CN102760125A - Barcode filtering and matching engine technology - Google Patents
Barcode filtering and matching engine technology Download PDFInfo
- Publication number
- CN102760125A CN102760125A CN2011101046051A CN201110104605A CN102760125A CN 102760125 A CN102760125 A CN 102760125A CN 2011101046051 A CN2011101046051 A CN 2011101046051A CN 201110104605 A CN201110104605 A CN 201110104605A CN 102760125 A CN102760125 A CN 102760125A
- Authority
- CN
- China
- Prior art keywords
- data
- barcode
- bar code
- technology
- filtering
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000005516 engineering process Methods 0.000 title claims abstract description 10
- 238000001914 filtration Methods 0.000 title abstract description 7
- 238000000034 method Methods 0.000 claims abstract description 16
- 238000005457 optimization Methods 0.000 abstract description 6
- 238000005206 flow analysis Methods 0.000 abstract description 3
- 238000012545 processing Methods 0.000 abstract description 2
- 238000012795 verification Methods 0.000 description 5
- 230000008569 process Effects 0.000 description 3
- 238000006243 chemical reaction Methods 0.000 description 2
- 230000000295 complement effect Effects 0.000 description 2
- 238000004519 manufacturing process Methods 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000001747 exhibiting effect Effects 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000003760 hair shine Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 238000002310 reflectometry Methods 0.000 description 1
- 230000008439 repair process Effects 0.000 description 1
- 238000003860 storage Methods 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
- 238000010200 validation analysis Methods 0.000 description 1
Images
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
The invention relates to a barcode filtering and matching engine technology, which is the technology for processing barcode data with a filtering method and requesting matched data contained in a search term from mass data in a database. The technology comprises the steps as follows: analyzing primary characteristic property based on data information flow analysis of keywords, comparing according to the existing keyword library (a built-in keyword library), intercepting a network data packet in an equals manner during internal filtering, carrying out keyword comparison on the content of the data packet, calculating whether the content of the data packet is similar to the internal data library according to the corresponding MD5 value of the data information flow, obtaining and merging the data, and carrying out optimization on the data by combining dichotomy and Hash, so as to achieve rapid and precise matching of the input data. According to the technology, a method for searching the result by using the barcode or keywords of the search term is realized, and can lighten the equipment; professional equipment is not needed; and the function of fast scanning barcode and fast querying the corresponding merchandise information can be realized just by a wireless mobile terminal and the like.
Description
One, technical field
The present invention relevant a kind of from bar code data after the filter purifying method is handled, request comprises the technical method of institute's data matching in the search terms from database mass data again.Search engine can be realized a kind of bar code of search terms or method that key word comes Search Results used.
Two, background technology
Bar code (barcode) is a plurality of secret notes and the blank that width is not waited, and arranges according to certain coding rule, in order to express the graphical identifier of one group of information.Common bar code is the pattern of parallel lines that the secret note (abbreviation bar) that differed greatly by reflectivity and informal voucher (being called for short empty) are lined up.Bar code can mark many information such as producing country, manufacturing firm, trade name, date of manufacture, book classification number, mail start-stop place, classification, the date of article, thereby has all obtained using widely in many fields such as circulation of commodities, taking care of books, postal management, banking systems.
Three, summary of the invention
1, goal of the invention:
Had only enterprise-class tools in the past and had large-scale bar code query facility user and could inquire about commodity bar code information; Provide this method can lightweight equipment now; Do not need to accomplish professional equipment only only to need mobile radio terminal etc. just can realize the quick scanning barcode of bar code, the function of fast query corresponding goods information.
2, technical solution:
Data message flow analysis based on the bar code key word; Analyze its principal character character, compare according to existing key word library (in build key word library), self-filtering adopts the equals mode that network packet is intercepted; The content of packet is carried out the key word comparison; According to the corresponding MD5 value of data message stream, calculate whether it similar with internal database, and merge after obtaining its data; Data are carried out the optimization that dichotomy (dichotomy) and Hash (Hash) mutually combine, thereby reach input data accurate matching fast.
3, description of drawings:
Fig. 1 is the process flow diagram that bar code is filtered turbid matching engine technology.
Four, embodiment
Bar code is filtered turbid precise search engine terminal technology:
1. network inputted search item:
1.1 filtration key word:
Data message flow analysis based on key word; Analyzing its principal character character compares according to existing key word library (in build key word library); Self-filtering adopts the equals mode that network packet is intercepted, and the content of packet is carried out the key word comparison, is filled into the corresponding MD5 value (Message Digest Algorithm) of data message stream; Calculate whether it similar with internal database, judge whether to tackle its data.
1.2 pooled data stream:
Merge the data message stream that filters key word, adopt MD5 (Message Digest Algorithm) to mix connected mode, pooled data stream.
1.3 data stream is submitted server apparatus to
Data stream after having merged well can adopt Method cipher mode (POST) to server apparatus by wireless terminal device or PC hardware device or server mode.Adopt the more cipher mode of Security.Such as: submit data to through non-POST, information data may be exposed to presentation layer, and is stored in the buffer memory of other media, just causes insecurity once check buffer memory.In addition, use non-POST to submit to data also may cause Cross-site request forgery to attack.
2. server apparatus data interaction:
2.1 setting up database connects:
Set up each and show needed table space, adopt the SQL hardware standard according to the equipment otherness.Authorize for database inside search access right.Be connected to database.(set up the relevant inquiring table space.)
2.2 database inquiry optimization:
Carry out the optimization that dichotomy (dichotomy) and Hash (Hash) mutually combine for each data of needs inquiries.Thereby reach the accurate matching of input data, shorten the inquiry institute purpose of service time.
Dichotomy:
Binary chop is claimed binary search again, and it is the higher lookup method of a kind of efficient.
Binary chop requires: linear list is an ordered list, and promptly node is according to keywords orderly in the table, and will use the storage organization of vector as table.Might as well establish ordered list increases progressively orderly.
Hash:
HASH is mainly used in AES in the information security field; It changes into 128 mixed and disorderly coding to the information of some different lengths; These encoded radios are called the HASH value. we can say that also hash is exactly the mapping relations that find between a kind of data content and the deposit data address.
2.3 verification msg correctness:
Data are carried out secondary checksum verification data correctness by the MD5 mode once more.
MD5: to the concise and to the point narration of MD5 algorithm can for: MD5 handles the information of input with 512 groupings; And each divides into groups to be divided into again 16 32 seats and divides into groups; After having passed through a series of processing; The output of algorithm is formed by four 32, with generating 128 hashed values after these four 32 packet concatenation.
2.4 inner debugging mechanism:
When connection or optimization or validation failure, internal server equipment forms daily record (LogData) with the numbering of the timing error of automatic misregistration generation.Convenient inquiry, and can start corresponding inner debugging mechanism, repair frequent fault, guarantee data query stability and robustness.
2.5 ISN conversion:
According to the different language requirement of information flow ISSUER platform, the unified UTF8 ISN form that adopts.When outputing to presentation layer, can reduce the occurrence frequency of mess code, accomplish optimization output and the effect that improves output efficiency.
UTF8:UTF-8 is that a kind of elongated character code of UNICODE is claimed ten thousand country codes again, is created in 1992 by Ken Thompson.Be standardized as RFC 3629 now.UTF-8 is with 1 to 6 byte code UNICODE character.Being used in can the simplified traditional font of same page Chinese display and other language (like Japanese, the Korean) on the webpage
2.6 acquisition Query Result:
Character information data stream after will passing through verification and changing turns back on the target query terminal as Query Result.Adopt the mode of network or WIFI or other various wireless or wired (according to device requirements) to transmit.
3. the terminal inquiry result resolves:
3.1 network measuring verification:
By the terminal inter-area traffic interarea is carried out parity checking.(employing all be data stream to be regarded as 16 integers stream repeat stack and calculate.For calculate the check with, at first the check and field be changed to 0.Then, in the valid data scope each 16 carry out the one's complement summation, the result exists in check and the field, data length is that odd number is then mended a byte 0.After receiving data, equally each 16 figure place in the valid data scope are carried out the summation of one's complement.The take over party in computation process, comprised transmit leg exist in the stem check with, any mistake does not take place in stem in transmission course, take over party's result calculated should be complete 0 or complete 1.If the result is not complete 0 or complete 1, the expression error in data.)
3.2 output verification:
Whether the character that test will be exported is the UTF8 form, if not the UTF8 formatted request is made mistakes, inside then attempts using the mode of " 2.1 set up database connects " once more.(UTF8 explains and asks for an interview the conversion of 2.5 ISNs).
3.3 data-switching:
Adopt international eXtensible Markup Language mode to change traffic flow information, be delivered to the terminal presentation layer.
3.4 terminal output:
Use the eXtensible Markup Language mode data of having changed to carry out data exhibiting.To convert the bar code that compiles out according to certain rule to significant information, need experience scanning and decipher two processes.The color of object is by its catoptrical type decided; White object can reflect the visible light of various wavelength; Black object then absorbs the visible light of various wavelength, thus when light that the bar code scanner light source sends after reflection on the bar code, reflected light shines on the inner photoelectric commutator of barcode scanner; The reflected light signal that photoelectric commutator is different according to power converts corresponding electric signal to.
Claims (2)
1. the present invention is, relevant a kind of from bar code data after the filter purifying method is handled, request comprises the technical method of institute's data matching in the search terms from database mass data again.Search engine can be realized a kind of bar code of search terms or method that key word comes Search Results used.
2. bar code according to claim 1 is filtered the technology of turbid match search engine, it is characterized in that: the method for using bar code or key word to come Search Results through wireless terminal.This invention can be carried out search inquiry to bar code or related keyword information.The data message stream that obtains from this search engine method can turn back on the target query terminal device.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN2011101046051A CN102760125A (en) | 2011-04-26 | 2011-04-26 | Barcode filtering and matching engine technology |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN2011101046051A CN102760125A (en) | 2011-04-26 | 2011-04-26 | Barcode filtering and matching engine technology |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN102760125A true CN102760125A (en) | 2012-10-31 |
Family
ID=47054583
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN2011101046051A Pending CN102760125A (en) | 2011-04-26 | 2011-04-26 | Barcode filtering and matching engine technology |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN102760125A (en) |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20020026358A1 (en) * | 1999-04-22 | 2002-02-28 | Miller Michael R. | System, method and article of manufacture for alerting a user to a promotional offer for a product based on user-input bar code information |
| CN101625681A (en) * | 2008-07-11 | 2010-01-13 | 江苏怡丰通信设备有限公司 | Quick commodity information query method |
| CN102007416A (en) * | 2008-02-14 | 2011-04-06 | 三星电子株式会社 | Bio-disc reading device and analysis method using same |
-
2011
- 2011-04-26 CN CN2011101046051A patent/CN102760125A/en active Pending
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20020026358A1 (en) * | 1999-04-22 | 2002-02-28 | Miller Michael R. | System, method and article of manufacture for alerting a user to a promotional offer for a product based on user-input bar code information |
| CN102007416A (en) * | 2008-02-14 | 2011-04-06 | 三星电子株式会社 | Bio-disc reading device and analysis method using same |
| CN101625681A (en) * | 2008-07-11 | 2010-01-13 | 江苏怡丰通信设备有限公司 | Quick commodity information query method |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN112540923B (en) | Interface parameter checking and converting method, device, equipment and storage medium | |
| US8799240B2 (en) | System and method for investigating large amounts of data | |
| CN102810089B (en) | Short link system and implementation method based on content | |
| US20220019678A1 (en) | Method, apparatus, and computer-readable medium for automated construction of data masks | |
| CN108197226A (en) | MPTC account status tree and MPTC block chain method for quickly retrieving | |
| CN113297431B (en) | Multi-system heterogeneous identification compatible method of industrial Internet identification analysis system | |
| US11222131B2 (en) | Method for a secure storage of data records | |
| CN105389352A (en) | Log processing method and apparatus | |
| CN107103067A (en) | A kind of method of data synchronization and system based on search engine | |
| CN114493630A (en) | Industrial internet-based white spirit product tracing method and equipment | |
| KR20200093262A (en) | Method for proving original contents of knowledge sharing service using blockchain technology and system thereof | |
| CN110362560B (en) | Method for removing duplicate of non-service master key data during database storage | |
| CN117992499A (en) | Cargo management system | |
| US10409845B1 (en) | Authenticated pattern matching and exact path queries | |
| CN115775184A (en) | Data processing method, device, equipment, storage medium and program product | |
| CN113239039B (en) | Dynamic data storage method, query method, management method and management system | |
| US12216685B2 (en) | Systems and methods for pattern-based multi-stage deterministic data classification | |
| CN102760125A (en) | Barcode filtering and matching engine technology | |
| CN112612987A (en) | Method for calculating upstream and downstream flow of page access | |
| CN109829769B (en) | Method and system for electronic invoice checking | |
| CN100357952C (en) | Binary data access method | |
| CN107092607B (en) | A method and device for storing bills | |
| CN112241620B (en) | Text comparison method, system and computer program product thereof | |
| CN113887171A (en) | A method for standardization and automatic conversion of measuring point code of wind power generation system | |
| CN102761519A (en) | Technology for generating dynamic XML frameworks |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| DD01 | Delivery of document by public notice |
Addressee: Shanghai Zhenshi Information Technology Co., Ltd. Document name: the First Notification of an Office Action |
|
| DD01 | Delivery of document by public notice |
Addressee: Shanghai Zhenshi Information Technology Co., Ltd. Document name: Notification that Application Deemed to be Withdrawn |
|
| C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
| WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20121031 |