CN114490963A - All-media publishing system - Google Patents
All-media publishing system Download PDFInfo
- Publication number
- CN114490963A CN114490963A CN202111556039.8A CN202111556039A CN114490963A CN 114490963 A CN114490963 A CN 114490963A CN 202111556039 A CN202111556039 A CN 202111556039A CN 114490963 A CN114490963 A CN 114490963A
- Authority
- CN
- China
- Prior art keywords
- user
- manuscript
- keywords
- words
- program
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000012795 verification Methods 0.000 claims abstract description 35
- 238000012544 monitoring process Methods 0.000 claims abstract description 15
- 238000000034 method Methods 0.000 claims description 18
- 238000006243 chemical reaction Methods 0.000 claims description 12
- 230000001174 ascending effect Effects 0.000 claims description 3
- 230000000903 blocking effect Effects 0.000 claims description 3
- 239000000284 extract Substances 0.000 abstract description 3
- 238000012546 transfer Methods 0.000 abstract description 2
- 238000010586 diagram Methods 0.000 description 3
- 238000005457 optimization Methods 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 238000004519 manufacturing process Methods 0.000 description 2
- 238000012552 review Methods 0.000 description 2
- 238000003860 storage Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000019771 cognition Effects 0.000 description 1
- 230000003750 conditioning effect Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000001105 regulatory effect Effects 0.000 description 1
- 238000003892 spreading Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/30—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F16/33—Querying
- G06F16/332—Query formulation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
- G10L13/00—Speech synthesis; Text to speech systems
- G10L13/08—Text analysis or generation of parameters for speech synthesis out of text, e.g. grapheme to phoneme translation, prosody generation or stress or intonation determination
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
- G10L15/00—Speech recognition
- G10L15/26—Speech to text systems
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02P—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
- Y02P90/00—Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
- Y02P90/30—Computing systems specially adapted for manufacturing
Abstract
The invention relates to the field of media publishing, and particularly discloses a full media publishing system which comprises an uploading encryption module, a database, a data monitoring module, an identity verification module and a downloading decryption module. The invention encrypts the manuscript stored on the server in an image mode, extracts the verification of obtaining the manuscript according to the content of the manuscript, allows the manuscript to be obtained after the verification is passed, thereby ensuring the safety of the manuscript, marks the characters according to the pronunciation of the characters, ensures that the pronunciation of each character corresponds to a graph, thereby obtaining the graphs distributed in order, mutually converts the characters and the images in a voice transfer mode when the characters and the images correspond, thereby realizing the consistency of the characters before and after encryption, and ensures that the characters corresponding to the graphs are not unique, namely the manuscript is intercepted and cannot be accurately cracked.
Description
Technical Field
The invention relates to the field of media publishing, in particular to a full media publishing system.
Background
The full media is a general name of a transmission mode taking newspapers, periodicals, televisions, broadcasts, the internet and the like as transmission media, the periodicals are one type of media and are usually oriented to high-end clients to store and record some high-quality manuscripts, and the manuscripts have a characteristic before the periodicals are issued, so that the manuscripts cannot be disclosed by other full media in various forms, and the novelty and integrity of the manuscripts are ensured. The periodical editing work is sequentially performed through a series of work flows of submission, multi-expert peer review, manuscript review, recording and finalizing, production and manufacturing, publishing and spreading and the like, and each work flow needs to be completed by at least one worker. In actual editing, the series of work flows are completed in an online mode, each worker operates the manuscript on line, and after the operation is completed, the manuscript reaches the next work flow, so that the editing work is very convenient and fast by using the online mode, the efficiency of the editing work is effectively improved, however, a server needs to be built in the online mode and the manuscripts are uploaded to the server, and the workers of each work flow operate the manuscripts through the server.
Disclosure of Invention
The present invention is directed to overcome the problems of the prior art described above, and to provide a full media publishing system, which encrypts a manuscript stored in a server in an image manner, extracts a verification of obtaining the manuscript according to the content of the manuscript, and allows the manuscript to be obtained after the verification is passed, thereby ensuring the security of the manuscript.
To this end, the present invention provides a full media publishing system comprising:
the uploading encryption module is used for receiving manuscripts uploaded by a user, encrypting the uploaded manuscripts and storing the encrypted manuscripts in a database;
a database for storing manuscripts and providing access;
the data monitoring module is used for monitoring an access request of any program to the database, starting the identity authentication module and receiving an access permission instruction or an access rejection instruction sent by the identity authentication module when the access request of the program is detected to exist, opening a channel of the database for the program when the access permission instruction is received, and blocking the database for the program when the access rejection instruction is received;
the identity authentication module is used for verifying the user of the program, sending an access permission instruction to the data monitoring module when the user verification of the program is true, and sending an access rejection instruction to the data monitoring module when the user verification of the program is false;
and the download decryption module is used for receiving a download request of a user, extracting manuscripts to be downloaded by the user from the database and decrypting the manuscripts to be downloaded by the user.
Further, when the authentication module word verifies the user of the program, the method comprises the following steps:
analyzing the program to obtain manuscripts to be accessed by the program;
extracting manuscripts to be accessed by the program from the database, and extracting the manuscript contents of the manuscripts;
extracting a plurality of keywords from the manuscript content, and sequentially arranging and marking serial numbers of the extracted keywords according to the sequence of the extracted keywords in the manuscript content;
displaying a plurality of words to a user, wherein the plurality of words comprise at least one keyword, and receiving a selection of the user;
and judging whether the selection of the user is correct or not, and if so, considering that the user verification of the program is true, otherwise, considering that the user verification of the program is false.
Further, when displaying a plurality of words to a user, the method comprises the following steps:
obtaining a plurality of irrelevant words, wherein the irrelevant words are synonyms or near-synonyms of the keywords, and the irrelevant words and the keywords form the words;
randomly acquiring the number of the irrelevant words and the number of the keywords, wherein the number of the keywords is less than the number of the irrelevant words;
randomly selecting the irrelevant words with the number of the irrelevant words, and randomly selecting the keywords with the number of the keywords;
simultaneously displaying the selected irrelevant words and the keywords to a user, and receiving the selection of the user;
and when the words selected by the user are the irrelevant words, the user verification of the program is considered to be false.
Further, when displaying a plurality of words to a user, the method comprises the following steps:
obtaining a plurality of irrelevant words, wherein the irrelevant words are synonyms or near-synonyms of the keywords, and the irrelevant words and the keywords form the words;
randomly acquiring the number of the irrelevant words and the number of the keywords, wherein the number of the keywords is larger than the number of the irrelevant words;
randomly selecting the irrelevant words with the number of the irrelevant words, and randomly selecting the keywords with the number of the keywords;
simultaneously displaying the selected irrelevant words and the keywords to a user, and receiving the sequence of the words selected by the user;
when the words selected by the user comprise irrelevant words, the user verification of the program is considered to be false, when the words selected by the user only comprise keywords, the sequence of the sequence numbers corresponding to the keywords is arranged according to the sequence of the keywords selected by the user to obtain a selection number sequence of the user, when the selection number sequence of the user is in a descending sequence or an ascending sequence, the user verification of the program is considered to be true, otherwise, the user verification of the program is considered to be false.
Further, the keywords are displayed in a graphical display manner.
Further, when the upload encryption module encrypts the uploaded manuscript, the method comprises the following steps:
extracting manuscript contents of the uploaded manuscript, and obtaining pronunciation of each character in the manuscript contents by using a character voice conversion technology;
obtaining a corresponding graph according to the pronunciation of the characters, and replacing each character by the corresponding graph;
traversing each character in the manuscript content to obtain an encrypted manuscript, and storing the encrypted manuscript in the database;
the download decryption module, when decrypting the manuscript that the user wants to download, comprises the following steps:
extracting an encrypted manuscript corresponding to a manuscript to be downloaded by a user, and extracting the encrypted content of the encrypted manuscript;
according to the voice corresponding to each graph, sequentially disconnecting the graphs according to the arrangement sequence of the images and punctuation marks to obtain encrypted voice;
and converting the encrypted voice into characters by using a voice-character conversion technology to obtain a downloaded manuscript which is used as the manuscript to be downloaded by the user and is sent to the user.
Furthermore, the voice and character conversion technology is divided into three layers of working spaces when working;
the first layer of working space is used for playing the encrypted voice under a set decibel to enable the encrypted voice to complete the conversion of characters;
the second layer of working space adds noise into the encrypted voice after adjusting the encrypted voice to obtain mixed sound;
and the third layer of working space filters and eliminates the mixed sound.
Further, when adjusting the encrypted voice, the method comprises the following steps:
disassembling the encrypted voice to obtain a plurality of sub-voices;
randomly arranging each sub-voice to obtain a recombined voice;
and taking the recombined voice as the encrypted voice after the adjustment.
Further, before each of the sub-voices is randomly arranged, the audio frequency of each of the sub-voices is adjusted by different multiples.
Furthermore, a firewall is arranged in the database.
The all-media publishing system provided by the invention has the following beneficial effects:
the invention encrypts the manuscripts stored on the server in an image mode, extracts the verification of obtaining the manuscripts according to the contents of the manuscripts, and allows the manuscripts to be obtained after the verification is passed, thereby ensuring the safety of the manuscripts;
the characters are marked according to the pronunciations of the characters, so that the pronunciations of the characters correspond to one graph, the graphs distributed in order are obtained, the characters and the images are mutually converted in a voice transfer mode when the characters and the images correspond to each other, the consistency of the characters before and after encryption is realized, and the characters corresponding to the graphs are not unique, namely the manuscripts are intercepted and cannot be accurately cracked.
Drawings
FIG. 1 is a schematic block diagram of the overall system connection of the present invention;
FIG. 2 is a schematic block diagram of a flow of a user of the authentication module word check program of the present invention;
FIG. 3 is a block diagram illustrating the process of encrypting and decrypting documents according to the present invention.
Detailed Description
An embodiment of the present invention will be described in detail below with reference to the accompanying drawings, but it should be understood that the scope of the present invention is not limited to the embodiment.
Specifically, as shown in fig. 1 to 3, an embodiment of the present invention provides a full media publishing system, including: the system comprises an uploading encryption module, a database, a data monitoring module, an identity verification module and a downloading decryption module. The invention completes the whole work through the coordination and the coordination among all the modules. The respective modules will be described in detail below.
The uploading encryption module is used for receiving manuscripts uploaded by a user, encrypting the uploaded manuscripts and storing the encrypted manuscripts in a database; the module is a gateway for receiving data and encrypting the data, namely encrypting manuscripts to be stored in the database, and the reason for encrypting is that the database is broken by hackers, and the manuscripts obtained by the hackers are also encrypted, so that the hackers are effectively prevented from obtaining the manuscripts, and the novelty of the manuscripts is ensured.
A database for storing manuscripts and providing access; the database is used as a storage component, has a data storage function and protects the internal storage content, and in the embodiment of the invention, the database is internally provided with a firewall and is protected by using the firewall.
The data monitoring module is used for monitoring an access request of any program to the database, starting the identity authentication module and receiving an access permission instruction or an access rejection instruction sent by the identity authentication module when the access request of the program is detected to exist, opening a channel of the database for the program when the access permission instruction is received, and blocking the database for the program when the access rejection instruction is received; the module is a protection module for the database, detects each program to be accessed to the database, and judges whether to allow the access operation of the program to the database according to the approval of the identity verification module.
The identity authentication module is used for verifying the user of the program, sending an access permission instruction to the data monitoring module when the user verification of the program is true, and sending an access rejection instruction to the data monitoring module when the user verification of the program is false; the module is used for verifying a user who wants to access a program of the database, namely the user who sends the program, and judging whether the identity of the user is legal or not, namely whether the identity of the user is the user operated by the system of the invention or not, if so, the verification is true, otherwise, the verification is false.
And the download decryption module is used for receiving a download request of a user, extracting manuscripts to be downloaded by the user from the database and decrypting the manuscripts to be downloaded by the user. The module provides for the downloading of the user, and decrypts the downloaded encrypted contribution to obtain the original contribution.
The system uploads the processed manuscript when each work flow is finished, encrypts and stores the uploaded manuscript, protects the encrypted manuscript in the database by the protection of the system, decrypts the encrypted manuscript when the manuscript is downloaded in the next work flow, thereby finishing the protection of the file, stores the manuscript in the database in an encrypted form, and obtains the encrypted manuscript which is not readable by a hacker when the database is damaged without protection. Therefore, the invention protects the manuscript from multiple angles, thereby ensuring the novelty of the manuscript.
In the embodiment of the present invention, when the program that needs to access the database is verified, that is, when the user of the program is verified by the authentication module word, the method includes the following steps:
firstly, the method comprises the following steps: analyzing the program to obtain manuscripts to be accessed by the program;
secondly, the method comprises the following steps: extracting manuscripts to be accessed by the program from the database, and extracting the manuscript contents of the manuscripts;
thirdly, the method comprises the following steps: extracting a plurality of keywords from the manuscript content, and sequentially arranging and marking serial numbers of the extracted keywords according to the sequence of the extracted keywords in the manuscript content;
fourthly: displaying a plurality of words to a user, wherein the plurality of words comprise at least one keyword, and receiving a selection of the user;
fifth, the method comprises the following steps: and judging whether the selection of the user is correct or not, and if so, considering that the user verification of the program is true, otherwise, considering that the user verification of the program is false.
When the identity of the user is checked, the content of the manuscript is combined with a checking mode, so that only a worker who knows the content of the manuscript can check the user of the program to be true, the system can prevent personnel except the worker from acquiring the manuscript, and the confidential safety of the manuscript is protected from the perspective of the content of the manuscript.
The embodiment of the invention provides two ways when displaying a plurality of words to a user, which are as follows:
the first method is as follows:
when a plurality of words are displayed to a user, the embodiment of the invention comprises the following steps:
step A1: obtaining a plurality of irrelevant words, wherein the irrelevant words are synonyms or near-synonyms of the keywords, and the irrelevant words and the keywords form the words;
step A2: randomly acquiring the number of the irrelevant words and the number of the keywords, wherein the number of the keywords is less than the number of the irrelevant words;
step A3: randomly selecting the irrelevant words with the number of the irrelevant words, and randomly selecting the keywords with the number of the keywords;
step A4: simultaneously displaying the selected irrelevant words and the keywords to a user, and receiving the selection of the user;
step A5: and when the words selected by the user are the irrelevant words, the user verification of the program is considered to be false.
In the first mode, when the keywords and the irrelevant words are displayed, the keywords and the irrelevant words are displayed to the user at the same time, the selection of the user is received, the irrelevant words are used as confused options, when the keywords are selected by the user, the user is considered to have a good understanding on the contents of the manuscript, and vice versa, generally, the number of the keywords is only one, and therefore the staff can be screened out in such a mode.
The second method comprises the following steps:
when the embodiment of the invention displays a plurality of words to a user, the method comprises the following steps:
step B1: obtaining a plurality of irrelevant words, wherein the irrelevant words are synonyms or near-synonyms of the keywords, and the irrelevant words and the keywords form the words;
step B2: randomly acquiring the number of the irrelevant words and the number of the keywords, wherein the number of the keywords is larger than the number of the irrelevant words;
step B3: randomly selecting the irrelevant words with the number of the irrelevant words, and randomly selecting the keywords with the number of the keywords;
step B4: simultaneously displaying the selected irrelevant words and the keywords to a user, and receiving the sequence of the words selected by the user;
step B5: when the words selected by the user comprise irrelevant words, the user verification of the program is considered to be false, when the words selected by the user only comprise keywords, the sequence of the sequence numbers corresponding to the keywords is arranged according to the sequence of the keywords selected by the user to obtain a selection number sequence of the user, when the selection number sequence of the user is in a descending sequence or an ascending sequence, the user verification of the program is considered to be true, otherwise, the user verification of the program is considered to be false.
In the second mode, when the keyword and the irrelevant word are displayed, the keyword and the irrelevant word are displayed to the user at the same time, the selection of the user is received, the irrelevant word is used as a confused option, the user selects the keyword in the manuscript content in sequence, at the moment, the system checks the user according to the sequence selected by the user, and compared with the first mode, the first mode improves the difficulty and screens out the staff through the cognition and the memory of the manuscript.
As the optimization of the technical scheme, the keywords are displayed in a graphic display mode. The characters can be visually converted through a graphic display mode, so that a hacker cannot accurately obtain the keywords from the logical relationship of the keywords.
In the embodiment of the present invention, when the upload encryption module encrypts the uploaded manuscript, the method includes the following steps:
step 1-1: extracting manuscript contents of the uploaded manuscript, and obtaining pronunciation of each character in the manuscript contents by using a character voice conversion technology;
step 1-2: obtaining a corresponding graph according to the pronunciation of the characters, and replacing each character by the corresponding graph;
step 1-3: traversing each character in the manuscript content to obtain an encrypted manuscript, and storing the encrypted manuscript in the database;
the download decryption module, when decrypting the manuscript that the user wants to download, comprises the following steps:
step 2-1: extracting an encrypted manuscript corresponding to a manuscript to be downloaded by a user, and extracting the encrypted content of the encrypted manuscript;
step 2-2: according to the voice corresponding to each graph, sequentially disconnecting the graphs according to the arrangement sequence of the images and punctuation marks to obtain encrypted voice;
step 2-3: and converting the encrypted voice into characters by using a voice-character conversion technology to obtain a downloaded manuscript which is used as the manuscript to be downloaded by the user and is sent to the user.
The invention fuses characters, graphs and voice, provides a unique encryption mode, and simultaneously, the contents in the encrypted manuscripts are all displayed in a graph mode, so that when a hacker attacks the database protection method, the contents of the obtained manuscripts are also in a graph mode, and the manuscripts are unreadable and cannot be cracked. Meanwhile, a graphic is associated with only one pronunciation, not a specific character, and thus readability is poor.
Meanwhile, the graph can be obtained by combining the initials, the finals and the tones of the pinyin, so that limited initials, finals and tones can be combined to obtain limited vocalization, and the limited initials, the finals and the tones can correspond to one another and have universality.
As the optimization of the technical scheme, the voice and character conversion technology is divided into three layers of working spaces when working; each layer of workspace implements its corresponding function.
The first layer of working space is used for playing the encrypted voice under a set decibel to enable the encrypted voice to complete the conversion of characters; this layer of workspace performs the basic steps of the system of the present invention.
The second layer of working space adds noise into the encrypted voice after adjusting the encrypted voice to obtain mixed sound; the floor workspace performs the conditioning of the generated sound.
The third layer of working space filters and eliminates the mixed sound; the layer of workspace performs the cancellation of the generated sound.
The system generates directional voice when voice and text are converted, and in order to prevent hackers from monitoring the system beside an operating server of the system, the system adopts a mode of regulating and eliminating groans, so that the hackers cannot acquire manuscript contents in a voice mode.
As the optimization of the above technical solution, when the encrypted voice is adjusted, the method includes the following steps:
step (1): decomposing the encrypted voice to obtain a plurality of sub-voices;
step (2): randomly arranging each sub-voice to obtain a recombined voice;
and (3): and taking the recombined voice as the encrypted voice after the regulation.
The invention recombines the encrypted voice and updates the encrypted voice in a mode of disturbing the broadcasting of the encrypted voice. And simultaneously, adjusting the audio frequency of each sub-voice by different multiples before randomly arranging each sub-voice. Therefore, the voices with different audio frequencies can be obtained, and the higher the audio frequency is, the more harsh the voice is, so that the safety of the manuscript is protected.
The above disclosure is only for a few specific embodiments of the present invention, however, the present invention is not limited to the above embodiments, and any variations that can be made by those skilled in the art are intended to fall within the scope of the present invention.
Claims (10)
1. A full media publishing system, comprising:
the uploading encryption module is used for receiving manuscripts uploaded by a user, encrypting the uploaded manuscripts and storing the encrypted manuscripts in a database;
a database for storing manuscripts and providing access;
the data monitoring module is used for monitoring an access request of any program to the database, starting the identity authentication module and receiving an access permission instruction or an access rejection instruction sent by the identity authentication module when the access request of the program is detected to exist, opening a channel of the database for the program when the access permission instruction is received, and blocking the database for the program when the access rejection instruction is received;
the identity authentication module is used for verifying the user of the program, sending an access permission instruction to the data monitoring module when the user verification of the program is true, and sending an access rejection instruction to the data monitoring module when the user verification of the program is false;
and the download decryption module is used for receiving a download request of a user, extracting manuscripts to be downloaded by the user from the database and decrypting the manuscripts to be downloaded by the user.
2. The full media publishing system as recited in claim 1, wherein the authentication module, when verifying the user of the program, comprises the steps of:
analyzing the program to obtain manuscripts to be accessed by the program;
extracting manuscripts to be accessed by the program from the database, and extracting the manuscript contents of the manuscripts;
extracting a plurality of keywords from the manuscript content, and sequentially arranging and marking serial numbers of the extracted keywords according to the sequence of the extracted keywords in the manuscript content;
displaying a plurality of words to a user, wherein the plurality of words comprise at least one keyword, and receiving a selection of the user;
and judging whether the selection of the user is correct or not, and if so, considering that the user verification of the program is true, otherwise, considering that the user verification of the program is false.
3. The full media publishing system as recited in claim 2, wherein when displaying the plurality of terms to the user, comprising the steps of:
obtaining a plurality of irrelevant words, wherein the irrelevant words are synonyms or near-synonyms of the keywords, and the irrelevant words and the keywords form the words;
randomly acquiring the number of the irrelevant words and the number of the keywords, wherein the number of the keywords is less than the number of the irrelevant words;
randomly selecting the irrelevant words with the number of the irrelevant words, and randomly selecting the keywords with the number of the keywords;
simultaneously displaying the selected irrelevant words and the keywords to a user, and receiving the selection of the user;
and when the words selected by the user are the irrelevant words, the user verification of the program is considered to be false.
4. The full media publishing system as recited in claim 2, wherein when displaying the plurality of terms to the user, comprising the steps of:
obtaining a plurality of irrelevant words, wherein the irrelevant words are synonyms or near-synonyms of the keywords, and the irrelevant words and the keywords form the words;
randomly acquiring the number of the irrelevant words and the number of the keywords, wherein the number of the keywords is larger than the number of the irrelevant words;
randomly selecting the irrelevant words with the number of the irrelevant words, and randomly selecting the keywords with the number of the keywords;
simultaneously displaying the selected irrelevant words and the keywords to a user, and receiving the sequence of the words selected by the user;
when the words selected by the user comprise irrelevant words, the user verification of the program is considered to be false, when the words selected by the user only comprise keywords, the sequence of the sequence numbers corresponding to the keywords is arranged according to the sequence of the keywords selected by the user to obtain a selection number sequence of the user, when the selection number sequence of the user is in a descending sequence or an ascending sequence, the user verification of the program is considered to be true, otherwise, the user verification of the program is considered to be false.
5. The full media publishing system as recited in claim 2, wherein the keywords are displayed graphically.
6. The full media publishing system as recited in claim 1, wherein the upload encryption module, when encrypting the uploaded document, comprises the steps of:
extracting manuscript contents of the uploaded manuscript, and obtaining pronunciation of each character in the manuscript contents by using a character voice conversion technology;
obtaining a corresponding graph according to the pronunciation of the characters, and replacing each character by the corresponding graph;
traversing each character in the manuscript content to obtain an encrypted manuscript, and storing the encrypted manuscript in the database;
the download decryption module, when decrypting the manuscript that the user wants to download, comprises the following steps:
extracting an encrypted manuscript corresponding to a manuscript to be downloaded by a user, and extracting the encrypted content of the encrypted manuscript;
according to the voice corresponding to each graph, sequentially disconnecting the graphs according to the arrangement sequence of the images and punctuation marks to obtain encrypted voice;
and converting the encrypted voice into characters by using a voice-character conversion technology to obtain a downloaded manuscript which is used as the manuscript to be downloaded by the user and is sent to the user.
7. The full media publishing system as recited in claim 6, wherein the phonetic text conversion technique is divided into three layers of working spaces when in operation;
the first layer of working space is used for playing the encrypted voice under a set decibel to enable the encrypted voice to complete the conversion of characters;
the second layer of working space adjusts the encrypted voice and then adds noise to obtain mixed sound;
and the third layer of working space filters and eliminates the mixed sound.
8. The full media publishing system as recited in claim 7, wherein in adjusting the encrypted speech, comprising the steps of:
disassembling the encrypted voice to obtain a plurality of sub-voices;
randomly arranging each sub-voice to obtain a recombined voice;
and taking the recombined voice as the encrypted voice after the regulation.
9. The full media publishing system as recited in claim 8, wherein the audio of each of said sub-voices is adjusted by a different multiple before each of said sub-voices is randomly arranged.
10. The full media publishing system as recited in claim 1, wherein said database has a built-in firewall.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111556039.8A CN114490963B (en) | 2021-12-17 | 2021-12-17 | Full-media publishing system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111556039.8A CN114490963B (en) | 2021-12-17 | 2021-12-17 | Full-media publishing system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114490963A true CN114490963A (en) | 2022-05-13 |
CN114490963B CN114490963B (en) | 2023-11-24 |
Family
ID=81493410
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111556039.8A Active CN114490963B (en) | 2021-12-17 | 2021-12-17 | Full-media publishing system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114490963B (en) |
Citations (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20040068763A (en) * | 2003-01-27 | 2004-08-02 | (주)한국파워보이스 | Computer security method using voice password |
FR2891970A1 (en) * | 2005-10-07 | 2007-04-13 | Thales Sa | METHOD FOR GENERATING A DIGITAL MESSAGE ENCRYPTION KEY FROM A DIGITAL SIGNATURE OF THE PILOT |
CN101917441A (en) * | 2010-08-25 | 2010-12-15 | 北京天智通达信息技术有限公司 | Mobile digital publishing system |
US20110311042A1 (en) * | 2008-10-23 | 2011-12-22 | University Of Ulster | Encryption method |
US20140205085A1 (en) * | 2011-12-30 | 2014-07-24 | Scott Janus | Preventing pattern recognition in electronic code book encryption |
CN105323073A (en) * | 2015-11-16 | 2016-02-10 | 腾讯科技(深圳)有限公司 | Identity authentication method, identity authentication device and identity authentication system |
US20170034131A1 (en) * | 2015-07-28 | 2017-02-02 | Todor Yotkov Yotov | System and method for encryption of digital content based on a modified one time pad algorithm |
US20170302443A1 (en) * | 2014-06-18 | 2017-10-19 | James C. Collier | Methods and Apparatus for Cryptography |
CN107291373A (en) * | 2016-04-12 | 2017-10-24 | 陈旭 | A kind of digital media resource content storage management system |
CN107784882A (en) * | 2017-09-30 | 2018-03-09 | 江苏睿泰数字产业园有限公司 | A kind of interactive mode teaching digital publishing system |
CN107908946A (en) * | 2017-10-27 | 2018-04-13 | 链家网(北京)科技有限公司 | Method for generating picture verification codes, picture validation code, verification method and device |
CN108366072A (en) * | 2018-03-06 | 2018-08-03 | 中山大学 | A kind of cloud storage method for supporting voice encryption to search for |
CN109859737A (en) * | 2019-03-28 | 2019-06-07 | 深圳市升弘创新科技有限公司 | Communication encryption method, system and computer readable storage medium |
CN110489978A (en) * | 2019-07-09 | 2019-11-22 | 中国人民解放军国防科技大学 | A kind of file encryption-decryption method |
CN110851854A (en) * | 2019-09-26 | 2020-02-28 | 合肥触点传媒有限公司 | Image processing method and device for preventing information leakage |
CN111737200A (en) * | 2020-08-17 | 2020-10-02 | 北京人教聚珍图文技术有限公司 | Quality control method and system based on open network transmission and output version file |
CN113328999A (en) * | 2021-05-14 | 2021-08-31 | 中国经济信息社有限公司 | Data transmission method and device |
-
2021
- 2021-12-17 CN CN202111556039.8A patent/CN114490963B/en active Active
Patent Citations (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20040068763A (en) * | 2003-01-27 | 2004-08-02 | (주)한국파워보이스 | Computer security method using voice password |
FR2891970A1 (en) * | 2005-10-07 | 2007-04-13 | Thales Sa | METHOD FOR GENERATING A DIGITAL MESSAGE ENCRYPTION KEY FROM A DIGITAL SIGNATURE OF THE PILOT |
US20110311042A1 (en) * | 2008-10-23 | 2011-12-22 | University Of Ulster | Encryption method |
CN101917441A (en) * | 2010-08-25 | 2010-12-15 | 北京天智通达信息技术有限公司 | Mobile digital publishing system |
US20140205085A1 (en) * | 2011-12-30 | 2014-07-24 | Scott Janus | Preventing pattern recognition in electronic code book encryption |
US20170302443A1 (en) * | 2014-06-18 | 2017-10-19 | James C. Collier | Methods and Apparatus for Cryptography |
US20170034131A1 (en) * | 2015-07-28 | 2017-02-02 | Todor Yotkov Yotov | System and method for encryption of digital content based on a modified one time pad algorithm |
CN105323073A (en) * | 2015-11-16 | 2016-02-10 | 腾讯科技(深圳)有限公司 | Identity authentication method, identity authentication device and identity authentication system |
CN107291373A (en) * | 2016-04-12 | 2017-10-24 | 陈旭 | A kind of digital media resource content storage management system |
CN107784882A (en) * | 2017-09-30 | 2018-03-09 | 江苏睿泰数字产业园有限公司 | A kind of interactive mode teaching digital publishing system |
CN107908946A (en) * | 2017-10-27 | 2018-04-13 | 链家网(北京)科技有限公司 | Method for generating picture verification codes, picture validation code, verification method and device |
CN108366072A (en) * | 2018-03-06 | 2018-08-03 | 中山大学 | A kind of cloud storage method for supporting voice encryption to search for |
CN109859737A (en) * | 2019-03-28 | 2019-06-07 | 深圳市升弘创新科技有限公司 | Communication encryption method, system and computer readable storage medium |
CN110489978A (en) * | 2019-07-09 | 2019-11-22 | 中国人民解放军国防科技大学 | A kind of file encryption-decryption method |
CN110851854A (en) * | 2019-09-26 | 2020-02-28 | 合肥触点传媒有限公司 | Image processing method and device for preventing information leakage |
CN111737200A (en) * | 2020-08-17 | 2020-10-02 | 北京人教聚珍图文技术有限公司 | Quality control method and system based on open network transmission and output version file |
CN113328999A (en) * | 2021-05-14 | 2021-08-31 | 中国经济信息社有限公司 | Data transmission method and device |
Non-Patent Citations (2)
Title |
---|
YALI LIU: "A Method of CT Image Denoising Based on Residual Encoder-Decoder Network", JOURNAL OF HEALTHCARE ENGINEERING, no. 2021 * |
戴斌;朱俊星;倪舜谦;陈泰伟;宋明亮;: "全媒体投稿系统的设计与实现", 中国报业, no. 24, pages 75 - 77 * |
Also Published As
Publication number | Publication date |
---|---|
CN114490963B (en) | 2023-11-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3803668B1 (en) | Obfuscating information related to personally identifiable information (pii) | |
US8976008B2 (en) | Cross-domain collaborative systems and methods | |
US20150339788A1 (en) | ABSTRACTION LAYER FOR DEFAULT Encryption WITH ORTHOGONAL ENCRYPTION LOGIC SESSION OBJECT AND AUTOMATED AUTHENTICATION with A METHOD FOR ONLINE LITIGATION | |
US8205081B2 (en) | Systems and methods for verifying the authenticity of a remote device | |
GB2557577A (en) | Methods and apparatus for recording a change of authorisation state of one or more authorisation agents | |
US20150326512A1 (en) | Message transmission system and method for a structure of a plurality of organizations | |
US20140222695A1 (en) | Integrated authentication system using electronic contract | |
WO2014165940A1 (en) | A system, method, computer program and data signal for the provision of a profile of identification | |
JP2009524881A5 (en) | ||
EA026054B1 (en) | Method for signing electronic documents with an analog-digital signature with additional verification | |
CN103098071B (en) | The method and apparatus that differentiation to digital document accesses is provided | |
JP2007265242A (en) | File access control device, password setting device, processing instructing device, and file access control method | |
CA3092611C (en) | Secure password management systems, methods and apparatuses | |
US7219229B2 (en) | Protected communication system | |
CN114490963A (en) | All-media publishing system | |
US11144657B2 (en) | System and method of providing a secure inter-domain data management using blockchain technology | |
JP2010140228A (en) | Service providing device, user information management device, user registration management system, user registration method, user information management method, user registration program, and user information management program | |
CN103414688A (en) | Method for loading user security seal in visited page and device thereof | |
JP2011175578A (en) | System and method for data backup | |
CN106603244B (en) | A kind of digital literary property protection method and device | |
CA3101714C (en) | Secure, immutable and verifiable interview records | |
WO2022225467A1 (en) | System and method for creating multi dimension blockchain | |
GB2540138A (en) | Method of exchanging digital content | |
JP2006011916A (en) | Network proofreading method for compilation | |
EP3662433A1 (en) | Communication apparatus and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |