be performed at different times, the order of their execution not necessarily being sequential, but may be performed in turn or alternately with other steps or at least a portion of the other steps or stages.
The foregoing is only a partial embodiment of the present invention, and it should be noted that it will be apparent to those skilled in the art that modifications and adaptations can be made without departing from the principles of the present invention, and such modifications and adaptations are intended to be comprehended within the scope of the present invention.

Claims (17)

1. A character display method, comprising:
the method comprises the steps that first equipment receives a query request, wherein the query request carries information of target characters;
The first device queries a field to which the target character belongs in a pre-constructed word stock as a target field, wherein the word stock comprises field information of at least one field, and the field information carries character information in a corresponding field;
the first device sends target data to the second device so that the second device displays the target characters according to the target data, wherein the target data carries character information in the target field;
the second device displaying the target character according to the target data, including:
the second device verifies the target data to verify whether a target field carried by the target data is a field to which the target character actually belongs;
after verification is successful, displaying the target character according to a target field in the target data;
the second device stores part of character information in a field to which the target character actually belongs;
the verifying the target data comprises the following steps:
the second device acquires character information of the target field from the target data;
when the partial character information belongs to the character information in the target field, performing preset operation on the target field to obtain a first operation value;
And if the first operation value is the same as a second operation stored in the second device, determining that verification is passed, wherein the second operation value is obtained by performing preset operation on an actual belonging field of the target character.
2. The character display method according to claim 1, wherein the first device transmitting the target data to the second device includes:
the first device performs preset operation on the target field;
or the first device performs a preset operation on the target field and the target character and/or position information, wherein the position information characterizes the storage position of the target field in the word stock.
3. The character display method according to claim 2, wherein the predetermined operation is a compression operation, or a compression operation is performed before an encryption operation, or a hash operation is performed before an encryption operation is performed.
4. A character display method, comprising:
the second equipment sends a query request, wherein the query request carries information of target characters;
the second device receives target data sent by the first device, and displays the target character according to the target data;
The target data carries character information in a target field, wherein the target field is a field to which the target character obtained by inquiring in a pre-constructed word stock by the first device belongs, the word stock comprises field information of at least one field, and the field information carries character information in a corresponding field;
the displaying the target character according to the target data comprises the following steps:
verifying the target data to verify whether a target field carried by the target data is a field to which the target character actually belongs;
after verification is successful, displaying the target character according to a target field in the target data;
the second device stores part of character information in a field to which the target character actually belongs;
the verifying the target data comprises the following steps:
acquiring character information of the target field from the target data;
when the partial character information belongs to the character information in the target field, performing preset operation on the target field to obtain a first operation value;
and if the first operation value is the same as a second operation stored in the second device, determining that verification is passed, wherein the second operation value is obtained by performing preset operation on an actual belonging field of the target character.
5. The character display method according to claim 4, wherein,
the target data are obtained by the first device performing preset operation on the target field;
or the target data is obtained by the first device performing preset operation on the target field, the target character and/or the position information, and the position information characterizes the storage position of the target field in the word stock.
6. The character display method according to claim 5, wherein the predetermined operation is a compression operation, or a compression operation is performed before an encryption operation, or a hash operation is performed before an encryption operation is performed.
7. The character display method according to claim 4, wherein the verifying the target data includes:
acquiring the target field from the target data; carrying out hash calculation on the target field to obtain a first hash value;
and if the first hash value is the same as a second hash value stored by the second device, determining that verification is passed, wherein the second hash value is obtained by carrying out hash calculation on an actual field of the target character.
8. The character display method according to claim 4 or 7, wherein the target data carries position information of the target field stored in the word stock;
before the verification is determined to pass, the method further comprises:
judging whether the position information carried by the target field received by the second equipment is consistent with the position information of the field to which the target character actually belongs, which is stored by the second equipment;
if yes, determining that the verification is passed.
9. A character display device, characterized in that the character display device is a first device comprising:
the first receiving module is used for receiving a query request, wherein the query request carries information of target characters;
the query module is used for querying a field to which the target character belongs in a pre-constructed word stock as a target field, wherein the word stock comprises field information of at least one field, and the field information carries character information in a corresponding field;
the operation module is used for sending target data to the second equipment so that the second equipment can display the target characters according to the target data, and the target data carries character information in the target field;
The second device displaying the target character according to the target data, including:
the second device verifies the target data to verify whether a target field carried by the target data is a field to which the target character actually belongs;
after verification is successful, displaying the target character according to a target field in the target data;
the second device stores part of character information in a field to which the target character actually belongs;
the verifying the target data comprises the following steps:
the second device acquires character information of the target field from the target data;
when the partial character information belongs to the character information in the target field, performing preset operation on the target field to obtain a first operation value;
and if the first operation value is the same as a second operation stored in the second device, determining that verification is passed, wherein the second operation value is obtained by performing preset operation on an actual belonging field of the target character.
10. The character display device according to claim 9, wherein the operation module is specifically configured to:
performing preset operation on the target field;
Or, performing a preset operation on the target field and the target character and/or position information, wherein the position information characterizes the storage position of the target character in the word stock.
11. A character display device, characterized in that the character display device is a second device comprising:
the sending module is used for sending a query request, wherein the query request carries information of target characters;
the second receiving module is used for receiving the target data sent by the first equipment;
the display module is used for displaying the target characters according to the target data;
the target data carries character information in a target field, wherein the target field is a field to which the target character obtained by inquiring in a pre-constructed word stock by the first device belongs, the word stock comprises field information of at least one field, and the field information carries character information in a corresponding field;
the display module includes:
the verification sub-module is used for verifying the target data to verify whether a target field carried by the target data is a field to which the target character actually belongs;
The display sub-module is used for displaying the target characters according to the target fields in the target data after the verification is successful;
the second device stores part of character information in a field to which the target character actually belongs; the verification sub-module is specifically configured to:
acquiring character information of the target field from the target data;
if the partial character information belongs to the character information in the target field, performing preset operation on the target field to obtain a first operation value;
and if the first operation value is the same as a second operation value stored by the second equipment, determining that the verification is passed, wherein the second operation value is obtained by carrying out preset operation on the field of the target character.
12. The character display device of claim 11, wherein the verification sub-module is specifically configured to:
acquiring the target field from the target data;
carrying out hash calculation on the target field to obtain a first hash value;
and if the first hash value is the same as a second hash value stored by the second device, determining that verification is passed, wherein the second hash value is obtained by carrying out hash calculation on an actual field of the target character.
13. The character display apparatus according to claim 11 or 12, wherein the target data carries storage position information of the target field in the word stock; the verification sub-module is further configured to:
before verification is confirmed to pass, judging whether the position information carried by the target field received by the second equipment is consistent with the position information of the field to which the target character actually belongs, which is stored by the second equipment;
if yes, determining that the verification is passed.
14. An electronic device, comprising:
one or more processors;
a memory;
one or more applications, wherein the one or more applications are stored in the memory and configured to be executed by the one or more processors, the one or more applications configured to: a character display method according to any one of claims 1 to 3.
15. An electronic device, comprising:
one or more processors;
a memory;
one or more applications, wherein the one or more applications are stored in the memory and configured to be executed by the one or more processors, the one or more applications configured to: the character display method according to any one of claims 4 to 8 is performed.
16. A computer-readable storage medium, on which a computer program is stored, characterized in that the program, when executed by a processor, implements the character display method according to any one of claims 1-3.
17. A computer-readable storage medium, on which a computer program is stored, characterized in that the program, when executed by a processor, implements the character display method according to any one of claims 4-8.
CN202010592403.5A 2020-06-24 2020-06-24 Character display method, device, electronic equipment and computer readable storage medium Active CN112307489B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010592403.5A CN112307489B (en) 2020-06-24 2020-06-24 Character display method, device, electronic equipment and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010592403.5A CN112307489B (en) 2020-06-24 2020-06-24 Character display method, device, electronic equipment and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN112307489A CN112307489A (en) 2021-02-02
CN112307489B true CN112307489B (en) 2024-03-22

