Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

File protection method and device

A file and object file technology, applied in the field of computer security, can solve problems such as low security, content acquisition of files, and lack of security awareness of users, so as to achieve the effect of improving security

Inactive Publication Date: 2015-07-01
ZHUHAI KINGSOFT OFFICE SOFTWARE +1
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, many users lack security awareness. They often use login passwords to log in to network servers on different devices or even public devices to browse files. The content of the file is obtained by others, and the security is not high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File protection method and device
  • File protection method and device
  • File protection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0061] Embodiments of the present invention provide a file protection method and device. In this solution, when the target file is currently in a browseable state, the state of the target file is monitored; when the state of the target file is detected to meet the preset locking After the condition, switch the state of the target file to the state of prohibiting browsing.

[0062] The present invention will be described in detail below through specific examples.

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An embodiment of the invention discloses a file protection method and device. The method includes monitoring the state of a target file under the condition that the target file is currently in the browsing allowable state; switching the state of the target file into the browsing forbidding state after monitoring that the state of the target file meets the preset locking condition. By means of the method and device, under the condition that a user quits without quitting the account or closing the opened target file, the state of the opened file can be switched to the browsing forbidding state to prevent others from browsing the file, and the file safety is improved.

Description

technical field [0001] The invention relates to the technical field of computer security, in particular to a file protection method and device. Background technique [0002] With the development of computer technology and the Internet, more and more users store files in network servers, so that they can be opened and used by different devices anytime and anywhere. But sometimes users do not want certain files to be browsed or downloaded by other users, such as files that record various bank account numbers or passwords, some private photos, etc., and these files need to be protected. [0003] The existing method for file protection is to set a layer of login password or set a password to open the folder on the basis of setting a layer of login password. [0004] However, many users lack security awareness. They often use login passwords to log in to network servers on different devices or even public devices to browse files. The content of the file is obtained by others, a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62
Inventor 晁云瞳黄智寿黄叙鹏欧迪佐洪学文
Owner ZHUHAI KINGSOFT OFFICE SOFTWARE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products