[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN108280353B - Method and device for judging security document operation - Google Patents

Method and device for judging security document operation Download PDF

Info

Publication number
CN108280353B
CN108280353B CN201710007609.5A CN201710007609A CN108280353B CN 108280353 B CN108280353 B CN 108280353B CN 201710007609 A CN201710007609 A CN 201710007609A CN 108280353 B CN108280353 B CN 108280353B
Authority
CN
China
Prior art keywords
document
security
security document
operation instruction
authority
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710007609.5A
Other languages
Chinese (zh)
Other versions
CN108280353A (en
Inventor
梁托华
余陶跃
黄志军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Kingsoft Office Software Inc
Zhuhai Kingsoft Office Software Co Ltd
Guangzhou Kingsoft Mobile Technology Co Ltd
Original Assignee
Beijing Kingsoft Office Software Inc
Zhuhai Kingsoft Office Software Co Ltd
Guangzhou Kingsoft Mobile Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Kingsoft Office Software Inc, Zhuhai Kingsoft Office Software Co Ltd, Guangzhou Kingsoft Mobile Technology Co Ltd filed Critical Beijing Kingsoft Office Software Inc
Priority to CN201710007609.5A priority Critical patent/CN108280353B/en
Publication of CN108280353A publication Critical patent/CN108280353A/en
Application granted granted Critical
Publication of CN108280353B publication Critical patent/CN108280353B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Automation & Control Theory (AREA)
  • Document Processing Apparatus (AREA)

Abstract

The embodiment of the invention discloses a method and a device for judging operation of a security document, which are used for solving the technical problems that in the prior art, the security document is usually protected from a driving layer, so that error injury is easy to occur, the operation performed on a non-security document cannot be correctly executed, the method for monitoring protection from the driving layer has low stability, and the stable operation of the security document is hindered. The method provided by the embodiment of the invention comprises the following steps: receiving a security document operation instruction of a user terminal for operating a security document, comparing and judging the security document operation instruction with the security document authority owned by the user terminal through a preset kernel editor, if the user terminal has the authority of operating the security document in the security document operation instruction, executing the security document operation instruction, otherwise refusing to execute the security document operation instruction.

Description

Method and device for judging security document operation
Technical Field
The invention relates to the field of computers, in particular to a method and a device for judging operation of a security document.
Background
In OFFICE software, on some specific occasions, the author who creates a document encrypts the document and sets restrictions such as reading, editing, and the like to ensure the security of the document. Therefore, when the document is transferred to the hands of some users who do not obtain the reading right, the users can not open the document for reference, and the safety of the document content is greatly ensured.
The security document is protected in the prior art, for example, the security document is protected from a driving layer, for example, the driving layer detects a copy operation, and the copy operation is prohibited from being executed when a copy operation instruction is detected. However, this kind of protection method is prone to have a "false damage" result, that is, when the security document and the normal document are opened at the same time, the content in the security document cannot be copied, and at the same time, the content in the normal document cannot be copied. And the method for implementing the monitoring protection from the driving layer has low stability, which hinders the stable operation of the security document.
Disclosure of Invention
The embodiment of the invention provides a method and a device for judging operation of a security document, which solve the technical problems that in the prior art, the operation of a non-security document cannot be correctly executed due to the fact that the security document is usually protected from a driving layer and is easy to be accidentally damaged, and the stable operation of the security document is hindered due to the low stability of a method for monitoring protection from the driving layer.
The method for judging the operation of the security document, provided by the embodiment of the invention, comprises the following steps:
receiving a security document operation instruction of a user terminal for operating a security document, comparing and judging the security document operation instruction with the security document authority owned by the user terminal through a preset kernel editor, if the user terminal has the authority of operating the security document in the security document operation instruction, executing the security document operation instruction, otherwise refusing to execute the security document operation instruction, wherein the security document operation instruction carries the security document authority.
Optionally, the security document authority carried by the security document operation instruction includes a copy operation authority, an edit operation authority, a print operation authority, and an additional storage operation authority.
Optionally, the method further comprises:
receiving a security form document operation instruction of a user terminal for operating a security form document, comparing and judging the security form document operation instruction and security form document authority owned by the user terminal through a preset kernel editor, if the user terminal owns the authority of operating the security form document in the security form document operation instruction, executing the security form document operation instruction, and otherwise refusing to execute the security form document operation instruction.
Optionally, the security form document authority carried by the security form document operation instruction includes a copy operation authority, an edit operation authority, a print operation authority, and an additional storage operation authority.
Optionally, the method further comprises:
and if the table document reference instruction is the safety table document reference instruction for referencing the safety table document content, refusing to execute the safety table document reference instruction.
Optionally, the security document is a security text document with a preset specific format.
Optionally, the security form document is a security form document with a preset specific format.
The embodiment of the invention provides a device for judging the operation of a security document, which comprises:
the first judgment module is used for receiving a security document operation instruction for operating a security document by a user terminal, comparing and judging the security document operation instruction and security document authority owned by the user terminal through a preset kernel editor, if the user terminal owns the authority for operating the security document in the security document operation instruction, executing the security document operation instruction, and otherwise, refusing to execute the security document operation instruction, wherein the security document operation instruction carries the security document authority.
Optionally, the method further comprises:
the second judgment module is used for receiving a safety form document operation instruction of operating a safety form document by a user terminal, comparing and judging the safety form document operation instruction and the safety form document authority owned by the user terminal through a preset kernel editor, if the user terminal owns the authority of operating the safety form document in the safety form document operation instruction, executing the safety form document operation instruction, and if not, refusing to execute the safety form document operation instruction.
Optionally, the method further comprises:
the identification module is used for receiving a table document reference instruction for the user terminal to reference the table document content, identifying the table document reference instruction through a preset kernel editor, and refusing to execute the safety table document reference instruction if the table document reference instruction is the safety table document reference instruction for referencing the safety table document content.
According to the technical scheme, the embodiment of the invention has the following advantages:
the embodiment of the invention provides a method and a device for judging security document operation, wherein the method comprises the following steps: receiving a security document operation instruction of a user terminal for operating a security document, comparing and judging the security document operation instruction with the security document authority owned by the user terminal through a preset kernel editor, if the user terminal has the authority of operating the security document in the security document operation instruction, executing the security document operation instruction, otherwise refusing to execute the security document operation instruction, comparing and judging the received security document operation instruction of the user terminal for operating the security document with the document authority actually owned by the user through the preset kernel editor, executing the security document operation instruction when the user terminal has the authority of operating the security document in the security document operation instruction, otherwise refusing to execute the security document operation instruction, compared with the method of filtering the authority operation from a driving layer and preventing the operation to achieve the protection purpose in the prior art, the embodiment of the invention adopts the preset kernel editor to carry out protection, carries out accurate judgment on the execution of the operation instruction of the security document, has high stability, and solves the technical problems that the operation on the non-security document cannot be correctly executed due to easy accidental injury caused by the fact that the security document is usually protected from a driving layer in the prior art, and the method for carrying out monitoring protection from the driving layer has lower stability and prevents the stable operation of the security document.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without inventive exercise.
FIG. 1 is a flowchart illustrating an embodiment of a method for determining security document operation according to the present invention;
FIG. 2 is a flowchart illustrating a method for determining security document operation according to another embodiment of the present invention;
fig. 3 is a flowchart illustrating an embodiment of a device for determining security document operation according to an embodiment of the present invention.
Detailed Description
The embodiment of the invention provides a method and a device for judging operation of a security document, which are used for solving the technical problems that in the prior art, the security document is usually protected from a driving layer, so that error injury is easy to occur, the operation performed on a non-security document cannot be correctly executed, the method for monitoring protection from the driving layer is low in stability, and the stable operation of the security document is hindered.
In order to make the objects, features and advantages of the present invention more obvious and understandable, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention, and it is obvious that the embodiments described below are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, an embodiment of a method for determining a security document operation according to the present invention includes:
101. receiving a security document operation instruction of a user terminal for operating a security document, comparing and judging the security document operation instruction with the security document authority owned by the user terminal through a preset kernel editor, if the user terminal has the authority of operating the security document in the security document operation instruction, executing the security document operation instruction, otherwise refusing to execute the security document operation instruction, wherein the security document operation instruction carries the security document authority.
When a user terminal carries out authority operation on a security document, such as editing, copying, printing and other authority operation, receiving a security document operation instruction for operating the security document by the user terminal, comparing and judging the security document operation instruction and the security document authority owned by the user terminal through a preset kernel editor, executing the security document operation instruction if the user terminal owns the authority for operating the security document in the security document operation instruction, and refusing to execute the security document authority carried by the security document operation instruction including copying operation authority, editing operation authority, printing operation authority and storing operation authority. If the user terminal edits the security document, the kernel editor judges whether the user terminal has the editing authority of the security document according to an editing operation instruction sent by the user terminal, if so, the editing instruction of the user terminal is executed, otherwise, the editing instruction is refused to be executed.
The security document is a security text document with a preset specific WPS Office format, the format of the security text document is WPSs (namely, a suffix name), and the security text document can be opened only by using a WPS Office client supporting the WPS security document.
The above is a detailed description of an embodiment of a method for determining a security document operation according to an embodiment of the present invention, and another embodiment of a method for determining a security document operation according to an embodiment of the present invention will be described in detail below.
Referring to fig. 2, another embodiment of the method for determining a security document operation according to the present invention includes:
201. receiving a security form document operation instruction of a user terminal for operating a security form document, comparing and judging the security form document operation instruction and security form document authority owned by the user terminal through a preset kernel editor, if the user terminal owns the authority of operating the security form document in the security form document operation instruction, executing the security form document operation instruction, and otherwise refusing to execute the security form document operation instruction.
When a user terminal carries out authority operation on a safety form document, such as editing, copying, printing and other authority operation, receiving a safety form document operation instruction of the user terminal for operating the safety form document, comparing and judging the safety form document operation instruction and the safety form document authority owned by the user terminal through a preset kernel editor, executing the safety form document operation instruction if the user terminal owns the authority of operating the safety form document in the safety form document operation instruction, and otherwise refusing to execute the safety form document authority carried by the safety form document operation instruction, wherein the safety form document authority includes copying operation authority, editing operation authority, printing operation authority and saving operation authority. If the user terminal edits the safety form document, the kernel editor judges whether the user terminal has the editing authority of the safety form document according to an editing operation instruction sent by the user terminal, if so, the editing instruction of the user terminal is executed, otherwise, the editing instruction is refused to be executed.
Note that the security form document is a security form document with a preset WPS Office specific format, and the format of the security form document is ets (i.e., a suffix name), and the security form document can only be opened by using a WPS Office client that supports the WPS security form document.
202. And if the table document reference instruction is the safety table document reference instruction for referencing the safety table document content, refusing to execute the safety table document reference instruction.
When a table document reference instruction for a user terminal to reference the contents of the table document is received, the table document reference instruction is identified through a preset kernel editor, and if the table document reference instruction is a security table document reference instruction for referencing the contents of the security table document, the security table document reference instruction is refused to be executed. In the prior art, when a non-secure form document is referenced in a secure form document, the permission limit of the secure form document is avoided, and the reference is successful, that is, when a user terminal possesses the reading permission of the secure form document and does not have the authority of editing, copying and the like, the user terminal can obtain all contents of the secure form document by referring to the contents of the secure form document in another non-secure form document, even though the user terminal does not have the editing permission and the copying permission of the secure form document. In the invention, all table document reference instructions for referencing the table document content are identified through a kernel editor of the WPS client, and if the table document reference instructions are instructions for referencing the safety table document content, the instructions are refused to be executed, so that the content of the safety table document cannot be referenced.
The above is a detailed description of another embodiment of the method for determining a security document operation according to the embodiment of the present invention, and a detailed description of a device for determining a security document operation according to the embodiment of the present invention is provided below.
Referring to fig. 3, a device for determining security document operation according to an embodiment of the present invention includes:
the first judging module 301 is configured to receive a security document operation instruction for operating a security document by a user terminal, compare and judge the security document operation instruction with a security document right owned by the user terminal through a preset kernel editor, execute the security document operation instruction if the user terminal has the right to operate the security document in the security document operation instruction, and refuse to execute the security document operation instruction if the user terminal does not have the right to operate the security document in the security document operation instruction, where the security document operation instruction carries the security document right.
The second judging module 302 is configured to receive a security form document operation instruction for operating a security form document by a user terminal, compare and judge the security form document operation instruction with a security form document authority owned by the user terminal through a preset kernel editor, execute the security form document operation instruction if the user terminal has the authority of operating the security form document in the security form document operation instruction, and refuse to execute the security form document operation instruction if the user terminal does not have the authority of operating the security form document in the security form document operation instruction.
The identification module 303 is configured to receive a table document reference instruction for referring to the content of the table document by the user terminal, identify the table document reference instruction by using the preset kernel editor, and refuse to execute the security table document reference instruction if the table document reference instruction is the security table document reference instruction for referring to the content of the security table document.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present invention, and not for limiting the same; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (8)

1. A method for determining operation of a security document, comprising:
receiving a security document operation instruction of a user terminal for operating a security document, comparing and judging the security document operation instruction with the security document authority owned by the user terminal through a preset kernel editor of an application program for editing the security document, if the user terminal has the authority of operating the security document in the security document operation instruction, executing the security document operation instruction, otherwise refusing to execute the security document operation instruction, wherein the security document operation instruction carries the security document authority; the safety document is a safety form document, and the safety document operation instruction is a safety form document operation instruction;
receiving a table document reference instruction for a user terminal to reference table document contents, identifying the table document reference instruction through a preset kernel editor, and refusing to execute the safety table document reference instruction if the table document reference instruction is the safety table document reference instruction for referencing the safety table document contents.
2. The method for judging the operation of the security document according to claim 1, wherein the security document authority carried by the security document operation instruction comprises a copy operation authority, an edit operation authority, a print operation authority, and an save operation authority.
3. The method for determining the operation of a security document according to claim 1, further comprising:
receiving a safety form document operation instruction of a user terminal for operating a safety form document, comparing and judging the safety form document operation instruction with the safety form document authority owned by the user terminal through a preset kernel editor, if the user terminal has the authority of operating the safety form document in the safety form document operation instruction, executing the safety form document operation instruction, otherwise refusing to execute the safety form document operation instruction.
4. The method for judging security document operation according to claim 3, wherein the security form document authority carried by the security form document operation instruction includes a copy operation authority, an edit operation authority, a print operation authority, and an save operation authority.
5. The method for judging the operation of a security document according to claim 1, wherein the security document is a security text document having a preset specific format.
6. The method for determining the operation of a security document according to claim 3, wherein the security form document is a security form document having a preset specific format.
7. A judgment apparatus of a security document operation, characterized by comprising:
the first judgment module is used for receiving a security document operation instruction for operating a security document by a user terminal, comparing and judging the security document operation instruction with the security document authority owned by the user terminal through a preset kernel editor of an application program for editing the security document, if the user terminal owns the authority for operating the security document in the security document operation instruction, executing the security document operation instruction, and if not, refusing to execute the security document operation instruction, wherein the security document operation instruction carries the security document authority; the safety document is a safety form document, and the safety document operation instruction is a safety form document operation instruction;
the identification module is used for receiving a table document reference instruction for referring to the content of the table document by a user terminal, identifying the table document reference instruction through a preset kernel editor, and refusing to execute the safety table document reference instruction if the table document reference instruction is the safety table document reference instruction for referring to the content of the safety table document.
8. The apparatus for judging the operation of a security document according to claim 7, further comprising:
the second judgment module is used for receiving a safety form document operation instruction of a user terminal for operating a safety form document, comparing and judging the safety form document operation instruction and the safety form document authority owned by the user terminal through a preset kernel editor, if the user terminal owns the authority of operating the safety form document in the safety form document operation instruction, executing the safety form document operation instruction, and if not, refusing to execute the safety form document operation instruction.
CN201710007609.5A 2017-01-05 2017-01-05 Method and device for judging security document operation Active CN108280353B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710007609.5A CN108280353B (en) 2017-01-05 2017-01-05 Method and device for judging security document operation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710007609.5A CN108280353B (en) 2017-01-05 2017-01-05 Method and device for judging security document operation

Publications (2)

Publication Number Publication Date
CN108280353A CN108280353A (en) 2018-07-13
CN108280353B true CN108280353B (en) 2021-12-28

Family

ID=62800618

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710007609.5A Active CN108280353B (en) 2017-01-05 2017-01-05 Method and device for judging security document operation

Country Status (1)

Country Link
CN (1) CN108280353B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111813282B (en) * 2020-05-29 2021-12-10 北京金山云网络技术有限公司 Data form display method and device
CN112131533A (en) * 2020-08-27 2020-12-25 北京云动智效网络科技有限公司 Document protection method and system
CN111931244B (en) * 2020-10-13 2021-07-13 北京世纪好未来教育科技有限公司 Method and device for preventing document from divulging, electronic equipment and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101226573A (en) * 2007-01-16 2008-07-23 北京书生国际信息技术有限公司 Method for controlling access authority of electric document
CN101847197A (en) * 2009-03-24 2010-09-29 上海任登信息科技有限公司 Method for controlling document access authority
CN102087690A (en) * 2009-12-02 2011-06-08 富士施乐株式会社 Document management system and document management method
CN103597494A (en) * 2011-04-02 2014-02-19 英特尔公司 Method and apparatus for managing digital usage rights of a document
CN105224678A (en) * 2015-10-19 2016-01-06 浪潮软件集团有限公司 Electronic document management method and device
US9268958B1 (en) * 2013-08-09 2016-02-23 Symantec Corporation Preventing the loss of sensitive data synchronized with a mobile device

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102306255B (en) * 2011-08-29 2013-06-19 飞天诚信科技股份有限公司 Document protection method and system
CN104318174A (en) * 2014-10-28 2015-01-28 深圳市大成天下信息技术有限公司 Document protecting method, document protecting devices and document protecting system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101226573A (en) * 2007-01-16 2008-07-23 北京书生国际信息技术有限公司 Method for controlling access authority of electric document
CN101847197A (en) * 2009-03-24 2010-09-29 上海任登信息科技有限公司 Method for controlling document access authority
CN102087690A (en) * 2009-12-02 2011-06-08 富士施乐株式会社 Document management system and document management method
CN103597494A (en) * 2011-04-02 2014-02-19 英特尔公司 Method and apparatus for managing digital usage rights of a document
US9268958B1 (en) * 2013-08-09 2016-02-23 Symantec Corporation Preventing the loss of sensitive data synchronized with a mobile device
CN105224678A (en) * 2015-10-19 2016-01-06 浪潮软件集团有限公司 Electronic document management method and device

Also Published As

Publication number Publication date
CN108280353A (en) 2018-07-13

Similar Documents

Publication Publication Date Title
US11704384B2 (en) Secure document sharing
CN110506271B (en) Configurable annotations for privacy-sensitive user content
CN110447035B (en) User content obfuscation in structured user data files
US9852289B1 (en) Systems and methods for protecting files from malicious encryption attempts
KR101382222B1 (en) System and method for mobile data loss prevention which uses file system virtualization
US8950005B1 (en) Method and system for protecting content of sensitive web applications
CN108280353B (en) Method and device for judging security document operation
CN107679370B (en) Equipment identifier generation method and device
CN102609642A (en) Clipboard control method and clipboard control system
JP2010026662A (en) Information leakage prevention system
US9292691B1 (en) Systems and methods for protecting users from website security risks using templates
JP2012068833A (en) Method, computer program, apparatus and system for determining confidential label of document information
CN103544446A (en) Method and device for security classification calibration of files
CN105959322A (en) Mandatory access control method and system based on fusion of multiple protection strategies
CN104537295A (en) Computer system and method for managing computer user right
CN109388966A (en) File permission control method and device
CN108092946B (en) Method and system for safely accessing network
JPH04147361A (en) System for processing for change of processing screen
CN107918550A (en) A kind of method for USB device history service condition of auditing under linux system
JP4138854B1 (en) External device management system
KR101572242B1 (en) Preventing system and method for copying electronic book
CN111030982B (en) Strong management and control method, system and storage medium for confidential files
CN113656355A (en) File processing method and device, nonvolatile storage medium and processor
TW202240404A (en) Data processing system and method capable of separating application processes
CN108280354B (en) Method and device for using authority template

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant