CN112019642B - Audio uploading method, device, equipment and storage medium - Google Patents

Audio uploading method, device, equipment and storage medium Download PDF

Info

Publication number
CN112019642B
CN112019642B CN202011130132.8A CN202011130132A CN112019642B CN 112019642 B CN112019642 B CN 112019642B CN 202011130132 A CN202011130132 A CN 202011130132A CN 112019642 B CN112019642 B CN 112019642B
Authority
CN
China
Prior art keywords
character
user
audio
target
attribute
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011130132.8A
Other languages
Chinese (zh)
Other versions
CN112019642A (en
Inventor
刘永坚
白立华
钱峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Ligong Digital Communications Engineering Co ltd
Original Assignee
Wuhan Ligong Digital Communications Engineering Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Ligong Digital Communications Engineering Co ltd filed Critical Wuhan Ligong Digital Communications Engineering Co ltd
Priority to CN202011130132.8A priority Critical patent/CN112019642B/en
Publication of CN112019642A publication Critical patent/CN112019642A/en
Application granted granted Critical
Publication of CN112019642B publication Critical patent/CN112019642B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/955Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
    • G06F16/9554Retrieval from the web using information identifiers, e.g. uniform resource locators [URL] by using bar codes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/23Clustering techniques
    • G06F18/232Non-hierarchical techniques
    • G06F18/2321Non-hierarchical techniques using statistics or function optimisation, e.g. modelling of probability density functions
    • G06F18/23213Non-hierarchical techniques using statistics or function optimisation, e.g. modelling of probability density functions with fixed number of clusters, e.g. K-means clustering
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/24Classification techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0478Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Evolutionary Biology (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Artificial Intelligence (AREA)
  • Databases & Information Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Evolutionary Computation (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Probability & Statistics with Applications (AREA)
  • Computing Systems (AREA)
  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses an audio uploading method, an audio uploading device, audio uploading equipment and a storage medium. The method comprises the following steps: randomly generating at least one non-repetitive character string to obtain at least one target character string; adding a check bit between any two characters in at least one target character string according to the character attributes of the previous characters in any two characters to obtain a character string after primary encryption; adding a upgrading bit between any one character and a check bit corresponding to the character in the character string subjected to the primary encryption according to an upgrading encryption rule to obtain a character string subjected to secondary encryption; generating a corresponding two-dimensional code by the character string subjected to secondary encryption and at least one identification ID according to a preset two-dimensional code generation rule to obtain a target two-dimensional code; acquiring the duration of the dictation audio to obtain a target duration; and storing the target duration, the dictation audio and the application basic information into an account corresponding to the first user. User experience and privacy protection are promoted.

Description

Audio uploading method, device, equipment and storage medium
Technical Field
The present invention relates to the field of information storage, and in particular, to an audio uploading method, apparatus, device, and storage medium.
Background
In the existing mechanism for uploading audio files, secondary transmission often occurs in the transmission of audio files, for example, a user B requests a file X from a user a, in the existing mechanism, the user a needs to send the file X to the user B, and then the user B uploads the received file X to the system, so that broadband resources are wasted, the uploading experience of the user is very poor, and time is wasted. Or the user B logs in the account of the user A by scanning the two-dimensional code and uploads the two-dimensional code by self, the information of the two-dimensional code is easy to leak, because the personal information of the user, such as a micro signal and a mobile phone number, is recorded in the two-dimensional code in detail in the existing two-dimensional code information scanning process, the personal information is directly exposed without encryption protection, and the problem of personal information leakage is easily caused. This phenomenon is mainly caused by the lack of information protection measures, and thus it is seen that privacy leakage causes a serious threat to the private information security of customers.
Disclosure of Invention
The invention provides an audio uploading method based on the technical problem of how to improve uploading efficiency and effectively prevent information leakage when audio is uploaded through a two-dimensional code, and the audio uploading method comprises the following steps:
within a preset time, receiving an uploading instruction of a second user through a target two-dimensional code, wherein the target two-dimensional code is an identification two-dimensional code used for identifying a first user, and the target two-dimensional code is obtained in the following way:
acquiring a login request of the first user;
generating at least one identification ID for identifying the first user according to the login request;
randomly generating at least one non-repetitive character string to obtain at least one target character string;
adding a check bit between any two characters in the at least one target character string according to the character attribute of the prior character in the any two characters to obtain a character string after primary encryption; the character attribute comprises an English letter attribute or an Arabic numeral attribute; adding a check bit according to the character attribute of the previous character in the two random characters comprises the following steps: when the character attribute of the prior character in any two characters is an English letter attribute, the check digit is @usedfor representing the English letter character, and when the character attribute of the prior character in any two characters is an Arabic number attribute, the check digit is # -used for representing the Arabic number character;
adding a upgrading bit between any one of the characters and the check bit corresponding to the character in the character string subjected to the primary encryption according to an upgrading encryption rule to obtain a character string subjected to secondary encryption; the upgrade encryption rule includes: when the character attribute corresponding to the character is the Arabic numeral attribute, the upgrading bit is an upgrading character obtained by calculating the square of the character according to a formula and then subtracting 1 from the square of the character; when the character attribute corresponding to the character is the English letter attribute, the upgrading position is an upgrading character obtained by changing the character according to letter case and exchanging letter sequence;
generating a corresponding two-dimensional code by the character string subjected to secondary encryption and the at least one identification ID according to a preset two-dimensional code generation rule to obtain the target two-dimensional code;
after an uploading instruction of the second user is obtained, the second user is indicated to fill in basic application information, and the basic application information is uploaded through a client;
after the application basic information is obtained, indicating the second user to upload the dictation audio, and uploading the dictation audio through the client;
acquiring the duration of the dictation audio to obtain a target duration;
and storing the target duration, the dictation audio and the application basic information into an account corresponding to the first user.
In some possible designs, after the saving the target duration, the dictation audio, and the application basic information into the account corresponding to the first user, the method further includes:
acquiring a dictation request of a third user;
after receiving the dictation request of the third user, instructing a client to open a payment interface, and acquiring the payment information of the third user through the payment interface;
and if the payment is completed through the payment information, calling the dictation audio according to the dictation request of the third user.
In some possible designs, after receiving the dictation request of the third user, instructing the client to open a payment interface, and acquiring the payment information of the third user through the payment interface includes:
after receiving a dictation request of the third user, acquiring account information of the third user;
after the account information of the third user is obtained, the third user is instructed to open a payment page;
sending a purchase request to a preset audio mall through the account information of the third user, and sending payment information of the third user through the client;
responding to the purchase request, sending the audio data purchased by the user to the third user, and storing the payment information to a database;
generating a transaction information receipt through the payment information;
sending the transaction information receipt to the client;
and displaying the transaction information receipt through the client.
In some possible designs, before sending the audio data purchased by the user to the third user in response to the purchase request and saving the payment information to the database, the method includes:
instructing the client to send a membership enrollment invitation to the third user;
receiving an enrollment confirmation message of the client based on the member enrollment invitation;
and constructing a member information database.
In some possible designs, before the client is instructed to open a payment interface after receiving the dictation request of the third user and obtaining the payment information of the third user through the payment interface, the method further includes:
acquiring an audio audition request sent by a client;
calling corresponding audio data and audio information according to the audio audition request to obtain target audio data and target audio information;
sending the target audio data and the target audio information to a client;
displaying the target audio information through terminal equipment;
and playing the target audio data through the terminal equipment.
In some possible designs, after the building the member information database, the method further includes:
generating a resource set through the member information database;
performing attribute marking on the members of the resource set according to preset n-dimensional attributes to generate a new resource set;
extracting the characteristics of the new resource set through an extraction function to obtain a characteristic vector and obtain an initial sample space;
obtaining a clustering number K value through a parameter self-help method, and classifying the initial sample space by using K mean value clustering so as to divide the initial sample space into K resources; and
and classifying the K resources into resource atlas classes corresponding to the clustering centers of each class to complete the resource atlas.
In some possible designs, the obtaining a value K by a parameter self-service method, and classifying the initial sample space by using K-means clustering to divide the initial sample space into K types of resources includes:
determining an upper limit value K max of K, a lower limit value K min of K and setting parameters through a system clustering method, and setting an initial value K to be K min;
generating a data sample set through the member information database;
acquiring indexes for estimating the cluster quality, and starting from K +1, increasing 1 each time to simulate the WSS of the cluster of the generated samples one by one;
and when the clustered WSS meets a preset condition, accepting the K +1 classes, and sequentially increasing K after the K classes until the preset condition is not met so as to determine the K value.
In a second aspect, the present invention provides an audio uploading apparatus having a function of implementing a method corresponding to the audio uploading platform provided in the first aspect. The functions can be realized by hardware, and the functions can also be realized by executing corresponding software by hardware. The hardware or software includes one or more modules corresponding to the above functions, which may be software and/or hardware.
The audio uploading device comprises:
the input and output module is used for acquiring a login request of the first user;
the processing module is used for generating at least one identification ID used for identifying the first user according to the login request; randomly generating at least one non-repetitive character string to obtain at least one target character string; adding a check bit between any two characters in the at least one target character string according to the character attribute of the prior character in the any two characters to obtain a character string after primary encryption; the character attribute comprises an English letter attribute or an Arabic numeral attribute; adding a check bit according to the character attribute of the previous character in the two random characters comprises the following steps: when the character attribute of the prior character in any two characters is an English letter attribute, the check digit is @usedfor representing the English letter character, and when the character attribute of the prior character in any two characters is an Arabic number attribute, the check digit is # -used for representing the Arabic number character; adding a upgrading bit between any one of the characters and the check bit corresponding to the character in the character string subjected to the primary encryption according to an upgrading encryption rule to obtain a character string subjected to secondary encryption; the upgrade encryption rule includes: when the character attribute corresponding to the character is the Arabic numeral attribute, the upgrading bit is an upgrading character obtained by calculating the square of the character according to a formula and then subtracting 1 from the square of the character; when the character attribute corresponding to the character is the English letter attribute, the upgrading position is an upgrading character obtained by changing the character according to letter case and exchanging letter sequence; generating a corresponding two-dimensional code by the character string subjected to secondary encryption and the at least one identification ID according to a preset two-dimensional code generation rule to obtain the target two-dimensional code; after an uploading instruction of the second user is obtained, the second user is indicated to fill in basic application information, and the basic application information is uploaded through a client; after the application basic information is obtained, indicating the second user to upload the dictation audio, and uploading the dictation audio through the client; acquiring the duration of the dictation audio to obtain a target duration; and storing the target duration, the dictation audio and the application basic information into an account corresponding to the first user.
In some possible designs, the processing module is further to:
acquiring a dictation request of a third user;
after receiving the dictation request of the third user, instructing a client to open a payment interface, and acquiring the payment information of the third user through the payment interface;
and if the payment is completed through the payment information, calling the dictation audio according to the dictation request of the third user.
In some possible designs, the processing module is further to:
after receiving a dictation request of the third user, acquiring account information of the third user;
after the account information of the third user is obtained, the third user is instructed to open a payment page
Sending a purchase request to a preset audio mall through the account information of the third user, and sending payment information of the third user through the client;
responding to the purchase request, sending the audio data purchased by the user to the third user, and storing the payment information to a database;
generating a transaction information receipt through the payment information;
sending the transaction information receipt to the client;
and displaying the transaction information receipt through the client.
In some possible designs, the processing module is further to:
instructing the client to send a membership enrollment invitation to the third user;
receiving an enrollment confirmation message of the client based on the member enrollment invitation;
and constructing a member information database.
In some possible designs, the processing module is further to:
acquiring an audio audition request sent by a client;
calling corresponding audio data and audio information according to the audio audition request to obtain target audio data and target audio information;
sending the target audio data and the target audio information to a client;
displaying the target audio information through terminal equipment;
and playing the target audio data through the terminal equipment.
In some possible designs, the processing module is further to:
generating a resource set through the member information database;
performing attribute marking on the members of the resource set according to preset n-dimensional attributes to generate a new resource set;
extracting the characteristics of the new resource set through an extraction function to obtain a characteristic vector and obtain an initial sample space;
obtaining a clustering number K value through a parameter self-help method, and classifying the initial sample space by using K mean value clustering so as to divide the initial sample space into K resources; and
and classifying the K resources into resource atlas classes corresponding to the clustering centers of each class to complete the resource atlas.
In some possible designs, the processing module is further to:
determining an upper limit value K max of K, a lower limit value K min of K and setting parameters through a system clustering method, and setting an initial value K to be K min;
generating a data sample set through the member information database;
acquiring indexes for estimating the cluster quality, and starting from K +1, increasing 1 each time to simulate the WSS of the cluster of the generated samples one by one;
and when the clustered WSS meets a preset condition, accepting the K +1 classes, and sequentially increasing K after the K classes until the preset condition is not met so as to determine the K value.
In another aspect, the present invention provides an audio uploading device, which includes at least one connected processor, a memory, and an input/output unit, where the memory is used for storing program codes, and the processor is used for calling the program codes in the memory to execute the method of the above aspects.
Yet another aspect of the present invention provides a computer storage medium comprising instructions which, when executed on a computer, cause the computer to perform the method of the above-described aspects.
Compared with the prior art, the method and the device have the advantages that the first user generates the two-dimensional code when the audio is uploaded, the second user logs in the uploading interface in the network disk of the first user through the generated two-dimensional code, uploads the file through the uploading interface, automatically uploads the file to the network disk of the user A, randomly generates the identification ID when the two-dimensional code is generated, once encrypts and twice encrypts the unrepeated target character string, and binds the twice encrypted character string and the identification ID to generate the two-dimensional code, so that the experience of uploading the file by the user is improved, and the two-dimensional code information uploaded by the audio is prevented from being decrypted by others to cause exposure of the two-dimensional code information.
Drawings
Fig. 1 is a flowchart illustrating an audio uploading method according to an embodiment of the present invention;
fig. 2 is a schematic diagram illustrating user information filling of an audio uploading method according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of an audio uploading apparatus according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a computer device in an embodiment of the present invention.
The implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention. The terms "first," "second," and the like in the description and in the claims, and in the drawings described above, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It will be appreciated that the data so used may be interchanged under appropriate circumstances such that the embodiments described herein may be practiced otherwise than as specifically illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or modules is not necessarily limited to those steps or modules expressly listed, but may include other steps or modules not expressly listed or inherent to such process, method, article, or apparatus, and the division of modules into blocks presented herein is merely a logical division that may be implemented in a practical application in a different manner, such that multiple blocks may be combined or integrated into another system, or some features may be omitted, or may not be implemented.
Referring to fig. 1, the following illustrates an audio uploading method according to the present invention, including:
within a preset time, receiving an uploading instruction of a second user through a target two-dimensional code, wherein the target two-dimensional code is an identification two-dimensional code used for identifying a first user, and the target two-dimensional code is obtained in the following way:
the first user and the second user may be the same user or different users.
101. And acquiring a login request of a user.
In this embodiment, the login request includes user account information and permission information.
102. And generating at least one identification ID for identifying the first user according to the login request.
In this embodiment, a unique identification ID is generated according to the account information and the authority information. For example, an account ABCD, the authority of which is the authority of the ordinary user, may generate an identification ID of ABCD # # # # # # # # # # # # #0, wherein since the number of digits of the account is not specified, the account is filled by "#", thereby obtaining account information, and 0 represents the authority of the ordinary user.
103. And randomly generating at least one non-repeated character string to obtain at least one target character string.
In this embodiment, in order to improve the security measure for the identification ID, the server 103 randomly generates a non-repeated character string for binding with the identification ID, and stores the character string in the database. The identification ID is encrypted through the character string, so that account information and authority information of a user are encrypted, and two-dimensional code information is prevented from being decrypted; it will be appreciated that where the string is not repeated, it is more difficult to decrypt than a string with repeated characters.
104. Adding a check bit between any two characters in the at least one target character string according to the character attribute of the prior character in the any two characters to obtain a character string after primary encryption; the character attribute comprises an English letter attribute or an Arabic numeral attribute; adding a check bit according to the character attribute of the previous character in the two random characters comprises the following steps: and when the character attribute of the prior character in the any two characters is the English letter attribute, the check digit is @usedfor representing the English letter character, and when the character attribute of the prior character in the any two characters is the Arabic number attribute, the check digit is #, used for representing the Arabic number character.
Specifically, as described in 103, in order to improve the security measure for the identification ID, it is necessary to implement encryption by binding the character string, but it is far from sufficient that the encryption level is not repeated only by the characters in the character string, and based on this, this embodiment continues to perform one-time encryption on the unrepeated character string, that is, a check bit is added to the character attribute of the previous character in any two characters, so as to obtain the character string after one-time encryption. The character attributes include an english alphabet attribute or an arabic number attribute, for example, when the character is ABCD …, the attribute of the character is an english alphabet attribute, and when the character is 1234567 …, the attribute of the character is an arabic number attribute; for example, when the generated target character string is a25B1C7, according to the method described in 104, the character string after being encrypted once is: a @2#5# B @1# C @ 7; therefore, on the basis that the target character string is not repeated, once encryption is performed again to obtain the character string after once encryption, and as the encryption rule of once encryption (namely, the addition rule of adding the check bits) is to perform once encryption according to the character attribute of the generated target character string, it can be understood that the once encryption is a unique encryption mode which is different from the existing conventional encryption for the target character string in the embodiment according to the specific encryption rule, and the encryption party can also accurately identify the character string according to the unique encryption rule, and the non-encryption party cannot identify and crack the character string because the encryption rule is unknown, so that the security is extremely high.
105. Adding a upgrading bit between any one of the characters and the check bit corresponding to the character in the character string subjected to the primary encryption according to an upgrading encryption rule to obtain a character string subjected to secondary encryption; the upgrade encryption rule includes: when the character attribute corresponding to the character is the Arabic numeral attribute, the upgrading bit is an upgrading character obtained by calculating the square of the character according to a formula and then subtracting 1 from the square of the character; when the character attribute corresponding to the character is the English letter attribute, the upgrading position is an upgrading character obtained by changing the character according to letter case and exchanging letter sequence;
specifically, as described above, on the basis that the characters in the target character string are not repeated and the target character string is encrypted once, in order to further improve the encryption level and increase the difficulty of decryption, the 105 continues to encrypt the character string after the encryption once, that is, adds a bit upgrading bit between any one of the characters and the check bit corresponding to the character according to the upgrading encryption rule, so as to obtain the character string after the encryption twice. Still take the once encrypted string a @2#5# B @1# C @7 as an example, according to the method described in 105, between "a @", because a is an english letter attribute, and the "change according to letter case" described in this embodiment means that when a is an uppercase letter, the letter in the upgrade position is a lowercase letterThe letters are replaced in the letter sequence, namely, the letters with the next rank according to the letter rank are taken as upgrade positions according to a 26-bit letter rank order table, namely when A is the current letter, the letters of the upgrade positions are B; and combining the ' letter case change and letter order change ' to obtain the ' A ' @ ' upgrading bit B in the once encrypted character string A @2#5# B @1# C @ 7; between "2 #", since 2 is the attribute of Arabic numerals, the "calculating the square of the character by subtracting 1 according to the formula" in this embodiment means that formula 221, i.e. 22-1=3, and 3 is the upgrade bit corresponding to "2 #", and so on, it can be known that the character string after the secondary encryption is: ab @23#524# Bc @10# Cd @ 7; therefore, on the basis that the target character string is not repeated and is encrypted for the first time, the character string after secondary encryption is obtained, and because the encryption rule of the secondary encryption (namely, the addition rule of adding the upgrade bit) is to perform the secondary encryption according to the character attribute of the generated target character string, it can be understood that the secondary encryption is a unique encryption mode which is different from the conventional encryption according to the specific encryption rule aiming at the target character string in the embodiment, and the encryption party can also accurately identify the character string according to the unique encryption rule, and the non-encryption party cannot identify and crack the character string because the encryption rule is unknown, so that the security is further improved to a great extent.
106. And generating the corresponding two-dimensional code by the character string subjected to secondary encryption and the at least one identification ID according to a preset two-dimensional code generation rule to obtain the target two-dimensional code.
In this embodiment, the two-dimensional code is generated by a two-dimensional code generation technology of WeChat; it can be understood that the target two-dimensional code can be used for identifying the identity information of the user B because the target two-dimensional code includes the identification ID of the user B, and the identification ID and the secondarily encrypted character string are bound to generate the target two-dimensional code together, and obviously, on the premise that the target character string has the advantage of being difficult to crack, the generated target two-dimensional code is also extremely difficult to crack, that is, the third party of the user a and the user B is removed, even if the target two-dimensional code is intercepted in the process of receiving the target two-dimensional code by the user a, the encryption rule of the target two-dimensional code is unknown, the identity information of the user B cannot be acquired through the target two-dimensional code, and the security performance of the identity information of the user B is greatly improved.
107. And after the uploading instruction of the second user is obtained, the second user is indicated to fill in basic application information, and the basic application information is uploaded through a client.
In this embodiment, the account is logged in for uploading audio through two-dimensional code scanning.
108. And after the application basic information is obtained, indicating the second user to upload the dictation audio, and uploading the dictation audio through the client.
In this embodiment, as shown in fig. 2, the basic information may include a title, a selling price, an operation platform, a tag, and a WeChat diagram. Instructing the user to upload audio corresponding to the basic information.
109. And acquiring the duration of the dictation audio to obtain the target duration.
In this embodiment, the duration of the audio is obtained after the uploading is completed.
110. And storing the target duration, the dictation audio and the application basic information into an account corresponding to the first user.
In this embodiment, the duration information of the audio is stored in the database.
Compared with the prior art, the method and the device have the advantages that the first user generates the two-dimensional code when the audio is uploaded, the second user logs in the uploading interface in the network disk of the first user through the generated two-dimensional code, uploads the file through the uploading interface, automatically uploads the file to the network disk of the user A, randomly generates the identification ID when the two-dimensional code is generated, once encrypts and twice encrypts the unrepeated target character string, further encrypts the ID through the twice encrypted character string and the identification ID identification bit, and binds the encrypted information to generate the two-dimensional code, so that the experience of uploading the file by the user is improved, and the two-dimensional code information is prevented from being exposed due to decryption of other people on the two-dimensional code information uploaded by the audio.
In some embodiments, after the storing the target duration, the dictation audio, and the application basic information into the account corresponding to the first user, the method further includes:
acquiring a dictation request of a third user;
after receiving the dictation request of the third user, instructing a client to open a payment interface, and acquiring the payment information of the third user through the payment interface;
and if the payment is completed through the payment information, calling the dictation audio according to the dictation request of the third user.
In the above embodiment, the acquisition of the payment information is completed in the above manner, and the payment of the user is obtained.
In some embodiments, after receiving the dictation request of the third user, instructing the client to open a payment interface, and acquiring the payment information of the third user through the payment interface includes:
after receiving a dictation request of the third user, acquiring account information of the third user;
after the account information of the third user is obtained, the third user is instructed to open a payment page;
sending a purchase request to a preset audio mall through the account information of the third user, and sending payment information of the third user through the client;
responding to the purchase request, sending the audio data purchased by the user to the third user, and storing the payment information to a database;
generating a transaction information receipt through the payment information;
sending the transaction information receipt to the client;
and displaying the transaction information receipt through the client.
In the above embodiment, the transaction interaction is completed in the above manner, and the transaction information is sent to the user, and the user obtains the transaction receipt for after-sale guarantee.
In some embodiments, before sending the audio data purchased by the user to the third user and saving the payment information to the database in response to the purchase request, the method includes:
instructing the client to send a membership enrollment invitation to the third user;
receiving an enrollment confirmation message of the client based on the member enrollment invitation;
and constructing a member information database.
In the above embodiment, the user database is constructed for user promotion and promotion of sales promotion activities, and the operation cost is reduced.
In some embodiments, after receiving the dictation request of the third user, the method further includes, before instructing the client to open a payment interface and acquiring the payment information of the third user through the payment interface, the method further includes:
acquiring an audio audition request sent by a client;
calling corresponding audio data and audio information according to the audio audition request to obtain target audio data and target audio information;
sending the target audio data and the target audio information to a client;
displaying the target audio information through terminal equipment;
and playing the target audio data through the terminal equipment.
In the above embodiment, the audio frequency of the audition is sent to the user, and the user completes the audition through the terminal device to decide whether to purchase the product. Setting an upper limit threshold and a lower limit threshold, and counting the purchase times or click times of the commodities in real time; if the access times or click times of the commodities are larger than the upper limit threshold, judging that the commodities are popular;
if the purchase times or click times of the commodities are smaller than the lower limit threshold, judging the cold commodities; and if the sum of the purchase times or click times of the commodity is larger than the lower limit data threshold and smaller than the upper limit threshold, judging the commodity as a common commodity. The commodity is pushed by hot commodities, common commodities and cold commodities.
In some embodiments, after the building the member information database, the method further includes:
generating a resource set through the member information database;
performing attribute marking on the members of the resource set according to preset n-dimensional attributes to generate a new resource set;
extracting the characteristics of the new resource set through an extraction function to obtain a characteristic vector and obtain an initial sample space;
obtaining a clustering number K value through a parameter self-help method, and classifying the initial sample space by using K mean value clustering so as to divide the initial sample space into K resources; and
and classifying the K resources into resource atlas classes corresponding to the clustering centers of each class to complete the resource atlas.
In the above embodiment, the user is classified by using the k-mean algorithm, and the user classification is completed. By establishing the relation between the user classification attribute and the numerical attribute and adopting a clustering algorithm to mine user classification information, the user classification is more accurate and reasonable; the information between the user attribute information and the audio of the user is comprehensively considered, the basis of similarity measurement between the users is enriched, and the similarity measurement precision is improved. Based on a clustering algorithm, grouping information of the global users is obtained after user data are clustered, the user difference in each group is small, and the user difference in different groups is large. Taking member information including gender, monthly consumption and native place, and some other information as examples, information of all members is counted to generate a resource set. At this time, the gender, the monthly consumption and the native place of each member are extracted, and a new resource set is formed through statistics. Through the extraction function, the sex, the monthly consumption and the native place of each member are converted into a vector, and the member information at the moment is expressed through the vector. And converting each member information in the new resource set into a feature vector, and expressing the feature vector through a coordinate system to form a multi-dimensional sample space. And determining the value of the clustering number K by a parameter self-help method, and finishing the classification of the initial sample space.
In some embodiments, the obtaining the K value by the parameter self-service method, and classifying the initial sample space by using K-means clustering to divide the initial sample space into K types of resources includes:
determining an upper limit value K max of K, a lower limit value K min of K and setting parameters through a system clustering method, and setting an initial value K to be K min;
generating a data sample set through the member information database;
acquiring indexes for estimating the cluster quality, and starting from K +1, increasing 1 each time to simulate the WSS of the cluster of the generated samples one by one;
and when the clustered WSS meets a preset condition, accepting the K +1 classes, and sequentially increasing K after the K classes until the preset condition is not met so as to determine the K value.
In the above embodiment, a suitable K value is selected to complete the user classification. Selecting K points as far as possible, wherein the distance between the clustering centers is as far as possible, so that one point is randomly selected from the sample as a first clustering center; the point farthest from this point is then selected as the second cluster center. The third cluster center selects the point that is farthest from the two points, and so on k cluster centers.
Dividing original data into k clusters by using a hierarchical clustering method, taking the center of each cluster as a clustering center, and operating a standard k-means algorithm on the clustering center. For example, the minimum category is set to 5, the maximum category is set to 10, the categories are initially distinguished from 5, and the sample space is constructed according to the member information. And (4) clustering from 5 classes, finishing the whole cycle from clustering to 10 classes, judging whether the clustering result is good or bad through WSS and clustering indexes each time, and selecting the optimal clustering result through the indexes.
Fig. 3 is a schematic structural diagram of an audio uploading apparatus 20, which can be applied to audio uploading. The audio uploading apparatus in the embodiment of the present invention can implement the steps corresponding to the audio uploading method executed in the embodiment corresponding to fig. 1. The functions implemented by the audio uploading apparatus 20 may be implemented by hardware, or may be implemented by hardware executing corresponding software. The hardware or software includes one or more modules corresponding to the above functions, which may be software and/or hardware. The audio uploading apparatus may include an input/output module 201 and a processing module 202, and the processing module 202 and the input/output module 201 may refer to operations executed in the embodiment corresponding to fig. 1 for realizing functions, which are not described herein again. The input-output module 201 may be used to control input, output, and acquisition operations of the input-output module 201.
In some embodiments, the input/output module 201 may be configured to obtain a login request of the first user;
the processing module 202 may be configured to generate at least one identification ID for identifying the first user according to the login request; randomly generating at least one non-repetitive character string to obtain at least one target character string; adding a check bit between any two characters in the at least one target character string according to the character attribute of the prior character in the any two characters to obtain a character string after primary encryption; the character attribute comprises an English letter attribute or an Arabic numeral attribute; adding a check bit according to the character attribute of the previous character in the two random characters comprises the following steps: when the character attribute of the prior character in any two characters is an English letter attribute, the check digit is @usedfor representing the English letter character, and when the character attribute of the prior character in any two characters is an Arabic number attribute, the check digit is # -used for representing the Arabic number character; adding a upgrading bit between any one of the characters and the check bit corresponding to the character in the character string subjected to the primary encryption according to an upgrading encryption rule to obtain a character string subjected to secondary encryption; the upgrade encryption rule includes: when the character attribute corresponding to the character is the Arabic numeral attribute, the upgrading bit is an upgrading character obtained by calculating the square of the character according to a formula and then subtracting 1 from the square of the character; when the character attribute corresponding to the character is the English letter attribute, the upgrading position is an upgrading character obtained by changing the character according to letter case and exchanging letter sequence; generating a corresponding two-dimensional code by the character string subjected to secondary encryption and the at least one identification ID according to a preset two-dimensional code generation rule to obtain the target two-dimensional code; after an uploading instruction of the second user is obtained, the second user is indicated to fill in basic application information, and the basic application information is uploaded through a client; after the application basic information is obtained, indicating the second user to upload the dictation audio, and uploading the dictation audio through the client; acquiring the duration of the dictation audio to obtain a target duration; and storing the target duration, the dictation audio and the application basic information into an account corresponding to the first user.
In some embodiments, the processing module 202 is further configured to:
acquiring a dictation request of a third user;
after receiving the dictation request of the third user, instructing a client to open a payment interface, and acquiring the payment information of the third user through the payment interface;
and if the payment is completed through the payment information, calling the dictation audio according to the dictation request of the third user.
In some embodiments, the processing module 202 is further configured to:
after receiving a dictation request of the third user, acquiring account information of the third user;
after the account information of the third user is obtained, the third user is instructed to open a payment page
Sending a purchase request to a preset audio mall through the account information of the third user, and sending payment information of the third user through the client;
responding to the purchase request, sending the audio data purchased by the user to the third user, and storing the payment information to a database;
generating a transaction information receipt through the payment information;
sending the transaction information receipt to the client;
and displaying the transaction information receipt through the client.
In some embodiments, the processing module 202 is further configured to:
instructing the client to send a membership enrollment invitation to the third user;
receiving an enrollment confirmation message of the client based on the member enrollment invitation;
and constructing a member information database.
In some embodiments, the processing module 202 is further configured to:
acquiring an audio audition request sent by a client;
calling corresponding audio data and audio information according to the audio audition request to obtain target audio data and target audio information;
sending the target audio data and the target audio information to a client;
displaying the target audio information through terminal equipment;
and playing the target audio data through the terminal equipment.
In some embodiments, the processing module 202 is further configured to:
generating a resource set through the member information database;
performing attribute marking on the members of the resource set according to preset n-dimensional attributes to generate a new resource set;
extracting the characteristics of the new resource set through an extraction function to obtain a characteristic vector and obtain an initial sample space;
obtaining a clustering number K value through a parameter self-help method, and classifying the initial sample space by using K mean value clustering so as to divide the initial sample space into K resources; and
and classifying the K resources into resource atlas classes corresponding to the clustering centers of each class to complete the resource atlas.
In some embodiments, the processing module 202 is further configured to:
determining an upper limit value K max of K, a lower limit value K min of K and setting parameters through a system clustering method, and setting an initial value K to be K min;
determining an upper limit value K max of K, a lower limit value K min of K and setting parameters through a system clustering method, and setting an initial value K to be K min;
generating a data sample set through the member information database;
acquiring indexes for estimating the cluster quality, and starting from K +1, increasing 1 each time to simulate the WSS of the cluster of the generated samples one by one;
and when the clustered WSS meets a preset condition, accepting the K +1 classes, and sequentially increasing K after the K classes until the preset condition is not met so as to determine the K value.
The creating apparatus in the embodiment of the present invention is described above from the perspective of the modular functional entity, and the following describes a computer device from the perspective of hardware, as shown in fig. 4, which includes: a processor, a memory, an input-output unit (which may also be a transceiver, not identified in fig. 4), and a computer program stored in the memory and executable on the processor. For example, the computer program may be a program corresponding to the audio uploading method in the embodiment corresponding to fig. 1. For example, when the computer device implements the functions of the audio uploading apparatus 20 shown in fig. 3, the processor executes the computer program to implement the steps of the audio uploading method executed by the audio uploading apparatus 20 in the embodiment corresponding to fig. 3. Alternatively, the processor, when executing the computer program, implements the functions of the modules in the audio uploading apparatus 20 according to the embodiment corresponding to fig. 3. For another example, the computer program may be a program corresponding to the audio uploading method in the embodiment corresponding to fig. 1.
The Processor may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic, discrete hardware components, etc. The general purpose processor may be a microprocessor or the processor may be any conventional processor or the like which is the control center for the computer device and which connects the various parts of the overall computer device using various interfaces and lines.
The memory may be used to store the computer programs and/or modules, and the processor may implement various functions of the computer device by running or executing the computer programs and/or modules stored in the memory and invoking data stored in the memory. The memory may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, video data, etc.) created according to the use of the cellular phone, etc. In addition, the memory may include high speed random access memory, and may also include non-volatile memory, such as a hard disk, a memory, a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), at least one magnetic disk storage device, a Flash memory device, or other volatile solid state storage device.
The input-output unit may also be replaced by a receiver and a transmitter, which may be the same or different physical entities. When they are the same physical entity, they may be collectively referred to as an input-output unit. The input and output may be a transceiver.
The memory may be integrated in the processor or may be provided separately from the processor.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (e.g., ROM/RAM), and includes instructions for causing a terminal (e.g., a mobile phone, a computer, a server, or a network device) to execute the method according to the embodiments of the present invention.
The present invention is described in connection with the accompanying drawings, but the present invention is not limited to the above embodiments, which are only illustrative and not restrictive, and those skilled in the art can make various changes without departing from the spirit and scope of the invention as defined by the appended claims, and all changes that come within the meaning and range of equivalency of the specification and drawings that are obvious from the description and the attached claims are intended to be embraced therein.

Claims (9)

1. An audio uploading method, characterized in that the method comprises:
within a preset time length, a first user generates a target two-dimensional code;
the second user acquires the target two-dimensional code and logs in an uploading interface in a network disk of the first user according to the target two-dimensional code, the target two-dimensional code is an identification two-dimensional code used for identifying the first user, and the target two-dimensional code is acquired in the following mode:
acquiring a login request of the first user;
generating at least one identification ID for identifying the first user according to the login request;
randomly generating at least one non-repetitive character string to obtain at least one target character string;
adding a check bit between any two characters in the at least one target character string according to the character attribute of the prior character in the any two characters to obtain a character string after primary encryption; the character attribute comprises an English letter attribute or an Arabic numeral attribute; adding a check bit according to the character attribute of the previous character in the two random characters comprises the following steps: when the character attribute of the prior character in any two characters is an English letter attribute, the check digit is @usedfor representing the English letter character, and when the character attribute of the prior character in any two characters is an Arabic number attribute, the check digit is # -used for representing the Arabic number character;
adding a upgrading bit between any one of the characters and the check bit corresponding to the character in the character string subjected to the primary encryption according to an upgrading encryption rule to obtain a character string subjected to secondary encryption; the upgrade encryption rule includes: when the character attribute corresponding to the character is the Arabic numeral attribute, the upgrading bit is an upgrading character obtained by calculating the square of the character according to a formula and then subtracting 1 from the square of the character; when the character attribute corresponding to the character is the English letter attribute, the upgrading position is an upgrading character obtained by changing the character according to letter case and exchanging letter sequence;
generating a corresponding two-dimensional code by the character string subjected to secondary encryption and the at least one identification ID according to a preset two-dimensional code generation rule to obtain the target two-dimensional code;
after logging in the uploading interface, the second user fills in basic application information and uploads the basic application information through a client;
after the application basic information is obtained, indicating the second user to upload the dictation audio, and uploading the dictation audio through the client;
acquiring the duration of the dictation audio to obtain a target duration;
and storing the target duration, the dictation audio and the application basic information into an account corresponding to the first user.
2. The method of claim 1, wherein after the storing the target duration, the dictation audio, and the application basic information into the account corresponding to the first user, the method further comprises:
acquiring a dictation request of a third user;
after receiving the dictation request of the third user, instructing a client to open a payment interface, and acquiring the payment information of the third user through the payment interface;
and if the payment is completed through the payment information, calling the dictation audio according to the dictation request of the third user.
3. The method according to claim 2, wherein after receiving the dictation request of the third user, instructing the client to open a payment interface, and acquiring the payment information of the third user through the payment interface comprises:
after receiving a dictation request of the third user, acquiring account information of the third user;
after the account information of the third user is obtained, the third user is instructed to open a payment page;
sending a purchase request to a preset audio mall through the account information of the third user, and sending payment information of the third user through the client;
responding to the purchase request, sending the audio data purchased by the user to the third user, and storing the payment information to a database;
generating a transaction information receipt through the payment information;
sending the transaction information receipt to the client;
and displaying the transaction information receipt through the client.
4. The method of claim 3, wherein before sending the audio data purchased by the user to the third user and saving the payment information to the database in response to the purchase request, the method comprises:
instructing the client to send a membership enrollment invitation to the third user;
receiving an enrollment confirmation message of the client based on the member enrollment invitation;
and constructing a member information database.
5. The method according to any one of claims 2-4, wherein after receiving the dictation request of the third user, instructing the client to open a payment interface, and before obtaining the third user payment information through the payment interface, the method further comprises:
acquiring an audio audition request sent by a client;
calling corresponding audio data and audio information according to the audio audition request to obtain target audio data and target audio information;
sending the target audio data and the target audio information to a client;
displaying the target audio information through terminal equipment;
and playing the target audio data through the terminal equipment.
6. The method of claim 4, wherein after the building of the member information database, the method further comprises:
generating a resource set through the member information database;
performing attribute marking on the members of the resource set according to preset n-dimensional attributes to generate a new resource set;
extracting the characteristics of the new resource set through an extraction function to obtain a characteristic vector and obtain an initial sample space;
obtaining a clustering number K value through a parameter self-help method, and classifying the initial sample space by using K mean value clustering so as to divide the initial sample space into K resources; and
and classifying the K resources into resource atlas classes corresponding to the clustering centers of each class to complete the resource atlas.
7. An audio uploading apparatus, characterized in that the apparatus comprises:
the input and output module is used for acquiring a login request of a first user;
the processing module is used for generating at least one identification ID used for identifying the first user according to the login request; randomly generating at least one non-repetitive character string to obtain at least one target character string; adding a check bit between any two characters in the at least one target character string according to the character attribute of the prior character in the any two characters to obtain a character string after primary encryption; the character attribute comprises an English letter attribute or an Arabic numeral attribute; adding a check bit according to the character attribute of the previous character in the two random characters comprises the following steps: when the character attribute of the prior character in any two characters is an English letter attribute, the check digit is @usedfor representing the English letter character, and when the character attribute of the prior character in any two characters is an Arabic number attribute, the check digit is # -used for representing the Arabic number character; adding a upgrading bit between any one of the characters and the check bit corresponding to the character in the character string subjected to the primary encryption according to an upgrading encryption rule to obtain a character string subjected to secondary encryption; the upgrade encryption rule includes: when the character attribute corresponding to the character is the Arabic numeral attribute, the upgrading bit is an upgrading character obtained by calculating the square of the character according to a formula and then subtracting 1 from the square of the character; when the character attribute corresponding to the character is the English letter attribute, the upgrading position is an upgrading character obtained by changing the character according to letter case and exchanging letter sequence; generating a corresponding two-dimensional code by the character string subjected to secondary encryption and the at least one identification ID according to a preset two-dimensional code generation rule to obtain a target two-dimensional code; a second user acquires the target two-dimensional code, logs in an uploading interface in a network disk of the first user according to the target two-dimensional code, fills in basic application information after logging in the uploading interface, and uploads the basic application information through a client; after the application basic information is obtained, indicating the second user to upload the dictation audio, and uploading the dictation audio through the client; acquiring the duration of the dictation audio to obtain a target duration; and storing the target duration, the dictation audio and the application basic information into an account corresponding to the first user.
8. A computer device, characterized in that the computer device comprises:
at least one processor, a memory, and an input-output unit;
wherein the memory is configured to store program code and the processor is configured to invoke the program code stored in the memory to perform the method of any of claims 1-6.
9. A computer storage medium characterized in that it comprises instructions which, when run on a computer, cause the computer to perform the method of any one of claims 1-6.
CN202011130132.8A 2020-10-21 2020-10-21 Audio uploading method, device, equipment and storage medium Active CN112019642B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011130132.8A CN112019642B (en) 2020-10-21 2020-10-21 Audio uploading method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011130132.8A CN112019642B (en) 2020-10-21 2020-10-21 Audio uploading method, device, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN112019642A CN112019642A (en) 2020-12-01
CN112019642B true CN112019642B (en) 2021-02-09

Family

ID=73527441

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011130132.8A Active CN112019642B (en) 2020-10-21 2020-10-21 Audio uploading method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN112019642B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114531613B (en) * 2022-02-17 2023-12-19 北京麦多贝科技有限公司 Video encryption processing method and device, electronic equipment and storage medium

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105847595A (en) * 2016-05-27 2016-08-10 立德高科(昆山)数码科技有限责任公司 Identifier with two-dimensional code and method for finding person under guardianship based on identifier

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105847595A (en) * 2016-05-27 2016-08-10 立德高科(昆山)数码科技有限责任公司 Identifier with two-dimensional code and method for finding person under guardianship based on identifier

Also Published As

Publication number Publication date
CN112019642A (en) 2020-12-01

Similar Documents

Publication Publication Date Title
CN104468531B (en) The authorization method of sensitive data, device and system
JP6837066B2 (en) Information processing method and server, computer storage medium
JP7095140B2 (en) Multi-model training methods and equipment based on feature extraction, electronic devices and media
CN108734028B (en) Data management method based on block chain, block chain link point and storage medium
CN110851879B (en) Method, device and equipment for infringement and evidence preservation based on evidence preservation block chain
WO2017140248A1 (en) Data exchange method, data exchange device and computing device
WO2017000820A1 (en) File sharing method, apparatus, and system based on cloud storage
CN110490721B (en) Financial voucher generating method and related product
CN109597822B (en) User data storage and query method and user data processing device
CN104144419A (en) Identity authentication method, device and system
CN107908632B (en) Website file processing method and device, website file processing platform and storage medium
CN107784504B (en) Method for generating return visit event of client and terminal equipment
CN111488995B (en) Method, device and system for evaluating joint training model
US11886556B2 (en) Systems and methods for providing user validation
CN106030527B (en) By the system and method for application notification user available for download
CN110597877A (en) Block chain transaction processing method and device
CN105516225B (en) Method, device and system for operating object
CN107277068B (en) Identity recognition method and terminal
CN112150030A (en) Account management method based on multiple units and multiple identities, terminal equipment and storage medium
CN112019642B (en) Audio uploading method, device, equipment and storage medium
CN116738493B (en) Data encryption storage method and device based on classification category
CN112783847A (en) Data sharing method and device
CN111553742A (en) Federal product recommendation method, device, equipment and computer storage medium
CN111177536A (en) Method and device for transmitting customized information to unregistered user based on device fingerprint and electronic device
CN107729345B (en) Website data processing method and device, website data processing platform and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant