CN106302326A - Network article guard method and system - Google Patents
Network article guard method and system Download PDFInfo
- Publication number
- CN106302326A CN106302326A CN201510259722.3A CN201510259722A CN106302326A CN 106302326 A CN106302326 A CN 106302326A CN 201510259722 A CN201510259722 A CN 201510259722A CN 106302326 A CN106302326 A CN 106302326A
- Authority
- CN
- China
- Prior art keywords
- article
- font
- ciphertext
- character code
- server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 62
- 238000006243 chemical reaction Methods 0.000 claims abstract description 90
- 239000000203 mixture Substances 0.000 claims description 12
- 230000008859 change Effects 0.000 claims description 7
- 230000007246 mechanism Effects 0.000 abstract description 3
- 230000008569 process Effects 0.000 description 19
- 238000005516 engineering process Methods 0.000 description 8
- 238000013519 translation Methods 0.000 description 8
- 230000005540 biological transmission Effects 0.000 description 6
- 238000010411 cooking Methods 0.000 description 5
- 230000006870 function Effects 0.000 description 5
- 238000010586 diagram Methods 0.000 description 3
- 230000000694 effects Effects 0.000 description 3
- 238000012545 processing Methods 0.000 description 3
- 206010038743 Restlessness Diseases 0.000 description 2
- 238000004422 calculation algorithm Methods 0.000 description 2
- 230000003362 replicative effect Effects 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 241000208340 Araliaceae Species 0.000 description 1
- 235000005035 Panax pseudoginseng ssp. pseudoginseng Nutrition 0.000 description 1
- 235000003140 Panax quinquefolius Nutrition 0.000 description 1
- 230000009471 action Effects 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 238000007796 conventional method Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 235000008434 ginseng Nutrition 0.000 description 1
- 239000007943 implant Substances 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 238000004064 recycling Methods 0.000 description 1
- 230000009467 reduction Effects 0.000 description 1
- 230000007704 transition Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/067—Network architectures or network communication protocols for network security for supporting key management in a packet data network using one-time keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/105—Multiple levels of security
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Information Transfer Between Computers (AREA)
- Document Processing Apparatus (AREA)
Abstract
The present invention relates to network article guard method and system, and run the computer network system of the method.In this method, yi word pattern server is provided, the article that author is transmitted can be directly received, or receive the article that author is delivered at a content platform, then article parsing is obtained font subset, and produce a ciphertext character code conversion table, article is transferred to a ciphertext, again ciphertext is transferred to content platform, content platform provides this article of readers ' reading.Particularly, when reader is intended to obtain this article directly from content platform, obtain is the ciphertext failed to understand through transcoding, but the ciphertext font file after providing character code conversion via font server can show correct article content.Thereby offer one is for the copyright protection mechanism of web documents.
Description
Technical field
The present invention is about a kind of network article guard method and system, particularly a kind of by clothes
The method of business device end transcoding technology protection web documents copyright and correlation computer network system.
Background technology
Because network has quickly transmission, searches the platform identity used with the public easily, common people can
Delivering works with word, audio-visual mode easily, wherein video content copyright easily determines, but civilian
Word but has the problem replicating easily and being difficult to differentiate, prevailing network platform majority lacks effective copyright pipe
Reason mechanism.
Though digital content has advantage, but still has easily by massive duplication and the shortcoming of quickly transmission, although
Promote the exchange of information, also allow the exchange of information excessively spread unchecked so that ensure digital content copyright
Work be challenged.As long as owing to having correct encoder and decoder, any user all may be used
To transmit and to understand digital content, the mandate of the specification digital content that causes having no idea, also cannot sound
The copyright of bright digital content.
The medium that digital content is all transmitted using the coded system that public affairs are fixed as data at present.But, compare
In the most flourishing digital audio-video copyright management technique, numeral article lacks one can be effective
State the technology of its copyright so that numeral article is easily by unauthorized reprinting.
It is said that in general, originally webpage article is probably segmented into following several rank from being posted to read
Section, including: the article write is uploaded on its original work platform specified by original author, if with net
As a example by network platform, reader can be allowed to browse article by web browser, after opening web browser, journey
Sequence will send web-page requests to original work platform, acquirement web page contents.
In the processing procedure of web browser, the standard that the file obtained sets according to webpage can be compiled
Code rule, sets (such as CSS) by font file according to character code and the pattern in webpage of each word
Corresponding font takes out, and sequentially shows on screen.
Owing to article not encrypted is processed by general networking platform, as long as any reader is by browser
Webpage article replicates, and just can recycle easily.And these recyclings are probably not obtain former
The mode that author authorizes is carried out, and the most again uploads, revises or arbitrarily reprint other transfer platform
On, can allow the content that other ignorant readers ' readings are reprinted, so may produce copyright disputes.
Existing subnetwork platform provides the mode preventing replicating to include: utilize webpage embedded description language
Say (script language) or reader cannot be replicated by conventional method for server end web page program
Webpage word, forbids directly being posted article;Or require specific reading is installed in user end computer
Software, is typically common in e-book.
The general running of font server refers to the dealer of font server shown in Fig. 1 provides font service
System architecture diagram.
Under this framework, general content platform provides the service that web documents is delivered, uploaded etc., such as
Author 10 is provided to be published an article the blogger (blog) of (101), forum, community website by network,
Or other provide the website etc. of the service of publishing an article, this example represents with content platform 12, typically interior
With (plain text) in plain text or standard code mode stores article to hold platform 12, therefore can be direct
There is provided reader 14 by network reading web documents (103).If article uses font server (font
Server) 16 fonts provided and the design of pattern, when reader 14 reads article, can be according to net
Page sets and is linked to font server 16, transmits web page contents (105) simultaneously and arrives font server 16,
Content includes entire chapter or part webpage article.Afterwards, font server 16 can provide font file
(107) giving reader 14 reader (such as web browser) used, reader can be according to institute
Defined in the font file obtained, font shows article with pattern.
In system above framework, article is all to carry out turning with the coded system that public affairs are fixed from being posted to read
Change and transmit, therefore, as long as original work platform reader can receive correct character code data, just can conduct
Reprinting person uploads to transfer platform again by same method.
Summary of the invention
Because the known effectively protection web documents that lacks prevents the technology of bootlegging, the invention discloses
Book proposes a kind of network article guard method and the system realizing the method, in such a system,
Having the font server of an offer web documents font subset, the present invention is i.e. by this font server
A kind of copyright protection method of web documents is provided.
According to one of method embodiment, receiving article by this font server, author can pass through
One content platform is published an article, then by content platform, article is delivered to this font server and performs ciphertext
Conversion;Or, font server itself provides the interface that author can publish an article, thus directly takes
Obtain article and carry out ciphertext conversion.
Then, in this font server, generation one character code conversion table real-time to article, character code is changed
Table is the unique transition key for this article, and other articles inapplicable.Then, with this character code
Translation table article is a ciphertext, then transmits ciphertext to content platform, content platform provide and read
The service of article.
When reader is intended to by reader to content platform reading articles, service without by font
Device utilizes the aforementioned ciphertext of character code translation table, i.e. cannot obtain the ciphertext font file after conversion, then
Can only see the nonsensical ciphertext through conversion, therefore to read article originally, need font to take
Business device is agreed to perform conversion, the method thereby providing web documents copyright protection.
Wherein, the action producing ciphertext conversion shelves at font server includes the article that first parsing obtains,
With font subset in acquirement article, thereby reduce font file, improve treatment efficiency, more real-time
Computing obtains character code conversion table, then with this character code translation table article as ciphertext.
Relevant network article protection system can a computer system realize, wherein with software hands
Duan Shixian obtains article, resolves article, generation character code conversion table, ciphertext generation, and store character code
The data base of conversion table and font data storehouse.
System can be realized by font server, more can include a user management means, in order to verify work
Person and the identity of reader.
In order to be able to be further understood that technology, method and the merit that the present invention is taked by reaching set purpose
Effect, refers to the detailed description below in connection with the present invention, graphic, it is believed that the purpose of the present invention, feature
With feature, when can thus be goed deep into and concrete understanding, but institute's accompanying drawings and adnexa only provide ginseng
Examine and use is described, being not used for the present invention person of being any limitation as.
Accompanying drawing explanation
Fig. 1 describes the system architecture diagram that general font server dealer provides font to service;
Fig. 2 show the system architecture one embodiment signal of the present invention network article protection system
Figure;
Fig. 3 show the present invention network article guard method framework one embodiment flow process it
One;
Fig. 4 show the present invention network article guard method framework one embodiment flow process it
Two;
Fig. 5 show the present invention network article guard method framework one embodiment flow process it
Three;
Fig. 6 show the system architecture two embodiment signal of the present invention network article protection system
Figure;
Fig. 7 show the framework two embodiment flow process of the present invention network article guard method;
Fig. 8 show the embodiment of character code conversion in the present invention network article guard method;
Fig. 9 show the embodiment of character code conversion table in the present invention network article guard method;
Figure 10 show the function block embodiment of the present invention network article protection system.
Detailed description of the invention
According to the embodiment of the network article guard method described by this exposure book Yu system, its
In in order to effective protection works copyright, prevent web documents from being reprinted without permission or capturing
Wherein content, the article guard method provided by yi word pattern server, web documents is performed close
Literary composition conversion.It is as a copyright by font server using one of article mode being converted to ciphertext
Keyholed back plate role, can set up a character code conversion table according to acquired article, when readers' needs is read
During article, need to obtain the ciphertext font file after conversion by link font server, could read
To correct article, otherwise fail to obtain the ciphertext font after changing in unwarranted situation civilian
Part, therefore can only see the content of mistake transcoding.
Web documents can refer to author and be published in the article of particular network platform, be such as published in website,
Digital content on blogger, community website, or various discussion platform, particularly word.When having
When reader to watch this kind of article, typically can be obtained by the reader link network of relation platform of terminal
Article, including the pattern archives (such as HTML markup, CSS style etc.) of decision article layout form,
Being downloaded to reader in the lump open, reader can be web browser or specific ocr software, passes through
Explain this kind of pattern archives and font encoding, i.e. correctly present article content according to coding rule.
When user is by reader viewing web documents, wherein by word in font file definition article
Type style, the major function of font file is that the numerous fonts belonging to same style are stored in one
Or in several archives, in order to user adjusts its word vision effect wanting to present.But, remove
Beyond the substantial amounts of font of storage, inside font file, also store the right of a series of character code and font
According to table, each character code in the character set that these synopsis can will be specified is chained up with font.Cause
This, when read web article, call font from the font file specified according to character code, and depend on
Sequence shows on picture, makes reader be understood the content of article.
The general running of font server refers to the description of Fig. 1, and under this framework, general content is put down
Platform there is no provides the behavior that effectively can stop bootlegging, reprinting etc..But, when in wherein article
When using the service of the font that provided of font server and pattern, one of embodiment of the present invention is i.e. passed through
Font server implementation one network article protection system, is carried for every article by this system
For the ciphertext conversion shelves of its uniqueness, thereby realize a kind of copyright protection method.
Technology according to the network article guard method that the invention discloses described by book Yu system
One of purpose, system can provide for each original author or original text chapter and be specific to this original author or former
The coding rule of article, by this coding rule, can send original work again to and read after being encoded by article content
Person, therefore original work reader can receive the article content after coding, reaches protection by exclusive coding rule
The purpose of article.Further, if this coding rule have passed through a certain degree of encryption,
In the case of not knowing about coding rule, reprinting person will be unable to the article content before being encoded;If reprinting
Person wants the article content received is replicated or revised, and can only obtain the ciphertext after coding.Furthermore,
When forming exclusive font file, font file is equivalent to the signature of this author, if simultaneously
Author can be embedded in font file and authorize claim information, or utilize blank code to add the version of image-type
Power statement, then can increase the effect of infringement identification, such as, when exclusive font file is stolen, but
Wherein copyright mark can assist to pick out copyright owner for whom, can process piracy in law mode and ask
Topic.
On the other hand, though original work reader can obtain original text chapter according to correct coding rule, if original work
Article content after coding is replicated by reader, and the font file using general standard to encode shows,
Each character code still sequentially can be corresponded to each font by font file.But, because the article content received
Being to have used aforementioned exclusive individualized coding to weave into ciphertext, the part of ciphertext is nonsensical unrest
Code, during display, the font arrangement that character code corresponds to also is not seen in all senses, refers to shown in Fig. 8
Character code correspondence font example, even if causing the content after original work reader's replica code, also cannot read.
Technology above by the exclusive coding rule providing each original author's article can be carried by one
Dealer for the service of font storehouse provides, and can pass through font server, or specific servosystem provides individual
Peopleization encoding service.
According to one of inventive embodiments, when being provided the service of exclusive coding by font server dealer,
Server can make a special font file, a kind of shelves being loaded with ciphertext transitional information
Case, and this special font file is placed on original work platform in the way of web page character type, and with comprise
The webpage of this article is made to link so that the part comprising an article in webpage can apply mechanically this special word
Type.Specifically, the font file that system provides encodes via individualized coding rule equally, produces
New character code and the corresponding relation of font so that although article content is the " unrest after being personalized coding
Code ", but this " mess code " can return, by special font file correspondence, the font that originally should show.
[embodiment framework one]
One of related system framework is referred to the protection of the network article of the present invention shown in Fig. 2
The embodiment schematic diagram of system.
Figure showing, network article protection system can be implemented in an offer network font service
In font server 26, be also not excluded for can with the server of another this font server 26 of arranging in pairs or groups reality
Execute, the most still referred to as one system being implemented in font server 26.
Content platform 22 such as one provides what article delivered to service dealer, have offer blogger, forum,
The servosystem of the website service such as community website, separately has font server 26, the most mainly includes
Font data storehouse.Under this framework, font server 26 provides an interface, and author 20 can be allowed first will
Article is transferred to font server 26, completes article and delivers (201), afterwards, and font server 26
Perform succession of steps (as article resolves, forms ciphertext etc. with coding), produce exclusive this article
Coding rule, one of embodiment is a kind of character code conversion table, and in article described in it, the character code of font turns
Change information, can thereby change article into ciphertext.
Then, font server 26 passes through the ciphertext (203) of conversion to content platform 22, close
Literary composition can include the information linking font server 26.Afterwards by the open article of content platform 22.When having
When reader 24 obtains web documents (205) by content platform 22, as deposited by web browser
Taking article content, web browser will actively be linked to font according to wherein font server 26 information
Server 26, and transmit web documents (207) to font server 26, the content now transmitted is
Ciphertext, is obtained, by font server 26 judgement, the exclusive character code conversion table that this article is corresponding, then returns
The ciphertext font file formed through this character code translation table ciphertext is to reader 24 end web browser
(209).According to embodiment, this ciphertext font file describes the right of character code and font in related article
According to table, the character code in font subset can be chained up by these synopsis with font, at this by ciphertext word
Type file returns to reader 24.
Wherein, font server 26 can possess user's administrative mechanism, can through the reader 24 authorized
From font server 26 legal acquirement character code conversion table, web browser can be made to be turned by character code
Changing table and correctly show article, therefore reader 24 is it can be seen that correct content.Otherwise, when this article
By the content reprinted without permission, will be unable to by authentication, also cannot be from font server
26 obtain and transferred the character code conversion table of ciphertext originally to so that it is close that this article appears to understand
Literary composition.Thereby can reach the purpose of copyright protection.
Then framework one embodiment of the network article guard method of the present invention shown in Fig. 3 is referred to
Flow process.
In this flow embodiment, start such as step S301, relevant by font server or offer
The servosystem of service provides a user interface, can be received from author and reach the standard grade transmitted article, as
Step S303.Then, this type of servosystem obtains font situation in article by resolving article content,
And corresponding can produce personalized character code conversion table, such as step S305, character code conversion table can be one
Newly generated character code conversion table, character code described in it compares information with font.
Afterwards, font server passes through software approach, (the step with character code translation table article as ciphertext
Rapid S307), the ciphertext that this converted original text chapter is formed is transferred on content platform (step S309).
Content platform system provides the service reading this article.
The process forming character code conversion table in upper example refers to flow process shown in Fig. 4.
When system receives author's article (step S401), it is usually and is submitted to system in clear text manner
(such as font server), system will resolve article (step S403), main purpose with software approach
It is to obtain the font that article is used, gets rid of reusable word, form font subset (step
S405), this step is referred to as font subset acquisition (font subsetting), it is therefore an objective to because eliminating weight
Answer word or symbol and reduce font file, more reduce internal memory and use, speed up processing, literary composition can be promoted
Chapter reading experience.
Can produce exclusive to the font subset of this article plus kind of a value (seed) with special algorithm afterwards
Character code conversion table (step S407), algorithm such as can be by general font character code according to specific mathematical side
Formula arranges, as random number arrange, maybe can be simultaneously introduced timestamp (timestamp) or its
He can form the factor of unique kind value, calculates out one group of new font and character code deck watch every time.Can
With reference to Fig. 8 institute demonstration example, can perform with font server owing to forming the work of ciphertext, therefore character code
Conversion table can be a kind of to have the font file that new font character code is corresponding.Embodiment is separately had to drill
Calculate and produce new encryption and decryption key, as the foundation of ciphertext conversion.
Then, with obtain character code translation table article as ciphertext (step S409).It is worth mentioning
, when author revises article, because font subset originally may be changed, system is by Fig. 4 again
Step, calculates the character code conversion table made new advances again.
It is intended to read the article through ciphertext conversion, after font server authentication will be first passed through reader
Obtain and originally change the character code conversion table that this article is ciphertext, related embodiment refer to Fig. 5 shown
Framework embodiment flow process once.
Reader can pass through in particular reader (such as web browser, specific ocr software etc.) access
Hold platform, content platform is first sent the request of certain articles to be obtained.According to embodiment, work as reader
While obtaining web page contents with reader, the pattern that can achieve webpage in the lump sets, wherein sample
Font defined in formula comes from specific font server, therefore reader can send net to font server
Page font request.
When user ulilization reader obtains the article to be read to content platform, and this stage is ciphertext, then
Such as step S501, the active according to the font server info (such as URL) pointed by info web
Link font server, if desired, font server can perform an authentication program, it is to avoid quilt
Unauthorized person obtains the information of ciphertext conversion.After authentication, ciphertext can be passed by terminal automatically
Being handed to font server, font server receives terminal (reader that reader opens) and is delivered from content
The ciphertext that platform obtains, judges the character code conversion table of correspondence and the font relevant to this ciphertext simultaneously
Subset (step S503), produces the ciphertext font file after conversion, the most i.e. records character code and font
Synopsis, each character code in the font subset that will specify is chained up with font.Again via network
Or specific file, ciphertext font file is sent to by the reader of reader's end, through obtaining
Wherein after the font after conversion (step S505), in terminal reader, correctly show article (step
S507)。
Above, changed, through originally, the character code translation table that article is ciphertext owing to achieving from server
After ciphertext font file so that the reader in terms of reader can arrange in pairs or groups correspondence character code transitional information
Could correctly show article content.
Otherwise, because article have passed through ciphertext conversion process, as through recompiling process, therefore want
Read this article and have to use the character code conversion table of correspondence, can be exclusive font file (word
Shape the most again layout corresponding with character code), if causing reprinting person directly to replicate this article,
Only can obtain the mess code (ciphertext) failed to understand, and ensure the right of original author.
[embodiment framework two]
Then framework two embodiment being described under joint invention concept of the present invention, framework refers to Fig. 6
Shown enforcement illustration, in figure, same display provides the content platform 62 that web documents delivers service, separately
It is provided with the servosystem of article guard method of the present invention, is the most then the font server that provides of dealer
66。
In this example, author 60 directly can publish an article (601) by the interface of content platform 62 initial,
In content platform to be realized, article can provide the measure of copyright protection, content via present system
Platform 62 can implant a ciphertext service routine 620, and ciphertext service routine 620 can be font server
Dealer is provided, and can be to reside in the programmed instruction in content platform servo programe, in order to intercept with
Analyzing web page content, to obtain the article in web page contents, obtains, through intercepting, the literary composition that author 60 delivers
Zhang Shi, i.e. transmission web documents 603 to font server 66.
After font server 66 obtains article, the most in plain text, obtain according to article analysis result
Font subset, then form personalized character code conversion table, particularly obtain personalized coding rule.
Step performed by font server see the description of Fig. 4, resolves including article, obtains literary composition
The font subset of chapter, by the calculation process of random alignment after, character code conversion table can be obtained, and will
Article is converted to ciphertext.
Afterwards, font server 66 article (605) of conversion ciphertext is passed through to content platform
62, can process via ciphertext service routine 620 again, include validating that font server 66 connects with ciphertext
The program received, stores this part of ciphertext afterwards on content platform 62.
When reader 64 is intended to read this article on content platform 62, obtain network by reader
Article (607), reader will obtain the information (such as URL) of font server 66 from web page contents,
Reader then active link [HTML], to font server 66, to transmit web documents (609), is now close
Literary composition, then by font server 66 according to ciphertext information loaded obtain reduction article character code conversion table with
Corresponding font subset, finally transmits font subset and combines the ciphertext font file formed to reader's end
On reader (611).Wherein one being mentioned that, the character code conversion table formed in server end can't pass
Deliver to terminal reader, to guarantee that transformational rule will not arbitrarily be transferred, the ciphertext word transmitted if desired
Type file can transmit in the way of symmetric cryptography.Original text is correctly shown with ciphertext font file by reader
Chapter content, the most if desired, font server 66 will carry out a preliminary authentication to reader 64,
Just can transmit ciphertext font file.
The embodiment of the method for above framework two refers to the flow process shown in Fig. 7.
System can be implemented on font server, and such as step S701, system receives from content platform
The article that author is delivered, embodiment is the most above-mentioned, and content platform performs an interception and analyzing web page content
Ciphertext service routine, the article in web page contents can be obtained, then transmit article to font server.
Then the font subset that will first obtain in article in font server, and transport according to font subset
Calculate and form exclusive character code conversion table, such as step S703, then with this character code translation table article be
Ciphertext (step S705), wherein font is such as recompiled by conversion regime, if relevant character code is to read
The reader preset standard character code conversion of person's end compares, and becomes the ciphertext that cannot read, this part of ciphertext
By transmission ciphertext to content platform, such as step S707.The clothes reading this article are provided in content platform
Business.
According to above example content, in font server or the spy of offer article guard method of the present invention
Determining the ciphertext conversion regime obtained by servosystem is the character code conversion table that a real-time operation produces, real
Execute aspect and refer to the embodiment of the conversion of character code shown in Fig. 8.
Example shown in figure, if the service that author is provided by content platform interface or font server
In publish an article, wherein have an original character 801: " literary composition, ancient cooking vessel, word, type ", and these four words be former
Beginning character code 803 is respectively " 6587 (civilian), 9F0E (ancient cooking vessel), 5B57 (word), 578B (type) ".
Afterwards, resolve the article received through font server by utilizing software approach, to capture font in article
Subset (font subsetting), then real-time operation obtains character code conversion table accordingly.
Character code refer to word or symbol in the numbering defined in specific coding rule, general such as web browser
Deng reader use the conventional coding with standard, for the purpose of article of the present invention to be reached protection,
This example lies in font server and produces new character code conversion table according to the font subset captured in article, as
This example turns rear character code 805: " 7DB2,9808,78BC, 898F ", and namely the character code of this example turns
Changing the character code of " civilian " described in table is " 7DB2 ", and the character code of " ancient cooking vessel " is " 9808 ", " word "
Character code is " 78BC ", and the character code of " type " is " 898F ".
But because new character code not corresponds to " literary composition, ancient cooking vessel, word, type " in general standard encodes,
Therefore when the article that reader's acquirement is changed with the character code conversion table of this example, will with general standard coding
Correct article cannot be obtained, and display word 807 can be presented under standard code environment: " net,
Palpus, code, rule ", this is formed for ciphertext, and independent of the meaning originally so that not through mandate
The reader that cannot obtain aforementioned character code conversion table cannot correctly show original text.Thereby, the present invention can shut out
Exhausted unwarranted reprinting or usurp behavior, reaches the purpose of article protection.
Relatively, if reading article is the reader through authentication, can obtain through font server
Corresponding character code conversion table, in order to change ciphertext so that correct display article originally.Fig. 9 enters one
Step schematically illustrates the example of character code conversion.
According to this example, reader obtains what related article was changed through ciphertext by reader from content platform
It is encoded to " 7DB2,9808,78BC, 898F ", figure showing, the general character code of these character codes shows
90 is " net (7DB2), palpus (9808), code (78BC), rule (898F) ".Afterwards by font
Server 92 obtains the character code conversion table of correspondence, and can correctly show content at the reader of reader's end,
So example according to exclusive 94 transcodings of character code conversion table show " civilian (7DB2), ancient cooking vessel (9808),
Word (78BC), type (898F) ".
Figure 10 show the related system function side realizing the present invention network article guard method
Block embodiment.
Wherein showing the font server 100 realizing present system, one end has linked content platform
11, article and ciphertext can be transmitted, one end provides author 13 directly to deliver at font server 100
Article, the other end is then to receive the web page contents that reader 15 is transmitted, word simultaneously when reading articles
Type server 100 also can directly transmit ciphertext font file to reader 15.
The network article protection system realized by font server 100 is mainly had with software
Mode with coordinate computer hard-wired function means, font server 100 is one to have at data
The servosystem of the functions such as reason, ability to communicate and webpage servo, related software modules such as has article and takes
Module 111, this be the software approach of acquirement article, including can be by content platform 11 through network system
Or other pipelines obtain the article delivered by author 13 at this platform, or can take directly from author 13
Obtain article.
Font server 100 has article parsing module 112, and this is the software approach resolving article,
Resolve means with this article and resolve word in article, to obtain the font subset in article, this part work
Work can reduce font file size, and reduces word processing burden.
Font server 100 has a character code conversion table generation module 113, this be according to article with/
Or the computing of font subset institute obtains the software approach of character code conversion table, according to embodiments of the present invention, except this
Outside character code conversion table, can be maybe other conversion means.
Font server 100 has ciphertext generation module 114, and this is to produce ciphertext with character code conversion table
Software approach, the ciphertext such as produced according to newly generated character code conversion article.
Font server 100 has character code conversion table data base 115, character code conversion table data base 115
In order to store character code conversion table, all literary compositions of all online employings article of the present invention guard method will be recorded
All character code conversion tables that chapter is corresponding.
Font server 100 has user management module 116, and this can be that management user (includes making
Person and reader) software approach, may be used to verify the identity of author and reader, be also not excluded for managing
Reason uses the website identity of article guard method of the present invention, logs in this high in the clouds font server 100
Website, could obtain corresponding character code conversion table and relevant font, article of the present invention could be used to protect
Method.
Font server 100 is provided with font data storehouse 117, and this is the data base of font in offer article,
The font subset formed through font subset capturing program can also be stored.
Font server 100 is more for a ciphertext font file generation module 118.When system is (such as word
Type server 100) when receiving the ciphertext that a terminal obtains from content platform, can be according to the letter in ciphertext
Breath judges the character code conversion table of this ciphertext corresponding, and the font subset of ciphertext, then ciphertext font
File generation module 118 produces records character code and the ciphertext font file of font synopsis, warp in article
After specific transmission method is sent to reader, the ciphertext of reading can be converted to correct article content.
Therefore the technology contained according to the invention discloses book, when reader obtains in terminal webpage browser
While webpage, being set by the pattern achieving webpage in the lump, including font, therefore browser can be to word
Type server sends web page character type request.Now, font server, can be by after checked mandate
The exclusive ciphertext font file previously made sends the reader of legal reading article to, it is possible to correctly show
This article.Under such an approach, because article can have passed through recompiles process, this literary composition to be read
Chapter have to use the ciphertext font file of this article, if not authorizing via font server
Download exclusive ciphertext font file, the ciphertext failed to understand causing reprinting person to have to, therefore ensure
The right of original author.
The foregoing is only the preferred possible embodiments of the present invention, all according to scope of the present invention patent institute
Equalization change and the modification done, all should belong to the covering scope of the present invention.
[symbol description]
Author 10 publishes an article 101
Content platform 12 read web article 103
Reader 14 transmits web page contents 105
Obtain font file 107 font server 16
Author 20 content platform 22
Reader 24 font server 26
Publish an article 201 pass through conversion ciphertext article 203
Obtain web documents 205 and transmit web documents 207
Obtain ciphertext font file 209
Author 60 content platform 62
Ciphertext service routine 620 reader 64
Font server 66 publishes an article 601
Transmission web documents 603 passes through the article 605 of conversion ciphertext
Obtain web documents 607 and transmit web documents 609
Obtain ciphertext font file 611
The original character code of original character 801 803
After turning, character code 805 shows word 807
General character code shows 90 font servers 92
Ciphertext conversion table 94
Content platform 11 author 13
Reader 15 font server 100
Article obtains module 111 article parsing module 112
Character code conversion table generation module 113 ciphertext generation module 114
Character code conversion table data base 115 user management module 116
Font data storehouse 117 ciphertext font file generation module 118
Step S301~S309 article protection flow process
Step S401~S409 article protection flow process
Step S501~S507 article protection flow process
Step S701~S707 article protection flow process
Claims (10)
1. a network article guard method, it is characterised in that described method includes:
There is provided yi word pattern server, in order to receive an article;
In this font server, described article is produced a character code conversion table;
In this font server, with this character code conversion table, described article is converted to a ciphertext;
And
Transmitting described ciphertext to a content platform, wherein said content platform is to provide reading should
The service of article.
Network article guard method the most according to claim 1, wherein, described font
Server initial provides an author to transmit an interface of described article.
Network article guard method the most according to claim 1, wherein, by an author
The interface provided by described content platform delivers described article, then is passed by described content platform
Pass described article to described font server.
Network article guard method the most according to claim 3, wherein, described content
Platform performs a ciphertext service routine, in order to intercept and analyzing web page content, to obtain webpage
Described article in content, then transmit described article to described font server.
Network article guard method the most according to any one of claim 1 to 4, its
In, when user ulilization one reader obtains described ciphertext to described content platform, automatically will
Described ciphertext is transferred to described font server, described font server obtain corresponding warp
Cross the character code conversion table of conversion, form a ciphertext font file, then by described ciphertext font literary composition
Part is transferred to described reader.
Network article guard method the most according to claim 5, wherein, at described word
In type server, real-time operation produces described character code conversion table, and described character code conversion table aims at
Described article is converted to described ciphertext, and described font server obtains described close from this reader
Wen Shi, produces the correct ciphertext font file showing described article according to described character code conversion table.
Network article guard method the most according to claim 6, wherein, described font
Server produces described character code conversion table and includes with the step forming described ciphertext:
In this font server, resolve the described article received, to obtain in described article
Font subset;And
Obtain this character code conversion table according to font subset in described article, then turn with described character code
Change table and described article is converted to described ciphertext.
8. a network article protection system, it is characterised in that described system includes:
One article obtains means, in order to obtain an article;
One article resolves means, in order to resolve described article to obtain the word in described article
Type subset;
One character code conversion table produces means, produces a character code conversion table for described article;
One ciphertext produces means, with this character code conversion table, described article is converted to a ciphertext;
One character code conversion table data base, in order to store described character code conversion table;
Yi word pattern data base, in order to provide font in described article, and forms described font
The data base of subset;And
One ciphertext font file generation module, in order to produce character code and word in the described article of record
The ciphertext font file of the synopsis of shape;
Wherein, when receiving a terminal from this ciphertext that a content platform obtains, it is judged that right
Answer the described character code conversion table of described ciphertext and described font subset, by described ciphertext word
Type file generation module produces the institute recording the relevant character code of described article with the synopsis of font
State ciphertext font file, more described ciphertext font file is sent to described terminal.
Network article the most according to claim 8 protection system, wherein, described article
From acquired by a content platform, described content platform is to provide publishes an article and provides reading
The service of article;Or described article is from acquired by the interface of font server institute initial.
The most according to claim 8 or claim 9, network article protection system, farther include
One user's management means, in order to verify the identity of author and reader.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510259722.3A CN106302326A (en) | 2015-05-20 | 2015-05-20 | Network article guard method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510259722.3A CN106302326A (en) | 2015-05-20 | 2015-05-20 | Network article guard method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106302326A true CN106302326A (en) | 2017-01-04 |
Family
ID=57634207
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510259722.3A Pending CN106302326A (en) | 2015-05-20 | 2015-05-20 | Network article guard method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106302326A (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101819645A (en) * | 2009-01-26 | 2010-09-01 | 施乐公司 | The recognition engine that is used for pattern fonts based on the font input |
CN102662920A (en) * | 2012-03-15 | 2012-09-12 | 齐凡 | Method and system for transmitting text |
US20120260108A1 (en) * | 2011-04-11 | 2012-10-11 | Steve Lee | Font encryption and decryption system and method |
CN104618390A (en) * | 2015-02-17 | 2015-05-13 | 北京趣拿信息技术有限公司 | Website data feedback method, display method and system and processing system |
-
2015
- 2015-05-20 CN CN201510259722.3A patent/CN106302326A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101819645A (en) * | 2009-01-26 | 2010-09-01 | 施乐公司 | The recognition engine that is used for pattern fonts based on the font input |
US20120260108A1 (en) * | 2011-04-11 | 2012-10-11 | Steve Lee | Font encryption and decryption system and method |
CN102662920A (en) * | 2012-03-15 | 2012-09-12 | 齐凡 | Method and system for transmitting text |
CN104618390A (en) * | 2015-02-17 | 2015-05-13 | 北京趣拿信息技术有限公司 | Website data feedback method, display method and system and processing system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112292682B (en) | Decentralized document and entity verification engine | |
CN110598376B (en) | Copyright authentication method, device and equipment based on block chain and storage medium | |
EP3394779B1 (en) | Methods and systems for identity creation, verification and management | |
CN106295388B (en) | A kind of data desensitization method and device | |
CN108134791A (en) | A kind of data center's total management system login validation method | |
CN105261105B (en) | Safety door inhibition method | |
CN105893829A (en) | Image-based key exchange | |
CN107066844A (en) | A kind of method and apparatus of paper document security management and control and tracing | |
KR20190038938A (en) | SYSTEM, METHOD, AND SERVER COMPUTER SYSTEM FOR IMPLEMENTING CONVERTING ONE entity in a heterogeneous communication network environment to a verifiably authenticated entity | |
KR102321608B1 (en) | First copyright holder authentication system using blockchain and its method | |
Hossain et al. | Improving cloud data security through hybrid verification technique based on biometrics and encryption system | |
CN111241555A (en) | Access method and device for simulating user login, computer equipment and storage medium | |
US20130191641A1 (en) | Captcha (completely automated public test to tell computers and humans apart) data generation methods and related data management systems and computer program products thereof | |
CN115795415A (en) | Digital cultural relic evidence and infringement tracing method and system based on block chain digital watermarking | |
CN101741561A (en) | Method and system for authenticating two-way hardware | |
CN109684802A (en) | A kind of method and system providing a user artificial intelligence platform | |
CN103390121A (en) | Digital work ownership authentication method and digital work ownership authentication system | |
CN102222195A (en) | E-book reading method and system | |
CN117708043A (en) | Electronic file establishment method and system based on blockchain technology | |
CN105117920A (en) | Anti-counterfeiting method and apparatus for picture electronic certificates | |
CN106302326A (en) | Network article guard method and system | |
CN110472423A (en) | A kind of nuclear power station file permission management method, device and equipment | |
KR20200004666A (en) | Biometric information authentication system using machine learning and block chain and its method | |
CN107920053A (en) | Managing device and method based on Internet of Things | |
WO2021205392A1 (en) | Computer-implemented method and system for the automated learning management |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20170104 |
|
WD01 | Invention patent application deemed withdrawn after publication |