CN114492342A - Table icon filling method, device, equipment and storage medium - Google Patents

Table icon filling method, device, equipment and storage medium Download PDF

Info

Publication number
CN114492342A
CN114492342A CN202210138178.7A CN202210138178A CN114492342A CN 114492342 A CN114492342 A CN 114492342A CN 202210138178 A CN202210138178 A CN 202210138178A CN 114492342 A CN114492342 A CN 114492342A
Authority
CN
China
Prior art keywords
data
icon
verification
check
table data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210138178.7A
Other languages
Chinese (zh)
Inventor
杨欣舰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Securities Co Ltd
Original Assignee
Ping An Securities Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Securities Co Ltd filed Critical Ping An Securities Co Ltd
Priority to CN202210138178.7A priority Critical patent/CN114492342A/en
Publication of CN114492342A publication Critical patent/CN114492342A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/10Text processing
    • G06F40/166Editing, e.g. inserting or deleting
    • G06F40/174Form filling; Merging
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Artificial Intelligence (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Computational Linguistics (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The invention relates to the field of artificial intelligence, and discloses a form icon filling method, which comprises the following steps: performing security verification on the acquired form data to be filled, and obtaining verification form data when the security verification is successful; judging whether the verification of the verification form data is successful or not by using a preset single-point regular rule; when the verification is successful, inquiring a first rendering icon from the icon mapping table, and filling the verification table data by using the first rendering icon to obtain filled table data; and when the verification fails, performing recheck on the verification table data by using a preset regular expression, constructing a second rendering icon when the recheck succeeds, and filling the verification table data by using the second rendering icon to obtain filled table data. The invention also relates to a block chaining technique, and filling table data can be stored in block chain link points. The invention also provides a form icon filling device, equipment and a medium. The invention can improve the efficiency of filling the form icon.

Description

Table icon filling method, device, equipment and storage medium
Technical Field
The invention relates to the technical field of artificial intelligence, in particular to a form icon filling method and device, electronic equipment and a computer readable storage medium.
Background
The form icon is a visual icon filled in the form data item according to character features of the form data, and can be used for clearly representing the trend of the form data and increasing the readability and the outward presentation of the form data.
However, most of the conventional table icon filling methods are implemented by inserting icons into table slots by using hard codes, that is, a user writes different codes for each item of data in a table to fill the icons, so that the code amount of the table during icon filling is enlarged in a power form, a large amount of time is consumed, and the efficiency of table icon filling is affected.
Disclosure of Invention
The invention provides a form icon filling method and device, electronic equipment and a computer readable storage medium, and mainly aims to improve the efficiency of filling form icons.
In order to achieve the above object, the present invention provides a form icon filling method, including:
the method comprises the steps of obtaining table data to be filled, carrying out security verification on the table data, and taking the table data with successful security verification as verification table data;
judging whether the verification of the verification form data is successful or not by using a preset single-point regular rule;
when the verification of the verification form data is successful, identifying character characteristics of the verification form data, inquiring a first rendering icon corresponding to the verification form data from a preset icon mapping table according to the character characteristics, and filling the verification form data by using the first rendering icon to obtain filled form data;
when verification of the verification form data fails, performing re-verification on the verification form data by using a preset regular expression, when the verification of the verification form data succeeds, constructing a second rendering icon of the verification form data, and filling the verification form data by using the second rendering icon to obtain filled form data.
Optionally, the filling the check table data with the first rendering icon to obtain filled table data includes:
acquiring a DOM tree of the check form data, and traversing the DOM tree to obtain a plurality of node positions of the check form data; and acquiring a slot to be filled in the node position, and filling the first rendering icon into the slot to be filled to obtain filling table data.
Optionally, before querying a first rendering icon corresponding to the check table data from a preset icon mapping table according to the character feature, the method further includes:
obtaining an icon type and a table data item, carrying out relational mapping on the icon type and the table data item to obtain a mapping relation between the icon type and the table data item, and constructing an icon mapping table of the icon type and the table data item according to the mapping relation.
Optionally, the determining, by using a preset single-point regular rule, whether the verification of the verification form data is successful includes:
acquiring the data type of the check form data, and searching whether a single-point data type consistent with the data type exists in the preset single-point regular rule; if the single-point data type consistent with the data type does not exist, the verification of the verification form data fails; and if the single-point data type consistent with the data type exists, the verification of the verification form data is successful.
Optionally, the querying, according to the character feature, a first rendering icon corresponding to the check table data from a preset icon mapping table includes:
and acquiring a table data item of the check table data, and inquiring a first rendering icon corresponding to the table data item from a preset icon mapping table according to the character characteristics.
Optionally, the constructing a second rendered icon of the check form data includes:
reading the description content of the check table input by a user in a preset input box, extracting keywords in the description content, and constructing a second rendering icon of the check table data by using a preset operator according to the keywords.
Optionally, the performing security check on the table data includes:
performing hash calculation on the table data to obtain a data hash value; carrying out consistency comparison on the data hash value and a standard hash value; if the data hash value is not consistent with the standard hash value, determining that the table data does not pass security verification; and if the data hash value is consistent with the standard hash value, determining that the table data passes the security check.