Family

ID=74483122

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010592403.5A Active CN112307489B (en) 2020-06-24 2020-06-24 Character display method, device, electronic equipment and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN112307489B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106897280A (en) * 2015-12-17 2017-06-27 阿里巴巴集团控股有限公司 Data query method and device
CN107615277A (en) * 2015-03-26 2018-01-19 卡斯维尔公司 System and method for inquiring about data source
CN108241670A (en) * 2016-12-26 2018-07-03 北京国双科技有限公司 Database statement generation method and device
CN109635256A (en) * 2018-12-20 2019-04-16 上海掌门科技有限公司 Method and apparatus for verifying data
CN110647562A (en) * 2019-09-29 2020-01-03 中国联合网络通信集团有限公司 Data query method and device, electronic equipment and storage medium

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11245533B2 (en) * 2018-11-12 2022-02-08 Drone Delivery Canada Corp. System and method for secure communication with one or more unmanned aerial vehicles

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107615277A (en) * 2015-03-26 2018-01-19 卡斯维尔公司 System and method for inquiring about data source
CN106897280A (en) * 2015-12-17 2017-06-27 阿里巴巴集团控股有限公司 Data query method and device
CN108241670A (en) * 2016-12-26 2018-07-03 北京国双科技有限公司 Database statement generation method and device
CN109635256A (en) * 2018-12-20 2019-04-16 上海掌门科技有限公司 Method and apparatus for verifying data
CN110647562A (en) * 2019-09-29 2020-01-03 中国联合网络通信集团有限公司 Data query method and device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN112307489A (en) 2021-02-02

Similar Documents

Publication Publication Date Title
CN107729383B (en) Index library generation method, data verification method, device and platform
CN106790156B (en) Intelligent device binding method and device
US9418027B2 (en) Secure boot information with validation control data specifying a validation technique
US8683213B2 (en) Progressive boot for a wireless device
US8601285B2 (en) Method for secure program code execution in an electronic device
US8006084B2 (en) Apparatus and method for managing plurality of certificates
WO2018236479A1 (en) Method and system for indexing consumer enrollment using blockchain
US9734091B2 (en) Remote load and update card emulation support
CN108628611B (en) Data calling method and data calling device
CN113472720B (en) Digital certificate key processing method, device, terminal equipment and storage medium
CN111694589B (en) Upgrade package generation method, device, server and computer readable storage medium
CN104935435A (en) Login methods, terminal and application server
CN112738021A (en) Single sign-on method, terminal, application server, authentication server and medium
KR20170102219A (en) Method and apparatus for processing transactions
CN113329004B (en) Authentication method, system and device
CN114519360A (en) Data reading and writing method, login method and device of business system and computer equipment
CN112307489B (en) Character display method, device, electronic equipment and computer readable storage medium
CN116361833A (en) Verification method and device and terminal equipment
EP4261713A1 (en) License file management method and apparatus, and device
US8966254B2 (en) Keyless challenge and response system
CN112307491A (en) Character display method, device, electronic device and computer readable storage medium
CN112559825B (en) Service processing method, device, computing equipment and medium
CN114896313B (en) Data transmission method, device, equipment and medium
US20220164794A1 (en) Method of verifying identity for a computerized account, computing device, and storage medium
CN117134971A (en) Method, device, equipment and storage medium for processing encrypted data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant