CN107085584B - Cloud document management method and system based on content and server - Google Patents

Cloud document management method and system based on content and server Download PDF

Info

Publication number
CN107085584B
CN107085584B CN201610988380.3A CN201610988380A CN107085584B CN 107085584 B CN107085584 B CN 107085584B CN 201610988380 A CN201610988380 A CN 201610988380A CN 107085584 B CN107085584 B CN 107085584B
Authority
CN
China
Prior art keywords
document
information
analysis
client
documents
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610988380.3A
Other languages
Chinese (zh)
Other versions
CN107085584A (en
Inventor
熊文
周庚申
丁紫惠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Great Wall Technology Group Co ltd
Original Assignee
China Great Wall Technology Group Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Great Wall Technology Group Co ltd filed Critical China Great Wall Technology Group Co ltd
Priority to CN201610988380.3A priority Critical patent/CN107085584B/en
Publication of CN107085584A publication Critical patent/CN107085584A/en
Application granted granted Critical
Publication of CN107085584B publication Critical patent/CN107085584B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/93Document management systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Landscapes

  • Engineering & Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Document Processing Apparatus (AREA)

Abstract

The invention discloses a cloud document management method, a cloud document management system and a server based on content, wherein the method comprises the following steps: the server receives identity authentication information and a request data packet sent by the client; the server side verifies the identity authentication information and analyzes the request data packet; if the identity authentication information passes the verification, corresponding document classification, document positioning or document analysis operation is executed according to the type of the request data packet; the server side sends a positioning intermediate result obtained when the document positioning operation is executed or a key information report obtained when the document analysis operation is executed to the client side; and if the identity authentication information cannot pass the verification, terminating the session with the client. By the scheme of the invention, the user is helped to realize the unified management of the cloud documents, the efficiency and the safety of searching the effective information when the user uses the cloud documents are improved, and the user is helped to quickly find the required information in a plurality of cloud documents.

Description

Cloud document management method and system based on content and server
Technical Field
The invention relates to the field of cloud information management and processing, in particular to a cloud document management method and system based on content and a server side.
Background
In the process of modern office, because internal employees of an enterprise are required to share some documents, a server capable of storing the documents is widely applied by each enterprise. After the document to be shared is uploaded to the server, the staff in the enterprise can independently download or perform other operations.
However, when the number of employees in an enterprise is too large and electronic documents to be shared are too many, if all the employees access and operate the document on the server storing the documents, the documents on the server are stored out of order, and the management is disordered, so that the employees cannot quickly find effective information from the server.
Disclosure of Invention
The embodiment of the invention provides a content-based cloud document management method, a server and a system, aiming at improving the efficiency and safety of searching effective information when a user uses a cloud document and helping the user to quickly find needed information in numerous cloud documents.
In a first aspect of the embodiments of the present invention, a method for managing a cloud document based on content is provided, where the method includes:
the server receives identity authentication information and a request data packet sent by the client;
the server side verifies the identity authentication information and analyzes the request data packet;
if the identity authentication information passes verification and the request data packet comprises classification request information and documents to be classified, classifying the documents to be classified into corresponding subdirectories of a managed directory of the server according to the content of the documents to be classified, wherein the managed directory is a directory protected by the server, and all documents in the server are stored in the managed directory;
if the identity authentication information passes verification and the request data packet comprises positioning request information, searching a document meeting positioning conditions carried in the positioning request information in the hosting directory, generating a positioning intermediate result, and sending the positioning intermediate result to the client;
and if the identity authentication information cannot pass the verification, terminating the session with the client.
In a second aspect of the embodiments of the present invention, a content-based cloud document management system is provided, where the content-based cloud document management system includes:
a client and a server;
the server receives the identity authentication information and the request data packet sent by the client;
the server side verifies the identity authentication information and analyzes the request data packet;
if the identity authentication information passes verification and the request data packet comprises classification request information and documents to be classified, classifying the documents to be classified into corresponding subdirectories of a managed directory of the server according to the content of the documents to be classified, wherein the managed directory is a directory protected by the server, and all documents in the server are stored in the managed directory;
if the identity authentication information passes verification and the request data packet comprises positioning request information, searching a document meeting positioning conditions carried in the positioning request information in the hosting directory, generating a positioning intermediate result, and sending the positioning intermediate result to the client;
if the identity authentication information passes verification and the request data packet comprises analysis request information, searching a subdirectory which meets analysis conditions carried in the analysis request information in the managed directory to serve as an analysis directory, analyzing and mining key information of all documents in the analysis directory, generating a key information report related to the analysis directory, and sending the key information report to a client;
and if the identity authentication information cannot pass the verification, terminating the session between the server and the client.
In a third aspect of the embodiments of the present invention, a content-based cloud document management server is provided, where the content-based cloud document management server includes:
the request receiving module is used for receiving the identity authentication information and the request data packet sent by the client;
the verification analysis module is used for verifying the identity authentication information received by the request receiving module and analyzing the request data packet received by the request receiving module;
the classification processing module is used for classifying the documents to be classified into corresponding subdirectories of a hosting directory of the server according to the content of the documents to be classified when the identity authentication information is verified and the request data packet comprises classification request information and the documents to be classified by the verification analysis module, wherein the hosting directory is a directory protected by the server, and all documents in the server are stored in the hosting directory;
the positioning processing module is used for searching a document which meets the positioning condition carried in the positioning request information in the managed catalog when the verification analysis module determines that the identity authentication information passes the verification and the request data packet comprises the positioning request information, generating a positioning intermediate result and sending the positioning intermediate result to the client;
the analysis processing module is used for searching a subdirectory which meets the analysis condition carried in the analysis request information in the managed directory to serve as an analysis directory, analyzing and mining key information of all documents in the analysis directory, generating a key information report related to the analysis directory and sending the key information report to a client when the verification analysis module determines that the identity authentication information passes verification and the request data packet comprises the analysis request information;
and the session termination module is used for terminating the session with the client when the verification analysis module determines that the identity authentication information cannot pass the verification.
As can be seen from the above, in the embodiment of the present invention, a server receives identity authentication information and a request data packet sent by a client, the server verifies the identity authentication information and analyzes the request data packet, when the identity authentication information passes verification and the request data packet includes classification request information and a document to be classified, the document to be classified is classified into a corresponding subdirectory of a hosted directory of the server according to the content of the document to be classified, when the identity authentication information passes verification and the request data packet includes location request information, a document meeting a location condition carried in the location request information is retrieved from the hosted directory, a location intermediate result is generated and sent to the client, and when the identity authentication information fails verification, the session with the client is terminated. According to the embodiment of the invention, when the user uploads the document to the server, the document is classified into the corresponding directory of the server, so that all documents are stored in the server in order, and therefore, when the user requests to locate the required document through the server, the required document can be found more quickly, and the efficiency and the safety of searching effective information when the user uses the cloud document are improved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive labor.
FIG. 1 is a flowchart illustrating an implementation of a method for managing a cloud document based on content according to an embodiment of the present invention;
FIG. 2 is a block diagram of a cloud document management system based on content according to an embodiment of the present invention;
fig. 3 is a block diagram of a structure of a content-based cloud document management server according to an embodiment of the present invention.
Detailed Description
In order to make the objects, features and advantages of the present invention more obvious and understandable, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention, and it is apparent that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The following detailed description of the implementation of the present invention is made with reference to specific embodiments:
example one
Fig. 1 is a flowchart illustrating an implementation of a content-based cloud document management method according to an embodiment of the present invention, and it is first explained that a cloud document referred to in the embodiment of the present invention refers to a document stored in a server. Specifically, as shown in fig. 1, the method for managing a cloud document based on content in the embodiment of the present invention includes:
step S101, the server receives the identity authentication information and the request data packet sent by the client.
In step S101, the server receives the authentication information and the request packet sent by the client via a network transmission protocol (e.g., a Secure Socket Layer long Text Transfer protocol (HTTPS)). Specifically, a background daemon process may be set in the server, and the background daemon process may perform network monitoring on an eXtensible Markup Language Remote Procedure Call (XML-RPC, which is called as "eXtensible Markup Language Remote Procedure Call"), a Web-Service related port, and a Uniform Resource Identifier (URI), and automatically receive the identity authentication information and the request packet sent by the client through the network transmission protocol. The HTTPS provides an Encryption communication method, and for general enterprises, commercial-grade Public Key Infrastructures (PKI) and 3DES (Triple DES) can be used as a choice of Encryption algorithms. On the basis, for enterprises with high security level, a newly-researched strong encryption algorithm module for security can be introduced, and a quantum key agreement algorithm can be used as a key agreement algorithm in the strong encryption algorithm module in the future, so that information security problems such as eavesdropping, tampering and the like cannot occur on a transmission channel between a client and a server, high-strength encryption of a server document is realized, and encrypted transmission of the document is ensured.
Step S102, the server side verifies the identity authentication information and analyzes the request data packet.
In step S102, after receiving the authentication information and the request packet sent by the client, the server verifies the authentication information and analyzes the request packet. The authentication information is verified through Secure Socket Layer/Transport Layer Security (SSL/TLS), which provides functions of data encryption, message integrity, and the like. Optionally, the background user process set at the server in step S101 may automatically verify the identity authentication information, and parse the request packet. According to different requirements of users, the request data packet can comprise classification request information so as to request document classification through the classification request information; or, the request data packet may include location request information, so as to request document location through the location request information; alternatively, the request packet may further include analysis request information, so as to request document analysis through the analysis request information, which is not limited herein.
Step S103, if the identity authentication information is verified and the request data package includes classification request information and documents to be classified, classifying the documents to be classified into corresponding sub-directories of the managed directory of the server according to the content of the documents to be classified.
In step S103, after the user sends the document to be classified and the classification request information to the server through the graphical user interface of the client, the server may process the user request on the premise that the identity authentication information is verified. Optionally, the server may obtain a classification keyword of the document to be classified, determine a directory in the managed directory as a classification directory according to the classification keyword and a preset classification similarity calculation scheme, and classify the document to be classified into the classification directory. The managed catalog is protected by the server, and all documents in the server are stored in the managed catalog. In the step, the documents with similar contents and expressing similar subjects can be stored in the same subdirectory of the managed directory after being uploaded to the managed directory, so that the effect that the documents are sequentially stored in the managed directory of the server side is achieved.
Step S104, if the identity authentication information is verified and the request data packet includes location request information, retrieving a document meeting the location condition carried in the location request information from the managed directory, generating a location intermediate result, and sending the location intermediate result to the client.
In step S104, after the user sends the location request information to the server through the graphical user interface of the client, the server may retrieve the matched document for the user according to the location condition carried by the location request information on the premise that the identity authentication information is verified. Optionally, the location condition carried by the location request information may be a location keyword, and the server may determine documents meeting the location condition according to the location keyword and a preset location similarity calculation scheme, and send the documents meeting the location condition as an intermediate location result to the client via a network transmission protocol for the user to refer. Therefore, the user can interact with the server by utilizing the graphical user interface of the client to acquire the information required by the user.
Optionally, in order to further improve the security of the cloud document, so that the user can only refer to the cloud document content within the authority of the user, before the sending the positioning intermediate result to the client, the method further includes:
the server side acquires the current user security level from the client side;
comparing the security level of the current user with the security level of the positioning intermediate result;
the sending of the positioning intermediate result to the client specifically includes: and if the security level of the current user is not lower than the security level of the positioning intermediate result, sending the positioning intermediate result to the client.
When a user logs in by using the client for the first time, the client can default to the lowest security level. Alternatively, a default security level may be assigned to each user through a preset program. Meanwhile, the login interface of the client also has an option for improving the security level, so that the user can select the security level required by the user to improve, but the process of improving the security level can be confirmed only through the authentication of the server. The positioning intermediate result may contain a plurality of documents, the security level of the documents may be high or low, any document of the positioning intermediate result needs to be compared with the security level of the current user before being sent to the client, and only when the security level of the current user is not lower than the security level of the document, the current user is considered to have the right to view the document.
Optionally, in order to prompt the user to respond in time when the user does not have the right to refer to the corresponding document, after the comparing the obtained security level of the current user with the security level of the positioning intermediate result, the method further includes:
and if the security level of the current user is lower than that of the positioning intermediate result, sending an error permission instruction to the client to prompt the user to improve the security level of the current user or give up looking up the positioning intermediate result.
If the security level of a part of documents in the positioning intermediate result is higher than the security level of the current user, the user is considered to have no authority for viewing the part of documents at the moment, the server side sends an error authority instruction to the client side to prompt the user that the security level of the current user is too low, and the user can select from the following two operations: and making an increase to the current user level or giving up the user to refer to the part of the document with the security level higher than the security level of the current user.
Optionally, after sending the error permission instruction to the client, in order to allow the user to have a chance to refer to the document with higher permission in the positioning intermediate result again, the method further includes:
if receiving a current user security level improving instruction sent by the client, verifying the current user security level improving instruction;
if the verification is passed, the security level of the current user is improved, and then the step of comparing the security level of the current user with the security level of the positioning intermediate result is returned to be executed.
If the user selects to promote the current user level after the server sends the error permission instruction to the client, the server receives the current user level promotion instruction sent by the client and verifies the current user level promotion instruction to ensure that the promotion operation is correct and can be executed. If the instruction for improving the security level of the current user passes the verification, the step of comparing the security level of the current user with the security level of the positioning intermediate result is returned again to confirm whether the user has the right to check each document of the positioning intermediate result again.
Optionally, in order to avoid excessive time spent by the user on the document without the corresponding authority in the positioning intermediate result, after the sending of the error authority instruction to the client, the method further includes:
and if a query abandoning instruction is received, only documents with the security level not higher than the security level of the current user are reserved in the positioning intermediate result, and the positioning intermediate result is sent to the client.
If the user selects to initiate to look up the part of documents with the security level higher than the security level of the current user after the server sends the error permission instruction to the client, the server receives the giving up look-up instruction, screens the positioning intermediate result, eliminates the documents with the security level higher than the security level of the current user in the positioning intermediate result, only keeps the documents with the security level not higher than the security level of the current user, and sends the screened positioning intermediate result to the client for the user to look up.
Step S105, if the identity authentication information is verified and the request data package includes analysis request information, retrieving a subdirectory in the managed directory that meets the analysis condition carried in the analysis request information as an analysis directory, analyzing and mining key information of all documents in the analysis directory, generating a key information report related to the analysis directory, and sending the key information report to a client.
In step S105, after the user sends the analysis request information to the server through the graphical user interface of the client, the server may retrieve the matched document for the user according to the analysis condition carried in the analysis request information on the premise that the identity authentication information is verified. Similar to step S104, the analysis condition carried by the analysis request may be an analysis keyword, which is substantially not different from the positioning keyword in step S104, but is used as a directory for searching the document that the user wants to analyze and mine in step S105, and thus is called an analysis condition in step S105. The server side can determine documents meeting the analysis conditions according to the analysis keywords and a preset positioning similarity calculation scheme, then returns the sub-directories where the documents meeting the analysis conditions are located to the client side, and the user selects one of the sub-directories where the documents meeting the analysis conditions are located from the client side to serve as an analysis directory. The server side can analyze and mine the key information of the analysis catalog, write the mined key information into a key information report, and finally send the key information report to the client side for the user to look up after all the documents are analyzed and mined. Alternatively, the key information report may be saved in the analysis directory. When the number of users (e.g., employees in an enterprise) is large and the number of documents to be shared is also large, the number of sub-directories in the managed directory of the server side also increases, and a large number of documents are stored under each sub-directory. Because the number of the documents in the subdirectory is too large, and the user cannot have time and energy to carefully look up all the documents, the step can enable the user to know the approximate conditions of all the documents in the subdirectory by reading the key information report under the condition that all the documents in the subdirectory are not looked up one by one, thereby acquiring the implicit knowledge and business information of each document in the subdirectory and improving the efficiency of the user for acquiring effective information. Optionally, since the key information report relates to all document information in the subdirectory, before sending the key information report to the client, it may be determined whether the current user has an authority to view the key information report in a manner of checking a security level of the current user, and a specific implementation flow thereof may refer to step S104, which is not described herein again.
Specifically, the analyzing and exploring key information of all documents in the analysis catalog to generate a key information report related to the analysis catalog includes:
extracting key information of all documents in the analysis catalog, wherein the key information comprises more than one of the following: named entities, money amounts, quantity phrases and key phrases, wherein the named entities include one or more of the following: organization name, person name, time and place name;
and extracting the context of the key information from the corresponding document of each key information, and generating a key information report related to the analysis catalog.
Because the user mainly targeted by the method is the internal staff of the enterprise, and the business information is the most interesting for the enterprise and the internal staff thereof, when extracting the key information of all documents in the analysis catalog, the key information includes but is not limited to more than one of the following: named entities, amounts, quantity phrases and key phrases, including but not limited to one or more of the following: organization name, person name, time, and place name. For the phrases of organization names, names of people, time, place names, money amounts and quantity, the phrases have certain regularity and are easy to be identified by a server, and the key information can be directly extracted from the document. However, the key phrases are not limited in content, and may be in any content or any format, so the server side may analyze and calculate the statistical syntax of each document in the analysis catalog, and extract the key phrases of each document by using statistical knowledge.
It is not enough to derive the key information, because it is only a few scattered words and sentences without meaning. In order to make the extracted key information have practical significance, the extracted key information can be returned to the corresponding document according to each key information, and the context of the key information in the corresponding document is extracted. With the above basis and the following explanation, these key information can be understood by the user to show their meaning. After extracting the context of each piece of key information and forming understandable contents, a key information report related to the analysis list is generated.
Optionally, in order to understand the importance degree of each document in the catalog and help the user to quickly find an important document, after extracting the key information of all documents in the analysis catalog, the method further includes:
determining each document in the analysis catalog as a document to be evaluated in sequence;
and scoring the importance of the document to be scored according to the related information of the document to be scored to obtain a scoring result, wherein the related information comprises more than one of the following information: the frequency of the key information of the document, the support degree of the key information of the document, the document generation time and the document modification time, wherein the importance degree score comprises more than one of the following: the method comprises the following steps of technology complexity scoring, technology distribution scoring and technology originality scoring.
The user not only wants to know the analysis catalog as a whole, but also wants to score the importance of each document in the analysis catalog, so as to obtain several important documents in the catalog and consult the documents in a focused way. Therefore, each document in the analysis catalog can be sequentially determined as a document to be evaluated, and the importance of the document can be scored according to the related information of the document to be evaluated. The related information includes, but is not limited to, one or more of the following: the frequency of the key information of the document, the support degree of the key information of the document and the time of the document falling into the managed catalog. The importance score also includes one or more of the following: technical complexity, technical distribution and technical originality.
In an application scenario, the importance score includes: and the technical complexity, namely scoring the document to be evaluated according to the related information of the document to be evaluated, specifically:
counting the number of key phrases, the number of named entities and the number of types of different named entities in the key information of the document to be evaluated, and simultaneously counting the word number and the de-duplication number of the document to be evaluated;
carrying out weighted average calculation on the counted number of the key phrases, the number of named entities, the number of types of different named entities and the number of words and de-duplicated words of the evaluated document;
and taking the result of the weighted average calculation as the scoring result of the technical complexity of the document.
Wherein, the frequency of key information is mainly used when the technical complexity scoring of the document is carried out. When the weighted average calculation is performed, the weight of each element may be preset by a developer, or the user may modify and adjust the weight of each element through a graphical interface of the client before performing the scoring of the technical complexity.
Of course, the technical complexity score for a document may also be obtained using other means, not limiting herein.
In another application scenario, the importance score includes: and (3) scoring the document to be evaluated according to the relevant information of the document to be evaluated, specifically:
carrying out similarity calculation on other documents in the analysis catalog except the document to be evaluated and the document to be evaluated;
accumulating the values obtained by calculating the similarity of the other documents and the evaluated document;
and taking the accumulated result as the scoring result of the technical distribution degree of the evaluated document.
When the similarity calculation is performed, the similarity calculation is performed on each document except the document to be evaluated in the analysis catalog and the document to be evaluated, and all the documents in the analysis catalog can be sequentially used as the document to be evaluated, so that the value of the similarity calculation performed on the document to be evaluated and each document can be saved, and the calculation amount of the subsequent similarity calculation can be saved. For example, there are three documents A, B, C in the analysis catalog. When A is used as the document to be evaluated, the server calculates and stores the similarity between A and B and the similarity between A and C, and adds the calculated values of the two similarities to obtain the evaluation result of the technical distribution degree of A. When B is used as a document to be evaluated, the server side calculates the similarity between B and A and the similarity between B and C, and the similarity between B and A is already stored when A is subjected to technical distribution degree evaluation, so that the similarity between B and A can not be calculated any more at this time, only the similarity between B and C is calculated, and the similarity between B and C is stored. When the similarity calculation is finally carried out on C, the similarity of A and C and the similarity of B and C are actually calculated when the technical distribution scores are carried out on A and B, so that the stored values of the similarity of A and C and the similarity of B and C are only required to be taken out and added to obtain the score result of the technical distribution of C. Therefore, resources occupied when the distribution degree of each document technology is graded can be greatly saved, and the calculation amount of similarity calculation is reduced.
Of course, the technical distribution score of the document may also be obtained using other means, which are not limited herein.
In another application scenario, the importance score includes: scoring the document to be evaluated according to the related information of the document to be evaluated, specifically, according to the degree of technical originality, the scoring is performed by:
obtaining the support degree of the key phrases of the evaluated document and the time for the evaluated document to be classified into a managed catalog;
and according to a preset technical originality degree scoring formula, calculating to obtain a scoring result of the technical originality degree of the evaluated document by utilizing the support degree of the key phrase of the evaluated document and the time of the evaluated document in a managed catalog.
The preset technical originality scoring formula can be as follows:
Figure BDA0001149001640000151
Figure BDA0001149001640000152
in the above formula, s.t. is a constraint condition, TiIs the ith key phrase, sup (T) of the document being ratedi) For the ith key phrase TiIs a measure of the degree of support, age-in-days (T)i) The time of occurrence of the key phrase, i.e., the time of the document being evaluated in the managed catalog, is counted in days, O (T)i) As the key phrase TiDegree of technical originality of (O)1The technical originality of the evaluated document is obtained by adding the technical originality of all key phrases in the evaluated document.
Optionally, on the basis of the above formula, there is another method for calculating the originality of the technology, wherein the formula is:
O2=|S|
s.t.S={T|O(T)>0}
wherein, { T | O (T)>0, representing O (T) in the first formula abovei) Those key phrases whose value of (a) is greater than 0, which constitute the set S, O2And taking the absolute value of the set S to represent the technical originality of the evaluated document obtained after the number of elements contained in the set S is taken.
Of course, other scoring formulas may be selected for calculating the originality score of the document, and are not limited herein.
The three application scenarios mentioned above may appear independently or in combination according to the requirements of the user, and are not limited herein.
Optionally, in order to optimize the managed catalog and make the category under the managed catalog more accurate, after extracting the key information of all the documents under the analysis catalog, the method further includes:
and clustering the related documents in the analysis catalog.
The method can be used for clustering operation by using a K-Means (K-Means) algorithm, and similarity aggregation categories supported by words are provided in the method; or, the clustering operation can be performed by using the key information support degree, and the similarity aggregation category supported by the key information is provided in this way. Of course, other clustering algorithms may be used for clustering, and are not limited herein.
Step S106, if the identity authentication information can not pass the verification, the conversation with the client is terminated.
In step S106, if the identity authentication information sent by the client and received by the server fails to pass the verification, it indicates that there is a danger in communicating with the client, so that the server can terminate the session with the client in time to prevent information leakage.
Optionally, in order to further prevent leakage of the important document, after step S104 or step S105, the content-based cloud document management method further includes:
and the client opens the positioning intermediate result or the key information report sent by the server by using a pre-customized reading tool.
In order to avoid leakage of confidential information of an enterprise caused by infection of a client of a user by a malicious Trojan horse, a reading tool can be customized at the client, and a file sent by a server is opened by the customized reading tool. The method can be customized on the basis of WPS, and can also be customized on the basis of open source Office software for reading electronic documents of Office categories. When the client reading tool is customized on a domestic operating platform, possible malicious holes and risks of foreign business software can be effectively filtered.
Optionally, in order to enable the server to master a basic standard for a user to perform security rating on a document, the content-based cloud document management method further includes:
the server side regularly carries out safety grading training on the electronic documents in the managed catalog to generate a safety grading knowledge base.
The server side can regularly perform security hierarchical training on documents marked with security levels in the managed catalog, specifically, for each document with the existing security level, extracting keywords, the security level and weight information of the document, generating a security hierarchical knowledge base according to the time of the security training, and recording the extracted information in a training security hierarchical word set information table of a database of the managed catalog.
Optionally, in order to perfect a security hierarchical knowledge base automatically generated by the server, the content-based cloud document management method further includes:
the server receives the user experience hierarchical word bank and updates the safety hierarchical knowledge base according to the received user experience hierarchical word bank.
In order to perfect the security hierarchical knowledge base, a privileged user can directly input or import a user experience hierarchical word base into a server, the user experience hierarchical word base is stored in a user special important information table of the database, and meanwhile, the security hierarchical knowledge base can be supplemented and perfected according to the user experience hierarchical word base.
Optionally, in order to achieve the effect of automatically labeling a security level to a document, after the security hierarchical knowledge base is generated, the content-based cloud document management method further includes:
and generating a security classification classifier by adopting a machine learning algorithm according to the security classification knowledge base, and automatically marking the security level of the document to be classified when the server receives the document to be classified.
The machine learning algorithm relates to information retrieval, statistical indexes, principles in the field of Chinese information processing and concept machine models, and comprises but is not limited to more than one of the following: bag of words model (BOW, bag of words), flux linkage model (BOL, bag of link), frequency and inverse frequency models (TF-IDF, term-frequency and inverse term-frequency), mutual information model (MI, mutual information), location-weight. The generated security classification classifier can be used by the server for labeling the security level of the electronic document to be classified without labeling the security level when the electronic document to be classified is classified.
As can be seen from the above, in the embodiment of the present invention, firstly, a server receives an authentication information and a request data packet sent by a client, then, the server verifies the authentication information, and parses the request data packet, when the authentication information is verified and the request data packet includes a classification request information and a document to be classified, the document to be classified is classified into a corresponding subdirectory of a hosted directory of the server according to the content of the document to be classified, when the authentication information is verified and the request data packet includes a positioning request information, a document meeting a positioning condition carried in the positioning request information is retrieved from the hosted directory, a positioning intermediate result is generated and sent to the client, and when the authentication information cannot be verified, the session with the client is terminated. According to the embodiment of the invention, the server side can receive the data request instruction sent by the client side, and corresponding classification, positioning or analysis operation is carried out according to the category of the data request instruction, so that an enterprise is helped to realize unified management of the cloud document, and the efficiency and the safety of obtaining effective information in the cloud document by a user are improved.
Example two
Fig. 2 shows a composition structure of a content-based cloud document management system according to a second embodiment of the present invention, and for convenience of description, only a part related to the second embodiment of the present invention is shown.
As shown in fig. 2, the content-based cloud document management system includes a client 1 and a server 2.
The client includes, but is not limited to, a mobile phone, a tablet computer or a computer. The user can access the document stored by the server through the client. The content-based cloud document management system may adopt a Client/Server architecture (C/S Structs, Client Server structures), a Browser/Server architecture (B/S Structs, Browser Server structures), or other architectures improved based on the above two architectures, which is not limited herein.
The server 2 receives the identity authentication information and the request data packet sent by the client 1.
The server receives identity authentication information and a request data packet sent by the client through a network transmission protocol. A background daemon process may be set in the server for network monitoring, and the identity authentication information and the request data packet sent by the client 1 through the network transmission protocol are automatically received.
The server 2 verifies the authentication information and parses the request packet.
After receiving the authentication information and the request packet sent from the user via the client 1, the server 2 verifies the authentication information and analyzes the request packet. According to different requirements of users, the request data packet can comprise classification request information so as to request document classification through the classification request information; or, the request data packet may include location request information, so as to request document location through the location request information; alternatively, the request packet may further include analysis request information, so as to request document analysis through the analysis request information, which is not limited herein.
If the identity authentication information passes the verification and the request data packet comprises classification request information and documents to be classified, classifying the documents to be classified into corresponding subdirectories of the managed directory of the server 2 according to the contents of the documents to be classified.
After the user sends the document to be classified and the classification request information to the server through the client, the server processes the request of the user on the premise that the identity authentication information is verified. The server side can obtain the classification keywords of the documents to be classified, determine one directory in the managed directories as the classification directory according to the classification keywords and a preset classification similarity calculation scheme, and classify the documents to be classified into the classification directory. The managed catalog is a catalog protected by the server, and all documents in the server are stored under the managed catalog.
If the identity authentication information passes verification and the request data packet comprises positioning request information, searching a document meeting positioning conditions carried in the positioning request information in the hosting directory, generating a positioning intermediate result, and sending the positioning intermediate result to the client 1.
After the user sends the positioning request information to the server through the client, the server retrieves the matched document for the user according to the positioning condition carried by the positioning request information on the premise that the identity authentication information is verified. As an implementation example of the present invention, the location condition carried by the location request information may be a location keyword, and the server determines documents meeting the location condition according to the location keyword and a preset location similarity calculation scheme, and sends the documents meeting the location condition as an intermediate location result to the client via a network transmission protocol for the user to refer. Therefore, the user can interact with the server by utilizing the graphical user interface of the client to acquire the information required by the user.
If the identity authentication information passes verification and the request data packet comprises analysis request information, searching a subdirectory which meets analysis conditions carried in the analysis request information in the managed directory to serve as an analysis directory, analyzing and mining key information of all documents in the analysis directory, generating a key information report related to the analysis directory, and sending the key information report to the client 1.
After the user sends the analysis request information to the server through the client, the server retrieves matched documents for the user according to analysis conditions carried by the analysis request information on the premise that the identity authentication information is verified, and determines a directory where one document matched with the analysis conditions is located as an analysis directory. And the server side analyzes and excavates the key information of the analysis catalog, writes the excavated key information into a key information report, and finally sends the key information report to the client side for the user to look up after analyzing and excavating each document.
If the authentication information fails to pass the verification, the session between the server 2 and the client 1 is terminated.
If the identity authentication information received by the server and sent by the client cannot pass the verification, it indicates that the communication between the server and the client is dangerous, so that the server can terminate the session with the client in time, and prevent the leakage of important information stored in the server.
It should be understood that the cloud document management system based on content in the embodiment of the present invention may be configured to implement all technical solutions in the foregoing method embodiments, and the functions of each functional module may be specifically implemented according to the method in the foregoing method embodiments, and the specific implementation process may refer to the relevant description in the foregoing embodiments, which is not described herein again.
In this embodiment, a server of the content-based cloud document management system receives a data request instruction sent by a client, and performs corresponding classification, positioning or analysis operations according to the type of the data request instruction, so as to help an enterprise realize unified management of cloud documents and improve efficiency and security of obtaining effective information in the cloud documents by a user.
EXAMPLE III
Fig. 3 shows a structural framework of a content-based cloud document management server according to a third embodiment of the present invention, and for convenience of description, only the parts related to the third embodiment of the present invention are shown.
As shown in fig. 3, the content-based cloud document management server 3 includes: a request receiving module 31, a verification analysis module 32, a classification processing module 33, a positioning processing module 34 and an analysis processing module 35.
The request receiving module 31 is configured to receive identity authentication information and a request data packet sent by a client;
a verification analysis module 32, configured to verify the identity authentication information received by the request receiving module 31, and analyze the request data packet received by the request receiving module;
a classification processing module 33, configured to, when the verification analysis module 32 determines that the identity authentication information passes the verification and the request data packet includes classification request information and documents to be classified, classify the documents to be classified into corresponding subdirectories of a managed directory of the server according to the content of the documents to be classified, where the managed directory is a directory protected by the server, and all documents in the server are stored in the managed directory;
a positioning processing module 34, configured to, when the verification analysis module 32 determines that the identity authentication information passes the verification and the request data packet includes the positioning request information, retrieve, in the managed directory, a document that meets the positioning condition carried in the positioning request information, generate a positioning intermediate result, and send the positioning intermediate result to the client;
an analysis processing module 35, configured to, when the verification analysis module 32 determines that the identity authentication information passes the verification and the request data package includes analysis request information, retrieve, as an analysis directory, one subdirectory that meets an analysis condition carried in the analysis request information from the managed directory, analyze and mine key information of all documents in the analysis directory, generate a key information report related to the analysis directory, and send the key information report to a client;
a session termination module 36, configured to terminate the session with the client when the verification analysis module 32 determines that the authentication information cannot pass the verification.
Optionally, the content-based cloud document management server 3 further includes:
a user security level obtaining module, configured to obtain a current user security level from the client when the identity authentication information received by the request receiving module 31 passes verification and the request data packet includes location request information;
the safety level verification module is used for comparing the current user safety level acquired by the user level acquisition module with the safety level of the positioning intermediate result;
specifically, the location processing module is configured to send the location intermediate result to the client if the current user security level is not lower than the security level of the location intermediate result.
Optionally, the content-based cloud document management server 3 further includes:
and the error permission sending module is used for sending an error permission instruction to the client when the security level verification module determines that the security level of the current user is lower than that of the positioning intermediate result, so as to prompt the user to improve the security level of the current user or abandon the reference of the positioning intermediate result.
Optionally, the content-based cloud document management server 3 further includes:
and the lifting instruction operation module is used for verifying the instruction for lifting the current user security level when receiving the instruction for lifting the current user security level sent by the client, lifting the current user security level after the verification is passed, and informing the security level verification module to perform verification again.
Optionally, the analysis processing module 35 further includes:
a key information obtaining sub-module, configured to extract key information of all documents in the analysis catalog, where the key information includes one or more of the following: named entities, money amounts, quantity phrases and key phrases, wherein the named entities include one or more of the following: organization name, person name, time and place name;
and the key information report generating submodule is used for extracting the context of the key information from the corresponding document of each key information and generating the key information report related to the analysis catalogue.
Optionally, the analysis processing module 35 further includes:
the importance degree scoring submodule is used for sequentially determining one document in the analysis catalog as a document to be scored; and scoring the importance of the document to be scored according to the related information of the document to be scored to obtain a scoring result, wherein the related information comprises more than one of the following information: the frequency of the key information of the document, the support degree of the key information of the document and the time of the document being put into the managed catalog, wherein the importance degree score comprises more than one of the following: the method comprises the following steps of technology complexity scoring, technology distribution scoring and technology originality scoring.
Specifically, the importance scoring submodule further includes:
the key information counting submodule is used for counting the number of key phrases, the number of named entities and the number of types of different named entities in the key information of the document to be evaluated when the importance score comprises a technical complexity score, and simultaneously counting the word number and the repeated word removing number of the document to be evaluated;
the weighted calculation submodule is used for carrying out weighted average calculation on the counted number of the key phrases, the number of the named entities, the number of the types of the different named entities and the number of the words and the duplication removing words of the evaluated document;
and the technical complexity determining submodule is used for taking the result of the weighted average calculation as the scoring result of the technical complexity of the document.
Specifically, the importance scoring submodule further includes:
a similarity operator module for calculating the similarity between each document except the document to be evaluated and the document to be evaluated in the analysis catalog;
a similarity accumulation submodule for accumulating the values obtained by calculating the similarity between each of the other documents and the document to be evaluated;
and the technical distribution degree determining submodule is used for taking the accumulated result as a scoring result of the technical distribution degree of the evaluated document.
Specifically, the importance scoring submodule further includes:
and the technical originality information acquisition submodule is used for acquiring the support of the key phrases of the document to be evaluated and the time for the document to be evaluated to be put into the managed catalogue.
And the technical originality determining submodule is used for calculating a scoring result of the technical originality of the evaluated document according to a preset technical originality scoring formula by utilizing the support of the key phrases of the evaluated document and the time of the evaluated document entering the hosting directory.
It should be understood that the content-based cloud document management server in the embodiment of the present invention may be configured to implement all technical solutions implemented in the method embodiment in a server angle, and the functions of each functional module may be specifically implemented according to the method in the method embodiment, and the specific implementation process may refer to the relevant description in the above embodiment, which is not described herein again.
As can be seen from the above, the content-based cloud document management server in this embodiment may receive a data request instruction sent by a client, and perform corresponding classification, positioning, or analysis operations according to the type of the data request instruction, so as to help an enterprise realize unified management of cloud documents, and improve efficiency and security of obtaining effective information in cloud documents by a user.
It should be noted that, in the several embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, and for example, the above-described division of units is only one type of division of logical functions, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
While, for purposes of simplicity of explanation, the foregoing method embodiments have been described as a series of acts or combination of acts, it will be appreciated by those skilled in the art that the present invention is not limited by the illustrated ordering of acts, as some steps may occur in other orders or concurrently with other steps in accordance with the invention. Further, those skilled in the art will appreciate that the embodiments described in the specification are presently preferred and that no acts or modules are necessarily required of the invention.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In view of the above, it is intended that the present invention not be limited to the particular embodiments disclosed, but that the present invention cover modifications, variations and equivalents of the embodiments of the present invention.

Claims (9)

1. A cloud document management method based on content is characterized by comprising the following steps:
the server receives identity authentication information and a request data packet sent by the client;
the server side verifies the identity authentication information and analyzes the request data packet;
if the identity authentication information passes verification and the request data packet comprises classification request information and documents to be classified, classifying the documents to be classified into corresponding subdirectories of a managed directory of the server according to the content of the documents to be classified, wherein the managed directory is a directory protected by the server, and all documents in the server are stored in the managed directory;
if the identity authentication information passes verification and the request data packet comprises positioning request information, searching a document meeting positioning conditions carried in the positioning request information in the hosting directory, generating a positioning intermediate result, and sending the positioning intermediate result to the client;
if the identity authentication information passes verification and the request data packet comprises analysis request information, searching a subdirectory which meets analysis conditions carried in the analysis request information in the managed directory as an analysis directory, and extracting key information of all documents under the analysis directory, wherein the key information comprises more than one of the following information: named entities, amounts, quantity phrases and key phrases, wherein the named entities further comprise one or more of the following: the organization name, the person name, the time and the place name are extracted from the corresponding document of each key information, the context of the key information is generated, a key information report related to the analysis catalog is generated, and the key information report is sent to a client;
if the identity authentication information cannot pass the verification, terminating the session with the client;
when the key information includes a key phrase, the extracting key information of all documents under the analysis catalog includes:
respectively carrying out statistical syntactic analysis on each document under the analysis catalog;
extracting key phrases of all the documents by utilizing statistical knowledge according to the result of the statistical syntactic analysis;
if the identity authentication information passes verification and the request data packet includes location request information, before sending the location intermediate result to the client, the method further includes:
the server side acquires the current user security level from the client side;
comparing the current user security level with the security level of the positioning intermediate result;
the sending of the positioning intermediate result to the client specifically comprises: if the security level of the current user is not lower than that of the positioning intermediate result, the positioning intermediate result is sent to the client;
the cloud document management method further comprises:
regularly carrying out security grading training on the documents in the managed catalog to generate a security grading knowledge base;
and generating a security classification classifier according to the security classification knowledge base by adopting a machine learning algorithm, wherein the security classification classifier is used for automatically labeling the security level of the document to be classified when the server receives the document to be classified.
2. The method of claim 1, wherein said comparing said obtained current user security level with a security level of said intermediate result of said positioning further comprises:
and if the security level of the current user is lower than that of the positioning intermediate result, sending an error permission instruction to the client to prompt the user to improve the security level of the current user or give up looking up the positioning intermediate result.
3. The method of claim 2, wherein sending the error right instruction to the client further comprises:
if a current user security level improving instruction sent by the client is received, verifying the current user security level improving instruction;
and if the verification is passed, the security level of the current user is improved, and then the step of comparing the security level of the current user with the security level of the positioning intermediate result is returned to be executed.
4. The method of claim 1, wherein said extracting key information of all documents under said analysis catalog further comprises:
determining one document under the analysis catalog as a document to be evaluated in sequence;
and scoring the importance of the document to be scored according to the related information of the document to be scored to obtain a scoring result, wherein the related information comprises more than one of the following information: the frequency of the key information of the document, the support degree of the key information of the document, and the time of the document being classified into the managed catalog, wherein the importance score comprises more than one of the following: the method comprises the following steps of technology complexity scoring, technology distribution scoring and technology originality scoring.
5. The method of claim 4, wherein when the importance score comprises a technical complexity score, the scoring the scored document according to the relevant information of the scored document comprises:
counting the number of key phrases, the number of named entities and the number of types of different named entities in the key information of the document to be evaluated, and simultaneously counting the word number and the de-duplication word number of the document to be evaluated;
carrying out weighted average calculation on the counted number of the key phrases, the number of named entities, the number of types of different named entities and the word number and the de-duplication word number of the evaluated document;
and taking the result of the weighted average calculation as the scoring result of the technical complexity of the document.
6. The method of claim 4, wherein when the importance score comprises a technology distribution score, the scoring the scored document according to the relevant information of the scored document, further comprising:
carrying out similarity calculation on other documents in the analysis catalog except for the document to be evaluated and the document to be evaluated;
accumulating the values obtained by calculating the similarity of the other documents and the evaluated document;
and taking the accumulated result as a scoring result of the technical distribution degree of the document to be scored.
7. The method of claim 4, wherein when the importance score comprises a technology originality score, the scoring the rated document according to the relevant information of the rated document further comprises:
obtaining the support degree of key phrases of the document to be evaluated and the time for the document to be evaluated to be classified into a managed catalog;
and according to a preset technology originality degree scoring formula, calculating to obtain a scoring result of the technology originality degree of the evaluated document by utilizing the support degree of the key phrase of the evaluated document and the time of the evaluated document in a managed catalog.
8. A content-based cloud document management system, comprising:
a client and a server;
the server receives the identity authentication information and the request data packet sent by the client;
the server side verifies the identity authentication information and analyzes the request data packet;
if the identity authentication information passes verification and the request data packet comprises classification request information and documents to be classified, classifying the documents to be classified into corresponding subdirectories of a managed directory of the server according to the content of the documents to be classified, wherein the managed directory is a directory protected by the server, and all documents in the server are stored in the managed directory;
if the identity authentication information passes verification and the request data packet comprises positioning request information, searching a document meeting positioning conditions carried in the positioning request information in the hosting directory, generating a positioning intermediate result, and sending the positioning intermediate result to the client;
if the identity authentication information passes verification and the request data packet comprises analysis request information, searching a subdirectory which meets analysis conditions carried in the analysis request information in the managed directory as an analysis directory, and extracting key information of all documents under the analysis directory, wherein the key information comprises more than one of the following information: named entities, amounts, quantity phrases and key phrases, wherein the named entities further comprise one or more of the following: the organization name, the person name, the time and the place name are extracted from the corresponding document of each key information, the context of the key information is generated, a key information report related to the analysis catalog is generated, and the key information report is sent to a client;
if the identity authentication information cannot pass the verification, terminating the session between the server and the client;
when the key information includes a key phrase, the extracting key information of all documents under the analysis catalog includes:
respectively carrying out statistical syntactic analysis on each document under the analysis catalog;
extracting key phrases of all the documents by utilizing statistical knowledge according to the result of the statistical syntactic analysis;
regularly carrying out security grading training on the documents in the managed catalog to generate a security grading knowledge base;
generating a security classification classifier according to the security classification knowledge base by adopting a machine learning algorithm, wherein the security classification classifier is used for automatically labeling the security level of the document to be classified when the server receives the document to be classified;
if the identity authentication information passes verification and the request data packet includes location request information, before sending the location intermediate result to the client, the method further includes:
the server side acquires the current user security level from the client side;
comparing the current user security level with the security level of the positioning intermediate result;
the sending of the positioning intermediate result to the client specifically comprises: and if the security level of the current user is not lower than the security level of the positioning intermediate result, sending the positioning intermediate result to the client.
9. A content-based cloud document management server, comprising:
the request receiving module is used for receiving the identity authentication information and the request data packet sent by the client;
the verification analysis module is used for verifying the identity authentication information received by the request receiving module and analyzing the request data packet received by the request receiving module;
the classification processing module is used for classifying the documents to be classified into corresponding subdirectories of a hosting directory of the server according to the content of the documents to be classified when the identity authentication information is verified and the request data packet comprises classification request information and the documents to be classified by the verification analysis module, wherein the hosting directory is a directory protected by the server, and all documents in the server are stored in the hosting directory;
the positioning processing module is used for searching a document which meets the positioning condition carried in the positioning request information in the managed catalog when the verification analysis module determines that the identity authentication information passes the verification and the request data packet comprises the positioning request information, generating a positioning intermediate result and sending the positioning intermediate result to the client;
an analysis processing module, configured to, when the verification analysis module determines that the identity authentication information passes verification and the request data package includes analysis request information, retrieve, in the hosted directory, one subdirectory that meets an analysis condition carried in the analysis request information as an analysis directory, and extract key information of all documents under the analysis directory, where the key information includes one or more of the following: named entities, amounts, quantity phrases and key phrases, wherein the named entities further comprise one or more of the following: the organization name, the person name, the time and the place name are extracted from the corresponding document of each key information, the context of the key information is generated, a key information report related to the analysis catalog is generated, and the key information report is sent to a client;
the session termination module is used for terminating the session with the client when the verification analysis module determines that the identity authentication information cannot pass the verification;
the analysis processing module also comprises a key phrase extraction submodule which is used for respectively carrying out statistical syntactic analysis on each document in the analysis catalogue and extracting the key phrase of each document by using statistical knowledge according to the result of the statistical syntactic analysis;
the content-based cloud document management server further comprises:
a user security level obtaining module, configured to obtain a current user security level from the client when the identity authentication information received by the request receiving module is verified and the request data packet includes the location request information;
the safety level verification module is used for comparing the current user safety level acquired by the user level acquisition module with the safety level of the positioning intermediate result;
the positioning processing module is specifically configured to send the positioning intermediate result to the client if the current user security level is not lower than the security level of the positioning intermediate result;
the cloud document management server based on the content is further specifically used for performing security grading training on the documents in the managed catalog periodically to generate a security grading knowledge base;
and generating a security classification classifier according to the security classification knowledge base by adopting a machine learning algorithm, wherein the security classification classifier is used for automatically labeling the security level of the document to be classified when the server receives the document to be classified.
CN201610988380.3A 2016-11-09 2016-11-09 Cloud document management method and system based on content and server Active CN107085584B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610988380.3A CN107085584B (en) 2016-11-09 2016-11-09 Cloud document management method and system based on content and server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610988380.3A CN107085584B (en) 2016-11-09 2016-11-09 Cloud document management method and system based on content and server

Publications (2)

Publication Number Publication Date
CN107085584A CN107085584A (en) 2017-08-22
CN107085584B true CN107085584B (en) 2021-05-28

Family

ID=59615152

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610988380.3A Active CN107085584B (en) 2016-11-09 2016-11-09 Cloud document management method and system based on content and server

Country Status (1)

Country Link
CN (1) CN107085584B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110287493B (en) * 2019-06-28 2023-04-18 中国科学技术信息研究所 Risk phrase identification method and device, electronic equipment and storage medium
CN110675289B (en) * 2019-09-29 2023-05-05 四川大学 Method for cataloging electronic file along with criminal investigation
CN110851397A (en) * 2019-11-12 2020-02-28 成都九鼎瑞信科技股份有限公司 Knowledge base construction platform based on cloud document management system
CN116361240B (en) * 2023-05-31 2023-09-19 北京觅图科技有限公司 Cloud document processing method, cloud document processing system and server

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1680942A (en) * 2004-02-27 2005-10-12 株式会社理光 Document group analyzing apparatus, a document group analyzing method, a document group analyzing system
CN103441986A (en) * 2013-07-29 2013-12-11 中国航天科工集团第二研究院七〇六所 Data resource security control method in thin client mode
CN105357201A (en) * 2015-11-12 2016-02-24 中国科学院信息工程研究所 Access control method and system for object cloud storage

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1680942A (en) * 2004-02-27 2005-10-12 株式会社理光 Document group analyzing apparatus, a document group analyzing method, a document group analyzing system
CN103441986A (en) * 2013-07-29 2013-12-11 中国航天科工集团第二研究院七〇六所 Data resource security control method in thin client mode
CN105357201A (en) * 2015-11-12 2016-02-24 中国科学院信息工程研究所 Access control method and system for object cloud storage

Also Published As

Publication number Publication date
CN107085584A (en) 2017-08-22

Similar Documents

Publication Publication Date Title
CN111258989B (en) Database migration evaluation method and device, storage medium and computer equipment
US20110029555A1 (en) Method, system and apparatus for content identification
US11188635B2 (en) File authentication method and apparatus
US11188657B2 (en) Method and system for managing electronic documents based on sensitivity of information
US20160299924A1 (en) Search system
CN107085584B (en) Cloud document management method and system based on content and server
WO2019196224A1 (en) Regulation information processing method and apparatus, computer device and storage medium
US20130254838A1 (en) System and method for data mining and security policy management
CN108512854B (en) System information safety monitoring method and device, computer equipment and storage medium
US20130268679A1 (en) Information processing apparatus, information processing method, and program
CN110855676A (en) Network attack processing method and device and storage medium
CN103442061A (en) Method and system for encrypting cloud server files and cloud server
US11580138B2 (en) Virtual research platform
US10706011B2 (en) Methods for facilitating preservation and retrieval of heterogeneous content and devices thereof
US11514188B1 (en) System and method for serving subject access requests
NL2024002B1 (en) Method and computing device for informing about malicious web resources
CN111753171A (en) Malicious website identification method and device
US20170004201A1 (en) Structure-based entity analysis
US20230333715A1 (en) Processing electronic signature data in a collaborative environment
Actoriano et al. Forensic Investigation on WhatsApp Web Using Framework Integrated Digital Forensic Investigation Framework Version 2
US20130246338A1 (en) System and method for indexing a capture system
CN117390696A (en) Integrity detection system, method, equipment and medium for electronic file
Kamal et al. Forensics chain for evidence preservation system: An evidence preservation forensics framework for internet of things‐based smart city security using blockchain
CN112685389B (en) Data management method, data management device, electronic device, and storage medium
CN113037743B (en) Encryption method and system for cloud server file

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant