CN115238314A - Network disk file display method and device, network disk and storage medium - Google Patents
Network disk file display method and device, network disk and storage medium Download PDFInfo
- Publication number
- CN115238314A CN115238314A CN202211154326.0A CN202211154326A CN115238314A CN 115238314 A CN115238314 A CN 115238314A CN 202211154326 A CN202211154326 A CN 202211154326A CN 115238314 A CN115238314 A CN 115238314A
- Authority
- CN
- China
- Prior art keywords
- information
- file
- privacy
- network disk
- files
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 57
- 230000008569 process Effects 0.000 description 9
- 230000003287 optical effect Effects 0.000 description 6
- 238000010586 diagram Methods 0.000 description 5
- 230000006870 function Effects 0.000 description 4
- 230000009471 action Effects 0.000 description 3
- 238000004364 calculation method Methods 0.000 description 2
- 239000013307 optical fiber Substances 0.000 description 2
- 238000005457 optimization Methods 0.000 description 2
- 230000002093 peripheral effect Effects 0.000 description 2
- 230000000644 propagated effect Effects 0.000 description 2
- 238000003491 array Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000008707 rearrangement Effects 0.000 description 1
- 238000011084 recovery Methods 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
Landscapes
- Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Databases & Information Systems (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Medical Informatics (AREA)
- Storage Device Security (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The invention discloses a network disk file display method and device, a network disk and a storage medium. Wherein the method comprises the following steps: receiving a network disk access request sent by a terminal, and matching the identity authentication information and/or terminal configuration information of the access user with at least two privacy display setting lists to obtain a privacy display setting list which is successfully matched; obtaining the information of the private files or private folders in the access target according to the privacy display setting list successfully matched; determining the information of the public files or the public folders according to the information of all files and files in the access target and the information of the private files or the private folders; and transmitting the public document or the public folder information to the terminal so that the terminal only displays the public document or the public folder. The file display list can be set for the privacy sensitive files, and compared with the existing mode, the method is simple in operation and capable of reducing the possibility of file divulgence.
Description
Technical Field
The embodiment of the invention relates to the technical field of network disks, in particular to a network disk file display method, a network disk file display device, a network disk and a storage medium.
Background
The network disk is an online storage service released by internet companies. The network disk system machine room divides a certain disk space for users, provides file management functions such as storage, access, backup and sharing of files for the users free or charged, and has high-level disaster recovery backup in all parts of the world. The user can see the network disk as a hard disk or a U disk placed on the network, whether in home, a unit or anywhere else, and can manage and edit the files in the network disk by connecting to the Internet. The portable type solar water heater is not required to be carried about and is not afraid of being lost.
In the network disk, a user can view files in the network disk through a browser or a client, and can view the files and view file information in the content of the folder through operations similar to those in a resource manager.
In the process of implementing the invention, the inventor finds the following technical problems: when the network disk is used for displaying externally, all files and names of the files under the file folder can be displayed in the process that a user clicks the file folder in the network disk to search for a target file. Some of these files may not be intended to be seen by others and if they are seen by others, they may pose a risk of compromise. In order to avoid secret divulgence, privacy protection operation is required. In general, it is necessary to copy sensitive files in the exposed folder to other private files and delete sensitive files in the exposed folder. After the external display is finished, the file needs to be copied back to the display folder in order to facilitate the file filing. The method is not only complicated in operation, but also easy to generate filing errors, so that the file leakage condition is caused.
Disclosure of Invention
The embodiment of the invention provides a network disk file display method and device, a network disk and a storage medium, and aims to solve the technical problems that privacy protection operation on sensitive file names in folders is complicated and secret leakage is easy to occur in the display process in the prior art.
In a first aspect, an embodiment of the present invention provides a method for displaying a network disk file, including:
receiving a network disk access request sent by a terminal, wherein the network disk access request comprises: accessing user identity authentication information and/or terminal configuration information, and accessing a target, wherein the terminal configuration information comprises: display brightness or volume of the terminal;
matching the access user identity authentication information and/or the terminal configuration information with at least two privacy display setting lists to obtain a privacy display setting list which is successfully matched;
obtaining the information of the private files or private folders in the access target according to the privacy display setting list successfully matched;
determining public files or public folder information according to all files and information of the files in the access target and the private files or the private folder information;
and transmitting the public document or the public folder information to the terminal so that the terminal only displays the public document or the public folder.
In a second aspect, an embodiment of the present invention further provides a network disk file display apparatus, including:
a receiving module, configured to receive a network disk access request sent by a terminal, where the network disk access request includes: accessing user identity authentication information and/or terminal configuration information, and accessing a target, wherein the terminal configuration information comprises: display brightness or volume of the terminal;
the matching module is used for matching the access user identity authentication information and/or the terminal configuration information with at least two privacy display setting lists to obtain a privacy display setting list successfully matched;
the acquisition module is used for acquiring the information of the private files or the private folders in the access target according to the privacy display setting list successfully matched;
the determining module is used for determining the public files or the public folder information according to all files and information of the files in the access target and the private files or the private folder information;
and the sending module is used for sending the public file or the public folder information to the terminal so that the terminal only displays the public file or the public folder.
In a third aspect, an embodiment of the present invention further provides a network disk, including:
one or more processors;
storage means for storing one or more programs;
when the one or more programs are executed by the one or more processors, the one or more processors are enabled to implement the network disk file display method provided by the above embodiment.
In a fourth aspect, the present invention further provides a storage medium containing computer-executable instructions, which when executed by a computer processor, are configured to perform the method for displaying a network disk file provided in the foregoing embodiments.
The method, the device, the network disk and the storage medium for displaying the network disk file provided by the embodiment of the invention receive a network disk access request sent by a terminal, wherein the network disk access request comprises the following steps: accessing user identity authentication information and/or terminal configuration information, and accessing a target, wherein the terminal configuration information comprises: display brightness or volume of the terminal; matching the access user identity authentication information and/or the terminal configuration information with at least two privacy display setting lists to obtain a privacy display setting list which is successfully matched; obtaining the information of the private files or private folders in the access target according to the privacy display setting list successfully matched; determining the information of the public files or the public folders according to the information of all files and files in the access target and the information of the private files or the private folders; and transmitting the public document or the public folder information to the terminal so that the terminal only displays the public document or the public folder. The file display list can be set for the privacy sensitive files, and the display mode capable of viewing the privacy sensitive files is set through privacy setting. In the process that a user operates the network disk folder step by step, the privacy file can be displayed only when the user adopts the corresponding authentication information and the configuration information of the terminal, otherwise, the names and other attribute information of the privacy file and the privacy folder are not displayed, so that other viewers cannot perceive the existence of the privacy file and the privacy folder. Compared with the existing mode, the method is simple to operate, and the possibility of file leakage is reduced.
Drawings
Other features, objects and advantages of the invention will become more apparent upon reading of the detailed description of non-limiting embodiments made with reference to the following drawings:
fig. 1 is a flowchart of a method for displaying a network disk file according to an embodiment of the present invention;
fig. 2 is a flowchart of a network disk file display method according to a second embodiment of the present invention;
fig. 3 is a flowchart of a network disk file display method according to a third embodiment of the present invention;
fig. 4 is a flowchart of a network disk file display method according to a fourth embodiment of the present invention;
fig. 5 is a flowchart of a method for displaying a network disk file according to a fifth embodiment of the present invention;
fig. 6 is a structural diagram of a network disk file display device according to a sixth embodiment of the present invention;
fig. 7 is a structural diagram of a network disk according to a seventh embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the invention and are not to be construed as limiting the invention. It should be further noted that, for the convenience of description, only some of the structures related to the present invention are shown in the drawings, not all of the structures.
Example one
Fig. 1 is a flowchart of a network disk file display method according to an embodiment of the present invention, where this embodiment is applicable to a case where a privacy-sensitive file in a network disk is hidden and displayed when a network disk file is demonstrated, and the method may be executed by a network disk file display apparatus, and specifically includes the following steps:
The network disk can provide file viewing service for users. A user can log in the network disk through a client or a WEB page of the network disk, and select a corresponding file storage path to view a corresponding file or folder through an operation mode similar to a resource manager. The access target may be a file directory opened step by step, and the file directory may be a folder.
In some cases, the user needs to use the files in the network disk for showing. In the display process, a user needs to open a file directory step by step according to the storage path of the file to find out the corresponding display file. However, when the file directory is opened stage by stage, there may exist some privacy-sensitive files or folders under the directory opened stage by stage, which is inconvenient for others to display. For example: the corresponding quotation and implementation needs to be presented to client a. But the upper directory of the folder typically also has other customer quotations and implementations. In this scenario, the quotation and implementation of other clients are privacy sensitive files. It needs to be processed so that customer a cannot see the quotations and implementations of other customers during the display process.
Generally, a user needs to log in at a client or a web page to realize access to a network disk. In this embodiment, other privacy-sensitive files in the storage path corresponding to the network disk file that the current user needs to show may be determined by using the network disk access request sent by the user through the terminal, and may be hidden and displayed.
Illustratively, the privacy-sensitive file needing to be hidden and displayed can be determined according to the access user authentication information and/or the terminal configuration information of the network disk access request. Illustratively, the accessing the user authentication information may include: the auxiliary password input by the user logging in the network disk or the gesture input by the user logging in the network disk. The terminal configuration information includes: display brightness or volume of the terminal.
The sub-passwords may be different passwords respectively set under the same user ID. Correspondingly, gesture actions of a plurality of login net discs can be set as the auxiliary password for the same user.
The access target can be a folder clicked each time the user searches the network disk file. In this embodiment, the number of access targets may be multiple, and each clicked folder serves as the current access target.
And 120, matching the access user identity authentication information and/or the terminal configuration information with at least two privacy display setting lists to obtain a privacy display setting list successfully matched.
In this embodiment, the user may set the privacy-sensitive file list under different conditions in advance. Each condition may correspond to a list of privacy sensitive files. Illustratively, a user can set a file display list corresponding to each kind of user authentication information and/or terminal configuration information through a privacy setting menu, and the list indicates whether preset network disk privacy files are displayed in each directory of a network disk under different conditions.
And acquiring the identity authentication information and/or terminal configuration information of the access user by analyzing the network disk access request. Because each privacy display setting list corresponds to one user identity authentication information and/or terminal configuration information pair, the access user identity authentication information and/or terminal configuration information are matched with at least two privacy display setting lists to obtain a privacy display setting list which is successfully matched.
And step 130, obtaining the information of the privacy file or the privacy folder in the access target according to the privacy display setting list successfully matched.
And determining an access target according to the operation of clicking the network disk folder by the user, and searching the privacy display setting list successfully matched with the access target, namely the privacy or the information of the privacy folder included in the corresponding clicked folder.
And removing the private files and the private folders from all the files and folders under the access target to obtain the information of the public files and the public folders.
The network disk sends the public document or the public folder information to the terminal through a specific port. If no other files or folders exist, null information is sent to the terminal. The terminal carries out corresponding display through the received information, and only the public file or the public folder can be displayed on the terminal side through the mode.
In this embodiment, a network disk access request sent by a terminal is received, where the network disk access request includes: accessing user identity authentication information and/or terminal configuration information, and accessing a target, wherein the terminal configuration information comprises: display brightness or volume of the terminal; matching the access user identity authentication information and/or the terminal configuration information with at least two privacy display setting lists to obtain a privacy display setting list which is successfully matched; obtaining the information of the private files or private folders in the access target according to the privacy display setting list successfully matched; determining the information of the public files or the public folders according to the information of all files and files in the access target and the information of the private files or the private folders; and transmitting the public document or the public folder information to the terminal so that the terminal only displays the public document or the public folder. The file display list can be set for the privacy sensitive files, and the display mode capable of viewing the privacy sensitive files is set through privacy setting. In the process that the user operates the network disk folder step by step, the privacy file can be displayed only when the user adopts the corresponding authentication information and the configuration information of the terminal, otherwise, the names and other attribute information of the privacy file and the privacy folder are not displayed, so that other viewers cannot perceive the existence of the privacy file and the privacy folder. Compared with the existing mode, the method is simple to operate, and the possibility of file leakage is reduced.
Example two
Fig. 2 is a flowchart of a network disk file display method according to a second embodiment of the present invention. In this embodiment, the access user authentication information and/or the terminal configuration information are matched with at least two privacy display setting lists to obtain a privacy display setting list successfully matched, and the specific optimization is as follows: and matching the access user identity authentication information with at least two network disk personal space privacy display setting lists to obtain a successfully matched personal space privacy display setting list.
Correspondingly, the method for displaying the network disk file provided by the embodiment specifically includes:
And step 220, matching the access user identity authentication information with at least two network disk personal space privacy display setting lists to obtain a successfully matched personal space privacy display setting list.
The storage space in the network disk can be divided into a personal space and a collaborative office space, wherein the personal space can be used for storing personal files of the current user and files frequently used by the current user. And the collaborative office space mainly stores files in departments or project groups which need collaborative processing. The two are different in use purpose and file authority. In some cases, the user needs to view and edit the files in the personal space. But does not want to expose files relating to personal privacy. Therefore, in the present embodiment, the user can input different user authentication information. The situation that people around know the existence of the privacy file in a screen watching mode is avoided.
Optionally, different gesture operations input by the user or different login passwords may be matched with the at least one network disk personal space privacy display setting list to obtain a successfully matched personal space privacy display setting list.
And step 230, acquiring the private file or the private folder information in the access target according to the successfully matched personal space privacy display setting list.
And step 250, sending the public file or the public folder information to the terminal so that the terminal only displays the public file or the public folder.
In this embodiment, the access user authentication information and/or the terminal configuration information are matched with the access user authentication information and/or the terminal configuration information in the preset file display list, and the method specifically optimizes the access user authentication information and/or the terminal configuration information as follows: determining the display grade of the personal space file according to the identity verification information of the access user; and matching files or folders with the display grades of the personal space files from a preset personal space file display list. The user can conveniently set the file display grades with different grades by accessing the user identity authentication information, and the files are displayed according to the display grades. The method can prevent people around from knowing the existence of the privacy file in a screen watching mode, and improves the safety of the personal space privacy file of the network disk. And the user can customize various user authentication information to correspond to different display grades, so that corresponding privacy files or folders can be defined conveniently in different network disk use scenes, and the applicability of checking the privacy files is improved.
EXAMPLE III
Fig. 3 is a flowchart of a network disk file display method according to a third embodiment of the present invention. In this embodiment, the access user authentication information and/or the terminal configuration information are matched with at least two privacy display setting lists to obtain a privacy display setting list successfully matched, and the specific optimization is as follows: and matching the terminal configuration information with at least two network disk office space privacy display setting lists to obtain successfully matched office space privacy display setting lists.
The method for displaying the network disk file provided by the embodiment specifically includes:
And step 320, matching the terminal configuration information with at least two network disk office space privacy display setting lists to obtain an office space privacy display setting list successfully matched.
In the daily office process, users usually edit or view files cooperatively in the network disk office space. Part of the file needs to be kept secret due to project requirements. If the privacy file is set and checked by the identity authentication information mode, the user is required to log out and log in repeatedly, so that the operation is complex, and the privacy setting is easily found by other people. Therefore, in the present embodiment, the terminal configuration information may be employed as a condition for determining the display of the privacy file. As described in the foregoing embodiment, the privacy file may be set in a terminal setting manner such as volume and brightness. To enhance privacy of the adjust viewing conditions action.
Correspondingly, the network disk matches the terminal configuration information with at least two network disk office space privacy display setting lists by receiving the terminal configuration information to obtain successfully matched office space privacy display setting lists.
And step 330, obtaining the information of the private file or the private folder in the access target according to the successfully matched network disk office space privacy display setting list.
And step 350, sending the public file or the public folder information to the terminal so that the terminal only displays the public file or the public folder.
In this embodiment, the access user authentication information and/or the terminal configuration information are matched with at least two privacy display setting lists to obtain a privacy display setting list successfully matched, which is specifically optimized as follows: and matching the terminal configuration information with at least two network disk office space privacy display setting lists to obtain successfully matched office space privacy display setting lists. The privacy of the adjust view condition action may be further enhanced.
Example four
Fig. 4 is a flowchart of a network disk file display method according to a fourth embodiment of the present invention. In this embodiment, the access user authentication information and/or the terminal configuration information are matched with at least two privacy display setting lists to obtain a successfully matched privacy display setting list, which is specifically optimized as follows: determining a storage space of a display file according to the identity authentication information of the access user; and matching the terminal configuration information with at least two network disk file storage space privacy display setting lists to obtain a successfully matched network disk file storage space privacy display setting list.
The method for displaying the network disk file provided by the embodiment specifically includes:
And step 420, determining a storage space of the display file according to the identity authentication information of the access user.
In this embodiment, the above method can be used in a case where a lecture or a presentation is performed to the outside using a network disk. In the above case, if all the files in the network disk need to be matched in the above manner, much calculation power is required. While only a specific few directories are usually involved in the presentation or demonstration. Therefore, in this embodiment, the files or folders that are displayed and need to be subjected to privacy processing can be determined according to the user authentication information.
Optionally, a corresponding comparison table may be formed according to a preset correspondence between the user authentication information and the designated file storage space, and the corresponding display file storage space may be determined by looking up the matching table.
And 430, matching the terminal configuration information with at least two network disk file storage space privacy display setting lists to obtain a successfully matched network disk file storage space privacy display setting list.
And step 440, acquiring the information of the private files or private folders in the access target according to the successfully matched private display setting list.
And step 450, determining the public files or the public folder information according to the information of all the files and files in the access target and the information of the private files or the private folders.
In this embodiment, the access user authentication information and/or the terminal configuration information are matched with at least two privacy display setting lists to obtain a privacy display setting list successfully matched, which is specifically optimized as follows: determining a storage space of a display file according to the identity authentication information of the access user; and matching the terminal configuration information with at least two network disk file storage space privacy display setting lists to obtain a successfully matched network disk file storage space privacy display setting list. The network disk file display scene can be determined, corresponding privacy files are correspondingly matched according to the displayed specific folder, the calculation amount of the network disk for searching all files of the network disk is reduced, and the privacy setting efficiency is improved. Meanwhile, the requirement of the current display scene on the safety of the private files of the specific folder can be effectively distinguished, the display efficiency of the network disk private files is improved, and the display efficiency of the files is improved.
EXAMPLE five
Fig. 5 is a flowchart of a network disk file display method according to a fifth embodiment of the present invention. In this embodiment, the method may further include the following steps: checking whether the newly added file exists in the storage path at regular time, and determining privacy setting of the newly added file according to the number of collaborative editors of the newly added file; and adding the privacy setting of the newly added file into the privacy display setting list of the successfully matched network disk file storage space.
Correspondingly, the method for displaying the network disk file provided by the embodiment specifically includes:
step 510, receiving a network disk access request sent by a terminal, where the network disk access request includes: accessing user identity authentication information and/or terminal configuration information, and accessing a target, wherein the terminal configuration information comprises: display brightness or volume of the terminal.
And step 520, regularly checking whether the newly added file exists in the access target, and determining the privacy setting of the newly added file according to the number of the collaborative editors of the newly added file.
In an office space, office documents of a plurality of people are stored in the office space. A person with authority can create a file and delete a file. Thus, the files therein are in real-time change. Adding a file also involves privacy settings. Therefore, in this embodiment, the network disk system checks whether the new file exists in the storage path at regular time. And determining the privacy setting of the newly added file according to the number of the collaborative editors of the newly added file. For example, the privacy of the newly added file may be set as a public file when the number of collaborative editing people exceeds a preset threshold of the number of collaborative editing people. Generally, when the number of collaborative editors is large, it can be stated that the newly added file fills out files in a universal big set, for example: daily newspaper, etc. Its privacy is not high. Therefore, the newly added file can be displayed, so that the user can know the newly added file as soon as possible and finish the editing work of the newly added file as soon as possible.
And step 530, adding the privacy setting of the newly added file into the privacy display setting list of the successfully matched network disk file storage space.
And 540, matching the access user identity authentication information and/or the terminal configuration information with at least two privacy display setting lists to obtain a privacy display setting list successfully matched.
And 550, acquiring the information of the private file or the private folder in the access target according to the privacy display setting list successfully matched.
The present embodiment adds the following steps: regularly checking whether the newly added file exists in the storage path, and determining the privacy setting of the newly added file according to the number of the collaborative editors of the newly added file; and adding the privacy setting of the newly added file into the privacy display setting list of the successfully matched network disk file storage space. When a document is newly added in an office space, whether the document is displayed or not can be judged according to the authority characteristics of the newly added document, the newly added collaborative editing document can be displayed to a user in time under the condition that the security of the privacy document is protected as far as possible, and the user can finish editing the document as soon as possible. On the premise of protecting the privacy of the file, the working efficiency of collaboratively editing the document is improved.
EXAMPLE six
Fig. 6 is a structural diagram of a network disk file display apparatus according to a sixth embodiment of the present invention, and as shown in fig. 6, the apparatus includes:
a receiving module 610, configured to receive a network disk access request sent by a terminal, where the network disk access request includes: accessing user identity authentication information and/or terminal configuration information, and accessing a target, wherein the terminal configuration information comprises: display brightness or volume of the terminal;
the matching module 620 is configured to match the access user authentication information and/or the terminal configuration information with at least two privacy display setting lists to obtain a privacy display setting list successfully matched with the access user authentication information and/or the terminal configuration information;
an obtaining module 630, configured to obtain the private file or the private folder information in the access target according to the successfully matched private display setting list;
a determining module 640, configured to determine public files or public folder information according to information of all files and files in the access target and the private files or private folder information;
a sending module 650, configured to send the public file or the public folder information to the terminal, so that the terminal only displays the public file or the public folder.
The network disk file display device provided in this embodiment receives a network disk access request sent by a terminal, where the network disk access request includes: accessing user identity authentication information and/or terminal configuration information, and accessing a target, wherein the terminal configuration information comprises: display brightness or volume of the terminal; matching the access user identity authentication information and/or the terminal configuration information with at least two privacy display setting lists to obtain a privacy display setting list which is successfully matched; obtaining the information of the private files or private folders in the access target according to the privacy display setting list successfully matched; determining the information of the public files or the public folders according to the information of all files and files in the access target and the information of the private files or the private folders; and transmitting the public document or the public folder information to the terminal so that the terminal only displays the public document or the public folder. The file display list can be set for the privacy sensitive files, and the display mode capable of viewing the privacy sensitive files is set through privacy setting. In the process that a user operates the network disk folder step by step, the privacy file can be displayed only when the user adopts the corresponding authentication information and the configuration information of the terminal, otherwise, the names and other attribute information of the privacy file and the privacy folder are not displayed, so that other viewers cannot perceive the existence of the privacy file and the privacy folder. Compared with the existing mode, the method is simple to operate, and the possibility of file leakage is reduced.
On the basis of the foregoing embodiments, the accessing the user authentication information includes:
the auxiliary password input by the user logging in the network disk or the gesture input by the user logging in the network disk.
On the basis of the above embodiments, the matching module includes:
and the personal space matching unit is used for matching the access user authentication information with at least two network disk personal space privacy display setting lists to obtain a successfully matched personal space privacy display setting list.
On the basis of the above embodiments, the matching module includes:
and the public space matching unit is used for matching the terminal configuration information with at least two network disk office space privacy display setting lists to obtain successfully matched office space privacy display setting lists.
On the basis of the above embodiments, the matching module includes: :
the determining unit is used for determining a storage space of the display file according to the identity authentication information of the access user;
and the matching unit is used for matching the terminal configuration information with at least two network disk file storage space privacy display setting lists to obtain a successfully matched network disk file storage space privacy display setting list.
On the basis of the above embodiments, the apparatus further includes:
the checking module is used for checking whether the newly added file exists in the access target at regular time and determining the privacy setting of the newly added file according to the number of the collaborative editors of the newly added file;
and the adding module is used for adding the privacy setting of the newly added file into the privacy display setting list of the successfully matched network disk file storage space.
On the basis of the foregoing embodiments, the viewing module includes:
and the public file setting unit is used for setting the privacy of the newly-added file as a public file when the number of the collaborative editing people exceeds a preset threshold value of the number of the collaborative editing people.
The network disk file display device provided by the embodiment of the invention can execute the network disk file display method provided by any embodiment of the invention, and has the corresponding functional modules and beneficial effects of the execution method.
EXAMPLE seven
Fig. 7 is a schematic structural diagram of a mesh disc according to a sixth embodiment of the present invention. Fig. 7 shows a block diagram of an exemplary mesh disk 12 suitable for use in implementing embodiments of the present invention. The mesh tray 12 shown in fig. 7 is only an example, and should not bring any limitation to the function and the use range of the embodiment of the present invention.
As shown in fig. 7, the network disk 12 is in the form of a general purpose computing device. The components of the mesh tray 12 may include, but are not limited to: one or more processors or processing units 16, a system memory 28, and a bus 18 that couples various system components including the system memory 28 and the processing unit 16.
The mesh tray 12 typically includes a variety of computer system readable media. Such media may be any available media that is accessible by the network disk 12 and includes both volatile and nonvolatile media, removable and non-removable media.
The system memory 28 may include computer system readable media in the form of volatile memory, such as Random Access Memory (RAM) 30 and/or cache 32. The network disk 12 may further include other removable/non-removable, volatile/nonvolatile computer system storage media. By way of example only, storage system 34 may be used to read from and write to non-removable, nonvolatile magnetic media (not shown in FIG. 7, and commonly referred to as a "hard drive"). Although not shown in FIG. 7, a magnetic disk drive for reading from and writing to a removable, nonvolatile magnetic disk (e.g., a "floppy disk") and an optical disk drive for reading from or writing to a removable, nonvolatile optical disk (e.g., a CD-ROM, DVD-ROM, or other optical media) may be provided. In these cases, each drive may be connected to bus 18 by one or more data media interfaces. System memory 28 may include at least one program product having a set (e.g., at least one) of program modules that are configured to carry out the functions of embodiments of the invention.
A program/utility 40 having a set (at least one) of program modules 42 may be stored, for example, in system memory 28, such program modules 42 including, but not limited to, an operating system, one or more application programs, other program modules, and program data, each of which examples or some combination thereof may comprise an implementation of a network environment. Program modules 42 generally carry out the functions and/or methodologies of embodiments of the invention as described.
The network disk 12 may also communicate with one or more external devices 14 (e.g., keyboard, pointing device, display 24, etc.), with one or more devices that enable a user to interact with the network disk 12, and/or with any devices (e.g., network card, modem, etc.) that enable the network disk 12 to communicate with one or more other computing devices. Such communication may be through an input/output (I/O) interface 22. Also, the network disk 12 may communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network such as the Internet) via the network adapter 20. As shown, the network adapter 20 communicates with the other modules of the network disk 12 via the bus 18. It should be understood that although not shown in the figures, other hardware and/or software modules may be used in conjunction with the network disk 12, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, and data backup storage systems, among others.
The processing unit 16 executes various functional applications and data processing by executing programs stored in the system memory 28, for example, to implement the network disk file display method provided by the embodiment of the present invention.
Example eight
An eighth embodiment of the present invention further provides a storage medium containing computer-executable instructions, where the computer-executable instructions, when executed by a computer processor, are configured to perform any one of the foregoing network disk file display methods provided in the foregoing embodiments.
Computer storage media for embodiments of the invention may employ any combination of one or more computer-readable media. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
A computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, smalltalk, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
It is to be noted that the foregoing description is only exemplary of the invention and that the principles of the technology may be employed. It will be understood by those skilled in the art that the present invention is not limited to the particular embodiments described herein, but is capable of various obvious changes, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the invention. Therefore, although the present invention has been described in greater detail by the above embodiments, the present invention is not limited to the above embodiments, and may include other equivalent embodiments without departing from the spirit of the present invention, and the scope of the present invention is determined by the scope of the appended claims.
Claims (10)
1. A method for displaying a network disk file is characterized by comprising the following steps:
receiving a network disk access request sent by a terminal, wherein the network disk access request comprises: accessing user identity authentication information and/or terminal configuration information, and accessing a target, wherein the terminal configuration information comprises: display brightness or volume of the terminal;
matching the access user identity authentication information and/or the terminal configuration information with at least two privacy display setting lists to obtain a privacy display setting list which is successfully matched;
obtaining the information of the private files or private folders in the access target according to the privacy display setting list successfully matched;
determining the information of the public files or the public folders according to the information of all files and files in the access target and the information of the private files or the private folders;
and transmitting the public document or the public folder information to the terminal so that the terminal only displays the public document or the public folder.
2. The method of claim 1, wherein accessing user authentication information comprises:
the auxiliary password input by the user logging in the network disk or the gesture input by the user logging in the network disk.
3. The method as claimed in claim 1, wherein the matching the access user authentication information and/or the terminal configuration information with at least two privacy display setting lists to obtain a privacy display setting list successfully matched comprises:
and matching the access user identity authentication information with at least two network disk personal space privacy display setting lists to obtain a successfully matched personal space privacy display setting list.
4. The method according to claim 1, wherein the matching the access user authentication information and/or the terminal configuration information with at least two privacy display setting lists to obtain a successfully matched privacy display setting list comprises:
and matching the terminal configuration information with at least two network disk office space privacy display setting lists to obtain successfully matched office space privacy display setting lists.
5. The method as claimed in claim 1, wherein the matching the access user authentication information and/or the terminal configuration information with at least two privacy display setting lists to obtain a privacy display setting list successfully matched comprises:
determining a storage space of a display file according to the identity authentication information of the access user;
and matching the terminal configuration information with at least two network disk file storage space privacy display setting lists to obtain a successfully matched network disk file storage space privacy display setting list.
6. The method of claim 1, further comprising:
regularly checking whether a newly added file exists in the access target, and determining privacy setting of the newly added file according to the number of collaborative editors of the newly added file;
and adding the privacy setting of the newly added file into the privacy display setting list of the successfully matched network disk file storage space.
7. The method according to claim 6, wherein the determining the privacy setting of the added file according to the number of the collaborative editors of the added file comprises:
and when the number of the collaborative editing people exceeds a preset threshold value of the number of the collaborative editing people, setting the privacy of the newly added file as a public file.
8. A network disk file display device, comprising:
a receiving module, configured to receive a network disk access request sent by a terminal, where the network disk access request includes: accessing user identity authentication information and/or terminal configuration information, and accessing a target, wherein the terminal configuration information comprises: display brightness or volume of the terminal;
the matching module is used for matching the access user identity authentication information and/or the terminal configuration information with at least two privacy display setting lists to obtain a privacy display setting list successfully matched;
the acquisition module is used for acquiring the information of the private files or the private folders in the access target according to the privacy display setting list successfully matched;
the determining module is used for determining the public files or the public folder information according to all files and information of the files in the access target and the private files or the private folder information;
and the sending module is used for sending the information of the public files or the public folders to the terminal so that the terminal only displays the public files or the public folders.
9. A mesh tray, characterized in that it comprises:
one or more processors;
storage means for storing one or more programs;
when executed by the one or more processors, cause the one or more processors to implement the method for displaying a netdisk file as recited in any of claims 1-7.
10. A storage medium containing computer-executable instructions for performing the method of displaying a netdisk file according to any one of claims 1-7 when executed by a computer processor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211154326.0A CN115238314B (en) | 2022-09-22 | 2022-09-22 | Network disk file display method and device, network disk and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211154326.0A CN115238314B (en) | 2022-09-22 | 2022-09-22 | Network disk file display method and device, network disk and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN115238314A true CN115238314A (en) | 2022-10-25 |
CN115238314B CN115238314B (en) | 2023-02-17 |
Family
ID=83667068
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202211154326.0A Active CN115238314B (en) | 2022-09-22 | 2022-09-22 | Network disk file display method and device, network disk and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115238314B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116011410A (en) * | 2023-03-27 | 2023-04-25 | 天津联想协同科技有限公司 | Method, device, network disk and storage medium for realizing document call content |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106096449A (en) * | 2016-06-20 | 2016-11-09 | 乐视控股(北京)有限公司 | Document protection method and device |
CN106548051A (en) * | 2016-10-31 | 2017-03-29 | 宇龙计算机通信科技(深圳)有限公司 | The management method of private visit pattern, managing device and terminal |
CN108573168A (en) * | 2018-04-10 | 2018-09-25 | Oppo广东移动通信有限公司 | Private space starts method and apparatus, storage medium, electronic equipment |
CN109063504A (en) * | 2018-07-02 | 2018-12-21 | 北京珠穆朗玛移动通信有限公司 | Access method, mobile terminal and the storage medium of secret file |
CN110334068A (en) * | 2019-07-10 | 2019-10-15 | 浪潮卓数大数据产业发展有限公司 | A kind of organizing cooperating's implementation method, apparatus and system |
CN113900998A (en) * | 2021-09-30 | 2022-01-07 | 北京熵简科技有限公司 | Multi-secret knowledge management and editing system using cloud object storage |
CN113923056A (en) * | 2021-12-15 | 2022-01-11 | 天津联想协同科技有限公司 | Matching authentication method and device for multi-network segment network disk, network disk and storage medium |
CN113946808A (en) * | 2021-09-15 | 2022-01-18 | 荣耀终端有限公司 | Interface display method, electronic device and computer-readable storage medium |
CN114756841A (en) * | 2022-04-02 | 2022-07-15 | 上海上讯信息技术股份有限公司 | Personal private disk system and management method based on Windows virtual folder technology |
-
2022
- 2022-09-22 CN CN202211154326.0A patent/CN115238314B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106096449A (en) * | 2016-06-20 | 2016-11-09 | 乐视控股(北京)有限公司 | Document protection method and device |
CN106548051A (en) * | 2016-10-31 | 2017-03-29 | 宇龙计算机通信科技(深圳)有限公司 | The management method of private visit pattern, managing device and terminal |
CN108573168A (en) * | 2018-04-10 | 2018-09-25 | Oppo广东移动通信有限公司 | Private space starts method and apparatus, storage medium, electronic equipment |
CN109063504A (en) * | 2018-07-02 | 2018-12-21 | 北京珠穆朗玛移动通信有限公司 | Access method, mobile terminal and the storage medium of secret file |
CN110334068A (en) * | 2019-07-10 | 2019-10-15 | 浪潮卓数大数据产业发展有限公司 | A kind of organizing cooperating's implementation method, apparatus and system |
CN113946808A (en) * | 2021-09-15 | 2022-01-18 | 荣耀终端有限公司 | Interface display method, electronic device and computer-readable storage medium |
CN113900998A (en) * | 2021-09-30 | 2022-01-07 | 北京熵简科技有限公司 | Multi-secret knowledge management and editing system using cloud object storage |
CN113923056A (en) * | 2021-12-15 | 2022-01-11 | 天津联想协同科技有限公司 | Matching authentication method and device for multi-network segment network disk, network disk and storage medium |
CN114756841A (en) * | 2022-04-02 | 2022-07-15 | 上海上讯信息技术股份有限公司 | Personal private disk system and management method based on Windows virtual folder technology |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116011410A (en) * | 2023-03-27 | 2023-04-25 | 天津联想协同科技有限公司 | Method, device, network disk and storage medium for realizing document call content |
CN116011410B (en) * | 2023-03-27 | 2023-08-11 | 天津联想协同科技有限公司 | Method, device, network disk and storage medium for realizing document call content |
Also Published As
Publication number | Publication date |
---|---|
CN115238314B (en) | 2023-02-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10447560B2 (en) | Data leakage protection in cloud applications | |
US9396260B2 (en) | Managing multiple virtual world accounts from a single virtual lobby interface | |
US20180152515A1 (en) | File Storage Method and Apparatus for Instant Communication Messages | |
US11750652B2 (en) | Generating false data for suspicious users | |
US11940982B2 (en) | Systems and methods for locating application specific data | |
CN107729768B (en) | Page display method and device, intelligent panel and storage medium | |
US11496446B1 (en) | Protecting personally identifiable information submitted through a browser | |
CN114817969B (en) | Method, device, terminal and storage medium for previewing network disk drive letter file | |
CN109726041B (en) | Method, apparatus and computer readable medium for restoring files in a virtual machine disk | |
CN114416667A (en) | Method and device for rapidly sharing network disk file, network disk and storage medium | |
CN114385091A (en) | Method and device for realizing network disk drive character, network disk and storage medium | |
WO2019071907A1 (en) | Method for identifying help information based on operation page, and application server | |
CN112150113A (en) | Method, device and system for borrowing file data and method for borrowing data | |
CN115238314B (en) | Network disk file display method and device, network disk and storage medium | |
US20150264054A1 (en) | Collaboration space with event-trigger configuration views | |
CN107862035B (en) | Network reading method and device for conference record, intelligent tablet and storage medium | |
CN115826828B (en) | Network disk file operation method, device, terminal and storage medium | |
CN112738249A (en) | File uploading method, device, equipment and storage medium based on quantitative transaction | |
US20130191341A1 (en) | Methods and apparatus for restoring a user-selected subset of application data | |
CN114816646B (en) | Shortcut operation method, device, terminal and storage medium suitable for network disk drive letter | |
CN113377265B (en) | Annotating method and device, mobile terminal and storage medium | |
CN105354506A (en) | File hiding method and apparatus | |
CN115481413A (en) | File processing method and device, electronic equipment and storage medium | |
CN114265759A (en) | Tracing method and system after data information leakage and electronic equipment | |
CN107749892B (en) | Network reading method and device for conference record, intelligent tablet and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |