WO2017071364A1 - 文件的处理方法、处理系统及终端设备 - Google Patents

文件的处理方法、处理系统及终端设备 Download PDF

Info

Publication number
WO2017071364A1
WO2017071364A1 PCT/CN2016/093755 CN2016093755W WO2017071364A1 WO 2017071364 A1 WO2017071364 A1 WO 2017071364A1 CN 2016093755 W CN2016093755 W CN 2016093755W WO 2017071364 A1 WO2017071364 A1 WO 2017071364A1
Authority
WO
WIPO (PCT)
Prior art keywords
area
file
encrypted
module
password
Prior art date
Application number
PCT/CN2016/093755
Other languages
English (en)
French (fr)
Inventor
张海平
周意保
Original Assignee
广东欧珀移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 广东欧珀移动通信有限公司 filed Critical 广东欧珀移动通信有限公司
Publication of WO2017071364A1 publication Critical patent/WO2017071364A1/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Definitions

  • the invention belongs to the field of computer security, and in particular relates to a file processing method, a processing system and a terminal device.
  • the mobile terminal usually does not support the encryption processing of the file, but only supports encrypting the file through the computer, and inputting numbers, English, or Chinese characters in the mobile terminal device (such as a mobile phone).
  • the composed password is decrypted.
  • An object of the present invention is to provide a method for processing a file, a processing system, and a terminal device, which can solve the technical problem that the prior art has no targeting for the encryption target, does not support cooperation, and has poor security performance and is complicated to use.
  • an embodiment of the present invention provides a file processing method, including:
  • biometric information includes: face information, iris information, fingerprint information, palm print information, voice recognition information, and/ Or handwriting information;
  • the unplanned area is displayed, and the encrypted area is hidden to generate a first file.
  • an embodiment of the present invention further provides a file processing method, including:
  • a planning module configured to plan a planned area and an unplanned area in the original file, where the number of the planned area is at least one;
  • An encryption coding module configured to: acquire biometric information of a current user, and generate an encryption code, where the biometric information includes: face information, iris information, fingerprint information, palm print information, Voice recognition information, and/or handwriting information;
  • An encryption module configured to encrypt a planned area processed by the encryption encoding to form an encrypted area
  • the first file module is configured to display the unplanned area and hide the encrypted area to generate a first file.
  • an embodiment of the present invention provides a terminal device, including a memory and a processor, where the memory stores instructions executable by a processor, and the processor is configured to execute an instruction in the memory.
  • the instructions are used to perform the following operations:
  • biometric information includes: face information, iris information, fingerprint information, palm print information, voice recognition information, and/ Or handwriting information;
  • the unplanned area is displayed, and the encrypted area is hidden to generate a first file.
  • the file processing method, the processing system and the terminal device plan the planned area and the unplanned area in the original file, and separately encrypt each of the planned areas to form an encrypted area, and then unplanned
  • the area and the encrypted area generate the first file, which has the advantages of strong targeting, strong cooperation, strong security, and simple use.
  • FIG. 1 is a schematic flowchart of a method for processing a file according to Embodiment 1 of the present invention
  • FIG. 2 is a schematic flowchart of a method for processing a file according to Embodiment 2 of the present invention
  • FIG. 3 is a schematic block diagram of a file processing system according to Embodiment 3 of the present invention.
  • FIG. 4 is a schematic block diagram of a file processing system according to Embodiment 4 of the present invention.
  • 5A to 5C are schematic diagrams of an original file, a first file, and a second file, respectively, in an embodiment of the present invention
  • FIG. 6 is a schematic diagram of a hardware environment of a terminal device according to Embodiment 5 of the present invention.
  • the processing method and processing system of the file of the present invention provided by the present invention can be applied to terminal devices such as smart phones and notebook computers, and are not enumerated here.
  • FIG. 1 is a schematic flowchart diagram of a method for processing a file according to an embodiment of the present invention.
  • the processing method of the file includes:
  • step S101 a planned area and an unplanned area are planned in the original file.
  • the unplanned area 51 and the planned area 52, 53 are included.
  • the unplanned area is usually one for displaying designs such as a cover, a header, and the like.
  • the unplanned area 51 may also include: a background introduction of the project, an introduction to the article, etc., to give the collaborative staff a revelation.
  • the unplanned areas may also be divided into a plurality of planned areas 52, 53 to prompt the content of each collaborator to be encrypted.
  • the content of the unplanned area 51 includes: a summary of each chapter; the content of the planning area 52, 53 includes: specific content of each chapter.
  • the steps of the planning include:
  • step S102 when the planning area is processed, biometric information of the current user is acquired, and an encryption code is generated.
  • the biometric information includes, but is not limited to, face information, iris information, fingerprint information, palm print information, voice recognition information, and/or handwriting information.
  • the steps of generating an encryption code include:
  • the preprocessing of the face image includes: calibrating the position and size of the face; performing ray compensation, gradation transformation, histogram equalization, normalization, geometric correction, filtering, and sharpening on the face image; or
  • Preprocessing of the iris image includes performing iris by determining the position of the inner circle (the boundary between the iris and the pupil), the outer circle (the boundary between the iris and the sclera), and the quadratic curve (the boundary between the iris and the upper and lower eyelids) in the image. Positioning; normalize the iris size in the iris image to adjust to a preset fixed size; perform normalized iris image, brightness, contrast, and smoothness to improve iris feature recognition in the image degree.
  • Handwriting image preprocessing including: handwriting image scanning, removing the dividing line in the manuscript paper, converting into a black and white binary image (achievable by PhotoShop), median filtering, removing noise in the image (achievable by MatLab), and Tilt correction, etc.;
  • Text segmentation and texture creation including: line segmentation and word segmentation (segmentation is performed according to the statistical information of the pixels, and the radical integration strategy for the left and right structures and the radicals in the Chinese characters is designed. Ensure the integrity of Chinese characters), the production of texture images (normalize the length and width of the Chinese characters into the texture image), and extract the texture features from the texture image (Gabor transformation can be used);
  • step S103 the planned area processed by the encryption encoding is encrypted to form an encrypted area.
  • step S104 the unplanned area is displayed, and the encrypted area is hidden to generate a first file.
  • FIG. 5B a schematic diagram of the first file is shown. Only the unplanned area 51 is displayed in the first file. That is, when an unauthorized person opens the first file, the content that is not encrypted is presented, and the application scenario includes details such as a contract or a plan book that need to be kept secret, but the plan itself needs to be disclosed.
  • the method for processing a file provided by the present invention, by planning a planned area and an unplanned area in an original file, and separately encrypting each of the planned areas to form an encrypted area, and then generating a first file with an unplanned area and an encrypted area, having an encrypted target
  • FIG. 2 it is a schematic flowchart of a method for processing a file according to an embodiment of the present invention.
  • the same steps in Fig. 2 as in Fig. 1 still start with S1, and the steps different from Fig. 1 start with S2 to show the difference.
  • the processing method of the file includes:
  • step S101 a planned area and an unplanned area are planned in the original file.
  • step S102 when the planning area is processed, biometric information of the current user is acquired, and an encryption code is generated.
  • the biometric information includes, but is not limited to, face information, iris information, fingerprint information, palm print information, voice recognition information, and/or handwriting information.
  • step S103 the planned area processed by the encryption encoding is encrypted to form an encrypted area.
  • a permission list is set by the current user, and the permission list is used to store an encryption code, and a corresponding authorization password and authorization authority, the authorization authority including viewing and editing.
  • the specified authorization password and operation authority include:
  • the authorization password corresponding to the encryption code of the current user For example, the user corresponding to the planning area 52 in FIG. 5A can only authorize the authorization password of the planning area 52. However, when planning in step S101, an authorization password having the authority of all planning areas can be set.
  • step S104 the unplanned area is displayed, and the encrypted area is hidden to generate a first file.
  • FIG. 5B a schematic diagram of the first file is shown. In the first file, only the unplanned area 51 is displayed.
  • step S202 when the first file is opened, the biometric information of the current user is collected, and a decryption code is generated.
  • the collection in this step refers to the collection of biometric information by the camera, the touch point, the microphone, etc. of the device itself when the user opens the first file.
  • the acquisition in step S102 can be performed in a non-real-time manner by storing the stored photos, audio clips, and the like, and can also be collected in real time through the camera, the touch point, or the microphone.
  • the avatar of the designated person is obtained as an encrypted code for encryption, and the designated person can only decrypt by the face information collected in real time.
  • step S203 it is determined whether the decrypted code has a matching encrypted code. If there is a matching encryption code, the decryption is successful, and step S204 is performed; if there is no matching encryption code, the decryption fails, and step S208 is performed.
  • step S102 whether the decrypted code formed by the current user's iris has a matching encrypted code, that is, whether it is the user who originally processed the planned area in step S102.
  • the matching step specifically includes:
  • the biometric information is affected by various factors, such as collecting face information or human eye information, it will be affected by factors such as whether the user is wearing makeup, getting sick, whether the light is sufficient, and whether the background is disordered; When fingerprints or palm prints are collected, the error will increase due to water or dry skin on the hands; when collecting sound information, it will be affected by factors such as hoarseness of the user's cold or background noise. Therefore, a reasonable matching threshold range will not make the user unable to open the file, and will not be easily simulated or even deciphered by others.
  • step S204 the encrypted area in the first file is decrypted by the decryption encoding to form a decrypted area.
  • the step of forming a decryption area specifically includes:
  • the encrypted area in the first file is decrypted by the decryption encoding to form a decrypted area.
  • step S205 it is determined whether there is an undecrypted encrypted area in the first file. If it does not exist, step S206 is performed, and if yes, step S207 is performed.
  • step S206 the original file is displayed.
  • the original file may display or hide the mark of the planning area, such as: the encrypted person name, the avatar, and the like of the planning area 52.
  • step S207 the unplanned area and the decrypted area are displayed, and the undecrypted encrypted area is hidden to generate a second file.
  • FIG. 5C a schematic diagram of the second file is shown.
  • an unplanned area 51 and a decrypted area 52' are displayed.
  • step S208 a rights password is received.
  • the form of the privilege password includes: a password composed of letters, numbers, and/or Chinese; and the current user in step S102 forwards a picture, audio, or two-dimensional code including the biometric information of the user. .
  • step S209 it is determined whether the authority password corresponds to the encryption code. If it does not correspond, step S210 is performed; if so, step S211 is performed.
  • the step of determining the authority password and the encryption code includes:
  • step S210 the first file is displayed.
  • step S211 the encrypted area in the first file is decrypted by the privilege password to form a decrypted area.
  • step S205 it is determined whether there is still an undecrypted encrypted area in the first file.
  • step S212 is performed. If the undecrypted encrypted area does not exist, step S206 is performed.
  • step S212 the unplanned area and the decrypted area are displayed, and the undecrypted encrypted area is hidden to generate a third file.
  • the third file and the second file display the same content, and the operation rights may be the same or different.
  • the method for processing a file provided by the present invention, by planning a planned area and an unplanned area in an original file, and separately encrypting each of the planned areas to form an encrypted area, and then generating a first file with an unplanned area and an encrypted area, having an encrypted target
  • FIG. 3 it is a block diagram of a file processing system according to an embodiment of the present invention.
  • the processing system 300 of the file includes: a planning module 31, an encryption encoding module 32, an encryption module 33, and a first file module 34.
  • the planning module 31 is configured to plan a planned area and an unplanned area in the original file.
  • the original document as shown in FIG. 5A includes an unplanned area 51, and planned areas 52, 53.
  • the planning module 31 includes: a dividing submodule 311, and a sequence submodule 312.
  • the dividing sub-module 311 is configured to plan an original file by using a separator or a page break to generate an unplanned area and at least one planned area.
  • the sequence sub-module 312 is configured to record the relative order of each planned area and the unplanned area, so that after the cooperation, the encrypted contents are combined in the original set order.
  • the encryption and encoding module 32 is connected to the planning module 31, and is configured to acquire biometric information of the current user when the planning area is processed, and generate an encryption code.
  • the biometric information includes, but is not limited to, face information, iris information, fingerprint information, palm print information, voice recognition information, and/or handwriting information.
  • the encryption module 33 is connected to the encryption and encoding module 32 for encrypting the processing area processed by the encryption coding to form an encryption area.
  • the first file module 34 is connected to the planning module 31 and the encryption module 33 for displaying the unplanned area and hiding the encrypted area to generate a first file.
  • the processing system of the file provided by the present invention plans a planned area and an unplanned area in the original file, and separately encrypts each of the planned areas to form an encrypted area, and then generates a first file with an unplanned area and an encrypted area, and has an encrypted target.
  • FIG. 4 it is a block diagram of a file processing system according to an embodiment of the present invention.
  • the same module in Fig. 4 as Fig. 3 still starts with 3, and the module different from Fig. 3 starts with 4 to show the difference.
  • the processing system 400 of the file includes: a planning module 31, an encryption and encoding module 32, an encryption module 33, a corresponding module 41, a first file module 34, a decryption encoding module 42, a decryption module 43, and an integrity judgment module. 44.
  • the planning module 31 is connected to the storage unit (not labeled) for reading the original file and planning the planned area and the unplanned area in the original file.
  • the planning module 31 includes:
  • a dividing sub-module 311, configured to plan an original file by using a separator or a page break to generate an unplanned area and at least one planned area;
  • the sequence sub-module 312 is configured to record the relative order of each planned area and the unplanned area, so that after the cooperation, the encrypted contents are combined in the original set order.
  • the encryption and encoding module 32 is connected to the planning module 31, and is configured to acquire biometric information of the current user when the planning area is processed, and generate an encryption code.
  • the biometric information includes, but is not limited to, face information, iris information, fingerprint information, palm print information, voice recognition information, and handwriting information.
  • the encryption module 33 is connected to the encryption and encoding module 32 for encrypting the processing area processed by the encryption coding to form an encryption area.
  • the corresponding module 41 is connected to the encryption module 33, and includes a permission list 411, which is set by the current user currently processing the planned area.
  • the permission list is used to store an encryption code, and a corresponding authorization password and authorization authority, the authorization rights including viewing and editing.
  • the first file module 34 is connected to the planning module 31 and the encryption module 33 for displaying the unplanned area and hiding the encrypted area to generate a first file.
  • the decryption encoding module 42 is connected to the first file module 34, and is configured to collect biometric information of the current user when the first file is opened, and generate a decryption code.
  • the acquisition in the decryption encoding module 42 refers to the collection of biometric information by the camera, the touch point, the microphone, and the like of the device itself when the user opens the first file.
  • the acquisition in the encryption and encoding module 32 can be obtained in a non-real-time manner through stored data, audio clips, etc., and can also be collected in real time through the camera, the touch point or the microphone.
  • the avatar of the designated person is obtained as an encrypted code for encryption, and the designated person can only decrypt by the face information collected in real time.
  • the decryption module 43 is coupled to the decryption encoding module 42 and the first file module 34 for decrypting the encrypted region in the first file by the decryption encoding to form a decrypted region.
  • the decrypting module 43 specifically includes:
  • a comparison submodule 431, configured to compare a degree of matching between the decryption password and the encrypted password
  • a determining sub-module 432 configured to determine whether the matching degree is greater than a preset matching threshold
  • the area sub-module 433 is configured to decrypt the encrypted area in the first file by using the decryption code to form a decryption area when the matching degree is greater than a preset matching threshold.
  • the receiving module 46 is connected to the determining sub-module 432 of the decrypting module 43 for receiving the privilege password when the matching degree is not greater than the preset matching threshold.
  • the form of the privilege password includes: a password composed of letters, numbers, and Chinese; the picture, audio, or two-dimensional code including the biometric information of the self is forwarded by the current user in the encryption and encoding module 32.
  • the corresponding module 41 is connected to the encryption module 33 and the receiving module 47, and is configured to determine whether the permission password corresponds to the encryption code.
  • the corresponding module 41 further includes:
  • the finding submodule 412 is configured to search, from the permission list, whether an authorization password corresponding to the current permission password exists;
  • the permission sub-module 413 is configured to determine an operation authority of the third file when there is an authorization password corresponding to the current permission password.
  • the area sub-module 433 is further connected to the search sub-module 412 in the corresponding module 41, and is configured to use the privilege password to the first file when the privilege password corresponds to the cipher code.
  • the encrypted area in the area is decrypted to form a decrypted area.
  • the integrity determination module 44 is connected to the decryption module 43 and the first file module 34 for determining whether there is an undecrypted encrypted area in the first file.
  • the second file module 45 is connected to the integrity determining module 44, and configured to display the unplanned area and the decrypted area when the decrypted area is formed by decrypting the encoded decryption and the undecrypted encrypted area still exists, and hide the Decrypt the encrypted area to generate a second file.
  • the third file module 47 is connected to the integrity determination module 44, and the permission sub-module 413 in the corresponding module 41, for forming a decryption area by decryption by an authorization password and still having the undecrypted encryption area , displaying an unplanned area and a decrypted area, and hiding the undecrypted encrypted area to generate a third file.
  • the display module 46 is connected to the storage unit (not labeled), the integrity determining module 44, the second file module 45, and the third file module 47, for displaying the original file, the first file, the second file, And the third file. in particular:
  • the processing system of the file provided by the present invention plans a planned area and an unplanned area in the original file, and separately encrypts each of the planned areas to form an encrypted area, and then generates a first file with an unplanned area and an encrypted area, and has an encrypted target.
  • the embodiment of the present invention further provides a terminal device.
  • the terminal device may include radio frequency (RF, Radio).
  • Frequency circuit 601 memory 602 including one or more computer readable storage media, input unit 603, display unit 604, sensor 605, audio circuit 606, wireless fidelity (WiFi, Wireless)
  • the Fidelity module 607 includes a processor 608 having one or more processing cores, and a power supply 609 and the like. It will be understood by those skilled in the art that the terminal structure shown in FIG. 6 does not constitute a limitation to the terminal, and may include more or less components than those illustrated, or a combination of certain components, or different component arrangements. among them:
  • the memory 602 stores instructions executable by the processor 608.
  • the processor 608 is configured to execute instructions in the memory for performing the methods as described in the first to second embodiments or to operate the systems as described in the third to fourth embodiments.
  • the processing method, the processing system, and the terminal device of the file provided by the embodiment of the present invention belong to the same concept, and the specific implementation process thereof is described in the full text of the specification, and details are not described herein again.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Document Processing Apparatus (AREA)
  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Collating Specific Patterns (AREA)

Abstract

一种文件的处理方法、处理系统及终端设备,所述方法包括:在原始文件中规划出规划区域与未规划区域(S101);对所述规划区域进行处理时,获取当前用户的生物特征信息并生成加密编码(S102);通过所述加密编码对其处理的规划区域进行加密,以形成加密区域(S103);显示所述未规划区域并隐藏所述加密区域,以生成第一文件(S104)。所述方法加密针对性强、支持协同合作,使用简单。

Description

文件的处理方法、处理系统及终端设备
本申请要求于2015年10月28日提交中国专利局、申请号为201510719428.6、发明名称为“文件的处理方法及处理系统”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本发明属于计算机安全领域,尤其涉及一种文件的处理方法、处理系统及终端设备。
背景技术
智能终端设备的普及,为用户的生活带来了极大的便利,比如,用户可以通过手机等移动终端设备进行随时随地的移动办公。同时,也使用户数据的价值不断的提升,进而对数据的存储与处理的安全性能提出了更高的要求。
目前,对于移动办公而产生的文件而言,通常不支持移动终端对文件进行加密处理,而仅支持通过电脑对文件加密后,在移动终端设备(如手机)中通过输入数字、英文、或汉字组成的密码进行解密。
而现有的对文件加密的技术,存在如下问题:
第一,无针对性,仅能对整个文件加密,或者有权限可以编辑或查看,或者无权限,而没有部分权限的情形;
第二,不支持协同合作,在多人共同编辑时,文件或只能按照时间顺序保存最初文件或最后文件,或者是出现内容出现混乱;以及
第三,通过传统的数字、英文、或汉字构成的密码,容易被无权限的人破解或被有权限的人遗忘,安全性低、且使用复杂。
技术问题
本发明的目的在于提供一种文件的处理方法、处理系统及终端设备,可以解决现有技术中对加密标的无针对性、不支持协同合作、以及安全性能差、且使用复杂的技术问题。
技术解决方案
为解决上述技术问题,本发明实施例提供了一种文件的处理方法,包括:
在原始文件中规划出规划区域与未规划区域,其中所述规划区域的个数为至少一个;
对所述规划区域进行处理时,获取当前用户的生物特征信息,并生成加密编码,其中所述生物特征信息包括:人脸信息、虹膜信息、指纹信息、掌纹信息、声音识别信息、和/或笔迹信息;
通过所述加密编码对其处理的规划区域进行加密,以形成加密区域;以及
显示所述未规划区域、并隐藏所述加密区域,以生成第一文件。
为解决上述技术问题,本发明实施例还提供了一种文件的处理方法,包括:
规划模块,用于在原始文件中规划出规划区域与未规划区域,其中所述规划区域的个数为至少一个;
加密编码模块,用于对所述规划区域进行处理时,获取当前用户的生物特征信息,并生成加密编码,其中所述生物特征信息包括:人脸信息、虹膜信息、指纹信息、掌纹信息、声音识别信息、和/或笔迹信息;
加密模块,用于通过所述加密编码对其处理的规划区域进行加密,以形成加密区域;以及
第一文件模块,用于显示所述未规划区域、并隐藏所述加密区域,以生成第一文件。
为解决上述技术问题,本发明实施例提供了一种终端设备,其包括存储器和处理器,所述存储器存储有处理器可执行的指令,所述处理器用于执行所述存储器中的指令,所述指令用于执行如下操作:
在原始文件中规划出规划区域与未规划区域,其中所述规划区域的个数为至少一个;
对所述规划区域进行处理时,获取当前用户的生物特征信息,并生成加密编码,其中所述生物特征信息包括:人脸信息、虹膜信息、指纹信息、掌纹信息、声音识别信息、和/或笔迹信息;
通过所述加密编码对其处理的规划区域进行加密,以形成加密区域;以及
显示所述未规划区域、并隐藏所述加密区域,以生成第一文件。
有益效果
相对于现有技术,本发明提供的文件的处理方法、处理系统及终端设备,通过将原始文件中规划出规划区域与未规划区域,并对各规划区域单独加密形成加密区域,再将未规划区域与加密区域生成第一文件,具有加密标的针对性强、支持协同合作、安全性强、以及使用简单的优点。
附图说明
图1是本发明实施例一提供的文件的处理方法的流程示意图;
图2是本发明实施例二提供的文件的处理方法的流程示意图;
图3是本发明实施例三提供的文件的处理系统的模块示意图;
图4是本发明实施例四提供的文件的处理系统的模块示意图;
图5A~5C分别是本发明实施例中的原始文件、第一文件、以及第二文件的示意图;
图6是本发明实施例五提供的终端设备的硬件环境示意图。
本发明的最佳实施方式
请参照附图中的图式,其中相同的组件符号代表相同的组件,本发明的原理是以实施在一适当的运算环镜中来举例说明。以下的说明是基于所示例的本发明的具体实施例,其不应被视为限制本发明未在此详述的其它具体实施例。
本发明原理以上述文字来说明,其并不代表为一种限制,本领域技术人员将可了解到以下所述的多种步骤及操作亦可实施在硬件当中。
本发明提供的本发明的文件的处理方法及处理系统,可应用于智能手机、笔记本电脑等终端设备中,此处不一一枚举。
实施例一
请参阅图1,所示为本发明实施例提供的文件的处理方法的流程示意图。
具体而言,所述文件的处理方法,包括:
在步骤S101中,在原始文件中规划出规划区域与未规划区域。
请参阅图5A,所示为原始文件的示意图。其中,包括未规划区域51、和规划区域52、53。所述未规划区域通常为一个,用于展示如封面、页眉等设计。以合同或设计文件为例,未规划区域51也可以包括:项目的背景介绍、文章的引言等,以给协同工作人员以启示。未规划区域也可被规划区域52、53分隔成多个,以提示各协同人员被加密的内容。具体而言,未规划区域51的内容,包括:各章节的概要;规划区域52、53的内容,包括:各章节的具体内容。
具体而言,所述规划的步骤,包括:
(1)通过分隔符、或分页符对原始文件进行规划,以生成未规划区域与至少一个规划区域;以及
(2)记录每一规划区域和所述未规划区域的相对顺序,以便在协同合作之后,将各加密内容按照原设定的顺序进行组合。
在步骤S102中,对所述规划区域进行处理时,获取当前用户的生物特征信息,并生成加密编码。
其中,所述生物特征信息,包括但不限于:人脸信息、虹膜信息、指纹信息、掌纹信息、声音识别信息、和/或笔迹信息。
一、以人脸或虹膜信息为例,其生成加密编码的步骤,具体包括:
(1)获取第一加密区域中的人脸图像或虹膜图像;
(2)对所述人脸图像或虹膜图像进行预处理,其中:
对人脸图像的预处理包括:标定人脸的位置和大小;对人脸图像进行光线补偿、灰度变换、直方图均衡化、归一化、几何校正、滤波、以及锐化;或
对虹膜图像的预处理包括:通过确定内圆(虹膜与瞳孔的边界)、外圆(虹膜与巩膜的边界)和二次曲线(虹膜与上下眼皮的边界)在图像中的位置,以进行虹膜定位;将虹膜图像中的虹膜大小进行归一化处理,以调整到预设的固定尺寸;针对归一化后虹膜图像,进行亮度、对比度和平滑度等处理,以提高图像中虹膜特征的识别度。
(3)提取所述人脸图像或虹膜图像中的特征点;
(4)对所述特征点进行编码,以生成加密编码。
二、以笔迹为例,通过纹理识别而生成加密编码,具体包括:
(1)笔迹图像预处理,包括:笔迹图像扫描、去除稿纸中的分割线,转换成黑白二值图(可通过PhotoShop实现)、中值滤波、去除图片中噪声(可通过MatLab实现)、以及倾斜校正等;
(2)文字切分、纹理制作,包括:行切分和字切分(根据象素的统计信息进行切分,对于汉字中常见的左右结构以及偏旁部首等设计了偏旁部首合并策略,确保汉字的完整性)、纹理图像的制作(对切分下来的汉字将文字长、宽归一化,制作纹理图像)、以及对纹理图像进行提取纹理特征(可采用Gabor变换);
(3)对待测样本进行鉴别,包括:对待处理样本采用同样的处理方法提取纹理特征,然后使用KNN临近聚类的方法或SVM(或LibSVM)进行分类。
三、对于指纹和掌纹信息的生成,由于目前的相关技术已很成熟,在此不再赘述。
在步骤S103中,通过所述加密编码对其处理的规划区域进行加密,以形成加密区域。
在步骤S104中,显示所述未规划区域、并隐藏所述加密区域,以生成第一文件。
请参阅图5B,所示为第一文件的示意图。在第一文件中仅显示未规划区域51。即,当无权限的人打开第一文件时,呈现的是不加密的内容,其应用的场景包括合同或规划书等具体细节需要保密,但计划本身又需要公开的情形。
本发明提供的文件的处理方法,通过将原始文件中规划出规划区域与未规划区域,并对各规划区域单独加密形成加密区域,再将未规划区域与加密区域生成第一文件,具有加密标的针对性强、支持协同合作、安全性强、以及使用简单的优点。
实施例二
请参阅图2,所示为本发明实施例提供的文件的处理方法的流程示意图。图2中与图1相同的步骤仍以S1开头,与图1不同的步骤以S2开头,以示其差异。
具体而言,所述文件的处理方法,包括:
在步骤S101中,在原始文件中规划出规划区域与未规划区域。
在步骤S102中,对所述规划区域进行处理时,获取当前用户的生物特征信息,并生成加密编码。
其中,所述生物特征信息,包括但不限于:人脸信息、虹膜信息、指纹信息、掌纹信息、声音识别信息、和/或笔迹信息。
在步骤S103中,通过所述加密编码对其处理的规划区域进行加密,以形成加密区域。
在步骤S201中,由当前用户设定权限列表,所述权限列表用于存储加密编码、及其对应的授权密码和授权权限,所述授权权限包括查看和编辑。
其中,所述指定授权密码和操作权限,具体包括:
(1)设定授权密码,所述授权密码与所述当前用户的加密编码所对应。比如图5A中规划区域52对应的用户,只能授权所述规划区域52的授权密码。但在步骤S101规划时,可以设定具有全部规划区域权限的授权密码。
(2)为所述授权密码设定操作权限,如:使授权密码具有与加密编码同等的权利(可查看、且可编辑)、或等低一级的权利(可查看、但不可编辑)。
在步骤S104中,显示所述未规划区域、并隐藏所述加密区域,以生成第一文件。
请参阅图5B,所示为第一文件的示意图。在所述第一文件中,仅显示未规划区域51。
在步骤S202中,打开所述第一文件时,采集当前用户的生物特征信息,并生成解密编码。
由于生成解密编码的步骤,与生成加密编码的原理相同,此处不再赘述。
此外,需要说明的是,本步骤中的采集,是指用户打开第一文件时,通过设备本身的摄像头、触控点、话筒等进行生物特征信息的采集。而步骤S102中的获取,可以通过存储的照片、音频片段等存储的资料中进行非实时地获取,此外,也可以通过上述摄像头、触控点或话筒进行实时采集。
具体而言,如,管理员在指派任务时,通过获取指定人员的头像作为加密编码进行加密,而指定人员仅能通过实时采集的人脸信息进行解密。
在步骤S203中,判断所述解密编码是否有匹配的加密编码。其中,若存在匹配的加密编码,则解密成功,并执行步骤S204;若不存在匹配的加密编码,则解密失败,并执行步骤S208。
比如,基于当前用户的虹膜所形成的解密编码是否有匹配的加密编码,即判断是否是最初在步骤S102中处理所述规划区域的用户。
此外,可以理解的是,由于基于生物特征信息而形成的解密编码与数字密码等不同,数字密码只有对错,如设定了123,即使8与3的相似度高,也不会判断128因为相似度高而作为密码。但基于生物特征信息形成的编码则会受外界的影响而不稳定在判断时需要匹配,所述匹配的步骤具体包括:
(1)对比所述解密密码与所述加密密码的匹配度;
(2)判断所述匹配度是否大于预设匹配阈值,若大于预设匹配阈值,则视为匹配,若不大于,则视为不匹配。
对于匹配阈值而言,由于生物特征信息会受到多种因素的影响,如:采集人脸信息或人眼信息时,会受到用户是否化妆、生病、光线是否充足、背景是否混乱等因素的影响;采集指纹或掌纹信息时,会因为手上沾水或干燥起皮导致误差增大;采集声音信息时,会受到用户感冒声音沙哑或背景的嘈杂等因素影响。因此,合理的匹配阈值范围,即不会使用户无法打开文件,又不会被他人轻易模拟乃至破译。
在步骤S204中,通过所述解密编码对所述第一文件中的加密区域进行解密,以形成解密区域。
所述形成解密区域的步骤,具体包括:
(1)对比所述解密密码与所述加密密码的匹配度;
(2)判断所述匹配度是否大于预设匹配阈值;以及
(3)当所述匹配度大于预设匹配阈值时,通过所述解密编码对所述第一文件中的加密区域进行解密,以形成解密区域。
在步骤S205中,判断所述第一文件中是否存在未解密的加密区域。其中,若不存在,则执行步骤S206,若存在,则执行步骤S207。
在步骤S206中,显示所述原始文件。
请参阅图5A所示的原始文件示意图。其中,原始文件可以显示或隐藏规划区域的标记,如显示:规划区域52的加密人名称、头像等。
在步骤S207中,显示未规划区域和解密区域,并隐藏所述未解密的加密区域,以生成第二文件。
请参阅图5C,所示为第二文件的示意图。在所述第二文件中,显示未规划区域51、和解密区域52’。
在步骤S208中,接收权限密码。
可以理解的是,所述权限密码的形式,包括:由字母、数字、和/或中文构成的密码;由步骤S102中的当前用户转发包含自己生物特性信息的图片、音频、或二维码等。
在步骤S209中,判断所述权限密码是否与所述加密编码对应。其中,若不对应,则执行步骤S210;若对应,则执行步骤S211。
具体而言,所述判断权限密码与加密编码的步骤包括:
(1)从所述权限列表中查找是否存在与当前权限密码对应的授权密码;以及
(2)当存在与当前权限密码对应的授权密码时,设置所述授权密码对应的操作权限。
在步骤S210中,显示所述第一文件。
即,无任何权限的人,可以查看第一文件。
在步骤S211中,通过所述权限密码对所述第一文件中的加密区域进行解密,以形成解密区域。
返回步骤S205中,判断所述第一文件中是否还存在未解密的加密区域。
其中,若存在所述未解密的加密区域,则执行步骤S212,若不存在所述未解密的加密区域,则执行步骤S206。
在步骤S212中,显示未规划区域和解密区域,并隐藏所述未解密的加密区域,以生成第三文件。
其中,第三文件与第二文件显示的内容相同,操作权限可以相同,也可以不相同。
本发明提供的文件的处理方法,通过将原始文件中规划出规划区域与未规划区域,并对各规划区域单独加密形成加密区域,再将未规划区域与加密区域生成第一文件,具有加密标的针对性强、支持协同合作、安全性强、以及使用简单的优点。
实施例三
请参阅图3,所示为本发明实施例提供的文件的处理系统的模块示意图。
具体而言,所述文件的处理系统300,包括:规划模块31、加密编码模块32、加密模块33、以及第一文件模块34。
规划模块31,用于在原始文件中规划出规划区域与未规划区域。
如图5A所示的原始文件,包括未规划区域51、和规划区域52、53。
具体而言,所述规划模块31包括:划分子模块311、和顺序子模块312。其中,所述划分子模块311,用于通过分隔符、或分页符对原始文件进行规划,以生成未规划区域与至少一个规划区域。所述顺序子模块312,用于记录每一规划区域和所述未规划区域的相对顺序,以便在协同合作之后,将各加密内容按照原设定的顺序进行组合。
加密编码模块32,连接于所述规划模块31,用于对所述规划区域进行处理时,获取当前用户的生物特征信息,并生成加密编码。
其中,所述生物特征信息,包括但不限于:人脸信息、虹膜信息、指纹信息、掌纹信息、声音识别信息、和/或笔迹信息。
加密模块33,连接于所述加密编码模块32,用于通过所述加密编码对其处理的规划区域进行加密,以形成加密区域。
第一文件模块34,连接于所述规划模块31和加密模块33,用于显示所述未规划区域、并隐藏所述加密区域,以生成第一文件。
如图5B所示的第一文件,其中仅显示未规划区域51。
本发明提供的文件的处理系统,通过将原始文件中规划出规划区域与未规划区域,并对各规划区域单独加密形成加密区域,再将未规划区域与加密区域生成第一文件,具有加密标的针对性强、支持协同合作、安全性强、以及使用简单的优点。
实施例四
请参阅图4,所示为本发明实施例提供的文件的处理系统的模块示意图。图4中与图3相同的模块仍以3开头,与图3不同的模块以4开头,以示其差异。
具体而言,所述文件的处理系统400,包括:规划模块31、加密编码模块32、加密模块33、对应模块41、第一文件模块34、解密编码模块42、解密模块43、完整性判断模块44、第二文件模块45、接收模块46、第三文件模块47、以及显示模块48。
规划模块31,连接于存储单元(未标示),用于读取原始文件,并在原始文件中规划出规划区域与未规划区域。
具体而言,所述规划模块31包括:
划分子模块311,用于通过分隔符、或分页符对原始文件进行规划,以生成未规划区域与至少一个规划区域;以及
顺序子模块312,用于记录每一规划区域和所述未规划区域的相对顺序,以便在协同合作之后,将各加密内容按照原设定的顺序进行组合。
加密编码模块32,连接于所述规划模块31,用于对所述规划区域进行处理时,获取当前用户的生物特征信息,并生成加密编码。
其中,所述生物特征信息,包括但不限于:人脸信息、虹膜信息、指纹信息、掌纹信息、声音识别信息、和笔迹信息。
加密模块33,连接于所述加密编码模块32,用于通过所述加密编码对其处理的规划区域进行加密,以形成加密区域。
对应模块41,连接于所述加密模块33,其中包括权限列表411,由当前对规划区域进行处理的当前用户进行设定。所述权限列表用于存储加密编码、及其对应的授权密码和授权权限,所述授权权限包括查看和编辑。
第一文件模块34,连接于所述规划模块31和加密模块33,用于显示所述未规划区域、并隐藏所述加密区域,以生成第一文件。
解密编码模块42,连接于所述第一文件模块34,用于打开所述第一文件时,采集当前用户的生物特征信息,并生成解密编码。
需要说明的是,解密编码模块42中的采集,是指用户打开第一文件时,通过设备本身的摄像头、触控点、话筒等进行生物特征信息的采集。而加密编码模块32中的获取,可以通过存储的照片、音频片段等存储的资料中进行非实时地获取,此外,也可以通过上述摄像头、触控点或话筒进行实时采集。
具体而言,如,管理员在指派任务时,通过获取指定人员的头像作为加密编码进行加密,而指定人员仅能通过实时采集的人脸信息进行解密。
解密模块43,连接于所述解密编码模块42和第一文件模块34,用于通过所述解密编码对所述第一文件中的加密区域进行解密,以形成解密区域。
所述解密模块43,具体包括:
对比子模块431,用于对比所述解密密码与所述加密密码的匹配度;
判断子模块432,用于判断所述匹配度是否大于预设匹配阈值;以及
区域子模块433,用于当所述匹配度大于预设匹配阈值时,通过所述解密编码对所述第一文件中的加密区域进行解密,以形成解密区域。
接收模块46,连接于所述解密模块43的判断子模块432,用于当所述匹配度不大于预设匹配阈值时,接收权限密码。
可以理解的是,所述权限密码的形式,包括:由字母、数字、中文构成的密码;由加密编码模块32中的当前用户转发包含自己生物特性信息的图片、音频、或二维码等。
对应模块41,连接于所述加密模块33和接收模块47,用于判断所述权限密码是否与所述加密编码对应。
所述对应模块41,还包括:
查找子模块412,用于从所述权限列表中查找是否存在与当前权限密码对应的授权密码;以及
权限子模块413,用于当存在与当前权限密码对应的授权密码时,确定所述第三文件的操作权限。
此外,所述区域子模块433,还连接于所述对应模块41中的查找子模块412,用于当所述权限密码与所述加密编码对应时,通过所述权限密码对所述第一文件中的加密区域进行解密,以形成解密区域。
完整性判断模块44,连接于所述解密模块43与第一文件模块34,用于判断所述第一文件中是否存在未解密的加密区域。
第二文件模块45,连接于所述完整性判断模块44,用于当通过解密编码解密而形成解密区域且仍存在未解密的加密区域时,显示未规划区域和解密区域,并隐藏所述未解密的加密区域,以生成第二文件。
第三文件模块47,连接于所述完整性判断模块44,和对应模块41中的权限子模块413,用于当通过授权密码进行解密而形成解密区域且仍存在所述未解密的加密区域时,显示未规划区域和解密区域,并隐藏所述未解密的加密区域,以生成第三文件。
所述显示模块46,连接于存储单元(未标示)、完整性判断模块44、第二文件模块45、和第三文件模块47,用于显示所述原始文件、第一文件、第二文件、以及第三文件。具体而言:
(1)当解密模块43无法通过解密编码进行解密、且对应模块41判断无对应授权密码时,显示第一文件,如图5B所示;
(2)当解密模块43通过解密编码成功解密、且完整性判断模块44判断仍有未解密区域时,显示第二文件,如图5C所示;
(3)当解密模块,通过授权密码成功解密、且完整性判断模块44判断仍有未解密区域时,显示第三文件;以及
(4)当完整性判断模块44判断无未解密区域时,显示原始文件,如图5A所示。
本发明提供的文件的处理系统,通过将原始文件中规划出规划区域与未规划区域,并对各规划区域单独加密形成加密区域,再将未规划区域与加密区域生成第一文件,具有加密标的针对性强、支持协同合作、安全性强、以及使用简单的优点。
实施例五
相应的,本发明实施例还提供一种终端设备,如图6所示,该终端设备可以包括射频(RF,Radio Frequency)电路601、包括有一个或一个以上计算机可读存储介质的存储器602、输入单元603、显示单元604、传感器605、音频电路606、无线保真(WiFi,Wireless Fidelity)模块607、包括有一个或者一个以上处理核心的处理器608、以及电源609等部件。本领域技术人员可以理解,图6中示出的终端结构并不构成对终端的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。其中:
所述存储器602存储有处理器608可执行的指令。所述处理器608用于执行所述存储器中的指令,所述指令用于执行如实施例一至二所述的方法,或运行如实施例三至四所述的系统。
本发明实施例提供的文件的处理方法、处理系统及终端设备属于同一构思,其具体实现过程详见说明书全文,此处不再赘述。
综上所述,虽然本发明已以优选实施例揭露如上,但上述优选实施例并非用以限制本发明,本领域的普通技术人员,在不脱离本发明的精神和范围内,均可作各种更动与润饰,因此本发明的保护范围以权利要求界定的范围为准。

Claims (20)

  1. 一种文件的处理方法,其包括:
    在原始文件中规划出规划区域与未规划区域,其中所述规划区域的个数为至少一个;
    对所述规划区域进行处理时,获取当前用户的生物特征信息,并生成加密编码,其中所述生物特征信息包括:人脸信息、虹膜信息、指纹信息、掌纹信息、声音识别信息、和/或笔迹信息;
    通过所述加密编码对其处理的规划区域进行加密,以形成加密区域;以及
    显示所述未规划区域、并隐藏所述加密区域,以生成第一文件。
  2. 如权利要求1所述的处理方法,其中显示所述未规划区域、并隐藏所述加密区域,以生成第一文件,之后还包括:
    打开所述第一文件时,采集当前用户的生物特征信息,并生成解密编码;
    通过所述解密编码对所述第一文件中的加密区域进行解密,以形成解密区域;
    判断所述第一文件中是否存在未解密的加密区域;
    若不存在所述未解密的加密区域,则显示所述原始文件;或
    若存在所述未解密的加密区域,则显示未规划区域和解密区域,并隐藏所述未解密的加密区域,以生成第二文件。
  3. 如权利要求2所述的处理方法,其中通过所述解密编码对所述第一文件中的加密区域进行解密,以形成解密区域,具体包括:
    对比所述解密密码与所述加密密码的匹配度;
    判断所述匹配度是否大于预设匹配阈值;以及
    当所述匹配度大于预设匹配阈值时,通过所述解密编码对所述第一文件中的加密区域进行解密,以形成解密区域。
  4. 如权利要求3所述的处理方法,其中判断所述匹配度是否大于预设匹配阈值,之后还包括:
    当所述匹配度不大于预设匹配阈值时,接收权限密码;
    判断所述权限密码是否与所述加密编码对应;
    若所述权限密码与所述加密编码对应,则通过所述权限密码对所述第一文件中的加密区域进行解密,以形成解密区域;
    判断所述第一文件中是否还存在未解密的加密区域;
    若不存在所述未解密的加密区域,则显示所述原始文件;或
    若存在所述未解密的加密区域,则显示未规划区域和解密区域,并隐藏所述未解密的加密区域,以生成第三文件。
  5. 如权利要求4所述的处理方法,其中判断所述权限密码是否与所述加密编码对应,具体包括:
    从所述权限列表中查找是否存在与当前权限密码对应的授权密码,其中所述权限列表形成于通过所述加密编码对其处理的规划区域进行加密的步骤之后,所述权限列表用于存储加密编码、及其对应的授权密码和操作权限,所述操作权限包括查看和编辑;以及
    当存在与当前权限密码对应的授权密码时,确定所述第三文件的操作权限。
  6. 如权利要求1所述的处理方法,其中在原始文件中规划出规划区域与未规划区域,其中所述规划区域的个数为至少一个,具体包括:
    通过分隔符、或分页符对原始文件进行规划,以生成未规划区域与至少一个规划区域;以及
    记录每一规划区域和所述未规划区域的相对顺序。
  7. 一种文件的处理系统,其包括:
    规划模块,用于在原始文件中规划出规划区域与未规划区域,其中所述规划区域的个数为至少一个;
    加密编码模块,用于对所述规划区域进行处理时,获取当前用户的生物特征信息,并生成加密编码,其中所述生物特征信息包括:人脸信息、虹膜信息、指纹信息、掌纹信息、声音识别信息、和/或笔迹信息;
    加密模块,用于通过所述加密编码对其处理的规划区域进行加密,以形成加密区域;以及
    第一文件模块,用于显示所述未规划区域、并隐藏所述加密区域,以生成第一文件。
  8. 如权利要求7所述的处理系统,其中还包括:
    解密编码模块,用于打开所述第一文件时,采集当前用户的生物特征信息,并生成解密编码;
    解密模块,用于通过所述解密编码对所述第一文件中的加密区域进行解密,以形成解密区域;
    完整性判断模块,用于判断所述第一文件中是否存在未解密的加密区域;
    第二文件模块,连接于所述完整性判断模块,用于当通过解密编码进行解密且仍存在所述未解密的加密区域时,显示未规划区域和解密区域,并隐藏所述未解密的加密区域,以生成第二文件;以及
    显示模块,用于当不存在所述未解密的加密区域时,显示所述原始文件;以及当存在所述未解密的加密区域时,显示所述第二文件。
  9. 如权利要求8所述的处理系统,其中所述解密模块包括:
    对比子模块,用于对比所述解密密码与所述加密密码的匹配度;
    判断子模块,用于判断所述匹配度是否大于预设匹配阈值;以及
    区域子模块,用于当所述匹配度大于预设匹配阈值时,通过所述解密编码对所述第一文件中的加密区域进行解密,以形成解密区域。
  10. 如权利要求9所述的处理系统,其中还包括:
    接收模块,连接于所述解密模块的判断子模块,用于当所述匹配度不大于预设匹配阈值时,接收权限密码;
    对应模块,用于判断所述权限密码是否与所述加密编码对应;
    所述区域子模块,连接于所述对应模块,还用于当所述权限密码与所述加密编码对应时,通过所述权限密码对所述第一文件中的加密区域进行解密,以形成解密区域;
    所述完整性判断模块,连接于所述区域子模块,用于判断所述第一文件中是否还存在未解密的加密区域;
    第三文件模块,连接于所述完整性判断模块,用于当通过权限密码进行解密,且仍存在所述未解密的加密区域时,显示未规划区域和解密区域,并隐藏所述未解密的加密区域,以生成第三文件;以及
    显示模块,用于当不存在所述未解密的加密区域时,显示所述原始文件;以及当存在所述未解密的加密区域时,显示所述第三文件。
  11. 如权利要求10所述的处理系统,其中所述对应模块包括:
    权限列表,用于存储加密编码、及其对应的授权密码和操作权限,所述操作权限包括查看和编辑;
    查找子模块,用于从所述权限列表中查找是否存在与当前权限密码对应的授权密码;以及
    权限子模块,用于当存在与当前权限密码对应的授权密码时,确定所述第三文件的操作权限。
  12. 如权利要求7所述的处理系统,其中所述规划模块包括:
    划分子模块,用于通过分隔符、或分页符对所述原始文件进行规划,以生成未规划区域与至少一个规划区域;以及
    顺序子模块,用于记录每一规划区域和所述未规划区域的相对顺序。
  13. 一种终端设备,其包括存储器和处理器,所述存储器存储有处理器可执行的指令,所述处理器用于执行所述存储器中的指令,所述指令用于执行如下操作:
    在原始文件中规划出规划区域与未规划区域,其中所述规划区域的个数为至少一个;
    对所述规划区域进行处理时,获取当前用户的生物特征信息,并生成加密编码,其中所述生物特征信息包括:人脸信息、虹膜信息、指纹信息、掌纹信息、声音识别信息、和/或笔迹信息;
    通过所述加密编码对其处理的规划区域进行加密,以形成加密区域;以及
    显示所述未规划区域、并隐藏所述加密区域,以生成第一文件。
  14. 如权利要求13所述的终端设备,其中还包括:
    摄像头和/或指纹传感器,用于获取当前用户的生物特征信息;以及
    显示屏,用于显示所述第一文件。
  15. 如权利要求13所述的终端设备,其中显示所述未规划区域、并隐藏所述加密区域,以生成第一文件,之后还包括:
    打开所述第一文件时,采集当前用户的生物特征信息,并生成解密编码;
    通过所述解密编码对所述第一文件中的加密区域进行解密,以形成解密区域;
    判断所述第一文件中是否存在未解密的加密区域;
    若不存在所述未解密的加密区域,则显示所述原始文件;或
    若存在所述未解密的加密区域,则显示未规划区域和解密区域,并隐藏所述未解密的加密区域,以生成第二文件。
  16. 如权利要求15所述的终端设备,其中通过所述解密编码对所述第一文件中的加密区域进行解密,以形成解密区域,具体包括:
    对比所述解密密码与所述加密密码的匹配度;
    判断所述匹配度是否大于预设匹配阈值;以及
    当所述匹配度大于预设匹配阈值时,通过所述解密编码对所述第一文件中的加密区域进行解密,以形成解密区域。
  17. 如权利要求16所述的终端设备,其中判断所述匹配度是否大于预设匹配阈值,之后还包括:
    当所述匹配度不大于预设匹配阈值时,接收权限密码;
    判断所述权限密码是否与所述加密编码对应;
    若所述权限密码与所述加密编码对应,则通过所述权限密码对所述第一文件中的加密区域进行解密,以形成解密区域;
    判断所述第一文件中是否还存在未解密的加密区域;
    若不存在所述未解密的加密区域,则显示所述原始文件;或
    若存在所述未解密的加密区域,则显示未规划区域和解密区域,并隐藏所述未解密的加密区域,以生成第三文件。
  18. 如权利要求17所述的终端设备,其中判断所述权限密码是否与所述加密编码对应,具体包括:
    从所述权限列表中查找是否存在与当前权限密码对应的授权密码,其中所述权限列表形成于通过所述加密编码对其处理的规划区域进行加密的步骤之后,所述权限列表用于存储加密编码、及其对应的授权密码和操作权限,所述操作权限包括查看和编辑;以及
    当存在与当前权限密码对应的授权密码时,确定所述第三文件的操作权限。
  19. 如权利要求13所述的终端设备,其中在原始文件中规划出规划区域与未规划区域,其中所述规划区域的个数为至少一个,具体包括:
    通过分隔符、或分页符对原始文件进行规划,以生成未规划区域与至少一个规划区域;以及
    记录每一规划区域和所述未规划区域的相对顺序。
  20. 如权利要求13所述的终端设备,其中所述终端设备是智能手机或笔记本电脑。
PCT/CN2016/093755 2015-10-28 2016-08-05 文件的处理方法、处理系统及终端设备 WO2017071364A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510719428.6 2015-10-28
CN201510719428.6A CN105335643B (zh) 2015-10-28 2015-10-28 文件的处理方法及处理系统

Publications (1)

Publication Number Publication Date
WO2017071364A1 true WO2017071364A1 (zh) 2017-05-04

Family

ID=55286163

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/093755 WO2017071364A1 (zh) 2015-10-28 2016-08-05 文件的处理方法、处理系统及终端设备

Country Status (2)

Country Link
CN (1) CN105335643B (zh)
WO (1) WO2017071364A1 (zh)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105335643B (zh) * 2015-10-28 2017-10-27 广东欧珀移动通信有限公司 文件的处理方法及处理系统
CN109492407A (zh) * 2017-09-11 2019-03-19 中兴通讯股份有限公司 数据保护、数据解保方法、终端及计算机可读存储介质
CN107577952A (zh) * 2017-09-21 2018-01-12 威创集团股份有限公司 一种检测报告的生成方法和生成系统
CN108197448A (zh) * 2017-12-26 2018-06-22 奇酷互联网络科技(深圳)有限公司 文件显示方法、装置、可读存储介质及终端
CN108288041B (zh) * 2018-01-26 2021-02-02 大连民族大学 一种行人目标错检去除的预处理方法
CN110210206B (zh) * 2019-05-28 2021-04-06 维沃移动通信有限公司 一种权限管理方法及终端
CN111353168A (zh) * 2020-02-27 2020-06-30 闻泰通讯股份有限公司 一种多媒体文件的管理方法、装置、设备及存储介质
CN112734974A (zh) * 2020-12-25 2021-04-30 北京首钢自动化信息技术有限公司 一种物业巡检方法、装置及系统
CN112686008A (zh) * 2021-02-03 2021-04-20 广州市久邦数码科技有限公司 一种电子书阅读笔记的记录、查看管理方法和系统
CN113704794B (zh) * 2021-09-02 2023-09-26 国泰新点软件股份有限公司 电子招投标系统中的投标文件处理方法及装置

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101627620A (zh) * 2007-05-31 2010-01-13 株式会社Pfu 电子文件加密系统、解密系统、程序以及方法
CN102915424A (zh) * 2011-08-04 2013-02-06 国际商业机器公司 处理电子文档内的规定区域的方法和系统
CN103400082A (zh) * 2013-08-16 2013-11-20 中科创达软件股份有限公司 一种文件加密方法、解密方法及系统
US20150302218A1 (en) * 2014-04-22 2015-10-22 Pacid Technologies, Llc Method and system for file hiding
CN105335643A (zh) * 2015-10-28 2016-02-17 广东欧珀移动通信有限公司 文件的处理方法及处理系统

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103577764A (zh) * 2012-07-27 2014-02-12 国基电子(上海)有限公司 文档加解密方法及具有文档加解密功能的电子装置
WO2015154285A1 (zh) * 2014-04-10 2015-10-15 华为技术有限公司 设备文件的加解密方法及装置
CN104463019B (zh) * 2014-12-29 2017-07-25 北京致远互联软件股份有限公司 电子文档的加解密方法
CN104992120A (zh) * 2015-06-18 2015-10-21 广东欧珀移动通信有限公司 一种图片加密方法及移动终端

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101627620A (zh) * 2007-05-31 2010-01-13 株式会社Pfu 电子文件加密系统、解密系统、程序以及方法
CN102915424A (zh) * 2011-08-04 2013-02-06 国际商业机器公司 处理电子文档内的规定区域的方法和系统
CN103400082A (zh) * 2013-08-16 2013-11-20 中科创达软件股份有限公司 一种文件加密方法、解密方法及系统
US20150302218A1 (en) * 2014-04-22 2015-10-22 Pacid Technologies, Llc Method and system for file hiding
CN105335643A (zh) * 2015-10-28 2016-02-17 广东欧珀移动通信有限公司 文件的处理方法及处理系统

Also Published As

Publication number Publication date
CN105335643A (zh) 2016-02-17
CN105335643B (zh) 2017-10-27

Similar Documents

Publication Publication Date Title
WO2017071364A1 (zh) 文件的处理方法、处理系统及终端设备
WO2017071363A1 (zh) 密码的共享方法、密码的共享系统及终端设备
WO2019216499A1 (ko) 전자 장치 및 그 제어 방법
WO2017067286A1 (zh) 一种指纹模板更新方法、装置及终端
WO2016204466A1 (en) User authentication method and electronic device supporting the same
KR101714873B1 (ko) 컨텍스트 기반 데이터 액세스 제어
WO2016000307A1 (zh) 一种基于虹膜识别的移动终端用户模式启动方法及系统
US9189612B2 (en) Biometric verification with improved privacy and network performance in client-server networks
WO2019144738A1 (zh) 金融业务的验证方法、装置、设备和计算机存储介质
WO2021049791A1 (ko) 증강현실과 가상현실을 이용한 문서의 처리 시스템 및 그 방법
WO2017050093A1 (zh) 登录信息输入方法、登录信息保存方法及相关装置
WO2015199501A1 (ko) 가변 키패드와 생체 인식을 이용한 본인 인증 방법 및 시스템
WO2018076865A1 (zh) 数据分享方法、装置、存储介质及电子设备
EP3000070A1 (en) Method and apparatus for using electronic device
WO2016192165A1 (zh) 一种数据加密方法及装置
WO2019139420A1 (ko) 전자 장치, 서버 및 그 제어 방법
WO2023128345A1 (ko) 동형 암호화된 이미지를 이용한 개인 식별 방법 및 시스템
WO2013149548A1 (zh) 一种手机数据加密方法以及解密方法
CN103606047A (zh) 密码管理系统
WO2018076844A1 (zh) 数据备份的方法、装置、存储介质及电子设备
WO2023128342A1 (ko) 동형 암호화된 음성을 이용한 개인 식별 방법 및 시스템
CA3156555A1 (en) Cryptographic key management
WO2012053875A2 (ko) 지문 정보를 통한 데이터 송신 수신 장치 및 시스템
WO2020206899A1 (zh) 基于时间戳的身份验证方法、装置、设备及存储介质
WO2017067282A1 (zh) 一种指纹信息的使用方法、装置及终端

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16858801

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16858801

Country of ref document: EP

Kind code of ref document: A1