CN104156673B - File processing method and device - Google Patents

File processing method and device Download PDF

Info

Publication number
CN104156673B
CN104156673B CN201410384596.XA CN201410384596A CN104156673B CN 104156673 B CN104156673 B CN 104156673B CN 201410384596 A CN201410384596 A CN 201410384596A CN 104156673 B CN104156673 B CN 104156673B
Authority
CN
China
Prior art keywords
file
restrictive condition
judge
duration
open
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410384596.XA
Other languages
Chinese (zh)
Other versions
CN104156673A (en
Inventor
刘英东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nubia Technology Co Ltd
Original Assignee
Nubia Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nubia Technology Co Ltd filed Critical Nubia Technology Co Ltd
Priority to CN201410384596.XA priority Critical patent/CN104156673B/en
Publication of CN104156673A publication Critical patent/CN104156673A/en
Application granted granted Critical
Publication of CN104156673B publication Critical patent/CN104156673B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a file processing method and device. The file processing method comprises the steps that when an encrypted file is operated, a limiting condition preset in the encrypted file is analyzed, whether the limiting condition is met currently is judged, and the encrypted file is destroyed if the limiting condition is met. According to the file processing method, the limiting condition is preset for the encrypted file, the limiting condition needs to be analyzed first when the encrypted file is operated on a terminal, then, whether the limiting condition is met currently is judged, the encrypted file is destroyed if the limiting condition is met, as a result, classified information is prevented from leaking, and data security is improved.

