CN107085584A - A kind of cloud document management method, system and service end based on content - Google Patents
A kind of cloud document management method, system and service end based on content Download PDFInfo
- Publication number
- CN107085584A CN107085584A CN201610988380.3A CN201610988380A CN107085584A CN 107085584 A CN107085584 A CN 107085584A CN 201610988380 A CN201610988380 A CN 201610988380A CN 107085584 A CN107085584 A CN 107085584A
- Authority
- CN
- China
- Prior art keywords
- document
- mentioned
- client
- service end
- catalogue
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/93—Document management systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
Abstract
The invention discloses a kind of cloud document management method, system and service end based on content, methods described includes:Service end receives the authentication information and request data package that client is sent;The service end verifies the authentication information, and parses the request data package;According to the type of request data package if the authentication information is by checking, corresponding document classification, document positioning or document analysis operation are performed;The key message report that the service end is obtained when can be by the positioning intermediate result obtained when performing document positioning action or execution document analysis operation is sent to client;If the authentication information can not terminate the session with the client by checking.By the present invention program, help user to realize the unified management of cloud document, and improve user using efficiency and security that effective information is searched during cloud document, help user to be quickly found out the information of needs in numerous cloud documents.
Description
Technical field
The present invention relates to cloud information management and process field, and in particular to a kind of cloud document management method based on content,
System and service end.
Background technology
Among the process of modern office, due to needing enterprises employee to share some documents, it is thus possible to store
The service end of document is widely used by each enterprise.Shared document will be needed to be uploaded to after service end, the employee of enterprises
Autonomous it can just be downloaded or other operations.
However, when the headcount of enterprises is too many and needs shared electronic document also excessive, if all members
Service end of the work all to store document conducts interviews and document function, then the document of the service end can be caused to deposit unordered, management
Confusion, causes employee can not quickly find effective information from the service end.
The content of the invention
The embodiments of the invention provide a kind of cloud document management method, service end and system based on content, it is intended to improves
User searches the efficiency and security of effective information when using cloud document, help user to be quickly found out needs in numerous cloud documents
Information.
The first aspect of the embodiment of the present invention includes there is provided a kind of cloud document management method based on content, methods described:
Service end receives the authentication information and request data package that client is sent;
The service end verifies the authentication information, and parses the request data package;
If the authentication information includes sorting out solicited message and waits to sort out by checking and the request data package
The content of document, then the foundation document to be sorted out, by the trustship catalogue of the document classification to be sorted out to the service end
In correspondence subdirectory, the trustship catalogue is the catalogue protected by the service end, and all documents are deposited in the service end
It is put under the trustship catalogue;
If the authentication information is by checking and the request data package includes positioning request information, described
Retrieval meets the document of the location condition carried in the positioning request information in trustship catalogue, and generation positioning intermediate result will
The positioning intermediate result is sent to the client;
If the authentication information can not terminate the session with the client by checking.
The second aspect of the embodiment of the present invention is described to be based on content there is provided a kind of cloud document file management system based on content
Cloud document file management system include:
Client and service end;
The service end receives the authentication information and request data package that the client is sent;
The service end verifies the authentication information, and parses the request data package;
If the authentication information includes sorting out solicited message and waits to sort out by checking and the request data package
The content of document, then the foundation document to be sorted out, by the trustship catalogue of the document classification to be sorted out to the service end
In correspondence subdirectory, the trustship catalogue is the catalogue protected by the service end, and all documents are deposited in the service end
It is put under the trustship catalogue;
If the authentication information is by checking and the request data package includes positioning request information, described
Retrieval meets the document of the location condition carried in the positioning request information in trustship catalogue, and generation positioning intermediate result will
The positioning intermediate result is sent to the client;
If the authentication information is by checking and the request data package includes analysis request information, described
A subdirectory for meeting the analysis condition carried in the analysis request information is retrieved in trustship catalogue as analytical bibliography, and
All documents under the analytical bibliography are carried out with the analysis and excavation of key message, the pass related to the analytical bibliography is generated
Key information is reported, key message report is sent to client;
If the authentication information can not terminate the session of the service end and the client by checking.
The third aspect of the embodiment of the present invention is described based on interior there is provided a kind of cloud document management server based on content
The cloud document management server of appearance includes:
Request receiving module, authentication information and request data package for receiving client transmission;
Parsing module is verified, for verifying the authentication information that the request receiving module is received, and described ask is parsed
The request data package for asking receiving module to receive;
Sort out processing module, for when it is described checking parsing module determine authentication information by checking and it is described please
Ask packet to include sorting out solicited message and when document is sorted out, according to the content of the document to be sorted out, wait to sort out by described
Document classification is into the corresponding subdirectory of the trustship catalogue of the service end, and the trustship catalogue is to be protected by the service end
All documents are deposited under the trustship catalogue in catalogue, the service end;
Localization process module, for when it is described checking parsing module determine authentication information by checking and it is described please
When seeking packet and including positioning request information, retrieval meets determining of being carried in the positioning request information in the trustship catalogue
The document of position condition, generation positioning intermediate result sends the positioning intermediate result to the client;
Analysis and processing module, for when it is described checking parsing module determine authentication information by checking and it is described please
When seeking packet including analysis request information, retrieval meets point carried in the analysis request information in the trustship catalogue
One subdirectory of analysis condition carries out the analysis of key message to all documents under the analytical bibliography as analytical bibliography
With excavation, the key message report related to the analytical bibliography is generated, key message report is sent to client;
Conversation module is terminated, it is whole for when the checking parsing module determines that authentication information can not be by verifying
Only with the session of the client.
Therefore, in the embodiment of the present invention, the authentication information of client transmission is received by service end first and asked
Packet is sought, the authentication information is then verified by the service end, and parses the request data package, when the identity
Authentication information includes sorting out solicited message and when document is sorted out by checking and the request data package, then is treated according to described in
Sort out the content of document, by the corresponding subdirectory of the trustship catalogue of the document classification to be sorted out to the service end, work as institute
State authentication information by checking and the request data package include positioning request information when, then in the trustship catalogue
Retrieval meets the document of the location condition carried in the positioning request information, generation positioning intermediate result, and by the positioning
Intermediate result is sent to the client, when the authentication information can not be by verifying, then is terminated and the client
Session.The embodiment of the present invention sorts out the document to the respective directories of service end when document is uploaded to service end by user
Under so that all documents are stored in service end, the so text required for user asks positioning by service end with being ordered into
During shelves, required document can be quickly found, namely improve efficiency of the user using lookup effective information during cloud document
And security.
Brief description of the drawings
Technical scheme in order to illustrate the embodiments of the present invention more clearly, makes required in being described below to embodiment
Accompanying drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the present invention, for
For those of ordinary skill in the art, without having to pay creative labor, it can also be obtained according to these accompanying drawings
His accompanying drawing.
Fig. 1 is the implementation process figure of the cloud document management method provided in an embodiment of the present invention based on content;
Fig. 2 is the structured flowchart of the cloud document file management system provided in an embodiment of the present invention based on content;
Fig. 3 is the structured flowchart of the cloud document management service end provided in an embodiment of the present invention based on content.
Embodiment
To enable goal of the invention, feature, the advantage of the present invention more obvious and understandable, below in conjunction with the present invention
Accompanying drawing in embodiment, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described reality
It is only a part of embodiment of the invention to apply example, and not all embodiments.Based on the embodiment in the present invention, the common skill in this area
The every other embodiment that art personnel are obtained under the premise of creative work is not made, belongs to the model that the present invention is protected
Enclose.
The realization of the present invention is described in detail below in conjunction with specific embodiment:
Embodiment one
Fig. 1 shows the implementation process figure for the cloud document management method based on content that the embodiment of the present invention one is provided, first
First illustrate, the cloud document referred in the embodiment of the present invention refers to the document for being stored in service end.Specifically, as shown in figure 1,
The cloud document management method based on content in the embodiment of the present invention includes:
Step S101, service end receives the authentication information and request data package that client is sent.
In step S101, service end receives client and passes through the network transmission protocol (such as security socket layer long text
Host-host protocol (HTTPS, Hyper Text Transfer Protocal over Secure Socket Layer)) send
Authentication information and request data package.Specifically, a backstage finger daemon can be set in service end, and the backstage is guarded
Process can (i.e. XML-RPC, English full name be to the extensible markup language remote procedure call in the network transmission protocol:
EXtensible Markup Language Remote Procedure Call), Web-Service related ports and unified money
Source identifier (URI, Uniform Resource Identifier) carries out network monitoring, and above-mentioned client is received automatically and is passed through
Authentication information and request data package that the network transmission protocol is sent.Wherein, the method that HTTPS provides encryption communication is right
For general enterprises, bussiness class Public Key Infrastructure (PKI, publik key infrastructures) can be used
Selected with 3DES (Triple DES, Triple Data Encryption) as one kind of AES.On this basis, it is right
In the high enterprise of security classification, the strong cipher algorithms module of the current research of secrecy is may be incorporated into, future can be with usage amount
Sub-key negotiation algorithm ensures that client is passed with service end as the cipher key agreement algorithm in above-mentioned strong cipher algorithms module with this
The information security issue such as it will not eavesdrop, distort on defeated channel, realizing the high strength encrypting of service end document, it is ensured that document
Encrypted transmission.
Step S102, above-mentioned service end verifies above-mentioned authentication information, and parses above-mentioned request data package.
In step s 102, above-mentioned service end have received authentication information and request data that client is sended over
After bag, above-mentioned authentication information is verified, and above-mentioned request data package is parsed.Wherein, to authentication
The checking of information is by SSL/Transport Layer Security (SSL/TLS, Secure Socket Layer/Transport
Layer Security) carry out, it provides the functions such as data encryption, message integrity.Alternatively, in above-mentioned steps S101
The background user process set in service end can verify above-mentioned authentication information automatically, and parse above-mentioned request data package.
Wherein, according to the different demands of user, above-mentioned request data package can include sorting out solicited message, will pass through classification request
Information request document classification;Or, above-mentioned request data package can include positioning request information, will pass through Location Request letter
Ask document positioning;Or, above-mentioned request data package can also include analysis request information, will pass through the analysis request information
Document analysis is asked, is not limited herein.
Step S103, if above-mentioned authentication information includes sorting out solicited message by checking and above-mentioned request data package
And document to be sorted out, then the content according to above-mentioned document to be sorted out, by the support of above-mentioned document classification to be sorted out to above-mentioned service end
In the corresponding subdirectory of pipe catalogue.
In step s 103, when user will document be sorted out and classification solicited message hair by client graphical user interface
Deliver to after service end, the request that service end can be to user on the premise of authentication information is verified is dealt with.Can
Selection of land, above-mentioned service end can obtain the classification keyword of above-mentioned document to be sorted out, and according to sorting out keyword and default return
Class Similarity Measure scheme, determines a catalogue in trustship catalogue to sort out catalogue, and by above-mentioned document classification to be sorted out extremely
In above-mentioned classification catalogue.Wherein, above-mentioned trustship catalogue is the catalogue protected by above-mentioned service end, all texts in above-mentioned service end
Shelves are deposited under above-mentioned trustship catalogue.This step make it that, with Similar content, the document of expression similar topic is being uploaded to support
After pipe catalogue, under the same subdirectory that trustship catalogue can be deposited in, reach that each document deposits in the trustship of service end in order
Effect in catalogue.
Step S104, if above-mentioned authentication information is believed by checking and above-mentioned request data package including Location Request
Breath, then retrieval meets the document of the location condition carried in above-mentioned positioning request information, generation positioning in above-mentioned trustship catalogue
Intermediate result, above-mentioned positioning intermediate result is sent to above-mentioned client.
In step S104, when user is sent positioning request information to service end by client graphical user interface
Afterwards, the location condition that service end can be carried on the premise of authentication information is verified according to above-mentioned positioning request information
The document matched for user search.Alternatively, the location condition that above-mentioned positioning request information is carried can be positioning keyword, then
Above-mentioned service end can be determined for compliance with above-mentioned positioning strip according to above-mentioned positioning keyword and default positioning Similarity Measure scheme
The document of part, and the document that these are met to above-mentioned location condition sent as positioning intermediate result by the network transmission protocol
To client, consulted for user.With this so that user is interacted using client graphical user interface with service end, obtain and use
The information that family needs.
Alternatively, in order to further improve the security of cloud document, user is made to consult in the cloud document in its authority
Hold, send above-mentioned positioning intermediate result to before above-mentioned client above-mentioned, the above method also includes:
Above-mentioned service end obtains active user's level of security from above-mentioned client;
Compare the level of security of active user's level of security and above-mentioned positioning intermediate result;
It is above-mentioned to send above-mentioned positioning intermediate result to above-mentioned client, be specially:If above-mentioned active user's level of security
It is not less than the level of security of above-mentioned positioning intermediate result, then sends above-mentioned positioning intermediate result to above-mentioned client.
Wherein, user using client when being logged in for the first time, and client can give tacit consent to it for lowest security level.Or
Person, it, by default program, is the level of security that each user distributes respective acquiescence that can be.Meanwhile, the login of client
Also there is the option of lifting level of security at interface, and the level of security that selecting oneself for user needs is lifted, but lifting safety
The process of rank needs just be confirmed by the certification of service end.Multiple documents may be included by positioning intermediate result, these
The level of security of document may have height to have low, any one document for positioning intermediate result, before client is sent to, all
Need to be compared with active user's level of security, only when active user's level of security is not less than the level of security of the document
When, just think that active user has the authority for checking the document.
Alternatively, in order to which when user does not possess the authority for consulting respective document, prompting user reacts in time, upper
State after comparing above-mentioned active user's level of security of acquisition and the level of security of above-mentioned positioning intermediate result, the above method is also wrapped
Include:
If above-mentioned active user's level of security is less than the level of security of above-mentioned positioning intermediate result, sent out to above-mentioned client
Wrong authority is sent to instruct, to point out user to lift active user's safe class or abandon consulting above-mentioned positioning intermediate result.
Wherein, if the level of security for having partial document in positioning intermediate result is higher than above-mentioned active user's level of security,
Then think that now user is without the authority for checking this partial document, service end can send wrong authority to client and instruct, to carry
Show that user's active user's level of security is too low, user can make a choice in the following two kinds operation:Active user's rank is made
Go out lifting or user abandons consulting the document that this Partial security is superior to active user's level of security.
