CN118277503A - Text processing method, apparatus, device, medium, and program product - Google Patents

Text processing method, apparatus, device, medium, and program product Download PDF

Info

Publication number
CN118277503A
CN118277503A CN202410535959.9A CN202410535959A CN118277503A CN 118277503 A CN118277503 A CN 118277503A CN 202410535959 A CN202410535959 A CN 202410535959A CN 118277503 A CN118277503 A CN 118277503A
Authority
CN
China
Prior art keywords
text
slice
encrypted
sliced
label
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202410535959.9A
Other languages
Chinese (zh)
Inventor
刘畅
赵春
李友洪
李汇腾
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Publication of CN118277503A publication Critical patent/CN118277503A/en
Pending legal-status Critical Current

Links

Abstract

The disclosure provides a text method which can be applied to the technical field of information security. The text processing method comprises the following steps: decrypting the encrypted text by using a decryption key to obtain an original text, wherein the encrypted text is obtained by encrypting the original text by using an encryption algorithm corresponding to the decryption key; slicing the original text according to the content information of the original text to obtain a plurality of slice texts and corresponding slice labels, wherein the slice labels represent text characteristics of the slice texts; re-encrypting the slice text according to the attribute information of the slice text to obtain an encrypted slice text, wherein the attribute information characterizes the encryption level of the slice text; and associating the slice label with the encrypted slice text corresponding to the slice label, and storing the encrypted slice text after label association into a category position corresponding to the slice label in a knowledge base. The present disclosure also provides a text apparatus, a device, a storage medium, and a program product.

Description

Text processing method, apparatus, device, medium, and program product
Technical Field
The present disclosure relates to the field of information security, text storage, and knowledge base management technologies, and in particular, to a text processing method, apparatus, device, medium, and program product.
Background
Security and privacy of data are becoming particularly important today in the rapid development of information-based society. Particularly in enterprises, governments and scientific research institutions, a large amount of document data needs to be effectively managed and stored. Since these documents often contain sensitive information such as business secrets, personal privacy, research results, etc., the storage technology of encrypting the documents has become an important means for securing data.
However, since the retrieval of an encrypted document needs to be performed without decrypting the document, this increases the difficulty and complexity of the retrieval. Especially when dealing with large-scale data sets, the efficiency of retrieval may be severely impacted.
Disclosure of Invention
In view of the foregoing, the present disclosure provides a text processing method, apparatus, device, medium, and program product.
According to a first aspect of the present disclosure, there is provided a text processing method, including: decrypting the encrypted text by using a decryption key to obtain an original text, wherein the encrypted text is obtained by encrypting the original text by using an encryption algorithm corresponding to the decryption key; slicing the original text according to the content information of the original text to obtain a plurality of sliced texts and slice labels corresponding to the sliced texts, wherein the content information is obtained by analyzing the original text, and the slice labels represent text characteristics of the sliced texts; re-encrypting the slice text according to the attribute information of the slice text to obtain an encrypted slice text, wherein the attribute information characterizes the encryption level of the slice text; and associating the slice label with the encrypted slice text corresponding to the slice label, and storing the encrypted slice text after label association to a category position corresponding to the slice label in a knowledge base.
According to the embodiment of the disclosure, slicing an original text according to content information of the original text to obtain a plurality of slice texts and slice labels corresponding to the slice texts, wherein the slicing parameters for slicing the original text are determined according to the content information of the original text; and slicing the original text according to the slicing parameters to obtain a plurality of sliced texts.
According to an embodiment of the present disclosure, determining a slicing parameter of an original text according to content information of the original text includes, in a case where it is determined that the original text includes a paragraph title, determining the slicing parameter based on the paragraph title; in the case where it is determined that the original text includes non-text content, determining a slicing parameter based on the text type; in the case where it is determined that the original text satisfies the predetermined text length, a slicing parameter is determined based on the text length. Slicing the original text according to the slicing parameters to obtain a plurality of sliced texts, including: slicing the original text according to slicing parameters to obtain a plurality of initial sliced texts; and combining a plurality of initial slice texts with the same text semantics to obtain a plurality of slice texts.
According to the embodiment of the disclosure, slicing an original text according to content information of the original text to obtain a plurality of sliced texts and slice labels corresponding to the sliced texts, and obtaining a plurality of keywords of the sliced texts, wherein the keywords comprise category keywords and content keywords used for representing text characteristics; and obtaining a slice label corresponding to the slice text according to the plurality of keywords.
According to an embodiment of the present disclosure, the attribute information includes encryption level information, and re-encrypting the slice text according to the attribute information of the slice text to obtain an encrypted slice text, including: determining a target encryption algorithm from a plurality of encryption algorithms according to encryption level information of the slice text; and encrypting the slice text by using the target encryption algorithm to obtain the encrypted slice text.
According to an embodiment of the disclosure, before storing the encrypted slice text after tag association in a category position corresponding to the slice tag in the knowledge base, the method further includes generating an access right tag corresponding to the slice text according to access right information of the slice text; and associating the access rights label with the corresponding encrypted slice text and slice label.
According to an embodiment of the present disclosure, the above text processing method further includes, in response to a request for access to a knowledge base by a user, acquiring access rights of the user; responding to the keywords input by the user, and inquiring target slice labels matched with the keywords input by the user in a knowledge base; determining a target access right label and a target encryption slice text corresponding to the target slice label according to the target slice label; and under the condition that the access rights of the user are matched with the target access rights label, displaying the text content of the decrypted target encrypted slice text on the interactive interface.
According to the embodiment of the disclosure, decrypting the encrypted text by using a decryption key to obtain an original text, including checking a digital signature of the encrypted text according to a public key of the original text to obtain a checking result of the digital signature, wherein the digital signature is generated by encrypting the encrypted text according to a private key of the original text corresponding to the public key; determining the integrity of the encrypted text according to the checking result of the digital signature; and under the condition that the encrypted text is determined to be complete, decrypting the encrypted text by using a decryption key to obtain the original text.
A second aspect of the present disclosure provides a text processing apparatus, comprising: the decryption module is used for decrypting the encrypted text by using the decryption key to obtain an original text, wherein the encrypted text is obtained by encrypting the original text by using an encryption algorithm corresponding to the decryption key; the analysis slicing module is used for slicing the original text according to the content information of the original text to obtain a plurality of sliced texts and slicing labels corresponding to the sliced texts, wherein the content information is obtained by analyzing the original text, and the slicing labels represent text characteristics of the sliced texts; the encryption module is used for re-encrypting the slice text according to the attribute information of the slice text to obtain an encrypted slice text, wherein the attribute information characterizes the encryption level of the slice text; and the storage module is used for associating the slice label with the encrypted slice text corresponding to the slice label and storing the encrypted slice text after label association into a category position corresponding to the slice label in the knowledge base.
A third aspect of the present disclosure provides an electronic device, comprising: one or more processors; and a memory for storing one or more computer programs, wherein the one or more processors execute the one or more computer programs to implement the steps of the method.
A fourth aspect of the present disclosure also provides a computer readable storage medium having stored thereon a computer program or instructions which, when executed by a processor, implement the steps of the above method.
A fifth aspect of the present disclosure also provides a computer program product comprising a computer program or instructions which, when executed by a processor, performs the steps of the method described above.
According to the embodiment of the disclosure, the original text is obtained by decrypting the encrypted text transmitted to the knowledge base, after the original text is obtained, the original text is cut into a plurality of slices, and the slice labels are used for representing the text characteristics of the slice text, so that the slice text can be stored in a classified mode, the data in the knowledge base are more modularized due to slicing and classification, and flexible management and operation are facilitated according to requirements. Meanwhile, the slicing storage mode also enables the retrieval operation to be faster and more accurate, the knowledge base can only search for specific slices, but not the whole document, and the retrieval accuracy and efficiency are improved.
Drawings
The foregoing and other objects, features and advantages of the disclosure will be more apparent from the following description of embodiments of the disclosure with reference to the accompanying drawings, in which:
FIG. 1 schematically illustrates an application scenario diagram of a text processor, apparatus, according to an embodiment of the present disclosure;
FIG. 2 schematically illustrates a flow chart of a text processing method according to an embodiment of the disclosure;
FIG. 3 schematically illustrates a schematic diagram of obtaining a plurality of sliced text in accordance with an embodiment of the present disclosure;
FIG. 4 schematically illustrates a data flow diagram of a text processing method according to another embodiment of the present disclosure;
Fig. 5 schematically shows a block diagram of a text processing apparatus according to an embodiment of the present disclosure; and
Fig. 6 schematically illustrates a block diagram of an electronic device adapted to implement a text processing method according to an embodiment of the disclosure.
Detailed Description
Hereinafter, embodiments of the present disclosure will be described with reference to the accompanying drawings. It should be understood that the description is only exemplary and is not intended to limit the scope of the present disclosure. In the following detailed description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the embodiments of the present disclosure. It may be evident, however, that one or more embodiments may be practiced without these specific details. In addition, in the following description, descriptions of well-known structures and techniques are omitted so as not to unnecessarily obscure the concepts of the present disclosure.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. The terms "comprises," "comprising," and/or the like, as used herein, specify the presence of stated features, steps, operations, and/or components, but do not preclude the presence or addition of one or more other features, steps, operations, or components.
All terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art unless otherwise defined. It should be noted that the terms used herein should be construed to have meanings consistent with the context of the present specification and should not be construed in an idealized or overly formal manner.
Where a convention analogous to "at least one of A, B and C, etc." is used, in general such a convention should be interpreted in accordance with the meaning of one of skill in the art having generally understood the convention (e.g., "a system having at least one of A, B and C" would include, but not be limited to, systems having a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc.).
In the technical solution of the present disclosure, the related user information (including, but not limited to, user personal information, user image information, user equipment information, such as location information, etc.) and data (including, but not limited to, data for analysis, stored data, displayed data, etc.) are information and data authorized by the user or sufficiently authorized by each party, and the related data is collected, stored, used, processed, transmitted, provided, disclosed, applied, etc. in compliance with relevant laws and regulations and standards, necessary security measures are taken, no prejudice to the public order colloquia is provided, and corresponding operation entries are provided for the user to select authorization or rejection.
In the scenario of using personal information to make an automated decision, the method, the device and the system provided by the embodiment of the disclosure provide corresponding operation inlets for users, so that the users can choose to agree or reject the automated decision result; if the user selects refusal, the expert decision flow is entered. The expression "automated decision" here refers to an activity of automatically analyzing, assessing the behavioral habits, hobbies or economic, health, credit status of an individual, etc. by means of a computer program, and making a decision. The expression "expert decision" here refers to an activity of making a decision by a person who is specializing in a certain field of work, has specialized experience, knowledge and skills and reaches a certain level of expertise.
The inventor finds that as various technical research and development data, product design data, various research and development reports, technical specifications and other data are often accumulated in enterprises, the documents cover important contents in the aspects of a large number of various innovation achievements, business confidentiality and the like of the enterprises, and the documents are mostly controlled by access and are scattered in various departments and systems for preventing information leakage, so that inconvenience is brought to staff's review. In order to improve the working efficiency and ensure the information security, various documents are concentrated to one place, and an enterprise usually establishes a document knowledge base so as to facilitate staff to intensively review and manage related documents. However, the encryption storage and management of the corresponding enterprise document knowledge base still lacks effective means, and the retrieval efficiency of the encrypted file is affected with the increase of the knowledge base content, especially when a large-scale data set is located, the retrieval efficiency may be seriously affected.
In view of the foregoing, embodiments of the present disclosure provide a text processing method, including: decrypting the encrypted text by using a decryption key to obtain an original text, wherein the encrypted text is obtained by encrypting the original text by using an encryption algorithm corresponding to the decryption key; slicing the original text according to the content information of the original text to obtain a plurality of sliced texts and slice labels corresponding to the sliced texts, wherein the content information is obtained by analyzing the original text, and the slice labels represent text characteristics of the sliced texts; re-encrypting the slice text according to the attribute information of the slice text to obtain an encrypted slice text, wherein the attribute information characterizes the encryption level of the slice text; and associating the slice label with the encrypted slice text corresponding to the slice label, and storing the encrypted slice text after label association to a category position corresponding to the slice label in a knowledge base.
According to the embodiment of the disclosure, the original text is subjected to slice storage, and the slice labels are utilized to realize classified storage of the slice text, so that the data in the knowledge base are more modularized through slicing and classification, and flexible management and operation are facilitated according to requirements. Meanwhile, the slicing storage mode also enables the retrieval operation to be faster and more accurate, the knowledge base can search only for specific slices instead of the whole document, and the retrieval accuracy and efficiency are improved.
Fig. 1 schematically illustrates an application scenario diagram of a text processor, apparatus according to an embodiment of the disclosure.
As shown in fig. 1, an application scenario 100 according to this embodiment may include a first terminal device 101, a second terminal device 102, a third terminal device 103, a network 104, and a server 105. The network 104 is a medium used to provide a communication link between the first terminal device 101, the second terminal device 102, the third terminal device 103, and the server 105. The network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, among others.
The user may interact with the server 105 via the network 104 using the first terminal device 101, the second terminal device 102, the third terminal device 103, to receive or send messages etc. Various communication client applications, such as a shopping class application, a web browser application, a search class application, an instant messaging tool, a mailbox client, social platform software, etc. (by way of example only) may be installed on the first terminal device 101, the second terminal device 102, and the third terminal device 103.
The first terminal device 101, the second terminal device 102, the third terminal device 103 may be various electronic devices having a display screen and supporting web browsing, including but not limited to smartphones, tablets, laptop and desktop computers, and the like.
The server 105 may be a server providing various services, such as a background management server (by way of example only) providing support for websites browsed by the user using the first terminal device 101, the second terminal device 102, and the third terminal device 103. The background management server may analyze and process the received data such as the user request, and feed back the processing result (e.g., the web page, information, or data obtained or generated according to the user request) to the terminal device.
It should be noted that the text processing method provided in the embodiments of the present disclosure may be generally executed by the server 105. Accordingly, the text processing apparatus provided by the embodiments of the present disclosure may be generally disposed in the server 105. The text processing method provided by the embodiments of the present disclosure may also be performed by a server or a server cluster that is different from the server 105 and is capable of communicating with the first terminal device 101, the second terminal device 102, the third terminal device 103, and/or the server 105. Accordingly, the text processing apparatus provided by the embodiments of the present disclosure may also be provided in a server or a server cluster that is different from the server 105 and is capable of communicating with the first terminal device 101, the second terminal device 102, and the third terminal device 103.
It should be understood that the number of terminal devices, networks and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
The text processing method of the disclosed embodiment will be described in detail below with reference to fig. 2 to 4 based on the scenario described in fig. 1.
Fig. 2 schematically illustrates a flow chart of a text processing method according to an embodiment of the present disclosure.
As shown in fig. 2, the text processing side of this embodiment includes operations S210 to S230.
In operation S210, the encrypted text is decrypted using the decryption key, resulting in the original text.
According to an embodiment of the present disclosure, the encrypted text is obtained by encrypting the original text using an encryption algorithm corresponding to the decryption key.
In operation S220, the original text is sliced according to the content information of the original text, and a plurality of slice texts and slice labels corresponding to the slice texts are obtained.
According to an embodiment of the present disclosure, the content information is obtained by parsing an original text, and the slice label characterizes text features of the slice text.
In operation S230, the cut text is re-encrypted according to attribute information of the cut text, which characterizes an encryption level of the cut text, to obtain an encrypted cut text.
In operation S240, the slice label and the encrypted slice text corresponding to the slice label are associated, and the encrypted slice text after the label association is stored in a category location corresponding to the slice label in the knowledge base.
According to embodiments of the present disclosure, a file sender may encrypt an original text before transmitting the original text to a knowledge base, and may select encryption algorithms having different degrees of complexity based on the encryption level of the original text.
According to an embodiment of the present disclosure, the original text may be encrypted by means of symmetric encryption, for example, the original text may be encrypted using an AES encryption algorithm (advanced encryption standard), to which the present disclosure is not limited. Firstly, a symmetric encryption key (namely a decryption key) is determined, and a file sender can encrypt an original text by using an encryption system through the encryption key to obtain a corresponding encrypted text. And uploading the corresponding encrypted text to a knowledge base by the file sender, and decrypting the encrypted text by the knowledge base through an encryption key to obtain the corresponding original text.
According to embodiments of the present disclosure, the original text may be encrypted by an asymmetric encryption scheme. For example, an asymmetric encryption public key and an asymmetric encryption private key (i.e., decryption key) are first determined, and the file sender can encrypt the original text by using the encryption system through the asymmetric encryption public key to obtain a corresponding encrypted text. And uploading the corresponding encrypted text to a knowledge base by the file sender, and decrypting the encrypted text by the knowledge base through an asymmetric encryption private key to obtain the corresponding original text.
According to the embodiment of the disclosure, the decrypted original text can be parsed by using a natural language processing technology, the original text is sliced according to the parsing result, such as text semantic category, length and the like, and corresponding slice labels which can be used for representing text features are extracted. Because the slice labels can characterize text features, the functions of identifying, classifying, storing, retrieving and the like of slice texts can be realized based on the slice labels.
According to an embodiment of the present disclosure, after the initial text is cut. Multiple slice texts with smaller lengths can be obtained, and a parallel processing mode can be adopted for the obtained multiple slice texts. For example, the plurality of slice texts obtained are encrypted at the same time by a plurality of processing units operating at the same time. In particular, for large, complex documents or datasets, data processing efficiency may be greatly improved.
According to the embodiment of the disclosure, after the encrypted slice text and the corresponding slice label are associated, the encrypted slice text can be classified and stored in the knowledge base at the category position corresponding to the slice label based on the classification function of the slice label, so that the retrieval and management are facilitated.
According to the embodiment of the disclosure, the original text is obtained by decrypting the encrypted text transmitted to the knowledge base, and after the original text is obtained, the original text is divided into a plurality of slices, so that the formed slice text can more efficiently utilize the storage space and reduce redundant data. The obtained slicing labels used for representing the text characteristics of the slicing texts can realize the classified storage of the slicing texts, and the slicing and classification enable the data in the knowledge base to be more modularized, so that flexible management and operation can be conveniently carried out according to requirements. Meanwhile, the slicing storage mode also enables the retrieval operation to be faster and more accurate, the knowledge base can only search for specific slices, but not the whole document, and the retrieval accuracy and efficiency are improved.
According to the embodiment of the disclosure, decrypting the encrypted text by using a decryption key to obtain an original text, including checking a digital signature of the encrypted text according to a public key of the original text to obtain a checking result of the digital signature, wherein the digital signature is generated by encrypting the encrypted text according to a private key of the original text corresponding to the public key; determining the integrity of the encrypted text according to the checking result of the digital signature; and under the condition that the encrypted text is determined to be complete, decrypting the encrypted text by using a decryption key to obtain the original text.
According to embodiments of the present disclosure, the public and private keys for the digital signature may be determined prior to transmitting the encrypted text to the knowledge base. The encrypted text may be calculated using a hash algorithm to obtain a hash value. And signing the hash value by using the private key and an encryption algorithm corresponding to the private key to generate a digital signature. The generated digital signature is unique and closely related to the encrypted text. The generated digital signature is appended to the encrypted text to form an encrypted text with the signature. The encrypted text with the signature is transmitted to a knowledge base.
According to the embodiment of the disclosure, after receiving the encrypted text with the digital signature, the knowledge base can decrypt the digital signature by using the public key of the signer to obtain the original hash value. Further, the receiver may calculate the encrypted text again using the same hash algorithm, resulting in a new hash value. If the two hash values are the same, the signature is valid and the integrity and origin of the message can be confirmed. If the hash values are different, the signature is invalid, meaning that the message may be tampered with during transmission or the signature is counterfeit.
According to the embodiment of the disclosure, the receiver can verify the identity of the sender and the integrity of the encrypted text through the digital signature, so that the message is ensured not to be tampered in the transmission process.
According to the embodiment of the disclosure, slicing an original text according to content information of the original text to obtain a plurality of slice texts and slice labels corresponding to the slice texts, wherein the slicing parameters for slicing the original text are determined according to the content information of the original text; and slicing the original text according to the slicing parameters to obtain a plurality of sliced texts.
According to embodiments of the present disclosure, the content information of the initial text may include a topic, a structure, a keyword frequency, a sentence length, a logical relationship between paragraphs, and the like of the text. The slicing parameters characterize specific indicators or rules for guiding slicing operations. The slice parameters may include parameters such as position, slice length, slice number, number of slices, etc. Information such as a position at which the initial text is sliced, a size of each slice, and the like can be determined based on the slicing parameters.
According to the embodiment of the disclosure, the relationship among the key information, the topic structure and the entity in the text can be identified through natural language processing technology, so that reasonable slicing parameters can be determined. After the slicing parameters are determined, the original text can be sliced according to the slicing parameters, and the original text is sliced into a plurality of independent sliced texts.
According to the embodiment of the disclosure, by splitting the original text into a plurality of smaller sliced texts, the complexity of text storage and management is reduced, and the plurality of sliced texts can be processed in parallel, so that the efficiency of text processing is remarkably improved. In particular, for processing large-scale text data, the processing time can be significantly reduced by slicing the original text.
According to an embodiment of the present disclosure, determining a slicing parameter of an original text according to content information of the original text includes, in a case where it is determined that the original text includes a paragraph title, determining the slicing parameter based on the paragraph title; in the case where it is determined that the original text includes non-text content, determining a slicing parameter based on the text type; in the case where it is determined that the original text satisfies the predetermined text length, a slicing parameter is determined based on the text length.
According to an embodiment of the present disclosure, slicing an original text according to slicing parameters to obtain a plurality of sliced text, including: slicing the original text according to slicing parameters to obtain a plurality of initial sliced texts; and combining a plurality of initial slice texts with the same text semantics to obtain a plurality of slice texts.
According to embodiments of the present disclosure, if the original text contains paragraph titles, these titles typically mark the change in the important part or topic of the text content. Thus, these titles can be utilized as demarcation points for the slices. Slice parameters are determined based on the cut points of the section headers.
For example, a technical document may contain headings such as "introduction", "method", "result" and "conclusion", and the content under each heading may be as a separate slice text.
According to the embodiment of the disclosure, the non-text content includes a chart, a picture or an illustration, etc., slice parameters can be determined according to the text types, and different text types can be divided into different slices to form corresponding text slices, picture slices, table slices, etc. Further, text surrounding or above and below a picture or form may be an explanation or description of the picture or form, and may be used as a demarcation point based on the title of the picture or chart and/or the associated description. In this case, the portion containing the non-text content and its associated text portion may be treated as one sliced text to ensure the integrity and consistency of the information.
According to embodiments of the present disclosure, if the original text reaches or exceeds a predetermined length, the slices may be divided according to the length. The method is helpful for ensuring that the size of each slice is moderate, and is convenient for subsequent processing and analysis.
For example, a maximum number of words per slice may be set, and then the text may be divided equally by this number of words or divided according to the natural demarcation point of the content.
According to the embodiment of the disclosure, after the slicing parameters are determined, the original text can be sliced according to the slicing parameters, so as to obtain a plurality of initial sliced texts. Then, text semantics can be identified through natural language processing technology, and a plurality of initial slice texts with the same, similar or related semantics can be combined to form a final slice text.
According to the embodiment of the disclosure, the slicing parameters are determined by comprehensively considering the paragraph titles, the non-text contents and the text lengths, so that the slicing method is more flexible and diversified, and the method can adapt to original texts with different types and formats. By combining the semantically identical initial sliced text together, the semantic integrity and information consistency of each sliced text is ensured.
Fig. 3 schematically illustrates a schematic diagram of obtaining a plurality of sliced text in accordance with an embodiment of the present disclosure.
As shown in fig. 3, the original text 301 may be divided into text 302 containing a paragraph title, text 303 containing non-text content, and text 304 exceeding a predetermined text length according to its content information. The inclusion of paragraph heading text 302 determines a slicing parameter 305 from the paragraph heading, and the inclusion of non-text content text 303 determines a slicing parameter 306 from the non-text type. Text 304 over a predetermined text length determines a slicing parameter 307 based on the preset text length. The original text 301 is sliced according to slice parameters 305, slice parameters 306, and slice parameters 307, resulting in a plurality of initial sliced text 308. Combining a plurality of initial sliced text 308 that have the same, similar, or associated text meaning may result in a plurality of sliced text 309.
According to the embodiment of the disclosure, slicing an original text according to content information of the original text to obtain a plurality of sliced texts and slice labels corresponding to the sliced texts, and obtaining a plurality of keywords of the sliced texts, wherein the keywords comprise category keywords and content keywords used for representing text characteristics; and obtaining a slice label corresponding to the slice text according to the plurality of keywords.
According to an embodiment of the present disclosure, category keywords characterize the category or topic to which the sliced text belongs. For example, if the cut text is a technical article about an information security topic, then words such as "information security" may be used as category keywords. Text may be classified and located according to category keywords.
According to embodiments of the present disclosure, content keywords characterize the content and detail features of the sliced text. Content keywords may include name of person, place name, event, specific technical nouns, data or views, etc.
After the plurality of keywords of the cut text are obtained, a cut label may be further generated based on the keywords. Slice labels are short summaries of slice text content that accurately reflect the primary information and features of slice text.
The method for generating the slice label can be simple keyword combination or label generation algorithm based on rules or models. For example, category keywords and content keywords may be combined in a certain order or format to form a slice label. The user can index by inputting the keywords, and search the corresponding slice labels, so that the corresponding slice text is found.
According to the embodiment of the disclosure, the contents and the characteristics of the slice text can be accurately reflected by extracting the keywords of the slice text and generating the slice label, and the method can be used as an important basis for text classification and retrieval. The text is conveniently classified and retrieved, and the accuracy and efficiency of text processing are improved.
