Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

File protection method and device

A file and current file technology, applied in the field of data processing, can solve the problems of no security, low operating cost of exposing private data, and induced cracking of private files, etc., to achieve the effect of convenient operation, concise page, and saving design and development costs

Inactive Publication Date: 2016-11-09
LETV HLDG BEIJING CO LTD +1
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In the process of realizing the present invention, the inventor finds that there are at least the following problems in the prior art: the first prior art means, the hidden files can be checked through the simplest switch in the setting, and only by one click (switch ) operation can display or hide the privacy file without any security, and the operation cost of exposing privacy data is very low; in the second prior art means, the user needs to enter the correct password to view the file that is set as the hidden attribute. The security of files has been improved, but when facing the public, due to the existence of the "safe box", there will be a hint of the existence of private files, which will instead induce malicious intruders to crack private files, which will bring a lot of problems to users. unnecessary trouble

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File protection method and device
  • File protection method and device
  • File protection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0078] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be described in further detail below in conjunction with specific embodiments and with reference to the accompanying drawings.

[0079] It should be noted that all expressions using "first" and "second" in the embodiments of the present invention are to distinguish two entities with the same name but different parameters or parameters that are not the same, see "first" and "second" It is only for the convenience of expression, and should not be construed as a limitation on the embodiments of the present invention, which will not be described one by one in the subsequent embodiments.

[0080] In the first aspect of the embodiment of the present invention, a file protection method capable of improving the confidentiality and security of private files is proposed, which is mainly applied to the server side of the cloud disk. Such as figure 1 As shown...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a file protection method and device. The method comprises the steps of receiving a file search instruction, monitoring a character string in the file search instruction, comparing the character string with a preset code, and returning file interface data corresponding to the preset code if the character string is the preset code. By the adoption of the file protection method and device, privacy and security of private files can be improved.

Description

technical field [0001] The invention relates to the technical field of data processing, in particular to a file protection method and device. Background technique [0002] Privacy files (or hidden files), that is, files related to privacy. Usually includes: user-defined or made, such as personal photos, personally written documents, personal video recordings, etc.; information created by the system, such as system information files will contain the user's personal information; files created by software, Passwords and chat records of chat software such as QQ and Want Want, cookies stored by browsers such as IE (data stored on the user's local terminal for identifying user identities and conducting session control tracking), etc., as well as browsing records of IE, User habits can be analyzed through these files. [0003] Protecting privacy files, on the one hand, can protect user privacy, and on the other hand, can also prevent others from using user information to imperson...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F21/46
CPCG06F21/46G06F21/6245G06F2221/2141G06F2221/2107
Inventor 李兵张帆
Owner LETV HLDG BEIJING CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products