CN106302326A - Network article guard method and system - Google Patents

Network article guard method and system Download PDF

Info

Publication number
CN106302326A
CN106302326A CN201510259722.3A CN201510259722A CN106302326A CN 106302326 A CN106302326 A CN 106302326A CN 201510259722 A CN201510259722 A CN 201510259722A CN 106302326 A CN106302326 A CN 106302326A
Authority
CN
China
Prior art keywords
article
font
ciphertext
character code
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510259722.3A
Other languages
Chinese (zh)
Inventor
庄智涵
林佑儒
吴福生
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wending Science & Tech Development Co Ltd
Arphic Tech Co Ltd
Original Assignee
Wending Science & Tech Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wending Science & Tech Development Co Ltd filed Critical Wending Science & Tech Development Co Ltd
Priority to CN201510259722.3A priority Critical patent/CN106302326A/en
Publication of CN106302326A publication Critical patent/CN106302326A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/067Network architectures or network communication protocols for network security for supporting key management in a packet data network using one-time keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Information Transfer Between Computers (AREA)
  • Document Processing Apparatus (AREA)

Abstract

The present invention relates to network article guard method and system, and run the computer network system of the method.In this method, yi word pattern server is provided, the article that author is transmitted can be directly received, or receive the article that author is delivered at a content platform, then article parsing is obtained font subset, and produce a ciphertext character code conversion table, article is transferred to a ciphertext, again ciphertext is transferred to content platform, content platform provides this article of readers ' reading.Particularly, when reader is intended to obtain this article directly from content platform, obtain is the ciphertext failed to understand through transcoding, but the ciphertext font file after providing character code conversion via font server can show correct article content.Thereby offer one is for the copyright protection mechanism of web documents.

Description

Network article guard method and system
Technical field
The present invention is about a kind of network article guard method and system, particularly a kind of by clothes The method of business device end transcoding technology protection web documents copyright and correlation computer network system.
Background technology
Because network has quickly transmission, searches the platform identity used with the public easily, common people can Delivering works with word, audio-visual mode easily, wherein video content copyright easily determines, but civilian Word but has the problem replicating easily and being difficult to differentiate, prevailing network platform majority lacks effective copyright pipe Reason mechanism.
Though digital content has advantage, but still has easily by massive duplication and the shortcoming of quickly transmission, although Promote the exchange of information, also allow the exchange of information excessively spread unchecked so that ensure digital content copyright Work be challenged.As long as owing to having correct encoder and decoder, any user all may be used To transmit and to understand digital content, the mandate of the specification digital content that causes having no idea, also cannot sound The copyright of bright digital content.
The medium that digital content is all transmitted using the coded system that public affairs are fixed as data at present.But, compare In the most flourishing digital audio-video copyright management technique, numeral article lacks one can be effective State the technology of its copyright so that numeral article is easily by unauthorized reprinting.
It is said that in general, originally webpage article is probably segmented into following several rank from being posted to read Section, including: the article write is uploaded on its original work platform specified by original author, if with net As a example by network platform, reader can be allowed to browse article by web browser, after opening web browser, journey Sequence will send web-page requests to original work platform, acquirement web page contents.
In the processing procedure of web browser, the standard that the file obtained sets according to webpage can be compiled Code rule, sets (such as CSS) by font file according to character code and the pattern in webpage of each word Corresponding font takes out, and sequentially shows on screen.
Owing to article not encrypted is processed by general networking platform, as long as any reader is by browser Webpage article replicates, and just can recycle easily.And these recyclings are probably not obtain former The mode that author authorizes is carried out, and the most again uploads, revises or arbitrarily reprint other transfer platform On, can allow the content that other ignorant readers ' readings are reprinted, so may produce copyright disputes.
Existing subnetwork platform provides the mode preventing replicating to include: utilize webpage embedded description language Say (script language) or reader cannot be replicated by conventional method for server end web page program Webpage word, forbids directly being posted article;Or require specific reading is installed in user end computer Software, is typically common in e-book.
The general running of font server refers to the dealer of font server shown in Fig. 1 provides font service System architecture diagram.
Under this framework, general content platform provides the service that web documents is delivered, uploaded etc., such as Author 10 is provided to be published an article the blogger (blog) of (101), forum, community website by network, Or other provide the website etc. of the service of publishing an article, this example represents with content platform 12, typically interior With (plain text) in plain text or standard code mode stores article to hold platform 12, therefore can be direct There is provided reader 14 by network reading web documents (103).If article uses font server (font Server) 16 fonts provided and the design of pattern, when reader 14 reads article, can be according to net Page sets and is linked to font server 16, transmits web page contents (105) simultaneously and arrives font server 16, Content includes entire chapter or part webpage article.Afterwards, font server 16 can provide font file (107) giving reader 14 reader (such as web browser) used, reader can be according to institute Defined in the font file obtained, font shows article with pattern.
In system above framework, article is all to carry out turning with the coded system that public affairs are fixed from being posted to read Change and transmit, therefore, as long as original work platform reader can receive correct character code data, just can conduct Reprinting person uploads to transfer platform again by same method.
Summary of the invention
Because the known effectively protection web documents that lacks prevents the technology of bootlegging, the invention discloses Book proposes a kind of network article guard method and the system realizing the method, in such a system, Having the font server of an offer web documents font subset, the present invention is i.e. by this font server A kind of copyright protection method of web documents is provided.
According to one of method embodiment, receiving article by this font server, author can pass through One content platform is published an article, then by content platform, article is delivered to this font server and performs ciphertext Conversion;Or, font server itself provides the interface that author can publish an article, thus directly takes Obtain article and carry out ciphertext conversion.
Then, in this font server, generation one character code conversion table real-time to article, character code is changed Table is the unique transition key for this article, and other articles inapplicable.Then, with this character code Translation table article is a ciphertext, then transmits ciphertext to content platform, content platform provide and read The service of article.
When reader is intended to by reader to content platform reading articles, service without by font Device utilizes the aforementioned ciphertext of character code translation table, i.e. cannot obtain the ciphertext font file after conversion, then Can only see the nonsensical ciphertext through conversion, therefore to read article originally, need font to take Business device is agreed to perform conversion, the method thereby providing web documents copyright protection.
Wherein, the action producing ciphertext conversion shelves at font server includes the article that first parsing obtains, With font subset in acquirement article, thereby reduce font file, improve treatment efficiency, more real-time Computing obtains character code conversion table, then with this character code translation table article as ciphertext.
Relevant network article protection system can a computer system realize, wherein with software hands Duan Shixian obtains article, resolves article, generation character code conversion table, ciphertext generation, and store character code The data base of conversion table and font data storehouse.
System can be realized by font server, more can include a user management means, in order to verify work Person and the identity of reader.
In order to be able to be further understood that technology, method and the merit that the present invention is taked by reaching set purpose Effect, refers to the detailed description below in connection with the present invention, graphic, it is believed that the purpose of the present invention, feature With feature, when can thus be goed deep into and concrete understanding, but institute's accompanying drawings and adnexa only provide ginseng Examine and use is described, being not used for the present invention person of being any limitation as.
Accompanying drawing explanation
Fig. 1 describes the system architecture diagram that general font server dealer provides font to service;
Fig. 2 show the system architecture one embodiment signal of the present invention network article protection system Figure;
Fig. 3 show the present invention network article guard method framework one embodiment flow process it One;
Fig. 4 show the present invention network article guard method framework one embodiment flow process it Two;
Fig. 5 show the present invention network article guard method framework one embodiment flow process it Three;
Fig. 6 show the system architecture two embodiment signal of the present invention network article protection system Figure;
Fig. 7 show the framework two embodiment flow process of the present invention network article guard method;
Fig. 8 show the embodiment of character code conversion in the present invention network article guard method;
Fig. 9 show the embodiment of character code conversion table in the present invention network article guard method;
Figure 10 show the function block embodiment of the present invention network article protection system.
Detailed description of the invention
According to the embodiment of the network article guard method described by this exposure book Yu system, its In in order to effective protection works copyright, prevent web documents from being reprinted without permission or capturing Wherein content, the article guard method provided by yi word pattern server, web documents is performed close Literary composition conversion.It is as a copyright by font server using one of article mode being converted to ciphertext Keyholed back plate role, can set up a character code conversion table according to acquired article, when readers' needs is read During article, need to obtain the ciphertext font file after conversion by link font server, could read To correct article, otherwise fail to obtain the ciphertext font after changing in unwarranted situation civilian Part, therefore can only see the content of mistake transcoding.
Web documents can refer to author and be published in the article of particular network platform, be such as published in website, Digital content on blogger, community website, or various discussion platform, particularly word.When having When reader to watch this kind of article, typically can be obtained by the reader link network of relation platform of terminal Article, including the pattern archives (such as HTML markup, CSS style etc.) of decision article layout form, Being downloaded to reader in the lump open, reader can be web browser or specific ocr software, passes through Explain this kind of pattern archives and font encoding, i.e. correctly present article content according to coding rule.
When user is by reader viewing web documents, wherein by word in font file definition article Type style, the major function of font file is that the numerous fonts belonging to same style are stored in one Or in several archives, in order to user adjusts its word vision effect wanting to present.But, remove Beyond the substantial amounts of font of storage, inside font file, also store the right of a series of character code and font According to table, each character code in the character set that these synopsis can will be specified is chained up with font.Cause This, when read web article, call font from the font file specified according to character code, and depend on Sequence shows on picture, makes reader be understood the content of article.
The general running of font server refers to the description of Fig. 1, and under this framework, general content is put down Platform there is no provides the behavior that effectively can stop bootlegging, reprinting etc..But, when in wherein article When using the service of the font that provided of font server and pattern, one of embodiment of the present invention is i.e. passed through Font server implementation one network article protection system, is carried for every article by this system For the ciphertext conversion shelves of its uniqueness, thereby realize a kind of copyright protection method.
Technology according to the network article guard method that the invention discloses described by book Yu system One of purpose, system can provide for each original author or original text chapter and be specific to this original author or former The coding rule of article, by this coding rule, can send original work again to and read after being encoded by article content Person, therefore original work reader can receive the article content after coding, reaches protection by exclusive coding rule The purpose of article.Further, if this coding rule have passed through a certain degree of encryption, In the case of not knowing about coding rule, reprinting person will be unable to the article content before being encoded;If reprinting Person wants the article content received is replicated or revised, and can only obtain the ciphertext after coding.Furthermore, When forming exclusive font file, font file is equivalent to the signature of this author, if simultaneously Author can be embedded in font file and authorize claim information, or utilize blank code to add the version of image-type Power statement, then can increase the effect of infringement identification, such as, when exclusive font file is stolen, but Wherein copyright mark can assist to pick out copyright owner for whom, can process piracy in law mode and ask Topic.
On the other hand, though original work reader can obtain original text chapter according to correct coding rule, if original work Article content after coding is replicated by reader, and the font file using general standard to encode shows, Each character code still sequentially can be corresponded to each font by font file.But, because the article content received Being to have used aforementioned exclusive individualized coding to weave into ciphertext, the part of ciphertext is nonsensical unrest Code, during display, the font arrangement that character code corresponds to also is not seen in all senses, refers to shown in Fig. 8 Character code correspondence font example, even if causing the content after original work reader's replica code, also cannot read.
Technology above by the exclusive coding rule providing each original author's article can be carried by one Dealer for the service of font storehouse provides, and can pass through font server, or specific servosystem provides individual Peopleization encoding service.
According to one of inventive embodiments, when being provided the service of exclusive coding by font server dealer, Server can make a special font file, a kind of shelves being loaded with ciphertext transitional information Case, and this special font file is placed on original work platform in the way of web page character type, and with comprise The webpage of this article is made to link so that the part comprising an article in webpage can apply mechanically this special word Type.Specifically, the font file that system provides encodes via individualized coding rule equally, produces New character code and the corresponding relation of font so that although article content is the " unrest after being personalized coding Code ", but this " mess code " can return, by special font file correspondence, the font that originally should show.
[embodiment framework one]
One of related system framework is referred to the protection of the network article of the present invention shown in Fig. 2 The embodiment schematic diagram of system.
Figure showing, network article protection system can be implemented in an offer network font service In font server 26, be also not excluded for can with the server of another this font server 26 of arranging in pairs or groups reality Execute, the most still referred to as one system being implemented in font server 26.
Content platform 22 such as one provides what article delivered to service dealer, have offer blogger, forum, The servosystem of the website service such as community website, separately has font server 26, the most mainly includes Font data storehouse.Under this framework, font server 26 provides an interface, and author 20 can be allowed first will Article is transferred to font server 26, completes article and delivers (201), afterwards, and font server 26 Perform succession of steps (as article resolves, forms ciphertext etc. with coding), produce exclusive this article Coding rule, one of embodiment is a kind of character code conversion table, and in article described in it, the character code of font turns Change information, can thereby change article into ciphertext.
Then, font server 26 passes through the ciphertext (203) of conversion to content platform 22, close Literary composition can include the information linking font server 26.Afterwards by the open article of content platform 22.When having When reader 24 obtains web documents (205) by content platform 22, as deposited by web browser Taking article content, web browser will actively be linked to font according to wherein font server 26 information Server 26, and transmit web documents (207) to font server 26, the content now transmitted is Ciphertext, is obtained, by font server 26 judgement, the exclusive character code conversion table that this article is corresponding, then returns The ciphertext font file formed through this character code translation table ciphertext is to reader 24 end web browser (209).According to embodiment, this ciphertext font file describes the right of character code and font in related article According to table, the character code in font subset can be chained up by these synopsis with font, at this by ciphertext word Type file returns to reader 24.
Wherein, font server 26 can possess user's administrative mechanism, can through the reader 24 authorized From font server 26 legal acquirement character code conversion table, web browser can be made to be turned by character code Changing table and correctly show article, therefore reader 24 is it can be seen that correct content.Otherwise, when this article By the content reprinted without permission, will be unable to by authentication, also cannot be from font server 26 obtain and transferred the character code conversion table of ciphertext originally to so that it is close that this article appears to understand Literary composition.Thereby can reach the purpose of copyright protection.
Then framework one embodiment of the network article guard method of the present invention shown in Fig. 3 is referred to Flow process.
In this flow embodiment, start such as step S301, relevant by font server or offer The servosystem of service provides a user interface, can be received from author and reach the standard grade transmitted article, as Step S303.Then, this type of servosystem obtains font situation in article by resolving article content, And corresponding can produce personalized character code conversion table, such as step S305, character code conversion table can be one Newly generated character code conversion table, character code described in it compares information with font.
Afterwards, font server passes through software approach, (the step with character code translation table article as ciphertext Rapid S307), the ciphertext that this converted original text chapter is formed is transferred on content platform (step S309). Content platform system provides the service reading this article.
The process forming character code conversion table in upper example refers to flow process shown in Fig. 4.
When system receives author's article (step S401), it is usually and is submitted to system in clear text manner (such as font server), system will resolve article (step S403), main purpose with software approach It is to obtain the font that article is used, gets rid of reusable word, form font subset (step S405), this step is referred to as font subset acquisition (font subsetting), it is therefore an objective to because eliminating weight Answer word or symbol and reduce font file, more reduce internal memory and use, speed up processing, literary composition can be promoted Chapter reading experience.
Can produce exclusive to the font subset of this article plus kind of a value (seed) with special algorithm afterwards Character code conversion table (step S407), algorithm such as can be by general font character code according to specific mathematical side Formula arranges, as random number arrange, maybe can be simultaneously introduced timestamp (timestamp) or its He can form the factor of unique kind value, calculates out one group of new font and character code deck watch every time.Can With reference to Fig. 8 institute demonstration example, can perform with font server owing to forming the work of ciphertext, therefore character code Conversion table can be a kind of to have the font file that new font character code is corresponding.Embodiment is separately had to drill Calculate and produce new encryption and decryption key, as the foundation of ciphertext conversion.
Then, with obtain character code translation table article as ciphertext (step S409).It is worth mentioning , when author revises article, because font subset originally may be changed, system is by Fig. 4 again Step, calculates the character code conversion table made new advances again.
It is intended to read the article through ciphertext conversion, after font server authentication will be first passed through reader Obtain and originally change the character code conversion table that this article is ciphertext, related embodiment refer to Fig. 5 shown Framework embodiment flow process once.
Reader can pass through in particular reader (such as web browser, specific ocr software etc.) access Hold platform, content platform is first sent the request of certain articles to be obtained.According to embodiment, work as reader While obtaining web page contents with reader, the pattern that can achieve webpage in the lump sets, wherein sample Font defined in formula comes from specific font server, therefore reader can send net to font server Page font request.
When user ulilization reader obtains the article to be read to content platform, and this stage is ciphertext, then Such as step S501, the active according to the font server info (such as URL) pointed by info web Link font server, if desired, font server can perform an authentication program, it is to avoid quilt Unauthorized person obtains the information of ciphertext conversion.After authentication, ciphertext can be passed by terminal automatically Being handed to font server, font server receives terminal (reader that reader opens) and is delivered from content The ciphertext that platform obtains, judges the character code conversion table of correspondence and the font relevant to this ciphertext simultaneously Subset (step S503), produces the ciphertext font file after conversion, the most i.e. records character code and font Synopsis, each character code in the font subset that will specify is chained up with font.Again via network Or specific file, ciphertext font file is sent to by the reader of reader's end, through obtaining Wherein after the font after conversion (step S505), in terminal reader, correctly show article (step S507)。
Above, changed, through originally, the character code translation table that article is ciphertext owing to achieving from server After ciphertext font file so that the reader in terms of reader can arrange in pairs or groups correspondence character code transitional information Could correctly show article content.
Otherwise, because article have passed through ciphertext conversion process, as through recompiling process, therefore want Read this article and have to use the character code conversion table of correspondence, can be exclusive font file (word Shape the most again layout corresponding with character code), if causing reprinting person directly to replicate this article, Only can obtain the mess code (ciphertext) failed to understand, and ensure the right of original author.
[embodiment framework two]
Then framework two embodiment being described under joint invention concept of the present invention, framework refers to Fig. 6 Shown enforcement illustration, in figure, same display provides the content platform 62 that web documents delivers service, separately It is provided with the servosystem of article guard method of the present invention, is the most then the font server that provides of dealer 66。
In this example, author 60 directly can publish an article (601) by the interface of content platform 62 initial, In content platform to be realized, article can provide the measure of copyright protection, content via present system Platform 62 can implant a ciphertext service routine 620, and ciphertext service routine 620 can be font server Dealer is provided, and can be to reside in the programmed instruction in content platform servo programe, in order to intercept with Analyzing web page content, to obtain the article in web page contents, obtains, through intercepting, the literary composition that author 60 delivers Zhang Shi, i.e. transmission web documents 603 to font server 66.
After font server 66 obtains article, the most in plain text, obtain according to article analysis result Font subset, then form personalized character code conversion table, particularly obtain personalized coding rule.
Step performed by font server see the description of Fig. 4, resolves including article, obtains literary composition The font subset of chapter, by the calculation process of random alignment after, character code conversion table can be obtained, and will Article is converted to ciphertext.
Afterwards, font server 66 article (605) of conversion ciphertext is passed through to content platform 62, can process via ciphertext service routine 620 again, include validating that font server 66 connects with ciphertext The program received, stores this part of ciphertext afterwards on content platform 62.
When reader 64 is intended to read this article on content platform 62, obtain network by reader Article (607), reader will obtain the information (such as URL) of font server 66 from web page contents, Reader then active link [HTML], to font server 66, to transmit web documents (609), is now close Literary composition, then by font server 66 according to ciphertext information loaded obtain reduction article character code conversion table with Corresponding font subset, finally transmits font subset and combines the ciphertext font file formed to reader's end On reader (611).Wherein one being mentioned that, the character code conversion table formed in server end can't pass Deliver to terminal reader, to guarantee that transformational rule will not arbitrarily be transferred, the ciphertext word transmitted if desired Type file can transmit in the way of symmetric cryptography.Original text is correctly shown with ciphertext font file by reader Chapter content, the most if desired, font server 66 will carry out a preliminary authentication to reader 64, Just can transmit ciphertext font file.
The embodiment of the method for above framework two refers to the flow process shown in Fig. 7.
System can be implemented on font server, and such as step S701, system receives from content platform The article that author is delivered, embodiment is the most above-mentioned, and content platform performs an interception and analyzing web page content Ciphertext service routine, the article in web page contents can be obtained, then transmit article to font server.
Then the font subset that will first obtain in article in font server, and transport according to font subset Calculate and form exclusive character code conversion table, such as step S703, then with this character code translation table article be Ciphertext (step S705), wherein font is such as recompiled by conversion regime, if relevant character code is to read The reader preset standard character code conversion of person's end compares, and becomes the ciphertext that cannot read, this part of ciphertext By transmission ciphertext to content platform, such as step S707.The clothes reading this article are provided in content platform Business.
According to above example content, in font server or the spy of offer article guard method of the present invention Determining the ciphertext conversion regime obtained by servosystem is the character code conversion table that a real-time operation produces, real Execute aspect and refer to the embodiment of the conversion of character code shown in Fig. 8.
Example shown in figure, if the service that author is provided by content platform interface or font server In publish an article, wherein have an original character 801: " literary composition, ancient cooking vessel, word, type ", and these four words be former Beginning character code 803 is respectively " 6587 (civilian), 9F0E (ancient cooking vessel), 5B57 (word), 578B (type) ". Afterwards, resolve the article received through font server by utilizing software approach, to capture font in article Subset (font subsetting), then real-time operation obtains character code conversion table accordingly.
Character code refer to word or symbol in the numbering defined in specific coding rule, general such as web browser Deng reader use the conventional coding with standard, for the purpose of article of the present invention to be reached protection, This example lies in font server and produces new character code conversion table according to the font subset captured in article, as This example turns rear character code 805: " 7DB2,9808,78BC, 898F ", and namely the character code of this example turns Changing the character code of " civilian " described in table is " 7DB2 ", and the character code of " ancient cooking vessel " is " 9808 ", " word " Character code is " 78BC ", and the character code of " type " is " 898F ".
But because new character code not corresponds to " literary composition, ancient cooking vessel, word, type " in general standard encodes, Therefore when the article that reader's acquirement is changed with the character code conversion table of this example, will with general standard coding Correct article cannot be obtained, and display word 807 can be presented under standard code environment: " net, Palpus, code, rule ", this is formed for ciphertext, and independent of the meaning originally so that not through mandate The reader that cannot obtain aforementioned character code conversion table cannot correctly show original text.Thereby, the present invention can shut out Exhausted unwarranted reprinting or usurp behavior, reaches the purpose of article protection.
Relatively, if reading article is the reader through authentication, can obtain through font server Corresponding character code conversion table, in order to change ciphertext so that correct display article originally.Fig. 9 enters one Step schematically illustrates the example of character code conversion.
According to this example, reader obtains what related article was changed through ciphertext by reader from content platform It is encoded to " 7DB2,9808,78BC, 898F ", figure showing, the general character code of these character codes shows 90 is " net (7DB2), palpus (9808), code (78BC), rule (898F) ".Afterwards by font Server 92 obtains the character code conversion table of correspondence, and can correctly show content at the reader of reader's end, So example according to exclusive 94 transcodings of character code conversion table show " civilian (7DB2), ancient cooking vessel (9808), Word (78BC), type (898F) ".
Figure 10 show the related system function side realizing the present invention network article guard method Block embodiment.
Wherein showing the font server 100 realizing present system, one end has linked content platform 11, article and ciphertext can be transmitted, one end provides author 13 directly to deliver at font server 100 Article, the other end is then to receive the web page contents that reader 15 is transmitted, word simultaneously when reading articles Type server 100 also can directly transmit ciphertext font file to reader 15.
The network article protection system realized by font server 100 is mainly had with software Mode with coordinate computer hard-wired function means, font server 100 is one to have at data The servosystem of the functions such as reason, ability to communicate and webpage servo, related software modules such as has article and takes Module 111, this be the software approach of acquirement article, including can be by content platform 11 through network system Or other pipelines obtain the article delivered by author 13 at this platform, or can take directly from author 13 Obtain article.
Font server 100 has article parsing module 112, and this is the software approach resolving article, Resolve means with this article and resolve word in article, to obtain the font subset in article, this part work Work can reduce font file size, and reduces word processing burden.
Font server 100 has a character code conversion table generation module 113, this be according to article with/ Or the computing of font subset institute obtains the software approach of character code conversion table, according to embodiments of the present invention, except this Outside character code conversion table, can be maybe other conversion means.
Font server 100 has ciphertext generation module 114, and this is to produce ciphertext with character code conversion table Software approach, the ciphertext such as produced according to newly generated character code conversion article.
Font server 100 has character code conversion table data base 115, character code conversion table data base 115 In order to store character code conversion table, all literary compositions of all online employings article of the present invention guard method will be recorded All character code conversion tables that chapter is corresponding.
Font server 100 has user management module 116, and this can be that management user (includes making Person and reader) software approach, may be used to verify the identity of author and reader, be also not excluded for managing Reason uses the website identity of article guard method of the present invention, logs in this high in the clouds font server 100 Website, could obtain corresponding character code conversion table and relevant font, article of the present invention could be used to protect Method.
Font server 100 is provided with font data storehouse 117, and this is the data base of font in offer article, The font subset formed through font subset capturing program can also be stored.
Font server 100 is more for a ciphertext font file generation module 118.When system is (such as word Type server 100) when receiving the ciphertext that a terminal obtains from content platform, can be according to the letter in ciphertext Breath judges the character code conversion table of this ciphertext corresponding, and the font subset of ciphertext, then ciphertext font File generation module 118 produces records character code and the ciphertext font file of font synopsis, warp in article After specific transmission method is sent to reader, the ciphertext of reading can be converted to correct article content.
Therefore the technology contained according to the invention discloses book, when reader obtains in terminal webpage browser While webpage, being set by the pattern achieving webpage in the lump, including font, therefore browser can be to word Type server sends web page character type request.Now, font server, can be by after checked mandate The exclusive ciphertext font file previously made sends the reader of legal reading article to, it is possible to correctly show This article.Under such an approach, because article can have passed through recompiles process, this literary composition to be read Chapter have to use the ciphertext font file of this article, if not authorizing via font server Download exclusive ciphertext font file, the ciphertext failed to understand causing reprinting person to have to, therefore ensure The right of original author.
The foregoing is only the preferred possible embodiments of the present invention, all according to scope of the present invention patent institute Equalization change and the modification done, all should belong to the covering scope of the present invention.
[symbol description]
Author 10 publishes an article 101
Content platform 12 read web article 103
Reader 14 transmits web page contents 105
Obtain font file 107 font server 16
Author 20 content platform 22
Reader 24 font server 26
Publish an article 201 pass through conversion ciphertext article 203
Obtain web documents 205 and transmit web documents 207
Obtain ciphertext font file 209
Author 60 content platform 62
Ciphertext service routine 620 reader 64
Font server 66 publishes an article 601
Transmission web documents 603 passes through the article 605 of conversion ciphertext
Obtain web documents 607 and transmit web documents 609
Obtain ciphertext font file 611
The original character code of original character 801 803
After turning, character code 805 shows word 807
General character code shows 90 font servers 92
Ciphertext conversion table 94
Content platform 11 author 13
Reader 15 font server 100
Article obtains module 111 article parsing module 112
Character code conversion table generation module 113 ciphertext generation module 114
Character code conversion table data base 115 user management module 116
Font data storehouse 117 ciphertext font file generation module 118
Step S301~S309 article protection flow process
Step S401~S409 article protection flow process
Step S501~S507 article protection flow process
Step S701~S707 article protection flow process

Claims (10)

1. a network article guard method, it is characterised in that described method includes:
There is provided yi word pattern server, in order to receive an article;
In this font server, described article is produced a character code conversion table;
In this font server, with this character code conversion table, described article is converted to a ciphertext; And
Transmitting described ciphertext to a content platform, wherein said content platform is to provide reading should The service of article.
Network article guard method the most according to claim 1, wherein, described font Server initial provides an author to transmit an interface of described article.
Network article guard method the most according to claim 1, wherein, by an author The interface provided by described content platform delivers described article, then is passed by described content platform Pass described article to described font server.
Network article guard method the most according to claim 3, wherein, described content Platform performs a ciphertext service routine, in order to intercept and analyzing web page content, to obtain webpage Described article in content, then transmit described article to described font server.
Network article guard method the most according to any one of claim 1 to 4, its In, when user ulilization one reader obtains described ciphertext to described content platform, automatically will Described ciphertext is transferred to described font server, described font server obtain corresponding warp Cross the character code conversion table of conversion, form a ciphertext font file, then by described ciphertext font literary composition Part is transferred to described reader.
Network article guard method the most according to claim 5, wherein, at described word In type server, real-time operation produces described character code conversion table, and described character code conversion table aims at Described article is converted to described ciphertext, and described font server obtains described close from this reader Wen Shi, produces the correct ciphertext font file showing described article according to described character code conversion table.
Network article guard method the most according to claim 6, wherein, described font Server produces described character code conversion table and includes with the step forming described ciphertext:
In this font server, resolve the described article received, to obtain in described article Font subset;And
Obtain this character code conversion table according to font subset in described article, then turn with described character code Change table and described article is converted to described ciphertext.
8. a network article protection system, it is characterised in that described system includes:
One article obtains means, in order to obtain an article;
One article resolves means, in order to resolve described article to obtain the word in described article Type subset;
One character code conversion table produces means, produces a character code conversion table for described article;
One ciphertext produces means, with this character code conversion table, described article is converted to a ciphertext;
One character code conversion table data base, in order to store described character code conversion table;
Yi word pattern data base, in order to provide font in described article, and forms described font The data base of subset;And
One ciphertext font file generation module, in order to produce character code and word in the described article of record The ciphertext font file of the synopsis of shape;
Wherein, when receiving a terminal from this ciphertext that a content platform obtains, it is judged that right Answer the described character code conversion table of described ciphertext and described font subset, by described ciphertext word Type file generation module produces the institute recording the relevant character code of described article with the synopsis of font State ciphertext font file, more described ciphertext font file is sent to described terminal.
Network article the most according to claim 8 protection system, wherein, described article From acquired by a content platform, described content platform is to provide publishes an article and provides reading The service of article;Or described article is from acquired by the interface of font server institute initial.
The most according to claim 8 or claim 9, network article protection system, farther include One user's management means, in order to verify the identity of author and reader.
CN201510259722.3A 2015-05-20 2015-05-20 Network article guard method and system Pending CN106302326A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510259722.3A CN106302326A (en) 2015-05-20 2015-05-20 Network article guard method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510259722.3A CN106302326A (en) 2015-05-20 2015-05-20 Network article guard method and system

Publications (1)

Publication Number Publication Date
CN106302326A true CN106302326A (en) 2017-01-04

Family

ID=57634207

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510259722.3A Pending CN106302326A (en) 2015-05-20 2015-05-20 Network article guard method and system

Country Status (1)

Country Link
CN (1) CN106302326A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101819645A (en) * 2009-01-26 2010-09-01 施乐公司 The recognition engine that is used for pattern fonts based on the font input
CN102662920A (en) * 2012-03-15 2012-09-12 齐凡 Method and system for transmitting text
US20120260108A1 (en) * 2011-04-11 2012-10-11 Steve Lee Font encryption and decryption system and method
CN104618390A (en) * 2015-02-17 2015-05-13 北京趣拿信息技术有限公司 Website data feedback method, display method and system and processing system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101819645A (en) * 2009-01-26 2010-09-01 施乐公司 The recognition engine that is used for pattern fonts based on the font input
US20120260108A1 (en) * 2011-04-11 2012-10-11 Steve Lee Font encryption and decryption system and method
CN102662920A (en) * 2012-03-15 2012-09-12 齐凡 Method and system for transmitting text
CN104618390A (en) * 2015-02-17 2015-05-13 北京趣拿信息技术有限公司 Website data feedback method, display method and system and processing system

Similar Documents

Publication Publication Date Title
CN112292682B (en) Decentralized document and entity verification engine
CN110598376B (en) Copyright authentication method, device and equipment based on block chain and storage medium
EP3394779B1 (en) Methods and systems for identity creation, verification and management
CN106295388B (en) A kind of data desensitization method and device
CN108134791A (en) A kind of data center's total management system login validation method
CN105261105B (en) Safety door inhibition method
CN105893829A (en) Image-based key exchange
CN107066844A (en) A kind of method and apparatus of paper document security management and control and tracing
KR20190038938A (en) SYSTEM, METHOD, AND SERVER COMPUTER SYSTEM FOR IMPLEMENTING CONVERTING ONE entity in a heterogeneous communication network environment to a verifiably authenticated entity
KR102321608B1 (en) First copyright holder authentication system using blockchain and its method
Hossain et al. Improving cloud data security through hybrid verification technique based on biometrics and encryption system
CN111241555A (en) Access method and device for simulating user login, computer equipment and storage medium
US20130191641A1 (en) Captcha (completely automated public test to tell computers and humans apart) data generation methods and related data management systems and computer program products thereof
CN115795415A (en) Digital cultural relic evidence and infringement tracing method and system based on block chain digital watermarking
CN101741561A (en) Method and system for authenticating two-way hardware
CN109684802A (en) A kind of method and system providing a user artificial intelligence platform
CN103390121A (en) Digital work ownership authentication method and digital work ownership authentication system
CN102222195A (en) E-book reading method and system
CN117708043A (en) Electronic file establishment method and system based on blockchain technology
CN105117920A (en) Anti-counterfeiting method and apparatus for picture electronic certificates
CN106302326A (en) Network article guard method and system
CN110472423A (en) A kind of nuclear power station file permission management method, device and equipment
KR20200004666A (en) Biometric information authentication system using machine learning and block chain and its method
CN107920053A (en) Managing device and method based on Internet of Things
WO2021205392A1 (en) Computer-implemented method and system for the automated learning management

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20170104

WD01 Invention patent application deemed withdrawn after publication