In order to solve the above problem, the present invention also provides a form icon filling apparatus, including:
the verification module is used for acquiring the table data to be filled, performing security verification on the table data and taking the table data with successful security verification as verification table data;
the verification module is used for judging whether the verification of the verification form data is successful or not by utilizing a preset single-point regular rule;
the table icon filling module is used for identifying character characteristics of the check table data when the check table data is successfully verified, inquiring a first rendering icon corresponding to the check table data from a preset icon mapping table according to the character characteristics, and filling the check table data by using the first rendering icon to obtain filled table data; when verification of the verification form data fails, performing re-verification on the verification form data by using a preset regular expression, when the verification of the verification form data succeeds, constructing a second rendering icon of the verification form data, and filling the verification form data by using the second rendering icon to obtain filled form data.
In order to solve the above problem, the present invention also provides an electronic device, including:
a memory storing at least one computer program; and
and the processor executes the computer program stored in the memory to realize the table icon filling method.
In order to solve the above problem, the present invention also provides a computer-readable storage medium, in which at least one computer program is stored, and the at least one computer program is executed by a processor in an electronic device to implement the above table icon filling method.
In the embodiment of the invention, firstly, security verification is carried out on the table data to be filled, and the verification table data is obtained according to the security verification result, so that the table data can be prevented from being tampered or leaked; secondly, the embodiment of the invention judges whether the verification of the verification form data is successful by using a preset single-point regular rule without writing repeated codes for many times by a user, thereby improving the verification efficiency of the verification form data, and when the verification is successful, a first rendering icon corresponding to the verification form data is inquired from a preset icon mapping table, the verification form data is filled by using the first rendering icon, the selection of different icons in the verification form data can be directly realized, the user does not need to write different codes for each verification form data, and the icon filling efficiency is improved; and when the verification fails, performing recheck on the verification form data by using a preset regular expression, and when the recheck on the verification form data succeeds, constructing a second rendering icon of the verification form data, and filling the verification form data by using the second rendering icon, so that different rendering icons can be further generated, the integrity of the icons during the filling of the form icons is perfected, and the filling efficiency of the form icons is further improved. Therefore, the table icon filling method, the table icon filling device, the electronic equipment and the storage medium provided by the embodiment of the invention can improve the table icon filling efficiency.
Drawings
Fig. 1 is a schematic flowchart of a method for filling a form icon according to an embodiment of the present invention;
FIG. 2 is a block diagram of a table icon filling apparatus according to an embodiment of the present invention;
fig. 3 is a schematic internal structural diagram of an electronic device implementing a form icon filling method according to an embodiment of the present invention;
the implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
The embodiment of the invention provides a table icon filling method. The execution subject of the form icon filling method includes, but is not limited to, at least one of electronic devices such as a server and a terminal that can be configured to execute the method provided by the embodiments of the present application. In other words, the form icon filling method may be performed by software or hardware installed in the terminal device or the server device, and the software may be a block chain platform. The server includes but is not limited to: a single server, a server cluster, a cloud server or a cloud server cluster, and the like.
Referring to fig. 1, which is a schematic flow chart of a form icon filling method according to an embodiment of the present invention, in an embodiment of the present invention, the form icon filling method includes:
and S1, obtaining the table data to be filled, carrying out security verification on the table data, and taking the table data with successful security verification as verification table data.
In the embodiment of the present invention, the table data refers to various data to be filled in a table, where the table data includes a table name, time, a table name of a data table, names of fields of the data table, and data corresponding to the names of the fields, and the table data may be obtained from an enterprise database.
Further, the embodiment of the invention can prevent the table data from being tampered or leaked by performing security check on the table data.
As an embodiment of the present invention, the performing security check on the table data includes:
performing hash calculation on the table data to obtain a data hash value; carrying out consistency comparison on the data hash value and a standard hash value; if the data hash value is not consistent with the standard hash value, determining that the table data does not pass security verification; and if the data hash value is consistent with the standard hash value, determining that the table data passes the security check.
The table data can be subjected to hash calculation by using a preset hash algorithm (such as an SHA algorithm) to obtain a data hash value with a fixed length of 256; the standard hash value is a real hash value of the existing table data, the table data can be prevented from being tampered by comparing the data hash value with the standard hash value, the data hash value is strong in anti-tampering capability, and the data hash value is changed greatly only by slight change of any input.
For example, the table data is "telephone", the hash value of the data calculated by the hash is "C7 BE1ED902FB8DD4D48897C6452F5D7E509FBCDBE2808B16BCF4EDCE4C07D 14E", and the standard hash value is also "C7 BE1ED902FB8DD4D48897C6452F5D7E509FBCDBE2808B16BCF4EDCE4C07D 14E", so that the table data can BE determined to pass the security check.
Further, in an optional embodiment of the present invention, the table data with successfully verified security is used as the verification table data, so that the security of the table data can be improved.
And S2, judging whether the verification of the verification form data is successful by using a preset single-point regular rule.
In the embodiment of the invention, the single-point regular rule is a character string and numerical matching mode, can be used for verifying each data type in the checked form data, and does not need a user to write repeated codes for multiple times to verify each data type in the checked form data, so that the verification efficiency of the checked form data is improved.
Further, the data types of the check table data include a numeric type (including an integer type and a floating point type), a character string type (including a chinese character, an english alphabet, a space, and a character string type composed of numbers, such as a coded telephone number), a date type, and a time type.
As an embodiment of the present invention, the determining whether the verification of the check table data is successful by using a preset single-point regular rule includes:
acquiring the data type of the check form data, and searching whether a single-point data type consistent with the data type exists in the preset single-point regular rule; if the single-point data type consistent with the data type does not exist, the verification of the verification form data fails; and if the single-point data type consistent with the data type exists, the verification of the verification form data is successful.
The single-point data types also include numerical type, character string type, date type and time type.
In an optional embodiment of the present invention, it may be found whether there is a single-point data type consistent with the data type through a single-point regular rule composed of symbols such as ">, < ═ and >".
S3, when the verification of the verification form data is successful, identifying character features of the verification form data, inquiring a first rendering icon corresponding to the verification form data from a preset icon mapping table according to the character features, and filling the verification form data by using the first rendering icon to obtain filled form data.
In the embodiment of the present invention, when the verification of the check form data is successful, it indicates that the data types in the check form data are all verified, the character feature refers to a specific attribute of each character in the check form data, for example, a telephone number, a yield, and the like, and by identifying the character feature of the check form data, an identifier corresponding to character information in the check form data can be obtained, for example, when a number with a character feature of 11 digits is identified, the identifier of the character feature is a mobile phone number; when the character feature is recognized as a small sheet, the character feature is identified as a name.
In the embodiment of the present invention, the preset icon mapping table is a data table storing mapping relationships between table data items and icons.
In an optional implementation of the present invention, before querying, according to the character feature, a first rendering icon corresponding to the check table data from a preset icon mapping table, the method further includes:
obtaining an icon type and a table data item, carrying out relational mapping on the icon type and the table data item to obtain a mapping relation between the icon type and the table data item, and constructing an icon mapping table of the icon type and the table data item according to the mapping relation.
The icon type refers to the icon category associated with the identifier of the character feature, such as a telephone icon, a landline icon, a name icon and the like; the table data item refers to each item of data in the check table data; the mapping relation is a one-to-one corresponding relation, and if the table data item is a telephone number, the icon type can be a telephone icon; if the table data item is a fixed-line number, the icon type can be a fixed-line icon; if the form data item is domestic, the icon type can be a Chinese icon; if the table data item is foreign, the icon type may be a corresponding foreign icon.
Furthermore, according to the character characteristics, the first rendering icon corresponding to the check form data is inquired from the preset icon mapping table, so that different icons in the check form data can be directly selected, a user does not need to compile different codes for each check form data to generate the icons, and the efficiency of subsequent icon filling is improved.
In detail, the querying, according to the character feature, a first rendering icon corresponding to the check table data from a preset icon mapping table includes:
and acquiring a table data item of the check table data, and inquiring a first rendering icon corresponding to the table data item from a preset icon mapping table according to the character characteristics.
In the embodiment of the invention, the check table data is filled by utilizing the first rendering icon to obtain the filling table data, so that the first rendering icon can be directly filled to the corresponding position in the check table data, and the icon filling efficiency is improved.
In detail, the populating the check table data with the first rendering icon to obtain populated table data includes:
acquiring a DOM tree of the check form data, and traversing the DOM tree to obtain a plurality of node positions of the check form data; and acquiring a slot to be filled in the node position, and filling the first rendering icon into the slot to be filled to obtain filling table data.
In the embodiment of the present invention, the DOM tree is a page view describing each data item in the check table data, the DOM tree may be traversed through a preset converter (e.g., Babel) to obtain a position of the check table data in the DOM tree, a Slot to be filled (Slot) is obtained from a node position, and the first rendering icon is filled into the Slot to be filled to obtain filled table data, so that the efficiency of filling the first rendering icon may be improved.
S4, when verification of the verification form data fails, performing re-verification on the verification form data by using a preset regular expression, when the re-verification of the verification form data succeeds, constructing a second rendering icon of the verification form data, and filling the verification form data by using the second rendering icon to obtain filled form data.
In the embodiment of the present invention, the regular expression (regular expression) is a rule for matching character strings, where the regular expression is a character pattern composed of common characters and special characters.
In the embodiment of the invention, the regular expression is utilized to perform recheck on the check form data, namely, whether the character characteristics in the check form data are matched with the character rules in the regular expression is rechecked, if the character characteristics are telephone numbers and the fixed length is 11 digits, when the characters which are more than or less than 11 digits are identified, the character characteristics are not matched with the character rules and the rechecking fails, when the rechecking fails, the character characteristics are wrong, and the check failure result is returned to a user until the character characteristics modified by the user can be rechecked successfully; if the 11-digit character is identified, the character characteristic is matched with the character rule, the re-check is successful, and the generation of a subsequent second rendering icon can be further ensured by using the regular expression to re-check the check table data so as to perfect the integrity of the icon filled by the table icon.
In the embodiment of the present invention, the second rendering icon refers to an icon corresponding to a table data item of the remaining checking table data, for example, if a certain table data item in the checking table data is a yield, and the first rendering icon does not have an icon type for identifying the yield, the checking table data may be re-checked by using a regular expression, so as to obtain a second rendering icon (the color and size of the icon may be customized) for identifying the yield.
As an optional embodiment of the present invention, the constructing the second rendering icon of the check table data includes:
reading the description content of the check table input by a user in a preset input box, extracting keywords in the description content, and constructing a second rendering icon of the check table data by using a preset operator according to the keywords.
In an embodiment of the present invention, the description content refers to a limitation on check form data and a limitation on a color of the second rendering icon, which are input by a user, for example, the description content is trademark information in the check form data, and the color of the second rendering icon corresponding to the trademark information is red.
In an optional embodiment of the present invention, a keyword extraction algorithm such as (TF-IDF) may be used to extract keywords from the description content, for example, the description content is trademark information in the verification table data, and the keyword of the trademark information may be obtained through the keyword extraction algorithm.
In this embodiment of the present invention, the preset operator may be an operator, and the preset operator is formed by combining multiple standard operators selected by a user, for example, the operator may be composed of standard operators exists (which function to search and check whether records satisfying a specific condition exist in table data), and (connector), create (creator), and color (color limited symbol); create (gain) and color (graph red).
Further, in the embodiment of the present invention, the preset operator mainly functions to convert the information of the keyword into the corresponding second rendering icon, for example, if the keyword is the trademark information and the red icon, the red trademark information rendering icon may be generated by using the preset operator.
In another embodiment of the present invention, the method for filling the check table data by using the second rendering icon is the same as the method for filling the check table data by using the first rendering icon in S3, and details thereof are not repeated here.
In the embodiment of the invention, firstly, security verification is carried out on table data to be filled, and the table data successfully subjected to the security verification is used as verification table data, so that the table data can be prevented from being tampered or leaked; secondly, the embodiment of the invention judges whether the verification of the verification form data is successful by using a preset single-point regular rule without writing repeated codes for many times by a user, thereby improving the verification efficiency of the verification form data, and when the verification is successful, a first rendering icon corresponding to the verification form data is inquired from a preset icon mapping table, the verification form data is filled by using the first rendering icon, the selection of different icons in the verification form data can be directly realized, the user does not need to write different codes for each verification form data, and the icon filling efficiency is improved; and when the verification fails, performing recheck on the verification form data by using a preset regular expression, and when the recheck on the verification form data succeeds, constructing a second rendering icon of the verification form data, and filling the verification form data by using the second rendering icon, so that different rendering icons can be further generated, the integrity of the icons during the filling of the form icons is perfected, and the filling efficiency of the form icons is further improved. Therefore, the table icon filling method provided by the embodiment of the invention can improve the efficiency of filling the table icons.
Fig. 2 is a functional block diagram of the table icon filling apparatus according to the present invention.
The form icon filling apparatus 100 of the present invention can be installed in an electronic device. According to the implemented functions, the form icon filling apparatus may include a checking module 101, a verifying module 102, and a form icon filling module 103, which may also be referred to as a unit, and refers to a series of computer program segments that can be executed by a processor of an electronic device and can perform fixed functions, and are stored in a memory of the electronic device.
In the present embodiment, the functions of the respective modules/units are as follows:
the checking module 101 is configured to obtain table data to be filled, perform security checking on the table data, and use the table data with successful security checking as checking table data.
In the embodiment of the present invention, the table data refers to various data to be filled in a table, where the table data includes a table name, time, a table name of a data table, names of fields of the data table, and data corresponding to the names of the fields, and the table data may be obtained from an enterprise database.
Further, the embodiment of the invention can prevent the table data from being tampered or leaked by performing security check on the table data.
As an embodiment of the present invention, the checking module 101 performs security checking on the table data by performing the following operations, including:
performing hash calculation on the table data to obtain a data hash value; carrying out consistency comparison on the data hash value and a standard hash value; if the data hash value is not consistent with the standard hash value, determining that the table data does not pass security verification; and if the data hash value is consistent with the standard hash value, determining that the table data passes the security check.
The table data can be subjected to hash calculation by using a preset hash algorithm (such as an SHA algorithm) to obtain a data hash value with a fixed length of 256; the standard hash value is a real hash value of the existing table data, the table data can be prevented from being tampered by comparing the data hash value with the standard hash value, the data hash value is strong in anti-tampering capability, and the data hash value is changed greatly only by slight change of any input.
For example, the table data is "telephone", the hash value of the data calculated by the hash is "C7 BE1ED902FB8DD4D48897C6452F5D7E509FBCDBE2808B16BCF4EDCE4C07D 14E", and the standard hash value is also "C7 BE1ED902FB8DD4D48897C6452F5D7E509FBCDBE2808B16BCF4EDCE4C07D 14E", so that the table data can BE determined to pass the security check.
Further, in an optional embodiment of the present invention, the table data with successfully verified security is used as the verification table data, so that the security of the table data can be improved.
The verification module 102 is configured to determine whether the verification of the verification form data is successful by using a preset single-point regular rule.
In the embodiment of the invention, the single-point regular rule is a character string and numerical matching mode, can be used for verifying each data type in the checked form data, and does not need a user to write repeated codes for multiple times to verify each data type in the checked form data, so that the verification efficiency of the checked form data is improved.
Further, the data types of the check table data include a numeric type (including an integer type and a floating point type), a character string type (including a chinese character, an english alphabet, a space, and a character string type composed of numbers, such as a coded telephone number), a date type, and a time type.
As an embodiment of the present invention, the verifying module 102 determines whether the verification of the verification table data is successful by using a preset single-point regular rule by performing the following operations, including:
acquiring the data type of the check form data, and searching whether a single-point data type consistent with the data type exists in the preset single-point regular rule; if the single-point data type consistent with the data type does not exist, the verification of the verification form data fails; and if the single-point data type consistent with the data type exists, the verification of the verification form data is successful.
The single-point data types also include numerical type, character string type, date type and time type.
In an optional embodiment of the present invention, it may be found whether there is a single-point data type consistent with the data type through a single-point regular rule composed of symbols such as ">, < ═ and >".
The table icon filling module 103 is configured to identify character features of the check table data when the check table data is successfully verified, query a first rendering icon corresponding to the check table data from a preset icon mapping table according to the character features, fill the check table data with the first rendering icon to obtain filled table data, perform re-check on the check table data with a preset regular expression when the check table data is failed to be verified, construct a second rendering icon of the check table data when the check table data is successfully re-checked with the preset regular expression, and fill the check table data with the second rendering icon to obtain filled table data.
In the embodiment of the present invention, when the verification of the check form data is successful, it indicates that the data types in the check form data are all verified, the character feature refers to a specific attribute of each character in the check form data, for example, a telephone number, a yield, and the like, and by identifying the character feature of the check form data, an identifier corresponding to character information in the check form data can be obtained, for example, when a number with a character feature of 11 digits is identified, the identifier of the character feature is a mobile phone number; when the character feature is recognized as a small sheet, the character feature is identified as a name.
In the embodiment of the present invention, the preset icon mapping table is a data table storing mapping relationships between table data items and icons.
The form icon population module 103 is further operable to:
before the first rendering icon corresponding to the check form data is inquired from a preset icon mapping table, the icon type and the form data item are obtained, the icon type and the form data item are subjected to relational mapping to obtain the mapping relation between the icon type and the form data item, and the icon mapping table of the icon type and the form data item is constructed according to the mapping relation.
The icon type refers to the icon category associated with the identifier of the character feature, such as a telephone icon, a landline icon, a name icon and the like; the table data item refers to each item of data in the check table data; the mapping relation is a one-to-one correspondence relation, and if the table data item is a telephone number, the icon type can be a telephone icon; if the table data item is a fixed-line number, the icon type can be a fixed-line icon; if the table data item is domestic, the icon type can be a Chinese icon; if the table data item is foreign, the icon type may be a corresponding foreign icon.
Furthermore, according to the character characteristics, the first rendering icon corresponding to the check form data is inquired from the preset icon mapping table, so that different icons in the check form data can be directly selected, a user does not need to compile different codes for each check form data to generate the icons, and the efficiency of subsequent icon filling is improved.
In detail, the table icon filling module 103 queries, according to the character features, a first rendering icon corresponding to the check table data from a preset icon mapping table by performing the following operations, including:
and acquiring a table data item of the check table data, and inquiring a first rendering icon corresponding to the table data item from a preset icon mapping table according to the character characteristics.
In the embodiment of the invention, the check table data is filled by utilizing the first rendering icon to obtain the filling table data, so that the first rendering icon can be directly filled to the corresponding position in the check table data, and the icon filling efficiency is improved.
In detail, the form icon padding module 103 further pads the check form data with the first rendering icon by performing the following operations, and obtaining padded form data includes:
acquiring a DOM tree of the check form data, and traversing the DOM tree to obtain a plurality of node positions of the check form data; and acquiring a slot to be filled in the node position, and filling the first rendering icon into the slot to be filled to obtain filling table data.
In the embodiment of the present invention, the DOM tree is a page view describing each data item in the check table data, the DOM tree may be traversed through a preset converter (e.g., Babel) to obtain a position of the check table data in the DOM tree, a Slot to be filled (Slot) is obtained from a node position, and the first rendering icon is filled into the Slot to be filled to obtain filled table data, so that the efficiency of filling the first rendering icon may be improved.
In the embodiment of the present invention, the regular expression (regular expression) is a rule for matching character strings, where the regular expression is a character pattern composed of common characters and special characters.
In the embodiment of the invention, the regular expression is utilized to perform recheck on the check form data, namely, whether the character characteristics in the check form data are matched with the character rules in the regular expression is rechecked, if the character characteristics are telephone numbers and the fixed length is 11 digits, when the characters which are more than or less than 11 digits are identified, the character characteristics are not matched with the character rules and the rechecking fails, when the rechecking fails, the character characteristics are wrong, and the check failure result is returned to a user until the character characteristics modified by the user can be rechecked successfully; if the 11-digit character is identified, the character characteristic is matched with the character rule, the re-check is successful, and the generation of a subsequent second rendering icon can be further ensured by using the regular expression to re-check the check table data so as to perfect the integrity of the icon filled by the table icon.
In the embodiment of the present invention, the second rendering icon refers to an icon corresponding to a table data item of the remaining checking table data, for example, if a certain table data item in the checking table data is a yield, and the first rendering icon does not have an icon type for identifying the yield, the checking table data may be re-checked by using a regular expression, so as to obtain a second rendering icon (the color and size of the icon may be customized) for identifying the yield.
As an optional embodiment of the present invention, the constructing the second rendering icon of the check table data includes:
reading the description content of the check table input by a user in a preset input box, extracting keywords in the description content, and constructing a second rendering icon of the check table data by using a preset operator according to the keywords.
In an embodiment of the present invention, the description content refers to a limitation on check form data and a limitation on a color of the second rendering icon, which are input by a user, for example, the description content is trademark information in the check form data, and the color of the second rendering icon corresponding to the trademark information is red.
In an optional embodiment of the present invention, a keyword extraction algorithm such as (TF-IDF) may be used to extract keywords from the description content, for example, the description content is trademark information in the verification table data, and the keyword of the trademark information may be obtained through the keyword extraction algorithm.
In this embodiment of the present invention, the preset operator may be an operator, and the preset operator is formed by combining multiple standard operators selected by a user, for example, the operator may be composed of standard operators exists (which function to search and check whether records satisfying a specific condition exist in table data), and (connector), create (creator), and color (color limited symbol); create (gain) and color (graph red).
Further, in the embodiment of the present invention, the preset operator mainly functions to convert the information of the keyword into the corresponding second rendering icon, for example, if the keyword is the trademark information and the red icon, the red trademark information rendering icon may be generated by using the preset operator.
In another embodiment of the present invention, the method for filling the check table data by using the second rendering icon is the same as the method for filling the check table data by using the first rendering icon, and details are not repeated here.
In the embodiment of the invention, firstly, security verification is carried out on table data to be filled, and the table data successfully subjected to the security verification is used as verification table data, so that the table data can be prevented from being tampered or leaked; secondly, the embodiment of the invention judges whether the verification of the verification form data is successful by using a preset single-point regular rule without writing repeated codes for many times by a user, thereby improving the verification efficiency of the verification form data, and when the verification is successful, a first rendering icon corresponding to the verification form data is inquired from a preset icon mapping table, the verification form data is filled by using the first rendering icon, the selection of different icons in the verification form data can be directly realized, the user does not need to write different codes for each verification form data, and the icon filling efficiency is improved; and when the verification fails, performing recheck on the verification form data by using a preset regular expression, and when the recheck on the verification form data succeeds, constructing a second rendering icon of the verification form data, and filling the verification form data by using the second rendering icon, so that different rendering icons can be further generated, the integrity of the icons during the filling of the form icons is perfected, and the filling efficiency of the form icons is further improved. Therefore, the form icon filling device provided by the embodiment of the invention can improve the efficiency of filling the form icons.
Fig. 3 is a schematic structural diagram of an electronic device implementing the form icon filling method according to the present invention.
The electronic device may include a processor 10, a memory 11, a communication bus 12 and a communication interface 13, and may further include a computer program, such as a form icon filling program, stored in the memory 11 and operable on the processor 10.
The memory 11 includes at least one type of media, which includes flash memory, removable hard disk, multimedia card, card type memory (e.g., SD or DX memory, etc.), magnetic memory, local disk, optical disk, etc. The memory 11 may in some embodiments be an internal storage unit of the electronic device, for example a removable hard disk of the electronic device. The memory 11 may also be an external storage device of the electronic device in other embodiments, such as a plug-in mobile hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like, which are provided on the electronic device. Further, the memory 11 may also include both an internal storage unit and an external storage device of the electronic device. The memory 11 may be used not only to store application software installed in the electronic device and various types of data, such as codes of a form icon filling program, etc., but also to temporarily store data that has been output or is to be output.
The processor 10 may be composed of an integrated circuit in some embodiments, for example, a single packaged integrated circuit, or may be composed of a plurality of integrated circuits packaged with the same or different functions, including one or more Central Processing Units (CPUs), microprocessors, digital Processing chips, graphics processors, and combinations of various control chips. The processor 10 is a Control Unit (Control Unit) of the electronic device, connects various components of the electronic device by using various interfaces and lines, and executes various functions and processes data of the electronic device by running or executing programs or modules (e.g., table icon filling programs, etc.) stored in the memory 11 and calling data stored in the memory 11.
The communication bus 12 may be a PerIPheral Component Interconnect (PCI) bus or an Extended Industry Standard Architecture (EISA) bus. The bus may be divided into an address bus, a data bus, a control bus, etc. The communication bus 12 is arranged to enable connection communication between the memory 11 and at least one processor 10 or the like. For ease of illustration, only one thick line is shown, but this does not mean that there is only one bus or one type of bus.
Fig. 3 shows only an electronic device having components, and those skilled in the art will appreciate that the structure shown in fig. 3 does not constitute a limitation of the electronic device, and may include fewer or more components than those shown, or some components may be combined, or a different arrangement of components.
For example, although not shown, the electronic device may further include a power supply (such as a battery) for supplying power to each component, and preferably, the power supply may be logically connected to the at least one processor 10 through a power management device, so that functions of charge management, discharge management, power consumption management and the like are realized through the power management device. The power supply may also include any component of one or more dc or ac power sources, recharging devices, power failure detection circuitry, power converters or inverters, power status indicators, and the like. The electronic device may further include various sensors, a bluetooth module, a Wi-Fi module, and the like, which are not described herein again.
Optionally, the communication interface 13 may include a wired interface and/or a wireless interface (e.g., WI-FI interface, bluetooth interface, etc.), which is generally used to establish a communication connection between the electronic device and other electronic devices.
Optionally, the communication interface 13 may further include a user interface, which may be a Display (Display), an input unit (such as a Keyboard (Keyboard)), and optionally, a standard wired interface, or a wireless interface. Alternatively, in some embodiments, the display may be an LED display, a liquid crystal display, a touch-sensitive liquid crystal display, an OLED (Organic Light-Emitting Diode) touch device, or the like. The display, which may also be referred to as a display screen or display unit, is suitable, among other things, for displaying information processed in the electronic device and for displaying a visualized user interface.
It is to be understood that the described embodiments are for purposes of illustration only and that the scope of the appended claims is not limited to such structures.
The form icon filling program stored in the memory 11 of the electronic device is a combination of a plurality of computer programs, which when run in the processor 10, can realize:
the method comprises the steps of obtaining table data to be filled, carrying out security verification on the table data, and taking the table data with successful security verification as verification table data;
judging whether the verification of the verification form data is successful or not by using a preset single-point regular rule;
when the verification of the verification form data is successful, identifying character characteristics of the verification form data, inquiring a first rendering icon corresponding to the verification form data from a preset icon mapping table according to the character characteristics, and filling the verification form data by using the first rendering icon to obtain filled form data;
when verification of the verification form data fails, performing re-verification on the verification form data by using a preset regular expression, when the verification of the verification form data succeeds, constructing a second rendering icon of the verification form data, and filling the verification form data by using the second rendering icon to obtain filled form data.
Specifically, the processor 10 may refer to the description of the relevant steps in the embodiment corresponding to fig. 1 for a specific implementation method of the computer program, which is not described herein again.
Further, the electronic device integrated module/unit, if implemented in the form of a software functional unit and sold or used as a separate product, may be stored in a computer readable medium. The computer readable medium may be non-volatile or volatile. The computer-readable medium may include: any entity or device capable of carrying the computer program code, recording medium, U disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-Only Memory (ROM).
Embodiments of the present invention may also provide a computer-readable storage medium, where the computer-readable storage medium stores a computer program, and when the computer program is executed by a processor of an electronic device, the computer program may implement:
the method comprises the steps of obtaining table data to be filled, carrying out security verification on the table data, and taking the table data with successful security verification as verification table data;
judging whether the verification of the verification form data is successful or not by using a preset single-point regular rule;
when the verification of the verification form data is successful, identifying character characteristics of the verification form data, inquiring a first rendering icon corresponding to the verification form data from a preset icon mapping table according to the character characteristics, and filling the verification form data by using the first rendering icon to obtain filled form data;
when verification of the verification form data fails, performing re-verification on the verification form data by using a preset regular expression, when the verification of the verification form data succeeds, constructing a second rendering icon of the verification form data, and filling the verification form data by using the second rendering icon to obtain filled form data.
Further, the computer-readable storage medium may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function, and the like; the storage data area may store data created according to the use of the blockchain node, and the like.
In the several embodiments provided in the present invention, it should be understood that the disclosed medium, apparatus, device and method may be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the modules is only one logical functional division, and other divisions may be realized in practice.
The modules described as separate parts may or may not be physically separate, and parts displayed as modules may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment.
In addition, functional modules in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional module.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof.
The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference signs in the claims shall not be construed as limiting the claim concerned.
The block chain is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism, an encryption algorithm and the like. A block chain (Blockchain), which is essentially a decentralized database, is a series of data blocks associated by using a cryptographic method, and each data block contains information of a batch of network transactions, so as to verify the validity (anti-counterfeiting) of the information and generate a next block. The blockchain may include a blockchain underlying platform, a platform product service layer, an application service layer, and the like.
Furthermore, it is obvious that the word "comprising" does not exclude other elements or steps, and the singular does not exclude the plural. A plurality of units or means recited in the system claims may also be implemented by one unit or means in software or hardware. The terms second, etc. are used to denote names, but not any particular order.
Finally, it should be noted that the above embodiments are only for illustrating the technical solutions of the present invention and not for limiting, and although the present invention is described in detail with reference to the preferred embodiments, it should be understood by those skilled in the art that modifications or equivalent substitutions may be made on the technical solutions of the present invention without departing from the spirit and scope of the technical solutions of the present invention.

Claims (10)

1. A form icon populating method, the method comprising:
the method comprises the steps of obtaining table data to be filled, carrying out security verification on the table data, and taking the table data with successful security verification as verification table data;
judging whether the verification form data is successfully verified or not by using a preset single-point regular rule;
when the verification of the verification form data is successful, identifying character characteristics of the verification form data, inquiring a first rendering icon corresponding to the verification form data from a preset icon mapping table according to the character characteristics, and filling the verification form data by using the first rendering icon to obtain filled form data;
when verification of the verification form data fails, performing re-verification on the verification form data by using a preset regular expression, when the verification of the verification form data succeeds, constructing a second rendering icon of the verification form data, and filling the verification form data by using the second rendering icon to obtain filled form data.
2. The form icon populating method of claim 1, wherein said populating the check form data with the first rendered icon resulting in populated form data includes:
acquiring a DOM tree of the check form data, and traversing the DOM tree to obtain a plurality of node positions of the check form data; and acquiring a slot to be filled in the node position, and filling the first rendering icon into the slot to be filled to obtain filling table data.
3. A form icon filling method as claimed in claim 1, wherein before querying the first rendered icon corresponding to the check table data from a preset icon mapping table according to the character feature, the method further comprises:
obtaining an icon type and a table data item, carrying out relational mapping on the icon type and the table data item to obtain a mapping relation between the icon type and the table data item, and constructing an icon mapping table of the icon type and the table data item according to the mapping relation.
4. The method for filling a form icon according to claim 1, wherein the determining whether the verification of the check form data is successful by using a preset single-point regular rule includes:
acquiring the data type of the check form data, and searching whether a single-point data type consistent with the data type exists in the preset single-point regular rule; if the single-point data type consistent with the data type does not exist, the verification of the verification form data fails; and if the single-point data type consistent with the data type exists, the verification of the verification form data is successful.
5. A form icon filling method as claimed in claim 1, wherein said querying the first rendered icon corresponding to the check form data from a preset icon mapping table according to the character feature comprises:
and acquiring a table data item of the check table data, and inquiring a first rendering icon corresponding to the table data item from a preset icon mapping table according to the character characteristics.
6. The form icon populating method of claim 1, wherein said constructing a second rendered icon of said check form data includes:
reading the description content of the check table input by a user in a preset input box, extracting keywords in the description content, and constructing a second rendering icon of the check table data by using a preset operator according to the keywords.
7. The form icon populating method of claim 1, wherein said performing a security check on said form data includes:
performing hash calculation on the table data to obtain a data hash value; carrying out consistency comparison on the data hash value and a standard hash value; if the data hash value is inconsistent with the standard hash value, determining that the table data does not pass the security check; and if the data hash value is consistent with the standard hash value, determining that the table data passes the security check.
8. A form icon populating device, the device comprising:
the verification module is used for acquiring the table data to be filled, performing security verification on the table data and taking the table data with successful security verification as verification table data;
the verification module is used for judging whether the verification of the verification form data is successful or not by utilizing a preset single-point regular rule;
the table icon filling module is used for identifying character characteristics of the check table data when the check table data is successfully verified, inquiring a first rendering icon corresponding to the check table data from a preset icon mapping table according to the character characteristics, and filling the check table data by using the first rendering icon to obtain filled table data; when verification of the verification form data fails, performing re-verification on the verification form data by using a preset regular expression, when the verification of the verification form data succeeds, constructing a second rendering icon of the verification form data, and filling the verification form data by using the second rendering icon to obtain filled form data.
9. An electronic device, characterized in that the electronic device comprises:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores a computer program executable by the at least one processor to enable the at least one processor to perform the form icon populating method of any one of claims 1 to 7.
10. A computer-readable storage medium, storing a computer program, wherein the computer program, when executed by a processor, implements the form icon populating method of any of claims 1-7.
CN202210138178.7A 2022-02-15 2022-02-15 Table icon filling method, device, equipment and storage medium Pending CN114492342A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210138178.7A CN114492342A (en) 2022-02-15 2022-02-15 Table icon filling method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210138178.7A CN114492342A (en) 2022-02-15 2022-02-15 Table icon filling method, device, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN114492342A true CN114492342A (en) 2022-05-13

Family

ID=81480079

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210138178.7A Pending CN114492342A (en) 2022-02-15 2022-02-15 Table icon filling method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN114492342A (en)

Similar Documents

Publication Publication Date Title
CN112418798A (en) Information auditing method and device, electronic equipment and storage medium
CN113239106B (en) Excel file export method and device, electronic equipment and storage medium
CN113449187A (en) Product recommendation method, device and equipment based on double portraits and storage medium
CN114979120B (en) Data uploading method, device, equipment and storage medium
CN112528616B (en) Service form generation method and device, electronic equipment and computer storage medium
CN114185895A (en) Data import and export method and device, electronic equipment and storage medium
CN112115152A (en) Data increment updating and querying method and device, electronic equipment and storage medium
CN113489704A (en) Sensitive data identification method and device based on flow, electronic equipment and medium
CN112949278A (en) Data checking method and device, electronic equipment and readable storage medium
CN113434542B (en) Data relationship identification method and device, electronic equipment and storage medium
CN114398346A (en) Data migration method, device, equipment and storage medium
CN113468175A (en) Data compression method and device, electronic equipment and storage medium
CN113032275A (en) Method and device for testing field, electronic equipment and storage medium
CN112486532A (en) Method and device for managing configuration file, electronic equipment and storage medium
CN111538768A (en) Data query method and device based on N-element model, electronic equipment and medium
CN114840631A (en) Spatial text query method and device, electronic equipment and storage medium
CN113687827B (en) Data list generation method, device and equipment based on widget and storage medium
CN114840388A (en) Data monitoring method and device, electronic equipment and storage medium
CN114492342A (en) Table icon filling method, device, equipment and storage medium
CN115062023A (en) Wide table optimization method and device, electronic equipment and computer readable storage medium
CN112506931A (en) Data query method and device, electronic equipment and storage medium
CN112686759A (en) Account checking monitoring method, device, equipment and medium
CN113434365B (en) Data characteristic monitoring method and device, electronic equipment and storage medium
CN113438221B (en) Local end file loading method and device, electronic equipment and medium
CN113672565B (en) File marking method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination