Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

439 results about "Character encoding" patented technology

Character encoding is used to represent a repertoire of characters by some kind of encoding system. Depending on the abstraction level and context, corresponding code points and the resulting code space may be regarded as bit patterns, octets, natural numbers, electrical pulses, etc. A character encoding is used in computation, data storage, and transmission of textual data. "Character set", "character map", "codeset" and "code page" are related, but not identical, terms.

Data structure for creating, scoping, and converting to unicode data from single byte character sets, double byte character sets, or mixed character sets comprising both single byte and double byte character sets

A data structure for specifying the types of constants whose character values are to be converted to Unicode; for specifying which code page or pages are used for specifying the character encodings used in the source program for writing the character strings to be converted to Unicode; and that can be used to perform conversions from SBCS, mixed SBCS / DBCS, and pure DBCS character strings to Unicode. A syntax suitable for specifying character data conversion from SBCS, mixed SBCS / DBCS, and pure DBCS representation to Unicode utilizes an extension to the conventional constant subtype notation. In converting the nominal value data to Unicode, currently relevant SBCS and DBCS code pages are used, as specified by three levels or scopes derived from either global options, from local AOPTIONS statement specifications, or from constant-specific modifiers. Global code page specifications apply to the entire source program. These global specifications allow a programmer to declare the source-program code page or code pages just once. These specifications then apply to all constants containing a request for conversion to Unicode. Local code page specifications apply to all subsequent source-program statements. These local specifications allow the programmer to create groups of statements containing Unicode conversion requests, all of which use the same code page or code pages for their source-character encodings. Code page specifications that apply to individual constants allow a detailed level of control over the source data encodings to be used for Unicode conversion. The conversion of source data to Unicode may be implemented inherently to the translator (assembler, compiler, or interpreter) wherein it recognizes and parses the complete syntax of the statement in which the constant or constants is specified, and performs the requested conversion. Alternatively, an external function may be invoked by a variety of source language syntaxes which parses as little or as much of the source statement as its implementation provides, and returns the converted value for inclusion in the generated machine language of the object program. Alternatively, the conversion may be provided by the translator's macro instruction definition facility.
Owner:IBM CORP

Complementary Character Encoding for Preventing Input Injection in Web Applications

Method to prevent the effect of web application injection attacks, such as SQL injection and cross-site scripting (XSS), which are major threats to the security of the Internet. Method using complementary character coding, a new approach to character level dynamic tainting, which allows efficient and precise taint propagation across the boundaries of server components, and also between servers and clients over HTTP. In this approach, each character has two encodings, which can be used to distinguish trusted and untrusted data. Small modifications to the lexical analyzers in components such as the application code interpreter, the database management system, and (optionally) the web browser allow them to become complement aware components, capable of using this alternative character coding scheme to enforce security policies aimed at preventing injection attacks, while continuing to function normally in other respects. This approach overcomes some weaknesses of previous dynamic tainting approaches by offering a precise protection against persistent cross-site scripting attacks, as taint information is maintained when data is passed to a database and later retrieved by the application program. The technique is effective on a group of vulnerable benchmarks and has low overhead.
Owner:POLYTECHNIC INSTITUTE OF NEW YORK UNIVERSITY

Screen video encoding and decoding method based on progressive character block compression and encoding and decoding device

The invention discloses a screen video encoding and decoding method based on progressive character block compression and an encoding and decoding device thereof. The screen video encoding and decoding method comprises the following steps: obtaining a frame in a screen video, and dividing the frame into M*N macro blocks; dividing each macro block into character blocks or image blocks according to the category; dividing each character block into a plurality of character compression code streams according to a main color and a non-main color; encoding the main color by an index table, and progressively encoding escape colors of the non-main color based on a bit plane; dividing each image block into a plurality of image encoding quality layers by using a progressive image encoding algorithm based on wavelet transform; transmitting the code streams to a receiving terminal according to different quality grades; and decoding and displaying the code stream of each quality layer by the receiving terminal. According to the screen video encoding and decoding method disclosed by the invention, in view of the limitation and defects of traditional character encoders, the progressive character encoding technology of a plurality of quality layers is realized, no support of special equipment is needed, and the screen video encoding and decoding method is applicable to all occasions needing to compress screen images containing characters.
Owner:XIAN WANXIANG ELECTRONICS TECH CO LTD

Text content digital watermark encryption and protection method and device

ActiveCN108090329ATo achieve the purpose of original data protectionThe display effect is not affectedDigital data protectionProgram/content distribution protectionArray data structureOriginal data
The invention discloses a text content digital watermark encryption and protection method and device. The method comprises S1, eliminating posterior repeated characters in an original text to generatean array A composed of characters without repetition, wherein the serial number of every character in the array A is in order of appearance in the original text; S2, converting the characters in thearray A one by one into character codes A (n), and encrypting the character codes A (n) one by one to acquire encrypted new character codes B (n); S3, converting the new character codes B (n) into acquire character codes C (n), mapping the characters in the array A with the character codes C (n) so that the character codes C (n) are displayed as the font of the characters in the array A. Accordingto the text content digital watermark encryption and protection method, by encrypting and coding the character codes of original codes again and enabling the encrypted character codes to carry watermark information, the display effects can avoid being affected, text content can be encrypted and carry the unforgeable watermark information, so that the aim of original data protection of content ofcopyright can be achieved.
Owner:上海海笛数字出版科技有限公司

Color character encoding method and decoding method

The invention discloses a color character encoding method and a decoding method which solve the problems of an anti-counterfeiting code technology that the security is low and the appearance effect of a product is affected. The color character encoding method comprises the following steps that (1) N different colors are selected; (2) an N system encoding library is set up and the base of the encoding library is matched with the selected colors; (3) source information is input and converted into an M system code; (4) the M system code is converted into an N system code to obtain corresponding data; (5) the data is substituted through the colors which are matched with the base of the N system encoding library, lined and combined into a color character; and (6) the color character is output. The color character decoding method comprises the following steps that (1) the color character is identified and substituted into the M system code by terminal equipment; (2) the M system code is converted into a Unicode or an ASCII code; and (3) the terminal equipment converts the Unicode or ASCII code into source information and outputs the same. According to the color character encoding method and the decoding method, an anti-counterfeiting code manufacturing method is novel and the security is high.
Owner:曾芝渝 +3

Complementary character encoding for preventing input injection in web applications

Method to prevent the effect of web application injection attacks, such as SQL injection and cross-site scripting (XSS), which are major threats to the security of the Internet. Method using complementary character coding, a new approach to character level dynamic tainting, which allows efficient and precise taint propagation across the boundaries of server components, and also between servers and clients over HTTP. In this approach, each character has two encodings, which can be used to distinguish trusted and untrusted data. Small modifications to the lexical analyzers in components such as the application code interpreter, the database management system, and (optionally) the web browser allow them to become complement aware components, capable of using this alternative character coding scheme to enforce security policies aimed at preventing injection attacks, while continuing to function normally in other respects. This approach overcomes some weaknesses of previous dynamic tainting approaches by offering a precise protection against persistent cross-site scripting attacks, as taint information is maintained when data is passed to a database and later retrieved by the application program. The technique is effective on a group of vulnerable benchmarks and has low overhead.
Owner:POLYTECHNIC INSTITUTE OF NEW YORK UNIVERSITY

Apparatus and method of mobile communication terminal character conversion

The invention discloses a character conversion device of a mobile communication terminal, and comprises a data recognition unit which judges whether the code of a received first character exists in a local character base; a character code corresponding table which records the code of the first character and the code of a corresponding second character in the local character base; and a character conversion unit which converts the received first character into the corresponding second character in the local character base according to the character code corresponding table. Besides, the invention discloses a character conversion method of the mobile communication terminal, which first judges whether the code of the received first character exists in the local character base, and searches the code of the second character in the local character base which is corresponding to the first character according to the set character code corresponding table, if not. The invention reduces the occupation of memory space by the character base resource, has a small calculating amount, is suitable for mobile terminal devices limited by resources and cost and can realize the compatibility of characters with only a set of character base in the mobile terminal device.
Owner:SHANGHAI SIMCOM LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products