CN102722682A - Protection method for Excel document - Google Patents

Protection method for Excel document Download PDF

Info

Publication number
CN102722682A
CN102722682A CN2012101345503A CN201210134550A CN102722682A CN 102722682 A CN102722682 A CN 102722682A CN 2012101345503 A CN2012101345503 A CN 2012101345503A CN 201210134550 A CN201210134550 A CN 201210134550A CN 102722682 A CN102722682 A CN 102722682A
Authority
CN
China
Prior art keywords
formula
record
cell
plug
unit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2012101345503A
Other languages
Chinese (zh)
Other versions
CN102722682B (en
Inventor
陆舟
于华章
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Feitian Technologies Co Ltd
Original Assignee
Feitian Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Feitian Technologies Co Ltd filed Critical Feitian Technologies Co Ltd
Priority to CN201210134550.3A priority Critical patent/CN102722682B/en
Publication of CN102722682A publication Critical patent/CN102722682A/en
Application granted granted Critical
Publication of CN102722682B publication Critical patent/CN102722682B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses a protection method for an Excel document, relating to a field of information security. The method comprises that: a second plug-in detects whether a record cryptograph exists in a formula protection list, wherein the formula protection list is a hidden work table pre-established in the Excel document, or, a work table stored in an encryption lock; if the record cryptograph exists in a formula protection list, the second plug-in reads the record cryptograph from the formula protection list to acquire a record plaintext obtained by deciphering according to the record cryptograph; the second plug-in carries out calculation according to the formula in the record plaintext and fills the calculation result in the corresponding cells of the Excel document; and if record cryptograph exists in a formula protection list, the flow is ended.

Description

A kind of guard method of Excel document
Technical field
The present invention relates to information security field, particularly a kind of guard method of Excel document.
Background technology
In the prior art, the guard method of Excel document is normally encrypted whole Excel document, after validated user is through authentication, document is deciphered, recover expressly.But can comprise some complex calculations and formula in some Excel document, if use front said Excel document protection method, the formula algorithm still can be exposed to the user after deciphering, can't realize the protection to some core formula algorithms.
In sum, there is following defective in prior art: can only realize the protection to entire document, can not protect specific formula algorithm; The formula algorithm of core can't safe preservation.
Summary of the invention
Deficiency in view of prior art in order to realize the safeguard protection to core algorithm, the present invention proposes the guard method of formula algorithm in a kind of Excel document.
The technical scheme that the present invention adopts is following:
A kind of guard method of Excel document may further comprise the steps:
Whether have the record ciphertext in the second plug-in unit detection formula protection tabulation, the hiding worksheet of said formula protection tabulation in the Excel document, creating in advance perhaps, is stored in the worksheet in the encryption lock;
If there is the record ciphertext in said formula protection in tabulating, then said second plug-in unit reads said record ciphertext from said formula protection tabulation, obtain the record plaintext that obtains according to said record decrypt ciphertext; Said second plug-in unit calculates according to the formula in the said record plaintext, result of calculation is filled up in the units corresponding lattice of said Excel document;
If do not have the record ciphertext in the said formula protection tabulation, then process ends.
A kind of guard method of Excel document may further comprise the steps:
Whether have the record ciphertext in the second plug-in unit detection formula protection tabulation, the hiding worksheet of said formula protection tabulation in the Excel document, creating in advance perhaps, is stored in the worksheet in the encryption lock;
If have the record ciphertext in the said formula protection tabulation; Said encryption lock obtains said record ciphertext; Said record ciphertext is deciphered, obtain record expressly, resolve the formula in the said record plaintext; Obtain the cell address that said formula comprises, said cell address is sent to said second plug-in unit; Said second plug-in unit obtains the data that are stored in said cell address from said Excel document, the total data that formula operation is required sends to said encryption lock; Said encryption lock calculates according to the required total data of said formula operation and the said record formula in expressly, sends to said second plug-in unit with result of calculation and with the address of the corresponding cell of said result of calculation, removes said record plaintext; The address of the said second plug-in unit basis and the corresponding cell of said result of calculation, with said result of calculation be filled up to the corresponding cell of said result of calculation in;
If do not have the record ciphertext in the said formula protection tabulation, then process ends.
A kind of protective device of Excel document is characterized in that, comprising:
Detection module is used for detection formula protection tabulation and whether has the record ciphertext, and the hiding worksheet of said formula protection tabulation in the Excel document, creating in advance perhaps, is stored in the worksheet in the encryption lock;
Acquisition module is used for when said detection module detects said formula protection tabulation and has the record ciphertext, from said formula protection tabulation, reading said record ciphertext, obtains the record that obtains according to said record decrypt ciphertext expressly;
Computing module is used for calculating according to said record formula expressly;
Fill in module, be used for the result of calculation that said computing module calculates is filled up to the units corresponding lattice of said Excel document.
A kind of protection system of Excel document comprises second plug-in unit and encryption lock:
Said second plug-in unit is used for detection formula protection tabulation and whether has the record ciphertext, and the hiding worksheet of said formula protection tabulation in the Excel document, creating in advance perhaps, is stored in the worksheet in the encryption lock; Reception is obtained the data that are stored in said cell address from the cell address of said encryption lock from said Excel document, the total data that formula operation is required sends to said encryption lock; Reception from the result of calculation of encryption lock and with the address of the corresponding cell of said result of calculation, according to the address of the corresponding cell of said result of calculation, with said result of calculation be filled up to the corresponding cell of said result of calculation in;
Said encryption lock; Be used for when there is the record ciphertext in said formula protection tabulation, obtaining said record ciphertext, said record ciphertext is deciphered; Obtain record expressly; Resolve the formula in the said record plaintext, obtain the cell address that said formula comprises, said cell address is sent to said second plug-in unit; Calculate according to the required total data of said formula operation and the said record formula in expressly, send to said second plug-in unit, removes said record plaintext with result of calculation and with the address of the corresponding cell of said result of calculation.
Beneficial effect of the present invention is: the security that has improved core algorithm in the Excel document.
Description of drawings
For the clearer explanation embodiment of the invention or technical scheme of the prior art; To do simple the introduction to the accompanying drawing of required use in embodiment or the description of the Prior Art below; Obviously, the accompanying drawing in describing below only is some embodiments of the present invention, for those of ordinary skills; Under the prerequisite of not paying creative work, can also obtain other accompanying drawing according to these accompanying drawings.
The method of work process flow diagram of first plug-in unit in the guard method of the Excel document that Fig. 1 ~ Fig. 2 provides for the embodiment of the invention two;
The method of work process flow diagram of second plug-in unit in the guard method of the Excel document that Fig. 3 ~ Fig. 8 provides for the embodiment of the invention three;
The block scheme of the protective device of a kind of Excel document that Fig. 9 provides for the embodiment of the invention four.
Embodiment
To combine the accompanying drawing in the embodiment of the invention below, the technical scheme in the embodiment of the invention is carried out clear, intactly description, obviously, described embodiment only is the present invention's part embodiment, rather than whole embodiment.Based on the embodiment among the present invention, those of ordinary skills are not making the every other embodiment that is obtained under the creative work prerequisite, all belong to the scope of the present invention's protection.
Embodiment one
The embodiment of the invention one provides the installation process of plug-in unit, specifically comprises following content:
Step 101: duplicate the plug-in unit solution file in installation directory;
Particularly, said plug-in unit solution file comprises the alternative document that inventory, procedure set and plug-in unit are used.
Step 102: installation system important component;
Particularly, said VS .NET Prerequisites assembly can provide with installation procedure, also can in installation process, download as required.
Step 103: in registration table, write specific registry entry.
Particularly, said in the present embodiment specific registry entry be Software application name Addins Add-In ID.
Embodiment two
The embodiment of the invention has proposed a kind of guard method of Excel document on the basis of embodiment one; Said method comprises the encryption formula and deciphers execution formula two parts, wherein encrypts formula and passes through second plug-in unit and realize through the realization of first plug-in unit, deciphering execution formula.
The developer can in the Excel book, add one grand, by the object that the macroprogram loading of plug-in openly comes out, under the scene of correspondence, call the method for object then, said method is corresponding calls the function in the plug-in unit.Perhaps, the developer can increase button through rewriteeing the RequestService method on the toolbar of Excel document editor, correspondingly when the corresponding event (like click event) of said button takes place calls the function in the plug-in unit.
Being provided with in first plug-in unit increases formula function, encryption formula function; Be provided with deciphering in second plug-in unit and carry out the formula function.
Below introduce in detail the concrete operations that when each function is called in first plug-in unit, comprise, the concrete operations that when the execution of the deciphering in second plug-in unit formula function is called, comprise will be set forth in embodiment three.
(1),, the increase formula function of first plug-in unit specifically comprises when being called referring to Fig. 1:
Step 201: whether first plug-in unit is judged has the cell that is chosen in the Excel document, is that then order is carried out next step, otherwise the prompting corresponding information, end operation;
Particularly, said in the present embodiment corresponding information is not selected cell.
Step 202: first plug-in unit obtains the information that is chosen cell;
Preferably; In the present embodiment; Said information is to be chosen the address of cell and to be chosen the formula in the cell, specifically obtains certain implementation method that is chosen formula in the cell and is: the object of an Excel.Range type of definition, give said object with the Application.ActiveCell assignment of first plug-in unit; Obtain the value of said object through the formula attribute that reads said object, promptly be chosen the formula in the cell.
Step 203: first plug-in unit generates the respective formula record according to the information that gets access to by predetermined form;
Wherein, in the present embodiment, the cell that is chosen can be one or more; Preferably, first plug-in unit is according to formula record of the corresponding generation of the information that from each cell, gets access to; For example, the cell that is chosen is the A1 cell of Sheet1 in the Excel document, and the formula in the A1 cell "=A2+A3 ", and then the formula of first plug-in unit generation is recorded as " Formula:Sheet1$A1 ,=A2+A3 ".
Step 204: first plug-in unit adds the formula record that generates in the formula protection tabulation to, removes the formula attribute that is chosen cell.
When particularly, removing the formula attribute that is chosen cell in the present embodiment can be 0 with the value attribute assignment that is chosen cell also;
Wherein, said formula protection tabulation is a hiding worksheet of in the Excel document, creating in advance or is stored in a worksheet in the encryption lock.
(2),, the encryption formula function of first plug-in unit specifically comprises when being called referring to Fig. 2:
Step 301: in the first plug-in unit detection formula protection tabulation whether unencrypted formula record being arranged, is that then order is carried out next step, otherwise the prompting corresponding information, end operation;
Particularly, in the present embodiment, said corresponding information is not for existing unencryption formula record.
Step 302: first plug-in unit reads unencrypted formula record in the formula protection tabulation;
Step 303: first plug-in unit carries out cryptographic calculation according to first preset algorithm to the corresponding contents that the unencrypted formula writes down, and generates the record ciphertext;
Particularly, said first preset algorithm is for be stored in the AES in first plug-in unit in advance;
Wherein, The corresponding contents of said unencryption formula record is for the full content of unencryption formula record or for encrypting the formula part of formula record, for example: the unencryption formula is recorded as " Formula:Sheet1$A1 ,=A2+A3 "; Its formula partly is "=A2+A3 "; When the formula that only the unencryption formula is write down partly carried out cryptographic calculation, the record ciphertext of generation was " Formula:Sheet1$A1, a formula ciphertext ".
Step 304: first plug-in unit is removed unencrypted formula record in the formula protection tabulation, and the record ciphertext that generates is write in the formula protection tabulation.
Further, said first preset algorithm can also be for being stored in the AES in the encryption lock in advance, and correspondingly, step 302, step 303 replace with step 302 ', step 303 ', and the particular content of step 302 ', step 303 ' is following:
Step 302 ': first plug-in unit reads unencrypted formula record in the formula protection tabulation, and the unencrypted formula record that reads is sent to encryption lock;
Step 303 ': first plug-in unit judges whether receive the record ciphertext that encryption lock returns in the given time, is that then order is carried out next step, otherwise the prompting corresponding information, end operation.
Particularly, in the present embodiment, said corresponding information is the encryption lock failed encryption.
(3) further, also can be provided with decryption function in said first plug-in unit,, when the decryption function of first plug-in unit is called, specifically comprise referring to Fig. 3:
Step 401: in the first plug-in unit detection formula protection tabulation whether the respective record ciphertext being arranged, is that then order is carried out next step, otherwise the prompting corresponding information, end operation;
Particularly, whether there is the respective record ciphertext to be in the said detection formula protection tabulation: whether the record ciphertext whether corresponding designating unit lattice address is arranged in record ciphertext or the detection formula protection tabulation is arranged in the detection formula protection tabulation; If second kind of situation then needs when unencryption formula record is carried out computations, only its formula partly to be carried out computations.
Further, in the present embodiment, said corresponding information is no respective record ciphertext.
Step 402: first plug-in unit reads the respective record ciphertext;
Step 403: first plug-in unit carries out decrypt operation according to second preset algorithm to the record ciphertext that reads and obtains record expressly;
Wherein, said second preset algorithm is for be stored in the decipherment algorithm in first plug-in unit in advance.
Step 404: first plug-in unit expressly adds record in the formula protection tabulation.
Further, said second preset algorithm can also be for being stored in the decipherment algorithm in the encryption lock in advance, and correspondingly, step 403 replaces with step 403 '-1 and step 403 '-2, and said step 403 '-1 and step 403 '-2 particular content are following:
Step 403 '-1: the record ciphertext that will read sends to encryption lock;
Step 403 '-2: judging whether to receive record that encryption lock returns in the given time expressly, is execution in step 404 then, otherwise the prompting corresponding information, end operation.
Particularly, in the present embodiment, said corresponding information is encryption lock deciphering failure.
Embodiment three
The embodiment of the invention provides the deciphering in second plug-in unit to carry out the concrete operations that comprise when the formula function is called, and particularly, the concrete operations that comprise when adopting distinct methods are different, as follows:
Method one
Formula protection tabulation is hiding worksheet of establishment in the Excel document in advance in this method, and the analysis of formula, implementation are accomplished by plug-in unit.Referring to Fig. 4,, the deciphering execution formula function of plug-in unit specifically comprises when being called:
Step 501: in the second plug-in unit detection formula protection tabulation whether the respective record ciphertext being arranged, is that then order is carried out next step, otherwise the prompting corresponding information, end operation;
Particularly, whether there is the respective record ciphertext to be in the said detection formula protection tabulation: whether the record ciphertext whether corresponding designating unit lattice address is arranged in record ciphertext or the detection formula protection tabulation is arranged in the detection formula protection tabulation; If second kind of situation then needs when unencryption formula record is carried out computations, only its formula partly to be carried out computations;
Further, in the present embodiment, said corresponding information is no respective record ciphertext.
Step 502: second plug-in unit reads the record ciphertext in the formula protection tabulation;
Step 503: second plug-in unit carries out decrypt operation according to second preset algorithm to the record ciphertext that reads and obtains record expressly;
Particularly, said second preset algorithm is for be stored in the decipherment algorithm in second plug-in unit in advance.
Step 504: second plug-in unit is resolved said record expressly, from the Excel document, obtains data required in the formula operation process;
For example, record is " Formula:Sheet1$A1 ,=A2+A3 " expressly, and then required data are A2 cell and the data in the A3 cell in the Sheet1 worksheet in the formula operation process;
A2 ") assignment gives said object, obtains the data in the said cell through the value attribute that reads said object.
Step 505: second plug-in unit judges whether that success gets access to total data required in the formula operation process, is that then order is carried out next step, otherwise the prompting corresponding information, end operation or execution in step 506 ';
Wherein, the cell in the Excel document has value attribute and text attribute, saidly judges whether that success gets access to total data required in the formula operation process specifically through following method realization:
1., the value attribute of inspection each cell corresponding with the address of second plug-in unit acquisition, judge whether that the value attribute is 0 cell, be then to carry out 2., otherwise judge and successfully get access to total data required in the formula operation process;
2., inspection value attribute is the text attribute of 0 cell; Judge whether that the text attribute is 0 cell; Be then to judge successfully not get access to the required total data of formula operation process, otherwise judge and successfully get access to total data required in the formula operation process;
Further, in the present embodiment, said corresponding information is not for successfully getting access to total data.
Step 506: second plug-in unit carries out corresponding calculating according to formula in the record plaintext and the data that get access to, and result of calculation is filled up in the respective cells of Excel document.
For example, record is " Formula:Sheet1$A1 ,=A2+A3 " expressly, and then the formula in the record plaintext is A2+A3, and second plug-in unit is filled up to the result in the A1 cell according to A2 cell that gets access to and the result of the data computation A2+A3 in the A3 cell;
Particularly; The concrete grammar that result of calculation is filled up in the respective cells of Excel document is: the object of an Excel.Range type of definition; If result of calculation is filled up in the Sheet1 worksheet in the A1 cell, then with Application.Range (" Sheet1! A1 ") assignment gives said object, through the value attribute that said object is set result of calculation is filled up in the A1 cell.
Step 506 ': second plug-in unit carries out corresponding calculating according to formula in the record plaintext and the data that get access to, and result of calculation is filled up in the respective cells of Excel document execution in step 507.
Particularly, in step 506 ', can calculate whole formula or only calculate the formula that successfully gets access to the calculating process desired data, when calculating whole formula, the data that acquiescence does not successfully get access to are preset value, and preferably, preset value is 0.
Step 507: second plug-in unit is removed its inner record expressly.
Further, said second preset algorithm can also be for being stored in the decipherment algorithm in the encryption lock in advance, and correspondingly, step 503 replaces with step 503 '-1 and step 503 '-2, and said step 503 '-1 and step 503 '-2 particular content are following:
The record ciphertext that step 503 '-1: the second plug-in unit will read sends to encryption lock;
Step 503 '-2: the second plug-in unit judges whether to receive record that said encryption lock returns in the given time expressly, is execution in step 504 then, otherwise the prompting corresponding information, end operation.
Particularly, in the present embodiment, said corresponding information is encryption lock deciphering failure.
Method two
Formula protection tabulation is for create a hiding worksheet in advance in this method in the Excel document; And analysis, the implementation of formula are accomplished by plug-in unit, are that with the difference of method one implementation of formula is accomplished through the Calculate method of calling respective cells.Referring to Fig. 5,, the deciphering execution formula function of second plug-in unit specifically comprises when being called:
Step 601: in the second plug-in unit detection formula protection tabulation whether the respective record ciphertext being arranged, is that then order is carried out next step, otherwise the prompting corresponding information, end operation;
Particularly, whether there is the respective record ciphertext to be in the said detection formula protection tabulation: whether the record ciphertext whether corresponding designating unit lattice address is arranged in record ciphertext or the detection formula protection tabulation is arranged in the detection formula protection tabulation; If second kind of situation then needs when unencryption formula record is carried out computations, only its formula partly to be carried out computations;
Further, in the present embodiment, said corresponding information is no respective record ciphertext.
Step 602: second plug-in unit reads the record ciphertext in the formula protection tabulation;
Step 603: second plug-in unit carries out decrypt operation according to second preset algorithm to the record ciphertext that reads and obtains record expressly;
Particularly, said second preset algorithm is for be stored in the decipherment algorithm in the said plug-in unit in advance.
Step 604: second plug-in unit is resolved said record expressly, and the formula assignment in will writing down is expressly given the formula attribute of respective cells;
For example, record is " Formula:Sheet1$A1 ,=A2+A3 " expressly, and then general=A2+A3 assignment is given the formula attribute of A1 cell;
Particularly; Be to the concrete grammar of the formula attribute in the respective cells formula assignment: the object of an Excel.Range type of definition; If with the formula attribute of formula=A2+A3 assignment, then with Application.Range (" Sheet1! to A1 cell in the Sheet1 worksheet A1 ") assignment gives said object, and through formula attribute position=A2+A3 is set and realizes the formula attribute of general=A2+A3 assignment to the A1 cell with said object.
Step 605: second plug-in unit calls the calculate method of said respective cells and carries out corresponding calculating, and result of calculation is filled up in the respective cells of Excel document;
Step 606: second plug-in unit empties the formula attribute of said respective cells.
Further, said second preset algorithm can also be for being stored in the decipherment algorithm in the encryption lock in advance, and correspondingly, step 603 replaces with step 603 '-1 and step 603 '-2, and said step 603 '-1 and step 603 '-2 particular content are following:
The record ciphertext that step 603 '-1: the second plug-in unit will read sends to encryption lock;
Step 603 '-2: the second plug-in unit judges whether to receive record that said encryption lock returns in the given time expressly, is execution in step 604 then, otherwise the prompting corresponding information, end operation.
Particularly, said in the present embodiment corresponding information is encryption lock deciphering failure.
Method three
Formula protection tabulation is hiding worksheet of establishment in the Excel document in advance in this method, and the deciphering of formula, analysis, implementation are accomplished by encryption lock.Referring to Fig. 6,, the deciphering execution formula function of second plug-in unit specifically comprises when being called:
Step 701: in the second plug-in unit detection formula protection tabulation whether the respective record ciphertext being arranged, is that then order is carried out next step, otherwise the prompting corresponding information, end operation;
Particularly, whether there is the respective record ciphertext to be in the said detection formula protection tabulation: whether the record ciphertext whether corresponding designating unit lattice address is arranged in record ciphertext or the detection formula protection tabulation is arranged in the detection formula protection tabulation; If second kind of situation then needs when unencryption formula record is carried out computations, only its formula partly to be carried out computations;
Further, in the present embodiment, said corresponding information is no respective record ciphertext.
Step 702: second plug-in unit reads the record ciphertext in the said formula protection tabulation;
Step 703: the record ciphertext that second plug-in unit will read sends to encryption lock;
Step 704: said encryption lock carries out decrypt operation according to second preset algorithm to said record ciphertext and obtains record expressly;
Particularly, said second preset algorithm is for be stored in the decipherment algorithm in the said encryption lock in advance.
Step 705: said encryption lock is resolved said record plaintext, and the address of the cell that relates in the formula operation process is returned to second plug-in unit;
Step 706: second plug-in unit obtains formula operation process desired data from the Excel document;
Step 707: second plug-in unit judges whether that success gets access to the required total data of formula operation process, is that then order is carried out next step, otherwise the prompting corresponding information, end operation or execution in step 708 ';
Particularly, in the present embodiment, said corresponding information is not for successfully getting access to total data.
Wherein, it is identical with determination methods in the method one to judge whether that success gets access to the method for total data required in the formula operation process, repeats no more at this.
Step 708: second plug-in unit sends to said encryption lock with the data that read;
Step 708 ': the data that second plug-in unit acquiescence does not successfully get access to are preset value, and the total data that the formula operation process is required sends to said encryption lock, execution in step 709;
Preferably, preset value is 0 in the present embodiment.
Step 709: said encryption lock according to record expressly and the data that receive carry out corresponding calculating, and send to second plug-in unit with result of calculation with the address of the corresponding cell of result of calculation;
Step 710: said encryption lock is removed its inner record expressly.
Step 711: second plug-in unit is filled up to result of calculation in the respective cells of Excel document.
Method four
Formula protection tabulation is for to be stored in a worksheet in the encryption lock in this method, and the deciphering of formula, analysis, implementation are accomplished by second plug-in unit.Referring to Fig. 7,, the deciphering execution formula function of second plug-in unit specifically comprises when being called:
Step 801: in the second plug-in unit detection formula protection tabulation whether the respective record ciphertext being arranged, is that then order is carried out next step, otherwise the prompting corresponding information, end operation;
Particularly, whether there is the respective record ciphertext to be in the said detection formula protection tabulation: whether the record ciphertext whether corresponding designating unit lattice address is arranged in record ciphertext or the detection formula protection tabulation is arranged in the detection formula protection tabulation; If second kind of situation then needs when unencryption formula record is carried out computations, only its formula partly to be carried out computations;
Further, in the present embodiment, said corresponding information is no respective record ciphertext.
Step 802: second plug-in unit reads the record ciphertext in the formula protection tabulation;
Step 803: second plug-in unit carries out decrypt operation according to second preset algorithm to said record ciphertext and obtains record expressly;
Particularly, said second preset algorithm is for be stored in the decipherment algorithm in second plug-in unit in advance.
Step 804: second plug-in unit is resolved said record expressly, from the Excel document, obtains data required in the formula operation process;
Step 805: second plug-in unit judges whether that success gets access to total data required in the formula operation process, is that then order is carried out next step, otherwise the prompting corresponding information, end operation or execution in step 806 ';
Particularly, in the present embodiment, said corresponding information is not for successfully getting access to total data;
Wherein, it is identical with determination methods in the method one to judge whether that success gets access to the method for total data required in the formula operational process, repeats no more at this.
Step 806: second plug-in unit carries out corresponding calculating according to the data that write down plaintext and get access to, and result of calculation is filled up in the respective cells of Excel document.
Step 806 ': second plug-in unit carries out corresponding calculating according to the data that write down plaintext and get access to, and result of calculation is filled up in the respective cells of Excel document execution in step 807.
Particularly, in step 806 ', can calculate whole formula or only calculate the formula that successfully gets access to the calculating process desired data, when calculating whole formula, the data that acquiescence does not successfully get access to are preset value, and preferably, preset value is 0.
Step 807: second plug-in unit is removed its inner record expressly.
Further, said second preset algorithm can also be for being stored in the decipherment algorithm in the encryption lock in advance, and correspondingly, step 801,802,803 replaces with step 801 ' and step 802 ', and the particular content of said step 801 ' and step 802 ' is following:
Step 801 ': second plug-in unit notice encryption lock reads the record ciphertext in the formula protection tabulation and according to second preset algorithm it is carried out decrypt operation and obtains record expressly;
Step 802 ': second plug-in unit judges whether to receive record that encryption lock returns in the given time expressly, is execution in step 804 then, otherwise the prompting corresponding information, end operation.
Particularly, in the present embodiment, said corresponding information is encryption lock deciphering failure.
Method five
Formula protection tabulation is for to be stored in a worksheet in the encryption lock in this method, and the deciphering of formula, analysis, implementation are accomplished by encryption lock.Referring to Fig. 8,, the deciphering execution formula function of second plug-in unit specifically comprises when being called:
Step 901: in the second plug-in unit detection formula protection tabulation whether the respective record ciphertext being arranged, is that then order is carried out next step, otherwise the prompting corresponding information, end operation;
Particularly, whether there is the respective record ciphertext to be in the said detection formula protection tabulation: whether the record ciphertext whether corresponding designating unit lattice address is arranged in record ciphertext or the detection formula protection tabulation is arranged in the detection formula protection tabulation; If second kind of situation then needs when unencryption formula record is carried out computations, only its formula partly to be carried out computations;
Further, in the present embodiment, said corresponding information is no respective record ciphertext.
Step 902: second plug-in unit notice encryption lock is deciphered said record ciphertext;
Step 903: said encryption lock carries out decrypt operation according to second preset algorithm to said record ciphertext and obtains record expressly;
Particularly, said second preset algorithm is for be stored in the decipherment algorithm in the said encryption lock in advance.
Step 904: said encryption lock is resolved said plaintext record, and the address of the cell that relates in the formula operation process is returned to second plug-in unit;
Step 905: second plug-in unit obtains desired data in the formula operation process from the Excel document;
Step 906: second plug-in unit judges whether that success gets access to total data required in the formula operation process, is that then order is carried out next step, otherwise the prompting corresponding information, end operation or execution in step 907 ';
Particularly, in the present embodiment, said corresponding information is not for successfully getting access to total data;
Wherein, judge that whether successfully to get access to the method for total data required in the formula operation process in the given time identical with determination methods in the method one, repeat no more at this.
Step 907: second plug-in unit sends to said encryption lock with the data that read;
Step 907 ': the data that second plug-in unit acquiescence does not successfully read are preset value, and the data that the formula operation process is required send to said encryption lock execution in step 908;
Preferably, preset value is 0 in the present embodiment.
Step 908: said encryption lock according to formula expressly and the data that receive carry out corresponding calculating, and result of calculation and respective cells address are sent to second plug-in unit;
Step 909: said encryption lock is removed its inner record expressly.
Step 910: second plug-in unit is filled up to said result of calculation in the respective cells of Excel document.
Embodiment four
Referring to Fig. 9; The embodiment of the invention provides a kind of protective device of Excel document; Said device comprises detection module 11, acquisition module 12, parsing module 13, judge module 14, computing module 15, fills in module 16, removes module 17, and the concrete function of above-mentioned each module is following:
Detection module 11 is used for detection formula protection tabulation and whether has the record ciphertext;
Particularly, the hiding worksheet of said formula protection tabulation in the Excel document, creating in advance perhaps, is stored in the worksheet in the encryption lock; Whether the said record ciphertext that whether exists is for having the record ciphertext or whether the record ciphertext corresponding with the designating unit lattice is arranged.
Acquisition module is used for when detection module detects formula protection tabulation existence record ciphertext, reading and recording ciphertext from formula protection tabulation, and obtain the record plaintext that obtains according to the record ciphertext;
Parsing module is used for separating new record formula expressly, obtains the cell address that formula comprises, and from the Excel document, obtains the data of storage and said cell address;
Judge module is used for judging whether that success gets access to the data of all cell address corresponding cells lattice that said formula comprises;
Particularly; Said judge module judges whether that the data that success gets access in all cell address corresponding cells lattice that said formula comprises specifically comprise: detect the cell address corresponding cells lattice that said formula comprises: if in the cell address corresponding cells lattice that said formula comprises in the value attribute of each cell and the text attribute at least one attribute be not 0, then judge the data that successfully get access in all cell address corresponding cells lattice that said formula comprises; If value attribute and the text attribute of each cell are 0 in the cell address corresponding cells lattice that comprise of said formula, then judgement does not successfully get access to the data in arbitrary cell address corresponding cells lattice that said formula comprises; If at least one attribute is not 0 in the value attribute of corresponding cells lattice middle part, the cell address subdivision lattice that said formula comprises and the text attribute; The value attribute and the text attribute of part cell are 0, then judge the data that successfully get access in the part cell address corresponding cells lattice that said formula comprises.
Computing module is used for when judge module is judged the data that successfully get access to all cell address corresponding cells lattice that said formula comprises, and calculates according to the data of obtaining and the record formula in expressly; Perhaps; When judge module is judged the data successfully do not get access in the cell address corresponding cells lattice that arbitrary said formula comprises; With the data assignment that does not successfully get access to is preset value, calculates according to the formula in data after the assignment and the said record plaintext; Perhaps; When judge module is judged the data that successfully get access in the part cell address corresponding cells lattice that said formula comprises; Data assignment through successfully not getting access to is a preset value, carries out according to the formula in data after the data of obtaining, the assignment and the said record plaintext;
Fill in module, be used for the result of calculation that computing module calculates is filled up to the respective cells of Excel document;
Remove module, be used for accomplishing it and remove said record expressly after function separately when above-mentioned module;
Wherein, Said device can not comprise parsing module and judge module; Then correspondingly; The function of computing module is corresponding to be become: be used to separate new record expressly, and the formula assignment in will write down expressly is to the formula attribute of the units corresponding lattice of Excel document, the calculate method of call unit lattice is calculated; If computing module adopts this mode to calculate, then correspondingly, said device also comprises and empties module, is used to empty the formula attribute of said cell;
Embodiment five
The embodiment of the invention provides a kind of Excel file protection system, and said system comprises second plug-in unit and encryption lock, particularly,
Said second plug-in unit is used for detection formula protection tabulation and whether has the record ciphertext, and the hiding worksheet of said formula protection tabulation in the Excel document, creating in advance perhaps, is stored in the worksheet in the encryption lock; Reception is obtained the data that are stored in said cell address from the cell address of said encryption lock from said Excel document, the total data that formula operation is required sends to said encryption lock; Reception from the result of calculation of encryption lock and with the address of the corresponding cell of said result of calculation, according to the address of the corresponding cell of said result of calculation, with said result of calculation be filled up to the corresponding cell of said result of calculation in; Whether the said record ciphertext that whether exists is for having the record ciphertext or whether the record ciphertext corresponding with the designating unit lattice is arranged;
Wherein, said second plug-in unit total data that formula operation is required sends to and also comprises before the said encryption lock: judge whether that success gets access to the data in all cell address corresponding cells lattice that said formula comprises;
Correspondingly; If comprise above-mentioned deterministic process; Then said second plug-in unit total data that formula operation is required sends to said encryption lock and specifically comprises: during data in successfully getting access to all cell address corresponding cells lattice that said formula comprises, said data are sent to said encryption lock; Perhaps, during data in successfully not getting access to the cell address corresponding cells lattice that said formula comprises, be preset value with the data assignment that does not successfully get access to, the data after the assignment are sent to said encryption lock; Perhaps, during data in successfully getting access to the part cell address corresponding cells lattice that said formula comprises, be preset value with the data assignment that does not successfully get access to, the data after data of obtaining and the assignment are sent to said encryption lock.
Further; Said second plug-in unit judges whether that the data that success gets access in all cell address corresponding cells lattice that said formula comprises specifically comprise: detect the cell address corresponding cells lattice that said formula comprises: if in the cell address corresponding cells lattice that said formula comprises in the value attribute of each cell and the text attribute at least one attribute be not 0, then judge the data that successfully get access in all cell address corresponding cells lattice that said formula comprises; If value attribute and the text attribute of each cell are 0 in the cell address corresponding cells lattice that comprise of said formula, then judgement does not successfully get access to the data in arbitrary cell address corresponding cells lattice that said formula comprises; If at least one attribute is not 0 in the value attribute of corresponding cells lattice middle part, the cell address subdivision lattice that said formula comprises and the text attribute; The value attribute and the text attribute of part cell are 0, then judge the data that successfully get access in the part cell address corresponding cells lattice that said formula comprises;
Said second plug-in unit also is used for said result of calculation is filled up to said designating unit lattice address.
Said encryption lock; Be used for when there is the record ciphertext in said formula protection tabulation, obtaining said record ciphertext, said record ciphertext is deciphered; Obtain record expressly; Resolve the formula in the said record plaintext, obtain the cell address that said formula comprises, said cell address is sent to said second plug-in unit; Calculate according to the required total data of said formula operation and the said record formula in expressly, send to said second plug-in unit, removes said record plaintext with result of calculation and with the address of the corresponding cell of said result of calculation;
Said system also comprises first plug-in unit; Said first plug-in unit is used for judging whether said Excel document exists the cell that is chosen; When the cell that existence is chosen; Obtain the information of the said cell that is chosen, generate the corresponding formulas record, the formula record that generates is added in the said formula protection tabulation according to the information that gets access to; Remove the formula attribute of the said cell that is chosen, said information is the address of the said cell that is chosen and the formula in the said cell that is chosen.
Said first plug-in unit also is used for detecting said formula protection tabulation and whether has unencrypted formula record; When having unencrypted formula record; Read said formula record, said formula record is encrypted, generate the record ciphertext; Remove said formula record, said record ciphertext is write said formula protection tabulation.
The above; Be merely embodiment of the present invention, but protection scope of the present invention is not limited thereto, any technician who is familiar with the present technique field is in the technical scope that the present invention discloses; Can expect easily changing or replacement, all should be encompassed within protection scope of the present invention.Therefore, protection scope of the present invention should be as the criterion by said protection domain with claim.

Claims (26)

1. the guard method of an Excel document is characterized in that, may further comprise the steps:
Whether have the record ciphertext in the second plug-in unit detection formula protection tabulation, the hiding worksheet of said formula protection tabulation in the Excel document, creating in advance perhaps, is stored in the worksheet in the encryption lock;
If there is the record ciphertext in said formula protection in tabulating, then said second plug-in unit reads said record ciphertext from said formula protection tabulation, obtain the record plaintext that obtains according to said record decrypt ciphertext; Said second plug-in unit calculates according to the formula in the said record plaintext, result of calculation is filled up in the units corresponding lattice of said Excel document;
If do not have the record ciphertext in the said formula protection tabulation, then process ends.
2. the method for claim 1 is characterized in that, said second plug-in unit calculates according to the formula in the said record plaintext, is specially:
Said second plug-in unit is resolved said record expressly, and the formula assignment in will writing down is expressly called the calculate method of said cell and calculated to the formula attribute of the units corresponding lattice of said Excel document;
Said second plug-in unit also comprises after result of calculation being filled up in the units corresponding lattice of said Excel document:
Said second plug-in unit empties the formula attribute of said cell.
3. the method for claim 1 is characterized in that, said second plug-in unit also comprises before calculating according to the formula in the said record plaintext:
Said second plug-in unit is resolved said record expressly, obtains the cell address that the formula in the said record plaintext comprises, and from said Excel document, obtains the data that are stored in said cell address;
Said second plug-in unit also comprises after result of calculation being filled up in the units corresponding lattice of said Excel document:
Said second plug-in unit is removed said record expressly.
4. method as claimed in claim 3 is characterized in that, said second plug-in unit also comprises before calculating according to the formula in the said record plaintext:
Said second plug-in unit judges whether that success gets access to the data in all cell address corresponding cells lattice that said formula comprises;
Said second plug-in unit calculates according to the formula in the said record plaintext, is specially:
During data in successfully getting access to all cell address corresponding cells lattice that said formula comprises, said second plug-in unit calculates according to the data of obtaining and the said record formula in expressly;
Perhaps,
During data in successfully not getting access to arbitrary cell address corresponding cells lattice that said formula comprises, the data assignment that said second plug-in unit will successfully not get access to is a preset value, calculates according to the formula in data after the assignment and the said record plaintext;
Perhaps,
During data in successfully getting access to the part cell address corresponding cells lattice that said formula comprises; The data assignment that said second plug-in unit will successfully not get access to is a preset value, calculates according to the formula in data after the data of obtaining, the assignment and the said record plaintext.
5. method as claimed in claim 4 is characterized in that, said second plug-in unit judges whether that success gets access to the data in all cell address corresponding cells lattice that said formula comprises, and specifically comprises:
Said second plug-in unit detects the cell address corresponding cells lattice that said formula comprises:
If in the cell address corresponding cells lattice that comprise of said formula in the value attribute of each cell and the text attribute at least one attribute be not 0, then judge the data that successfully get access in all cell address corresponding cells lattice that said formula comprises;
If value attribute and the text attribute of each cell are 0 in the cell address corresponding cells lattice that comprise of said formula, then judgement does not successfully get access to the data in arbitrary cell address corresponding cells lattice that said formula comprises;
If at least one attribute is not 0 in the value attribute of corresponding cells lattice middle part, the cell address subdivision lattice that said formula comprises and the text attribute; The value attribute and the text attribute of part cell are 0, then judge the data that successfully get access in the part cell address corresponding cells lattice that said formula comprises.
6. the method for claim 1 is characterized in that,
Said record ciphertext is specially: the record ciphertext corresponding with designating unit lattice address in the said formula protection tabulation;
In the said units corresponding lattice that result of calculation are filled up to said Excel document, be specially:
Said result of calculation is filled up to said designating unit lattice address.
7. the method for claim 1 also comprises:
First plug-in unit detects in the said formula protection tabulation whether have unencrypted formula record;
If exist, then said first plug-in unit reads said formula record, and said formula record is encrypted, and generates the record ciphertext, removes said formula record, and said record ciphertext is write said formula protection tabulation;
If do not exist, process ends then.
8. method as claimed in claim 7 also comprises:
Said first plug-in unit judges in the said Excel document whether have the cell that is chosen;
If exist; Then said first plug-in unit obtains the information of the said cell that is chosen; Generate the corresponding formulas record according to the information that gets access to; The formula record that generates is added in the said formula protection tabulation, remove the formula attribute of the said cell that is chosen, said information is the address of the said cell that is chosen and the formula in the said cell that is chosen;
If do not exist, process ends then.
9. the guard method of an Excel document is characterized in that, may further comprise the steps:
Whether have the record ciphertext in the second plug-in unit detection formula protection tabulation, the hiding worksheet of said formula protection tabulation in the Excel document, creating in advance perhaps, is stored in the worksheet in the encryption lock;
If have the record ciphertext in the said formula protection tabulation; Said encryption lock obtains said record ciphertext; Said record ciphertext is deciphered, obtain record expressly, resolve the formula in the said record plaintext; Obtain the cell address that said formula comprises, said cell address is sent to said second plug-in unit; Said second plug-in unit obtains the data that are stored in said cell address from said Excel document, the total data that formula operation is required sends to said encryption lock; Said encryption lock calculates according to the required total data of said formula operation and the said record formula in expressly, sends to said second plug-in unit with result of calculation and with the address of the corresponding cell of said result of calculation, removes said record plaintext; The address of the said second plug-in unit basis and the corresponding cell of said result of calculation, with said result of calculation be filled up to the corresponding cell of said result of calculation in;
If do not have the record ciphertext in the said formula protection tabulation, then process ends.
10. method as claimed in claim 9 is characterized in that, said second plug-in unit total data that formula operation is required sends to before the said encryption lock, also comprises:
Said second plug-in unit judges whether that success gets access to the data in all cell address corresponding cells lattice that said formula comprises;
Said second plug-in unit total data that formula operation is required sends to said encryption lock, is specially:
During data in successfully getting access to all cell address corresponding cells lattice that said formula comprises, said second plug-in unit sends to said encryption lock with said data;
Perhaps,
During data in successfully not getting access to arbitrary cell address corresponding cells lattice that said formula comprises, the data assignment that said second plug-in unit will successfully not get access to is a preset value, and the data after the assignment are sent to said encryption lock;
Perhaps,
During data in successfully getting access to the part cell address corresponding cells lattice that said formula comprises, the data assignment that said second plug-in unit will successfully not get access to is a preset value, and the data after data of obtaining and the assignment are sent to said encryption lock.
11. method as claimed in claim 10 is characterized in that, said second plug-in unit judges whether that success gets access to the data in all cell address corresponding cells lattice that said formula comprises, and specifically comprises:
Said second plug-in unit detects the cell address corresponding cells lattice that said formula comprises:
If in the cell address corresponding cells lattice that comprise of said formula in the value attribute of each cell and the text attribute at least one attribute be not 0, then judge the data that successfully get access in all cell address corresponding cells lattice that said formula comprises;
If value attribute and the text attribute of each cell are 0 in the cell address corresponding cells lattice that comprise of said formula, then judgement does not successfully get access to the data in arbitrary cell address corresponding cells lattice that said formula comprises;
If at least one attribute is not 0 in the value attribute of corresponding cells lattice middle part, the cell address subdivision lattice that said formula comprises and the text attribute; The value attribute and the text attribute of part cell are 0, then judge the data that successfully get access in the part cell address corresponding cells lattice that said formula comprises.
12. method as claimed in claim 9 is characterized in that,
Said record ciphertext is specially: the record ciphertext corresponding with designating unit lattice address in the said formula protection tabulation;
Said second plug-in unit is filled up to result of calculation in the units corresponding lattice of said Excel document, is specially:
Said second plug-in unit is filled up to said designating unit lattice address with said result of calculation.
13. method as claimed in claim 9 is characterized in that, also comprises:
Said first plug-in unit detects in the said formula protection tabulation whether have unencrypted formula record;
If exist, then said first plug-in unit reads said formula record, and said formula record is encrypted, and generates the record ciphertext, removes said formula record, and said record ciphertext is write said formula protection tabulation;
If do not exist, process ends then.
14. method as claimed in claim 13 is characterized in that, also comprises:
Said first plug-in unit judges in the said Excel document whether have the cell that is chosen;
If exist; Then said first plug-in unit obtains the information of the said cell that is chosen; Generate the corresponding formulas record according to the information that gets access to; The formula record that generates is added in the said formula protection tabulation, remove the formula attribute of the said cell that is chosen, said information is the address of the said cell that is chosen and the formula in the said cell that is chosen;
If do not exist, process ends then.
15. the protective device of an Excel document is characterized in that, comprising:
Detection module is used for detection formula protection tabulation and whether has the record ciphertext, and the hiding worksheet of said formula protection tabulation in the Excel document, creating in advance perhaps, is stored in the worksheet in the encryption lock;
Acquisition module is used for when said detection module detects said formula protection tabulation and has the record ciphertext, from said formula protection tabulation, reading said record ciphertext, obtains the record that obtains according to said record decrypt ciphertext expressly;
Computing module is used for calculating according to said record formula expressly;
Fill in module, be used for the result of calculation that said computing module calculates is filled up to the units corresponding lattice of said Excel document.
16. device as claimed in claim 15 is characterized in that,
Said computing module specifically is used to resolve said record expressly, and the formula assignment in will writing down is expressly called the calculate method of said cell and calculated to the formula attribute of the units corresponding lattice of said Excel document;
Said device also comprises:
Empty module, be used to empty the formula attribute of said cell.
17. device as claimed in claim 15 is characterized in that, also comprises:
Parsing module is used for resolving said record formula expressly, obtains the cell address that said formula comprises, and from said Excel document, obtains the data that are stored in said cell address;
Remove module, be used to remove said record expressly.
18. device as claimed in claim 17 is characterized in that, also comprises:
Judge module is used for judging whether that success gets access to the data of all cell address corresponding cells lattice that said formula comprises;
Said computing module specifically is used for when said judge module is judged the data that successfully get access to all cell address corresponding cells lattice that said formula comprises, and calculates according to the data of obtaining and the said record formula in expressly;
Perhaps,
When said judge module is judged the data that successfully do not get access in the cell address corresponding cells lattice that said formula comprises, be preset value with the data assignment that successfully does not get access to, calculate according to the formula in data after the assignment and the said record plaintext;
Perhaps,
When said judge module is judged the data that successfully get access in the part cell address corresponding cells lattice that said formula comprises; With the data assignment that does not successfully get access to is preset value, calculates according to the formula in data after the data of obtaining, the assignment and the said record plaintext.
19. device as claimed in claim 18 is characterized in that,
Said judge module specifically is used to detect the cell address corresponding cells lattice that said formula comprises:
If in the cell address corresponding cells lattice that comprise of said formula in the value attribute of each cell and the text attribute at least one attribute be not 0, then judge the data that successfully get access in all cell address corresponding cells lattice that said formula comprises;
If value attribute and the text attribute of each cell are 0 in the cell address corresponding cells lattice that comprise of said formula, then judgement does not successfully get access to the data in arbitrary cell address corresponding cells lattice that said formula comprises;
If at least one attribute is not 0 in the value attribute of corresponding cells lattice middle part, the cell address subdivision lattice that said formula comprises and the text attribute; The value attribute and the text attribute of part cell are 0, then judge the data that successfully get access in the part cell address corresponding cells lattice that said formula comprises.
20. device as claimed in claim 15 is characterized in that,
Said record ciphertext is specially: the record ciphertext corresponding with designating unit lattice address in the said formula protection tabulation;
The said module of filling in specifically is used for said result of calculation is filled up to said designating unit lattice address corresponding cells lattice.
21. the protection system of an Excel document comprises second plug-in unit and encryption lock, it is characterized in that,
Said second plug-in unit is used for detection formula protection tabulation and whether has the record ciphertext, and the hiding worksheet of said formula protection tabulation in the Excel document, creating in advance perhaps, is stored in the worksheet in the encryption lock; Reception is obtained the data that are stored in said cell address from the cell address of said encryption lock from said Excel document, the total data that formula operation is required sends to said encryption lock; Reception from the result of calculation of encryption lock and with the address of the corresponding cell of said result of calculation, according to the address of the corresponding cell of said result of calculation, with said result of calculation be filled up to the corresponding cell of said result of calculation in;
Said encryption lock; Be used for when there is the record ciphertext in said formula protection tabulation, obtaining said record ciphertext, said record ciphertext is deciphered; Obtain record expressly; Resolve the formula in the said record plaintext, obtain the cell address that said formula comprises, said cell address is sent to said second plug-in unit; Calculate according to the required total data of said formula operation and the said record formula in expressly, send to said second plug-in unit, removes said record plaintext with result of calculation and with the address of the corresponding cell of said result of calculation.
22. system as claimed in claim 21 is characterized in that,
Said second plug-in unit is used for specifically judging whether that success gets access to the data of all cell address corresponding cells lattice that said formula comprises; During data in successfully getting access to all cell address corresponding cells lattice that said formula comprises, said data are sent to said encryption lock;
Perhaps,
During data in successfully not getting access to the cell address corresponding cells lattice that said formula comprises, be preset value, the data after the assignment are sent to said encryption lock the data assignment that does not successfully get access to;
Perhaps,
During data in successfully getting access to the part cell address corresponding cells lattice that said formula comprises, be preset value, the data after data of obtaining and the assignment are sent to said encryption lock the data assignment that does not successfully get access to.
23. the system of claim 22 is characterized in that,
Said second plug-in unit specifically is used to detect the cell address corresponding cells lattice that said formula comprises:
If in the cell address corresponding cells lattice that comprise of said formula in the value attribute of each cell and the text attribute at least one attribute be not 0, then judge the data that successfully get access in all cell address corresponding cells lattice that said formula comprises;
If value attribute and the text attribute of each cell are 0 in the cell address corresponding cells lattice that comprise of said formula, then judgement does not successfully get access to the data in arbitrary cell address corresponding cells lattice that said formula comprises;
If at least one attribute is not 0 in the value attribute of corresponding cells lattice middle part, the cell address subdivision lattice that said formula comprises and the text attribute; The value attribute and the text attribute of part cell are 0, then judge the data that successfully get access in the part cell address corresponding cells lattice that said formula comprises.
24. system as claimed in claim 21 is characterized in that,
Said record ciphertext is specially: the record ciphertext corresponding with designating unit lattice address in the said formula protection tabulation;
Said second plug-in unit specifically is used for said result of calculation is filled up to said designating unit lattice address corresponding cells lattice.
25. system as claimed in claim 21 is characterized in that, also comprises:
First plug-in unit; Be used for detecting said formula protection tabulation and whether have unencrypted formula record, when having unencrypted formula record, read said formula record; Said formula record is encrypted; Generate the record ciphertext, remove said formula record, said record ciphertext is write said formula protection tabulation.
26. system as claimed in claim 25 is characterized in that,
Said first plug-in unit; Be used for also judging whether said Excel document exists the cell that is chosen, when the cell that existence is chosen, obtain the information of the said cell that is chosen; Generate the corresponding formulas record according to the information that gets access to; The formula record that generates is added in the said formula protection tabulation, remove the formula attribute of the said cell that is chosen, said information is the address of the said cell that is chosen and the formula in the said cell that is chosen.
CN201210134550.3A 2012-04-28 2012-04-28 Protection method for Excel document Expired - Fee Related CN102722682B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210134550.3A CN102722682B (en) 2012-04-28 2012-04-28 Protection method for Excel document

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210134550.3A CN102722682B (en) 2012-04-28 2012-04-28 Protection method for Excel document

Publications (2)

Publication Number Publication Date
CN102722682A true CN102722682A (en) 2012-10-10
CN102722682B CN102722682B (en) 2015-01-14

Family

ID=46948436

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210134550.3A Expired - Fee Related CN102722682B (en) 2012-04-28 2012-04-28 Protection method for Excel document

Country Status (1)

Country Link
CN (1) CN102722682B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104268128A (en) * 2014-09-26 2015-01-07 广州金山移动科技有限公司 Method and device for batch protection of worksheet
CN106502966A (en) * 2015-09-07 2017-03-15 北京国双科技有限公司 EXCEL document treating method and apparatus
CN112651214A (en) * 2020-08-28 2021-04-13 成都格斗科技有限公司 Method for converting data table plaintext into binary ciphertext convenient for program to read

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020002468A1 (en) * 1998-08-13 2002-01-03 International Business Machines Corporation Method and system for securing local database file of local content stored on end-user system
US20070269042A1 (en) * 2006-05-17 2007-11-22 Kyocera Mita Corporation Image forming apparatus and image forming system
CN101834721A (en) * 2010-04-20 2010-09-15 宇龙计算机通信科技(深圳)有限公司 Data encryption and decryption method and system
CN102306255A (en) * 2011-08-29 2012-01-04 飞天诚信科技股份有限公司 Document protection method and system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020002468A1 (en) * 1998-08-13 2002-01-03 International Business Machines Corporation Method and system for securing local database file of local content stored on end-user system
US20070269042A1 (en) * 2006-05-17 2007-11-22 Kyocera Mita Corporation Image forming apparatus and image forming system
CN101834721A (en) * 2010-04-20 2010-09-15 宇龙计算机通信科技(深圳)有限公司 Data encryption and decryption method and system
CN102306255A (en) * 2011-08-29 2012-01-04 飞天诚信科技股份有限公司 Document protection method and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
甘伟明: "用Execl构建计算机等级考试自动改卷评分系统", 《电脑学习》, no. 2, 30 April 2010 (2010-04-30), pages 54 - 55 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104268128A (en) * 2014-09-26 2015-01-07 广州金山移动科技有限公司 Method and device for batch protection of worksheet
CN106502966A (en) * 2015-09-07 2017-03-15 北京国双科技有限公司 EXCEL document treating method and apparatus
CN106502966B (en) * 2015-09-07 2019-08-20 北京国双科技有限公司 EXCEL document treating method and apparatus
CN112651214A (en) * 2020-08-28 2021-04-13 成都格斗科技有限公司 Method for converting data table plaintext into binary ciphertext convenient for program to read
CN112651214B (en) * 2020-08-28 2023-03-28 成都格斗科技有限公司 Method for converting data table plaintext into binary ciphertext convenient for program to read

Also Published As

Publication number Publication date
CN102722682B (en) 2015-01-14

Similar Documents

Publication Publication Date Title
TWI471754B (en) Support for secure objects in a computer system
CN103988467B (en) Ensure the encryption system and method for software encryption technique safety
CN105681039A (en) Method and device for secret key generation and corresponding decryption
CN105939378B (en) Method and device for exporting and importing configuration file
CN109313677A (en) Method and apparatus for the executable verifying of dynamic
CN104067286B (en) The detection of invalid trustship key
CN110929291A (en) Method and device for accessing text file and computer readable storage medium
CN109190401A (en) A kind of date storage method, device and the associated component of Qemu virtual credible root
CN103745166A (en) Method and device for inspecting file attribute value
CN111191195A (en) Method and device for protecting APK
CN102930223B (en) Method and system for protecting disk data
US10572635B2 (en) Automatic correction of cryptographic application program interfaces
CN103971034A (en) Method and device for protecting Java software
CN103268452A (en) Method and device for file processing
CN110650191A (en) Data read-write method of distributed storage system
CN108133147B (en) Method and device for protecting executable code and readable storage medium
CN101815292A (en) Device and method for protecting data of mobile terminal
CN101641701A (en) Device and method for digital processing management of content so as to enable an imposed work flow
CN102722682B (en) Protection method for Excel document
CN109992974A (en) Guard method, equipment and the readable storage medium storing program for executing of Virtual Machine bytecodes file
CN108416224A (en) A kind of data encryption/decryption method and device
CN109065077B (en) Method and device for manufacturing encrypted optical disk
CN102970298A (en) Method, equipment and system for secret leakage prevention
CN113132078A (en) Block chain privacy protection method based on homomorphic commitment and block chain system
JP2000076064A (en) Method and system for inserting watermark into program

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20150114