CN116306490A - Document content presentation method and device, electronic equipment and storage medium - Google Patents

Document content presentation method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN116306490A
CN116306490A CN202310274111.0A CN202310274111A CN116306490A CN 116306490 A CN116306490 A CN 116306490A CN 202310274111 A CN202310274111 A CN 202310274111A CN 116306490 A CN116306490 A CN 116306490A
Authority
CN
China
Prior art keywords
content
document
target
information
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310274111.0A
Other languages
Chinese (zh)
Inventor
许凌
杨钦鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Kingsoft Office Software Inc
Zhuhai Kingsoft Office Software Co Ltd
Wuhan Kingsoft Office Software Co Ltd
Original Assignee
Beijing Kingsoft Office Software Inc
Zhuhai Kingsoft Office Software Co Ltd
Wuhan Kingsoft Office Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Kingsoft Office Software Inc, Zhuhai Kingsoft Office Software Co Ltd, Wuhan Kingsoft Office Software Co Ltd filed Critical Beijing Kingsoft Office Software Inc
Priority to CN202310274111.0A priority Critical patent/CN116306490A/en
Publication of CN116306490A publication Critical patent/CN116306490A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/10Text processing
    • G06F40/103Formatting, i.e. changing of presentation of documents
    • G06F40/106Display of layout of documents; Previewing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/11File system administration, e.g. details of archiving or snapshots
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/16File or folder operations, e.g. details of user interfaces specifically adapted to file systems
    • G06F16/168Details of user interfaces specifically adapted to file systems, e.g. browsing and visualisation, 2d or 3d GUIs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries

Abstract

The embodiment of the application relates to a method, a device, electronic equipment and a storage medium for presenting document content, wherein the method comprises the following steps: acquiring document data of a target document and user information of a target user; determining content information of the document area content; determining a presentation mode of the document area content based on the user information and the content information; and presenting the content of the document area by adopting the presenting mode. Therefore, the document area content can be presented in a mode of matching with the user information and the content information of the document area content, so that the same document area content of the same document can be presented to users with different user information in a plurality of presentation modes, and the fineness of document management is improved.

Description

Document content presentation method and device, electronic equipment and storage medium
Technical Field
The present disclosure relates to the field of computer technologies, and in particular, to a method and apparatus for presenting document content, an electronic device, and a storage medium.
Background
Electronic documents refer to materials formed in social activities and using magnetic disks, optical disks and the like as carriers. Which rely on computer system access and which are transportable over a communications network.
In the prior art, a password is usually set, or different document authorities are set for different users to prohibit or allow the users to view the document content, so that the document management is less fine, and the users can see the whole content of the document or can not see any content of the document.
Disclosure of Invention
In view of this, in order to solve some or all of the above technical problems, embodiments of the present application provide a method, an apparatus, an electronic device, and a storage medium for presenting document content.
In a first aspect, an embodiment of the present application provides a method for presenting document content, where the method includes:
acquiring document data of a target document and user information of a target user, wherein the document data comprises document area content;
determining content information of the document area content;
determining a presentation mode of the document area content based on the user information and the content information;
and presenting the content of the document area by adopting the presenting mode.
In one possible embodiment, the content information represents a content security level, and in a case where the target user has viewing authority of the document area content, the user information represents a highest security level of the document area content where the target user has viewing authority; and
The determining the presenting mode of the document area content based on the user information and the content information comprises the following steps:
determining the highest security level of the document area content with the viewing authority of the target user based on the user information;
under the condition that the content security level represented by the content information is lower than or equal to the highest security level, determining that the presentation mode of the content in the document area is a non-desensitization mode;
and under the condition that the content density of the content information representation is higher than the highest density, determining that the presentation mode of the content of the document area is a desensitization mode.
In a possible implementation manner, in a case that the content information indicates that the content security level is higher than the highest security level, after the presenting the document area content in the presenting manner, the method further includes:
acquiring an authorization request of the target user for the presented target area content, wherein the target area content is the document area content presented in a desensitization mode, and the authorization request is used for requesting to acquire the viewing authority of the target area content;
determining authorization information corresponding to the authorization request, wherein the authorization information represents whether the target user is authorized to view the content of the target area;
Determining whether to present the target area content in a non-desensitizing manner based on the authorization information;
and in the case that the target area content is determined to be presented in a non-desensitizing mode, the target area content is presented in a non-desensitizing mode.
In one possible implementation manner, the document data is stored in a preset position, and the acquiring the document data of the target document and the user information of the target user includes:
acquiring document data of a target document and user information of a target user from a preset position;
and loading the document data of the target document and the user information of the target user into a memory.
In one possible implementation manner, the presenting the document area content in the presenting manner includes:
modifying the part of the document area content in the document data loaded into the memory into the original content with the presentation mode;
and presenting the original content with the presentation mode.
In one possible embodiment, in a case where the document area content includes confidential content, the content information includes a secret level of the confidential content in the document area content.
In one possible implementation, it is determined whether the content information includes the confidential content in one of the following ways:
determining whether the document area content comprises a target keyword, wherein the target keyword is any preset keyword in a preset keyword set; determining that the content information includes the confidential content in a case where the document area content includes the target keyword;
determining whether the document region content accords with a target regular expression, wherein the target regular expression is any preset regular expression in a preset regular expression set; determining that the content information comprises the confidential content under the condition that the document area content accords with the target regular expression;
determining whether the presentation mode of the document area content is a target presentation mode, wherein the target presentation mode is any preset presentation mode in a preset presentation mode set; and under the condition that the presentation mode of the document area content is the target presentation mode, determining that the content information comprises the confidential content.
In one possible embodiment of the present invention,
each preset keyword in the preset keyword set corresponds to a secret level; in the case that the document area content includes the target keyword, determining a secret level included in the content information based on a secret level corresponding to the target keyword;
Each preset regular expression in the preset regular expression set corresponds to a secret level; under the condition that the document area content accords with the target regular expression, determining a secret level included in the content information based on the secret level corresponding to the target regular expression;
each preset presentation mode in the preset presentation mode set corresponds to a secret level; and under the condition that the presentation mode of the document area content is the target presentation mode, determining the secret level included in the content information based on the secret level corresponding to the target presentation mode.
In a second aspect, an embodiment of the present application provides a device for presenting document content, where the device includes:
a first acquisition unit configured to acquire document data of a target document and user information of a target user, wherein the document data includes document area content;
a first determining unit configured to determine content information of the document area content;
a second determining unit configured to determine a presentation manner of the document area content based on the user information and the content information;
and the first presenting unit is used for presenting the document area content by adopting the presenting mode.
In one possible embodiment, the content information represents a content security level, and in a case where the target user has viewing authority of the document area content, the user information represents a highest security level of the document area content where the target user has viewing authority; and
the determining the presenting mode of the document area content based on the user information and the content information comprises the following steps:
determining the highest security level of the document area content with the viewing authority of the target user based on the user information;
under the condition that the content security level represented by the content information is lower than or equal to the highest security level, determining that the presentation mode of the content in the document area is a non-desensitization mode;
and under the condition that the content density of the content information representation is higher than the highest density, determining that the presentation mode of the content of the document area is a desensitization mode.
In a possible implementation manner, in a case that the content information indicates that the content security level is higher than the highest security level, after the presenting the document area content in the presenting manner, the apparatus further includes:
the second acquisition unit is used for acquiring an authorization request of the target user for the presented target area content, wherein the target area content is the document area content presented in a desensitization mode, and the authorization request is used for requesting to acquire the viewing authority of the target area content;
A third determining unit, configured to determine authorization information corresponding to the authorization request, where the authorization information indicates whether the target user is authorized to view the content of the target area;
a fourth determining unit, configured to determine whether to present the target area content in a non-desensitizing manner based on the authorization information;
and the second presentation unit is used for presenting the target area content in a non-desensitizing mode under the condition that the target area content is determined to be presented in the non-desensitizing mode.
In one possible implementation manner, the document data is stored in a preset position, and the acquiring the document data of the target document and the user information of the target user includes:
acquiring document data of a target document and user information of a target user from a preset position;
and loading the document data of the target document and the user information of the target user into a memory.
In one possible implementation manner, the presenting the document area content in the presenting manner includes:
modifying the part of the document area content in the document data loaded into the memory into the original content with the presentation mode;
And presenting the original content with the presentation mode.
In one possible embodiment, in a case where the document area content includes confidential content, the content information includes a secret level of the confidential content in the document area content.
In one possible implementation, it is determined whether the content information includes the confidential content in one of the following ways:
determining whether the document area content comprises a target keyword, wherein the target keyword is any preset keyword in a preset keyword set; determining that the content information includes the confidential content in a case where the document area content includes the target keyword;
determining whether the document region content accords with a target regular expression, wherein the target regular expression is any preset regular expression in a preset regular expression set; determining that the content information comprises the confidential content under the condition that the document area content accords with the target regular expression;
determining whether the presentation mode of the document area content is a target presentation mode, wherein the target presentation mode is any preset presentation mode in a preset presentation mode set; and under the condition that the presentation mode of the document area content is the target presentation mode, determining that the content information comprises the confidential content.
In one possible embodiment of the present invention,
each preset keyword in the preset keyword set corresponds to a secret level; in the case that the document area content includes the target keyword, determining a secret level included in the content information based on a secret level corresponding to the target keyword;
each preset regular expression in the preset regular expression set corresponds to a secret level; under the condition that the document area content accords with the target regular expression, determining a secret level included in the content information based on the secret level corresponding to the target regular expression;
each preset presentation mode in the preset presentation mode set corresponds to a secret level; and under the condition that the presentation mode of the document area content is the target presentation mode, determining the secret level included in the content information based on the secret level corresponding to the target presentation mode.
In a third aspect, an embodiment of the present application provides an electronic device, including:
a memory for storing a computer program;
and a processor, configured to execute a computer program stored in the memory, where the computer program is executed to implement a method according to any embodiment of the document content rendering method according to the first aspect of the present application.
In a fourth aspect, embodiments of the present application provide a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements a method as in any of the embodiments of the method for presenting document content of the first aspect described above.
In a fifth aspect, embodiments of the present application provide a computer program comprising computer readable code which, when run on a device, causes a processor in the device to implement a method as in any of the embodiments of the method for rendering document content of the first aspect above.
According to the method for presenting the document content, the document data of the target document and the user information of the target user can be obtained, wherein the document data comprises the document area content, then the content information of the document area content is determined, then the presenting mode of the document area content is determined based on the user information and the content information, and finally the document area content is presented by adopting the presenting mode. Therefore, the document area content can be presented in a mode of matching with the user information and the content information of the document area content, so that the same document area content of the same document can be presented to users with different user information in a plurality of presentation modes, and the fineness of document management is improved.
Drawings
FIG. 1A is a flowchart illustrating a method for presenting document content according to an embodiment of the present application;
FIGS. 1B and 1C are schematic diagrams illustrating a user information setting mode;
fig. 1D is a schematic diagram of a setting manner of a preset keyword set of a document content presentation method according to an embodiment of the present application;
FIG. 1E is a schematic presentation mode setting diagram of a method for presenting document content according to an embodiment of the present application;
FIG. 1F illustrates a schematic diagram of a labeling and rights setting mode;
FIG. 1G illustrates a schematic diagram of a scenario in which target annotation information is determined;
FIG. 1H illustrates yet another scenario diagram for determining target annotation information;
FIG. 1I illustrates a schematic view of a scenario in which first rights information is set;
FIG. 1J is a schematic diagram of a policy configuration;
FIG. 1K is a schematic diagram showing the rendering effect of the content in the first region;
FIG. 1L is a schematic diagram showing the rendering effect of the content in the second region;
FIG. 1M is a schematic diagram showing another rendering effect of the first region content;
FIG. 1N is a schematic diagram showing the rendering effect of the content of another second region;
FIG. 1O is a schematic view showing the rendering effect of the content of a first region;
FIG. 1P is a schematic view showing the rendering effect of the content of a second region;
FIG. 1Q is a schematic view showing a rendering effect of the content of a first region;
FIG. 1R is a schematic diagram showing a rendering effect of the content of a second region;
FIG. 2A is a flowchart illustrating another method for presenting document content according to an embodiment of the present application;
FIG. 2B is a schematic diagram of presenting document area content in a desensitizing manner in a method for presenting document content according to an embodiment of the present application;
FIG. 2C is a schematic diagram of presenting document area content in a non-desensitizing manner in a method for presenting document content according to an embodiment of the present application;
FIG. 3 is a flowchart illustrating a method for presenting document content according to another embodiment of the present disclosure;
FIG. 4 is a schematic structural diagram of a document content presenting device according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
Various exemplary embodiments of the present application will now be described in detail with reference to the accompanying drawings. It should be noted that: the relative arrangement of the parts and steps, numerical expressions and numerical values set forth in these embodiments do not limit the scope of the present application unless it is specifically stated otherwise.
It will be appreciated by those skilled in the art that terms such as "first," "second," and the like in the embodiments of the present application are used merely to distinguish between different steps, devices, or modules, and do not represent any particular technical meaning or logical sequence therebetween.
It should also be understood that in this embodiment, "plurality" may refer to two or more, and "at least one" may refer to one, two or more.
It should also be appreciated that any component, data, or structure referred to in the embodiments of the present application may be generally understood as one or more without explicit limitation or the contrary in the context.
In addition, the term "and/or" in this application is merely an association relationship describing an association object, and indicates that three relationships may exist, for example, a and/or B may indicate: a exists alone, A and B exist together, and B exists alone. In this application, the character "/" generally indicates that the associated object is an or relationship.
It should also be understood that the description of the embodiments herein emphasizes the differences between the embodiments, and that the same or similar features may be referred to each other, and for brevity, will not be described in detail.
The following description of at least one exemplary embodiment is merely exemplary in nature and is in no way intended to limit the application, its application, or uses.
Techniques, methods, and apparatus known to one of ordinary skill in the relevant art may not be discussed in detail, but are intended to be part of the specification where appropriate.
It should be noted that: like reference numerals and letters denote like items in the following figures, and thus once an item is defined in one figure, no further discussion thereof is necessary in subsequent figures.
It should be noted that, in the case of no conflict, the embodiments and features in the embodiments may be combined with each other. For an understanding of the embodiments of the present application, the present application will be described in detail below with reference to the drawings in conjunction with the embodiments. It will be apparent that the embodiments described are some, but not all, of the embodiments of the present application. All other embodiments, which can be made by one of ordinary skill in the art without undue burden from the present disclosure, are within the scope of the present disclosure.
Furthermore, it should be noted that the users described in this application (e.g., target user, drafter, signer) may be distinguished by user identification. For example, the user identifier may be a login account, and in this scenario, if different people log in with the same account, the different people may be considered to be the same user; if the same person logs in by adopting different accounts, the same person logging in the different accounts can be considered as different users. For another example, in a state where a device is not logged in, a user identification may also be assigned based on the device identification of the device. In this scenario, if different persons operate by using a device with the same device identifier, the different persons can be considered to be the same user; if the same person operates with devices having different device identifications, the same person may be considered to be a different user.
Fig. 1A is a flowchart of a method for presenting document content according to an embodiment of the present application. As shown in fig. 1A, the method specifically includes:
step 101, obtaining document data of a target document and user information of a target user, wherein the document data comprises document area content.
In this embodiment, the target document may be any document. As an example, the target document may include, but is not limited to, documents in the following format: doc Format, docx Format, ppt Format, pptx Format, rtf (Rich Text Format), html (Hyper Text Markup Language ) Format, and the like. In addition, the target document may also be an offline document stored locally or an online document stored in the cloud. Further, the target document may include one or more document regions. Each document area may be displayed with one or more document area contents.
The document area content may be the content of a document area presented in the target document. As an example, the document area content may include at least one of: text, pictures, tables, and the like. In the case where the document area content is text, a sentence of text, or a piece of text, in the document may be determined as one document area content.
Document data, which may include any data of the target document. As an example, the document data may include one or more of text, pictures, and forms of document area content. As yet another example, the document data further includes layout information of the contents of the document area.
The target user may be a user requesting to view the target document or a user currently viewing the target document.
The user information may be information of a target user. As an example, the user information may include at least one of: user security, gender of the target user, age group of the target user, occupation of the target user, etc. The user security level may represent the highest security level of the document area content of which the target user has viewing authority.
Specifically, referring to fig. 1B and 1C, fig. 1B and 1C are schematic views illustrating a setting mode of user information.
As shown in fig. 1B and 1C, the above-described user security level may represent the highest security level of the contents of the document area for which the target user has viewing rights (i.e., the person security level in the drawing). As shown in fig. 1B, user information may be set by adding a user (e.g., entering a user account, name, etc.) and a personnel security level. Thereafter, as shown in fig. 1C, the user information of the user named "Xu Mao cat" is "secret", and the user information of the user named "yuehou sound" is "secret".
Step 102, determining content information of the document area content.
In the present embodiment, the content information may be information of the content of the document area. As an example, the content information may include at least one of: a secret level of the document area content, a modification time of the document area content, and the like.
As an example, the content information of the document area content may be included in the above-described document data, whereby the content information of the document area content may be acquired from the document data.
In some optional implementations of this embodiment, the content information of the document area content may also be determined in the following manner:
step one, determining whether the document area content comprises confidential content.
As an example, the confidential content may be content including keywords in a preset keyword set. Therefore, whether the document area content comprises keywords in a preset keyword set or not can be determined by scanning the content of the target document, and whether the document area content comprises confidential content or not is further determined.
As yet another example, the confidential content is content conforming to a regular expression in a set of preset regular expressions (Regular Expression). Therefore, whether the document area content accords with the content of the regular expression in the preset regular expression set can be determined by scanning the content of the target document, and whether the document area content comprises confidential content is further determined.
A regular expression is a logical formula that operates on a string of characters, and uses predefined specific characters and combinations of the specific characters to form a regular string of characters. This regular string is used to express a filtering logic for the string. A plurality of special grammars are defined to represent character classes, quantity qualifiers and position relations, and then the special grammars and common characters are used for representing a mode, namely the regular expression.
As yet another example, the confidential content may be content set to a preset display style. For example, in the case of turning on the dot pattern, a dot pattern setting may be performed, and one or more of its corresponding security color, security background color, security transparency, whether or not an underline is displayed, and the like may be set for each security. Further, thereby, in the case that the target document is already dense, it can be determined whether the presentation mode of the document area content is the target presentation mode; the target presentation mode is any preset presentation mode in a preset presentation mode set. And under the condition that the presentation mode of the document area content is the target presentation mode, determining that the content information comprises the confidential content.
And step two, determining the level information of the secret level corresponding to the confidential content under the condition that the document area content comprises the confidential content.
Wherein each secret-related content may correspond to a secret level. The level information may represent a secret level.
In some cases of the above alternative implementations, if the secret-related content is a keyword in a preset keyword set, each keyword in the preset keyword set may correspond to a secret level.
As an example, as shown in fig. 1D, fig. 1D is a schematic diagram illustrating a setting manner of a preset keyword set of a document content presentation method according to an embodiment of the present application. In fig. 1D, the preset keyword set may include keywords "development strategy and its layout", keywords "major reform matters", keywords "major project arrangement, major asset disposition" and keywords "XXXX cases". Wherein, the keywords all correspond to the secret level 'core secret'. In this case, the level information of the secret level may be "core secret", or may be an identification (e.g., 1, 2, etc.) indicating "core secret".
It can be appreciated that in the above case, whether the document area content includes the confidential content may be determined based on the preset keyword set, so that after the target document is scanned, if the target document includes keywords in the preset keyword set, it may be determined that the document area content includes the confidential content, and further, the level information of the secret level corresponding to the included keywords is determined, so that accuracy of determining whether the document area content includes the confidential content may be improved.
In some cases of the above alternative implementations, if the secret-related content is content conforming to a regular expression in a preset regular expression set, each regular expression in the preset regular expression set may correspond to a secret level.
As an example, if regular expression a and regular expression B are included in the preset regular expression set, wherein regular expression a corresponds to the secret level "secret level 1", regular expression B corresponds to the secret level "secret level 2", in which case the level information of the secret level may be "secret level 2", "2", or the like.
It can be appreciated that in the above case, whether the document area content includes the confidential content may be determined based on the preset regular expression set, so that after the target document is scanned, if the target document includes the regular expression in the preset regular expression set, it may be determined that the document area content includes the confidential content, and further, it may be determined that the level information of the confidential level corresponding to the included regular expression is determined, so that accuracy of determining whether the document area content includes the confidential content may be improved.
And step three, determining the level information as content information of the document area content.
It can be understood that in the above alternative implementation manner, in the case that the document area content includes the confidential content, the level information of the secret level corresponding to the confidential content may be determined as the content information of the document area content, and further, the presentation manner of the document area content is determined through the subsequent steps based on the user information and the level information of the secret level corresponding to the confidential content, and the document area content may be presented in a manner matching with the secret level corresponding to the user information and the confidential content, so that the document area content of different secret levels in the same document may be presented in different presentation manners, thereby improving the security of the document area content display and the richness of the document area content presentation manner.
And step 103, determining the presentation mode of the document area content based on the user information and the content information.
In this embodiment, the document area content may be presented in a desensitized mode or in a non-desensitized mode. In addition, the presentation mode of the document area content may include a font size, a font, a bold, an italic, an underline, a strikethrough, a font color, a background color of the document area content, and the like of the document area content.
In some optional implementations of this embodiment, the following manner may be used to determine, based on the user information and the content information, a presentation manner of the document region content:
first, a presentation mode of establishing an association relation with the user information and the content information in advance is determined.
Here, the drafting person, the secret setting person of the target document, or other users with the permission determined by the presentation mode of the target document can establish the association relationship among the user information, the content information and the presentation mode by themselves. Alternatively, the association relationship among the user information, the content information, and the presentation manner may also be established by setting a determination rule. For example, the above determination rule may be "if the user information indicates the highest security level of the content of the document area to which the user has viewing authority, which is higher than or equal to the content security level indicated by the content information, the presentation mode having an association relationship with the above user information and the above content information may be a" non-desensitization mode ". Alternatively, the above determination rule may be "if the user information indicates that the highest security level of the content of the document area to which the user has the viewing authority is lower than the content security level indicated by the content information, the presentation mode having the association relationship with the above user information and the above content information may be a" desensitization mode ". Still alternatively, the determination rule may be "if the user information indicates a user identifier (e.g., an account number), and the content information indicates a secret level of confidential content included in the document area content, then the presentation form having an association relationship with the user information and the content information may be" displaying the document area content in a predetermined color (e.g., red) ".
When the presentation style of the document area content is a 'non-desensitization style', reading style data corresponding to the document area content from document data of a target document, and taking the presentation style represented by the style data as the presentation style of the document area content.
In the case that the presentation style of the document area content is a "desensitization style", a preset, default presentation style is used as the presentation style of the document area content.
In a specific embodiment, in the case that the presentation style of the document area content is a "desensitization style", the densely-printed style corresponding to the density of the document area content is not displayed, and the presentation style of the document area content may be set to a preset default style, so as to avoid leakage of the density of the document area content through the densely-printed style.
And then, determining the presentation mode as the presentation mode of the document area content.
For example, please refer to fig. 1E, fig. 1E is a schematic diagram illustrating a presentation manner setting of a method for presenting document content according to an embodiment of the present application.
As shown in fig. 1E, it is possible to select whether to use a person security level (i.e., one of the user information) and set whether to turn on a spot pattern. In the case of opening the dot pattern, a dot pattern setting may be performed, and for example, one or more of a corresponding color of the key, a background color of the key, transparency of the key, whether or not an underline is displayed, and the like may be set for each key.
It can be appreciated that in the above alternative implementation manner, the speed of determining the presentation manner of the content in the document area may be increased by pre-establishing the correspondence between the user information, the content information and the presentation manner.
And 104, presenting the content of the document area by adopting the presenting mode.
In this embodiment, if the presentation mode is a "desensitization mode", the document area content may be presented in a desensitization mode. If the presentation mode is a "non-desensitized mode," then the document area content may be presented in a non-desensitized mode. If the rendering mode is "the background color of the document area content is yellow", the yellow may be used as the background color, thereby rendering the document area content.
According to the method for presenting the document content, the document data of the target document and the user information of the target user can be obtained, wherein the document data comprises the document area content, then the content information of the document area content is determined, then the presenting mode of the document area content is determined based on the user information and the content information, and finally the document area content is presented by adopting the presenting mode. Therefore, the document area content can be presented in a mode of matching with the user information and the content information of the document area content, so that the same document area content of the same document can be presented to users with different user information in a plurality of presentation modes, and the fineness of document management is improved.
In some optional implementations of this embodiment, where the document area content includes confidential content, the content information includes a level of confidentiality of the confidential content in the document area content.
Wherein each secret-related content may correspond to a secret level. For example, the secret level of the secret-related content a may be "secret", and the secret level of the secret-related content a may be "secret-proof".
It will be appreciated that in the alternative implementations described above, where the document area content includes confidential content, the document area content may be presented in a manner that matches the user information and the level of privacy.
In some application scenarios in the above optional implementation manners, in a case that the target document is encrypted, determining whether the content information includes the confidential content is performed in one of the following manners:
in one mode, it is determined whether the document area content includes a target keyword.
The target keywords are any preset keywords in a preset keyword set. And in the case that the document area content comprises the target keyword, determining that the content information comprises the confidential content.
For example, it may be determined whether the document area content includes a target keyword by scanning the document area content, and further, whether the content information includes confidential content.
In one embodiment, the scope of the document area content may be a word, a word combination, a sentence, a paragraph, a section, a chapter, or the like in the document.
And secondly, determining whether the content of the document area accords with a target regular expression.
The target regular expression is any preset regular expression in a preset regular expression set. And determining that the content information comprises the confidential content under the condition that the content of the document area accords with the target regular expression.
For example, it may be determined whether the document region content conforms to a target regular expression by scanning the document region content, thereby determining whether the content information includes confidential content.
A regular expression is a logical formula that operates on a string of characters, and uses predefined specific characters and combinations of the specific characters to form a regular string of characters. This regular string is used to express a filtering logic for the string. A plurality of special grammars are defined to represent character classes, quantity qualifiers and position relations, and then the special grammars and common characters are used for representing a mode, namely the regular expression.
And determining whether the presentation mode of the document area content is a target presentation mode.
The target presentation mode is any preset presentation mode in a preset presentation mode set. And under the condition that the presentation mode of the document area content is the target presentation mode, determining that the content information comprises the confidential content.
It can be appreciated that, in the first manner, whether the content information includes the confidential content may be determined based on the preset keyword set, so that after the target document is scanned, if the target document includes keywords in the preset keyword set, it may be determined that the content information includes the confidential content. The second mode can judge whether the content information comprises confidential content based on the preset regular expression set, so that after the target document is scanned, if the target document comprises the regular expression in the preset regular expression set, the content information can be determined to comprise the confidential content. The third mode may determine whether the content information includes confidential content based on a preset presentation mode set, so if the presentation mode of the content in the document area is the target presentation mode, it may be determined that the content information includes the confidential content, and it may be determined that the content information includes the confidential content. Thereby, the accuracy of determining whether the content information includes confidential content can be improved.
In some cases in the application scenario described above,
each preset keyword in the preset keyword set corresponds to a secret level. In the case where the document area content includes the target keyword, the secret level included in the content information is determined based on the secret level corresponding to the target keyword.
Each preset regular expression in the preset regular expression set corresponds to a secret level. And under the condition that the document area content accords with the target regular expression, determining the secret level included in the content information based on the secret level corresponding to the target regular expression.
Each preset presentation mode in the preset presentation mode set corresponds to a secret level. And under the condition that the presentation mode of the document area content is the target presentation mode, determining the secret level included in the content information based on the secret level corresponding to the target presentation mode.
As an example, the privacy level may be determined based on at least one of whether the document area content includes a target keyword, whether the document area content conforms to a target regular expression, and a manner of presentation of the document area content. For example, if the document region content includes a target keyword, the document region content does not conform to the target regular expression, and the presentation manner of the document region content is not the target presentation manner, then the secret level corresponding to the target keyword may be determined as the secret level included in the content information. For another example, if the document area content includes a target keyword, the document area content conforms to the target regular expression, and the presentation mode of the document area content is the target presentation mode, then the highest secret level of the secret level corresponding to the target keyword, the secret level corresponding to the target regular expression, and the secret level corresponding to the target presentation mode may be determined as the secret level included in the content information.
It can be appreciated that in the above case, the accuracy of determining the level of the secret included in the content information is improved.
Alternatively, it may be determined whether the target user has an operation right to perform the target operation with respect to the confidential content in the following manner:
first, first authority information of a target user on confidential content of a target document is determined.
The first authority information is information of the operation authority of the target user on the confidential content; . By way of example, the first rights information may include at least one of: whether the target user has viewing rights, editing rights, copying rights, cutting rights, deleting rights, changing security, etc. for each document region content (which may include confidential content) in the target document.
Then, presenting the confidential content; .
Here, the confidential content may be presented in a presentation manner indicated by presentation manner information in document data of the target document. Or, presenting the confidential content according to the presentation mode indicated by the presentation mode information associated with the target user.
Then, a target operation performed by the target user with respect to the confidential content is detected.
The target operation may be an operation performed by the target user for the confidential content. As an example, the target operation may include at least one of: copy operations, edit operations, cut operations, delete operations, and so forth.
Finally, based on the first authority information, it is determined whether the target user has an operation authority to execute the target operation.
Here, if the first authority information indicates that the target user has editing authority for confidential content in the target document, and the target operation is an editing operation, it may be determined that the target user has operation authority to perform the target operation. If the first authority information does not indicate that the target user has editing authority for confidential content in the target document and the target operation is an editing operation, it may be determined that the target user does not have operation authority to perform the target operation. Thereby, the target user can be controlled to operate the target document.
It can be understood that by determining first authority information of a target user on confidential content of a target document, wherein the first authority information is information of operation authority of the target user on the confidential content, the confidential content is presented, then, a target user performs target operation on the confidential content, and then, based on the first authority information, whether the target user has operation authority for performing the target operation is determined, so as to control the target user to operate the target document. Therefore, whether the user has corresponding operation authority to the confidential content of the document can be determined based on the authority information of the user to the confidential content of the document, the fine degree of controlling the document operation is improved, and the security of the document operation is improved.
Alternatively, the first authority information of the target user on the confidential content of the target document may be determined in the following manner:
firstly, determining second authority information of a target user on a target document; .
The second authority information may be authority information of the target user on the target document. As an example, the second authority information may represent at least one of: the target user has viewing rights to the target document, the target user does not have viewing rights to the target document, the target user has editing rights to the target document, the target user does not have editing rights to the target document, the target user has deleting rights to the target document, the target user does not have deleting rights to the target document, and so on.
And then, based on the second authority information, determining first authority information of the target user on confidential content of the target document.
Here, how to determine the first permission information of the target user for the confidential content of the target document based on the second permission information may be described later, which is not described herein.
It can be understood that the first authority information of the target user for the confidential content of the target document is determined based on the second authority information of the target user for the target document, thereby improving the speed of determining the authority information of the confidential content.
Alternatively, one of the following manners may be adopted to determine, based on the second authority information, first authority information of the target user on confidential content of the target document:
in one mode, the second authority information is determined to be the first authority information of the target user on the confidential content of the target document.
As an example, if the second authority information indicates that "the target user has viewing authority for the target document", the first authority information may indicate that "the target user has viewing authority for the target document". If the second rights information indicates that the target user does not have viewing rights to the target document, the first rights information may indicate that the target user does not have viewing rights to the target document.
Here, referring to fig. 1F, fig. 1F shows a schematic diagram of a labeling and authority setting manner. In fig. 1F, in the case where "multiplexing document rights" is selected, the second rights information (i.e., document rights in the drawing) may be determined as first rights information (i.e., confidential point rights in the document) of the target user to confidential content of the target document.
And in a second mode, determining that the authority priority corresponding to the first authority information of the confidential content of the target document by the target user is lower than the authority priority corresponding to the second authority information.
As an example, if the second authority information indicates that "the target user has no editing authority for the target document", the first authority information may indicate that "the target user does not have any authority for the confidential content". The effect is that the permission of any confidential content cannot be set for the target user.
As still another example, if the second authority information indicates that "the target user has editing authority for the target document", the first authority information may indicate that "the target user has editing authority for the confidential content", or may indicate that "the target user does not have any authority for the confidential content".
And in a third mode, determining that the authority priority corresponding to the first authority information of the confidential content of the target document by the target user is higher than the authority priority corresponding to the second authority information.
As an example, if the second authority information indicates that "the target user has editing authority for the target document", the first authority information may indicate that "the target user does not have any authority for the confidential content", or the first authority information may also indicate that "the target user has editing authority for the target document".
As yet another example, if the second authority information indicates that "the target user does not have editing authority for the target document", the first authority information may indicate that "the target user has editing authority for the confidential content", or may also indicate that "the target user does not have any authority for the confidential content".
In addition, for the second mode and the third mode, confidential content can be classified, so that more refined document operation can be realized. For example, the confidential content may be divided into 2 (or more) categories. If the confidential content includes a core keyword (a type of keyword in the above-mentioned preset keyword set) or conforms to a core regular expression (a type of regular expression in the above-mentioned preset regular expression set), the confidential content may be determined as a type a confidential content. If the confidential content includes a common keyword (another type of keyword in the above-described preset keyword set) or conforms to a common regular expression (another type of regular expression in the above-described preset regular expression set), the confidential content may be determined as the type B confidential content. The authority priority corresponding to the authority information of the class-A confidential content can be set to be higher or lower than the authority priority corresponding to the authority information of the class-B confidential content.
The number of the categories of the confidential content can be equal to the number of the categories of the keywords in the preset keyword set, and each category of the confidential content corresponds to each category of the keywords in the preset keyword set one by one. Alternatively, the number of categories of the secret-related content may be equal to the number of categories of the regular expressions in the preset regular expression set, and each category of the secret-related content corresponds to each category of the regular expressions in the preset regular expression set one by one.
It can be understood that the second authority information is directly determined as the first authority information, so that the speed of determining the authority information of the confidential content can be further improved. And determining the authority priority of the first authority information according to the authority priority of the second authority information in the second mode and the third mode in the application scene, so that the settable range of the first authority information is reduced, and the controllability of the operation of the confidential content is improved.
Optionally, the first authority information is set for the target user and the confidential content, and the first authority information is set independently from the second authority information. The second authority information is the authority information of the target user on non-confidential content in the target document. The non-confidential content can be other content than the confidential content in the target document.
For example, please refer to fig. 1F, which illustrates a schematic diagram of a labeling and authority setting manner. In fig. 1F, in the case where "use close point authority" is selected, the first authority information (i.e., close point authority in the drawing) is set independently of the second authority information (i.e., document authority in the drawing).
Further, in the case where the first authority information is set independently of the second authority information, the first authority information may be set for the user and the security level of the confidential content in a manner as shown in fig. 1I.
It can be understood that the first authority information and the second authority information are independently set, so that flexibility of operation control of confidential content and non-confidential content is improved. The first authority information is set for the target user and the confidential content, and the first authority information and the second authority information are set independently, and the second authority information is the authority information of the target user on the non-confidential content in the target document.
Alternatively, the determining the first authority information of the target user on the confidential content of the target document may be performed in the following manner:
in the case that the authority information of the target user on the confidential content of the target document is not preset, determining that the first authority information of the target user on the confidential content of the target document is expressed as: the target user does not have an operating right to the confidential content.
It can be understood that, in the case that the authority information of the target user on the confidential content of the target document is not preset, it can be determined by default that the target user does not have the operation authority on the confidential content, so that the security of the confidential content can be improved.
Optionally, the following manner may be adopted to determine the first authority information of the target user on the confidential content of the target document:
in the case that the authority information of the target user on the confidential content of the target document is not preset, determining that the first authority information of the target user on the confidential content of the target document is expressed as: the target user has only copy-and-paste rights to the confidential content, and does not have rights other than copy-and-paste rights.
Alternatively, the determining the first authority information of the target user on the confidential content of the target document may be performed in the following manner:
firstly, determining a presentation mode of confidential content of a target document; .
Then, under the condition that the presentation mode is a desensitization mode, determining first authority information of the target user on confidential content of the target document is expressed as follows: the target user has copy-and-paste rights to the confidential content, and the target user does not have editing rights to the confidential content.
The copy-paste rights may include copy rights and paste rights, among others.
It can be understood that under the condition that the confidential content is presented in a desensitization mode, the target user has copy and paste permission to the confidential content, but does not have editing permission to the confidential content, so that the operation permission to the confidential content is provided for the target user to a greater extent, and the potential safety hazard of documents in which the target user edits the confidential content is avoided.
Alternatively, the confidential content may be presented in the following manner:
presenting the confidential content in a desensitization mode under the condition that a target user has viewing authority for the confidential content;
and presenting the confidential content in a non-desensitized mode under the condition that the target user does not have the viewing authority.
By way of example, if the confidential content includes the text "quote 1000 yuan," then "quote 1000 yuan" may be displayed to display the confidential content in a non-desensitized manner. If the text "bid 1000 Yuan" is included in the content of the displayed document area, "XXXXX" may be displayed to display the above-mentioned confidential content in a desensitized manner.
It will be appreciated that by disabling or allowing the target user to view the confidential content in a desensitized or non-desensitized manner, the security of the confidential content is improved.
Alternatively, the confidential content may be presented in the following manner:
firstly, determining target annotation information of the confidential content, wherein the target annotation information comprises at least one of the following items: secret point content, secret level and secret term; .
The secret point content may be a keyword in the preset keyword set, or may be a secret level corresponding to a keyword in the preset keyword set or a regular expression in the preset regular expression set.
The secret class may represent a secret level of the secret-related content.
The confidentiality duration may represent a duration that the document area content belongs to the confidential content. The confidentiality deadline may be pre-associated with a keyword in a preset keyword set or a regular expression in a preset regular expression set.
The target label information related to the confidential content may be set by the user.
And then, presenting the target annotation information and the confidential content.
As an example, the target annotation information and the confidential content may be displayed in association. For example, in the case where a mouse is hovered over confidential content, target annotation information may be displayed. For another example, the target annotation information may be presented at a start position of a previous line of the confidential content or a start line of the confidential content.
It can be understood that by presenting the target labeling information, the target user can obtain information such as the confidential point content, the confidential level, the confidential period and the like of the confidential content.
Optionally, the determining the target labeling information of the confidential content may be performed in the following manner:
first, a plurality of (at least two) annotation information corresponding to the confidential content is determined.
Here, for a piece or sentence of document area content, by scanning a case where there may be a plurality of keywords in the above-mentioned preset keyword set or a plurality of regular expressions in the above-mentioned preset regular expression set, at least one of the hit keywords and the confidential point content, the confidential level, and the confidential period corresponding to each regular expression may be determined as a plurality of pieces of labeling information corresponding to the confidential content.
And then, presenting a plurality of labeling information.
Then, a selection operation for a single one of the plurality of annotation information is detected.
And finally, determining the single annotation information selected by the selection operation as the target annotation information of the confidential content.
Here, in the case of intelligent labeling, the target labeling information may be determined in the manner described above. As an example, referring to fig. 1F, fig. 1F shows a schematic diagram of a labeling and authority setting manner. In FIG. 1F, in the case where "Smart callout" is selected, the target callout information can be determined in the manner described above. In addition, for the case where "manual annotation" is selected, the user may be prompted to make manual annotation by sending a message to the sketcher, as shown in fig. 1G.
Then, under the condition that a plurality of labeling information corresponding to the confidential content is determined, the labeling information can be presented in a mode shown in fig. 1H so as to recommend the confidential point, and the user clicks the labeling information to be selected and then can label the confidential point.
It can be appreciated that pushing multiple annotation information to the user for the user to select target annotation information therefrom increases the speed and flexibility of determining target annotation information.
Optionally, the presentation mode of the confidential content is a desensitization mode, the first authority information indicates that the target user has copy-paste authority on the confidential content, and the target operation is a copy-paste operation. On the basis of the above-mentioned combination of the above-mentioned components,
after said determining, based on said first rights information, whether said target user has an operation right to perform said target operation, said method further comprises the step of:
first, the confidential content is pasted in a desensitization mode.
Here, the target user may paste the confidential content to the target document, or may paste the confidential content to another document other than the target document.
And then, storing the document obtained after pasting the confidential content.
Here, if the confidential content is pasted to the target document, the target document obtained after pasting the confidential content may be saved. If the confidential content is pasted to another document other than the target document, the other document obtained after pasting the confidential content may be saved.
It will be appreciated that the confidential content may be displayed to the target user in a desensitized manner in the event that the target user does not have viewing rights for the confidential content. Meanwhile, even if the target user copies and pastes the confidential content, the target user can only view the confidential content displayed in a desensitizing mode all the time, so that the security of document content display is improved.
Optionally, after the document obtained after the confidential content is pasted is saved, the method further includes the following steps:
firstly, detecting a viewing request of an authorized user for the target document after the confidential content is pasted.
Wherein the authorized user has viewing rights for the confidential content.
And then, in the case that the viewing request is detected, presenting the confidential content in a non-desensitized mode.
As an example, for a confidential content "quote 1000 yuan" in a target document, in the case where the target user does not have viewing rights for the confidential content, "XXXXX" may be displayed to the target user during the time from opening the target document to closing the target document to display the above confidential content to the target user in a desensitized manner. Meanwhile, even if the target user copies and pastes the confidential content, the target user always looks up the confidential content as XXXXX. After the target user copies and pastes the confidential content, the authorized user can be displayed with 'quotation 1000 yuan', so that the confidential content can be displayed to the target user in a non-desensitizing mode.
It can be understood that for the same confidential content, the operation of the user who does not have the viewing authority does not influence the subsequent normal viewing of the user who has the viewing authority, and the accuracy of determining whether the confidential content is displayed or not is improved.
Further, switching between desensitized content and non-desensitized content may be performed in the following manner:
first, the first region content of the target document is acquired.
The target document may be any document. As an example, the target document may include, but is not limited to, documents in the following format: doc Format, docx Format, ppt Format, pptx Format, rtf (Rich Text Format), html (Hyper Text Markup Language ) Format, and the like. In addition, the target document may also be an offline document stored locally or an online document stored in the cloud. Further, the target document may include one or more document regions. Each document area may be displayed with one or more document area contents.
The first region content may be desensitized content or non-desensitized content. In the case where the first region content is non-desensitized content, the first region content may be document region content at the location of the first region content. In the case where the first area content is desensitized content, the first area content may be obtained by replacing the document area content at the position thereof with one or more preset characters (for example, "x", "#," ■ "," "to" etc.).
The document region content may be the content of a document region in the target document. As an example, the document area content may include at least one of: text, pictures, tables, and the like. In the case where the document area content is text, a word, a sentence of text, or a piece of text in the document may be determined as one document area content.
And then, replacing the first area content with second area content, wherein third area content in the target document is kept consistent in typesetting before and after the replacement, and the third area content is a part except the first area content in the target document.
The second region content may be non-desensitized content or desensitized content. In the case where the second region content is non-desensitized content, the second region content may be document region content at the location thereof. In the case where the second area content is desensitized content, the second area content may be obtained by replacing the document area content at the position thereof with one or more preset characters (for example, "x", "#," ■ "," "to" etc.).
In the case that the first area content is desensitized content, the second area content is non-desensitized content of the first area content; in the case where the first region content is non-desensitized content, the second region content is desensitized content of the first region content.
It should be noted that the consistency of typesetting between two region contents means that the two region contents occupy the same region in the document, the difference between the regions occupied by the two region contents in the document is smaller than a preset threshold, the preset direction in the document occupies the same length and position, and the difference between the length or position occupied by the preset direction in the document is smaller than the preset threshold. The preset direction may be a longitudinal direction or a transverse direction of the document.
In an embodiment, the third area content in the target document keeps typesetting consistency before and after the replacement, which can indicate the typesetting position of the third area content in the document and cannot be changed by the replacement of the first area content. Wherein the typesetting position of the region content in the document can be represented by coordinates. For example, a coordinate system is established with the upper left corner as the origin in each page of the document, and a region formed by the region contents can be expressed using coordinates based on the coordinate system.
The target document is then presented.
Wherein, in the case where the first region content is desensitized content, the second region content is non-desensitized content of the first region content; in the case where the first region content is non-desensitized content, the second region content is desensitized content of the first region content.
The target document may be presented after replacing the first region content with the second region content.
Here, the portions of the target document other than the content of the first region are kept identical in layout before and after replacement.
It can be appreciated that in the process of replacing the desensitized content and the non-desensitized content of the document, the typesetting of the target document except the content of the first area can be kept consistent before and after the replacement, so that the influence on the typesetting of the target document after the content replacement is reduced.
Alternatively, the first area content may be replaced with the second area content in the following manner:
and replacing the first area content by using a second area content with the same occupied length as the first area content in the preset direction.
The preset direction may include at least one of a direction in which a length of the target document is located and a direction in which a width of the target document is located.
It is understood that the first region contents are replaced with second region contents having a length identical to the occupied length of the first region contents in a preset direction. Thereby, the influence on the typesetting of the target document after the content replacement is further reduced.
In an embodiment, in the case that the first area content is determined to be the end of the segment, the first area content is replaced by a second area content with a length consistent with the occupation length of the first area content in the preset direction.
Assuming that the preset direction is the direction in which the length of the target document is located, namely, the longitudinal direction, under the condition that the first area content is the end of the section, setting the initial positions of the first area content and the second area content to be equal, and setting the heights of the occupied documents to be equal can ensure that the typesetting position of the third area content cannot be changed due to the replacement of the first area content. Of course, here, it is not necessary to guarantee that the last line of the replaced second area content remains identical to the last line of the first area content.
In this embodiment, replacing the first area content with the second area content specifically includes:
first, the first region content is loaded into the memory.
Thereafter, in the memory, the first area content is replaced with the second area content so that the target document including the second area content is presented through the subsequent steps.
It can be understood that the first area content is replaced by the second area content in a memory loading mode, and the replacement and presentation of the second area content can be realized on the basis of not changing the source file of the target document.
Alternatively, the first area content may be replaced with the second area content in the following manner:
and replacing the first area content with a second area content consistent with the occupied area of the first area content.
The occupied area can be measured by adopting the area and the pixels.
It is understood that the first region content is replaced with a second region content that coincides with the occupied region of the first region content. Thereby, the influence on the typesetting of the target document after the content replacement is further reduced.
Alternatively, the first area content may be replaced with the second area content in the following manner:
first, first layout information of the first region contents is determined.
The first composition information of the first region content may include at least one of: the number of characters of the first region content (i.e., the first number of characters described later), the character size (i.e., the first character size described later, such as width, height), the line spacing (i.e., the first line spacing described later), the character spacing (i.e., the first character spacing described later), the word size of the first region content, the positional information of the adjacent region content of the first region content in the target document, and the like.
Then, second layout information of the second area content of the target document is determined based on the first layout information.
The second layout information of the second region contents may include at least one of: the number of characters of the second area content (i.e., the second number of characters described later), the character size (i.e., the second character size described later), the line spacing (i.e., the second line spacing described later), the character spacing (i.e., the second character spacing described later), the word size of the second area content.
And under the condition that the second typesetting information comprises at least two items, part of the second typesetting information can be determined in a preset mode, and the rest part of the second typesetting information is calculated according to the target consistent with typesetting. And under the condition that the rest part of the second typesetting information has a plurality of value combinations so that typesetting is consistent, one type is selected at will. Of course, all the second typesetting information can also be obtained by calculation according to the goal of consistent typesetting, and under the condition that the second typesetting information has various value combinations, one of the second typesetting information is arbitrarily selected. The preset manner may include, but is not limited to, one of the following: the second typesetting information is equal to the first typesetting information; the second typesetting information is a multiple of the first typesetting information; the second typesetting information is a preset numerical value.
Then, the first region contents are replaced with second region contents having the second layout information.
On this basis, the target document may be presented in the following manner:
and presenting the second area content in the target document according to the typesetting mode indicated by the second typesetting information.
In the case that the first area content is desensitized content, the second area content is non-desensitized content of the first area content; in the case where the first region content is non-desensitized content, the second region content is desensitized content of the first region content.
As an example, in a case where the first area content is desensitized content and the second area content is non-desensitized content of the first area content, the first area content may include the word "quote 1000 yuan" and the second area content may include "". In this example, the first region content is desensitized content and the second region content is non-desensitized content of the first region content.
Here, in the case where the second area content is the non-desensitized content of the first area content, the layout information in the source file of the target document may be directly determined as the layout information of the second area content (i.e., the above-described second layout information) without recalculation.
It can be understood that in the process of replacing the desensitized content and the non-desensitized content of the document, the second typesetting information of the replaced content can be determined based on the first typesetting information of the content before the replacement, and then the replaced content is presented according to the corresponding typesetting mode, so that the typesetting of the part except the first area content in the target document is consistent before and after the replacement, and the influence on the typesetting of the target document after the replacement of the content is reduced.
Alternatively, the second layout information of the second area content of the target document may be determined based on the first layout information in the following manner:
first, a first number of characters of the first region content is determined from the first layout information.
Wherein, the first typesetting information may include a first character number of the first area content. Thereby, the first character number of the first region content can be determined from the first layout information.
Then, based on the first character number, a second character number of the second region content of the target document is generated.
The second layout information may include the number of two characters.
Then, second layout information of the second area content is determined based on the first layout information and the second number of characters.
For example, the second layout information of the second area content of the target document may be determined based on the first layout information and the second number of characters in the following manner:
and determining the first character spacing of the first area content included in the first typesetting information as the second character spacing of the second area content of the target document. And determining the second character spacing and the second character number as second typesetting information of the second area content.
And determining the first character size of the first area content included in the first typesetting information as the second character size of the second area content of the target document. And determining the second character size and the second character number as second typesetting information of the second area content.
And determining the first line spacing of the first area content included in the first typesetting information as the second line spacing of the second area content of the target document. And determining the second line spacing and the second character number as second typesetting information of the second area content.
Optionally, the first area content is non-desensitized content, and the second area content is desensitized content of the first area content. Thus, the second character number of the second area content of the target document may be generated based on the first character number in one of the following manners:
In a first mode, when the first character number is smaller than or equal to a preset first threshold value, a preset strategy is adopted to increase the first character number, and the increased first character number is determined to be a second character number of the second area content of the target document.
The preset strategy may be a self-increasing preset value (e.g. 1, 5, etc.), or an expanding preset multiple (e.g. 2).
And in a second mode, determining the first character number as a second character number of the second area content of the target document under the condition that the first character number is larger than the preset first threshold value.
And in a third mode, determining the first character number as a second character number of the second area content of the target document.
It will be appreciated that, in the first and second modes, the second number of characters may be determined in different manners according to different situations, and the influence on the typesetting of the target document after the content is replaced may be further reduced. By adopting the third mode, the second character quantity can be determined more quickly, and the speed of presenting the content of the second area is further improved.
Alternatively, the second character number of the second area content of the target document may be generated based on the first character number in the following manner:
And under the condition of adopting the first configuration, adopting a preset strategy to change the first character quantity, and determining the changed first character quantity as a second character quantity of the second area content of the target document.
Wherein the first configuration may be used to indicate that the content of the region before and after desensitization includes an unequal number of characters.
The preset policy may be: reducing the number of characters, reducing the number of characters of the preset proportion, increasing the number of characters of the preset proportion and increasing the number of characters of the preset proportion. The preset number or preset ratio may be selected from one of a plurality of presets in a random arrangement. The random setting mode may be a gaussian distribution mode, for example, an average value is set to 2, and a variance is set to 1, so as to generate a preset number, such as any integer of 1, 2 and 3; the mode of selecting one of the plurality of presets may be to set the preset number to 1, 2, 3, and in the case of selecting 2, the preset number is set to 2.
In the case of adopting the second configuration, the first character number is determined as a second character number of the second area content of the target document.
Wherein the second configuration may be used to indicate that the content of the region before and after desensitization includes an equal number of characters.
It will be appreciated that by configuration, it is determined whether the content of the region before and after desensitization includes the same number of characters.
Alternatively, one or more of the following may be employed to determine second layout information of the second area content of the target document based on the first layout information:
the first item is that a first character spacing of the first area content included in the first typesetting information is determined to be a second character spacing of the second area content of the target document, and second typesetting information of the second area content is obtained.
And the second item, determining the first character size of the first area content included in the first typesetting information as the second character size of the second area content of the target document, and obtaining the second typesetting information of the second area content.
And third item, determining the first line spacing of the first area content included in the first typesetting information as the second line spacing of the second area content of the target document, and obtaining second typesetting information of the second area content.
Fourth, determining the first character number of the first area content included in the first typesetting information as the second character number of the second area content of the target document, and obtaining second typesetting information of the second area content.
For example, referring to fig. 1J, fig. 1J is a schematic diagram of a policy configuration. As shown in fig. 1J, in the case where the number of dots (i.e., the second number of characters) and the number of words (i.e., the first number of characters) are set to coincide, the number of words can be determined directly as the number of dots.
Referring to fig. 1K and fig. 1L, fig. 1K is a schematic view showing the effect of the first region content. Fig. 1L is a schematic view showing the effect of the second area content. The first area content in fig. 1K includes "support multi-user online collaboration", the second area content in fig. 1L includes "first character number is equal to second character number".
Note that the number of characters refers to the number of characters in the area content. The statistical method of the number of characters is not limited, and in one method, one Chinese character or one English letter is one character, one half-angle or full-angle mark point symbol is one character, and one space is calculated as one character.
Further, if the fonts and font sizes of the documents in fig. 1K and 1L are adjusted, reference may be made to fig. 1M and 1N. Fig. 1M is a schematic view of another presentation effect of the first area content. Fig. 1N is a schematic view showing a rendering effect of another second area content.
In addition, the density point and the word number are inconsistent, so that the safety of document content presentation can be improved.
With continued reference to fig. 1O and fig. 1P, fig. 1O is a schematic view of another rendering effect of the first region content. Fig. 1P is a schematic view showing a rendering effect of another second area content. The first area content in fig. 1O includes "document, brand new generation cloud office software, supports online collaborative office of multiple people, real-time collaboration, and sets document access and editing permissions. The second region in fig. 1P includes "", and the first and second character numbers are not equal to each other.
Further, if the fonts and font sizes of the documents in fig. 1O and 1P are adjusted, reference may be made to fig. 1Q and 1R. Fig. 1Q is a schematic view showing a rendering effect of the content of the first region. Fig. 1R is a schematic view showing a rendering effect of the content of the second region.
As can be seen from comparing fig. 1K and 1L, fig. 1M and 1N, fig. 1O and 1P, fig. 1Q and 1R, the layout of the target document is not affected after the first area content is replaced with the second area content.
It may be appreciated that in the above-mentioned alternative implementation manner, the second typesetting information of the second area content may include at least one of a second character pitch, a second character size, a second line pitch, and a second character number of the second area content, so that the influence on the typesetting of the target document after the content replacement may be further reduced through a subsequent step.
Alternatively, the second layout information of the second area content of the target document may be determined based on the first layout information in the following manner:
first, a first number of characters of the first region content is determined from the first layout information.
Wherein, the first typesetting information may include a first character number of the first area content. Thereby, the first character number of the first region content can be determined from the first layout information.
Then, based on the first character number, a second character number of the second region content of the target document is generated.
The second layout information may include the number of two characters.
Then, second layout information of the second area content is determined based on the first layout information and the second number of characters.
For example, the second layout information of the second area content of the target document may be determined based on the first layout information and the second number of characters in the following manner:
and determining the first character spacing of the first area content included in the first typesetting information as the second character spacing of the second area content of the target document. And determining the second character spacing and the second character number as second typesetting information of the second area content.
And determining the first character size of the first area content included in the first typesetting information as the second character size of the second area content of the target document. And determining the second character size and the second character number as second typesetting information of the second area content.
And determining the first line spacing of the first area content included in the first typesetting information as the second line spacing of the second area content of the target document. And determining the second line spacing and the second character number as second typesetting information of the second area content.
Alternatively, the second number of characters, the second character spacing, and the second character size of the second area content of the target document may be determined based on the first number of characters, the first character spacing, and the first character size in the following manner:
First, a third character number of the second region content of the target document is determined based on the first character number.
Wherein the third number of characters may be a hypothesized number of characters of the second area content of the target document.
Then, first size information of the first area content is determined based on the first character number, the first character spacing, and the first character size.
As an example, the first size information X1 may be determined using the following formula one:
X1=N1×L1+(N1-1)×D1
equation one
Wherein N1 represents a first number of characters, L1 represents a first character size (e.g., character width or character height), and D1 represents a first character pitch.
Then, a third character spacing and a third character size of the second region content of the target document are determined.
The third character spacing may be a predetermined and fixed character spacing, or may be a character spacing determined based on the first character spacing, for example, the third character spacing is set to be equal to the first character spacing or a multiple of the first character spacing. Further, the third character size may be a predetermined and fixed character size, or may be a character size determined based on the first character size, for example, set such that the third character size is equal to the first character size or a multiple of the first character size.
Then, third size information is determined based on the third character number, the third character spacing, and the third character size.
As an example, the third size information X2 may be determined using the following formula two:
X2=N2×L2+(N2-1)×D2
in the second formula, N2 represents the second number of characters, L2 represents the second character size, and D2 represents the second character spacing.
Next, it is determined whether a size difference between the size indicated by the first size information and the size indicated by the third size information is less than or equal to a preset second threshold.
The size difference may be calculated by, for example, absolute value of a difference between the size indicated by the first size information and the size indicated by the third size information, or quotient.
In the case where the size difference is less than or equal to the preset second threshold, determining the third number of characters as the second number of characters of the second area content, determining the third size of characters as the second size of characters of the second area content, and determining the third spacing of characters as the second spacing of characters of the second area content.
And adjusting at least one of the third character number, the third character size, and the third character spacing such that a size difference between a size determined based on the adjusted third character number, third character size, and third character spacing and a size indicated by the first size information is smaller than or equal to the preset second threshold value, and determining the adjusted third character number, third character size, and third character spacing as a second character number, a second character size, and a second character spacing of the second area content, respectively, when the size difference is larger than the preset second threshold value.
Here, if the third character number is adjusted, the adjusted third character number may be determined as the second character number of the second area content; if the third character amount is not adjusted, the unadjusted third character amount may be determined as the second character amount of the second area content. If the third character size is adjusted, determining the adjusted third character size as the second character size of the second area content; if the third character size is not adjusted, the unadjusted third character size may be determined as the second character size of the second area content. If the third character spacing is adjusted, the adjusted third character spacing can be determined to be the second character spacing of the second area content; if the third character spacing is not adjusted, the unadjusted third character spacing may be determined to be the second character spacing of the second region content.
Further, in some cases, in the case where the size difference is larger than the preset second threshold value, at least one of the third character number, the third character size, and the third character pitch may be adjusted so that a size determined based on the adjusted third character number, third character size, and third character pitch is equal to a size indicated by the first size information, and the adjusted third character number, third character size, and third character pitch are determined as the second character number, second character size, and second character pitch of the second area content, respectively.
It can be appreciated that in the above alternative implementation manner, the size difference between the size of the second area content after the content replacement and the size of the first area content before the content replacement may be made smaller (that is, smaller than or equal to the preset second threshold value), so that the influence on the typesetting of the target document after the content replacement is further reduced.
Optionally, the first typesetting information includes first size information of the first area content.
The first size information may be size information of the first area content. As an example, the first size information may include at least one of a width and a height of the first region content. As yet another example, in the case where the first area content includes at least two lines of content, the first size information may include a total width and/or a total height of each line of content.
On this basis, second layout information of the second area contents of the target document may be determined based on the first layout information in the following manner:
first, the first size information included in the first layout information is determined as second size information of the second area content of the target document.
The second size information may be size information of the second area content. As an example, the second size information may include at least one of a width and a height of the second area content. As yet another example, in the case where the second area content includes at least two lines of content, the second size information may include a width of each line of content. The second size information corresponds to the first size information. For example, if the first size information includes a width of the first area content, the second size information includes a width of the second area content. If the first size information includes a height of the first area content, the second size information includes a height of the second area content.
Then, second layout information of second area contents of the target document is determined based on the second size information.
As an example, a target size interval including the size indicated by the second size information may be first determined from a set of preset size intervals. And then, determining the second typesetting information pre-associated with the target size information as the second typesetting information of the second area content of the target document.
The target size interval may be a size interval including a size indicated by the second size information in a preset size interval set. Each size section in the preset size section set may be associated with a type of second layout information in advance.
As yet another example, it may be first determined whether the second size information satisfies the following condition: the second size information indicates a size greater than the first preset size, and the second size information indicates a size smaller than the second preset size. And if the condition is met, determining the second typesetting information of the second area content of the target document as preset second typesetting information. Wherein the first preset size is smaller than the second preset size. Here, when the second region content is presented according to the typesetting mode indicated by the preset second typesetting information, the typesetting mode of the other document region contents except the second region content in the target document is consistent with the typesetting mode of the other document region contents except the first region content in the target document when the first region content is presented.
It may be appreciated that in the above-mentioned alternative implementation manner, the first size information included in the first typesetting information is used to determine the second size information of the second area content, so as to determine the second typesetting information of the second area content, so that the influence on the typesetting of the target document after the content is replaced can be further reduced.
In an embodiment, in case the first region content is non-desensitized content and the second region content is desensitized content of the first region content, the second region content is set to a preset presentation style different from the first region content. For example, at least one of a font size, a font, a bold, an italic, an underline, a strikethrough, a font color, a background color of the document area content, and the like is set to delete the original presentation style of the non-desensitized content, thereby avoiding information leakage of the security level and the like of the second area content due to the correspondence between the presentation style and the security level of the non-desensitized content.
Fig. 2A is a flowchart of another method for presenting document content according to an embodiment of the present application. As shown in fig. 2A, the method specifically includes:
in step 201, document data of a target document and user information of a target user are acquired, wherein the document data includes document area content. Thereafter, step 202 is continued.
In this embodiment, in the case where the target user has the viewing authority of the document area content, the user information indicates the highest security level of the document area content for which the target user has the viewing authority.
By way of example, the security level of the document area content (i.e., the content security level described later) may include 1, 2, 3, 4, 5. In this scenario, if the user information indicates that the highest security level of the document area content for which the target user has viewing rights is "3", the target user may have viewing rights for the document area content of security levels 1, 2, 3, and may not have viewing rights for the document area content of security levels 4, 5.
The manner of representing each security class and the level of each security class may be determined according to actual needs, and the above examples are not limited thereto.
In addition, step 201 in this embodiment may be identical to step 101 in the corresponding embodiment of fig. 1A, and will not be described here again.
Step 202, determining content information of the document area content. Thereafter, step 203 is continued.
In this embodiment, the content information indicates a content security level.
In addition, step 202 in this embodiment may be identical to step 102 in the corresponding embodiment of fig. 1A, and will not be described here again.
Step 203, determining the highest security level of the document area content with the viewing authority of the target user based on the user information. Thereafter, step 204 is continued.
In the present embodiment, since the user information indicates the highest level of the document area content for which the target user has viewing authority, the highest level of the document area content for which the target user has viewing authority can be determined based on the user information.
Step 204, determining whether the content security level represented by the content information is lower than or equal to the highest security level. If yes, go on to step 206; if not, proceed to step 205.
Step 205, determining that the presentation mode of the document area content is a desensitization mode. Thereafter, the process continues to step 207.
In this embodiment, when the presentation mode is a non-desensitization mode, information such as text, image, table, etc. in the content of the display document area may be encrypted, so that the encrypted information is displayed. In other words, the content of the document area presented in the desensitization mode cannot be obtained directly by the corresponding user, and the information such as text, images, tables and the like in the content of the document area is displayed.
Step 206, determining that the presentation mode of the document area content is a non-desensitization mode. Thereafter, the process continues to step 207.
In this embodiment, in the case where the presentation mode is a non-desensitization mode, information such as text, images, tables, and the like in the document area content can be displayed.
And step 207, presenting the content of the document area in the presenting mode.
As an example, if the text "1000 yuan bid" is included in the displayed document area content, then "1000 yuan bid" may be displayed to display the above document area content in a non-desensitized manner. If the text "bid 1000 Yuan" is included in the displayed document area content, "XXXXX" may be displayed to display the above document area content in a desensitized manner.
Referring specifically to fig. 1F and fig. 1G, fig. 1F is a schematic diagram illustrating a document area content presented by a desensitization manner in a document content presentation method according to an embodiment of the present application. Fig. 1G is a schematic diagram of presenting document area content in a non-desensitizing manner in a method for presenting document content according to an embodiment of the present application.
It should be noted that, in addition to the above descriptions, the present embodiment may further include the corresponding technical features described in the embodiment corresponding to fig. 1A, so as to achieve the technical effects of the method for presenting the document content shown in fig. 1A, and specific reference is made to the related description of fig. 1A, which is not repeated herein for brevity.
The method for presenting the document content can compare the highest security level of the document area content with the viewing authority of the target user with the content security level of the content information representation of the document area content to determine whether to display the document area content in a desensitization mode or a non-desensitization mode. Compared with a scheme of adopting a mode of setting passwords or setting different document authorities for different users to prohibit or allow the users to view the document content, the method can improve the fine degree of document management. The setting efficiency can be improved relative to a scheme in which the content of the document area is displayed by determining whether to adopt a desensitization mode or a non-desensitization mode for each user, respectively. Compared with the mode that the visible document area content of each user is determined, and a plurality of different documents are generated for different users based on the same document, the problem of inconsistent content caused by the fact that a single document cannot be synchronized to other documents after being modified can be avoided.
In some optional implementations of this embodiment, in a case where the content information indicates that the content security level is higher than the highest security level, after the presenting the document area content in the presenting manner, the following steps may be further performed:
First, an authorization request of the target user for the presented target area content is obtained.
The target area content is the document area content which is presented in a desensitization mode. The authorization request is used for requesting to acquire the viewing authority of the target area content.
And a second step of determining the authorization information corresponding to the authorization request.
Wherein the authorization information indicates whether the target user is authorized to view the target area content.
In practice, the above-mentioned authorization information may be determined via a user having the management authority or the auditing authority of the target document. Specifically, the user having the management authority or the auditing authority of the target document may include at least one of: a creator of the target document, an administrator of the target document, and the like.
And thirdly, determining whether to present the content of the target area in a non-desensitizing mode based on the authorization information.
In particular, in the case where the authorization information indicates that the target user is authorized to view the target area content, it may be determined that the target area content is presented in a non-desensitized manner. In the event that the authorization information does not indicate authorization to view the target area content by the target user, it may be determined to present the target area content in a desensitized manner.
And fourthly, under the condition that the target area content is determined to be presented in a non-desensitizing mode, the target area content is presented in a non-desensitizing mode.
It can be appreciated that in the above alternative implementation manner, for the document area content presented in the desensitization manner, the corresponding user may obtain the viewing authority of the document area content by initiating the authorization request, so as to view the document area content presented in the non-desensitization manner. Therefore, on the premise of ensuring that the levels of the content which can be checked by the users with different levels are set, the secondary confirmation can be carried out pertinently for specific users, thereby ensuring the efficiency of setting the checking authority and reducing the occurrence of the situation that the users with the checking authority cannot check the corresponding content.
In some application scenarios in the above optional implementation manners, the authorization request is used to request to obtain viewing rights of at least two target area contents, and the authorization information indicates whether the target user is authorized to view the target area contents.
On this basis, it may be determined whether to present the target area content in a non-desensitized manner based on the authorization information in the following manner:
For each of the at least two target area contents, determining whether to render each of the target area contents in a non-desensitized manner based on the authorization information.
It can be understood that in the above application scenario, whether the user has the viewing authority can be determined one by one for each target area content, thereby improving the fineness and accuracy of setting the document area content having the viewing authority for the user.
Fig. 3 is a flowchart of another method for presenting document content according to an embodiment of the present application. The method can be applied to one or more electronic devices such as smart phones, notebook computers, desktop computers, portable computers, servers and the like. The main execution body of the method may be hardware or software. When the execution body is hardware, the execution body may be one or more of the electronic devices. For example, a single electronic device may perform the method, or a plurality of electronic devices may cooperate with one another to perform the method. When the execution subject is software, the method may be implemented as a plurality of software or software modules, or may be implemented as a single software or software module. The present invention is not particularly limited herein.
Specifically, as shown in fig. 3, the method specifically includes:
step 301, obtaining document data of a target document and user information of a target user from a preset position, wherein the document data comprises document area content, and the document data is stored in the preset position.
In this embodiment, the preset location may be a storage space such as a database. Thereby, the document data of the target document and the user information of the target user can be acquired from the preset position.
In addition, step 301 in this embodiment may be identical to step 101 in the corresponding embodiment of fig. 1A, and will not be described here again.
And step 302, loading the document data of the target document and the user information of the target user into a memory.
Step 303, determining content information of the document area content.
In this embodiment, step 303 may be identical to step 102 in the corresponding embodiment of fig. 1A, and will not be described herein.
Step 304, determining the presenting mode of the document area content based on the user information and the content information.
In this embodiment, step 304 may be identical to step 103 in the corresponding embodiment of fig. 1A, and will not be described herein.
And step 305, presenting the content of the document area by adopting the presenting mode.
In this embodiment, step 305 is substantially identical to step 104 in the corresponding embodiment of fig. 1A, and will not be described herein.
In some optional implementations of this embodiment, the document region content may be presented by employing the presentation manner as follows:
first, the part of the document area content in the document data loaded in the memory is modified into the original content with the presentation mode.
And then, presenting the original content with the presentation mode.
It can be appreciated that in the above alternative implementation manner, the presenting manner of the original document may be modified in the memory, so that the manner in which the original document is presented to the user does not modify the target document in the preset position, and does not affect the style in which the document is presented to other users. The presentation styles of the same document by the users are not mutually influenced.
The following exemplary description of the embodiments of the present application is provided, but it should be noted that the embodiments of the present application may have the features described below, and the following description should not be construed as limiting the scope of the embodiments of the present application.
The method can load data through the memory, so that the source data (namely the original content) is not changed, and when the encrypted business document (namely the target document) is opened, the document content is scanned and matched with the sensitive word strategy of the management background after scanning. The sensitive word policy may set keywords or regular expressions, and when scanning hits configured keywords (i.e., keywords in the preset keyword set) or confidential sensitive words of regular expressions (i.e., regular expressions in the preset regular expression set), these hit information (i.e., document region content) may be marked as confidential points (i.e., confidential content). Regarding the dense dots, it is necessary to judge the visibility. If the judgment result is visible, the method is presented in a non-desensitizing mode; and if the judgment result is invisible, adopting a desensitization mode for presentation. And the sensitive word strategy can make a one-to-one matching relation between the dense point content and the dense level, wherein the matching relation can be determined through the corresponding relation between the key word and the dense level, or the matching relation can be determined through the corresponding relation between the regular expression and the dense level.
Different security classes can be configured with corresponding display styles (i.e., the presentation modes described above) through the management background. When the document is opened, the security level style is read to be matched with the security level of the current login role once, and when the document is searched and fast read, the position of the security point and the security level can be fast determined according to the self-defined security level style configured in the background. Different secret classes can have different patterns, and whether the secret points are displayed or not can be rapidly determined according to the patterns. By modifying the document data (for example, the presentation mode of the document area content) in the memory, the effect that personnel with different authorities (corresponding to the highest security class) display different content styles is achieved, so that only one document is used up until the end, and the original document is not changed.
In the management background, the personnel security level may be set (as shown in fig. 1B and 1C), and the policy configuration may be performed (as shown in fig. 1E).
Here, different personnel may set different security levels. After setting, when a user with opening authority opens a business-secret document, only the contents of the secret points corresponding to the secret level and below the secret level can be checked, the contents above the secret level can not be checked, and the desensitization effect is displayed on the contents. In addition, in performing policy configuration, the function of the personnel level may be determined with or without the use of the "set" button of the policy. After opening, the personnel security level is validated against the configuration data of FIG. 1E. When the secret level and the pattern of the dense point display inserted in the document content are set in a self-defined mode, a new button can be clicked to add. Different classes of security may be supported to correspond to different styles.
In the front-end interface, if a document (i.e., the above-mentioned target document) is opened, it is necessary to determine the authority status of the account currently logged in. For a confidential document, if the user does not have document opening rights, the confidential document cannot be opened. If the user has document opening rights and no document security rights, the dense point part is displayed in a desensitized manner. If the user has document opening authority and document security authority, the user needs to be matched with the security information of the current login account. If the personnel security level (i.e., the highest security level) of the current login account is equal to or lower than the secret point security level (i.e., the secret level corresponding to the secret-related content), the secret point content (i.e., the document area content) is displayed in a non-desensitizing mode, the document security level is higher than the personnel security level, the content cannot be checked, and a desensitizing effect is displayed on the document security level.
In addition, for the user without document security authority, the user can submit the open approval (namely the authorization request) to the drafting person or the approver through the walk approval process. And after approval, the document is opened again, and the user can see the content of the secret point information. The approval may be for a portion or all of the secret points of the secret classes that are open. For the users with partial security rights, the method can submit the high-security point open approval to the drafter or the approver through the walk approval process, and the high-security point information content can be seen by opening the document again after the approval is passed.
Therefore, the method converts the secret point data in a memory loading mode, and determines whether the content of the document secret point is visible or not according to the secret attribute corresponding to the secret of different personnel. And, the contents of the secret points can be displayed according to the personnel security without changing the source file.
In addition, the method can scan the content of the document region through the keywords (namely, the keywords in the preset keyword set) or the formal expressions (namely, the regular expressions in the preset regular expression set) of the document. Fig. 1D is a schematic diagram of a setting manner of a preset keyword set of a document content presentation method according to an embodiment of the present application. In fig. 1D, the preset keyword set may include keywords "development strategy and its layout", keywords "major reform matters", keywords "major project arrangement, major asset disposition" and keywords "XXXX cases". Wherein, the keywords all correspond to the secret level 'core secret'. In this case, the level information of the secret level may be "core secret", or may be an identification (e.g., 1, 2, etc.) indicating "core secret". And after the hit is scanned, marking the hit secret-related content automatically or manually, and displaying the secret class corresponding to the secret-related content before the secret-related content. When the scanning hits a plurality of keywords or a plurality of regular expressions, the security class, the security basis and the security term (namely a plurality of labeling information) corresponding to the hit keywords or regular expressions can be displayed in the task bar. The user can manually judge which security class, the basis of security establishment and the security term (namely the target labeling information) need to be labeled before the security content. The rights related to the confidential content (i.e., the first rights information) can multiplex the document rights (i.e., the second rights information). In addition, the authority of the confidential content can be independently set by a technical mode of regional authority protection, so that the effect that the modification of the document authority does not influence the modification of the confidential point is achieved.
In addition, the method can have a labeling function and a permission setting function.
For the labeling function, whether the labeling is performed by means of manual labeling or intelligent labeling can be determined through configuration items. As shown in fig. 1F, after selecting "manual labeling" and scanning out the secret points, the drafting personnel can be notified in a message notification manner, and the drafting personnel manually labels the secret level before the secret-related content. And selecting intelligent labeling, automatically labeling the secret level before a labeling function after the secret-related content is determined, and if the secret level cannot be determined by a plurality of labeling information, starting secret point recommendation and prompting after the document is opened.
For the rights setting function, whether the confidential content rights (i.e., the above-described first rights information) are set alone or in accordance with the document rights (i.e., the above-described second rights information) can be configured by the configuration item. Selecting 'using secret point authority', and separating document authority from authority related to secret content. And selecting 'multiplexing document rights', wherein the document rights are consistent with the rights related to the confidential content.
In addition, as shown in fig. 1G, the front-end interface of the user may be provided with functions such as message notification and labeling target labeling information.
The message notification function may notify the drafter of the confidential content in a message notification manner after determining the confidential content when "manual labeling" is selected. The drafter clicks the "document seal" button to open the document. In addition, through the labeling target labeling information function, under the condition of selecting intelligent labeling, if the document hits keywords or regular expressions in the scanning process, automatic labeling can be performed, so that the document is automatically changed into a confidential document.
Under the condition that the management background configuration item selects manual labeling, the scanned secret-related content is marked, the secret level, the secret setting, the secret term and the corresponding secret point are displayed on the right taskbar, the secret point (1) can be clicked to locate the secret-related content corresponding to the document, and target labeling information can be manually added to the document before the secret point.
Under the condition that the intelligent label is selected in the management background configuration item, the scanned secret-related content can be automatically marked with secret level, secret-related basis and secret-related term related information (namely the target label information).
In addition, as shown in fig. 1H, for the case where a hit of a plurality of keywords or a plurality of regular expressions occurs, for example, it is shown herein that "materials related to annual basic financial situation annual financial settlement need to be uploaded and archived to a financial system", "annual basic financial situation" is a secret point corresponding to a core business secret, and "annual financial settlement" is a secret point corresponding to a common business secret. The combined secret points relate to secret classes or secret foundation which are related, a plurality of marking information can appear in the right taskbar to recommend, and a drafting person clicks the marking information to be selected to mark.
In the case where the management background configuration item selects "use confidential content rights (i.e., the first rights information) independent of document rights (i.e., the second rights information), the rights of the confidential content can be set independently by the regional rights protection technique. The rights only aim at the condition that the confidential content is visible (namely, the confidential content is provided with viewing rights and displayed in a non-desensitizing mode), and the visible confidential content is operated according to the given rights. When the confidential content has no viewing right, the confidential point can be copied, and the copied content is still displayed in a desensitization mode. The authorized object of the confidential content (i.e., the authorized user) reads the authorized object of the document (i.e., the confidential content is displayed to the authorized object in a non-desensitized manner). By way of example, the rights to confidential content may be set separately in the manner shown in FIG. 1I.
Here, in the case where the document authority and the confidential content authority are independent, the confidential point name may be the name of the document authority, but the confidential content authority is set independently of the document authority.
In addition, the following strategy can be used for comparison of the security level:
for the case set to editable, if the security levels 1, 2, 3 are ordered in sequence, and the level of security level 3 is highest. In this case, if the user a has the right to modify the content of security class 3, the security classes 1, 2, 3 can be modified. If user b has rights to modify content of security class 2, then content of security classes 1 and 2 may be modified.
For the case of being set to uneditable, if the security levels 1, 2, 3, 4, 5 are ordered in sequence, and the level of security level 5 is highest. In this case, if the user a cannot modify the content of the security level 2, 3, 4, 5. If user b cannot modify content with a security level of 3, it cannot modify content with a security level of 3, 4, 5.
One of three schemes can be adopted in the management background configuration item selection to set the confidential content authority:
the first scheme is as follows: the dense point authority priority is higher than the document authority priority:
for example, in the case where the user a has editing authority for the document a, the core close point has no editing authority, and the normal close point has editing authority. The effect of this example is that the text and the common secret points outside the set secret points can be modified, and the core secret point content cannot be modified. In the case that the user b has no editing authority (read-only) for the document a, the user b has no editing authority for the core secret point and no editing authority for the common secret point, and the effect of this example is that the text outside the common secret point and the set secret point can be modified.
The scheme is equivalent to that the characters outside the set secret points are classified as the secret level with the lowest ranking.
The second scheme is as follows: the priority of the document rights is higher than the priority of the confidential content rights:
for example, in the case where the user a has no editing authority for the document a, the user a has no editing authority for both the core secret point and the ordinary secret point, and the effect of this example is that the authority of any secret point cannot be set for the user a. Under the condition that the user b has editing authority for the document A, the user b has no editing authority for the core secret point and has editing authority for the common secret point, and the effect of the example is that the characters and the common secret points outside the set secret point can be modified, and the content of the core secret point cannot be modified.
The third scheme is: the close point authority is independent of the document authority:
for example, in the case that the user a has editing authority for the document a, the user a has no editing authority for the core secret point and editing authority for the common secret point, and the effect of this example is that the text and the common secret point outside the set secret point can be modified, and the content of the core secret point cannot be modified. Under the condition that the user b has no editing authority (read-only) on the document A, the user b has no editing authority on the core secret point and has editing authority on the common secret point, and the effect of the example is that the common secret point can be modified, and the content of the core secret point and the characters outside the set secret point cannot be modified.
In addition, under the condition that a new authorized user is added to the document, if the authorization of the secret point is not set, the new user can operate the authorization of the document, the authorization of the secret point operation is not defaulted, the secret point display content displays whether the secret-related content is in a secret point form or not according to the role condition of background configuration (namely, the desensitization mode), and the new user cannot view all the secret-related content and can view or modify the secret-related content after authorization.
Therefore, when the document hits a plurality of keywords or a plurality of regular expressions, the method can recommend an alternative scheme (namely recommending a plurality of annotation information), and a user can manually conduct selection confirmation to determine the target annotation information. And the authority control is carried out on the confidential content in a document area authority mode, so that the original authority of the document is not influenced.
In addition, in the method, when the document (i.e., the target document) is opened, by calculating the attribute of the character width (i.e., the first character size) and the attribute value of the line spacing (i.e., the first character line spacing) of the related ciphertext (i.e., the characters in the first area content), and combining the configuration strategy (such as equal or unequal number of the first characters and the second characters) of the background, then calculating the font scaling (such as quotient of the second character size and the first character size), the word spacing (i.e., the second character spacing), the character width (i.e., the second character size) and the line spacing (i.e., the second line spacing), and solidifying the corresponding values, thereby realizing the display of the ciphertext (i.e., the second area content) state or the display of the ciphertext (i.e., the second area content) state, and the middle/special character clips can be kept unchanged (such as no influence of the contents on other parts of the target document before and after the replacement).
Further, as shown in fig. 1J, the number of the dense point displays may be set by a configuration policy in the background.
For example, the density and number of words (i.e., the number of characters) may be identical. That is, the first character number is determined as the second character number. When the document is set to be consistent with the number of words, the client opens the document, and the number of hidden characters and the number of words are displayed to be consistent.
Alternatively, the number of dots and words may be inconsistent. That is, the first number of characters is not equal to the second number of characters.
When the document is set to be inconsistent with the number of words, the client opens the document, and the number of hidden characters of the document is unequal to the number of hidden characters and the number of displayed dense points. In this way, some of the confidential content is avoided from being easily guessed that is short.
Here, when a document is presented by a client, there may be two cases corresponding to the above two configuration policies as follows:
in the first case, when the number of density points (i.e., the second number of characters) and the number of characters (i.e., the first number of characters) are identical, the second character size (e.g., the length and width) of the second area content may be the first character size (e.g., the length and width of chinese or english) of the first area content. When the document is opened, a first character spacing and a first line spacing of the first region content are calculated. According to the strategy that the number of characters and the number of secret points are to be corresponding (in this case, the number of secret points is consistent with the number of characters), the data corresponding to the secret points (i.e., the second character size, the second character spacing, the second line spacing) is converted by font scaling (i.e., the quotient of the second character size and the first character size), the word spacing (i.e., the first character spacing) and the line spacing (i.e., the second character spacing) through font scaling (i.e., the first character spacing) and the line spacing (i.e., the second line spacing) so that the character spacing (i.e., the first character spacing) and the line spacing) of a secret word can be corresponding (i.e., the second character spacing is equal to the first character size and the second line spacing is equal to the first line spacing), and the effect of non-typesetting can be achieved as shown in fig. 1K and 1L. The line spacing value is a fixed value, and when the line spacing value is converted into the fixed value, the fixed value is continuously used without change. In addition, when the fonts and the font sizes are changed, the original typesetting effect is not affected. The effect diagram is shown in fig. 1M and 1N.
In the second case, when the number of secret points and the number of characters do not match, when the document (i.e., the target document) is opened, the character pitch (i.e., the first character pitch) and the line pitch (i.e., the first line pitch) of the hit secret-related characters (i.e., the characters in the first region content) are calculated. According to the strategy that the number of characters and the number of secret points selected by the background are inconsistent, the data (namely the second character size, the second character spacing and the second line spacing) corresponding to the secret points are converted through the combination of font scaling (namely the quotient of the second character size and the first character size), character spacing (namely the first character spacing), character width (namely the first character size) and line spacing (namely the first line spacing), so that the character spacing and the line spacing of a section of secret-related characters can correspond to the field spacing and the overall data between lines of a section of secret points, and the effect of unchanged typesetting is achieved. The effect diagram is shown in fig. 1O and 1P. When the font and font size change, the filling is automatically added according to the character spacing (i.e. the first character spacing) and the line spacing (i.e. the first line spacing) of the original document, if the predetermined effect cannot be achieved after filling, the font scaling, the character spacing, the character width and the line spacing are recalculated to achieve the effect of keeping the original character spacing consistent, and the effect diagram is shown in fig. 1Q and fig. 1R.
When the document is opened, the method calculates the character width (namely the first character size) attribute of the confidential text, and solidifies the line spacing attribute (namely the first line spacing is determined as the second line spacing), so that after the confidential text is changed into a dense point (namely the first area content is replaced by the second area content), the method is not influenced by the font, the font size and the line spacing, and the document typesetting consistency is kept.
It should be noted that, in addition to the above descriptions, the present embodiment may further include the technical features described in the above embodiments, so as to achieve the technical effects of the method for presenting the document content shown above, and specific reference is made to the above description, which is omitted herein for brevity.
According to the document content presentation method, the memory is used for loading relevant data of the user personalized document presentation mode, and source data of documents stored in the database are not affected.
Fig. 4 is a schematic structural diagram of a document content presenting device according to an embodiment of the present application. The method specifically comprises the following steps:
a first obtaining unit 401 for obtaining document data of a target document and user information of a target user, wherein the document data includes document area content;
A first determining unit 402 for determining content information of the document area content;
a second determining unit 403, configured to determine a presentation manner of the document area content based on the user information and the content information;
and the first presenting unit 404 is configured to present the document area content in the presenting manner.
In one possible embodiment, the content information represents a content security level, and in a case where the target user has viewing authority of the document area content, the user information represents a highest security level of the document area content where the target user has viewing authority; and
the determining the presenting mode of the document area content based on the user information and the content information comprises the following steps:
determining the highest security level of the document area content with the viewing authority of the target user based on the user information;
under the condition that the content security level represented by the content information is lower than or equal to the highest security level, determining that the presentation mode of the content in the document area is a non-desensitization mode;
and under the condition that the content density of the content information representation is higher than the highest density, determining that the presentation mode of the content of the document area is a desensitization mode.
In a possible implementation manner, in a case that the content information indicates that the content security level is higher than the highest security level, after the presenting the document area content in the presenting manner, the apparatus further includes:
a second obtaining unit (not shown in the figure) configured to obtain an authorization request of the target user for the presented target area content, where the target area content is the document area content presented in a desensitization manner, and the authorization request is used to request to obtain a viewing authority of the target area content;
a third determining unit (not shown in the figure) configured to determine authorization information corresponding to the authorization request, where the authorization information indicates whether the target user is authorized to view the target area content;
a fourth determining unit (not shown) for determining whether to present the target area content in a non-desensitized manner based on the authorization information;
and a second rendering unit (not shown in the figure) for rendering the target area content in a non-desensitized manner, in case it is determined to render the target area content in a non-desensitized manner.
In one possible implementation manner, the document data is stored in a preset position, and the acquiring the document data of the target document and the user information of the target user includes:
Acquiring document data of a target document and user information of a target user from a preset position;
and loading the document data of the target document and the user information of the target user into a memory.
In one possible implementation manner, the presenting the document area content in the presenting manner includes:
modifying the part of the document area content in the document data loaded into the memory into the original content with the presentation mode;
and presenting the original content with the presentation mode.
In one possible embodiment, in a case where the document area content includes confidential content, the content information includes a secret level of the confidential content in the document area content.
In one possible implementation, it is determined whether the content information includes the confidential content in one of the following ways:
determining whether the document area content comprises a target keyword, wherein the target keyword is any preset keyword in a preset keyword set; determining that the content information includes the confidential content in a case where the document area content includes the target keyword;
Determining whether the document region content accords with a target regular expression, wherein the target regular expression is any preset regular expression in a preset regular expression set; determining that the content information comprises the confidential content under the condition that the document area content accords with the target regular expression;
determining whether the presentation mode of the document area content is a target presentation mode, wherein the target presentation mode is any preset presentation mode in a preset presentation mode set; and under the condition that the presentation mode of the document area content is the target presentation mode, determining that the content information comprises the confidential content.
In one possible embodiment of the present invention,
each preset keyword in the preset keyword set corresponds to a secret level; in the case that the document area content includes the target keyword, determining a secret level included in the content information based on a secret level corresponding to the target keyword;
each preset regular expression in the preset regular expression set corresponds to a secret level; under the condition that the document area content accords with the target regular expression, determining a secret level included in the content information based on the secret level corresponding to the target regular expression;
Each preset presentation mode in the preset presentation mode set corresponds to a secret level; and under the condition that the presentation mode of the document area content is the target presentation mode, determining the secret level included in the content information based on the secret level corresponding to the target presentation mode.
The document content presenting device provided in this embodiment may be a document content presenting device as shown in fig. 4, and may perform all the steps of the above-described method for presenting document contents, so as to achieve the technical effects of the above-described method for presenting document contents, and specific reference is made to the above-described related description, which is omitted herein for brevity.
Fig. 5 is a schematic structural diagram of an electronic device according to an embodiment of the present application, and an electronic device 500 shown in fig. 5 includes: at least one processor 501, memory 502, at least one network interface 504, and other user interfaces 503. The various components in the electronic device 500 are coupled together by a bus system 505. It is understood that bus system 505 is used to enable connected communications between these components. The bus system 505 includes a power bus, a control bus, and a status signal bus in addition to a data bus. But for clarity of illustration the various buses are labeled as bus system 505 in fig. 5.
The user interface 503 may include, among other things, a display, a keyboard, or a pointing device (e.g., a mouse, a trackball, a touch pad, or a touch screen, etc.).
It is to be appreciated that the memory 502 in embodiments of the present application may be either volatile memory or nonvolatile memory, or may include both volatile and nonvolatile memory. The nonvolatile Memory may be a Read-Only Memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an Electrically Erasable EPROM (EEPROM), or a flash Memory. The volatile memory may be random access memory (Random Access Memory, RAM) which acts as an external cache. By way of example, and not limitation, many forms of RAM are available, such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double Data Rate SDRAM (Double Data Rate SDRAM), enhanced SDRAM (ESDRAM), synchronous Link DRAM (SLDRAM), and Direct memory bus RAM (DRRAM). The memory 502 described herein is intended to comprise, without being limited to, these and any other suitable types of memory.
In some implementations, the memory 502 stores the following elements, executable units or data structures, or a subset thereof, or an extended set thereof: an operating system 5021 and application programs 5022.
The operating system 5021 includes various system programs, such as a framework layer, a core library layer, a driver layer, and the like, for implementing various basic services and processing hardware-based tasks. The application 5022 includes various application programs such as a Media Player (Media Player), a Browser (Browser), and the like for realizing various application services. A program for implementing the method of the embodiment of the present application may be included in the application 5022.
In this embodiment, the processor 501 is configured to execute the method steps provided in the method embodiments by calling a program or an instruction stored in the memory 502, specifically, a program or an instruction stored in the application 5022, for example, including:
acquiring document data of a target document and user information of a target user, wherein the document data comprises document area content;
determining content information of the document area content;
determining a presentation mode of the document area content based on the user information and the content information;
And presenting the content of the document area by adopting the presenting mode.
The method disclosed in the embodiments of the present application may be applied to the processor 501 or implemented by the processor 501. The processor 501 may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be performed by integrated logic circuitry in hardware or instructions in software in the processor 501. The processor 501 may be a general purpose processor, a digital signal processor (Digital Signal Processor, DSP), an application specific integrated circuit (Application Specific Integrated Circuit, ASIC), an off-the-shelf programmable gate array (Field Programmable Gate Array, FPGA) or other programmable logic device, discrete gate or transistor logic device, discrete hardware components. The disclosed methods, steps, and logic blocks in the embodiments of the present application may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present application may be embodied directly in hardware, in a decoded processor, or in a combination of hardware and software elements in a decoded processor. The software elements may be located in a random access memory, flash memory, read-only memory, programmable read-only memory or electrically erasable programmable memory, registers, etc. as well known in the art. The storage medium is located in a memory 502, and the processor 501 reads information in the memory 502 and, in combination with its hardware, performs the steps of the method described above.
It is to be understood that the embodiments described herein may be implemented in hardware, software, firmware, middleware, microcode, or a combination thereof. For a hardware implementation, the processing units may be implemented within one or more application specific integrated circuits (Application Specific Integrated Circuits, ASIC), digital signal processors (Digital Signal Processing, DSP), digital signal processing devices (dspev, DSPD), programmable logic devices (Programmable Logic Device, PLD), field programmable gate arrays (Field-Programmable Gate Array, FPGA), general purpose processors, controllers, microcontrollers, microprocessors, other electronic units configured to perform the above-described functions of the application, or a combination thereof.
For a software implementation, the techniques described herein may be implemented by means of units that perform the functions described herein. The software codes may be stored in a memory and executed by a processor. The memory may be implemented within the processor or external to the processor.
The electronic device provided in this embodiment may be an electronic device as shown in fig. 5, and may perform all the steps of the above-described method for presenting content of each document, so as to achieve the technical effects of the above-described method for presenting content of each document, and specific reference is made to the above-described related description, which is omitted herein for brevity.
The embodiment of the application also provides a storage medium (computer readable storage medium). The storage medium here stores one or more programs. Wherein the storage medium may comprise volatile memory, such as random access memory; the memory may also include non-volatile memory, such as read-only memory, flash memory, hard disk, or solid state disk; the memory may also comprise a combination of the above types of memories.
When one or more programs in the storage medium are executable by one or more processors, the method for presenting document content executed on the electronic device side is implemented.
The above-mentioned processor is used for executing the presentation program of the document content stored in the memory, in order to realize the following steps of the presentation method of the document content executed on the electronic device side:
acquiring document data of a target document and user information of a target user, wherein the document data comprises document area content;
determining content information of the document area content;
determining a presentation mode of the document area content based on the user information and the content information;
and presenting the content of the document area by adopting the presenting mode.
Those of skill would further appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that the various illustrative elements and steps are described above generally in terms of function in order to clearly illustrate the interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied in hardware, in a software module executed by a processor, or in a combination of the two. The software modules may be disposed in Random Access Memory (RAM), memory, read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art.
The foregoing embodiments have been provided for the purpose of illustrating the general principles of the present application, and are not meant to limit the scope of the invention, but to limit the scope of the invention. Moreover, while the various embodiments described above have been described as a series of acts for simplicity of explanation, it will be appreciated by those skilled in the art that the present invention is not limited by the order of acts, as some steps may occur in other orders or concurrently in the same fashion, in accordance with the invention. Further, those skilled in the art will also appreciate that the embodiments described in the specification are alternative embodiments, and that the acts and modules referred to are not necessarily required for the present invention.

Claims (11)

1. A method of presenting document content, the method comprising:
acquiring document data of a target document and user information of a target user, wherein the document data comprises document area content;
determining content information of the document area content;
determining a presentation mode of the document area content based on the user information and the content information;
and presenting the content of the document area by adopting the presenting mode.
2. The method according to claim 1, wherein the content information indicates a content security level, and in the case where the target user has viewing authority of the document area content, the user information indicates a highest security level of the document area content where the target user has viewing authority; and
the determining the presenting mode of the document area content based on the user information and the content information comprises the following steps:
determining the highest security level of the document area content with the viewing authority of the target user based on the user information;
under the condition that the content security level represented by the content information is lower than or equal to the highest security level, determining that the presentation mode of the content in the document area is a non-desensitization mode;
And under the condition that the content density of the content information representation is higher than the highest density, determining that the presentation mode of the content of the document area is a desensitization mode.
3. The method according to claim 2, wherein in a case where the content information indicates a content higher than the highest security level, after the presenting the document area content in the presenting manner, the method further comprises:
acquiring an authorization request of the target user for the presented target area content, wherein the target area content is the document area content presented in a desensitization mode, and the authorization request is used for requesting to acquire the viewing authority of the target area content;
determining authorization information corresponding to the authorization request, wherein the authorization information represents whether the target user is authorized to view the content of the target area;
determining whether to present the target area content in a non-desensitizing manner based on the authorization information;
and in the case that the target area content is determined to be presented in a non-desensitizing mode, the target area content is presented in a non-desensitizing mode.
4. The method according to claim 1, wherein the document data is stored in a preset location, and the acquiring the document data of the target document and the user information of the target user includes:
Acquiring document data of a target document and user information of a target user from a preset position;
and loading the document data of the target document and the user information of the target user into a memory.
5. The method of claim 4, wherein presenting the document area content in the presenting manner comprises:
modifying the part of the document area content in the document data loaded into the memory into the original content with the presentation mode;
and presenting the original content with the presentation mode.
6. The method according to claim 1, wherein in the case where the document area content includes confidential content, the content information includes a secret level of the confidential content in the document area content.
7. The method of claim 6, wherein determining whether the content information includes the confidential content is performed by one of:
determining whether the document area content comprises a target keyword, wherein the target keyword is any preset keyword in a preset keyword set; determining that the content information includes the confidential content in a case where the document area content includes the target keyword;
Determining whether the document region content accords with a target regular expression, wherein the target regular expression is any preset regular expression in a preset regular expression set; determining that the content information comprises the confidential content under the condition that the document area content accords with the target regular expression;
determining whether the presentation mode of the document area content is a target presentation mode, wherein the target presentation mode is any preset presentation mode in a preset presentation mode set; and under the condition that the presentation mode of the document area content is the target presentation mode, determining that the content information comprises the confidential content.
8. The method of claim 7, wherein the step of determining the position of the probe is performed,
each preset keyword in the preset keyword set corresponds to a secret level; in the case that the document area content includes the target keyword, determining a secret level included in the content information based on a secret level corresponding to the target keyword;
each preset regular expression in the preset regular expression set corresponds to a secret level; under the condition that the document area content accords with the target regular expression, determining a secret level included in the content information based on the secret level corresponding to the target regular expression;
Each preset presentation mode in the preset presentation mode set corresponds to a secret level; and under the condition that the presentation mode of the document area content is the target presentation mode, determining the secret level included in the content information based on the secret level corresponding to the target presentation mode.
9. A document content presentation apparatus, the apparatus comprising:
a first acquisition unit configured to acquire document data of a target document and user information of a target user, wherein the document data includes document area content;
a first determining unit configured to determine content information of the document area content;
a second determining unit configured to determine a presentation manner of the document area content based on the user information and the content information;
and the first presenting unit is used for presenting the document area content by adopting the presenting mode.
10. An electronic device, comprising:
a memory for storing a computer program;
a processor for executing a computer program stored in said memory, and which, when executed, implements the method of any of the preceding claims 1-8.
11. A computer readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements the method of any of the preceding claims 1-8.
CN202310274111.0A 2023-03-17 2023-03-17 Document content presentation method and device, electronic equipment and storage medium Pending CN116306490A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310274111.0A CN116306490A (en) 2023-03-17 2023-03-17 Document content presentation method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310274111.0A CN116306490A (en) 2023-03-17 2023-03-17 Document content presentation method and device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN116306490A true CN116306490A (en) 2023-06-23

Family

ID=86777599

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310274111.0A Pending CN116306490A (en) 2023-03-17 2023-03-17 Document content presentation method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN116306490A (en)

Similar Documents

Publication Publication Date Title
US11704384B2 (en) Secure document sharing
US11182541B2 (en) Collaborative document creation by a plurality of distinct teams
US9754120B2 (en) Document redaction with data retention
JP5266384B2 (en) Communication between in-space user interface and out-space user interface in document editor
US9256753B2 (en) Method and apparatus for protecting regions of an electronic document
US20100318894A1 (en) Modifications to Editable Elements of Web Pages Rendered in Word Processor Applications
US9237136B2 (en) Mapping a glyph to character code in obfuscated data
US11049161B2 (en) Brand-based product management with branding analysis
US20100174997A1 (en) Collaborative documents exposing or otherwise utilizing bona fides of content contributors
US20240012913A1 (en) Systems and methods for creating enhanced documents for perfect automated parsing
US11874892B2 (en) Information processing apparatus and non-transitory computer readable medium storing program for browsing confidential information
US20120151334A1 (en) Interactive image-based document for secured data access
US8484555B2 (en) Electronic document control apparatus, method, program and system
CN112749537A (en) Role-based electronic engineering document management method
US11803696B2 (en) Management of tracked changes objects for cloud document editing
CN116306490A (en) Document content presentation method and device, electronic equipment and storage medium
CN116383839A (en) Document operation method, device, electronic equipment and storage medium
CN116362201A (en) Document presentation method, device, electronic equipment and storage medium
CN117273671A (en) Document collaboration method, device and storage medium
US10891432B2 (en) System and process for generating an internet application
JP2007066302A (en) Electronic document having authentication function
US7454700B1 (en) Method and apparatus for restricting the application of formatting to the contents of an electronic document
US11847405B1 (en) Encoding hyperlink data in a printed document
CN116992835B (en) Method and equipment for processing batch deposit of layout document
US20230161891A1 (en) Information processing apparatus, non-transitory computer readable medium storing information processing program, and information processing method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination