CN113806797A - Document encryption method and device, storage medium and processor - Google Patents
Document encryption method and device, storage medium and processor Download PDFInfo
- Publication number
- CN113806797A CN113806797A CN202110927634.1A CN202110927634A CN113806797A CN 113806797 A CN113806797 A CN 113806797A CN 202110927634 A CN202110927634 A CN 202110927634A CN 113806797 A CN113806797 A CN 113806797A
- Authority
- CN
- China
- Prior art keywords
- secret
- document
- basis
- level
- determining
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 97
- 230000004044 response Effects 0.000 claims description 14
- 238000004590 computer program Methods 0.000 claims description 13
- 238000005516 engineering process Methods 0.000 abstract description 4
- 238000010586 diagram Methods 0.000 description 16
- 230000008569 process Effects 0.000 description 8
- 230000006870 function Effects 0.000 description 5
- 238000012216 screening Methods 0.000 description 5
- 230000000694 effects Effects 0.000 description 4
- 230000003287 optical effect Effects 0.000 description 3
- 239000000284 extract Substances 0.000 description 2
- 238000000605 extraction Methods 0.000 description 2
- 230000000873 masking effect Effects 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000001960 triggered effect Effects 0.000 description 2
- 238000012550 audit Methods 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000003058 natural language processing Methods 0.000 description 1
- 230000011218 segmentation Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0481—Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
- G06F3/0482—Interaction with lists of selectable items, e.g. menus
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0484—Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
- G06F3/04847—Interaction techniques to control parameter settings, e.g. interaction with sliders or dials
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Human Computer Interaction (AREA)
- Automation & Control Theory (AREA)
- Document Processing Apparatus (AREA)
Abstract
The application discloses a document encryption method, a document encryption device, a storage medium and a processor. The method comprises the following steps: configuring a plurality of secret levels; configuring a plurality of secret bases and associating each secret base with a corresponding secret level; configuring a plurality of secret types, and associating each secret type with a corresponding secret grade to establish an association relation of a secret determination basis, the secret grade and the secret type; and carrying out encryption processing on the document according to the association relation of the encryption basis, the secret level and the encryption type. By the method and the device, the problem that the processing efficiency of the document encryption in the related technology is low is solved.
Description
Technical Field
The present application relates to the field of document encryption technologies, and in particular, to a document encryption method, an apparatus, a storage medium, and a processor.
Background
In order to avoid divulgence in the process of passing confidential documents, the confidential documents are generally marked. When the confidential documents are subjected to confidentiality marking, confidentiality marking bases are required to be selected, each confidentiality marking base has a corresponding document confidentiality level, different confidentiality levels limit the protection period, the confidential documents and the confidential documents have a certain association relationship, and the confidentiality marking bases, the confidentiality levels and the confidentiality periods of enterprises are different. Therefore, the document drafter is required to be very familiar with the privacy-fixing rule, otherwise, the situation that the privacy-fixing basis is not matched with the privacy level occurs or the privacy time limit exceeds the protection range of the privacy-fixing level requirement, but many document drafters in enterprises are not very familiar and thorough to understand the privacy-fixing rule, so that the workload of checking and modifying the privacy-fixing responsibility person is increased invisibly when the privacy-fixing audit is submitted, and the processing efficiency of the document privacy fixing is influenced.
Aiming at the problem of low processing efficiency of document encryption in the related art, no effective solution is provided at present.
Disclosure of Invention
The present application mainly aims to provide a method, an apparatus, a storage medium, and a processor for document encryption, so as to solve the problem of low processing efficiency of document encryption in the related art.
In order to achieve the above object, according to one aspect of the present application, there is provided a document encrypting method. The method comprises the following steps: configuring a plurality of secret levels; configuring a plurality of secret bases and associating each secret base with a corresponding secret level; configuring a plurality of secret types, and associating each secret type with a corresponding secret grade to establish an association relation of a secret determination basis, the secret grade and the secret type; and carrying out encryption processing on the document according to the association relation of the encryption basis, the secret level and the encryption type.
Further, after configuring the plurality of privacy classes, the method further comprises: configuring a secret level identifier of each secret level; associating each secret reference with a corresponding secret level comprises: and associating the secret rating basis with the secret level and the secret level identification.
Further, before configuring a plurality of security types and associating each security type with a corresponding secret level to establish an association relationship of a secret basis, the secret level and the security type, the method further comprises: and configuring a corresponding display control for each security type.
Further, according to the association relationship among the secret-determining basis, the secret level and the secret type, the encrypting process of the document comprises the following steps: receiving a selected secret-determining basis for the document; determining a secret level corresponding to the secret determining basis according to the association relation; determining a secret type according to the secret level corresponding to the secret determining; and carrying out encryption processing on the document based on the secret level and the secret type.
Further, after receiving the selected basis for determining the security of the document, the method further comprises: judging whether the secret-determining basis is matched with the document; if the matching is successful, executing a step of determining a secret level and a secret type corresponding to the secret determining basis according to the association relation; and if the matching fails, triggering reminding information to remind that the selected password-fixing basis is wrong.
Further, receiving the selected basis for determining the density of the document comprises: extracting key words in the document; displaying a secret-determining basis matched with the keywords; receiving user operation acting on a secret-setting basis; and responding to the user operation, and determining the privacy-determining basis acted by the user operation as the selected privacy-determining basis for the document.
In order to achieve the above object, according to another aspect of the present application, there is also provided a document encrypting method. The method comprises the following steps: responding to a first selection instruction input by a user, selecting a secret-setting basis for setting the secret of the document to be set in the secret-setting basis from a plurality of secret-setting bases, and displaying a secret grade corresponding to the secret-setting basis on a display interface; determining a security type according to the corresponding security level according to the password, and displaying the security type on a display interface; and displaying a security marking result of the document on the display interface, wherein the document is subjected to security marking processing based on the secret level displayed on the display interface and the security type corresponding to the secret level.
Further, after selecting a secret reference for secret marking the document to be secret marked from the plurality of secret references in response to a first selection instruction input by the user, the method further comprises the following steps: judging whether the secret-determining basis is matched with the document; if the password-fixing basis is not matched with the document, displaying reminding information on a display interface to remind that the selected password-fixing basis is wrong.
Further, a plurality of types in the security type include at least: the secret term, the decryption date and the decryption condition, after the display interface displays the secret type, the method further comprises the following steps: responding to a second selection instruction input by a user, selecting at least one target type from the security types, and displaying each target type and a display control corresponding to each target type on a display interface; and responding to an operation instruction input by a user, and displaying the target content indicated by the operation instruction in each display control.
In order to achieve the above object, according to another aspect of the present application, there is provided a document encryption device. The device includes: a first configuration unit for configuring a plurality of secret levels; the second configuration unit is used for configuring a plurality of secret bases and associating each secret base with a corresponding secret level; the third configuration unit is used for configuring a plurality of secret types and associating each secret type with a corresponding secret level so as to establish an association relation among a secret-determining basis, the secret level and the secret type; and the first processing unit is used for carrying out encryption processing on the document according to the association relation among the encryption basis, the secret level and the encryption type.
Further, a fourth configuration unit, configured to, after configuring the plurality of secret levels, the apparatus further includes: configuring a secret level identifier of each secret level; a first associating unit for associating each secret reference with a corresponding secret level, comprising: and associating the secret rating basis with the secret level and the secret level identification.
Further, the apparatus further comprises: and the fifth configuration unit is used for configuring a plurality of security types and associating each security type with a corresponding secret level so as to configure a corresponding display control for each security type before establishing an association relationship among the secret-determining basis, the secret level and the security type.
Further, the first processing unit includes: the first receiving module is used for receiving the selected secret-fixing basis for the document; the first determining module is used for determining the secret level corresponding to the secret determining basis according to the association relation; the second determining module is used for determining the secret type according to the secret level corresponding to the secret determining basis; and the first processing module is used for carrying out encryption processing on the document based on the secret level and the confidentiality type.
Further, the apparatus further comprises: the first matching unit is used for judging whether the selected secret fixing basis for the document is matched with the document or not after receiving the selected secret fixing basis for the document; the first determining unit is used for executing the step of determining the secret according to the corresponding secret grade and the secret type according to the association relation if the matching is successful; and the first triggering unit is used for triggering the reminding information if the matching fails so as to remind the selected password-fixing basis error.
Further, the first receiving module comprises: the extraction submodule is used for extracting keywords in the document; the display sub-module is used for displaying the secret-fixing basis matched with the keywords; the receiving submodule is used for receiving user operation acting on the secret setting basis; and the determining submodule is used for responding to the user operation and determining the density-fixing basis acted by the user operation as the selected density-fixing basis for the document.
In order to achieve the above object, according to another aspect of the present application, there is provided a document encryption device. The device includes: the first response unit is used for responding to a first selection instruction input by a user and selecting a density determining basis for determining the density of the document to be subjected to the density determination from a plurality of density determining bases; the first display unit is used for displaying the secret grade corresponding to the secret fixing basis and the secret type corresponding to the secret grade on the display interface; the second display unit is used for determining the security type according to the corresponding security level according to the password and displaying the security type on the display interface; and the third display unit is used for displaying the encryption result of the document on the display interface, wherein the encryption processing is carried out on the document based on the secret level displayed on the display interface and the encryption type corresponding to the secret level.
Further, the apparatus further comprises: the third display unit is used for judging whether the encryption basis is matched with the document or not after the encryption basis for encrypting the document to be encrypted is selected from a plurality of encryption basis in response to a first selection instruction input by a user; if the password-fixing basis is not matched with the document, displaying reminding information on a display interface to remind that the selected password-fixing basis is wrong.
Further, a plurality of types in the security type include at least: a secret term, a decryption date and a decryption condition, the apparatus further comprising: the second response unit is used for responding to a second selection instruction input by the user after the security types are displayed on the display interface, selecting at least one target type from the security types, and displaying each target type and a display control corresponding to each target type on the display interface; and the third response unit is used for responding to the operation instruction input by the user and displaying the target content indicated by the operation instruction in each display control.
According to another aspect of the embodiments of the present application, there is also provided a processor configured to execute a program, where the program executes to perform the method of any one of the above.
According to another aspect of embodiments of the present application, there is also provided a computer-readable storage medium having stored thereon a computer program/instructions which, when executed by a processor, perform the method of any one of the above.
Through the application, the following steps are adopted: configuring a plurality of secret levels; configuring a plurality of secret bases and associating each secret base with a corresponding secret level; configuring a plurality of secret types, and associating each secret type with a corresponding secret grade to establish an association relation of a secret determination basis, the secret grade and the secret type; and carrying out encryption processing on the document according to the association relation of the encryption basis, the secret level and the encryption type. The problem of lower processing efficiency of document encryption in the related art is solved. By establishing the association relationship among the encryption basis, the secret level and the secret type, the document is encrypted according to the association relationship among the encryption basis, the secret level and the secret type, wherein, by the multi-layer incidence relation of the secret base correlation secret grade and the secret grade correlation secret type, the user can conveniently carry out multi-level screening based on the multi-layer incidence relation, so that after the correct secret base, secret grade and secret type are obtained, the method has the advantages that the document is subjected to encryption, the problem that the encryption of the document fails due to the fact that encryption bases, secret levels and secret types do not correspond to each other is solved, the problem that the encryption can only be correctly performed due to the fact that a user needs to try a combination of multiple encryption bases, secret levels and secret types is solved, the times of encryption of the document are reduced, the effect of improving the processing efficiency of the encryption of the document is achieved, and software and hardware resources used by the encryption of the document are saved.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this application, illustrate embodiments of the application and, together with the description, serve to explain the application and are not intended to limit the application. In the drawings:
FIG. 1 is a flowchart of a document encryption method according to an embodiment of the present application;
FIG. 2 is a schematic illustration of a security type provided according to an embodiment of the present application;
FIG. 3 is a diagram of a privacy-type display control provided in accordance with an embodiment of the present application;
FIG. 4 is a diagram of an alternative document encryption method according to an embodiment of the present application;
FIG. 5 is a flowchart of a document encryption method according to the second embodiment of the present application;
FIG. 6 is a schematic diagram of a display interface selection privacy criterion provided in accordance with an embodiment II of the present application;
FIG. 7 is a diagram illustrating a display control corresponding to a decryption condition according to a second embodiment of the present application;
FIG. 8 is a schematic diagram of a document encryption device provided in accordance with an embodiment of the present application;
fig. 9 is a schematic diagram of a document encryption device provided according to the fourth embodiment of the present application.
Detailed Description
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only partial embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that the terms "first," "second," and the like in the description and claims of this application and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It should be understood that the data so used may be interchanged under appropriate circumstances such that embodiments of the application described herein may be used. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
According to an embodiment of the present application, a document encryption method is provided.
Fig. 1 is a flowchart of a document encryption method according to a first embodiment of the present application. As shown in fig. 1, the method comprises the steps of:
step S101 configures a plurality of secret levels.
A privacy level, abbreviated as "confidentiality level," is a distinction between the degrees of confidentiality of the contents of a document, and a document is provided with a privacy level for identifying the degree of confidentiality of the contents of the document so that a user can save and use the document according to the privacy level of the document.
For example, a confidential document is classified into a core secret and a business secret, three secret levels, namely, a first secret level, a second secret level and a third secret level, are configured in the core secret, and two secret levels, namely, the first secret level and the second secret level, are configured in the business secret. In particular, different privacy levels may be configured to attach different rights ranges, knowledge ranges, and the like. The permission range may include read-only, readable-writable, shareable, and the like. The user, who knows the scope can be used to specify what role can get the document. Further, the document is saved and used according to the attribute added by the secret level.
Step S102, configuring a plurality of secret bases and associating each secret base with a corresponding secret level;
the above-mentioned secret-determining basis may be a legal regulation prescribed in a secret-related country or a secret-related rule set inside each enterprise. For example, the secret rating basis established by the enterprise a is B, and the secret level corresponding to the secret rating basis B is the first secret level.
One secret-determining basis corresponds to one secret level, and each secret-determining basis is associated with the corresponding secret level, so that the corresponding secret level can be quickly found by the subsequent secret-determining basis.
Step S103, configuring a plurality of secret types, and associating each secret type with a corresponding secret level to establish an association relationship among a secret determination basis, the secret level and the secret type.
In one embodiment, the security types may include: a privacy deadline, a decryption condition, and a decryption date, the privacy deadline, the decryption condition, and the decryption date being associated with a corresponding privacy level.
For example, the privacy deadline corresponding to the first privacy level is a first privacy deadline, the first privacy level is associated with the first privacy deadline, and the privacy deadline corresponding to the first privacy level may be determined to be the first privacy deadline as long as it is subsequently determined that the privacy level is the first privacy level. For another example, the decryption condition corresponding to the second secret level is a second decryption condition, the decryption date corresponding to the second secret level is a second decryption date, the second secret level is associated with the second decryption condition and the second decryption date, and as long as it is determined that the secret level is the second secret level, the second decryption condition corresponding to the second secret level, and the second decryption date corresponding to the second secret level can be determined quickly.
For another example, one secret level may be associated with a plurality of secret types, for example, the secret term corresponding to the first secret level is a first secret term and a second secret date, the first secret level is associated with the first secret term and the second secret date, and as long as it is subsequently determined that the secret level is the first secret level, one secret type may be selected from the first secret term and the second secret date as the secret type corresponding to the document encrypted by the first secret level.
The method is used for establishing the association relationship among the secret determination basis, the secret level and the secret type. For example, the first level of security corresponds to a security period of 30 days, and the decryption conditions are: MMM, decryption date: in XX month XX day of XX year, only the secret setting basis is determined, and correspondingly, the secret setting basis can be obtained quickly according to the corresponding secret grade and secret type (secret duration, decryption condition and decryption date) according to the incidence relation of the three, so that the efficiency and accuracy of determining the secret grade and the secret type according to the secret setting basis can be improved.
It should be noted that how to establish the association relationship among the secret-determining basis, the secret level, and the secret type is not limited in this embodiment. For example, the secret-determining basis, the secret level, and the secret type may be stored in the same entry of a database or a configuration file to establish the association. Under the condition that the incidence relation among the secret fixing basis, the secret level and the secret type needs to be determined, data can be read from the database or the configuration file, and under the condition that the secret fixing basis, the secret level and the secret type are stored in the same item of the database or the configuration file, the incidence relation among the secret fixing basis, the secret level and the secret type can be determined.
And step S104, carrying out encryption processing on the document according to the association relation of the encryption basis, the secret level and the encryption type.
After the association relationship among the encryption basis, the secret level and the secret type is established, when the document is subjected to encryption processing, the corresponding secret level and the corresponding secret type (the encryption period, the decryption condition and the decryption date) of the encryption basis can be obtained only based on the encryption basis selected aiming at the document, so that the document is subjected to encryption processing according to the encryption basis selected aiming at the document, the secret level and the corresponding secret type, and the user can conveniently carry out multi-level screening based on the multi-level association relationship by associating the secret level with the secret type according to the encryption basis, so that the document is subjected to encryption processing after the correct encryption basis, secret level and secret type are obtained, the problem that the document encryption fails due to the fact that the encryption basis, the secret level and the secret type do not correspond is solved, and the problem that the document encryption fails due to the fact that the user needs to try various encryption bases, secret levels and secret types is also avoided, The combination of the secret grade and the secret type can only mark the document correctly, the times of marking the document secret are reduced, the efficiency and the accuracy of marking the document secret are improved, the workload of subsequent checking the document secret is reduced, the working efficiency of a secret check verifier is improved, and software and hardware resources used by the document secret are saved.
Optionally, in the document encryption method provided in this application, after configuring the plurality of secret levels, the method further includes: configuring a secret level identifier of each secret level; associating each secret reference with a corresponding secret level comprises: and associating the secret rating basis with the secret level and the secret level identification.
For example, the secret level identifier of the first secret level is four, the secret level identifier of the second secret level is Δ, and the secret level identifier of the third secret level is four, and by configuring the secret level identifier of each secret level and associating each secret reference with the secret level identifier corresponding to the secret level and the secret level, for example, if the first secret reference corresponds to the first secret level and the secret level identifier of the first secret level is four, the first secret reference, the first secret level and the secret level identifier are associated. When the document is subsequently encrypted, besides the characters of the secret level, the identification of the secret level can be displayed, so that the encryption result of the document can be displayed more intuitively and accurately for the user.
Optionally, in the document encryption method provided in this embodiment of the present application, before configuring a plurality of security types and associating each security type with a corresponding secret level to establish an association relationship among a basis for secret determination, the secret level, and the security type, the method further includes: and configuring a corresponding display control for each security type.
For example, the security types described above may include: the security period, the decryption condition, and the decryption date, as shown in fig. 2. Before the association relationship among the secret-determining basis, the secret level and the secret type is established, a corresponding display control can be configured for each secret type, as shown in fig. 3. For example, the display control corresponding to the security deadline is configured as a drop-down box, a plurality of security deadlines, such as 7 days, 15 days, 30 days, and the like, may be set in the drop-down box, and may also be set. The display control corresponding to the decryption condition can be configured as an input box, and a user can input a custom decryption condition. The display control corresponding to the decryption date can be configured as a date box, and when the user sets the decryption date, any date after the current date can be selected in the date box.
The display control corresponding to each confidential type is configured through the scheme, so that the user can configure the confidential types more conveniently subsequently, and the working efficiency and the experience of the user are further improved.
Optionally, in the document encryption method provided in this embodiment of the present application, performing encryption processing on the document according to an association relationship among an encryption basis, a secret level, and a secret type includes: receiving a selected secret-determining basis for the document; determining a secret level corresponding to the secret determining basis according to the association relation; determining a secret type according to the secret level corresponding to the secret determining; and carrying out encryption processing on the document based on the secret level and the secret type.
For example, when a document needs to be encrypted, if a user selects an encryption basis, the encryption basis is correspondingly obtained according to the corresponding secret level and the corresponding secret type (the encryption term, the decryption condition and the decryption date) according to the association relationship among the encryption basis, the secret level and the secret type, and specifically, the secret level can be selected after the encryption basis is selected through the first-level association relationship between the encryption basis and the secret level; further, through the secondary association relationship between the secret level and the secret type, at least one secret type associated with the secret level can be determined, and the user can select one secret type conveniently. And performing multi-level screening by the user based on the multi-layer incidence relation to obtain correct secret-determining basis, secret level and secret type. And then, the document is subjected to encryption processing according to the corresponding secret level and the corresponding secret type of the encryption basis, so that the problems that in the prior art, a document drafter is required to be very familiar with the encryption rule, otherwise, the situation that the encryption basis is not matched with the secret level occurs or the protection range of the encryption term exceeding the secret level requirement exists, but a plurality of document drafters in an enterprise are not very familiar and thorough to understand the encryption rule are solved, the technical effect of linkage control of the encryption basis, the secret level and the secret type is achieved, and the efficiency and the accuracy of encryption processing on the document can be improved.
In order to further ensure the accuracy of the document encryption processing, optionally, in the document encryption method provided in this embodiment of the present application, after receiving the selected encryption basis for the document, the method further includes: judging whether the secret basis is matched with the document; if the matching is successful, executing a step of determining a secret level and a secret type corresponding to the secret determining basis according to the association relation; and if the matching fails, triggering reminding information to remind that the selected password-fixing basis is wrong.
When the secret-determining basis is matched with the document, a keyword can be extracted from the document, and the keyword is compared with the secret-determining basis.
For example, the document a needs to be subjected to encryption processing, after the user selects the encryption basis a for the document a, in order to ensure accuracy, the background extracts keywords in the document a, and matches the keywords with the encryption basis a, for example, a preset keyword list is determined according to the encryption basis a; when the number of the keywords in the document A is the same as that of the keywords in the keyword list exceeds a preset threshold value, the document A and the secret-setting basis A are determined to be matched successfully, the selected secret-setting basis is indicated to be correct, the step of determining the secret level and the secret type corresponding to the secret-setting basis according to the incidence relation can be continuously executed, and if the matching fails, the user is indicated to select the secret-setting basis A which is wrong according to the document A, and reminding information is triggered to remind the user so that the user can select the secret-setting basis again. By the scheme, the accuracy of selecting the secret-setting basis for the document is ensured, and the accuracy of performing secret marking processing on the document subsequently is ensured.
It should be noted that, in the technical scheme for matching the document with the fixed-density basis in the present application, in addition to the above-mentioned scheme for matching the keyword in the document with the fixed-density basis, similarity between the keyword in the document and the keyword determined by the fixed-density basis may be calculated, and if the similarity exceeds the preset similarity, it is determined that the document is successfully matched with the fixed-density basis, so that a specific technical scheme for matching the document with the fixed-density basis in the present application is not limited.
In order to further ensure the accuracy of the selected document density determining basis, optionally, in the document density marking method provided in this embodiment of the present application, the receiving the selected document density determining basis includes: extracting key words in the document; displaying a secret-determining basis matched with the keywords; receiving user operation acting on a secret-setting basis; and responding to the user operation, and determining the privacy-determining basis acted by the user operation as the selected privacy-determining basis for the document.
The scheme for extracting the keywords in the document in the above scheme may be based on a natural language processing algorithm, for example, performing word segmentation processing on the document to obtain a plurality of words, counting the frequency of each word appearing in the document, and using the word with the frequency higher than a preset frequency as the keyword of the document. For example, the keywords in the document are compared with the keywords in each preset keyword list determined by the density determining basis one by one, and when the number of the keywords in the document is the same as the number of the keywords in at least one target keyword list exceeds a preset threshold value, the density determining basis corresponding to the target keyword list is determined as the density determining basis for keyword matching.
For example, the keyword may be matched with one or more privacy bases, the matched privacy bases are displayed for the user to select, and the selected privacy bases are used as the privacy bases of the document.
Optionally, as shown in fig. 4, in the management background, firstly defining the secret level and the secret level content (i.e., the secret level identifier) in the background, then defining the secret reference in the background, associating the secret level with the input secret reference content (corresponding to the associated secret level 1 in fig. 4), and finally defining the secret term content (which may also be understood as the secret type) in the background, determining the name of each secret type, selecting the display control of each secret type, and associating the secret level with the input secret type content (corresponding to the associated secret level 2 in fig. 4), thereby establishing the association relationship among the secret reference, the secret level, and the secret type. Through the scheme, each user can define the secret-determining basis, the secret level and the secret type in a self-defined mode, and the requirement that different users have different secret-determining basis, secret level and secret type is met, so that the scheme has universality for processing secret-related documents.
In summary, in the document encryption method provided by the embodiment of the present application, a plurality of secret levels are configured; configuring a plurality of secret bases and associating each secret base with a corresponding secret level; configuring a plurality of secret types, and associating each secret type with a corresponding secret grade to establish an association relation of a secret determination basis, the secret grade and the secret type; and carrying out encryption processing on the document according to the association relation of the encryption basis, the secret level and the encryption type. The problem of lower processing efficiency of document encryption in the related art is solved. By establishing the association relationship among the encryption basis, the secret level and the secret type, the document is encrypted according to the association relationship among the encryption basis, the secret level and the secret type, by associating the secret level according to the secret rating and the multilayer association relation of the secret type according to the secret rating, a user can conveniently carry out multistage screening based on the multilayer association relation so as to obtain the correct secret determination basis, secret level and secret type, the method has the advantages that the document is subjected to encryption, the problem that the encryption of the document fails due to the fact that encryption bases, secret levels and secret types do not correspond to each other is solved, the problem that the encryption can only be correctly performed due to the fact that a user needs to try a combination of multiple encryption bases, secret levels and secret types is solved, the times of encryption of the document are reduced, the effect of improving the processing efficiency of the encryption of the document is achieved, and software and hardware resources used by the encryption of the document are saved.
Fig. 5 is a flowchart of a document encryption method according to the second embodiment of the present application. As shown in fig. 5, the method comprises the steps of:
step S501, responding to a first selection instruction input by a user, and selecting a density determining basis for marking the density of the document to be marked from a plurality of density determining bases.
Step S502, displaying the secret grade corresponding to the secret-setting basis on the display interface.
Step S503, determining the security type according to the corresponding security level according to the secret setting, and displaying the security type on the display interface.
As shown in fig. 6, if the user clicks the add control at the encryption basis and selects the encryption basis of the document to be encrypted, the display interface displays the corresponding secret level of the encryption basis and the encryption type determined according to the corresponding secret level of the encryption basis, for example, the display interface displays that the secret level is a common commercial secret, and the encryption type is: the duration of the confidentiality is 2 years.
It should be noted that, at the secret reference in the interface shown in fig. 6, the user may click the add control, add a plurality of secret references, if the user selects a plurality of secret references, determine the secret level corresponding to each secret reference, determine the secret level with the highest secret level among the secret levels corresponding to each secret reference as the target secret level, take the target secret level as the secret level corresponding to the selected plurality of secret references, and display the target secret level. For example, the user selects the secret-setting basis 1, the secret-setting basis 2, and the secret-setting basis 3, and the secret-setting basis 1 corresponds to the secret level 1, the secret-setting basis 2 corresponds to the secret level 2, and the secret-setting basis 3 corresponds to the secret level 3. The highest secret level of the secret levels 1, 2 and 3 is the secret level 1, and the secret level 1 is taken as the secret level corresponding to the selected secret basis (secret basis 1, secret basis 2 and secret basis 3), and the secret level 1 is displayed on the display interface.
And step S504, displaying the encryption result of the document on the display interface, wherein the encryption processing is carried out on the document based on the secret level displayed on the display interface and the encryption type corresponding to the secret level.
And carrying out encryption marking processing on the document according to the secret grade displayed on the display interface and the security type corresponding to the secret grade to obtain an encryption marking result of the document, generating a transparent covering layer on a display page of the document, and displaying the encryption marking result of the document on the transparent covering layer. For example, the result of the encryption for document A is: the business secret is 2 days, a transparent masking layer is generated on the display page of the document A, and the business secret is displayed for 2 days on the transparent masking layer.
Through the scheme, the user can quickly determine the secret grade and the secret type corresponding to the secret-determining basis only by selecting the secret-determining basis, and then carry out the secret marking processing on the document according to the secret grade and the secret type corresponding to the secret-determining basis, so that the efficiency and the accuracy of the secret marking processing on the document can be improved.
Optionally, in the document encryption method provided in the second embodiment of the present application, after selecting, in response to a first selection instruction input by a user, an encryption basis for encrypting a document to be encrypted from a plurality of encryption bases, the method further includes: judging whether the secret basis is matched with the document; if the password-fixing basis is not matched with the document, displaying reminding information on a display interface to remind that the selected password-fixing basis is wrong.
For example, the document a needs to be subjected to encryption processing, after the user selects the encryption basis a for the document a, in order to ensure accuracy, the background extracts keywords in the document a, and matches the keywords with the encryption basis a, for example, a preset keyword list is determined according to the encryption basis a; when the number of the keywords in the document a is the same as the number of the keywords in the keyword list exceeds a preset threshold value, it is determined that the document a and the secret setting basis a are successfully matched, the selected secret setting basis is correct, the step S502 can be continuously executed, and if the matching fails, the user selects a wrong secret setting basis a for the document a, and the reminding information is triggered. Through the scheme, the reminding information is displayed on the display interface, so that the user can reselect the secret-setting basis, the accuracy of selecting the secret-setting basis for the document is ensured, and the accuracy of performing secret marking processing on the document subsequently is ensured.
It should be noted that, in the technical scheme for matching the document with the fixed-density basis in the present application, in addition to the above-mentioned scheme for matching the keyword in the document with the fixed-density basis, similarity between the keyword in the document and the keyword determined by the fixed-density basis may be calculated, and if the similarity exceeds the preset similarity, it is determined that the document is successfully matched with the fixed-density basis, so that a specific technical scheme for matching the document with the fixed-density basis in the present application is not limited.
Optionally, in the document encryption method provided in the second embodiment of the present application, a plurality of types in the encryption types include at least: the secret term, the decryption date and the decryption condition, after the display interface displays the secret type, the method further comprises the following steps: responding to a second selection instruction input by a user, selecting at least one target type from the security types, and displaying each target type and a display control corresponding to each target type on a display interface; and responding to an operation instruction input by a user, and displaying the target content indicated by the operation instruction in each display control.
For example, the security type includes a security term, a decryption condition, and a decryption date, and the user may select the decryption condition from the security type, and then display a display control (input box) corresponding to the decryption condition, as shown in fig. 7, the user may edit in the input box to input corresponding content as the decryption condition. And if the user can select the security deadline from the security type, displaying a display control (a pull-down box) corresponding to the security deadline, selecting specific security time in the pull-down box, and taking the selected security time as the security deadline.
Through the scheme, the user can configure the confidential type more conveniently, and the working efficiency and the experience degree of the user are further improved.
It should be noted that the steps illustrated in the flowcharts of the figures may be performed in a computer system such as a set of computer-executable instructions and that, although a logical order is illustrated in the flowcharts, in some cases, the steps illustrated or described may be performed in an order different than presented herein.
The embodiment of the present application further provides a document encryption device, and it should be noted that the document encryption device of the embodiment of the present application can be used to execute the method for encrypting a document provided in the embodiment of the present application. The document encryption device provided by the third embodiment of the present application is introduced below.
Fig. 8 is a schematic diagram of a document encryption device according to a third embodiment of the present application. As shown in fig. 8, the apparatus includes: a first configuration unit 801, a second configuration unit 802, a third configuration unit 803, and a first processing unit 804.
Specifically, a first configuration unit 801 configured to configure a plurality of secret levels;
a second configuration unit 802, configured to configure a plurality of secret bases, and associate each secret base with a corresponding secret level;
a third configuration unit 803, configured to configure a plurality of security types, and associate each security type with a corresponding secret level to establish an association relationship among a secret determination basis, the secret level, and the security type;
the first processing unit 804 is configured to perform encryption processing on the document according to an association relationship among an encryption basis, a secret level, and a secret type.
In the document encryption device provided in the third embodiment of the present application, a plurality of secret levels are configured by the first configuration unit 801; the second configuration unit 802 configures a plurality of secret bases and associates each secret base with a corresponding secret level; the third configuration unit 803 configures a plurality of security types, and associates each security type with a corresponding secret level to establish an association relationship among a secret determination basis, the secret level and the security type; the first processing unit 804 performs encryption processing on the document according to the association relationship among the encryption basis, the secret level and the encryption type, and solves the problem of low processing efficiency of encryption processing on the document in the related art. By establishing the association relationship among the encryption basis, the secret level and the secret type, the document is encrypted according to the association relationship among the encryption basis, the secret level and the secret type, wherein, by the multi-layer incidence relation of the secret base correlation secret grade and the secret grade correlation secret type, the user can conveniently carry out multi-level screening based on the multi-layer incidence relation, so that after the correct secret base, secret grade and secret type are obtained, the method has the advantages that the document is subjected to encryption, the problem that the encryption of the document fails due to the fact that encryption bases, secret levels and secret types do not correspond to each other is solved, the problem that the encryption can only be correctly performed due to the fact that a user needs to try a combination of multiple encryption bases, secret levels and secret types is solved, the times of encryption of the document are reduced, the effect of improving the processing efficiency of the encryption of the document is achieved, and software and hardware resources used by the encryption of the document are saved.
Optionally, in the document encrypting apparatus provided in the third embodiment of the present application, the fourth configuring unit is configured to, after configuring the plurality of secret levels, further include: configuring a secret level identifier of each secret level; a first associating unit for associating each secret reference with a corresponding secret level, comprising: and associating the secret rating basis with the secret level and the secret level identification.
Optionally, in the document encrypting apparatus provided in the third embodiment of the present application, the apparatus further includes: and the fifth configuration unit is used for configuring a plurality of security types and associating each security type with a corresponding secret level so as to configure a corresponding display control for each security type before establishing an association relationship among the secret-determining basis, the secret level and the security type.
Optionally, in the document encrypting apparatus provided in the third embodiment of the present application, the first processing unit 804 includes: the first receiving module is used for receiving the selected secret-fixing basis for the document; the first determining module is used for determining the secret level corresponding to the secret determining basis according to the association relation; the second determining module is used for determining the secret type according to the secret level corresponding to the secret determining basis; and the first processing module is used for carrying out encryption processing on the document based on the secret level and the encryption type.
Optionally, in the document encrypting apparatus provided in the third embodiment of the present application, the apparatus further includes: the first matching unit is used for judging whether the secret reference is matched with the document or not after receiving the selected secret reference for the document; the first determining unit is used for executing the step of determining the secret according to the corresponding secret grade and the secret type according to the association relation if the matching is successful; and the first triggering unit is used for triggering the reminding information if the matching fails so as to remind the selected password-fixing basis error.
Optionally, in the document encrypting apparatus provided in the third embodiment of the present application, the first receiving module includes: the extraction submodule is used for extracting keywords in the document; the display sub-module is used for displaying the secret-fixing basis matched with the keywords; the receiving submodule is used for receiving user operation acting on the secret setting basis; and the determining submodule is used for responding to the user operation and determining the density-fixing basis acted by the user operation as the selected density-fixing basis for the document.
The fourth embodiment of the present application further provides a document encryption device, and it should be noted that the document encryption device of the second embodiment of the present application may be used to execute the method for encrypting a document provided in the second embodiment of the present application. The document encryption device provided in the fourth embodiment of the present application is described below.
Fig. 9 is a schematic diagram of a document encryption device according to a fourth embodiment of the present application. As shown in fig. 9, the apparatus includes: a first response unit 901, a first display unit 902, a second display unit 903 and a third display unit 904.
Specifically, the first response unit 901 is configured to respond to a first selection instruction input by a user, and select a density determining basis for determining a density of a document to be subjected to density determination from a plurality of density determining bases;
a first display unit 902, configured to display, on a display interface, a secret level corresponding to a secret-setting basis;
the second display unit 903 is used for determining the security type according to the corresponding security level according to the password and displaying the security type on a display interface;
and a third display unit 904, configured to display a result of encrypting the document on the display interface, wherein the document is encrypted based on the secret level displayed on the display interface and the security type corresponding to the secret level.
In the document encryption device provided in the fourth embodiment of the present application, the first response unit 901 responds to the first selection instruction input by the user, and selects an encryption basis for encrypting the document to be encrypted from the multiple encryption bases; the first display unit 902 displays the secret level corresponding to the secret-setting basis and the secret type corresponding to the secret level on the display interface; the second display unit 903 is used for determining the security type according to the corresponding security level according to the password and displaying the security type on a display interface; the third display unit 904 displays the result of the encryption of the document on the display interface, wherein the document is subjected to encryption processing based on the privacy level displayed on the display interface and the privacy type corresponding to the privacy level. Through the scheme, the user can quickly determine the secret grade and the secret type corresponding to the secret-determining basis only by selecting the secret-determining basis, and then carry out the secret marking processing on the document according to the secret grade and the secret type corresponding to the secret-determining basis, so that the efficiency and the accuracy of the secret marking processing on the document can be improved.
Optionally, in the document encrypting apparatus provided in the fourth embodiment of the present application, the apparatus further includes: the third display unit is used for judging whether the density basis is matched with the document or not after selecting the density basis for marking the document to be subjected to the density marking from a plurality of density basis in response to a first selection instruction input by a user; if the password-fixing basis is not matched with the document, displaying reminding information on a display interface to remind that the selected password-fixing basis is wrong.
Optionally, in the document encrypting apparatus provided in the fourth embodiment of the present application, a plurality of types among the security types include at least: a secret term, a decryption date and a decryption condition, the apparatus further comprising: the second response unit is used for responding to a second selection instruction input by a user after the security types are displayed on the display interface, selecting at least one target type from the security types, and displaying each target type and a display control corresponding to each target type on the display interface; and the third response unit is used for responding to the operation instruction input by the user and displaying the target content indicated by the operation instruction in each display control.
The document encryption device comprises a processor and a memory, the unit modules and the like are stored in the memory as program units, and the processor executes the program units stored in the memory to realize corresponding functions.
The processor comprises a kernel, and the kernel calls the corresponding program unit from the memory. The kernel can be set to one or more, and document encryption is carried out by adjusting kernel parameters.
The memory may include volatile memory in a computer readable medium, Random Access Memory (RAM) and/or nonvolatile memory such as Read Only Memory (ROM) or flash memory (flash RAM), and the memory includes at least one memory chip.
An embodiment of the present invention provides a storage medium on which a program is stored, the program implementing a document encrypting method when executed by a processor.
The embodiment of the invention provides a processor, which is used for running a program, wherein a document encryption method is executed when the program runs.
The embodiment of the invention provides equipment, which comprises a processor, a memory and a program which is stored on the memory and can run on the processor, wherein the processor executes the program and realizes the following steps: configuring a plurality of secret levels; configuring a plurality of secret bases and associating each secret base with a corresponding secret level; configuring a plurality of secret types, and associating each secret type with a corresponding secret grade to establish an association relation of a secret determination basis, the secret grade and the secret type; and carrying out encryption processing on the document according to the association relation of the encryption basis, the secret level and the encryption type.
The processor executes the program and further realizes the following steps: after configuring the plurality of secret levels, configuring a secret level identification of each secret level; associating each secret reference with a corresponding secret level comprises: and associating the secret rating basis with the secret level and the secret level identification.
The processor executes the program and further realizes the following steps: before configuring a plurality of security types and associating each security type with a corresponding secret level to establish an association relationship among a secret reference, the secret level and the security type, configuring a corresponding display control for each security type.
The processor executes the program and further realizes the following steps: receiving a selected secret-determining basis for the document; determining a secret level corresponding to the secret determining basis according to the association relation; determining a secret type according to the secret level corresponding to the secret determining; and carrying out encryption processing on the document based on the secret level and the secret type.
The processor executes the program and further realizes the following steps: after receiving a selected secret determination basis for the document, judging whether the secret determination basis is matched with the document; if the matching is successful, executing a step of determining a secret level and a secret type corresponding to the secret determining basis according to the association relation; and if the matching fails, triggering reminding information to remind that the selected password-fixing basis is wrong.
The processor executes the program and further realizes the following steps: the receiving the selected basis for determining the density of the document comprises: extracting key words in the document; displaying a secret-determining basis matched with the keyword; receiving user operation acting on the secret-determining basis; and responding to the user operation, and determining the privacy-fixing basis acted by the user operation as the selected privacy-fixing basis for the document.
The processor executes the program and further realizes the following steps: responding to a first selection instruction input by a user, and selecting a density determining basis for marking the density of the document to be marked from a plurality of density determining bases; displaying the secret grade corresponding to the secret determining basis on a display interface; determining a security type according to the corresponding secret level of the secret determining basis, and displaying the security type on the display interface; and displaying a security marking result of the document on the display interface, wherein the document is subjected to security marking processing based on the secret level displayed on the display interface and the security type corresponding to the secret level.
The processor executes the program and further realizes the following steps: after responding to a first selection instruction input by a user and selecting a secret setting basis for setting the secret of a document to be set secret from a plurality of secret setting bases, judging whether the secret setting basis is matched with the document or not; if the password-fixing basis is not matched with the document, displaying reminding information on a display interface to remind that the selected password-fixing basis is wrong.
The processor executes the program and further realizes the following steps: the secret term, the decryption date and the decryption condition, after the display interface displays the secret type, the method further comprises the following steps: responding to a second selection instruction input by a user, selecting at least one target type from the security types, and displaying each target type and a display control corresponding to each target type on a display interface; and responding to an operation instruction input by a user, and displaying the target content indicated by the operation instruction in each display control.
The device herein may be a server, a PC, a PAD, a mobile phone, etc.
The present application further provides a computer program product adapted to perform a program for initializing the following method steps when executed on a data processing device: configuring a plurality of secret levels; configuring a plurality of secret bases and associating each secret base with a corresponding secret level; configuring a plurality of secret types, and associating each secret type with a corresponding secret grade to establish an association relation of a secret determination basis, the secret grade and the secret type; and carrying out encryption processing on the document according to the association relation of the encryption basis, the secret level and the encryption type.
When executed on a data processing device, is further adapted to perform a procedure for initializing the following method steps: after configuring the plurality of secret levels, configuring a secret level identification of each secret level; associating each secret reference with a corresponding secret level comprises: and associating the secret rating basis with the secret level and the secret level identification.
When executed on a data processing device, is further adapted to perform a procedure for initializing the following method steps: before configuring a plurality of security types and associating each security type with a corresponding secret level to establish an association relationship among a secret reference, the secret level and the security type, configuring a corresponding display control for each security type.
When executed on a data processing device, is further adapted to perform a procedure for initializing the following method steps: receiving a selected secret-determining basis for the document; determining a secret level corresponding to the secret determining basis according to the association relation; determining a secret type according to the secret level corresponding to the secret determining; and carrying out encryption processing on the document based on the secret level and the secret type.
When executed on a data processing device, is further adapted to perform a procedure for initializing the following method steps: after receiving a selected secret determination basis for the document, judging whether the secret determination basis is matched with the document; if the matching is successful, executing a step of determining a secret level and a secret type corresponding to the secret determining basis according to the association relation; and if the matching fails, triggering reminding information to remind that the selected password-fixing basis is wrong.
When executed on a data processing device, is further adapted to perform a procedure for initializing the following method steps: the receiving the selected basis for determining the density of the document comprises: extracting key words in the document; displaying a secret-determining basis matched with the keyword; receiving user operation acting on the secret-determining basis; and responding to the user operation, and determining the privacy-fixing basis acted by the user operation as the selected privacy-fixing basis for the document.
When executed on a data processing device, is further adapted to perform a procedure for initializing the following method steps: responding to a first selection instruction input by a user, and selecting a density determining basis for marking the density of the document to be marked from a plurality of density determining bases; displaying the secret grade corresponding to the secret determining basis on a display interface; determining a security type according to the corresponding secret level of the secret determining basis, and displaying the security type on the display interface; and displaying a security marking result of the document on the display interface, wherein the document is subjected to security marking processing based on the secret level displayed on the display interface and the security type corresponding to the secret level.
When executed on a data processing device, is further adapted to perform a procedure for initializing the following method steps: after responding to a first selection instruction input by a user and selecting a secret setting basis for setting the secret of a document to be set secret from a plurality of secret setting bases, judging whether the secret setting basis is matched with the document or not; if the password-fixing basis is not matched with the document, displaying reminding information on a display interface to remind that the selected password-fixing basis is wrong.
When executed on a data processing device, is further adapted to perform a procedure for initializing the following method steps: the secret term, the decryption date and the decryption condition, after the display interface displays the secret type, the method further comprises the following steps: responding to a second selection instruction input by a user, selecting at least one target type from the security types, and displaying each target type and a display control corresponding to each target type on a display interface; and responding to an operation instruction input by a user, and displaying the target content indicated by the operation instruction in each display control.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). The memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in the process, method, article, or apparatus that comprises the element.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The above are merely examples of the present application and are not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.
Claims (12)
1. A method for encrypting a document, comprising:
configuring a plurality of secret levels;
configuring a plurality of secret bases and associating each secret base with a corresponding secret level;
configuring a plurality of secret types, and associating each secret type with a corresponding secret grade to establish an association relation of a secret determination basis, the secret grade and the secret type;
and carrying out encryption processing on the document according to the association relation of the encryption basis, the secret level and the encryption type.
2. The method of claim 1,
after configuring the plurality of privacy classes, the method further comprises: configuring a secret level identifier of each secret level;
associating each secret reference with a corresponding secret level comprises: and associating the secret rating basis with the secret level and the secret level identification.
3. The method of claim 1, wherein the encrypting the document according to the association relationship among the encryption basis, the secret level and the security type comprises:
receiving selected secret-determining basis for the document;
determining the secret level corresponding to the secret determining basis according to the association relation;
determining a secret type according to the secret level corresponding to the secret determining basis;
and carrying out encryption processing on the document based on the secret level and the security type.
4. The method of claim 3, wherein after receiving the selected basis for the document, the method further comprises:
judging whether the secret-determining basis is matched with the document;
if the matching is successful, determining the secret level and the secret type corresponding to the secret determining basis according to the association relation;
and if the matching fails, triggering reminding information to remind that the selected password-fixing basis is wrong.
5. The method of claim 3, wherein receiving the selected basis for the document comprises:
extracting key words in the document;
displaying a secret-determining basis matched with the keyword;
receiving user operation acting on the secret-determining basis;
and responding to the user operation, and determining the secret-determining basis acted by the user operation as the selected secret-determining basis for the document.
6. A method for encrypting a document, comprising:
responding to a first selection instruction input by a user, and selecting a density determining basis for marking the density of the document to be marked from a plurality of density determining bases;
displaying the secret grade corresponding to the secret determining basis on a display interface;
determining a security type according to the corresponding secret level of the secret determining basis, and displaying the security type on the display interface;
and displaying a encryption result of the document on the display interface, wherein encryption processing is carried out on the document based on the secret level displayed on the display interface and the security type corresponding to the secret level.
7. The method of claim 6, wherein after selecting a basis for encrypting the document to be encrypted from a plurality of basis for encrypting in response to a first selection instruction input by a user, the method further comprises:
judging whether the secret-determining basis is matched with the document;
and if the secret-determining basis is not matched with the document, displaying reminding information on the display interface to remind that the selected secret-determining basis is wrong.
8. The method of claim 6, wherein a plurality of the security types include at least: a privacy deadline, a decryption date, and a decryption condition, after the display interface displays the privacy type, the method further comprising:
responding to a second selection instruction input by the user, selecting at least one target type from the security types, and displaying each target type and a display control corresponding to each target type on the display interface;
and responding to the operation instruction input by the user, and displaying the target content indicated by the operation instruction in each display control.
9. A document encryption apparatus, comprising:
a first configuration unit for configuring a plurality of secret levels;
the second configuration unit is used for configuring a plurality of secret bases and associating each secret base with a corresponding secret level;
the third configuration unit is used for configuring a plurality of secret types and associating each secret type with a corresponding secret level so as to establish an association relation among a secret-determining basis, the secret level and the secret type;
and the first processing unit is used for carrying out encryption processing on the document according to the association relation among the encryption basis, the secret level and the encryption type.
10. A document encryption apparatus, comprising:
the first response unit is used for responding to a first selection instruction input by a user and selecting a density determining basis for determining the density of the document to be subjected to the density determination from a plurality of density determining bases;
the first display unit is used for displaying the secret grade corresponding to the secret-fixing basis on the display interface;
the second display unit is used for determining the security type according to the corresponding security level according to the password and displaying the security type on the display interface;
and the third display unit is used for displaying the encryption result of the document on the display interface, wherein the encryption processing is carried out on the document based on the secret level displayed on the display interface and the encryption type corresponding to the secret level.
11. A computer-readable storage medium, on which a computer program/instructions is stored, characterized in that the computer program/instructions, when executed by a processor, performs the method of any one of claims 1 to 8.
12. A processor, characterized in that the processor is configured to run a program, wherein the program when running performs the method of any of claims 1 to 8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110927634.1A CN113806797B (en) | 2021-08-11 | 2021-08-11 | Document encryption method, device, storage medium and processor |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110927634.1A CN113806797B (en) | 2021-08-11 | 2021-08-11 | Document encryption method, device, storage medium and processor |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113806797A true CN113806797A (en) | 2021-12-17 |
CN113806797B CN113806797B (en) | 2024-09-06 |
Family
ID=78893588
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110927634.1A Active CN113806797B (en) | 2021-08-11 | 2021-08-11 | Document encryption method, device, storage medium and processor |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113806797B (en) |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6598161B1 (en) * | 1999-08-09 | 2003-07-22 | International Business Machines Corporation | Methods, systems and computer program products for multi-level encryption |
CN102006302A (en) * | 2010-12-03 | 2011-04-06 | 中国软件与技术服务股份有限公司 | Method for identifying security classification of electronic file |
CN102436599A (en) * | 2011-10-28 | 2012-05-02 | 中国舰船研究设计中心 | Secret determination information accounting method based on cascade secret determination information synchronous processing system |
CN102819604A (en) * | 2012-08-20 | 2012-12-12 | 徐亮 | Method for retrieving confidential information of file and judging and marking security classification based on content correlation |
CN102902931A (en) * | 2011-07-28 | 2013-01-30 | 中国航天科工集团第二研究院七〇六所 | File encryption system and file encryption method |
CN104134046A (en) * | 2014-07-29 | 2014-11-05 | 深圳市中兴移动通信有限公司 | Encryption method and device |
US20160344556A1 (en) * | 2013-12-27 | 2016-11-24 | Beijing Kingsoft Office Software Co., Ltd | Document encryption prompt method and system |
CN106790174A (en) * | 2016-12-29 | 2017-05-31 | 成都三零盛安信息系统有限公司 | Security level identification method and device |
US20200342059A1 (en) * | 2019-04-29 | 2020-10-29 | Abbyy Production Llc | Document classification by confidentiality levels |
CN112380554A (en) * | 2020-11-26 | 2021-02-19 | 北京京航计算通讯研究所 | Electronic document encryption calibration system and method based on operating system |
CN112583833A (en) * | 2020-12-14 | 2021-03-30 | 珠海格力电器股份有限公司 | Data encryption processing method and device, electronic equipment and storage medium |
-
2021
- 2021-08-11 CN CN202110927634.1A patent/CN113806797B/en active Active
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6598161B1 (en) * | 1999-08-09 | 2003-07-22 | International Business Machines Corporation | Methods, systems and computer program products for multi-level encryption |
CN102006302A (en) * | 2010-12-03 | 2011-04-06 | 中国软件与技术服务股份有限公司 | Method for identifying security classification of electronic file |
CN102902931A (en) * | 2011-07-28 | 2013-01-30 | 中国航天科工集团第二研究院七〇六所 | File encryption system and file encryption method |
CN102436599A (en) * | 2011-10-28 | 2012-05-02 | 中国舰船研究设计中心 | Secret determination information accounting method based on cascade secret determination information synchronous processing system |
CN102819604A (en) * | 2012-08-20 | 2012-12-12 | 徐亮 | Method for retrieving confidential information of file and judging and marking security classification based on content correlation |
US20160344556A1 (en) * | 2013-12-27 | 2016-11-24 | Beijing Kingsoft Office Software Co., Ltd | Document encryption prompt method and system |
CN104134046A (en) * | 2014-07-29 | 2014-11-05 | 深圳市中兴移动通信有限公司 | Encryption method and device |
CN106790174A (en) * | 2016-12-29 | 2017-05-31 | 成都三零盛安信息系统有限公司 | Security level identification method and device |
US20200342059A1 (en) * | 2019-04-29 | 2020-10-29 | Abbyy Production Llc | Document classification by confidentiality levels |
CN112380554A (en) * | 2020-11-26 | 2021-02-19 | 北京京航计算通讯研究所 | Electronic document encryption calibration system and method based on operating system |
CN112583833A (en) * | 2020-12-14 | 2021-03-30 | 珠海格力电器股份有限公司 | Data encryption processing method and device, electronic equipment and storage medium |
Non-Patent Citations (1)
Title |
---|
刘霞;: "以定密管理系统为依托有效开展定密、涉密电子文档标密工作", 保密科学技术, no. 11, 10 November 2014 (2014-11-10) * |
Also Published As
Publication number | Publication date |
---|---|
CN113806797B (en) | 2024-09-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10817619B1 (en) | Method and system for securing data stored in a cloud-based software system | |
CN108292231B (en) | Method and system for generating applications from data | |
US20160379139A1 (en) | Adaptive classification of data items | |
US20170154188A1 (en) | Context-sensitive copy and paste block | |
US10462148B2 (en) | Dynamic data masking for mainframe application | |
RU2714609C1 (en) | Automation of document generation | |
EP3133507A1 (en) | Context-based data classification | |
US20170124336A1 (en) | Computer-Implemented System And Method For Automatically Identifying Attributes For Anonymization | |
EP3971798A1 (en) | Data processing method and apparatus, and computer readable storage medium | |
US20180129819A1 (en) | Redacting restricted content in files | |
EP3196798A1 (en) | Context-sensitive copy and paste block | |
US11630924B2 (en) | Sharing data with a particular audience | |
CN111737304B (en) | Processing method, device and equipment of block chain data | |
CN112150113A (en) | Method, device and system for borrowing file data and method for borrowing data | |
US11693960B2 (en) | System and method for detecting leaked documents on a computer network | |
CN110532773B (en) | Malicious access behavior identification method, data processing method, device and equipment | |
JP6596848B2 (en) | Access right estimation apparatus and access right estimation program | |
CN109359274B (en) | Method, device and equipment for identifying character strings generated in batch | |
CN117407893A (en) | Data authority management method, device, equipment and medium based on API configuration | |
CN113806797A (en) | Document encryption method and device, storage medium and processor | |
WO2023244383A1 (en) | Preventing data spillage in multi-tenant services via request and response containerization with provenance checks | |
CN115730012A (en) | Database desensitization method and system | |
CN115081017A (en) | Large-field data calling method and system | |
CN112580080A (en) | Data desensitization system based on management strategy | |
CN111858499A (en) | File identification method, system and device based on black and white list |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |