CN114329367A - Network disk file tracing method and device, network disk and storage medium - Google Patents

Network disk file tracing method and device, network disk and storage medium Download PDF

Info

Publication number
CN114329367A
CN114329367A CN202210243697.XA CN202210243697A CN114329367A CN 114329367 A CN114329367 A CN 114329367A CN 202210243697 A CN202210243697 A CN 202210243697A CN 114329367 A CN114329367 A CN 114329367A
Authority
CN
China
Prior art keywords
file
network disk
markup language
extensible markup
attribute
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210243697.XA
Other languages
Chinese (zh)
Other versions
CN114329367B (en
Inventor
杜志杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tianjin Lenovo Collaboration Technology Inc
Original Assignee
Tianjin Lenovo Collaboration Technology Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tianjin Lenovo Collaboration Technology Inc filed Critical Tianjin Lenovo Collaboration Technology Inc
Priority to CN202210243697.XA priority Critical patent/CN114329367B/en
Publication of CN114329367A publication Critical patent/CN114329367A/en
Application granted granted Critical
Publication of CN114329367B publication Critical patent/CN114329367B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The embodiment of the invention discloses a method and a device for tracing a network disk file, a network disk and a storage medium. Wherein the method comprises the following steps: receiving a network disk file downloading request and determining tracking and tracing information; recording tracing information in a network disk log, and generating an encryption character string according to the tracing information; generating a download backup file for the network disk file; judging whether the network disk file is an Office Open XML file, if so, decompressing the downloaded backup file to obtain an extensible markup language file with file customization attributes in a file attribute folder; adding an attribute in the extensible markup language file, taking the type of the tracing information as a name of the added attribute, and writing a corresponding encrypted character string as attribute content into the extensible markup language file; writing the written extensible markup language file as a guide target into a guide extensible markup language file; compressing to generate a download file for the user to download.

Description

Network disk file tracing method and device, network disk and storage medium
Technical Field
The embodiment of the invention relates to the technical field of network disks, in particular to a network disk file tracing method and device, a network disk and a storage medium.
Background
The network disk is an online storage service released by internet companies. The network disk system machine room divides a certain disk space for users, provides file management functions such as storage, access, backup and sharing of files for the users free or charged, and has high-level disaster recovery backup all over the world. The user can see the network disk as a hard disk or a U disk placed on the network, whether in home, a unit or anywhere else, and can manage and edit the files in the network disk by connecting to the Internet. The portable type solar water heater is not required to be carried about and is not afraid of being lost.
Enterprise data security is particularly important. The network disk has strict safety management on files, has different authorities on the same file of different users, and can effectively ensure that sensitive information in the network disk files cannot leak through different settings on the authorities. However, the user may cause the network disk file to be downloaded locally by other people through the distribution behavior of the network disk file, thereby causing the information to be exposed on the public network. Risk of important information leakage. Once information leakage occurs, the files need to be traced. At present, the commonly adopted tracing mode is a digital watermark mode, namely, when a file is downloaded from a network disk, a bright watermark or a dark watermark is added to the file.
In the process of implementing the invention, the inventor finds the following technical problems: the watermark is generally in a logo or encrypted dot matrix mode, is obvious to a user, and can be deleted deliberately and easily to lose the possibility of reverse tracing of the file in order to avoid pursuing responsibility under the condition of keeping the original format of the file. The tracing is lack of stability, and serious performance problems exist. Especially, for some large files or files with complex formats, increasing watermarks requires a large amount of computation, takes a long time, and in extreme cases, may cause failure, and may not meet the use requirements of users.
Disclosure of Invention
The embodiment of the invention provides a method and a device for tracing a network disk file, a network disk and a storage medium, and aims to solve the technical problem that the network disk performance is seriously influenced by the technical means adopted by the network disk file tracing in the prior art.
In a first aspect, an embodiment of the present invention provides a method for tracing a network disk file, including:
receiving a network disk file downloading request, and determining tracking and tracing information according to the network disk file downloading request;
recording the tracing information in a network disk log, and generating an encrypted character string according to the tracing information;
generating a download backup file for the network disk file;
judging whether the network disk file is a file realized based on the Office Open XML document format specification, if so, decompressing the downloaded backup file to obtain an extensible markup language file with file customization attributes in the document attribute file;
adding attributes in the extensible markup language file, taking the tracking and tracing information type as a new attribute name, and writing a corresponding encrypted character string as attribute content into the extensible markup language file;
writing the written extensible markup language file as a rewriting target into a content extensible markup language file;
writing the written extensible markup language file as a relation target into a relation extensible markup language file;
and compressing the modified decompressed file to generate a download file for the user to download.
In a second aspect, an embodiment of the present invention further provides a device for tracing a network disk file, where the device includes:
the receiving module is used for receiving a network disk file downloading request and determining tracking and tracing information according to the network disk file downloading request;
the recording module is used for recording the tracing information in a network disk log and generating an encrypted character string according to the tracing information;
the generating module is used for generating a downloading backup file for the network disk file;
the judging module is used for judging whether the network disk file is a file realized based on the Office Open XML document format specification, if so, decompressing the downloaded backup file to acquire an extensible markup language file with file customization attributes in the document attribute file;
the new adding module is used for adding attributes in the extensible markup language file, taking the tracking and tracing information type as a new attribute name, and taking a corresponding encrypted character string as attribute content to be written into the extensible markup language file;
the first writing module is used for writing the written extensible markup language file into the content extensible markup language file as a rewriting target;
the second writing module is used for writing the written extensible markup language file into the relational extensible markup language file as a relational target;
and the compression module is used for compressing the modified decompressed file to generate a download file for the user to download.
In a third aspect, an embodiment of the present invention further provides a network disk, including:
one or more processors;
storage means for storing one or more programs;
when the one or more programs are executed by the one or more processors, the one or more processors implement the network disk file tracing method provided in the above embodiments.
In a fourth aspect, an embodiment of the present invention further provides a storage medium containing computer-executable instructions, which are used to execute the network disk file tracing method provided in the foregoing embodiment when executed by a computer processor.
According to the method, the device, the network disk and the storage medium for tracing the network disk file, provided by the embodiment of the invention, the tracing information is determined according to the network disk file downloading request by receiving the network disk file downloading request; recording the tracing information in a network disk log, and generating an encrypted character string according to the tracing information; generating a download backup file for the network disk file; judging whether the network disk file is a file realized based on the Office Open XML document format specification, if so, decompressing the downloaded backup file to obtain an extensible markup language file with file customization attributes in the document attribute file; adding attributes in the extensible markup language file, taking the tracking and tracing information type as a new attribute name, and writing a corresponding encrypted character string as attribute content into the extensible markup language file; writing the written extensible markup language file into the content extensible markup language file as a rewriting target; writing the written extensible markup language file as a relation target into a relation extensible markup language file; and compressing the modified decompressed file to generate a download file for the user to download. The encrypted file reverse tracing necessary information can be analyzed, and corresponding tracing information can be obtained. Compared with other modes, the method is not easy to identify, has stronger stability, has smaller computation amount, and can better meet the downloading requirement of the network disk file under the condition of meeting the requirement of file tracing.
Drawings
Other features, objects and advantages of the invention will become more apparent upon reading of the detailed description of non-limiting embodiments made with reference to the following drawings:
fig. 1 is a flowchart of a method for tracing a network disk file according to an embodiment of the present invention;
fig. 2 is a flowchart of a network disk file tracing method according to a second embodiment of the present invention;
fig. 3 is a flowchart of a network disk file tracing method according to a third embodiment of the present invention;
fig. 4 is a flowchart of a network disk file tracing method according to a fourth embodiment of the present invention;
fig. 5 is a structural diagram of a network disk file tracing apparatus according to a fifth embodiment of the present invention;
fig. 6 is a structural diagram of a mesh disk according to a sixth embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the invention and are not limiting of the invention. It should be further noted that, for the convenience of description, only some of the structures related to the present invention are shown in the drawings, not all of the structures.
Example one
Fig. 1 is a flowchart of a method for tracing a network disk file according to an embodiment of the present invention, where the embodiment is applicable to a case of tracing an off-disk file, and the method can be executed by a network disk file tracing apparatus, and specifically includes the following steps:
step 110, receiving a network disk file downloading request, and determining tracking and tracing information according to the network disk file downloading request.
Generally, a user can download a corresponding file from a network disk, so as to facilitate offline processing of the file. The network disk can receive a downloading request of a user for the network disk file. When a download request of the network disk file is received, the tracing information of the network disk file can be determined according to the specific content of the request.
The tracing information is used for representing intellectual property attribution of the file and corresponding information flowing out of the network disk. Therefore, the tracking and tracing information of the off-disk file can be determined by utilizing the time corresponding to the network disk file downloading request, the information of the requester and the network disk file. For example, the tracing information may include: advanced trace traceability information, comprising: ID of the network disk file, ID of a downloader, downloading time and storage path of the network disk file; and/or the primary tracing information comprises: the login name, name of the downloader, and the name of the network disk file.
And 120, recording the tracing information in a network disk log, and generating an encrypted character string according to the tracing information.
The tracing information can be written into the network disk system log. Therefore, when the network disk file leaks, the tracing information recorded in the network disk log is used for tracing, and the intellectual property attribution problem of the network disk file can be effectively solved. Correspondingly, in this embodiment, since the tracing information is written in the binary file of the network disk file, in order to avoid being deleted maliciously, the tracing information may be encrypted to generate an encrypted character string, so as to prevent a user from maliciously identifying the corresponding tracing information, and the encrypted character string is generated according to the tracing information. The encryption effect can be realized by using a common encryption algorithm, such as an algorithm like RSA.
And step 130, generating a download backup file for the network disk file.
In this embodiment, the trace source information may be secretly written into the network disk file. Since the network disk file may be downloaded by different users many times. Therefore, in this embodiment, a corresponding backup file is generated for the network disk file corresponding to the download request, so as to facilitate writing of the tracking and tracing information thereto. For example, a temporary storage area may be set, and the network disk file may be copied in the temporary storage area to form a downloaded backup file.
Step 140, determining whether the network disk file is a file realized based on the Office Open XML document format specification, if so, decompressing the downloaded backup file to obtain an extensible markup language file with file customization attributes in the document attribute file.
Office Open XML is a technical specification developed by Microsoft for Office 2007 products, has become an international document format standard, and is compatible with the former international standard Open document format and the Chinese document standard 'standard text-through'. The Office Open XML format uses ZIP and compression techniques to store documents. One great advantage of this new format is that its maximum file compression ratio can reach 75 percent of the original binary file. This is a big advantage of using XML in combination with ZIP technology for file storage. Office Open XML documents are actually file compression packages that represent the contents of the document. The file can be saved into a Word XML document format by the method.
Thus, corresponding file suffix names may be utilized, such as: and detecting whether the network disk file is an Office Open XML file or not by docx, xlsx, pptx and the like, and decompressing the network disk file when the network disk file is determined to be a file realized based on the Office Open XML document format specification so as to obtain all file contents of the network disk file.
After the network disk file is decompressed, three folders can be obtained, wherein the docprop folder is a document attribute folder. Xml component includes any custom document attribute that defines logic to add to the document. Xml components can thus be obtained by decompression and lookup. Create a custom.
Step 150, adding new attributes in the extensible markup language file component, using the tracking and tracing information type as a new attribute name, and writing the corresponding encrypted character string as attribute content into the extensible markup language file.
Xml component attributes can be added. For example, an attribute id may be newly added to a custom.
And 160, writing the written extensible markup language file as a rewriting target into the content extensible markup language file.
XML files are all located under the root directory of the files realized based on the Office Open XML document format specification.
Xml file is used to determine all unique type components in a document. Each component needs to list its own type in this component. Since Content is newly added to the store.xml component, it is necessary to rewrite the corresponding target file in the Content _ types.xml file to the store.xml component of the newly added Content.
And 170, writing the written extensible markup language file as a relation target into the relation extensible markup language file.
The component needs to be of a type that can be recognized so that the application knows how to use the component when rendering the document. And after the attribute is newly added to the custom. xml component, correspondingly modifying the Content _ types. xml file, and taking the written extensible markup language file as a guide target. Illustratively, the load file portion is modified to a custom.
The rels folder comprises a rels file. A rels file is a relational storage file that stores file with file-related associations in the document structure. The file description file identification, the file type definition, the target file and the storage path of the target file are used for loading corresponding relation contents when the file is started. The convenience application knows how to use this component when rendering this document. And after the attributes of the custom xml component are added, the rels file can be correspondingly modified, and the written extensible markup language file is used as a guide target. Illustratively, the load file portion is modified to a custom.
And step 180, compressing the modified decompressed file to generate a download file for the user to download.
By compression, a file with added attributes can be generated. The file can be used as a download backup file. The user may download to a binary file that adds an encrypted string of trace traceability information. Once intellectual property disputes occur, the leaked files can be uploaded to the network disk system. The network disk system reads the corresponding attribute and the corresponding encryption character string. And acquiring corresponding tracing information, and comparing the tracing information with the tracing information recorded in the network disk log, thereby providing corresponding reference data for determining intellectual property attribution and a divulgence source.
In the embodiment, by receiving a network disk file downloading request, tracking and tracing information is determined according to the network disk file downloading request; recording the tracing information in a network disk log, and generating an encrypted character string according to the tracing information; generating a download backup file for the network disk file; judging whether the network disk file is a file realized based on the Office Open XML document format specification, if so, decompressing the downloaded backup file to obtain an extensible markup language file with file customization attributes in the document attribute file; adding attributes in the extensible markup language file, taking the tracking and tracing information type as a new attribute name, and writing a corresponding encrypted character string as attribute content into the extensible markup language file; writing the written extensible markup language file into the content extensible markup language file as a rewriting target; writing the written extensible markup language file as a relation target into a relation extensible markup language file; and compressing the modified decompressed file to generate a download file for the user to download. The encrypted file reverse tracing necessary information can be analyzed, and corresponding tracing information can be obtained. Compared with other modes, the method is not easy to identify, has stronger stability, is simultaneously suitable for concurrent writing of a large number of files, is easier to deploy on a cluster and a distributed system, and can better meet the downloading requirement of the network disk file under the condition of meeting the requirement of file tracing.
In a preferred embodiment of this embodiment, the method may further include the following steps: and after the downloading is finished, deleting the downloaded backup file. The method can effectively reduce the pressure of the backup files on the storage system, and simultaneously can avoid the problem that the tracing cannot be realized due to file sending errors.
Example two
Fig. 2 is a flowchart of a network disk file tracing method according to a second embodiment of the present invention. In this embodiment, the generating of the encrypted character string according to the tracing information may be specifically optimized as follows: determining whether the network disk file downloading requester is a file creator or editor, and generating an encrypted character string according to the primary tracking and tracing information when the network disk file downloading requester is the file creator or editor; otherwise, generating an encryption character string according to the high-level tracing information.
Correspondingly, the method for tracing the network disk file provided by the embodiment specifically includes:
step 210, receiving a network disk file downloading request, and determining tracking and tracing information according to the network disk file downloading request.
Step 220, recording the tracing and tracing information in a network disk log, determining whether a network disk file downloading requester is a file creator or an editor, and generating an encrypted character string according to the primary tracing and tracing information when the network disk file downloading requester is the file creator or the editor; otherwise, generating an encryption character string according to the high-level tracing information.
Certain computation amount and computation time are also needed for writing information into the file. Therefore, the amount of information should be reduced as much as possible while ensuring accurate tracing.
In general, the creator or the collaborative editor of a file is less likely to be compromised, and therefore, less tracing information can be selected according to the situation. On the contrary, the possibility of disclosure of the ordinary user is high, so that whether the requester for downloading the network disk file is the creator or the editor of the file may be determined first, and for example, whether the requester is the creator or the editor of the file may be determined by looking at the log. If the creator or editor is concerned, the encrypted character string can be generated by only using the primary tracing information.
On the contrary, if the network disk file downloading requester is a general user, the possibility of disclosure is high. Therefore, it is necessary to generate an encrypted string using advanced trace source information.
In addition, the position of the downloader can be considered, if the level of the network disk file download requester is higher, the possibility of disclosure is considered to be lower, and therefore, the encrypted character string can be generated by only adopting the primary tracing and tracing information. If the level is lower and the corresponding is true, the high-level tracing information is adopted to generate the encrypted character string. For example, the level of the organization hierarchy corresponding to the download requester can be judged, and when the level exceeds a preset level threshold, the level is determined to be a high level, otherwise, the level is determined to be a low level.
And step 230, generating a download backup file for the network disk file.
And 240, judging whether the network disk file is a file realized based on the Office Open XML document format specification, if so, decompressing the downloaded backup file to acquire an extensible markup language file component of the file customization attribute in the document attribute folder.
Step 250, adding new attributes in the extensible markup language file component, taking the tracking and tracing information type as a new attribute name, and writing the corresponding encrypted character string as attribute content into the extensible markup language file.
And step 260, writing the written extensible markup language file as a rewriting target into the content extensible markup language file.
And 270, writing the written extensible markup language file as a relation target into the relation extensible markup language file.
Step 280, compressing the modified decompressed file to generate a download file for the user to download.
In this embodiment, the generating of the encrypted character string according to the tracing information is specifically optimized as follows: determining whether the network disk file downloading requester is a file creator or editor, and generating an encrypted character string according to the primary tracking and tracing information when the network disk file downloading requester is the file creator or editor; otherwise, generating an encryption character string according to the high-level tracing information. The increased data volume of the tracing information can be determined according to the actual situation of the actual downloading requester. And the written information amount is reduced under the condition of ensuring accurate tracing. Further, the calculation amount of data is reduced, and the calculation time is shortened.
EXAMPLE III
Fig. 3 is a flowchart of a network disk file tracing method according to a third embodiment of the present invention. In this embodiment, the tracking information type is used as a new attribute name, and a corresponding encrypted character string is used as an attribute content and written into the xml file, which is specifically optimized as follows: when the download request is a file creator or editor, the single newly added tracking and tracing information attribute is used as a newly added attribute name, and all encrypted character strings are used as the single newly added tracking and tracing information attribute and are written into the extensible markup language file as attribute content.
Correspondingly, the method for tracing the network disk file provided by the embodiment specifically includes:
step 310, receiving a network disk file downloading request, and determining tracking and tracing information according to the network disk file downloading request.
And 320, recording the tracing information in a network disk log, and generating an encrypted character string according to the tracing information.
Step 330, generating a download backup file for the network disk file.
And 340, judging whether the network disk file is a file realized based on the Office Open XML document format specification, if so, decompressing the downloaded backup file to acquire an extensible markup language file component of the file customization attribute in the document attribute folder.
And 350, when the download request is a file creator or an editor, taking a single newly added tracking and tracing information attribute as a newly added attribute name, and writing all encrypted character strings as the single newly added tracking and tracing information attribute as attribute content into the extensible markup language file.
When there are a plurality of attributes, it is necessary to add an attribute and an attribute value for each attribute by using a function. Therefore, multiple calls to classes are required to be added, thus requiring a longer time to add completion. Since the high-level user has a low possibility of revealing the file, all the encrypted strings can be written into the binary file as a value of one attribute. So as to reduce the operation amount, reduce the operation time and improve the response speed. Meanwhile, the network disk can still analyze all newly added encrypted character strings in the file and track and trace the source through the network disk log.
And step 360, writing the written extensible markup language file as a rewriting target into the content extensible markup language file.
And step 370, writing the written extensible markup language file as a relation target into the relational extensible markup language file.
And 380, compressing the modified decompressed file to generate a download file for the user to download.
In this embodiment, the tracing information type is used as a newly added attribute name, and the corresponding encrypted character string is written into the xml file as the attribute content, which is specifically optimized as follows: when the download request is a file creator or editor, the single newly added tracking and tracing information attribute is used as a newly added attribute name, and all encrypted character strings are used as the single newly added tracking and tracing information attribute and are written into the extensible markup language file as attribute content. And the written information amount is reduced under the condition of ensuring accurate tracing. Further, the calculation amount of data is reduced, and the calculation time is shortened.
Example four
Fig. 4 is a flowchart of a network disk file tracing method according to a fourth embodiment of the present invention. In this embodiment, the tracking information type is used as a new attribute name, and a corresponding encrypted character string is used as an attribute content and written into the xml file, which is specifically optimized as follows: when a downloading request is a common user, adding at least two tracing information attributes for the downloading backup file, and writing an encrypted character string corresponding to the at least two tracing information attributes into the extensible markup language file as a corresponding attribute added attribute value of the at least two tracing information attributes.
Correspondingly, the method for tracing the network disk file provided by the embodiment specifically includes:
step 410, receiving a network disk file downloading request, and determining tracking and tracing information according to the network disk file downloading request.
And step 420, recording the tracing information in a network disk log, and generating an encrypted character string according to the tracing information.
Step 430, generating a download backup file for the network disk file.
And 440, judging whether the network disk file is a file realized based on the Office Open XML document format specification, if so, decompressing the downloaded backup file to acquire an extensible markup language file component of the file customization attribute in the document attribute folder.
And 450, when the download request is a common user, adding at least two tracing information attributes for the downloaded backup file, and writing the encrypted character strings corresponding to the at least two tracing information attributes into the extensible markup language file as the attribute added attribute values corresponding to the at least two tracing information attributes.
In order to prevent malicious or unintentional attribute deletion, in this embodiment, when the download user layer is a general user, at least two tracking trace information attributes may be set. Illustratively, the advanced tracing information can be randomly combined to generate a corresponding character string. The encrypted character strings corresponding to at least two tracing information attributes can be written into the extensible markup language file as the attribute added attribute values corresponding to the at least two tracing information attributes. The method and the device can avoid the condition that tracing information cannot occur due to malicious or unintentional attribute deletion operation, and can reduce the number of times of calling the attribute addition class. Meanwhile, the network disk can still analyze all newly added encrypted character strings in the file and track and trace the source through the network disk log.
And step 460, writing the written extensible markup language file as a rewriting target into the content extensible markup language file.
And 470, writing the written extensible markup language file as a relation target into the relation extensible markup language file.
And step 480, compressing the modified decompressed file to generate a download file for the user to download.
In this embodiment, the tracing source information type is used as a newly added attribute name, and the corresponding encrypted character string is written into the xml file as the attribute content, which is specifically optimized as follows: when a downloading request is a common user, adding at least two tracing information attributes for the downloading backup file, and writing an encrypted character string corresponding to the at least two tracing information attributes into the extensible markup language file as a corresponding attribute added attribute value of the at least two tracing information attributes. Malicious or unintentional attribute deletion operations can be effectively prevented. And the amount of write trace traceback information can be reduced. Further, the calculation amount of data is reduced, and the calculation time is shortened.
EXAMPLE five
Fig. 5 is a structural diagram of a network disk file tracing apparatus according to a fifth embodiment of the present invention, and as shown in fig. 5, the apparatus includes:
the receiving module 510 is configured to receive a network disk file downloading request, and determine tracking and tracing information according to the network disk file downloading request;
the recording module 520 is configured to record the trace source tracing information in a network disk log, and generate an encrypted character string according to the trace source tracing information;
a generating module 530, configured to generate a download backup file for the network disk file;
the determining module 540 is configured to determine whether the network disk file is an Office Open-based XML file, and when the network disk file is an Office Open-based XML file, decompress the downloaded backup file to obtain an extensible markup language file with a file customization attribute in a document attribute file;
a newly-added module 550, configured to add an attribute in the xml file, use the type of the trace source information as a name of the newly-added attribute, and write a corresponding encrypted string as an attribute content into the xml file;
a first writing module 560, configured to write the written xml file as a guidance target into a guidance xml file;
the second writing module 570 writes the written extensible markup language file as a relation target into the relational extensible markup language file;
the compressing module 580 is configured to compress the modified decompressed file, and generate a download file for downloading by the user.
The network disk file tracing device provided by this embodiment determines tracing information according to a network disk file downloading request by receiving the network disk file downloading request; recording the tracing information in a network disk log, and generating an encrypted character string according to the tracing information; generating a download backup file for the network disk file; judging whether the network disk file is a file realized based on the Office Open XML document format specification, if so, decompressing the downloaded backup file to obtain an extensible markup language file with file customization attributes in the document attribute file; adding attributes in the extensible markup language file, taking the tracking and tracing information type as a new attribute name, and writing a corresponding encrypted character string as attribute content into the extensible markup language file; writing the written extensible markup language file into the content extensible markup language file as a rewriting target; writing the written extensible markup language file as a relation target into a relation extensible markup language file; and compressing the modified decompressed file to generate a download file for the user to download. The encrypted file reverse tracing necessary information can be analyzed, and corresponding tracing information can be obtained. Compared with other modes, the method is not easy to identify, has stronger stability, has smaller computation amount, and can better meet the downloading requirement of the network disk file under the condition of meeting the requirement of file tracing.
On the basis of the foregoing embodiments, the tracing information includes:
advanced trace traceability information, comprising: ID of the network disk file, ID of a downloader, downloading time and storage path of the network disk file; and/or the primary tracing information comprises: the login name, name of the downloader, and the name of the network disk file.
In addition to the above embodiments, the recording module includes:
the determining unit is used for determining whether the network disk file downloading requester is a file creator or an editor, and generating an encrypted character string according to the primary tracking and tracing information when the network disk file downloading requester is the file creator or the editor;
otherwise, generating an encryption character string according to the high-level tracing information.
On the basis of the above embodiments, the newly added module includes:
and the single adding unit is used for taking a single newly added tracking and tracing information attribute as a newly added attribute name and taking all encrypted character strings as the single newly added tracking and tracing information attribute as attribute content to be written into the extensible markup language file when the downloading request is a file creator or an editor.
On the basis of the above embodiments, the newly added module includes:
and the multiple adding units are used for adding at least two tracing information attributes for the downloading backup file when a downloading request is a common user, and writing the encrypted character strings corresponding to the at least two tracing information attributes into the extensible markup language file as the attribute adding attribute values corresponding to the at least two tracing information attributes.
On the basis of the above embodiments, the apparatus further includes:
and the deleting module is used for deleting the downloaded backup file after the downloading is finished.
The network disk file tracing device provided by the embodiment of the invention can execute the network disk file tracing method provided by any embodiment of the invention, and has the corresponding functional modules and beneficial effects of the execution method.
EXAMPLE six
Fig. 6 is a structural diagram of a mesh disk according to a sixth embodiment of the present invention. Fig. 6 shows a block diagram of an exemplary mesh disk 12 suitable for use in implementing embodiments of the present invention. The mesh tray 12 shown in fig. 6 is only an example, and should not bring any limitation to the function and the use range of the embodiment of the present invention.
As shown in fig. 6, the network disk 12 is in the form of a general purpose computing device. The components of the mesh tray 12 may include, but are not limited to: one or more processors or processing units 16, a system memory 28, and a bus 18 that couples various system components including the system memory 28 and the processing unit 16.
Bus 18 represents one or more of any of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, and a processor or local bus using any of a variety of bus architectures. By way of example, such architectures include, but are not limited to, Industry Standard Architecture (ISA) bus, micro-channel architecture (MAC) bus, enhanced ISA bus, Video Electronics Standards Association (VESA) local bus, and Peripheral Component Interconnect (PCI) bus.
The mesh tray 12 typically includes a variety of computer system readable media. Such media may be any available media that is accessible by the network disk 12 and includes both volatile and nonvolatile media, removable and non-removable media.
The system memory 28 may include computer system readable media in the form of volatile memory, such as Random Access Memory (RAM) 30 and/or cache 32. The network disk 12 may further include other removable/non-removable, volatile/nonvolatile computer system storage media. By way of example only, storage system 34 may be used to read from and write to non-removable, nonvolatile magnetic media (not shown in FIG. 6, and commonly referred to as a "hard drive"). Although not shown in FIG. 6, a magnetic disk drive for reading from and writing to a removable, nonvolatile magnetic disk (e.g., a "floppy disk") and an optical disk drive for reading from or writing to a removable, nonvolatile optical disk (e.g., a CD-ROM, DVD-ROM, or other optical media) may be provided. In these cases, each drive may be connected to bus 18 by one or more data media interfaces. System memory 28 may include at least one program product having a set (e.g., at least one) of program modules that are configured to carry out the functions of embodiments of the invention.
A program/utility 40 having a set (at least one) of program modules 42 may be stored, for example, in system memory 28, such program modules 42 including, but not limited to, an operating system, one or more application programs, other program modules, and program data, each of which examples or some combination thereof may comprise an implementation of a network environment. Program modules 42 generally carry out the functions and/or methodologies of the described embodiments of the invention.
The network disk 12 may also communicate with one or more external devices 14 (e.g., keyboard, pointing device, display 24, etc.), with one or more devices that enable a user to interact with the network disk 12, and/or with any devices (e.g., network card, modem, etc.) that enable the network disk 12 to communicate with one or more other computing devices. Such communication may be through an input/output (I/O) interface 22. Also, the network disk 12 may communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network such as the Internet) via the network adapter 20. As shown, the network adapter 20 communicates with the other modules of the network disk 12 via the bus 18. It should be understood that although not shown in the figures, other hardware and/or software modules may be used in conjunction with the network disk 12, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, and data backup storage systems, among others.
The processing unit 16 executes various functional applications and data processing by running a program stored in the system memory 28, for example, to implement the network disk file tracing method provided by the embodiment of the present invention.
EXAMPLE seven
The seventh embodiment of the present invention further provides a storage medium containing computer-executable instructions, where the computer-executable instructions are executed by a computer processor to perform any one of the network disk file tracing methods provided in the foregoing embodiments.
Computer storage media for embodiments of the invention may employ any combination of one or more computer-readable media. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
A computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
It is to be noted that the foregoing is only illustrative of the preferred embodiments of the present invention and the technical principles employed. It will be understood by those skilled in the art that the present invention is not limited to the particular embodiments described herein, but is capable of various obvious changes, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the invention. Therefore, although the present invention has been described in greater detail by the above embodiments, the present invention is not limited to the above embodiments, and may include other equivalent embodiments without departing from the spirit of the present invention, and the scope of the present invention is determined by the scope of the appended claims.

Claims (10)

1. A method for tracing a network disk file is characterized by comprising the following steps:
receiving a network disk file downloading request, and determining tracking and tracing information according to the network disk file downloading request;
recording the tracing information in a network disk log, and generating an encrypted character string according to the tracing information;
generating a download backup file for the network disk file;
judging whether the network disk file is a file realized based on the Office Open XML document format specification, if so, decompressing the downloaded backup file to obtain an extensible markup language file component of the file customization attribute in a document attribute folder;
adding new attributes in the extensible markup language file component, taking the tracking and tracing information type as a new attribute name, and writing a corresponding encrypted character string as attribute content into the extensible markup language file;
writing the written extensible markup language file as a rewriting target into a content extensible markup language file;
writing the written extensible markup language file as a relation target into a relation extensible markup language file;
and compressing the modified decompressed file to generate a download file for the user to download.
2. The method of claim 1, wherein tracking the traceability information comprises:
advanced trace traceability information, comprising: ID of the network disk file, ID of a downloader, downloading time and storage path of the network disk file; and/or the primary tracing information comprises: the login name, name of the downloader, and the name of the network disk file.
3. The method according to claim 1, wherein the generating an encrypted string according to the tracing information comprises:
determining whether the network disk file downloading requester is a file creator or editor, and generating an encrypted character string according to the primary tracking and tracing information when the network disk file downloading requester is the file creator or editor;
otherwise, generating an encryption character string according to the high-level tracing information.
4. The method according to claim 1, wherein the writing the trace-source information category as a new attribute name and the corresponding encrypted string as an attribute content into the xml file comprises:
when the download request is a file creator or editor, the single newly added tracking and tracing information attribute is used as a newly added attribute name, and all encrypted character strings are used as the single newly added tracking and tracing information attribute and are written into the extensible markup language file as attribute content.
5. The method according to claim 1, wherein the writing the trace-source information category as a new attribute name and the corresponding encrypted string as an attribute content into the xml file comprises:
when a downloading request is a common user, adding at least two tracing information attributes for the downloading backup file, and writing an encrypted character string corresponding to the at least two tracing information attributes into the extensible markup language file as a corresponding attribute added attribute value of the at least two tracing information attributes.
6. The method of claim 1, further comprising:
and after the downloading is finished, deleting the downloaded backup file.
7. A network disk file tracing device is characterized by comprising:
the receiving module is used for receiving a network disk file downloading request and determining tracking and tracing information according to the network disk file downloading request;
the recording module is used for recording the tracing information in a network disk log and generating an encrypted character string according to the tracing information;
the generating module is used for generating a downloading backup file for the network disk file;
the judging module is used for judging whether the network disk file is an Office Open XML file or not, and when the network disk file is the Office Open XML file, decompressing the downloaded backup file to obtain an extensible markup language file with file customization attributes in the document attribute file;
the new adding module is used for adding attributes in the extensible markup language file, taking the tracking and tracing information type as a new attribute name, and taking a corresponding encrypted character string as attribute content to be written into the extensible markup language file;
the first writing module is used for writing the written extensible markup language file into the content extensible markup language file as a rewriting target;
the second writing module is used for writing the written extensible markup language file into the relational extensible markup language file as a relational target;
and the compression module is used for compressing the modified decompressed file to generate a download file for the user to download.
8. The apparatus of claim 7, comprising:
the tracing information comprises:
advanced trace traceability information, comprising: ID of the network disk file, ID of a downloader, downloading time and storage path of the network disk file; and/or the primary tracing information comprises: the login name, name of the downloader, and the name of the network disk file.
9. A mesh tray, characterized in that it comprises:
one or more processors;
storage means for storing one or more programs;
when executed by the one or more processors, cause the one or more processors to implement the method for traceback of a webdisk file as recited in any of claims 1-6.
10. A storage medium containing computer executable instructions for performing the method of traceback of a webdisk file according to any of claims 1 to 6 when executed by a computer processor.
CN202210243697.XA 2022-03-14 2022-03-14 Network disk file tracing method and device, network disk and storage medium Active CN114329367B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210243697.XA CN114329367B (en) 2022-03-14 2022-03-14 Network disk file tracing method and device, network disk and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210243697.XA CN114329367B (en) 2022-03-14 2022-03-14 Network disk file tracing method and device, network disk and storage medium

Publications (2)

Publication Number Publication Date
CN114329367A true CN114329367A (en) 2022-04-12
CN114329367B CN114329367B (en) 2022-07-26

Family

ID=81033364

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210243697.XA Active CN114329367B (en) 2022-03-14 2022-03-14 Network disk file tracing method and device, network disk and storage medium

Country Status (1)

Country Link
CN (1) CN114329367B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116011410A (en) * 2023-03-27 2023-04-25 天津联想协同科技有限公司 Method, device, network disk and storage medium for realizing document call content
CN116595498A (en) * 2023-07-11 2023-08-15 北京升鑫网络科技有限公司 Document tracking and tracing method and system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111930712A (en) * 2020-09-10 2020-11-13 北京联想协同科技有限公司 File control method and device and storage medium
CN112583918A (en) * 2020-12-11 2021-03-30 广州润普网络科技有限公司 Intranet and extranet document interaction system, method and storage medium
CN113177226A (en) * 2021-04-21 2021-07-27 上海辛格迪健康科技有限公司 Confidential method and system for displaying files to external users through network
CN113254408A (en) * 2021-07-13 2021-08-13 北京艾秀信安科技有限公司 Invisible mark adding method, device, medium and electronic equipment
CN113946873A (en) * 2021-12-21 2022-01-18 天津联想协同科技有限公司 Off-disk file tracing method and device, terminal and storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111930712A (en) * 2020-09-10 2020-11-13 北京联想协同科技有限公司 File control method and device and storage medium
CN112583918A (en) * 2020-12-11 2021-03-30 广州润普网络科技有限公司 Intranet and extranet document interaction system, method and storage medium
CN113177226A (en) * 2021-04-21 2021-07-27 上海辛格迪健康科技有限公司 Confidential method and system for displaying files to external users through network
CN113254408A (en) * 2021-07-13 2021-08-13 北京艾秀信安科技有限公司 Invisible mark adding method, device, medium and electronic equipment
CN113946873A (en) * 2021-12-21 2022-01-18 天津联想协同科技有限公司 Off-disk file tracing method and device, terminal and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
林海伦等: "基于Cookie的网盘资源在线溯源方法", 《通信学报》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116011410A (en) * 2023-03-27 2023-04-25 天津联想协同科技有限公司 Method, device, network disk and storage medium for realizing document call content
CN116011410B (en) * 2023-03-27 2023-08-11 天津联想协同科技有限公司 Method, device, network disk and storage medium for realizing document call content
CN116595498A (en) * 2023-07-11 2023-08-15 北京升鑫网络科技有限公司 Document tracking and tracing method and system
CN116595498B (en) * 2023-07-11 2023-09-29 北京升鑫网络科技有限公司 Document tracking and tracing method and system

Also Published As

Publication number Publication date
CN114329367B (en) 2022-07-26

Similar Documents

Publication Publication Date Title
US11740992B2 (en) Deriving component statistics for a stream enabled application
JP4150060B2 (en) Method for loading a resource module in a computer system
CN114329367B (en) Network disk file tracing method and device, network disk and storage medium
US8977661B2 (en) System, method and computer readable medium for file management
US9262643B2 (en) Encrypting files within a cloud computing environment
US9665394B2 (en) Sharing application objects among multiple tenants
US20140019497A1 (en) Modification of files within a cloud computing environment
CN114329366B (en) Network disk file control method and device, network disk and storage medium
CN112650956A (en) Excel document tracking method and system, electronic device and storage medium
CN113918999B (en) Method and device for establishing safe ferry channel, network disk and storage medium
CN110727476B (en) Method, device, equipment and storage medium for generating authorization configuration file
CN113946873B (en) Off-disk file tracing method and device, terminal and storage medium
WO2022174737A1 (en) Method for running neural network model, and electronic device and storage medium
CN110070360B (en) Transaction request processing method, device, equipment and storage medium
US8448244B1 (en) Methods and systems for fused files comprising logic and content data
CN107533614B (en) Device for storing data and storage medium
US9400894B1 (en) Management of log files subject to edit restrictions that can undergo modifications
US7634521B1 (en) Technique for scanning stealthed, locked, and encrypted files
CN115130130A (en) Network disk file unlocking method and device, network disk and storage medium
US9064134B1 (en) Method and apparatus for mitigating software vulnerabilities
CN112114811A (en) Compiling method, device and equipment
US20170286195A1 (en) Information object system
US20230359591A1 (en) Offloading data processing into computational storage using journaling
GB2561862A (en) Computer device and method for handling files
CN117298598A (en) Method and device for processing resource package, storage medium and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant