CN112651214A - Method for converting data table plaintext into binary ciphertext convenient for program to read - Google Patents
Method for converting data table plaintext into binary ciphertext convenient for program to read Download PDFInfo
- Publication number
- CN112651214A CN112651214A CN202010888427.5A CN202010888427A CN112651214A CN 112651214 A CN112651214 A CN 112651214A CN 202010888427 A CN202010888427 A CN 202010888427A CN 112651214 A CN112651214 A CN 112651214A
- Authority
- CN
- China
- Prior art keywords
- data
- data table
- row
- field
- program
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F40/00—Handling natural language data
- G06F40/10—Text processing
- G06F40/12—Use of codes for handling textual entities
- G06F40/151—Transformation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Audiology, Speech & Language Pathology (AREA)
- Computational Linguistics (AREA)
- Artificial Intelligence (AREA)
- Bioethics (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Devices For Executing Special Programs (AREA)
Abstract
The invention discloses a method for converting a data table plaintext into a binary ciphertext convenient for program reading, which is combined with open source Protobuf (version 3.11.x) provided by Google and is based on a cross-platform programming language Python. Protobuf is an open-source data definition format provided by Google, each column of a data table can be mapped to a specified field in a data structure defined in Protobuf by using the Protobuf, a converted binary file is read in a program and converted into an array corresponding to the data structure type of the Protobuf, and the array can be operated, so that the data implicit in the data table such as a main key, a maximum value, a minimum value and the like can be packaged, and data access can be directly performed through reading an Excel file according to a row number and a column number, so that the code readability and the development efficiency are improved.
Description
Technical Field
The invention relates to a method for reading data in an Excel data table (xlsx, csv and the like) by a program, in particular to a method for converting a data table plaintext into a binary ciphertext which is convenient for the program to read.
Background
The existing method for reading data in Excel data table (xlsx, csv, etc.) by program is relatively cluttered because different programming languages are different for reading Excel data table.
For example, for the C + + programming language, under the Windows platform, the specified Excel file may be accessed using ODBC, or the specified Excel file may be accessed through a COM object provided by Excel; firstly, creating an ODBC or COM object, opening a file, creating an Excel object, and accessing data by a row number and a column number. Under a non-Windows platform, such as Linux, a third-party library libxls needs to be installed, and the use method is similar to that under the Windows platform. As another example, as for the Java programming language, Windows and non-Windows platforms are not involved because Java is a cross-platform programming language. One common method is to refer to an Apache POI-related class library, realize a method Parser for analyzing specified Excel content, realize a method Reader for reading Excel, then read an Excel file through the Reader, and return a result set.
At present, methods for reading Excel files for different programming languages and different platforms analyze Excel files through corresponding libraries provided by Excel, but access is performed on access cell data through rows and columns; therefore, a large amount of hard codes can be generated due to relative rigid comparison in the program development process, and if the rows and columns of Excel are transformed, the program codes also need to be correspondingly changed; if the data table files are packaged into the corresponding application programs, the data table files exist in a plain text, and certain danger is also brought to the safety of the application programs. Therefore, the existing mainstream method for reading Excel data by using a program is not a very friendly way for a demand side and a development side. Therefore, the present invention provides a method for converting the plaintext of the data table into the binary ciphertext that is easy to be read by the program, so as to solve the problems in the background art.
Disclosure of Invention
The present invention is directed to a method for converting a plaintext of a data table into a binary ciphertext that is easy to read by a program, so as to solve the problems mentioned in the background art.
In order to achieve the purpose, the invention provides the following technical scheme:
a method for converting a plaintext of a data table into a binary ciphertext that is readable by a program, the method comprising the steps of:
1) the data table is transmitted into a Python program, the Class of the corresponding data interface is found through the name of the data table, the content of the data table is read into the program through xlrd, and a null array List is declared and used for storing an object converted from the data table into the Class;
2) traversing the content of the data table, if the data table has no content, jumping to step 7), if the data table has content, starting traversing from the third row of the data table (the first row is a custom header, and the second row is a mapping name of the data structure defined by the column of data and Protobuf);
3) after data of a row is obtained, declaring an object Ins of a Class, continuously traversing the row of data from the 1 st column to obtain cell information, obtaining a second row of data Field of the current cell in the column, and obtaining the data Value of the cell, wherein the Field is the Field name mapped by the data table and the data structure;
4) if the Field does not contain middle brackets, obtaining the type of the Field in the Ins, and converting the cell data Value into a corresponding type Value emod; assigning the member corresponding to the Field in the Ins as ValueMod, if the Field contains middle brackets, indicating that the cell data is one item of a section of continuous data in the data table and corresponding to the data structure as an array; obtaining the data type of the array corresponding to the Field in the Ins, converting the Value into a Value emodr of a corresponding type, and adding the Value emodr to the tail of the array type member corresponding to the Field in the Ins;
5) after the data traversal of the row is finished, obtaining a complete data mapping object Ins, adding Ins to the tail of the List array, and then continuously traversing the content of the data table according to the rows;
6) after traversing the data table, returning an array List of the obtained Class object for binarization and writing into a file for use;
7) traversing the returned Class object array List;
8) each member of the List is an object of Class type (i.e., Python type for Protobuf) that contains a method SerializeToString that serializes the object into a binary string. Serializing the object into a binary character string BinStr to obtain the length Len of the BinStr, writing the Len (the length is 4 bytes) into a file, and continuously writing the BinStr into the file;
9) and after the traversal of the List is completed, the data table is converted into the ciphertext and then written into the binary file, and the program is ended.
As a further scheme of the invention: the contents of the data table need to start with the third row, the data of the second row being the field names of the mapping between the columns of the data table and the data structure.
As a still further scheme of the invention: the definition names of the data structure and the definition names of the data table need to be consistent.
As a still further scheme of the invention: when parsing is performed between the type defined in the data structure and the data mapped in the data table, type conversion is required.
As a still further scheme of the invention: before a binary system of a row of data is converted into a file, the length of the binary system needs to be written into the file before the binary character string.
Compared with the prior art, the invention has the beneficial effects that:
1. when data is read for Excel, data does not need to be accessed through line numbers and column numbers, the change of codes caused by the change of a data table in the development process is reduced, the readability of the codes is improved, and the development efficiency is increased.
2. When the data table is packed by the application program, the data table of the plaintext is changed into the binary format of the ciphertext, and the safety of the application program is improved.
3. When the demander provides the data table, the meaning of each column does not need to be explained in detail, the mapping relation of each column only needs to be explained, and the sequence of the columns of the data table does not need to be defined forcibly; the developer can process the data sheet only by analyzing the converted file, and the members of the operation object can process the data sheet, thereby reducing the communication cost of the demander and the developer.
Drawings
FIG. 1 is a diagram of a client information data table illustrating a method for converting plaintext data into binary data that is easily readable by a program.
FIG. 2 is a flow chart of a method for converting plaintext data form into binary ciphertext that is readable by a program.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In the embodiment of the invention, a method for converting a data table plaintext into a binary ciphertext convenient for program reading needs to be combined with an open-source Protobuf (version 3.11.x) provided by Google, based on a cross-platform programming language Python, the Protobuf is an open-source data definition format provided by Google, each column of a data table can be mapped to a specified field in a data structure defined in the Protobuf by using the Protobuf, and a third-party library xlrd (version 1.1.0) provided by Python needs to be used for analyzing the data table of Excel.
Referring to fig. 1, there is an Excel data table with a file name of corporation, xssel, which records information of clients of a company, and a Protobuf is used to define a data structure of the corporation, the name of the defined data structure needs to be consistent with that of the data table, and the data structure definition is generated into a corresponding Python definition through a tool provided by Google.
Proto, data structure definition file of company customer information data sheet:
the data of the data table is recorded from the third row, the first row is a self-defined header, and the second row is a mapping relation between the columns of the data table and the data structure defined by the Protobuf.
Referring to FIG. 2, the data table is converted into a binary ciphertext file format for easy program reading, comprising the steps of:
1) the data table is transmitted into a Python program, the Class of the corresponding data interface is found through the name of the data table, the content of the data table is read into the program through xlrd, and a null array List is declared and used for storing an object converted from the data table into the Class;
2) traversing the content of the data table, if the data table has no content, jumping to step 7), if the data table has content, starting traversing from the third row of the data table (the first row is a custom header, and the second row is a mapping name of the data structure defined by the column of data and Protobuf);
3) after data of a row is obtained, declaring an object Ins of a Class, continuously traversing the row of data from the 1 st column to obtain cell information, obtaining a second row of data Field of the current cell in the column, and obtaining the data Value of the cell, wherein the Field is the Field name mapped by the data table and the data structure;
4) if the Field does not contain middle brackets, obtaining the type of the Field in the Ins, and converting the cell data Value into a corresponding type Value emod; assigning the member corresponding to the Field in the Ins as ValueMod, if the Field contains middle brackets, indicating that the cell data is one item of a section of continuous data in the data table and corresponding to the data structure as an array; obtaining the data type of the array corresponding to the Field in the Ins, converting the Value into a Value emodr of a corresponding type, and adding the Value emodr to the tail of the array type member corresponding to the Field in the Ins;
5) after the data traversal of the row is finished, obtaining a complete data mapping object Ins, adding Ins to the tail of the List array, and then continuously traversing the content of the data table according to the rows;
6) after traversing the data table, returning an array List of the obtained Class object for binarization and writing into a file for use;
7) traversing the returned Class object array List;
8) each member of the List is an object of Class type (i.e., Python type for Protobuf) that contains a method SerializeToString that serializes the object into a binary string. Serializing the object into a binary character string BinStr to obtain the length Len of the BinStr, writing the Len (the length is 4 bytes) into a file, and continuously writing the BinStr into the file;
9) and after the traversal of the List is completed, the data table is converted into the ciphertext and then written into the binary file, and the program is ended.
The method provides a file conversion process through Python, and partial codes of a data table conversion ciphertext binary system are as follows:
the algorithm code for ciphertext binary reading and parsing is as follows:
the converted binary file is read in the program and converted into an array corresponding to the data structure type of the Protobuf, the array can be operated, the data implicit in the data tables such as a main key, a maximum value, a minimum value and the like can be packaged, data access is not required to be carried out by reading the Excel file according to the row number and the column number, the access can be directly carried out through members of the mapped data structure, and the code readability and the development efficiency are improved.
The implementation mode of the invention is as follows:
1. language environment Python, library to install, protobuf (version 3.11.2), xlrd (version 1.1.0);
2. tool protoc for installing Protobuf (version 3.11.2);
3. defining a Protobuf data structure mapped by a data table;
4. generating the type of Python of the data structure through a tool protoc of the Protobuf;
5. executing Python program, introducing protobuf library and xlrd library, and generating class defined by data structure. Transmitting the data table file into a program through parameters, and transmitting the generated binary file path into the program;
6. and executing the program, analyzing the data table and generating a ciphertext binary file.
The above description is only for the preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art should be considered to be within the technical scope of the present invention, and the technical solutions and the inventive concepts thereof according to the present invention should be equivalent or changed within the scope of the present invention.
Claims (5)
1. A method for converting a plaintext of a data table into a binary ciphertext that is readable by a program, comprising the steps of:
1) the data table is transmitted into a Python program, the Class of the corresponding data interface is found through the name of the data table, the content of the data table is read into the program through xlrd, and a null array List is declared and used for storing an object converted from the data table into the Class;
2) traversing the content of the data table, if the data table has no content, jumping to step 7), if the data table has content, traversing from the third row of the data table, wherein the first row is a custom header, and the second row is a mapping name of the data structure defined by the line of data and Protobuf;
3) after data of a row is obtained, declaring an object Ins of a Class, continuously traversing the row of data from the 1 st column to obtain cell information, obtaining a second row of data Field of the current cell in the column, and obtaining the data Value of the cell, wherein the Field is the Field name mapped by the data table and the data structure;
4) if the Field does not contain middle brackets, obtaining the type of the Field in the Ins, and converting the cell data Value into a corresponding type Value emod; assigning the member corresponding to the Field in the Ins as ValueMod, if the Field contains middle brackets, indicating that the cell data is one item of a section of continuous data in the data table and corresponding to the data structure as an array; obtaining the data type of the array corresponding to the Field in the Ins, converting the Value into a Value emodr of a corresponding type, and adding the Value emodr to the tail of the array type member corresponding to the Field in the Ins;
5) after the data traversal of the row is finished, obtaining a complete data mapping object Ins, adding Ins to the tail of the List array, and then continuously traversing the content of the data table according to the rows;
6) after traversing the data table, returning an array List of the obtained Class object for binarization and writing into a file for use;
7) traversing the returned Class object array List;
8) each member of the List is a Class type object, i.e., a Python type object corresponding to Protobuf, which contains a method serializtostring that serializes the object into a binary string. Serializing the object into a binary character string BinStr to obtain the length Len of the BinStr, writing the Len into a file, wherein the length of the Len is 4 bytes, and continuously writing the BinStr into the file;
9) and after the traversal of the List is completed, the data table is converted into the ciphertext and then written into the binary file, and the program is ended.
2. The method of claim 1, wherein the contents of the data table are started from a third row, and the data in the second row is a field name of the mapping between the columns of the data table and the data structure.
3. The method of claim 1, wherein the definition name of the data structure and the definition name of the data table need to be consistent.
4. The method of claim 1, wherein type conversion is required between the type defined in the data structure and the data mapped in the data table during parsing.
5. The method of claim 1, wherein the length of the binary string is written into the file before the binary string is written into the file.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010888427.5A CN112651214B (en) | 2020-08-28 | 2020-08-28 | Method for converting data table plaintext into binary ciphertext convenient for program to read |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010888427.5A CN112651214B (en) | 2020-08-28 | 2020-08-28 | Method for converting data table plaintext into binary ciphertext convenient for program to read |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112651214A true CN112651214A (en) | 2021-04-13 |
CN112651214B CN112651214B (en) | 2023-03-28 |
Family
ID=75346100
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010888427.5A Active CN112651214B (en) | 2020-08-28 | 2020-08-28 | Method for converting data table plaintext into binary ciphertext convenient for program to read |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112651214B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115033546A (en) * | 2022-06-27 | 2022-09-09 | 深圳市万维云数字科技有限公司 | Digital model universal format, conversion method, system, terminal and storage medium |
Citations (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101625702A (en) * | 2009-07-03 | 2010-01-13 | 无敌科技(西安)有限公司 | Encryption method of data file with file allocation table format |
CN102306255A (en) * | 2011-08-29 | 2012-01-04 | 飞天诚信科技股份有限公司 | Document protection method and system |
CN102722682A (en) * | 2012-04-28 | 2012-10-10 | 飞天诚信科技股份有限公司 | Protection method for Excel document |
CN103580857A (en) * | 2012-08-06 | 2014-02-12 | 重庆电子工程职业学院 | Compression method for Chinese character message data based on knapsack encryption |
CN105787128A (en) * | 2016-03-29 | 2016-07-20 | 四川秘无痕信息安全技术有限责任公司 | Method for recovering Java serialized file data |
CN105871542A (en) * | 2016-03-25 | 2016-08-17 | 贵州大学 | Encryption and decryption method of ciphertext |
CN106294017A (en) * | 2016-08-11 | 2017-01-04 | 苏州华兴源创电子科技有限公司 | A kind of information security back-up method |
CN107871082A (en) * | 2016-11-15 | 2018-04-03 | 平安科技(深圳)有限公司 | The method of data encryption and control extension terminal in oracle database |
CN108256807A (en) * | 2018-02-10 | 2018-07-06 | 西安科技大学 | Courier's article receiving and sending system and method based on Quick Response Code identification |
CN108804091A (en) * | 2018-05-25 | 2018-11-13 | 广州小天软件有限公司 | A kind of software code generation method |
CN109302400A (en) * | 2018-10-17 | 2019-02-01 | 成都安恒信息技术有限公司 | A kind of cryptographic asset deriving method for O&M auditing system |
CN109409101A (en) * | 2018-09-17 | 2019-03-01 | 平安科技(深圳)有限公司 | The method and terminal device of data encryption |
CN109697374A (en) * | 2018-12-28 | 2019-04-30 | 东信和平科技股份有限公司 | A kind of encryption method, decryption method and device |
CN110299989A (en) * | 2019-06-10 | 2019-10-01 | 南通大学 | A kind of encryption and decryption method of Chinese and English character string |
CN110535646A (en) * | 2018-05-24 | 2019-12-03 | 广东技术师范学院 | A kind of data information security management method |
CN110585724A (en) * | 2019-09-24 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Table data updating method and device in game client |
CN110704854A (en) * | 2019-09-27 | 2020-01-17 | 上海易点时空网络有限公司 | Stream type encryption method aiming at text data reserved format |
CN111488277A (en) * | 2020-04-08 | 2020-08-04 | 矩阵元技术(深圳)有限公司 | Node matching method, device, equipment and system |
US20200252210A1 (en) * | 2019-01-31 | 2020-08-06 | Re Formsnet, Llc | Systems and methods for encryption and authentication |
-
2020
- 2020-08-28 CN CN202010888427.5A patent/CN112651214B/en active Active
Patent Citations (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101625702A (en) * | 2009-07-03 | 2010-01-13 | 无敌科技(西安)有限公司 | Encryption method of data file with file allocation table format |
CN102306255A (en) * | 2011-08-29 | 2012-01-04 | 飞天诚信科技股份有限公司 | Document protection method and system |
CN102722682A (en) * | 2012-04-28 | 2012-10-10 | 飞天诚信科技股份有限公司 | Protection method for Excel document |
CN103580857A (en) * | 2012-08-06 | 2014-02-12 | 重庆电子工程职业学院 | Compression method for Chinese character message data based on knapsack encryption |
CN105871542A (en) * | 2016-03-25 | 2016-08-17 | 贵州大学 | Encryption and decryption method of ciphertext |
CN105787128A (en) * | 2016-03-29 | 2016-07-20 | 四川秘无痕信息安全技术有限责任公司 | Method for recovering Java serialized file data |
CN106294017A (en) * | 2016-08-11 | 2017-01-04 | 苏州华兴源创电子科技有限公司 | A kind of information security back-up method |
CN107871082A (en) * | 2016-11-15 | 2018-04-03 | 平安科技(深圳)有限公司 | The method of data encryption and control extension terminal in oracle database |
CN108256807A (en) * | 2018-02-10 | 2018-07-06 | 西安科技大学 | Courier's article receiving and sending system and method based on Quick Response Code identification |
CN110535646A (en) * | 2018-05-24 | 2019-12-03 | 广东技术师范学院 | A kind of data information security management method |
CN108804091A (en) * | 2018-05-25 | 2018-11-13 | 广州小天软件有限公司 | A kind of software code generation method |
CN109409101A (en) * | 2018-09-17 | 2019-03-01 | 平安科技(深圳)有限公司 | The method and terminal device of data encryption |
CN109302400A (en) * | 2018-10-17 | 2019-02-01 | 成都安恒信息技术有限公司 | A kind of cryptographic asset deriving method for O&M auditing system |
CN109697374A (en) * | 2018-12-28 | 2019-04-30 | 东信和平科技股份有限公司 | A kind of encryption method, decryption method and device |
US20200252210A1 (en) * | 2019-01-31 | 2020-08-06 | Re Formsnet, Llc | Systems and methods for encryption and authentication |
CN110299989A (en) * | 2019-06-10 | 2019-10-01 | 南通大学 | A kind of encryption and decryption method of Chinese and English character string |
CN110585724A (en) * | 2019-09-24 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Table data updating method and device in game client |
CN110704854A (en) * | 2019-09-27 | 2020-01-17 | 上海易点时空网络有限公司 | Stream type encryption method aiming at text data reserved format |
CN111488277A (en) * | 2020-04-08 | 2020-08-04 | 矩阵元技术(深圳)有限公司 | Node matching method, device, equipment and system |
Non-Patent Citations (6)
Title |
---|
A568005784: "python之明密文转换", 《HTTPS://BLOG.CSDN.NET/A568005784/ARTICLE/DETAILS/19932125》 * |
NAVYOFFICER: "[python]使用xlrd对Excel表格进行读写操作", 《HTTPS://BLOG.CSDN.NET/HITWANGPENG/ARTICLE/DETAILS/51364770》 * |
YOUMI CHOU: "Python xlrd 读取 Excel 表格基础(一):获取sheet、行、列对象,读取数据类型等", 《HTTPS://BLOG.CSDN.NET/ZHOUZ92/ARTICLE/DETAILS/106883774》 * |
包先雨等: "基于 N F C 的智能防伪电子铅封系统研究", 《现代电子技术》 * |
王俊峰等: "基于汉字的背包公钥加密算法", 《2006北京地区高校研究生学术交流会》 * |
郭永林等: "批量 E x c e l 校准曲线文件自动加密解密的软件设计", 《现代电子技术》 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115033546A (en) * | 2022-06-27 | 2022-09-09 | 深圳市万维云数字科技有限公司 | Digital model universal format, conversion method, system, terminal and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN112651214B (en) | 2023-03-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112015430A (en) | JavaScript code translation method and device, computer equipment and storage medium | |
CN106796525B (en) | On-demand loading dynamic script language codes are to reduce memory use | |
CN110688122A (en) | Method and device for compiling and executing intelligent contract | |
CN110704064A (en) | Method and device for compiling and executing intelligent contract | |
CN113312108A (en) | SWIFT message checking method and device, electronic equipment and storage medium | |
CN112651214B (en) | Method for converting data table plaintext into binary ciphertext convenient for program to read | |
CN112363706A (en) | Nested combination preprocessing method and equipment | |
CN106776779B (en) | Method for generating entity file by JSON data based on Mac platform | |
CN103235757B (en) | Several apparatus and method that input domain tested object is tested are made based on robotization | |
KR102546424B1 (en) | Machine learning data generating apparatus, apparatus and method for analyzing errors in source code | |
CN111488731B (en) | File generation method, device, computer equipment and storage medium | |
CN110347416B (en) | Script updating method and device | |
CN106293862B (en) | A kind of analysis method and device of expandable mark language XML data | |
CN111158665A (en) | Code generation method and device, electronic equipment and storage medium | |
CN113849781B (en) | Go language source code confusion method, system, terminal and storage medium | |
CN115495082A (en) | TLV format data automatic conversion method and related equipment | |
CN114020278B (en) | Data processing method, device, equipment and storage medium | |
CN111783482A (en) | Text translation method and device, computer equipment and storage medium | |
CN111475403A (en) | Dynamic generation method of test script and related device | |
CN117270962B (en) | Method and device for processing coloring language, storage medium and electronic equipment | |
CN113687833B (en) | Hybrid compiling method, hybrid compiling system, compiler and storage medium | |
CN111708572B (en) | Automatic control flow chart generation method based on Clang program structure | |
CN115203132B (en) | Design method for rapidly extracting OP2file architecture according to requirements | |
CN117785213B (en) | Front-end construction tool and construction method based on Rust development | |
CN116954622B (en) | Method for associating abstract syntax tree with source code coordinates, electronic device and medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |