CN113204439B - Error-proof text data copying and pasting method, system and medium - Google Patents

Error-proof text data copying and pasting method, system and medium Download PDF

Info

Publication number
CN113204439B
CN113204439B CN202110406539.7A CN202110406539A CN113204439B CN 113204439 B CN113204439 B CN 113204439B CN 202110406539 A CN202110406539 A CN 202110406539A CN 113204439 B CN113204439 B CN 113204439B
Authority
CN
China
Prior art keywords
text
hash
proprietary format
format
error
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110406539.7A
Other languages
Chinese (zh)
Other versions
CN113204439A (en
Inventor
刘耀滨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Aoe Network Technology Co ltd
Original Assignee
Shenzhen Aoe Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Aoe Network Technology Co ltd filed Critical Shenzhen Aoe Network Technology Co ltd
Priority to CN202110406539.7A priority Critical patent/CN113204439B/en
Publication of CN113204439A publication Critical patent/CN113204439A/en
Application granted granted Critical
Publication of CN113204439B publication Critical patent/CN113204439B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogram communication
    • G06F9/543User-generated data transfer, e.g. clipboards, dynamic data exchange [DDE], object linking and embedding [OLE]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/10Text processing
    • G06F40/12Use of codes for handling textual entities
    • G06F40/151Transformation

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Artificial Intelligence (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Computational Linguistics (AREA)
  • General Health & Medical Sciences (AREA)
  • Document Processing Apparatus (AREA)

Abstract

The invention provides an error-proof text data copying and pasting method, a system and a medium, wherein the method comprises the steps of adding a special format copying item and a special format pasting item in an operating system; when the operating system detects that the copying item with the proprietary format is triggered, acquiring a selected copied text, and converting the copied text into the proprietary format; when the operating system copies and pastes the proprietary format, transferring the proprietary format between the clipboard and the specified edit box; when the operating system detects that the proprietary format pasting item is triggered, the copied text is analyzed from the proprietary format and pasted to the specified edit box. The method reduces the error rate in the process of copying and pasting the text.

Description

Error-proof text data copying and pasting method, system and medium
Technical Field
The invention belongs to the technical field of computers, and particularly relates to an anti-error text data copying and pasting method, system and medium.
Background
Many computer-related scenarios use copying and pasting of text. But errors can occur during the copying and pasting of text for various reasons. Especially, in the process of copying and pasting for many times, the error probability is greatly increased. For example: 1. the process of copy-and-paste is complicated. For example, a text message needs to be transferred between multiple persons, and multiple copies and pastes are performed. 2. An erroneous operation. The shortcut keys are pressed incorrectly during the copy-and-paste process and some keys are pressed unintentionally resulting in an inadvertent addition/deletion/modification of one or two symbols to the text content. 3. Copy and paste process, put in some inappropriate edit boxes. For example, some edit boxes will automatically capitalize all letters pasted into the text, resulting in all letters in the content becoming capitalized. Many times, these errors are not discovered immediately, but only until the lag in the problem is apparent, which is a loss of resources to both individuals and businesses.
Therefore, to avoid this situation, the individual's habit must be relied upon, and care/refinement is required to prevent this situation, for example, the verification code, the telephone number, and the invitation code are simple and easy to find out errors. However, if the text content is long, it is difficult to confirm whether there is an error in the multiple copy and paste processes.
Disclosure of Invention
Aiming at the defects in the prior art, the invention provides the error-proof text data copying and pasting method, the error-proof text data copying and pasting system and the error-proof text data copying and pasting medium, so that the error rate in the text copying and pasting process is reduced.
In a first aspect, an error-proof text data copying and pasting method includes the following steps:
adding a proprietary format copy item and a proprietary format paste item in an operating system;
when the operating system detects that the copying item with the proprietary format is triggered, acquiring a selected copied text, and converting the copied text into the proprietary format;
when the operating system copies and pastes the proprietary format, transferring the proprietary format between the clipboard and the specified edit box;
when the operating system detects that the proprietary format pasting item is triggered, the copied text is analyzed from the proprietary format and is pasted to a specified edit box.
Preferably, the proprietary format copy item and the proprietary format paste item include a button set in an edit bar in an operating system or a shortcut key set in the operating system.
Preferably, the converting the copied text into the proprietary format specifically includes:
processing the copied text through a preset text hash algorithm to obtain a text hash;
the copied text is converted to a proprietary format based on the text hash.
Preferably, the text hashing algorithm includes:
dividing the copied text by lines to obtain n lines of content;
performing sha256 operation on each 1 line of content to obtain n 1 lines of hash;
performing sha256 operation on every 2 lines of content to obtain n/2 lines of hash;
performing sha256 operation on every 4 lines of content to obtain n/4 lines of hash;
...
performing sha256 operation on the content of each 2^m line to obtain 1 hash of 2^m lines, wherein 2^m is more than or equal to n;
the text hash includes: row number n,1 2^m row hashes, ·, n/4 row hashes, n/2 row hashes, n 1 row hashes;
the proprietary formats include: fixed format header, sha256 hash, copy text, text hash.
Preferably, when the operating system copies and pastes the proprietary format, the transferring the proprietary format between the clipboard and the specified edit box specifically includes:
when an operating system receives a copy instruction sent aiming at a proprietary format in an edit box, transmitting the proprietary format in the edit box to a clipboard;
when the operating system receives a paste instruction sent for the proprietary format in the clipboard, the proprietary format in the clipboard is passed to the specified edit box.
Preferably, the transferring the proprietary format in the clipboard to the specified edit box specifically includes:
pasting the proprietary format to a specified edit box in a binary or file format;
the transmitting the proprietary format in the edit box to the clipboard specifically includes:
detecting whether a prompt that the content is destroyed exists in the proprietary format;
if yes, displaying a prompt that the content is destroyed;
if not, when the proprietary format is a binary or file format and the proprietary format contains the format header, acquiring sha256 hash in the proprietary format, copied text and 2^m line hash in the text hash; performing hash operation on the copied text by using the sha256 hash; if the result of the operation does not match the 2^m row hash, a hint is generated that the content has been corrupted.
Preferably, when the operating system detects that the proprietary format pasting item is triggered, parsing the copied text from the proprietary format, and pasting the copied text into a specified edit box specifically includes:
when the fact that the proprietary format pasting item is triggered is detected, if the proprietary format does not have the prompt that the content is damaged, the sha256 hash, the copied text and the text hash in the proprietary format are obtained, and the copied text is pasted to a specified edit box;
acquiring the latest paste text of the edit box, and performing hash operation on the paste text by using the text hash algorithm and the sha256 hash; and if the operation result is inconsistent with the text hash, generating an error prompt.
Preferably, if the operation result is inconsistent with the text hash, the generating an error prompt specifically includes:
sequentially comparing the operation result with the 2^m lines of hash, 4 lines of hash, 2 lines of hash and 1 line of hash in the text hash;
and when the comparison result is inconsistent, obtaining the error line number according to the comparison result, and generating the error prompt containing the error line number.
In a second aspect, an error-proof text data copy-paste system performs the method of the first aspect.
In a third aspect, a computer-readable storage medium stores a computer program comprising program instructions which, when executed by a processor, cause the processor to perform the method of the first aspect.
According to the technical scheme, the error-preventing text data copying and pasting method, the error-preventing text data copying and pasting system and the error-preventing text data copying and pasting medium reduce the error rate in the text copying and pasting process.
Drawings
In order to more clearly illustrate the detailed description of the invention or the technical solutions in the prior art, the drawings that are needed in the detailed description of the invention or the prior art will be briefly described below. Throughout the drawings, like elements or portions are generally identified by like reference numerals. In the drawings, elements or portions are not necessarily drawn to scale.
Fig. 1 is a flowchart of a text data copy and paste method according to an embodiment of the present invention.
Detailed Description
Embodiments of the present invention will be described in detail below with reference to the accompanying drawings. The following examples are only for illustrating the technical solutions of the present invention more clearly, and therefore are only examples, and the protection scope of the present invention is not limited thereby. It is to be noted that, unless otherwise specified, technical or scientific terms used herein shall have the ordinary meaning as understood by those skilled in the art to which the present invention belongs.
It will be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It is also to be understood that the terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in the specification of the present invention and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
As used in this specification and the appended claims, the term "if" may be interpreted contextually as "when", "upon" or "in response to a determination" or "in response to a detection". Similarly, the phrase "if it is determined" or "if a [ described condition or event ] is detected" may be interpreted contextually to mean "upon determining" or "in response to determining" or "upon detecting [ described condition or event ]" or "in response to detecting [ described condition or event ]".
The first embodiment is as follows:
an error-proof text data copying and pasting method, see fig. 1, includes the following steps:
s1: adding a proprietary format copy item and a proprietary format paste item in an operating system;
preferably, the proprietary format copy item and the proprietary format paste item include a button set in an edit bar in an operating system or a shortcut key set in the operating system.
Specifically, the clipboard of the operating system is mainly a transmission channel for copying and pasting various data such as text, binary information, pictures, multimedia, files and the like of a user in the operating system. The method can add a special format copy item (the name can be named as copy in a special format) and a special format paste item (the name can be named as special format paste) in a right key popup menu and a context popup menu of an operating system edit bar. If the operating system is windows, two corresponding new shortcut keys can be added in the range of the operating system.
S2: when the operating system detects that the copying item with the proprietary format is triggered, acquiring a selected copied text, and converting the copied text into the proprietary format;
preferably, the converting the copied text into the proprietary format specifically includes:
processing the copied text through a preset text hash algorithm to obtain a text hash;
the copied text is converted to a proprietary format according to the text hash.
Specifically, the text hash algorithm includes:
dividing the copied text by lines to obtain n lines of content;
performing sha256 operation on each 1 line of content to obtain n 1 lines of hash;
performing sha256 operation on every 2 lines of content to obtain n/2 lines of hash;
performing sha256 operation on every 4 lines of content to obtain n/4 lines of hash;
...
performing sha256 operation on every 2^ (m-1) line content to obtain 2^ (m-1) line hashes, wherein the 2^ (m-1) line hashes respectively represent the hash of the first half copied text and the hash of the second half copied text.
Performing sha256 operation on the content of each 2^m line to obtain 1 2^m line hash, wherein 2^m is not less than n, and 1 2^m line hash represents the hash of the whole copied text; for example, sha256 ("hello") =670d9743542cae3ea7ebe af56bd53648b0a1126162e78d81a32934a711302e, i.e., binary digits with hash values of 32Bytes (256 bits).
The text hash includes: row number n (8 bytes), 1 2^m row hashes, ·, n/4 row hashes, n/2 row hashes, n 1 row hashes; it can be seen that the text hash has 1+2+4+. The. + n/4+n/2+n ≦ 2n hash values, and if each hash value is 32bytes, the size of the text hash is less than or equal to 32 × 2n bytes, for example, for 1000 lines of text, the size of the text hash is less than 32 × 2000 bytes =64K.
The proprietary formats include: a fixed format header (which may be 16-ary, such as 86d514934a232d482932ced9ac6d496a, where the format header is used to quickly determine whether it is a proprietary format), sha256 hash (32 bytes), copied text, text hash. The proprietary format may also include a copy text length of 8 bytes and a text hash length of 8 bytes.
S3: when the operating system copies and pastes the proprietary format, the proprietary format is transferred between the clipboard and the specified edit box, which specifically includes:
when an operating system receives a copy instruction sent aiming at a proprietary format in an edit box, transmitting the proprietary format in the edit box to a clipboard;
when the operating system receives a paste instruction sent for the proprietary format in the clipboard, the proprietary format in the clipboard is passed to the specified edit box.
In particular, it follows that the proprietary format is passed in clipboard- > edit box- > clipboard- > edit box, either within the same operating system or within a different operating system, always keeping the format unchanged. The proprietary format passed between the clipboard and the designated edit box can be implemented by the operating system's native paste copy function.
Preferably, the transferring the proprietary format in the clipboard to the designated edit box specifically includes:
pasting the proprietary format to a specified edit box in a binary or file format;
in particular, paste of a proprietary format is the transfer of the proprietary format from the clipboard to the edit box. In the process, whether the edit box supports binary is required to be judged, and if not, a prompt of 'the edit box does not support binary' is popped up; if so, the proprietary format is pasted to the edit box in file form.
The transmitting the proprietary format in the edit box to the clipboard specifically includes:
detecting whether a prompt that the content is destroyed exists in the proprietary format;
if yes, displaying a prompt that the content is destroyed;
if not, when the proprietary format is a binary or file format and the proprietary format contains the format header, acquiring sha256 hash in the proprietary format, copied text and 2^m line hash in the text hash; performing hash operation on the copied text by using the sha256 hash; if the result of the operation does not match the 2^m row hash, a hint is generated that the content has been corrupted.
Specifically, the method needs to check in the ordinary copying process of the proprietary format, and when the content is found to be damaged, the user is reminded. The copy of the proprietary format is a transfer of the proprietary format from the edit box to the clipboard. If the copied proprietary format is not a file or binary format, or the copied proprietary format does not contain the format header, then it is passed to the operating system for processing. If the copied proprietary format is a file or binary format and the copied proprietary format contains the format header, acquiring sha256 hash, copied text and 2^m line hash in the proprietary format, performing sha256 operation on the copied text, and if the operation result is consistent with 2^m line hash, indicating that the copied content is not damaged, otherwise, generating a prompt that the content is damaged.
S4: when the operating system detects that the proprietary format pasting item is triggered, analyzing the copied text from the proprietary format, and pasting the copied text into a specified edit box, wherein the method specifically comprises the following steps:
when the fact that the proprietary format pasting item is triggered is detected, if the proprietary format does not have the prompt that the content is damaged, the sha256 hash, the copied text and the text hash in the proprietary format are obtained, and the copied text is pasted to a specified edit box;
acquiring the latest pasted text of the edit box, and performing hash operation on the pasted text by using the text hash algorithm and the sha256 hash; and if the operation result is inconsistent with the text hash, generating an error prompt.
Specifically, when the method performs the proprietary format pasting, whether the pasting content is damaged needs to be checked. The verification method is the same as the above-described proprietary format normal copy method. And when the paste content is not damaged, acquiring the copy text in the proprietary format, pasting the copy text into a specified edit box, acquiring the latest paste text from the edit box, operating the paste text by using a text hash algorithm, and comparing the operation result with the text hash of the proprietary format.
Preferably, if the operation result is inconsistent with the text hash, the generating an error prompt specifically includes:
sequentially comparing the operation result with the 2^m lines of hash, 4 lines of hash, 2 lines of hash and 1 line of hash in the text hash;
and when the comparison result is inconsistent, obtaining the error line number according to the comparison result, and generating the error prompt containing the error line number.
Specifically, for example, the 2^m line hashes are compared first, and if they match, the entire description is matched, and the process is ended. Otherwise, comparing 2 hash lines of 2^ (m-1) to determine whether the 1/2 inconsistency before or 1/2 inconsistency after copying the text. And comparing 2^ (m-2) line hashes in the top 1/2 or bottom 1/2 text according to the result of the last time, and determining whether the top 1/4 inconsistency or the bottom 1/4 inconsistency of the result (the top 1/2 or the bottom 1/2) of the last time. And sequentially processing, wherein the method can further reduce the 1/2 range judgment in the corresponding range of the last result every time, and can determine which specific line in the copied text is inconsistent by comparing 1 line of hash. The method can quickly find inconsistent lines in the copied text, and the maximum times do not exceed lg2 (n) times. For example, for 1000 lines of text, lg2 (1000) < =10 times is needed to find the difference line. Finally, the user is prompted that the "first.
In conclusion, in each pasting process, the method can compare consistency of the pasted content and the original content through a text hash algorithm, so as to ensure that no error occurs, and if inconsistency is found, a user is prompted, so that the error rate of the text copying and pasting process is reduced. In addition, the text hash algorithm adopted by the method can quickly locate the difference lines in the text comparison process.
Example two:
an error-proof text data copying and pasting system executes the method.
For the sake of brief description, the system provided by the embodiment of the present invention may refer to the corresponding content in the foregoing embodiments.
Example three:
a computer-readable storage medium, in which a computer program is stored, the computer program comprising program instructions which, when executed by a processor, cause the processor to carry out the above-mentioned method.
The computer readable storage medium may be an internal storage unit such as a hard disk or a memory of the terminal. The computer readable storage medium may also be an external storage device of the terminal, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like provided on the terminal. Further, the computer-readable storage medium may also include both an internal storage unit and an external storage device of the terminal. The computer-readable storage medium is used for storing the computer program and other programs and data required by the terminal. The computer readable storage medium may also be used to temporarily store data that has been output or is to be output.
For the sake of brief description, the media provided by the embodiments of the present invention, and the portions of the embodiments that are not mentioned, refer to the corresponding contents in the foregoing embodiments.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; such modifications and substitutions do not depart from the spirit and scope of the present invention, and they should be construed as being included in the following claims and description.

Claims (8)

1. An error-proof text data copying and pasting method is characterized by comprising the following steps:
adding a proprietary format copy item and a proprietary format paste item in an operating system;
when the operating system detects that the copying item with the proprietary format is triggered, acquiring a selected copied text, and converting the copied text into the proprietary format;
when the operating system copies and pastes the proprietary format, transferring the proprietary format between the clipboard and the specified edit box;
when the operating system detects that the proprietary format pasting item is triggered, analyzing a copied text from the proprietary format, and pasting the copied text to a specified edit box;
the converting the copied text into the proprietary format specifically includes:
processing the copied text through a preset text hash algorithm to obtain a text hash;
converting the copied text into a proprietary format according to text hash;
the text hashing algorithm comprises the following steps:
dividing the copied text by lines to obtain n lines of content;
performing sha256 operation on every 1 line of content to obtain n 1 lines of hash;
performing sha256 operation on every 2 lines of content to obtain n/2 lines of hash;
performing sha256 operation on every 4 lines of content to obtain n/4 lines of hash;
...
performing sha256 operation on the content of each 2^m line to obtain 1 hash of 2^m lines, wherein 2^m is more than or equal to n;
the text hash includes: row number n,1 2^m row hashes, ·, n/4 row hashes, n/2 row hashes, n 1 row hashes;
the proprietary format includes: fixed format header, sha256 hash, duplicate text, text hash.
2. The error-proof text data copy-and-paste method according to claim 1,
the proprietary format copy item and the proprietary format paste item include a button set in an edit bar in an operating system or a shortcut key set in the operating system.
3. The error-proofing text data copy-paste method according to claim 1, wherein when the operating system copies and pastes the proprietary format, transferring the proprietary format between the clipboard and the specified edit box specifically comprises:
when an operating system receives a copy instruction sent aiming at a proprietary format in an edit box, the proprietary format in the edit box is transmitted to a clipboard;
when the operating system receives a paste instruction sent to the proprietary format in the clipboard, the proprietary format in the clipboard is transferred to the designated edit box.
4. The error-proof text data copy-and-paste method according to claim 3,
the transmitting the proprietary format in the clipboard to the specified edit box specifically includes:
pasting the proprietary format to a specified edit box in a binary or file format;
the transmitting the proprietary format in the edit box to the clipboard specifically includes:
detecting whether a prompt that the content is destroyed exists in the proprietary format;
if yes, displaying a prompt that the content is destroyed;
if not, when the proprietary format is a binary or file format and the proprietary format contains the format header, acquiring sha256 hash in the proprietary format, copied text and 2^m line hash in the text hash; performing hash operation on the copied text by using the sha256 hash; if the result of the operation does not match the 2^m row hash, a hint is generated that the content has been corrupted.
5. The method for copy-paste of error-proof text data according to claim 1, wherein when the operating system detects that the pasting item of the proprietary format is triggered, the parsing of the copied text from the proprietary format and the pasting of the copied text to the specified edit box specifically include:
when the operating system detects that the proprietary format pasting item is triggered, if the proprietary format does not have the prompt that the content is damaged, acquiring sha256 hash, a copied text and text hash in the proprietary format, and pasting the copied text to a specified edit box;
acquiring the latest pasted text of the edit box, and performing hash operation on the pasted text by using the text hash algorithm and the sha256 hash; and if the operation result is inconsistent with the text hash, generating an error prompt.
6. The error-proofing text data copying and pasting method according to claim 5, wherein if the operation result is inconsistent with the text hash, the generating an error prompt specifically comprises:
sequentially comparing the operation result with the 2^m lines of hash, 4 lines of hash, 2 lines of hash and 1 line of hash in the text hash;
and when the comparison result is inconsistent, obtaining the error line number according to the comparison result, and generating the error prompt containing the error line number.
7. An error-proof text data copying and pasting system is characterized in that,
performing the method of any one of claims 1-6.
8. A computer-readable storage medium, characterized in that the computer-readable storage medium stores a computer program comprising program instructions that, when executed by a processor, cause the processor to carry out the method according to any one of claims 1-6.
CN202110406539.7A 2021-04-15 2021-04-15 Error-proof text data copying and pasting method, system and medium Active CN113204439B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110406539.7A CN113204439B (en) 2021-04-15 2021-04-15 Error-proof text data copying and pasting method, system and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110406539.7A CN113204439B (en) 2021-04-15 2021-04-15 Error-proof text data copying and pasting method, system and medium

Publications (2)

Publication Number Publication Date
CN113204439A CN113204439A (en) 2021-08-03
CN113204439B true CN113204439B (en) 2023-01-24

Family

ID=77027070

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110406539.7A Active CN113204439B (en) 2021-04-15 2021-04-15 Error-proof text data copying and pasting method, system and medium

Country Status (1)

Country Link
CN (1) CN113204439B (en)

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9275025B2 (en) * 2005-04-29 2016-03-01 Adobe Systems Incorporated Interactive special paste
CN102609642A (en) * 2012-01-09 2012-07-25 中标软件有限公司 Clipboard control method and clipboard control system
US11144541B2 (en) * 2019-02-18 2021-10-12 Microsoft Technology Licensing, Llc Intelligent content and formatting reuse
CN111897661B (en) * 2019-05-06 2023-12-22 珠海金山办公软件有限公司 Cell content copying method and device in electronic table and electronic equipment

Also Published As

Publication number Publication date
CN113204439A (en) 2021-08-03

Similar Documents

Publication Publication Date Title
US6453338B1 (en) Electronic mail apparatus and computer readable record medium having electronic mail program recorded thereon
US8006180B2 (en) Spell checking in network browser based applications
US7636885B2 (en) Method of determining Unicode values corresponding to the text in digital documents
WO2006115603A2 (en) Methods for providing an accurate visual rendition of a text element formatted with an unavailable font
US9158742B2 (en) Automatically detecting layout of bidirectional (BIDI) text
EP3724835A1 (en) Split mapping for dynamic rendering and maintaining consistency of data processed by applications
CN110597591B (en) Interface multi-language implementation method and device of embedded equipment and storage medium
US20120143824A1 (en) Protecting files that include editable metadata
US20080052619A1 (en) Spell Checking Documents with Marked Data Blocks
US20060173933A1 (en) Mechanisms for transferring raw data from one data structure to another representing the same item
CN113204439B (en) Error-proof text data copying and pasting method, system and medium
US7594169B2 (en) Compressing, and extracting a value from, a page descriptor format file
CN113064556A (en) BIOS data storage method, device, equipment and storage medium
US20150278162A1 (en) Retention of content in converted documents
US9158493B2 (en) Page description language package file preview
WO2001082121A2 (en) Pre-computing and encoding techniques for an electronic document to improve run-time processing
JP2006216024A (en) Efficient conversion of interchange format message
CN112989437B (en) OFD document processing method, transmission method and system
CN115827856A (en) Military field message transmission method based on computer
CN113608889A (en) Message data processing method, device, equipment and storage medium
CN113010103A (en) Data storage method and device, related equipment and storage medium
CN111581094B (en) Header file name detection method and device, storage medium and electronic equipment
US20230418978A1 (en) Automated batch de-identification of unstructured healthcare documents
CN111695327B (en) Method and device for repairing messy codes, electronic equipment and readable storage medium
US11671243B2 (en) Apparatus, computer program and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant