CN114329366B - Network disk file control method and device, network disk and storage medium - Google Patents

Network disk file control method and device, network disk and storage medium Download PDF

Info

Publication number
CN114329366B
CN114329366B CN202210243694.6A CN202210243694A CN114329366B CN 114329366 B CN114329366 B CN 114329366B CN 202210243694 A CN202210243694 A CN 202210243694A CN 114329366 B CN114329366 B CN 114329366B
Authority
CN
China
Prior art keywords
file
network disk
attribute
tracing information
disk file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210243694.6A
Other languages
Chinese (zh)
Other versions
CN114329366A (en
Inventor
杜志杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tianjin Lenovo Collaboration Technology Inc
Original Assignee
Tianjin Lenovo Collaboration Technology Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tianjin Lenovo Collaboration Technology Inc filed Critical Tianjin Lenovo Collaboration Technology Inc
Priority to CN202210243694.6A priority Critical patent/CN114329366B/en
Publication of CN114329366A publication Critical patent/CN114329366A/en
Application granted granted Critical
Publication of CN114329366B publication Critical patent/CN114329366B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The embodiment of the invention discloses a network disk file control method, a network disk file control device, a network disk and a storage medium. Wherein the method comprises the following steps: receiving a network disk file downloading request, and determining tracking and tracing information according to the network disk file downloading request; generating a download backup file for the network disk file; recording the tracing information in a network disk log, and generating an encrypted character string according to the tracing information; judging whether the network disk file is a binary document file or not, and determining an attribute adding class corresponding to the office operation component according to the type of the network disk file when the network disk file is the binary document file; adding a tracking traceability information attribute for the downloaded backup file by using the attribute addition class, and writing the encrypted character string as a new attribute value into the downloaded backup file; and providing the download backup file with the newly added attribute for a download requester.

Description

Network disk file control method and device, network disk and storage medium
Technical Field
The embodiment of the invention relates to the technical field of network disks, in particular to a network disk file control method, a network disk file control device, a network disk and a storage medium.
Background
The network disk is an online storage service released by internet companies. The network disk system machine room divides a certain disk space for users, provides file management functions such as storage, access, backup and sharing of files for the users free or charged, and has high-level disaster recovery backup all over the world. The user can see the network disk as a hard disk or a U disk placed on a network, whether in home, a unit or anywhere else, and can realize management and editing of files in the network disk as long as the network disk is connected to the Internet. The portable type solar water heater is not required to be carried about and is not afraid of being lost.
Enterprise data security is particularly important. The network disk is strict in safety management of files, different authorities are possessed for the same file of different users, and sensitive information in the network disk file can be effectively prevented from leaking through different settings of the authorities. However, the user may distribute the network disk file through the network disk, which may result in the network disk file being downloaded locally by other people, and further cause the information to be exposed on the public network. Risks of leakage of important information. Once information leakage occurs, the source of the file needs to be traced. At present, the commonly adopted tracing mode is a digital watermark mode, namely, when a file is downloaded from a network disk, a bright watermark or a dark watermark is added to the file.
In the process of implementing the invention, the inventor finds the following technical problems: the watermark is generally in a logo or encrypted dot matrix mode, is obvious to a user, and can be deleted deliberately and easily to lose the possibility of reverse tracing of the file in order to avoid pursuing responsibility under the condition of keeping the original format of the file. So that the tracing lacks stability and has more serious performance problems. Especially, for some large files or files with complex formats, increasing watermarks requires a large amount of computation, takes a long time, and in extreme cases, may cause failure, and may not meet the use requirements of users.
Disclosure of Invention
The embodiment of the invention provides a network disk file control method, a network disk file control device, a network disk and a storage medium, and aims to solve the technical problem that the traceability of network disk files cannot meet the requirements of users in the prior art.
In a first aspect, an embodiment of the present invention provides a network disk file control method, including:
receiving a network disk file downloading request, and determining tracking and tracing information according to the network disk file downloading request;
generating a download backup file for the network disk file;
recording the tracing information in a network disk log, and generating an encrypted character string according to the tracing information;
judging whether the network disk file is a binary document file or not, and determining a class corresponding to a corresponding office operation component according to the type of the network disk file when the network disk file is the binary document file;
adding a tracking traceability information attribute for the downloaded backup file by using the attribute addition class, and writing the encrypted character string as a new attribute value into the downloaded backup file;
and providing the download backup file with the newly added attribute to a download requester.
In a second aspect, an embodiment of the present invention further provides a network disk file control apparatus, including:
the receiving module is used for receiving a network disk file downloading request and determining tracking and tracing information according to the network disk file downloading request;
the generating module is used for generating a downloading backup file for the network disk file;
the recording module is used for recording the tracing information in a network disk log and generating an encrypted character string according to the tracing information;
the judging module is used for judging whether the network disk file is a binary document file or not, and determining a class corresponding to the office operation component according to the type of the network disk file when the network disk file is the binary document file;
the newly-added module is used for adding a tracking and tracing information attribute for the downloaded backup file by using the attribute addition class and writing the encrypted character string serving as a newly-added attribute value into the downloaded backup file;
and the providing module is used for providing the download backup file with the new added attribute for the download requester.
In a third aspect, an embodiment of the present invention further provides a network disk, including:
one or more processors;
storage means for storing one or more programs;
when the one or more programs are executed by the one or more processors, the one or more processors are enabled to implement the network disk file control method provided by the above embodiment.
In a fourth aspect, an embodiment of the present invention further provides a storage medium containing computer-executable instructions, where the computer-executable instructions are executed by a computer processor to perform the network disk file control method provided in the foregoing embodiment.
According to the network disk file control method, the network disk file control device, the network disk and the storage medium, provided by the embodiment of the invention, the tracking and tracing information is determined according to the network disk file downloading request by receiving the network disk file downloading request; generating a download backup file for the network disk file; recording the tracing information in a network disk log, and generating an encrypted character string according to the tracing information; judging whether the network disk file is a binary document file or not, and determining a class corresponding to the corresponding office operation component according to the type of the network disk file when the network disk file is the binary document file; adding the tracking and tracing information attribute for the download backup file by using the attribute addition class, and writing the encrypted character string serving as a new attribute value into the download backup file; and providing the download backup file with the newly added attribute for a download requester. When the network disk downloads the file, the user-defined mark attribute is added to the file, and the encrypted file reverse tracing necessary information is used as the attribute value to be utilized, and the class corresponding to the office operation component is written into the corresponding backup file for the downloading requester to obtain. The encrypted file reverse tracing necessary information can be analyzed to obtain corresponding tracing information. Compared with other modes, the method is not easy to identify, has stronger stability, has smaller computation amount, and can better meet the downloading requirement of the network disk file under the condition of meeting the requirement of file tracing.
Drawings
Other features, objects and advantages of the invention will become more apparent upon reading of the detailed description of non-limiting embodiments made with reference to the following drawings:
fig. 1 is a schematic flowchart of a network disk file control method according to an embodiment of the present invention;
fig. 2 is a schematic flowchart of a network disk file control method according to a second embodiment of the present invention;
fig. 3 is a schematic flowchart of a network disk file control method according to a third embodiment of the present invention;
fig. 4 is a schematic flowchart of a network disk file control method according to a fourth embodiment of the present invention;
fig. 5 is a schematic structural diagram of a network disk file control apparatus according to a fifth embodiment of the present invention;
fig. 6 is a schematic structural diagram of a mesh disc according to a sixth embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the invention and are not to be construed as limiting the invention. It should be further noted that, for the convenience of description, only some of the structures related to the present invention are shown in the drawings, not all of the structures.
Example one
Fig. 1 is a schematic flowchart of a network disk file control method according to an embodiment of the present invention, where this embodiment is applicable to a case where a login device is used to control a network disk file in a different location, and the method may be executed by a network disk file control apparatus, and specifically includes the following steps:
step 110, receiving a network disk file downloading request, and determining the tracking and tracing information according to the network disk file downloading request.
Generally, a user can download a corresponding file from a network disk, so as to facilitate offline processing of the file. The network disk can receive a downloading request of a user for the network disk file. After receiving a download request of the network disk file, the tracing information of the network disk file can be determined according to the specific content of the request.
The tracing and tracing information is used for representing intellectual property attribution of the file and corresponding information flowing out of the network disk. Therefore, the tracking and tracing information of the off-disk file can be determined by utilizing the time corresponding to the network disk file downloading request, the information of the requester and the network disk file. For example, the tracing information may include: advanced trace traceability information, comprising: ID of the network disk file, ID of a downloader, downloading time and storage path of the network disk file; and/or the primary tracing information comprises: the login name, name of the downloader, and the name of the network disk file.
And step 120, generating a download backup file for the network disk file.
In this embodiment, the trace source information may be secretly written into the network disk file. Since the network disk file may be downloaded by different users many times. Therefore, in this embodiment, a corresponding backup file is generated for the network disk file corresponding to the download request, so as to facilitate writing of the tracking and tracing information. For example, a temporary storage area may be set, and the network disk file may be copied in the temporary storage area to form a downloaded backup file.
And step 130, recording the tracking and tracing information in a network disk log, and generating an encrypted character string according to the tracking and tracing information.
The tracing information can be written into the network disk system log. Therefore, when the network disk file leaks, the tracing information recorded in the network disk log is used for tracing, and the intellectual property attribution problem of the network disk file can be effectively solved. Accordingly, in this embodiment, since the tracking and tracing information is written into the binary file of the network disk file, in order to avoid being deleted maliciously, the tracking and tracing information may be encrypted to generate an encrypted character string, so as to prevent a user from maliciously identifying the corresponding tracking and tracing information, and the encrypted character string may be generated according to the tracking and tracing information.
And 140, judging whether the network disk file is a binary document file or not, and determining a class corresponding to the office operation component according to the type of the network disk file when the network disk file is the binary document file.
For four file formats, namely doc, xls, ppt and pdf, files in the formats are stored in a binary mode. The corresponding content is added by directly modifying the file, so that the file is damaged or the information is lost. Therefore, in the embodiment, when the file is judged to be a binary document file, the encrypted character string can be written into the binary document file by using the office operation component in java. Because the classes corresponding to different types of files are different, the class corresponding to the corresponding office operation component needs to be determined according to the different types of files.
And 150, adding the tracking and tracing information attribute for the downloaded backup file by using the attribute addition class, and writing the encrypted character string serving as a new attribute value into the downloaded backup file.
And adding the tracking and tracing information attribute for the downloaded backup file by using the corresponding attribute addition class. And writing the encrypted character string as a new attribute value into a download backup file. For example, the tracing information may be used as an attribute name, and the corresponding encrypted string may be written into the download backup file as a new attribute value. For example, the new attribute and the corresponding attribute value may be added in an add (ID of the network disk file, encrypted string corresponding to the ID value) manner as a parameter of the class. Further, in order to prevent the attribute from being maliciously deleted, the attribute name may be encrypted and used as the attribute name.
Step 160, providing the download backup file with the new added attribute to the download requester.
And writing the tracking and tracing information attribute and the encrypted character string into a binary file, and taking the file as a download backup file. The user may download to a binary file that adds an encrypted string of trace traceability information. Once intellectual property disputes occur, the leaked files can be uploaded to the network disk system. The network disk system obtains corresponding tracing information after reading corresponding attributes and corresponding encrypted character strings and analyzing the attributes and the corresponding encrypted character strings, and can further obtain more information of the file by linkage query in the network disk according to the obtained tracing information, thereby providing corresponding reference data for determining intellectual property attribution and a leakage source.
In this embodiment, by receiving a network disk file downloading request, tracking and tracing information is determined according to the network disk file downloading request; generating a download backup file for the network disk file; recording the tracing information in a network disk log, and generating an encrypted character string according to the tracing information; judging whether the network disk file is a binary document file or not, and determining a class corresponding to a corresponding office operation component according to the type of the network disk file when the network disk file is the binary document file; adding a tracking traceability information attribute for the downloaded backup file by using the attribute addition class, and writing the encrypted character string as a new attribute value into the downloaded backup file; and providing the download backup file with the newly added attribute for a download requester. When the network disk downloads the file, the user-defined mark attribute is added to the file, and the encrypted file reverse tracking necessary information is used as an attribute value and is written into a corresponding backup file by using a class corresponding to the corresponding office operation component for being acquired by a downloading requester. The encrypted file reverse tracing necessary information can be analyzed to obtain corresponding tracing information. Compared with other modes, the method is not easy to identify, has stronger stability, has smaller computation amount, and can better meet the downloading requirement of the network disk file under the condition of meeting the requirement of file tracing.
In a preferred embodiment of this embodiment, the method may further include the following steps: and after downloading is finished, deleting the downloaded backup file. The method can effectively reduce the pressure of the backup files on the storage system, and can also avoid the problem that the source cannot be traced due to file issuing errors.
In another preferred implementation of this embodiment, the attribute adding class may be further used as the attribute of the newly added tracking and tracing information of the download backup file, and the encrypted character string is written into the download backup file as a newly added attribute value, which is specifically optimized as follows: and when the network disk file is a PPT file or a PDF file, setting a tracking and tracing information attribute for the downloaded backup file by using the attribute setting class, and writing the encrypted character string serving as a set attribute value into the downloaded backup file. For PPT and PDF files, the new attribute and the corresponding attribute value cannot be completed in add (ID of network disk file, encrypted character string corresponding to ID value). Therefore, it is necessary to implement the new attribute and the corresponding attribute value by using a set (ID of the network disk file, encrypted string corresponding to the ID value).
Example two
Fig. 2 is a schematic flowchart of a network disk file control method according to a second embodiment of the present invention. In this embodiment, the generating of the encrypted character string according to the tracing information may be specifically optimized as follows: determining an organization architecture level corresponding to the network disk file download requester, and generating an encryption character string according to the primary tracking and tracing information when the level is greater than a preset level standard; otherwise, generating an encryption character string according to the high-level tracing information.
Correspondingly, the method for controlling the network disk file provided by the embodiment specifically includes:
step 210, receiving a network disk file downloading request, and determining the tracking and tracing information according to the network disk file downloading request.
Step 220, generating a download backup file for the network disk file.
Step 230, recording the tracing and tracing information in the network disk log, determining an organizational structure hierarchy corresponding to the network disk file download requester, and generating an encryption character string according to the primary tracing and tracing information when the hierarchy is greater than a preset hierarchy standard.
Certain computation amount and computation time are also needed for writing information into the binary file. Therefore, the amount of information written should be reduced as much as possible while ensuring that tracing can be accurately performed.
In general, a person with a higher position has a lower possibility of disclosure, and therefore, less tracing information can be selected according to such a situation. And the possibility of disclosure of the people with lower positions is higher, so that the hierarchy corresponding to the organization structure of the network disk file download requester on the network disk system can be firstly determined, and if the hierarchy is greater than the preset hierarchy standard, the people can be considered to have higher positions, and therefore, the encrypted character string can be generated only by adopting the primary tracking and tracing information.
Accordingly, if the requester for downloading the web disk file is smaller than the predetermined level standard, the requester may be a person with a lower position, and the possibility of disclosure is low. Therefore, it is necessary to generate an encrypted string using advanced traceback information.
In addition, the source of the network disk file can be considered, if the network disk file downloading requester is the creator and the system editor of the file, the possibility of disclosure is considered to be low, and therefore, the encryption character string can be generated by only adopting the primary tracing and tracing information. If the user is a common user, correspondingly, the high-level tracing information is adopted to generate the encrypted character string.
And 240, judging whether the network disk file is a binary document file or not, and determining a class corresponding to the office operation component according to the type of the network disk file when the network disk file is the binary document file.
And 250, adding a tracing information attribute for the downloaded backup file by using the attribute addition class, and writing the encrypted character string as a new attribute value into the downloaded backup file.
And step 260, providing the download backup file with the newly added attribute to the download requester.
In this embodiment, the generating of the encrypted character string according to the tracing information is specifically optimized as follows: determining an organization architecture level corresponding to the network disk file download requester, and generating an encryption character string according to the primary tracking and tracing information when the level is greater than a preset level standard; otherwise, generating an encryption character string according to the high-level tracing information. The increased data volume of the tracing and tracing information can be determined according to the actual situation of the actual downloading requester. And the written information amount is reduced under the condition of ensuring accurate tracing. Further, the calculation amount of data is reduced, and the calculation time is shortened.
EXAMPLE III
Fig. 3 is a schematic flow chart of a network disk file control method according to a third embodiment of the present invention. In this embodiment, the attribute addition class may be used as the attribute of the newly added tracking and tracing information of the downloaded backup file, and the encrypted character string may be written in the downloaded backup file as a newly added attribute value, which is specifically optimized as follows: and when the hierarchy is greater than the preset hierarchy standard, newly adding a single newly added tracking and tracing information attribute for the download backup file by using the attribute addition class, and writing all encrypted character strings into the download backup file as newly added attribute values of the single newly added tracking and tracing information attribute.
Correspondingly, the method for controlling the network disk file provided by the embodiment specifically includes:
step 310, receiving a network disk file downloading request, and determining tracking and tracing information according to the network disk file downloading request.
And step 320, generating a download backup file for the network disk file.
Step 330, recording the tracing and tracing information in the network disk log, determining an organizational structure hierarchy corresponding to the network disk file download requester, and generating an encryption character string according to the primary tracing and tracing information when the hierarchy is greater than a preset hierarchy standard.
And 340, judging whether the network disk file is a binary document file or not, and determining a class corresponding to the office operation component according to the type of the network disk file when the network disk file is the binary document file.
Step 350, when the level is greater than the preset level standard, adding a single newly added tracking and tracing information attribute for the downloaded backup file by using the attribute addition class, and writing all the encrypted character strings into the downloaded backup file as a newly added attribute value of the single newly added tracking and tracing information attribute.
When there are a plurality of attributes, it is necessary to add an attribute and an attribute value by using a function for each attribute. Therefore, multiple call classes are required to be added, and thus a longer time is required to add completion. Since the high-level user has a low possibility of revealing the file, all the encrypted strings can be written into the binary file as a value of one attribute. So as to reduce the operation amount and the operation time. And the response speed is improved. Meanwhile, the network disk can still analyze all newly added encrypted character strings in the file and track and trace the source through the network disk log.
And step 360, providing the download backup file with the newly added attribute to the download requester.
In this embodiment, the attribute addition class is used as the attribute of the newly added tracking and tracing information of the downloaded backup file, and the encrypted character string is written into the downloaded backup file as a newly added attribute value, which is specifically optimized as follows: and when the level is greater than the preset level standard, newly adding a single newly added tracking and tracing information attribute for the downloaded backup file by using the attribute addition class, and writing all encrypted character strings into the downloaded backup file as the newly added attribute values of the single newly added tracking and tracing information attribute. The number of times of calling attribute addition classes can be reduced under the condition of ensuring accurate tracking and tracing. Further, the operation amount of data is reduced, and the operation time is shortened.
Example four
Fig. 4 is a flowchart illustrating a network disk file control method according to a fourth embodiment of the present invention. In this embodiment, the attribute addition class may be used as the attribute of the newly added tracking and tracing information of the downloaded backup file, and the encrypted character string may be written in the downloaded backup file as a newly added attribute value, which is specifically optimized as follows: and when the level is smaller than the preset level standard, adding at least two tracking and tracing information attributes for the downloaded backup file by using the attribute addition class, and writing the encrypted character string into the downloaded backup file as a corresponding attribute added attribute value of the at least two tracking and tracing information attributes.
Correspondingly, the method for controlling the network disk file provided by the embodiment specifically includes:
and step 410, receiving a network disk file downloading request, and determining the tracking and tracing information according to the network disk file downloading request.
And step 420, generating a download backup file for the network disk file.
And 430, recording the tracking and tracing information in a network disk log, determining an organizational structure level corresponding to the network disk file download requester, and generating an encryption character string according to the primary tracking and tracing information when the level is greater than a preset level standard.
Step 440, judging whether the network disk file is a binary document file, and determining a class corresponding to the office operation component according to the type of the network disk file when the network disk file is the binary document file.
And step 450, when the level is smaller than the preset level standard, adding at least two tracking and tracing information attributes for the downloaded backup file by using the attribute addition class, and writing the encrypted character strings corresponding to the at least two tracking and tracing information attributes into the downloaded backup file as the attribute added attribute values corresponding to the at least two tracking and tracing information attributes.
In order to prevent malicious or unintentional attribute deletion, in this embodiment, at least two tracking and tracing information attributes may be set when the download user level is smaller than a preset level standard or is a common user. Illustratively, the advanced tracing information can be randomly combined to generate a corresponding character string. And correspondingly writing the attribute adding classes to avoid the condition that the tracing information cannot occur due to malicious or unintentional attribute deleting operation, and reducing the times of calling the attribute adding classes. Meanwhile, the network disk can still analyze all newly added encrypted character strings in the file and track and trace the source through the network disk log.
Step 460, providing the download backup file with the new added attribute to the download requester.
In this embodiment, the attribute addition class is used as the attribute of the newly added tracking and tracing information of the downloaded backup file, and the encrypted character string is written into the downloaded backup file as a newly added attribute value, which is specifically optimized as follows: and when the level is smaller than the preset level standard, adding at least two tracking and tracing information attributes for the downloaded backup file by using the attribute addition class, and writing the encrypted character string into the downloaded backup file as a new attribute value corresponding to the at least two tracking and tracing information attributes. Malicious or unintentional attribute deletion operations are effectively prevented. And the number of times the attribute addition class is called can be reduced. Further, the calculation amount of data is reduced, and the calculation time is shortened.
EXAMPLE five
Fig. 5 is a schematic structural diagram of a network disk file control apparatus according to a fifth embodiment of the present invention, and as shown in fig. 5, the apparatus includes:
the receiving module 510 is configured to receive a network disk file downloading request, and determine tracking and tracing information according to the network disk file downloading request;
a generating module 520, configured to generate a download backup file for the network disk file;
the recording module 530 is configured to record the trace source tracing information in a network disk log, and generate an encrypted character string according to the trace source tracing information;
the determining module 540 is configured to determine whether the network disk file is a binary document file, and determine an attribute addition class corresponding to the office operation component according to the type of the network disk file when the network disk file is the binary document file;
the adding module 550 is configured to add a tracking and tracing information attribute to the downloaded backup file by using the attribute addition class, and write the encrypted character string as a new attribute value into the downloaded backup file;
and the providing module 560 is configured to provide the download backup file with the new added attribute to the download requester.
The network disk file control device provided by this embodiment determines, by receiving a network disk file download request, tracking and tracing information according to the network disk file download request; generating a download backup file for the network disk file; recording the tracing information in a network disk log, and generating an encrypted character string according to the tracing information; judging whether the network disk file is a binary document file or not, and determining a class corresponding to a corresponding office operation component according to the type of the network disk file when the network disk file is the binary document file; adding the tracking and tracing information attribute for the download backup file by using the attribute addition class, and writing the encrypted character string serving as a new attribute value into the download backup file; and providing the download backup file with the newly added attribute for a download requester. When the files are downloaded through the network disk, custom mark attributes are added to the files, and the encrypted file reverse tracking necessary information is used as attribute values and written into corresponding backup files by using classes corresponding to the corresponding office operation components, so that a download requester can obtain the information. The encrypted file reverse tracing necessary information can be analyzed, and corresponding tracing information can be obtained. Compared with other modes, the method is not easy to identify, has stronger stability, has smaller computation amount, and can better meet the downloading requirement of the network disk file under the condition of meeting the requirement of file tracing.
On the basis of the above embodiments, the apparatus further includes:
and the deleting module is used for deleting the downloaded backup file after the downloading is finished.
On the basis of the foregoing embodiments, the tracing information includes:
advanced trace traceability information, comprising: ID of the network disk file, ID of a downloader, downloading time and storage path of the network disk file; and/or the primary tracing and source tracing information comprises: the login name, name of the downloader, and the name of the network disk file.
On the basis of the above embodiments, the recording module includes:
the determining unit is used for determining an organization architecture level corresponding to the network disk file download requester, and generating an encryption character string according to the primary tracking and tracing information when the level is greater than a preset level standard;
otherwise, generating an encryption character string according to the high-level tracing information.
On the basis of the above embodiments, the newly added module includes:
and the first writing unit is used for utilizing the attribute addition class to newly add a single newly added tracking and tracing information attribute for the download backup file when the hierarchy is greater than a preset hierarchy standard, and writing all the encrypted character strings into the download backup file as a newly added attribute value of the single newly added tracking and tracing information attribute.
On the basis of the above embodiments, the newly added module includes:
and the second writing unit is used for newly adding at least two tracing information attributes for the downloaded backup file by using the attribute addition class when the hierarchy is smaller than a preset hierarchy standard, and writing the encrypted character strings corresponding to the at least two tracing information attributes into the downloaded backup file as attribute newly added values corresponding to the at least two tracing information attributes.
On the basis of the above embodiments, the newly added module includes:
and the setting unit is used for setting the tracking and tracing information attribute for the download backup file by using the attribute setting class when the network disk file is a PPT file and a PDF file, and writing the encrypted character string serving as a set attribute value into the download backup file.
The network disk file control device provided by the embodiment of the invention can execute the network disk file control method provided by any embodiment of the invention, and has the corresponding functional modules and beneficial effects of the execution method.
Example six
Fig. 6 is a schematic structural diagram of a mesh disc according to a sixth embodiment of the present invention. Fig. 6 shows a block diagram of an exemplary mesh disk 12 suitable for use in implementing embodiments of the present invention. The mesh tray 12 shown in fig. 6 is only an example, and should not bring any limitation to the function and the range of use of the embodiment of the present invention.
As shown in fig. 6, the network disk 12 is in the form of a general purpose computing device. The components of the mesh disk 12 may include, but are not limited to: one or more processors or processing units 16, a system memory 28, and a bus 18 that couples various system components including the system memory 28 and the processing unit 16.
Bus 18 represents one or more of any of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, and a processor or local bus using any of a variety of bus architectures. By way of example, such architectures include, but are not limited to, Industry Standard Architecture (ISA) bus, micro-channel architecture (MAC) bus, enhanced ISA bus, Video Electronics Standards Association (VESA) local bus, and Peripheral Component Interconnect (PCI) bus.
The mesh tray 12 typically includes a variety of computer system readable media. Such media may be any available media that is accessible by the network disk 12 and includes both volatile and nonvolatile media, removable and non-removable media.
The system memory 28 may include computer system readable media in the form of volatile memory, such as Random Access Memory (RAM) 30 and/or cache 32. The network disk 12 may further include other removable/non-removable, volatile/nonvolatile computer system storage media. By way of example only, storage system 34 may be used to read from and write to non-removable, nonvolatile magnetic media (not shown in FIG. 5, and commonly referred to as a "hard drive"). Although not shown in FIG. 5, a magnetic disk drive for reading from and writing to a removable, nonvolatile magnetic disk (e.g., a "floppy disk") and an optical disk drive for reading from or writing to a removable, nonvolatile optical disk (e.g., a CD-ROM, DVD-ROM, or other optical media) may be provided. In these cases, each drive may be connected to bus 18 by one or more data media interfaces. System memory 28 may include at least one program product having a set (e.g., at least one) of program modules that are configured to carry out the functions of embodiments of the invention.
A program/utility 40 having a set (at least one) of program modules 42 may be stored, for example, in system memory 28, such program modules 42 including, but not limited to, an operating system, one or more application programs, other program modules, and program data, each of which examples or some combination thereof may comprise an implementation of a network environment. Program modules 42 generally carry out the functions and/or methodologies of the described embodiments of the invention.
The network disk 12 may also communicate with one or more external devices 14 (e.g., keyboard, pointing device, display 24, etc.), with one or more devices that enable a user to interact with the network disk 12, and/or with any devices (e.g., network card, modem, etc.) that enable the network disk 12 to communicate with one or more other computing devices. Such communication may be through an input/output (I/O) interface 22. Also, the network disk 12 may communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network such as the Internet) via the network adapter 20. As shown, the network adapter 20 communicates with the other modules of the network disk 12 via the bus 18. It should be understood that although not shown in the figures, other hardware and/or software modules may be used in conjunction with the network disk 12, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, and data backup storage systems, among others.
The processing unit 16 executes various functional applications and data processing by executing programs stored in the system memory 28, for example, to implement the network disk file control method provided by the embodiment of the present invention.
EXAMPLE seven
The seventh embodiment of the present invention further provides a storage medium containing computer-executable instructions, which when executed by a computer processor, are configured to perform the network disk file control method according to any one of the embodiments provided above.
Computer storage media for embodiments of the invention may employ any combination of one or more computer-readable media. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
A computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
It is to be noted that the foregoing is only illustrative of the preferred embodiments of the present invention and the technical principles employed. It will be understood by those skilled in the art that the present invention is not limited to the particular embodiments described herein, but is capable of various obvious changes, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the invention. Therefore, although the present invention has been described in some detail by the above embodiments, the invention is not limited to the above embodiments, and may include other equivalent embodiments without departing from the spirit of the invention, and the scope of the invention is determined by the scope of the appended claims.

Claims (8)

1. A method for controlling a network disk file is characterized by comprising the following steps:
receiving a network disk file downloading request, and determining tracking and tracing information according to the network disk file downloading request;
generating a download backup file for the network disk file;
recording the tracing information in a network disk log, and generating an encrypted character string according to the tracing information;
judging whether the network disk file is a binary document file or not, and determining an attribute addition class corresponding to the office operation component according to the type of the network disk file when the network disk file is the binary document file;
adding a tracking traceability information attribute for the downloaded backup file by using the attribute addition class, and writing the encrypted character string as a new attribute value into the downloaded backup file;
providing the download backup file with the newly added attribute to a download requester;
the tracing information comprises:
advanced trace traceability information, comprising: ID of the network disk file, ID of a downloader, downloading time and storage path of the network disk file; and/or the primary tracing information comprises: the login name, name and name of the network disk file of the downloader;
the generating of the encrypted character string according to the tracing information comprises:
determining an organization architecture level corresponding to the network disk file download requester, and generating an encryption character string according to the primary tracking and tracing information when the level is greater than a preset level standard;
otherwise, generating an encryption character string according to the advanced tracing information.
2. The method of claim 1, further comprising:
and after the downloading is finished, deleting the downloaded backup file.
3. The method according to claim 1, wherein said adding the tracking information attribute for the downloaded backup file by using the attribute addition class and writing the encrypted string as the added attribute value into the downloaded backup file comprises:
and when the hierarchy is greater than the preset hierarchy standard, newly adding a single newly added tracking and tracing information attribute for the download backup file by using the attribute addition class, and writing all encrypted character strings into the download backup file as newly added attribute values of the single newly added tracking and tracing information attribute.
4. The method according to claim 1, wherein said adding the tracking information attribute for the downloaded backup file by using the attribute addition class and writing the encrypted string as the added attribute value into the downloaded backup file comprises:
and when the level is smaller than the preset level standard, adding at least two tracing information attributes for the downloaded backup file by using the attribute addition class, and writing the encrypted character strings corresponding to the at least two tracing information attributes into the downloaded backup file as the attribute added attribute values corresponding to the at least two tracing information attributes.
5. The method according to claim 1, wherein said adding the tracking information attribute for the downloaded backup file by using the attribute addition class and writing the encrypted string as the added attribute value into the downloaded backup file comprises:
and when the network disk file is a PPT file or a PDF file, setting a tracking and tracing information attribute for the downloaded backup file by using the attribute setting class, and writing the encrypted character string serving as a set attribute value into the downloaded backup file.
6. A network disk file control apparatus, comprising:
the receiving module is used for receiving a network disk file downloading request and determining tracking and tracing information according to the network disk file downloading request;
the generating module is used for generating a downloading backup file for the network disk file;
the recording module is used for recording the tracking and tracing information in a network disk log and generating an encrypted character string according to the tracking and tracing information;
the judging module is used for judging whether the network disk file is a binary document file or not, and determining an attribute adding class corresponding to the office operation component according to the type of the network disk file when the network disk file is the binary document file;
the newly-added module is used for adding a tracking and tracing information attribute for the downloaded backup file by using the attribute addition class and writing the encrypted character string into the downloaded backup file as a newly-added attribute value;
the providing module is used for providing the download backup file with the newly added attribute to a download requester;
the tracing information comprises:
advanced trace traceability information, comprising: ID of the network disk file, ID of a downloader, downloading time and storage path of the network disk file; and/or the primary tracing information comprises: the login name and name of the downloader and the name of the network disk file;
the recording module comprises:
the determining unit is used for determining an organization architecture level corresponding to the network disk file download requester, and generating an encryption character string according to the primary tracking and tracing information when the level is greater than a preset level standard;
otherwise, generating an encryption character string according to the high-level tracing information.
7. A mesh tray, characterized in that it comprises:
one or more processors;
storage means for storing one or more programs;
when executed by the one or more processors, cause the one or more processors to implement the network disk file control method of any one of claims 1-5.
8. A storage medium containing computer-executable instructions for performing the network disk file control method of any one of claims 1-5 when executed by a computer processor.
CN202210243694.6A 2022-03-14 2022-03-14 Network disk file control method and device, network disk and storage medium Active CN114329366B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210243694.6A CN114329366B (en) 2022-03-14 2022-03-14 Network disk file control method and device, network disk and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210243694.6A CN114329366B (en) 2022-03-14 2022-03-14 Network disk file control method and device, network disk and storage medium

Publications (2)

Publication Number Publication Date
CN114329366A CN114329366A (en) 2022-04-12
CN114329366B true CN114329366B (en) 2022-07-26

Family

ID=81034134

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210243694.6A Active CN114329366B (en) 2022-03-14 2022-03-14 Network disk file control method and device, network disk and storage medium

Country Status (1)

Country Link
CN (1) CN114329366B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114708138B (en) * 2022-06-06 2022-10-04 天津联想协同科技有限公司 Network disk image watermark adding method and device, network disk and storage medium
CN116010364B (en) * 2023-03-27 2023-08-04 天津联想协同科技有限公司 Method and device for updating network disk file state, network disk and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108965486A (en) * 2018-10-08 2018-12-07 深圳市创维软件有限公司 A kind of document down loading method, system, server and storage medium
CN109145632A (en) * 2017-06-28 2019-01-04 北京京东尚科信息技术有限公司 For generating the method and device of traceable file
CN112468599A (en) * 2021-01-25 2021-03-09 广州大学 Anonymous communication method, system and equipment based on Internet file storage service
CN112565196A (en) * 2020-11-10 2021-03-26 杭州神甲科技有限公司 Data leakage prevention method and device with network monitoring capability and storage medium
CN113946873A (en) * 2021-12-21 2022-01-18 天津联想协同科技有限公司 Off-disk file tracing method and device, terminal and storage medium

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9683867B2 (en) * 2015-10-30 2017-06-20 Curtis E. Quady Electrical power switch control with usage data display
CN110750388B (en) * 2019-10-30 2022-06-17 苏州龙信信息科技有限公司 Backup analysis method, device, equipment and medium
CN112650956A (en) * 2021-01-06 2021-04-13 携程旅游信息技术(上海)有限公司 Excel document tracking method and system, electronic device and storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109145632A (en) * 2017-06-28 2019-01-04 北京京东尚科信息技术有限公司 For generating the method and device of traceable file
CN108965486A (en) * 2018-10-08 2018-12-07 深圳市创维软件有限公司 A kind of document down loading method, system, server and storage medium
CN112565196A (en) * 2020-11-10 2021-03-26 杭州神甲科技有限公司 Data leakage prevention method and device with network monitoring capability and storage medium
CN112468599A (en) * 2021-01-25 2021-03-09 广州大学 Anonymous communication method, system and equipment based on Internet file storage service
CN113946873A (en) * 2021-12-21 2022-01-18 天津联想协同科技有限公司 Off-disk file tracing method and device, terminal and storage medium

Also Published As

Publication number Publication date
CN114329366A (en) 2022-04-12

Similar Documents

Publication Publication Date Title
CN114329366B (en) Network disk file control method and device, network disk and storage medium
TWI457776B (en) Method and system for implementing cached parameterized cells
US8271995B1 (en) System services for native code modules
CN114329367B (en) Network disk file tracing method and device, network disk and storage medium
CN113961971B (en) Method and device for reminding setting of file authority of network disk, network disk and storage medium
CN107111649B (en) Uploading user and system data from a source location to a destination location
CN104036194A (en) Vulnerability detection method and device for revealing private data in application program
US20120158657A1 (en) Role-specific access control to sections of artifact content within a configuration management (cm) system
CN113918999B (en) Method and device for establishing safe ferry channel, network disk and storage medium
CN110727476B (en) Method, device, equipment and storage medium for generating authorization configuration file
CN113946873B (en) Off-disk file tracing method and device, terminal and storage medium
WO2022174737A1 (en) Method for running neural network model, and electronic device and storage medium
CN102402598B (en) Application file system access
CN112069158A (en) Data restoration method, device, equipment and storage medium
CN115408358B (en) Network disk online file management method and device, network disk and storage medium
CN107533614B (en) Device for storing data and storage medium
CN115130130B (en) Network disk file unlocking method and device, network disk and storage medium
US8448244B1 (en) Methods and systems for fused files comprising logic and content data
CN111562929A (en) Method, device and equipment for generating patch file and storage medium
CN114780497B (en) Batch file processing method, apparatus, computer device, medium, and program product
CN113590564B (en) Data storage method, device, electronic equipment and storage medium
US8656066B2 (en) Monitoring input/output operations to specific storage locations
CN113810477A (en) File uploading method, device, equipment and storage medium
US20180053016A1 (en) Visually configurable privacy enforcement
CN112114811A (en) Compiling method, device and equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant