CN112612749B - Intelligent security management storage system - Google Patents

Intelligent security management storage system Download PDF

Info

Publication number
CN112612749B
CN112612749B CN202011480096.8A CN202011480096A CN112612749B CN 112612749 B CN112612749 B CN 112612749B CN 202011480096 A CN202011480096 A CN 202011480096A CN 112612749 B CN112612749 B CN 112612749B
Authority
CN
China
Prior art keywords
path
file
storage
information
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011480096.8A
Other languages
Chinese (zh)
Other versions
CN112612749A (en
Inventor
何倩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing College of Electronic Engineering
Original Assignee
Chongqing College of Electronic Engineering
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing College of Electronic Engineering filed Critical Chongqing College of Electronic Engineering
Priority to CN202011480096.8A priority Critical patent/CN112612749B/en
Publication of CN112612749A publication Critical patent/CN112612749A/en
Application granted granted Critical
Publication of CN112612749B publication Critical patent/CN112612749B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/11File system administration, e.g. details of archiving or snapshots
    • G06F16/113Details of archiving
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/13File access structures, e.g. distributed indices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/16File or folder operations, e.g. details of user interfaces specifically adapted to file systems
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention relates to the technical field of storage systems, and particularly discloses an intelligent security management storage system, which comprises a storage module, a storage module and a storage module, wherein the storage module is used for storing a storage path estimation model; the file information acquisition module is used for acquiring file information of files to be classified, wherein the file information comprises file names; the file storage position analysis module is used for carrying out storage path prediction analysis on file information of the files to be classified through the storage path prediction model to obtain a pre-storage path, and generating path information to be confirmed according to the pre-storage path; the interaction module is used for displaying path to-be-confirmed information, wherein the path to-be-confirmed information comprises file information and a corresponding pre-stored path; the method is also used for acquiring path selection result information, wherein the path selection result information comprises file information and a corresponding storage path; the file storage module is used for storing the files to be classified according to the path selection result information and the storage path. By adopting the technical scheme of the invention, the files to be classified are automatically classified.

Description

Intelligent security management storage system
Technical Field
The invention relates to the technical field of storage systems, in particular to an intelligent security management storage system.
Background
In order to be convenient to work, people often arrange the data in order, and through newly built folders, the associated files are placed in the same folder, so that the files are convenient to view. After creating a plurality of classified folders, when a person subsequently receives a file associated with a history received file, the person needs to find a storage path of the associated folder, and then places the file to be classified into the associated folder. When a person subsequently receives a file which is not associated with the history received file, a classification folder needs to be newly established at a proper storage position for placing the file to be classified.
However, in actual work and life, many documents are often received by people, and each time a document is received, the document needs to be manually moved to a corresponding folder, which is very troublesome.
Disclosure of Invention
The invention provides an intelligent security management storage system for solving the technical problem of how to realize automatic classification of files to be classified.
The basic scheme of the invention is as follows:
the intelligent security management storage system comprises a storage module, a file information acquisition module, a file storage position analysis module and an interaction module, wherein:
the storage module is used for storing the storage path estimation model;
the file information acquisition module is used for acquiring file information of files to be classified, wherein the file information comprises file names;
the file storage position analysis module is used for carrying out storage path prediction analysis on file information of the files to be classified through the storage path prediction model to obtain a pre-storage path, and generating path information to be confirmed according to the pre-storage path;
the interaction module is used for displaying path to-be-confirmed information, wherein the path to-be-confirmed information comprises file information and a corresponding pre-stored path; the method is also used for acquiring path selection result information, wherein the path selection result information comprises file information and a corresponding storage path;
the file storage module is used for storing the files to be classified according to the path selection result information and the storage path.
The beneficial effect of this scheme is: 1. the file names are named according to personal naming habits, the stored path prediction model performs path prediction analysis on the file names of the files to be classified, so that the file classification logic of the personal naming habits is performed according to user history, and if the file name naming rule of the user A is: the storage path rule is that files with the same affiliated case name are all placed in a folder named by the case name. The method comprises the steps that a storage path estimation model analyzes case names of file names of files to be classified, and generates a file estimation storage path according to the case names, so that the estimated storage path obtained through path estimation analysis is attached to personal file classification habits of users.
2. The predicted storage path of the file is displayed for the user to confirm, and firstly, the predicted storage path of the file to be classified is used for prompting the path to be stored, so that the user can search the predicted storage path when using the file next time; secondly, ensuring that the transfer storage path of the file to be classified accords with the expected storage path of the user, and avoiding the storage error of the file to be classified, thereby realizing the automatic classified archiving of the file to be classified, which correctly meets the personal habit of the user.
The self-learning module is used for carrying out self-learning training on the storage path estimation model according to the file information obtained by history and the corresponding storage path to obtain a new storage path estimation model.
The beneficial effects are that: according to file information (file name and file acquisition source) of files stored by a user and the file storage path, self-learning is carried out, so that the estimation of the storage path of the files to be classified is more fit with personal file arrangement habit of the user.
Further, the system also comprises a grade analysis module and a grade recording module,
the storage module is also used for storing a path security level comparison table of security levels corresponding to each storage path, wherein the security levels comprise important levels and common levels;
the grade analysis module is used for searching the corresponding security grade in the path security grade comparison table according to the storage path, and generating grade setting information if the corresponding security grade is not searched, wherein the grade setting information comprises the storage path and a security grade option;
the interaction module is also used for displaying the grade setting information; the system is also used for acquiring grade setting result information, wherein the grade setting result information comprises a storage path and a selected security grade;
the grade recording module is used for carrying out record modification on the path security grade comparison table according to the grade setting result information.
The beneficial effects are that: by classifying the security levels for the storage paths, the stored files are classified, and the files with different security levels can be managed in a distinguishing mode.
Further, the grade analysis module is also used for searching the corresponding security grade from the path security grade comparison table according to the pre-stored path of the file to be classified,
the file storage position analysis module is also used for generating manual classification prompt information if the security level of the pre-stored path is an important level; and if the security level of the pre-stored path is the common level, generating the path information to be confirmed.
The beneficial effects are that: when important file data is required to be manually classified and stored, setting the security level of the file to be classified as an important level, and when the system detects that the security level of the file is the important level, not automatically archiving the file. Meets the differential storage requirement of important files.
The file moving monitoring module is used for monitoring file moving conditions, and if the file is monitored to be moved, a current storage path and an original storage path of the file are obtained;
the grade analysis module is also used for searching corresponding safety grades in the path safety grade comparison table according to the current storage path and the original storage path respectively, generating refusing moving information if one of the searched safety grades is an important grade, and discarding the moving information to comprise file information of moving files, the current storage path and the original storage path;
the file storage module is also used for searching the target moving file according to the current storage path when receiving the refusing moving information, and changing the storage path of the target moving file into the original storage path according to the original storage path.
The beneficial effects are that: and the files with the importance level are forbidden to be automatically sorted, so that the situation that important files cannot be found when people need to be sorted in the sorting process is avoided.
Further, the level analysis module is further configured to search for a corresponding security level in the path security level comparison table according to the current storage path and the original storage path, and if the searched security levels are all common levels, generate file moving prompt information, where the file moving prompt information includes file information of a moved file, the current storage path and the original storage path;
the interaction module is also used for displaying file moving prompt information and acquiring file moving confirmation information, wherein the moving confirmation information comprises permission moving information and abandon moving information;
the file storage module is also used for searching the target moving file according to the current storage path when the abandoned moving information is received, and changing the storage path of the target moving file into the original storage path according to the original storage path.
Has the beneficial effects that; in file organization, it often happens that people do not notice moving files to other storage paths, so that when people need files next time, the needed files cannot be found in the original storage paths. According to the scheme, when the storage path is moved, file movement prompt information is generated, and the moved file information and the position information of the file to be moved are displayed for people to confirm, so that the situation of wrong file movement is avoided.
Drawings
FIG. 1 is a logic block diagram of a first embodiment of an intelligent security management storage system;
FIG. 2 is a logic block diagram of a second embodiment of an intelligent security management storage system.
Detailed Description
The following is a further detailed description of the embodiments:
example 1
The intelligent security management storage system, as shown in fig. 1, comprises a storage module, a self-learning module, a file information acquisition module, a file storage position analysis module, an interaction module, a grade analysis module, a file storage module and a grade recording module, wherein:
the storage module is used for storing the storage path estimation model; the storage module is also used for storing a path security level comparison table of security levels corresponding to each storage path, wherein the security levels comprise important levels and common levels;
the self-learning module is used for carrying out self-learning training on the storage path estimation model according to the file information obtained by history and the corresponding storage path to obtain a new storage path estimation model, wherein the file information comprises file names, file creation time and file sources. In this embodiment, the storage path estimation model is a BP neural network model generated by training file information and storage paths obtained through a plurality of sets of histories as samples. Specifically, firstly, a three-layer BP neural network model is constructedThe embodiment takes the file name and the file creation time as input layers for input, so the input layers have 2 nodes; for hidden layers, the present embodiment uses the following formula to determine the number of hidden layer nodes:
Figure BDA0002837215580000041
wherein I is the number of nodes of the hidden layer, n is the number of nodes of the input layer, m is the number of nodes of the output layer, a is one number between 1 and 10, and in this embodiment, 4 is taken, so that the hidden layer has 6 nodes in total. In this embodiment, the judgment priority of the file information is that the file name is larger than the file source and larger than the file creation time.
The file information acquisition module is used for acquiring file information of the files to be classified. The files to be classified refer to files downloaded on the Internet, such as websites, mails, various social platforms and the like, and files copied from a mobile memory, such as a USB flash disk and the like. Specifically, assume that the custom naming of user a for a file is: case name + file content + file category, and it is customary to place the files of the same belonging case name in the folder named by case name in the F disc, namely the storage path is: f \case name. Then the user a downloads the file X on the Z website at 9 points 28 times of 10/01/2020, and names the file X as m+n+k, that is, the file name is m+n+k, and the file information obtaining module obtains the file information of the file X: the file name is m+n+k, the file creation time is 9 points of 10 months and 01 days in 2020, and the file source is a Z website.
The file storage position analysis module is used for carrying out storage path prediction analysis on file information of the files to be classified through the storage path prediction model to obtain a pre-storage path, and generating path information to be confirmed according to the pre-storage path. In this embodiment, the file storage location analysis module is further configured to generate a manual classification prompt message if the security level of the pre-stored path is an important level; and if the security level of the pre-stored path is the common level, generating the path information to be confirmed.
The interaction module is used for displaying manual classification prompt information and path to-be-confirmed information, wherein the path to-be-confirmed information comprises file information and a corresponding pre-stored path; and the path selection result information comprises file information and corresponding storage paths.
For example, after file information of a file X downloaded by a user A is subjected to storage path prediction analysis through a storage path prediction model, a pre-storage path F/m is obtained, then a corresponding security level is searched on a path security level comparison table according to the pre-storage path F/case name, if the security level is an important level, manual classification prompt information is generated, namely if the user uses a PC end, the manual classification prompt information is displayed on a computer; if the security level is the common level, generating path information to be confirmed, displaying file information of the file X and pre-storing paths in a computer for a user to confirm, and obtaining path selection result information.
The grade analysis module is used for searching the corresponding security grade in the path security grade comparison table according to the storage path, and generating grade setting information if the corresponding security grade is not searched, wherein the grade setting information comprises the storage path and a security grade option. The grade analysis module is also used for searching the corresponding security grade from the path security grade comparison table according to the pre-stored path of the file to be classified.
The interaction module is also used for displaying the grade setting information; and is further configured to obtain level setting result information, where the level setting result information includes a storage path and a selected security level. Specifically, the PC side used by the user a displays options of the storage path and the security level, so that the user a can select and confirm the security level corresponding to the storage path to obtain the level setting result information.
The file storage module is used for storing the files to be classified according to the path selection result information and the storage path.
The grade recording module is used for carrying out record modification on the path security grade comparison table according to the grade setting result information.
Example two
The difference from the first embodiment is that: as shown in fig. 2, the system further includes a file migration monitoring module, where the file migration monitoring module is configured to monitor a file migration condition, and if it is monitored that a file is migrated, obtain a current storage path and an original storage path of the file.
The grade analysis module is also used for searching corresponding safety grades in the path safety grade comparison table according to the current storage path and the original storage path respectively, generating refusing moving information if one of the searched safety grades is an important grade, and discarding the moving information to comprise file information of moving files, the current storage path and the original storage path; if the searched security levels are all ordinary levels, file moving prompt information is generated, wherein the file moving prompt information comprises file information of moving files, a current storage path and an original storage path.
The interaction module is also used for displaying file moving prompt information and acquiring file moving confirmation information, wherein the moving confirmation information comprises permission moving information and abandon moving information.
The file storage module is also used for searching the target moving file according to the current storage path when receiving the refusing moving information, and changing the storage path of the target moving file into the original storage path according to the original storage path. The file storage module is also used for searching the target moving file according to the current storage path when the abandoned moving information is received, and changing the storage path of the target moving file into the original storage path according to the original storage path.
The foregoing is merely exemplary embodiments of the present invention, and specific structures and features that are well known in the art are not described in detail herein. It should be noted that modifications and improvements can be made by those skilled in the art without departing from the structure of the present invention, and these should also be considered as the scope of the present invention, which does not affect the effect of the implementation of the present invention and the utility of the patent. The protection scope of the present application shall be subject to the content of the claims, and the description of the specific embodiments and the like in the specification can be used for explaining the content of the claims.

Claims (4)

1. The intelligent security management storage system is characterized by comprising a storage module, a file information acquisition module, a file storage position analysis module, an interaction module model, a grade analysis module, a grade recording module and a file moving monitoring module, wherein:
the storage module is used for storing the storage path estimation model;
the file information acquisition module is used for acquiring file information of files to be classified, wherein the file information comprises file names;
the file storage position analysis module is used for carrying out storage path prediction analysis on file information of the files to be classified through the storage path prediction model to obtain a pre-storage path, and generating path information to be confirmed according to the pre-storage path;
the interaction module is used for displaying path to-be-confirmed information, wherein the path to-be-confirmed information comprises file information and a corresponding pre-stored path; the method is also used for acquiring path selection result information, wherein the path selection result information comprises file information and a corresponding storage path;
the file storage module is used for storing the files to be classified according to the path selection result information and the storage path;
the storage module is also used for storing a path security level comparison table of security levels corresponding to each storage path, wherein the security levels comprise important levels and common levels;
the grade analysis module is used for searching the corresponding security grade in the path security grade comparison table according to the storage path, and generating grade setting information if the corresponding security grade is not searched, wherein the grade setting information comprises the storage path and a security grade option;
the interaction module is also used for displaying the grade setting information; the system is also used for acquiring grade setting result information, wherein the grade setting result information comprises a storage path and a selected security grade;
the grade recording module is used for carrying out record modification on the path security grade comparison table according to the grade setting result information;
the file moving monitoring module is used for monitoring file moving conditions, and acquiring a current storage path and an original storage path of the file if the file is moved;
the grade analysis module is also used for searching corresponding safety grades in the path safety grade comparison table according to the current storage path and the original storage path respectively, generating refusing moving information if one of the searched safety grades is an important grade, and discarding the moving information to comprise file information of moving files, the current storage path and the original storage path;
the file storage module is also used for searching the target moving file according to the current storage path when receiving the refusing moving information, and changing the storage path of the target moving file into the original storage path according to the original storage path.
2. The intelligent security management storage system of claim 1, wherein: the self-learning module is used for carrying out self-learning training on the storage path estimation model according to the file information acquired by the history and the corresponding storage path to obtain a new storage path estimation model.
3. The intelligent security management storage system of claim 1, wherein: the grade analysis module is also used for searching the corresponding security grade from the path security grade comparison table according to the pre-stored path of the file to be classified,
the file storage position analysis module is also used for generating manual classification prompt information if the security level of the pre-stored path is an important level; and if the security level of the pre-stored path is the common level, generating the path information to be confirmed.
4. The intelligent security management storage system of claim 1, wherein: the grade analysis module is also used for searching corresponding security grades in the path security grade comparison table according to the current storage path and the original storage path respectively, and generating file moving prompt information if the searched security grades are all common grades, wherein the file moving prompt information comprises file information of moving files, the current storage path and the original storage path;
the interaction module is also used for displaying file moving prompt information and acquiring file moving confirmation information, wherein the moving confirmation information comprises permission moving information and abandon moving information;
the file storage module is also used for searching the target moving file according to the current storage path when the abandoned moving information is received, and changing the storage path of the target moving file into the original storage path according to the original storage path.
CN202011480096.8A 2020-12-15 2020-12-15 Intelligent security management storage system Active CN112612749B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011480096.8A CN112612749B (en) 2020-12-15 2020-12-15 Intelligent security management storage system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011480096.8A CN112612749B (en) 2020-12-15 2020-12-15 Intelligent security management storage system

Publications (2)

Publication Number Publication Date
CN112612749A CN112612749A (en) 2021-04-06
CN112612749B true CN112612749B (en) 2023-07-04

Family

ID=75239299

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011480096.8A Active CN112612749B (en) 2020-12-15 2020-12-15 Intelligent security management storage system

Country Status (1)

Country Link
CN (1) CN112612749B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114840620B (en) * 2022-04-01 2023-06-27 广东省国土资源测绘院 Evidence-providing material management method, intelligent terminal and storage medium
CN116226886B (en) * 2023-03-22 2024-02-09 中国移动通信集团广东有限公司 Information security management method and system for software information system

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103064752A (en) * 2011-09-27 2013-04-24 奇智软件(北京)有限公司 Method and device of repairing document
CN103605583A (en) * 2013-07-08 2014-02-26 宇龙计算机通信科技(深圳)有限公司 File recovery method and system
CN105653582A (en) * 2015-12-21 2016-06-08 联想(北京)有限公司 File management method of electronic equipment and electronic equipment
CN106980797A (en) * 2017-03-24 2017-07-25 北京奇虎科技有限公司 A kind of method, device and computing device for realizing file protection
CN108363931A (en) * 2018-02-13 2018-08-03 北京奇安信科技有限公司 A kind of method and device that isolation area file is restored
CN109388538A (en) * 2018-09-13 2019-02-26 西安交通大学 A kind of file operation behavior monitoring method and device based on kernel
CN110083573A (en) * 2019-04-30 2019-08-02 维沃移动通信有限公司 A kind of file management method and mobile terminal

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP5352695B2 (en) * 2005-12-28 2013-11-27 株式会社日本デジタル研究所 Electronic file management method, electronic file management device, electronic file management program, file information generation method, file information generation device, and file information generation program
US8495750B2 (en) * 2010-08-31 2013-07-23 International Business Machines Corporation Filesystem management and security system
CN108763388A (en) * 2014-08-27 2018-11-06 韦雪 To the method and device for downloading file identification, preserving and quickly searching
CN108491549B (en) * 2018-04-09 2022-02-01 深圳市茁壮网络股份有限公司 Method and device for creating file directory in distributed storage system
CN109063105A (en) * 2018-07-27 2018-12-21 北京字节跳动网络技术有限公司 File memory method, device, computer equipment and storage medium
CN109376133B (en) * 2018-09-26 2023-08-18 中国平安人寿保险股份有限公司 File access method and file access system
CN111666259B (en) * 2020-06-06 2023-05-23 智同道合(苏州)信息技术服务有限公司 Document management method, management system, readable storage medium, and electronic device
CN111949611B (en) * 2020-07-30 2021-10-01 广东建采网科技有限公司 File processing method, system, device and medium

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103064752A (en) * 2011-09-27 2013-04-24 奇智软件(北京)有限公司 Method and device of repairing document
CN103605583A (en) * 2013-07-08 2014-02-26 宇龙计算机通信科技(深圳)有限公司 File recovery method and system
CN105653582A (en) * 2015-12-21 2016-06-08 联想(北京)有限公司 File management method of electronic equipment and electronic equipment
CN106980797A (en) * 2017-03-24 2017-07-25 北京奇虎科技有限公司 A kind of method, device and computing device for realizing file protection
CN108363931A (en) * 2018-02-13 2018-08-03 北京奇安信科技有限公司 A kind of method and device that isolation area file is restored
CN109388538A (en) * 2018-09-13 2019-02-26 西安交通大学 A kind of file operation behavior monitoring method and device based on kernel
CN110083573A (en) * 2019-04-30 2019-08-02 维沃移动通信有限公司 A kind of file management method and mobile terminal

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
File Interity Monitor Scheduling Based on File security Level Classification;Zu Hiilmi Abdullah等;《software Engineering and Computer System》;177-189 *
NTFS系统存储介质上文件操作痕迹分析;黄步根;《计算机工程》;第33卷(第23期);287-289 *

Also Published As

Publication number Publication date
CN112612749A (en) 2021-04-06

Similar Documents

Publication Publication Date Title
US20200364244A1 (en) Systems and methods for probabilistic data classification
US10178197B2 (en) Metadata prediction of objects in a social networking system using crowd sourcing
US20150012548A1 (en) Question-related identification of relevant social communities
TWI491217B (en) Method to increase content relevance using insights obtained from user activity updates
JP4848241B2 (en) Method and system for determining a user-specific relevance score for a message in a messaging system
US9946722B2 (en) Generating file usage information
CN112612749B (en) Intelligent security management storage system
US9805042B1 (en) Systems and methods for automatically organizing files and folders
US20110055264A1 (en) Data mining organization communications
US20080172464A1 (en) Generation of contextual information in communication between parties
MX2009000591A (en) Temporal ranking of search results.
US20170208068A1 (en) Masking restrictive access control for a user on multiple devices
CN1648903A (en) Automatic query clustering
US9760622B2 (en) System and method for computerized batching of huge populations of electronic documents
US9385985B2 (en) Systems and methods for assisting users with contact, access, and distribution lists
WO2012125448A2 (en) Systems and methods for message collection
CN105075178A (en) Identifying one or more relevant social networks for one or more collaboration artifacts
CN105787800B (en) Intelligent social platform potential relationship retrieval device, system and method
US20090113281A1 (en) Identifying And Displaying Tags From Identifiers In Privately Stored Messages
US20080288439A1 (en) Combined personal and community lists
KR20170036422A (en) Apparatus, method and computer program for providing service to share knowledge
CN106293650A (en) A kind of folder attribute method to set up and device
US20140067812A1 (en) Systems and methods for ranking document clusters
US20170269798A1 (en) Computerized Content Recommendation Based on Container Interactions
US20170041277A1 (en) Method for distributing a message

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant