WO2023216989A1 - 转换文件格式的方法和电子设备 - Google Patents

转换文件格式的方法和电子设备 Download PDF

Info

Publication number
WO2023216989A1
WO2023216989A1 PCT/CN2023/092275 CN2023092275W WO2023216989A1 WO 2023216989 A1 WO2023216989 A1 WO 2023216989A1 CN 2023092275 W CN2023092275 W CN 2023092275W WO 2023216989 A1 WO2023216989 A1 WO 2023216989A1
Authority
WO
WIPO (PCT)
Prior art keywords
file
application
document
target
linked
Prior art date
Application number
PCT/CN2023/092275
Other languages
English (en)
French (fr)
Inventor
胡慧锋
付天福
李东锋
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2023216989A1 publication Critical patent/WO2023216989A1/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/10Text processing
    • G06F40/12Use of codes for handling textual entities
    • G06F40/151Transformation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems

Definitions

  • Embodiments of the present application relate to the field of electronic technology, and in particular, to a method and electronic device for converting a file format.
  • File permission management is very important for people who use files. For example, in order to ensure file security, the file owner can add permissions to a file, which can include the user account authorized to access, set permission types such as read-only, full control, etc. File visitors can access the file according to their corresponding permissions.
  • Embodiments of the present application provide a method and electronic device for converting file formats, in order to realize automatic conversion of file formats for the application program at the system level when the application program reads and writes permission files.
  • a method for converting a file format includes: obtaining a first operation of opening a target file sent by a first application to a second application; generating a link file according to the first operation, so The linked file is associated with the file; and the linked file is sent to the second application.
  • this method can be applied to the electronic device, the operating system of the electronic device, or a certain module of the operating system of the electronic device, which is not limited by the embodiments of the present application.
  • the target file is a permissions file.
  • the permission file can be a document or a multimedia file such as video, audio, animation, etc.
  • the first operation of opening a file sent by the first application to the second application can be obtained, and a link file can be generated based on the first operation.
  • the link file is associated with the target file, and then sent to the second application.
  • the application sends the linked file. Therefore, the second application can perform corresponding operations on the link file. Since the link file has a corresponding relationship with the target file, it can be converted to perform corresponding operations on the target file, and the conversion process is imperceptible to the second application. This avoids the need for the second application to perform additional adaptation work for opening the target file.
  • the method further includes: detecting a second operation performed by the second application program on the linked file; The second operation of linking the file is converted into a second operation on the target file.
  • the second operation after detecting the second operation performed by the second application program on the linked file, the second operation can be automatically converted into a second operation performed on the target file.
  • This technical solution can realize the file conversion process in the system without being aware of the second application, and can avoid the second application to perform additional steps to open the target file. adaptation.
  • the second operation when the second operation is a read operation, the second operation of the second application program on the linked file is converted into a second operation on the linked file.
  • the second operation performed on the target file includes: reading the target file from the target address.
  • the actual storage location of the target file is the target address in the memory chip.
  • the second application program when the second application program performs a read operation on the linked file, it can be automatically converted into a read operation on the target file. At this point, the target file can be read from the target address where the target file is actually stored.
  • the second application can read the permission file without making any modifications such as adaptation or integrating the SDK.
  • the read operation may correspond to reading the text content of the target file, or may also correspond to reading the file attribute content of the target file.
  • the method further includes: decrypting the target file to obtain the plain text of the target file; sending the plain text of the target file to the third Two applications.
  • the read content when reading the target file from the target address, the read content is encrypted.
  • the target file can be decrypted first to obtain the plain text of the target file, and then the plain text can be sent to the second application. This way, the user can see the clear text of the target file in the second application.
  • the method when the second operation is a write operation, the method further includes: encrypting the first content corresponding to the write operation; The first content is written into the target address.
  • the second application program when the second application program performs a write operation on the linked file, it can be automatically converted into a write operation on the target file. At this time, the first content corresponding to the write operation can be encrypted and then written into the target address where the target file is actually stored.
  • the second application can perform write operations on the permission file without any modification such as adaptation or integration of the SDK.
  • the method further includes: sending a result of successful writing of the first content to the second application.
  • the successful writing result of the first content corresponding to the writing operation can be sent to the second application program, so that the second application program can determine that the content edited by the user is written successfully.
  • the method before obtaining the first operation of opening the target file sent by the first application to the second application, the method further includes: determining that the target file is permissions file.
  • the technical solution can distinguish the types of files. For authorized files, the technical solution in this application can be executed, and for non-authorized files, it can be opened directly.
  • determining that the target file is a permission file includes: determining that the target file is a permission file based on identification information of the target file, wherein: The identification information is added by the first application program.
  • the identification information may be a special identification, such as the suffix .dlp, or the identification information may be indication information.
  • the first application when determining that the target file is a permission file, can add identification information to the target file, so that when the file system obtains the first operation, it can determine that the target file is a permission file based on the identification information.
  • determining that the target file is a permission file includes: directly determining that the target file is a permission file based on identification information of the target file.
  • identification information is not added by the first application, but is special information generated after adding permissions to the target file.
  • the first application does not need to perform any operations on the target file, and the system can also directly determine that the target file is a permission file based on the identification information of the target file.
  • the method before generating the link file according to the first operation, the method further includes: verifying the second application or the second application The permissions of the user logged in to the program.
  • verifying the permissions of the second application or the user logged in by the second application includes: obtaining the target file from the target address the authority certificate; verify the authority of the second application or the user logged in by the second application according to the authority certificate.
  • the permission certificate of the target file can be obtained from the target address, and then the corresponding permissions of the second application or the user logged in by the second application are determined based on the permission certificate.
  • the link file is an empty file.
  • link file being an empty file can be understood as: the size of the link file is 0, the included content is empty, and the file attributes are also empty.
  • the link file is an empty file, thereby avoiding a waste of file system resources when creating the link file.
  • the second operation includes any one or more of the following: a read operation of the linked file; a write operation of the linked file; The reading operation of the file attributes; the writing operation of the file attributes of the linked file; the opening operation of the linked file; the closing operation of the linked file.
  • the second application program when the second application program performs the above operation on the linked file, it can be automatically converted to perform the corresponding operation on the target file.
  • an electronic device including: one or more processors; one or more memories; the one or more memories store one or more computer programs, and the one or more computer programs Instructions are included, and when the instructions are executed by one or more processors, the method for converting the file format as described in the first aspect and any possible implementation thereof is executed.
  • a third aspect provides an electronic device, including a module for implementing the method for converting a file format as described in the first aspect and any possible implementation thereof.
  • a chip in a fourth aspect, includes a processor and a communication interface.
  • the communication interface is used to receive signals and transmit the signals to the processor.
  • the processor processes the signals. The method for converting the file format as described in the first aspect and any possible implementation thereof is executed.
  • a computer-readable storage medium is provided.
  • Computer instructions are stored in the computer-readable storage medium.
  • the method described in the first aspect and any possible method thereof is achieved.
  • the method of converting the file format described in Implementation is executed.
  • a sixth aspect provides a computer program product, including computer instructions.
  • the computer instructions When the computer instructions are run on a computer, the method for converting a file format as described in the first aspect and any possible implementation thereof is provided. quilt implement.
  • Figure 1 is a framework diagram of an application program provided by an embodiment of the present application.
  • FIG. 2 is a schematic frame diagram of an electronic device provided by an embodiment of the present application.
  • Figure 3 is a schematic flow chart of a method for converting file formats provided by an embodiment of the present application.
  • Figure 4 is a schematic diagram of a document provided by an embodiment of this application.
  • Figure 5 is a schematic flow chart of a method for converting file formats provided by an embodiment of the present application.
  • FIG. 6 is a schematic block diagram of an electronic device provided by an embodiment of the present application.
  • the electronic device in the embodiment of this application may refer to user equipment, access terminal, user unit, user station, mobile station, mobile station, remote station, remote terminal, mobile device, user terminal, terminal, wireless communication equipment, user agent or User device.
  • the terminal device may also be a cellular phone, a cordless phone, a session initiation protocol (SIP) phone, a wireless local loop (WLL) station, a personal digital assistant (PDA), a device with wireless communications Functional handheld devices, computing devices or other processing devices connected to wireless modems, vehicle-mounted devices, wearable devices, terminal devices in 5G networks or terminals in future evolved public land mobile communications networks (PLMN) Equipment, etc., the embodiments of this application are not limited to this.
  • SIP session initiation protocol
  • WLL wireless local loop
  • PDA personal digital assistant
  • Permissions file A file with permissions added.
  • the file may include documents (such as .ppt, .doc format documents), or may include audio, video, pictures, animations and other multimedia files, which are not limited in the embodiment of the present application.
  • User space Provides a space for application (application, App) to run.
  • application application, App
  • Kernel space The location where the kernel code runs. Processes running in this space can have more access to the system than processes running in user space.
  • a task executes a system call and is trapped in the kernel code for execution, the process is said to be in the kernel running state (or simply called the kernel state).
  • SDK Software development kit
  • File descriptor In the file system, most input/output operations are assigned an integer as a number, which can be used as the file descriptor for this input/output operation.
  • file permission management is very important.
  • users in order to ensure the security of files, users often need to add permissions to files.
  • the owner of a file can add permissions to a file, which can include the user account authorized to access, and set permission types such as read-only, Full control and more.
  • File visitors can access the file according to their corresponding permissions.
  • Figure 1 provides a technical solution by integrating the SDK into the application.
  • Figure 1 is a framework diagram of an application program provided by an embodiment of the present application.
  • the App 200 may include the code 210 part of the App itself and the rights management service (right management service, RMS) SDK 220 part.
  • RMS rights management service
  • App200 developers can integrate the RMS SDK220 when developing the App200.
  • the file format can be converted in the RMS SDK220.
  • the App200 realizes reading or writing of the permission file by calling the interface of the RMS SDK220.
  • user 1 has set permissions on document 1.
  • user 2 can fully control document 1, that is, user 2 can perform read operations, write operations, print operations, screenshot operations, reset permissions, etc. on document 1. wait.
  • the RMS client will create a random key to encrypt the document 1, then the document 1 becomes the encrypted permission document 1; then the RMS client will create a certificate, which includes the policy of document 1 , the policy includes the usage rights of user 2; then the RMS client uses the organization key encryption policy and the random key, and embeds the encrypted policy into the encrypted document 1.
  • the RMS client can verify user 2's permissions with the cloud server or a preset server.
  • the process can be:
  • the cloud server or preset server extracts the random key from the decrypted policy, and then encrypts the random key using the organization key.
  • the re-encrypted random key will be embedded in the encrypted usage license with the user permission list, Then sent to RMS client.
  • the RMS client obtains the encrypted usage license and uses user 2’s private key to decrypt it. This allows you to open the body of the secret document and render the document on the screen.
  • embodiments of the present application provide a method and electronic device for converting file formats.
  • This technical solution can realize automatic conversion of file formats for the application at the system level when the application reads and writes permission files, without the need for the application to perform adaptation.
  • FIG. 2 is a schematic frame diagram of an electronic device provided by an embodiment of the present application. As shown in FIG. 2 , the electronic device may include a user space 310 , a kernel space 320 and a memory chip 330 .
  • the user space 310 may include a first App 311 and a second App 312; the kernel space 320 may include a conversion module 321; the memory chip 330 may be used to store data, such as for storing document 1 Data storage space 331, the memory chip 330 can also be used to store data of other files.
  • the user space 310 of the electronic device 300 may include a first App 311 and a second App 312,
  • the first App 311 can send the first operation of opening permission document 1 to the second App 312, and the conversion module 321 located in the kernel space 320 can detect the first operation and intercept the first operation; after that, the conversion module 321 generates a Link file, the link file can be associated with document 1; the conversion module 321 can send the link file to the second App 312, so that the second App 312 can perform the second operation on the link file, because the link file and The correlation of document 1, when the second App 312 performs the second operation on the link file, it can perform the second operation on the document 1 accordingly, and this conversion process is imperceptible to the second App 312, and the second App 312 2 App312 does not require any adaptation.
  • the second operation may be an open, a read operation, a write operation, or the like.
  • the second operation is a read operation.
  • the second App 312 After receiving the link file, the second App 312 reads the link file, and the conversion module 321 can correspondingly read the content corresponding to the document 1 from the storage space 331. After decrypting the content, the plain text of document 1 is displayed in the second App 312.
  • the second operation is a write operation
  • the second App 312 can perform a write operation in the link file
  • the conversion module 321 can convert the write operation into writing the content corresponding to document 1, and write the The content is stored in the storage space 331 of the data of document 1.
  • the first operation may be the user double-clicking the document 1, the first operation may also be sharing the document 1, the first operation may also be calling a system interface, etc., which are not limited by the embodiments of this application.
  • the link file can be an empty file, the file size of the link file is 0, the content is empty, and the file attributes are also empty. This can avoid wasting file system resources when creating link files.
  • the conversion module may store the corresponding relationship between the link file and document 1.
  • document 1 corresponds to link file 1.
  • each document can correspond to a link file, so as not to cause confusion and ensure the accuracy of the document opened by the second App 312.
  • the first App 311 can determine whether the document 1 is a permission document. When it is determined that the document 1 is a permission document, it can add identification information to the document 1, such as adding the suffix .dlp, or other identification information; or , the conversion module determines whether document 1 is a permission document.
  • the document 1 can also be other files, such as audio, video, pictures, animations and other multimedia files, which are not limited in the embodiments of this application.
  • the first App 311 may be a system application, such as a file manager, or a third-party application, such as an application with a file management function.
  • the first App 311 may be located outside the electronic device 300, for example, it may be an application program of another electronic device, which is not limited by the embodiments of this application.
  • the other electronic device when the first App 311 is in another electronic device, the other electronic device may install the same operating system as the electronic device 300 .
  • the first App 311 may be integrated with an SDK including the conversion module 321 .
  • the second App 312 when the second App 312 is located in another electronic device other than the electronic device 300, the other electronic device may install the same operating system as the electronic device 300.
  • the second App 312 may be integrated with an SDK including the conversion module 321 .
  • the conversion module 321 may also be located in the user space 310, for example, it may be a submodule in the user space file system, which is not limited by the embodiments of this application.
  • the conversion module can detect and intercept the first operation of opening document 1 sent by the first App to the second App, and generate an empty link file that corresponds to document 1 one-to-one, and convert the link File sending to the second App, so that when the second App performs the second operation (reading, writing, etc.) on the link file, it can be converted to perform the corresponding second operation on document 1, and this conversion process for the second App is It is imperceptible, and the second App does not need to perform any adaptation, thus avoiding the workload of the second App to perform adaptation when opening the permission document.
  • Figure 3 is a schematic flow chart of a method for converting file formats provided by this application. As shown in Figure 3, the method 400 may include steps 401 to 412.
  • the first App sends the first operation of opening document 1 to the second App.
  • document 1 in the embodiment of this application is a permissions document.
  • the first App can determine whether the document 1 is a permission document. When it is determined that the document 1 is a permission document, it can add identification information to the document 1, such as adding the suffix .dlp, or other identification information; Or, the conversion module determines whether document 1 is a permission document.
  • the first operation may be the user double-clicking the document 1, the first operation may also be sharing the document 1, the first operation may also be calling a system interface, etc., which are not limited by the embodiments of this application.
  • the first App and the second App may be located in the same electronic device.
  • the first App is a file manager
  • the second App is a document App, such as Huawei Reader.
  • the first App may be located in the first electronic device
  • the second App may be located in the second electronic device.
  • the first electronic device and the second electronic device may have the same operating system, such as Hongmeng operating system.
  • the conversion module intercepts the first operation.
  • the conversion module detects the first operation and intercepts the first operation.
  • the hook function can be used to intercept the first operation.
  • the conversion module creates a link document.
  • the link document may be a link document, and the link document is associated with document 1.
  • the link document corresponds to document 1 one-to-one.
  • the link document can be an empty document, the document size of the link document is 0, the content is empty, and the document attributes are also empty. This can avoid wasting file system resources when creating link documents.
  • the conversion module when creating a link document, the conversion module simultaneously generates a corresponding relationship between the link document and document 1, and can store the corresponding relationship.
  • creating a link document by the conversion module can also be understood as generating the link document.
  • the conversion module has a link document generation submodule for generating the link document.
  • the technical solution may further include: the conversion module verifies the permissions of the second App.
  • the permission certificate module in the conversion module obtains the permission certificate of document 1.
  • step 403 can be performed.
  • the second App or the user who logs in to the second App may be considered to have corresponding permissions.
  • the conversion module sends the linked document to the second App.
  • the second App receives the link document.
  • the second App opens the linked document and obtains the file descriptor of the linked document.
  • the second App opens the linked document, such as the user double-clicking the linked document, or clicking the icon of the linked document, etc., in order to obtain the file descriptor of the linked document.
  • step 406 when the second App opens the linked document, it can automatically switch to step 406.
  • the conversion module opens document 1 and obtains the file descriptor of document 1.
  • the conversion module has an open conversion sub-module, which is used to convert the operation of the second App to open the linked document into the operation of opening the document 1.
  • the conversion module sends the file descriptor of the linked document to the virtual file system (VFS).
  • VFS virtual file system
  • the conversion module may also send the path or handle of the link document to the VFS, which is not limited by the embodiments of this application.
  • the conversion module sends the file descriptor or handle or path of the linked document to the VFS, so that the VFS can find the linked document based on the handle or path.
  • VFS sends the file descriptor of the linked document to the second App.
  • VFS sends the file descriptor of the linked document to the second App, so that the second App can obtain the file descriptor of the linked document.
  • the second App reads the linked document.
  • the second App when the second App performs a reading operation on the linked document, it may automatically switch to step 409.
  • the second App can read the linked document according to the file descriptor of the linked document.
  • the conversion module reads document 1.
  • the conversion module reads the corresponding ciphertext of document 1 from the actual storage address of document 1 .
  • the specific content of document 1 stored in the memory chip may include: the name of document 1, the content of document 1 (encrypted text), the attributes of document 1, and the authority certificate of document 1. etc.
  • the conversion module when the conversion module reads the ciphertext corresponding to document 1, it needs to calculate the document offset.
  • the conversion module can start reading from 1MB+200KB of document 1. Fetch, read content with a size of 500KB. It should be understood that the conversion module may include an offset conversion sub-module for calculating document offsets.
  • the reading and writing submodule in the conversion module can be used to perform step 409 to read document 1.
  • the second App can also read the file attributes of the linked document.
  • the conversion module detects this operation, it can automatically convert to reading the file attributes of document 1.
  • the document attribute conversion submodule in the conversion module can be used to perform this process.
  • the conversion module decrypts document 1.
  • the conversion module may include an encryption and decryption submodule for encrypting or decrypting document 1 .
  • the encryption and decryption sub-module can decrypt the ciphertext of document 1 and obtain the plaintext of document 1.
  • the conversion module sends the plaintext of document 1 to VFS.
  • VFS sends the plain text of document 1 to the second App.
  • VFS sends the plain text of Document 1 to the second App, so that the user can see the plain text of Document 1 in the second App.
  • steps 408 to 412 can be performed simultaneously or combined into one step, which is not limited by the embodiments of this application.
  • the conversion module can detect and intercept the open document 1 sent by the first App to the second App.
  • the first operation and generates an empty link file, which corresponds to document 1 one-to-one, and sends the link file to the second App, so that when the second App performs a read operation on the link file, it can be converted
  • this conversion process is imperceptible to the second App, and the second App does not need to perform any Adaptation can avoid the workload of adaptation when the second App opens or reads the permission document.
  • the user may wish to edit document 1, for example, write some content in the open document 1, then the method 400 may further include steps 414 to 418.
  • the second App performs a write operation in the linked document.
  • the second App when the second App performs a writing operation on the linked document, it can automatically switch to steps 415 and 416.
  • the conversion module encrypts the first content corresponding to the write operation.
  • the encryption and decryption sub-module in the conversion module can encrypt the first written content to ensure the security of the data.
  • the conversion module writes the encrypted first content to document 1.
  • the read-write conversion sub-module in the conversion module can be used to convert the second App's write operation on the linked document into a write operation on document 1.
  • the conversion module sends the result of successful writing of the first content to the VFS.
  • the first content includes n bytes
  • the conversion module can send the result of successfully writing n bytes in document 1 to the VFS.
  • VFS sends the result of successful writing of the first content to the second App.
  • steps 414 to 418 can be performed simultaneously or combined into one step, which is not limited by the embodiments of this application.
  • the second App when the second App performs a write operation on the linked document, it can be automatically converted to perform a write operation on Document 1, and the writing operation process is unaware of the second App, and the application does not need to make any adaptations. , which can avoid the workload of adaptation when the second App opens or reads the permission document; further, the second App does not need to integrate the SDK, thereby reducing the complexity of developing the second App.
  • the user can close the document 1 after using the document 1, and the method 400 may further include steps 419 to 422.
  • the second App closes the linked document.
  • the second App can close the linked document.
  • the second App when the second App closes the linked document, it can automatically switch to step 418.
  • the conversion module closes document 1.
  • the conversion module sends the successful execution result of closing document 1 to VFS.
  • VFS sends the successful execution result of closing document 1 to the second App.
  • VFS sends the successful execution result of closing document 1 to the second App, so that the user can see the result in the second App. For example, the linked document window disappears.
  • steps 419 to 422 can be performed simultaneously or combined into one step.
  • This application implements The examples are not limiting.
  • the user can save the edited document 1.
  • steps 419 to 422 please refer to the relevant description of steps 419 to 422, which will not be described again for the sake of brevity.
  • the conversion module can detect and intercept the first operation of opening document 1 sent by the first App to the second App, and generate an empty link file that corresponds to document 1 one-to-one, and convert the link The file is sent to the second App, so that when the second App performs the second operation (reading, writing, etc.) on the link file, it can be converted to perform the corresponding second operation on Document 1, and this conversion process is important to the second App. It is said to be imperceptible, and the second App does not need to make any adaptations, which can avoid the second App from making additional adaptations when opening the permission document.
  • Figure 4 is a schematic diagram of a document provided by an embodiment of the present application.
  • the specific content of the stored document 1 may include but is not limited to: the name of document 1, such as hello.docx.dlp; the content of document 1 (encrypted text); The properties of document 1; the authority certificate of document 1.
  • the linked document seen in the second App can be automatically linked to document 1.
  • the linked document may include the content (plain text) of document 1 and the attributes of document 1.
  • the linked document may also include the name of document 1, which is not limited in the embodiments of this application.
  • Figure 5 is a schematic flow chart of a method for converting file formats provided by an embodiment of the present application. As shown in FIG. 5 , the method 500 may include steps 510 to 530 .
  • the target file is a permissions file.
  • the permission file can be a document or a multimedia file such as video, audio, animation, etc.
  • the acquisition in this step can be understood as detecting the first operation and intercepting the first operation as mentioned above.
  • the first operation can be referred to the previous description, and for the sake of brevity, it will not be described again.
  • the link file can be generated.
  • the method 500 can be applied to an electronic device, an operating system of the electronic device, or a certain module of the operating system of the electronic device, such as a file system, which is not limited by the embodiments of the present application.
  • the target file is a permissions file.
  • the permission file can be a document or a multimedia file such as video, audio, animation, etc.
  • the first operation of opening a file sent by the first application to the second application can be obtained, and a link file can be generated based on the first operation.
  • the link file is associated with the target file, and then sent to the second application.
  • the application sends the linked file. Therefore, the second application can perform corresponding operations on the linked file, because the link file is different from the target file.
  • the target file has a corresponding relationship, so it can be converted to perform corresponding operations on the target file, and the conversion process is imperceptible to the second application, which can prevent the second application from making additional adaptations for opening the target file.
  • the method 500 may further include: detecting a second operation performed by the second application program on the linked file; and converting the second operation performed by the second application program on the linked file into a second operation performed on the target file.
  • the read operation or write operation of the second App on the linked file can be converted into a read operation or write operation on Document 1.
  • the second operation after detecting the second operation performed by the second application program on the linked file, the second operation can be automatically converted into a second operation performed on the target file.
  • This technical solution can realize the file conversion process in the system without being aware of the second application, and can prevent the second application from making additional adaptations for opening the target file.
  • converting the second operation of the second application program on the linked file into a second operation on the target file includes: reading the target file from the target address.
  • the actual storage location of the target file is the target address in the memory chip.
  • the conversion module reads the content of document 1 from the address where document 1 is actually stored.
  • the read operation may correspond to reading the text content of the target file, or may also correspond to reading the file attribute content of the target file.
  • the second application program when the second application program performs a read operation on the linked file, it can be automatically converted into a read operation on the target file. At this point, the target file can be read from the target address where the target file is actually stored.
  • the second application can read the permission file without making any modifications such as adaptation or integrating the SDK.
  • the method 500 may further include: decrypting the target file to obtain the plaintext of the target file; and sending the plaintext of the target file to the second application.
  • the conversion module can decrypt the read ciphertext of document 1 to obtain the plaintext of document 1, and send it to the second App through steps 412-413.
  • the read content when reading the target file from the target address, the read content is encrypted.
  • the target file can be decrypted first to obtain the plain text of the target file, and then the plain text can be sent to the second application. This way, the user can see the clear text of the target file in the second application.
  • the method 500 may further include: encrypting the first content corresponding to the write operation; and writing the encrypted first content into the target address.
  • the second App When the second App performs a write operation on the linked file, it automatically switches to perform a write operation on document 1, encrypts the content corresponding to the write operation, and then writes it to the target address. .
  • the second application program when the second application program performs a write operation on the linked file, it can be automatically converted into a write operation on the target file. At this time, the first content corresponding to the write operation can be encrypted and then written into the target address where the target file is actually stored.
  • the second application can perform write operations on the permission file without any modification such as adaptation or integration of the SDK.
  • the method 500 may further include: sending a successful result of writing the first content to the second application.
  • a successful result of writing the encrypted first content may be sent to the second App.
  • the successful writing result of the first content corresponding to the writing operation can be sent to the second application program, so that the second application program can determine that the content edited by the user is written successfully.
  • the method 500 may further include: determining that the target file is a permission file.
  • the technical solution can distinguish the types of files. For authorized files, the technical solution in this application can be executed, and for non-authorized files, it can be opened directly.
  • determining that the target file is a permission file includes: determining that the target file is a permission file based on identification information of the target file, where the identification information is added by the first application.
  • the identification information can be a special identification, such as the suffix .dlp, and the identification information can also be indication information.
  • the first application when determining that the target file is a permission file, can add identification information to the target file, so that when the file system obtains the first operation, it can determine that the target file is a permission file based on the identification information.
  • determining that the target file is a permission file includes directly determining that the target file is a permission file based on identification information of the target file.
  • identification information is not added by the first application, but is special information generated after adding permissions to the target file.
  • the first application does not need to perform any operations on the target file, and the system can also directly determine that the target file is a permission file based on the identification information of the target file.
  • the method 500 may further include: verifying the permissions of the second application or the user logged in by the second application.
  • verifying the permissions of the second application or the user logged in by the second application includes: obtaining the permission certificate of the target file from the target address; verifying the second application or the second application based on the permission certificate. Permissions of the logged in user.
  • the permission certificate of the target file can be obtained from the target address, and then the corresponding permissions of the second application or the user logged in by the second application are determined based on the permission certificate.
  • the link file is an empty file.
  • link file being an empty file can be understood as: the size of the link file is 0, the included content is empty, and the file attributes are also empty.
  • the second operation includes any one or more of the following: a read operation of the linked file; a write operation of the linked file; a read operation of the file attribute of the linked file; a write operation of the file attribute of the linked file; a linked file The opening operation of the linked file; the closing operation of the linked file.
  • the second operation may also include saving, screenshots, printing, etc., which are not limited by the embodiments of this application.
  • the second application program when the second application program performs the above operation on the linked file, it can be automatically converted to perform the corresponding operation on the target file.
  • FIG. 6 is a schematic block diagram of an electronic device provided by an embodiment of the present application.
  • the electronic device 600 may include one or more memories 610 and one or more processors 620 .
  • One or more computer programs are stored in the one or more memories 610.
  • the one or more computer programs include instructions.
  • the instructions are executed by the one or more processors 620, any of the above is possible.
  • the method of converting the file format described in Implementation is executed.
  • the electronic device 600 may perform the following steps: obtain the first operation of opening the target file sent by the first application program to the second application program; according to The first operation generates a link file that is associated with the target file; and sends the link file to the second application.
  • the electronic device 600 may perform the following steps: detect a second operation performed by the second application program on the linked file; The second operation on the file is converted into a second operation on the target file.
  • the electronic device 600 may perform the following steps: read the target file from the target address.
  • the electronic device 600 when the instruction is executed by one or more processors 620, the electronic device 600 can perform the following steps: decrypt the target file to obtain the plaintext of the target file; send the plaintext of the target file to the second app.
  • the electronic device 600 may perform the following steps: write the first content corresponding to the write operation. Encrypt; write the encrypted first content into the target address.
  • the electronic device 600 may perform the following steps: sending a successful result of writing the first content to the second application.
  • the electronic device before the electronic device obtains the first operation of opening the target file sent by the first application to the second application, the electronic device is further configured to perform: determining that the target file is a permission file.
  • the electronic device 600 when the instruction is executed by one or more processors 620, the electronic device 600 can perform the following steps: determine the target file to be a permission file according to the identification information of the target file, wherein the identification information is the first Added by application.
  • the electronic device 600 may perform the following steps: directly determine that the target file is a permission file according to the identification information of the target file.
  • the electronic device 600 before the electronic device generates the link file according to the first operation, the electronic device 600 is further configured to perform: verify the permissions of the second application or the user logged in by the second application.
  • the electronic device 600 may perform the following steps: verify the permissions of the second application or the user logged in by the second application according to the permission certificate.
  • the link file is an empty file.
  • the second operation includes any one or more of the following: a read operation of the linked file; a write operation of the linked file; a read operation of the file attribute of the linked file; a write operation of the file attribute of the linked file; link The opening operation of the file; the closing operation of the linked file.
  • An embodiment of the present application also provides an electronic device, including various modules or units for implementing the above functions.
  • An embodiment of the present application also provides a chip.
  • the chip includes a processor and a communication interface.
  • the communication interface is used to receive signals and transmit the signals to the processor.
  • the processor processes the signals. This causes the method of converting the file format as described in any of the previous possible implementations to be executed.
  • This embodiment also provides a computer-readable storage medium.
  • Computer instructions are stored in the computer-readable storage medium.
  • the method for converting file formats in the above embodiment is executed.
  • This embodiment also provides a computer program product.
  • the computer program product When the computer program product is run on a computer, it causes the computer to perform the above related steps to implement the method for converting file formats in the above embodiment.
  • the disclosed systems, devices and methods can be implemented in other ways.
  • the device embodiments described above are only illustrative.
  • the division of the units is only a logical function division. In actual implementation, there may be other division methods.
  • multiple units or components may be combined or can be integrated into another system, or some features can be ignored, or not implemented.
  • the coupling or direct coupling or communication connection between each other shown or discussed may be through some interfaces, and the indirect coupling or communication connection of the devices or units may be in electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and the components shown as units may or may not be physical units, that is, they may be located in one place, or they may be distributed to multiple network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of this embodiment.
  • each functional unit in each embodiment of the present application can be integrated into one processing unit, each unit can exist physically alone, or two or more units can be integrated into one unit.
  • the functions are implemented in the form of software functional units and sold or used as independent products, they can be stored in a computer-readable storage medium.
  • the technical solution of the present application is essentially or the part that contributes to the existing technology or the part of the technical solution can be embodied in the form of a software product.
  • the computer software product is stored in a storage medium, including Several instructions are used to cause a computer device (which may be a personal computer, a server, or a network device, etc.) to execute all or part of the steps of the methods described in various embodiments of this application.
  • the aforementioned storage media include: U disk, mobile hard disk, read-only memory (ROM), random access memory (RAM), magnetic disk or optical disk and other media that can store program code. .

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • Computational Linguistics (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Artificial Intelligence (AREA)
  • Automation & Control Theory (AREA)
  • Bioethics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Storage Device Security (AREA)

Abstract

提供了转换文件格式的方法和电子设备,方法包括:获取第一应用程序向第二应用程序发送的打开目标文件的第一操作(510);根据第一操作生成链接文件,链接文件与目标文件相关联(520);向第二应用程序发送链接文件(530)。技术方案可以在应用程序读写权限文件时,在系统层面为应用程序实现文件格式的自动转换,且转换过程对第二应用程序是无感知的,可以避免第二应用程序为打开目标文件进行额外的适配工作。

Description

转换文件格式的方法和电子设备
本申请要求于2022年05月11日提交中国专利局、申请号为202210511148.6、申请名称为“转换文件格式的方法和电子设备”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请实施例涉及电子技术领域,尤其涉及一种转换文件格式的方法和电子设备。
背景技术
文件的权限管理对于使用文件的人员来说十分重要。例如,为了保证文件的安全性,文件的拥有者可以对某个文件添加权限,可以包括被授权访问的用户账号、设置权限的类型如只读、完全控制等。文件访问者可以根据其对应的权限访问该文件。
然而,各个应用程序实现文件权限管理的格式不尽相同,导致不同应用程序之间无法相互打开这些文件。
发明内容
本申请实施例提供一种转换文件格式的方法和电子设备,以期在应用程序读写权限文件时,在系统层面为应用程序实现文件格式的自动转换。
第一方面,提供了一种转换文件格式的方法,所述方法包括:获取第一应用程序向第二应用程序发送的打开目标文件的第一操作;根据所述第一操作生成链接文件,所述链接文件与所述文件相关联;向所述第二应用程序发送所述链接文件。
应理解,该方法可以应用于电子设备,也可以应用于电子设备的操作系统,或者还可以应用于电子设备的操作系统的某个模块,本申请实施例不予限定。
应理解,该目标文件为权限文件。该权限文件可以是文档、或者可以是视频、音频、动图等多媒体文件。
本申请实施例中,可以获取第一应用程序向第二应用程序发送的打开文件的第一操作,并根据该第一操作生成链接文件,该链接文件与目标文件相关联,然后向该第二应用程序发送链接文件。从而第二应用程序可以对该链接文件进行相应的操作,由于链接文件与目标文件具有对应关系,因此可以转换为对目标文件进行相应操作,且该转换过程对第二应用程序是无感知的,可以避免第二应用程序为打开目标文件进行额外的适配工作。
结合第一方面,在第一方面的某些实现方式中,所述方法还包括:检测所述第二应用程序对所述链接文件进行的第二操作;将所述第二应用程序对所述链接文件的第二操作转换为对所述目标文件进行的第二操作。
本申请实施例中,当检测到第二应用程序对链接文件进行的第二操作后,可以将该第二操作自动转换为对目标文件进行的第二操作。该技术方案可以在系统中实现对文件的转换过程,对第二应用程序是无感知的,可以避免第二应用程序为打开目标文件进行额外的 适配。
结合第一方面,在第一方面的某些实现方式中,当所述第二操作为读操作时,所述将所述第二应用程序对所述链接文件的第二操作转换为对所述目标文件进行的第二操作,包括:从目标地址中读取所述目标文件。
本申请实施例中,目标文件实际存储的位置为存储芯片中的目标地址中。
基于本申请实施例,当第二应用程序对链接文件执行读操作时,可以自动转换为对目标文件执行读操作。此时,可以从实际存储目标文件的目标地址中读取该目标文件。该技术方案中,第二应用程序无需进行任何修改如适配或集成SDK,可以实现权限文件的读取。
应理解,该读操作可以是对应读取目标文件的正文内容,还可以是对应读取目标文件的文件属性内容。
结合第一方面,在第一方面的某些实现方式中,所述方法还包括:对所述目标文件进行解密,得到所述目标文件的明文;将所述目标文件的明文发送至所述第二应用程序。
本申请实施例中,从目标地址中读取目标文件时,读取的内容是加密的。此时可以首先对该目标文件进行解密,得到目标文件的明文,然后将该明文发送至第二应用程序。这样,用户可以在第二应用程序中看到目标文件的明文。
结合第一方面,在第一方面的某些实现方式中,当所述第二操作为写操作时,所述方法还包括:对所述写操作对应的第一内容进行加密;将加密后的第一内容写入所述目标地址中。
本申请实施例中,当第二应用程序对链接文件执行写操作时,可以自动转换为对目标文件执行写操作。此时,可以对写操作对应的第一内容进行加密操作,然后将其写入实际存储目标文件的目标地址中。该技术方案中,第二应用程序无需进行任何修改如适配或集成SDK,可以对权限文件执行写操作。
结合第一方面,在第一方面的某些实现方式中,所述方法还包括:将所述第一内容写入成功的结果发送至所述第二应用程序。
本申请实施例中,可以将写操作对应的第一内容写入成功的结果发送至第二应用程序,从而第二应用程序可以确定用户编辑的内容写入成功。
结合第一方面,在第一方面的某些实现方式中,在获取第一应用程序向第二应用程序发送的打开目标文件的第一操作之前,所述方法还包括:确定所述目标文件为权限文件。
本申请实施例中,在获取第一操作之前,可以先确定目标文件是权限文件,然后执行后面的步骤。该技术方案可以区分文件的类型,对于权限文件执行本申请中的技术方案,对于非权限文件,则可以直接打开。
结合第一方面,在第一方面的某些实现方式中,所述确定所述目标文件为权限文件,包括:根据所述目标文件的标识信息,确定所述目标文件为权限文件,其中,所述标识信息为所述第一应用程序添加的。
在一些实施例中,该标识信息可以为特殊标识,如后缀名.dlp,该标识信息也可以为指示信息。
本申请实施例中,第一应用程序可以在确定目标文件为权限文件时,对该目标文件添加标识信息,从而文件系统在获取第一操作时,可以根据标识信息确定目标文件为权限文件。
结合第一方面,在第一方面的某些实现方式中,所述确定所述目标文件为权限文件,包括:根据所述目标文件的标识信息,直接确定所述目标文件为权限文件。
应理解,该标识信息不是第一应用程序添加的,而是对目标文件添加权限后生成的特殊信息。
本申请实施例中,第一应用程序无需对目标文件进行任何操作,系统也可以根据目标文件的标识信息直接确定该目标文件为权限文件。
结合第一方面,在第一方面的某些实现方式中,在所述根据所述第一操作生成链接文件之前,所述方法还包括:校验所述第二应用程序或所述第二应用程序登录的用户的权限。
本申请实施例中,为了保证目标文件的安全性,在根据第一操作生成链接文件之前,还会校验第二应用程序或登录第二应用程序的用户的权限。该技术方案可以保证目标文件的安全性。
结合第一方面,在第一方面的某些实现方式中,校验所述第二应用程序或所述第二应用程序登录的用户的权限,包括:从所述目标地址中获取所述目标文件的权限证书;根据所述权限证书校验所述第二应用程序或所述第二应用程序登录的用户的权限。
本申请实施例中,可以从目标地址中获取目标文件的权限证书,然后根据该权限证书确定第二应用程序或第二应用程序登录的用户的相应权限。
结合第一方面,在第一方面的某些实现方式中,所述链接文件为空文件。
应理解,该链接文件为空文件可以理解为:该链接文件的大小为0、包括的内容为空、文件属性也为空。
本申请实施例中,该链接文件为空文件,从而可以在创建链接文件时避免文件系统的资源浪费。
结合第一方面,在第一方面的某些实现方式中,所述第二操作包括以下任意一项或多项:所述链接文件的读操作;所述链接文件的写操作;所述链接文件的文件属性的读操作;所述链接文件的文件属性的写操作;所述链接文件的打开操作;所述链接文件的关闭操作。
本申请实施例中,当第二应用程序对链接文件执行上述操作时,可以自动转换为对目标文件执行相应的操作。
第二方面,提供了一种电子设备,包括:一个或多个处理器;一个或多个存储器;所述一个或多个存储器存储有一个或多个计算机程序,所述一个或多个计算机程序包括指令,当所述指令被一个或多个处理器执行时,使得如第一方面及其任一种可能的实现方式中所述的转换文件格式的方法被执行。
第三方面,提供了一种电子设备,包括用于实现如第一方面及其任一种可能的实现方式中所述的转换文件格式的方法中的模块。
第四方面,提供了一种芯片,所述芯片包括处理器和通信接口,所述通信接口用于接收信号,并将所述信号传输至所述处理器,所述处理器处理所述信号,使得如第一方面及其任一种可能的实现方式中所述的转换文件格式的方法被执行。
第五方面,提供了一种计算机可读存储介质,所述计算机可读存储介质中存储有计算机指令,当所述计算机指令在计算机上运行时,使得如第一方面及其任一种可能的实现方式中所述的转换文件格式的方法被执行。
第六方面,提供了一种计算机程序产品,包括计算机指令,当所述计算机指令在计算机上运行时,使得如第一方面及其任一种可能的实现方式中所述的转换文件格式的方法被 执行。
附图说明
图1是本申请实施例提供的一种应用程序的框架图。
图2是本申请实施例提供的一种电子设备的示意性框架图。
图3是本申请实施例提供的一种转换文件格式的方法的示意性流程图。
图4本申请实施例提供的一种文档的示意图。
图5是本申请实施例提供的一种转换文件格式的方法的示意性流程图。
图6是本申请实施例提供的一种电子设备的示意性框图。
具体实施方式
下面将结合附图,对本申请实施例中的技术方案进行描述。
本申请实施例中的电子设备可以指用户设备、接入终端、用户单元、用户站、移动站、移动台、远方站、远程终端、移动设备、用户终端、终端、无线通信设备、用户代理或用户装置。终端设备还可以是蜂窝电话、无绳电话、会话启动协议(session initiation protocol,SIP)电话、无线本地环路(wireless local loop,WLL)站、个人数字处理(personal digital assistant,PDA)、具有无线通信功能的手持设备、计算设备或连接到无线调制解调器的其它处理设备、车载设备、可穿戴设备,5G网络中的终端设备或者未来演进的公用陆地移动通信网络(public land mobile network,PLMN)中的终端设备等,本申请实施例对此并不限定。
在介绍本申请实施例提供的转换文件格式的方法的技术方案之前,首先简单介绍一下本申请涉及的一些技术术语。
权限文件:添加了权限的文件。在本申请实施例中,该文件可以包括文档(如.ppt、.doc格式的文档),也可以包括音频、视频、图片、动图等多媒体文件,本申请实施例不予限定。
用户空间:提供应用程序(application,App)运行的空间。当一个进程运行于用户空间中,称该进程处于用户运行态(或简称为用户态)。
内核空间:内核代码运行的位置,在这个空间下运行的进程可以比在用户空间下运行的进程拥有更多的访问系统的权限。当一个任务(进程)执行系统调用而陷入内核代码中执行时,称该进程处于内核运行态(或简称为内核态)。
软件开发工具包(software development kit,SDK):是一些被软件工程师用于为特定的软件包、软件框架、硬件平台、操作系统等创建应用软件的开发工具的集合。SDK还经常包括示例代码、支持性的技术注解或者其他的为基本参考资料澄清疑点的支持文档。
文件描述符(file descriptor,FD):文件系统中,大部分的输入/输出操作都会被分配一个整数作为编号,该整数可以作为这个输入/输出操作的文件描述符。
在用户日常使用文件时,对于文件的权限管理是十分重要的。在一些场景下,为了保证文件的安全,用户经常需要对文件添加权限,例如,文件的拥有者可以对某个文件添加权限,可以包括被授权访问的用户账号、设置权限的类型如只读、完全控制等。文件访问者可以根据其对应的权限访问该文件。
然而,各个应用程序支持的权限文件的格式不尽相同,导致不同应用程序之间无法相 互打开这些权限文件。
为了解决不同应用程序之间无法相互打开权限文件的问题,图1提供了一种应用程序集成SDK的方法解决的技术方案。
图1是本申请实施例提供的一种应用程序的框架图。
如图1所示,该App200可以包括该App本身的代码210部分和权限管理服务(right management service,RMS)SDK220部分。
App200的开发者在开发该App200时,可以集成该RMS SDK220。在用户使用该App200访问权限文件时,可以在该RMS SDK220中进行文件格式的转换,该App200通过调用该RMS SDK220的接口实现权限文件的读取或写入。
应理解,该App200通过调用该RMS SDK220的接口实现权限文件的读取或写入之前,为了保证安全,需要验证该App200访问该权限文件的权限。
示例性地,用户1对文档1设置了权限,具体为用户2可以对该文档1完全控制,即用户2可以对该文档1进行读操作、写操作、打印操作、截屏操作以及重新设置权限等等。在设置权限时,RMS客户端会创建一个随机密钥对该文档1进行加密,那么该文档1就变成了加密的权限文档1;随后RMS客户端会创建一个证书,其中包括文档1的策略,该策略中包括用户2的使用权限;接着RMS客户端使用组织密钥加密策略和随机密钥,并将加密后的策略嵌入到加密的文档1中。
此后,当用户2希望打开该文档1时,RMS客户端可以向云服务器或预设服务器验证用户2的权限。其过程可以为:
(1)用户2将文档策略和用户2的证书发送至云服务器或预设服务器,云服务器或预设服务器将解密和评估该文档策略,并生成用户权限列表,包括用户对该文档具有的任何权限。
(2)云服务器或预设服务器从解密的策略中提取随机密钥,然后使用组织密钥加密该随机密钥,重新加密的随机密钥将嵌入到具有用户权限列表的加密使用许可证中,然后发送到RMS客户端。
(3)RMS客户端获取加密的使用许可证,并使用用户2的私钥进行解密。从而可以打开密文档正文,并在屏幕上呈现文档。
上述描述了App200调用RMS SDK220打开权限文档的过程,然而,当该App200中已经定义了一些可以打开的目标文件格式时,在使用RMS SDK220时,需要对目标文件格式中的每种文件格式进行适配,从而增加了该App2的工作量,且不利于扩大应用程序的生态。
有鉴于此,本申请实施例提供一种转换文件格式的方法和电子设备,该技术方案可以在应用程序读写权限文件时,在系统层面为应用程序实现文件格式的自动转换,无需应用程序进行适配。
图2是本申请实施例提供的一种电子设备的示意性框架图。如图2所示,该电子设备可以包括用户空间310、内核空间320和存储芯片330。
在一些实施例中,该用户空间310中可以包括第一App311、第二App312;该内核空间320中可以包括转换模块321;该存储芯片330中可以用于存储数据,如用于存储文档1的数据的存储空间331,该存储芯片330中还可以用于存储其他文件的数据。
参见图2,该电子设备300的用户空间中310可以包括第一App311和第二App312, 该第一App311可以向第二App312发送打开权限文档1的第一操作,位于内核空间320中的转换模块321可以检测到该第一操作并拦截该第一操作;之后,该转换模块321生成一个链接(link)文件,该link文件可以与文档1相关联;该转换模块321可以将该link文件发送至第二App312,从而该第二App312可以对该link文件执行第二操作,由于link文件与文档1的关联性,当第二App312对该link文件执行第二操作时,可以相应的对该文档1执行第二操作,而这个转换过程对于第二App312来说是无感知的,且该第二App312无需进行任何适配。
示例性地,该第二操作可以是打开、读操作、写操作等等。
在一些实施例中,该第二操作为读操作,则第二App312在接收到link文件后,读取link文件,则转换模块321可以对应的从存储空间331中读取文档1对应的内容,并将该内容解密后,将文档1的明文显示在第二App312中。
在一些实施例中,该第二操作为写操作,则第二App312可以在link文件中执行写操作,则转换模块321可以将该写操作转换为写文档1对应的内容,并将写入的内容存储在文档1的数据的存储空间331。
示例性地,该第一操作可以是用户双击文档1,该第一操作还可以是分享该文档1,该第一操作还可以是调用系统接口等,本申请实施例不予限定。
示例性地,该link文件可以是一个空文件,该link文件的文件大小为0、内容为空、文件属性也为空。从而可以在创建link文件时,避免造成文件系统的资源浪费。
示例性地,该转换模块中可以存储有该link文件与文档1的对应关系。例如,文档1对应link文件1,当具有多个文档时,每个文档可以对应有一个link文件,从而不会造成错乱,保证第二App312打开文档的准确性。
在一些实施例中,第一App311可以判断该文档1是否是权限文档,当判断该文档1为权限文档时,可以对该文档1添加标识信息,如添加后缀.dlp,或者其他标识信息;或者,转换模块判断该文档1是否是权限文档。
在一些实施例中,该文档1也可以为其他文件,如音频、视频、图片、动图等多媒体文件,本申请实施例不予限定。
应理解,该第一App311可以是系统应用,例如可以是文件管理器,也可以是第三方应用,例如可以是具有文件管理功能的应用程序。
在一些实施例中,该第一App311可以位于电子设备300之外,例如,可以是另一电子设备的应用程序,本申请实施例不予限定。
在一些实施例中,当该第一App311处于另一电子设备中时,该另一电子设备可以和电子设备300安装相同的操作系统。当该另一电子设备的操作系统与电子设备300不同时,该第一App311可以集成有包括该转换模块321的SDK。类似的,当第二App312处于电子设备300之外的另一电子设备时,其该另一电子设备可以和电子设备300安装相同的操作系统。当该另一电子设备的操作系统与电子设备300不同时,该第二App312可以集成有包括该转换模块321的SDK。
在一些实施例中,该转换模块321也可以位于用户空间310,如可以是用户空间文件系统中的子模块,本申请实施例不予限定。
本申请实施例中,转换模块可以检测并拦截第一App向第二App发送的打开文档1的第一操作,并生成空的link文件,该link文件与文档1一一对应,并将该link文件发送 至第二App中,从而当第二App对该link文件执行第二操作(读写等)时,可以转换为对文档1执行相应的第二操作,而这个转换过程对于第二App来说是无感知的,且该第二App无需进行任何适配,从而可以避免第二App在打开权限文档时进行适配的工作量。
图3是本申请实施提供的一种转换文件格式的方法的示意性流程图。如图3所示,该方法400可以包括步骤401至步骤412。
401,第一App向第二App发送打开文档1的第一操作。
应理解,本申请实施例中的文档1为权限文档。
在一些实施例中,该第一App可以判断该文档1是否是权限文档,当判断该文档1为权限文档时,可以对该文档1添加标识信息,如添加后缀.dlp,或者其他标识信息;或者,转换模块判断该文档1是否是权限文档。
该第一操作可以是用户双击文档1,该第一操作还可以是分享该文档1,该第一操作还可以是调用系统接口等,本申请实施例不予限定。
在一些实施例中,该第一App、第二App可以位于同一电子设备中。例如,该第一App为文件管理器,该第二App为文档类App,如华为阅读。或者,该第一App可以位于第一电子设备中,第二App位于第二电子设备中,例如,第一电子设备可以和第二电子设备具有同样的操作系统,如鸿蒙操作系统。
402,转换模块拦截该第一操作。
示例性地,该转换模块检测到该第一操作,拦截该第一操作。例如,可以使用hook函数拦截该第一操作。
403,转换模块创建链接文档。
在一些实施例中,该链接文档可以为link文档,该link文档与文档1相关联,例如,link文档与文档1一一对应。
示例性地,该link文档可以是一个空文档,该link文档的文档大小为0、内容为空、文档属性也为空。从而可以在创建link文档时,避免造成文件系统的资源浪费。
示例性地,该转换模块在创建link文档时,同时生成该link文档与文档1的对应关系,并可以将该对应关系存储起来。
应理解,转换模块创建链接文档也可以理解为生成该链接文档。例如,该转换模块中具有链接文档生成子模块,用于生成该链接文档。
在一些实施例中,在转换模块创建链接文档之前,该技术方案还可以包括:转换模块校验第二App的权限。
示例性地,该转换模块中的权限证书模块获取文档1的权限证书,当确定第二App或登录该第二App的用户具有相应的权限时,可以执行该步骤403。
应理解,在后续的步骤中,可以认为该第二App或登录该第二App的用户具有相应的权限。
404,转换模块将链接文档发送至第二App。对应的,第二App接收该链接文档。
405,第二App打开链接文档,获取链接文档的文件描述符。
示例性地,响应于用户的打开操作,该第二App打开链接文档,如用户双击该链接文档,或者点击该链接文档的图标等,以期获取链接文档的文件描述符。
应理解,该步骤中,当第二App打开该链接文档时,可以自动切换至步骤406。
406,转换模块打开文档1,获取文档1的文件描述符。
由于链接文档和文档1存在对应关系,当文件系统检测到第二App打开该链接文档的操作时,会自动转换至打开该文档1,获取文档1的文件描述符。
示例性地,该转换模块中具有打开(open)转换子模块,用于将第二App打开链接文档的操作转换为打开文档1的操作。
407,转换模块向虚拟文件系统(virtual file system,VFS)发送链接文档的文件描述符。
在另一些示例中,该转换模块也可以向VFS发送链接文档的路径或句柄,本申请实施例不予限定。
应理解,转换模块向VFS发送链接文档的文件描述符或者句柄或路径,从而VFS可以根据该句柄或路径去寻找到该链接文档。
408,VFS向第二App发送链接文档的文件描述符。
VFS将链接文档的文件描述符发送至第二App中,从而该第二App可以获取到链接文档的文件描述符。
409,第二App读链接文档。
在一些实施例中,当第二App对链接文档进行读操作时,可以自动切换至步骤409。
应理解,该第二App可以根据链接文档的文件描述符读取链接文档。
410,转换模块读文档1。
在一些实施例中,该转换模块从文档1的实际存储地址中读取文档1的对应的密文。例如,该文档1存储在存储芯片中,则该存储芯片中存储的文档1的具体内容可以包括:文档1的名称、文档1的内容(密文)、文档1的属性以及文档1的权限证书等等。
在一些实施例中,转换模块读取文档1对应的密文时,需要计算文档偏移。
示例性地,第二App读取文档偏移为1MB、大小为500KB的内容,而存储芯片中存储文档1的原始文件是从200KB开始,则转换模块可以从文档1的1MB+200KB处开始读取,读取大小为500KB的内容。应理解,该转换模块中可以包括偏移转换子模块,用于计算文档偏移。
示例性地,转换模块中的读写子模块可以用于执行该步骤409,对文档1进行读操作。
在一些实施例中,该第二App还可以读取链接文档的文件属性,转换模块检测到该操作时,可以自动转化到读文档1的文件属性。例如,转换模块中的文档属性转换子模块可以用于执行该过程。
411,转换模块解密文档1。
示例性地,该转换模块中可以包括加解密子模块,以用于对文档1进行加密或解密操作。当转换模块读取文档1的内容时,该加解密子模块可以对文档1的密文进行解密,得到文档1的明文。
412,转换模块将文档1的明文发送至VFS。
413,VFS将文档1的明文发送至第二App。
示例性的,VFS将文档1的明文发送至第二App中,从而用户可以在第二App中看到文档1的明文。
在一些实施例中,该步骤408至412可以同时进行,或者合并为一个步骤,本申请实施例不予限定。
本申请实施例中,转换模块可以检测并拦截第一App向第二App发送的打开文档1 的第一操作,并生成空的link文件,该link文件与文档1一一对应,并将该link文件发送至第二App中,从而当第二App对该link文件执行读操作时,可以转换为对文档1执行相应的读操作,并将读取到的文档1的明文显示在第二App中,而这个转换过程对于第二App来说是无感知的,且该第二App无需进行任何适配,从而可以避免第二App在打开或读取权限文档时进行适配的工作量。
在一些实施例中,用户可能希望对文档1进行编辑,例如,在打开的文档1中写入一些内容,则该方法400还可以包括步骤414至步骤418。
414,第二App在链接文档中执行写操作。
在一些实施例中,当第二App对链接文档进行写操作时,可以自动切换至步骤415、416。
415,转换模块加密写操作对应的第一内容。
示例性地,转换模块中的加解密子模块可以对写入的第一内容进行加密,以保证数据的安全性。
416,转换模块将加密后的第一内容写到文档1。
示例性地,该转换模块中的读写转换子模块可以用于将第二App对链接文档的写操作转换为对文档1的写操作。
应理解,当对文档1执行写操作时,将加密后的第一内容写入文档1的实际存储地址中,以使得写入的内容作为密文保存。
417,转换模块将第一内容写入成功的结果发送至VFS。
示例性地,该第一内容包括n字节,该转换模块可以将在文档1中写入n字节成功的结果发送至VFS。
418,VFS将第一内容写入成功的结果发送至第二App。
在一些实施例中,该步骤414至418可以同时进行,或者合并为一个步骤,本申请实施例不予限定。
本申请实施例中,当第二App对链接文档执行写操作时,可以自动转换为对文档1执行写操作,且该写操作的过程对第二App是无感知的,应用无需进行任何适配,从而可以避免第二App在打开或读取权限文档时进行适配的工作量;进一步地,第二App也无需集成SDK,从而降低了开发第二App的复杂性。
在一些实施例中,用户使用完该文档1,可以关闭该文档1,则该方法400还可以包括步骤419至步骤422。
419,第二App关闭链接文档。
示例性地,响应于用户的关闭操作,如,用户点击链接文档的关闭控件,则第二App可以关闭该链接文档。
在一些实施例中,当第二App对链接文档进行关闭操作时,可以自动切换至步骤418。
420,转换模块关闭文档1。
421,转换模块将关闭文档1的执行成功的结果发送至VFS。
422,VFS将关闭文档1的执行成功的结果发送至第二App。
示例性地,VFS将关闭文档1的执行成功的结果发送至第二App中,从而用户可以在第二App中看到该结果。如,链接文档的窗口消失。
在一些实施例中,该步骤419至422可以同时进行,或者合并为一个步骤,本申请实 施例不予限定。
在一些实施例中,用户可以对编辑后的文档1进行保存。其过程可以参见步骤419至422的相关描述,为了简洁,不再赘述。
应理解,对于转换模块中执行相应功能的子模块,在一些实施例中,其对应功能也可以直接有转换模块或其他模块执行,本申请实施例不予限定。
应理解,本申请实施例对于上述步骤401-422的具体执行顺序不予限定,在一些实施例中,其部分步骤可以不执行或被其他步骤替换,本申请实施例不予限定。
本申请实施例中,转换模块可以检测并拦截第一App向第二App发送的打开文档1的第一操作,并生成空的link文件,该link文件与文档1一一对应,并将该link文件发送至第二App中,从而当第二App对该link文件执行第二操作(读写等)时,可以转换为对文档1执行相应的第二操作,而这个转换过程对于第二App来说是无感知的,且该第二App无需进行任何适配,从而可以避免第二App在打开权限文档时进行额外的适配。
图4是本申请实施例提供的一种文档的示意图。
图4中的(a)是存储在存储芯片中的文档1包括的具体内容的示意图;图4中的(b)是第二App中看到的链接文档的示意图。
参见图4中的(a),在存储芯片中,存储的该文档1包括的具体内容可以包括但不限于:文档1的名称,例如hello.docx.dlp;文档1的内容(密文);文档1的属性;文档1的权限证书。
由于链接文档和文档1具有一一对应的关系,所以在第二App中看到的链接文档可以自动链接到文档1。
参见图4中的(b),该链接文档中可以包括文档1的内容(明文)和文档1的属性。
在一些实施例中,该链接文档中也可以包括文档1的名称,本申请实施例不予限定。
图5是本申请实施例提供的一种转换文件格式的方法的示意性流程图。如图5所示,该方法500可以包括步骤510至步骤530。
510,获取第一应用程序向第二应用程序发送的打开目标文件的第一操作。
应理解,该目标文件为权限文件。该权限文件可以是文档、或者可以是视频、音频、动图等多媒体文件。
应理解,该步骤中的获取可以理解为前文中的检测第一操作和拦截该第一操作。
该第一操作可以参见前文中的描述,为了简洁,不再赘述。
520,根据第一操作生成链接文件,链接文件与目标文件相关联。
在一些实施例中,当获取该第一操作后,可以生成该链接文件。
应理解,该链接文件与目标文件相关联可以参见前文中的描述。
530,向第二应用程序发送链接文件。
应理解,该方法500可以应用于电子设备,也可以应用于电子设备的操作系统,或者还可以应用于电子设备的操作系统的某个模块,如文件系统,本申请实施例不予限定。
在一些实施例中,应理解,该目标文件为权限文件。该权限文件可以是文档、或者可以是视频、音频、动图等多媒体文件。
本申请实施例中,可以获取第一应用程序向第二应用程序发送的打开文件的第一操作,并根据该第一操作生成链接文件,该链接文件与目标文件相关联,然后向该第二应用程序发送链接文件。从而第二应用程序可以对该链接文件进行相应的操作,由于链接文件与目 标文件具有对应关系,因此可以转换为对目标文件进行相应操作,且该转换过程对第二应用程序是无感知的,可以避免第二应用程序为打开目标文件进行额外的适配。
在一些实施例中,该方法500还可以包括:检测第二应用程序对链接文件进行的第二操作;将第二应用程序对链接文件的第二操作转换为对目标文件进行的第二操作。
示例性地,参见前文中的步骤409-413、或步骤414-418。可以将第二App对链接文件的读操作或写操作转换为对文档1的读操作或写操作。
本申请实施例中,当检测到第二应用程序对链接文件进行的第二操作后,可以将该第二操作自动转换为对目标文件进行的第二操作。该技术方案可以在系统中实现对文件的转换过程,对第二应用程序是无感知的,可以避免第二应用程序为打开目标文件进行额外的适配。
在一些实施例中,当第二操作为读操作时,将第二应用程序对链接文件的第二操作转换为对目标文件进行的第二操作,包括:从目标地址中读取目标文件。
本申请实施例中,目标文件实际存储的位置为存储芯片中的目标地址中。
示例性地,参见前文中的步骤410,转换模块从实际存储文档1的地址中读取文档1的内容。
应理解,该读操作可以是对应读取目标文件的正文内容,还可以是对应读取目标文件的文件属性内容。
基于本申请实施例,当第二应用程序对链接文件执行读操作时,可以自动转换为对目标文件执行读操作。此时,可以从实际存储目标文件的目标地址中读取该目标文件。该技术方案中,第二应用程序无需进行任何修改如适配或集成SDK,可以实现权限文件的读取。
在一些实施例中,该方法500还可以包括:对目标文件进行解密,得到目标文件的明文;将目标文件的明文发送至第二应用程序。
示例性地,参见前文中的步骤411至步骤413,转换模块可以对读取到的文档1的密文进行解密,得到文档1的明文,并通过步骤412-413发送至第二App。
本申请实施例中,从目标地址中读取目标文件时,读取的内容是加密的。此时可以首先对该目标文件进行解密,得到目标文件的明文,然后将该明文发送至第二应用程序。这样,用户可以在第二应用程序中看到目标文件的明文。
在一些实施例中,当第二操作为写操作时,该方法500还可以包括:对写操作对应的第一内容进行加密;将加密后的第一内容写入目标地址中。
示例性地,参见前文中的步骤414-416,第二App对链接文件执行写操作时,自动转换到对文档1执行写操作,并将写操作对应的内容进行加密,然后写入目标地址中。
本申请实施例中,当第二应用程序对链接文件执行写操作时,可以自动转换为对目标文件执行写操作。此时,可以对写操作对应的第一内容进行加密操作,然后将其写入实际存储目标文件的目标地址中。该技术方案中,第二应用程序无需进行任何修改如适配或集成SDK,可以对权限文件执行写操作。
在一些实施例中,该方法500还可以包括:将第一内容写入成功的结果发送至第二应用程序。
示例性地,参见步骤417-418,可以将加密后的第一内容写入成功的结果发送至第二App。
本申请实施例中,可以将写操作对应的第一内容写入成功的结果发送至第二应用程序,从而第二应用程序可以确定用户编辑的内容写入成功。
在一些实施例中,在获取第一应用程序向第二应用程序发送的打开目标文件的第一操作之前,该方法500还可以包括:确定目标文件为权限文件。
本申请实施例中,在获取第一操作之前,可以先确定目标文件是权限文件,然后执行后面的步骤。该技术方案可以区分文件的类型,对于权限文件执行本申请中的技术方案,对于非权限文件,则可以直接打开。
在一些实施例中,确定目标文件为权限文件,包括:根据目标文件的标识信息,确定目标文件为权限文件,其中,标识信息为第一应用程序添加的。
应理解,该标识信息可以为特殊标识,如后缀名.dlp,该标识信息也可以为指示信息。
本申请实施例中,第一应用程序可以在确定目标文件为权限文件时,对该目标文件添加标识信息,从而文件系统在获取第一操作时,可以根据标识信息确定目标文件为权限文件。
在一些实施例中,确定目标文件为权限文件,包括:根据目标文件的标识信息,直接确定目标文件为权限文件。
应理解,该标识信息不是第一应用程序添加的,而是对目标文件添加权限后生成的特殊信息。
本申请实施例中,第一应用程序无需对目标文件进行任何操作,系统也可以根据目标文件的标识信息直接确定该目标文件为权限文件。
在一些实施例中,在根据第一操作生成链接文件之前,该方法500还可以包括:校验第二应用程序或第二应用程序登录的用户的权限。
应理解,本申请实施例对于具体的校验方式不予限定。
本申请实施例中,为了保证目标文件的安全性,在根据第一操作生成链接文件之前,还会校验第二应用程序或登录第二应用程序的用户的权限。该技术方案可以保证目标文件的安全性。
在一些实施例中,校验第二应用程序或第二应用程序登录的用户的权限,包括:从目标地址中获取目标文件的权限证书;根据权限证书校验第二应用程序或第二应用程序登录的用户的权限。
本申请实施例中,可以从目标地址中获取目标文件的权限证书,然后根据该权限证书确定第二应用程序或第二应用程序登录的用户的相应权限。
在一些实施例中,该链接文件为空文件。
应理解,该链接文件为空文件可以理解为:该链接文件的大小为0、包括的内容为空、文件属性也为空。
在一些实施例中,第二操作包括以下任意一项或多项:链接文件的读操作;链接文件的写操作;链接文件的文件属性的读操作;链接文件的文件属性的写操作;链接文件的打开操作;链接文件的关闭操作。
应理解,该第二操作还可以包括保存、截图、打印等等,本申请实施例不予限定。
本申请实施例中,当第二应用程序对链接文件执行上述操作时,可以自动转换为对目标文件执行相应的操作。
图6是本申请实施例提供的一种电子设备的示意性框图。
如图6所示,该电子设备600可以包括一个或多个存储器610和一个或多个处理器620。
该一个或多个存储器610中存储有一个或多个计算机程序,该一个或多个计算机程序包括指令,当该指令被一个或多个处理器620执行时,使得如前文中任一种可能的实现方式中所述的转换文件格式的方法被执行。
在一些实施例中,当该指令被一个或多个处理器620执行时,该电子设备600可以执行如下步骤:获取第一应用程序向第二应用程序发送的打开目标文件的第一操作;根据第一操作生成链接文件,该链接文件与目标文件相关联;向第二应用程序发送链接文件。
在一些实施例中,当该指令被一个或多个处理器620执行时,该电子设备600可以执行如下步骤:检测第二应用程序对链接文件进行的第二操作;将第二应用程序对链接文件的第二操作转换为对目标文件进行的第二操作。
在一些实施例中,当所述第二操作为读操作时,当该指令被一个或多个处理器620执行时,该电子设备600可以执行如下步骤:从目标地址中读取目标文件。
在一些实施例中,当该指令被一个或多个处理器620执行时,该电子设备600可以执行如下步骤:对目标文件进行解密,得到目标文件的明文;将目标文件的明文发送至第二应用程序。
在一些实施例中,当所述第二操作为写操作时,当该指令被一个或多个处理器620执行时,该电子设备600可以执行如下步骤:对所述写操作对应的第一内容进行加密;将加密后的第一内容写入目标地址中。
在一些实施例中,当该指令被一个或多个处理器620执行时,该电子设备600可以执行如下步骤:将所述第一内容写入成功的结果发送至第二应用程序。
在一些实施例中,在电子设备获取第一应用程序向第二应用程序发送的打开目标文件的第一操作之前,该电子设备还用于执行:确定目标文件为权限文件。
在一些实施例中,当该指令被一个或多个处理器620执行时,该电子设备600可以执行如下步骤:根据目标文件的标识信息,确定目标文件为权限文件,其中,标识信息为第一应用程序添加的。
在一些实施例中,当该指令被一个或多个处理器620执行时,该电子设备600可以执行如下步骤:根据目标文件的标识信息,直接确定目标文件为权限文件。
在一些实施例中,在电子设备根据第一操作生成链接文件之前,该电子设备600还用于执行:校验第二应用程序或第二应用程序登录的用户的权限。
在一些实施例中,当该指令被一个或多个处理器620执行时,该电子设备600可以执行如下步骤:根据权限证书校验第二应用程序或第二应用程序登录的用户的权限
在一些实施例中,该链接文件为空文件。
在一些实施例中,该第二操作包括以下任意一项或多项:链接文件的读操作;链接文件的写操作;链接文件的文件属性的读操作;链接文件的文件属性的写操作;链接文件的打开操作;链接文件的关闭操作。
本申请实施例还提供一种电子设备,包括用于实现上述功能的各个模块或单元。
本申请实施例还提供一种芯片,所述芯片包括处理器和通信接口,所述通信接口用于接收信号,并将所述信号传输至所述处理器,所述处理器处理所述信号,使得如前文中任一种可能的实现方式中所述的转换文件格式的方法被执行。
本实施例还提供一种计算机可读存储介质,该计算机可读存储介质中存储有计算机指令,当该计算机指令在计算机上运行时,使得上述实施例中的转换文件格式的方法被执行。
本实施例还提供了一种计算机程序产品,当该计算机程序产品在计算机上运行时,使得计算机执行上述相关步骤,以实现上述实施例中的转换文件格式的方法。
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在本申请所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。
所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(read-only memory,ROM)、随机存取存储器(random access memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以所述权利要求的保护范围为准。

Claims (16)

  1. 一种转换文件格式的方法,其特征在于,包括:
    获取第一应用程序向第二应用程序发送的打开目标文件的第一操作;
    根据所述第一操作生成链接文件,所述链接文件与所述目标文件相关联;
    向所述第二应用程序发送所述链接文件。
  2. 根据权利要求1所述的方法,其特征在于,所述方法还包括:
    检测所述第二应用程序对所述链接文件进行的第二操作;
    将所述第二应用程序对所述链接文件的第二操作转换为对所述目标文件进行的第二操作。
  3. 根据权利要求2所述的方法,其特征在于,当所述第二操作为读操作时,所述将所述第二应用程序对所述链接文件的第二操作转换为对所述目标文件进行的第二操作,包括:
    从目标地址中读取所述目标文件。
  4. 根据权利要求2或3所述的方法,其特征在于,所述方法还包括:
    对所述目标文件进行解密,得到所述目标文件的明文;
    将所述目标文件的明文发送至所述第二应用程序。
  5. 根据权利要求2所述的方法,其特征在于,当所述第二操作为写操作时,所述方法还包括:
    对所述写操作对应的第一内容进行加密;
    将加密后的第一内容写入所述目标地址中。
  6. 根据权利要求5所述的方法,其特征在于,所述方法还包括:
    将所述第一内容写入成功的结果发送至所述第二应用程序。
  7. 根据权利要求1-6中任一项所述的方法,其特征在于,在获取第一应用程序向第二应用程序发送的打开目标文件的第一操作之前,所述方法还包括:
    确定所述目标文件为权限文件。
  8. 根据权利要求7所述的方法,其特征在于,所述确定所述目标文件为权限文件,包括:
    根据所述目标文件的标识信息,确定所述目标文件为权限文件,其中,所述标识信息为所述第一应用程序添加的。
  9. 根据权利要求7所述的方法,其特征在于,所述确定所述目标文件为权限文件,包括:
    根据所述目标文件的标识信息,直接确定所述目标文件为权限文件。
  10. 根据权利要求1-9中任一项所述的方法,其特征在于,在所述根据所述第一操作生成链接文件之前,所述方法还包括:
    校验所述第二应用程序或所述第二应用程序登录的用户的权限。
  11. 根据权利要求10所述的方法,其特征在于,所述校验所述第二应用程序或所述第二应用程序登录的用户的权限,包括:
    从所述目标地址中获取所述目标文件的权限证书;
    根据所述权限证书校验所述第二应用程序或所述第二应用程序登录的用户的权限。
  12. 根据权利要求1-11中任一项所述的方法,其特征在于,所述链接文件为空文件。
  13. 根据权利要求2-12中任一项所述的方法,其特征在于,所述第二操作包括以下任意一项或多项:
    所述链接文件的读操作;
    所述链接文件的写操作;
    所述链接文件的文件属性的读操作;
    所述链接文件的文件属性的写操作;
    所述链接文件的打开操作;
    所述链接文件的关闭操作。
  14. 一种电子设备,其特征在于,包括:一个或多个处理器;一个或多个存储器;所述一个或多个存储器存储有一个或多个计算机程序,所述一个或多个计算机程序包括指令,当所述指令被一个或多个处理器执行时,使得如权利要求1-13中任一项所述的转换文件格式的方法被执行。
  15. 一种芯片,其特征在于,所述芯片包括处理器和通信接口,所述通信接口用于接收信号,并将所述信号传输至所述处理器,所述处理器处理所述信号,使得如权利要求1-13中任一项所述的转换文件格式的方法被执行。
  16. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质中存储有计算机指令,当所述计算机指令在计算机上运行时,使得如权利要求1-13中任一项所述的转换文件格式的方法被执行。
PCT/CN2023/092275 2022-05-11 2023-05-05 转换文件格式的方法和电子设备 WO2023216989A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202210511148.6A CN115062588A (zh) 2022-05-11 2022-05-11 转换文件格式的方法和电子设备
CN202210511148.6 2022-05-11

Publications (1)

Publication Number Publication Date
WO2023216989A1 true WO2023216989A1 (zh) 2023-11-16

Family

ID=83199098

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/092275 WO2023216989A1 (zh) 2022-05-11 2023-05-05 转换文件格式的方法和电子设备

Country Status (2)

Country Link
CN (1) CN115062588A (zh)
WO (1) WO2023216989A1 (zh)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115062588A (zh) * 2022-05-11 2022-09-16 华为技术有限公司 转换文件格式的方法和电子设备

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102236762A (zh) * 2010-04-30 2011-11-09 国际商业机器公司 用于处理对多租户应用的文件访问的方法和文件代理装置
CN104766027A (zh) * 2015-03-25 2015-07-08 深圳市金立通信设备有限公司 一种数据访问方法
US20180039652A1 (en) * 2016-08-02 2018-02-08 Microsoft Technology Licensing, Llc Symbolic link based placeholders
CN109766700A (zh) * 2018-05-04 2019-05-17 360企业安全技术(珠海)有限公司 访问文件的控制方法及装置、存储介质、电子装置
CN111479250A (zh) * 2020-03-31 2020-07-31 歌尔科技有限公司 一种文件共享方法、装置、系统及终端设备
CN112597523A (zh) * 2021-03-02 2021-04-02 冷杉云(北京)科技股份有限公司 文件处理方法、文件转换加密机、终端、服务器及介质
CN113672576A (zh) * 2020-05-15 2021-11-19 华为技术有限公司 文件共享方法及终端设备
CN115062588A (zh) * 2022-05-11 2022-09-16 华为技术有限公司 转换文件格式的方法和电子设备

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102236762A (zh) * 2010-04-30 2011-11-09 国际商业机器公司 用于处理对多租户应用的文件访问的方法和文件代理装置
CN104766027A (zh) * 2015-03-25 2015-07-08 深圳市金立通信设备有限公司 一种数据访问方法
US20180039652A1 (en) * 2016-08-02 2018-02-08 Microsoft Technology Licensing, Llc Symbolic link based placeholders
CN109766700A (zh) * 2018-05-04 2019-05-17 360企业安全技术(珠海)有限公司 访问文件的控制方法及装置、存储介质、电子装置
CN111479250A (zh) * 2020-03-31 2020-07-31 歌尔科技有限公司 一种文件共享方法、装置、系统及终端设备
CN113672576A (zh) * 2020-05-15 2021-11-19 华为技术有限公司 文件共享方法及终端设备
CN112597523A (zh) * 2021-03-02 2021-04-02 冷杉云(北京)科技股份有限公司 文件处理方法、文件转换加密机、终端、服务器及介质
CN115062588A (zh) * 2022-05-11 2022-09-16 华为技术有限公司 转换文件格式的方法和电子设备

Also Published As

Publication number Publication date
CN115062588A (zh) 2022-09-16

Similar Documents

Publication Publication Date Title
US9807066B2 (en) Secure data transmission and verification with untrusted computing devices
US9165139B2 (en) System and method for creating secure applications
US9225533B2 (en) System and method for interapplication communications
US8260353B2 (en) SIM messaging client
CN109840436A (zh) 数据处理方法、可信用户界面资源数据的应用方法及装置
US20130125196A1 (en) Method and apparatus for combining encryption and steganography in a file control system
EP2371096B1 (en) Electronic file sending method
CN112287372B (zh) 用于保护剪贴板隐私的方法和装置
JP4647392B2 (ja) デバイス制御装置、デバイス制御方法およびプログラム
US9524394B2 (en) Method and apparatus for providing provably secure user input/output
WO2023216989A1 (zh) 转换文件格式的方法和电子设备
CN112100639B (zh) 一种基于元数据业务信息的数据加密传输的方法、系统
JP2010134935A (ja) ファイル操作を実行するための方法及び装置
WO2022062980A1 (zh) 一种通信方法、装置及电子设备和存储介质
KR101952139B1 (ko) 사용자 단말과 연동된 게이트웨이 서버에서 drm 기능을 제공하는 방법
US10140431B2 (en) File management system and user terminal in file management system
WO2007068263A1 (en) Device, system and method for allowing authorised access to a digital content
JP4607023B2 (ja) ログ収集システム及びログ収集方法
US9537842B2 (en) Secondary communications channel facilitating document security
CN110737910A (zh) 一种Android log解密管理方法、装置、设备和介质
CN104915607A (zh) 一种基于移动终端的密码数据处理和交换方法
KR20150101833A (ko) 휴대용 단말기를 이용한 소프트웨어 복제방지 및 권한인증 장치 및 그 방법
US20080059794A1 (en) Method, apparatus and computer readable medium for secure conversion of confidential files
CN115996126B (zh) 信息交互方法、应用设备、辅助平台及电子设备
KR20180043679A (ko) 게이트웨이 서버와 연동된 클라우드 저장소 서버에서 drm 기능을 제공하는 방법

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23802761

Country of ref document: EP

Kind code of ref document: A1