CN107800714A - A kind of file of client shows method and apparatus - Google Patents

A kind of file of client shows method and apparatus Download PDF

Info

Publication number
CN107800714A
CN107800714A CN201711107329.8A CN201711107329A CN107800714A CN 107800714 A CN107800714 A CN 107800714A CN 201711107329 A CN201711107329 A CN 201711107329A CN 107800714 A CN107800714 A CN 107800714A
Authority
CN
China
Prior art keywords
client
file
encryption file
server
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711107329.8A
Other languages
Chinese (zh)
Inventor
王志松
王巍鳓
李乐
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Minsheng Banking Corp Ltd
Original Assignee
China Minsheng Banking Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Minsheng Banking Corp Ltd filed Critical China Minsheng Banking Corp Ltd
Priority to CN201711107329.8A priority Critical patent/CN107800714A/en
Publication of CN107800714A publication Critical patent/CN107800714A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]

Abstract

The embodiments of the invention provide a kind of file of client to show method and apparatus, and methods described includes:The client obtains encryption file, decruption key corresponding with encryption file from server;The client uses the decruption key, decrypts the encryption file;The client shows the file after decryption.In embodiments of the present invention, the ciphering process of file is carried out in server, and each file is using random key, the save location of key in server, when avoiding key and being stored in client code, when client is cracked, hacker can find various methods and attempt decruption key by reading code.The possibility that the decruption key of file is cracked is reduced, as a result of one key of a file, the strategy that key generates at random, the possibility that encryption file is cracked more is reduced, ensure that the safety of encryption file.The embodiment of the present invention can protect the encryption file in client not to be cracked, and take precautions against encryption file and get compromised.

Description

A kind of file of client shows method and apparatus
Technical field
The present invention relates to communication technical field, shows method and a kind of client more particularly to a kind of file of client File demonstration device.
Background technology
With the extensive use of internet and the rise of intelligent movable equipment, the application program development of mobile terminal is increasingly Vigorously.
With the change of mobile device user's consumption habit, increasing application program be related to file to safety Property protection.The characteristics of in view of mobile terminal simplicity and performance, most of application programs are in design by data safety school Test and be placed on service end.In general, mobile terminal message is being transmitted after encryption to background server end, by server end solution It is close and verify data consistency, the foundation whether being tampered as intermediate data.This method can effectively resist middle personal data Hijack attack, and malicious attack caused by being distorted for mobile terminal local file, do not possess defensive ability/resistance ability.
Application program needs to carry out in some cases sensitive document displaying and reading, for example, meeting material, service scripts, Run form, picture etc..If these sensitive information file preserving types are improper, it is easy to cause the generation of the leakage of a state or party secret.
The content of the invention
In view of the above problems, it is proposed that the embodiment of the present invention overcomes above mentioned problem or at least in part to provide one kind A kind of file of the client to solve the above problems shows the file demonstration device of method and a kind of corresponding client.
In order to solve the above problems, the embodiment of the invention discloses a kind of file of client to show method, including:
The client obtains encryption file, decruption key corresponding with encryption file from server;
The client uses the decruption key, decrypts the encryption file;
The client shows the file after decryption.
Preferably, the client obtains the step of encrypting file, decruption key corresponding with encryption file from server Including:
The client obtains encryption file, with encrypting the corresponding decruption key of file from server, and corresponding has Effect phase information;
Methods described also includes:
When the client terminal start-up, whether term of validity information corresponding to the client verification encryption file expires;
If expiring, the client deletes the encryption file.
Preferably, in addition to:
The client obtains the living document list that server is sent;
The client shows the living document list;
The client obtains encryption file, with encrypting the corresponding decruption key of file from server, and corresponding has The step of effect phase information, includes:
The file being directed in living document list that the client reception user submits checks request;
The client checks request according to described in, and encryption file, decryption corresponding with encryption file are obtained from server Key, and corresponding term of validity information.
Preferably, in addition to:
When client terminates to show the file after decrypting, the client deletes the file after the decryption.
Preferably, in addition to:
When the client is closed, the client deletes the file after decryption.
Preferably, the client checks request according to described in, and obtaining the step of encrypting file from server includes:
The client checks request according to described in, and the download address of encryption file is obtained from server;
The client judges whether to have downloaded the encryption file according to the download address;
If it is not, then the client downloads encryption file according to the download address.
Preferably, in addition to:
The decruption key is used in the client, after decrypting the encryption file, after the client will decrypt File store to temporary folder.
The embodiment of the invention also discloses a kind of file demonstration device of client, including:
Positioned at the data acquisition module of the client, for obtaining encryption file, corresponding with encrypting file from server Decruption key;
Positioned at the deciphering module of the client, for using the decruption key, the encryption file is decrypted;
Positioned at the file display module of the client, for showing the file after decrypting.
The embodiment of the invention also discloses a kind of device, including:
One or more processors;With the one or more machine readable medias for being stored thereon with instruction, when by described one During individual or multiple computing devices so that described device performs one or more method as described above.
The embodiment of the invention also discloses one or more machine readable medias, are stored thereon with instruction, when by one or During multiple computing devices so that device performs one or more method as described above.
The embodiment of the present invention includes advantages below:
In embodiments of the present invention, the ciphering process of file is carried out in server, and each file uses random key, key Save location in server, when avoiding key and being stored in client code, when client is cracked, hacker can be by readding Code is read, various methods is found and attempts decruption key.The possibility that the decruption key of file is cracked is reduced, as a result of one Individual one key of file, the strategy that key generates at random, the possibility that encryption file is cracked more is reduced, ensure that encryption The safety of file.The embodiment of the present invention can protect the encryption file in client not to be cracked, and take precautions against encryption file and get compromised.
Brief description of the drawings
Fig. 1 is that a kind of file of client of the present invention shows the step flow chart of embodiment of the method 1;
Fig. 2 is that a kind of file of client of the present invention shows the step flow chart of embodiment of the method 2;
Fig. 3 is that a kind of file of client of the present invention shows the step flow chart of embodiment of the method 3;
Fig. 4 is the schematic diagram for sharing file in the embodiment of the present invention by Web conference;
Fig. 5 is a kind of structured flowchart of the file demonstration device embodiment of client of the present invention.
Embodiment
In order to facilitate the understanding of the purposes, features and advantages of the present invention, it is below in conjunction with the accompanying drawings and specific real Applying mode, the present invention is further detailed explanation.
Reference picture 1, show that a kind of file of client of the present invention shows the step flow chart of embodiment of the method 1, tool Body may include steps of:
Step 101, the client obtains encryption file, decruption key corresponding with encryption file from server;
In embodiments of the present invention, document to be protected is needed to be encrypted and stored by server end for some, each What the decruption key of file was all randomly generated, ensure the corresponding key of a file.
When the client application of terminal (for example, mobile phone, tablet personal computer) needs to check these files, client needs Encryption file and corresponding decruption key are asked to server.
Step 102, the client uses the decruption key, decrypts the encryption file;
In embodiments of the present invention, file can be encrypted using various ways in server, for example, MD5 (Message-Digest Algorithm 5) encryption, DES (Data Encryption Standard) encryptions.
Step 103, the client shows the file after decryption.
In embodiments of the present invention, the ciphering process of file is carried out in server, and each file uses random key, key Save location in server, when avoiding key and being stored in client code, when client is cracked, hacker can be by readding Code is read, various methods is found and attempts decruption key.The possibility that the decruption key of file is cracked is reduced, as a result of one Individual one key of file, the strategy that key generates at random, the possibility that encryption file is cracked more is reduced, ensure that encryption The safety of file.The embodiment of the present invention can protect the encryption file in client not to be cracked, and take precautions against encryption file and get compromised.
Reference picture 2, show that a kind of file of client of the present invention shows the step flow chart of embodiment of the method 2, tool Body may include steps of:
Step 201, when the client terminal start-up, whether term of validity information corresponding to the client verification encryption file Expire;
In embodiments of the present invention, client can also obtain server and carry when encryption file is obtained from server The term of validity information corresponding with encryption file supplied.
When client terminal start-up, whether the term of validity for detecting the encryption file obtained before first expires.
Step 202, if expiring, the client deletes the encryption file;
If term of validity information corresponding to encryption file has expired, client deletes the encryption file, corresponding solution Key and term of validity information.
Step 203, the client obtains encryption file, decruption key corresponding with encryption file from server, and Corresponding term of validity information;
When the client of terminal needs to check encryption file, user end to server request encryption file, corresponding solution Key, and term of validity information.
Step 204, the client uses the decruption key, decrypts the encryption file;
In embodiments of the present invention, file can be encrypted using various ways in server.
Step 205, the client shows the file after decryption.
In embodiments of the present invention, client is managed to the term of validity information of each encryption file, when the term of validity is believed When ceasing expired, then encryption file is deleted.When user needs to use file, the solution of file is just obtained in real time by network request Key, so reduce the time that key exposes in terminal, if user's unused file look facility, key in terminal just Be not in.So that encryption file is limited in the retention time of terminal, the compromised probability of encryption file is reduced.
Reference picture 3, show that a kind of file of client of the present invention shows the step flow chart of embodiment of the method 3, tool Body may include steps of:
Step 301, when the client terminal start-up, whether term of validity information corresponding to the client verification encryption file Expire;
Step 302, if expiring, the client deletes the encryption file;
Step 303, the client obtains the living document list that server is sent;
In embodiments of the present invention, server being contained in living document list can be supplied to what the client of terminal was checked The information of All Files.
For example, the client for providing Web conference, participant can download in the client provides meeting by server View data.
Step 304, the client shows the living document list;
Living document list is presented to user and selected by client.
Step 305, the file being directed in living document list that the client reception user submits checks request;
User can select to need the file checked in living document list.For example, the side by clicking on file option Formula, selection need the file checked.
Step 306, the client checks request according to described in, and encryption file is obtained, with encrypting file pair from server The decruption key answered, and corresponding term of validity information;
Selection of the client according to user in living document list, from the corresponding encryption file of server acquisition, correspondingly Decruption key, and corresponding term of validity information.
In embodiments of the present invention, the step 306 can include following sub-step:
Sub-step S11, the client check request according to described in, and the download address of encryption file is obtained from server;
It is close to the ID of the client return file of terminal, download address, decryption after server, which receives, checks request Key, and term of validity information.
The information such as file ID and download address, decruption key, the term of validity can be stored in the database of server.
Sub-step S12, the client judge whether to have downloaded the encryption file according to the download address;
Specifically, client according to the URL of file download address, can calculate this URL MD5 values as filename. So different URL addresses, filename are just different.If file had been downloaded, the MD5 values of URL generations are as filename, just This document of client preservation can be found.
Sub-step S13, if it is not, then the client downloads encryption file according to the download address.
If not downloading the encryption file before, encryption file is downloaded from the download address.
Step 307, the client uses the decruption key, decrypts the encryption file;
Step 308, the client stores the file after decryption to temporary folder.
Step 309, the client shows the file after decryption.
Step 310, when client terminates to show the file after decrypting, the client deletes the text after the decryption Part.
When user terminates to show the file after decrypting in client, client deletes the file after decryption, reduces decryption The compromised risk of rear file.
Step 311, when the client is closed, the client deletes the file after decryption.
When client is closed by the user or during by system positive closing, client deletes the file after decryption, reduces decryption The compromised risk of rear file.
In order that those skilled in the art better understood when the embodiment of the present invention, below by an example to this hair Bright embodiment is illustrated:
Reference picture 4 show the schematic diagram for sharing file in the embodiment of the present invention by Web conference.
After user launches application, the term of validity of application initialization and the encryption file to obtaining before is carried out Verification.If the term of validity of file goes beyond the time limit, the encryption file is deleted.
After application program adds Web conference, application program provides committee paper list look facility.
After user clicks on meeting material look facility, application program is to server request dynamic listed files.
Server returns to living document list according to the request of application program.
Application program shows living document list to user, when user clicks on some file in living document list, Application program obtains the download address, decruption key and term of validity information of this document from server according to the ID of this file.
Application program calculates the filename locally preserved after downloading, judges that local is according to the download address of this document It is no to have downloaded this document.If downloading this document, it is decrypted using key-pair file, the file after decryption is stored in Temporary folder, document presentation is carried out after successful decryption.For the file do not downloaded, download function is called, by under file It is decrypted and shows after is downloaded to local.
When user checks the end of file, when exiting file and showing function, the text after being decrypted in temporary folder is deleted Part.Applied if run into by user or system compulsory withdrawal system, delete the file after being decrypted in temporary folder, avoid solving File after close is among risk.Safety management of the file in client may insure by above flow.
It should be noted that for embodiment of the method, in order to be briefly described, therefore it is all expressed as to a series of action group Close, but those skilled in the art should know, the embodiment of the present invention is not limited by described sequence of movement, because according to According to the embodiment of the present invention, some steps can use other orders or carry out simultaneously.Secondly, those skilled in the art also should Know, embodiment described in this description belongs to preferred embodiment, and the involved action not necessarily present invention is implemented Necessary to example.
Reference picture 5, a kind of structured flowchart of the file demonstration device embodiment of client of the present invention is shown, specifically may be used With including following module:
Positioned at the data acquisition module 501 of the client, for obtaining encryption file, with encrypting file pair from server The decruption key answered;
Positioned at the deciphering module 502 of the client, for using the decruption key, the encryption file is decrypted;
Positioned at the file display module 503 of the client, for showing the file after decrypting.
In embodiments of the present invention, the data acquisition module 501 can include:
Data acquisition submodule, for obtaining encryption file, decruption key corresponding with encryption file from server, and Corresponding term of validity information;
Described device also includes:
Term of validity correction verification module, for when the client terminal start-up, term of validity information corresponding to verification encryption file is It is no to expire;
File removing module, if being expired for term of validity information corresponding to encryption file, delete the encryption file.
In embodiments of the present invention, described device can also include:
Positioned at the living document list acquisition module of the client, for obtaining the living document row of server transmission Table;
Positioned at the living document list display module of the client, for showing the living document list;
The data acquisition submodule includes:
Request reception unit is checked, the checking for the file being directed in living document list for receiving user's submission please Ask;
Data capture unit, for according to described in check request, from server obtain encryption file, with encrypt file it is corresponding Decruption key, and corresponding term of validity information.
In embodiments of the present invention, described device can also include:
Positioned at the end removing module of the client, for when client terminates to show the file after decrypting, deleting File after the decryption.
In embodiments of the present invention, described device can also include:
Positioned at the closing removing module of the client, for when the client is closed, deleting the text after decryption Part.
In embodiments of the present invention, the data capture unit can include:
Download address obtains subelement, for checking request according to described in, the download of encryption file is obtained from server Location;
Judgment sub-unit is downloaded, for according to the download address, judging whether to have downloaded the encryption file;
File download subelement, if for not downloading the encryption file, download and encrypt according to the download address File.
In embodiments of the present invention, described device can also include:
Temporary storage module, for using the decruption key in the deciphering module, after decrypting the encryption file, File after decryption is stored to temporary folder.
For device embodiment, because it is substantially similar to embodiment of the method, so description is fairly simple, it is related Part illustrates referring to the part of embodiment of the method.
The embodiment of the present invention additionally provides a kind of device, including:
One or more processors;With
One or more machine readable medias of instruction are stored thereon with, when by one or more of computing devices When so that described device performs the method described in the embodiment of the present invention.
The embodiment of the present invention additionally provides one or more machine readable medias, is stored thereon with instruction, when by one or During multiple computing devices so that device performs the method described in the embodiment of the present invention.
Each embodiment in this specification is described by the way of progressive, what each embodiment stressed be with The difference of other embodiment, between each embodiment identical similar part mutually referring to.
It should be understood by those skilled in the art that, the embodiment of the embodiment of the present invention can be provided as method, apparatus or calculate Machine program product.Therefore, the embodiment of the present invention can use complete hardware embodiment, complete software embodiment or combine software and The form of the embodiment of hardware aspect.Moreover, the embodiment of the present invention can use one or more wherein include computer can With in the computer-usable storage medium (including but is not limited to magnetic disk storage, CD-ROM, optical memory etc.) of program code The form of the computer program product of implementation.
The embodiment of the present invention is with reference to method according to embodiments of the present invention, terminal device (system) and computer program The flow chart and/or block diagram of product describes.It should be understood that can be by computer program instructions implementation process figure and/or block diagram In each flow and/or square frame and the flow in flow chart and/or block diagram and/or the combination of square frame.These can be provided Computer program instructions are set to all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing terminals Standby processor is to produce a machine so that is held by the processor of computer or other programmable data processing terminal equipments Capable instruction is produced for realizing in one flow of flow chart or multiple flows and/or one square frame of block diagram or multiple square frames The device for the function of specifying.
These computer program instructions, which may be alternatively stored in, can guide computer or other programmable data processing terminal equipments In the computer-readable memory to work in a specific way so that the instruction being stored in the computer-readable memory produces bag The manufacture of command device is included, the command device is realized in one flow of flow chart or multiple flows and/or one side of block diagram The function of being specified in frame or multiple square frames.
These computer program instructions can be also loaded into computer or other programmable data processing terminal equipments so that Series of operation steps is performed on computer or other programmable terminal equipments to produce computer implemented processing, so that The instruction performed on computer or other programmable terminal equipments is provided for realizing in one flow of flow chart or multiple flows And/or specified in one square frame of block diagram or multiple square frames function the step of.
Although having been described for the preferred embodiment of the embodiment of the present invention, those skilled in the art once know base This creative concept, then other change and modification can be made to these embodiments.So appended claims are intended to be construed to Including preferred embodiment and fall into having altered and changing for range of embodiment of the invention.
Finally, it is to be noted that, herein, such as first and second or the like relational terms be used merely to by One entity or operation make a distinction with another entity or operation, and not necessarily require or imply these entities or operation Between any this actual relation or order be present.Moreover, term " comprising ", "comprising" or its any other variant meaning Covering including for nonexcludability, so that process, method, article or terminal device including a series of elements are not only wrapped Those key elements, but also the other element including being not expressly set out are included, or is also included for this process, method, article Or the key element that terminal device is intrinsic.In the absence of more restrictions, wanted by what sentence "including a ..." limited Element, it is not excluded that other identical element in the process including the key element, method, article or terminal device also be present.
Method is showed to a kind of file of client provided by the present invention above and a kind of file of client shows dress Put, be described in detail, specific case used herein is set forth to the principle and embodiment of the present invention, the above The explanation of embodiment is only intended to help the method and its core concept for understanding the present invention;Meanwhile for the general skill of this area Art personnel, according to the thought of the present invention, there will be changes in specific embodiments and applications, in summary, this Description should not be construed as limiting the invention.

Claims (10)

1. a kind of file of client shows method, it is characterised in that including:
The client obtains encryption file, decruption key corresponding with encryption file from server;
The client uses the decruption key, decrypts the encryption file;
The client shows the file after decryption.
2. according to the method for claim 1, it is characterised in that the client obtains encryption file, with adding from server Include corresponding to ciphertext part the step of decruption key:
The client obtains encryption file, decruption key corresponding with encryption file, and the corresponding term of validity from server Information;
Methods described also includes:
When the client terminal start-up, whether term of validity information corresponding to the client verification encryption file expires;
If expiring, the client deletes the encryption file.
3. method according to claim 1 or 2, it is characterised in that also include:
The client obtains the living document list that server is sent;
The client shows the living document list;
The client obtains encryption file, decruption key corresponding with encryption file, and the corresponding term of validity from server The step of information, includes:
The file being directed in living document list that the client reception user submits checks request;
The client checks request according to described in, and encryption file, decruption key corresponding with encryption file are obtained from server, And corresponding term of validity information.
4. method according to claim 1 or 2, it is characterised in that also include:
When client terminates to show the file after decrypting, the client deletes the file after the decryption.
5. method according to claim 1 or 2, it is characterised in that also include:
When the client is closed, the client deletes the file after decryption.
6. according to the method for claim 3, it is characterised in that the client checks request according to described in, from server The step of obtaining encryption file includes:
The client checks request according to described in, and the download address of encryption file is obtained from server;
The client judges whether to have downloaded the encryption file according to the download address;
If it is not, then the client downloads encryption file according to the download address.
7. according to the method for claim 1, it is characterised in that also include:
The decruption key is used in the client, and after decrypting the encryption file, the client is by the text after decryption Part is stored to temporary folder.
A kind of 8. file demonstration device of client, it is characterised in that including:
Positioned at the data acquisition module of the client, for obtaining encryption file, solution corresponding with encryption file from server Key;
Positioned at the deciphering module of the client, for using the decruption key, the encryption file is decrypted;
Positioned at the file display module of the client, for showing the file after decrypting.
A kind of 9. device, it is characterised in that including:
One or more processors;With
One or more machine readable medias of instruction are stored thereon with, when by one or more of computing devices, are made Obtain one or more methods of the described device execution as described in claim 1-7.
10. one or more machine readable medias, instruction is stored thereon with, when executed by one or more processors so that Device performs one or more methods as described in claim 1-7.
CN201711107329.8A 2017-11-10 2017-11-10 A kind of file of client shows method and apparatus Pending CN107800714A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711107329.8A CN107800714A (en) 2017-11-10 2017-11-10 A kind of file of client shows method and apparatus

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711107329.8A CN107800714A (en) 2017-11-10 2017-11-10 A kind of file of client shows method and apparatus

Publications (1)

Publication Number Publication Date
CN107800714A true CN107800714A (en) 2018-03-13

Family

ID=61535977

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711107329.8A Pending CN107800714A (en) 2017-11-10 2017-11-10 A kind of file of client shows method and apparatus

Country Status (1)

Country Link
CN (1) CN107800714A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114580001A (en) * 2022-03-11 2022-06-03 合肥工业大学 Encryption and decryption algorithm and file protection method for excel file

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103198261A (en) * 2012-01-09 2013-07-10 鸿富锦精密工业(深圳)有限公司 Method and system for protecting file content security
CN103442059A (en) * 2013-08-27 2013-12-11 华为终端有限公司 File sharing method and device
CN104281814A (en) * 2013-07-03 2015-01-14 钟丹东 File anti-disclosure system for files and working method thereof
CN105791105A (en) * 2016-05-20 2016-07-20 北京北信源软件股份有限公司 Method for burning after reading instant messaging information
CN106202083A (en) * 2015-04-30 2016-12-07 阿里巴巴集团控股有限公司 Resource packaging system, method and device for web page
CN107046540A (en) * 2017-04-18 2017-08-15 北京元心科技有限公司 File transfer method and device
CN107295018A (en) * 2017-08-14 2017-10-24 北京连云决科技有限公司 A kind of safety storage of cloud disc file and sharing method

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103198261A (en) * 2012-01-09 2013-07-10 鸿富锦精密工业(深圳)有限公司 Method and system for protecting file content security
CN104281814A (en) * 2013-07-03 2015-01-14 钟丹东 File anti-disclosure system for files and working method thereof
CN103442059A (en) * 2013-08-27 2013-12-11 华为终端有限公司 File sharing method and device
CN106202083A (en) * 2015-04-30 2016-12-07 阿里巴巴集团控股有限公司 Resource packaging system, method and device for web page
CN105791105A (en) * 2016-05-20 2016-07-20 北京北信源软件股份有限公司 Method for burning after reading instant messaging information
CN107046540A (en) * 2017-04-18 2017-08-15 北京元心科技有限公司 File transfer method and device
CN107295018A (en) * 2017-08-14 2017-10-24 北京连云决科技有限公司 A kind of safety storage of cloud disc file and sharing method

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114580001A (en) * 2022-03-11 2022-06-03 合肥工业大学 Encryption and decryption algorithm and file protection method for excel file
CN114580001B (en) * 2022-03-11 2022-09-06 合肥工业大学 Encryption and decryption algorithm and file protection method for excel file

Similar Documents

Publication Publication Date Title
EP3893170A1 (en) Federated learning-based model parameter training method, apparatus and device, and medium
US20240015141A1 (en) Secure message search
US9246947B2 (en) Method and apparatus for protecting access to corporate applications from a mobile device
CN109728914B (en) Digital signature verification method, system, device and computer readable storage medium
CN105812332A (en) Data protection method
US9372987B1 (en) Apparatus and method for masking a real user controlling synthetic identities
CN112866228B (en) Method and device for controlling unauthorized access of web system
CN111460503B (en) Data sharing method, device, equipment and storage medium
CN204360381U (en) mobile device
CN102281300A (en) digital rights management license distribution method and system, server and terminal
CN107040520B (en) Cloud computing data sharing system and method
CN107959660A (en) A kind of static file access method and device based on Nginx
CN108111497A (en) Video camera and server inter-authentication method and device
CN105101183A (en) Method and system for protecting private contents at mobile terminal
CN107579903B (en) Picture message secure transmission method and system based on mobile device
CN106203141A (en) The data processing method of a kind of application and device
US20160210596A1 (en) Method, device and system for controlling presentation of application
CN110069241A (en) Acquisition methods, device, client device and the server of pseudo random number
CN110602132A (en) Data encryption and decryption processing method
CN114329541A (en) Data encryption method, device, equipment and storage medium
JP2014106690A (en) Terminal equipment, server, content distribution system, content distribution method and program
CN103618754B (en) Cookie anti-tamper method and device
CN107026828A (en) A kind of anti-stealing link method cached based on internet and internet caching
CN107800714A (en) A kind of file of client shows method and apparatus
CN105187379A (en) Multi-party distrust-based password split managing method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180313

RJ01 Rejection of invention patent application after publication