CN112632596B - Data processing method, device, storage medium and terminal - Google Patents

Data processing method, device, storage medium and terminal Download PDF

Info

Publication number
CN112632596B
CN112632596B CN202010079899.6A CN202010079899A CN112632596B CN 112632596 B CN112632596 B CN 112632596B CN 202010079899 A CN202010079899 A CN 202010079899A CN 112632596 B CN112632596 B CN 112632596B
Authority
CN
China
Prior art keywords
data
editing
field
terminal
data table
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010079899.6A
Other languages
Chinese (zh)
Other versions
CN112632596A (en
Inventor
徐俏云
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN202010079899.6A priority Critical patent/CN112632596B/en
Publication of CN112632596A publication Critical patent/CN112632596A/en
Application granted granted Critical
Publication of CN112632596B publication Critical patent/CN112632596B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Abstract

The embodiment of the application discloses a data processing method, a data processing device, a storage medium and a terminal, wherein the method comprises the following steps: responding to a starting instruction of a terminal for a data table, outputting a data display interface of the data table, displaying first editing content belonging to a target field on the data display interface, wherein an editing user to which the first editing content belongs is the same as a terminal user of the terminal, the target field is a field in a privacy protection state in the data table, and displaying second editing content belonging to the target field on the data display interface in an encrypted manner, wherein the editing user to which the second editing content belongs is different from the terminal user. By the embodiment of the application, the safety of the editing content in the data table can be improved.

Description

Data processing method, device, storage medium and terminal
Technical Field
The present application relates to the field of computer technologies, and in particular, to a data processing method, an apparatus, a storage medium, and a terminal.
Background
With the development of internet technology, applications borne by the internet are increasingly abundant, and an online data table is an important form of internet application. Online spreadsheets are an extension of traditional desktop word processing applications in internet applications, and they gradually eliminate user dependence on processing software.
In the process of using the online data table, a plurality of users can check and edit the same data table, and after a certain user edits the data table, the terminal can synchronize the edited data content to other users, so that the editing efficiency of the data table can be improved. However, the security of the online data table is relatively low, which easily causes leakage of data content in the online data table, and how to improve the security of the online data table is a problem to be solved urgently at present.
Disclosure of Invention
An embodiment of the present application provides a data processing method, an apparatus, a storage medium, and a terminal, which can improve the security of editing contents in a data table.
An embodiment of the present application provides a data processing method, including:
responding to a starting instruction of the terminal for the data table, and outputting a data display interface of the data table;
displaying first editing content belonging to a target field on the data display interface, wherein an editing user to which the first editing content belongs is the same as a terminal user of the terminal, and the target field is a field in a privacy protection state in the data table;
and displaying second editing content belonging to the target field in an encrypted manner on the data display interface, wherein the editing user to which the second editing content belongs is different from the terminal user.
An embodiment of the present application provides a data processing apparatus, including:
the output module is used for responding to a starting instruction of the terminal aiming at the data table and outputting a data display interface of the data table;
the first display module is used for displaying first editing content belonging to a target field on the data display interface, wherein an editing user to which the first editing content belongs is the same as a terminal user of the terminal, and the target field is a field in a privacy protection state in the data table;
and the second display module is used for displaying second editing content belonging to the target field in an encrypted manner on the data display interface, and the editing user to which the second editing content belongs is different from the terminal user.
Optionally, the first display module is specifically configured to perform the step of displaying the second editing content belonging to the target field in an encrypted manner on the data display interface if the terminal has the editing user right for the data table; and if the terminal has the creating user right aiming at the data table, displaying the second editing content on the data display interface.
The output module is further configured to output a privacy protection setting interface in response to a privacy protection setting instruction of the terminal for the data table, where the privacy protection setting interface includes an identifier of the data table and a field in the data table;
the device also includes:
the first determining module is used for setting all fields in the data table to be in a privacy protection state and determining all fields in the data table to be the target fields if the selection operation of the identifier of the data table is detected; and if the selection operation of the fields in the data table is detected, setting the selected fields to be in a privacy protection state, and determining the selected fields to be the target fields.
The device also includes:
the first acquisition module is used for acquiring fields matched with the privacy field library from the data table as first fields;
and the second determining module is used for setting the first field to be in a privacy protection state and determining the first field as the target field if the data table is a table for information collection.
The device also includes:
a second obtaining module, configured to obtain, from the data table, a field adjacent to the first field as a second field;
and the third determining module is used for determining the data table as a table for information collection if the second field belongs to the field of the information collection type.
Optionally, the third determining module includes:
a first obtaining unit, configured to obtain, if the second field belongs to the field of the information collection type, a sequence identifier of the first field in a first table direction and a sequence identifier of the second field in a second table direction, respectively;
a first determining unit, configured to determine that the data table is a table for information collection if the sequence identifier of the first field in the first table direction is the same as the sequence identifier of the second field in the first table direction, or the sequence identifier of the first field in the second table direction is the same as the sequence identifier of the second field in the second table direction.
Optionally, the first display module includes:
the second acquisition unit is used for acquiring the sequence identification of the fields in the data table in the direction of the first table; if the sequence identifications of the fields in the data table in the first table direction are the same, acquiring a table area having an association relation with the terminal user from the first table direction of the data table as a first table area, wherein the association relation is used for indicating that the edited content in the first table area is edited by the terminal user;
the first display unit is used for displaying the editing content located in the first table area on the data display interface, the editing content located in the first table area comprises the first editing content located in the first editing area, and the first editing area is an editing area with the same sequence identification in the second table direction as the sequence identification of the target field in the second table direction in the first table area.
The device also includes:
a fourth determining module, configured to respond to an editing instruction of the terminal for the first table area, use data obtained by executing the editing instruction as editing content located in the first table area;
and the establishing module is used for establishing the association relationship between the sequence identifier of the first table area in the first table direction and the terminal user.
A fourth determining module, configured to execute, if the first table area is not edited, the data obtained by executing the first editing instruction as the editing content of the first table area;
the output module is further configured to output first prompt information if the first table area is edited and the first table area does not have the association relationship with the terminal user, where the first prompt information is used to prompt that the terminal does not have the editing right for the first table area.
The second display module includes:
a third obtaining unit, configured to obtain, from the first table direction of the data table, an edited table area that has no association with the end user, as a second table area;
the second display unit is further configured to encrypt and display the editing content located in the second table area on the data display interface, where the editing content located in the second table area includes the second editing content located in a second editing area, and the second editing area is an editing area where a sequence identifier of the second table area in the second table direction is the same as a sequence identifier of the target field in the second table direction.
The second display unit includes:
the first display subunit is used for displaying the editing content in the second table area in an encrypted manner on the data display interface if the fields in the data table are the target fields;
and the second display subunit is configured to display the editing content of the remaining field on the data display interface if the remaining field is not in the privacy protection state, and encrypt and display the second editing content of the target field on the data display interface, where the remaining field is a field other than the target field in the data table.
And the output module is further used for responding to a viewing instruction of the terminal for the second editing content and outputting second prompt information, wherein the second prompt information is used for prompting that the terminal does not have viewing permission for the second editing content.
One aspect of the present application provides a terminal, including: a processor, a memory, a network interface;
the processor is connected to a memory and a network interface, wherein the network interface is used for providing a data communication function, the memory is used for storing a computer program, and the processor is used for calling the computer program to execute the method in the aspect in the embodiment of the present application.
An aspect of the embodiments of the present application provides a computer-readable storage medium storing a computer program, where the computer program includes program instructions, which, when executed by a processor, perform a method as in the embodiments of the present application.
In the embodiment of the application, the terminal can respond to the starting instruction aiming at the data table, output the data display interface of the data table, and modify or check the edited contents edited by the terminal user by displaying the first edited contents belonging to the target field on the data display interface, namely displaying the edited contents edited by the terminal user on the data display interface; in addition, the second editing content belonging to the target field is displayed on the data display interface in an encrypted manner, namely the editing content which does not belong to the editing of the terminal user is displayed on the data display interface in an encrypted manner, so that the problem that the editing content edited by other editing users is leaked due to the fact that the terminal user views the editing content edited by other editing users can be avoided, and the privacy and the safety of the editing content can be improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1a is a block diagram of a data processing system according to an embodiment of the present application;
FIG. 1b is a block diagram of a data processing system according to an embodiment of the present application;
FIG. 2a is a schematic view of a scenario for setting a data table privacy protection manner according to an embodiment of the present application;
FIG. 2b is a schematic view of a scenario for setting a data table privacy protection manner according to an embodiment of the present application;
FIG. 2c is a schematic view of a scenario for setting a data table privacy protection manner according to an embodiment of the present application;
FIG. 3a is a schematic view of a scenario for setting a data table privacy protection manner according to an embodiment of the present application;
FIG. 3b is a schematic view of a scenario for setting a data table privacy protection manner according to an embodiment of the present application;
fig. 4a is a schematic view of a scenario for editing a data table according to an embodiment of the present application;
fig. 4b is a schematic view of a scenario for editing a data table according to an embodiment of the present application;
fig. 5 is a schematic flowchart of a data processing method according to an embodiment of the present application;
FIG. 6 is a schematic diagram illustrating a scenario in which a privacy preserving state of a field is set according to an embodiment of the present application;
FIG. 7 is a schematic flowchart illustrating editing contents in a display data table according to an embodiment of the present application;
FIG. 8a is a diagram illustrating a sequence identifier of a field in a first table direction according to an embodiment of the present application;
FIG. 8b is a diagram illustrating a sequence identifier of a field in a first table direction according to an embodiment of the present application;
FIG. 9a is a schematic diagram of an output prompt message provided in an embodiment of the present application;
FIG. 9b is a diagram illustrating an output prompt according to an embodiment of the present application;
FIG. 9c is a schematic diagram of an output prompt message provided in an embodiment of the present application;
FIG. 10a is a diagram illustrating editing content in a display data table according to an embodiment of the present application;
FIG. 10b is a diagram illustrating editing content in a display data table according to an embodiment of the present application;
FIG. 11a is a schematic diagram of an output prompt message according to an embodiment of the present application;
FIG. 11b is a diagram illustrating an output prompt according to an embodiment of the present application;
fig. 12 is a schematic structural diagram of a data processing apparatus according to an embodiment of the present application;
fig. 13 is a schematic structural diagram of a terminal according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Referring to fig. 1a and 1b, fig. 1a and 1b are schematic structural diagrams of a data processing system in an embodiment of the present application, where the data processing system includes a creation terminal 10 and a plurality of editing terminals, and three editing terminals are taken as an example in fig. 1a and 1b and are respectively an editing terminal 11, an editing terminal 12, and an editing terminal 13.
Alternatively, the creation terminal 10, the editing terminal 11, the editing terminal 12, and the editing terminal 13 may communicate with each other by connecting to a server. As shown in fig. 1a, each terminal establishes a communication connection with a server 00; when information interaction is needed between every two terminals, the sending terminal is needed to send the information to the server 00, and the server 00 forwards the information to the receiving terminal. That is to say, the server 00 may be used as an intermediate device for performing communication between the terminals, where the server 00 may specifically refer to a background server for processing the data table, and the server 00 may be an independent server, a server cluster composed of several servers, or a cloud computing center. Alternatively, as shown in fig. 1b, the creation terminal 10, the editing terminal 11, the editing terminal 12, and the editing terminal 13 may communicate directly through a network 01, that is, peer-to-peer communication may be implemented between the terminals; that is, when information interaction is required between every two terminals, the sending terminal can directly send the information to the receiving terminal. The creation terminal 10, the editing terminal 11, the editing terminal 12, and the editing terminal 13 may be smart devices such as a smart phone, a tablet computer, a portable personal computer, a smart watch, a bracelet, and a smart television.
The creating terminal 10 may be a terminal for a creating user, and has a creating user right for the data table. The creating user may refer to a user who creates the data table, and the creating user authority may include authority to create the data table, modify the data table, view editing contents in the data table, set a privacy protection mode of the data table, select an editing user who participates in editing the data table, and the like. The data table may include a plurality of fields and each field includes a plurality of edit regions; the fields are used for indicating the subject or the attribute of the editing content in the data table, and the arrangement mode of the fields in the data table can include the arrangement mode of data rows, the arrangement mode of data columns or the mixed arrangement mode. The arrangement mode of the data rows refers to that all fields in the data table are arranged in the same data row, the arrangement mode of the data columns refers to that all fields in the data table are arranged in the same data column, and the mixed arrangement mode refers to that partial fields in the data table are arranged in the same data row and other fields are arranged in the same data column. The edit area may refer to a cell for recording edit contents of a field; the privacy protection mode of the data table comprises the protection of the data table and the protection of partial fields in the data table. Protecting the data table means that all fields in the data table are set to be in a privacy protection state, and each editing user can only view the edited content in the privacy protection mode; protecting partial fields in the data table means that partial fields in the data table are set to be in a privacy protection state, and in the privacy protection mode, each editing user can view the edited content of the editing user and the edited content of other editing users aiming at the fields which are not in the privacy protection state. The editing user who participates in editing the data table may refer to a user who has a relationship chain with the creating user, and the relationship chain may refer to a friend relationship chain, a student relationship chain, a same-affair relationship chain, a relative relationship chain, or the like, which is stored in the creating terminal 10, or stored in the server 00 described above.
The editing terminals 11, 12, and 13 are all terminals for editing users, and have editing user rights for the data table. The editing user may refer to a user who edits the data table, and the editing user right may include an editing right for an editing area in the data table, a viewing right for editing content belonging to the editing user, a modification right, and the like.
In one embodiment, when information of multiple users needs to be collected, the user collecting the information may be called a creating user, and the user providing the information may be called an editing user; the creation terminal 10 may be used to create a data table. Specifically, the creation terminal 10 may output an interface for creating the data table on various user interfaces, which may include, but are not limited to: service pages of applications, web pages, and pages of applets, etc. used to create the data tables. An applet may be an application that can be used without download and installation; the interface may refer to a key or an option. The creating user may invoke the parameter configuration interface by operating the interface, set the parameters of the data table in the parameter configuration interface, and the creating terminal 10 may obtain the parameters set by the creating user from the parameter configuration interface. The parameters may include a user identification of the creating user, a name of the data table, a size of the data table, fields of the data table, a privacy preserving manner of the data table, editing users participating in editing the data table, and so forth. The size of the data table may refer to the number of data lines and the number of data columns of the data table, and the user identifier may refer to a user account logged in to the user interface, and an equipment identifier used by the user (e.g., a mobile phone number, a serial number of a mobile phone, etc.).
For example, the creation terminal 10 may create the data table 1 through a service page or a web page of an application, as shown in fig. 2a, fields in the data table 1 include a name, an identification number, a telephone number, a pickup address, and an accommodation type, and each field is arranged in a data row manner in the 1 st data row in the data table 1. The data sheet 1 further comprises a menu bar, which may be located at the top, bottom or side of the data sheet 1, etc., and fig. 2a illustrates an example in which the menu bar is located at the top of the data sheet 1. The menu bar is used for displaying the basic information of the data sheet 1 and the operation options of the data sheet, and the operation options can include an editing user selection item 14, a sharing option 15, an editing setting option and the like. The editing user option 14 is used to select a plurality of users from the relationship chain of the creating user as editing users, the sharing option 15 is used for the creator to share the data table 1 to the editing users, and the editing setting option may refer to an option for setting the size, type, color of fonts in the data table 1, or an option for accessing images, videos, links or documents (i.e., attachments), and the like. The basic information may include the name of the data table 1, the user identification (or avatar) of the editing user, and so on. The data 1 may also include other non-displayed menus that can be called up by corresponding instructions, such as a content setting menu included in the data table 1. The creating user may call the content setting menu 16 of the data table 1 by voice or touch, and the content setting menu 16 includes a copy option, a paste option, a fill-in setting option, and the like for the edited content. Here, the touch manner may be a click operation on a field or a click operation on an editing area, and the filling of the setting option is an option for calling a content setting submenu. If the creating terminal 10 detects an operation for filling in the setting option, outputting a content setting submenu 17, wherein the content setting submenu 17 comprises a privacy protection setting option and a data verification option; the operation of filling in the option may refer to a touch operation, a cursor operation, a key operation, a voice operation, or the like. The touch operation can be touch click operation, touch press operation or touch slide operation, and the touch operation can be single-point touch operation or multi-point touch operation; the cursor operation can be an operation of controlling a cursor to click or an operation of controlling the cursor to press; the key operation may be a virtual key operation or a physical key operation, etc. The data verification option is used to verify whether the edited content edited in the data table 1 is valid data, and the privacy protection setting option is used to invoke the privacy protection setting interface 18. As shown in fig. 2b, if the creation terminal 10 detects a selection operation for the privacy protection setting option, the privacy protection setting interface 18 is output; the privacy protection setting interface 18 is used to set the privacy protection mode of the data table 1, and the privacy protection setting interface 18 may include an identifier of the data table 1 (i.e., the data table 1), one or more fields in the data table 1 (or sequence identifiers of the respective fields), and a cancel privacy protection option. The sequence identification of the field may include a data row identification or a data column identification, and the sequence identification of the field may be formed by at least one of letters, numbers, symbols, and the like, for indicating which data row or column the field is located in. If the sequence is identified as a B column, it is used to indicate the field (i.e., the identification number) located in the B column. If the creating terminal 10 detects a selection operation of the creating user for the identification of the data table 1, indicating that the creating user wishes to protect the data table 1, the fields in the data table 1 may each be set to the privacy-protected state. The creation terminal 10 may mark the data table 1 with a mark 19, and the mark 19 may be used to indicate that the fields of the data table 1 are all in a privacy protection state. The marker 19 is at the bottom of the data table 1 as in fig. 2b, but the marker 19 may of course be located elsewhere in the data table 1, e.g. in a menu bar. The mark 19 in fig. 2b is a shield pattern, but the mark 19 may be formed of at least one of other patterns, characters, symbols, and the like. If the creating terminal detects a selection operation of the creating user for a field in the privacy protection setting interface 18, indicating that the creating user wishes to protect a certain row or a certain column of the data table, the selected field is set to the privacy protection state. As in fig. 2c, if a selection operation of the creating user on the field-identity number is detected, the field-identity number may be set to the privacy-protected state, and similarly, if a selection operation of the creating user on the field-phone number is detected, the field-phone number may be set to the privacy-protected state. Further, the field-identification number and the field-telephone number may be marked with a mark 20, respectively, where the mark 20 is used to indicate that the field-identification number and the field-telephone number are in the privacy protection state. The mark 20 may be the same as or different from the mark 19, and the present application is not limited thereto. It should be noted that the creating user may cancel the privacy protection of the field by operating on the cancel privacy protection option.
For another example, the creation terminal 10 may create the data table 2 through a page of an applet, as shown in fig. 3a, fields in the data table 2 include a name, an identification number, a telephone number, a pickup address, and a housing type, and the fields are arranged in a data line manner in the 1 st data line in the data table 2. The data table 2 may include a plurality of menus, and the creator may call each menu by operating on the data table. As in fig. 3a, the creation terminal 10 detects a click operation of the creation user on a field of the data table 2, and outputs the content setting menu 21 of the data table 2, the content setting menu 21 including a copy option, a paste option, a column operation option, and the like for editing content, the column operation option being used to call a content setting submenu. If the creation terminal 10 detects a selection operation for the column operation option, the content setting submenu 22 is output, and the content setting submenu 22 includes a privacy protection setting option, a hidden data row option, a hidden data column option, and the like. If the creating terminal detects the selection operation of the creating user for the privacy protection setting option, the privacy protection setting interface 23 is output, and the privacy protection setting interface 23 may include the identification of the data table 2 (i.e., the data table 2), the field in the data table 2, and the cancel privacy protection option. If the creating terminal detects that the creating user selects the fields in the data table 2, which indicates that the creating user wishes to protect a certain row or a certain column of the data table, the selected fields are set to the privacy protection state. As shown in fig. 3a, if a selection operation of the creation user on the field-identity number is detected, the field-identity number may be set to a privacy protection state, and similarly, if a selection operation of the creation user on the field-phone number is detected, the field-phone number may be set to a privacy protection state. Further, the field-identification number and the field-telephone number may be marked with a mark 24, respectively, where the mark 24 is used to indicate that the field-identification number and the field-telephone number are in the privacy protection state. As shown in fig. 3b, if the creating terminal 10 detects a selection operation of the creating user for the identification of the data table 2, indicating that the creating user wishes to protect the data table 2, the fields in the data table 2 may each be set to the privacy-protected state. The creation terminal 10 may tag the data table 2 with a tag 25, and the tag 25 may be used to indicate that the fields of the data 25 are all in a privacy-preserving state.
After the creation terminal 10 creates the data table 1 or the data table 2, the data table 1 or the data table 2 can be sent to the server 00, and the server 00 forwards the data table 1 or the data table 2 to each editing terminal; alternatively, the creation terminal 10 may directly transmit the data table 1 or the data table 2 to each editing terminal; in the following, the creation terminal 10 directly transmits the data table 1 to each editing terminal is taken as an example. After receiving the data table 1, each editing terminal can edit the data table 1 through an application program, a web page or an applet. Assuming that the terminal user corresponding to the editing terminal 11 is the user 1, that is, the editing user corresponding to the editing terminal 11 is the user 1, the user 1 may edit the data table 1 through an application program or a web page of the editing terminal 11. As shown in fig. 4a, after receiving the data table 1, the editing terminal 11 may output a data display interface of the data table 1, where the data display interface includes the data table 1, and the user 1 may edit an unedited editing area in the data table 1 to obtain an editing content. As shown in fig. 4a, if the editing terminal 11 detects an editing operation of the user 1 on the second data line in the data table 1, the edited content is recorded in the second data line in the data table 1. In this case, the editing terminal 11 may synchronize the edited content edited by the user 1 with another editing terminal, and the other editing terminal may synchronize the edited content edited by the other user with the editing terminal 11. Assuming that the editing user corresponding to the editing terminal 12 is the user 2 and the editing user corresponding to the editing terminal 13 is the user 3, if the editing terminal 12 detects the editing operation of the user 2 on the third data line in the data table 1, the edited content is recorded in the third data line in the data table 1. If the editing terminal 12 detects an editing operation of the user 3 on the fourth data line in the data table 1, the edited contents are recorded in the fourth data line in the data table 1. After the editing terminal 12 and the editing terminal 13 acquire the editing content, the encrypted data of the editing content of the field in the privacy protection state may be transmitted to the editing terminal 11, and the editing content of the field not in the privacy protection state may be transmitted to the editing terminal 11. After receiving the data transmitted by each editing terminal, the editing terminal 11 may record the data transmitted by the editing terminal 12 in the third data line of the data table 1, and record the data transmitted by the editing terminal 13 in the fourth data line of the data table 1. As shown in fig. 4a, if some fields in the data table 1 are in the privacy protection state, such as fields-id number and fields-phone number are in the privacy protection state, the editing terminal 11 may display the edited content edited by the user 1 on the data display interface, display the encrypted data of id numbers and phone numbers of the users 2 and 3 on the data display interface, and display the edited content of the fields (i.e., field name, delivery address and accommodation type) that are not in the privacy protection state in the edited content edited by the users 2 and 3 on the data display interface. Alternatively, the editing terminals 12 and 13 may send the edited content edited by the corresponding editing user to the editing terminal 11, and the editing terminal 11 may encrypt and display the target edited content in the privacy protection state on the data display interface, where the target edited content is obtained by editing the field in the privacy protection state by the users 2 and 3. Similarly, if the data table 1 is in the privacy protection state, that is, the fields of the data table 1 are all in the privacy protection state, as shown in fig. 4b, the editing terminal 11 may display the edited content edited by the user 1 on the data display interface, and encrypt and display the edited content edited by the user 2 and the user 3 on the data display interface; therefore, the private data of the user can be prevented from being leaked, and the safety of the edited content in the data table is improved. The specific implementation manner of the editing terminal on the data table editing operation on the applet may refer to the specific implementation manner of the editing terminal 11 on the data table 1 editing operation on the application program or the web page, and repeated details are not repeated.
Based on the above description, please refer to fig. 5, which is a flowchart illustrating a data processing method according to an embodiment of the present application. The method may be performed by a terminal, which may refer to the editing terminal in fig. 1a or fig. 1b, as shown in fig. 5, and the method may include:
and S101, responding to a starting instruction of the terminal for the data table, and outputting a data display interface of the data table.
The user interface of the terminal can comprise attribute information of the data table, the attribute information can comprise an icon, an identifier, a link and the like of the data table, if the selection operation aiming at the attribute information is detected, the starting instruction aiming at the data table is determined to be received, and the data display interface of the data is output. The data presentation interface may be used to present relevant data in the data table, which may include edit content, fields, user identifications of editing users participating in editing the data table, user identifications of creating users, and so on.
S102, displaying first editing content belonging to a target field on the data display interface, wherein an editing user to which the first editing content belongs is the same as a terminal user of the terminal, and the target field is a field in a privacy protection state in the data table.
S103, encrypting and displaying second editing content belonging to the target field on the data display interface, wherein the editing user to which the second editing content belongs is different from the terminal user.
In steps S102 to S103, first, the terminal may obtain a field in the data table in the privacy protection state as a target field; specifically, the terminal may determine the target field according to the privacy protection information, that is, may obtain the privacy protection information from the creating terminal, where the privacy protection information is used to indicate a privacy protection manner of the data table, and the privacy protection manner includes protecting the data table or protecting one or more fields in the data table. And if the protection mode of the data table is to protect the data table, determining that all fields in the data table are in a privacy protection state, and taking all fields in the data table as target fields. If the protection mode of the data table is to protect one field or a plurality of fields in the data table, taking the protected field as a target field; that is, at this time, part of the fields in the data table are in the privacy protection state, that is, the data table further includes the remaining fields that are not in the privacy protection state, and the remaining fields are fields other than the target fields in the data table. Optionally, the terminal may determine the target field according to the flag of the data table; if the terminal detects that the data table has the label 19 in fig. 2b or the label 25 in fig. 3b, and determines that the fields in the data table are in the privacy protection state, the fields in the data table can be determined as the target fields. If the terminal detects that the field of the data table has the tag 20 in fig. 2c or has the tag 24 in fig. 3a, determining that the field having the tag 20 or the tag 24 is in the privacy-protected state as the target field; that is, at this time, part of the fields in the data table are in the privacy-protected state, that is, the remaining fields that are not in the privacy-protected state are also included in the data table.
After the terminal acquires the target field, if the fields in the data table are all the target fields, the terminal may acquire the editing content having an association relationship with the terminal user from the data table as the first editing content, and acquire the editing content having no association relationship with the terminal user as the second editing content. The edited content having an association relationship with the terminal user refers to the edited content edited by the terminal user, and therefore, the edited user to which the first edited content belongs is the same as the terminal user of the terminal, that is, the first edited content belongs to the edited content edited by the terminal user. The edited content which has no association relation with the terminal user refers to the edited content which is not edited by the terminal user, so that the edited user to which the second edited content belongs is different from the terminal user, namely the second edited content does not belong to the edited content obtained by the terminal user; the end user refers to the user currently using the terminal. After the terminal acquires the first editing content and the second editing content, the first editing content can be displayed on the data display interface, and the second editing content can be displayed on the data display interface in an encrypted manner; that is, the edited content edited by the end user can be displayed on the data display interface, and the edited content edited by the end user in the data table is displayed in an encrypted manner on the data display interface. The terminal is beneficial to the terminal user to verify or modify the edited content by displaying the edited content edited by the terminal user; the terminal displays the edited content which does not belong to the terminal user through encryption, and the privacy of the edited content can be improved.
Optionally, if the data table includes the remaining fields that are not in the privacy protection state, the terminal may obtain, from the editing content belonging to the target field, the editing content having an association relationship with the terminal user as the first editing content, and obtain, from the editing content belonging to the target field, the editing content having no association relationship with the terminal user as the second editing content. After the terminal acquires the first editing content and the second editing content, the terminal can display the first editing content belonging to the target field on the data display interface, encrypt and display the second editing content belonging to the target field on the data display interface, and display the editing content belonging to the remaining field on the data display interface, wherein editing users to which the editing content of the remaining field belongs include the terminal user and other terminal users. The terminal is beneficial to the terminal user to check or modify the edited content by displaying the first edited content belonging to the target field; the terminal displays the second editing content belonging to the target field through encryption, and therefore privacy of the editing content can be improved. In addition, by displaying the editing contents belonging to the remaining fields, information intercommunication of all editing users is facilitated, and communication efficiency among all editing users is improved.
The terminal encrypts and displays second editing content belonging to the target field on the data display interface, and the method comprises the following steps: and encrypting the second editing content by adopting an encryption algorithm to obtain encrypted data, and displaying the encrypted data on a data display interface. The encryption algorithm here may include, but is not limited to: a symmetric algorithm (DES), a Hash algorithm, an Elgamal algorithm (an asymmetric Encryption algorithm), a Rabin algorithm (an asymmetric Encryption algorithm), a Diffie-Hellman algorithm (an asymmetric Encryption algorithm), and an ECC algorithm (elliptic curve Encryption algorithm). Optionally, the terminal may hide and display the second editing content, that is, replace the second editing content with a character unrelated to the second editing content, and display the character on the data display interface. Characters may include, but are not limited to: #, -,%, etc. As shown in fig. 4a, the second edited content may be the id numbers of the user 2 and the user 3, and the terminal may display the id numbers of the user 2 and the user 3 as: ****. Or the terminal can hide and display the key information of the second editing content and display the non-key information in the second editing content on the data display interface. For example, the target field is an identity card number, the second editing content is an identity card number of the editing user, the key information of the second editing content may refer to data for indicating the birth date of the editing user, and the non-key information may refer to data in the second editing content except the key information. Assuming that the second edited content is 500234199112251234, the second edited content may be displayed encrypted as: 500234********1234.
In the embodiment of the application, the terminal can respond to the starting instruction aiming at the data table, output the data display interface of the data table, and modify or check the edited contents edited by the terminal user by displaying the first edited contents belonging to the target field on the data display interface, namely displaying the edited contents edited by the terminal user on the data display interface; in addition, the second editing content belonging to the target field is displayed on the data display interface in an encrypted manner, namely the editing content which does not belong to the editing of the terminal user is displayed on the data display interface in an encrypted manner, so that the problem that the editing content edited by other editing users is leaked due to the fact that the terminal user views the editing content edited by other editing users can be avoided, and the privacy and the safety of the editing content can be improved.
In one embodiment, the method further comprises: if the terminal has the authority of the editing user for the data table, step S103 is executed. And if the terminal has the creating user right aiming at the data table, displaying the second editing content on the data display interface.
The starting instruction carries a user identifier, and the authority of the terminal can be verified according to the user identifier. Specifically, if the user identifier carried in the start instruction is an identifier of an editing user, that is, the terminal user is an editing user, it is determined that the terminal has an editing user right for the data table, that is, the editing user has a right to check the edited content edited by the terminal user, so that the terminal can encrypt and display the second edited content on the data display interface. If the user identifier carried in the start instruction is the identifier of the creating user, that is, the terminal user is the creating user, it is determined that the terminal has the creating user authority for the data table, that is, the creating user has the editing content edited by each editing user, so that the terminal can display the second editing content on the data display interface.
In this embodiment, the terminal has the right to create the data table, and the method further includes the following steps s 11-s 13.
s11, responding to the privacy protection setting instruction of the terminal for the data table, outputting a privacy protection setting interface, wherein the privacy protection setting interface comprises the identification of the data table and the field in the data table.
s12, if the selection operation of the identification of the data table is detected, setting all the fields in the data table to be in the privacy protection state, and determining all the fields in the data table to be the target fields.
s13, if the selection operation of the field in the data table is detected, setting the selected field to be in the privacy protection state, and determining the selected field as the target field.
In steps s11 to s13, the terminal may set the privacy securing manner of the data table according to the operation of the creating user. Specifically, the creating user can send a privacy protection setting instruction for the data table to the terminal in a voice mode, a touch mode and the like, after the terminal receives the privacy protection setting instruction, the terminal can output a privacy protection setting interface, the privacy protection setting interface is used for setting a privacy protection mode of the data table, and the privacy protection setting interface comprises an identifier of the data table and a field in the data table. And if the selection operation of the identifier of the data table is detected, which indicates that the creating user wishes to protect the data table, setting all the fields in the data table to be in a privacy protection state, and determining all the fields in the data table to be the target fields. If the selection operation of the fields in the data table is detected, the creation user is indicated to wish to protect partial fields in the data table, the selected fields are set to be in a privacy protection state, and the selected fields are determined to be the target fields; the selected field may be one or more. Specific implementation manners of setting the privacy protection manner of the data table may refer to fig. 2a to fig. 3b, and are not repeated.
Optionally, the terminal has a user right for creating the data table, and the method may further include the following steps s21 and s 22.
s21, obtaining the field matching the privacy field bank from the data table as the first field.
s22, if the data table is a table for information collection, setting the first field to be in a privacy protection state, and determining the first field as the target field.
In steps s 21-s 22, the terminal may automatically identify fields that require privacy protection. Specifically, the terminal may obtain, as the first field, a field matching the privacy field library from the data table, where the privacy field library includes at least one privacy field, such as fields including an identification number, an age, a phone number, and the like. Further, whether the data table is a table for information collection can be verified according to the name of the data table and fields in the data table, if so, the data table is indicated to require a plurality of editing users to participate in editing, therefore, the first field is set to be in a privacy protection state, and the first field is determined to be a target field. If not, the data table does not need a plurality of editing users to participate in editing, so that privacy protection is not needed to be carried out on the data table, and the process can be ended.
Optionally, the method may further comprise steps s31 and s32 as follows.
s31, obtaining the field adjacent to the first field from the data table as the second field;
s32, if the second field belongs to the field of the information collection type, determining the data table as the table for information collection.
In steps s31 and s32, the terminal may obtain, as the second field, a field adjacent to the first field from the data table, where the field adjacent to the first field may refer to one or more fields located above, below, to the right, or to the left of the first field. And if the second field belongs to the field of the information collection type, indicating that the data table is an information collection data table, determining that the data table is a table for information collection of the user. The field of the information collection type refers to a field for indicating that the data table is an information collection data table, and may include fields of name, XX name, quantity, price, and the like.
Alternatively, step s32 may include steps s41 and s42 as follows.
s41, if the second field belongs to the field of the information collection type, obtaining the sequence identification of the first field and the second field in the first table direction and the sequence identification in the second table direction respectively.
s42, if the sequence id of the first field in the first table direction is the same as the sequence id of the second field in the first table direction, or the sequence id of the first field in the second table direction is the same as the sequence id of the second field in the second table direction, determining the data table as a table for information collection.
In steps s41 and s42, if the second field belongs to the field of the information collection type, the sequence identifier of the first field and the sequence identifier of the second field in the first table direction and the sequence identifier in the second table direction are obtained respectively. The first tabular direction may refer to a data row direction of the data table, and the second tabular manner may refer to a data column direction of the data table. Alternatively, the first table direction may refer to a data column direction of the data table, the second table manner may refer to a data row direction of the data table, and the sequence identifier may be a number or a name of a data row or a data column. And if the sequence identification of the first field in the first table direction is the same as the sequence identification of the second field in the first table direction, or the sequence identification of the first field in the second table direction is the same as the sequence identification of the second field in the second table direction, determining the data table as a table for information collection.
Optionally, as shown in fig. 6, creating the privacy protection state of the terminal automatic setting field may specifically include the following steps s43 to s 49.
s43, obtaining the field matching the privacy field bank from the data table as the first field.
s44, determining whether the data table includes a field adjacent to the first field, if yes, executing step s46, and if no, executing step s 45.
s45, determining that the data sheet is not a sheet for information collection.
s46, using the field adjacent to the first field as the second field, judging whether the second field belongs to the field of the information type, if not, executing the step s 45; if so, step s47 is performed.
s47, judging whether the sequence identifier of the first field in the first table direction is the same as the sequence identifier of the second field in the first table direction, if not, executing step s 48; if so, step s49 is performed.
s48, judging whether the sequence identifier of the first field in the second table direction is the same as the sequence identifier of the second field in the second table direction, if not, executing step s 45; if so, step s49 is performed.
In steps s 43-s 49, as shown in FIG. 6, assume that the data table is data 2, the first table direction is the data row direction of the data table, and the second table direction is the data column direction of the data table. The terminal can compare fields in the data table 2 with fields in a privacy field library, the privacy field library comprises fields of identification numbers, ages, telephone numbers and the like, if the fields in the data table 2 are not matched with the fields in the privacy field library, the data table 2 is determined not to be an information collection data table, and privacy protection is not needed. If the field-identification number and the field-telephone number in the data table 2 are respectively matched with the fields in the privacy field library, the field-identification number and the field-telephone number are used as the first fields. Then, it is determined whether a field adjacent to the first field is included in the data table 2, and if the field adjacent to the first field is not included, it indicates that the data table 2 is not an information collection data table, that is, it is determined that the data table 2 is not a table for information collection by the user. If the data table 2 comprises fields adjacent to the first field, such as field-name and field delivery address, the field adjacent to the first field is used as a second field; and judging whether the second field belongs to the field of the information type, if not, indicating that the data table 2 is not a table for information collection by the user, namely, the data table 2 does not need to be subjected to privacy protection. If so, judging whether the sequence identification of the first field in the first table direction is the same as the sequence identification of the second field in the first table direction, and if so, setting the first field to be in a privacy protection state, namely setting the field-identity card number and the field-telephone number to be in the privacy protection state. If the sequence identification of the first field in the first table direction is not the same as the sequence identification of the second field in the first table direction, whether the sequence identification of the first field in the second table direction is the same as the sequence identification of the second field in the second table direction can be judged, and if so, the first field is set to be in a privacy protection state. If the data table 2 is not the same, the data table 2 is not a table for information collection by the user, that is, privacy protection for the data table 2 is not required.
Data table a:
identity card number
Data table b:
numbering Name (I) Sex Identity card number Size of
Data table c:
name (I)
Identity card number
Sex
Size of
For another example, assuming that the first field is an identification number, if the data table is a data table a which does not have a field adjacent to the first field, it is determined that the data table a is not a table for information collection by the user, that is, privacy protection is not required for the data table a. If the data table is a data table b, and the field-name and the field-identity number are both located in the same data row in the data table b, namely the sequence identification of the first field in the first table direction is the same as the sequence identification of the second field in the first direction, determining that the data table is a table for information collection; the first field is set to a privacy preserving state. Assuming that the data table is a data table c, and the field-name and the field-identity number are both located in the same data column in the data table c, that is, the sequence identifier of the first field in the second table direction is the same as the sequence identifier of the second field in the second direction, the data table is determined to be a table for information collection, and the first field is set to be in a privacy protection state. If the data table is a data table d, and the field-name and the field-identity number are both located in different data columns and different data columns in the data table d, that is, the sequence identification of the first field in the second table direction is different from the sequence identification of the second field in the second direction, and the sequence identification of the first field in the first table direction is different from the sequence identification of the second field in the first direction, it is determined that the data table is not a table for information collection, and privacy protection is not required to be performed on the data table.
The sequence identification of the fields in the data table in the first table direction and the sequence identification of the fields in the second table direction may be automatically generated when the data table is created, that is, the sequence identification of the fields in the first table direction may be the data row identification of the fields, and the sequence identification of the fields in the second table direction may be the data column identification of the fields. Alternatively, the sequence identification of the fields in the data table in the first table direction and the sequence identification in the second table direction may be created manually by the user.
Data table d:
name (I)
Sex Identity card number
Size of
Optionally, the terminal has an editing user right for the data table, and the step S102 includes the following steps S51-S53.
s51, obtaining the sequence identification of the fields in the data table in the first table direction.
s52, if the sequence identifiers of the fields in the data table in the first table direction are all the same, obtaining a table area having an association relationship with the end user from the first table direction of the data table as the first table area, where the association relationship is used to indicate that the edited content located in the first table area is edited by the end user.
s53, displaying the editing content located in the first table area on the data presentation interface, where the editing content located in the first table area includes the first editing content located in a first editing area, and the first editing area is an editing area in the first table area, where the sequence identifier in the second table direction is the same as the sequence identifier of the target field in the second table direction.
In steps s51-s53, the terminal may obtain the sequence identifiers of the fields in the data table in the first table direction, and if the sequence identifiers of the fields in the data table in the first table direction are all the same, this indicates that the fields in the data table are located in the same data row or the same data column, and the edited contents edited by each editing user are arranged in the manner of data row or in the manner of data column. Therefore, the terminal can acquire the table area having the association relation with the terminal user from the first table direction of the data table, and display the edited content in the first table area on the data display interface.
Optionally, the terminal has an editing user authority for the data table, and the step S102 includes the following steps S551 to S558.
And s551, the terminal detects that the terminal user accesses the data table.
s552, determining whether the data table starts privacy protection, if not, executing step s 553; if so, step s554 is performed.
And s553, checking all editorial contents in the data table.
s554, judging whether the privacy protection mode of the data table is to protect the data table or to protect the target field, and if so, executing the step s 555; if the protection target field is present, step s556 is executed.
s555, judging whether the sequence identifiers of the fields in the data table in the first table direction are the same, if so, executing s 557; if not, go to step s 553.
s556, determining whether the sequence identifier of the target field in the first table direction is the same as the sequence identifiers of the remaining fields in the first table direction, if so, executing step s 557; if not, go to step s 553.
s557, obtaining a table region having an association relationship with the end user from the first table direction of the data table as a first table region.
And s558, displaying the editing content in the first table area on the data display interface.
In steps s551-s558, when the end user wants to access the data table, the terminal may verify whether the data table is turned on privacy protection according to the flag of the data table, and if the data table is not turned on privacy protection, indicating that the data table is not set in the privacy protection mode, the terminal may display all editorial contents in the data table on the data presentation interface. If the data table has the opened privacy protection, which indicates that the data table is set in the privacy protection mode, the terminal may obtain the privacy protection mode of the data table, where the privacy protection mode includes protecting the data table or protecting partial fields in the data table. If the privacy protection mode of the data table is to protect the data table, the terminal can obtain the sequence identification of each field in the data table in the first direction. If the sequence identifications of all fields in the data table in the first direction are the same, a table area which is in an association relationship with the terminal user is obtained from the first table direction of the data table to serve as a first table area, the edited content in the first table area is displayed on the data display interface, and the edited content outside the first table area is displayed on the data display interface in an encrypted manner. If the privacy protection mode of the data table is to protect partial fields in the data table, and the protected fields are target fields, the terminal can obtain the sequence identifiers of the remaining fields and the target fields in the data table in the first table direction, and the remaining fields are fields in the data table except the target fields. If the sequence identification of the residual field in the first table direction is the same as the sequence identification of the target field in the first table direction, a table area which is associated with the terminal user is obtained from the first table direction of the data table to be used as a first table area, the editing content in the first table area is displayed on the data display interface, the second editing content belonging to the target field is displayed on the data display interface in an encrypted manner, and the editing content belonging to the residual field and not belonging to the terminal user is displayed on the data display interface.
For example, assuming the first table direction is the data row direction of the data table, as shown in FIG. 8a, the end user is user 1, the destination field includes the identification number and telephone number, and the remaining fields include the name, pickup address, and housing type. As can be seen from fig. 8a, the remaining field and the target field are both located in the first data row of data table 1, and the sequence identifier of the data row direction may be 1, that is, the sequence identifier of the remaining field in the data row direction is the same as the sequence identifier of the target field in the data row. Therefore, it can be determined that the editing contents of each editing user in the data table 1 are arranged in the data row. The terminal can obtain the mapping table 1 from the creation terminal, obtain the data row having an association relation with the user 1 from the data table according to the mapping table 1, that is, obtain the data row associated with the user 1 as a second data row, and display the editing content located in the second data row on the data display interface. The first table area refers to a cell in the second data row in the data table 1, the identification number and the telephone number belonging to the user 1 are first editing contents, and the first editing area comprises a second data column of the second data row and a third data column of the second data row. The mapping table 1 is used for recording the association relationship between editing users and data rows, and the mapping table 1 indicates that the user 1 is associated with a second data row, the user 2 is associated with a third data row, and the user 3 is associated with a fourth data row; the mapping table 1 may be generated by the creating terminal.
For another example, assuming that the first table direction is the data column direction of the data table, as shown in fig. 8b, the data table is data table 3, the end user is user 1, the destination field includes the identification number and the telephone number, and the remaining fields include the name, the delivery address, and the housing type. As can be seen from fig. 8b, both the remaining field and the target field are located in the first data column (i.e. column a) of data table 1, i.e. the sequence identifier of the data row may be a, i.e. the sequence identifier of the remaining field in the direction of the data column is the same as the sequence identifier of the target field in the data column. Therefore, it can be determined that the editing contents of each editing user in the data table 1 are arranged in a data column. The terminal can obtain the mapping table 2 from the creation terminal, obtain the data column having an association relation with the user 1 from the data table according to the mapping table 2, that is, obtain the second data column of the data behavior associated with the user 1, and display the editing content located in the data column on the data display interface. The first table area refers to a cell in the second data column in the data table 1, the identification number and the telephone number belonging to the user 1 are first editing contents, and the first editing area comprises a second data row of the second data column and a third data row of the second data column. The mapping table 2 is used for recording the association relationship between the editing users and the data columns, and the mapping table 2 indicates that the user 1 is associated with the second data column, the user 2 is associated with the third data column, and the user 3 is associated with the fourth data column; the mapping table 2 may be generated by the creating terminal.
Optionally, the method may comprise the following steps s61-s 62.
s61, responding to the terminal editing instruction for the first table area, using the data obtained by executing the editing instruction as the editing content in the first table area.
s62, establishing the association relationship between the sequence identifier of the first table area in the first table direction and the end user.
In steps s61-s62, when the terminal detects an editing operation of the terminal user with respect to the first table region, it determines that an editing instruction for the first table region is received, and acquires data resulting from execution of the editing instruction as editing content located in the first table region. And establishing the association relation between the sequence identification of the first table area in the first table direction and the terminal user. As in fig. 8a, an association between the sequence identifier of the second data row and the end user may be established, and as in fig. 8b, an association between the sequence identifier of the second data column and the end user may be established.
The terminal can prompt the terminal user that the data sheet is in a privacy protection state in the process of checking or editing the data sheet by the editing user, and the terminal user can record own information quickly. For example, in fig. 9a, the terminal may output a prompt message 26 and a prompt message 27 on the data presentation interface, where the prompt message 26 is "creator has opened privacy protection of data table, and what you fill in is only visible to creator and you, please feel confident to fill in", and the prompt message 27 is "data table has opened privacy protection, and other people cannot view what you fill in". When the cursor position of the terminal is located at the position of the field in the privacy protection state, the terminal may output prompt information for prompting that the field is in the privacy protection state. As shown in fig. 9b, when the cursor position of the terminal falls on the position of the identification number, the terminal can output a prompt message 28, and the prompt message 28 is "the data table has opened the privacy protection, and other people cannot view your identification number". Alternatively, as shown in fig. 9c, the terminal may output a prompt message 28 on the data presentation interface, where the prompt message 28 is "data sheet has opened privacy protection, please fill out with confidence". The display position of the prompt message can be located at the top, bottom, left side, right side or other positions of the data table, and the display form of the prompt message is not limited to the above text form, and can also include a voice form, a pattern form and the like. The end user may manually turn off these prompts or the terminal may automatically turn off the prompts after a time interval following the start of the data sheet.
Optionally, the method includes: if the first table area is not edited, executing the data obtained by executing the first editing instruction as the editing content of the first table area; if the first table area is edited and the first table area does not have the association relation with the terminal user, outputting first prompt information, wherein the first prompt information is used for prompting that the terminal does not have the editing authority aiming at the first table area.
If the first form has not been edited, i.e. the first editing region has not been associated with other editing users, step s61 may be executed. If the first table area is edited and the first table area and the terminal user have the association relationship, the terminal may obtain the modification operation of the terminal user on the editing content, and update the editing content of the first table area with the editing content obtained by the modification operation.
If the first table area is edited and the first table area does not have the association relation with the terminal user, indicating that the first table area has established the association relation with other editing users, outputting first prompt information, wherein the first prompt information is used for prompting that the terminal does not have the editing right for the first table area. The method and the device can prevent the terminal user from recording the self editing content in the table area corresponding to other editing users, and improve the accuracy of editing the data table.
Optionally, the step S103 includes the following steps S71-S72.
s71, obtaining the edited table region having no relation with the end user from the first table direction of the data table as the second table region.
s72, displaying the editing content located in the second table area in an encrypted manner on the data display interface, where the editing content located in the second table area includes the second editing content located in a second editing area, and the second editing area is an editing area where the sequence identifier of the second table area in the second table direction is the same as the sequence identifier of the target field in the second table direction.
The terminal can obtain the table area which has no relation with the terminal user and is edited from the first table side of the data table as the second table area. For example, in fig. 8a, the second table area is a third data row and a fourth data row in the data table, and in fig. 8b, the second table area is a third data column and a fourth data column in the data table. After the terminal acquires the second editing area, the editing content of the second table area can be displayed in an encrypted manner on the data display interface.
Optionally, the step s72 may include the following steps s81-s 82.
s81, if the fields in the data table are all the target fields, displaying the edited content in the second table area in an encrypted manner on the data display interface.
s83, if the remaining field is not in the privacy protection state, displaying the edited content of the remaining field on the data presentation interface, and encrypting the second edited content of the target field on the data presentation interface.
In steps s81-s82, if all the fields in the data table are the target fields, indicating that the data table is in the privacy protection state, the terminal may display the edited content located in the second table area in an encrypted manner on the data presentation interface. For example, assuming that the end user is user 1, as shown in fig. 10a, all fields in the data table are target fields, the edited content in the second data line in the data table belongs to the edited content obtained by user 1, and the edited content in the third data line and the fourth data line in the data table does not belong to the edited content obtained by user 1. That is, the second data row of the data table belongs to the first table region, and the third data row and the fourth data row in the data table belong to the second table region. The terminal can display the edited content belonging to the second table area in an encrypted manner on the data display interface, namely, the edited content not belonging to the edited by the terminal user is displayed in an encrypted manner on the data display interface. If the remaining field is not in the privacy protection state, which indicates that a part of fields in the data table are in the privacy protection state, the terminal can display the edited content of the remaining field on the data display interface, and encrypt and display the second edited content of the target field on the data display interface.
For example, assuming that the end user is user 1, as shown in fig. 10b, the fields of the data table include the identity number and the phone number as target fields, i.e., both the field-identity number and the field-phone number are in the privacy protection state, and the remaining fields of the data table except the target fields are not in the privacy protection state. The edited content in the second data line in the data table belongs to the edited content obtained by the user 1, and the edited content in the third data line and the edited content in the fourth data line in the data table do not belong to the edited content obtained by the user 1. The terminal can display the second editing content belonging to the target field in an encrypted manner on the data display interface, namely the second editing content comprises the identity numbers and the telephone numbers of the user 2 and the user 3, and the editing content belonging to the remaining field is displayed on the data display interface. By displaying the editing contents belonging to the remaining fields, information intercommunication of each editing user is facilitated, and communication efficiency among the editing users is improved. For another example, as shown in fig. 10b, the terminal may display the edit content of the field-Buddha, and the editing user may select his or her friend according to friends of other users, so as to improve communication efficiency, thereby reducing the time for creating friends for users to coordinate each editing user.
Optionally, the method further includes: and outputting second prompt information in response to a viewing instruction of the terminal for the second editing content, wherein the second prompt information is used for prompting that the terminal does not have viewing permission for the second editing content.
If the terminal detects a viewing instruction for the second editing content, the terminal can output second prompt information, and the second prompt information is used for prompting that the terminal does not have viewing permission for the second editing content. For example, as shown in fig. 11a, if the terminal detects a click operation for the identity card number and the phone number of the user 2 or the user 3, the terminal may output a prompt message 30, where the prompt message 30 is "the data table is in a privacy protection state and does not support viewing the contents of other people", that is, the prompt message 30 is used to prompt the terminal user that the identity card number and the phone number of the user 2 or the user 3 are not viewed. Alternatively, as shown in fig. 11b, if the terminal detects a click operation on the identification number and the phone number of the user 2 or the user 3, the terminal may output a prompt message 31, where the prompt message 31 is "the data table is in a privacy protection state and does not support viewing the contents of another person", that is, the prompt message 31 is used to prompt that the terminal user does not have the authority to view the identification number and the phone number of the user 2 or the user 3.
Fig. 12 is a schematic structural diagram of a data processing apparatus according to an embodiment of the present application. The data processing means may be a computer program (including program code) running in the terminal, for example the data processing means being an application software; the apparatus may be used to perform the corresponding steps in the methods provided by the embodiments of the present application. As shown in fig. 12, the data processing apparatus includes:
the output module 12 is configured to output a data display interface of the data table in response to a start instruction of the terminal for the data table;
a first display module 13, configured to display, on the data display interface, first editing content that belongs to a target field, where an editing user to which the first editing content belongs is the same as a terminal user of the terminal, and the target field is a field in the data table that is in a privacy protection state;
and the second display module 14 is configured to encrypt and display second editing content belonging to the target field on the data display interface, where an editing user to which the second editing content belongs is different from the terminal user.
Optionally, the first display module 13 is specifically configured to perform the step of displaying the second editing content belonging to the target field in an encrypted manner on the data display interface if the terminal has the editing user right for the data table; and if the terminal has the creating user right aiming at the data table, displaying the second editing content on the data display interface.
The output module 12 is further configured to output a privacy protection setting interface in response to a privacy protection setting instruction of the terminal for the data table, where the privacy protection setting interface includes an identifier of the data table and a field in the data table;
the device also includes:
a first determining module 15, configured to set, if a selection operation on an identifier of the data table is detected, all fields in the data table to be in a privacy protection state, and determine all fields in the data table as the target field; and if the selection operation of the fields in the data table is detected, setting the selected fields to be in a privacy protection state, and determining the selected fields to be the target fields.
The device also includes:
a first obtaining module 16, configured to obtain, from the data table, a field that matches the privacy field bank as a first field;
and a second determining module 17, configured to set the first field to be in a privacy protection state if the data table is a table used for information collection, and determine the first field as the target field.
The device also includes:
a second obtaining module 18, configured to obtain, from the data table, a field adjacent to the first field as a second field;
a third determining module 19, configured to determine that the data table is a table for information collection if the second field belongs to a field of an information collection type.
Optionally, the third determining module 19 includes:
a first obtaining unit 191, configured to obtain, if the second field belongs to the field of the information collection type, a sequence identifier of the first field in a first table direction and a sequence identifier of the second field in a second table direction, respectively;
a first determining unit 192, configured to determine that the data table is a table for information collection if the sequence identifier of the first field in the first table direction is the same as the sequence identifier of the second field in the first table direction, or the sequence identifier of the first field in the second table direction is the same as the sequence identifier of the second field in the second table direction.
Optionally, the first display module 13 includes:
a second obtaining unit 131, configured to obtain a sequence identifier of a field in the data table in the first table direction; if the sequence identifications of the fields in the data table in the first table direction are the same, acquiring a table area having an association relation with the terminal user from the first table direction of the data table as a first table area, wherein the association relation is used for indicating that the edited content in the first table area is edited by the terminal user;
the first display unit 132 is configured to display, on the data presentation interface, the editing content located in the first table area, where the editing content located in the first table area includes the first editing content located in a first editing area, and the first editing area is an editing area in the first table area, where a sequence identifier in the second table direction is the same as a sequence identifier of the target field in the second table direction.
The device also includes:
a fourth determining module 20, configured to respond to an editing instruction of the terminal for the first table area, use data obtained by executing the editing instruction as editing content located in the first table area;
an establishing module 21, configured to establish the association relationship between the sequence identifier of the first table area in the first table direction and the end user.
A fourth determining module 20, configured to execute the data obtained by executing the first editing instruction as the editing content of the first table area if the first table area is not edited;
the output module 12 is further configured to output first prompt information if the first table area is edited and the first table area does not have the association relationship with the terminal user, where the first prompt information is used to prompt that the terminal does not have the editing right for the first table area.
The second display module 14 includes:
a third obtaining unit 141, configured to obtain, from the first table direction of the data table, an edited table area that has no relationship with the end user, as a second table area;
the second display unit 142 is further configured to encrypt and display the editing content located in the second table area on the data display interface, where the editing content located in the second table area includes the second editing content located in a second editing area, and the second editing area is an editing area where a sequence identifier of the second table area in the second table direction is the same as a sequence identifier of the target field in the second table direction.
The second display unit 142 includes:
a first display subunit 1421, configured to, if the fields in the data table are all the target fields, encrypt and display the editing content located in the second table area on the data display interface;
a second displaying subunit 1422, configured to, if the remaining field is not in the privacy protection state, display the editing content of the remaining field on the data displaying interface, and encrypt and display the second editing content of the target field on the data displaying interface, where the remaining field is a field in the data table other than the target field.
The output module 12 is further configured to output, in response to a viewing instruction of the terminal for the second editing content, second prompt information, where the second prompt information is used to prompt that the terminal does not have a viewing right for the second editing content.
It should be understood that the data processing apparatus described in the embodiment of the present application can perform the description of the data processing method in the embodiment corresponding to fig. 5, and is not described herein again. In addition, the beneficial effects of the same method are not described in detail.
Please refer to fig. 13, which is a schematic structural diagram of another terminal provided in the embodiment of the present application. As shown in fig. 13, the terminal 1000 may include: the processor 1001, the network interface 1004, and the memory 1005, and the computer apparatus 1000 may further include: a user interface 1003, and at least one communication bus 1002. Wherein a communication bus 1002 is used to enable connective communication between these components. The user interface 1003 may include a Display screen (Display) and a Keyboard (Keyboard), and the optional user interface 1003 may also include a standard wired interface and a standard wireless interface. The network interface 1004 may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface). The memory 1005 may be a high-speed RAM memory or a non-volatile memory (e.g., at least one disk memory). The memory 1005 may optionally be at least one memory device located remotely from the processor 1001. As shown in fig. 12, a memory 1005, which is a kind of computer-readable storage medium, may include therein an operating system, a network communication module, a user interface module, and a device control application program.
In the terminal 1000 shown in fig. 13, the network interface 1004 may provide a network communication function; the user interface 1003 is an interface for providing a user with input; and the processor 1001 may be used to invoke a device control application stored in the memory 1005 to implement:
responding to a starting instruction of the terminal for the data table, and outputting a data display interface of the data table;
displaying first editing content belonging to a target field on the data display interface, wherein an editing user to which the first editing content belongs is the same as a terminal user of the terminal, and the target field is a field in a privacy protection state in the data table;
and displaying second editing content belonging to the target field in an encrypted manner on the data display interface, wherein the editing user to which the second editing content belongs is different from the terminal user.
Optionally, the processor 1001 may be configured to call a device control application stored in the memory 1005, and perform the following steps:
if the terminal has the editing user authority aiming at the data table, executing the step of displaying the second editing content belonging to the target field in an encrypted manner on the data display interface;
and if the terminal has the creating user right aiming at the data table, displaying the second editing content on the data display interface.
Optionally, the processor 1001 may be configured to call a device control application stored in the memory 1005, and perform the following steps:
responding to a privacy protection setting instruction of the terminal aiming at the data table, and outputting a privacy protection setting interface, wherein the privacy protection setting interface comprises an identifier of the data table and a field in the data table;
if the selection operation of the identifier of the data table is detected, setting all fields in the data table to be in a privacy protection state, and determining all fields in the data table to be the target fields;
and if the selection operation of the fields in the data table is detected, setting the selected fields to be in a privacy protection state, and determining the selected fields to be the target fields.
Optionally, the processor 1001 may be configured to call a device control application stored in the memory 1005, and perform the following steps:
acquiring a field matched with the privacy field library from the data table as a first field;
and if the data table is used for information collection, setting the first field to be in a privacy protection state, and determining the first field as the target field.
Optionally, the processor 1001 may be configured to call a device control application stored in the memory 1005, and perform the following steps:
acquiring a field adjacent to the first field from the data table as a second field;
and if the second field belongs to the field of the information collection type, determining the data table as a table for information collection.
Optionally, the processor 1001 may be configured to call a device control application stored in the memory 1005, and perform the following steps:
if the second field belongs to the field of the information collection type, acquiring the sequence identification of the first field and the second field in the first form direction and the sequence identification of the second field in the second form direction respectively;
and if the sequence identification of the first field in the first table direction is the same as the sequence identification of the second field in the first table direction, or the sequence identification of the first field in the second table direction is the same as the sequence identification of the second field in the second table direction, determining the data table as a table for information collection.
Optionally, the processor 1001 may be configured to call a device control application stored in the memory 1005, and perform the following steps:
acquiring a sequence identifier of a field in the data table in a first table direction;
if the sequence identifications of the fields in the data table in the first table direction are the same, acquiring a table area having an association relation with the terminal user from the first table direction of the data table as a first table area, wherein the association relation is used for indicating that the edited content in the first table area is edited by the terminal user;
displaying the editing content located in the first table area on the data display interface, wherein the editing content located in the first table area comprises the first editing content located in the first editing area, and the first editing area is an editing area with the same sequence identification in the second table direction as the sequence identification of the target field in the second table direction in the first table area.
Optionally, the processor 1001 may be configured to call a device control application stored in the memory 1005, and perform the following steps:
responding to an editing instruction of the terminal aiming at the first table area, and taking data obtained by executing the editing instruction as editing content in the first table area;
and establishing the association relation between the sequence identification of the first table area in the first table direction and the end user.
Optionally, the processor 1001 may be configured to call a device control application stored in the memory 1005, and perform the following steps:
if the first table area is not edited, executing the data obtained by executing the first editing instruction as the editing content of the first table area;
if the first table area is edited and the first table area does not have the association relation with the terminal user, outputting first prompt information, wherein the first prompt information is used for prompting that the terminal does not have the editing authority aiming at the first table area.
Optionally, the processor 1001 may be configured to call a device control application stored in the memory 1005, and perform the following steps:
acquiring a table area which has no relation with the terminal user and is edited from the first table direction of the data table to serve as a second table area;
and displaying the editing content in the second table area in an encrypted manner on the data display interface, wherein the editing content in the second table area comprises the second editing content in the second editing area, and the second editing area is an editing area with the same sequence identification of the second table area in the second table direction as that of the target field in the second table direction.
Optionally, the processor 1001 may be configured to call a device control application stored in the memory 1005, and perform the following steps:
if the fields in the data table are all the target fields, the editing content in the second table area is displayed in an encrypted mode on the data display interface;
and if the residual field is not in the privacy protection state, displaying the edited content of the residual field on the data display interface, and encrypting and displaying the second edited content of the target field on the data display interface, wherein the residual field is a field except the target field in the data table.
Optionally, the processor 1001 may be configured to call a device control application stored in the memory 1005, and perform the following steps:
and outputting second prompt information in response to a viewing instruction of the terminal for the second editing content, wherein the second prompt information is used for prompting that the terminal does not have viewing permission for the second editing content.
It should be understood that terminal 1000 described in this embodiment of the application can perform the description of the data processing method in the embodiment corresponding to fig. 5, and can also perform the description of the data processing apparatus in the embodiment corresponding to fig. 12, which is not described herein again. In addition, the beneficial effects of the same method are not described in detail.
Further, here, it is to be noted that: an embodiment of the present application further provides a computer-readable storage medium, where the computer-readable storage medium stores a computer program executed by the aforementioned data processing apparatus, and the computer program includes program instructions, and when the processor executes the program instructions, the description of the data processing method in the embodiment corresponding to fig. 5 can be performed, and therefore, details are not repeated here. In addition, the beneficial effects of the same method are not described in detail. For technical details not disclosed in embodiments of the computer-readable storage medium referred to in the present application, reference is made to the description of embodiments of the method of the present application.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), or the like.
The above disclosure is only for the purpose of illustrating the preferred embodiments of the present application and is not to be construed as limiting the scope of the present application, so that the present application is not limited thereto, and all equivalent variations and modifications can be made to the present application.

Claims (14)

1. A data processing method, comprising:
responding to a starting instruction of a terminal for a data table, and outputting a data display interface of the data table;
acquiring sequence identification of fields in the data table in a first table direction;
if the sequence identifications of the fields in the data table in the first table direction are the same, acquiring a table area having an association relation with an end user from the first table direction of the data table as a first table area, wherein the association relation is used for indicating that the edited content in the first table area is edited by the end user; the terminal has an editing user authority aiming at the data table;
displaying the editing content located in the first table area on the data display interface, wherein the editing content located in the first table area comprises first editing content located in the first editing area, the first editing area is an editing area with the sequence identification in the second table direction in the first table area being the same as the sequence identification of a target field in the second table direction, an editing user to which the first editing content belongs is the same as a terminal user of the terminal, and the target field is a field in a privacy protection state in the data table;
and displaying second editing content belonging to the target field in an encrypted manner on the data display interface, wherein the editing user to which the second editing content belongs is different from the terminal user.
2. The method of claim 1, wherein the method further comprises:
if the terminal has the editing user authority aiming at the data table, executing the step of displaying the second editing content belonging to the target field in an encrypted manner on the data display interface;
and if the terminal has the creating user right aiming at the data table, displaying the second editing content on the data display interface.
3. The method of claim 2, wherein the terminal is provided with a create user authority for the data table, the method further comprising:
responding to a privacy protection setting instruction of the terminal for the data table, and outputting a privacy protection setting interface, wherein the privacy protection setting interface comprises an identifier of the data table and a field in the data table;
if the selection operation of the identifier of the data table is detected, setting all fields in the data table to be in a privacy protection state, and determining all fields in the data table to be the target fields;
and if the selection operation of the fields in the data table is detected, setting the selected fields to be in a privacy protection state, and determining the selected fields to be the target fields.
4. The method of claim 2, wherein the terminal is provided with a create user authority for the data table, the method further comprising:
acquiring a field matched with a privacy field library from the data table as a first field;
and if the data table is a table for information collection, setting the first field to be in a privacy protection state, and determining the first field as the target field.
5. The method of claim 4, wherein the method further comprises:
acquiring a field adjacent to the first field from the data table as a second field;
and if the second field belongs to the field of the information collection type, determining the data table as a table for information collection.
6. The method of claim 5, wherein the second field matches an information collection field, determining the data table as a table for information collection comprises:
if the second field belongs to the field of the information collection type, acquiring a sequence identifier of the first field and the second field in a first table direction and a sequence identifier of the second field in a second table direction respectively;
and if the sequence identification of the first field in the first table direction is the same as the sequence identification of the second field in the first table direction, or the sequence identification of the first field in the second table direction is the same as the sequence identification of the second field in the second table direction, determining that the data table is a table for information collection.
7. The method of claim 1, wherein the method further comprises:
responding to an editing instruction of the terminal aiming at the first table area, and taking data obtained by executing the editing instruction as editing content in the first table area;
establishing the association relationship between the sequence identification of the first table area in the first table direction and the end user.
8. The method of claim 7, wherein the method further comprises:
if the first table area is not edited, executing the data obtained by executing the editing instruction as the editing content in the first table area;
if the first table area is edited and the first table area does not have the association relation with the terminal user, outputting first prompt information, wherein the first prompt information is used for prompting that the terminal does not have the editing authority aiming at the first table area.
9. The method according to claim 7 or 8, wherein the displaying the second editing content belonging to the target field on the data presentation interface in an encrypted manner comprises:
acquiring a table area which has no relation with the terminal user and is edited from the first table direction of the data table to serve as a second table area;
and displaying the editing content in the second table area in an encrypted manner on the data display interface, wherein the editing content in the second table area comprises the second editing content in the second editing area, and the second editing area is an editing area with the same sequence identification of the second table area in the second table direction as the sequence identification of the target field in the second table direction.
10. The method of claim 9, wherein displaying the edited content located in the second table area on the data presentation interface in an encrypted manner comprises:
if the fields in the data table are all the target fields, the editing content in the second table area is displayed in an encrypted mode on the data display interface;
and if the residual field is not in a privacy protection state, displaying the editing content of the residual field on the data display interface, and encrypting and displaying the second editing content of the target field on the data display interface, wherein the residual field is a field except the target field in the data table.
11. The method of claim 2, wherein the terminal is provided with editing user rights for the data table, comprising:
and responding to a viewing instruction of the terminal for the second editing content, and outputting second prompt information, wherein the second prompt information is used for prompting that the terminal does not have viewing permission for the second editing content.
12. A data processing apparatus, comprising:
the output module is used for responding to a starting instruction of the terminal aiming at the data table and outputting a data display interface of the data table;
the first display module is used for acquiring sequence identification of fields in the data table in the direction of a first table; if the sequence identifications of the fields in the data table in the first table direction are the same, acquiring a table area having an association relation with an end user from the first table direction of the data table as a first table area, wherein the association relation is used for indicating that the edited content in the first table area is edited by the end user; the terminal has an editing user authority aiming at the data table; displaying the editing content located in the first table area on the data display interface, wherein the editing content located in the first table area comprises first editing content located in the first editing area, the first editing area is an editing area with the sequence identification in the second table direction in the first table area being the same as the sequence identification of a target field in the second table direction, an editing user to which the first editing content belongs is the same as a terminal user of the terminal, and the target field is a field in a privacy protection state in the data table;
and the second display module is used for displaying second editing content belonging to the target field in an encrypted manner on the data display interface, wherein the editing user to which the second editing content belongs is different from the terminal user.
13. A terminal, comprising: a processor, a memory, and a network interface;
the processor is connected to a memory for providing data communication functions, a network interface for storing program code, and a processor for calling the program code to perform the method of any one of claims 1 to 11.
14. A computer-readable storage medium, characterized in that the computer-readable storage medium stores a computer program comprising program instructions which, when executed by a processor, perform the steps of the method according to any one of claims 1 to 11.
CN202010079899.6A 2020-02-04 2020-02-04 Data processing method, device, storage medium and terminal Active CN112632596B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010079899.6A CN112632596B (en) 2020-02-04 2020-02-04 Data processing method, device, storage medium and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010079899.6A CN112632596B (en) 2020-02-04 2020-02-04 Data processing method, device, storage medium and terminal

Publications (2)

Publication Number Publication Date
CN112632596A CN112632596A (en) 2021-04-09
CN112632596B true CN112632596B (en) 2022-02-11

Family

ID=75300021

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010079899.6A Active CN112632596B (en) 2020-02-04 2020-02-04 Data processing method, device, storage medium and terminal

Country Status (1)

Country Link
CN (1) CN112632596B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114840521B (en) * 2022-04-22 2023-03-21 北京友友天宇系统技术有限公司 Database authority management and data protection method, device, equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106874781A (en) * 2015-12-11 2017-06-20 阿里巴巴集团控股有限公司 A kind of tables of data encryption method and server
CN107273343A (en) * 2017-06-23 2017-10-20 北京计算机技术及应用研究所 Document collaborative editing system and method based on data centralized management
CN109933760A (en) * 2019-01-28 2019-06-25 平安科技(深圳)有限公司 List generation method, device, computer equipment and computer readable storage medium

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9350714B2 (en) * 2013-11-19 2016-05-24 Globalfoundries Inc. Data encryption at the client and server level

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106874781A (en) * 2015-12-11 2017-06-20 阿里巴巴集团控股有限公司 A kind of tables of data encryption method and server
CN107273343A (en) * 2017-06-23 2017-10-20 北京计算机技术及应用研究所 Document collaborative editing system and method based on data centralized management
CN109933760A (en) * 2019-01-28 2019-06-25 平安科技(深圳)有限公司 List generation method, device, computer equipment and computer readable storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"【分权与协作】如何然录入人只能查看自己的数据";简道云定制;《http://blog.sina.com.cn/s/blog_15a5f0c250102wx7c.html》;20170428;全文 *

Also Published As

Publication number Publication date
CN112632596A (en) 2021-04-09

Similar Documents

Publication Publication Date Title
WO2018108059A1 (en) Method and device for processing template data, requesting for template data and presenting template data
CN111193599B (en) Message processing method and device
US9117068B1 (en) Password protection using pattern
CN110287724B (en) Data storage and verification method and device
US11290408B2 (en) Rendering custom emojis in cross-organization communications
CN111767563A (en) Method, device, terminal and storage medium for setting authority of online document
US10461934B2 (en) Authentication-based message display method and communication terminal thereof
JP2022533203A (en) How and equipment to insert information into online documents
CN114818000B (en) Privacy protection set confusion intersection method, system and related equipment
CN109446761B (en) Information security processing method, storage medium and terminal equipment
CN113177190A (en) Document content sharing method and electronic equipment
CN112632596B (en) Data processing method, device, storage medium and terminal
CN113742601A (en) Content sharing method and device, computer equipment and storage medium
CN113190322A (en) Page acquisition method, related equipment and medium
CN113946739A (en) Sensitive data query method, device, equipment and storage medium
WO2016188079A1 (en) Data storage method for terminal device and terminal device
CN114580026A (en) Document cooperative processing method and device
CN114297552A (en) Form expansion method and device, computer equipment and storage medium
TW201826119A (en) Data output method and system capable of fast outputting data while keeping the security of the data
CN114330263A (en) Message identification method, device, equipment and storage medium
CN104794417B (en) A kind of code figure reading method
CN114980072B (en) Electronic business card exchange method and device based on Subscriber Identity Module (SIM) card
KR102417236B1 (en) Method for identifying conctent writer and apparatus implementing the same method
CN112073174B (en) Communication account decryption method, device, equipment, storage medium and information interaction system
CN112966197B (en) Method, device, equipment and storage medium for displaying page electronic signature

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 40042949

Country of ref document: HK

GR01 Patent grant
GR01 Patent grant