CN105630855A - File sharing method, file sharing system and terminal - Google Patents

File sharing method, file sharing system and terminal Download PDF

Info

Publication number
CN105630855A
CN105630855A CN201510200279.2A CN201510200279A CN105630855A CN 105630855 A CN105630855 A CN 105630855A CN 201510200279 A CN201510200279 A CN 201510200279A CN 105630855 A CN105630855 A CN 105630855A
Authority
CN
China
Prior art keywords
file
decryptdecryption
given content
terminal
shared
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510200279.2A
Other languages
Chinese (zh)
Other versions
CN105630855B (en
Inventor
张磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201510200279.2A priority Critical patent/CN105630855B/en
Publication of CN105630855A publication Critical patent/CN105630855A/en
Application granted granted Critical
Publication of CN105630855B publication Critical patent/CN105630855B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/17Details of further file system functions
    • G06F16/176Support for shared access to files; File sharing support
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/74Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Data Mining & Analysis (AREA)
  • Mathematical Physics (AREA)
  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention provides a file sharing method, a file sharing system and a terminal. The file sharing method comprises the following steps of when a sharing request of any one ordinary system in the terminal on a file of a security system in the terminal, determining whether the file contains a specified content or not according to the attribute of the file; when the condition that the file contains the specified content is determined, judging whether the file needs to be subjected to decryption processing or not; and sharing the file for any one ordinary system according to the judging result. By using the technical scheme, a user can share the file from the security system of the terminal to the ordinary system; the decryption processing can be performed in the sharing process so as to ensure the security of private information; and the experience of the user is improved.

Description

File sharing method, shared file system and terminal
Technical field
The present invention relates to field of terminal technology, in particular to a kind of file sharing method, a kind of shared file system and a kind of terminal.
Background technology
At present, being independent between existing security system and non-security system, data (such as file etc.) between cannot be carried out alternately. If user needs from conventional system, some data (such as calling record, note, photo etc.) security system to be shared, but understood by people without wishing to private information therein again, be difficult to realization. Additionally; if the user thinks that some data in the security system has been no longer necessary to carry out so high-grade safeguard protection; but simultaneously again without wishing to deleting these files, also cannot be moved in non-security system on the basis of the safety of this data of guarantee.
It is thus desirable to a kind of new technical scheme, make user to be shared to conventional system from the security system of terminal by file, and ensure the safety of file.
Summary of the invention
The present invention is based on the problems referred to above, it is proposed that a kind of new technical scheme, makes user to be shared to conventional system from the security system of terminal by file, and ensures the safety of file.
In view of this, an aspect of of the present present invention proposes a kind of file sharing method, during including: the arbitrary conventional system in receiving described terminal to the sharing request of the file of the security system in described terminal, the attribute according to described file, it is determined that whether described file comprises given content; When determining that described file comprises described given content, it may be judged whether described file is carried out DecryptDecryption process; According to judged result, share described file for described arbitrary conventional system.
In this technical scheme, owing to different files comprises different attributes, can determine whether file comprises given content according to the attribute of file, given content described here is that user sets or that system automatically determines according to keyword etc. private information, if file comprises given content, then need this document is carried out DecryptDecryption process, and then guarantee that private information is not leaked, it is ensured that the safety of private information. Wherein, the concrete opportunity of the computing processed about the detection of given content and DecryptDecryption needs the actual demand according to user to determine, if be only carried out when file is stored in, substantial amounts of operand is likely to affect the speed of service of terminal, and then affect Consumer's Experience, if and only need when shared DecryptDecryption process in just carry out interim computing, user can be made again to wait oversize opportunity, therefore, in order to ensure the convenience of user operation, calculation process can be carried out, for instance the length of one's sleep when user does not use mobile phone. So both not interfering with Consumer's Experience, free time can be utilized again to carry out detecting and computing, needing that what which part of file carried out processes to make user may know that when directly reading file.
In technique scheme, it is preferable that described DecryptDecryption processes and specifically includes: delete described given content; Revise described given content; Hide described given content; Or replace described given content by the replacement content similar with described given content.
In this technical scheme, DecryptDecryption processes and includes but not limited to deletion, amendment, hiding or replacement operation, and given content can be processed by user according to individual demand, thus meeting the different demands of different user, this way it is ensured that the safety of private information, promote user's experience. Wherein, for text, there are two kinds of processing modes, a kind of is that the secret Word message that directly will match to is deleted, and in conjunction with contextual information, residue word is combined, another kind of then be the secret Word message matched is hidden operation, such as blacking, replace with mess code etc. And the DecryptDecryption of image file processes relatively simple, directly the pixel relating to the region of private information is carried out mosaicked field and process. DecryptDecryption process for audio file also has two ways, a kind of be directly by Corresponding matching to secret audio-frequency information delete, and the voice data after deleting secret audio-frequency information is combined, another kind is then utilize other audios to replace this part audio-frequency information, for instance drip sound. Video file, by audio file and what a lot of image file was constituted, therefore can use the above-mentioned processing method to audio file and image file that video file is carried out DecryptDecryption process.
In technique scheme, preferably, described when determining that described file comprises described given content, judge whether described file is carried out DecryptDecryption process, specifically include: when determining that described file comprises described given content, sending prompting, described prompting includes DecryptDecryption prompting or need not point out by DecryptDecryption; And receive the selection order to described prompting, determine whether described file is carried out described DecryptDecryption process for according to described selection order.
In this technical scheme, when determining that the file needing to share comprises given content, when namely needing that the file shared comprises private information, terminal can prompt the user whether this private information is carried out DecryptDecryption process, when given content is ostensible content, can send and need not point out by DecryptDecryption, given content need not be carried out DecryptDecryption process by prompting user, it is sent directly to shared region, thus promoting the operational efficiency of terminal, otherwise, if this document comprises private information, DecryptDecryption prompting can be sent, given content is carried out DecryptDecryption process by prompting user, and then ensure the safety of given content, improve user's experience.
In technique scheme, preferably, the described attribute of described file includes at least one of or its combination: the filename of described file, the size of described file, the relevant contact information of described file, the keyword of described file, described file storage position, receive time of described file; And described file includes at least one of or its combination: text, image file, audio file, video file.
In this technical scheme, the attribute of file includes but not limited to the filename of file, size, relevant contact information, keyword, storage position, reception time etc., both can be wherein certain attribute, it can also be the combination of plurality of attribute, by the judgement to file attribute, can determine in file whether comprise given content more accurately and quickly, i.e. private information, thus promoting the safety of terminal. It addition, the technical program is primarily directed to text, image file, audio file, four kinds of active files of video file, wherein, determine whether file comprises given content according to the attribute of file, relate to a kind of concerning security matters recognition mechanism. To text, such as WORD document, note etc, file is carried out keyword match in conjunction with context by its concerning security matters recognition method exactly, here keyword can by system definition, such as definition initial key word " transaction ", " address ", can also be added by User Defined, it might even be possible to consider according to some the total keyword between multiple secure files of user as target keywords. If some information and keyword match success in document, this illustrates that this partial information has related to the private information of user. The close recognition method of image file utilizes image recognition technology exactly, and this needs user to provide the original photo of need for confidentiality personage so that system generates face and the physical trait value of corresponding personage. If there being image file to need to carry out DecryptDecryption process, first file can be carried out Text region, see whether it is close of a sort photo, this identification still falls within keyword match category, additionally, the character image in picture can also be identified and generate characteristic of correspondence value, the eigenvalue that these eigenvalues generate with personage's picture of customer-furnished need for confidentiality before being mated, so illustrates that this partial information has related to the private information of user if the match is successful. For audio file, mainly still utilize speech recognition technology that audio keyword is carried out concerning security matters identification. Video file is by audio file and what a lot of image file was constituted, and therefore it may be used for the concerning security matters recognition mechanism to audio file and image file.
In technique scheme, preferably, described according to judged result, described file is shared for described arbitrary conventional system, specifically include: when described judged result is for being, described file is carried out described DecryptDecryption process, and after completing the process of described DecryptDecryption, described file is preserved the shared region to described terminal; When described judged result is no, described file is not carried out described DecryptDecryption process, and directly described file is preserved to described shared region; The described security system of wherein said terminal has the read right to described shared region and write permission, and described arbitrary conventional system of described terminal has the read right to described shared region.
In this technical scheme, after file is carried out DecryptDecryption process, in order to protect the safety of file; file can be preserved to shared region; this shared region had both been not belonging to security system, was also not belonging to conventional system, and conventional system can read this document from shared region. Equally, if it is determined that when specified file is not processed, file is sent directly in shared region. Wherein, security system has the access limit to shared region, and conventional system only has the read right to shared region, so, improves the safety of private information in shared region, improves user's experience.
According to a further aspect in the invention, also proposed a kind of shared file system, comprise determining that unit, when arbitrary conventional system in receiving described terminal is to the sharing request of the file of the security system in described terminal, attribute according to described file, it is determined that whether described file comprises given content; Judging unit, when determining that described file comprises described given content, it may be judged whether described file is carried out DecryptDecryption process; Shared cell, according to judged result, shares described file for described arbitrary conventional system.
In this technical scheme, owing to different files comprises different attributes, can determine whether file comprises given content according to the attribute of file, given content described here is that user sets or that system automatically determines according to keyword etc. private information, if file comprises given content, then need this document is carried out DecryptDecryption process, and then guarantee that private information is not leaked, it is ensured that the safety of private information. Wherein, the concrete opportunity of the computing processed about the detection of given content and DecryptDecryption needs the actual demand according to user to determine, if be only carried out when file is stored in, substantial amounts of operand is likely to affect the speed of service of terminal, and then affect Consumer's Experience, if and only need when shared DecryptDecryption process in just carry out interim computing, user can be made again to wait oversize opportunity, therefore, in order to ensure the convenience of user operation, calculation process can be carried out, for instance the length of one's sleep when user does not use mobile phone. So both not interfering with Consumer's Experience, free time can be utilized again to carry out detecting and computing, needing that what which part of file carried out processes to make user may know that when directly reading file.
In technique scheme, it is preferable that described DecryptDecryption processes and specifically includes: delete described given content; Revise described given content; Hide described given content; Or replace described given content by the replacement content similar with described given content.
In this technical scheme, DecryptDecryption processes and includes but not limited to deletion, amendment, hiding or replacement operation, and given content can be processed by user according to individual demand, thus meeting the different demands of different user, this way it is ensured that the safety of private information, promote user's experience. Wherein, for text, there are two kinds of processing modes, a kind of is that the secret Word message that directly will match to is deleted, and in conjunction with contextual information, residue word is combined, another kind of then be the secret Word message matched is hidden operation, such as blacking, replace with mess code etc. And the DecryptDecryption of image file processes relatively simple, directly the pixel relating to the region of private information is carried out mosaicked field and process. DecryptDecryption process for audio file also has two ways, a kind of be directly by Corresponding matching to secret audio-frequency information delete, and the voice data after deleting secret audio-frequency information is combined, another kind is then utilize other audios to replace this part audio-frequency information, for instance drip sound. Video file, by audio file and what a lot of image file was constituted, therefore can use the above-mentioned processing method to audio file and image file that video file is carried out DecryptDecryption process.
In technique scheme, preferably, described judging unit specifically for: when determining that described file comprises described given content, send prompting, described prompting includes DecryptDecryption prompting or need not point out by DecryptDecryption, and receive the selection order to described prompting, determine whether described file is carried out described DecryptDecryption process for according to described selection order.
In this technical scheme, when determining that the file needing to share comprises given content, when namely needing that the file shared comprises private information, terminal can prompt the user whether this private information is carried out DecryptDecryption process, when given content is ostensible content, can send and need not point out by DecryptDecryption, given content need not be carried out DecryptDecryption process by prompting user, it is sent directly to shared region, thus promoting the operational efficiency of terminal, otherwise, if this document comprises private information, DecryptDecryption prompting can be sent, given content is carried out DecryptDecryption process by prompting user, and then ensure the safety of given content, improve user's experience.
In technique scheme, preferably, the described attribute of described file includes at least one of or its combination: the filename of described file, the size of described file, the relevant contact information of described file, the keyword of described file, described file storage position, receive time of described file; And described file includes at least one of or its combination: text, image file, audio file, video file.
In this technical scheme, the attribute of file includes but not limited to the filename of file, size, relevant contact information, keyword, storage position, reception time etc., both can be wherein certain attribute, it can also be the combination of plurality of attribute, by the judgement to file attribute, can determine in file whether comprise given content more accurately and quickly, i.e. private information, thus promoting the safety of terminal. It addition, the technical program is primarily directed to text, image file, audio file, four kinds of active files of video file, wherein, determine whether file comprises given content according to the attribute of file, relate to a kind of concerning security matters recognition mechanism. To text, such as WORD document, note etc, file is carried out keyword match in conjunction with context by its concerning security matters recognition method exactly, here keyword can by system definition, such as definition initial key word " transaction ", " address ", can also be added by User Defined, it might even be possible to consider according to some the total keyword between multiple secure files of user as target keywords. If some information and keyword match success in document, this illustrates that this partial information has related to the private information of user. The close recognition method of image file utilizes image recognition technology exactly, and this needs user to provide the original photo of need for confidentiality personage so that system generates face and the physical trait value of corresponding personage. If there being image file to need to carry out DecryptDecryption process, first file can be carried out Text region, see whether it is close of a sort photo, this identification still falls within keyword match category, additionally, the character image in picture can also be identified and generate characteristic of correspondence value, the eigenvalue that these eigenvalues generate with personage's picture of customer-furnished need for confidentiality before being mated, so illustrates that this partial information has related to the private information of user if the match is successful. For audio file, mainly still utilize speech recognition technology that audio keyword is carried out concerning security matters identification. Video file is by audio file and what a lot of image file was constituted, and therefore it may be used for the concerning security matters recognition mechanism to audio file and image file.
In technique scheme, preferably, described shared cell specifically for: when described judged result is for being, described file is carried out described DecryptDecryption process, and after completing the process of described DecryptDecryption, described file is preserved the shared region to described terminal, and when described judged result is no, described file is not carried out described DecryptDecryption process, and directly described file is preserved to described shared region, wherein, the described security system of described terminal has the read right to described shared region and write permission, described arbitrary conventional system of described terminal has the read right to described shared region.
In this technical scheme, after file is carried out DecryptDecryption process, in order to protect the safety of file; file can be preserved to shared region; this shared region had both been not belonging to security system, was also not belonging to conventional system, and conventional system can read this document from shared region. Equally, if it is determined that when specified file is not processed, file is sent directly in shared region. Wherein, security system has the access limit to shared region, and conventional system only has the read right to shared region, so, improves the safety of private information in shared region, improves user's experience.
The embodiment of another aspect of the invention proposes a kind of terminal, including the shared file system according to any one of such as technique scheme, therefore, this terminal has the technique effect identical with the shared file system according to any one of technique scheme, does not repeat them here.
By above technical scheme, can determine whether file comprises given content according to the attribute of file, if file comprises given content, then need this document is carried out DecryptDecryption process, and then guarantee that private information is not leaked, make user to be shared to conventional system from the security system of terminal by file, it is ensured that the safety of private information, improve Consumer's Experience.
Accompanying drawing explanation
Fig. 1 illustrates the flow chart of file sharing method according to an embodiment of the invention;
Fig. 2 illustrates the block diagram of shared file system according to an embodiment of the invention;
Fig. 3 illustrates the block diagram of terminal according to an embodiment of the invention;
Fig. 4 illustrates the flow chart of file sharing method according to another embodiment of the invention.
Detailed description of the invention
In order to be more clearly understood that the above-mentioned purpose of the present invention, feature and advantage, below in conjunction with the drawings and specific embodiments, the present invention is further described in detail. It should be noted that when not conflicting, embodiments herein and the feature in embodiment can be mutually combined.
Elaborate a lot of detail in the following description so that fully understanding the present invention; but; the present invention can also adopt other to be different from other modes described here to implement, and therefore, protection scope of the present invention is by the restriction of following public specific embodiment.
Fig. 1 illustrates the flow chart of file sharing method according to an embodiment of the invention.
As it is shown in figure 1, file sharing method according to an embodiment of the invention, described method includes:
Step 102, when the arbitrary conventional system in receiving described terminal is to the sharing request of the file of the security system in described terminal, the attribute according to described file, it is determined that whether described file comprises given content.
Step 104, when determining that described file comprises described given content, it may be judged whether described file is carried out DecryptDecryption process.
Step 106, according to judged result, shares described file for described arbitrary conventional system.
In this technical scheme, owing to different files comprises different attributes, can determine whether file comprises given content according to the attribute of file, given content described here is that user sets or that system automatically determines according to keyword etc. private information, if file comprises given content, then need this document is carried out DecryptDecryption process, and then guarantee that private information is not leaked, it is ensured that the safety of private information. Wherein, the concrete opportunity of the computing processed about the detection of given content and DecryptDecryption needs the actual demand according to user to determine, if be only carried out when file is stored in, substantial amounts of operand is likely to affect the speed of service of terminal, and then affect Consumer's Experience, if and only need when shared DecryptDecryption process in just carry out interim computing, user can be made again to wait oversize opportunity, therefore, in order to ensure the convenience of user operation, calculation process can be carried out, for instance the length of one's sleep when user does not use mobile phone. So both not interfering with Consumer's Experience, free time can be utilized again to carry out detecting and computing, needing that what which part of file carried out processes to make user may know that when directly reading file.
In technique scheme, it is preferable that DecryptDecryption processes and specifically includes: delete given content; Amendment given content; Hide given content; Or replace given content by the replacement content similar with given content.
In this technical scheme, DecryptDecryption processes and includes but not limited to deletion, amendment, hiding or replacement operation, and given content can be processed by user according to individual demand, thus meeting the different demands of different user, this way it is ensured that the safety of private information, promote user's experience. Wherein, for text, there are two kinds of processing modes, a kind of is that the secret Word message that directly will match to is deleted, and in conjunction with contextual information, residue word is combined, another kind of then be the secret Word message matched is hidden operation, such as blacking, replace with mess code etc. And the DecryptDecryption of image file processes relatively simple, directly the pixel relating to the region of private information is carried out mosaicked field and process. DecryptDecryption process for audio file also has two ways, a kind of be directly by Corresponding matching to secret audio-frequency information delete, and the voice data after deleting secret audio-frequency information is combined, another kind is then utilize other audios to replace this part audio-frequency information, for instance drip sound. Video file, by audio file and what a lot of image file was constituted, therefore can use the above-mentioned processing method to audio file and image file that video file is carried out DecryptDecryption process.
In technique scheme, it is preferable that step 104 specifically includes: when determining that file comprises given content, sending prompting, prompting includes DecryptDecryption prompting or need not point out by DecryptDecryption; And receive the selection order to prompting, for according to selecting order to determine whether file is carried out DecryptDecryption process.
In this technical scheme, when determining that the file needing to share comprises given content, when namely needing that the file shared comprises private information, terminal can prompt the user whether this private information is carried out DecryptDecryption process, when given content is ostensible content, can send and need not point out by DecryptDecryption, given content need not be carried out DecryptDecryption process by prompting user, it is sent directly to shared region, thus promoting the operational efficiency of terminal, otherwise, if this document comprises private information, DecryptDecryption prompting can be sent, given content is carried out DecryptDecryption process by prompting user, and then ensure the safety of given content, improve user's experience.
In technique scheme, it is preferable that the attribute of file include at least one of or its combination: the filename of file, the size of file, the relevant contact information of file, the keyword of file, file storage position, receive file time; And file includes at least one of or its combination: text, image file, audio file, video file.
In this technical scheme, the attribute of file includes but not limited to the filename of file, size, relevant contact information, keyword, storage position, reception time etc., both can be wherein certain attribute, it can also be the combination of plurality of attribute, by the judgement to file attribute, can determine in file whether comprise given content more accurately and quickly, i.e. private information, thus promoting the safety of terminal. It addition, the technical program is primarily directed to text, image file, audio file, four kinds of active files of video file, wherein, determine whether file comprises given content according to the attribute of file, relate to a kind of concerning security matters recognition mechanism. To text, such as WORD document, note etc, file is carried out keyword match in conjunction with context by its concerning security matters recognition method exactly, here keyword can by system definition, such as definition initial key word " transaction ", " address ", can also be added by User Defined, it might even be possible to consider according to some the total keyword between multiple secure files of user as target keywords. If some information and keyword match success in document, this illustrates that this partial information has related to the private information of user. The close recognition method of image file utilizes image recognition technology exactly, and this needs user to provide the original photo of need for confidentiality personage so that system generates face and the physical trait value of corresponding personage. If there being image file to need to carry out DecryptDecryption process, first file can be carried out Text region, see whether it is close of a sort photo, this identification still falls within keyword match category, additionally, the character image in picture can also be identified and generate characteristic of correspondence value, the eigenvalue that these eigenvalues generate with personage's picture of customer-furnished need for confidentiality before being mated, so illustrates that this partial information has related to the private information of user if the match is successful. For audio file, mainly still utilize speech recognition technology that audio keyword is carried out concerning security matters identification. Video file is by audio file and what a lot of image file was constituted, and therefore it may be used for the concerning security matters recognition mechanism to audio file and image file.
In technique scheme, it is preferable that step 106 specifically includes: when judged result is for being, file is carried out DecryptDecryption process, and after completing DecryptDecryption process, file is preserved the shared region to terminal; When judged result is no, file is not carried out DecryptDecryption process, and directly file is preserved to shared region; Wherein the security system of terminal has the read right to shared region and write permission, and arbitrary conventional system of terminal has the read right to shared region.
In this technical scheme, after file is carried out DecryptDecryption process, in order to protect the safety of file; file can be preserved to shared region; this shared region had both been not belonging to security system, was also not belonging to conventional system, and conventional system can read this document from shared region. Equally, if it is determined that when specified file is not processed, file is sent directly in shared region. Wherein, security system has the access limit to shared region, and conventional system only has the read right to shared region, so, improves the safety of private information in shared region, improves user's experience.
Fig. 2 illustrates the block diagram of shared file system according to an embodiment of the invention.
As shown in Figure 2, shared file system 200 according to an embodiment of the invention, comprises determining that unit 202, when the arbitrary conventional system in receiving terminal is to the sharing request of the file of the security system in terminal, attribute according to file, it is determined that whether file comprises given content; Judging unit 204, when determining that file comprises given content, it may be judged whether file is carried out DecryptDecryption process; Shared cell 206, according to judged result, shares file for arbitrary conventional system.
In this technical scheme, owing to different files comprises different attributes, can determine whether file comprises given content according to the attribute of file, given content described here is that user sets or that system automatically determines according to keyword etc. private information, if file comprises given content, then need this document is carried out DecryptDecryption process, and then guarantee that private information is not leaked, it is ensured that the safety of private information. Wherein, the concrete opportunity of the computing processed about the detection of given content and DecryptDecryption needs the actual demand according to user to determine, if be only carried out when file is stored in, substantial amounts of operand is likely to affect the speed of service of terminal, and then affect Consumer's Experience, if and only need when shared DecryptDecryption process in just carry out interim computing, user can be made again to wait oversize opportunity, therefore, in order to ensure the convenience of user operation, calculation process can be carried out, for instance the length of one's sleep when user does not use mobile phone. So both not interfering with Consumer's Experience, free time can be utilized again to carry out detecting and computing, needing that what which part of file carried out processes to make user may know that when directly reading file.
In technique scheme, it is preferable that DecryptDecryption processes and specifically includes: delete given content; Amendment given content; Hide given content; Or replace given content by the replacement content similar with given content.
In this technical scheme, DecryptDecryption processes and includes but not limited to deletion, amendment, hiding or replacement operation, and given content can be processed by user according to individual demand, thus meeting the different demands of different user, this way it is ensured that the safety of private information, promote user's experience. Wherein, for text, there are two kinds of processing modes, a kind of is that the secret Word message that directly will match to is deleted, and in conjunction with contextual information, residue word is combined, another kind of then be the secret Word message matched is hidden operation, such as blacking, replace with mess code etc. And the DecryptDecryption of image file processes relatively simple, directly the pixel relating to the region of private information is carried out mosaicked field and process. DecryptDecryption process for audio file also has two ways, a kind of be directly by Corresponding matching to secret audio-frequency information delete, and the voice data after deleting secret audio-frequency information is combined, another kind is then utilize other audios to replace this part audio-frequency information, for instance drip sound. Video file, by audio file and what a lot of image file was constituted, therefore can use the above-mentioned processing method to audio file and image file that video file is carried out DecryptDecryption process.
In technique scheme, preferably, judging unit 204 specifically for: when determining that file comprises given content, send prompting, prompting includes DecryptDecryption prompting or need not point out by DecryptDecryption, and receive the selection order to prompting, for according to selecting order to determine whether file is carried out DecryptDecryption process.
In this technical scheme, when determining that the file needing to share comprises given content, when namely needing that the file shared comprises private information, terminal can prompt the user whether this private information is carried out DecryptDecryption process, when given content is ostensible content, can send and need not point out by DecryptDecryption, given content need not be carried out DecryptDecryption process by prompting user, it is sent directly to shared region, thus promoting the operational efficiency of terminal, otherwise, if this document comprises private information, DecryptDecryption prompting can be sent, given content is carried out DecryptDecryption process by prompting user, and then ensure the safety of given content, improve user's experience.
In technique scheme, it is preferable that the attribute of file include at least one of or its combination: the filename of file, the size of file, the relevant contact information of file, the keyword of file, file storage position, receive file time; And file includes at least one of or its combination: text, image file, audio file, video file.
In this technical scheme, the attribute of file includes but not limited to the filename of file, size, relevant contact information, keyword, storage position, reception time etc., both can be wherein certain attribute, it can also be the combination of plurality of attribute, by the judgement to file attribute, can determine in file whether comprise given content more accurately and quickly, i.e. private information, thus promoting the safety of terminal. It addition, the technical program is primarily directed to text, image file, audio file, four kinds of active files of video file, wherein, determine whether file comprises given content according to the attribute of file, relate to a kind of concerning security matters recognition mechanism. To text, such as WORD document, note etc, file is carried out keyword match in conjunction with context by its concerning security matters recognition method exactly, here keyword can by system definition, such as definition initial key word " transaction ", " address ", can also be added by User Defined, it might even be possible to consider according to some the total keyword between multiple secure files of user as target keywords. If some information and keyword match success in document, this illustrates that this partial information has related to the private information of user. The close recognition method of image file utilizes image recognition technology exactly, and this needs user to provide the original photo of need for confidentiality personage so that system generates face and the physical trait value of corresponding personage. If there being image file to need to carry out DecryptDecryption process, first file can be carried out Text region, see whether it is close of a sort photo, this identification still falls within keyword match category, additionally, the character image in picture can also be identified and generate characteristic of correspondence value, the eigenvalue that these eigenvalues generate with personage's picture of customer-furnished need for confidentiality before being mated, so illustrates that this partial information has related to the private information of user if the match is successful. For audio file, mainly still utilize speech recognition technology that audio keyword is carried out concerning security matters identification. Video file is by audio file and what a lot of image file was constituted, and therefore it may be used for the concerning security matters recognition mechanism to audio file and image file.
In technique scheme, preferably, shared cell 206 specifically for: when judged result is for being, file is carried out DecryptDecryption process, and after completing DecryptDecryption process, file is preserved the shared region to terminal, and when judged result is no, file is not carried out DecryptDecryption process, and directly file is preserved to shared region, wherein, the security system of terminal has the read right to shared region and write permission, and arbitrary conventional system of terminal has the read right to shared region.
In this technical scheme, after file is carried out DecryptDecryption process, in order to protect the safety of file; file can be preserved to shared region; this shared region had both been not belonging to security system, was also not belonging to conventional system, and conventional system can read this document from shared region. Equally, if it is determined that when specified file is not processed, file is sent directly in shared region. Wherein, security system has the access limit to shared region, and conventional system only has the read right to shared region, so, improves the safety of private information in shared region, improves user's experience.
Fig. 3 illustrates the block diagram of terminal according to an embodiment of the invention.
As shown in Figure 3, terminal 300 according to an embodiment of the invention includes shared file system 302 (shared file system 200 being equivalent in the embodiment shown in Fig. 2), during for the arbitrary conventional system in receiving described terminal to the sharing request of the file of the security system in described terminal, attribute according to described file, determine whether described file comprises given content, and when determining that described file comprises described given content, judge whether described file is carried out DecryptDecryption process, and according to judged result, described file is shared for described arbitrary conventional system.
In this technical scheme, owing to different files comprises different attributes, can determine whether file comprises given content according to the attribute of file, given content described here is that user sets or that system automatically determines according to keyword etc. private information, if file comprises given content, then need this document is carried out DecryptDecryption process, and then guarantee that private information is not leaked, it is ensured that the safety of private information.
Wherein, the concrete opportunity of the computing processed about the detection of given content and DecryptDecryption needs the actual demand according to user to determine, if be only carried out when file is stored in, substantial amounts of operand is likely to affect the speed of service of terminal, and then affect Consumer's Experience, if and only need when shared DecryptDecryption process in just carry out interim computing, user can be made again to wait oversize opportunity, therefore, in order to ensure the convenience of user operation, calculation process can be carried out, for instance the length of one's sleep when user does not use mobile phone. So both not interfering with Consumer's Experience, free time can be utilized again to carry out detecting and computing, needing that what which part of file carried out processes to make user may know that when directly reading file.
It addition, after file is carried out DecryptDecryption process, in order to protect the safety of file, it is possible to being preserved to shared region by file, this shared region had both been not belonging to security system, was also not belonging to conventional system, and conventional system can read this document from shared region. Equally, if it is determined that when specified file is not processed, file is sent directly in shared region. Wherein, security system has the access limit to shared region, and conventional system only has the read right to shared region, so, improves the safety of private information in shared region, improves user's experience.
Be equivalent to the shared file system 200 in the embodiment shown in Fig. 2 due to the shared file system 302 in terminal 300, therefore, this terminal 300 has the technique effect identical with shared file system 200, does not repeat them here.
Fig. 4 illustrates the flow chart of file sharing method according to another embodiment of the invention.
As shown in Figure 4, file sharing method according to another embodiment of the invention, including:
Step 402, it may be judged whether have file to need to share to conventional system, when judged result is for being, enter step 404, when judged result is no, returns and again determine whether that file needs to be transferred to conventional system.
Step 404, detects the private information of file.
Step 406, it is judged that whether include the private information of user in file, when judged result is no, enters step 414, when judged result is for being, enters step 408.
Step 408, prompting user selects the mode that this part private information is processed.
Step 410, judge whether user selects this document is carried out DecryptDecryption process, when judged result is for being, enter step 412, when judged result is no, enter step 414, specifically, when determining that the file needing to share comprises given content, when namely needing that the file shared comprises private information, terminal can prompt the user whether this private information is carried out DecryptDecryption process, when given content is ostensible content, can send and need not point out by DecryptDecryption, given content need not be carried out DecryptDecryption process by prompting user, it is sent directly to shared region, thus promoting the operational efficiency of terminal, otherwise, if this document comprises private information, DecryptDecryption prompting can be sent, given content is carried out DecryptDecryption process by prompting user, and then ensure the safety of given content, improve user's experience.
Step 412, carries out DecryptDecryption process to file, specifically, DecryptDecryption process include the deletion to privacy information, amendment, hide or replace operation.
Step 414, is shared the file after DecryptDecryption to conventional system by security system. Described here shares to conventional system, can be by DecryptDecryption after file or need not move to conventional system the file of DecryptDecryption, can also in order to promote its safety further, it is transferred in public territory, security system has the authority to public territory read-write, the authority that public territory is only read by conventional system, thus promoting the safety of file sharing further.
Technical scheme is described in detail above in association with accompanying drawing, pass through technical scheme, can determine whether file comprises given content according to the attribute of file, if file comprises given content, then need this document is carried out DecryptDecryption process, and then guarantee that private information is not leaked, make user to be shared to conventional system from the security system of terminal by file, ensure that the safety of private information, improve Consumer's Experience.
The foregoing is only the preferred embodiments of the present invention, be not limited to the present invention, for a person skilled in the art, the present invention can have various modifications and variations. All within the spirit and principles in the present invention, any amendment of making, equivalent replacement, improvement etc., should be included within protection scope of the present invention.

Claims (11)

1. a file sharing method, for having the terminal of multiple operating system, it is characterised in that including:
When arbitrary conventional system in receiving described terminal is to the sharing request of the file of the security system in described terminal, the attribute according to described file, it is determined that whether described file comprises given content;
When determining that described file comprises described given content, it may be judged whether described file is carried out DecryptDecryption process;
According to judged result, share described file for described arbitrary conventional system.
2. file sharing method according to claim 1, it is characterised in that described DecryptDecryption processes and specifically includes:
Delete described given content;
Revise described given content;
Hide described given content; Or
Described given content is replaced by the replacement content similar with described given content.
3. file sharing method according to claim 2, it is characterised in that described when determining that described file comprises described given content, it may be judged whether described file to be carried out DecryptDecryption process, specifically includes:
When determining that described file comprises described given content, sending prompting, described prompting includes DecryptDecryption prompting or need not point out by DecryptDecryption; And
Receive the selection order to described prompting, determine whether described file is carried out described DecryptDecryption process for according to described selection order.
4. file sharing method according to claim 3, it is characterised in that the described attribute of described file includes at least one of or its combination:
The filename of described file, the size of described file, the relevant contact information of described file, the keyword of described file, described file storage position, receive time of described file; And
Described file includes at least one of or its combination:
Text, image file, audio file, video file.
5. file sharing method according to any one of claim 1 to 4, it is characterised in that described according to judged result, shares described file for described arbitrary conventional system, specifically includes:
When described judged result is for being, described file is carried out described DecryptDecryption process, and after completing the process of described DecryptDecryption, described file is preserved the shared region to described terminal;
When described judged result is no, described file is not carried out described DecryptDecryption process, and directly described file is preserved to described shared region; Wherein
The described security system of described terminal has the read right to described shared region and write permission, and described arbitrary conventional system of described terminal has the read right to described shared region.
6. a shared file system, for having the terminal of multiple operating system, it is characterised in that including:
Determine unit, when the arbitrary conventional system in receiving described terminal is to the sharing request of the file of the security system in described terminal, the attribute according to described file, it is determined that whether described file comprises given content;
Judging unit, when determining that described file comprises described given content, it may be judged whether described file is carried out DecryptDecryption process;
Shared cell, according to judged result, shares described file for described arbitrary conventional system.
7. shared file system according to claim 6, it is characterised in that described DecryptDecryption processes and specifically includes:
Delete described given content;
Revise described given content;
Hide described given content; Or
Described given content is replaced by the replacement content similar with described given content.
8. shared file system according to claim 7, it is characterised in that described judging unit specifically for:
When determining that described file comprises described given content, send prompting, described prompting includes DecryptDecryption prompting or need not point out by DecryptDecryption, and receives the selection order to described prompting, determines whether described file is carried out described DecryptDecryption process for according to described selection order.
9. shared file system according to claim 8, it is characterised in that the described attribute of described file includes at least one of or its combination:
The filename of described file, the size of described file, the relevant contact information of described file, the keyword of described file, described file storage position, receive time of described file; And
Described file includes at least one of or its combination:
Text, image file, audio file, video file.
10. the shared file system according to any one of claim 6 to 9, it is characterised in that described shared cell specifically for:
When described judged result is for being, described file is carried out described DecryptDecryption process, and after completing the process of described DecryptDecryption, described file is preserved the shared region to described terminal, and when described judged result is no, described file is not carried out described DecryptDecryption process, and directly described file is preserved to described shared region, wherein, the described security system of described terminal has the read right to described shared region and write permission, and described arbitrary conventional system of described terminal has the read right to described shared region.
11. a terminal, there is multiple operating system, it is characterised in that include the shared file system as according to any one of claim 6 to 10.
CN201510200279.2A 2015-04-24 2015-04-24 File sharing method, shared file system and terminal Expired - Fee Related CN105630855B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510200279.2A CN105630855B (en) 2015-04-24 2015-04-24 File sharing method, shared file system and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510200279.2A CN105630855B (en) 2015-04-24 2015-04-24 File sharing method, shared file system and terminal

Publications (2)

Publication Number Publication Date
CN105630855A true CN105630855A (en) 2016-06-01
CN105630855B CN105630855B (en) 2019-06-11

Family

ID=56045796

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510200279.2A Expired - Fee Related CN105630855B (en) 2015-04-24 2015-04-24 File sharing method, shared file system and terminal

Country Status (1)

Country Link
CN (1) CN105630855B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017177595A1 (en) * 2016-04-15 2017-10-19 北京小米移动软件有限公司 Data migration method and device
CN107547500A (en) * 2017-05-12 2018-01-05 新华三信息安全技术有限公司 A kind of information collecting method and device
CN109063499A (en) * 2018-07-27 2018-12-21 山东鲁能软件技术有限公司 A kind of electronic record area authorization method and system that flexibly can configure
CN110035183A (en) * 2019-04-22 2019-07-19 维沃移动通信有限公司 Information sharing method and terminal
CN112291341A (en) * 2020-10-28 2021-01-29 维沃移动通信有限公司 File transmission method, device and equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1883033A1 (en) * 2006-07-21 2008-01-30 Research In Motion Limited Method and system for providing a honeypot mode for an electronic device
CN104184738A (en) * 2014-09-01 2014-12-03 宇龙计算机通信科技(深圳)有限公司 Information sharing method and information sharing device of terminal and terminal
CN104268478A (en) * 2014-09-22 2015-01-07 宇龙计算机通信科技(深圳)有限公司 Multi-system-terminal data interaction method and device
CN104318183A (en) * 2014-11-18 2015-01-28 南京酷派软件技术有限公司 Processing method and device for communication information of terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1883033A1 (en) * 2006-07-21 2008-01-30 Research In Motion Limited Method and system for providing a honeypot mode for an electronic device
CN104184738A (en) * 2014-09-01 2014-12-03 宇龙计算机通信科技(深圳)有限公司 Information sharing method and information sharing device of terminal and terminal
CN104268478A (en) * 2014-09-22 2015-01-07 宇龙计算机通信科技(深圳)有限公司 Multi-system-terminal data interaction method and device
CN104318183A (en) * 2014-11-18 2015-01-28 南京酷派软件技术有限公司 Processing method and device for communication information of terminal

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017177595A1 (en) * 2016-04-15 2017-10-19 北京小米移动软件有限公司 Data migration method and device
CN107547500A (en) * 2017-05-12 2018-01-05 新华三信息安全技术有限公司 A kind of information collecting method and device
CN109063499A (en) * 2018-07-27 2018-12-21 山东鲁能软件技术有限公司 A kind of electronic record area authorization method and system that flexibly can configure
CN110035183A (en) * 2019-04-22 2019-07-19 维沃移动通信有限公司 Information sharing method and terminal
CN112291341A (en) * 2020-10-28 2021-01-29 维沃移动通信有限公司 File transmission method, device and equipment

Also Published As

Publication number Publication date
CN105630855B (en) 2019-06-11

Similar Documents

Publication Publication Date Title
US10839104B2 (en) Obfuscating information related to personally identifiable information (PII)
US9544286B2 (en) Methods and systems for increasing the security of electronic messages
CN110659512B (en) Picture management method, device, terminal and storage medium
CN107103245B (en) File authority management method and device
CN111897786B (en) Log reading method, device, computer equipment and storage medium
CN104657674A (en) Isolation protection system and isolation protection method of private data in mobile phone
US20140130186A1 (en) Methods and systems for increasing the security of electronic messages
US20060069925A1 (en) Content processing device, content accumulation medium, content processing method and content processing program
CN105630855A (en) File sharing method, file sharing system and terminal
US8805956B1 (en) Data leakage prevention in cloud-endpoint model
US9805216B2 (en) Privacy compliance event analysis system
CN101124585A (en) Information distribution system and terminal device
CN110399748A (en) A kind of screenshot method and device based on image recognition
JP2010044642A (en) Content distribution server and content distribution method
CN109274582A (en) Methods of exhibiting, device, equipment and the storage medium of instant communication information
US11558531B2 (en) Systems and methods for authenticating an image
CN109583228B (en) Privacy information management method, device and system
CN109219003B (en) Information encryption method and device, storage medium and electronic equipment
WO2016145849A1 (en) Short message security management method, device and terminal
CN108229190B (en) Transparent encryption and decryption control method, device, program, storage medium and electronic equipment
JP7009802B2 (en) Document management equipment, document management systems and programs
CN105790948A (en) Identity authentication method and identity authentication device
KR102558139B1 (en) Method for transmitting security message using personalized template and apparatus using the same
US10438003B2 (en) Secure document repository
KR102375973B1 (en) Security server using case based reasoning engine and storage medium for installing security function

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20190611

Termination date: 20210424