File protection realization method and device and computation equipment

A file and open file technology, applied in the computer field, can solve the problems of user life impact and loss, reducing user experience, economic loss, etc.

Inactive Publication Date: 2017-07-25
BEIJING QIHOO TECH CO LTD
View PDF5 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, some criminals will use various methods to intrude into the files of private terminal devices to perform operations against the user's wishes, such as deleting files, moving files, copying files, modifying the content or name of files, etc., and requiring users to give certain rewards, Only after the modified file is restored, in order to illegally seek profits, if the user ignores it, it will cause certain economic losses, and will condone the recurrence of this behavior; if the user ignores it, these illegally manipulated files, Especially for some important files, if they cannot be restored to their original state or directly lead to the leakage of the file content, or the loss of the file, it will bring certain impact and loss to the user's life or work, and reduce the user experience.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File protection realization method and device and computation equipment
  • File protection realization method and device and computation equipment
  • File protection realization method and device and computation equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0095] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0096] figure 1 A schematic flowchart showing a method for implementing file protection according to an embodiment of the present invention, as shown in figure 1 As shown, the method includes:

[0097] Step S110, determining the files to be protected.

[0098] The files to be protected may be default or user-defined one or more types of files, may also be one or more files selected by the user, and may also be some files that are...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a file protection realization method and device and computation equipment. The method comprises the following steps of: determining a to-be-protected file; monitoring operations executed on the to-be-protected file; and when the fact that a progress executes a specific operation on the to-be-protected file is monitored, executing processing corresponding to the specific operation. When to-be-protected files are modified under the condition of against the wills of the users, the method can be executed to achieve the effect of protect the to-be-protected files, prevent the condition of in-availability caused by illegal operations carried out on the files, maintain the benefits of the users and enhance the user experience.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a method, device and computing equipment for realizing file protection. Background technique [0002] With the popularization of computer technology in social life and work, a large number of files are stored in various terminal devices, such as mobile phones, pads, desktop computers, etc., and some of them are relatively important files. However, some criminals will use various methods to intrude into the files of private terminal devices to perform operations against the user's wishes, such as deleting files, moving files, copying files, modifying the content or name of files, etc., and requiring users to give certain rewards, Only after the modified file is restored, in order to illegally seek profits, if the user ignores it, it will cause certain economic losses, and will condone the recurrence of this behavior; if the user ignores it, these illegally manipulated files, Es...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62
Inventor 潘剑锋李宜檑秦光远邹贵强刘健锋
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products