[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN108280353A - A kind of judgment method and device of security document operation - Google Patents

A kind of judgment method and device of security document operation Download PDF

Info

Publication number
CN108280353A
CN108280353A CN201710007609.5A CN201710007609A CN108280353A CN 108280353 A CN108280353 A CN 108280353A CN 201710007609 A CN201710007609 A CN 201710007609A CN 108280353 A CN108280353 A CN 108280353A
Authority
CN
China
Prior art keywords
document
security document
safe
permission
user terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710007609.5A
Other languages
Chinese (zh)
Other versions
CN108280353B (en
Inventor
梁托华
余陶跃
黄志军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Kingsoft Office Software Inc
Zhuhai Kingsoft Office Software Co Ltd
Guangzhou Kingsoft Mobile Technology Co Ltd
Guangzhou Jinshan Mobile Technology Co Ltd
Original Assignee
Beijing Kingsoft Office Software Inc
Zhuhai Kingsoft Office Software Co Ltd
Guangzhou Jinshan Mobile Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Kingsoft Office Software Inc, Zhuhai Kingsoft Office Software Co Ltd, Guangzhou Jinshan Mobile Technology Co Ltd filed Critical Beijing Kingsoft Office Software Inc
Priority to CN201710007609.5A priority Critical patent/CN108280353B/en
Publication of CN108280353A publication Critical patent/CN108280353A/en
Application granted granted Critical
Publication of CN108280353B publication Critical patent/CN108280353B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Automation & Control Theory (AREA)
  • Document Processing Apparatus (AREA)

Abstract

The embodiment of the invention discloses the judgment methods and device of a kind of operation of security document; it is typically to be protected by being carried out from driving layer security document for solving the protection for security document in the prior art; it is easy to exist and accidentally injure; the operation carried out in non-security document is caused not execute correctly; and the technical issues of monitoring that the method stability of property protection is relatively low from driving layer implementation, being an impediment to the stable operation of security document.Present invention method includes:Receive the security document operational order that user terminal operates security document, the security document permission possessed security document operational order and user terminal by preset kernel editing machine carries out comparison judgement, if user terminal possesses the permission operated to security document in security document operational order, security document operational order is then executed, otherwise refusal executes security document operational order.

Description

A kind of judgment method and device of security document operation
Technical field
The judgment method and device operated the present invention relates to computer realm more particularly to a kind of security document.
Background technology
In OFFICE office softwares, under some specific occasions, document can be encrypted in the author for creating document, and And setting such as reads, edits limitation, to ensure the safety of document.Therefore, some are gone in document flow and does not obtain reading When in the user hand of permission, which can not also open document and carry out refering to greatly ensure that the safety of document content.
In the prior art for the protection of security document be typically by from driving layer to security document carry out protect, such as from Driving layer carries out the detection to replicating operation, and operation is replicated when detecting that the when of replicating operational order forbids executing.However, such guarantor Shield mode is easy the consequence that there is " accidental injury ", i.e., when opening security document and common document at the same time, the content in security document While can not be replicated, the content of common document can not also be replicated.And it is such from driving layer implementation monitoring property protection Method stability it is relatively low, be an impediment to the stable operation of security document.
Invention content
An embodiment of the present invention provides the judgment methods and device of a kind of operation of security document, and it is right in the prior art to solve It is typically to be protected by being carried out from driving layer security document in the protection of security document, is easy to exist and accidentally injure, cause in non-peace The operation that full text shelves are carried out can not be executed correctly, and relatively low from the method stability of driving layer implementation monitoring property protection, be hindered In the stable operation of security document the technical issues of.
A kind of judgment method of security document operation provided in an embodiment of the present invention, including:
The security document operational order that user terminal operates security document is received, preset kernel editing machine is passed through The security document permission possessed security document operational order and user terminal carries out comparison judgement, if user terminal possesses safety The permission operated to security document in document operation command then executes security document operational order, and otherwise refusal executes peace Full document operation command, security document operational order carry security document permission.
Optionally, the security document permission that security document operational order carries includes replicating operating right, edit operation power Limit, separately deposits operating right at printing permission.
Optionally, further include:
The safe table document operation command that user terminal operates safe form document is received, by preset interior The safe form document permission that core editing machine possesses safe table document operation command and user terminal carries out comparison judgement, if User terminal possesses the permission operated to safe form document in safe table document operation command, then executes safe table Otherwise document operation command is refused to execute safe table document operation command.
Optionally, the safe form document permission that safe table document operation command carries includes replicating operating right, compiling It collects operating right, printing permission, separately deposit operating right.
Optionally, further include:
The form document reference instruction that user terminal quotes form document content is received, is compiled by preset kernel It collects device form document reference instruction is identified, if form document reference instruction is to quote safe table document content The instruction of safe table document reference, then refuse to execute safe table document reference instruction.
Optionally, security document is the safe word or file for having preset specific format.
Optionally, safe form document is the safe form document for having preset specific format.
A kind of judgment means of security document operation provided in an embodiment of the present invention, including:
First judgment module, the security document operational order that security document is operated for receiving user terminal, The security document permission possessed security document operational order and user terminal by preset kernel editing machine carries out comparison judgement, If user terminal possesses the permission operated to security document in security document operational order, executes security document operation and refer to It enables, otherwise refusal executes security document operational order, and security document operational order carries security document permission.
Optionally, further include:
Second judgment module is grasped for receiving the safe form document that user terminal operates safe form document It instructs, the safe form document that safe table document operation command and user terminal possess is weighed by preset kernel editing machine Limit carries out comparison judgement, if user terminal possesses the power operated to safe form document in safe table document operation command Limit, then execute safe table document operation command, and otherwise refusal executes safe table document operation command.
Optionally, further include:
Identification module, the form document reference instruction that form document content is quoted for receiving user terminal, Form document reference instruction is identified by preset kernel editing machine, if form document reference instruction is to safe table text The safe table document reference instruction that shelves content is quoted then is refused to execute safe table document reference instruction.
As can be seen from the above technical solutions, the embodiment of the present invention has the following advantages:
An embodiment of the present invention provides the judgment methods and device of a kind of operation of security document, including:Receive user's end Hold the security document operational order that is operated to security document, by preset kernel editing machine to security document operational order with The security document permission that user terminal possesses carries out comparison judgement, if user terminal possesses in security document operational order to safety The permission that document is operated then executes security document operational order, and otherwise refusal executes security document operational order, the present invention It is grasped by the security document operated from preset kernel editing machine to security document to the user terminal received in embodiment Make instruction to be compared and judge with the practical document permission possessed of user, possesses the security document operational order in user terminal In security document is operated permission when, then execute security document operational order, otherwise refusal executes security document operation Instruction reaches the side for protecting purpose in the prior art from driving layer to be filtered to limiting operation and carry out prevention operation Method is compared, and is carried out and is protected by using preset kernel editing machine in the embodiment of the present invention, the execution to security document operational order It carries out and accurately judges, and stability is high, it is typically by from driving to solve the protection for security document in the prior art Layer is carried out security document and is protected, and is easy to exist and accidentally injure, the operation carried out in non-security document is caused not execute correctly, and The technical issues of monitoring that the method stability of property protection is relatively low from driving layer implementation, be an impediment to the stable operation of security document.
Description of the drawings
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention without having to pay creative labor, may be used also for those of ordinary skill in the art To obtain other attached drawings according to these attached drawings.
Fig. 1 is that a kind of flow of one embodiment of the judgment method of security document operation provided in an embodiment of the present invention is shown It is intended to;
Fig. 2 is a kind of flow of another embodiment of the judgment method of security document operation provided in an embodiment of the present invention Schematic diagram;
Fig. 3 is that a kind of flow of one embodiment of the judgment means of security document operation provided in an embodiment of the present invention is shown It is intended to.
Specific implementation mode
An embodiment of the present invention provides the judgment methods and device of a kind of operation of security document, for solving in the prior art Protection for security document is typically to be protected by being carried out from driving layer security document, is easy to exist and accidentally injure, causes non- The operation that security document is carried out can not be executed correctly, and relatively low from the method stability of driving layer implementation monitoring property protection, be had For fear of security document stable operation the technical issues of.
In order to make the invention's purpose, features and advantages of the invention more obvious and easy to understand, below in conjunction with the present invention Attached drawing in embodiment, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that disclosed below Embodiment be only a part of the embodiment of the present invention, and not all embodiment.Based on the embodiments of the present invention, this field All other embodiment that those of ordinary skill is obtained without making creative work, belongs to protection of the present invention Range.
Referring to Fig. 1, a kind of one embodiment of the judgment method of security document operation provided in an embodiment of the present invention, packet It includes:
101, the security document operational order that user terminal operates security document is received, is compiled by preset kernel It collects the security document permission that device possesses security document operational order and user terminal and carries out comparison judgement, if user terminal possesses The permission operated to security document in security document operational order then executes security document operational order, and otherwise refusal is held Row security document operational order, security document operational order carry security document permission.
When user terminal carries out limiting operation to security document, such as into edlin, duplication, printing limiting operation, connect The security document operational order that user terminal operates security document is received, by preset kernel editing machine to security document Operational order carries out comparison judgement with the security document permission that user terminal possesses, if user terminal possesses security document, operation refers to The permission operated to security document in order then executes security document operational order, and otherwise refusal executes security document operation The security document permission that instruction secure document operation command carries includes replicating operating right, edit operation permission, printing Permission separately deposits operating right.If user terminal carries out edit operation to security document, kernel editing machine is sent according to user terminal Edit operation instruction judge whether user terminal possesses the editing authority of security document, if so, then executing the volume of user terminal Instruction is collected, otherwise refusal executes the edit instruction.
It should be noted that security document is the safe word or file for having preset WPS Office specific formats, format For wpss (i.e. suffix name), it can only use and the WPS Office clients of WPS security document is supported to open.
It is a kind of the detailed of one embodiment of the judgment method of security document operation provided in an embodiment of the present invention above Description, below will be detailed to a kind of another embodiment progress of the judgment method of security document operation provided in an embodiment of the present invention Thin description.
Referring to Fig. 2, a kind of another embodiment of the judgment method of security document operation provided in an embodiment of the present invention, Including:
201, the safe table document operation command that user terminal operates safe form document is received, by pre- It sets kernel editing machine and safe table document operation command with the safe form document permission that user terminal possesses compare and sentence It is disconnected, if user terminal possesses the permission operated to safe form document in safe table document operation command, execute peace Otherwise full form document operational order is refused to execute safe table document operation command.
It is grasped when user terminal carries out limiting operation to safe form document, such as into edlin, duplication, printing permission Make, receives the safe table document operation command that user terminal operates safe form document, compiled by preset kernel It collects the safe form document permission that device possesses safe table document operation command and user terminal and carries out comparison judgement, if user Terminal possesses the permission operated to safe form document in safe table document operation command, then executes safe form document Operational order, the safe table text that otherwise the safe table document operation command of the safe table document operation command of refusal execution carries Shelves permission includes replicating operating right, edit operation permission, printing permission, separately depositing operating right.If user terminal is to peace Full form document carries out edit operation, and the edit operation instruction that kernel editing machine is sent according to user terminal judges that user terminal is The no editing authority for possessing safe form document, if so, then executing the edit instruction of user terminal, otherwise refusal executes the editor Instruction.
It should be noted that safe form document is the safe form document for having preset WPS Office specific formats, Format is ets (i.e. suffix name), can only use and the WPS Office clients of the safe form documents of WPS is supported to open.
202, the form document reference instruction that user terminal quotes form document content is received, by preset interior Form document reference instruction is identified in core editing machine, if form document reference instruction is to be carried out to safe table document content The safe table document reference instruction of reference is then refused to execute safe table document reference instruction.
When receiving the form document reference instruction that user terminal quotes form document content, by preset interior Form document reference instruction is identified in core editing machine, if form document reference instruction is to be carried out to safe table document content The safe table document reference instruction of reference is then refused to execute safe table document reference instruction.In the prior art, in non-peace The permission limitation of safe form document can be circumvented when full form document in safe form document to quoting and is quoted successfully, i.e., When user terminal possesses the reading permission of safe form document without editing the permissions such as duplication, user terminal can be another All the elements of the safe form document are obtained in a non-security form document by quoting the content of the safe form document, Although the user terminal does not have the editing authority of safe form document, replicates permission.Pass through the kernel of WPS clients in the present invention All form document reference instructions quoted to form document content are identified in editing machine, if the form document draws It is when quoting the instruction of safe table document content, then to refuse to execute the instruction with instruction, to which safe table text can not be quoted The content of shelves.
It is a kind of the detailed of another embodiment of the judgment method of security document operation provided in an embodiment of the present invention above Thin description below will be described in detail a kind of judgment means of security document operation provided in an embodiment of the present invention.
Referring to Fig. 3, a kind of judgment means of security document operation provided in an embodiment of the present invention, including:
First judgment module 301 refers to for receiving the security document operation that user terminal operates security document It enables, carrying out comparison to the security document permission that security document operational order possesses with user terminal by preset kernel editing machine sentences It is disconnected, if user terminal possesses the permission operated to security document in security document operational order, execute security document behaviour It instructs, otherwise refusal executes security document operational order, and security document operational order carries security document permission.
Second judgment module 302, the safe table text that safe form document is operated for receiving user terminal Shelves operational order, the safe table text that safe table document operation command and user terminal are possessed by preset kernel editing machine Shelves permission carries out comparison judgement, is operated to safe form document in safe table document operation command if user terminal possesses Permission, then execute safe table document operation command, otherwise refusal executes safe table document operation command.
Identification module 303 refers to for receiving the form document reference that user terminal quotes form document content It enables, form document reference instruction is identified by preset kernel editing machine, if form document reference instruction is to security table The safe table document reference instruction that lattice document content is quoted then is refused to execute safe table document reference instruction.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description, The specific work process of device and unit, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In several embodiments provided herein, it should be understood that disclosed system, device and method can be with It realizes by another way.For example, the apparatus embodiments described above are merely exemplary, for example, the unit It divides, only a kind of division of logic function, formula that in actual implementation, there may be another division manner, such as multiple units or component It can be combined or can be integrated into another system, or some features can be ignored or not executed.Another point, it is shown or The mutual coupling, direct-coupling or communication connection discussed can be the indirect coupling by some interfaces, device or unit It closes or communicates to connect, can be electrical, machinery or other forms.
The unit illustrated as separating component may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, you can be located at a place, or may be distributed over multiple In network element.Some or all of unit therein can be selected according to the actual needs to realize the mesh of this embodiment scheme 's.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, it can also It is that each unit physically exists alone, it can also be during two or more units be integrated in one unit.Above-mentioned integrated list The form that hardware had both may be used in member is realized, can also be realized in the form of SFU software functional unit.
If the integrated unit is realized in the form of SFU software functional unit and sells or use as independent product When, it can be stored in a computer read/write memory medium.Based on this understanding, technical scheme of the present invention is substantially The all or part of the part that contributes to existing technology or the technical solution can be in the form of software products in other words It embodies, which is stored in a storage medium, including some instructions are used so that a computer Equipment (can be personal computer, server or the network equipment etc.) executes the complete of each embodiment the method for the present invention Portion or part steps.And storage medium above-mentioned includes:USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can store journey The medium of sequence code.
The above, the above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although with reference to before Stating embodiment, invention is explained in detail, it will be understood by those of ordinary skill in the art that:It still can be to preceding The technical solution recorded in each embodiment is stated to modify or equivalent replacement of some of the technical features;And these Modification or replacement, the spirit and scope for various embodiments of the present invention technical solution that it does not separate the essence of the corresponding technical solution.

Claims (10)

1. a kind of judgment method of security document operation, which is characterized in that including:
The security document operational order that user terminal operates security document is received, by preset kernel editing machine to institute It states security document operational order and carries out comparison judgement with the security document permission that the user terminal possesses, if user terminal possesses The permission operated to security document in the security document operational order then executes the security document operational order, no Then refuse to execute the security document operational order, the security document operational order carries security document permission.
2. the judgment method of security document operation according to claim 1, which is characterized in that the security document operation refers to It includes replicating operating right, edit operation permission, printing permission, separately depositing operating right to enable the security document permission carried.
3. the judgment method of security document operation according to claim 1, which is characterized in that further include:
The safe table document operation command that user terminal operates safe form document is received, is compiled by preset kernel It collects device and the safe table document operation command with the safe form document permission that the user terminal possesses compare and sentence It is disconnected, if user terminal possesses the permission operated to safe form document in the safe table document operation command, hold Otherwise the row safe table document operation command is refused to execute the safe table document operation command.
4. the judgment method of security document operation according to claim 3, which is characterized in that the safe form document behaviour It includes replicating operating right, edit operation permission, printing permission, separately depositing behaviour to make the safe form document permission that instruction carries Make permission.
5. the judgment method of security document operation according to claim 3, which is characterized in that further include:
The form document reference instruction that user terminal quotes form document content is received, preset kernel editing machine is passed through The form document reference instruction is identified, if form document reference instruction is to be quoted to safe table document content The instruction of safe table document reference, then refuse to execute the safe table document reference instruction.
6. the judgment method of security document operation according to claim 1, which is characterized in that the security document is pre- to have Set the safe word or file of specific format.
7. the judgment method of security document according to claim 3 operation, which is characterized in that the safe form document is There is the safe form document of preset specific format.
8. a kind of judgment means of security document operation, which is characterized in that including:
First judgment module, the security document operational order operated to security document for receiving user terminal, passes through The security document permission that preset kernel editing machine possesses the security document operational order with the user terminal compares Judge, if user terminal possesses the permission operated to security document in the security document operational order, execute described in Security document operational order, otherwise the refusal execution security document operational order, the security document operational order carry Security document permission.
9. the judgment means of security document operation according to claim 8, which is characterized in that further include:
Second judgment module refers to for receiving the safe table document function that user terminal operates safe form document It enables, the safe table text that the safe table document operation command and the user terminal are possessed by preset kernel editing machine Shelves permission carries out comparison judgement, is carried out to safe form document if user terminal possesses in the safe table document operation command The permission of operation then executes the safe table document operation command, and otherwise refusal executes the safe table document function and refers to It enables.
10. the judgment means of security document operation according to claim 9, which is characterized in that further include:
Identification module, the form document reference instruction quoted to form document content for receiving user terminal, passes through The form document reference instruction is identified in preset kernel editing machine, if form document reference instruction is to safe table text The safe table document reference instruction that shelves content is quoted then is refused to execute the safe table document reference instruction.
CN201710007609.5A 2017-01-05 2017-01-05 Method and device for judging security document operation Active CN108280353B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710007609.5A CN108280353B (en) 2017-01-05 2017-01-05 Method and device for judging security document operation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710007609.5A CN108280353B (en) 2017-01-05 2017-01-05 Method and device for judging security document operation

Publications (2)

Publication Number Publication Date
CN108280353A true CN108280353A (en) 2018-07-13
CN108280353B CN108280353B (en) 2021-12-28

Family

ID=62800618

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710007609.5A Active CN108280353B (en) 2017-01-05 2017-01-05 Method and device for judging security document operation

Country Status (1)

Country Link
CN (1) CN108280353B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111813282A (en) * 2020-05-29 2020-10-23 北京金山云网络技术有限公司 Data form display method and device
CN111931244A (en) * 2020-10-13 2020-11-13 北京世纪好未来教育科技有限公司 Method and device for preventing document from divulging, electronic equipment and storage medium
CN112131533A (en) * 2020-08-27 2020-12-25 北京云动智效网络科技有限公司 Document protection method and system

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101226573A (en) * 2007-01-16 2008-07-23 北京书生国际信息技术有限公司 Method for controlling access authority of electric document
CN101847197A (en) * 2009-03-24 2010-09-29 上海任登信息科技有限公司 Method for controlling document access authority
CN102087690A (en) * 2009-12-02 2011-06-08 富士施乐株式会社 Document management system and document management method
CN102306255A (en) * 2011-08-29 2012-01-04 飞天诚信科技股份有限公司 Document protection method and system
CN103597494A (en) * 2011-04-02 2014-02-19 英特尔公司 Method and apparatus for managing digital usage rights of a document
CN104318174A (en) * 2014-10-28 2015-01-28 深圳市大成天下信息技术有限公司 Document protecting method, document protecting devices and document protecting system
CN105224678A (en) * 2015-10-19 2016-01-06 浪潮软件集团有限公司 Electronic document management method and device
US9268958B1 (en) * 2013-08-09 2016-02-23 Symantec Corporation Preventing the loss of sensitive data synchronized with a mobile device

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101226573A (en) * 2007-01-16 2008-07-23 北京书生国际信息技术有限公司 Method for controlling access authority of electric document
CN101847197A (en) * 2009-03-24 2010-09-29 上海任登信息科技有限公司 Method for controlling document access authority
CN102087690A (en) * 2009-12-02 2011-06-08 富士施乐株式会社 Document management system and document management method
CN103597494A (en) * 2011-04-02 2014-02-19 英特尔公司 Method and apparatus for managing digital usage rights of a document
CN102306255A (en) * 2011-08-29 2012-01-04 飞天诚信科技股份有限公司 Document protection method and system
US9268958B1 (en) * 2013-08-09 2016-02-23 Symantec Corporation Preventing the loss of sensitive data synchronized with a mobile device
CN104318174A (en) * 2014-10-28 2015-01-28 深圳市大成天下信息技术有限公司 Document protecting method, document protecting devices and document protecting system
CN105224678A (en) * 2015-10-19 2016-01-06 浪潮软件集团有限公司 Electronic document management method and device

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111813282A (en) * 2020-05-29 2020-10-23 北京金山云网络技术有限公司 Data form display method and device
CN112131533A (en) * 2020-08-27 2020-12-25 北京云动智效网络科技有限公司 Document protection method and system
CN111931244A (en) * 2020-10-13 2020-11-13 北京世纪好未来教育科技有限公司 Method and device for preventing document from divulging, electronic equipment and storage medium
CN111931244B (en) * 2020-10-13 2021-07-13 北京世纪好未来教育科技有限公司 Method and device for preventing document from divulging, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN108280353B (en) 2021-12-28

Similar Documents

Publication Publication Date Title
CN104268468B (en) It is a kind of to the guard method of android system dynamic link library and system
CN108280353A (en) A kind of judgment method and device of security document operation
CN104537295B (en) A kind of method of computer system and management computer user authority
CN108280361A (en) A kind of authority classification management method and device
CN103544446B (en) The method and apparatus that document is demarcated level of confidentiality
CN107679421A (en) A kind of movable memory apparatus monitoring means of defence and system
CN102103667B (en) Document use management system, document processing device, document processing and method and document management apparatus
CN101533452A (en) Method for protecting cipher of USB interface
CN102591802A (en) USB flash disk with stored files openable while irreproducible
CN105959322A (en) Mandatory access control method and system based on fusion of multiple protection strategies
CN103678089B (en) The log-output method of a kind of distributed software system and system
CN113409020A (en) Electronic file management system and method
CN104361297B (en) A kind of file encryption-decryption method based on (SuSE) Linux OS
CN104751064A (en) Document encryption prompting method and document encryption prompting system
CN106203159A (en) A kind of method and apparatus of application program operation file
CN102184368A (en) Method for safely using mobile storage device
CN102982043B (en) The disposal route of PE file and device
CN109656965A (en) A kind of account method for cleaning and device
CN103699828A (en) Information security management method
CN102750198B (en) A kind of backup method of social network sites content and system
CN106203114A (en) Application program protection method and device and electronic equipment
JP2012014317A (en) Copying device, copying method, memory medium, and program
CN103440465A (en) Mobile storage medium safety control method
CN107368738A (en) A kind of anti-Root method and devices of smart machine
CN107918550A (en) A kind of method for USB device history service condition of auditing under linux system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant