File security processing method
A security processing and file technology, applied in the direction of digital data protection, encryption device with shift register/memory, etc., can solve the problems of enterprise loss, file leakage, etc., and achieve the effect of solving security problems and avoiding resource leakage
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0026] The present invention will be further described below in conjunction with drawings and embodiments.
[0027] see Figure 1-2 1. A file security processing method, comprising:
[0028] S1, submitting the file and the file request corresponding to the file to the server through the java form;
[0029] S2. The server converts the file request into a file request item FileItem; it should be noted that the implementation of this solution uses java language. Each request item is encapsulated into a FileItem object through the DiskFileItemFactory class that creates a FileItem object factory in Java and the ServletFileUpload class that is responsible for processing uploaded file data.
[0030] S3, the server changes the file into a binary format according to the file request item FileItem, stores the file in the binary format into the disk through the output stream OutputStream, and generates a secret key corresponding to the file in the binary format;
[0031] Specifically,...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

