WO2022134559A1 - 文件处理方法、装置、智能设备及存储介质 - Google Patents

文件处理方法、装置、智能设备及存储介质 Download PDF

Info

Publication number
WO2022134559A1
WO2022134559A1 PCT/CN2021/107163 CN2021107163W WO2022134559A1 WO 2022134559 A1 WO2022134559 A1 WO 2022134559A1 CN 2021107163 W CN2021107163 W CN 2021107163W WO 2022134559 A1 WO2022134559 A1 WO 2022134559A1
Authority
WO
WIPO (PCT)
Prior art keywords
file
password
target
decryption
association relationship
Prior art date
Application number
PCT/CN2021/107163
Other languages
English (en)
French (fr)
Inventor
陈志文
Original Assignee
珠海格力电器股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 珠海格力电器股份有限公司 filed Critical 珠海格力电器股份有限公司
Publication of WO2022134559A1 publication Critical patent/WO2022134559A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/14Details of searching files based on file metadata
    • G06F16/156Query results presentation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Definitions

  • the embodiments of the present application relate to the field of file processing, and in particular, to a file processing method, apparatus, smart device, and storage medium.
  • the existing file encryption method can only set a password for the file.
  • the file can be decrypted and the file content can be displayed.
  • Corresponding files are available for display, which cannot achieve the effect of being fake and real, which may make the person who wants to steal the file information complete the password cracking by trying the password for many times, which will still cause privacy leakage.
  • the embodiments of the present application provide a file processing method, apparatus, smart device and storage medium.
  • an embodiment of the present application provides a file processing method, including:
  • the first file corresponding to the decrypted password is displayed.
  • the method further includes:
  • a non-target file corresponding to the non-target password is queried from the association relationship as a first file.
  • the method further includes:
  • the non-target file is used as the first file.
  • the method further includes:
  • the non-target file corresponding to the decryption password is queried from a plurality of the non-target files as the first file.
  • the method further includes:
  • a non-target file is randomly selected from a plurality of the non-target files as the first file.
  • the method further includes:
  • the candidate file is used as the first file.
  • the method further includes:
  • the method further includes:
  • a second file corresponding to the decrypted password is displayed.
  • an embodiment of the present application provides a file processing device, including:
  • a receiving device configured to receive the decryption password of the input file to be decrypted
  • a query module configured to query the corresponding first file from the pre-stored association between the password and the file
  • the display module is configured to display the first file corresponding to the decryption password.
  • an embodiment of the present application provides a smart device, including: a processor and a memory, where the processor is configured to execute a file processing program stored in the memory, so as to implement the file processing method described in the first aspect above .
  • an embodiment of the present application provides a storage medium, including: the storage medium stores one or more programs, and the one or more programs can be executed by one or more processors to implement the above-mentioned first The file processing method described in the aspect.
  • the file processing solution provided by the embodiment of the present application, by receiving the input decryption password of the file to be decrypted; querying the corresponding first file from the association relationship between the pre-stored password and the file; displaying the first file corresponding to the decryption password .
  • the file decryption if the password is correct, the file is normally opened, and if the password is incorrect, an incorrect password is prompted and the file cannot be opened.
  • FIG. 1 is a schematic flowchart of a file processing method according to an embodiment of the present application.
  • FIG. 2 is a schematic flowchart of another file processing method provided by an embodiment of the present application.
  • FIG. 3 is a schematic flowchart of another file processing method provided by an embodiment of the present application.
  • FIG. 4 is a schematic structural diagram of a file processing apparatus provided by an embodiment of the present application.
  • FIG. 5 is a schematic structural diagram of a smart device according to an embodiment of the present application.
  • FIG. 1 is a schematic flowchart of a file processing method provided by an embodiment of the present application. As shown in FIG. 1 , the method is applied to a scenario in which different file contents are displayed after decrypting a file by using different decryption passwords. Types include but are not limited to: Documents, Folders, Tables, or Graphics, etc. The method can be applied to smart devices such as smart phones, notebook computers, desktop computers, and portable computers.
  • the method specifically includes:
  • an association relationship of the file is constructed according to the current file and the corresponding encryption password, other files and other passwords, and the association relationship includes at least two sets of correspondence relationships, and the correspondence relationships can be Yes: current file (true file) - encrypted password (true password), and other files (fake file) - other passwords (fake password).
  • a decryption interface is generated, and a password input area for inputting a decryption password is provided in the decryption interface, and the input decoding password of the to-be-decoded file is received through the password input area.
  • Identify the decryption password entered by the user query the association relationship between the file and the password, and query the first file corresponding to the decryption password entered by the user from the association relationship.
  • the real file is displayed as the first file; if it is found from the association relationship that the decryption password is a fake password, the fake file corresponding to the fake password is displayed as the first file.
  • the file processing method by receiving the input decryption password of the file to be decrypted; querying the corresponding first file from the association relationship between the pre-stored password and the file; displaying the first file corresponding to the decryption password .
  • the visitor can try to decipher the password several times, set the association relationship and not display the wrong password prompt to ensure that each password entered by the visitor has the corresponding file displayed.
  • the file creator or the file authorizer can identify the authenticity of the file, so as to achieve the purpose of mixing the fake with the real, thereby preventing the file from being deciphered and ensuring information security.
  • FIG. 2 is a schematic flowchart of another file processing method provided by an embodiment of the present application. As shown in FIG. 2 , the method specifically includes:
  • multiple files are pre-stored, and each file is set with an encrypted password
  • the multiple files include a real file (hereinafter referred to as a target file) and at least one fake file (hereinafter referred to as a target file)
  • the encrypted password corresponding to the target file is the target password
  • the encrypted password corresponding to the non-target file is the non-target password.
  • the target file and the non-target file can be documents, tables, folders, etc., and the content of the target file It is the real content, even if it is inconvenient to disclose important content to the outside world, the content in the non-target file can be similar to the real content, some data are inconsistent, and it can also be other content that can be disclosed to the outside world.
  • Target files and non-target files can be stored in the same storage location or in different storage locations.
  • association relationship between the file and the password is constructed according to the target password corresponding to the target file and the non-target password corresponding to the non-target file.
  • association relationship between the file and the password may be: a target file and a non-target file are stored in the same storage location, wherein the target file corresponds to a target password, and the non-target file may correspond to a plurality of non-target passwords; the file
  • the association with the password and the storage location of the file can be shown in Table 1:
  • a target file and multiple non-target files may be stored in the same storage location, wherein the target file corresponds to a target password, and each non-target file corresponds to a non-target password; the association between files and passwords and the file
  • the storage location can be as shown in Table 2:
  • different storage locations can store one target file and multiple non-target files, wherein the target file corresponds to a target password, each non-target file corresponds to a non-target password, and the password can point to the location where the file is stored;
  • the relationship between the file and the password and the storage location of the file can be shown in Table 3:
  • different storage locations may store a target file, multiple non-target files, and an alternate file, wherein the target file corresponds to a target password, each non-target file corresponds to a non-target password, and the alternate file corresponds to a target password. It can be other passwords except the target password and multiple non-target passwords.
  • the password can point to the location where the file is stored; the association between the file and the password and the storage location of the file can be as shown in Table 4. Show:
  • the target password corresponding to the target file, the non-target password corresponding to the non-target file and the association are set in association, when the target file and the non-target file are stored in the same storage location, the target file is displayed in the interface of the file.
  • the attribute of the file is set to display, and the attribute of the non-target file is set to be hidden, so as to confuse the visitor to display only one target file on the interface of the file; file), the decryption password needs to be entered, and the association relationship is queried based on the decryption password.
  • a decryption interface is generated, and a password input area for inputting a decryption password is provided in the decryption interface, and the input decoding password of the to-be-decoded file is received through the password input area.
  • the decryption password After receiving the decryption password currently input by the user, query whether there is a decryption password currently input by the user in the above association relationship. If there is, find the file corresponding to the current decryption password according to the association relationship, and determine according to the association relationship.
  • the decryption password is the target password
  • the target file corresponding to the target password is used as the first file corresponding to the decryption password currently input by the user, and the found first file is displayed.
  • the target file corresponding to the target password is used as the first file corresponding to the currently input decryption password.
  • non-target files there may be one or more non-target files.
  • the non-target file corresponding to the non-target password is used as the non-target password.
  • only one target file and one non-target file are stored.
  • the password corresponding to the non-target file in the association relationship is any non-target password.
  • the pre-stored non-target file is used as the first file corresponding to the decryption password currently input by the user.
  • the first file is displayed on the display screen of the smart device. Modify the attribute information of the target file to be hidden, avoid showing other files under the folder to the outside world, and modify the size of the attribute information of the folder storing the target file and the non-target file.
  • the size of the modified folder can be the same as the one displayed.
  • Non-object files are the same size.
  • one target file and multiple non-target files are stored in the same folder.
  • the decryption password input by the user is a non-target password
  • search for a non-target file corresponding to the same non-target password as the decryption password input by the user according to the association relationship and then use the found non-target file as the first file corresponding to the decryption password currently input by the user .
  • the size of the modified folder can be the same as the size of the displayed non-target files. same.
  • a non-target file may be randomly selected from multiple non-target files as the first file to show. Modify the attribute information of the remaining non-target files and target files stored in the folder to hidden, hide all files, and modify the size in the attribute information of the folder.
  • the size of the modified folder can be the same as the size of the displayed non-target files. same.
  • an alternative file can also be stored, and the alternative file can be stored in the same folder as a target file and multiple non-target files, or can be stored in another folder, under the target password and multiple non-target files.
  • the alternative file may be displayed as the first file.
  • the file processing method by receiving the input decryption password of the file to be decrypted; querying the corresponding first file from the association relationship between the pre-stored password and the file; displaying the first file corresponding to the decryption password .
  • This method can realize that any decryption password has a corresponding display file, and no password error prompt will be given, so as to achieve the effect of confusing the real one, preventing those who want to steal the file information from completing the password cracking by trying the password for many times, and ensuring information security. .
  • FIG. 3 is a schematic flowchart of another file processing method provided by an embodiment of the present application. As shown in FIG. 3 , the method specifically includes:
  • Target and non-target files are pre-stored.
  • Target and non-target files can be in the same folder.
  • the user inputs the decryption password in the password input box, and the smart device receives the decryption password currently input by the user.
  • the target file corresponding to the target password is determined as the first file corresponding to the decryption password currently input by the user according to the association relationship.
  • the target file can be copied, and the copied target file can be stored in a preset location, where the preset location is the same as the storage target file and the non-target password.
  • the location of the target file is different, and part of the content in the copied target file is changed. Get the second file.
  • the content to be changed may be: the sequence of steps in the flowchart in the file, numerical information, alphabetical order, or random modification of data in the table.
  • the file processing method by receiving the input decryption password of the file to be decrypted; querying the corresponding first file from the association relationship between the pre-stored password and the file; displaying the first file corresponding to the decryption password .
  • This method can realize that any decryption password has a corresponding display file, and no password error prompt will be given, so as to achieve the effect of confusing the real one, preventing those who want to steal the file information from completing the password cracking by trying the password for many times, and ensuring information security. .
  • FIG. 4 is a schematic structural diagram of a file processing apparatus provided by an embodiment of the present application, which specifically includes:
  • the receiving device 401 is configured to receive the decryption password of the input file to be decrypted
  • the query module 402 is configured to query the corresponding first file from the pre-stored association between the password and the file;
  • the display module 403 is configured to display the first file corresponding to the decrypted password.
  • the query module 402 is specifically configured to, when it is determined that the decryption password is the target password, query the target file corresponding to the target password from the association relationship as the first file; When the decryption password is a non-target password, the non-target file corresponding to the non-target password is queried from the association relationship as the first file.
  • the query module 402 is further configured to use the non-target file as the first file when the decryption password is any of the non-target passwords.
  • the query module 402 is further configured to, when the non-target password in the association relationship includes the decryption password, query from a plurality of the non-target files corresponding to the decryption password A non-target file is used as the first file.
  • the query module 402 is further configured to randomly select one of the non-target files from a plurality of non-target files when neither the target password nor the non-target password in the association relationship includes the decryption password.
  • a non-target file is used as the first file.
  • the query module 402 is further configured to use the candidate file as the first file when the target password and the non-target password in the association relationship do not contain the decryption password.
  • the query module 402 is further configured to set the attribute of the non-target file and/or the candidate file to be hidden.
  • the query module 402 is further configured to copy the target file to a preset location when neither the target password nor the non-target password in the association relationship includes the decryption password, and the copied Part of the content in the target file is changed, and the changed target file is used as the second file;
  • the display module 403 is specifically configured to display the second file corresponding to the decryption password.
  • the file processing apparatus provided in this embodiment may be the file processing apparatus shown in FIG. 4 , and can execute all steps of the file processing method shown in FIG. 1-3 , thereby realizing the technical effect of the file processing method shown in FIG. 1-3 , please refer to the related descriptions in FIGS. 1-3 for details. For the sake of brevity, details are not repeated here.
  • FIG. 5 is a schematic structural diagram of a smart device according to an embodiment of the present application.
  • the smart device 500 shown in FIG. 5 includes: at least one processor 501 , memory 502 , at least one network interface 504 and other user interfaces 503 .
  • the various components in smart device 500 are coupled together by bus system 505 . It is understood that the bus system 505 is used to implement the connection communication between these components.
  • the bus system 505 also includes a power bus, a control bus and a status signal bus. However, for clarity of illustration, the various buses are labeled as bus system 505 in FIG. 5 .
  • the user interface 503 may include a display, a keyboard, or a pointing device (eg, a mouse, a trackball, a touch pad or a touch screen, etc.).
  • a pointing device eg, a mouse, a trackball, a touch pad or a touch screen, etc.
  • the memory 502 in this embodiment of the present application may be a volatile memory or a non-volatile memory, or may include both volatile and non-volatile memory.
  • the non-volatile memory may be a read-only memory (Read-Only Memory, ROM), a programmable read-only memory (Programmable ROM, PROM), an erasable programmable read-only memory (Erasable PROM, EPROM), an electrically programmable read-only memory (Erasable PROM, EPROM). Erase programmable read-only memory (Electrically EPROM, EEPROM) or flash memory.
  • Volatile memory may be Random Access Memory (RAM), which acts as an external cache.
  • RAM Static RAM
  • DRAM Dynamic RAM
  • SDRAM Synchronous DRAM
  • SDRAM double data rate synchronous dynamic random access memory
  • Double Data Rate SDRAM DDRSDRAM
  • enhanced SDRAM ESDRAM
  • synchronous link dynamic random access memory Synch link DRAM, SLDRAM
  • Direct Rambus RAM Direct Rambus RAM
  • memory 502 stores the following elements, executable units or data structures, or subsets thereof, or extended sets of them: operating system 5021 and applications 5022 .
  • the operating system 5021 includes various system programs, such as a framework layer, a core library layer, a driver layer, etc., for implementing various basic services and processing hardware-based tasks.
  • the application program 5022 includes various application programs, such as a media player (Media Player), a browser (Browser), etc., for implementing various application services.
  • the program for implementing the method of the embodiment of the present application may be included in the application program 5022 .
  • the processor 501 by calling the program or instruction stored in the memory 502, specifically, the program or instruction stored in the application program 5022, the processor 501 is configured to execute the method steps provided by each method embodiment, for example, including :
  • Receive the input decryption password of the file to be decrypted ; query the corresponding first file from the pre-stored association between the password and the file; and display the first file corresponding to the decrypted password.
  • a target file corresponding to the target password is queried from the association relationship as the first file; when it is determined that the decryption password is a non-target password , and query the non-target file corresponding to the non-target password from the association relationship as the first file.
  • the non-target file is used as the first file.
  • a non-target file corresponding to the decryption password is queried from a plurality of the non-target files as the first file.
  • a non-target file is randomly selected from a plurality of the non-target files as the first file.
  • the candidate file is used as the first file.
  • the attributes of the non-target files and/or the candidate files are set to be hidden.
  • the methods disclosed in the above embodiments of the present application may be applied to the processor 501 or implemented by the processor 501 .
  • the processor 501 may be an integrated circuit chip with signal processing capability. In the implementation process, each step of the above-mentioned method can be completed by an integrated logic circuit of hardware in the processor 501 or an instruction in the form of software.
  • the above-mentioned processor 501 can be a general-purpose processor, a digital signal processor (Digital Signal Processor, DSP), an application specific integrated circuit (Application Specific Integrated Circuit, ASIC), a ready-made programmable gate array (Field Programmable Gate Array, FPGA) or other Programmable logic devices, discrete gate or transistor logic devices, discrete hardware components.
  • a general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
  • the steps of the method disclosed in conjunction with the embodiments of the present application may be directly embodied as executed by a hardware decoding processor, or executed by a combination of hardware and software units in the decoding processor.
  • the software unit may be located in random access memory, flash memory, read-only memory, programmable read-only memory or electrically erasable programmable memory, registers and other storage media mature in the art.
  • the storage medium is located in the memory 502, and the processor 501 reads the information in the memory 502, and completes the steps of the above method in combination with its hardware.
  • the embodiments described herein may be implemented in hardware, software, firmware, middleware, microcode, or a combination thereof.
  • the processing unit can be implemented in one or more Application Specific Integrated Circuits (ASIC), Digital Signal Processing (DSP), Digital Signal Processing Device (DSPDevice, DSPD), programmable logic Devices (Programmable Logic Devices, PLDs), Field-Programmable Gate Arrays (FPGAs), general purpose processors, controllers, microcontrollers, microprocessors, other electronics for performing the functions described in this application unit or a combination thereof.
  • ASIC Application Specific Integrated Circuits
  • DSP Digital Signal Processing
  • DSPDevice Digital Signal Processing Device
  • DSPD programmable logic Devices
  • PLDs programmable Logic Devices
  • FPGAs Field-Programmable Gate Arrays
  • general purpose processors controllers, microcontrollers, microprocessors, other electronics for performing the functions described in this application unit or a combination thereof.
  • the techniques described herein may be implemented by means of units that perform the functions described herein.
  • Software codes may be stored in memory and executed by a processor.
  • the memory can be implemented in the processor or external to the processor.
  • the smart device provided in this embodiment may be the smart device shown in FIG. 5 , and can execute all the steps of the file processing method shown in FIG. 1-3 , thereby realizing the technical effect of the file processing method shown in FIG. 1-3 .
  • the smart device may be the smart device shown in FIG. 5 , and can execute all the steps of the file processing method shown in FIG. 1-3 , thereby realizing the technical effect of the file processing method shown in FIG. 1-3 .
  • FIGS. 1-3 for the sake of brevity, details are not repeated here.
  • the embodiments of the present application also provide a storage medium (computer-readable storage medium).
  • the storage medium here stores one or more programs.
  • the storage medium may include volatile memory, such as random access memory; the memory may also include non-volatile memory, such as read-only memory, flash memory, hard disk or solid-state hard disk; the memory may also include the above-mentioned types of memory. combination.
  • the processor is used to execute the file processing program stored in the memory, so as to realize the following steps of the file processing method executed on the smart device side:
  • Receive the input decryption password of the file to be decrypted ; query the corresponding first file from the pre-stored association between the password and the file; and display the first file corresponding to the decrypted password.
  • a target file corresponding to the target password is queried from the association relationship as the first file; when it is determined that the decryption password is a non-target password , and query the non-target file corresponding to the non-target password from the association relationship as the first file.
  • the non-target file is used as the first file.
  • a non-target file corresponding to the decryption password is queried from a plurality of the non-target files as the first file.
  • a non-target file is randomly selected from a plurality of the non-target files as the first file.
  • the candidate file is used as the first file.
  • the attributes of the non-target files and/or the candidate files are set to be hidden.
  • a software module can be placed in random access memory (RAM), internal memory, read only memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, removable disk, CD-ROM, or any other in the technical field. in any other known form of storage medium.
  • RAM random access memory
  • ROM read only memory
  • electrically programmable ROM electrically erasable programmable ROM
  • registers hard disk, removable disk, CD-ROM, or any other in the technical field. in any other known form of storage medium.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Databases & Information Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Library & Information Science (AREA)
  • Storage Device Security (AREA)

Abstract

一种文件处理方法、装置、智能设备及存储介质,所述方法包括:接收输入的待解密文件的解密密码(S11);从预先存储的密码与文件的关联关系中查询对应的第一文件(S12);展示与所述解密密码对应的第一文件(S13)。由此方法,可以实现真实密码打开真实文件,任何非真实密码也可以打开对应文件,达到以假乱真的效果,防止其他人通过多次尝试密码导致密码被破解成功。

Description

文件处理方法、装置、智能设备及存储介质
本申请要求于2020年12月23日提交中国专利局、申请号为202011556984.3、申请名称“文件处理方法、装置、智能设备及存储介质”的中国专利申请的优先权,其全部内容通过引用结合在本发明中。
技术领域
本申请实施例涉及文件处理领域,尤其涉及一种文件处理方法、装置、智能设备及存储介质。
背景技术
现如今,随着智能设备的普及,人们日常的工作、生活和学习等越来越离不开智能设备。人们经常会将一些重要文件或隐私等存储于智能设备上。因此,智能设备的安全性、保密性等问题越来越被人们重视。
但是,现有的文件加密方式只能为文件设置一个密码,当输入的密码为正确密码时,便可以解密文件并展示文件内容,当输入的密码为错误密码时,便会提示密码错误,没有对应文件可供展示,达不到以假乱真的效果,这就可能使得想要窃取文件信息的人员通过多次尝试密码完成密码的破解,仍然会造成隐私泄露。
发明内容
鉴于此,为解决上述文件解密时多次输入错误密码容易破解密码导致文件泄露的技术问题,本申请实施例提供一种文件处理方法、装置、智能设备及存储介质。
第一方面,本申请实施例提供一种文件处理方法,包括:
接收输入的待解密文件的解密密码;
从预先存储的密码与文件的关联关系中查询对应的第一文件;
展示与所述解密密码对应的第一文件。
在一个可能的实施方式中,所述方法还包括:
在确定所述解密密码为目标密码时,从所述关联关系查询与所述目标密码对应的目标文件作为第一文件;
在确定所述解密密码为非目标密码时,从所述关联关系查询与所述非目标密码对应的非目标文件作为第一文件。
在一个可能的实施方式中,所述方法还包括:
在所述解密密码为任一所述非目标密码时,将所述非目标文件作为第一文件。
在一个可能的实施方式中,所述方法还包括:
在所述关联关系中的非目标密码包含所述解密密码时,从多个所述非目标文件查询与所述解密密码对应的非目标文件作为第一文件。
在一个可能的实施方式中,所述方法还包括:
在所述关联关系中的目标密码和非目标密码均未包含所述解密密码时,从多个所述非目标文件随机选取一非目标文件作为第一文件。
在一个可能的实施方式中,所述方法还包括:
在所述关联关系中的目标密码和非目标密码均未包含所述解密密码时,将所述备选文件作为第一文件。
在一个可能的实施方式中,所述方法还包括:
将非目标文件和/或备选文件的属性设置为隐藏。
在一个可能的实施方式中,所述方法还包括:
在所述关联关系中的目标密码和非目标密码均未包含所述解密密码时,复制目标文件至预设位置,对复制后的所述目标文件中的部分内容进行更改,将更改后的目标文件作为第二文件;
展示与所述解密密码对应的第二文件。
第二方面,本申请实施例提供一种文件处理装置,包括:
接收装置,设置为接收输入的待解密文件的解密密码;
查询模块,设置为从预先存储的密码与文件的关联关系中查询对应的第一文件;
展示模块,设置为展示与所述解密密码对应的第一文件。
第三方面,本申请实施例提供一种智能设备,包括:处理器和存储器,所述处理器用于执行所述存储器中存储的文件处理程序,以实现上述第一方面中所述的文件处理方法。
第四方面,本申请实施例提供一种存储介质,包括:所述存储介质存储有一个或者多个程序,所述一个或者多个程序可被一个或者多个处理器执行,以实现上述第一方面中所述的文件处理方法。
本申请实施例提供的文件处理方案,通过接收输入的待解密文件的解密密码;从预先存储的密码与文件的关联关系中查询对应的第一文件;展示与所述解密密码对应的第一文件。由于现有技术中,针对文件解密,如果密码正确,则正常打开文件,如果密码不正确,则提示密码错误并不能打开文件。但是在某些不便展示真实文件的场景下,不能对外显示密码错误无法打开文件,而是需要将非真实文件对外展示,现有技术无法达到这一效果。由本方案,可以实现通过不同的解密密码展示内容被修改过的非真实文件,进而实现在用户不方便展示真实文件的场景下,达到以假乱真的效果,保证用户的隐私安全。
附图说明
图1为本申请实施例提供的一种文件处理方法的流程示意图;
图2为本申请实施例提供的另一种文件处理方法的流程示意图;
图3为本申请实施例提供的又一种文件处理方法的流程示意图;
图4为本申请实施例提供的一种文件处理装置的结构示意图;
图5为本申请实施例提供的一种智能设备的结构示意图。
具体实施方式
为使本申请实施例的目的、技术方案和优点更加清楚,下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。
为便于对本申请实施例的理解,下面将结合附图以具体实施例做进一步的解释说明,实施例并不构成对本申请实施例的限定。
图1为本申请实施例提供的一种文件处理方法的流程示意图,如图1所示,本方法应用于通过不同的解密密码对文件进行解密后展示不同的文件内容的场景中,其中,文件类型包括但不限于:文档、文件夹、表格、或图文等。本方法可以应用在智能手机、笔记本电脑、台式电脑、便携式计算机等一类智能设备上。
进一步地,该方法具体包括:
S11、接收输入的待解密文件的解密密码。
在本申请实施例中,在文件被设置加密密码时,根据当前文件及对应加密密码、其它文件及其它密码构建文件的关联关系,在该关联关系中包含有至少两组对应关系,对应关系可以是:当前文件(真文件)-加密密码(真密码),以及其它文件(假文件)-其它密码(假密码)。
将当前文件-加密密码、其它文件-其它密码与关联关系进行关联设置,以使在用户访问当前文件时,需要输入解密密码,并基于解密密码查询关 联关系。
在检测到用户访问当前文件(待解密文件),生成解密界面,在该解密界面中设置有用于输入解密密码的密码输入区域,通过该密码输入区域接收输入的待解码文件的解码密码。
S12、从预先存储的密码与文件的关联关系中查询对应的第一文件。
S13、展示与所述解密密码对应的第一文件。
识别用户输入的解密密码,查询文件与密码的关联关系,从关联关系中查询用户输入的解密密码对应的第一文件,如果从关联关系中查询到解密密码为真密码,则将真密码对应的真文件作为第一文件进行展示;如果从关联关系中查询到解密密码为假密码,则将假密码对应的假文件作为第一文件进行展示。
本申请实施例提供的文件处理方法,通过接收输入的待解密文件的解密密码;从预先存储的密码与文件的关联关系中查询对应的第一文件;展示与所述解密密码对应的第一文件。相比于现有文件与密码一对一的关系,访问者可通过数次尝试破译密码,设置关联关系以及不展示错误密码提示可以保证访问者每次输入的密码均有对应的文件进行展示,且只有文件创建者或文件授权者才能识别文件的真伪,达到以假乱真的目的,进而避免文件被破译,保证信息安全。
图2为本申请实施例提供的另一种文件处理方法的流程示意图,如图2所示,该方法具体包括:
S21、接收输入的待解密文件的解密密码。
在本申请的一可选实施例中,预先存储多个文件,每个文件被设置加密密码,其中,多个文件中包含有一个真文件(以下称为目标文件)和至少一个假文件(以下称为非目标文件)目标文件对应的加密密码为目标密码;,非目标文件对应的加密密码为非目标密码,目标文件和非目标文件 可以是文档、表格、文件夹等,目标文件中的内容是真实的内容,即不便对外公开的重要内容,非目标文件中的内容可以与真实内容类似,某些数据不一致,还可以是另外的可以对外公开的内容。目标文件和非目标文件可以存储在同一存储位置,也可以存储在不同存储位置中。
进一步地,根据目标文件对应的目标密码、非目标文件对应的非目标密码构建文件与密码之间的关联关系。
进一步地,文件与密码之间的关联关系可以是:相同存储位置存储有一个目标文件和一个非目标文件,其中,目标文件对应一个目标密码,非目标文件可以对应有多个非目标密码;文件与密码的关联关系以及文件的存储位置可以如表1所示:
文件名 密码 文件存储位置
目标文件 123 第一存储地址
非目标文件A 234 第一存储地址
表1
可选的,相同存储位置可以存储有一个目标文件和多个非目标文件,其中,目标文件对应一个目标密码,每个非目标文件分别对应有一个非目标密码;文件与密码的关联关系以及文件的存储位置可以如表2所示:
文件名 密码 文件存储位置
目标文件 123 第一存储地址
非目标文件A 234 第一存储地址
非目标文件B 345 第一存储地址
非目标文件C 456 第一存储地址
表2
可选的,不同存储位置可以存储有一个目标文件和多个非目标文件, 其中,目标文件对应一个目标密码,每个非目标文件分别对应有一个非目标密码,密码可以指向文件存储的位置;文件与密码的关联关系以及文件的存储位置可以如表3所示:
文件名 密码 文件存储位置
目标文件 123 第一存储地址
非目标文件A 234 第二存储地址
非目标文件B 345 第三存储地址
非目标文件C 456 第四存储地址
表3
可选的,不同存储位置可以存储有一个目标文件、多个非目标文件和一个备选文件,其中,目标文件对应一个目标密码,每个非目标文件分别对应有一个非目标密码,备选文件可以为除目标密码和多个非目标密码之外的其他密码,当文件分别存储在不同位置时,密码可以指向文件存储的位置;文件与密码的关联关系以及文件的存储位置可以如表4所示:
文件名 密码 文件存储位置
目标文件 123 第一存储地址
非目标文件A 234 第二存储地址
非目标文件B 345 第三存储地址
备选文件 567 第四存储地址
表4
进一步地,将目标文件对应的目标密码、非目标文件对应的非目标密码与关联关系进行关联设置,在目标文件和非目标文件存储于相同的存储位置时,在展示于文件的界面中将目标文件的属性设置为显示,将非目标 文件的属性设置为隐藏,以达到迷惑访问者展示于文件的界面仅仅显示一目标文件的目的;以使在用户访问当前文件(目标文件,也即待解密文件)时,需要输入解密密码,并基于解密密码查询关联关系。
在检测到用户访问当前文件(待解密文件),生成解密界面,在该解密界面中设置有用于输入解密密码的密码输入区域,通过该密码输入区域接收输入的待解码文件的解码密码。
S22、在确定所述解密密码为目标密码时,从所述关联关系查询与所述目标密码对应的目标文件作为第一文件。
接收到用户当前输入的解密密码后查询上述关联关系中是否存在用户当前输入的解密密码,如果存在,则根据关联关系查找到当前解密密码对应的文件,根据关联关系确定解密密码为目标密码时,将目标密码对应的目标文件作为用户当前输入的解密密码对应的第一文件,将查找到的第一文件进行展示。
例如,当前输入的解密密码为123,查询上述表中的关联关系,确定当前输入的解密密码与目标密码相同,则将目标密码对应的目标文件作为当前输入的解密密码对应的第一文件。
S23、在确定所述解密密码为非目标密码时,从所述关联关系查询与所述非目标密码对应的非目标文件作为第一文件。
在本申请实施例中,非目标文件可以为一个或多个,从预先设置的关联关系中查询到用户当前输入的解密密码为非目标密码时,将与该非目标密码对应的非目标文件作为用户当前输入的解密密码对应的第一文件。非目标文件为一个或多个时对应有不同的查询方式。
在本申请实施例的一可选方案中,仅存储有一个目标文件和一个非目标文件。其中,非目标文件在关联关系中对应的密码为任一非目标密码。
进一步地,在确定用户输入的解密密码为非目标密码时,将预先存储的非目标文件作为用户当前输入的解密密码对应的第一文件。
进一步地,将第一文件展示在智能设备显示屏上。并将目标文件的属性信息修改为隐藏,避免向外界展示文件夹下的其他文件,同时修改存储目标文件和非目标文件的文件夹的属性信息中的大小,修改的文件夹大小可以与展示的非目标文件的大小相同。
在本申请实施例的另一可选方案中,同一文件夹内存储有一个目标文件和多个非目标文件。
进一步地,在确定用户输入的解密密码为非目标密码时,查询预先设置的多个非目标密码中是否有与用户当前输入的解密密码相同的非目标密码,在多个非目标密码中如果包含有用户当前输入的解密密码时,根据关联关系查找与用户输入的解密密码相同的非目标密码对应的非目标文件,进而将查找到的非目标文件作为用户当前输入的解密密码对应的第一文件。并将文件夹下存储的其余非目标文件和目标文件的属性信息修改为隐藏,隐藏全部文件,同时修改文件夹的属性信息中的大小,修改的文件夹大小可以与展示的非目标文件的大小相同。
S24、在所述关联关系中的目标密码和非目标密码均未包含所述解密密码时,从多个所述非目标文件随机选取一非目标文件作为第一文件。
在确定用户输入的解密密码为非目标密码时,并在多个非目标密码中未包含有用户当前输入的解密密码时,可以从多个非目标文件中随机选取一个非目标文件作为第一文件进行展示。并将文件夹下存储的其余非目标文件和目标文件的属性信息修改为隐藏,隐藏全部文件,同时修改文件夹的属性信息中的大小,修改的文件夹大小可以与展示的非目标文件的大小相同。
可选的,还可以存储一个备选文件,该备选文件可以存储在与一个目标文件和多个非目标文件相同的文件夹下,还可以存储在另外文件夹下,在目标密码和多个非目标密码中均未包含用户当前输入的解密密码时,可以将备选文件作为第一文件进行展示。
本申请实施例提供的文件处理方法,通过接收输入的待解密文件的解密密码;从预先存储的密码与文件的关联关系中查询对应的第一文件;展示与所述解密密码对应的第一文件。由此方法,可以实现任一解密密码均存在对应的展示文件,不会进行密码错误提示,达到以假乱真的效果,防止想要窃取文件信息的人员通过多次尝试密码完成密码的破解,保证信息安全。
图3为本申请实施例提供的又一种文件处理方法的流程示意图,如图3所示,该方法具体包括:
S31、接收输入的待解密文件的解密密码。
S32、在确定所述解密密码为目标密码时,从所述关联关系查询与所述目标密码对应的目标文件作为第一文件。
在本申请实施例中,预先存储有一个目标文件和多个非目标文件。目标文件和非目标文件可以在同一文件夹下。
进一步地,用户在密码输入框内输入解密密码,智能设备接收用户当前输入的解密密码。在确定当前解密密码为目标密码时,根据关联关系确定将目标密码对应的目标文件作为用户当前输入的解密密码对应的第一文件。
S33、在确定所述解密密码为非目标密码时,从所述关联关系查询与所述非目标密码对应的非目标文件作为第一文件。
在确定用户当前输入的解密密码包含在预先存储的多个非目标密码中时,从预先设置的关联关系中查询与该非目标密码对应的非目标文件,将非目标文件作为用户当前输入的解密密码对应的第一文件。
S34、在所述关联关系中的目标密码和非目标密码均未包含所述解密密码时,复制目标文件至预设位置,对复制后的所述目标文件中的部分内容进行更改,将更改后的目标文件作为第二文件。
S35、展示与所述解密密码对应的第二文件。
在确定用户输入的解密密码不包含在目标密码和非目标密码中时,可以将目标文件进行复制,将复制得到的目标文件存储到预设位置,其中,该预设位置与存储目标文件和非目标文件的位置不同,进而将复制后的目标文件内的部分内容进行更改。得到第二文件。其中,更改的内容可以是:文件中的流程图的步骤顺序、数字信息、字母顺序或表格中的数据随机修改等。
进一步地,将第二文件进行展示。
本申请实施例提供的文件处理方法,通过接收输入的待解密文件的解密密码;从预先存储的密码与文件的关联关系中查询对应的第一文件;展示与所述解密密码对应的第一文件。由此方法,可以实现任一解密密码均存在对应的展示文件,不会进行密码错误提示,达到以假乱真的效果,防止想要窃取文件信息的人员通过多次尝试密码完成密码的破解,保证信息安全。
图4为本申请实施例提供的一种文件处理装置的结构示意图,具体包括:
接收装置401,设置为接收输入的待解密文件的解密密码;
查询模块402,设置为从预先存储的密码与文件的关联关系中查询对应的第一文件;
展示模块403,设置为展示与所述解密密码对应的第一文件。
在一个可能的实施方式中,所述查询模块402,具体用于在确定所述解密密码为目标密码时,从所述关联关系查询与所述目标密码对应的目标文件作为第一文件;在确定所述解密密码为非目标密码时,从所述关联关系查询与所述非目标密码对应的非目标文件作为第一文件。
在一个可能的实施方式中,所述查询模块402,还设置为在所述解密 密码为任一所述非目标密码时,将所述非目标文件作为第一文件。
在一个可能的实施方式中,所述查询模块402,还设置为在所述关联关系中的非目标密码包含所述解密密码时,从多个所述非目标文件查询与所述解密密码对应的非目标文件作为第一文件。
在一个可能的实施方式中,所述查询模块402,还设置为在所述关联关系中的目标密码和非目标密码均未包含所述解密密码时,从多个所述非目标文件随机选取一非目标文件作为第一文件。
在一个可能的实施方式中,所述查询模块402,还设置为在所述关联关系中的目标密码和非目标密码未包含所述解密密码时,将所述备选文件作为第一文件。
在一个可能的实施方式中,所述查询模块402,还设置为将非目标文件和/或备选文件的属性设置为隐藏。
在一个可能的实施方式中,所述查询模块402,还设置为在所述关联关系中的目标密码和非目标密码均未包含所述解密密码时,复制目标文件至预设位置,对复制后的所述目标文件中的部分内容进行更改,将更改后的目标文件作为第二文件;
在一个可能的实施方式中,所述展示模块403,具体设置为展示与所述解密密码对应的第二文件。
本实施例提供的文件处理装置可以是如图4中所示的文件处理装置,可执行如图1-3中文件处理方法的所有步骤,进而实现图1-3所示文件处理方法的技术效果,具体请参照图1-3相关描述,为简洁描述,在此不作赘述。
图5为本申请实施例提供的一种智能设备的结构示意图,图5所示的智能设备500包括:至少一个处理器501、存储器502、至少一个网络接口504和其他用户接口503。智能设备500中的各个组件通过总线系统505 耦合在一起。可理解,总线系统505用于实现这些组件之间的连接通信。总线系统505除包括数据总线之外,还包括电源总线、控制总线和状态信号总线。但是为了清楚说明起见,在图5中将各种总线都标为总线系统505。
其中,用户接口503可以包括显示器、键盘或者点击设备(例如,鼠标,轨迹球(trackball)、触感板或者触摸屏等。
可以理解,本申请实施例中的存储器502可以是易失性存储器或非易失性存储器,或可包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(Read-Only Memory,ROM)、可编程只读存储器(Programmable ROM,PROM)、可擦除可编程只读存储器(Erasable PROM,EPROM)、电可擦除可编程只读存储器(Electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(Random Access Memory,RAM),其用作外部高速缓存。通过示例性但不是限制性说明,许多形式的RAM可用,例如静态随机存取存储器(Static RAM,SRAM)、动态随机存取存储器(Dynamic RAM,DRAM)、同步动态随机存取存储器(Synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(Double Data Rate SDRAM,DDRSDRAM)、增强型同步动态随机存取存储器(Enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(Synch link DRAM,SLDRAM)和直接内存总线随机存取存储器(Direct Rambus RAM,DRRAM)。本文描述的存储器502旨在包括但不限于这些和任意其它适合类型的存储器。
在一些实施方式中,存储器502存储了如下的元素,可执行单元或者数据结构,或者他们的子集,或者他们的扩展集:操作系统5021和应用程序5022。
其中,操作系统5021,包含各种系统程序,例如框架层、核心库层、驱动层等,用于实现各种基础业务以及处理基于硬件的任务。应用程序5022,包含各种应用程序,例如媒体播放器(Media Player)、浏览器(Browser) 等,用于实现各种应用业务。实现本申请实施例方法的程序可以包含在应用程序5022中。
在本申请实施例中,通过调用存储器502存储的程序或指令,具体的,可以是应用程序5022中存储的程序或指令,处理器501用于执行各方法实施例所提供的方法步骤,例如包括:
接收输入的待解密文件的解密密码;从预先存储的密码与文件的关联关系中查询对应的第一文件;展示与所述解密密码对应的第一文件。
在一个可能的实施方式中,在确定所述解密密码为目标密码时,从所述关联关系查询与所述目标密码对应的目标文件作为第一文件;在确定所述解密密码为非目标密码时,从所述关联关系查询与所述非目标密码对应的非目标文件作为第一文件。
在一个可能的实施方式中,在所述解密密码为任一所述非目标密码时,将所述非目标文件作为第一文件。
在一个可能的实施方式中,在所述关联关系中的非目标密码包含所述解密密码时,从多个所述非目标文件查询与所述解密密码对应的非目标文件作为第一文件。
在一个可能的实施方式中,在所述关联关系中的目标密码和非目标密码均未包含所述解密密码时,从多个所述非目标文件随机选取一非目标文件作为第一文件。
在一个可能的实施方式中,在所述关联关系中的目标密码和非目标密码均未包含所述解密密码时,将所述备选文件作为第一文件。
在一个可能的实施方式中,将非目标文件和/或备选文件的属性设置为隐藏。
在一个可能的实施方式中,在所述关联关系中的目标密码和非目标密码均未包含所述解密密码时,复制目标文件至预设位置,对复制后的所述目标文件中的部分内容进行更改,将更改后的目标文件作为第二文件;展 示与所述解密密码对应的第二文件。
上述本申请实施例揭示的方法可以应用于处理器501中,或者由处理器501实现。处理器501可能是一种集成电路芯片,具有信号的处理能力。在实现过程中,上述方法的各步骤可以通过处理器501中的硬件的集成逻辑电路或者软件形式的指令完成。上述的处理器501可以是通用处理器、数字信号处理器(Digital Signal Processor,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、现成可编程门阵列(Field Programmable Gate Array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件。可以实现或者执行本申请实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。结合本申请实施例所公开的方法的步骤可以直接体现为硬件译码处理器执行完成,或者用译码处理器中的硬件及软件单元组合执行完成。软件单元可以位于随机存储器,闪存、只读存储器,可编程只读存储器或者电可擦写可编程存储器、寄存器等本领域成熟的存储介质中。该存储介质位于存储器502,处理器501读取存储器502中的信息,结合其硬件完成上述方法的步骤。
可以理解的是,本文描述的这些实施例可以用硬件、软件、固件、中间件、微码或其组合来实现。对于硬件实现,处理单元可以实现在一个或多个专用集成电路(Application Specific Integrated Circuits,ASIC)、数字信号处理器(Digital Signal Processing,DSP)、数字信号处理设备(DSPDevice,DSPD)、可编程逻辑设备(Programmable Logic Device,PLD)、现场可编程门阵列(Field-Programmable Gate Array,FPGA)、通用处理器、控制器、微控制器、微处理器、用于执行本申请所述功能的其它电子单元或其组合中。
对于软件实现,可通过执行本文所述功能的单元来实现本文所述的技术。软件代码可存储在存储器中并通过处理器执行。存储器可以在处理器中或在处理器外部实现。
本实施例提供的智能设备可以是如图5中所示的智能设备,可执行如图1-3中文件处理方法的所有步骤,进而实现图1-3所示文件处理方法的技术效果,具体请参照图1-3相关描述,为简洁描述,在此不作赘述。
本申请实施例还提供了一种存储介质(计算机可读存储介质)。这里的存储介质存储有一个或者多个程序。其中,存储介质可以包括易失性存储器,例如随机存取存储器;存储器也可以包括非易失性存储器,例如只读存储器、快闪存储器、硬盘或固态硬盘;存储器还可以包括上述种类的存储器的组合。
当存储介质中一个或者多个程序可被一个或者多个处理器执行,以实现上述在智能设备侧执行的文件处理方法。
所述处理器用于执行存储器中存储的文件处理程序,以实现以下在智能设备侧执行的文件处理方法的步骤:
接收输入的待解密文件的解密密码;从预先存储的密码与文件的关联关系中查询对应的第一文件;展示与所述解密密码对应的第一文件。
在一个可能的实施方式中,在确定所述解密密码为目标密码时,从所述关联关系查询与所述目标密码对应的目标文件作为第一文件;在确定所述解密密码为非目标密码时,从所述关联关系查询与所述非目标密码对应的非目标文件作为第一文件。
在一个可能的实施方式中,在所述解密密码为任一所述非目标密码时,将所述非目标文件作为第一文件。
在一个可能的实施方式中,在所述关联关系中的非目标密码包含所述解密密码时,从多个所述非目标文件查询与所述解密密码对应的非目标文件作为第一文件。
在一个可能的实施方式中,在所述关联关系中的目标密码和非目标密码均未包含所述解密密码时,从多个所述非目标文件随机选取一非目标文件作为第一文件。
在一个可能的实施方式中,在所述关联关系中的目标密码和非目标密码均未包含所述解密密码时,将所述备选文件作为第一文件。
在一个可能的实施方式中,将非目标文件和/或备选文件的属性设置为隐藏。
在一个可能的实施方式中,在所述关联关系中的目标密码和非目标密码均未包含所述解密密码时,复制目标文件至预设位置,对复制后的所述目标文件中的部分内容进行更改,将更改后的目标文件作为第二文件;展示与所述解密密码对应的第二文件。
专业人员应该还可以进一步意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、计算机软件或者二者的结合来实现,为了清楚地说明硬件和软件的可互换性,在上述说明中已经按照功能一般性地描述了各示例的组成及步骤。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
结合本文中所公开的实施例描述的方法或算法的步骤可以用硬件、处理器执行的软件模块,或者二者的结合来实施。软件模块可以置于随机存储器(RAM)、内存、只读存储器(ROM)、电可编程ROM、电可擦除可编程ROM、寄存器、硬盘、可移动磁盘、CD-ROM、或技术领域内所公知的任意其它形式的存储介质中。
以上所述的具体实施方式,对本申请的目的、技术方案和有益效果进行了进一步详细说明,所应理解的是,以上所述仅为本申请的具体实施方式而已,并不用于限定本申请的保护范围,凡在本申请的精神和原则之内,所做的任何修改、等同替换、改进等,均应包含在本申请的保护范围之内。

Claims (11)

  1. 一种文件处理方法,包括:
    接收输入的待解密文件的解密密码;
    从预先存储的密码与文件的关联关系中查询对应的第一文件;
    展示与所述解密密码对应的第一文件。
  2. 根据权利要求1所述的方法,其中,所述从预先存储的密码与文件的关联关系中查询对应的第一文件,包括:
    在确定所述解密密码为目标密码时,从所述关联关系查询与所述目标密码对应的目标文件作为第一文件;
    在确定所述解密密码为非目标密码时,从所述关联关系查询与所述非目标密码对应的非目标文件作为第一文件。
  3. 根据权利要求2所述的方法,其中,所述关联关系中包括一个所述非目标文件;
    所述从所述关联关系查询与所述非目标密码对应的非目标文件作为第一文件,包括:
    在所述解密密码为任一所述非目标密码时,将所述非目标文件作为第一文件。
  4. 根据权利要求2所述的方法,其中,所述关联关系中包括多个所述非目标文件;
    所述从所述关联关系查询与所述非目标密码对应的非目标文件作为第一文件,包括:
    在所述关联关系中的非目标密码包含所述解密密码时,从多个所述非目标文件查询与所述解密密码对应的非目标文件作为第一文件。
  5. 根据权利要求4所述的方法,其中,所述方法还包括:
    在所述关联关系中的目标密码和非目标密码均未包含所述解密密码时,从多个所述非目标文件随机选取一非目标文件作为第一文件。
  6. 根据权利要求3所述的方法,其中,所述关联关系中还包括备选文件;
    所述从所述关联关系查询与所述非目标密码对应的非目标文件作为第一文件,包括:
    在所述关联关系中的目标密码和非目标密码均未包含所述解密密码时,将所述备选文件作为第一文件。
  7. 根据权利要求2-6任一所述的方法,其中,所述方法还包括:
    将非目标文件和/或备选文件的属性设置为隐藏。
  8. 根据权利要求2所述的方法,其中,所述方法还包括:
    在所述关联关系中的目标密码和非目标密码均未包含所述解密密码时,复制目标文件至预设位置,对复制后的所述目标文件中的部分内容进行更改,将更改后的目标文件作为第二文件;
    展示与所述解密密码对应的第二文件。
  9. 一种文件处理装置,包括:
    接收装置,设置为接收输入的待解密文件的解密密码;
    查询模块,设置为从预先存储的密码与文件的关联关系中查询对应的第一文件;
    展示模块,设置为展示与所述解密密码对应的第一文件。
  10. 一种智能设备,包括:处理器和存储器,所述处理器用于执行所述存储器中存储的文件处理程序,以实现权利要求1~7中任一项所述的文件处理方法。
  11. 一种存储介质,所述存储介质存储有一个或者多个程序,所述一个或者多个程序可被一个或者多个处理器执行,以实现权利要求1~7中任 一项所述的文件处理方法。
PCT/CN2021/107163 2020-12-23 2021-07-19 文件处理方法、装置、智能设备及存储介质 WO2022134559A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202011556984.3A CN112597537B (zh) 2020-12-23 2020-12-23 文件处理方法、装置、智能设备及存储介质
CN202011556984.3 2020-12-23

Publications (1)

Publication Number Publication Date
WO2022134559A1 true WO2022134559A1 (zh) 2022-06-30

Family

ID=75201965

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/107163 WO2022134559A1 (zh) 2020-12-23 2021-07-19 文件处理方法、装置、智能设备及存储介质

Country Status (2)

Country Link
CN (1) CN112597537B (zh)
WO (1) WO2022134559A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117931755A (zh) * 2024-03-22 2024-04-26 上海合见工业软件集团有限公司 批量导入封装库的方法、装置、设备和介质

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112597537B (zh) * 2020-12-23 2024-04-09 珠海格力电器股份有限公司 文件处理方法、装置、智能设备及存储介质
CN113486191B (zh) * 2021-06-25 2024-04-05 北京计算机技术及应用研究所 一种涉密电子文件定解密方法

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102750497A (zh) * 2012-07-20 2012-10-24 腾讯科技(深圳)有限公司 一种解密隐私内容的方法及装置
CN103455737A (zh) * 2012-05-28 2013-12-18 百度在线网络技术(北京)有限公司 用户信息的保护方法及装置
US20140189349A1 (en) * 2012-12-28 2014-07-03 International Business Machines Corporation Decrypting Files for Data Leakage Protection in an Enterprise Network
CN111931134A (zh) * 2020-08-04 2020-11-13 高邮诺雷成科技有限公司 一种计算机系统的加密方法
CN112597537A (zh) * 2020-12-23 2021-04-02 珠海格力电器股份有限公司 文件处理方法、装置、智能设备及存储介质

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6941456B2 (en) * 2001-05-02 2005-09-06 Sun Microsystems, Inc. Method, system, and program for encrypting files in a computer system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103455737A (zh) * 2012-05-28 2013-12-18 百度在线网络技术(北京)有限公司 用户信息的保护方法及装置
CN102750497A (zh) * 2012-07-20 2012-10-24 腾讯科技(深圳)有限公司 一种解密隐私内容的方法及装置
US20140189349A1 (en) * 2012-12-28 2014-07-03 International Business Machines Corporation Decrypting Files for Data Leakage Protection in an Enterprise Network
CN111931134A (zh) * 2020-08-04 2020-11-13 高邮诺雷成科技有限公司 一种计算机系统的加密方法
CN112597537A (zh) * 2020-12-23 2021-04-02 珠海格力电器股份有限公司 文件处理方法、装置、智能设备及存储介质

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117931755A (zh) * 2024-03-22 2024-04-26 上海合见工业软件集团有限公司 批量导入封装库的方法、装置、设备和介质

Also Published As

Publication number Publication date
CN112597537A (zh) 2021-04-02
CN112597537B (zh) 2024-04-09

Similar Documents

Publication Publication Date Title
WO2022134559A1 (zh) 文件处理方法、装置、智能设备及存储介质
EP3750094B1 (en) Systems and methods for use in managing digital identities
US11902601B2 (en) System and techniques for digital data lineage verification
WO2019095563A1 (zh) 屏幕水印的显示方法、装置、计算机设备及存储介质
US8489889B1 (en) Method and apparatus for restricting access to encrypted data
US9582656B2 (en) Systems for validating hardware devices
US8417969B2 (en) Storage volume protection supporting legacy systems
JP2016001481A (ja) 無線デバイスのためのプログレッシブブート
US9661001B2 (en) User interface for selection of multiple accounts and connection points
US11567647B2 (en) Dynamic credit report obfuscation
WO2020000797A1 (zh) 个人档案信息的获取方法及服务器
WO2022237046A1 (zh) 一种数据加密方法及计算设备
JP2015505221A (ja) 無効なエスクロー・キーの検出
US10146926B2 (en) Differentiated authentication for compartmentalized computing resources
US9256754B2 (en) Data protection method and electronic device capable of creating a private folder having a same name as a public folder to hide private data
JP6717131B2 (ja) 制御プログラム、制御方法、情報処理装置、復号プログラム、復号方法、及び端末装置
JP6755539B2 (ja) ネットワークに著作物を公開するための方法および装置
CN110998583B (zh) 识别和保护个人敏感文档
CN115470525B (zh) 一种文件保护方法、系统、计算设备及存储介质
CN112231717A (zh) 加密文件文件名的处理方法、装置、电子设备及存储介质
TWI263432B (en) Data security method for storage apparatus and storage media and electronic device
GB2434887A (en) Access control by encrypting stored data with a key based on a "fingerprint" of the device storing the data
WO2023244383A1 (en) Preventing data spillage in multi-tenant services via request and response containerization with provenance checks
JP5305864B2 (ja) 情報処理装置、情報処理方法及び情報処理プログラム
CN112214778A (zh) 一种通过虚拟文件实现本地文件离散加密的方法及系统

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21908564

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21908564

Country of ref document: EP

Kind code of ref document: A1