WO2017113953A1 - 一种文档处理方法及装置 - Google Patents
一种文档处理方法及装置 Download PDFInfo
- Publication number
- WO2017113953A1 WO2017113953A1 PCT/CN2016/103146 CN2016103146W WO2017113953A1 WO 2017113953 A1 WO2017113953 A1 WO 2017113953A1 CN 2016103146 W CN2016103146 W CN 2016103146W WO 2017113953 A1 WO2017113953 A1 WO 2017113953A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- document
- electronic device
- target
- geographic location
- password
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/29—Geographical information databases
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/903—Querying
- G06F16/9035—Filtering based on additional data, e.g. user or group profiles
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/93—Document management systems
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/52—Network services specially adapted for the location of the user terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0872—Generation of secret information including derivation or calculation of cryptographic keys or passwords using geo-location information, e.g. location data, time, relative position or proximity to other entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2149—Restricted operating environment
Definitions
- the present application relates to the field of computer technologies, and in particular, to a document processing method and apparatus.
- the purpose of the embodiment of the present application is to provide a document processing method and device for performing geographic location-based encryption and decryption on a document, thereby ensuring the security and convenience of document processing in a collaborative office scenario.
- the technical solutions are as follows:
- the embodiment of the present application provides a document processing method, which is applied to a first electronic device, where the method includes:
- the target geographic location matches a target password used to pre-encrypt the document; wherein the target password is: used by a second electronic device storing the document to encrypt the document Authorizing to process the password of the document, and the password used is formed based on the geographic location of the second electronic device;
- the document is allowed to perform the predetermined operation; if not, the document is prohibited from being subjected to the predetermined operation.
- the predetermined operation comprises: a document opening operation
- the target password is: a geographical location of the second electronic device and a first preset radius value
- Determining whether the target geographic location matches a target password used to pre-encrypt the document includes:
- the predetermined operation comprises: a document editing operation
- the target password is: a geographical location of the second electronic device and a second preset radius value
- Determining whether the target geographic location matches a target password used to pre-encrypt the document includes:
- the predetermined operation comprises: a document opening operation
- the target password is: a third predetermined area range centered on a geographic location where the second electronic device is located;
- Determining whether the target geographic location matches a target password used to pre-encrypt the document includes:
- the predetermined operation comprises: a document editing operation
- the target password is: a fourth predetermined area range centered on a geographical location where the second electronic device is located;
- Determining whether the target geographic location is related to a target password used to pre-encrypt the document Matches including:
- the method further includes:
- An encryption operation is performed on the document with the current target password formed, and the formed target password is encrypted and written into the document.
- the method further includes:
- the prompt information about prohibiting processing within the geographical range of the document that is authorized to process the document is output.
- the acquiring the target geographic location where the first electronic device is currently located includes:
- the embodiment of the present application further provides a document processing apparatus, which is applied to a first electronic device, where the device includes:
- An acquiring module configured to acquire a target geographic location where the first electronic device is currently located when a predetermined operation for the document is detected
- a determining module configured to determine whether the target geographic location matches a target password used to pre-encrypt the document; wherein the target password is: when the second electronic device storing the document encrypts the document a password used to authorize processing of the document, and the password used is formed based on a geographic location of the second electronic device;
- a decision module configured to allow the document to be performed by the predetermined operation if the determination result is yes; if not, to prohibit the document from being performed by the predetermined operation.
- the predetermined operation comprises: a document opening operation
- the target password is: a geographical location of the second electronic device and a first preset radius value
- the determining module includes:
- a first area determining unit configured to determine a first predetermined area range having a radius of a first preset radius value centered on a geographic location of the second electronic device used for pre-encrypting the document;
- the first determining unit is configured to determine whether the target geographic location is within the first predetermined area.
- the predetermined operation comprises: a document editing operation
- the target password is: a geographical location of the second electronic device and a second preset radius value
- the determining module includes:
- a second area determining unit configured to determine a second predetermined area range centered on a geographic location of the second electronic device used to pre-encrypt the document, and having a second predetermined radius value as a radius;
- the second determining unit is configured to determine whether the target geographic location is within the second predetermined area.
- the predetermined operation comprises: a document opening operation
- the target password includes: a third predetermined area range centered on a geographic location where the second electronic device is located;
- the determining module includes:
- a third determining unit configured to determine whether the target geographic location is within a third predetermined area that is centered on the geographic location of the second electronic device used to pre-encrypt the document.
- the predetermined operation comprises: a document editing operation
- the target password is: a fourth predetermined area range centered on a geographical location where the second electronic device is located;
- the determining module includes:
- a fourth determining unit configured to determine whether the target geographic location is within a fourth predetermined area that is centered on a geographic location of the second electronic device used to pre-encrypt the document.
- the method further comprises:
- An encryption authority obtaining module configured to obtain an encryption authority of the document according to a password used by the target password to be encrypted and written into the document after the decision module allows the document to be performed by the predetermined operation, wherein The target password is previously encrypted and written into the document;
- An encryption instruction obtaining module for obtaining a location-based encryption instruction regarding a predetermined operation of the document
- a password forming module configured to form a current target password based on a geographic location of the first electronic device
- an encryption module configured to perform an encryption operation on the document with the formed target password, and encrypt the formed target password into the document.
- a document processing apparatus provided by the embodiment of the present application further includes:
- an output module configured to output prompt information about prohibiting processing within a geographical range that is not authorized to process the document after the decision module prohibits the document from being performed by the predetermined operation.
- the acquiring module includes:
- an obtaining unit configured to determine whether a predetermined operation regarding the document is set to a geographically-based restricted state, and if yes, determine a target geographic location where the first electronic device is currently located.
- an embodiment of the present application further provides an electronic device, including: a housing, a processor, a memory, a circuit board, and a power supply circuit, wherein the circuit board is disposed inside the space enclosed by the housing, the processor and the memory Provided on a circuit board; a power supply circuit for powering various circuits or devices of the electronic device; a memory for storing executable program code; and a processor for executing the embodiment code of the present application by running executable program code stored in the memory
- an electronic device including: a housing, a processor, a memory, a circuit board, and a power supply circuit, wherein the circuit board is disposed inside the space enclosed by the housing, the processor and the memory Provided on a circuit board; a power supply circuit for powering various circuits or devices of the electronic device; a memory for storing executable program code; and a processor for executing the embodiment code of the present application by running executable program code stored in the memory
- an embodiment of the present application further provides an executable program code for being executed to execute the document processing method provided by the embodiment of the present application.
- the embodiment of the present application further provides a storage medium, where the storage medium is used to store executable program code, and the executable program code is executed to execute the document processing method provided by the embodiment of the present application. .
- the embodiment of the present application discloses a document processing method and device.
- the second electronic device encrypts the document
- the password formed based on the geographical location of the second electronic device is used as the target password used for authorizing the processing of the document.
- the method performs encryption; when performing a predetermined operation on the document, obtaining a target geographic location where the first electronic device is currently located, determining whether the target geographical location matches the target password used to pre-encrypt the document, and if the determination result is yes, Allowing the document to perform a predetermined operation, in this way authorizing the document to be subjected to a predetermined operation in a geographical location matching the target password used to pre-encrypt the document, the decryption is successful, the authorization is completed, and the operation is simple and convenient.
- the document is prohibited from being subjected to a predetermined operation, and in this way, the document is prohibited from being in a geographical position that does not match the target password used to pre-encrypt the document.
- the predetermined operation is performed at the location, the decryption is unsuccessful, and the security is completed. jobs.
- the solution performs geographical location-based encryption and decryption on the document, and the document sharing does not require the password and the document to be transmitted at the same time, which reduces the cumbersome operation, and the password does not need to be propagated, so that the user in the authorized area can access the document instead of Users in the authorized area cannot access the documents, which avoids the insecure problem of documents caused by insecure passwords. Therefore, this solution can ensure the security and convenience of document processing in a collaborative office environment.
- FIG. 1 is a flowchart of a document processing method according to an embodiment of the present application
- FIG. 2 is another flowchart of a document processing method according to an embodiment of the present application.
- FIG. 3 is another flowchart of a document processing method according to an embodiment of the present application.
- FIG. 4 is another flowchart of a document processing method according to an embodiment of the present application.
- FIG. 5 is a schematic structural diagram of a document processing apparatus according to an embodiment of the present disclosure.
- FIG. 6 is another schematic structural diagram of a document processing apparatus according to an embodiment of the present application.
- the embodiment of the present application provides a document processing method and device, which can ensure the security and convenience of document processing in a collaborative office scenario by performing location-based encryption and decryption on the document.
- a document processing method and apparatus provided by the embodiments of the present application may also be utilized.
- a document processing method provided by the embodiment of the present application is first introduced.
- the document processing method provided by the embodiment of the present application is applied to the first electronic device.
- the first electronic device may be: a smart phone, a tablet computer, a notebook computer, etc. It is all reasonable.
- the function software that implements a document processing method provided by the embodiment of the present application may be a plug-in of an existing office software, such as a plug-in of a WPS office software, a plug-in of an Office office software, etc., of course, For independent office software.
- the “first” in the “first electronic device” mentioned in the embodiment of the present application and the “second” in the subsequent “second electronic device” are merely used to distinguish the electronic device that decrypts the document from the naming and The electronic device for encrypting the document does not have any limiting meaning; and the electronic device that decrypts the document and the electronic device that encrypts the document may be the same or different electronic devices, and the same electronic device may refer to the same electronic device. Can refer to two electronic devices of the same type.
- FIG. 1 is a flowchart of a document processing method according to an embodiment of the present application.
- a document processing method according to an embodiment of the present application may include the following steps:
- the document may be encrypted in advance based on the geographic location in the second electronic device.
- a predetermined operation may be issued on the document, and correspondingly, when the first electronic device detects the predetermined operation for the document, the current electronic device may be automatically acquired.
- the target geographic location which in turn performs subsequent decryption processing.
- the predetermined operation may be: a document opening operation or a document editing operation, and is not limited thereto.
- the predetermined operation may also be: a document content cutting operation, a document content copying operation, or a document content deleting operation. ,and many more.
- the target password is: a password used by the second electronic device storing the document to encrypt the document to authorize processing of the document, and the used password is formed based on the geographic location of the second electronic device.
- the geographic location where the second electronic device is located in the embodiment of the present application refers to the geographic location where the second electronic device encrypts the document.
- the second electronic device encrypts the document in advance using the target password.
- the encrypted instruction can be given through the interface operation of the document, and the second electronic device encrypts the document after receiving the encrypted instruction, for example: When the second electronic device encrypts the document, you can select the file encryption menu under the document file menu, and output the encrypted menu tab.
- the tab has a “Location Based Service LBS (Location Based Service) fence technology to open the file limit” And the "Use LBS Fence Technology for File Editing Restrictions” option, select “Use LBS Fence Technology to Open Limits on Files” and / or “Use LBS Fence Technology to Edit Limits on Files” option to enable users to check the tabs.
- LBS Location Based Service
- a geo-location based encryption instruction is issued regarding the corresponding predetermined operation of the document.
- the target password is formed based on a geographic location where the second electronic device encrypts the document.
- any specified geographic location may be selected, and then the required target password is formed based on the geographic location, and the arbitrarily designated geographic location may be a known direct input geographic location, or may be passed through The geographical location required for the second electronic device or other auxiliary device.
- the target password may be a geographical location and a preset radius value on which the password is formed, or a specific area centered on the geographical location on which the password is formed, and the size of the specific area may be encrypted. Limit the radius by setting any value greater than 0 as the radius.
- the specific process of determining whether the target geographical location matches the target password used to pre-encrypt the document is different, and for the clear layout and clear solution, the subsequent determination of the target geographic location is performed. Whether or not the specific implementation process that matches the target password used to pre-encrypt the document is described in detail.
- the target geographical location matches the target password used to pre-encrypt the document, it indicates that the user holding the first electronic device is within the authorized access area, and at this time, the document may be allowed to perform the predetermined operation.
- the document is prohibited from being executed by the predetermined operation.
- the target geographical location does not match the target password used to pre-encrypt the document, it indicates that the user holding the first electronic device is not in the authorized access area. At this time, in order to ensure document security, the document is prohibited.
- the predetermined operation is performed.
- the information of the geographical location on which the target password is formed is allowed to be viewed, so that the user can select to move to a suitable geographic location suitable for authorization processing after viewing the information of the geographical location, so as to be authorized to operate the document.
- the target geographical location of the first electronic device is equal to the geographic location of the document to be processed, and is also equivalent to the geographical location of the network accessed by the first electronic device.
- the geographic location of the second electronic device The location is actually equal to the geographic location of the document to be processed and the geographic location of the network accessed by the second electronic device. Therefore, the target geographic location where the first electronic device is located and the geographic location where the second electronic device is located Can be through existing GPS positioning technology, too It can be obtained by the existing IP positioning technology, and can also be obtained by using other positioning means.
- the GPS positioning technology is a positioning technology based on GPS (Global Positioning System), which is based on IP. Location technology (Internet Protocol Address).
- the solution performs geographical location-based encryption and decryption on the document, and the document sharing does not require the password and the document to be transmitted at the same time, which reduces the cumbersome operation, and the password does not need to be propagated, so that the user in the authorized area can access the document instead of Users in the authorized area cannot access the documents, which avoids the insecure problem caused by insecure password transmission. Therefore, the solution can ensure the security and convenience of document processing in the collaborative office environment.
- the target password may include: a geographic location where the second electronic device is located and a preset radius value, whether the predetermined operation includes a document opening operation or a document editing operation.
- Whether the target geographical location matches the target password used to pre-encrypt the document (S102) may include:
- S1021 Determine a first predetermined area range with a radius of a first preset radius value centered on a geographic location of the second electronic device used for pre-encrypting the document;
- the first preset radius value may be specified by the user or the system default when the second electronic device encrypts the document, and if the second electronic device encrypts the document, the document is written when the second electronic device encrypts the document.
- the target password is the geographical location of the second electronic device and the preset radius value
- the predetermined operation including the document editing operation whether the target geographic location is determined relative to the embodiment shown in FIG. Matching with the target password used to pre-encrypt the document (S102), which may include:
- the radius of the second predetermined area range may be specified by the user or the system default by the second electronic device when encrypting the document. If the user specifies, the second electronic device needs to write the document when the document is encrypted.
- the authorization restriction of the document opening operation and the authorization restriction of the document editing may be used alone or in combination.
- the first predetermined area range and the second predetermined area range may be set to any size according to actual conditions. When the two are equal, only one of them may be stored. For example, when used in combination, the document is usually used. The authorized scope of the edit needs to be smaller than the authorized range in which the document is opened. Therefore, the second predetermined area range is smaller than the first predetermined area range.
- the document to be processed is important, and only the small range is allowed to be edited, and the larger range is only allowed to open. The editing is prohibited, and at this time, the second predetermined area range may be set smaller than the first predetermined area range.
- the target password may be set as the geographical location of the second electronic device and the determination threshold, and the specific implementation of determining whether the target geographical location matches the target password used in the pre-encrypted document may be determined.
- the limitation of the embodiment of the present application is not limited.
- the geographic location of the second electronic device and the determination threshold the following implementation manner may be adopted, for example:
- determining whether the target geographical location matches the target password used to pre-encrypt the document may include:
- determining whether the target geographical location matches the target password used by the pre-encrypted document may include:
- the first determination threshold and the second determination threshold may be set to arbitrary values; in the case where the two are used in combination, in the above embodiment, If the first judgment threshold is set to be larger than the second judgment threshold, it is also possible to allow editing only in a small range, and only allow viewing to be opened in a larger range, and editing is prohibited.
- the target password may be within a certain area centered on the geographical location where the second electronic device is located.
- the third predetermined area range may be a circular range determined by the document storing the geographical location of the second electronic device and the third preset radius; or a range of special shapes obtained by other methods, such as a polygon range, for example
- the polygon range can be determined by determining a plurality of reference points around the geographic location where the second electronic device is located, and as shown in FIG. 2, determining whether the target geographic location is used with the pre-encrypted document.
- the target passwords match (S102) and may include:
- the predetermined operation includes a document editing operation
- the predetermined operation includes a document editing operation
- the target password being a fourth predetermined area range centered on the geographical location where the second electronic device is located, where the second electronic device is located
- the fourth predetermined area range that is centered may be a circular range determined by the document storing the geographical location of the second electronic device and the fourth predetermined radius, or may be a range of special shapes obtained by other methods, such as a polygon range.
- the range of polygons The plurality of reference points around the geographical location where the second electronic device is located may be determined and connected, and the target geographic location is determined to match the target password used by the pre-encrypted document with respect to the embodiment of FIG. 1 (S102). include:
- the target geographical position is within the fourth predetermined area centered on the geographical position of the second electronic device used in the pre-encrypted document, and if so, the document is allowed to perform a predetermined operation; otherwise, the document is prohibited from being subjected to the predetermined operation.
- the authorization restriction of the document opening operation and the authorization restriction of the document editing may exist separately or in combination.
- the third predetermined area range and the fourth predetermined area range size may be any size, and the actual use may be according to specific office needs. When the two are equal, only one of them may be stored, for example, for In the case of a combination, in an actual application, the authorization range of the document editing generally needs to be smaller than the authorization range of the document opening. Therefore, the fourth predetermined area range is smaller than the third predetermined area range.
- the document to be processed is important, and only wants to be small. Editing is allowed in the range, and editing is prohibited only in the larger range, and editing is prohibited. In this case, the fourth predetermined area range may be set smaller than the third predetermined area range.
- the geographical location acquired by the existing positioning technology is not very accurate, and there may be certain errors. Therefore, in the process of actually setting a password, when a strict authorization condition is required, the The first predetermined area range, the second predetermined area range, the third predetermined area range, the fourth predetermined area range, the first determination threshold, and the second determination threshold are set to be smaller than actually needed; when a looser authorization condition is required.
- the first predetermined area range, the second predetermined area range, the third predetermined area range, the fourth predetermined area range, the first determination threshold, and the second determination threshold may be set to be larger than actually needed.
- the processing method may further include:
- S105 Encrypt the permission used to write the document according to the target password, and obtain the encryption permission of the document, wherein the target password is previously encrypted and written into the document.
- the encryption command can be given through the interface operation of the document, such as selecting the file encryption menu under the document file menu, outputting the encryption menu tab, the tab has "restriction on opening the file using LBS fence technology” and “using LBS” "Fence technology for file editing restrictions” option, select “Use LBS fence technology to open restrictions on files” and / or “Use LBS fence technology to limit file editing” option, so that users can check out the document by checking the tab A location-based encryption instruction corresponding to a predetermined operation.
- the current target password is formed as the modified new target password.
- steps S106-S108 can be directly performed.
- the document has a function of prohibiting the user from modifying the target password.
- most users in the collaborative office area are not required to know the password used by the target password to be encrypted and written to the document, and the geographic location of most of the electronic devices used by the employee is only If the target password is matched, the document can be opened or edited, so that most of the work requirements can be met. Therefore, the password used to encrypt the target password is not required to be written to the document, and the security of the password can be ensured. .
- the method for processing the document further includes:
- Outputs prompt information about processing that is not allowed within the geographic location where the document is authorized to be processed.
- the content of the prompt information is specifically as follows: “The target geographical location of the electronic device is not in the LBS fence, the processing of the document is prohibited” or “the target geographical location of the electronic device does not match the target password, and the processing of the document is prohibited” or “the electronic The target geographic location of the device is not within the scope of authorization, and the document is prohibited from being processed.
- the target geographic location of the first electronic device may be included in the following manners:
- the step of determining the target geographic location where the first electronic device is currently located is performed, and then the subsequent processing flow is started. For example, it is judged that the document is set with the function of "restricting the opening of the file using the LBS fence technology", and/or it is judged that the document is set with the function of "restricting the file editing using the LBS fence technology”.
- FIG. 5 is a schematic structural diagram of a document processing apparatus according to an embodiment of the present application.
- a document processing apparatus according to an embodiment of the present application is applied to a first electronic device, and the apparatus may include:
- the obtaining module 51 is configured to acquire a target geographic location where the first electronic device is currently located when detecting a predetermined operation for the document.
- the determining module 52 is configured to determine whether the target geographical location matches the target password used by the pre-encrypted document; wherein the target password is: used for authorization processing when the second electronic device storing the document encrypts the document The password for the document, and the password used is based on the geographic location of the second electronic device.
- the decision module 53 is configured to allow the document to be subjected to a predetermined operation if the determination result is YES; if not, the document is prohibited from being subjected to the predetermined operation.
- the solution performs location-based encryption and decryption on the document, and the document sharing does not need to be performed.
- the password is transmitted at the same time as the document, which reduces the cumbersome operation.
- the password does not need to be transmitted, so that the user in the authorized area can access the document instead of the user in the authorized area, and the password is not safely transmitted. Insecure problems, therefore, the solution can ensure the security and convenience of document processing in a collaborative office scenario.
- the target password is: a geographical location of the second electronic device and a first preset radius value
- the predetermined operation includes: when the document is opened, the determining module 52 includes:
- a first area determining unit configured to determine a first predetermined area range having a radius of a first preset radius value centered on a geographic location of the second electronic device used for pre-encrypting the document;
- the first determining unit is configured to determine whether the target geographic location is within the first predetermined area.
- the target password is: a geographical location of the second electronic device and a second preset radius value
- the predetermined operation includes: a document editing operation
- the determining module 52 includes:
- a second area determining unit configured to determine a second predetermined area range centered on a geographic location of the second electronic device used for pre-encrypting the document, and having a second predetermined radius value as a radius;
- the second determining unit is configured to determine whether the target geographic location is within the second predetermined area.
- the target password is a geographic location of the second electronic device and a first determination threshold
- the determining module 52 includes:
- a first calculating unit configured to calculate a distance between the target geographic location and a geographic location of the second electronic device used to pre-encrypt the document
- the first comparison determining unit is configured to determine whether the distance is smaller than the first determination threshold.
- the target password is a geographic location of the second electronic device and a second determination threshold
- the determining module 52 includes:
- a second calculating unit configured to calculate a distance between the target geographic location and a geographic location of the second electronic device used to pre-encrypt the document
- the second comparison determining unit is configured to determine whether the distance is smaller than the second determination threshold.
- the determining module 52 when the predetermined operation includes: a document opening operation; and the target password includes: a third predetermined area range centered on a geographical location where the second electronic device is located, the determining module 52, include:
- the third determining unit is configured to determine whether the target geographic location is within a third predetermined area that is centered on the geographic location of the second electronic device used by the pre-encrypted document.
- the determining module 52 includes:
- the fourth determining unit is configured to determine whether the target geographical location is within a fourth predetermined area that is centered on the geographic location of the second electronic device used by the pre-encrypted document.
- FIG. 6 is another schematic structural diagram of a device for processing a document according to an embodiment of the present application.
- a device for processing a document according to an embodiment of the present application further includes:
- the encryption authority obtaining module 54 is configured to obtain the encryption authority of the document according to the password used by the target password to be encrypted and written into the document after the decision module allows the document to be performed by the predetermined operation, wherein the target password is previously encrypted and written into the document;
- An encryption instruction obtaining module 55 configured to obtain a location-based encryption instruction regarding a predetermined operation of the document
- the password forming module 56 is configured to form a current target password based on the geographic location of the first electronic device
- the encryption module 57 is configured to perform an encryption operation on the document with the formed target password, and encrypt the formed target password into the document.
- a document processing apparatus provided by an embodiment of the present application further includes:
- an output module configured to output prompt information about prohibiting processing within a geographical range of the authorized processing document after the decision module prohibits the document from being performed by the predetermined operation.
- the obtaining module 51 includes: an obtaining unit, configured to determine whether a predetermined operation regarding the document is set to a geographically-based restricted state, and if yes, determine a target geographic location where the first electronic device is currently located.
- an embodiment of the present application further provides an electronic device, including: a housing, a processor, a memory, a circuit board, and a power supply circuit, wherein the circuit board is disposed inside the space enclosed by the housing, the processor and the memory Provided on a circuit board; a power supply circuit for powering various circuits or devices of the electronic device; a memory for storing executable program code; and a processor for executing the embodiment code of the present application by running executable program code stored in the memory
- the document processing method provided, specifically, the document processing method, including:
- the target geographic location matches a target password used to pre-encrypt the document; wherein the target password is: used by a second electronic device storing the document to encrypt the document Authorizing to process the password of the document, and the password used is formed based on the geographic location of the second electronic device;
- the document is allowed to perform the predetermined operation; if not, the document is prohibited from being subjected to the predetermined operation.
- the solution performs geographical location-based encryption and decryption on the document, and the document sharing does not require the password and the document to be transmitted at the same time, which reduces the cumbersome operation, and the password does not need to be propagated, so that the user in the authorized area can access the document instead of Users in the authorized area cannot access the documents, which avoids the insecure problem caused by insecure password transmission. Therefore, the solution can ensure the security and convenience of document processing in the collaborative office environment.
- the embodiment of the present application further provides an executable program code, where the executable program code is used to execute the document processing method provided by the embodiment of the present application, where the document processing method may be Including steps:
- the target password is: a password used by the second electronic device storing the document to encrypt the document to authorize processing of the document, and the used password is based on the second electronic device
- the geographical location is formed;
- the document is allowed to perform the predetermined operation; if not, the document is prohibited from being subjected to the predetermined operation.
- the solution performs geographical location-based encryption and decryption on the document, and the document sharing does not require the password and the document to be transmitted at the same time, which reduces the cumbersome operation, and the password does not need to be propagated, so that the user in the authorized area can access the document instead of Users in the authorized area cannot access the documents, which avoids the insecure problem caused by insecure password transmission. Therefore, the solution can ensure the security and convenience of document processing in the collaborative office environment.
- the embodiment of the present application further provides a storage medium, where the storage medium is used to store executable program code, and the executable program code is executed to execute the document processing method provided by the embodiment of the present application.
- the document processing method can include the steps of:
- the target geographic location matches a target password used to pre-encrypt the document; wherein the target password is: used by a second electronic device storing the document to encrypt the document Authorizing to process the password of the document, and the password used is formed based on the geographic location of the second electronic device;
- the document is allowed to perform the predetermined operation; if not, the document is prohibited from being subjected to the predetermined operation.
- the solution performs geographical location-based encryption and decryption on the document, and the document sharing does not require the password and the document to be transmitted at the same time, which reduces the cumbersome operation, and the password does not need to be propagated, so that the user in the authorized area can access the document instead of Users in the authorized area cannot access the documents, which avoids the insecure problem caused by insecure password transmission. Therefore, the solution can ensure the security and convenience of document processing in the collaborative office environment.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Databases & Information Systems (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Data Mining & Analysis (AREA)
- Automation & Control Theory (AREA)
- Computational Linguistics (AREA)
- Business, Economics & Management (AREA)
- General Business, Economics & Management (AREA)
- Remote Sensing (AREA)
- Document Processing Apparatus (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims (19)
- 一种文档处理方法,其特征在于,应用于第一电子设备,所述方法包括:当检测到针对于文档的预定操作时,获取所述第一电子设备当前所在的目标地理位置;判断所述目标地理位置是否与预先加密所述文档所使用的目标密码相匹配;其中,所述目标密码为:存储有所述文档的第二电子设备对所述文档加密时所使用的用于授权处理所述文档的密码,且所使用密码基于所述第二电子设备所在地理位置所形成;若判断结果为是,则允许所述文档被执行所述预定操作;若为否,则禁止所述文档被执行所述预定操作。
- 根据权利要求1所述的方法,其特征在于,所述预定操作包括:文档打开操作;所述目标密码为:所述第二电子设备所在地理位置和第一预设半径值;所述判断所述目标地理位置是否与预先加密所述文档所使用的目标密码相匹配,包括:确定以预先加密所述文档所使用的所述第二电子设备所在地理位置为中心,以第一预设半径值为半径的第一预定区域范围;判断所述目标地理位置是否在所述第一预定区域范围内。
- 根据权利要求1所述的方法,其特征在于,所述预定操作包括:文档编辑操作;所述目标密码为:所述第二电子设备所在地理位置和第二预设半径值;所述判断所述目标地理位置是否与预先加密所述文档所使用的目标密码相匹配,包括:确定以预先加密所述文档所使用的所述第二电子设备所在地理位置为中心,以第二预设半径值为半径的第二预定区域范围;判断所述目标地理位置是否在所述第二预定区域范围内。
- 根据权利要求1所述的方法,其特征在于,所述预定操作包括:文档打开操作;所述目标密码为:以所述第二电子设备所在的地理位置为中心的第三预定区域范围;所述判断所述目标地理位置是否与预先加密所述文档所使用的目标密码相匹配,包括:判断所述目标地理位置是否在预先加密所述文档所使用的以所述第二电子设备所在地理位置为中心的第三预定区域范围内。
- 根据权利要求1所述的方法,其特征在于,所述预定操作包括:文档编辑操作;所述目标密码为:以所述第二电子设备所在的地理位置为中心的第四预定区域范围;所述判断所述目标地理位置是否与预先加密所述文档所使用的目标密码相匹配,包括:判断所述目标地理位置是否在预先加密所述文档所使用的以所述第二电子设备所在地理位置为中心的第四预定区域范围内。
- 根据权利要求1所述的方法,其特征在于,在允许所述文档被执行所述预定操作之后,还包括:根据所述目标密码被加密写入所述文档所使用的密码,获得所述文档的加密权限,其中,所述目标密码预先被加密写入所述文档;获得关于所述文档的预定操作的基于地理位置的加密指令;基于所述第一电子设备所在地理位置形成本次的目标密码;以所形成的本次的目标密码对所述文档执行加密操作,并将所形成的本次的目标密码加密写入所述文档。
- 根据权利要求1-6任一项所述的方法,其特征在于,禁止所述文档被执 行所述预定操作之后,还包括:输出关于不在授权处理所述文档的地理位置范围内而禁止处理的提示信息。
- 根据权利要求1-6任一项所述的方法,其特征在于,所述获取所述第一电子设备当前所在的目标地理位置,包括:判断关于所述文档的预定操作是否被设置为基于地理位置的限制状态,如果是,确定所述第一电子设备当前所在的目标地理位置。
- 一种文档处理装置,其特征在于,应用于第一电子设备,所述装置包括:获取模块,用于当检测到针对于文档的预定操作时,获取所述第一电子设备当前所在的目标地理位置;判断模块,用于判断所述目标地理位置是否与预先加密所述文档所使用的目标密码相匹配;其中,所述目标密码为:存储有所述文档的第二电子设备对所述文档加密时所使用的用于授权处理所述文档的密码,且所使用密码基于所述第二电子设备所在地理位置所形成;决策模块,用于若判断结果为是,则允许所述文档被执行所述预定操作;若为否,则禁止所述文档被执行所述预定操作。
- 根据权利要求9所述的装置,其特征在于,所述预定操作包括:文档打开操作;所述目标密码为:所述第二电子设备所在地理位置和第一预设半径值;所述判断模块,包括:第一区域确定单元,用于确定以预先加密所述文档所使用的所述第二电子设备所在地理位置为中心,以第一预设半径值为半径的第一预定区域范围;第一判断单元,用于判断所述目标地理位置是否在所述第一预定区域范围内。
- 根据权利要求9所述的装置,其特征在于,所述预定操作包括:文档 编辑操作;所述目标密码为:所述第二电子设备所在地理位置和第二预设半径值;所述判断模块,包括:第二区域确定单元,用于确定以预先加密所述文档所使用的所述第二电子设备所在地理位置为中心,以第二预设半径值为半径的第二预定区域范围;第二判断单元,用于判断所述目标地理位置是否在所述第二预定区域范围内。
- 根据权利要求9所述的装置,其特征在于,所述预定操作包括:文档打开操作;所述目标密码包括:以所述第二电子设备所在的地理位置为中心的第三预定区域范围;所述判断模块,包括:第三判断单元,用于判断所述目标地理位置是否在预先加密所述文档所使用的以所述第二电子设备所在地理位置为中心的第三预定区域范围内。
- 根据权利要求9所述的装置,其特征在于,所述预定操作包括:文档编辑操作;所述目标密码为:以所述第二电子设备所在的地理位置为中心的第四预定区域范围;所述判断模块,包括:第四判断单元,用于判断所述目标地理位置是否在预先加密所述文档所使用的以所述第二电子设备所在地理位置为中心的第四预定区域范围内。
- 根据权利要求9所述的装置,其特征在于,还包括:加密权限获得模块,用于在所述决策模块允许所述文档被执行所述预定操作之后,根据所述目标密码被加密写入所述文档所使用的密码,获得所述文档的加密权限,其中,所述目标密码预先被加密写入所述文档;加密指令获得模块,用于获得关于所述文档的预定操作的基于地理位置的加密指令;密码形成模块,用于基于所述第一电子设备所在地理位置形成本次的目标密码;加密模块,用于以所形成的本次的目标密码对所述文档执行加密操作,并将所形成的本次的目标密码加密写入所述文档。
- 根据权利要求9-14任一所述的装置,其特征在于,还包括:输出模块,用于在所述决策模块禁止所述文档被执行所述预定操作之后,输出关于不在授权处理所述文档的地理位置范围内而禁止处理的提示信息。
- 根据权利要求9-14任一所述的装置,其特征在于,所述获取模块,包括:获取单元,用于判断关于所述文档的预定操作是否被设置为基于地理位置的限制状态,如果是,确定所述第一电子设备当前所在的目标地理位置。
- 一种电子设备,其特征在于,包括:壳体、处理器、存储器、电路板和电源电路,其中,电路板安置在壳体围成的空间内部,处理器和存储器设置在电路板上;电源电路,用于为电子设备的各个电路或器件供电;存储器用于存储可执行程序代码;处理器通过运行存储器中存储的可执行程序代码,以执行权利要求1-8任一项所述的文档处理方法。
- 一种可执行程序代码,其特征在于,所述可执行程序代码被运行以执行权利要求1-8任一项所述的文档处理方法。
- 一种存储介质,其特征在于,所述存储介质用于存储可执行程序代码,所述可执行程序代码被运行以执行权利要求1-8任一项所述的文档处理方法。
Priority Applications (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US16/066,353 US10984114B2 (en) | 2015-12-31 | 2016-10-25 | Document processing method and apparatus |
| JP2018534158A JP6774084B2 (ja) | 2015-12-31 | 2016-10-25 | 文書処理方法及び装置 |
| KR1020187020007A KR102212202B1 (ko) | 2015-12-31 | 2016-10-25 | 문서 처리 방법 및 장치 |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201511034069.7 | 2015-12-31 | ||
| CN201511034069.7A CN106934295A (zh) | 2015-12-31 | 2015-12-31 | 一种文档处理方法及装置 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2017113953A1 true WO2017113953A1 (zh) | 2017-07-06 |
Family
ID=59224545
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2016/103146 Ceased WO2017113953A1 (zh) | 2015-12-31 | 2016-10-25 | 一种文档处理方法及装置 |
Country Status (5)
| Country | Link |
|---|---|
| US (1) | US10984114B2 (zh) |
| JP (1) | JP6774084B2 (zh) |
| KR (1) | KR102212202B1 (zh) |
| CN (1) | CN106934295A (zh) |
| WO (1) | WO2017113953A1 (zh) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN115374293A (zh) * | 2022-08-25 | 2022-11-22 | 中国银行股份有限公司 | 一种语料迁移方法及装置、存储介质及电子设备 |
Families Citing this family (13)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US10824737B1 (en) * | 2017-02-22 | 2020-11-03 | Assa Abloy Ab | Protecting data from brute force attack |
| CN109409118B (zh) * | 2017-08-17 | 2020-12-11 | 中国移动通信有限公司研究院 | 一种文件保护方法、装置和计算机可读存储介质 |
| CN107526950A (zh) * | 2017-09-07 | 2017-12-29 | 努比亚技术有限公司 | 数据加解密方法、移动终端及计算机可读存储介质 |
| CN108337365A (zh) * | 2018-01-09 | 2018-07-27 | 维沃移动通信有限公司 | 一种加锁方法、解锁方法及移动终端 |
| CN110659526B (zh) * | 2018-06-29 | 2023-11-24 | 珠海金山办公软件有限公司 | 一种文档处理方法、装置及电子设备 |
| CN112115685B (zh) * | 2019-06-04 | 2024-11-08 | 珠海金山办公软件有限公司 | 文档中图形位置的保护方法、装置、电子设备及存储介质 |
| CN112115485B (zh) * | 2019-06-04 | 2024-06-25 | 珠海金山办公软件有限公司 | 文档中图形宽高的保护方法、装置、电子设备及存储介质 |
| CN112036126B (zh) * | 2019-06-04 | 2024-07-23 | 珠海金山办公软件有限公司 | 对文档中图形禁止操作的方法、装置、设备及存储介质 |
| CN112035868B (zh) * | 2019-06-04 | 2024-11-08 | 珠海金山办公软件有限公司 | 文档中图形旋转角度的保护方法、装置及电子设备 |
| CN112115501B (zh) * | 2019-06-04 | 2024-10-15 | 珠海金山办公软件有限公司 | 文档中图形形状的保护方法、装置、电子设备及存储介质 |
| CN113158172B (zh) * | 2021-02-26 | 2022-03-22 | 山东英信计算机技术有限公司 | 一种基于芯片的密码获取方法、装置、设备及存储介质 |
| US12443696B2 (en) | 2021-03-08 | 2025-10-14 | Thinkspan, LLC | User authentication in a recall-memory enhancing manner |
| CN115859246A (zh) * | 2023-02-16 | 2023-03-28 | 天津联想协同科技有限公司 | 在线文档权限控制方法、装置、服务器及存储介质 |
Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2006155283A (ja) * | 2004-11-30 | 2006-06-15 | Fuji Xerox Co Ltd | 文書処理装置及び方法 |
| CN103874021A (zh) * | 2014-04-02 | 2014-06-18 | 上海坤士合生信息科技有限公司 | 安全区域识别方法、识别设备及用户终端 |
| US20140280740A1 (en) * | 2013-03-12 | 2014-09-18 | General Electric Company | Location based equipment documentation access control |
| CN104636645A (zh) * | 2015-01-27 | 2015-05-20 | 腾讯科技(深圳)有限公司 | 数据访问的控制方法及装置 |
| CN104767717A (zh) * | 2014-01-03 | 2015-07-08 | 腾讯科技(深圳)有限公司 | 身份验证方法及装置 |
Family Cites Families (15)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JPH07221751A (ja) | 1994-02-07 | 1995-08-18 | Nippon Telegr & Teleph Corp <Ntt> | ディジタル情報複製方法及びその装置 |
| JP2001156766A (ja) | 1999-11-29 | 2001-06-08 | Murata Mach Ltd | 暗号通信方法及び暗号通信システム |
| JP2002123172A (ja) * | 2000-10-16 | 2002-04-26 | Toshiba Information Systems (Japan) Corp | 暗号化装置、復号化装置、情報管理システム及び施錠システム |
| US7120254B2 (en) * | 2000-10-30 | 2006-10-10 | Geocodex Llc | Cryptographic system and method for geolocking and securing digital information |
| US20030108202A1 (en) * | 2001-12-12 | 2003-06-12 | Clapper Edward O. | Location dependent encryption and/or decryption |
| JP2005128965A (ja) | 2003-10-27 | 2005-05-19 | Sony Corp | アクセス権限制御装置 |
| US7512814B2 (en) * | 2004-11-09 | 2009-03-31 | Fortiva Inc. | Secure and searchable storage system and method |
| JP4726051B2 (ja) * | 2005-06-21 | 2011-07-20 | Kddi株式会社 | アクセス制御システム |
| CN101901194A (zh) * | 2009-08-31 | 2010-12-01 | 深圳市朗科科技股份有限公司 | 可根据地理位置进行功能限制的存储设备及其方法 |
| JP2012099523A (ja) | 2010-10-29 | 2012-05-24 | Shin Etsu Chem Co Ltd | 異方性希土類焼結磁石及びその製造方法 |
| CN103514413A (zh) * | 2012-06-29 | 2014-01-15 | 凹凸电子(武汉)有限公司 | 数字文件读取保护装置、方法以及信息处理设备 |
| CN103107887B (zh) * | 2013-01-22 | 2016-09-21 | 东莞宇龙通信科技有限公司 | 一种基于位置信息对文件进行操作控制的方法和装置 |
| JP6167833B2 (ja) | 2013-10-10 | 2017-07-26 | 富士ゼロックス株式会社 | 情報処理装置及び情報処理プログラム |
| WO2016093174A1 (ja) | 2014-12-12 | 2016-06-16 | 日立金属株式会社 | R-t-b系焼結磁石の製造方法 |
| US10453058B2 (en) * | 2014-12-17 | 2019-10-22 | Heartland Payment Systems, Inc. | E-signature |
-
2015
- 2015-12-31 CN CN201511034069.7A patent/CN106934295A/zh active Pending
-
2016
- 2016-10-25 US US16/066,353 patent/US10984114B2/en active Active
- 2016-10-25 JP JP2018534158A patent/JP6774084B2/ja active Active
- 2016-10-25 WO PCT/CN2016/103146 patent/WO2017113953A1/zh not_active Ceased
- 2016-10-25 KR KR1020187020007A patent/KR102212202B1/ko active Active
Patent Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2006155283A (ja) * | 2004-11-30 | 2006-06-15 | Fuji Xerox Co Ltd | 文書処理装置及び方法 |
| US20140280740A1 (en) * | 2013-03-12 | 2014-09-18 | General Electric Company | Location based equipment documentation access control |
| CN104767717A (zh) * | 2014-01-03 | 2015-07-08 | 腾讯科技(深圳)有限公司 | 身份验证方法及装置 |
| CN103874021A (zh) * | 2014-04-02 | 2014-06-18 | 上海坤士合生信息科技有限公司 | 安全区域识别方法、识别设备及用户终端 |
| CN104636645A (zh) * | 2015-01-27 | 2015-05-20 | 腾讯科技(深圳)有限公司 | 数据访问的控制方法及装置 |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN115374293A (zh) * | 2022-08-25 | 2022-11-22 | 中国银行股份有限公司 | 一种语料迁移方法及装置、存储介质及电子设备 |
Also Published As
| Publication number | Publication date |
|---|---|
| US20190012468A1 (en) | 2019-01-10 |
| KR102212202B1 (ko) | 2021-02-04 |
| KR20180094063A (ko) | 2018-08-22 |
| JP2019502208A (ja) | 2019-01-24 |
| JP6774084B2 (ja) | 2020-10-21 |
| US10984114B2 (en) | 2021-04-20 |
| CN106934295A (zh) | 2017-07-07 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| WO2017113953A1 (zh) | 一种文档处理方法及装置 | |
| US12271493B2 (en) | Controlling access to application data | |
| US9805210B2 (en) | Encryption-based data access management | |
| KR101754308B1 (ko) | 모바일 민감 데이터 관리 방법 및 이를 수행하는 위탁 서버 | |
| EP2973188B1 (en) | Secondary device as key for authorizing access to resources | |
| US9723003B1 (en) | Network beacon based credential store | |
| KR20100133953A (ko) | 데이터를 안전하게 하는 시스템 및 방법 | |
| US10129299B1 (en) | Network beacon management of security policies | |
| TWI652592B (zh) | Storage device and access control method thereof | |
| US20170185790A1 (en) | Dynamic management of protected file access | |
| CN103581196A (zh) | 分布式文件透明加密方法及透明解密方法 | |
| US20180053018A1 (en) | Methods and systems for facilitating secured access to storage devices | |
| WO2020155812A1 (zh) | 一种数据存储方法、装置及设备 | |
| US9733852B2 (en) | Encrypted synchronization | |
| WO2023207975A1 (zh) | 数据传输方法、装置和电子设备 | |
| US20170187527A1 (en) | Obtaining A Decryption Key From a Mobile Device | |
| US20160335420A1 (en) | Secure Document Management | |
| WO2015139571A1 (en) | Data protection | |
| KR102005534B1 (ko) | 스마트 기기 기반의 원격 접근 제어 및 멀티 팩터 인증 시스템 | |
| WO2017020449A1 (zh) | 一种指纹读取方法及用户设备 | |
| CN115913794B (zh) | 数据安全传输方法、设备及介质 | |
| KR101500664B1 (ko) | 휴대용 보안 기록 매체를 이용한 사내망 보안 접속 서비스 제공 방법 및 시스템 | |
| JP2008077239A (ja) | 文書管理システム、文書管理方法、文書閲覧装置およびプログラム | |
| TW201626282A (zh) | 資料安全存取系統及方法 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 16880744 Country of ref document: EP Kind code of ref document: A1 |
|
| ENP | Entry into the national phase |
Ref document number: 2018534158 Country of ref document: JP Kind code of ref document: A |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| ENP | Entry into the national phase |
Ref document number: 20187020007 Country of ref document: KR Kind code of ref document: A |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 1020187020007 Country of ref document: KR |
|
| 32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 22/10/2018) |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 16880744 Country of ref document: EP Kind code of ref document: A1 |