CN106096449A - Document protection method and device - Google Patents

Document protection method and device Download PDF

Info

Publication number
CN106096449A
CN106096449A CN201610446003.7A CN201610446003A CN106096449A CN 106096449 A CN106096449 A CN 106096449A CN 201610446003 A CN201610446003 A CN 201610446003A CN 106096449 A CN106096449 A CN 106096449A
Authority
CN
China
Prior art keywords
file
character string
presetting cipher
user
cipher
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610446003.7A
Other languages
Chinese (zh)
Inventor
李兵
张帆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
LeTV Holding Beijing Co Ltd
LeTV Information Technology Beijing Co Ltd
Original Assignee
LeTV Holding Beijing Co Ltd
LeTV Information Technology Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by LeTV Holding Beijing Co Ltd, LeTV Information Technology Beijing Co Ltd filed Critical LeTV Holding Beijing Co Ltd
Priority to CN201610446003.7A priority Critical patent/CN106096449A/en
Publication of CN106096449A publication Critical patent/CN106096449A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Abstract

The invention discloses a kind of document protection method and device, including: receive file search instruction;Monitor the character string in described file search instruction;Described character string is compared with presetting cipher;If described character string is presetting cipher, return the file interface data that described presetting cipher is corresponding.A kind of document protection method of present invention proposition and device, it is possible to increase the crypticity of private file and safety.

Description

Document protection method and device
Technical field
The present invention relates to technical field of data processing, particularly relate to a kind of document protection method and device.
Background technology
Private file (or hidden file), i.e. relevant to privacy file.Include under normal circumstances: user oneself definition or Make, the document write such as individual photo, individual, the video recording recording of individual etc.;The information of system creation, such as system information literary composition The personal information of user can be comprised in part;The file of software creation, as password and the chat record of the chat softwares such as QQ, Wang Wang, The cookie that the browsers such as IE are stored is (in order to distinguish that user identity, the control that conversates are followed the tracks of and is stored in user this locality eventually Data on end) etc., also IE browse record, user habit can be analyzed by these files.
Protection private file, on the one hand can be protection privacy of user, and on the other hand being also possible to prevent other people utilizes user Information carrys out fake user.
In prior art, user oneself processes that the method for privacy data specifically includes that 1, user sets for file or folder Put hiding attribute, file increases the switch whether private file (or hidden file) shows;2, embedded one " insurance Case " function, it is specifically designed to the private file of storage user.
During realizing the present invention, inventor finds that prior art at least there is problems in that the first existing skill Art means, just can be viewed, by arranging inner simplest switch, the file hidden, and only (be opened by one click Close) operation can private file described in show or hide, there is no any safety, expose the running cost of private data very Low;The second prior art means, user needs to input correct password just can view the literary composition being arranged to hide attribute Part, its safety increases, but when in the face of the public, due to the existence of " condom ", it will produce and there is private file Hint, induce on the contrary malice effractor private file is cracked, user can be brought the most unnecessary puzzlement.
Summary of the invention
In view of this, the purpose of the embodiment of the present invention is to propose a kind of document protection method and device, it is possible to increase hidden The crypticity of private file and safety.
The document protection method provided based on the above-mentioned purpose embodiment of the present invention, including:
Reception file search instructs, and monitors the character string in described file search instruction;
Described character string is compared with presetting cipher;
If described character string is presetting cipher, return the file interface data that described presetting cipher is corresponding.
In some embodiments, the step of the file interface data that the described presetting cipher of described return is corresponding includes:
Obtain the hierarchical information at current file interface;
According to described hierarchical information, return the file interface data matched with described hierarchical information.
In some embodiments, also include after the described step that described character string and presetting cipher are compared:
If described character string is presetting cipher, return switching icon idsplay order;
Judge whether to receive the click commands for switching icon;
If receiving the click commands for switching icon, return the file interface data that described presetting cipher is corresponding.
In some embodiments, described presetting cipher includes two or more;Described by described character string and presetting cipher The step compared includes:
Whether relatively described character string is one of them of described presetting cipher;
If one of them that described character string is described presetting cipher, then return file circle corresponding with described character string Face data.
In some embodiments, also include after the described step that described character string and presetting cipher are compared:
If described character string is presetting cipher, return string clearance order.
Second aspect of the embodiment of the present invention, additionally provides a kind of document protection method, including:
Reception file search instructs, and monitors the character string in described file search instruction;;
Described character string is compared with presetting cipher;
If described character string is presetting cipher, show the file interface that described presetting cipher is corresponding.
In some embodiments, the step of the file interface that the described presetting cipher of described display is corresponding includes:
Obtain the hierarchical information at current file interface;
According to described hierarchical information, the file interface that display matches with described hierarchical information.
In some embodiments, also include after the described step that described character string and presetting cipher are compared:
If described character string is presetting cipher, display switching icon;
Judge whether to receive the click commands for described switching icon;
If receiving the click commands for described switching icon, show the file interface that described presetting cipher is corresponding.
In some embodiments, described presetting cipher includes two or more;Described by described character string and presetting cipher The step compared includes:
Whether relatively described character string is one of them of described presetting cipher;
If one of them that described character string is described presetting cipher, then show the file interface that described character string is corresponding.
In some embodiments, also include after the described step that described character string and presetting cipher are compared:
If described character string is presetting cipher, remove described character string.
3rd aspect of the embodiment of the present invention, additionally provides a kind of file protection device, including:
Command reception module, is used for receiving file search instruction;
Monitoring modular, for monitoring the character string in described file search instruction;
Comparison module, for comparing described character string with presetting cipher;
Data return module, if described character string is presetting cipher, for returning file circle that described presetting cipher is corresponding Face data.
In some embodiments, described data return module, specifically for:
Obtain the hierarchical information at current file interface;
According to described hierarchical information, return the file interface data matched with described hierarchical information.
In some embodiments, if described character string is presetting cipher, described data return module, are additionally operable to return and cut Change icon idsplay order;
Described command reception module, is used for judging whether to receive the click commands for switching icon;
If receiving the click commands for switching icon, described data return module, are used for returning described presetting cipher Corresponding file interface data.
In some embodiments, described presetting cipher includes two or more;Described comparison module, specifically for comparing Whether state character string is one of them of described presetting cipher;
If one of them that described character string is described presetting cipher, described data return module, specifically for return with The file interface data that described character string is corresponding.
In some embodiments, if described character string is presetting cipher, described data return module, are additionally operable to return word Symbol string clearance order.
4th aspect of the embodiment of the present invention, additionally provides a kind of file protection device, including:
Command reception module, is used for receiving file search instruction;
Monitoring modular, for monitoring the character string in described file search instruction;;
Comparison module, for comparing described character string with presetting cipher;
Display module, if described character string is presetting cipher, for showing the file interface that described presetting cipher is corresponding.
In some embodiments, described display module, specifically for:
Obtain the hierarchical information at current file interface;
According to described hierarchical information, the file interface that display matches with described hierarchical information.
In some embodiments, if described character string is presetting cipher, described display module, it is additionally operable to show switching figure Mark;
Described command reception module, for judging whether to receive the click commands for described switching icon;
If receiving the click commands for described switching icon, described display module, it is used for showing described presetting cipher Corresponding file interface.
In some embodiments, described presetting cipher includes two or more;Described comparison module, specifically for:
Whether relatively described character string is one of them of described presetting cipher;
If one of them that described character string is described presetting cipher, the most described display module, described specifically for display The file interface that character string is corresponding.
In some embodiments, if described character string is presetting cipher, described display module, it is additionally operable to remove described word Symbol string.
From the above it can be seen that the document protection method of embodiment of the present invention offer and device, pass through monitoring file Search instruction judges whether user have input presetting cipher, if in the file search instruction of user's input the character string that comprises with Presetting cipher is identical, then it is assumed that user wants to operate private file, and returns file circle that described presetting cipher is corresponding Face data or show the file interface that described presetting cipher is corresponding such that it is able to utilize the interface existed, it is achieved privacy literary composition Part defencive function, has saved and has designed and developed cost, makes the page become more succinct, meanwhile, because employing the boundary existed Face, and there is no newly-increased private file display switch or " condom " so that the privacy operations of user more has crypticity;And And, by the way of input file search instruction, input password, operate the most convenient.Further, because function of search is almost The function that each internet product or smart electronics product can have, does not have any special identification, adds File security;Meanwhile, function of search generation also will not be appointed by the entrance that function of search entrance is multiplexed with display/hidden file What impact.
Accompanying drawing explanation
The schematic flow sheet of first embodiment of the document protection method that Fig. 1 provides for the present invention;
The schematic flow sheet of second embodiment of the document protection method that Fig. 2 provides for the present invention;
The schematic flow sheet of the 3rd embodiment of the document protection method that Fig. 3 provides for the present invention;
The schematic flow sheet of the 4th embodiment of the document protection method that Fig. 4 provides for the present invention;
The schematic flow sheet of the 5th embodiment of the document protection method that Fig. 5 provides for the present invention;
The modular structure schematic diagram of first embodiment of the file protection device that Fig. 6 provides for the present invention;
The modular structure schematic diagram of the 5th embodiment of the file protection device that Fig. 7 provides for the present invention;
The schematic diagram of file search column in document protection method that Fig. 8 provides for the present invention and the embodiment of device;
Document protection method that Fig. 9 provides for the present invention and the embodiment of device switch the schematic diagram of icon.
Detailed description of the invention
For making the object, technical solutions and advantages of the present invention clearer, below in conjunction with specific embodiment, and reference Accompanying drawing, the present invention is described in more detail.
It should be noted that the statement of all uses " first " and " second " is for distinguishing two in the embodiment of the present invention The entity of individual same names non-equal or the parameter of non-equal, it is seen that " first " " second ", only for the convenience of statement, should not Being interpreted as the restriction to the embodiment of the present invention, this is illustrated by subsequent embodiment the most one by one.
First aspect of the embodiment of the present invention, it is proposed that a kind of crypticity that can improve private file and safety Document protection method, is mainly used in the server end of cloud disk,.As it is shown in figure 1, the document protection method provided for the present invention The schematic flow sheet of first embodiment.
Cloud disk of the prior art relatively conventional hardware store instrument (such as portable hard drive, USB flash disk etc.) spatial spread and And it is very easy to use.User can be by any terminal accessing the Internet, it is only necessary to input the account number of oneself And password, it becomes possible to check and oneself be stored entirely in file in cloud disk.But the same with traditional hardware store instrument, how to protect The privacy of card subscriber data, the problem that the most each family pays special attention to, therefore some businessmans are proposed the merit of hardware encryption lock Can, small tool, program that once in a period of time, some were encrypted are the most prevailing.
As long as PC end cloud disk production development has the several years so far, define certain specification and system, most basic Data storage requirement meets masses already, uses scene also to become more and more simpler, convenient, fast.When being supplied to user Preferably Product Experience, it is possible to when providing the user with better service, the privacy carrying out data then becomes relative to competing Strive and add subitem for product.
Described document protection method, it may include following steps:
Step 101: receive file search instruction;
Described file search instructs, and can be to include search trigger instruction and search content input instruction, i.e. include search Instruction is triggered and starts search and the input of search content, it is also possible to be only to include searching for content input instruction, if described When file search instruction only refers to search for content input instruction, may also include search trigger instruction before described step 101, be used for carrying Show and be currently entering search condition;The instruction of described search trigger can be by click on file search hurdle (with reference to accompanying drawing 8) or Triggering when moving the cursor in file search hurdle, the input instruction of described search content can be quilt in file search hurdle Have input character string;
Step 102: monitor the character string (string) in described file search instruction;Here the file search monitored refers to Order, optionally, refers to the character string carried in the input instruction of described search content;
Optionally, monitoring character string can be to be completed by following several ways: 1) such as, by monitoring input in real time The character that the external equipment of character string is inputted, judges 1 sequentially input in units of group or several character can represent Meaning, such as when beaing " b ", " a ", " d " these keys on keyboard, may refer to the multiple Chinese such as " 8 points ", " overbearing " and contain Justice, it is also possible to refer to English word " bad " (bad), these possible meanings, can be the content of the character string monitored;2) again Such as, can be that unit is come with the single word (Chinese or English) having been enter in file search hurdle (with reference to accompanying drawing 8) As the content monitored, the single word having been enter in file search hurdle is usually expressed as showing in file search hurdle Word (do not include inputting and do not determine input word in file search hurdle), such as, have been shown in file search Word " heartily " in hurdle is then monitored character string, and the content " haha " being also transfused in Chinese character coding input method is not Monitored character string;3) for another example, it is also possible to " search so that file search hurdle (with reference to accompanying drawing 8) have input word clicking Rope " button, just triggers the monitoring to the word inputted;It is contemplated that for the monitoring of character string, it is also possible to use other to hold The mode being readily conceivable that, no longer enumerates at this, should not be used for limiting the protection of the present invention by the embodiment that selects enumerated Scope;
Step 103: described character string is compared with presetting cipher;
Described presetting cipher refers to the password for private file described in show or hide set in advance;Described preset close Code can be user by a file or folder is arranged to private file or private file press from both sides while from behavior institute State private file or private file sandwiched put, it is also possible to be user a file or folder is arranged to private file or While private file folder, system is described private file according to password default automatically or private file sandwiched is put;
Step 104: if described character string is presetting cipher, returns the file interface data that described presetting cipher is corresponding;This In the hiding situation pressed from both sides according to current private file or private file of file interface data and different;Such as, if working as Front private file or private file folder are in hidden state, then when judging described character string as presetting cipher, and described file circle Face data are then for pressing from both sides, by current private file or private file, the file interface data shown;If current private file Or private file folder is in display state, then, when judging described character string as presetting cipher, described file interface data are then will Current private file or private file press from both sides the file interface data stashed;
Optionally, if described character string is not presetting cipher, then can complete search operation according to described character string, and not Described character string is identified as password.
From above-described embodiment it can be seen that the document protection method of embodiment of the present invention offer, searched for by monitoring file Instruction judges whether user have input presetting cipher, if the character string comprised in the file search instruction of user's input is with preset Password is identical, then it is assumed that user wants to operate private file, and returns private file interface data such that it is able to utilize The interface existed, it is achieved private file defencive function, has saved and has designed and developed cost, makes the page become more succinct, with Time, because employing the interface existed, and there is no newly-increased private file display switch or " condom " so that user's Privacy operations more has crypticity;Further, by the way of input file search instruction, input password, operate the most square Just.Further, because the function that function of search is almost each internet product or smart electronics product can have, do not have There is any special identification, add file security;Meanwhile, function of search entrance is multiplexed with display/hidden file Entrance also will not produce any impact to function of search.
Second aspect of the embodiment of the present invention, it is provided that what one was applied to cloud disk (Dropbox) can improve private file Crypticity and the document protection method of safety.As in figure 2 it is shown, second reality of the document protection method provided for the present invention Execute the schematic flow sheet of example.
In view of this, the described document protection method that the embodiment of the present invention provides, it is mainly used in the server end of cloud disk, Can comprise the following steps that
Step 201: receive the file search instruction that user sends;Described file search instructs, and is that user is opening and stepping on After Lu Yunpan, by click on cloud disk file search hurdle and in described file search hurdle input character string and send;
Step 202: monitor the character string in described file search instruction;The file at user cloud disk interface in the terminal is searched When inputting word in rope hurdle, terminal can actively to the corresponding data of server transport, (this data visualization be that described file search refers to Order a part), so that server can in real time monitor terminal file search instruct in character string;
Step 203: described character string is compared with presetting cipher;
Step 204: if described character string is presetting cipher, returns the file interface data that described presetting cipher is corresponding;
Described file interface data, are that server draws according to the interaction data with the terminal of user, i.e. returning The cloud disk interface data of the user terminal before file interface data, be the request according to user and to user return corresponding Interface data, such as, user when logging in cloud disk to server request, server after being verified username and password, to The terminal of user returns the main interface data of the cloud disk of user oneself, after user receives these data, and can be on the subscriber terminal Show the main interface of cloud disk of user, be read out owing to data are returned to user terminal by server and show, therefore, clothes Business device can be currently at any state according to each and user terminal the cloud disk interface learning user terminal alternately;So, Returning before file interface data at needs, server can be learnt according to the data interacted with user terminal formerly and work as In front user terminal cloud disk interface state (such as, be in the file of which level, the file of current presentation have which etc. Deng), according to the state at cloud disk interface in active user's terminal, server returns corresponding file interface data to user terminal, Here file interface data are according to private file corresponding to presetting cipher described in current cloud disk interface or private file folder Hiding situation and different;Such as, if current private file corresponding to described presetting cipher or private file folder are in Hidden state, then, when judging described character string as presetting cipher, described file interface data are then that described presetting cipher is corresponding Current private file or private file press from both sides the file interface data that show;If corresponding current of described presetting cipher Private file or private file folder are in display state, then when judging described character string as presetting cipher, and described file interface number According to then for current private file corresponding for described presetting cipher or private file are pressed from both sides the file interface data stashed;
The terminal of user, after receiving described file interface data and reading, i.e. shows according to described file interface data New cloud disk interface, i.e. refreshes the cloud disk interface in terminal, thus by private file corresponding for described presetting cipher from terminal Show or hide in cloud disk interface.
Optionally, if described character string is not presetting cipher, then can complete file search operation according to described character string, And described character string is not identified as password.
From above-described embodiment it can be seen that the document protection method of embodiment of the present invention offer, monitored by server and use The file search instruction of input in the file search hurdle of family terminal judges whether user have input presetting cipher, if user's input File search instruction in the character string that comprises identical with presetting cipher, then it is assumed that user wants to operate private file, And return the file interface data that described presetting cipher is corresponding such that it is able to utilize the cloud disk interface existed, it is achieved cloud disk In private file defencive function, having saved and designed and developed cost, having made the page become more succinct, meanwhile, because employing Cloud disk interface through existing, and there is no newly-increased private file display switch or " condom " so that the privacy operations of user is more Add and there is crypticity;Further, by the way of input file search instruction, input password, operate the most convenient.Further, because Function of search is almost the function that each internet product can have, and does not have any special identification, adds File security;Meanwhile, function of search generation also will not be appointed by the entrance that function of search entrance is multiplexed with display/hidden file What impact.
3rd aspect of the embodiment of the present invention, it is proposed that a kind of crypticity that can improve private file and safety Document protection method.As it is shown on figure 3, the schematic flow sheet of the 3rd embodiment of the document protection method provided for the present invention.
Described document protection method, can be applicable to the server of cloud disk, comprises the following steps:
Step 301: receive file search instruction;
Step 302: monitor the character string in described file search instruction;
Step 303: whether relatively described character string is one of them of described presetting cipher;
When user is when arranging private file, and different files is employed different presetting ciphers, described preset close Code then includes two or more, at this time, it may be necessary to judge be described character string be whether one of them of described presetting cipher, meet One of them time, the most at least have a private file can be shown or hide;
Step 304: if one of them that described character string is presetting cipher, return switching icon idsplay order;Optionally, The only user of character string now is input to the character string in file search hurdle, and user can not carry out carriage return or click is searched The operation of rope, just can trigger server and return switching icon idsplay order;User terminal shows receiving described switching icon After instruction, can show switching icon (referring to the drawings 9) in cloud disk interface, the character string in order to point out user to be currently entered is pre- Put password, thus user can choose whether to need show or hide private file (or private file folder);Optionally, cut described in Change icon and show on side, file search hurdle, thus play more preferable suggesting effect;Step 305: judge whether to receive for The click commands of switching icon;For the click commands of switching icon, can be that user clicks the institute of display in cloud disk interface Stating switching icon, thus have issued the instruction of switching private file state to server, hidden state switches to display state, or Person, display state switches to hidden state;
Step 306: if being not received for switching the click commands of icon, illustrate that user need not show or hide privacy File and be only merely needs and scan for, then the character string using input scans for as key word and returns Search Results;
Step 307: if receiving the click commands for switching icon, illustrates that user needs show or hide privacy literary composition Part, then obtain the hierarchical information at current file interface;
By arranging above-mentioned steps 304~step 307 so that the character string in file input instruction meets presetting cipher Time, do not return private file interface data at once, but prompt the user whether to need to obtain file interface by switching icon Data, after user actively clicks on switching icon, just think that user needs to obtain file interface data, if user the most actively clicks on Switching icon, then default user only wishes to scan for, thus has distinguished search and two kinds of functions of secret protection well, with Time user can also be pointed out can to obtain the fast of file interface data by inputting correct presetting cipher in file search hurdle Prompt function;Can also be it is easy to see that above-mentioned steps 304~step 307 are a kind of preferably embodiment of the present invention To the optimization of document protection method rather than necessary, therefore cannot be used for limiting protection scope of the present invention;
The hierarchical information at described current file interface, optionally, refer to residing for cloud disk interface file level, it may include Main interface, ground floor file, second layer file ... n-th layer file;
Step 308: according to described hierarchical information, return that match with described hierarchical information and with described presetting cipher The file interface data that one of them character string being consistent is corresponding;By obtaining the hierarchical information at current file interface, Xiang Yong Family returns the privacy in the file interface data rather than all cloud disks matched with the hierarchical information at described current file interface File and the file interface data of private file folder, so that the data returned more have specific aim, meanwhile, the file of return Interface data also needs to corresponding with one of them character string being consistent of described presetting cipher, because the character that user is inputted What string met is corresponding presetting cipher rather than whole presetting cipher, thus ensures the privacy literary composition that other presetting ciphers are corresponding The crypticity of part and safety;Can also be it is easy to see that above-mentioned steps 307~step 308 be a kind of preferable of the present invention Embodiment, be the optimization to document protection method rather than necessary, therefore cannot be used for limiting protection scope of the present invention, And, it is also possible to it is readily conceivable that remove the acquisition to hierarchical information, directly return all with described presetting cipher wherein it The corresponding file interface data of one character string being consistent can also be a kind of embodiment;
Step 309: return string clearance order, after user terminal receives described character string clearance order, the most automatically Removing in file search hurdle the character string inputted, prevent other people from seeing password that user inputs also utilizes it to steal a glance at user's Private file;
Can find out from above-described embodiment, the step of the hierarchical information obtaining current file interface in above-mentioned steps 307, Not necessarily to perform in step 307, it is also possible to perform after step 303, or perform after step 304, all Do not affect final result;The step of the return string clearance order of above-mentioned steps 309, can be to hold after the step 304 OK, it is also possible to be to perform after step 307, it is also possible to be to perform after step 306, can act as preventing other people from seeing The effect of the password of user's input.
From above-described embodiment it can be seen that the document protection method of embodiment of the present invention offer, monitored by server and use The file search instruction of input in the file search hurdle of family terminal judges whether user have input presetting cipher, if user's input File search instruction in the character string that comprises identical with presetting cipher, then it is assumed that user wants to operate private file, And return the file interface data that described presetting cipher is corresponding such that it is able to utilize the cloud disk interface existed, it is achieved cloud disk In private file defencive function, having saved and designed and developed cost, having made the page become more succinct, meanwhile, because employing Cloud disk interface through existing, and there is no newly-increased private file display switch or " condom " so that the privacy operations of user is more Add and there is crypticity;Further, by the way of input file search instruction, input password, operate the most convenient.Further, because Function of search is almost the function that each internet product can have, and does not have any special identification, adds File security;Meanwhile, function of search generation also will not be appointed by the entrance that function of search entrance is multiplexed with display/hidden file What impact.
Optionally, in above-described embodiment, after user enters the pattern of display private file every time, it is also possible to by personalization Arrange and change described presetting cipher, can be to press from both sides for certain private file or certain private file, or for multiple Private file or multiple private file folder, preserve after change, and next time can obtain file circle by new presetting cipher Face data.
4th aspect of the embodiment of the present invention, it is provided that a kind of crypticity that can improve private file and safety Document protection method.As shown in Figure 4, the schematic flow sheet of the 4th embodiment of the document protection method provided for the present invention.
Described document protection method, optionally, is applied in client home environment, it may include following steps:
Step 401: receive file search instruction;Optionally, described file search instruction is on local file search hurdle Middle input;Described file search hurdle, can be the file search hurdle in the start menu of PC, it is also possible to be any literary composition Part folder open after show above file file search hurdle;It is, of course, also possible to be that other smart machines (such as mobile phone, are put down Plate computer, intelligent television etc.) search column;
Step 402: monitor the character string in described file search instruction;Here, the action of monitoring character string is held in this locality OK, can be completed by the processor in terminal;
Step 403: described character string is compared with presetting cipher;Described presetting cipher can be that user passes through inciting somebody to action One file or folder is arranged to while private file or private file folder from private file described in behavior or private file Sandwiched is put, it is also possible to be user's system while a file or folder is arranged to private file or private file folder Automatically it is described private file according to password default or private file sandwiched is put;
Step 404: if described character string is presetting cipher, show the file interface that described presetting cipher is corresponding;Here The file interface that described presetting cipher is corresponding is different according to current private file or the hiding situation of private file folder; Such as, if private file corresponding to described presetting cipher or private file folder are currently at hidden state, then described character is judged When string is for presetting cipher, described file interface is then for pressing from both sides, by current private file or private file, file circle shown Face;If the private file that described presetting cipher is corresponding or private file folder are currently at display state, then judge described character string During for presetting cipher, described file interface then stashes for private file corresponding for described presetting cipher or private file being pressed from both sides File interface.
Optionally, if described character string is not presetting cipher, then can complete file search operation according to described character string, And described character string is not identified as password.
From above-described embodiment it can be seen that the document protection method that provides of the embodiment of the present invention, by monitoring local literary composition The file search instruction of input in part search column judges whether user have input presetting cipher, if the file search of user's input The character string comprised in instruction is identical with presetting cipher, then it is assumed that user wants to operate private file, and shows described The file interface that presetting cipher is corresponding such that it is able to utilize the interface existed, it is achieved private file defencive function, save Design and develop cost, make the page become more succinct, meanwhile, because employing the interface existed, and hidden less than increase newly Private file display switch or " condom " so that the privacy operations of user more has crypticity;Further, searched by input file The mode of Suo Zhiling inputs password, operates the most convenient.Further, because search file function is almost each smart electronics The function that product all can have, does not have any special identification, adds file security;Meanwhile, by function of search Entrance is multiplexed with the entrance of display/hidden file also will not produce any impact to function of search.
5th aspect of the embodiment of the present invention, it is provided that a kind of crypticity that can improve private file and safety Document protection method.As it is shown in figure 5, the schematic flow sheet of the 5th embodiment of the document protection method provided for the present invention.
Described document protection method, optionally, is applied in client home environment, such as PC, notebook electricity Brain etc., it may include following steps:
Step 501: receive file search instruction;Described file search instruction can be the file search in start menu In hurdle input, it is also possible to be open certain file after, in the file search hurdle in folder window input (Windows system In system, this document search column is in the upper right corner);
Step 502: monitor the character string in described file search instruction;
Step 503: whether relatively described character string is one of them of described presetting cipher;
When user is when arranging private file, and different files is employed different presetting ciphers, described preset close Code then includes two or more, at this time, it may be necessary to judge be described character string be whether one of them of described presetting cipher, meet One of them time, the most at least have a private file can be shown or hide;
Step 504: if one of them that described character string is presetting cipher, display switching icon;Optionally, word now Symbol string is only that user is input to the character string in file search hurdle, and user can not carry out carriage return or click on the behaviour of search Make, just triggering terminal display can switch icon, on screen, i.e. show switching icon (referring to the drawings 9), in order to point out user to work as The character string of front input is presetting cipher, thus user can choose whether to need show or hide private file (or privacy literary composition Part presss from both sides);Optionally, described switching icon shows on side, file search hurdle, thus plays more preferable suggesting effect;
Step 505: judge whether to receive the click commands for switching icon;For the click commands of switching icon, Can be that user clicks the described switching icon of display in file interface or desktop, thus it is hidden to have issued switching to server The instruction of private file status, hidden state switches to display state, or, display state switches to hidden state;
Step 506: if being not received for switching the click commands of icon, illustrate that user need not show or hide privacy File and be only merely needs and scan for, then the character string using input scans for as key word and returns Search Results;
Step 507: if receiving the click commands for switching icon, illustrates that user needs show or hide privacy literary composition Part, then obtain the hierarchical information at current file interface;
By arranging above-mentioned steps 504~step 507 so that the character string in file input instruction meets presetting cipher Time, do not show the file interface that described presetting cipher is corresponding at once, but prompt the user whether to need to show by switching icon Show file interface, after user actively clicks on switching icon, just think that user needs to show file interface, if user's the most actively point Hit switching icon, then default user only wishes to scan for, thus has distinguished search and two kinds of functions of secret protection well, User can also be pointed out can to show the quick of file interface by inputting correct presetting cipher in file search hurdle simultaneously Function;Can also be right it is easy to see that above-mentioned steps 504~step 507 are a kind of preferably embodiment of the present invention The optimization of document protection method rather than necessary, therefore cannot be used for limiting protection scope of the present invention;
The hierarchical information at described current file interface, optionally, refer to residing for cloud disk interface file level, it may include The second layer file comprised in main interface, ground floor file, ground floor file ... comprise in N-1 layer file N-th layer file;
Step 508: according to described hierarchical information, that display matches with described hierarchical information and with described presetting cipher The file interface that one of them character string being consistent is corresponding;By obtaining the hierarchical information at current file interface, show to user Show the private file in the file interface rather than all terminals matched with the hierarchical information at described current file interface and hidden The file interface of private file, so that the interface data of display more has specific aim, meanwhile, the file interface of display also needs It is corresponding with the character string that one of them of described presetting cipher is consistent, because what the character string that inputted of user met is phase The presetting cipher answered rather than all presetting cipher, thus ensure the private file that other presetting ciphers are corresponding crypticity and Safety;Can also be it is easy to see that above-mentioned steps 507~step 508 are a kind of preferably embodiment of the present invention To the optimization of document protection method rather than necessary, therefore cannot be used for limiting protection scope of the present invention, and, it is also possible to very It is readily apparent that, removes the acquisition to hierarchical information, directly display one of them character being consistent of all and described presetting cipher Corresponding file interface of going here and there can also be a kind of optional embodiment;
Step 509: clear character string, is monitoring after character string is presetting cipher, is the most automatically removing in file search hurdle The character string inputted, prevent other people from seeing password that user inputs also utilizes it to steal a glance at the private file of user;
Can find out from above-described embodiment, the step of the hierarchical information obtaining current file interface in above-mentioned steps 507, Not necessarily to perform in step 507, it is also possible to perform after the step 503, or perform after step 504, all Do not affect final result;The step of the return string clearance order of above-mentioned steps 509, can be to hold after step 504 OK, it is also possible to be to perform after step 507, it is also possible to be to perform after procedure 506, can act as preventing other people from seeing The effect of the password of user's input.
From above-described embodiment it can be seen that the document protection method that provides of the embodiment of the present invention, by monitoring local literary composition The file search instruction of input in part search column judges whether user have input presetting cipher, if the file search of user's input The character string comprised in instruction is identical with presetting cipher, then it is assumed that user wants to operate private file, and shows described The file interface that presetting cipher is corresponding such that it is able to utilize the interface existed, it is achieved private file defencive function, save Design and develop cost, make the page become more succinct, meanwhile, because employing the interface existed, and hidden less than increase newly Private file display switch or " condom " so that the privacy operations of user more has crypticity;Further, searched by input file The mode of Suo Zhiling inputs password, operates the most convenient.Further, because search file function is almost each smart electronics The function that product all can have, does not have any special identification, adds file security;Meanwhile, by function of search Entrance is multiplexed with the entrance of display/hidden file also will not produce any impact to function of search.
Optionally, in above-described embodiment, after user enters the pattern of display private file every time, it is also possible to by personalization Arrange and change described presetting cipher, can be to press from both sides for certain private file or certain private file, or for multiple Private file or multiple private file folder, preserve after change, and next time can obtain file circle by new presetting cipher Face data.
6th aspect of the embodiment of the present invention, it is proposed that a kind of crypticity that can improve private file and safety First embodiment of file protection device.As shown in Figure 6, the module knot of the file protection device embodiment provided for the present invention Structure schematic diagram.
Described file protection device, including:
Command reception module 601, is used for receiving file search instruction;
Described file search instructs, and can be to include search trigger instruction and search content input instruction, i.e. include search Instruction is triggered and starts search and the input of search content, it is also possible to be only to include searching for content input instruction, if described When file search instruction only value refers to search for content input instruction, may also include search before receiving the step of file search instruction and touch Send instructions, be currently entering search condition for prompting;The instruction of described search trigger can be by clicking on file search hurdle (ginseng Examine accompanying drawing 8) or trigger when moving the cursor in file search hurdle, the input instruction of described search content can be at literary composition Part search column has been transfused to character string;
Monitoring modular 602, for monitoring the character string in described file search instruction;Here the file search monitored refers to Order, optionally, refers to the character string carried in the input instruction of described search content;
Optionally, monitoring character string can be to be completed by following several ways: 1) such as, by monitoring input in real time The character that the external equipment of character string is inputted, judges 1 sequentially input in units of group or several character can represent Meaning, such as when beaing " b ", " a ", " d " these keys on keyboard, may refer to the multiple Chinese such as " 8 points ", " overbearing " and contain Justice, it is also possible to refer to English word " bad " (bad), these possible meanings, can be the content of the character string monitored;2) again Such as, can be that unit is come with the single word (Chinese or English) having been enter in file search hurdle (with reference to accompanying drawing 8) As the content monitored, the single word having been enter in file search hurdle is usually expressed as showing in file search hurdle Word (do not include inputting and do not determine input word in file search hurdle), such as, have been shown in file search Word " heartily " in hurdle is then monitored character string, and the content " haha " being also transfused in Chinese character coding input method is not Monitored character string;3) for another example, it is also possible to " search so that file search hurdle (with reference to accompanying drawing 8) have input word clicking Rope " button, just triggers the monitoring to the word inputted;It is contemplated that for the monitoring of character string, it is also possible to use other to hold The mode being readily conceivable that, no longer enumerates at this, should not be used for limiting the protection of the present invention by the embodiment that selects enumerated Scope;
Comparison module 603, for comparing described character string with presetting cipher;
Described presetting cipher refers to the password for private file described in show or hide set in advance;Described preset close Code can be user by a file or folder is arranged to private file or private file press from both sides while from behavior institute State private file or private file sandwiched put, it is also possible to be user a file or folder is arranged to private file or While private file folder, system is described private file according to password default automatically or private file sandwiched is put;
Data return module 604, if described character string is presetting cipher, for returning the file that described presetting cipher is corresponding Interface data;Here file interface data are according to current hidden of private file corresponding to described presetting cipher or private file folder Tibetan situation and different;Such as, if current private file corresponding to described presetting cipher or private file folder are in hiding State, then, when judging described character string as presetting cipher, described file interface data are then by current private file or privacy The file interface data that file shows;If at the current private file that described presetting cipher is corresponding or private file folder In display state, then, when judging described character string as presetting cipher, described file interface data are then by current private file Or the file interface data that private file folder stashes;
Optionally, if described character string is not presetting cipher, then can complete search operation according to described character string, and not Described character string is identified as password.
From above-described embodiment it can be seen that the file protection device of embodiment of the present invention offer, searched for by monitoring file Instruction judges whether user have input presetting cipher, if the character string comprised in the file search instruction of user's input is with preset Password is identical, then it is assumed that user wants to operate private file, and returns file interface data such that it is able to utilized The interface existed, it is achieved private file defencive function, has saved and has designed and developed cost, makes the page become more succinct, meanwhile, because of For employing the interface existed, and there is no newly-increased private file display switch or " condom " so that the privacy of user Operation more has crypticity;Further, by the way of input file search instruction, input password, operate the most convenient.And And, because the function that function of search is almost each internet product or smart electronics product can have, do not have and appoint The identification what is special, adds file security;Meanwhile, function of search entrance is multiplexed with the entrance of display/hidden file Also function of search will not be produced any impact.
With continued reference to accompanying drawing 6, the 7th aspect of the embodiment of the present invention, it is proposed that a kind of can improve the hidden of private file Second embodiment of the file protection device of secret property and safety.
Described file protection device, including:
Command reception module 601, is used for receiving file search instruction;
Monitoring modular 602, for monitoring the character string in described file search instruction;
Comparison module 603, for comparing described character string with presetting cipher;
If described character string is presetting cipher, described data return module 604, are additionally operable to return switching icon and show and refer to Order;Optionally, the only user of character string now is input to the character string in file search hurdle, and user can not carry out carriage return Or click on the operation of search, just can trigger server and return switching icon idsplay order;User terminal is cut described in receiving After changing icon idsplay order, switching icon (referring to the drawings 9) can be shown in cloud disk interface, in order to point out user to be currently entered Character string is presetting cipher, thus user can choose whether to need show or hide private file (or private file folder);Can Choosing, optionally, described switching icon shows on side, file search hurdle, thus plays more preferable suggesting effect;
Described command reception module 601, is used for judging whether to receive the click commands for switching icon;For switching The click commands of icon, can be that user clicks the described switching icon of display in cloud disk interface, thus send to server The instruction of switching private file state, hidden state switches to display state, or, display state switches to hidden state;
If receiving the click commands for switching icon, illustrate that user needs show or hide private file, described number According to returning module 604, it is additionally operable to return the file interface data that described presetting cipher is corresponding.
From above-described embodiment it can be seen that the file protection device of embodiment of the present invention offer, searched for by monitoring file Instruction judges whether user have input presetting cipher, if the character string comprised in the file search instruction of user's input is with preset Password is identical, then it is assumed that user wants to operate private file, and returns the file interface number that described presetting cipher is corresponding According to such that it is able to utilize the interface existed, it is achieved private file defencive function, saved and designed and developed cost, made the page Become more succinct, meanwhile, because employing the interface existed, and there is no newly-increased private file display switch or " protect Danger case " so that the privacy operations of user more has crypticity;Further, input by the way of input file search instruction close Code, operates the most convenient.Further, because function of search is almost each internet product or smart electronics product can have A function, not there is any special identification, add file security;Meanwhile, function of search entrance is multiplexed with The entrance of display/hidden file also will not produce any impact to function of search.Additionally, pass through above-described embodiment so that at literary composition When character string in part input instruction meets presetting cipher, do not return the file interface number that described presetting cipher is corresponding at once According to, but prompt the user whether to need to obtain the file interface data that described presetting cipher is corresponding by switching icon, work as user After actively clicking on switching icon, just think that user needs to obtain private file interface data, if user the most actively clicks on switching figure Mark, then default user only wishes to scan for, thus has distinguished search and two kinds of functions of secret protection well, simultaneously can also Prompting user can obtain, by inputting correct presetting cipher in file search hurdle, the file that described presetting cipher is corresponding The shortcut function of interface data;Can also it is easy to see that above-described embodiment is a kind of preferably embodiment of the present invention, It is the optimization to document protection method rather than necessary, therefore cannot be used for limiting protection scope of the present invention.
With continued reference to accompanying drawing 6, the 8th aspect of the embodiment of the present invention, it is proposed that a kind of can improve the hidden of private file 3rd embodiment of the file protection device of secret property and safety.
Described file protection device, including:
Command reception module 601, is used for receiving file search instruction;
Monitoring modular 602, for monitoring the character string in described file search instruction;
Comparison module 603, for comparing described character string with presetting cipher;
Data return module 604, if described character string is presetting cipher, for obtaining the level letter at current file interface Breath, the hierarchical information at described current file interface, optionally, refer to residing for cloud disk interface file level, it may include main boundary The second layer file comprised in face, ground floor file, ground floor file ... the N comprised in N-1 layer file Layer file;And, according to described hierarchical information, return the file interface data matched with described hierarchical information.
From above-described embodiment it can be seen that the file protection device of embodiment of the present invention offer, searched for by monitoring file Instruction judges whether user have input presetting cipher, if the character string comprised in the file search instruction of user's input is with preset Password is identical, then it is assumed that user wants to operate private file, and returns file interface data such that it is able to utilized The interface existed, it is achieved private file defencive function, has saved and has designed and developed cost, makes the page become more succinct, meanwhile, because of For employing the interface existed, and there is no newly-increased private file display switch or " condom " so that the privacy of user Operation more has crypticity;Further, by the way of input file search instruction, input password, operate the most convenient.And And, because the function that function of search is almost each internet product or smart electronics product can have, do not have and appoint The identification what is special, adds file security;Meanwhile, function of search entrance is multiplexed with the entrance of display/hidden file Also function of search will not be produced any impact.Additionally, by obtain current file interface hierarchical information, to user return with Private file in private file interface data that the hierarchical information at described current file interface matches rather than all cloud disks And the file interface data of private file folder, so that the data returned more have specific aim.Can also it is easy to see that on State a kind of preferably embodiment that embodiment is the present invention, be the optimization to document protection method rather than necessary, therefore Cannot be used for limiting protection scope of the present invention.
With continued reference to accompanying drawing 6, the 9th aspect of the embodiment of the present invention, it is proposed that a kind of can improve the hidden of private file 4th embodiment of the file protection device of secret property and safety.
When user is when arranging private file, and different files is employed different presetting ciphers, described preset close Code then includes two or more, at this time, it may be necessary to judge be described character string be whether one of them of described presetting cipher, meet One of them time, the most at least have a private file can be shown or hide;In view of this, described file protection device, Including:
Command reception module 601, is used for receiving file search instruction;
Monitoring modular 602, for monitoring the character string in described file search instruction;
Whether comparison module 603, be one of them of described presetting cipher for relatively described character string;
Data return module 604, if one of them that described character string is described presetting cipher, for returning and described word The file interface data that symbol string is corresponding.The file interface data returned need to be consistent with one of them of described presetting cipher Character string is corresponding, because what the character string that inputted of user met is corresponding presetting cipher rather than whole presetting ciphers, Thus ensure crypticity and the safety of the private file that other presetting ciphers are corresponding.
From above-described embodiment it can be seen that the file protection device of embodiment of the present invention offer, searched for by monitoring file Instruction judges whether user have input presetting cipher, if the character string comprised in the file search instruction of user's input is with preset Password is identical, then it is assumed that user wants to operate private file, and returns file interface data such that it is able to utilized The interface existed, it is achieved private file defencive function, has saved and has designed and developed cost, makes the page become more succinct, meanwhile, because of For employing the interface existed, and there is no newly-increased private file display switch or " condom " so that the privacy of user Operation more has crypticity;Further, by the way of input file search instruction, input password, operate the most convenient.And And, because the function that function of search is almost each internet product or smart electronics product can have, do not have and appoint The identification what is special, adds file security;Meanwhile, function of search entrance is multiplexed with the entrance of display/hidden file Also function of search will not be produced any impact.
Can also be that file is protected it is easy to see that above-described embodiment is a kind of preferably embodiment of the present invention The optimization of maintaining method rather than necessary, therefore cannot be used for limiting protection scope of the present invention.
Optionally, in the above-described embodiments, if described character string is presetting cipher, described data return module 604, also may be used For return string clearance order, after user terminal receives described character string clearance order, the most automatically remove file search The character string inputted in hurdle, prevent other people from seeing password that user inputs also utilizes it to steal a glance at the private file of user.
Below in conjunction with referring to the drawings 3 and accompanying drawing 6, the embodiment introducing described file protection device is how to be applied to In 3rd embodiment of described document protection method.
Described document protection method, can be applicable to the server of cloud disk, comprises the following steps:
Step 301: command reception module 601 receives file search instruction;
Step 302: monitoring modular 602 monitors the character string in described file search instruction;
Step 303: whether comparison module 603 relatively described character string is one of them of described presetting cipher;
When user is when arranging private file, and different files is employed different presetting ciphers, described preset close Code then includes two or more, at this time, it may be necessary to judge be described character string be whether one of them of described presetting cipher, meet One of them time, the most at least have a private file can be shown or hide;
Step 304: if one of them that described character string is presetting cipher, data return module 604 and return switching icon Idsplay order;Optionally, the only user of character string now is input to the character string in file search hurdle, and user can not enter Row carriage return or the operation of click search, just can trigger server and return switching icon idsplay order;User terminal is receiving After described switching icon idsplay order, switching icon (referring to the drawings 9) can be shown in cloud disk interface, in order to point out user current The character string of input is presetting cipher, thus user can choose whether to need show or hide private file (or private file Folder);
Step 305: described command reception module 601 judges whether to receive the click commands for switching icon;For The click commands of switching icon, can be that user clicks the described switching icon of display in cloud disk interface, thus to server Have issued the instruction of switching private file state, hidden state switches to display state, or, display state switches to hiding shape State;
Step 306: if being not received for switching the click commands of icon, illustrate that user need not show or hide privacy File and be only merely needs and scan for, the most described data return module 604 using input character string carry out as key word Search for and return Search Results;
Step 307: if receiving the click commands for switching icon, illustrates that user needs show or hide privacy literary composition Part, the most described data return module 604 and obtain the hierarchical information at current file interface;
By arranging above-mentioned steps 304~step 307 so that the character string in file input instruction meets presetting cipher Time, do not return the file interface data that described presetting cipher is corresponding at once, but prompt the user whether to need by switching icon Obtain the file interface data that described presetting cipher is corresponding, after user actively clicks on switching icon, just think that user needs Obtaining the file interface data that described presetting cipher is corresponding, if user the most actively clicks on switching icon, then default user is just hoped Scan for, thus distinguished search and two kinds of functions of secret protection well, user can also be pointed out simultaneously to pass through File search hurdle inputs correct presetting cipher and obtains the shortcut function of private file interface data;Can also be easy to see Going out, above-mentioned steps 304~step 307 are a kind of preferably embodiment of the present invention, are the optimization to document protection method Rather than necessary, therefore cannot be used for limiting protection scope of the present invention;
The hierarchical information at described current file interface, optionally, refer to residing for cloud disk interface file level, it may include Main interface, ground floor file, second layer file ... n-th layer file;
Step 308: described data return module 604 and match with described hierarchical information according to described hierarchical information, return And file interface data that one of them character string being consistent with described presetting cipher is corresponding;By obtaining current file The hierarchical information at interface, returns, to user, the file interface data that the hierarchical information with described current file interface matches, and Private file in not all cloud disk and the file interface data of private file folder, so that the data returned more have pin To property, meanwhile, the file interface data of return also need to corresponding with one of them character string being consistent of described presetting cipher, Because what the character string that user is inputted met is corresponding presetting cipher rather than whole presetting cipher, thus ensures other The crypticity of the private file that presetting cipher is corresponding and safety;Can also be it is easy to see that above-mentioned steps 307~step 308 Simply a kind of preferably embodiment of the present invention, is the optimization to document protection method rather than necessary, therefore cannot be used for Limit protection scope of the present invention, and, it is also possible to it is readily conceivable that remove the acquisition to hierarchical information, directly return all The file interface data corresponding with one of them character string being consistent of described presetting cipher can also be a kind of embodiment;
Step 309: described data return module 604 return string clearance order, and user terminal receives described character After string clearance order, the most automatically removing in file search hurdle the character string inputted, preventing other people from seeing, that user inputs is close Code also utilizes it to steal a glance at the private file of user;
Can find out from above-described embodiment, the step of the hierarchical information obtaining current file interface in above-mentioned steps 307, Not necessarily to perform in step 307, it is also possible to perform after step 303, or perform after step 304, all Do not affect final result;The step of the return string clearance order of above-mentioned steps 309, can be to hold after the step 304 OK, it is also possible to be to perform after step 307, it is also possible to be to perform after step 306, can act as preventing other people from seeing The effect of the password of user's input.
From above-described embodiment it can be seen that the document protection method of embodiment of the present invention offer and device, pass through server The file search instruction of input in the file search hurdle of monitoring users terminal judges whether user have input presetting cipher, if using The character string comprised in the file search instruction of family input is identical with presetting cipher, then it is assumed that user wants to carry out private file Operation, and return file interface data such that it is able to utilize the cloud disk interface existed, it is achieved the private file in cloud disk is protected Protective function, has saved and has designed and developed cost, makes the page become more succinct, meanwhile, because employing cloud disk circle existed Face, and there is no newly-increased private file display switch or " condom " so that the privacy operations of user more has crypticity;And And, by the way of input file search instruction, input password, operate the most convenient.Further, because function of search is almost The function that each internet product can have, does not have any special identification, adds file security;With Time, the entrance that function of search entrance is multiplexed with display/hidden file also will not produce any impact to function of search.
9th aspect of the embodiment of the present invention, it is proposed that a kind of crypticity that can improve private file and safety 5th embodiment of file protection device.As it is shown in fig. 7, the 5th embodiment of the file protection device provided for the present invention Modular structure schematic diagram.
Described file protection device, optionally, is applied in client home environment, including:
Command reception module 701, is used for receiving file search instruction;Optionally, described file search instruction is in this locality File search hurdle in input;Described file search hurdle, can be the file search hurdle in the start menu of PC, also Can be show after any file is opened above file file search hurdle;It is, of course, also possible to be that other intelligence set The search column of standby (such as mobile phone, panel computer, intelligent television etc.);
Monitoring modular 702, for monitoring the character string in described file search instruction;Here, the action of character string is monitored It is performed locally, can be completed by the processor in terminal;
Comparison module 703, for comparing described character string with presetting cipher;Described presetting cipher can be user By a file or folder being arranged to while private file or private file are pressed from both sides from private file described in behavior or Private file sandwiched is put, it is also possible to be that a file or folder is being arranged to private file or private file folder by user Simultaneity factor is automatically described private file according to password default or private file sandwiched is put;
Display module 704, if described character string is presetting cipher, for showing file circle that described presetting cipher is corresponding Face;Here hiding situation that the file interface that described presetting cipher is corresponding is pressed from both sides according to current private file or private file and Different;Such as, if private file corresponding to described presetting cipher or private file folder are currently at hidden state, then judge When described character string is presetting cipher, described file interface is then to press from both sides current private file or private file to show File interface;If the private file that described presetting cipher is corresponding or private file folder are currently at display state, then judge described When character string is presetting cipher, described file interface is then to press from both sides hidden by private file corresponding for described presetting cipher or private file The file interface concealed.
Optionally, if described character string is not presetting cipher, then can complete file search operation according to described character string, And described character string is not identified as password.
From above-described embodiment it can be seen that the file protection device that provides of the embodiment of the present invention, by monitoring local literary composition The file search instruction of input in part search column judges whether user have input presetting cipher, if the file search of user's input The character string comprised in instruction is identical with presetting cipher, then it is assumed that user wants to operate private file, and shows described The file interface that presetting cipher is corresponding such that it is able to utilize the interface existed, it is achieved private file defencive function, save Design and develop cost, make the page become more succinct, meanwhile, because employing the interface existed, and hidden less than increase newly Private file display switch or " condom " so that the privacy operations of user more has crypticity;Further, searched by input file The mode of Suo Zhiling inputs password, operates the most convenient.Further, because search file function is almost each smart electronics The function that product all can have, does not have any special identification, adds file security;Meanwhile, by function of search Entrance is multiplexed with the entrance of display/hidden file also will not produce any impact to function of search.
With continued reference to accompanying drawing 7, the tenth aspect of the embodiment of the present invention, it is proposed that a kind of can improve the hidden of private file 6th embodiment of the file protection device of secret property and safety.
Described file protection device, optionally, is applied in client home environment, including:
Command reception module 701, is used for receiving file search instruction;Optionally, described file search instruction is in this locality File search hurdle in input;Described file search hurdle, can be the file search hurdle in the start menu of PC, also Can be show after any file is opened above file file search hurdle;It is, of course, also possible to be that other intelligence set The search column of standby (such as mobile phone, panel computer, intelligent television etc.);
Monitoring modular 702, for monitoring the character string in described file search instruction;Here, the action of character string is monitored It is performed locally, can be completed by the processor in terminal;
Comparison module 703, for comparing described character string with presetting cipher;Described presetting cipher can be user By a file or folder being arranged to while private file or private file are pressed from both sides from private file described in behavior or Private file sandwiched is put, it is also possible to be that a file or folder is being arranged to private file or private file folder by user Simultaneity factor is automatically described private file according to password default or private file sandwiched is put;
Display module 704, if described character string is presetting cipher, for showing file circle that described presetting cipher is corresponding Face;
Optionally, in some embodiments, described display module 704, specifically for:
Obtain the hierarchical information at current file interface;The hierarchical information at described current file interface, optionally, refers to cloud disk Residing for interface file level, it may include the second layer file comprised in main interface, ground floor file, ground floor file Folder ... the n-th layer file comprised in N-1 layer file;
According to described hierarchical information, that display matches with described hierarchical information and with one of them of described presetting cipher The file interface that the character string that is consistent is corresponding;By obtaining the hierarchical information at current file interface, display to the user that with described Private file in file interface that the hierarchical information at current file interface matches rather than all terminals and private file folder File interface so that display interface data more there is specific aim, meanwhile, the file interface of display also needs to described The character string that one of them of presetting cipher is consistent is corresponding, because what the character string that inputted of user met is the most preset Password rather than all presetting cipher, thus ensure crypticity and the safety of the private file that other presetting ciphers are corresponding;Also It can easily be shown that above-mentioned embodiment is a kind of preferably embodiment of the present invention, to file protection device Optimize rather than necessary, therefore cannot be used for limit protection scope of the present invention, and, it is also possible to it is readily conceivable that remove right The acquisition of hierarchical information, directly displays file circle that one of them character string being consistent of all and described presetting cipher is corresponding Face can also be a kind of optional embodiment;
And/or,
Optionally, in some embodiments, if described character string is presetting cipher, described display module 704, it is additionally operable to Display switching icon;Optionally, the only user of character string now is input to the character string in file search hurdle, and user is permissible Do not carry out carriage return or click on the operation of search, just triggering terminal can show switching icon, on screen, i.e. show switching icon (referring to the drawings 9), the character string in order to point out user to be currently entered is presetting cipher, thus user can choose whether to need to show Show or hide private file (or private file folder);Optionally, described switching icon shows on side, file search hurdle, thus rises To more preferable suggesting effect;
Described command reception module 701, for judging whether to receive the click commands for described switching icon;For The click commands of switching icon, can be that user clicks the described switching icon of display in file interface or desktop, thus Have issued the instruction of switching private file state to server, hidden state switches to display state, or, display state switching For hidden state;
If receiving the click commands for described switching icon, described display module 704, it is used for showing described preset close The file interface that code is corresponding;
If being not received for switching the click commands of icon, illustrate user need not show or hide private file and only It is merely needs to scan for, the most described display module 704, scans for as key word using the character string of input for display And obtain Search Results;
So so that when the character string in file input instruction meets presetting cipher, do not show described preset at once The file interface that password is corresponding, but prompt the user whether to need to show file interface by switching icon, when user's actively point After hitting switching icon, just thinking that user needs to show file interface, if user the most actively clicks on switching icon, then default user is only It is intended to scan for, thus has distinguished search and two kinds of functions of secret protection well, user can also be pointed out to lead to simultaneously Cross and in file search hurdle, input correct presetting cipher and show the shortcut function of file interface;Can also it is easy to see that Above-mentioned embodiment is a kind of preferably embodiment of the present invention, is the optimization to file protection device rather than necessary, Therefore cannot be used for limiting protection scope of the present invention;
And/or,
Optionally, in some embodiments, described presetting cipher includes two or more;Described comparison module 703, specifically For:
Whether relatively described character string is one of them of described presetting cipher;When user is when arranging private file, right When different files employs different presetting ciphers, described presetting cipher then includes two or more, at this time, it may be necessary to judge is Whether described character string is one of them of described presetting cipher, when meeting one of them, the most at least has a private file Can be shown or hide;
If one of them that described character string is described presetting cipher, the most described display module 704, specifically for display institute State the file interface that character string is corresponding;
And/or,
Optionally, in some embodiments, if described character string is presetting cipher, described display module 704, it is additionally operable to Remove described character string;Monitoring after character string is presetting cipher, the most automatically removing the word inputted in file search hurdle Symbol string, prevent other people from seeing password that user inputs also utilizes it to steal a glance at the private file of user;
From above-described embodiment it can be seen that the document protection method that provides of the embodiment of the present invention, by monitoring local literary composition The file search instruction of input in part search column judges whether user have input presetting cipher, if the file search of user's input The character string comprised in instruction is identical with presetting cipher, then it is assumed that user wants to operate private file, and shows described The file interface that presetting cipher is corresponding such that it is able to utilize the interface existed, it is achieved private file defencive function, save Design and develop cost, make the page become more succinct, meanwhile, because employing the interface existed, and hidden less than increase newly Private file display switch or " condom " so that the privacy operations of user more has crypticity;Further, searched by input file The mode of Suo Zhiling inputs password, operates the most convenient.Further, because search file function is almost each smart electronics The function that product all can have, does not have any special identification, adds file security;Meanwhile, by function of search Entrance is multiplexed with the entrance of display/hidden file also will not produce any impact to function of search.
Below in conjunction with referring to the drawings 5 and accompanying drawing 7, another embodiment introducing described file protection device is how to apply In the 6th embodiment of described document protection method.
Described document protection method, optionally, is applied in client home environment, such as PC, notebook electricity Brain etc., it may include following steps:
Step 501: command reception module 701 receives file search instruction;Described file search instruction can be to start In file search hurdle in menu input, it is also possible to be open certain file after, the file search hurdle in folder window Middle input (in Windows system, this document search column is in the upper right corner);
Step 502: monitoring modular 702 monitors the character string in described file search instruction;
Step 503: whether comparison module 703 relatively described character string is one of them of described presetting cipher;
When user is when arranging private file, and different files is employed different presetting ciphers, described preset close Code then includes two or more, at this time, it may be necessary to judge be described character string be whether one of them of described presetting cipher, meet One of them time, the most at least have a private file can be shown or hide;
Step 504: if one of them that described character string is presetting cipher, display module 704 display switching icon;Optional , the only user of character string now is input to the character string in file search hurdle, and user can not carry out carriage return or point Hit the operation of search, just triggering terminal display can switch icon, on screen, i.e. show switching icon (referring to the drawings 9), in order to The character string that prompting user is currently entered is presetting cipher, thus user can choose whether to need show or hide private file (or private file folder);Optionally, described switching icon shows on side, file search hurdle, thus plays and preferably point out work With;
Step 505: command reception module 701 judges whether to receive the click commands for switching icon;For switching The click commands of icon, can be that user clicks the described switching icon of display in file interface or desktop, thus to clothes Business device have issued the instruction of switching private file state, and hidden state switches to display state, or, display state switches to hidden Tibetan state;
Step 506: if being not received for switching the click commands of icon, illustrate that user need not show or hide privacy File and be only merely needs and scan for, then display module 704 show using input character string scan for as key word And the Search Results obtained;
Step 507: if receiving the click commands for switching icon, illustrates that user needs show or hide privacy literary composition Part, then display module 704 obtains the hierarchical information at current file interface;
By arranging above-mentioned steps 504~step 507 so that the character string in file input instruction meets presetting cipher Time, do not show the file interface that described presetting cipher is corresponding at once, but prompt the user whether to need to show by switching icon Show file interface, after user actively clicks on switching icon, just think that user needs to show file interface, if user's the most actively point Hit switching icon, then default user only wishes to scan for, thus has distinguished search and two kinds of functions of secret protection well, User can also be pointed out can to show the quick of file interface by inputting correct presetting cipher in file search hurdle simultaneously Function;Can also be right it is easy to see that above-mentioned steps 504~step 507 are a kind of preferably embodiment of the present invention The optimization of document protection method rather than necessary, therefore cannot be used for limiting protection scope of the present invention;
The hierarchical information at described current file interface, optionally, refer to residing for cloud disk interface file level, it may include The second layer file comprised in main interface, ground floor file, ground floor file ... comprise in N-1 layer file N-th layer file;
Step 508: display module 704 according to described hierarchical information, that display matches with described hierarchical information and with institute State the file interface that one of them character string being consistent of presetting cipher is corresponding;Believed by the level obtaining current file interface Breath, displays to the user that in the file interface rather than all terminals that the hierarchical information with described current file interface matches Private file and the file interface of private file folder, so that the interface data of display more has specific aim, meanwhile, display File interface also needs to corresponding with one of them character string being consistent of described presetting cipher, because the character that user is inputted What string met is corresponding presetting cipher rather than whole presetting cipher, thus ensures the privacy literary composition that other presetting ciphers are corresponding The crypticity of part and safety;Can also be it is easy to see that above-mentioned steps 507~step 508 be a kind of preferable of the present invention Embodiment, be the optimization to document protection method rather than necessary, therefore cannot be used for limiting protection scope of the present invention, And, it is also possible to it is readily conceivable that remove the acquisition to hierarchical information, directly display all with described presetting cipher wherein it The corresponding file interface of one character string being consistent can also be a kind of optional embodiment;
Step 509: display module 704 clear character string, is monitoring after character string is presetting cipher, is the most automatically removing literary composition The character string inputted in part search column, prevent other people from seeing password that user inputs also utilizes it to steal a glance at the privacy of user literary composition Part;
Can find out from above-described embodiment, the step of the hierarchical information obtaining current file interface in above-mentioned steps 507, Not necessarily to perform in step 507, it is also possible to perform after the step 503, or perform after step 504, all Do not affect final result;The step of the return string clearance order of above-mentioned steps 509, can be to hold after step 504 OK, it is also possible to be to perform after step 507, it is also possible to be to perform after procedure 506, can act as preventing other people from seeing The effect of the password of user's input.
From above-described embodiment it can be seen that the document protection method that provides of the embodiment of the present invention, by monitoring local literary composition The file search instruction of input in part search column judges whether user have input presetting cipher, if the file search of user's input The character string comprised in instruction is identical with presetting cipher, then it is assumed that user wants to operate private file, and shows described The file interface that presetting cipher is corresponding such that it is able to utilize the interface existed, it is achieved private file defencive function, save Design and develop cost, make the page become more succinct, meanwhile, because employing the interface existed, and hidden less than increase newly Private file display switch or " condom " so that the privacy operations of user more has crypticity;Further, searched by input file The mode of Suo Zhiling inputs password, operates the most convenient.Further, because search file function is almost each smart electronics The function that product all can have, does not have any special identification, adds file security;Meanwhile, by function of search Entrance is multiplexed with the entrance of display/hidden file also will not produce any impact to function of search.
11st aspect of the embodiment of the present invention, additionally provides a kind of device, including:
One or more processors;And
For storing the memorizer of operational order;
The one or more processor is configured to from described memorizer obtain operational order and perform:
Reception file search instructs, and the character string in described file search instruction is monitored in monitoring;
Described character string is compared with presetting cipher;
If described character string is presetting cipher, return the file interface data that described presetting cipher is corresponding.
Optionally, in some embodiments, described processor is additionally operable to perform:
Obtain the hierarchical information at current file interface;
According to described hierarchical information, return the file interface data matched with described hierarchical information.
Optionally, in some embodiments, described processor is additionally operable to perform:
If described character string is presetting cipher, return switching icon idsplay order;
Judge whether to receive the click commands for switching icon;
If receiving the click commands for switching icon, return the file interface data that described presetting cipher is corresponding.
Optionally, in some embodiments, described presetting cipher includes two or more;Described processor is additionally operable to hold OK:
Whether relatively described character string is one of them of described presetting cipher;
If one of them that described character string is described presetting cipher, then return file circle corresponding with described character string Face data.
Optionally, in some embodiments, described processor is additionally operable to perform:
If described character string is presetting cipher, return string clearance order.
12nd aspect of the embodiment of the present invention, additionally provides a kind of device, including:
One or more processors;And
For storing the memorizer of operational order;
The one or more processor is configured to from described memorizer obtain operational order and perform:
Reception file search instructs, and monitors the character string in described file search instruction;
Described character string is compared with presetting cipher;
If described character string is presetting cipher, show the file interface that described presetting cipher is corresponding.
Optionally, in some embodiments, described processor is additionally operable to perform:
Obtain the hierarchical information at current file interface;
According to described hierarchical information, the file interface that display matches with described hierarchical information.
Optionally, in some embodiments, described processor is additionally operable to perform:
If described character string is presetting cipher, display switching icon;
Judge whether to receive the click commands for described switching icon;
If receiving the click commands for described switching icon, show the file interface that described presetting cipher is corresponding.
Optionally, in some embodiments, described presetting cipher includes two or more;Described processor is additionally operable to hold OK:
Whether relatively described character string is one of them of described presetting cipher;
If one of them that described character string is described presetting cipher, then show the file interface that described character string is corresponding.
Optionally, in some embodiments, described processor is additionally operable to perform:
If described character string is presetting cipher, return string clearance order.
Those of ordinary skill in the field are it is understood that the discussion of any of the above embodiment is exemplary only, not It is intended to imply that the scope of the present disclosure (including claim) is limited to these examples;Under the thinking of the present invention, above example Or can also be combined between the technical characteristic in different embodiments, step can realize with random order, and exists such as Other change of the many of the different aspect of the upper described present invention, in order to concisely they do not provide in details.
It addition, for simplifying explanation and discussing, and in order to obscure the invention, can in the accompanying drawing provided To illustrate or can not illustrate and integrated circuit (IC) chip and the known power supply/grounding connection of other parts.Furthermore, it is possible to Device is shown in block diagram form, in order to avoid obscuring the invention, and this have also contemplated that following facts, i.e. about this The details of the embodiment of a little block diagram arrangements be the platform that depends highly on and will implement the present invention (that is, these details should In the range of being completely in the understanding of those skilled in the art).Elaborating that detail (such as, circuit) is to describe the present invention's In the case of exemplary embodiment, it will be apparent to those skilled in the art that can there is no these details In the case of or these details change in the case of implement the present invention.Therefore, these descriptions are considered as explanation Property rather than restrictive.
Although invention has been described to have been incorporated with the specific embodiment of the present invention, but according to retouching above Stating, a lot of replacements, amendment and the modification of these embodiments will be apparent from for those of ordinary skills.Example As, other memory architecture (such as, dynamic ram (DRAM)) can use discussed embodiment.
Embodiments of the invention be intended to fall into all such replacement within the broad range of claims, Amendment and modification.Therefore, all within the spirit and principles in the present invention, any omission of being made, amendment, equivalent, improvement Deng, should be included within the scope of the present invention.

Claims (20)

1. a document protection method, it is characterised in that including:
Reception file search instructs, and monitors the character string in described file search instruction;
Described character string is compared with presetting cipher;
If described character string is presetting cipher, return the file interface data that described presetting cipher is corresponding.
Method the most according to claim 1, it is characterised in that the file interface number that the described presetting cipher of described return is corresponding According to step include:
Obtain the hierarchical information at current file interface;
According to described hierarchical information, return the file interface data matched with described hierarchical information.
Method the most according to claim 1 and 2, it is characterised in that described described character string is compared with presetting cipher Also include after step relatively:
If described character string is presetting cipher, return switching icon idsplay order;
Judge whether to receive the click commands for switching icon;
If receiving the click commands for switching icon, return the file interface data that described presetting cipher is corresponding.
Method the most according to claim 1, it is characterised in that described presetting cipher includes two or more;Described by described The step that character string and presetting cipher compare includes:
Whether relatively described character string is one of them of described presetting cipher;
If one of them that described character string is described presetting cipher, then return the file interface number corresponding with described character string According to.
Method the most according to claim 1, it is characterised in that described described character string and presetting cipher compared Also include after step:
If described character string is presetting cipher, return string clearance order.
6. a document protection method, it is characterised in that including:
Reception file search instructs, and monitors the character string in described file search instruction;;
Described character string is compared with presetting cipher;
If described character string is presetting cipher, show the file interface that described presetting cipher is corresponding.
Method the most according to claim 6, it is characterised in that the file interface that the described presetting cipher of described display is corresponding Step includes:
Obtain the hierarchical information at current file interface;
According to described hierarchical information, the file interface that display matches with described hierarchical information.
8. according to the method described in claim 6 or 7, it is characterised in that described described character string is compared with presetting cipher Also include after step relatively:
If described character string is presetting cipher, display switching icon;
Judge whether to receive the click commands for described switching icon;
If receiving the click commands for described switching icon, show the file interface that described presetting cipher is corresponding.
Method the most according to claim 6, it is characterised in that described presetting cipher includes two or more;Described by described The step that character string and presetting cipher compare includes:
Whether relatively described character string is one of them of described presetting cipher;
If one of them that described character string is described presetting cipher, then show the file interface that described character string is corresponding.
Method the most according to claim 6, it is characterised in that described described character string is compared with presetting cipher Step after also include:
If described character string is presetting cipher, remove described character string.
11. 1 kinds of file protection devices, it is characterised in that including:
Command reception module, is used for receiving file search instruction;
Monitoring modular, for monitoring the character string in described file search instruction;
Comparison module, for comparing described character string with presetting cipher;
Data return module, if described character string is presetting cipher, for returning the file interface number that described presetting cipher is corresponding According to.
12. devices according to claim 11, it is characterised in that described data return module, specifically for:
Obtain the hierarchical information at current file interface;
According to described hierarchical information, return the file interface data matched with described hierarchical information.
13. according to the device described in claim 11 or 12, it is characterised in that if described character string is presetting cipher, described number According to returning module, it is additionally operable to return switching icon idsplay order;
Described command reception module, is used for judging whether to receive the click commands for switching icon;
If receiving the click commands for switching icon, described data return module, are used for returning described presetting cipher corresponding File interface data.
14. devices according to claim 11, it is characterised in that described presetting cipher includes two or more;Described comparison Whether module, be one of them of described presetting cipher specifically for relatively described character string;
If one of them that described character string is described presetting cipher, described data return module, specifically for returning with described The file interface data that character string is corresponding.
15. devices according to claim 11, it is characterised in that if described character string is presetting cipher, described data are returned Return module, be additionally operable to return string clearance order.
16. 1 kinds of file protection devices, it is characterised in that including:
Command reception module, is used for receiving file search instruction;
Monitoring modular, for monitoring the character string in described file search instruction;;
Comparison module, for comparing described character string with presetting cipher;
Display module, if described character string is presetting cipher, for showing the file interface that described presetting cipher is corresponding.
17. devices according to claim 16, it is characterised in that described display module, specifically for:
Obtain the hierarchical information at current file interface;
According to described hierarchical information, the file interface that display matches with described hierarchical information.
18. according to the device described in claim 16 or 17, it is characterised in that if described character string is presetting cipher, described aobvious Show module, be additionally operable to display switching icon;
Described command reception module, for judging whether to receive the click commands for described switching icon;
If receiving the click commands for described switching icon, described display module, it is used for showing that described presetting cipher is corresponding File interface.
19. devices according to claim 16, it is characterised in that described presetting cipher includes two or more;Described comparison Module, specifically for:
Whether relatively described character string is one of them of described presetting cipher;
If one of them that described character string is described presetting cipher, the most described display module, specifically for showing described character The file interface that string is corresponding.
20. devices according to claim 16, it is characterised in that if described character string is presetting cipher, described display mould Block, is additionally operable to remove described character string.
CN201610446003.7A 2016-06-20 2016-06-20 Document protection method and device Pending CN106096449A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610446003.7A CN106096449A (en) 2016-06-20 2016-06-20 Document protection method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610446003.7A CN106096449A (en) 2016-06-20 2016-06-20 Document protection method and device

Publications (1)

Publication Number Publication Date
CN106096449A true CN106096449A (en) 2016-11-09

Family

ID=57237352

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610446003.7A Pending CN106096449A (en) 2016-06-20 2016-06-20 Document protection method and device

Country Status (1)

Country Link
CN (1) CN106096449A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115238314A (en) * 2022-09-22 2022-10-25 天津联想协同科技有限公司 Network disk file display method and device, network disk and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102880837A (en) * 2012-08-24 2013-01-16 腾讯科技(深圳)有限公司 Method for improving security of mobile terminal and mobile terminal
CN103617382A (en) * 2013-11-22 2014-03-05 北京奇虎科技有限公司 Privacy protection method and device
CN104732125A (en) * 2015-01-30 2015-06-24 深圳市中兴移动通信有限公司 Method and terminal for displaying encrypted information
CN105512547A (en) * 2016-02-25 2016-04-20 上海斐讯数据通信技术有限公司 Intelligent terminal privacy protection method and intelligent terminal privacy protection system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102880837A (en) * 2012-08-24 2013-01-16 腾讯科技(深圳)有限公司 Method for improving security of mobile terminal and mobile terminal
CN103617382A (en) * 2013-11-22 2014-03-05 北京奇虎科技有限公司 Privacy protection method and device
CN104732125A (en) * 2015-01-30 2015-06-24 深圳市中兴移动通信有限公司 Method and terminal for displaying encrypted information
CN105512547A (en) * 2016-02-25 2016-04-20 上海斐讯数据通信技术有限公司 Intelligent terminal privacy protection method and intelligent terminal privacy protection system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115238314A (en) * 2022-09-22 2022-10-25 天津联想协同科技有限公司 Network disk file display method and device, network disk and storage medium
CN115238314B (en) * 2022-09-22 2023-02-17 天津联想协同科技有限公司 Network disk file display method and device, network disk and storage medium

Similar Documents

Publication Publication Date Title
JP6441502B2 (en) Device security based on screen analysis
US7454783B2 (en) System, method, and apparatus for automatic login
US11258810B2 (en) Identity authentication method, apparatus, and system
CN104573479B (en) A kind of use control method and device of user equipment
US20160300079A1 (en) Method and Device for Processing Hidden File Folder, and Terminal
CN104200170B (en) The method for secret protection and electronic equipment of a kind of electronic equipment
AU2022209288B2 (en) Personal information sharing method and apparatus, terminal device, and storage medium
CN106022196A (en) Information sharing method and intelligent terminal
CN105701420B (en) A kind of management method and terminal of user data
CN103488940A (en) Password protection system and method for application programs of intelligent equipment
Khodadadi et al. Evaluation of Recognition-Based Graphical Password Schemes in Terms of Usability and Security Attributes.
Renaud et al. Are graphical authentication mechanisms as strong as passwords?
CN105426717A (en) Interface display method and apparatus
CN106484231A (en) A kind of method and device of application hides
CN112130729B (en) Page processing method and device, computer equipment and storage medium
CN106936999A (en) Display methods, mobile terminal and the readable storage medium storing program for executing of record list are accessed recently
CN106203038A (en) A kind of unlocking method and mobile terminal
CN105827622A (en) Method and device for protecting user information
CN106372468A (en) Mobile terminal operation method and mobile terminal
CN202632281U (en) Electronic data privacy protection system and mobile storage device with privacy protection function
CN106874718A (en) privacy processing method, device and terminal
CN109858290A (en) Cipher-code input method, device, computer equipment and storage medium
CN106096449A (en) Document protection method and device
CN109359482B (en) Webpage browsing method and device
CN104423819A (en) Screen locking and unlocking method and electronic equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20161109