Alternatively, in order to allow user have again consult positioning intermediate result in the higher document of authority chance, it is above-mentioned to
Above-mentioned client is sent after wrong authority instruction, and the above method also includes:
If the lifting active user safe class instruction that above-mentioned client is sent is received, to above-mentioned lifting active user
Safe class instruction is verified;
If being verified, above-mentioned active user's level of security is lifted, return execution afterwards is above-mentioned to compare active user's peace
The step of level of security of full rank and above-mentioned positioning intermediate result.
Wherein, if after service end sends wrong authority instruction to client, user have selected lifting active user's level
Not, then service end can receive the lifting active user safe class instruction of client transmission, and above-mentioned lifting active user is pacified
Congruent level instruction is verified, to ensure that the lifting operation is correct, can be performed.If above-mentioned lifting active user safety
Grade instruction has passed through checking, then again returns to step and " compare the peace of active user's level of security and above-mentioned positioning intermediate result
Full rank ", each document for positioning intermediate result is checked to reaffirm whether user has permission.
Alternatively, in order to avoid when user does not possess in positioning intermediate result wastes excessive on the document of corresponding authority
Between, after the above-mentioned wrong authority instruction to the transmission of above-mentioned client, the above method also includes:
Abandon consulting instruction if receiving, level of security is only retained in positioning intermediate result and is not higher than active user's peace
The document of full rank, and above-mentioned positioning intermediate result is sent to client.
Wherein, if after service end sends wrong authority instruction to client, user have selected initiation and consult this part
Level of security is higher than the document of active user's level of security, then above-mentioned service end can receive above-mentioned access of abandoning and instruct, to positioning
Intermediate result is screened, and will be positioned level of security in intermediate result and is weeded out higher than the document of active user's level of security, is only protected
Stay level of security to be not higher than the document of active user's level of security, and the positioning intermediate result after screening sent to client,
Consulted for user.
Step S105, if above-mentioned authentication information is believed by checking and above-mentioned request data package including analysis request
Breath, then retrieval meets a subdirectory conduct of the analysis condition carried in above-mentioned analysis request information in above-mentioned trustship catalogue
Analytical bibliography, and all documents under above-mentioned analytical bibliography are carried out with the analysis and excavation of key message, generation and above-mentioned analysis
The related key message report of catalogue, the report of above-mentioned key message is sent to client.
In step S105, when user is sent analysis request information to service end by client graphical user interface
Afterwards, the analysis condition that service end can be carried on the premise of authentication information is verified according to above-mentioned analysis request information
The document matched for user search.Similar with step S104, the analysis condition that above-mentioned analysis request is carried can close for analysis
Keyword, its substantially with the positioning keyword in step S104 and indistinction, simply in step S105, be used as searching user
Want the catalogue of progress document analysis and excavation, therefore in step S105, call it for analysis condition.Above-mentioned service end can be with
According to above-mentioned analysis of key word and default positioning Similarity Measure scheme, after the document of above-mentioned analysis condition is determined for compliance with,
These subdirectories where meeting the document of analysis condition are returned into client, and meet bar at these in client by user
Made a choice in several subdirectories where the document of part, specify one of those to be used as analytical bibliography.Above-mentioned service end can
To carry out the analysis and excavation of key message to above-mentioned analytical bibliography, by the key message excavated write-in key message report
In, and it is final all analyzing each document, excavates and finishes after, by key message report transmission into client, looked into for user
Read.It is alternatively possible to which the report of above-mentioned key message is stored under above-mentioned analytical bibliography.When number of users (such as enterprises
Employee) it is more, it is necessary to during also more shared document, the subdirectory quantity in the trustship catalogue of service end can also rise, and
Large volume document can have also been deposited under each subdirectory.Because the number of documents in subdirectory is excessive, and user can not possibly be sometimes
Between go carefully to consult all documents with energy, thus by this step, can cause user in subdirectory is not consulted one by one
All documents in the case of, the substantially situations of all documents in catalogue is had gained some understanding by reading key message report,
The tacit knowledge and business intelligence of each document in subdirectory are obtained, lifting user knows the efficiency of effective information.Alternatively,
Because key message reports all document information being related under subdirectory, thus sent by key message report to client
Before end, key message report can be checked to examine active user's safe level to determine whether active user has otherwise
Authority, it implements flow and is referred to step S104, and therefore not to repeat here.
Specifically, above-mentioned all documents under above-mentioned analytical bibliography carry out the analysis and excavation of key message, generation with
The related key message report of above-mentioned analytical bibliography, including:
Extract the key message of all documents under above-mentioned analytical bibliography, above-mentioned key message include it is following more than one:Life
Name entity, the amount of money, numeral classifier phrase and key phrase, wherein, above-mentioned name entity include again as follows more than one:Institution term
Claim, name, time and place name;
In the corresponding document of each key message, the context of above-mentioned key message, generation and above-mentioned analysis are taken passages out
The related key message report of catalogue.
Wherein, because the user that this method is mainly directed towards is the interior employee of enterprise, come for enterprise and its interior employee
Say, commercial information most merits attention, thus under extraction and analysis catalogue during the key message of all documents, above-mentioned pass
Key information include but is not limited to it is following more than one:Name entity, the amount of money, numeral classifier phrase and key phrase, above-mentioned name entity
Include but is not limited to again it is following more than one:Organization's title, name, time and place name.For organization's title, people
For name, time, place name, the amount of money and numeral classifier phrase, because it possesses certain systematicness, it is relatively easy to being serviced end and is known
Not, these key messages can be directly extracted from document.But for key phrase, it does not have the limit in content
System, can be that any content, any form, thus service end can carry out statistics sentence to each document in analytical bibliography respectively
The analysis and calculating of method, the key phrase of each document is extracted using statistical knowledge.
And only draw these key messages or inadequate, because it is only that some are scattered, nonsensical word,
Sentence.In order that the key message that must be extracted is of practical significance, it can also be returned to corresponding according to each key message
In document, context of the key message in correspondence document is won.There are basis and explanation hereafter above, these key messages
It can be understood by user, can just show their meaning.The context of each key message is being taken passages out, energy is formed
After the content enough understood, the key message report related to above-mentioned analytical bibliography is generated.
Alternatively, in order to understand the significance level of the document of each in catalogue, user is helped to be quickly found out important documents, upper
State and extract under above-mentioned analytical bibliography after the key message of all documents, the above method also includes:
Each document under above-mentioned analytical bibliography is defined as document to be appraised successively;
Importance scoring is carried out to above-mentioned document to be appraised according to the relevant information of above-mentioned document to be appraised, appraisal result is obtained,
Wherein, above-mentioned relevant information include it is following more than one:The frequency of document key message, the support of document key message, text
The shelves generation time, document modification time, the scoring of above-mentioned importance include it is following more than one:Technical sophistication degree scores, technology point
Cloth degree scores, the original degree scoring of technology.
Wherein, user is not intended merely to the understanding for having an entirety to analytical bibliography, it is also desirable to each under analytical bibliography
Document carries out importance scoring, several documents more important in catalogue is obtained with this, and these document emphasis are consulted.Cause
And, the document of each in analytical bibliography can be successively defined as to document to be appraised, entered according to the relevant information of above-mentioned document to be appraised
The importance scoring of style of writing shelves.Above-mentioned relevant information include but is not limited to it is following more than one:The frequency of document key message, text
The support of shelves key message, document is included into the time in trustship catalogue.And the scoring of above-mentioned importance also include it is following it is a kind of with
On:Technical sophistication degree, technology distribution degree, the original degree of technology.
In a kind of application scenarios, above-mentioned importance scoring includes:Technical sophistication degree, then it is above-mentioned according to above-mentioned document to be appraised
Relevant information above-mentioned document to be appraised is scored, be specially:
In the key message for counting above-mentioned document to be appraised, the number of key phrase names the number and different lives of entity
Name entity species number, and count simultaneously above-mentioned document to be appraised number of words and with duplicate removal number of words;
The number of the key phrase of the above-mentioned document to be appraised obtained to above-mentioned statistics, names the number of entity and different names
The number of words and duplicate removal number of words of the species number of entity and above-mentioned document to be appraised are weighted average computation;
Using the result of above-mentioned weighted average calculation as the technical sophistication degree of above-mentioned document appraisal result.
Wherein, when carrying out the technical sophistication degree scoring of document, the frequency of key message has mainly been applied to.Above-mentioned progress
During weighted average calculation, the weight of each element can be pre-set by developer, can also carry out technical sophistication by user
Each element weight is modified and adjusted by client user's graphical interfaces before degree scoring.
Certainly, the technical sophistication degree scoring of document can also use other modes to obtain, and not be restricted herein.
In another application scenarios, above-mentioned importance scoring includes:Technology distribution degree, then it is above-mentioned according to above-mentioned text to be appraised
The relevant information of shelves scores above-mentioned document to be appraised, is specially:
Each other document in above-mentioned analytical bibliography in addition to above-mentioned document to be appraised are subjected to phase with above-mentioned document to be appraised
Calculated like degree;
The value that each above-mentioned other document are obtained with above-mentioned document progress Similarity Measure to be appraised adds up;
Using above-mentioned accumulated result as the technology distribution degree of above-mentioned document to be appraised appraisal result.
Wherein, due to carrying out during Similarity Measure, being will be other in addition to above-mentioned document to be appraised in above-mentioned analytical bibliography
Each document all carries out Similarity Measure with above-mentioned document to be appraised, and all documents in analytical bibliography can be successively by conduct
Document to be appraised, thus the value of document to be appraised and other each documents progress Similarity Measures can be preserved, after can saving
The amount of calculation of continuous Similarity Measure.For example, having three documents A, B, C in analytical bibliography.When A is as document to be appraised, service end
It will calculate and preserve A and B similarity and A and C similarity, and the value of the two Similarity Measures is added, be used as A skill
The appraisal result of art degree of distribution.When B is as document to be appraised, service end by calculate B and A similarity and B and C similarity,
Due to when carrying out the scoring of technology distribution degree to A, having saved the value of A and B similarity, thus now can be no longer to B
Calculated with A similarity, only calculate B and C similarity, and the value of B and C similarity is preserved.Finally to C
When carrying out Similarity Measure, actually carrying out being computed A and C similarity and B to A and B when technology distribution degree scores
With C similarity, so being added after now only need to taking out the A of preservation and C similarity and B with the value of C similarity, you can
Obtain the appraisal result of C technology distribution degree.So, it can greatly save and be accounted for when scoring each document technology degree of distribution
Resource, reduces the amount of calculation of Similarity Measure.
Certainly, the technology distribution degree scoring of document can also use other modes to obtain, and not be restricted herein.
In another application scenarios, above-mentioned importance scoring includes:The original degree of technology, then it is above-mentioned according to above-mentioned text to be appraised
The relevant information of shelves scores above-mentioned document to be appraised, is specially:
The support and above-mentioned document to be appraised for obtaining the key phrase of above-mentioned document to be appraised are included into time in trustship catalogue;
According to the original degree scoring formula of default technology, the support of the key phrase of above-mentioned document to be appraised and to be appraised is utilized
Document is included into the time in trustship catalogue, calculates the appraisal result for the original degree of technology for obtaining above-mentioned document to be appraised.
Wherein, the original degree scoring formula of default technology can be:
In above-mentioned formula, s.t. is constraints, TiFor i-th of key phrase of the document to be appraised, sup (Ti) it is i-th
Key phrase TiSupport, age-in-days (Ti) for the time of key phrase appearance, counting, i.e., text to be appraised in units of day
Shelves are included into time in trustship catalogue, O (Ti) it is key phrase TiThe original degree of technology, O1For by key all in document to be appraised
After the original degree of technology of phrase is added, the original degree of technology of obtained document to be appraised.
Alternatively, on the basis of above-mentioned formula, the method for the also another original degree of computing technique, its formula is:
O2=| S |
S.t.S=T | O (T)>0}
Wherein, T | O (T)>0 }, the O (T in above-mentioned first formula are representedi) value be more than 0 those key phrases,
These key phrases constitute set S, O2Set S absolute value has been taken, has represented to take the quantity for including element in this set S
Afterwards, the original degree of technology of the document to be appraised obtained.
It is of course also possible to be scored from other score formula to calculate the original degree of document, it is not restricted herein.
The above-mentioned three kinds of application scenarios referred to, can independently occur, and can also be occurred according to the demand combinations of user, herein
It is not restricted.
Alternatively, in order to be optimized to trustship catalogue, make the classification under it more accurate, in the above-mentioned analysis of said extracted
Under catalogue after the key message of all documents, the above method also includes:
Cluster operation is carried out to the relevant documentation under above-mentioned analytical bibliography.
Wherein it is possible to be to carry out cluster operation using K averages (K-Means) algorithm, word is provided in this way and supported
Similitude aggregation classification;Or, can carry out cluster operation using key message support, provide crucial in this way
The similitude aggregation classification of Informational support.It is of course also possible to carry out cluster operation using with other clustering algorithms, do not limit herein
System.
Step S106, if above-mentioned authentication information can not terminate the session with above-mentioned client by checking.
In step s 106, if the authentication information that the client that above-mentioned service end is received is sended over can not lead to
Checking is crossed, then explanation is carried out communicating dangerous with the client, therefore service end can be terminated and above-mentioned client in time
Session, prevents information leakage.
Alternatively, it is above-mentioned after above-mentioned steps S104 or step S105 in order to further prevent the leakage of important documents
Cloud document management method based on content also includes:
Above-mentioned client opens positioning intermediate result or the crucial letter that service end is sent using the reading tool customized in advance
Breath report.
Wherein, can be with order to avoid causing leakage enterprise confidential information because the client of user is infected by malice wooden horse
Reading tool is customized in client, the file that service end is sended over is opened with the reading tool of customization.It can be the base in WPS
It is customized, can also be customized on the basis of Office softwares of increasing income, the electronics to read Office classifications on plinth
Document.When making the customization of client reading tool on domestic operating platform, can effectively filter business software overseas can
The malice leak and risk of energy.
Alternatively, it is above-mentioned to be based on content in order that service end grasps the basic standard that user carries out safety classification to document
Cloud document management method also include:
Above-mentioned service end periodically carries out safety classification training to the electronic document in trustship catalogue, generates safety classification knowledge
Storehouse.
Wherein, service end regularly can carry out safety classification to the document that level of security has been labeled with trustship catalogue
Training, specifically, for the document of each existing level of security, extracting the keyword of the document, level of security, weight letter
Breath, the time of this safety training, generates safety classification knowledge base, and by these information records extracted in trustship catalogue
In the training of safety classification word set information table of database.
Alternatively, for the safety classification knowledge base that perfect service end is automatically generated, the above-mentioned cloud document pipe based on content
Reason method also includes:
Above-mentioned service end receives user experience classification dictionary, and Word library updating safety classification is classified according to the user experience of reception
Knowledge base.
Wherein, in order to improve safety classification knowledge base, use directly in service end typing or can also be imported by superuser
Family experience classification dictionary, user experience classification dictionary is stored in the special important information table of the user of database, while safety
Ranked knowledge base can also according to user experience be classified dictionary carry out supplement with it is perfect.
Alternatively, in order to reach the effect to document automatic marking level of security, in above-mentioned generation safety classification knowledge base
Afterwards, the above-mentioned cloud document management method based on content also includes:
Using machine learning algorithm, according to safety classification knowledge base, safety classification grader is generated, in service termination
Receive when document is sorted out, classification document is treated automatically and carries out level of security mark.
Wherein, above-mentioned machine learning algorithm is related to information retrieval, statistics index, the original in Chinese information processing field
Reason, conceptual machine model, include but is not limited to it is following more than one:Bag of words (BOW, bag of words), flux linkage model
(BOL, bag of link), word frequency and reverse word frequency model (TF-IDF, term-frequency and inverse term-
Frequency), mutual information model (MI, matual information), position weight (location-weight).Generated
Safety classification grader can with being serviced device be used for treat sort out electronic document sorted out when, for no mark safe level
Other electronic document to be sorted out carries out the mark of level of security.
Therefore, in embodiments of the present invention, first by service end receive client send authentication information and
Request data package, then verifies above-mentioned authentication information by above-mentioned service end, and parses above-mentioned request data package, when above-mentioned body
Part authentication information includes sorting out solicited message and when document is sorted out by checking and above-mentioned request data package, then according to above-mentioned
The content of document to be sorted out, by the corresponding subdirectory of the trustship catalogue of above-mentioned document classification to be sorted out to above-mentioned service end, when
When above-mentioned authentication information includes positioning request information by checking and above-mentioned request data package, then in above-mentioned trustship catalogue
Middle to retrieve the document for meeting the location condition carried in above-mentioned positioning request information, generation positions intermediate result, and will be above-mentioned fixed
Position intermediate result is sent to above-mentioned client, when above-mentioned authentication information can not be by verifying, then is terminated and above-mentioned client
The session at end.The embodiment of the present invention can be received the request data instruction that client is sent by service end, be referred to according to request data
The classification of order, makes corresponding classification, positioning or analysis operation, helps enterprise to realize the unified management of cloud document, and improve
User obtains the efficiency and security of effective information in cloud document.
Embodiment two
Fig. 2 shows the composition structure for the cloud document file management system based on content that the embodiment of the present invention two is provided, in order to
It is easy to explanation, illustrate only the part related to the embodiment of the present invention.
As shown in Fig. 2 the above-mentioned cloud document file management system based on content includes client 1, and service end 2.
Wherein, above-mentioned client includes but is not limited to mobile phone, tablet personal computer or computer.User can pass through above-mentioned visitor
Family end reaches the purpose for the document for accessing service end storage.The above-mentioned cloud document file management system based on content can use client
Machine/server architecture (C/S Structs, Client Server Structs), browser/server framework (B/S
Structs, Browser Server Structs) or other improved frameworks have been carried out based on above two framework, herein
It is not construed as limiting.
Above-mentioned service end 2 receives the authentication information and request data package that above-mentioned client 1 is sent.
Wherein, service end receives the authentication information and request data package that client is sent by the network transmission protocol.
A backstage finger daemon can be set to carry out network monitoring in service end, above-mentioned client 1 is received automatically and is passed by network
Authentication information and request data package that defeated agreement is sent.
Above-mentioned service end 2 verifies above-mentioned authentication information, and parses above-mentioned request data package.
Wherein, above-mentioned service end 2 have received authentication information and number of request that user sends over via client 1
After bag, above-mentioned authentication information is verified, and above-mentioned request data package is parsed.Wherein, according to user
Different demands, above-mentioned request data package can include sort out solicited message, with will pass through the classification solicited message request document
Sort out;Or, above-mentioned request data package can include positioning request information, be determined with will pass through Location Request letter request document
Position;Or, above-mentioned request data package can also include analysis request information, will pass through the analysis request information request document point
Analysis, is not limited herein.
If above-mentioned authentication information includes sorting out solicited message and waits to sort out by checking and above-mentioned request data package
Document, the then content according to above-mentioned document to be sorted out, by the trustship catalogue of above-mentioned document classification to be sorted out to above-mentioned service end 2
In correspondence subdirectory.
Wherein, when user by client will wait sort out document and sort out solicited message send to service end after, service end
The request of user is dealt with the premise of being verified in authentication information.Above-mentioned service end can obtain above-mentioned treat
Sort out the classification keyword of document, and according to keyword and default classification Similarity Measure scheme is sorted out, determine trustship catalogue
In a catalogue to sort out catalogue, and by above-mentioned document classification to be sorted out into above-mentioned classification catalogue.Above-mentioned trustship catalogue is
All documents are deposited under above-mentioned trustship catalogue in the catalogue protected by above-mentioned service end, above-mentioned service end.
If above-mentioned authentication information is by checking and above-mentioned request data package includes positioning request information, above-mentioned
Retrieval meets the document of the location condition carried in above-mentioned positioning request information in trustship catalogue, and generation positioning intermediate result will
Above-mentioned positioning intermediate result is sent to above-mentioned client 1.
Wherein, after user is sent positioning request information to service end by client, service end will be in authentication
The location condition that Information Authentication is carried on the premise of according to above-mentioned positioning request information is the document that user search is matched.Make
For the implementation example of the present invention, the location condition that above-mentioned positioning request information is carried can be positioning keyword, then above-mentioned
Service end will be determined for compliance with the text of above-mentioned location condition according to above-mentioned positioning keyword and default positioning Similarity Measure scheme
Shelves, and the document that these are met to above-mentioned location condition is sent to client as positioning intermediate result by the network transmission protocol
End, is consulted for user.With this so that user is interacted using client graphical user interface with service end, obtaining user needs
Information.
If above-mentioned authentication information is by checking and above-mentioned request data package includes analysis request information, above-mentioned
A subdirectory for meeting the analysis condition carried in above-mentioned analysis request information is retrieved in trustship catalogue as analytical bibliography, and
All documents under above-mentioned analytical bibliography are carried out with the analysis and excavation of key message, the pass related to above-mentioned analytical bibliography is generated
Key information is reported, the report of above-mentioned key message is sent to client 1.
Wherein, after user is sent analysis request information to service end by client, service end will be in authentication
The analysis condition that Information Authentication is carried on the premise of according to above-mentioned analysis request information is the document that user search is matched, and
Catalogue where matched with analysis condition document is defined as analytical bibliography.Above-mentioned service end then will be to above-mentioned analysis mesh
Record carries out the analysis and excavation of key message, during the key message excavated write-in key message is reported, and final to each
Individual document all analyzes, excavate and finish after, key message report is sent into client, consulted for user.
If above-mentioned authentication information can not terminate the session of above-mentioned service end 2 and above-mentioned client 1 by checking.
Wherein, if the authentication information that sends over of the client that above-mentioned service end is received can not by checking,
Then illustrate that service end and the client carry out communicate dangerous, thus service end by it is timely terminate and above-mentioned client meeting
Words, the important information leakage for preventing service end from having.
It should be understood that the cloud document file management system based on content in the embodiment of the present invention can be used for realizing that the above method is real
Whole technical schemes in example are applied, the function of its each functional module can be specifically real according to the method in above method embodiment
Existing, it implements process and can refer to associated description in above-described embodiment, and here is omitted.
In the present embodiment, the service end of the cloud document file management system based on content receives the request data that client is sent
Instruction, the classification instructed according to request data makes corresponding classification, positioning or analysis operation, helps enterprise to realize cloud text
The unified management of shelves, and improve efficiency and security that user obtains effective information in cloud document.
Embodiment three
Fig. 3 shows the structural framing for the cloud document management service end based on content that the embodiment of the present invention three is provided, and is
It is easy to explanation, illustrate only the part related to the embodiment of the present invention.
As shown in figure 3, the above-mentioned cloud document management service end 3 based on content includes:Request receiving module 31, checking parsing
Module 32, sorts out processing module 33, localization process module 34, analysis and processing module 35.
Wherein, request receiving module 31, authentication information and request data package for receiving client transmission;
Parsing module 32 is verified, for verifying the authentication information that above-mentioned request receiving module 31 is received, and is parsed
State the request data package of request receiving module reception;
Sort out processing module 33, for when above-mentioned checking parsing module 32 determine authentication information by checking and
Stating request data package includes sorting out solicited message and when document is sorted out, and according to the content of above-mentioned document to be sorted out, is treated above-mentioned
Sort out document classification into the corresponding subdirectory of the trustship catalogue of above-mentioned service end, above-mentioned trustship catalogue is to be protected by above-mentioned service end
All documents are deposited under above-mentioned trustship catalogue in the catalogue of shield, above-mentioned service end;
Localization process module 34, for when above-mentioned checking parsing module 32 determine authentication information by checking and
When stating request data package including positioning request information, retrieval meets in above-mentioned positioning request information and carried in above-mentioned trustship catalogue
Location condition document, generation positioning intermediate result, above-mentioned positioning intermediate result is sent to above-mentioned client;
Analysis and processing module 35, for when above-mentioned checking parsing module 32 determine authentication information by checking and
When stating request data package including analysis request information, retrieval meets in above-mentioned analysis request information and carried in above-mentioned trustship catalogue
Subdirectory of analysis condition carry out key message as analytical bibliography, and to all documents under above-mentioned analytical bibliography
Analysis generates the key message report related to above-mentioned analytical bibliography, the report of above-mentioned key message is sent to client with excavating
End;
Conversation module 36 is terminated, for determining that authentication information can not be by checking when above-mentioned checking parsing module 32
When, terminate the session with above-mentioned client.
Alternatively, the above-mentioned cloud document management service end 3 based on content also includes:
User security rank acquisition module, for the authentication information that receives when above-mentioned request receiving module 31 by testing
Demonstrate,prove and request data package include positioning request information when, from above-mentioned client obtain active user's level of security;
Level of security authentication module, for comparing active user's level of security that above-mentioned user class acquisition module is got
With the level of security of above-mentioned positioning intermediate result;
Specifically, above-mentioned localization process module is used for, if above-mentioned active user's level of security is not less than in the middle of above-mentioned positioning
As a result level of security, then send above-mentioned positioning intermediate result to above-mentioned client.
Alternatively, the above-mentioned cloud document management service end 3 based on content also includes:
Mistake authority sending module, for determining that active user's level of security is less than when above-mentioned level of security authentication module
When stating the level of security of positioning intermediate result, send wrong authority to above-mentioned client and instruct, to point out user's lifting current
User security grade is abandoned consulting above-mentioned positioning intermediate result.
Alternatively, the above-mentioned cloud document management service end 3 based on content also includes:
Command operating module is lifted, for when the lifting active user safe class instruction for receiving above-mentioned client transmission
When, the instruction of above-mentioned lifting active user safe class is verified, and after being verified, lift above-mentioned active user's safety
Rank, and notify that level of security authentication module is verified again.
Alternatively, above-mentioned analysis and processing module 35, in addition to:
Key message acquisition submodule, the key message for extracting all documents under above-mentioned analytical bibliography, above-mentioned key
Information include it is following more than one:Entity, the amount of money, numeral classifier phrase and key phrase are named, wherein, above-mentioned name entity includes again
It is following more than one:Organization's title, name, time and place name;
Key message report generation submodule, in the corresponding document of each key message, taking passages out above-mentioned key
The context of information, generates the key message report related to above-mentioned analytical bibliography.
Alternatively, above-mentioned analysis and processing module 35, in addition to:
Importance scoring submodule, for a document under above-mentioned analytical bibliography to be defined as into document to be appraised successively;Root
Importance scoring is carried out to above-mentioned document to be appraised according to the relevant information of above-mentioned document to be appraised, appraisal result is obtained, wherein, above-mentioned phase
Close information include it is following more than one:The frequency of document key message, the support of document key message, document is included into trustship mesh
Time in record, the scoring of above-mentioned importance include it is following more than one:Technical sophistication degree scores, the scoring of technology distribution degree, technology
Original degree scoring.
Specifically, above-mentioned importance scoring submodule, in addition to:
Key message statistic submodule, for when importance scoring include technical sophistication degree score when, count it is above-mentioned by
In the key message for commenting document, the number of key phrase names the number of entity and the species number of different name entities, and simultaneously
Count above-mentioned document to be appraised number of words and with duplicate removal number of words;
Weighted calculation submodule, for the number of the key phrase of above-mentioned document to be appraised obtained to above-mentioned statistics, name
The number of words and duplicate removal number of words of the species number and above-mentioned document to be appraised of the number of entity and different name entities are weighted average meter
Calculate;
Technical sophistication degree determination sub-module, for being answered the result of above-mentioned weighted average calculation as the technology of above-mentioned document
The appraisal result of miscellaneous degree.
Specifically, above-mentioned importance scoring submodule, in addition to:
Similarity Measure submodule, for by each other document in above-mentioned analytical bibliography in addition to above-mentioned document to be appraised
Similarity Measure is carried out with above-mentioned document to be appraised;
Similarity adds up submodule, is obtained for each above-mentioned other document to be carried out into Similarity Measure with above-mentioned document to be appraised
The value arrived adds up;
Technology distribution degree determination sub-module, for using above-mentioned accumulated result as above-mentioned document to be appraised technology distribution degree
Appraisal result.
Specifically, above-mentioned importance scoring submodule, in addition to:
The original degree acquisition of information submodule of technology, for the support of the key phrase that obtains above-mentioned document to be appraised and above-mentioned
Document to be appraised is included into the time in trustship catalogue.
The original degree determination sub-module of technology, for according to the original degree scoring formula of default technology, utilizing above-mentioned text to be appraised
The support and document to be appraised of the key phrase of shelves are included into the time in trustship catalogue, calculate the technology for obtaining above-mentioned document to be appraised
The appraisal result of original degree.
It should be understood that the cloud document management service end based on content in the embodiment of the present invention can be used for realizing the above method
The whole technical schemes realized in embodiment with service end angle, the function of its each functional module can be real according to the above method
The method applied in example is implemented, and it implements process and can refer to associated description in above-described embodiment, and here is omitted.
Therefore, the cloud document management service end based on content in the present embodiment can receive client transmission
Request data is instructed, the classification instructed according to request data, is made corresponding classification, positioning or analysis operation, is helped enterprise
The unified management of cloud document is realized, and improves efficiency and security that user obtains effective information in cloud document.
It should be noted that in several embodiments provided herein, it should be understood that disclosed device and side
Method, can be realized by another way.For example, device embodiment described above is only schematical, for example, above-mentioned
The division of unit, only a kind of division of logic function, can there is other dividing mode when actually realizing, such as multiple units
Or component can combine or be desirably integrated into another system, or some features can be ignored, or not perform.It is another, institute
Display or the coupling each other discussed or direct-coupling or communication connection can be by some interfaces, device or unit
INDIRECT COUPLING or communication connection, can be electrical, machinery or other forms.
For foregoing each method embodiment, for simplicity description, therefore it is all expressed as to a series of combination of actions, but
It is that those skilled in the art should know, the present invention is not limited by described sequence of movement, because according to the present invention, certain
A little steps can use other orders or carry out simultaneously.Secondly, those skilled in the art should also know, be retouched in specification
The embodiment stated belongs to preferred embodiment, necessary to involved action and module might not all be the present invention.
In the above-described embodiments, the description to each embodiment all emphasizes particularly on different fields, and does not have the portion being described in detail in some embodiment
Point, it may refer to the associated description of other embodiments.
It is to a kind of preferred embodiment provided by the present invention, for those of ordinary skill in the art, according to this above
The thought of inventive embodiments, will change in specific embodiments and applications, to sum up, and this specification content is not
It is interpreted as limitation of the present invention.
Claims (11)
1. a kind of cloud document management method based on content, it is characterised in that including:
Service end receives the authentication information and request data package that client is sent;
The service end verifies the authentication information, and parses the request data package;
If the authentication information includes sorting out solicited message and document to be sorted out by checking and the request data package,
Then the content according to the document to be sorted out, sub by the correspondence of the trustship catalogue of the document classification to be sorted out to the service end
In catalogue, the trustship catalogue is the catalogue protected by the service end, and all documents deposit in institute in the service end
State under trustship catalogue;
If the authentication information is by checking and the request data package includes positioning request information, in the trustship
Retrieval meets the document of the location condition carried in the positioning request information in catalogue, and generation positioning intermediate result will be described
Positioning intermediate result is sent to the client;
If the authentication information is by checking and the request data package includes analysis request information, in the trustship
A subdirectory for meeting the analysis condition carried in the analysis request information is retrieved in catalogue as analytical bibliography, and to institute
Analysis and excavation that all documents under analytical bibliography carry out key message are stated, the crucial letter related to the analytical bibliography is generated
Breath report, key message report is sent to client;
If the authentication information can not terminate the session with the client by checking.
2. the method as described in claim 1, it is characterised in that if the authentication information passes through checking and the request
Packet includes positioning request information, then described to send the positioning intermediate result to before the client, in addition to:
The service end obtains active user's level of security from the client;
Compare active user's level of security and the level of security of the positioning intermediate result;
It is described to send the positioning intermediate result to the client, be specially:If active user's level of security is not low
In the level of security of the positioning intermediate result, then the positioning intermediate result is sent to the client.
3. method as claimed in claim 2, it is characterised in that the active user's level of security for comparing acquisition and institute
The level of security of positioning intermediate result is stated, is also included afterwards:
If active user's level of security sends wrong less than the level of security of the positioning intermediate result to the client
Authority instruction by mistake, to point out user to lift active user's safe class or abandon consulting the positioning intermediate result.
4. method as claimed in claim 3, it is characterised in that described to send wrong authority instruction to the client, afterwards
Also include:
If the lifting active user safe class instruction that the client is sent is received, to the lifting active user safety
Grade instruction is verified;
If being verified, active user's level of security is lifted, return execution afterwards is described to compare active user's safe level
Not with it is described positioning intermediate result level of security the step of.
5. the method as described in claim 1, it is characterised in that all documents under the analytical bibliography carry out crucial
The analysis and excavation of information, generate the key message report related to the analytical bibliography, including:
Extract the key message of all documents under the analytical bibliography, the key message include it is following more than one:Name is real
Body, the amount of money, numeral classifier phrase and key phrase, wherein, it is described name entity again include as follows more than one:Organization's title,
Name, time and place name;
In the corresponding document of each key message, the context of the key message, generation and the analytical bibliography are taken passages out
Related key message report.
6. method as claimed in claim 5, it is characterised in that the crucial letter of all documents under the extraction analytical bibliography
Breath, also includes afterwards:
A document under the analytical bibliography is defined as document to be appraised successively;
Importance scoring is carried out to the document to be appraised according to the relevant information of the document to be appraised, appraisal result is obtained, wherein,
The relevant information include it is following more than one:The frequency of document key message, the support of document key message, document is included into
Time in trustship catalogue, importance scoring include it is following more than one:Technical sophistication degree is scored, and technology distribution degree is commented
Point, the original degree scoring of technology.
7. method as claimed in claim 6, it is characterised in that when importance scoring includes the scoring of technical sophistication degree,
The relevant information according to the document to be appraised scores the document to be appraised, including:
In the key message for counting the document to be appraised, the number of key phrase names the number of entity and different names real
The species number of body, and count simultaneously the document to be appraised number of words and with duplicate removal number of words;
To the number of the key phrase for counting the obtained document to be appraised, the number and different name entities of entity are named
Species number and the number of words and duplicate removal number of words of the document to be appraised be weighted average computation;
Using the result of the weighted average calculation as the technical sophistication degree of the document appraisal result.
8. method as claimed in claim 6, it is characterised in that when importance scoring includes the scoring of technology distribution degree,
The relevant information according to the document to be appraised scores the document to be appraised, in addition to:
Each other document in the analytical bibliography in addition to the document to be appraised are subjected to similarity with the document to be appraised
Calculate;
The value that each described other document are obtained with the document progress Similarity Measure to be appraised adds up;
Using the accumulated result as the technology distribution degree of the document to be appraised appraisal result.
9. method as claimed in claim 6, it is characterised in that when importance scoring, which includes the original degree of technology, scores,
The relevant information according to the document to be appraised scores the document to be appraised, in addition to:
The support and the document to be appraised for obtaining the key phrase of the document to be appraised are included into time in trustship catalogue;
According to the original degree scoring formula of default technology, the support and document to be appraised of the key phrase of the document to be appraised are utilized
It is included into the time in trustship catalogue, calculates the appraisal result for the original degree of technology for obtaining the document to be appraised.
10. a kind of cloud document file management system based on content, it is characterised in that the cloud document file management system bag based on content
Include:
Client and service end;
The service end receives the authentication information and request data package that the client is sent;
The service end verifies the authentication information, and parses the request data package;
If the authentication information includes sorting out solicited message and document to be sorted out by checking and the request data package,
Then the content according to the document to be sorted out, sub by the correspondence of the trustship catalogue of the document classification to be sorted out to the service end
In catalogue, the trustship catalogue is the catalogue protected by the service end, and all documents deposit in institute in the service end
State under trustship catalogue;
If the authentication information is by checking and the request data package includes positioning request information, in the trustship
Retrieval meets the document of the location condition carried in the positioning request information in catalogue, and generation positioning intermediate result will be described
Positioning intermediate result is sent to the client;
If the authentication information is by checking and the request data package includes analysis request information, in the trustship
A subdirectory for meeting the analysis condition carried in the analysis request information is retrieved in catalogue as analytical bibliography, and to institute
Analysis and excavation that all documents under analytical bibliography carry out key message are stated, the crucial letter related to the analytical bibliography is generated
Breath report, key message report is sent to client;
If the authentication information can not terminate the session of the service end and the client by checking.
11. a kind of cloud document management service end based on content, it is characterised in that the cloud document management service based on content
End includes:
Request receiving module, authentication information and request data package for receiving client transmission;
Parsing module is verified, is connect for verifying the authentication information that the request receiving module is received, and parsing the request
Receive the request data package that module is received;
Sort out processing module, for determining that authentication information passes through checking and the number of request when the checking parsing module
According to including sorting out solicited message and when document is sorted out, according to the content of the document to be sorted out, by the document to be sorted out
Sort out into the corresponding subdirectory of the trustship catalogue of the service end, the trustship catalogue is the mesh protected by the service end
All documents are deposited under the trustship catalogue in record, the service end;
Localization process module, for determining that authentication information passes through checking and the number of request when the checking parsing module
During according to including positioning request information, retrieval meets the positioning strip carried in the positioning request information in the trustship catalogue
The document of part, generation positioning intermediate result sends the positioning intermediate result to the client;
Analysis and processing module, for determining that authentication information passes through checking and the number of request when the checking parsing module
During according to including analysis request information, retrieval meets the analysis bar carried in the analysis request information in the trustship catalogue
One subdirectory of part carries out the analysis and digging of key message to all documents under the analytical bibliography as analytical bibliography
Pick, generates the key message report related to the analytical bibliography, key message report is sent to client;
Terminate conversation module, for when it is described checking parsing module determine that authentication information can not be by verifying when, terminate with
The session of the client.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610988380.3A CN107085584B (en) | 2016-11-09 | 2016-11-09 | Cloud document management method and system based on content and server |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610988380.3A CN107085584B (en) | 2016-11-09 | 2016-11-09 | Cloud document management method and system based on content and server |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107085584A true CN107085584A (en) | 2017-08-22 |
CN107085584B CN107085584B (en) | 2021-05-28 |
Family
ID=59615152
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610988380.3A Active CN107085584B (en) | 2016-11-09 | 2016-11-09 | Cloud document management method and system based on content and server |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107085584B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110287493A (en) * | 2019-06-28 | 2019-09-27 | 中国科学技术信息研究所 | Risk phrase chunking method, apparatus, electronic equipment and storage medium |
CN110675289A (en) * | 2019-09-29 | 2020-01-10 | 四川大学 | Method for compiling electronic file catalogue with case criminal review |
CN110851397A (en) * | 2019-11-12 | 2020-02-28 | 成都九鼎瑞信科技股份有限公司 | Knowledge base construction platform based on cloud document management system |
CN116361240A (en) * | 2023-05-31 | 2023-06-30 | 北京觅图科技有限公司 | Cloud document processing method, cloud document processing system and server |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1680942A (en) * | 2004-02-27 | 2005-10-12 | 株式会社理光 | Document group analyzing apparatus, a document group analyzing method, a document group analyzing system |
CN103441986A (en) * | 2013-07-29 | 2013-12-11 | 中国航天科工集团第二研究院七〇六所 | Data resource security control method in thin client mode |
CN105357201A (en) * | 2015-11-12 | 2016-02-24 | 中国科学院信息工程研究所 | Access control method and system for object cloud storage |
-
2016
- 2016-11-09 CN CN201610988380.3A patent/CN107085584B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1680942A (en) * | 2004-02-27 | 2005-10-12 | 株式会社理光 | Document group analyzing apparatus, a document group analyzing method, a document group analyzing system |
CN103441986A (en) * | 2013-07-29 | 2013-12-11 | 中国航天科工集团第二研究院七〇六所 | Data resource security control method in thin client mode |
CN105357201A (en) * | 2015-11-12 | 2016-02-24 | 中国科学院信息工程研究所 | Access control method and system for object cloud storage |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110287493A (en) * | 2019-06-28 | 2019-09-27 | 中国科学技术信息研究所 | Risk phrase chunking method, apparatus, electronic equipment and storage medium |
CN110287493B (en) * | 2019-06-28 | 2023-04-18 | 中国科学技术信息研究所 | Risk phrase identification method and device, electronic equipment and storage medium |
CN110675289A (en) * | 2019-09-29 | 2020-01-10 | 四川大学 | Method for compiling electronic file catalogue with case criminal review |
CN110675289B (en) * | 2019-09-29 | 2023-05-05 | 四川大学 | Method for cataloging electronic file along with criminal investigation |
CN110851397A (en) * | 2019-11-12 | 2020-02-28 | 成都九鼎瑞信科技股份有限公司 | Knowledge base construction platform based on cloud document management system |
CN116361240A (en) * | 2023-05-31 | 2023-06-30 | 北京觅图科技有限公司 | Cloud document processing method, cloud document processing system and server |
CN116361240B (en) * | 2023-05-31 | 2023-09-19 | 北京觅图科技有限公司 | Cloud document processing method, cloud document processing system and server |
Also Published As
Publication number | Publication date |
---|---|
CN107085584B (en) | 2021-05-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102598007B (en) | Effective detection fingerprints the system and method for data and information | |
US7558796B1 (en) | Determining origins of queries for a database intrusion detection system | |
CN104270386B (en) | Across application system user (asu) information integrating method and identity information management server | |
US9209974B1 (en) | Functional encryption key management | |
EP2676197B1 (en) | System and methods for identifying compromised personally identifiable information on the internet | |
US20090327484A1 (en) | System and method for establishing personal social network, trusty network and social networking system | |
CN107480549A (en) | A kind of shared sensitive information desensitization method of data-oriented and system | |
CN107085584A (en) | A kind of cloud document management method, system and service end based on content | |
US20060047793A1 (en) | Method for configuring computing devices using reference groups | |
CN113489672B (en) | Network sniffing-based REST interface specification packaging system | |
CN102394885A (en) | Information classification protection automatic verification method based on data stream | |
CN107194666A (en) | Report Server Management method and terminal device based on block chain technology | |
US10282461B2 (en) | Structure-based entity analysis | |
CN104618410B (en) | Resource supplying method and apparatus | |
CN107146154A (en) | A kind of method and device of data management | |
CN109076073A (en) | Prevent the undesirable communication in voice over internet protocol system | |
CN102325143B (en) | Cloud platform based information collection, storage, encryption and retrieval system | |
CN102708216A (en) | Word-segmentation organizing method and clustering method for ciphertext search | |
CN102509057B (en) | Mark-based method for safely filtering unstructured data | |
CN103957173B (en) | semantic switch | |
Zhu et al. | Ontology-based approach for the measurement of privacy disclosure | |
Tsoumas et al. | Security-by-Ontology: A knowledge-centric approach | |
Chakrabarti et al. | Approach towards realizing resource mining and secured information transfer | |
CN109560937A (en) | Command identifying method, device and computer readable storage medium | |
Sun et al. | Cloud Computing and Security: 4th International Conference, ICCCS 2018, Haikou, China, June 8–10, 2018, Revised Selected Papers, Part III |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |