Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

File processing method and processing system

A processing method and processing system technology, applied in the field of file processing methods and processing systems, can solve problems such as easy cracking, negligence or omission risk, etc., and achieve the effect of not easy to crack

Inactive Publication Date: 2018-03-02
GUANGDONG OPPO MOBILE TELECOMM CORP LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] In view of this, the purpose of the present invention is to provide a file processing method and processing system, which can solve the technical problems of non-real-time encryption, negligence or omission risks, and easy cracking in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File processing method and processing system
  • File processing method and processing system
  • File processing method and processing system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0030] see figure 1 , which is a schematic flowchart of the file processing method provided by the embodiment of the present invention.

[0031] The processing method of the file is applied to a terminal device, such as a mobile phone, and the processing method includes:

[0032] In step S101, the document is received and the full text is scanned.

[0033] The files include, but are not limited to: office software (such as WORD, EXCEL, WPS, or Notepad), web pages (such as Evernote), applications (such as memos, or reminders), or photos, etc.

[0034] In step S102, it is judged whether sensitive words appear in the full text.

[0035] Wherein, if the sensitive word appears, execute step S103; if the sensitive word does not appear, execute step S106.

[0036] The sensitive words can be set by the owner of the terminal device. Unlike the sensitive words in the public opinion monitoring system, they do not refer to political tendencies, violent tendencies, unhealthy, or uncivil...

Embodiment 2

[0054] see figure 2 , which is a schematic flowchart of the file processing method provided by the embodiment of the present invention. in, figure 2 and figure 1 The same steps in still use the label beginning with S1, which is the same as figure 1 The different steps are labeled with S2 at the beginning to distinguish them.

[0055] The file processing method is applied to a terminal device, and the processing method includes:

[0056] In step S201, a database of sensitive words is generated for the sensitive words.

[0057] Specifically, the step of generating the sensitive word database includes:

[0058] (1) Receive sensitive words input by the user one by one, that is, set by the owner of the terminal device. The sensitive words include: divorce, agreement, adoption, medical records, contract, or confidentiality, etc.; or / and

[0059] (2) Receive the sensitive words selected by the user, and download the sensitive words corresponding to the sensitive words, such a...

Embodiment 3

[0097] see image 3 , which is a schematic flowchart of the file processing system provided by the embodiment of the present invention.

[0098] The file processing system 300 is applied to a terminal device, and the processing system 300 includes: a scanning module 31 , a sensitivity judgment module 32 , a prompt module 33 , an instruction judgment module 34 , and an encryption module 35 .

[0099] The scanning module 31 is connected to the storage unit 50 and used for receiving or reading the files in the storage unit 50 and scanning the full text.

[0100] Among them, the files include but are not limited to: office software (such as WORD, EXCEL, WPS, or Notepad), web pages (such as Evernote), applications (such as memos, or reminders), or pictures (such as photos), etc. .

[0101] Sensitive judging module 32, connected to the scanning module 31, is used to judge whether sensitive words appear in the full text.

[0102] Wherein, the sensitive words can be set by the owne...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a file processing method and a processing system which are applied to a terminal device. The processing method comprises the steps of receiving a file, and scanning full text; judging that whether sensitive words exist in the full text; when the sensitive words exist, sending a prompting message to remind a user to encrypt the file; judging that whether a command of refusing encryption is received in a preset encryption time threshold; when the command of refusing encryption is not received, encrypting the file through biological characteristic information of the user. According to the processing method and the processing system, provided by the invention, through scanning and judging the file to screen out the file containing the sensitive words to perform encryption, the advantages of real-time encryption, no neglecting and omission, and less possibility in cracking can be realized.

Description

technical field [0001] The invention belongs to the field of computer security, and in particular relates to a file processing method and a processing system. Background technique [0002] The popularity of smart terminal devices has brought great convenience to users' lives. For example, they can work anytime, anywhere, check emails, and share work results in real time and quickly. However, as personal privacy and business secrets are increasingly concerned, improper handling of files is likely to bring great distress to users. [0003] At present, for file encryption, such as the most commonly used office software word, it is mainly used to manually select or set permissions on pre-encrypted files, usually through 4 to 8 letters or numbers for encryption. [0004] However, manually encrypting files has the following drawbacks: [0005] (1) Non-real-time encryption, there will be a time difference in being stolen; [0006] (2) There is a risk of negligence or forgetting ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62
CPCG06F21/6209G06F2221/2107
Inventor 张海平周意保
Owner GUANGDONG OPPO MOBILE TELECOMM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products