Home Backend Development PHP Tutorial How to use PHP regular expressions to verify whether the input string is in the correct name or screen name format

How to use PHP regular expressions to verify whether the input string is in the correct name or screen name format

Jun 24, 2023 pm 12:45 PM
php regular expression Name verification

In today's social media and digital era, online names have become a part of people's daily lives and an important way for people to show their personality socially. In the screen name or name, the presence of some special symbols, numbers and other elements will affect the legitimacy of the name or screen name. Therefore, in order to ensure the correct format of the name or screen name, the input string can be verified through PHP regular expressions.

PHP regular expression is a method of matching and replacing text. Regular expressions can match a string of a certain pattern and then verify whether the string conforms to a certain format. In the verification of name or screen name, PHP regular expression will verify the input string to determine whether it meets certain rules.

The following will introduce some commonly used PHP regular expression verification rules for verifying the legitimacy of names or screen names.

1. Verify Chinese name

Chinese name refers to a name composed of two or more Chinese characters. Regarding the verification rules for Chinese names, you can use the following regular expressions:

/^[x{4e00}-x{9fa5}]{2,}$/u

Among them, "x{4e00}" represents the starting value of the Unicode encoding of Chinese characters, and "x{9fa5}" represents the Unicode encoding of Chinese characters. end value. "u" means enable UTF-8 support.

Using the above regular expression, you can verify whether the input string consists of two or more Chinese characters.

  1. Verification of English Internet Names

In the verification of English Internet names, it is usually necessary to determine whether the following rules are met:

  • Internet name The length is between 3-20 characters
  • The screen name can contain letters, numbers, spaces, _ and - and other special characters

Therefore, you can use the following regular expression for verification :

/^[a-zA-Z0-9_-]{3,20}$/u

Among them, "[a-zA-Z0-9_-]" means that special characters such as numbers, uppercase and lowercase letters, "_" and "-" are allowed. "{3,20}" indicates that the length of the network name is between 3-20 characters.

  1. Verify Chinese and English mixed network names

For verification of Chinese and English mixed network names, you can use the following regular expression:

/^[a-zA-Z0-9_x{4e00}-x{9fa5}]{3,20}$/u

where "x {4e00}" and "x{9fa5}" represent the starting and ending values ​​of Unicode encoding of Chinese characters. The above regular expression allows the use of numbers, letters, Chinese characters and the "_" special character.

It should be noted that PHP regular expression verification is not omnipotent, nor may it meet all verification needs. For example, the above regular expression cannot determine whether the space between a person's name conforms to conventional habits. In practical applications, specific regular expressions can be written for verification based on specific needs.

In addition to regular expressions, you can also use other string functions in PHP to determine the legitimacy of a name or screen name, such as the strlen() function or preg_match() function, etc. Different verification methods can be selected according to different situations.

In short, PHP regular expression verification is a universal and effective verification method, which plays an important role in ensuring the legitimacy of names or screen names. In actual development, the appropriate verification method can be selected according to the specific situation to ensure the correctness of the information input.

The above is the detailed content of How to use PHP regular expressions to verify whether the input string is in the correct name or screen name format. For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undress AI Tool

Undress AI Tool

Undress images for free

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Beginner's Guide to RimWorld: Odyssey
1 months ago By Jack chen
PHP Variable Scope Explained
4 weeks ago By 百草
Tips for Writing PHP Comments
3 weeks ago By 百草
Commenting Out Code in PHP
3 weeks ago By 百草

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

Hot Topics

PHP Tutorial
1509
276
Beyond the LAMP Stack: PHP's Role in Modern Enterprise Architecture Beyond the LAMP Stack: PHP's Role in Modern Enterprise Architecture Jul 27, 2025 am 04:31 AM

PHPisstillrelevantinmodernenterpriseenvironments.1.ModernPHP(7.xand8.x)offersperformancegains,stricttyping,JITcompilation,andmodernsyntax,makingitsuitableforlarge-scaleapplications.2.PHPintegrateseffectivelyinhybridarchitectures,servingasanAPIgateway

Object-Relational Mapping (ORM) Performance Tuning in PHP Object-Relational Mapping (ORM) Performance Tuning in PHP Jul 29, 2025 am 05:00 AM

Avoid N 1 query problems, reduce the number of database queries by loading associated data in advance; 2. Select only the required fields to avoid loading complete entities to save memory and bandwidth; 3. Use cache strategies reasonably, such as Doctrine's secondary cache or Redis cache high-frequency query results; 4. Optimize the entity life cycle and call clear() regularly to free up memory to prevent memory overflow; 5. Ensure that the database index exists and analyze the generated SQL statements to avoid inefficient queries; 6. Disable automatic change tracking in scenarios where changes are not required, and use arrays or lightweight modes to improve performance. Correct use of ORM requires combining SQL monitoring, caching, batch processing and appropriate optimization to ensure application performance while maintaining development efficiency.

Building Resilient Microservices with PHP and RabbitMQ Building Resilient Microservices with PHP and RabbitMQ Jul 27, 2025 am 04:32 AM

To build a flexible PHP microservice, you need to use RabbitMQ to achieve asynchronous communication, 1. Decouple the service through message queues to avoid cascade failures; 2. Configure persistent queues, persistent messages, release confirmation and manual ACK to ensure reliability; 3. Use exponential backoff retry, TTL and dead letter queue security processing failures; 4. Use tools such as supervisord to protect consumer processes and enable heartbeat mechanisms to ensure service health; and ultimately realize the ability of the system to continuously operate in failures.

Creating Production-Ready Docker Environments for PHP Creating Production-Ready Docker Environments for PHP Jul 27, 2025 am 04:32 AM

Using the correct PHP basic image and configuring a secure, performance-optimized Docker environment is the key to achieving production ready. 1. Select php:8.3-fpm-alpine as the basic image to reduce the attack surface and improve performance; 2. Disable dangerous functions through custom php.ini, turn off error display, and enable Opcache and JIT to enhance security and performance; 3. Use Nginx as the reverse proxy to restrict access to sensitive files and correctly forward PHP requests to PHP-FPM; 4. Use multi-stage optimization images to remove development dependencies, and set up non-root users to run containers; 5. Optional Supervisord to manage multiple processes such as cron; 6. Verify that no sensitive information leakage before deployment

VSCode settings.json location VSCode settings.json location Aug 01, 2025 am 06:12 AM

The settings.json file is located in the user-level or workspace-level path and is used to customize VSCode settings. 1. User-level path: Windows is C:\Users\\AppData\Roaming\Code\User\settings.json, macOS is /Users//Library/ApplicationSupport/Code/User/settings.json, Linux is /home//.config/Code/User/settings.json; 2. Workspace-level path: .vscode/settings in the project root directory

Building Immutable Objects in PHP with Readonly Properties Building Immutable Objects in PHP with Readonly Properties Jul 30, 2025 am 05:40 AM

ReadonlypropertiesinPHP8.2canonlybeassignedonceintheconstructororatdeclarationandcannotbemodifiedafterward,enforcingimmutabilityatthelanguagelevel.2.Toachievedeepimmutability,wrapmutabletypeslikearraysinArrayObjectorusecustomimmutablecollectionssucha

The Serverless Revolution: Deploying Scalable PHP Applications with Bref The Serverless Revolution: Deploying Scalable PHP Applications with Bref Jul 28, 2025 am 04:39 AM

Bref enables PHP developers to build scalable, cost-effective applications without managing servers. 1.Bref brings PHP to AWSLambda by providing an optimized PHP runtime layer, supports PHP8.3 and other versions, and seamlessly integrates with frameworks such as Laravel and Symfony; 2. The deployment steps include: installing Bref using Composer, configuring serverless.yml to define functions and events, such as HTTP endpoints and Artisan commands; 3. Execute serverlessdeploy command to complete the deployment, automatically configure APIGateway and generate access URLs; 4. For Lambda restrictions, Bref provides solutions.

A Deep Dive into PHP's Internal Garbage Collection Mechanism A Deep Dive into PHP's Internal Garbage Collection Mechanism Jul 28, 2025 am 04:44 AM

PHP's garbage collection mechanism is based on reference counting, but circular references need to be processed by a periodic circular garbage collector; 1. Reference count releases memory immediately when there is no reference to the variable; 2. Reference reference causes memory to be unable to be automatically released, and it depends on GC to detect and clean it; 3. GC is triggered when the "possible root" zval reaches the threshold or manually calls gc_collect_cycles(); 4. Long-term running PHP applications should monitor gc_status() and call gc_collect_cycles() in time to avoid memory leakage; 5. Best practices include avoiding circular references, using gc_disable() to optimize performance key areas, and dereference objects through the ORM's clear() method.

See all articles