[go: up one dir, main page]

WO2017113953A1 - 一种文档处理方法及装置 - Google Patents

一种文档处理方法及装置 Download PDF

Info

Publication number
WO2017113953A1
WO2017113953A1 PCT/CN2016/103146 CN2016103146W WO2017113953A1 WO 2017113953 A1 WO2017113953 A1 WO 2017113953A1 CN 2016103146 W CN2016103146 W CN 2016103146W WO 2017113953 A1 WO2017113953 A1 WO 2017113953A1
Authority
WO
WIPO (PCT)
Prior art keywords
document
electronic device
target
geographic location
password
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/CN2016/103146
Other languages
English (en)
French (fr)
Inventor
黄传通
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Kingsoft Office Software Inc
Zhuhai Kingsoft Office Software Co Ltd
Guangzhou Kingsoft Mobile Technology Co Ltd
Original Assignee
Beijing Kingsoft Office Software Inc
Zhuhai Kingsoft Office Software Co Ltd
Guangzhou Kingsoft Mobile Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Kingsoft Office Software Inc, Zhuhai Kingsoft Office Software Co Ltd, Guangzhou Kingsoft Mobile Technology Co Ltd filed Critical Beijing Kingsoft Office Software Inc
Priority to US16/066,353 priority Critical patent/US10984114B2/en
Priority to JP2018534158A priority patent/JP6774084B2/ja
Priority to KR1020187020007A priority patent/KR102212202B1/ko
Publication of WO2017113953A1 publication Critical patent/WO2017113953A1/zh
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/29Geographical information databases
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/903Querying
    • G06F16/9035Filtering based on additional data, e.g. user or group profiles
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/93Document management systems
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/52Network services specially adapted for the location of the user terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0872Generation of secret information including derivation or calculation of cryptographic keys or passwords using geo-location information, e.g. location data, time, relative position or proximity to other entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2149Restricted operating environment

Definitions

  • the present application relates to the field of computer technologies, and in particular, to a document processing method and apparatus.
  • the purpose of the embodiment of the present application is to provide a document processing method and device for performing geographic location-based encryption and decryption on a document, thereby ensuring the security and convenience of document processing in a collaborative office scenario.
  • the technical solutions are as follows:
  • the embodiment of the present application provides a document processing method, which is applied to a first electronic device, where the method includes:
  • the target geographic location matches a target password used to pre-encrypt the document; wherein the target password is: used by a second electronic device storing the document to encrypt the document Authorizing to process the password of the document, and the password used is formed based on the geographic location of the second electronic device;
  • the document is allowed to perform the predetermined operation; if not, the document is prohibited from being subjected to the predetermined operation.
  • the predetermined operation comprises: a document opening operation
  • the target password is: a geographical location of the second electronic device and a first preset radius value
  • Determining whether the target geographic location matches a target password used to pre-encrypt the document includes:
  • the predetermined operation comprises: a document editing operation
  • the target password is: a geographical location of the second electronic device and a second preset radius value
  • Determining whether the target geographic location matches a target password used to pre-encrypt the document includes:
  • the predetermined operation comprises: a document opening operation
  • the target password is: a third predetermined area range centered on a geographic location where the second electronic device is located;
  • Determining whether the target geographic location matches a target password used to pre-encrypt the document includes:
  • the predetermined operation comprises: a document editing operation
  • the target password is: a fourth predetermined area range centered on a geographical location where the second electronic device is located;
  • Determining whether the target geographic location is related to a target password used to pre-encrypt the document Matches including:
  • the method further includes:
  • An encryption operation is performed on the document with the current target password formed, and the formed target password is encrypted and written into the document.
  • the method further includes:
  • the prompt information about prohibiting processing within the geographical range of the document that is authorized to process the document is output.
  • the acquiring the target geographic location where the first electronic device is currently located includes:
  • the embodiment of the present application further provides a document processing apparatus, which is applied to a first electronic device, where the device includes:
  • An acquiring module configured to acquire a target geographic location where the first electronic device is currently located when a predetermined operation for the document is detected
  • a determining module configured to determine whether the target geographic location matches a target password used to pre-encrypt the document; wherein the target password is: when the second electronic device storing the document encrypts the document a password used to authorize processing of the document, and the password used is formed based on a geographic location of the second electronic device;
  • a decision module configured to allow the document to be performed by the predetermined operation if the determination result is yes; if not, to prohibit the document from being performed by the predetermined operation.
  • the predetermined operation comprises: a document opening operation
  • the target password is: a geographical location of the second electronic device and a first preset radius value
  • the determining module includes:
  • a first area determining unit configured to determine a first predetermined area range having a radius of a first preset radius value centered on a geographic location of the second electronic device used for pre-encrypting the document;
  • the first determining unit is configured to determine whether the target geographic location is within the first predetermined area.
  • the predetermined operation comprises: a document editing operation
  • the target password is: a geographical location of the second electronic device and a second preset radius value
  • the determining module includes:
  • a second area determining unit configured to determine a second predetermined area range centered on a geographic location of the second electronic device used to pre-encrypt the document, and having a second predetermined radius value as a radius;
  • the second determining unit is configured to determine whether the target geographic location is within the second predetermined area.
  • the predetermined operation comprises: a document opening operation
  • the target password includes: a third predetermined area range centered on a geographic location where the second electronic device is located;
  • the determining module includes:
  • a third determining unit configured to determine whether the target geographic location is within a third predetermined area that is centered on the geographic location of the second electronic device used to pre-encrypt the document.
  • the predetermined operation comprises: a document editing operation
  • the target password is: a fourth predetermined area range centered on a geographical location where the second electronic device is located;
  • the determining module includes:
  • a fourth determining unit configured to determine whether the target geographic location is within a fourth predetermined area that is centered on a geographic location of the second electronic device used to pre-encrypt the document.
  • the method further comprises:
  • An encryption authority obtaining module configured to obtain an encryption authority of the document according to a password used by the target password to be encrypted and written into the document after the decision module allows the document to be performed by the predetermined operation, wherein The target password is previously encrypted and written into the document;
  • An encryption instruction obtaining module for obtaining a location-based encryption instruction regarding a predetermined operation of the document
  • a password forming module configured to form a current target password based on a geographic location of the first electronic device
  • an encryption module configured to perform an encryption operation on the document with the formed target password, and encrypt the formed target password into the document.
  • a document processing apparatus provided by the embodiment of the present application further includes:
  • an output module configured to output prompt information about prohibiting processing within a geographical range that is not authorized to process the document after the decision module prohibits the document from being performed by the predetermined operation.
  • the acquiring module includes:
  • an obtaining unit configured to determine whether a predetermined operation regarding the document is set to a geographically-based restricted state, and if yes, determine a target geographic location where the first electronic device is currently located.
  • an embodiment of the present application further provides an electronic device, including: a housing, a processor, a memory, a circuit board, and a power supply circuit, wherein the circuit board is disposed inside the space enclosed by the housing, the processor and the memory Provided on a circuit board; a power supply circuit for powering various circuits or devices of the electronic device; a memory for storing executable program code; and a processor for executing the embodiment code of the present application by running executable program code stored in the memory
  • an electronic device including: a housing, a processor, a memory, a circuit board, and a power supply circuit, wherein the circuit board is disposed inside the space enclosed by the housing, the processor and the memory Provided on a circuit board; a power supply circuit for powering various circuits or devices of the electronic device; a memory for storing executable program code; and a processor for executing the embodiment code of the present application by running executable program code stored in the memory
  • an embodiment of the present application further provides an executable program code for being executed to execute the document processing method provided by the embodiment of the present application.
  • the embodiment of the present application further provides a storage medium, where the storage medium is used to store executable program code, and the executable program code is executed to execute the document processing method provided by the embodiment of the present application. .
  • the embodiment of the present application discloses a document processing method and device.
  • the second electronic device encrypts the document
  • the password formed based on the geographical location of the second electronic device is used as the target password used for authorizing the processing of the document.
  • the method performs encryption; when performing a predetermined operation on the document, obtaining a target geographic location where the first electronic device is currently located, determining whether the target geographical location matches the target password used to pre-encrypt the document, and if the determination result is yes, Allowing the document to perform a predetermined operation, in this way authorizing the document to be subjected to a predetermined operation in a geographical location matching the target password used to pre-encrypt the document, the decryption is successful, the authorization is completed, and the operation is simple and convenient.
  • the document is prohibited from being subjected to a predetermined operation, and in this way, the document is prohibited from being in a geographical position that does not match the target password used to pre-encrypt the document.
  • the predetermined operation is performed at the location, the decryption is unsuccessful, and the security is completed. jobs.
  • the solution performs geographical location-based encryption and decryption on the document, and the document sharing does not require the password and the document to be transmitted at the same time, which reduces the cumbersome operation, and the password does not need to be propagated, so that the user in the authorized area can access the document instead of Users in the authorized area cannot access the documents, which avoids the insecure problem of documents caused by insecure passwords. Therefore, this solution can ensure the security and convenience of document processing in a collaborative office environment.
  • FIG. 1 is a flowchart of a document processing method according to an embodiment of the present application
  • FIG. 2 is another flowchart of a document processing method according to an embodiment of the present application.
  • FIG. 3 is another flowchart of a document processing method according to an embodiment of the present application.
  • FIG. 4 is another flowchart of a document processing method according to an embodiment of the present application.
  • FIG. 5 is a schematic structural diagram of a document processing apparatus according to an embodiment of the present disclosure.
  • FIG. 6 is another schematic structural diagram of a document processing apparatus according to an embodiment of the present application.
  • the embodiment of the present application provides a document processing method and device, which can ensure the security and convenience of document processing in a collaborative office scenario by performing location-based encryption and decryption on the document.
  • a document processing method and apparatus provided by the embodiments of the present application may also be utilized.
  • a document processing method provided by the embodiment of the present application is first introduced.
  • the document processing method provided by the embodiment of the present application is applied to the first electronic device.
  • the first electronic device may be: a smart phone, a tablet computer, a notebook computer, etc. It is all reasonable.
  • the function software that implements a document processing method provided by the embodiment of the present application may be a plug-in of an existing office software, such as a plug-in of a WPS office software, a plug-in of an Office office software, etc., of course, For independent office software.
  • the “first” in the “first electronic device” mentioned in the embodiment of the present application and the “second” in the subsequent “second electronic device” are merely used to distinguish the electronic device that decrypts the document from the naming and The electronic device for encrypting the document does not have any limiting meaning; and the electronic device that decrypts the document and the electronic device that encrypts the document may be the same or different electronic devices, and the same electronic device may refer to the same electronic device. Can refer to two electronic devices of the same type.
  • FIG. 1 is a flowchart of a document processing method according to an embodiment of the present application.
  • a document processing method according to an embodiment of the present application may include the following steps:
  • the document may be encrypted in advance based on the geographic location in the second electronic device.
  • a predetermined operation may be issued on the document, and correspondingly, when the first electronic device detects the predetermined operation for the document, the current electronic device may be automatically acquired.
  • the target geographic location which in turn performs subsequent decryption processing.
  • the predetermined operation may be: a document opening operation or a document editing operation, and is not limited thereto.
  • the predetermined operation may also be: a document content cutting operation, a document content copying operation, or a document content deleting operation. ,and many more.
  • the target password is: a password used by the second electronic device storing the document to encrypt the document to authorize processing of the document, and the used password is formed based on the geographic location of the second electronic device.
  • the geographic location where the second electronic device is located in the embodiment of the present application refers to the geographic location where the second electronic device encrypts the document.
  • the second electronic device encrypts the document in advance using the target password.
  • the encrypted instruction can be given through the interface operation of the document, and the second electronic device encrypts the document after receiving the encrypted instruction, for example: When the second electronic device encrypts the document, you can select the file encryption menu under the document file menu, and output the encrypted menu tab.
  • the tab has a “Location Based Service LBS (Location Based Service) fence technology to open the file limit” And the "Use LBS Fence Technology for File Editing Restrictions” option, select “Use LBS Fence Technology to Open Limits on Files” and / or “Use LBS Fence Technology to Edit Limits on Files” option to enable users to check the tabs.
  • LBS Location Based Service
  • a geo-location based encryption instruction is issued regarding the corresponding predetermined operation of the document.
  • the target password is formed based on a geographic location where the second electronic device encrypts the document.
  • any specified geographic location may be selected, and then the required target password is formed based on the geographic location, and the arbitrarily designated geographic location may be a known direct input geographic location, or may be passed through The geographical location required for the second electronic device or other auxiliary device.
  • the target password may be a geographical location and a preset radius value on which the password is formed, or a specific area centered on the geographical location on which the password is formed, and the size of the specific area may be encrypted. Limit the radius by setting any value greater than 0 as the radius.
  • the specific process of determining whether the target geographical location matches the target password used to pre-encrypt the document is different, and for the clear layout and clear solution, the subsequent determination of the target geographic location is performed. Whether or not the specific implementation process that matches the target password used to pre-encrypt the document is described in detail.
  • the target geographical location matches the target password used to pre-encrypt the document, it indicates that the user holding the first electronic device is within the authorized access area, and at this time, the document may be allowed to perform the predetermined operation.
  • the document is prohibited from being executed by the predetermined operation.
  • the target geographical location does not match the target password used to pre-encrypt the document, it indicates that the user holding the first electronic device is not in the authorized access area. At this time, in order to ensure document security, the document is prohibited.
  • the predetermined operation is performed.
  • the information of the geographical location on which the target password is formed is allowed to be viewed, so that the user can select to move to a suitable geographic location suitable for authorization processing after viewing the information of the geographical location, so as to be authorized to operate the document.
  • the target geographical location of the first electronic device is equal to the geographic location of the document to be processed, and is also equivalent to the geographical location of the network accessed by the first electronic device.
  • the geographic location of the second electronic device The location is actually equal to the geographic location of the document to be processed and the geographic location of the network accessed by the second electronic device. Therefore, the target geographic location where the first electronic device is located and the geographic location where the second electronic device is located Can be through existing GPS positioning technology, too It can be obtained by the existing IP positioning technology, and can also be obtained by using other positioning means.
  • the GPS positioning technology is a positioning technology based on GPS (Global Positioning System), which is based on IP. Location technology (Internet Protocol Address).
  • the solution performs geographical location-based encryption and decryption on the document, and the document sharing does not require the password and the document to be transmitted at the same time, which reduces the cumbersome operation, and the password does not need to be propagated, so that the user in the authorized area can access the document instead of Users in the authorized area cannot access the documents, which avoids the insecure problem caused by insecure password transmission. Therefore, the solution can ensure the security and convenience of document processing in the collaborative office environment.
  • the target password may include: a geographic location where the second electronic device is located and a preset radius value, whether the predetermined operation includes a document opening operation or a document editing operation.
  • Whether the target geographical location matches the target password used to pre-encrypt the document (S102) may include:
  • S1021 Determine a first predetermined area range with a radius of a first preset radius value centered on a geographic location of the second electronic device used for pre-encrypting the document;
  • the first preset radius value may be specified by the user or the system default when the second electronic device encrypts the document, and if the second electronic device encrypts the document, the document is written when the second electronic device encrypts the document.
  • the target password is the geographical location of the second electronic device and the preset radius value
  • the predetermined operation including the document editing operation whether the target geographic location is determined relative to the embodiment shown in FIG. Matching with the target password used to pre-encrypt the document (S102), which may include:
  • the radius of the second predetermined area range may be specified by the user or the system default by the second electronic device when encrypting the document. If the user specifies, the second electronic device needs to write the document when the document is encrypted.
  • the authorization restriction of the document opening operation and the authorization restriction of the document editing may be used alone or in combination.
  • the first predetermined area range and the second predetermined area range may be set to any size according to actual conditions. When the two are equal, only one of them may be stored. For example, when used in combination, the document is usually used. The authorized scope of the edit needs to be smaller than the authorized range in which the document is opened. Therefore, the second predetermined area range is smaller than the first predetermined area range.
  • the document to be processed is important, and only the small range is allowed to be edited, and the larger range is only allowed to open. The editing is prohibited, and at this time, the second predetermined area range may be set smaller than the first predetermined area range.
  • the target password may be set as the geographical location of the second electronic device and the determination threshold, and the specific implementation of determining whether the target geographical location matches the target password used in the pre-encrypted document may be determined.
  • the limitation of the embodiment of the present application is not limited.
  • the geographic location of the second electronic device and the determination threshold the following implementation manner may be adopted, for example:
  • determining whether the target geographical location matches the target password used to pre-encrypt the document may include:
  • determining whether the target geographical location matches the target password used by the pre-encrypted document may include:
  • the first determination threshold and the second determination threshold may be set to arbitrary values; in the case where the two are used in combination, in the above embodiment, If the first judgment threshold is set to be larger than the second judgment threshold, it is also possible to allow editing only in a small range, and only allow viewing to be opened in a larger range, and editing is prohibited.
  • the target password may be within a certain area centered on the geographical location where the second electronic device is located.
  • the third predetermined area range may be a circular range determined by the document storing the geographical location of the second electronic device and the third preset radius; or a range of special shapes obtained by other methods, such as a polygon range, for example
  • the polygon range can be determined by determining a plurality of reference points around the geographic location where the second electronic device is located, and as shown in FIG. 2, determining whether the target geographic location is used with the pre-encrypted document.
  • the target passwords match (S102) and may include:
  • the predetermined operation includes a document editing operation
  • the predetermined operation includes a document editing operation
  • the target password being a fourth predetermined area range centered on the geographical location where the second electronic device is located, where the second electronic device is located
  • the fourth predetermined area range that is centered may be a circular range determined by the document storing the geographical location of the second electronic device and the fourth predetermined radius, or may be a range of special shapes obtained by other methods, such as a polygon range.
  • the range of polygons The plurality of reference points around the geographical location where the second electronic device is located may be determined and connected, and the target geographic location is determined to match the target password used by the pre-encrypted document with respect to the embodiment of FIG. 1 (S102). include:
  • the target geographical position is within the fourth predetermined area centered on the geographical position of the second electronic device used in the pre-encrypted document, and if so, the document is allowed to perform a predetermined operation; otherwise, the document is prohibited from being subjected to the predetermined operation.
  • the authorization restriction of the document opening operation and the authorization restriction of the document editing may exist separately or in combination.
  • the third predetermined area range and the fourth predetermined area range size may be any size, and the actual use may be according to specific office needs. When the two are equal, only one of them may be stored, for example, for In the case of a combination, in an actual application, the authorization range of the document editing generally needs to be smaller than the authorization range of the document opening. Therefore, the fourth predetermined area range is smaller than the third predetermined area range.
  • the document to be processed is important, and only wants to be small. Editing is allowed in the range, and editing is prohibited only in the larger range, and editing is prohibited. In this case, the fourth predetermined area range may be set smaller than the third predetermined area range.
  • the geographical location acquired by the existing positioning technology is not very accurate, and there may be certain errors. Therefore, in the process of actually setting a password, when a strict authorization condition is required, the The first predetermined area range, the second predetermined area range, the third predetermined area range, the fourth predetermined area range, the first determination threshold, and the second determination threshold are set to be smaller than actually needed; when a looser authorization condition is required.
  • the first predetermined area range, the second predetermined area range, the third predetermined area range, the fourth predetermined area range, the first determination threshold, and the second determination threshold may be set to be larger than actually needed.
  • the processing method may further include:
  • S105 Encrypt the permission used to write the document according to the target password, and obtain the encryption permission of the document, wherein the target password is previously encrypted and written into the document.
  • the encryption command can be given through the interface operation of the document, such as selecting the file encryption menu under the document file menu, outputting the encryption menu tab, the tab has "restriction on opening the file using LBS fence technology” and “using LBS” "Fence technology for file editing restrictions” option, select “Use LBS fence technology to open restrictions on files” and / or “Use LBS fence technology to limit file editing” option, so that users can check out the document by checking the tab A location-based encryption instruction corresponding to a predetermined operation.
  • the current target password is formed as the modified new target password.
  • steps S106-S108 can be directly performed.
  • the document has a function of prohibiting the user from modifying the target password.
  • most users in the collaborative office area are not required to know the password used by the target password to be encrypted and written to the document, and the geographic location of most of the electronic devices used by the employee is only If the target password is matched, the document can be opened or edited, so that most of the work requirements can be met. Therefore, the password used to encrypt the target password is not required to be written to the document, and the security of the password can be ensured. .
  • the method for processing the document further includes:
  • Outputs prompt information about processing that is not allowed within the geographic location where the document is authorized to be processed.
  • the content of the prompt information is specifically as follows: “The target geographical location of the electronic device is not in the LBS fence, the processing of the document is prohibited” or “the target geographical location of the electronic device does not match the target password, and the processing of the document is prohibited” or “the electronic The target geographic location of the device is not within the scope of authorization, and the document is prohibited from being processed.
  • the target geographic location of the first electronic device may be included in the following manners:
  • the step of determining the target geographic location where the first electronic device is currently located is performed, and then the subsequent processing flow is started. For example, it is judged that the document is set with the function of "restricting the opening of the file using the LBS fence technology", and/or it is judged that the document is set with the function of "restricting the file editing using the LBS fence technology”.
  • FIG. 5 is a schematic structural diagram of a document processing apparatus according to an embodiment of the present application.
  • a document processing apparatus according to an embodiment of the present application is applied to a first electronic device, and the apparatus may include:
  • the obtaining module 51 is configured to acquire a target geographic location where the first electronic device is currently located when detecting a predetermined operation for the document.
  • the determining module 52 is configured to determine whether the target geographical location matches the target password used by the pre-encrypted document; wherein the target password is: used for authorization processing when the second electronic device storing the document encrypts the document The password for the document, and the password used is based on the geographic location of the second electronic device.
  • the decision module 53 is configured to allow the document to be subjected to a predetermined operation if the determination result is YES; if not, the document is prohibited from being subjected to the predetermined operation.
  • the solution performs location-based encryption and decryption on the document, and the document sharing does not need to be performed.
  • the password is transmitted at the same time as the document, which reduces the cumbersome operation.
  • the password does not need to be transmitted, so that the user in the authorized area can access the document instead of the user in the authorized area, and the password is not safely transmitted. Insecure problems, therefore, the solution can ensure the security and convenience of document processing in a collaborative office scenario.
  • the target password is: a geographical location of the second electronic device and a first preset radius value
  • the predetermined operation includes: when the document is opened, the determining module 52 includes:
  • a first area determining unit configured to determine a first predetermined area range having a radius of a first preset radius value centered on a geographic location of the second electronic device used for pre-encrypting the document;
  • the first determining unit is configured to determine whether the target geographic location is within the first predetermined area.
  • the target password is: a geographical location of the second electronic device and a second preset radius value
  • the predetermined operation includes: a document editing operation
  • the determining module 52 includes:
  • a second area determining unit configured to determine a second predetermined area range centered on a geographic location of the second electronic device used for pre-encrypting the document, and having a second predetermined radius value as a radius;
  • the second determining unit is configured to determine whether the target geographic location is within the second predetermined area.
  • the target password is a geographic location of the second electronic device and a first determination threshold
  • the determining module 52 includes:
  • a first calculating unit configured to calculate a distance between the target geographic location and a geographic location of the second electronic device used to pre-encrypt the document
  • the first comparison determining unit is configured to determine whether the distance is smaller than the first determination threshold.
  • the target password is a geographic location of the second electronic device and a second determination threshold
  • the determining module 52 includes:
  • a second calculating unit configured to calculate a distance between the target geographic location and a geographic location of the second electronic device used to pre-encrypt the document
  • the second comparison determining unit is configured to determine whether the distance is smaller than the second determination threshold.
  • the determining module 52 when the predetermined operation includes: a document opening operation; and the target password includes: a third predetermined area range centered on a geographical location where the second electronic device is located, the determining module 52, include:
  • the third determining unit is configured to determine whether the target geographic location is within a third predetermined area that is centered on the geographic location of the second electronic device used by the pre-encrypted document.
  • the determining module 52 includes:
  • the fourth determining unit is configured to determine whether the target geographical location is within a fourth predetermined area that is centered on the geographic location of the second electronic device used by the pre-encrypted document.
  • FIG. 6 is another schematic structural diagram of a device for processing a document according to an embodiment of the present application.
  • a device for processing a document according to an embodiment of the present application further includes:
  • the encryption authority obtaining module 54 is configured to obtain the encryption authority of the document according to the password used by the target password to be encrypted and written into the document after the decision module allows the document to be performed by the predetermined operation, wherein the target password is previously encrypted and written into the document;
  • An encryption instruction obtaining module 55 configured to obtain a location-based encryption instruction regarding a predetermined operation of the document
  • the password forming module 56 is configured to form a current target password based on the geographic location of the first electronic device
  • the encryption module 57 is configured to perform an encryption operation on the document with the formed target password, and encrypt the formed target password into the document.
  • a document processing apparatus provided by an embodiment of the present application further includes:
  • an output module configured to output prompt information about prohibiting processing within a geographical range of the authorized processing document after the decision module prohibits the document from being performed by the predetermined operation.
  • the obtaining module 51 includes: an obtaining unit, configured to determine whether a predetermined operation regarding the document is set to a geographically-based restricted state, and if yes, determine a target geographic location where the first electronic device is currently located.
  • an embodiment of the present application further provides an electronic device, including: a housing, a processor, a memory, a circuit board, and a power supply circuit, wherein the circuit board is disposed inside the space enclosed by the housing, the processor and the memory Provided on a circuit board; a power supply circuit for powering various circuits or devices of the electronic device; a memory for storing executable program code; and a processor for executing the embodiment code of the present application by running executable program code stored in the memory
  • the document processing method provided, specifically, the document processing method, including:
  • the target geographic location matches a target password used to pre-encrypt the document; wherein the target password is: used by a second electronic device storing the document to encrypt the document Authorizing to process the password of the document, and the password used is formed based on the geographic location of the second electronic device;
  • the document is allowed to perform the predetermined operation; if not, the document is prohibited from being subjected to the predetermined operation.
  • the solution performs geographical location-based encryption and decryption on the document, and the document sharing does not require the password and the document to be transmitted at the same time, which reduces the cumbersome operation, and the password does not need to be propagated, so that the user in the authorized area can access the document instead of Users in the authorized area cannot access the documents, which avoids the insecure problem caused by insecure password transmission. Therefore, the solution can ensure the security and convenience of document processing in the collaborative office environment.
  • the embodiment of the present application further provides an executable program code, where the executable program code is used to execute the document processing method provided by the embodiment of the present application, where the document processing method may be Including steps:
  • the target password is: a password used by the second electronic device storing the document to encrypt the document to authorize processing of the document, and the used password is based on the second electronic device
  • the geographical location is formed;
  • the document is allowed to perform the predetermined operation; if not, the document is prohibited from being subjected to the predetermined operation.
  • the solution performs geographical location-based encryption and decryption on the document, and the document sharing does not require the password and the document to be transmitted at the same time, which reduces the cumbersome operation, and the password does not need to be propagated, so that the user in the authorized area can access the document instead of Users in the authorized area cannot access the documents, which avoids the insecure problem caused by insecure password transmission. Therefore, the solution can ensure the security and convenience of document processing in the collaborative office environment.
  • the embodiment of the present application further provides a storage medium, where the storage medium is used to store executable program code, and the executable program code is executed to execute the document processing method provided by the embodiment of the present application.
  • the document processing method can include the steps of:
  • the target geographic location matches a target password used to pre-encrypt the document; wherein the target password is: used by a second electronic device storing the document to encrypt the document Authorizing to process the password of the document, and the password used is formed based on the geographic location of the second electronic device;
  • the document is allowed to perform the predetermined operation; if not, the document is prohibited from being subjected to the predetermined operation.
  • the solution performs geographical location-based encryption and decryption on the document, and the document sharing does not require the password and the document to be transmitted at the same time, which reduces the cumbersome operation, and the password does not need to be propagated, so that the user in the authorized area can access the document instead of Users in the authorized area cannot access the documents, which avoids the insecure problem caused by insecure password transmission. Therefore, the solution can ensure the security and convenience of document processing in the collaborative office environment.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Data Mining & Analysis (AREA)
  • Automation & Control Theory (AREA)
  • Computational Linguistics (AREA)
  • Business, Economics & Management (AREA)
  • General Business, Economics & Management (AREA)
  • Remote Sensing (AREA)
  • Document Processing Apparatus (AREA)
  • Storage Device Security (AREA)

Abstract

本申请实施例公开了一种文档处理方法及装置,该方法包括:当检测到针对于文档的预定操作时,获取所述第一电子设备当前所在的目标地理位置;判断所述目标地理位置是否与预先加密所述文档所使用的目标密码相匹配;若判断结果为是,则允许所述文档被执行所述预定操作;若为否,则禁止所述文档被执行所述预定操作,该装置包括:获取模块、判断模块和决策模块,本申请实施例采用基于地理位置形成的目标密码对文档进行加密解密,保证了密码传播的安全性,同时,提高了文档使用的安全性和授权解密的便利性。

Description

一种文档处理方法及装置
本申请要求于2015年12月31日提交中国专利局、申请号为201511034069.7发明名称为“一种文档处理方法及装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及计算机技术领域,特别涉及一种文档处理方法及装置。
背景技术
随着计算机及网络的发展,协同办公越来越普遍,在协同办公领域,企业对文档保密有着强烈的需求,因此有着各种不同程序的加密方式。
现有技术中,使用操作密码保护文档为最常见的文档保密方式,而为了方便使用方正常操作文档,文档与密码需要同时传播,操作较为繁琐,并且,密码传播不一定安全,如密码可能会丢失,需要对密码的安全性传播有严格要求,因此,有失方便性。
发明内容
本申请实施例的目的在于提供一种文档处理方法及装置,以对文档进行基于地理位置的加密及解密,从而保证协同办公场景下文档处理的安全性以及便捷性。技术方案如下:
第一方面,本申请实施例提供了一种文档处理方法,应用于第一电子设备,所述方法包括:
当检测到针对于文档的预定操作时,获取所述第一电子设备当前所在的目标地理位置;
判断所述目标地理位置是否与预先加密所述文档所使用的目标密码相匹配;其中,所述目标密码为:存储有所述文档的第二电子设备对所述文档加密时所使用的用于授权处理所述文档的密码,且所使用密码基于所述第二电子设备所在地理位置所形成;
若判断结果为是,则允许所述文档被执行所述预定操作;若为否,则禁止所述文档被执行所述预定操作。
优选地,所述预定操作包括:文档打开操作;
所述目标密码为:所述第二电子设备所在地理位置和第一预设半径值;
所述判断所述目标地理位置是否与预先加密所述文档所使用的目标密码相匹配,包括:
确定以预先加密所述文档所使用的所述第二电子设备所在地理位置为中心,以第一预设半径值为半径的第一预定区域范围;
判断所述目标地理位置是否在所述第一预定区域范围内。
优选地,所述预定操作包括:文档编辑操作;
所述目标密码为:所述第二电子设备所在地理位置和第二预设半径值;
所述判断所述目标地理位置是否与预先加密所述文档所使用的目标密码相匹配,包括:
确定以预先加密所述文档所使用的所述第二电子设备所在地理位置为中心,以第二预设半径值为半径的第二预定区域范围;
判断所述目标地理位置是否在所述第二预定区域范围内。
优选地,所述预定操作包括:文档打开操作;
所述目标密码为:以所述第二电子设备所在的地理位置为中心的第三预定区域范围;
所述判断所述目标地理位置是否与预先加密所述文档所使用的目标密码相匹配,包括:
判断所述目标地理位置是否在预先加密所述文档所使用的以所述第二电子设备所在地理位置为中心的第三预定区域范围内。
优选地,所述预定操作包括:文档编辑操作;
所述目标密码为:以所述第二电子设备所在的地理位置为中心的第四预定区域范围;
所述判断所述目标地理位置是否与预先加密所述文档所使用的目标密码 相匹配,包括:
判断所述目标地理位置是否在预先加密所述文档所使用的以所述第二电子设备所在地理位置为中心的第四预定区域范围内。
优选地,本申请实施例所提供的一种文档处理方法在允许所述文档被执行所述预定操作之后,还包括:
根据所述目标密码被加密写入所述文档所使用的密码,获得所述文档的加密权限,其中,所述目标密码预先被加密写入所述文档;
获得关于所述文档的预定操作的基于地理位置的加密指令;
基于所述第一电子设备所在地理位置形成本次的目标密码;
以所形成的本次的目标密码对所述文档执行加密操作,并将所形成的本次的目标密码加密写入所述文档。
优选地,本申请实施例所提供的一种文档处理方法在禁止所述文档被执行所述预定操作之后,还包括:
输出关于不在授权处理所述文档的地理位置范围内而禁止处理的提示信息。
优选地,所述获取所述第一电子设备当前所在的目标地理位置,包括:
判断关于所述文档的预定操作是否被设置为基于地理位置的限制状态,如果是,确定所述第一电子设备当前所在的目标地理位置。
第二方面,本申请实施例还提出了一种文档处理装置,应用于第一电子设备,所述装置包括:
获取模块,用于当检测到针对于文档的预定操作时,获取所述第一电子设备当前所在的目标地理位置;
判断模块,用于判断所述目标地理位置是否与预先加密所述文档所使用的目标密码相匹配;其中,所述目标密码为:存储有所述文档的第二电子设备对所述文档加密时所使用的用于授权处理所述文档的密码,且所使用密码基于所述第二电子设备所在地理位置所形成;
决策模块,用于若判断结果为是,则允许所述文档被执行所述预定操作;若为否,则禁止所述文档被执行所述预定操作。
优选地,所述预定操作包括:文档打开操作;
所述目标密码为:所述第二电子设备所在地理位置和第一预设半径值;
所述判断模块,包括:
第一区域确定单元,用于确定以预先加密所述文档所使用的所述第二电子设备所在地理位置为中心,以第一预设半径值为半径的第一预定区域范围;
第一判断单元,用于判断所述目标地理位置是否在所述第一预定区域范围内。
优选地,所述预定操作包括:文档编辑操作;
所述目标密码为:所述第二电子设备所在地理位置和第二预设半径值;
所述判断模块,包括:
第二区域确定单元,用于确定以预先加密所述文档所使用的所述第二电子设备所在地理位置为中心,以第二预设半径值为半径的第二预定区域范围;
第二判断单元,用于判断所述目标地理位置是否在所述第二预定区域范围内。
优选地,所述预定操作包括:文档打开操作;
所述目标密码包括:以所述第二电子设备所在的地理位置为中心的第三预定区域范围;
所述判断模块,包括:
第三判断单元,用于判断所述目标地理位置是否在预先加密所述文档所使用的以所述第二电子设备所在地理位置为中心的第三预定区域范围内。
优选地,所述预定操作包括:文档编辑操作;
所述目标密码为:以所述第二电子设备所在的地理位置为中心的第四预定区域范围;
所述判断模块,包括:
第四判断单元,用于判断所述目标地理位置是否在预先加密所述文档所使用的以所述第二电子设备所在地理位置为中心的第四预定区域范围内。
优选地,还包括:
加密权限获得模块,用于在所述决策模块允许所述文档被执行所述预定操作之后,根据所述目标密码被加密写入所述文档所使用的密码,获得所述文档的加密权限,其中,所述目标密码预先被加密写入所述文档;
加密指令获得模块,用于获得关于所述文档的预定操作的基于地理位置的加密指令;
密码形成模块,用于基于所述第一电子设备所在地理位置形成本次的目标密码;
加密模块,用于以所形成的本次的目标密码对所述文档执行加密操作,并将所形成的本次的目标密码加密写入所述文档。
优选地,本申请实施例所提供的一种文档处理装置还包括:
输出模块,用于在所述决策模块禁止所述文档被执行所述预定操作之后,输出关于不在授权处理所述文档的地理位置范围内而禁止处理的提示信息。
优选地,所述获取模块,包括:
获取单元,用于判断关于所述文档的预定操作是否被设置为基于地理位置的限制状态,如果是,确定所述第一电子设备当前所在的目标地理位置。
另一方面,本申请实施例还提供了一种电子设备,包括:壳体、处理器、存储器、电路板和电源电路,其中,电路板安置在壳体围成的空间内部,处理器和存储器设置在电路板上;电源电路,用于为电子设备的各个电路或器件供电;存储器用于存储可执行程序代码;处理器通过运行存储器中存储的可执行程序代码,以执行本申请实施例所提供的所述文档处理方法。
另一方面,本申请实施例还提供了一种可执行程序代码,所述可执行程序代码用于被运行以执行本申请实施例所提供的所述文档处理方法。
另一方面,本申请实施例还提供了一种存储介质,所述存储介质用于存储可执行程序代码,所述可执行程序代码被运行以执行本申请实施例所提供的所述文档处理方法。
本申请实施例公开了一种文档处理方法及装置,第二电子设备对文档进行加密时,采用的是基于第二电子设备所在地理位置形成的密码作为授权处理文档使用的目标密码,通过这种方式进行加密;在对该文档进行预定操作时,获取第一电子设备当前所在的目标地理位置,判断目标地理位置是否与预先加密该文档所使用的目标密码相匹配,若判断结果为是,则允许该文档被执行预定操作,通过这种方式授权允许该文档在与预先加密该文档所使用的目标密码相匹配的地理位置上被执行预定操作,解密成功,即可完成授权,操作简单,方便,提高对文档授权进行预定操作的便利性;若匹配结果为否,则禁止该文档被执行预定操作,通过这种方式禁止该文档在与预先加密该文档所使用的目标密码不相匹配的地理位置上被执行预定操作,解密不成功,完成保密工作。可见,本方案对文档进行基于地理位置的加密及解密,文档共享时无需密码与文档同时传输,降低了操作繁琐性,并且,密码无需传播便可使被授权区域内的用户能够访问文档而非被授权区域内的用户无法访问文档,避免了密码传播不安全所导致的文档不安全问题,因此,通过本方案能够保证协同办公场景下文档处理的安全性以及便捷性。
当然,实施本申请的任一产品或方法必不一定需要同时达到以上所述的所有优点。
附图说明
为了更清楚地说明本申请实施例和现有技术的技术方案,下面对实施例和现有技术中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1为本申请实施例所提供的一种文档处理方法的流程图;
图2为本申请实施例所提供的一种文档处理方法的另一种流程图;
图3为本申请实施例所提供的一种文档处理方法的另一种流程图;
图4为本申请实施例所提供的一种文档处理方法的另一种流程图;
图5为本申请实施例所提供的一种文档处理装置的结构示意图;
图6为本申请实施例所提供的一种文档处理装置的另一结构示意图。
具体实施方式
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本申请实施例一部分实施例,而不是全部的实施例。基于本申请实施例中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本申请实施例保护的范围。
为了解决现有技术问题,本申请实施例提供了一种文档处理方法及装置,通过对文档进行基于地理位置的加密及解密,从而保证协同办公场景下的文档处理的安全性以及便捷性。当然,在其他基于区域来区分访问权限的场景中,也可以利用本申请实施例所提供的一种文档处理方法及装置。
下面首先对本申请实施例所提供的一种文档处理方法进行介绍。
需要说明的是,本申请实施例所提供的一种文档处理方法应用于第一电子设备中,在实际应用中,该第一电子设备可以为:智能手机、平板电脑、笔记本电脑等设备,这都是合理的。
本申请实施例中所涉及的文档在电子设备中使用时,均与其他同类文档具有兼容性。
可以理解的是,实现本申请实施例所提供的一种文档处理方法的功能软件可以为现有办公软件的插件,如:WPS办公软件的插件、Office办公软件的插件等等,当然,也可以为独立的办公软件。另外,本申请实施例所提及的“第一电子设备”中的“第一”和后续的“第二电子设备”中的“第二”仅仅为了从命名上区分对文档解密的电子设备和对文档加密的电子设备,并不具有任何限定意义;并且,对文档解密的电子设备和对文档加密的电子设备可以为相同或不同的电子设备,相同的电子设备可以是指同一个电子设备也可以指同类型的两个电子设备。
图1为本申请实施例所提供的一种文档处理方法的流程图,参阅图1,本申请实施例所提出的一种文档处理方法,可以包括如下步骤:
S101、当检测到针对于文档的预定操作时,获取第一电子设备当前所在的目标地理位置。
其中,为了授权预定区域的用户访问文档,可以预先在第二电子设备中基于地理位置对该文档进行加密处理。当持有第一电子设备的用户需要处理文档时,可以对文档发出预定操作,相应的,当第一电子设备检测到针对于文档的预定操作时,可以自动获取该第一电子设备当前所在的目标地理位置,进而执行后续的解密处理。可以理解的是,该预定操作可以为:文档打开操作或文档编辑操作,当然并不局限于此,例如,该预定操作还可以为:文档内容剪切操作、文档内容复制操作或文档内容删除操作,等等。
S102、判断该目标地理位置是否与预先加密该文档所使用的目标密码相匹配,如果是,执行S103;否则,执行S104;
在获取第一电子设备当前所在的目标地理位置后,可以判断该目标地理位置是否与预先加密该文档所使用的目标密码相匹配,并根据不同的判断结果执行不同的操作。其中,该目标密码为:存储有该文档的第二电子设备对该文档加密时所使用的用于授权处理该文档的密码,且所使用密码基于该第二电子设备所在地理位置所形成。
需要说明的是,本申请实施例中第二电子设备所在的地理位置,指的是第二电子设备加密该文档时所在的地理位置。第二电子设备预先使用目标密码对该文档进行加密,实际使用中,可通过文档的界面操作给予加密指令,第二电子设备收到加密指令后对文档进行加密操作,举例而言:在通过第二电子设备对文档加密时,可以选择文档文件菜单下的文件加密菜单,输出加密菜单选项卡,选项卡上设有“使用LBS(Location Based Service,基于位置的服务)围栏技术对文件打开限制”和“使用LBS围栏技术对文件编辑限制”的选项,选择“使用LBS围栏技术对文件打开限制”和/或“使用LBS围栏技术对文件编辑限制”选项,以使得用户通过勾选选项卡的方式发出关于该文档的对应预定操作的基于地理位置的加密指令。本实施例中,该目标密码是基于第二电子设备对该文档进行加密时所在的地理位置形成的。可以理解 的是,在实际使用中,可以选取任意指定地理位置,再基于该地理位置形成所需要的目标密码,该任意指定的地理位置可以是已知的直接输入使用的地理位置,也可以是通过第二电子设备或其他辅助设备现获得的需要的地理位置。
并且,该目标密码可以是该密码形成时所基于的地理位置和预设半径值,或,以该密码形成时所基于的地理位置为中心的某一个特定区域,该特定区域的大小可以在加密时通过设置任意大于0的值作为半径进行限制,限制出一个圆形范围。
需要说明的是,由于目标密码形式不同,判断该目标地理位置是否与预先加密该文档所使用的目标密码相匹配的具体过程也不同,而为了布局清楚以及方案清楚,后续对判断该目标地理位置是否与预先加密该文档所使用的目标密码相匹配的具体实现过程进行详细介绍。
S103、允许该文档被执行该预定操作;
当判断出该目标地理位置与预先加密该文档所使用的目标密码相匹配时,表明持有该第一电子设备的用户在授权访问区域内,此时,可以允许该文档被执行该预定操作。
S104、禁止该文档被执行该预定操作。
当判断出该目标地理位置与预先加密该文档所使用的目标密码不匹配时,表明持有该第一电子设备的用户未在授权访问区域内,此时,为了保证文档安全性,禁止该文档被执行预定操作。
另外,目标密码形成所基于的地理位置的信息允许被查看,这样可以方便用户在查看到该地理位置的信息后选择移动到合适的便于授权处理的地理位置,以便被授权操作文档。
需要强调的是,第一电子设备所在的目标地理位置既等同于待处理的文档的地理位置,也等同于第一电子设备所接入的网络的地理位置,同理,第二电子设备所在地理位置实际上既等同于待处理的文档的地理位置,也等同于第二电子设备所接入的网络的地理位置,所以,第一电子设备所在的目标地理位置、第二电子设备所在的地理位置可以通过现有的GPS定位技术,也 可以通过现有的IP定位技术获得,当然也可以应用其他定位手段获得,其中,所述GPS定位技术即为基于GPS(GlobalPositioningSystem,全球定位系统)的定位技术,所述IP定位技术即为基于IP地址(Internet Protocol Address,网际协议地址)的定位技术。
可见,本方案对文档进行基于地理位置的加密及解密,文档共享时无需密码与文档同时传输,降低了操作繁琐性,并且,密码无需传播便可使被授权区域内的用户能够访问文档而非被授权区域内的用户无法访问文档,避免了密码传播不安全所导致的不安全问题,因此,通过本方案能够保证协同办公场景下文档处理的安全性以及便捷性。
具体的,在一种实现方式中,无论预定操作包括文档打开操作还是文档编辑操作,该目标密码均可以包括:第二电子设备所在地理位置和预设半径值。
基于该目标密码为该第二电子设备所在地理位置和预设半径值的情况,对于预定操作包括文档打开操作而言,相对于图1所示实施例而言,如图2所示,判断该目标地理位置是否与预先加密该文档所使用的目标密码相匹配(S102),可以包括:
S1021,确定以预先加密文档所使用的第二电子设备所在地理位置为中心,以第一预设半径值为半径的第一预定区域范围;
S1022,判断该目标地理位置是否在该第一预定区域范围内,如果是,执行S103;否则,执行S104。
其中,第一预设半径值可以由第二电子设备对文档加密时由用户指定或系统默认指定,若为用户指定,需在第二电子设备对该文档加密时,写入该文档。
类似的,基于该目标密码为该第二电子设备所在地理位置和预设半径值的情况,对于预定操作包括文档编辑操作而言,相对于图1所示实施例而言,判断目标地理位置是否与预先加密该文档所使用的目标密码相匹配(S102),可以包括:
确定以预先加密文档所使用的第二电子设备所在地理位置为中心,以第二预设半径值为半径的第二预定区域范围;
判断目标地理位置是否在第二预定区域范围内,如果是,允许该文档被执行该预定操作;否则,禁止该文档被执行该预定操作。
其中,第二预定区域范围的半径可以由第二电子设备对文档加密时由用户指定或系统默认指定,若为用户指定,需在第二电子设备对该文档加密时,写入该文档。
另外,在该种实现方式中,文档打开操作的授权限制和文档编辑的授权限制可以单独存在也可以结合使用。单独使用或结合使用时,第一预定区域范围和第二预定区域范围都可以根据实际情况设置任意大小,两者相等时,还可以只存储其中一个,举例来说,对于结合使用时,通常文档编辑的授权范围需要小于文档打开的授权范围,因此,第二预定区域范围小于第一预定区域范围,例如,待处理的文档比较重要,只想小范围内允许编辑,较大范围内只允许打开查看而禁止编辑,此时,可以设置第二预定区域范围小于第一预定区域范围。
需要说明的是,类似上述的目标密码的形式,还可以将目标密码设为第二电子设备所在地理位置和判断阈值,判断目标地理位置是否与预先加密文档所使用的目标密码相匹配的具体实现仅仅作为示例,并不应该构成对本申请实施例的限定,针对目标密码为第二电子设备所在地理位置和判断阈值,可以采用以下实现方式,举例而言:
当预定操作为文档打开操作时,判断目标地理位置是否与预先加密该文档所使用的目标密码相匹配,可以包括:
计算目标地理位置与以预先加密该文档所使用的该第二电子设备所在地理位置之间的距离;
判断该距离是否小于第一判断阈值,如果小于,允许该文档被执行该预定操作;否则,禁止该文档被执行该预定操作;
而当预定操作为文档编辑操作时,判断目标地理位置是否与预先加密文档所使用的目标密码相匹配,可以包括:
计算目标地理位置与以预先加密该文档所使用的该第二电子设备所在地理位置之间的距离;
判断该距离是否小于第二判断阈值,如果小于,允许该文档被执行该预定操作;否则,禁止该文档被执行该预定操作。
同理,对于文档打开操作的授权限制和文档编辑的授权限制单独使用的情况,可以设置第一判断阈值和第二判断阈值为任意值;对于两者结合使用的情况,在上述实施例中,设置第一判断阈值大于第二判断阈值,也可实现只想小范围内允许编辑,较大范围内只允许打开查看而禁止编辑。
具体的,在另一种实现方式中,无论预定操作包括文档打开操作还是文档编辑操作,该目标密码可以为以第二电子设备所在的地理位置为中心的某一区域范围内。
当预定操作包括文档打开操作时,基于该目标密码为以该第二电子设备所在的地理位置为中心的第三预定区域范围的情况,这里所说的以该第二电子设备所在地理位置为中心的第三预定区域范围可以是通过文档存储第二电子设备所在地理位置和第三预设半径所确定的圆形范围;也可以是通过其他方式获取的特殊形状的范围,如多边形范围,举例来说,多边形范围可以通过确定第二电子设备所在的地理位置周围的多个参考点并连接围成,相对于图1实施例,如图2所示,判断目标地理位置是否与预先加密文档所使用的目标密码相匹配(S102),可以包括:
S1023,判断该目标地理位置是否在预先加密该文档所使用的以该第二电子设备所在地理位置为中心的第三预定区域范围内,如果是,执行S103;否则,执行S104。
类似的,当预定操作包括文档编辑操作,基于该目标密码为以该第二电子设备所在的地理位置为中心的第四预定区域范围的情况,这里所说的以该第二电子设备所在地理位置为中心的第四预定区域范围可以是通过文档存储第二电子设备所在地理位置和第四预设半径所确定的圆形范围,也可以是通过其他方式获取的特殊形状的范围,如多边形范围,举例来说,多边形范围 可以通过确定第二电子设备所在的地理位置周围的多个参考点并连接围成,相对于图1实施例,判断目标地理位置是否与预先加密文档所使用的目标密码相匹配(S102),可以包括:
判断目标地理位置是否在预先加密文档所使用的以第二电子设备所在地理位置为中心的第四预定区域范围内,如果是,允许文档被执行预定操作;否则,禁止文档被执行预定操作。
可以理解的是,在该种实现方式中,文档打开操作的授权限制和文档编辑的授权限制可以单独存在也可以结合使用。单独使用或结合使用时,第三预定区域范围和第四预定区域范围大小可以为任意大小,实际使用可以根据具体的办公需要,两者相等时,还可以只存储其中一个,举例来说,对于结合使用的情况,在实际应用中,通常文档编辑的授权范围需要小于文档打开的授权范围,因此,第四预定区域范围小于第三预定区域范围,例如,待处理的文档比较重要,只想小范围内允许编辑,较大范围内只允许打开查看而禁止编辑,此时,可以设置第四预定区域范围小于第三预定区域范围。
由于现有技术的限制,现有的定位技术所获取的地理位置不是非常的准确,可能会存在一定的误差,因此,在实际设置密码的过程中,当需要较严格的授权条件时,可以将第一预定区域范围、第二预定区域范围、第三预定区域范围、第四预定区域范围、第一判断阈值和第二判断阈值设置成比实际需要的要小一些;当需要较宽松的授权条件时,可以将第一预定区域范围、第二预定区域范围、第三预定区域范围、第四预定区域范围、第一判断阈值和第二判断阈值设置成比实际需要的要大一些。
为了进一步提高文档使用的便利性,采用对目标密码加密解密的方式授权部分用户可以更改密码,相对于图1所示的实施例,如图4所示,本申请实施例所提供的一种文档处理方法还可以包括:
S105、根据目标密码被加密写入该文档所使用的密码,获得该文档的加密权限,其中,目标密码预先被加密写入该文档。
S106、获得关于该文档的预定操作的基于地理位置的加密指令。
实际使用时,可通过文档的界面操作给予加密指令,如选择文档文件菜单下的文件加密菜单,输出加密菜单选项卡,选项卡上设有“使用LBS围栏技术对文件打开限制”和“使用LBS围栏技术对文件编辑限制”的选项,选择“使用LBS围栏技术对文件打开限制”和/或“使用LBS围栏技术对文件编辑限制”选项,以使得用户通过勾选选项卡的方式发出关于该文档的对应预定操作的基于地理位置的加密指令。
S107、基于第一电子设备所在地理位置形成本次的目标密码。
该步骤中形成本次的目标密码,作为修改后的新的目标密码。
S108、以所形成的本次的目标密码对该文档执行加密操作,并将所形成的本次的目标密码加密写入该文档。
若初次对需要加密的文档进行加密,可直接执行步骤S106-S108。
对于上述“使用LBS围栏技术对文件打开限制”和“使用LBS围栏技术对文件编辑限制”的两种限制状态,可以同时一起设置同一个目标密码并用同一个密码对目标密码加密,或,可以采用不同的目标密码并用同一个密码对目标密码进行加密,或,可以采用不同的目标密码且分别用不同的密码对目标密码进行加密。
在具体加密过程中,在用户不知道目标密码被加密写入文档所使用的密码的情况下,该文档具有禁止用户修改目标密码的功能。再者,在实际协同办公区域,一般情况下,不需要协同办公区域内的大部分用户知道目标密码被加密写入该文档所使用的密码,大部分员工所使用的电子设备的地理位置只要与目标密码匹配,即可对文档进行打开或编辑操作,这样即可满足大部分工作需求,因此,不需要大范围的传播目标密码被加密写入该文档所使用的密码,能够保证密码的安全性。
为了进一步提高用户的使用体验,在禁止该文档被执行该预定操作之后,处理文档的方法还包括:
输出关于不在授权处理该文档的地理位置范围内而禁止处理的提示信息。
该提示信息的内容具体如,“该电子设备的目标地理位置不在LBS围栏内,禁止处理该文档”或“该电子设备的目标地理位置与目标密码不匹配,禁止处理该文档”或“该电子设备的目标地理位置不在授权范围内,禁止处理该文档”等。
更进一步的,由于文档加密存在多种方式,为了提高文档处理效率,获取第一电子设备当前所在的目标地理位置,可以包括:
判断关于该文档的预定操作是否被设置为基于地理位置的限制状态,如果是,确定该第一电子设备当前所在的目标地理位置。
其中,当判断出关于该文档的预定操作被设置为基于地理位置的限制状态时,才去执行确定该第一电子设备当前所在的目标地理位置的步骤,进而开启后续的处理流程。例如,判断出文档被设置了“使用LBS围栏技术对文件打开限制”的功能,和/或,判断出文档被设置了“使用LBS围栏技术对文件编辑限制”的功能。
相应于上述方法实施例,本申请实施例提供了一种文档处理装置。图5为本申请实施例提出的一种文档处理装置的一种结构示意图,参阅图5,本申请实施例提出的一种文档处理装置,应用于第一电子设备,该装置可以包括:
获取模块51,用于当检测到针对于文档的预定操作时,获取第一电子设备当前所在的目标地理位置。
判断模块52,用于判断目标地理位置是否与预先加密文档所使用的目标密码相匹配;其中,目标密码为:存储有该文档的第二电子设备对该文档加密时所使用的用于授权处理该文档的密码,且所使用密码基于第二电子设备所在地理位置所形成。
决策模块53,用于若判断结果为是,则允许文档被执行预定操作;若为否,则禁止文档被执行预定操作。
可见,本方案对文档进行基于地理位置的加密及解密,文档共享时无需 密码与文档同时传输,降低了操作繁琐性,并且,密码无需传播便可使被授权区域内的用户能够访问文档而非被授权区域内的用户无法访问文档,避免了密码传播不安全所导致的不安全问题,因此,通过本方案能够保证协同办公场景下文档处理的安全性以及便捷性。
一种实施例中,目标密码为:第二电子设备所在地理位置和第一预设半径值,预定操作包括:文档打开操作时,判断模块52,包括:
第一区域确定单元,用于确定以预先加密文档所使用的第二电子设备所在地理位置为中心,以第一预设半径值为半径的第一预定区域范围;
第一判断单元,用于判断目标地理位置是否在第一预定区域范围内。
另一实施例中,目标密码为:第二电子设备所在地理位置和第二预设半径值,预定操作包括:文档编辑操作,判断模块52,包括:
第二区域确定单元,用于确定以预先加密文档所使用的第二电子设备所在地理位置为中心,以第二预设半径值为半径的第二预定区域范围;
第二判断单元,用于判断目标地理位置是否在第二预定区域范围内。
一种实施例中,目标密码为第二电子设备所在地理位置和第一判断阈值,判断模块52,包括:
第一计算单元,用于计算目标地理位置与以预先加密该文档所使用的该第二电子设备所在地理位置之间的距离;
第一比较判断单元,用于判断该距离是否小于第一判断阈值。
另一实施例中,目标密码为第二电子设备所在地理位置和第二判断阈值,判断模块52,包括:
第二计算单元,用于计算目标地理位置与以预先加密该文档所使用的该第二电子设备所在地理位置之间的距离;
第二比较判断单元,用于判断该距离是否小于第二判断阈值。
在另一实施例中,当预定操作包括:文档打开操作;目标密码包括:以第二电子设备所在的地理位置为中心的第三预定区域范围时,判断模块52, 包括:
第三判断单元,用于判断目标地理位置是否在预先加密文档所使用的以第二电子设备所在地理位置为中心的第三预定区域范围内。
在另一实施例中,当预定操作包括:文档编辑操作;目标密码为:以第二电子设备所在的地理位置为中心的第四预定区域范围时;判断模块52,包括:
第四判断单元,用于判断目标地理位置是否在预先加密文档所使用的以第二电子设备所在地理位置为中心的第四预定区域范围内。
更进一步的,图6为本申请实施例提出的一种处理文档装置的另一种结构示意图,参阅图6,本申请实施例提出的一种处理文档装置,还包括:
加密权限获得模块54,用于在决策模块允许文档被执行预定操作之后,根据目标密码被加密写入文档所使用的密码,获得文档的加密权限,其中,目标密码预先被加密写入文档;
加密指令获得模块55,用于获得关于文档的预定操作的基于地理位置的加密指令;
密码形成模块56,用于基于第一电子设备所在地理位置形成本次的目标密码;
加密模块57,用于以所形成的本次的目标密码对文档执行加密操作,并将所形成的本次的目标密码加密写入文档。
上述结构中,本申请实施例所提供的一种文档处理装置还包括:
输出模块,用于在所述决策模块禁止所述文档被执行所述预定操作之后,输出关于不在授权处理文档的地理位置范围内而禁止处理的提示信息。
另外,获取模块51包括:获取单元,用于判断关于文档的预定操作是否被设置为基于地理位置的限制状态,如果是,确定第一电子设备当前所在的目标地理位置。
另一方面,本申请实施例还提供了一种电子设备,包括:壳体、处理器、存储器、电路板和电源电路,其中,电路板安置在壳体围成的空间内部,处理器和存储器设置在电路板上;电源电路,用于为电子设备的各个电路或器件供电;存储器用于存储可执行程序代码;处理器通过运行存储器中存储的可执行程序代码,以执行本申请实施例所提供的文档处理方法,具体的,该文档处理方法,包括:
当检测到针对于文档的预定操作时,获取所述第一电子设备当前所在的目标地理位置;
判断所述目标地理位置是否与预先加密所述文档所使用的目标密码相匹配;其中,所述目标密码为:存储有所述文档的第二电子设备对所述文档加密时所使用的用于授权处理所述文档的密码,且所使用密码基于所述第二电子设备所在地理位置所形成;
若判断结果为是,则允许所述文档被执行所述预定操作;若为否,则禁止所述文档被执行所述预定操作。
可见,本方案对文档进行基于地理位置的加密及解密,文档共享时无需密码与文档同时传输,降低了操作繁琐性,并且,密码无需传播便可使被授权区域内的用户能够访问文档而非被授权区域内的用户无法访问文档,避免了密码传播不安全所导致的不安全问题,因此,通过本方案能够保证协同办公场景下文档处理的安全性以及便捷性。
另一方面,本申请实施例还提供了一种可执行程序代码,该可执行程序代码用于被运行以执行本申请实施例所提供的所述文档处理方法,其中,该文档处理方法,可以包括步骤:
当检测到针对于文档的预定操作时,获取所述第一电子设备当前所在的目标地理位置;
判断所述目标地理位置是否与预先加密所述文档所使用的目标密码相匹 配;其中,所述目标密码为:存储有所述文档的第二电子设备对所述文档加密时所使用的用于授权处理所述文档的密码,且所使用密码基于所述第二电子设备所在地理位置所形成;
若判断结果为是,则允许所述文档被执行所述预定操作;若为否,则禁止所述文档被执行所述预定操作。
可见,本方案对文档进行基于地理位置的加密及解密,文档共享时无需密码与文档同时传输,降低了操作繁琐性,并且,密码无需传播便可使被授权区域内的用户能够访问文档而非被授权区域内的用户无法访问文档,避免了密码传播不安全所导致的不安全问题,因此,通过本方案能够保证协同办公场景下文档处理的安全性以及便捷性。
另一方面,本申请实施例还提供了一种存储介质,所述存储介质用于存储可执行程序代码,所述可执行程序代码被运行以执行本申请实施例所提供的所述文档处理方法,其中,该文档处理方法,可以包括步骤:
当检测到针对于文档的预定操作时,获取所述第一电子设备当前所在的目标地理位置;
判断所述目标地理位置是否与预先加密所述文档所使用的目标密码相匹配;其中,所述目标密码为:存储有所述文档的第二电子设备对所述文档加密时所使用的用于授权处理所述文档的密码,且所使用密码基于所述第二电子设备所在地理位置所形成;
若判断结果为是,则允许所述文档被执行所述预定操作;若为否,则禁止所述文档被执行所述预定操作。
可见,本方案对文档进行基于地理位置的加密及解密,文档共享时无需密码与文档同时传输,降低了操作繁琐性,并且,密码无需传播便可使被授权区域内的用户能够访问文档而非被授权区域内的用户无法访问文档,避免了密码传播不安全所导致的不安全问题,因此,通过本方案能够保证协同办公场景下文档处理的安全性以及便捷性。
需要说明的是,在本文中,诸如第一和第二等之类的关系术语仅仅用来将一个实体或者操作与另一个实体或操作区分开来,而不一定要求或者暗示这些实体或操作之间存在任何这种实际的关系或者顺序。而且,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者设备所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括该要素的过程、方法、物品或者设备中还存在另外的相同要素。
本说明书中的各个实施例均采用相关的方式描述,各个实施例之间相同相似的部分互相参见即可,每个实施例重点说明的都是与其他实施例的不同之处。尤其,对于装置实施例而言,由于其基本相似于方法实施例,所以描述的比较简单,相关之处参见方法实施例的部分说明即可。
本领域普通技术人员可以理解实现上述方法实施方式中的全部或部分步骤是可以通过程序来指令相关的硬件来完成,该的程序可以存储于计算机可读取存储介质中,这里所称得的存储介质,如:ROM/RAM、磁碟、光盘等。
以上该仅为本申请的较佳实施例而已,并非用于限定本申请的保护范围。凡在本申请的精神和原则之内所作的任何修改、等同替换、改进等,均包含在本申请的保护范围内。

Claims (19)

  1. 一种文档处理方法,其特征在于,应用于第一电子设备,所述方法包括:
    当检测到针对于文档的预定操作时,获取所述第一电子设备当前所在的目标地理位置;
    判断所述目标地理位置是否与预先加密所述文档所使用的目标密码相匹配;其中,所述目标密码为:存储有所述文档的第二电子设备对所述文档加密时所使用的用于授权处理所述文档的密码,且所使用密码基于所述第二电子设备所在地理位置所形成;
    若判断结果为是,则允许所述文档被执行所述预定操作;若为否,则禁止所述文档被执行所述预定操作。
  2. 根据权利要求1所述的方法,其特征在于,所述预定操作包括:文档打开操作;
    所述目标密码为:所述第二电子设备所在地理位置和第一预设半径值;
    所述判断所述目标地理位置是否与预先加密所述文档所使用的目标密码相匹配,包括:
    确定以预先加密所述文档所使用的所述第二电子设备所在地理位置为中心,以第一预设半径值为半径的第一预定区域范围;
    判断所述目标地理位置是否在所述第一预定区域范围内。
  3. 根据权利要求1所述的方法,其特征在于,所述预定操作包括:文档编辑操作;
    所述目标密码为:所述第二电子设备所在地理位置和第二预设半径值;
    所述判断所述目标地理位置是否与预先加密所述文档所使用的目标密码相匹配,包括:
    确定以预先加密所述文档所使用的所述第二电子设备所在地理位置为中心,以第二预设半径值为半径的第二预定区域范围;
    判断所述目标地理位置是否在所述第二预定区域范围内。
  4. 根据权利要求1所述的方法,其特征在于,所述预定操作包括:文档打开操作;
    所述目标密码为:以所述第二电子设备所在的地理位置为中心的第三预定区域范围;
    所述判断所述目标地理位置是否与预先加密所述文档所使用的目标密码相匹配,包括:
    判断所述目标地理位置是否在预先加密所述文档所使用的以所述第二电子设备所在地理位置为中心的第三预定区域范围内。
  5. 根据权利要求1所述的方法,其特征在于,所述预定操作包括:文档编辑操作;
    所述目标密码为:以所述第二电子设备所在的地理位置为中心的第四预定区域范围;
    所述判断所述目标地理位置是否与预先加密所述文档所使用的目标密码相匹配,包括:
    判断所述目标地理位置是否在预先加密所述文档所使用的以所述第二电子设备所在地理位置为中心的第四预定区域范围内。
  6. 根据权利要求1所述的方法,其特征在于,在允许所述文档被执行所述预定操作之后,还包括:
    根据所述目标密码被加密写入所述文档所使用的密码,获得所述文档的加密权限,其中,所述目标密码预先被加密写入所述文档;
    获得关于所述文档的预定操作的基于地理位置的加密指令;
    基于所述第一电子设备所在地理位置形成本次的目标密码;
    以所形成的本次的目标密码对所述文档执行加密操作,并将所形成的本次的目标密码加密写入所述文档。
  7. 根据权利要求1-6任一项所述的方法,其特征在于,禁止所述文档被执 行所述预定操作之后,还包括:
    输出关于不在授权处理所述文档的地理位置范围内而禁止处理的提示信息。
  8. 根据权利要求1-6任一项所述的方法,其特征在于,所述获取所述第一电子设备当前所在的目标地理位置,包括:
    判断关于所述文档的预定操作是否被设置为基于地理位置的限制状态,如果是,确定所述第一电子设备当前所在的目标地理位置。
  9. 一种文档处理装置,其特征在于,应用于第一电子设备,所述装置包括:
    获取模块,用于当检测到针对于文档的预定操作时,获取所述第一电子设备当前所在的目标地理位置;
    判断模块,用于判断所述目标地理位置是否与预先加密所述文档所使用的目标密码相匹配;其中,所述目标密码为:存储有所述文档的第二电子设备对所述文档加密时所使用的用于授权处理所述文档的密码,且所使用密码基于所述第二电子设备所在地理位置所形成;
    决策模块,用于若判断结果为是,则允许所述文档被执行所述预定操作;若为否,则禁止所述文档被执行所述预定操作。
  10. 根据权利要求9所述的装置,其特征在于,所述预定操作包括:文档打开操作;
    所述目标密码为:所述第二电子设备所在地理位置和第一预设半径值;
    所述判断模块,包括:
    第一区域确定单元,用于确定以预先加密所述文档所使用的所述第二电子设备所在地理位置为中心,以第一预设半径值为半径的第一预定区域范围;
    第一判断单元,用于判断所述目标地理位置是否在所述第一预定区域范围内。
  11. 根据权利要求9所述的装置,其特征在于,所述预定操作包括:文档 编辑操作;
    所述目标密码为:所述第二电子设备所在地理位置和第二预设半径值;
    所述判断模块,包括:
    第二区域确定单元,用于确定以预先加密所述文档所使用的所述第二电子设备所在地理位置为中心,以第二预设半径值为半径的第二预定区域范围;
    第二判断单元,用于判断所述目标地理位置是否在所述第二预定区域范围内。
  12. 根据权利要求9所述的装置,其特征在于,所述预定操作包括:文档打开操作;
    所述目标密码包括:以所述第二电子设备所在的地理位置为中心的第三预定区域范围;
    所述判断模块,包括:
    第三判断单元,用于判断所述目标地理位置是否在预先加密所述文档所使用的以所述第二电子设备所在地理位置为中心的第三预定区域范围内。
  13. 根据权利要求9所述的装置,其特征在于,所述预定操作包括:文档编辑操作;
    所述目标密码为:以所述第二电子设备所在的地理位置为中心的第四预定区域范围;
    所述判断模块,包括:
    第四判断单元,用于判断所述目标地理位置是否在预先加密所述文档所使用的以所述第二电子设备所在地理位置为中心的第四预定区域范围内。
  14. 根据权利要求9所述的装置,其特征在于,还包括:
    加密权限获得模块,用于在所述决策模块允许所述文档被执行所述预定操作之后,根据所述目标密码被加密写入所述文档所使用的密码,获得所述文档的加密权限,其中,所述目标密码预先被加密写入所述文档;
    加密指令获得模块,用于获得关于所述文档的预定操作的基于地理位置的加密指令;
    密码形成模块,用于基于所述第一电子设备所在地理位置形成本次的目标密码;
    加密模块,用于以所形成的本次的目标密码对所述文档执行加密操作,并将所形成的本次的目标密码加密写入所述文档。
  15. 根据权利要求9-14任一所述的装置,其特征在于,还包括:
    输出模块,用于在所述决策模块禁止所述文档被执行所述预定操作之后,输出关于不在授权处理所述文档的地理位置范围内而禁止处理的提示信息。
  16. 根据权利要求9-14任一所述的装置,其特征在于,所述获取模块,包括:
    获取单元,用于判断关于所述文档的预定操作是否被设置为基于地理位置的限制状态,如果是,确定所述第一电子设备当前所在的目标地理位置。
  17. 一种电子设备,其特征在于,包括:壳体、处理器、存储器、电路板和电源电路,其中,电路板安置在壳体围成的空间内部,处理器和存储器设置在电路板上;电源电路,用于为电子设备的各个电路或器件供电;存储器用于存储可执行程序代码;处理器通过运行存储器中存储的可执行程序代码,以执行权利要求1-8任一项所述的文档处理方法。
  18. 一种可执行程序代码,其特征在于,所述可执行程序代码被运行以执行权利要求1-8任一项所述的文档处理方法。
  19. 一种存储介质,其特征在于,所述存储介质用于存储可执行程序代码,所述可执行程序代码被运行以执行权利要求1-8任一项所述的文档处理方法。
PCT/CN2016/103146 2015-12-31 2016-10-25 一种文档处理方法及装置 Ceased WO2017113953A1 (zh)

Priority Applications (3)

Application Number Priority Date Filing Date Title
US16/066,353 US10984114B2 (en) 2015-12-31 2016-10-25 Document processing method and apparatus
JP2018534158A JP6774084B2 (ja) 2015-12-31 2016-10-25 文書処理方法及び装置
KR1020187020007A KR102212202B1 (ko) 2015-12-31 2016-10-25 문서 처리 방법 및 장치

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201511034069.7 2015-12-31
CN201511034069.7A CN106934295A (zh) 2015-12-31 2015-12-31 一种文档处理方法及装置

Publications (1)

Publication Number Publication Date
WO2017113953A1 true WO2017113953A1 (zh) 2017-07-06

Family

ID=59224545

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/103146 Ceased WO2017113953A1 (zh) 2015-12-31 2016-10-25 一种文档处理方法及装置

Country Status (5)

Country Link
US (1) US10984114B2 (zh)
JP (1) JP6774084B2 (zh)
KR (1) KR102212202B1 (zh)
CN (1) CN106934295A (zh)
WO (1) WO2017113953A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115374293A (zh) * 2022-08-25 2022-11-22 中国银行股份有限公司 一种语料迁移方法及装置、存储介质及电子设备

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10824737B1 (en) * 2017-02-22 2020-11-03 Assa Abloy Ab Protecting data from brute force attack
CN109409118B (zh) * 2017-08-17 2020-12-11 中国移动通信有限公司研究院 一种文件保护方法、装置和计算机可读存储介质
CN107526950A (zh) * 2017-09-07 2017-12-29 努比亚技术有限公司 数据加解密方法、移动终端及计算机可读存储介质
CN108337365A (zh) * 2018-01-09 2018-07-27 维沃移动通信有限公司 一种加锁方法、解锁方法及移动终端
CN110659526B (zh) * 2018-06-29 2023-11-24 珠海金山办公软件有限公司 一种文档处理方法、装置及电子设备
CN112115685B (zh) * 2019-06-04 2024-11-08 珠海金山办公软件有限公司 文档中图形位置的保护方法、装置、电子设备及存储介质
CN112115485B (zh) * 2019-06-04 2024-06-25 珠海金山办公软件有限公司 文档中图形宽高的保护方法、装置、电子设备及存储介质
CN112036126B (zh) * 2019-06-04 2024-07-23 珠海金山办公软件有限公司 对文档中图形禁止操作的方法、装置、设备及存储介质
CN112035868B (zh) * 2019-06-04 2024-11-08 珠海金山办公软件有限公司 文档中图形旋转角度的保护方法、装置及电子设备
CN112115501B (zh) * 2019-06-04 2024-10-15 珠海金山办公软件有限公司 文档中图形形状的保护方法、装置、电子设备及存储介质
CN113158172B (zh) * 2021-02-26 2022-03-22 山东英信计算机技术有限公司 一种基于芯片的密码获取方法、装置、设备及存储介质
US12443696B2 (en) 2021-03-08 2025-10-14 Thinkspan, LLC User authentication in a recall-memory enhancing manner
CN115859246A (zh) * 2023-02-16 2023-03-28 天津联想协同科技有限公司 在线文档权限控制方法、装置、服务器及存储介质

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2006155283A (ja) * 2004-11-30 2006-06-15 Fuji Xerox Co Ltd 文書処理装置及び方法
CN103874021A (zh) * 2014-04-02 2014-06-18 上海坤士合生信息科技有限公司 安全区域识别方法、识别设备及用户终端
US20140280740A1 (en) * 2013-03-12 2014-09-18 General Electric Company Location based equipment documentation access control
CN104636645A (zh) * 2015-01-27 2015-05-20 腾讯科技(深圳)有限公司 数据访问的控制方法及装置
CN104767717A (zh) * 2014-01-03 2015-07-08 腾讯科技(深圳)有限公司 身份验证方法及装置

Family Cites Families (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH07221751A (ja) 1994-02-07 1995-08-18 Nippon Telegr & Teleph Corp <Ntt> ディジタル情報複製方法及びその装置
JP2001156766A (ja) 1999-11-29 2001-06-08 Murata Mach Ltd 暗号通信方法及び暗号通信システム
JP2002123172A (ja) * 2000-10-16 2002-04-26 Toshiba Information Systems (Japan) Corp 暗号化装置、復号化装置、情報管理システム及び施錠システム
US7120254B2 (en) * 2000-10-30 2006-10-10 Geocodex Llc Cryptographic system and method for geolocking and securing digital information
US20030108202A1 (en) * 2001-12-12 2003-06-12 Clapper Edward O. Location dependent encryption and/or decryption
JP2005128965A (ja) 2003-10-27 2005-05-19 Sony Corp アクセス権限制御装置
US7512814B2 (en) * 2004-11-09 2009-03-31 Fortiva Inc. Secure and searchable storage system and method
JP4726051B2 (ja) * 2005-06-21 2011-07-20 Kddi株式会社 アクセス制御システム
CN101901194A (zh) * 2009-08-31 2010-12-01 深圳市朗科科技股份有限公司 可根据地理位置进行功能限制的存储设备及其方法
JP2012099523A (ja) 2010-10-29 2012-05-24 Shin Etsu Chem Co Ltd 異方性希土類焼結磁石及びその製造方法
CN103514413A (zh) * 2012-06-29 2014-01-15 凹凸电子(武汉)有限公司 数字文件读取保护装置、方法以及信息处理设备
CN103107887B (zh) * 2013-01-22 2016-09-21 东莞宇龙通信科技有限公司 一种基于位置信息对文件进行操作控制的方法和装置
JP6167833B2 (ja) 2013-10-10 2017-07-26 富士ゼロックス株式会社 情報処理装置及び情報処理プログラム
WO2016093174A1 (ja) 2014-12-12 2016-06-16 日立金属株式会社 R-t-b系焼結磁石の製造方法
US10453058B2 (en) * 2014-12-17 2019-10-22 Heartland Payment Systems, Inc. E-signature

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2006155283A (ja) * 2004-11-30 2006-06-15 Fuji Xerox Co Ltd 文書処理装置及び方法
US20140280740A1 (en) * 2013-03-12 2014-09-18 General Electric Company Location based equipment documentation access control
CN104767717A (zh) * 2014-01-03 2015-07-08 腾讯科技(深圳)有限公司 身份验证方法及装置
CN103874021A (zh) * 2014-04-02 2014-06-18 上海坤士合生信息科技有限公司 安全区域识别方法、识别设备及用户终端
CN104636645A (zh) * 2015-01-27 2015-05-20 腾讯科技(深圳)有限公司 数据访问的控制方法及装置

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115374293A (zh) * 2022-08-25 2022-11-22 中国银行股份有限公司 一种语料迁移方法及装置、存储介质及电子设备

Also Published As

Publication number Publication date
US20190012468A1 (en) 2019-01-10
KR102212202B1 (ko) 2021-02-04
KR20180094063A (ko) 2018-08-22
JP2019502208A (ja) 2019-01-24
JP6774084B2 (ja) 2020-10-21
US10984114B2 (en) 2021-04-20
CN106934295A (zh) 2017-07-07

Similar Documents

Publication Publication Date Title
WO2017113953A1 (zh) 一种文档处理方法及装置
US12271493B2 (en) Controlling access to application data
US9805210B2 (en) Encryption-based data access management
KR101754308B1 (ko) 모바일 민감 데이터 관리 방법 및 이를 수행하는 위탁 서버
EP2973188B1 (en) Secondary device as key for authorizing access to resources
US9723003B1 (en) Network beacon based credential store
KR20100133953A (ko) 데이터를 안전하게 하는 시스템 및 방법
US10129299B1 (en) Network beacon management of security policies
TWI652592B (zh) Storage device and access control method thereof
US20170185790A1 (en) Dynamic management of protected file access
CN103581196A (zh) 分布式文件透明加密方法及透明解密方法
US20180053018A1 (en) Methods and systems for facilitating secured access to storage devices
WO2020155812A1 (zh) 一种数据存储方法、装置及设备
US9733852B2 (en) Encrypted synchronization
WO2023207975A1 (zh) 数据传输方法、装置和电子设备
US20170187527A1 (en) Obtaining A Decryption Key From a Mobile Device
US20160335420A1 (en) Secure Document Management
WO2015139571A1 (en) Data protection
KR102005534B1 (ko) 스마트 기기 기반의 원격 접근 제어 및 멀티 팩터 인증 시스템
WO2017020449A1 (zh) 一种指纹读取方法及用户设备
CN115913794B (zh) 数据安全传输方法、设备及介质
KR101500664B1 (ko) 휴대용 보안 기록 매체를 이용한 사내망 보안 접속 서비스 제공 방법 및 시스템
JP2008077239A (ja) 文書管理システム、文書管理方法、文書閲覧装置およびプログラム
TW201626282A (zh) 資料安全存取系統及方法

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16880744

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2018534158

Country of ref document: JP

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 20187020007

Country of ref document: KR

Kind code of ref document: A

WWE Wipo information: entry into national phase

Ref document number: 1020187020007

Country of ref document: KR

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 22/10/2018)

122 Ep: pct application non-entry in european phase

Ref document number: 16880744

Country of ref document: EP

Kind code of ref document: A1