CN107085584A - A kind of cloud document management method, system and service end based on content - Google Patents

A kind of cloud document management method, system and service end based on content Download PDF

Info

Publication number
CN107085584A
CN107085584A CN201610988380.3A CN201610988380A CN107085584A CN 107085584 A CN107085584 A CN 107085584A CN 201610988380 A CN201610988380 A CN 201610988380A CN 107085584 A CN107085584 A CN 107085584A
Authority
CN
China
Prior art keywords
document
mentioned
client
service end
catalogue
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610988380.3A
Other languages
Chinese (zh)
Other versions
CN107085584B (en
Inventor
熊文
周庚申
丁紫惠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Great Wall Science And Technology Group Ltd By Share Ltd
Original Assignee
China Great Wall Science And Technology Group Ltd By Share Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Great Wall Science And Technology Group Ltd By Share Ltd filed Critical China Great Wall Science And Technology Group Ltd By Share Ltd
Priority to CN201610988380.3A priority Critical patent/CN107085584B/en
Publication of CN107085584A publication Critical patent/CN107085584A/en
Application granted granted Critical
Publication of CN107085584B publication Critical patent/CN107085584B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/93Document management systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Abstract

The invention discloses a kind of cloud document management method, system and service end based on content, methods described includes:Service end receives the authentication information and request data package that client is sent;The service end verifies the authentication information, and parses the request data package;According to the type of request data package if the authentication information is by checking, corresponding document classification, document positioning or document analysis operation are performed;The key message report that the service end is obtained when can be by the positioning intermediate result obtained when performing document positioning action or execution document analysis operation is sent to client;If the authentication information can not terminate the session with the client by checking.By the present invention program, help user to realize the unified management of cloud document, and improve user using efficiency and security that effective information is searched during cloud document, help user to be quickly found out the information of needs in numerous cloud documents.

Description

A kind of cloud document management method, system and service end based on content
Technical field
The present invention relates to cloud information management and process field, and in particular to a kind of cloud document management method based on content, System and service end.
Background technology
Among the process of modern office, due to needing enterprises employee to share some documents, it is thus possible to store The service end of document is widely used by each enterprise.Shared document will be needed to be uploaded to after service end, the employee of enterprises Autonomous it can just be downloaded or other operations.
However, when the headcount of enterprises is too many and needs shared electronic document also excessive, if all members Service end of the work all to store document conducts interviews and document function, then the document of the service end can be caused to deposit unordered, management Confusion, causes employee can not quickly find effective information from the service end.
The content of the invention
The embodiments of the invention provide a kind of cloud document management method, service end and system based on content, it is intended to improves User searches the efficiency and security of effective information when using cloud document, help user to be quickly found out needs in numerous cloud documents Information.
The first aspect of the embodiment of the present invention includes there is provided a kind of cloud document management method based on content, methods described:
Service end receives the authentication information and request data package that client is sent;
The service end verifies the authentication information, and parses the request data package;
If the authentication information includes sorting out solicited message and waits to sort out by checking and the request data package The content of document, then the foundation document to be sorted out, by the trustship catalogue of the document classification to be sorted out to the service end In correspondence subdirectory, the trustship catalogue is the catalogue protected by the service end, and all documents are deposited in the service end It is put under the trustship catalogue;
If the authentication information is by checking and the request data package includes positioning request information, described Retrieval meets the document of the location condition carried in the positioning request information in trustship catalogue, and generation positioning intermediate result will The positioning intermediate result is sent to the client;
If the authentication information can not terminate the session with the client by checking.
The second aspect of the embodiment of the present invention is described to be based on content there is provided a kind of cloud document file management system based on content Cloud document file management system include:
Client and service end;
The service end receives the authentication information and request data package that the client is sent;
The service end verifies the authentication information, and parses the request data package;
If the authentication information includes sorting out solicited message and waits to sort out by checking and the request data package The content of document, then the foundation document to be sorted out, by the trustship catalogue of the document classification to be sorted out to the service end In correspondence subdirectory, the trustship catalogue is the catalogue protected by the service end, and all documents are deposited in the service end It is put under the trustship catalogue;
If the authentication information is by checking and the request data package includes positioning request information, described Retrieval meets the document of the location condition carried in the positioning request information in trustship catalogue, and generation positioning intermediate result will The positioning intermediate result is sent to the client;
If the authentication information is by checking and the request data package includes analysis request information, described A subdirectory for meeting the analysis condition carried in the analysis request information is retrieved in trustship catalogue as analytical bibliography, and All documents under the analytical bibliography are carried out with the analysis and excavation of key message, the pass related to the analytical bibliography is generated Key information is reported, key message report is sent to client;
If the authentication information can not terminate the session of the service end and the client by checking.
The third aspect of the embodiment of the present invention is described based on interior there is provided a kind of cloud document management server based on content The cloud document management server of appearance includes:
Request receiving module, authentication information and request data package for receiving client transmission;
Parsing module is verified, for verifying the authentication information that the request receiving module is received, and described ask is parsed The request data package for asking receiving module to receive;
Sort out processing module, for when it is described checking parsing module determine authentication information by checking and it is described please Ask packet to include sorting out solicited message and when document is sorted out, according to the content of the document to be sorted out, wait to sort out by described Document classification is into the corresponding subdirectory of the trustship catalogue of the service end, and the trustship catalogue is to be protected by the service end All documents are deposited under the trustship catalogue in catalogue, the service end;
Localization process module, for when it is described checking parsing module determine authentication information by checking and it is described please When seeking packet and including positioning request information, retrieval meets determining of being carried in the positioning request information in the trustship catalogue The document of position condition, generation positioning intermediate result sends the positioning intermediate result to the client;
Analysis and processing module, for when it is described checking parsing module determine authentication information by checking and it is described please When seeking packet including analysis request information, retrieval meets point carried in the analysis request information in the trustship catalogue One subdirectory of analysis condition carries out the analysis of key message to all documents under the analytical bibliography as analytical bibliography With excavation, the key message report related to the analytical bibliography is generated, key message report is sent to client;
Conversation module is terminated, it is whole for when the checking parsing module determines that authentication information can not be by verifying Only with the session of the client.
Therefore, in the embodiment of the present invention, the authentication information of client transmission is received by service end first and asked Packet is sought, the authentication information is then verified by the service end, and parses the request data package, when the identity Authentication information includes sorting out solicited message and when document is sorted out by checking and the request data package, then is treated according to described in Sort out the content of document, by the corresponding subdirectory of the trustship catalogue of the document classification to be sorted out to the service end, work as institute State authentication information by checking and the request data package include positioning request information when, then in the trustship catalogue Retrieval meets the document of the location condition carried in the positioning request information, generation positioning intermediate result, and by the positioning Intermediate result is sent to the client, when the authentication information can not be by verifying, then is terminated and the client Session.The embodiment of the present invention sorts out the document to the respective directories of service end when document is uploaded to service end by user Under so that all documents are stored in service end, the so text required for user asks positioning by service end with being ordered into During shelves, required document can be quickly found, namely improve efficiency of the user using lookup effective information during cloud document And security.
Brief description of the drawings
Technical scheme in order to illustrate the embodiments of the present invention more clearly, makes required in being described below to embodiment Accompanying drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the present invention, for For those of ordinary skill in the art, without having to pay creative labor, it can also be obtained according to these accompanying drawings His accompanying drawing.
Fig. 1 is the implementation process figure of the cloud document management method provided in an embodiment of the present invention based on content;
Fig. 2 is the structured flowchart of the cloud document file management system provided in an embodiment of the present invention based on content;
Fig. 3 is the structured flowchart of the cloud document management service end provided in an embodiment of the present invention based on content.
Embodiment
To enable goal of the invention, feature, the advantage of the present invention more obvious and understandable, below in conjunction with the present invention Accompanying drawing in embodiment, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described reality It is only a part of embodiment of the invention to apply example, and not all embodiments.Based on the embodiment in the present invention, the common skill in this area The every other embodiment that art personnel are obtained under the premise of creative work is not made, belongs to the model that the present invention is protected Enclose.
The realization of the present invention is described in detail below in conjunction with specific embodiment:
Embodiment one
Fig. 1 shows the implementation process figure for the cloud document management method based on content that the embodiment of the present invention one is provided, first First illustrate, the cloud document referred in the embodiment of the present invention refers to the document for being stored in service end.Specifically, as shown in figure 1, The cloud document management method based on content in the embodiment of the present invention includes:
Step S101, service end receives the authentication information and request data package that client is sent.
In step S101, service end receives client and passes through the network transmission protocol (such as security socket layer long text Host-host protocol (HTTPS, Hyper Text Transfer Protocal over Secure Socket Layer)) send Authentication information and request data package.Specifically, a backstage finger daemon can be set in service end, and the backstage is guarded Process can (i.e. XML-RPC, English full name be to the extensible markup language remote procedure call in the network transmission protocol: EXtensible Markup Language Remote Procedure Call), Web-Service related ports and unified money Source identifier (URI, Uniform Resource Identifier) carries out network monitoring, and above-mentioned client is received automatically and is passed through Authentication information and request data package that the network transmission protocol is sent.Wherein, the method that HTTPS provides encryption communication is right For general enterprises, bussiness class Public Key Infrastructure (PKI, publik key infrastructures) can be used Selected with 3DES (Triple DES, Triple Data Encryption) as one kind of AES.On this basis, it is right In the high enterprise of security classification, the strong cipher algorithms module of the current research of secrecy is may be incorporated into, future can be with usage amount Sub-key negotiation algorithm ensures that client is passed with service end as the cipher key agreement algorithm in above-mentioned strong cipher algorithms module with this The information security issue such as it will not eavesdrop, distort on defeated channel, realizing the high strength encrypting of service end document, it is ensured that document Encrypted transmission.
Step S102, above-mentioned service end verifies above-mentioned authentication information, and parses above-mentioned request data package.
In step s 102, above-mentioned service end have received authentication information and request data that client is sended over After bag, above-mentioned authentication information is verified, and above-mentioned request data package is parsed.Wherein, to authentication The checking of information is by SSL/Transport Layer Security (SSL/TLS, Secure Socket Layer/Transport Layer Security) carry out, it provides the functions such as data encryption, message integrity.Alternatively, in above-mentioned steps S101 The background user process set in service end can verify above-mentioned authentication information automatically, and parse above-mentioned request data package. Wherein, according to the different demands of user, above-mentioned request data package can include sorting out solicited message, will pass through classification request Information request document classification;Or, above-mentioned request data package can include positioning request information, will pass through Location Request letter Ask document positioning;Or, above-mentioned request data package can also include analysis request information, will pass through the analysis request information Document analysis is asked, is not limited herein.
Step S103, if above-mentioned authentication information includes sorting out solicited message by checking and above-mentioned request data package And document to be sorted out, then the content according to above-mentioned document to be sorted out, by the support of above-mentioned document classification to be sorted out to above-mentioned service end In the corresponding subdirectory of pipe catalogue.
In step s 103, when user will document be sorted out and classification solicited message hair by client graphical user interface Deliver to after service end, the request that service end can be to user on the premise of authentication information is verified is dealt with.Can Selection of land, above-mentioned service end can obtain the classification keyword of above-mentioned document to be sorted out, and according to sorting out keyword and default return Class Similarity Measure scheme, determines a catalogue in trustship catalogue to sort out catalogue, and by above-mentioned document classification to be sorted out extremely In above-mentioned classification catalogue.Wherein, above-mentioned trustship catalogue is the catalogue protected by above-mentioned service end, all texts in above-mentioned service end Shelves are deposited under above-mentioned trustship catalogue.This step make it that, with Similar content, the document of expression similar topic is being uploaded to support After pipe catalogue, under the same subdirectory that trustship catalogue can be deposited in, reach that each document deposits in the trustship of service end in order Effect in catalogue.
Step S104, if above-mentioned authentication information is believed by checking and above-mentioned request data package including Location Request Breath, then retrieval meets the document of the location condition carried in above-mentioned positioning request information, generation positioning in above-mentioned trustship catalogue Intermediate result, above-mentioned positioning intermediate result is sent to above-mentioned client.
In step S104, when user is sent positioning request information to service end by client graphical user interface Afterwards, the location condition that service end can be carried on the premise of authentication information is verified according to above-mentioned positioning request information The document matched for user search.Alternatively, the location condition that above-mentioned positioning request information is carried can be positioning keyword, then Above-mentioned service end can be determined for compliance with above-mentioned positioning strip according to above-mentioned positioning keyword and default positioning Similarity Measure scheme The document of part, and the document that these are met to above-mentioned location condition sent as positioning intermediate result by the network transmission protocol To client, consulted for user.With this so that user is interacted using client graphical user interface with service end, obtain and use The information that family needs.
Alternatively, in order to further improve the security of cloud document, user is made to consult in the cloud document in its authority Hold, send above-mentioned positioning intermediate result to before above-mentioned client above-mentioned, the above method also includes:
Above-mentioned service end obtains active user's level of security from above-mentioned client;
Compare the level of security of active user's level of security and above-mentioned positioning intermediate result;
It is above-mentioned to send above-mentioned positioning intermediate result to above-mentioned client, be specially:If above-mentioned active user's level of security It is not less than the level of security of above-mentioned positioning intermediate result, then sends above-mentioned positioning intermediate result to above-mentioned client.
Wherein, user using client when being logged in for the first time, and client can give tacit consent to it for lowest security level.Or Person, it, by default program, is the level of security that each user distributes respective acquiescence that can be.Meanwhile, the login of client Also there is the option of lifting level of security at interface, and the level of security that selecting oneself for user needs is lifted, but lifting safety The process of rank needs just be confirmed by the certification of service end.Multiple documents may be included by positioning intermediate result, these The level of security of document may have height to have low, any one document for positioning intermediate result, before client is sent to, all Need to be compared with active user's level of security, only when active user's level of security is not less than the level of security of the document When, just think that active user has the authority for checking the document.
Alternatively, in order to which when user does not possess the authority for consulting respective document, prompting user reacts in time, upper State after comparing above-mentioned active user's level of security of acquisition and the level of security of above-mentioned positioning intermediate result, the above method is also wrapped Include:
If above-mentioned active user's level of security is less than the level of security of above-mentioned positioning intermediate result, sent out to above-mentioned client Wrong authority is sent to instruct, to point out user to lift active user's safe class or abandon consulting above-mentioned positioning intermediate result.
Wherein, if the level of security for having partial document in positioning intermediate result is higher than above-mentioned active user's level of security, Then think that now user is without the authority for checking this partial document, service end can send wrong authority to client and instruct, to carry Show that user's active user's level of security is too low, user can make a choice in the following two kinds operation:Active user's rank is made Go out lifting or user abandons consulting the document that this Partial security is superior to active user's level of security.
Alternatively, in order to allow user have again consult positioning intermediate result in the higher document of authority chance, it is above-mentioned to Above-mentioned client is sent after wrong authority instruction, and the above method also includes:
If the lifting active user safe class instruction that above-mentioned client is sent is received, to above-mentioned lifting active user Safe class instruction is verified;
If being verified, above-mentioned active user's level of security is lifted, return execution afterwards is above-mentioned to compare active user's peace The step of level of security of full rank and above-mentioned positioning intermediate result.
Wherein, if after service end sends wrong authority instruction to client, user have selected lifting active user's level Not, then service end can receive the lifting active user safe class instruction of client transmission, and above-mentioned lifting active user is pacified Congruent level instruction is verified, to ensure that the lifting operation is correct, can be performed.If above-mentioned lifting active user safety Grade instruction has passed through checking, then again returns to step and " compare the peace of active user's level of security and above-mentioned positioning intermediate result Full rank ", each document for positioning intermediate result is checked to reaffirm whether user has permission.
Alternatively, in order to avoid when user does not possess in positioning intermediate result wastes excessive on the document of corresponding authority Between, after the above-mentioned wrong authority instruction to the transmission of above-mentioned client, the above method also includes:
Abandon consulting instruction if receiving, level of security is only retained in positioning intermediate result and is not higher than active user's peace The document of full rank, and above-mentioned positioning intermediate result is sent to client.
Wherein, if after service end sends wrong authority instruction to client, user have selected initiation and consult this part Level of security is higher than the document of active user's level of security, then above-mentioned service end can receive above-mentioned access of abandoning and instruct, to positioning Intermediate result is screened, and will be positioned level of security in intermediate result and is weeded out higher than the document of active user's level of security, is only protected Stay level of security to be not higher than the document of active user's level of security, and the positioning intermediate result after screening sent to client, Consulted for user.
Step S105, if above-mentioned authentication information is believed by checking and above-mentioned request data package including analysis request Breath, then retrieval meets a subdirectory conduct of the analysis condition carried in above-mentioned analysis request information in above-mentioned trustship catalogue Analytical bibliography, and all documents under above-mentioned analytical bibliography are carried out with the analysis and excavation of key message, generation and above-mentioned analysis The related key message report of catalogue, the report of above-mentioned key message is sent to client.
In step S105, when user is sent analysis request information to service end by client graphical user interface Afterwards, the analysis condition that service end can be carried on the premise of authentication information is verified according to above-mentioned analysis request information The document matched for user search.Similar with step S104, the analysis condition that above-mentioned analysis request is carried can close for analysis Keyword, its substantially with the positioning keyword in step S104 and indistinction, simply in step S105, be used as searching user Want the catalogue of progress document analysis and excavation, therefore in step S105, call it for analysis condition.Above-mentioned service end can be with According to above-mentioned analysis of key word and default positioning Similarity Measure scheme, after the document of above-mentioned analysis condition is determined for compliance with, These subdirectories where meeting the document of analysis condition are returned into client, and meet bar at these in client by user Made a choice in several subdirectories where the document of part, specify one of those to be used as analytical bibliography.Above-mentioned service end can To carry out the analysis and excavation of key message to above-mentioned analytical bibliography, by the key message excavated write-in key message report In, and it is final all analyzing each document, excavates and finishes after, by key message report transmission into client, looked into for user Read.It is alternatively possible to which the report of above-mentioned key message is stored under above-mentioned analytical bibliography.When number of users (such as enterprises Employee) it is more, it is necessary to during also more shared document, the subdirectory quantity in the trustship catalogue of service end can also rise, and Large volume document can have also been deposited under each subdirectory.Because the number of documents in subdirectory is excessive, and user can not possibly be sometimes Between go carefully to consult all documents with energy, thus by this step, can cause user in subdirectory is not consulted one by one All documents in the case of, the substantially situations of all documents in catalogue is had gained some understanding by reading key message report, The tacit knowledge and business intelligence of each document in subdirectory are obtained, lifting user knows the efficiency of effective information.Alternatively, Because key message reports all document information being related under subdirectory, thus sent by key message report to client Before end, key message report can be checked to examine active user's safe level to determine whether active user has otherwise Authority, it implements flow and is referred to step S104, and therefore not to repeat here.
Specifically, above-mentioned all documents under above-mentioned analytical bibliography carry out the analysis and excavation of key message, generation with The related key message report of above-mentioned analytical bibliography, including:
Extract the key message of all documents under above-mentioned analytical bibliography, above-mentioned key message include it is following more than one:Life Name entity, the amount of money, numeral classifier phrase and key phrase, wherein, above-mentioned name entity include again as follows more than one:Institution term Claim, name, time and place name;
In the corresponding document of each key message, the context of above-mentioned key message, generation and above-mentioned analysis are taken passages out The related key message report of catalogue.
Wherein, because the user that this method is mainly directed towards is the interior employee of enterprise, come for enterprise and its interior employee Say, commercial information most merits attention, thus under extraction and analysis catalogue during the key message of all documents, above-mentioned pass Key information include but is not limited to it is following more than one:Name entity, the amount of money, numeral classifier phrase and key phrase, above-mentioned name entity Include but is not limited to again it is following more than one:Organization's title, name, time and place name.For organization's title, people For name, time, place name, the amount of money and numeral classifier phrase, because it possesses certain systematicness, it is relatively easy to being serviced end and is known Not, these key messages can be directly extracted from document.But for key phrase, it does not have the limit in content System, can be that any content, any form, thus service end can carry out statistics sentence to each document in analytical bibliography respectively The analysis and calculating of method, the key phrase of each document is extracted using statistical knowledge.
And only draw these key messages or inadequate, because it is only that some are scattered, nonsensical word, Sentence.In order that the key message that must be extracted is of practical significance, it can also be returned to corresponding according to each key message In document, context of the key message in correspondence document is won.There are basis and explanation hereafter above, these key messages It can be understood by user, can just show their meaning.The context of each key message is being taken passages out, energy is formed After the content enough understood, the key message report related to above-mentioned analytical bibliography is generated.
Alternatively, in order to understand the significance level of the document of each in catalogue, user is helped to be quickly found out important documents, upper State and extract under above-mentioned analytical bibliography after the key message of all documents, the above method also includes:
Each document under above-mentioned analytical bibliography is defined as document to be appraised successively;
Importance scoring is carried out to above-mentioned document to be appraised according to the relevant information of above-mentioned document to be appraised, appraisal result is obtained, Wherein, above-mentioned relevant information include it is following more than one:The frequency of document key message, the support of document key message, text The shelves generation time, document modification time, the scoring of above-mentioned importance include it is following more than one:Technical sophistication degree scores, technology point Cloth degree scores, the original degree scoring of technology.
Wherein, user is not intended merely to the understanding for having an entirety to analytical bibliography, it is also desirable to each under analytical bibliography Document carries out importance scoring, several documents more important in catalogue is obtained with this, and these document emphasis are consulted.Cause And, the document of each in analytical bibliography can be successively defined as to document to be appraised, entered according to the relevant information of above-mentioned document to be appraised The importance scoring of style of writing shelves.Above-mentioned relevant information include but is not limited to it is following more than one:The frequency of document key message, text The support of shelves key message, document is included into the time in trustship catalogue.And the scoring of above-mentioned importance also include it is following it is a kind of with On:Technical sophistication degree, technology distribution degree, the original degree of technology.
In a kind of application scenarios, above-mentioned importance scoring includes:Technical sophistication degree, then it is above-mentioned according to above-mentioned document to be appraised Relevant information above-mentioned document to be appraised is scored, be specially:
In the key message for counting above-mentioned document to be appraised, the number of key phrase names the number and different lives of entity Name entity species number, and count simultaneously above-mentioned document to be appraised number of words and with duplicate removal number of words;
The number of the key phrase of the above-mentioned document to be appraised obtained to above-mentioned statistics, names the number of entity and different names The number of words and duplicate removal number of words of the species number of entity and above-mentioned document to be appraised are weighted average computation;
Using the result of above-mentioned weighted average calculation as the technical sophistication degree of above-mentioned document appraisal result.
Wherein, when carrying out the technical sophistication degree scoring of document, the frequency of key message has mainly been applied to.Above-mentioned progress During weighted average calculation, the weight of each element can be pre-set by developer, can also carry out technical sophistication by user Each element weight is modified and adjusted by client user's graphical interfaces before degree scoring.
Certainly, the technical sophistication degree scoring of document can also use other modes to obtain, and not be restricted herein.
In another application scenarios, above-mentioned importance scoring includes:Technology distribution degree, then it is above-mentioned according to above-mentioned text to be appraised The relevant information of shelves scores above-mentioned document to be appraised, is specially:
Each other document in above-mentioned analytical bibliography in addition to above-mentioned document to be appraised are subjected to phase with above-mentioned document to be appraised Calculated like degree;
The value that each above-mentioned other document are obtained with above-mentioned document progress Similarity Measure to be appraised adds up;
Using above-mentioned accumulated result as the technology distribution degree of above-mentioned document to be appraised appraisal result.
Wherein, due to carrying out during Similarity Measure, being will be other in addition to above-mentioned document to be appraised in above-mentioned analytical bibliography Each document all carries out Similarity Measure with above-mentioned document to be appraised, and all documents in analytical bibliography can be successively by conduct Document to be appraised, thus the value of document to be appraised and other each documents progress Similarity Measures can be preserved, after can saving The amount of calculation of continuous Similarity Measure.For example, having three documents A, B, C in analytical bibliography.When A is as document to be appraised, service end It will calculate and preserve A and B similarity and A and C similarity, and the value of the two Similarity Measures is added, be used as A skill The appraisal result of art degree of distribution.When B is as document to be appraised, service end by calculate B and A similarity and B and C similarity, Due to when carrying out the scoring of technology distribution degree to A, having saved the value of A and B similarity, thus now can be no longer to B Calculated with A similarity, only calculate B and C similarity, and the value of B and C similarity is preserved.Finally to C When carrying out Similarity Measure, actually carrying out being computed A and C similarity and B to A and B when technology distribution degree scores With C similarity, so being added after now only need to taking out the A of preservation and C similarity and B with the value of C similarity, you can Obtain the appraisal result of C technology distribution degree.So, it can greatly save and be accounted for when scoring each document technology degree of distribution Resource, reduces the amount of calculation of Similarity Measure.
Certainly, the technology distribution degree scoring of document can also use other modes to obtain, and not be restricted herein.
In another application scenarios, above-mentioned importance scoring includes:The original degree of technology, then it is above-mentioned according to above-mentioned text to be appraised The relevant information of shelves scores above-mentioned document to be appraised, is specially:
The support and above-mentioned document to be appraised for obtaining the key phrase of above-mentioned document to be appraised are included into time in trustship catalogue;
According to the original degree scoring formula of default technology, the support of the key phrase of above-mentioned document to be appraised and to be appraised is utilized Document is included into the time in trustship catalogue, calculates the appraisal result for the original degree of technology for obtaining above-mentioned document to be appraised.
Wherein, the original degree scoring formula of default technology can be:
In above-mentioned formula, s.t. is constraints, TiFor i-th of key phrase of the document to be appraised, sup (Ti) it is i-th Key phrase TiSupport, age-in-days (Ti) for the time of key phrase appearance, counting, i.e., text to be appraised in units of day Shelves are included into time in trustship catalogue, O (Ti) it is key phrase TiThe original degree of technology, O1For by key all in document to be appraised After the original degree of technology of phrase is added, the original degree of technology of obtained document to be appraised.
Alternatively, on the basis of above-mentioned formula, the method for the also another original degree of computing technique, its formula is:
O2=| S |
S.t.S=T | O (T)>0}
Wherein, T | O (T)>0 }, the O (T in above-mentioned first formula are representedi) value be more than 0 those key phrases, These key phrases constitute set S, O2Set S absolute value has been taken, has represented to take the quantity for including element in this set S Afterwards, the original degree of technology of the document to be appraised obtained.
It is of course also possible to be scored from other score formula to calculate the original degree of document, it is not restricted herein.
The above-mentioned three kinds of application scenarios referred to, can independently occur, and can also be occurred according to the demand combinations of user, herein It is not restricted.
Alternatively, in order to be optimized to trustship catalogue, make the classification under it more accurate, in the above-mentioned analysis of said extracted Under catalogue after the key message of all documents, the above method also includes:
Cluster operation is carried out to the relevant documentation under above-mentioned analytical bibliography.
Wherein it is possible to be to carry out cluster operation using K averages (K-Means) algorithm, word is provided in this way and supported Similitude aggregation classification;Or, can carry out cluster operation using key message support, provide crucial in this way The similitude aggregation classification of Informational support.It is of course also possible to carry out cluster operation using with other clustering algorithms, do not limit herein System.
Step S106, if above-mentioned authentication information can not terminate the session with above-mentioned client by checking.
In step s 106, if the authentication information that the client that above-mentioned service end is received is sended over can not lead to Checking is crossed, then explanation is carried out communicating dangerous with the client, therefore service end can be terminated and above-mentioned client in time Session, prevents information leakage.
Alternatively, it is above-mentioned after above-mentioned steps S104 or step S105 in order to further prevent the leakage of important documents Cloud document management method based on content also includes:
Above-mentioned client opens positioning intermediate result or the crucial letter that service end is sent using the reading tool customized in advance Breath report.
Wherein, can be with order to avoid causing leakage enterprise confidential information because the client of user is infected by malice wooden horse Reading tool is customized in client, the file that service end is sended over is opened with the reading tool of customization.It can be the base in WPS It is customized, can also be customized on the basis of Office softwares of increasing income, the electronics to read Office classifications on plinth Document.When making the customization of client reading tool on domestic operating platform, can effectively filter business software overseas can The malice leak and risk of energy.
Alternatively, it is above-mentioned to be based on content in order that service end grasps the basic standard that user carries out safety classification to document Cloud document management method also include:
Above-mentioned service end periodically carries out safety classification training to the electronic document in trustship catalogue, generates safety classification knowledge Storehouse.
Wherein, service end regularly can carry out safety classification to the document that level of security has been labeled with trustship catalogue Training, specifically, for the document of each existing level of security, extracting the keyword of the document, level of security, weight letter Breath, the time of this safety training, generates safety classification knowledge base, and by these information records extracted in trustship catalogue In the training of safety classification word set information table of database.
Alternatively, for the safety classification knowledge base that perfect service end is automatically generated, the above-mentioned cloud document pipe based on content Reason method also includes:
Above-mentioned service end receives user experience classification dictionary, and Word library updating safety classification is classified according to the user experience of reception Knowledge base.
Wherein, in order to improve safety classification knowledge base, use directly in service end typing or can also be imported by superuser Family experience classification dictionary, user experience classification dictionary is stored in the special important information table of the user of database, while safety Ranked knowledge base can also according to user experience be classified dictionary carry out supplement with it is perfect.
Alternatively, in order to reach the effect to document automatic marking level of security, in above-mentioned generation safety classification knowledge base Afterwards, the above-mentioned cloud document management method based on content also includes:
Using machine learning algorithm, according to safety classification knowledge base, safety classification grader is generated, in service termination Receive when document is sorted out, classification document is treated automatically and carries out level of security mark.
Wherein, above-mentioned machine learning algorithm is related to information retrieval, statistics index, the original in Chinese information processing field Reason, conceptual machine model, include but is not limited to it is following more than one:Bag of words (BOW, bag of words), flux linkage model (BOL, bag of link), word frequency and reverse word frequency model (TF-IDF, term-frequency and inverse term- Frequency), mutual information model (MI, matual information), position weight (location-weight).Generated Safety classification grader can with being serviced device be used for treat sort out electronic document sorted out when, for no mark safe level Other electronic document to be sorted out carries out the mark of level of security.
Therefore, in embodiments of the present invention, first by service end receive client send authentication information and Request data package, then verifies above-mentioned authentication information by above-mentioned service end, and parses above-mentioned request data package, when above-mentioned body Part authentication information includes sorting out solicited message and when document is sorted out by checking and above-mentioned request data package, then according to above-mentioned The content of document to be sorted out, by the corresponding subdirectory of the trustship catalogue of above-mentioned document classification to be sorted out to above-mentioned service end, when When above-mentioned authentication information includes positioning request information by checking and above-mentioned request data package, then in above-mentioned trustship catalogue Middle to retrieve the document for meeting the location condition carried in above-mentioned positioning request information, generation positions intermediate result, and will be above-mentioned fixed Position intermediate result is sent to above-mentioned client, when above-mentioned authentication information can not be by verifying, then is terminated and above-mentioned client The session at end.The embodiment of the present invention can be received the request data instruction that client is sent by service end, be referred to according to request data The classification of order, makes corresponding classification, positioning or analysis operation, helps enterprise to realize the unified management of cloud document, and improve User obtains the efficiency and security of effective information in cloud document.
Embodiment two
Fig. 2 shows the composition structure for the cloud document file management system based on content that the embodiment of the present invention two is provided, in order to It is easy to explanation, illustrate only the part related to the embodiment of the present invention.
As shown in Fig. 2 the above-mentioned cloud document file management system based on content includes client 1, and service end 2.
Wherein, above-mentioned client includes but is not limited to mobile phone, tablet personal computer or computer.User can pass through above-mentioned visitor Family end reaches the purpose for the document for accessing service end storage.The above-mentioned cloud document file management system based on content can use client Machine/server architecture (C/S Structs, Client Server Structs), browser/server framework (B/S Structs, Browser Server Structs) or other improved frameworks have been carried out based on above two framework, herein It is not construed as limiting.
Above-mentioned service end 2 receives the authentication information and request data package that above-mentioned client 1 is sent.
Wherein, service end receives the authentication information and request data package that client is sent by the network transmission protocol. A backstage finger daemon can be set to carry out network monitoring in service end, above-mentioned client 1 is received automatically and is passed by network Authentication information and request data package that defeated agreement is sent.
Above-mentioned service end 2 verifies above-mentioned authentication information, and parses above-mentioned request data package.
Wherein, above-mentioned service end 2 have received authentication information and number of request that user sends over via client 1 After bag, above-mentioned authentication information is verified, and above-mentioned request data package is parsed.Wherein, according to user Different demands, above-mentioned request data package can include sort out solicited message, with will pass through the classification solicited message request document Sort out;Or, above-mentioned request data package can include positioning request information, be determined with will pass through Location Request letter request document Position;Or, above-mentioned request data package can also include analysis request information, will pass through the analysis request information request document point Analysis, is not limited herein.
If above-mentioned authentication information includes sorting out solicited message and waits to sort out by checking and above-mentioned request data package Document, the then content according to above-mentioned document to be sorted out, by the trustship catalogue of above-mentioned document classification to be sorted out to above-mentioned service end 2 In correspondence subdirectory.
Wherein, when user by client will wait sort out document and sort out solicited message send to service end after, service end The request of user is dealt with the premise of being verified in authentication information.Above-mentioned service end can obtain above-mentioned treat Sort out the classification keyword of document, and according to keyword and default classification Similarity Measure scheme is sorted out, determine trustship catalogue In a catalogue to sort out catalogue, and by above-mentioned document classification to be sorted out into above-mentioned classification catalogue.Above-mentioned trustship catalogue is All documents are deposited under above-mentioned trustship catalogue in the catalogue protected by above-mentioned service end, above-mentioned service end.
If above-mentioned authentication information is by checking and above-mentioned request data package includes positioning request information, above-mentioned Retrieval meets the document of the location condition carried in above-mentioned positioning request information in trustship catalogue, and generation positioning intermediate result will Above-mentioned positioning intermediate result is sent to above-mentioned client 1.
Wherein, after user is sent positioning request information to service end by client, service end will be in authentication The location condition that Information Authentication is carried on the premise of according to above-mentioned positioning request information is the document that user search is matched.Make For the implementation example of the present invention, the location condition that above-mentioned positioning request information is carried can be positioning keyword, then above-mentioned Service end will be determined for compliance with the text of above-mentioned location condition according to above-mentioned positioning keyword and default positioning Similarity Measure scheme Shelves, and the document that these are met to above-mentioned location condition is sent to client as positioning intermediate result by the network transmission protocol End, is consulted for user.With this so that user is interacted using client graphical user interface with service end, obtaining user needs Information.
If above-mentioned authentication information is by checking and above-mentioned request data package includes analysis request information, above-mentioned A subdirectory for meeting the analysis condition carried in above-mentioned analysis request information is retrieved in trustship catalogue as analytical bibliography, and All documents under above-mentioned analytical bibliography are carried out with the analysis and excavation of key message, the pass related to above-mentioned analytical bibliography is generated Key information is reported, the report of above-mentioned key message is sent to client 1.
Wherein, after user is sent analysis request information to service end by client, service end will be in authentication The analysis condition that Information Authentication is carried on the premise of according to above-mentioned analysis request information is the document that user search is matched, and Catalogue where matched with analysis condition document is defined as analytical bibliography.Above-mentioned service end then will be to above-mentioned analysis mesh Record carries out the analysis and excavation of key message, during the key message excavated write-in key message is reported, and final to each Individual document all analyzes, excavate and finish after, key message report is sent into client, consulted for user.
If above-mentioned authentication information can not terminate the session of above-mentioned service end 2 and above-mentioned client 1 by checking.
Wherein, if the authentication information that sends over of the client that above-mentioned service end is received can not by checking, Then illustrate that service end and the client carry out communicate dangerous, thus service end by it is timely terminate and above-mentioned client meeting Words, the important information leakage for preventing service end from having.
It should be understood that the cloud document file management system based on content in the embodiment of the present invention can be used for realizing that the above method is real Whole technical schemes in example are applied, the function of its each functional module can be specifically real according to the method in above method embodiment Existing, it implements process and can refer to associated description in above-described embodiment, and here is omitted.
In the present embodiment, the service end of the cloud document file management system based on content receives the request data that client is sent Instruction, the classification instructed according to request data makes corresponding classification, positioning or analysis operation, helps enterprise to realize cloud text The unified management of shelves, and improve efficiency and security that user obtains effective information in cloud document.
Embodiment three
Fig. 3 shows the structural framing for the cloud document management service end based on content that the embodiment of the present invention three is provided, and is It is easy to explanation, illustrate only the part related to the embodiment of the present invention.
As shown in figure 3, the above-mentioned cloud document management service end 3 based on content includes:Request receiving module 31, checking parsing Module 32, sorts out processing module 33, localization process module 34, analysis and processing module 35.
Wherein, request receiving module 31, authentication information and request data package for receiving client transmission;
Parsing module 32 is verified, for verifying the authentication information that above-mentioned request receiving module 31 is received, and is parsed State the request data package of request receiving module reception;
Sort out processing module 33, for when above-mentioned checking parsing module 32 determine authentication information by checking and Stating request data package includes sorting out solicited message and when document is sorted out, and according to the content of above-mentioned document to be sorted out, is treated above-mentioned Sort out document classification into the corresponding subdirectory of the trustship catalogue of above-mentioned service end, above-mentioned trustship catalogue is to be protected by above-mentioned service end All documents are deposited under above-mentioned trustship catalogue in the catalogue of shield, above-mentioned service end;
Localization process module 34, for when above-mentioned checking parsing module 32 determine authentication information by checking and When stating request data package including positioning request information, retrieval meets in above-mentioned positioning request information and carried in above-mentioned trustship catalogue Location condition document, generation positioning intermediate result, above-mentioned positioning intermediate result is sent to above-mentioned client;
Analysis and processing module 35, for when above-mentioned checking parsing module 32 determine authentication information by checking and When stating request data package including analysis request information, retrieval meets in above-mentioned analysis request information and carried in above-mentioned trustship catalogue Subdirectory of analysis condition carry out key message as analytical bibliography, and to all documents under above-mentioned analytical bibliography Analysis generates the key message report related to above-mentioned analytical bibliography, the report of above-mentioned key message is sent to client with excavating End;
Conversation module 36 is terminated, for determining that authentication information can not be by checking when above-mentioned checking parsing module 32 When, terminate the session with above-mentioned client.
Alternatively, the above-mentioned cloud document management service end 3 based on content also includes:
User security rank acquisition module, for the authentication information that receives when above-mentioned request receiving module 31 by testing Demonstrate,prove and request data package include positioning request information when, from above-mentioned client obtain active user's level of security;
Level of security authentication module, for comparing active user's level of security that above-mentioned user class acquisition module is got With the level of security of above-mentioned positioning intermediate result;
Specifically, above-mentioned localization process module is used for, if above-mentioned active user's level of security is not less than in the middle of above-mentioned positioning As a result level of security, then send above-mentioned positioning intermediate result to above-mentioned client.
Alternatively, the above-mentioned cloud document management service end 3 based on content also includes:
Mistake authority sending module, for determining that active user's level of security is less than when above-mentioned level of security authentication module When stating the level of security of positioning intermediate result, send wrong authority to above-mentioned client and instruct, to point out user's lifting current User security grade is abandoned consulting above-mentioned positioning intermediate result.
Alternatively, the above-mentioned cloud document management service end 3 based on content also includes:
Command operating module is lifted, for when the lifting active user safe class instruction for receiving above-mentioned client transmission When, the instruction of above-mentioned lifting active user safe class is verified, and after being verified, lift above-mentioned active user's safety Rank, and notify that level of security authentication module is verified again.
Alternatively, above-mentioned analysis and processing module 35, in addition to:
Key message acquisition submodule, the key message for extracting all documents under above-mentioned analytical bibliography, above-mentioned key Information include it is following more than one:Entity, the amount of money, numeral classifier phrase and key phrase are named, wherein, above-mentioned name entity includes again It is following more than one:Organization's title, name, time and place name;
Key message report generation submodule, in the corresponding document of each key message, taking passages out above-mentioned key The context of information, generates the key message report related to above-mentioned analytical bibliography.
Alternatively, above-mentioned analysis and processing module 35, in addition to:
Importance scoring submodule, for a document under above-mentioned analytical bibliography to be defined as into document to be appraised successively;Root Importance scoring is carried out to above-mentioned document to be appraised according to the relevant information of above-mentioned document to be appraised, appraisal result is obtained, wherein, above-mentioned phase Close information include it is following more than one:The frequency of document key message, the support of document key message, document is included into trustship mesh Time in record, the scoring of above-mentioned importance include it is following more than one:Technical sophistication degree scores, the scoring of technology distribution degree, technology Original degree scoring.
Specifically, above-mentioned importance scoring submodule, in addition to:
Key message statistic submodule, for when importance scoring include technical sophistication degree score when, count it is above-mentioned by In the key message for commenting document, the number of key phrase names the number of entity and the species number of different name entities, and simultaneously Count above-mentioned document to be appraised number of words and with duplicate removal number of words;
Weighted calculation submodule, for the number of the key phrase of above-mentioned document to be appraised obtained to above-mentioned statistics, name The number of words and duplicate removal number of words of the species number and above-mentioned document to be appraised of the number of entity and different name entities are weighted average meter Calculate;
Technical sophistication degree determination sub-module, for being answered the result of above-mentioned weighted average calculation as the technology of above-mentioned document The appraisal result of miscellaneous degree.
Specifically, above-mentioned importance scoring submodule, in addition to:
Similarity Measure submodule, for by each other document in above-mentioned analytical bibliography in addition to above-mentioned document to be appraised Similarity Measure is carried out with above-mentioned document to be appraised;
Similarity adds up submodule, is obtained for each above-mentioned other document to be carried out into Similarity Measure with above-mentioned document to be appraised The value arrived adds up;
Technology distribution degree determination sub-module, for using above-mentioned accumulated result as above-mentioned document to be appraised technology distribution degree Appraisal result.
Specifically, above-mentioned importance scoring submodule, in addition to:
The original degree acquisition of information submodule of technology, for the support of the key phrase that obtains above-mentioned document to be appraised and above-mentioned Document to be appraised is included into the time in trustship catalogue.
The original degree determination sub-module of technology, for according to the original degree scoring formula of default technology, utilizing above-mentioned text to be appraised The support and document to be appraised of the key phrase of shelves are included into the time in trustship catalogue, calculate the technology for obtaining above-mentioned document to be appraised The appraisal result of original degree.
It should be understood that the cloud document management service end based on content in the embodiment of the present invention can be used for realizing the above method The whole technical schemes realized in embodiment with service end angle, the function of its each functional module can be real according to the above method The method applied in example is implemented, and it implements process and can refer to associated description in above-described embodiment, and here is omitted.
Therefore, the cloud document management service end based on content in the present embodiment can receive client transmission Request data is instructed, the classification instructed according to request data, is made corresponding classification, positioning or analysis operation, is helped enterprise The unified management of cloud document is realized, and improves efficiency and security that user obtains effective information in cloud document.
It should be noted that in several embodiments provided herein, it should be understood that disclosed device and side Method, can be realized by another way.For example, device embodiment described above is only schematical, for example, above-mentioned The division of unit, only a kind of division of logic function, can there is other dividing mode when actually realizing, such as multiple units Or component can combine or be desirably integrated into another system, or some features can be ignored, or not perform.It is another, institute Display or the coupling each other discussed or direct-coupling or communication connection can be by some interfaces, device or unit INDIRECT COUPLING or communication connection, can be electrical, machinery or other forms.
For foregoing each method embodiment, for simplicity description, therefore it is all expressed as to a series of combination of actions, but It is that those skilled in the art should know, the present invention is not limited by described sequence of movement, because according to the present invention, certain A little steps can use other orders or carry out simultaneously.Secondly, those skilled in the art should also know, be retouched in specification The embodiment stated belongs to preferred embodiment, necessary to involved action and module might not all be the present invention.
In the above-described embodiments, the description to each embodiment all emphasizes particularly on different fields, and does not have the portion being described in detail in some embodiment Point, it may refer to the associated description of other embodiments.
It is to a kind of preferred embodiment provided by the present invention, for those of ordinary skill in the art, according to this above The thought of inventive embodiments, will change in specific embodiments and applications, to sum up, and this specification content is not It is interpreted as limitation of the present invention.

Claims (11)

1. a kind of cloud document management method based on content, it is characterised in that including:
Service end receives the authentication information and request data package that client is sent;
The service end verifies the authentication information, and parses the request data package;
If the authentication information includes sorting out solicited message and document to be sorted out by checking and the request data package, Then the content according to the document to be sorted out, sub by the correspondence of the trustship catalogue of the document classification to be sorted out to the service end In catalogue, the trustship catalogue is the catalogue protected by the service end, and all documents deposit in institute in the service end State under trustship catalogue;
If the authentication information is by checking and the request data package includes positioning request information, in the trustship Retrieval meets the document of the location condition carried in the positioning request information in catalogue, and generation positioning intermediate result will be described Positioning intermediate result is sent to the client;
If the authentication information is by checking and the request data package includes analysis request information, in the trustship A subdirectory for meeting the analysis condition carried in the analysis request information is retrieved in catalogue as analytical bibliography, and to institute Analysis and excavation that all documents under analytical bibliography carry out key message are stated, the crucial letter related to the analytical bibliography is generated Breath report, key message report is sent to client;
If the authentication information can not terminate the session with the client by checking.
2. the method as described in claim 1, it is characterised in that if the authentication information passes through checking and the request Packet includes positioning request information, then described to send the positioning intermediate result to before the client, in addition to:
The service end obtains active user's level of security from the client;
Compare active user's level of security and the level of security of the positioning intermediate result;
It is described to send the positioning intermediate result to the client, be specially:If active user's level of security is not low In the level of security of the positioning intermediate result, then the positioning intermediate result is sent to the client.
3. method as claimed in claim 2, it is characterised in that the active user's level of security for comparing acquisition and institute The level of security of positioning intermediate result is stated, is also included afterwards:
If active user's level of security sends wrong less than the level of security of the positioning intermediate result to the client Authority instruction by mistake, to point out user to lift active user's safe class or abandon consulting the positioning intermediate result.
4. method as claimed in claim 3, it is characterised in that described to send wrong authority instruction to the client, afterwards Also include:
If the lifting active user safe class instruction that the client is sent is received, to the lifting active user safety Grade instruction is verified;
If being verified, active user's level of security is lifted, return execution afterwards is described to compare active user's safe level Not with it is described positioning intermediate result level of security the step of.
5. the method as described in claim 1, it is characterised in that all documents under the analytical bibliography carry out crucial The analysis and excavation of information, generate the key message report related to the analytical bibliography, including:
Extract the key message of all documents under the analytical bibliography, the key message include it is following more than one:Name is real Body, the amount of money, numeral classifier phrase and key phrase, wherein, it is described name entity again include as follows more than one:Organization's title, Name, time and place name;
In the corresponding document of each key message, the context of the key message, generation and the analytical bibliography are taken passages out Related key message report.
6. method as claimed in claim 5, it is characterised in that the crucial letter of all documents under the extraction analytical bibliography Breath, also includes afterwards:
A document under the analytical bibliography is defined as document to be appraised successively;
Importance scoring is carried out to the document to be appraised according to the relevant information of the document to be appraised, appraisal result is obtained, wherein, The relevant information include it is following more than one:The frequency of document key message, the support of document key message, document is included into Time in trustship catalogue, importance scoring include it is following more than one:Technical sophistication degree is scored, and technology distribution degree is commented Point, the original degree scoring of technology.
7. method as claimed in claim 6, it is characterised in that when importance scoring includes the scoring of technical sophistication degree, The relevant information according to the document to be appraised scores the document to be appraised, including:
In the key message for counting the document to be appraised, the number of key phrase names the number of entity and different names real The species number of body, and count simultaneously the document to be appraised number of words and with duplicate removal number of words;
To the number of the key phrase for counting the obtained document to be appraised, the number and different name entities of entity are named Species number and the number of words and duplicate removal number of words of the document to be appraised be weighted average computation;
Using the result of the weighted average calculation as the technical sophistication degree of the document appraisal result.
8. method as claimed in claim 6, it is characterised in that when importance scoring includes the scoring of technology distribution degree, The relevant information according to the document to be appraised scores the document to be appraised, in addition to:
Each other document in the analytical bibliography in addition to the document to be appraised are subjected to similarity with the document to be appraised Calculate;
The value that each described other document are obtained with the document progress Similarity Measure to be appraised adds up;
Using the accumulated result as the technology distribution degree of the document to be appraised appraisal result.
9. method as claimed in claim 6, it is characterised in that when importance scoring, which includes the original degree of technology, scores, The relevant information according to the document to be appraised scores the document to be appraised, in addition to:
The support and the document to be appraised for obtaining the key phrase of the document to be appraised are included into time in trustship catalogue;
According to the original degree scoring formula of default technology, the support and document to be appraised of the key phrase of the document to be appraised are utilized It is included into the time in trustship catalogue, calculates the appraisal result for the original degree of technology for obtaining the document to be appraised.
10. a kind of cloud document file management system based on content, it is characterised in that the cloud document file management system bag based on content Include:
Client and service end;
The service end receives the authentication information and request data package that the client is sent;
The service end verifies the authentication information, and parses the request data package;
If the authentication information includes sorting out solicited message and document to be sorted out by checking and the request data package, Then the content according to the document to be sorted out, sub by the correspondence of the trustship catalogue of the document classification to be sorted out to the service end In catalogue, the trustship catalogue is the catalogue protected by the service end, and all documents deposit in institute in the service end State under trustship catalogue;
If the authentication information is by checking and the request data package includes positioning request information, in the trustship Retrieval meets the document of the location condition carried in the positioning request information in catalogue, and generation positioning intermediate result will be described Positioning intermediate result is sent to the client;
If the authentication information is by checking and the request data package includes analysis request information, in the trustship A subdirectory for meeting the analysis condition carried in the analysis request information is retrieved in catalogue as analytical bibliography, and to institute Analysis and excavation that all documents under analytical bibliography carry out key message are stated, the crucial letter related to the analytical bibliography is generated Breath report, key message report is sent to client;
If the authentication information can not terminate the session of the service end and the client by checking.
11. a kind of cloud document management service end based on content, it is characterised in that the cloud document management service based on content End includes:
Request receiving module, authentication information and request data package for receiving client transmission;
Parsing module is verified, is connect for verifying the authentication information that the request receiving module is received, and parsing the request Receive the request data package that module is received;
Sort out processing module, for determining that authentication information passes through checking and the number of request when the checking parsing module According to including sorting out solicited message and when document is sorted out, according to the content of the document to be sorted out, by the document to be sorted out Sort out into the corresponding subdirectory of the trustship catalogue of the service end, the trustship catalogue is the mesh protected by the service end All documents are deposited under the trustship catalogue in record, the service end;
Localization process module, for determining that authentication information passes through checking and the number of request when the checking parsing module During according to including positioning request information, retrieval meets the positioning strip carried in the positioning request information in the trustship catalogue The document of part, generation positioning intermediate result sends the positioning intermediate result to the client;
Analysis and processing module, for determining that authentication information passes through checking and the number of request when the checking parsing module During according to including analysis request information, retrieval meets the analysis bar carried in the analysis request information in the trustship catalogue One subdirectory of part carries out the analysis and digging of key message to all documents under the analytical bibliography as analytical bibliography Pick, generates the key message report related to the analytical bibliography, key message report is sent to client;
Terminate conversation module, for when it is described checking parsing module determine that authentication information can not be by verifying when, terminate with The session of the client.
CN201610988380.3A 2016-11-09 2016-11-09 Cloud document management method and system based on content and server Active CN107085584B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610988380.3A CN107085584B (en) 2016-11-09 2016-11-09 Cloud document management method and system based on content and server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610988380.3A CN107085584B (en) 2016-11-09 2016-11-09 Cloud document management method and system based on content and server

Publications (2)

Publication Number Publication Date
CN107085584A true CN107085584A (en) 2017-08-22
CN107085584B CN107085584B (en) 2021-05-28

Family

ID=59615152

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610988380.3A Active CN107085584B (en) 2016-11-09 2016-11-09 Cloud document management method and system based on content and server

Country Status (1)

Country Link
CN (1) CN107085584B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110287493A (en) * 2019-06-28 2019-09-27 中国科学技术信息研究所 Risk phrase chunking method, apparatus, electronic equipment and storage medium
CN110675289A (en) * 2019-09-29 2020-01-10 四川大学 Method for compiling electronic file catalogue with case criminal review
CN110851397A (en) * 2019-11-12 2020-02-28 成都九鼎瑞信科技股份有限公司 Knowledge base construction platform based on cloud document management system
CN116361240A (en) * 2023-05-31 2023-06-30 北京觅图科技有限公司 Cloud document processing method, cloud document processing system and server

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1680942A (en) * 2004-02-27 2005-10-12 株式会社理光 Document group analyzing apparatus, a document group analyzing method, a document group analyzing system
CN103441986A (en) * 2013-07-29 2013-12-11 中国航天科工集团第二研究院七〇六所 Data resource security control method in thin client mode
CN105357201A (en) * 2015-11-12 2016-02-24 中国科学院信息工程研究所 Access control method and system for object cloud storage

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1680942A (en) * 2004-02-27 2005-10-12 株式会社理光 Document group analyzing apparatus, a document group analyzing method, a document group analyzing system
CN103441986A (en) * 2013-07-29 2013-12-11 中国航天科工集团第二研究院七〇六所 Data resource security control method in thin client mode
CN105357201A (en) * 2015-11-12 2016-02-24 中国科学院信息工程研究所 Access control method and system for object cloud storage

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110287493A (en) * 2019-06-28 2019-09-27 中国科学技术信息研究所 Risk phrase chunking method, apparatus, electronic equipment and storage medium
CN110287493B (en) * 2019-06-28 2023-04-18 中国科学技术信息研究所 Risk phrase identification method and device, electronic equipment and storage medium
CN110675289A (en) * 2019-09-29 2020-01-10 四川大学 Method for compiling electronic file catalogue with case criminal review
CN110675289B (en) * 2019-09-29 2023-05-05 四川大学 Method for cataloging electronic file along with criminal investigation
CN110851397A (en) * 2019-11-12 2020-02-28 成都九鼎瑞信科技股份有限公司 Knowledge base construction platform based on cloud document management system
CN116361240A (en) * 2023-05-31 2023-06-30 北京觅图科技有限公司 Cloud document processing method, cloud document processing system and server
CN116361240B (en) * 2023-05-31 2023-09-19 北京觅图科技有限公司 Cloud document processing method, cloud document processing system and server

Also Published As

Publication number Publication date
CN107085584B (en) 2021-05-28

Similar Documents

Publication Publication Date Title
CN102598007B (en) Effective detection fingerprints the system and method for data and information
US7558796B1 (en) Determining origins of queries for a database intrusion detection system
CN104270386B (en) Across application system user (asu) information integrating method and identity information management server
US9209974B1 (en) Functional encryption key management
EP2676197B1 (en) System and methods for identifying compromised personally identifiable information on the internet
US20090327484A1 (en) System and method for establishing personal social network, trusty network and social networking system
CN107480549A (en) A kind of shared sensitive information desensitization method of data-oriented and system
CN107085584A (en) A kind of cloud document management method, system and service end based on content
US20060047793A1 (en) Method for configuring computing devices using reference groups
CN113489672B (en) Network sniffing-based REST interface specification packaging system
CN102394885A (en) Information classification protection automatic verification method based on data stream
CN107194666A (en) Report Server Management method and terminal device based on block chain technology
US10282461B2 (en) Structure-based entity analysis
CN104618410B (en) Resource supplying method and apparatus
CN107146154A (en) A kind of method and device of data management
CN109076073A (en) Prevent the undesirable communication in voice over internet protocol system
CN102325143B (en) Cloud platform based information collection, storage, encryption and retrieval system
CN102708216A (en) Word-segmentation organizing method and clustering method for ciphertext search
CN102509057B (en) Mark-based method for safely filtering unstructured data
CN103957173B (en) semantic switch
Zhu et al. Ontology-based approach for the measurement of privacy disclosure
Tsoumas et al. Security-by-Ontology: A knowledge-centric approach
Chakrabarti et al. Approach towards realizing resource mining and secured information transfer
CN109560937A (en) Command identifying method, device and computer readable storage medium
Sun et al. Cloud Computing and Security: 4th International Conference, ICCCS 2018, Haikou, China, June 8–10, 2018, Revised Selected Papers, Part III

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant