Movatterモバイル変換


[0]ホーム

URL:


CN102760125A - Barcode filtering and matching engine technology - Google Patents

Barcode filtering and matching engine technology
Download PDF

Info

Publication number
CN102760125A
CN102760125ACN2011101046051ACN201110104605ACN102760125ACN 102760125 ACN102760125 ACN 102760125ACN 2011101046051 ACN2011101046051 ACN 2011101046051ACN 201110104605 ACN201110104605 ACN 201110104605ACN 102760125 ACN102760125 ACN 102760125A
Authority
CN
China
Prior art keywords
data
barcode
bar code
technology
filtering
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2011101046051A
Other languages
Chinese (zh)
Inventor
苏捷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHANGHAI ZHENSHI INFORMATION TECHNOLOGY Co Ltd
Original Assignee
SHANGHAI ZHENSHI INFORMATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHANGHAI ZHENSHI INFORMATION TECHNOLOGY Co LtdfiledCriticalSHANGHAI ZHENSHI INFORMATION TECHNOLOGY Co Ltd
Priority to CN2011101046051ApriorityCriticalpatent/CN102760125A/en
Publication of CN102760125ApublicationCriticalpatent/CN102760125A/en
Pendinglegal-statusCriticalCurrent

Links

Images

Landscapes

Abstract

The invention relates to a barcode filtering and matching engine technology, which is the technology for processing barcode data with a filtering method and requesting matched data contained in a search term from mass data in a database. The technology comprises the steps as follows: analyzing primary characteristic property based on data information flow analysis of keywords, comparing according to the existing keyword library (a built-in keyword library), intercepting a network data packet in an equals manner during internal filtering, carrying out keyword comparison on the content of the data packet, calculating whether the content of the data packet is similar to the internal data library according to the corresponding MD5 value of the data information flow, obtaining and merging the data, and carrying out optimization on the data by combining dichotomy and Hash, so as to achieve rapid and precise matching of the input data. According to the technology, a method for searching the result by using the barcode or keywords of the search term is realized, and can lighten the equipment; professional equipment is not needed; and the function of fast scanning barcode and fast querying the corresponding merchandise information can be realized just by a wireless mobile terminal and the like.

Description

Bar code is filtered turbid matching engine technology
One, technical field
The present invention relevant a kind of from bar code data after the filter purifying method is handled, request comprises the technical method of institute's data matching in the search terms from database mass data again.Search engine can be realized a kind of bar code of search terms or method that key word comes Search Results used.
Two, background technology
Bar code (barcode) is a plurality of secret notes and the blank that width is not waited, and arranges according to certain coding rule, in order to express the graphical identifier of one group of information.Common bar code is the pattern of parallel lines that the secret note (abbreviation bar) that differed greatly by reflectivity and informal voucher (being called for short empty) are lined up.Bar code can mark many information such as producing country, manufacturing firm, trade name, date of manufacture, book classification number, mail start-stop place, classification, the date of article, thereby has all obtained using widely in many fields such as circulation of commodities, taking care of books, postal management, banking systems.
Three, summary of the invention
1, goal of the invention:
Had only enterprise-class tools in the past and had large-scale bar code query facility user and could inquire about commodity bar code information; Provide this method can lightweight equipment now; Do not need to accomplish professional equipment only only to need mobile radio terminal etc. just can realize the quick scanning barcode of bar code, the function of fast query corresponding goods information.
2, technical solution:
Data message flow analysis based on the bar code key word; Analyze its principal character character, compare according to existing key word library (in build key word library), self-filtering adopts the equals mode that network packet is intercepted; The content of packet is carried out the key word comparison; According to the corresponding MD5 value of data message stream, calculate whether it similar with internal database, and merge after obtaining its data; Data are carried out the optimization that dichotomy (dichotomy) and Hash (Hash) mutually combine, thereby reach input data accurate matching fast.
3, description of drawings:
Fig. 1 is the process flow diagram that bar code is filtered turbid matching engine technology.
Four, embodiment
Bar code is filtered turbid precise search engine terminal technology:
1. network inputted search item:
1.1 filtration key word:
Data message flow analysis based on key word; Analyzing its principal character character compares according to existing key word library (in build key word library); Self-filtering adopts the equals mode that network packet is intercepted, and the content of packet is carried out the key word comparison, is filled into the corresponding MD5 value (Message Digest Algorithm) of data message stream; Calculate whether it similar with internal database, judge whether to tackle its data.
1.2 pooled data stream:
Merge the data message stream that filters key word, adopt MD5 (Message Digest Algorithm) to mix connected mode, pooled data stream.
1.3 data stream is submitted server apparatus to
Data stream after having merged well can adopt Method cipher mode (POST) to server apparatus by wireless terminal device or PC hardware device or server mode.Adopt the more cipher mode of Security.Such as: submit data to through non-POST, information data may be exposed to presentation layer, and is stored in the buffer memory of other media, just causes insecurity once check buffer memory.In addition, use non-POST to submit to data also may cause Cross-site request forgery to attack.
2. server apparatus data interaction:
2.1 setting up database connects:
Set up each and show needed table space, adopt the SQL hardware standard according to the equipment otherness.Authorize for database inside search access right.Be connected to database.(set up the relevant inquiring table space.)
2.2 database inquiry optimization:
Carry out the optimization that dichotomy (dichotomy) and Hash (Hash) mutually combine for each data of needs inquiries.Thereby reach the accurate matching of input data, shorten the inquiry institute purpose of service time.
Dichotomy:
Binary chop is claimed binary search again, and it is the higher lookup method of a kind of efficient.
Binary chop requires: linear list is an ordered list, and promptly node is according to keywords orderly in the table, and will use the storage organization of vector as table.Might as well establish ordered list increases progressively orderly.
Hash:
HASH is mainly used in AES in the information security field; It changes into 128 mixed and disorderly coding to the information of some different lengths; These encoded radios are called the HASH value. we can say that also hash is exactly the mapping relations that find between a kind of data content and the deposit data address.
2.3 verification msg correctness:
Data are carried out secondary checksum verification data correctness by the MD5 mode once more.
MD5: to the concise and to the point narration of MD5 algorithm can for: MD5 handles the information of input with 512 groupings; And each divides into groups to be divided into again 16 32 seats and divides into groups; After having passed through a series of processing; The output of algorithm is formed by four 32, with generating 128 hashed values after these four 32 packet concatenation.
2.4 inner debugging mechanism:
When connection or optimization or validation failure, internal server equipment forms daily record (LogData) with the numbering of the timing error of automatic misregistration generation.Convenient inquiry, and can start corresponding inner debugging mechanism, repair frequent fault, guarantee data query stability and robustness.
2.5 ISN conversion:
According to the different language requirement of information flow ISSUER platform, the unified UTF8 ISN form that adopts.When outputing to presentation layer, can reduce the occurrence frequency of mess code, accomplish optimization output and the effect that improves output efficiency.
UTF8:UTF-8 is that a kind of elongated character code of UNICODE is claimed ten thousand country codes again, is created in 1992 by Ken Thompson.Be standardized as RFC 3629 now.UTF-8 is with 1 to 6 byte code UNICODE character.Being used in can the simplified traditional font of same page Chinese display and other language (like Japanese, the Korean) on the webpage
2.6 acquisition Query Result:
Character information data stream after will passing through verification and changing turns back on the target query terminal as Query Result.Adopt the mode of network or WIFI or other various wireless or wired (according to device requirements) to transmit.
3. the terminal inquiry result resolves:
3.1 network measuring verification:
By the terminal inter-area traffic interarea is carried out parity checking.(employing all be data stream to be regarded as 16 integers stream repeat stack and calculate.For calculate the check with, at first the check and field be changed to 0.Then, in the valid data scope each 16 carry out the one's complement summation, the result exists in check and the field, data length is that odd number is then mended a byte 0.After receiving data, equally each 16 figure place in the valid data scope are carried out the summation of one's complement.The take over party in computation process, comprised transmit leg exist in the stem check with, any mistake does not take place in stem in transmission course, take over party's result calculated should be complete 0 or complete 1.If the result is not complete 0 or complete 1, the expression error in data.)
3.2 output verification:
Whether the character that test will be exported is the UTF8 form, if not the UTF8 formatted request is made mistakes, inside then attempts using the mode of " 2.1 set up database connects " once more.(UTF8 explains and asks for an interview the conversion of 2.5 ISNs).
3.3 data-switching:
Adopt international eXtensible Markup Language mode to change traffic flow information, be delivered to the terminal presentation layer.
3.4 terminal output:
Use the eXtensible Markup Language mode data of having changed to carry out data exhibiting.To convert the bar code that compiles out according to certain rule to significant information, need experience scanning and decipher two processes.The color of object is by its catoptrical type decided; White object can reflect the visible light of various wavelength; Black object then absorbs the visible light of various wavelength, thus when light that the bar code scanner light source sends after reflection on the bar code, reflected light shines on the inner photoelectric commutator of barcode scanner; The reflected light signal that photoelectric commutator is different according to power converts corresponding electric signal to.

Claims (2)

CN2011101046051A2011-04-262011-04-26Barcode filtering and matching engine technologyPendingCN102760125A (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN2011101046051ACN102760125A (en)2011-04-262011-04-26Barcode filtering and matching engine technology

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN2011101046051ACN102760125A (en)2011-04-262011-04-26Barcode filtering and matching engine technology

Publications (1)

Publication NumberPublication Date
CN102760125Atrue CN102760125A (en)2012-10-31

Family

ID=47054583

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN2011101046051APendingCN102760125A (en)2011-04-262011-04-26Barcode filtering and matching engine technology

Country Status (1)

CountryLink
CN (1)CN102760125A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20020026358A1 (en)*1999-04-222002-02-28Miller Michael R.System, method and article of manufacture for alerting a user to a promotional offer for a product based on user-input bar code information
CN101625681A (en)*2008-07-112010-01-13江苏怡丰通信设备有限公司Quick commodity information query method
CN102007416A (en)*2008-02-142011-04-06三星电子株式会社 Bio-disc reading device and analysis method using same

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20020026358A1 (en)*1999-04-222002-02-28Miller Michael R.System, method and article of manufacture for alerting a user to a promotional offer for a product based on user-input bar code information
CN102007416A (en)*2008-02-142011-04-06三星电子株式会社 Bio-disc reading device and analysis method using same
CN101625681A (en)*2008-07-112010-01-13江苏怡丰通信设备有限公司Quick commodity information query method

Similar Documents

PublicationPublication DateTitle
CN112540923B (en)Interface parameter checking and converting method, device, equipment and storage medium
US8799240B2 (en)System and method for investigating large amounts of data
CN102810089B (en)Short link system and implementation method based on content
US20220019678A1 (en)Method, apparatus, and computer-readable medium for automated construction of data masks
CN108197226A (en)MPTC account status tree and MPTC block chain method for quickly retrieving
CN113297431B (en)Multi-system heterogeneous identification compatible method of industrial Internet identification analysis system
US11222131B2 (en)Method for a secure storage of data records
CN105389352A (en)Log processing method and apparatus
CN107103067A (en)A kind of method of data synchronization and system based on search engine
CN114493630A (en)Industrial internet-based white spirit product tracing method and equipment
KR20200093262A (en)Method for proving original contents of knowledge sharing service using blockchain technology and system thereof
CN110362560B (en)Method for removing duplicate of non-service master key data during database storage
CN117992499A (en)Cargo management system
US10409845B1 (en)Authenticated pattern matching and exact path queries
CN115775184A (en)Data processing method, device, equipment, storage medium and program product
CN113239039B (en)Dynamic data storage method, query method, management method and management system
US12216685B2 (en)Systems and methods for pattern-based multi-stage deterministic data classification
CN102760125A (en)Barcode filtering and matching engine technology
CN112612987A (en)Method for calculating upstream and downstream flow of page access
CN109829769B (en) Method and system for electronic invoice checking
CN100357952C (en)Binary data access method
CN107092607B (en) A method and device for storing bills
CN112241620B (en) Text comparison method, system and computer program product thereof
CN113887171A (en) A method for standardization and automatic conversion of measuring point code of wind power generation system
CN102761519A (en)Technology for generating dynamic XML frameworks

Legal Events

DateCodeTitleDescription
C06Publication
PB01Publication
C10Entry into substantive examination
SE01Entry into force of request for substantive examination
DD01Delivery of document by public notice

Addressee:Shanghai Zhenshi Information Technology Co., Ltd.

Document name:the First Notification of an Office Action

DD01Delivery of document by public notice

Addressee:Shanghai Zhenshi Information Technology Co., Ltd.

Document name:Notification that Application Deemed to be Withdrawn

C02Deemed withdrawal of patent application after publication (patent law 2001)
WD01Invention patent application deemed withdrawn after publication

Application publication date:20121031


[8]ページ先頭

©2009-2025 Movatter.jp