Description

Document handling method and device
Technical field
The present invention relates to communication technical field, especially relate to a kind of document handling method and device.
Background technology
Developing rapidly with the communication technology, the propagation of information is more and more convenient and swift, also leads to classified information to be got over simultaneously More easily to leak, the security of data becomes the special concern of enterprise or mechanism.Existing solution is to concerning security matters Data is encrypted, and reads then this data must be decrypted during this data and could obtain correct cleartext information.
Even however, encryption file is it is also possible to be cracked by the third party;Or, forget after encryption file is opened Close and be in during plaintext display state it is also possible to stolen by others for a long time.Therefore, existing solution, data is pacified Full property is not still high.
Content of the invention
Present invention is primarily targeted at providing a kind of file encrypting method and device it is intended to prevent classified information from leaking, Improve the security of data.
To achieve these objectives, the present invention proposes a kind of document handling method, including step:
During operation encryption file, parse default restrictive condition in described encryption file;
Judge currently whether meet described restrictive condition;
If meeting described restrictive condition, damage described encryption file.
Preferably, described restrictive condition include opening duration limit, open that number of times limits, hop count limits, resident when Any one in long restriction, or the arbitrarily combination of two or more.
Preferably, described restrictive condition is to open duration to limit, and whether described judgement currently meets described restrictive condition bag Include:
The existing continuous obtaining described encryption file are opened duration or are added up to open duration;
Judge described persistently open duration or accumulative open duration and whether reach open duration limits value;
If so, then judge currently to meet described restrictive condition.
Preferably, described restrictive condition is to open number of times to limit, and whether described judgement currently meets described restrictive condition bag Include:
Obtain described encryption the accumulative of file and open number of times;
Judge described accumulative open number of times and whether reach open count constraint value;
If so, then judge currently to meet described restrictive condition.
Preferably, described restrictive condition limits for hop count, and whether described judgement currently meets described restrictive condition bag Include:
Obtain the accumulative hop count of described encryption file;
Judge whether described accumulative hop count reaches hop count limits value;
If so, then judge currently to meet described restrictive condition.
The present invention proposes a kind of document handling apparatus simultaneously, including parsing module, judge module and processing module, wherein:
Parsing module:For parsing default restrictive condition in described encryption file;
Judge module, for judging currently whether meet described restrictive condition;
Processing module, for when currently meeting described restrictive condition, damaging described encryption file.
Preferably, described restrictive condition is to open duration to limit, and described judge module is used for:
The existing continuous obtaining described encryption file are opened duration or are added up to open duration;
Judge described persistently open duration or accumulative open duration and whether reach open duration limits value;
If so, then judge currently to meet described restrictive condition.
Preferably, described restrictive condition is to open number of times to limit, and described judge module is used for:
Obtain described encryption the accumulative of file and open number of times;
Judge described accumulative open number of times and whether reach open count constraint value;
If so, then judge currently to meet described restrictive condition.
Preferably, described restrictive condition limits for hop count, and described judge module is used for:
Obtain the accumulative hop count of described encryption file;
Judge whether described accumulative hop count reaches hop count limits value;
If so, then judge currently to meet described restrictive condition.
A kind of document handling method provided by the present invention, by pre-setting restrictive condition for encryption file, terminal is grasped When making encryption file, parse this restrictive condition first, then judge currently whether meet this restrictive condition, meet this restriction bar Then damage encryption file during part, to prevent classified information from leaking, improve the security of data.
Brief description
Fig. 1 is the flow chart of the document handling method first embodiment of the present invention;
Fig. 2 is the flow chart of the document handling method second embodiment of the present invention;
Fig. 3 is the flow chart of the document handling method 3rd embodiment of the present invention;
Fig. 4 is the flow chart of the document handling method fourth embodiment of the present invention;
Fig. 5 is the structured flowchart of document handling apparatus one embodiment of the present invention.
The realization of the object of the invention, functional characteristics and advantage will be described further in conjunction with the embodiments referring to the drawings.
Specific embodiment
It should be appreciated that specific embodiment described herein, only in order to explain the present invention, is not intended to limit the present invention.
The document handling method of the present invention, is particularly suited for being related to the security system of sensitive information.By in encryption file Middle setting restrictive condition, when terminal operation encryption file, default restrictive condition in parsing encryption file, currently whether judge Meeting restrictive condition, if meeting restrictive condition, damaging this encryption file, with the safety of protection information.Wherein, operation encryption literary composition Part, refers to open encryption file, reads encryption file, show encryption file, forward encryption file, scanning encryption file, loading Encryption file etc.;Restrictive condition includes opening during duration limits, opens that number of times limits, hop count limits, resident duration limits Any one, or the arbitrarily combination of two or more;Damage encryption file includes deleting encryption file, formats encryption literary composition Part place storage region etc..
Restrictive condition in encryption file, sets when generating encryption file.Specifically, user clicks on menu, pin Related confidential document is encrypted, and Choice encryption attribute (contains restrictive condition, when such as opening in this cryptographic attributes simultaneously Length limits, opens number of times limits, hop count limits, resident duration limits etc.).Then, terminal first corresponds to according to cryptographic attributes Value+public key, using AES, generate file attribute ciphertext, then read file content data+public key, calculated using encryption Method, generates file data ciphertext, file attribute ciphertext and file data ciphertext is re-write it together as complete data In front file, the length of file data ciphertext is write in the file header of file system, thus generating with restriction simultaneously The encryption file of condition.
Below by way of specific embodiment, the document handling method of the present invention is described in detail.
Referring to Fig. 1, the document handling method first embodiment of the present invention is proposed, described document handling method includes following step Suddenly:
Step S101:When opening encryption file, parsing default restrictive condition in encryption file is to open duration to limit
Specifically, when terminal receives the instruction opening encryption file, first encryption file is parsed, obtain encryption Default restrictive condition in file, the restrictive condition encrypting file in the present embodiment is to open duration to limit, and opens for single Duration, terminal obtains the limits value opening duration simultaneously, and this limits value can be set to a few minutes to dozens of minutes.
Specifically analytic method is:Terminal reads encryption file, reads file data and (includes file attribute ciphertext and literary composition Number of packages is according to ciphertext) and file header length A, calculate length B of file data, then deduct length A of file header, draw literary composition Length C of part attribute ciphertext, then goes out the data cutout of C byte front in file data, draws genus using public key+decipherment algorithm Property in plain text, according to property value, obtain corresponding restrictive condition.
Step S102:Open encryption file
Terminal execution File Open instruction, opens encryption file.
Step S103:Calculate and persistently open duration
Terminal can start timing when the File Open by timer, calculate encryption file existing continuous and open duration.
Step S104:Judge persistently to open duration and whether reach to open duration limits value
If reaching limits value, enter step S105;Otherwise, continue to stay open or display state.
Step S105:Damage encryption file
Open or display state when encryption file is in for a long time, when it shows that duration reaches limits value, terminal is then deleted This encryption file or the storage region formatting this encryption file place, it is to avoid user leaves terminal after opening encryption file and forgets Note is closed, and prevents information leakage.
In certain embodiments, opening duration and limit can also be to limit encryption the accumulative of file to open duration, and terminal obtains Take encryption file in the past all previous open duration, along with this opens duration, obtain accumulative opens duration, judge accumulative opening Whether duration reaches is opened duration limits value.
Referring to Fig. 2, the document handling method second embodiment of the present invention is proposed, described document handling method includes following step Suddenly:
Step S201:When opening encryption file, parsing default restrictive condition in encryption file is to open number of times to limit
The restrictive condition encrypting file in the present embodiment is to open number of times to limit, and terminal obtains the restriction opening number of times simultaneously Value.
Step S202:Obtain encryption the accumulative of file and open number of times
Terminal can by counter add up encrypt file open number of times, that is, encryption file often open once in the machine, Counter then carries out one-accumulate, and stores cumulative data.Terminal directly obtains cumulative data from storage, thus obtain to add The accumulative of ciphertext part opens number of times.
Step S203:Judge accumulative open number of times and whether reach open count constraint value
If cumulative data is more than or equal to limits value, enter step S204;Otherwise, enter step S205.
Step S204:Damage encryption file
Open number of times and reach limits value if accumulative, terminal does not then return the file data reading, and deletes encryption file Or format the storage region at this encryption file place.For example, when formatting, terminal finds the physical store of file data Position, and set gradually as 00, the file header of this document is set to deletion state simultaneously.
Step S205:Open encryption file
If accumulative number of times of opening also is not reaching to limits value, execution File Open instruction, open this encryption file, simultaneously Counter carries out one-accumulate to opening number of times, and stores cumulative data.
Referring to Fig. 3, the document handling method 3rd embodiment of the present invention is proposed, described document handling method includes following step Suddenly:
Step S301:When forwarding encryption file, parse default restrictive condition in encryption file and limit for hop count
The restrictive condition encrypting file in the present embodiment limits for hop count, and terminal obtains the restriction of hop count simultaneously Value.
Step S302:Obtain the accumulative hop count of encryption file
Terminal can add up to encrypt the hop count of file by counter, and that is, encryption file often forwards once in the machine, Counter then carries out one-accumulate, and stores cumulative data.Terminal directly obtains cumulative data from storage, thus obtain to add The accumulative hop count of ciphertext part.
Step S303:Judge whether accumulative hop count reaches hop count limits value
If cumulative data is more than or equal to limits value, enter step S304;Otherwise, enter step S305.
Step S304:Damage encryption file
If accumulative hop count reaches limits value, the memory block deleted encryption file or format this encryption file place Domain.
Step S305:Forward encryption file
If accumulative hop count is also not reaching to limits value, execution file forwards instruction, forwards this encryption file, simultaneously Counter carries out one-accumulate to hop count, and stores cumulative data.
Referring to Fig. 4, the document handling method fourth embodiment of the present invention is proposed, described document handling method includes following step Suddenly:
Step S401:During operation encryption file, parsing default restrictive condition in encryption file is that resident duration limits
The restrictive condition encrypting file in the present embodiment is that resident duration limits, and terminal obtains the restriction of resident duration simultaneously Value.Described operation encryption file, can be to open encryption file, read encryption file, forward encryption file, load encryption file Deng, or terminal timing scan encryption file.
Step S402:Obtain the duration that encryption file resides at the machine
Terminal can start lasting timing by timer when encryption file is stored in the machine, calculate encryption file and stay Stay the duration in the machine.
Step S403:Judge whether the duration residing at the machine reaches resident duration limits value
If timing duration is more than or equal to limits value, enter step S404;Otherwise, execute corresponding operation (such as to open and add Ciphertext part, forwarding encryption file, loading encryption file etc.) or not respond (during timing scan encryption file)
Step S404:Damage encryption file
If the duration that encryption file resides at the machine is more than or equal to limits value, deletes encryption file or format this encryption The storage region that file is located.
In certain embodiments it is also possible to be combined to the restrictive condition in previous embodiment, when for combining limit During condition processed, wherein any one restrictive condition is satisfied, predetermined number restrictive condition is satisfied or all of restriction bar When part all meets, then damage has the encryption file of this combination restrictive condition.
Thus, the document handling method of the present invention, by pre-setting restrictive condition for encryption file, terminal operation is encrypted During file, parse this restrictive condition first, then judge currently whether meet this restrictive condition, meet during this restrictive condition then Damage encryption file, to prevent classified information from leaking, improves the security of data.
Referring to Fig. 5, document handling apparatus one embodiment of the present invention is proposed, described document handling apparatus includes parsing mould Block, judge module and processing module.
Parsing module:For in operation encryption file, parsing to this encryption file, to obtain in this encryption file Default restrictive condition and corresponding limits value, and it is sent to judge module.Described restrictive condition include opening duration limit, Open that number of times limits, hop count limits, resident duration limit in any one, or the arbitrarily combination of two or more.
For example, when receive open encryption file, forward encryption file instruction when, parsing module is then to this encryption file Parsed;Or parsing module timing to all of encryption file be scanned parse.
Parsing module can parse to encryption file in the following manner:Parsing module reads encryption file, reads To length A of file data (including file attribute ciphertext and file data ciphertext) and file header, calculate the length of file data Degree B, then deducts length A of file header, draws length C of file attribute ciphertext, then the number of C byte front in file data According to intercepting out, draw attribute in plain text using public key+decipherment algorithm, according to property value, obtain corresponding restrictive condition.
Judge module:For judging currently whether meet the restrictive condition of this encryption file, and will determine that result is sent to Processing module.
When restrictive condition be open duration limit when, judge module then obtain encryption file existing continuous open duration or Accumulative open duration, judge persistently to open duration or accumulative open duration and whether reach open duration limits value;If reaching restriction Value, then judge currently to meet restrictive condition;Otherwise, it is determined that being unsatisfactory for restrictive condition.Judge module can be by timer from literary composition Start timing when part is opened, calculate encryption file existing continuous and open duration;Or add up to open duration by timer.
When restrictive condition is to open number of times to limit, judge module then obtains the accumulative of encryption file and opens number of times, judges Accumulative open number of times and whether reach open count constraint value;If reaching limits value, judge currently to meet restrictive condition;Otherwise, Judge to be unsatisfactory for restrictive condition.Judge module can by counter add up encrypt file open number of times, that is, encryption file this Often open once in machine, counter then carries out one-accumulate, and store cumulative data, judge module directly obtains tired from storage Addend evidence, thus obtain the accumulative of this encryption file to open number of times.
When restrictive condition limits for hop count, judge module then obtains the accumulative hop count of encryption file, judges Whether accumulative hop count reaches hop count limits value;If reaching limits value, judge currently to meet restrictive condition;Otherwise, Judge to be unsatisfactory for restrictive condition.Judge module can add up to encrypt the hop count of file by counter, and that is, encryption file is at this Often forward once in machine, counter then carries out one-accumulate, and store cumulative data, judge module directly obtains tired from storage Addend evidence, thus obtain the accumulative hop count of this encryption file.
When restrictive condition limits for resident duration, judge module then obtain encryption file reside at the machine accumulative when Long, judge whether this duration reaches resident duration limits value;If reaching limits value, judge currently to meet restrictive condition;Otherwise, Judge to be unsatisfactory for restrictive condition.Judge module can start lasting timing by timer when encryption file is stored in the machine, meter Calculate the duration that encryption file resides at the machine.
Processing module:For according to judged result, respective handling being carried out to file.If it is judged that adding for current satisfaction The restrictive condition of ciphertext part, then damage this encryption file, such as deletes this encryption file or formats depositing of this encryption file place Storage area domain;If it is judged that for the current restrictive condition meeting encryption file, then execute corresponding operate, such as open file, Transmit a document, continuous presentation file etc., or the result being obtained by parsing module active scan is (as active scan encrypts file Learn that the resident duration of this encryption file is still not reaching to limits value), then not respond.
In certain embodiments it is also possible to be combined to the restrictive condition in previous embodiment, when for combining limit During condition processed, wherein any one restrictive condition is satisfied, predetermined number restrictive condition is satisfied or all of restriction bar When part all meets, processing module then damages the encryption file with this combination restrictive condition.
Technical characteristic in said method embodiment is all corresponding applicable in this device, no longer repeats here.
Thus, the document handling apparatus of the present invention, by pre-setting restrictive condition for encryption file, terminal operation is encrypted During file, parse this restrictive condition first, then judge currently whether meet this restrictive condition, meet during this restrictive condition then Damage encryption file, to prevent classified information from leaking, improves the security of data.
It should be noted that:The document handling apparatus that above-described embodiment provides when carrying out file process, only with above-mentioned each The division of functional module is illustrated, and in practical application, can distribute above-mentioned functions by different work(as desired Can module complete.In addition, the document handling apparatus that above-described embodiment provides belongs to same design with document handling method embodiment, It implements process and refers to embodiment of the method, repeats no more here.
One of ordinary skill in the art will appreciate that, realizing all or part of step in above-described embodiment method can lead to Cross program to control the hardware of correlation to complete, described program can be stored in a computer read/write memory medium, described Storage medium can be ROM/RAM, disk, CD etc..
The preferred embodiments of the present invention above by reference to brief description, not thereby limit to the interest field of the present invention.This Skilled person, without departing from the scope of the present invention and essence, can have multiple flexible programs to realize the present invention, for example as one The feature of individual embodiment can be used for another embodiment and obtains another embodiment.All institutes within the technology design with the present invention Any modification, equivalent and the improvement made, all should be within the interest field of the present invention.

Claims (8)

1. a kind of document handling method is it is characterised in that include step:
During operation encryption file, parse default restrictive condition in described encryption file, specially:Read encryption file, obtain To length A of file data and file header, described file data includes file attribute ciphertext and file data ciphertext;Calculate literary composition Length B of number of packages evidence, then deducts length A of file header, draws length C of file attribute ciphertext;Then in file data The data cutout of front C byte goes out as file attribute ciphertext, draws file attribute in plain text using public key+decipherment algorithm;According to literary composition Part attribute plaintext obtains default restrictive condition;
Judge currently whether meet described restrictive condition;
If meeting described restrictive condition, damage described encryption file;
Wherein, described restrictive condition includes opening duration restriction, opens number of times restriction, hop count restriction, the restriction of resident duration In any one, or the arbitrarily combination of two or more.
2. document handling method according to claim 1 it is characterised in that described restrictive condition be open duration limit, Whether described judgement currently meets described restrictive condition includes:
The existing continuous obtaining described encryption file are opened duration or are added up to open duration;
Judge described persistently open duration or accumulative open duration and whether reach open duration limits value;
If so, then judge currently to meet described restrictive condition.
3. document handling method according to claim 1 it is characterised in that described restrictive condition be open number of times limit, Whether described judgement currently meets described restrictive condition includes:
Obtain described encryption the accumulative of file and open number of times;
Judge described accumulative open number of times and whether reach open count constraint value;
If so, then judge currently to meet described restrictive condition.
4. document handling method according to claim 1 it is characterised in that described restrictive condition be hop count limit, Whether described judgement currently meets described restrictive condition includes:
Obtain the accumulative hop count of described encryption file;
Judge whether described accumulative hop count reaches hop count limits value;
If so, then judge currently to meet described restrictive condition.
5. a kind of document handling apparatus is it is characterised in that include parsing module, judge module and processing module, wherein:
Parsing module:For in operation encryption file, parsing default restrictive condition in described encryption file, specially: Read encryption file, obtain length A of file data and file header, described file data includes file attribute ciphertext and number of files According to ciphertext;Calculate length B of file data, then deduct length A of file header, draw length C of file attribute ciphertext;So Afterwards the data cutout of C byte front in file data is gone out as file attribute ciphertext, show that file belongs to using public key+decipherment algorithm Property in plain text;Default restrictive condition is obtained according to file attribute plaintext;
Judge module, for judging currently whether meet described restrictive condition;
Processing module, for when currently meeting described restrictive condition, damaging described encryption file;
Wherein, described restrictive condition includes opening duration restriction, opens number of times restriction, hop count restriction, the restriction of resident duration In any one, or the arbitrarily combination of two or more.
6. document handling apparatus according to claim 5 it is characterised in that described restrictive condition be open duration limit, Described judge module is used for:
The existing continuous obtaining described encryption file are opened duration or are added up to open duration;
Judge described persistently open duration or accumulative open duration and whether reach open duration and limit;
If so, then judge currently to meet described restrictive condition.
7. document handling apparatus according to claim 5 it is characterised in that described restrictive condition be open number of times limit, Described judge module is used for:
Obtain described encryption the accumulative of file and open number of times;
Judge described accumulative open number of times and whether reach open number of times and limit;
If so, then judge currently to meet described restrictive condition.
8. document handling apparatus according to claim 5 it is characterised in that described restrictive condition be hop count limit, Described judge module is used for:
Obtain the accumulative hop count of described encryption file;
Judge whether described accumulative hop count reaches hop count and limit;
If so, then judge currently to meet described restrictive condition.
CN201410384596.XA 2014-08-06 2014-08-06 File processing method and device Active CN104156673B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410384596.XA CN104156673B (en) 2014-08-06 2014-08-06 File processing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410384596.XA CN104156673B (en) 2014-08-06 2014-08-06 File processing method and device

Publications (2)

Publication Number Publication Date
CN104156673A CN104156673A (en) 2014-11-19
CN104156673B true CN104156673B (en) 2017-02-15

Family

ID=51882170

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410384596.XA Active CN104156673B (en) 2014-08-06 2014-08-06 File processing method and device

Country Status (1)

Country Link
CN (1) CN104156673B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105893280A (en) * 2015-01-26 2016-08-24 深圳市硅格半导体有限公司 Memory card data encryption method and system
CN105701366B (en) * 2015-12-31 2019-02-26 曾庆义 A kind of method and system controlling file propagation
CN107294930B (en) * 2016-04-05 2021-08-17 阿里巴巴集团控股有限公司 File propagation management method and device
CN107220554B (en) * 2017-06-20 2020-11-27 深圳市六度人和科技有限公司 File forwarding management method, corresponding system and terminal equipment
CN109213102B (en) * 2018-09-11 2022-01-18 深圳众城卓越科技有限公司 Multi-command monitoring method and device, computer equipment and storage medium

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101778352A (en) * 2009-12-25 2010-07-14 中兴通讯股份有限公司 Realization method and system of technology for protecting multimedia message contents
CN102843283A (en) * 2011-06-23 2012-12-26 中兴通讯股份有限公司 Method and device for data forwarding protection
CN103136482A (en) * 2011-11-22 2013-06-05 无锡安腾软件开发有限公司 Method of limiting opening time of document
CN103617378B (en) * 2013-11-01 2017-07-14 北京创世泰克科技股份有限公司 DRM content protection system and method based on mobile intelligent terminal

Also Published As

Publication number Publication date
CN104156673A (en) 2014-11-19

Similar Documents

Publication Publication Date Title
CN104156673B (en) File processing method and device
EP3848838A1 (en) Model parameter acquisition method and system based on federated learning, and readable storage medium
CN103294961A (en) Method and device for file encrypting/decrypting
US20180341556A1 (en) Data backup method and device, storage medium and server
CN108880806A (en) Encryption and decryption method, chip and readable storage medium storing program for executing
CN105809042A (en) Information protection method and device, information display method and device, and terminal
CN102306255B (en) Document protection method and system
CN107533613B (en) Storage medium product, cloud printing system and PDF file access method
CN110474767A (en) Chip keys method for burn-recording and system under a kind of off-line state
CN113987557A (en) File encryption processing method and system, electronic equipment and storage medium
JP2020524864A (en) Controlling access to data
CN108133147B (en) Method and device for protecting executable code and readable storage medium
CN110262908A (en) A kind of processing method and processing device of shear plate data
CN105989304A (en) File storage method, file reading method, file storage apparatus and file reading apparatus
CN104601820A (en) Mobile terminal information protection method based on TF password card
US20170200020A1 (en) Data management system, program recording medium, communication terminal, and data management server
CN110753257A (en) Data display method, display terminal, server, display system, and storage medium
CN105391677A (en) Information transmission method and mobile terminal
CN103605927B (en) Encryption and decryption method and device based on embedded Linux system
CN108173906A (en) Installation kit method for down loading, device, storage medium and electronic equipment
CN109065077B (en) Method and device for manufacturing encrypted optical disk
CN111143879A (en) Android platform SD card file protection method, terminal device and storage medium
JP6531373B2 (en) INFORMATION PROCESSING APPARATUS, CONTROL METHOD FOR INFORMATION PROCESSING APPARATUS, AND PROGRAM
CN111931222B (en) Application data encryption method, device, terminal and storage medium
CN106549927A (en) Key preservation, acquisition methods and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: A District No. 9018 Han innovation building in Nanshan District high tech Zone in Shenzhen city of Guangdong Province, North Central Avenue, 518000 floor 10

Applicant after: Nubian Technologies Ltd.

Address before: A District No. 9018 Han innovation building in Nanshan District high tech Zone in Shenzhen city of Guangdong Province, North Central Avenue, 518000 floor 10

Applicant before: Shenzhen ZTE Mobile Tech Co., Ltd.

C14 Grant of patent or utility model
GR01 Patent grant