According to an embodiment of the present disclosure, the attribute information includes encryption level information, and re-encrypting the slice text according to the attribute information of the slice text to obtain an encrypted slice text, including: determining a target encryption algorithm from a plurality of encryption algorithms according to encryption level information of the slice text; and encrypting the slice text by using the target encryption algorithm to obtain the encrypted slice text.
According to an embodiment of the present disclosure, encryption level information of the slice text may be determined by slice text attribute information. The encryption level information may be an identification indicating the security requirement or privacy level of the cut text. For example, it may be a simple label (e.g., "low", "medium", "high") or a more detailed numerical value or description.
According to embodiments of the present disclosure, after determining the encryption level information, the encryption system of the knowledge base may select an appropriate target encryption algorithm from a plurality of available encryption algorithms according to predefined rules or policies. The encryption algorithm may include a symmetric encryption algorithm, an asymmetric encryption algorithm, a hash algorithm, or the like.
According to embodiments of the present disclosure, the sliced text is converted into an unreadable ciphertext form by the target encryption algorithm after the target encryption algorithm is determined. For symmetric encryption algorithms, one key is required for encryption and decryption; for asymmetric encryption algorithms, a pair of public and private keys is required, the public key being used for encryption and the private key being used for decryption. The encrypted slice text will have a higher security against unauthorized access or tampering.
According to the embodiment of the disclosure, by selecting an appropriate encryption algorithm according to the encryption level information of the sliced text, the data with different security levels can be ensured to be protected at corresponding levels, and flexible selection can be performed according to actual requirements.
According to an embodiment of the disclosure, before storing the encrypted slice text after tag association in a category position corresponding to the slice tag in the knowledge base, the method further includes generating an access right tag corresponding to the slice text according to access right information of the slice text; and associating the access rights label with the corresponding encrypted slice text and slice label.
According to embodiments of the present disclosure, the access rights information characterizes which users or groups of users have access to the encrypted cut text, as well as the level of access they possess (e.g., read-only, edit, delete, etc.). The knowledge base may generate an access rights label corresponding to the access rights information based on the access rights information. The access rights label may be a compact code or description for quickly identifying the access rights state of the sliced text.
According to an embodiment of the present disclosure, the generated access right tag may be associated with the corresponding encrypted slice text and slice tag by presetting a unique identifier of the slice text, such as a slice ID, to which the present disclosure is not limited.
According to the embodiment of the disclosure, the access permission label is generated for the slice text, and the slice text is encrypted, so that fine access control on different users can be realized. The access authority and the encryption state of the slice text are managed in a labeling mode, so that the management and the retrieval process of data can be simplified. Therefore, the slice text with specific authority or encryption requirements is rapidly positioned, and the data processing efficiency is improved.
According to the embodiment of the disclosure, the access right of a user is obtained in response to an access request of the user to a knowledge base; responding to the keywords input by the user, and inquiring target slice labels matched with the keywords input by the user in a knowledge base; determining a target access right label and a target encryption slice text corresponding to the target slice label according to the target slice label; and under the condition that the access rights of the user are matched with the target access rights label, displaying the text content of the decrypted target encrypted slice text on the interactive interface.
According to embodiments of the present disclosure, when a user attempts to access a knowledge base, the knowledge base may invoke a related rights interface to obtain identity information of the user, and may determine its access rights according to the identity, role, or other related information of the user.
According to embodiments of the present disclosure, the knowledge base may be configured to support keyword searching and advanced searching functions. The user may search the knowledge base for slicing labels related to keywords by entering the keywords. Once a target slice label is associated in the knowledge base, the access rights label and encrypted slice text associated with the label are further determined based on the label information.
According to embodiments of the present disclosure, prior to decryption, the knowledge base may check whether the user's access rights match the target access rights label. And if the text content matches, decrypting the encrypted slice text, and displaying the decrypted text content on the interactive interface. The user may preview or initiate a download request. If there is no match, the system may refuse access or prompt for unauthorized access.
According to embodiments of the present disclosure, by combining slice labels with keyword queries, a user can more quickly locate desired information without traversing the entire knowledge base. This greatly improves the query efficiency and saves the user's time cost. By introducing access rights labels and encrypting the cut text, it can be ensured that only users with corresponding rights can access and view sensitive or restricted content. The method is beneficial to preventing unauthorized access and data leakage and improving the security of the whole knowledge base.
Fig. 4 schematically illustrates a data flow diagram of a text processing method according to another embodiment of the present disclosure.
As shown in fig. 4, the original text 401 is encrypted by an encryption algorithm to obtain an encrypted text 402. The encrypted text 402 is transmitted to the knowledge base 406, where the original text 401 is decrypted using the decryption key to obtain the original text 401. According to the content information of the original text, the original text 401 is parsed and sliced to obtain a plurality of sliced texts 403, and the vocabulary tags and access right tags of the sliced texts 403 are obtained at the same time. And selecting a corresponding encryption algorithm to re-encrypt the slice text 403 according to the encryption level of the slice text 403, so as to obtain an encrypted slice text 404. The encrypted cut text 404 is associated with the vocabulary tag and the access right tag to obtain an encrypted cut text 405 after the associated tag. And storing the encrypted slice text 405 after the associated label to a position corresponding to the knowledge base according to the slice label.
An access request of the user 407 is received, and the access right 408 of the user is acquired. The user 407 may input keywords 409 into the knowledge base 406 by using the retrieval function of the knowledge base 406, perform a query in the knowledge base 406, and return the target vocabulary tag 410 according to the result of the query. The target access rights label 411 is determined from the target vocabulary label. The target access right tag 411 and the access right 408 of the user are matched to obtain a matching result 412. If the matching result 412 is yes, the target encrypted slice text 411 is decrypted when the matching is successful, the decrypted target encrypted slice text 413 is obtained, and then the decrypted text content 415 is displayed to the user 407 at the interactive interface. If the match 412 is negative, the match fails and a prompt is returned to the customer, such as no access rights.
Based on the text processing method, the disclosure also provides a text processing device. The device will be described in detail below in connection with fig. 5.
Fig. 5 schematically shows a block diagram of a text processing apparatus according to an embodiment of the present disclosure.
As shown in fig. 5, the text processing apparatus 500 of this embodiment includes a decryption module 510, a parsing and slicing module 520, an encryption module 530, and a storage module 540.
The decryption module 510 is configured to decrypt the encrypted text with a decryption key to obtain an original text, where the encrypted text is obtained by encrypting the original text with an encryption algorithm corresponding to the decryption key. In an embodiment, the decryption module 510 may be configured to perform the operation S210 described above, which is not described herein.
The parsing and slicing module 520 is configured to slice an original text according to content information of the original text, to obtain a plurality of sliced text and slice labels corresponding to the sliced text, where the content information is obtained by parsing the original text, and the slice labels represent text features of the sliced text. In an embodiment, the parsing and slicing module 520 may be used to perform the operation S220 described above, which is not described herein.
The encryption module 530 is configured to re-encrypt the slice text according to attribute information of the slice text, to obtain an encrypted slice text, where the attribute information characterizes an encryption level of the slice text. In an embodiment, the encryption module 530 may be used to perform the operation S230 described above, which is not described herein.
And the storage module 540 is used for associating the slice label with the encrypted slice text corresponding to the slice label, and storing the encrypted slice text after label association into a category position corresponding to the slice label in the knowledge base. In an embodiment, the storage module 540 may be used to perform the operation S240 described above, which is not described herein.
According to an embodiment of the present disclosure, the decryption module 510 includes an initial decryption unit, a determination unit, and a text decryption unit.
And the initial decryption unit is used for checking the digital signature of the encrypted text according to the public key of the original text to obtain a checking result of the digital signature, wherein the digital signature is generated by encrypting the encrypted text according to the private key of the original text corresponding to the public key.
And the determining unit is used for determining the integrity of the encrypted text according to the checking result of the digital signature.
And the text decryption unit is used for decrypting the encrypted text by using the decryption key under the condition that the encrypted text is determined to be complete, so as to obtain the original text.
According to an embodiment of the present disclosure, the parsing slicing module 520 includes a parameter determining unit and a slicing unit.
And the parameter determining unit is used for determining slicing parameters for slicing the original text according to the content information of the original text.
And the slicing unit is used for slicing the original text according to the slicing parameters to obtain a plurality of sliced texts.
According to an embodiment of the present disclosure, the parameter determination unit includes a first parameter determination subunit, a second parameter determination subunit, and a third parameter determination subunit.
A first parameter determination subunit for determining a slice parameter based on the paragraph title in case it is determined that the original text comprises the paragraph title.
And a second parameter determination subunit for determining a slice parameter based on the text type in case it is determined that the original text includes non-text content.
And a third parameter determination subunit configured to determine a slicing parameter based on the text length in a case where it is determined that the original text satisfies the predetermined text length.
According to an embodiment of the present disclosure, the slicing unit includes an initial slicing subunit and a combined subunit.
And the initial slicing subunit slices the original text according to the slicing parameters to obtain a plurality of initial sliced texts.
And the combining subunit is used for combining a plurality of initial slice texts with the same text semantics to obtain a plurality of slice texts.
According to an embodiment of the present disclosure, the parsing slice module 520 further includes an acquisition unit and a slice label generation unit.
And the acquisition unit is used for acquiring a plurality of keywords of the sliced text, wherein the keywords comprise category keywords and content keywords used for representing text characteristics.
And the slice label generating unit is used for obtaining slice labels corresponding to the slice text according to the keywords.
According to an embodiment of the present disclosure, the encryption module 530 includes: an algorithm determining unit and a slice encrypting unit.
And an algorithm determining unit for determining a target encryption algorithm from the plurality of encryption algorithms based on the encryption level information of the sliced text.
And the slice encryption unit is used for encrypting the slice text by utilizing the target encryption algorithm to obtain the encrypted slice text.
According to an embodiment of the present disclosure, the encryption module further includes a rights label generation unit and a label association unit.
And the permission label generating unit is used for generating an access permission label corresponding to the sliced text according to the access permission information of the sliced text.
And the label association unit is used for associating the access permission label with the corresponding encrypted slice text and slice label.
According to an embodiment of the present disclosure, the text processing apparatus 500 further includes a rights management module, a search module, an association matching module, and a decryption invoking module.
And the right management module is used for responding to the access request of the user to the knowledge base and acquiring the access right of the user.
And the searching module is used for responding to the keywords input by the user and inquiring target slice labels matched with the keywords input by the user in the knowledge base.
The association matching module is used for determining a target access right label and a target encryption slice text corresponding to the target slice label according to the target slice label
And the decryption calling module is used for displaying the text content of the decrypted target encrypted slice text on the interactive interface under the condition that the access rights of the user are matched with the target access rights label.
Any of the plurality of modules including the decryption module 510, the parsing and slicing module 520, the encryption module 530, and the storage module 540 may be combined in one module or any of the plurality of modules may be split into a plurality of modules according to embodiments of the present disclosure. Or at least some of the functionality of one or more of the modules may be combined with, and implemented in, at least some of the functionality of other modules.
According to embodiments of the present disclosure, at least one of the decryption module 510, the parsing and slicing module 520, the encryption module 530, and the storage module 540 may be implemented at least in part as hardware circuitry, such as a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system on a chip, a system on a substrate, a system on a package, an Application Specific Integrated Circuit (ASIC), or may be implemented in hardware or firmware in any other reasonable way of integrating or packaging the circuitry, or in any one of or a suitable combination of three of software, hardware, and firmware. Or at least one of the decryption module 510, the parsing and slicing module 520, the encryption module 530, and the storage module 540 may be at least partially implemented as a computer program module, which may perform the corresponding functions when being executed.
Fig. 6 schematically illustrates a block diagram of an electronic device adapted to implement a text processing method according to an embodiment of the disclosure.
As shown in fig. 6, an electronic device 600 according to an embodiment of the present disclosure includes a processor 601 that can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM) 602 or a program loaded from a storage section 608 into a Random Access Memory (RAM) 603. The processor 601 may include, for example, a general purpose microprocessor (e.g., a CPU), an instruction set processor and/or an associated chipset and/or a special purpose microprocessor (e.g., an Application Specific Integrated Circuit (ASIC)), or the like. Processor 601 may also include on-board memory for caching purposes. The processor 601 may comprise a single processing unit or a plurality of processing units for performing different actions of the method flows according to embodiments of the disclosure.
In the RAM 603, various programs and data necessary for the operation of the electronic apparatus 600 are stored. The processor 601, the ROM 602, and the RAM 603 are connected to each other through a bus 604. The processor 601 performs various operations of the method flow according to the embodiments of the present disclosure by executing programs in the ROM 602 and/or the RAM 603. Note that the program may be stored in one or more memories other than the ROM 602 and the RAM 603. The processor 601 may also perform various operations of the method flow according to embodiments of the present disclosure by executing programs stored in one or more memories.
According to an embodiment of the present disclosure, the electronic device 600 may also include an input/output (I/O) interface 605, the input/output (I/O) interface 605 also being connected to the bus 604. The electronic device 600 may also include one or more of the following components connected to the I/O interface 605: an input portion 606 including a keyboard, mouse, etc.; an output portion 607 including a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, a speaker, and the like; a storage section 608 including a hard disk and the like; and a communication section 609 including a network interface card such as a LAN card, a modem, or the like. The communication section 609 performs communication processing via a network such as the internet. The drive 610 is also connected to the I/O interface 605 as needed. Removable media 611 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is installed as needed on drive 610 so that a computer program read therefrom is installed as needed into storage section 608.
The present disclosure also provides a computer-readable storage medium that may be embodied in the apparatus/device/system described in the above embodiments; or may exist alone without being assembled into the apparatus/device/system. The computer-readable storage medium carries one or more programs which, when executed, implement methods in accordance with embodiments of the present disclosure.
According to embodiments of the present disclosure, the computer-readable storage medium may be a non-volatile computer-readable storage medium, which may include, for example, but is not limited to: a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this disclosure, a computer-readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. For example, according to embodiments of the present disclosure, the computer-readable storage medium may include ROM 602 and/or RAM 603 and/or one or more memories other than ROM 602 and RAM 603 described above.
Embodiments of the present disclosure also include a computer program product comprising a computer program containing program code for performing the methods shown in the flowcharts. The program code, when executed in a computer system, causes the computer system to perform the methods provided by embodiments of the present disclosure.
The above-described functions defined in the system/apparatus of the embodiments of the present disclosure are performed when the computer program is executed by the processor 601. The systems, apparatus, modules, units, etc. described above may be implemented by computer program modules according to embodiments of the disclosure.
In one embodiment, the computer program may be based on a tangible storage medium such as an optical storage device, a magnetic storage device, or the like. In another embodiment, the computer program may also be transmitted, distributed in the form of signals over a network medium, and downloaded and installed via the communication section 609, and/or installed from the removable medium 611. The computer program may include program code that may be transmitted using any appropriate network medium, including but not limited to: wireless, wired, etc., or any suitable combination of the foregoing.
In such an embodiment, the computer program may be downloaded and installed from a network through the communication portion 609, and/or installed from the removable medium 611. The above-described functions defined in the system of the embodiments of the present disclosure are performed when the computer program is executed by the processor 601. The systems, devices, apparatus, modules, units, etc. described above may be implemented by computer program modules according to embodiments of the disclosure.
According to embodiments of the present disclosure, program code for performing computer programs provided by embodiments of the present disclosure may be written in any combination of one or more programming languages, and in particular, such computer programs may be implemented in high-level procedural and/or object-oriented programming languages, and/or assembly/machine languages. Programming languages include, but are not limited to, such as Java, c++, python, "C" or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, partly on a remote computing device, or entirely on the remote computing device or server. In the case of remote computing devices, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., connected via the Internet using an Internet service provider).
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
Those skilled in the art will appreciate that the features recited in the various embodiments of the disclosure and/or in the claims may be provided in a variety of combinations and/or combinations, even if such combinations or combinations are not explicitly recited in the disclosure. In particular, the features recited in the various embodiments of the present disclosure and/or the claims may be variously combined and/or combined without departing from the spirit and teachings of the present disclosure. All such combinations and/or combinations fall within the scope of the present disclosure.
The embodiments of the present disclosure are described above. These examples are for illustrative purposes only and are not intended to limit the scope of the present disclosure. Although the embodiments are described above separately, this does not mean that the measures in the embodiments cannot be used advantageously in combination. The scope of the disclosure is defined by the appended claims and equivalents thereof. Various alternatives and modifications can be made by those skilled in the art without departing from the scope of the disclosure, and such alternatives and modifications are intended to fall within the scope of the disclosure.

Claims (12)

1. A method of text processing, the method comprising:
Decrypting the encrypted text by using a decryption key to obtain an original text, wherein the encrypted text is obtained by encrypting the original text by using an encryption algorithm corresponding to the decryption key;
slicing the original text according to content information of the original text to obtain a plurality of sliced texts and sliced labels corresponding to the sliced texts, wherein the content information is obtained by analyzing the original text, and the sliced labels represent text characteristics of the sliced texts;
Re-encrypting the slice text according to the attribute information of the slice text to obtain an encrypted slice text, wherein the attribute information characterizes the encryption level of the slice text; and
And associating the slice label with the encrypted slice text corresponding to the slice label, and storing the encrypted slice text after label association into a category position corresponding to the slice label in a knowledge base.
2. The method of claim 1, wherein slicing the original text based on content information of the original text to obtain a plurality of sliced text and slice labels corresponding to the sliced text comprises,
Determining slicing parameters for slicing the original text according to the content information of the original text; and
And slicing the original text according to the slicing parameters to obtain a plurality of sliced texts.
3. The method of claim 2, wherein determining slicing parameters of the original text based on content information of the original text comprises,
In the case that the original text is determined to comprise a paragraph title, determining the slicing parameters based on the paragraph title;
Determining the slicing parameters based on text type, in case it is determined that the original text comprises non-text content;
in the case that the original text is determined to satisfy a predetermined text length, the slicing parameters are determined based on the text length.
The slicing the original text according to the slicing parameters to obtain a plurality of sliced texts, including:
slicing the original text according to the slicing parameters to obtain a plurality of initial sliced texts;
and combining a plurality of initial slice texts with the same text semantics to obtain a plurality of slice texts.
4. The method of claim 1, wherein slicing the original text according to the content information of the original text results in a plurality of sliced text and slice labels corresponding to the sliced text, further comprising,
Acquiring a plurality of keywords of the sliced text, wherein the keywords comprise category keywords and content keywords used for representing the text characteristics; and
And obtaining slice labels corresponding to the slice text according to the keywords.
5. The method according to claim 1, wherein the attribute information includes encryption level information, and the re-encrypting the sliced text according to the attribute information of the sliced text to obtain encrypted sliced text includes:
Determining a target encryption algorithm from a plurality of encryption algorithms according to the encryption level information of the sliced text; and
And encrypting the slice text by using the target encryption algorithm to obtain the encrypted slice text.
6. The method of claim 1, wherein prior to storing the encrypted cut text after tag association in a knowledge base at a category location corresponding to the cut tag, the method further comprises,
Generating an access right label corresponding to the slice text according to the access right information of the slice text; and
And associating the access right label with the corresponding encrypted slice text and slice label.
7. The method of claim 6, further comprising,
Responding to an access request of a user to the knowledge base, and acquiring the access right of the user;
responding to keywords input by a user, and inquiring target slice labels matched with the keywords input by the user in the knowledge base;
Determining a target access right label and a target encryption slice text corresponding to the target slice label according to the target slice label; and
And under the condition that the access authority of the user is matched with the target access authority label, displaying the decrypted text content of the target encrypted slice text on an interactive interface.
8. The method of claim 1, wherein decrypting the encrypted text using the decryption key results in the original text, comprising,
Checking the digital signature of the encrypted text according to the public key of the original text to obtain a checking result of the digital signature, wherein the digital signature is generated by encrypting the encrypted text according to a private key of the original text corresponding to the public key;
Determining the integrity of the encrypted text according to the checking result of the digital signature;
And under the condition that the encrypted text is determined to be complete, decrypting the encrypted text by using the decryption key to obtain the original text.
9. A text processing apparatus, the apparatus comprising:
The decryption module is used for decrypting the encrypted text by using a decryption secret key to obtain an original text, wherein the encrypted text is obtained by encrypting the original text by using an encryption algorithm corresponding to the decryption secret key;
The analysis slicing module is used for slicing the original text according to the content information of the original text to obtain a plurality of sliced texts and slice labels corresponding to the sliced texts, wherein the content information is obtained by analyzing the original text, and the slice labels represent text characteristics of the sliced texts;
The encryption module is used for re-encrypting the slice text according to the attribute information of the slice text to obtain an encrypted slice text, wherein the attribute information characterizes the encryption level of the slice text; and
And the storage module is used for associating the slice label with the encrypted slice text corresponding to the slice label and storing the encrypted slice text after label association into a category position corresponding to the slice label in a knowledge base.
10. An electronic device, comprising:
one or more processors;
a memory for storing one or more computer programs,
Characterized in that the one or more processors execute the one or more computer programs to implement the steps of the method according to any one of claims 1-8.
11. A computer-readable storage medium, on which a computer program or instructions is stored, characterized in that the computer program or instructions, when executed by a processor, implement the steps of the method according to any one of claims 1-8.
12. A computer program product comprising a computer program or instructions which, when executed by a processor, implement the steps of the method according to any one of claims 1 to 8.
CN202410535959.9A 2024-04-30 Text processing method, apparatus, device, medium, and program product Pending CN118277503A (en)

Publications (1)

Publication Number Publication Date
CN118277503A true CN118277503A (en) 2024-07-02

Family

ID=

Similar Documents

Publication Publication Date Title
US11361104B1 (en) Method and system for securing data stored in a cloud-based software system
US9058505B2 (en) Providing access control for public and private document fields
US10013574B2 (en) Method and apparatus for secure storage and retrieval of encrypted files in public cloud-computing platforms
US11188657B2 (en) Method and system for managing electronic documents based on sensitivity of information
US8751506B2 (en) Personal computing device-based mechanism to detect preselected data
US7996373B1 (en) Method and apparatus for detecting policy violations in a data repository having an arbitrary data schema
US6981141B1 (en) Transparent encryption and decryption with algorithm independent cryptographic engine that allows for containerization of encrypted files
US20160299924A1 (en) Search system
US8312553B2 (en) Mechanism to search information content for preselected data
US6185684B1 (en) Secured document access control using recipient lists
US11256825B2 (en) Systems and methods for securing data in electronic communications
RU2724293C2 (en) Personal search index with high confidentiality
JP4903386B2 (en) Searchable information content for pre-selected data
CN110110550B (en) Searchable encryption method and system supporting cloud storage
US20220123935A1 (en) Masking sensitive information in a document
GB2603586A (en) Document access control based on document component layouts
CN115879157A (en) Data security search method and device, equipment, medium and product thereof
CN118277503A (en) Text processing method, apparatus, device, medium, and program product
CN113037743B (en) Encryption method and system for cloud server file
Sumathi et al. Generic cost optimized and secured sensitive attribute storage model for template based text document on cloud
CN114580008B (en) Document access control based on document component layout
US10521397B2 (en) System and methods of proactively searching and continuously monitoring content from a plurality of data sources
CN115934941A (en) Cloud computing data processing system for big data
CN118227659A (en) Data query method, device, apparatus, medium and program product
CN117952202A (en) Business knowledge management system and platform

Legal Events

Date Code Title Description
PB01 Publication