CN114490963A - All-media publishing system - Google Patents

All-media publishing system Download PDF

Info

Publication number
CN114490963A
CN114490963A CN202111556039.8A CN202111556039A CN114490963A CN 114490963 A CN114490963 A CN 114490963A CN 202111556039 A CN202111556039 A CN 202111556039A CN 114490963 A CN114490963 A CN 114490963A
Authority
CN
China
Prior art keywords
user
manuscript
keywords
words
program
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202111556039.8A
Other languages
Chinese (zh)
Other versions
CN114490963B (en
Inventor
裴建明
樊荣
张富洋
贾敏
李娟�
刘亚莉
刘银姬
张淑苗
冯娜
付锋
李军
顾晓明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Air Force Medical University of PLA
Original Assignee
Air Force Medical University of PLA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Air Force Medical University of PLA filed Critical Air Force Medical University of PLA
Priority to CN202111556039.8A priority Critical patent/CN114490963B/en
Publication of CN114490963A publication Critical patent/CN114490963A/en
Application granted granted Critical
Publication of CN114490963B publication Critical patent/CN114490963B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/30Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F16/33Querying
    • G06F16/332Query formulation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
    • G10L13/00Speech synthesis; Text to speech systems
    • G10L13/08Text analysis or generation of parameters for speech synthesis out of text, e.g. grapheme to phoneme translation, prosody generation or stress or intonation determination
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
    • G10L15/00Speech recognition
    • G10L15/26Speech to text systems
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/30Computing systems specially adapted for manufacturing

Abstract

The invention relates to the field of media publishing, and particularly discloses a full media publishing system which comprises an uploading encryption module, a database, a data monitoring module, an identity verification module and a downloading decryption module. The invention encrypts the manuscript stored on the server in an image mode, extracts the verification of obtaining the manuscript according to the content of the manuscript, allows the manuscript to be obtained after the verification is passed, thereby ensuring the safety of the manuscript, marks the characters according to the pronunciation of the characters, ensures that the pronunciation of each character corresponds to a graph, thereby obtaining the graphs distributed in order, mutually converts the characters and the images in a voice transfer mode when the characters and the images correspond, thereby realizing the consistency of the characters before and after encryption, and ensures that the characters corresponding to the graphs are not unique, namely the manuscript is intercepted and cannot be accurately cracked.

Description

All-media publishing system
Technical Field
The invention relates to the field of media publishing, in particular to a full media publishing system.
Background
The full media is a general name of a transmission mode taking newspapers, periodicals, televisions, broadcasts, the internet and the like as transmission media, the periodicals are one type of media and are usually oriented to high-end clients to store and record some high-quality manuscripts, and the manuscripts have a characteristic before the periodicals are issued, so that the manuscripts cannot be disclosed by other full media in various forms, and the novelty and integrity of the manuscripts are ensured. The periodical editing work is sequentially performed through a series of work flows of submission, multi-expert peer review, manuscript review, recording and finalizing, production and manufacturing, publishing and spreading and the like, and each work flow needs to be completed by at least one worker. In actual editing, the series of work flows are completed in an online mode, each worker operates the manuscript on line, and after the operation is completed, the manuscript reaches the next work flow, so that the editing work is very convenient and fast by using the online mode, the efficiency of the editing work is effectively improved, however, a server needs to be built in the online mode and the manuscripts are uploaded to the server, and the workers of each work flow operate the manuscripts through the server.
Disclosure of Invention
The present invention is directed to overcome the problems of the prior art described above, and to provide a full media publishing system, which encrypts a manuscript stored in a server in an image manner, extracts a verification of obtaining the manuscript according to the content of the manuscript, and allows the manuscript to be obtained after the verification is passed, thereby ensuring the security of the manuscript.
To this end, the present invention provides a full media publishing system comprising:
the uploading encryption module is used for receiving manuscripts uploaded by a user, encrypting the uploaded manuscripts and storing the encrypted manuscripts in a database;
a database for storing manuscripts and providing access;
the data monitoring module is used for monitoring an access request of any program to the database, starting the identity authentication module and receiving an access permission instruction or an access rejection instruction sent by the identity authentication module when the access request of the program is detected to exist, opening a channel of the database for the program when the access permission instruction is received, and blocking the database for the program when the access rejection instruction is received;
the identity authentication module is used for verifying the user of the program, sending an access permission instruction to the data monitoring module when the user verification of the program is true, and sending an access rejection instruction to the data monitoring module when the user verification of the program is false;
and the download decryption module is used for receiving a download request of a user, extracting manuscripts to be downloaded by the user from the database and decrypting the manuscripts to be downloaded by the user.
Further, when the authentication module word verifies the user of the program, the method comprises the following steps:
analyzing the program to obtain manuscripts to be accessed by the program;
extracting manuscripts to be accessed by the program from the database, and extracting the manuscript contents of the manuscripts;
extracting a plurality of keywords from the manuscript content, and sequentially arranging and marking serial numbers of the extracted keywords according to the sequence of the extracted keywords in the manuscript content;
displaying a plurality of words to a user, wherein the plurality of words comprise at least one keyword, and receiving a selection of the user;
and judging whether the selection of the user is correct or not, and if so, considering that the user verification of the program is true, otherwise, considering that the user verification of the program is false.
Further, when displaying a plurality of words to a user, the method comprises the following steps:
obtaining a plurality of irrelevant words, wherein the irrelevant words are synonyms or near-synonyms of the keywords, and the irrelevant words and the keywords form the words;
randomly acquiring the number of the irrelevant words and the number of the keywords, wherein the number of the keywords is less than the number of the irrelevant words;
randomly selecting the irrelevant words with the number of the irrelevant words, and randomly selecting the keywords with the number of the keywords;
simultaneously displaying the selected irrelevant words and the keywords to a user, and receiving the selection of the user;
and when the words selected by the user are the irrelevant words, the user verification of the program is considered to be false.
Further, when displaying a plurality of words to a user, the method comprises the following steps:
obtaining a plurality of irrelevant words, wherein the irrelevant words are synonyms or near-synonyms of the keywords, and the irrelevant words and the keywords form the words;
randomly acquiring the number of the irrelevant words and the number of the keywords, wherein the number of the keywords is larger than the number of the irrelevant words;
randomly selecting the irrelevant words with the number of the irrelevant words, and randomly selecting the keywords with the number of the keywords;
simultaneously displaying the selected irrelevant words and the keywords to a user, and receiving the sequence of the words selected by the user;
when the words selected by the user comprise irrelevant words, the user verification of the program is considered to be false, when the words selected by the user only comprise keywords, the sequence of the sequence numbers corresponding to the keywords is arranged according to the sequence of the keywords selected by the user to obtain a selection number sequence of the user, when the selection number sequence of the user is in a descending sequence or an ascending sequence, the user verification of the program is considered to be true, otherwise, the user verification of the program is considered to be false.
Further, the keywords are displayed in a graphical display manner.
Further, when the upload encryption module encrypts the uploaded manuscript, the method comprises the following steps:
extracting manuscript contents of the uploaded manuscript, and obtaining pronunciation of each character in the manuscript contents by using a character voice conversion technology;
obtaining a corresponding graph according to the pronunciation of the characters, and replacing each character by the corresponding graph;
traversing each character in the manuscript content to obtain an encrypted manuscript, and storing the encrypted manuscript in the database;
the download decryption module, when decrypting the manuscript that the user wants to download, comprises the following steps:
extracting an encrypted manuscript corresponding to a manuscript to be downloaded by a user, and extracting the encrypted content of the encrypted manuscript;
according to the voice corresponding to each graph, sequentially disconnecting the graphs according to the arrangement sequence of the images and punctuation marks to obtain encrypted voice;
and converting the encrypted voice into characters by using a voice-character conversion technology to obtain a downloaded manuscript which is used as the manuscript to be downloaded by the user and is sent to the user.
Furthermore, the voice and character conversion technology is divided into three layers of working spaces when working;
the first layer of working space is used for playing the encrypted voice under a set decibel to enable the encrypted voice to complete the conversion of characters;
the second layer of working space adds noise into the encrypted voice after adjusting the encrypted voice to obtain mixed sound;
and the third layer of working space filters and eliminates the mixed sound.
Further, when adjusting the encrypted voice, the method comprises the following steps:
disassembling the encrypted voice to obtain a plurality of sub-voices;
randomly arranging each sub-voice to obtain a recombined voice;
and taking the recombined voice as the encrypted voice after the adjustment.
Further, before each of the sub-voices is randomly arranged, the audio frequency of each of the sub-voices is adjusted by different multiples.
Furthermore, a firewall is arranged in the database.
The all-media publishing system provided by the invention has the following beneficial effects:
the invention encrypts the manuscripts stored on the server in an image mode, extracts the verification of obtaining the manuscripts according to the contents of the manuscripts, and allows the manuscripts to be obtained after the verification is passed, thereby ensuring the safety of the manuscripts;
the characters are marked according to the pronunciations of the characters, so that the pronunciations of the characters correspond to one graph, the graphs distributed in order are obtained, the characters and the images are mutually converted in a voice transfer mode when the characters and the images correspond to each other, the consistency of the characters before and after encryption is realized, and the characters corresponding to the graphs are not unique, namely the manuscripts are intercepted and cannot be accurately cracked.
Drawings
FIG. 1 is a schematic block diagram of the overall system connection of the present invention;
FIG. 2 is a schematic block diagram of a flow of a user of the authentication module word check program of the present invention;
FIG. 3 is a block diagram illustrating the process of encrypting and decrypting documents according to the present invention.
Detailed Description
An embodiment of the present invention will be described in detail below with reference to the accompanying drawings, but it should be understood that the scope of the present invention is not limited to the embodiment.
Specifically, as shown in fig. 1 to 3, an embodiment of the present invention provides a full media publishing system, including: the system comprises an uploading encryption module, a database, a data monitoring module, an identity verification module and a downloading decryption module. The invention completes the whole work through the coordination and the coordination among all the modules. The respective modules will be described in detail below.
The uploading encryption module is used for receiving manuscripts uploaded by a user, encrypting the uploaded manuscripts and storing the encrypted manuscripts in a database; the module is a gateway for receiving data and encrypting the data, namely encrypting manuscripts to be stored in the database, and the reason for encrypting is that the database is broken by hackers, and the manuscripts obtained by the hackers are also encrypted, so that the hackers are effectively prevented from obtaining the manuscripts, and the novelty of the manuscripts is ensured.
A database for storing manuscripts and providing access; the database is used as a storage component, has a data storage function and protects the internal storage content, and in the embodiment of the invention, the database is internally provided with a firewall and is protected by using the firewall.
The data monitoring module is used for monitoring an access request of any program to the database, starting the identity authentication module and receiving an access permission instruction or an access rejection instruction sent by the identity authentication module when the access request of the program is detected to exist, opening a channel of the database for the program when the access permission instruction is received, and blocking the database for the program when the access rejection instruction is received; the module is a protection module for the database, detects each program to be accessed to the database, and judges whether to allow the access operation of the program to the database according to the approval of the identity verification module.
The identity authentication module is used for verifying the user of the program, sending an access permission instruction to the data monitoring module when the user verification of the program is true, and sending an access rejection instruction to the data monitoring module when the user verification of the program is false; the module is used for verifying a user who wants to access a program of the database, namely the user who sends the program, and judging whether the identity of the user is legal or not, namely whether the identity of the user is the user operated by the system of the invention or not, if so, the verification is true, otherwise, the verification is false.
And the download decryption module is used for receiving a download request of a user, extracting manuscripts to be downloaded by the user from the database and decrypting the manuscripts to be downloaded by the user. The module provides for the downloading of the user, and decrypts the downloaded encrypted contribution to obtain the original contribution.
The system uploads the processed manuscript when each work flow is finished, encrypts and stores the uploaded manuscript, protects the encrypted manuscript in the database by the protection of the system, decrypts the encrypted manuscript when the manuscript is downloaded in the next work flow, thereby finishing the protection of the file, stores the manuscript in the database in an encrypted form, and obtains the encrypted manuscript which is not readable by a hacker when the database is damaged without protection. Therefore, the invention protects the manuscript from multiple angles, thereby ensuring the novelty of the manuscript.
In the embodiment of the present invention, when the program that needs to access the database is verified, that is, when the user of the program is verified by the authentication module word, the method includes the following steps:
firstly, the method comprises the following steps: analyzing the program to obtain manuscripts to be accessed by the program;
secondly, the method comprises the following steps: extracting manuscripts to be accessed by the program from the database, and extracting the manuscript contents of the manuscripts;
thirdly, the method comprises the following steps: extracting a plurality of keywords from the manuscript content, and sequentially arranging and marking serial numbers of the extracted keywords according to the sequence of the extracted keywords in the manuscript content;
fourthly: displaying a plurality of words to a user, wherein the plurality of words comprise at least one keyword, and receiving a selection of the user;
fifth, the method comprises the following steps: and judging whether the selection of the user is correct or not, and if so, considering that the user verification of the program is true, otherwise, considering that the user verification of the program is false.
When the identity of the user is checked, the content of the manuscript is combined with a checking mode, so that only a worker who knows the content of the manuscript can check the user of the program to be true, the system can prevent personnel except the worker from acquiring the manuscript, and the confidential safety of the manuscript is protected from the perspective of the content of the manuscript.
The embodiment of the invention provides two ways when displaying a plurality of words to a user, which are as follows:
the first method is as follows:
when a plurality of words are displayed to a user, the embodiment of the invention comprises the following steps:
step A1: obtaining a plurality of irrelevant words, wherein the irrelevant words are synonyms or near-synonyms of the keywords, and the irrelevant words and the keywords form the words;
step A2: randomly acquiring the number of the irrelevant words and the number of the keywords, wherein the number of the keywords is less than the number of the irrelevant words;
step A3: randomly selecting the irrelevant words with the number of the irrelevant words, and randomly selecting the keywords with the number of the keywords;
step A4: simultaneously displaying the selected irrelevant words and the keywords to a user, and receiving the selection of the user;
step A5: and when the words selected by the user are the irrelevant words, the user verification of the program is considered to be false.
In the first mode, when the keywords and the irrelevant words are displayed, the keywords and the irrelevant words are displayed to the user at the same time, the selection of the user is received, the irrelevant words are used as confused options, when the keywords are selected by the user, the user is considered to have a good understanding on the contents of the manuscript, and vice versa, generally, the number of the keywords is only one, and therefore the staff can be screened out in such a mode.
The second method comprises the following steps:
when the embodiment of the invention displays a plurality of words to a user, the method comprises the following steps:
step B1: obtaining a plurality of irrelevant words, wherein the irrelevant words are synonyms or near-synonyms of the keywords, and the irrelevant words and the keywords form the words;
step B2: randomly acquiring the number of the irrelevant words and the number of the keywords, wherein the number of the keywords is larger than the number of the irrelevant words;
step B3: randomly selecting the irrelevant words with the number of the irrelevant words, and randomly selecting the keywords with the number of the keywords;
step B4: simultaneously displaying the selected irrelevant words and the keywords to a user, and receiving the sequence of the words selected by the user;
step B5: when the words selected by the user comprise irrelevant words, the user verification of the program is considered to be false, when the words selected by the user only comprise keywords, the sequence of the sequence numbers corresponding to the keywords is arranged according to the sequence of the keywords selected by the user to obtain a selection number sequence of the user, when the selection number sequence of the user is in a descending sequence or an ascending sequence, the user verification of the program is considered to be true, otherwise, the user verification of the program is considered to be false.
In the second mode, when the keyword and the irrelevant word are displayed, the keyword and the irrelevant word are displayed to the user at the same time, the selection of the user is received, the irrelevant word is used as a confused option, the user selects the keyword in the manuscript content in sequence, at the moment, the system checks the user according to the sequence selected by the user, and compared with the first mode, the first mode improves the difficulty and screens out the staff through the cognition and the memory of the manuscript.
As the optimization of the technical scheme, the keywords are displayed in a graphic display mode. The characters can be visually converted through a graphic display mode, so that a hacker cannot accurately obtain the keywords from the logical relationship of the keywords.
In the embodiment of the present invention, when the upload encryption module encrypts the uploaded manuscript, the method includes the following steps:
step 1-1: extracting manuscript contents of the uploaded manuscript, and obtaining pronunciation of each character in the manuscript contents by using a character voice conversion technology;
step 1-2: obtaining a corresponding graph according to the pronunciation of the characters, and replacing each character by the corresponding graph;
step 1-3: traversing each character in the manuscript content to obtain an encrypted manuscript, and storing the encrypted manuscript in the database;
the download decryption module, when decrypting the manuscript that the user wants to download, comprises the following steps:
step 2-1: extracting an encrypted manuscript corresponding to a manuscript to be downloaded by a user, and extracting the encrypted content of the encrypted manuscript;
step 2-2: according to the voice corresponding to each graph, sequentially disconnecting the graphs according to the arrangement sequence of the images and punctuation marks to obtain encrypted voice;
step 2-3: and converting the encrypted voice into characters by using a voice-character conversion technology to obtain a downloaded manuscript which is used as the manuscript to be downloaded by the user and is sent to the user.
The invention fuses characters, graphs and voice, provides a unique encryption mode, and simultaneously, the contents in the encrypted manuscripts are all displayed in a graph mode, so that when a hacker attacks the database protection method, the contents of the obtained manuscripts are also in a graph mode, and the manuscripts are unreadable and cannot be cracked. Meanwhile, a graphic is associated with only one pronunciation, not a specific character, and thus readability is poor.
Meanwhile, the graph can be obtained by combining the initials, the finals and the tones of the pinyin, so that limited initials, finals and tones can be combined to obtain limited vocalization, and the limited initials, the finals and the tones can correspond to one another and have universality.
As the optimization of the technical scheme, the voice and character conversion technology is divided into three layers of working spaces when working; each layer of workspace implements its corresponding function.
The first layer of working space is used for playing the encrypted voice under a set decibel to enable the encrypted voice to complete the conversion of characters; this layer of workspace performs the basic steps of the system of the present invention.
The second layer of working space adds noise into the encrypted voice after adjusting the encrypted voice to obtain mixed sound; the floor workspace performs the conditioning of the generated sound.
The third layer of working space filters and eliminates the mixed sound; the layer of workspace performs the cancellation of the generated sound.
The system generates directional voice when voice and text are converted, and in order to prevent hackers from monitoring the system beside an operating server of the system, the system adopts a mode of regulating and eliminating groans, so that the hackers cannot acquire manuscript contents in a voice mode.
As the optimization of the above technical solution, when the encrypted voice is adjusted, the method includes the following steps:
step (1): decomposing the encrypted voice to obtain a plurality of sub-voices;
step (2): randomly arranging each sub-voice to obtain a recombined voice;
and (3): and taking the recombined voice as the encrypted voice after the regulation.
The invention recombines the encrypted voice and updates the encrypted voice in a mode of disturbing the broadcasting of the encrypted voice. And simultaneously, adjusting the audio frequency of each sub-voice by different multiples before randomly arranging each sub-voice. Therefore, the voices with different audio frequencies can be obtained, and the higher the audio frequency is, the more harsh the voice is, so that the safety of the manuscript is protected.
The above disclosure is only for a few specific embodiments of the present invention, however, the present invention is not limited to the above embodiments, and any variations that can be made by those skilled in the art are intended to fall within the scope of the present invention.

Claims (10)

1. A full media publishing system, comprising:
the uploading encryption module is used for receiving manuscripts uploaded by a user, encrypting the uploaded manuscripts and storing the encrypted manuscripts in a database;
a database for storing manuscripts and providing access;
the data monitoring module is used for monitoring an access request of any program to the database, starting the identity authentication module and receiving an access permission instruction or an access rejection instruction sent by the identity authentication module when the access request of the program is detected to exist, opening a channel of the database for the program when the access permission instruction is received, and blocking the database for the program when the access rejection instruction is received;
the identity authentication module is used for verifying the user of the program, sending an access permission instruction to the data monitoring module when the user verification of the program is true, and sending an access rejection instruction to the data monitoring module when the user verification of the program is false;
and the download decryption module is used for receiving a download request of a user, extracting manuscripts to be downloaded by the user from the database and decrypting the manuscripts to be downloaded by the user.
2. The full media publishing system as recited in claim 1, wherein the authentication module, when verifying the user of the program, comprises the steps of:
analyzing the program to obtain manuscripts to be accessed by the program;
extracting manuscripts to be accessed by the program from the database, and extracting the manuscript contents of the manuscripts;
extracting a plurality of keywords from the manuscript content, and sequentially arranging and marking serial numbers of the extracted keywords according to the sequence of the extracted keywords in the manuscript content;
displaying a plurality of words to a user, wherein the plurality of words comprise at least one keyword, and receiving a selection of the user;
and judging whether the selection of the user is correct or not, and if so, considering that the user verification of the program is true, otherwise, considering that the user verification of the program is false.
3. The full media publishing system as recited in claim 2, wherein when displaying the plurality of terms to the user, comprising the steps of:
obtaining a plurality of irrelevant words, wherein the irrelevant words are synonyms or near-synonyms of the keywords, and the irrelevant words and the keywords form the words;
randomly acquiring the number of the irrelevant words and the number of the keywords, wherein the number of the keywords is less than the number of the irrelevant words;
randomly selecting the irrelevant words with the number of the irrelevant words, and randomly selecting the keywords with the number of the keywords;
simultaneously displaying the selected irrelevant words and the keywords to a user, and receiving the selection of the user;
and when the words selected by the user are the irrelevant words, the user verification of the program is considered to be false.
4. The full media publishing system as recited in claim 2, wherein when displaying the plurality of terms to the user, comprising the steps of:
obtaining a plurality of irrelevant words, wherein the irrelevant words are synonyms or near-synonyms of the keywords, and the irrelevant words and the keywords form the words;
randomly acquiring the number of the irrelevant words and the number of the keywords, wherein the number of the keywords is larger than the number of the irrelevant words;
randomly selecting the irrelevant words with the number of the irrelevant words, and randomly selecting the keywords with the number of the keywords;
simultaneously displaying the selected irrelevant words and the keywords to a user, and receiving the sequence of the words selected by the user;
when the words selected by the user comprise irrelevant words, the user verification of the program is considered to be false, when the words selected by the user only comprise keywords, the sequence of the sequence numbers corresponding to the keywords is arranged according to the sequence of the keywords selected by the user to obtain a selection number sequence of the user, when the selection number sequence of the user is in a descending sequence or an ascending sequence, the user verification of the program is considered to be true, otherwise, the user verification of the program is considered to be false.
5. The full media publishing system as recited in claim 2, wherein the keywords are displayed graphically.
6. The full media publishing system as recited in claim 1, wherein the upload encryption module, when encrypting the uploaded document, comprises the steps of:
extracting manuscript contents of the uploaded manuscript, and obtaining pronunciation of each character in the manuscript contents by using a character voice conversion technology;
obtaining a corresponding graph according to the pronunciation of the characters, and replacing each character by the corresponding graph;
traversing each character in the manuscript content to obtain an encrypted manuscript, and storing the encrypted manuscript in the database;
the download decryption module, when decrypting the manuscript that the user wants to download, comprises the following steps:
extracting an encrypted manuscript corresponding to a manuscript to be downloaded by a user, and extracting the encrypted content of the encrypted manuscript;
according to the voice corresponding to each graph, sequentially disconnecting the graphs according to the arrangement sequence of the images and punctuation marks to obtain encrypted voice;
and converting the encrypted voice into characters by using a voice-character conversion technology to obtain a downloaded manuscript which is used as the manuscript to be downloaded by the user and is sent to the user.
7. The full media publishing system as recited in claim 6, wherein the phonetic text conversion technique is divided into three layers of working spaces when in operation;
the first layer of working space is used for playing the encrypted voice under a set decibel to enable the encrypted voice to complete the conversion of characters;
the second layer of working space adjusts the encrypted voice and then adds noise to obtain mixed sound;
and the third layer of working space filters and eliminates the mixed sound.
8. The full media publishing system as recited in claim 7, wherein in adjusting the encrypted speech, comprising the steps of:
disassembling the encrypted voice to obtain a plurality of sub-voices;
randomly arranging each sub-voice to obtain a recombined voice;
and taking the recombined voice as the encrypted voice after the regulation.
9. The full media publishing system as recited in claim 8, wherein the audio of each of said sub-voices is adjusted by a different multiple before each of said sub-voices is randomly arranged.
10. The full media publishing system as recited in claim 1, wherein said database has a built-in firewall.
CN202111556039.8A 2021-12-17 2021-12-17 Full-media publishing system Active CN114490963B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111556039.8A CN114490963B (en) 2021-12-17 2021-12-17 Full-media publishing system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111556039.8A CN114490963B (en) 2021-12-17 2021-12-17 Full-media publishing system

Publications (2)

Publication Number Publication Date
CN114490963A true CN114490963A (en) 2022-05-13
CN114490963B CN114490963B (en) 2023-11-24

Family

ID=81493410

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111556039.8A Active CN114490963B (en) 2021-12-17 2021-12-17 Full-media publishing system

Country Status (1)

Country Link
CN (1) CN114490963B (en)

Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20040068763A (en) * 2003-01-27 2004-08-02 (주)한국파워보이스 Computer security method using voice password
FR2891970A1 (en) * 2005-10-07 2007-04-13 Thales Sa METHOD FOR GENERATING A DIGITAL MESSAGE ENCRYPTION KEY FROM A DIGITAL SIGNATURE OF THE PILOT
CN101917441A (en) * 2010-08-25 2010-12-15 北京天智通达信息技术有限公司 Mobile digital publishing system
US20110311042A1 (en) * 2008-10-23 2011-12-22 University Of Ulster Encryption method
US20140205085A1 (en) * 2011-12-30 2014-07-24 Scott Janus Preventing pattern recognition in electronic code book encryption
CN105323073A (en) * 2015-11-16 2016-02-10 腾讯科技(深圳)有限公司 Identity authentication method, identity authentication device and identity authentication system
US20170034131A1 (en) * 2015-07-28 2017-02-02 Todor Yotkov Yotov System and method for encryption of digital content based on a modified one time pad algorithm
US20170302443A1 (en) * 2014-06-18 2017-10-19 James C. Collier Methods and Apparatus for Cryptography
CN107291373A (en) * 2016-04-12 2017-10-24 陈旭 A kind of digital media resource content storage management system
CN107784882A (en) * 2017-09-30 2018-03-09 江苏睿泰数字产业园有限公司 A kind of interactive mode teaching digital publishing system
CN107908946A (en) * 2017-10-27 2018-04-13 链家网(北京)科技有限公司 Method for generating picture verification codes, picture validation code, verification method and device
CN108366072A (en) * 2018-03-06 2018-08-03 中山大学 A kind of cloud storage method for supporting voice encryption to search for
CN109859737A (en) * 2019-03-28 2019-06-07 深圳市升弘创新科技有限公司 Communication encryption method, system and computer readable storage medium
CN110489978A (en) * 2019-07-09 2019-11-22 中国人民解放军国防科技大学 A kind of file encryption-decryption method
CN110851854A (en) * 2019-09-26 2020-02-28 合肥触点传媒有限公司 Image processing method and device for preventing information leakage
CN111737200A (en) * 2020-08-17 2020-10-02 北京人教聚珍图文技术有限公司 Quality control method and system based on open network transmission and output version file
CN113328999A (en) * 2021-05-14 2021-08-31 中国经济信息社有限公司 Data transmission method and device

Patent Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20040068763A (en) * 2003-01-27 2004-08-02 (주)한국파워보이스 Computer security method using voice password
FR2891970A1 (en) * 2005-10-07 2007-04-13 Thales Sa METHOD FOR GENERATING A DIGITAL MESSAGE ENCRYPTION KEY FROM A DIGITAL SIGNATURE OF THE PILOT
US20110311042A1 (en) * 2008-10-23 2011-12-22 University Of Ulster Encryption method
CN101917441A (en) * 2010-08-25 2010-12-15 北京天智通达信息技术有限公司 Mobile digital publishing system
US20140205085A1 (en) * 2011-12-30 2014-07-24 Scott Janus Preventing pattern recognition in electronic code book encryption
US20170302443A1 (en) * 2014-06-18 2017-10-19 James C. Collier Methods and Apparatus for Cryptography
US20170034131A1 (en) * 2015-07-28 2017-02-02 Todor Yotkov Yotov System and method for encryption of digital content based on a modified one time pad algorithm
CN105323073A (en) * 2015-11-16 2016-02-10 腾讯科技(深圳)有限公司 Identity authentication method, identity authentication device and identity authentication system
CN107291373A (en) * 2016-04-12 2017-10-24 陈旭 A kind of digital media resource content storage management system
CN107784882A (en) * 2017-09-30 2018-03-09 江苏睿泰数字产业园有限公司 A kind of interactive mode teaching digital publishing system
CN107908946A (en) * 2017-10-27 2018-04-13 链家网(北京)科技有限公司 Method for generating picture verification codes, picture validation code, verification method and device
CN108366072A (en) * 2018-03-06 2018-08-03 中山大学 A kind of cloud storage method for supporting voice encryption to search for
CN109859737A (en) * 2019-03-28 2019-06-07 深圳市升弘创新科技有限公司 Communication encryption method, system and computer readable storage medium
CN110489978A (en) * 2019-07-09 2019-11-22 中国人民解放军国防科技大学 A kind of file encryption-decryption method
CN110851854A (en) * 2019-09-26 2020-02-28 合肥触点传媒有限公司 Image processing method and device for preventing information leakage
CN111737200A (en) * 2020-08-17 2020-10-02 北京人教聚珍图文技术有限公司 Quality control method and system based on open network transmission and output version file
CN113328999A (en) * 2021-05-14 2021-08-31 中国经济信息社有限公司 Data transmission method and device

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
YALI LIU: "A Method of CT Image Denoising Based on Residual Encoder-Decoder Network", JOURNAL OF HEALTHCARE ENGINEERING, no. 2021 *
戴斌;朱俊星;倪舜谦;陈泰伟;宋明亮;: "全媒体投稿系统的设计与实现", 中国报业, no. 24, pages 75 - 77 *

Also Published As

Publication number Publication date
CN114490963B (en) 2023-11-24

Similar Documents

Publication Publication Date Title
EP3803668B1 (en) Obfuscating information related to personally identifiable information (pii)
US8976008B2 (en) Cross-domain collaborative systems and methods
US20150339788A1 (en) ABSTRACTION LAYER FOR DEFAULT Encryption WITH ORTHOGONAL ENCRYPTION LOGIC SESSION OBJECT AND AUTOMATED AUTHENTICATION with A METHOD FOR ONLINE LITIGATION
US8205081B2 (en) Systems and methods for verifying the authenticity of a remote device
GB2557577A (en) Methods and apparatus for recording a change of authorisation state of one or more authorisation agents
US20150326512A1 (en) Message transmission system and method for a structure of a plurality of organizations
US20140222695A1 (en) Integrated authentication system using electronic contract
WO2014165940A1 (en) A system, method, computer program and data signal for the provision of a profile of identification
JP2009524881A5 (en)
EA026054B1 (en) Method for signing electronic documents with an analog-digital signature with additional verification
CN103098071B (en) The method and apparatus that differentiation to digital document accesses is provided
JP2007265242A (en) File access control device, password setting device, processing instructing device, and file access control method
CA3092611C (en) Secure password management systems, methods and apparatuses
US7219229B2 (en) Protected communication system
CN114490963A (en) All-media publishing system
US11144657B2 (en) System and method of providing a secure inter-domain data management using blockchain technology
JP2010140228A (en) Service providing device, user information management device, user registration management system, user registration method, user information management method, user registration program, and user information management program
CN103414688A (en) Method for loading user security seal in visited page and device thereof
JP2011175578A (en) System and method for data backup
CN106603244B (en) A kind of digital literary property protection method and device
CA3101714C (en) Secure, immutable and verifiable interview records
WO2022225467A1 (en) System and method for creating multi dimension blockchain
GB2540138A (en) Method of exchanging digital content
JP2006011916A (en) Network proofreading method for compilation
EP3662433A1 (en) Communication apparatus and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant