CN112734361B - Distributed cooperative office data processing method and system - Google Patents

Distributed cooperative office data processing method and system Download PDF

Info

Publication number
CN112734361B
CN112734361B CN202011596044.7A CN202011596044A CN112734361B CN 112734361 B CN112734361 B CN 112734361B CN 202011596044 A CN202011596044 A CN 202011596044A CN 112734361 B CN112734361 B CN 112734361B
Authority
CN
China
Prior art keywords
file
data
address
plaintext
sequence
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011596044.7A
Other languages
Chinese (zh)
Other versions
CN112734361A (en
Inventor
罗圣阳
姚清文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Carel Electronics Suzhou Co Ltd
Original Assignee
Carel Electronics Suzhou Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Carel Electronics Suzhou Co Ltd filed Critical Carel Electronics Suzhou Co Ltd
Priority to CN202011596044.7A priority Critical patent/CN112734361B/en
Publication of CN112734361A publication Critical patent/CN112734361A/en
Application granted granted Critical
Publication of CN112734361B publication Critical patent/CN112734361B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • Human Resources & Organizations (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Computing Systems (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • General Business, Economics & Management (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to the technical field of big data processing, in particular to a distributed cooperative office data processing method and system. Firstly, acquiring an encrypted data file in each data block of a collaborative office project file; sequentially decrypting the encrypted data files in each data block based on the encrypted file sequence of the encrypted data files in each data block to obtain at least two plaintext data files; and fusing and splicing the at least two plaintext data files to obtain at least one to-be-processed cooperative office file. According to the method and the device, the encrypted data files in each data block of the collaborative office project file are sequentially decrypted according to the sequence of the encrypted files to obtain at least one to-be-processed collaborative office file, collaborative office can be achieved based on the to-be-processed collaborative office file, and the security of circulation of the collaborative office project file among different member devices is improved.

Description

Distributed cooperative office data processing method and system
Technical Field
The invention relates to the technical field of big data processing, in particular to a distributed cooperative office data processing method and system.
Background
With the development of distributed technology and the requirement of application scenes, the online cooperative office service can meet the flexible office requirement of enterprises, so that the possibility is provided for remote office of enterprise employees.
Some enterprise data relate to enterprise production and management, and therefore encryption processing needs to be carried out on enterprise office data shared on line. However, in the prior art, when enterprise office data is encrypted, the whole file is often encrypted, and the encryption strategy is easy to crack, so that the security of the enterprise data in the process of flowing among different users is low.
Disclosure of Invention
The present invention is directed to a distributed cooperative office data processing method and system, so as to solve at least some of the above technical problems.
In order to achieve the purpose, the technical scheme adopted by the invention is as follows:
in a first aspect, the present invention provides a distributed cooperative office data processing method, which is applied to member devices in a distributed cluster system; the method comprises the following steps:
acquiring encrypted data files in each data block of the collaborative office project file; any one of the encrypted data files is a file obtained by splitting the collaborative office project file and encrypted by one of the data blocks;
sequentially decrypting the encrypted data files in each data block based on the encrypted file sequence of the encrypted data files in each data block to obtain at least two plaintext data files; each plaintext data file is obtained by decrypting one encrypted data file in the data blocks of the collaborative office project file;
and fusing and splicing the at least two plaintext data files to obtain at least one to-be-processed cooperative office file.
Optionally, as an implementation manner, the sequentially decrypting the encrypted data files in each data block based on the encrypted file order of the encrypted data files in each data block to obtain at least two plaintext data files includes:
acquiring a first encryption file sequence between each encryption data file in the first data block and the second data block; the first data block is a data block of a target plaintext data file corresponding to the first data block, the first encryption file sequence is generated based on a storage sequence number sequence, a storage address sequence and a random verification code sequence between two data blocks, and the first data block and the second data block are two adjacent data blocks in each data block;
determining a sub-data block in which an encrypted data file corresponding to the first encrypted file sequence in each encrypted data file of the second data block is located and matched with a first encrypted file sequence of the last encrypted data file in the first data block as a target data block;
and after the encrypted data file in the target data block is decrypted, splicing the decrypted encrypted data file in the first data block to generate a plaintext data file.
Optionally, as an embodiment, the at least two plaintext data files include a first plaintext data file and a second plaintext data file;
the fusing and splicing of the at least two plaintext data files to obtain at least one to-be-processed collaborative office file comprises the following steps:
performing splicing sequence number prediction in a data block behind the first data block based on the file sequence number of each sub-plaintext data file in the first plaintext data file to obtain an estimated splicing sequence number of the first plaintext data file connected to the second data block;
acquiring an estimated splicing sequence number of the first plaintext data file connected to the second data block, and a storage sequence number sequence between a file sequence number of a first sub plaintext data file in the second plaintext data file, wherein the storage sequence number sequence is used as a target storage sequence number sequence between the first plaintext data file and the second plaintext data file; the first data block where the last sub-plaintext data file in the first plaintext data file is located before the second data block where the first sub-plaintext data file in the second plaintext data file is located in the generation time;
adjusting the initial storage address sequence by using a preset address adjustment strategy based on the storage address of the last sub-plaintext data file in the first plaintext data file and the initial storage address sequence between the storage addresses of the first sub-plaintext data file in the second plaintext data file to obtain a target storage address sequence of the first plaintext data file and the second plaintext data file;
fusing and splicing at least two sub-plaintext data files which are adjacent in generation time in the first plaintext data file and the second plaintext data file respectively to obtain an initial fusion file of the first plaintext data file;
acquiring an encrypted file sequence between the initial fusion file of the first plaintext data file and the initial fusion file of the second plaintext data file, and generating a random code, wherein the generated random code is used as a target random verification code sequence of the first plaintext data file and the second plaintext data file;
acquiring a target fusion sequence between the first plaintext data file and the second plaintext data file based on a target storage sequence number sequence, a target storage address sequence and a target random verification code sequence between the first plaintext data file and the second plaintext data file;
and aiming at the at least two plaintext data files, sequentially fusing according to a target fusion sequence between the at least two plaintext data files to generate at least one to-be-processed cooperative office file after the at least two plaintext data files are fused.
Optionally, as an implementation manner, the obtaining an encrypted data file in each data block of the collaborative office project file includes:
acquiring a file storage address of a collaborative office project file in a file sharing state; the collaborative office project file comprises at least one encrypted data file, and the file storage address is a storage address corresponding to any encrypted data file in the collaborative office project file;
acquiring a key storage address corresponding to the file storage address; the key saving address is used for saving a decoding key secret key obtaining file of the encrypted data file in the corresponding file saving address;
and matching and storing the file storage address and the corresponding secret key storage address, and acquiring an authentication result of the secret key storage address, and then acquiring an encrypted data file in the collaborative office project file according to the authentication result.
Optionally, as an implementation manner, the acquiring a file saving address of the collaborative office project file in the file sharing state includes:
acquiring file project information of a collaborative office project file, and running a file acquisition script in a shared file database according to the file project information to activate the collaborative office project file;
when the collaborative office project file is in a file sharing state, operating a file acquisition script aiming at the file saving address;
and reading the file storage address by using the file acquisition script.
Optionally, as an implementation manner, the obtaining a key saving address corresponding to the file saving address includes:
acquiring an address information identifier of the file saving address, and performing associated mapping on the address information identifier of the file saving address and an address information identifier of an encrypted data file in a key saving address information base to obtain an address mapping result; the key saving address information base is used for storing a key saving address corresponding to an encrypted data file of the collaborative office project file;
when the address mapping result is that the mapping is passed, acquiring a secret key saving address corresponding to the file saving address from the secret key saving address information base;
when the address mapping result is that the mapping does not pass, analyzing the file storage address, generating key acquisition indication information of the file storage address, and compiling the key acquisition indication information to generate a key acquisition instruction;
writing the secret key obtaining instruction into an actuator, and operating the secret key obtaining instruction by the actuator;
and receiving a key acquisition file fed back in response to the key acquisition instruction, decompressing the key acquisition file in response to the key acquisition instruction, and generating a key storage address.
Optionally, as an implementation manner, the obtaining an address information identifier of the file saving address, and performing association mapping on the address information identifier of the file saving address and an address information identifier of an encrypted data file in a key saving address information base to obtain an address mapping result includes:
acquiring an address information identifier of the file saving address, and performing association mapping on the address information identifier of the file saving address and an address information identifier of an encrypted data file in a key saving address information base;
when the address information identifier corresponding to the file saving address exists in the secret key saving address information base, determining that the address mapping result is that the mapping is passed;
and when the address information identifier corresponding to the file saving address does not exist in the key saving address information base, determining that the address mapping result is that the mapping is not passed.
Optionally, as an implementation manner, after the file saving address and the corresponding key saving address are stored in a matching manner and a verification result of the key saving address is obtained, obtaining an encrypted data file of the collaborative office project file according to the verification result includes:
analyzing the key storage address, and acquiring a key acquisition file corresponding to the file storage address stored in the key storage address from a cache pool corresponding to the key storage address;
acquiring address verification information and clock verification information of a file key saving address, respectively comparing and verifying the address verification information and the clock verification information with standard verification information, and generating a verification result; the standard verification information is address verification information and clock verification information when the collaborative office project file is in a standard state;
and when the verification result indicates that the verification is passed, analyzing the collaborative office project file and obtaining an encrypted data file in the collaborative office project file.
Optionally, as an implementation manner, the obtaining an encrypted data file in each data block of the collaborative office project file includes:
receiving a cooperative office operation request, and responding to the cooperative office operation request to display a cooperative office operation interface; the cooperative office operation interface comprises a file downloading address and a file version parameter;
downloading the collaborative file compression package from the cloud server through the file downloading address;
decompressing the collaborative file compression packet to generate a collaborative office project file;
acquiring a project file configuration strategy between a preset file type and a data block division strategy according to the collaborative office project file;
generating a target data block division strategy of the file type according to the project file configuration strategy, and performing block division on the collaborative office project file according to the target data block division strategy to generate at least one data block corresponding to the collaborative office project file;
and performing data extraction on the at least one data block by using the file version parameter to obtain an encrypted data file in each data block of the collaborative office project file.
In a second aspect, the present invention provides a distributed cooperative office data processing system, which is applied to member devices in a distributed cluster system; the system comprises:
the acquisition module is used for acquiring encrypted data files in each data block of the collaborative office project file; any one of the encrypted data files is a file obtained by splitting the collaborative office project file and encrypted by one of the data blocks;
the decryption module is used for sequentially decrypting the encrypted data files in each data block based on the encrypted file sequence of the encrypted data files in each data block to obtain at least two plaintext data files; each plaintext data file is obtained by decrypting one encrypted data file in the data blocks of the collaborative office project file;
and the splicing module is used for fusing and splicing the at least two plaintext data files to obtain at least one to-be-processed cooperative office file.
In a third aspect, the present invention provides a general-purpose device comprising a memory for storing one or more programs; a processor; the one or more programs, when executed by the processor, implement the distributed cooperative office data processing method described above.
In a fourth aspect, the present invention provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the distributed cooperative office data processing method described above.
According to the distributed cooperative office data processing method and system, the encrypted data files in each data block of the cooperative office project file are sequentially decrypted according to the sequence of the encrypted files, so that at least two plaintext data files are obtained, the at least two plaintext data files are fused and spliced, and at least one cooperative office file to be processed is obtained, so that a user at the member equipment side can realize cooperative office based on the cooperative office file to be processed; therefore, the safety of the circulation of the collaborative office project files among different member devices can be greatly improved.
In order to make the aforementioned and other objects, features and advantages of the present invention comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the technical solution of the present invention, the drawings needed to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present invention and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained according to these drawings without inventive effort.
Fig. 1 is a block diagram of a general device provided in the present invention.
Fig. 2 is a flowchart of a distributed cooperative office data processing method provided by the present invention.
FIG. 3 is a block diagram of a distributed cooperative office data processing system according to the present invention
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention clearer, the technical solutions of the present invention will be clearly and completely described below with reference to the accompanying drawings in some embodiments of the present invention, and it is obvious that the described embodiments are some, but not all embodiments of the present invention. The components of the present invention, as generally described and illustrated in the figures herein, may be arranged and designed in a wide variety of different configurations.
Thus, the following detailed description of the embodiments of the present invention, presented in the figures, is not intended to limit the scope of the invention, as claimed, but is merely representative of selected embodiments of the invention. All other embodiments, which can be obtained by a person skilled in the art without any inventive step based on a part of the embodiments of the present invention, belong to the protection scope of the present invention.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined and explained in subsequent figures. Meanwhile, in the description of the present invention, the terms "first", "second", and the like are used only for distinguishing the description, and are not to be construed as indicating or implying relative importance.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
Some embodiments of the invention are described in detail below with reference to the accompanying drawings. The embodiments described below and the features of the embodiments can be combined with each other without conflict.
Referring to fig. 1, fig. 1 is a block diagram of a general device 100 provided in the present invention, which can be used as a member device in a distributed cluster system and execute the distributed cooperative office data method provided in the present invention.
In the present embodiment, the general-purpose device 100 includes a memory 101, a processor 102, and a communication interface 103, and the memory 101, the processor 102, and the communication interface 103 are electrically connected to each other directly or indirectly to achieve data transmission or interaction. For example, the components may be electrically connected to each other via one or more communication buses or signal lines.
The memory 101 may be configured to store software programs and modules, such as program instructions/modules corresponding to the distributed cooperative office data processing system provided by the present invention, and the processor 102 executes various functional applications and data processing by executing the software programs and modules stored in the memory 101, so as to further execute the steps of the distributed cooperative office data processing method provided by the present invention. The communication interface 103 may be used for communicating signaling or data with other node devices.
The Memory 101 may be, but is not limited to, a Random Access Memory (RAM), a Read Only Memory (ROM), a Programmable Read-Only Memory (PROM), an Erasable Read-Only Memory (EPROM), an electrically Erasable Programmable Read-Only Memory (EEPROM), and the like.
The processor 102 may be an integrated circuit chip having signal processing capabilities. The Processor 102 may be a general-purpose Processor, including a Central Processing Unit (CPU), a Network Processor (NP), and the like; but also Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs) or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components.
Referring to fig. 2, fig. 2 is a flowchart of a distributed cooperative office data processing method provided by the present invention, in this embodiment, the distributed cooperative office data processing method is applied to member devices in a distributed cluster system, and the distributed cooperative office data processing method includes the following steps:
s310, acquiring encrypted data files in each data block of the collaborative office project file; any one of the encrypted data files is a file obtained by splitting the collaborative office project file and encrypted by one of the data blocks.
In this embodiment, the member device may obtain a collaborative office project file from a distributed cluster system, where the collaborative office project file may be uploaded by other member devices in the distributed cluster system, that is: different users can share project files by operating different member devices.
In this embodiment, when the collaborative office project file is stored in the distributed cluster system, the collaborative office project file may be divided into a plurality of data blocks, and each data block includes at least one encrypted data file, so as to improve the security of the collaborative office project file.
S320, sequentially decrypting the encrypted data files in each data block based on the encrypted file sequence of the encrypted data files in each data block to obtain at least two plaintext data files; and each plaintext data file is obtained by decrypting one encrypted data file in the data blocks of the collaborative office project file.
In this embodiment, since a scenario of collaborative office generally includes more than one data file, when the collaborative office project file is uploaded to the distributed cluster system, the collaborative office project file may be packaged and sent by at least two plaintext data files. Based on this, when the member device executes S320, based on the encrypted file sequence of the encrypted data files in each data block, the member device may sequentially decrypt and splice each encrypted data file, so as to obtain at least two plaintext data files.
And S330, fusing and splicing the at least two plaintext data files to obtain at least one to-be-processed cooperative office file.
In this embodiment, for the obtained at least two plaintext data files, the member device may perform fusion splicing on the at least two plaintext data files based on a requirement of a project content, so as to obtain a to-be-processed cooperative office file of the project content, so that a user at the member device side may implement cooperative office based on the to-be-processed cooperative office file.
Therefore, based on the above scheme provided by the present invention, the encrypted data files in each data block of the collaborative office project file are sequentially decrypted according to the sequence of the encrypted files, so as to obtain at least two plaintext data files, and then the at least two plaintext data files are fused and spliced, so as to obtain at least one to-be-processed collaborative office file, so that the user at the member device side can implement collaborative office based on the to-be-processed collaborative office file; therefore, the safety of the circulation of the collaborative office project files among different member devices can be greatly improved.
In this embodiment, in order to avoid that different project files are opened by mistake or project files in different reading states are shared by the member device by mistake, when the member device executes S310 to obtain encrypted data files in each data block of the collaborative office project file, the member device may first obtain a file saving address of the collaborative office project file in a file sharing state; the collaborative office project file comprises at least one encrypted data file, the file storage address is a storage address corresponding to any one encrypted data file in the collaborative office project file, and the file sharing state is used for indicating that the corresponding project file can be shared and used. Then, the member equipment acquires a key storage address corresponding to the file storage address; the key saving address is used for saving a decoding key secret key obtaining file of the encrypted data file in the corresponding file saving address; and then, the member equipment performs matching storage on the file storage address and the corresponding key storage address, acquires a verification result of the key storage address, and acquires an encrypted data file in the collaborative office project file according to the verification result.
It can be seen that, based on the above scheme provided by the present invention, an encrypted data file of a collaborative office project file is obtained according to a verification result after obtaining a file saving address of the collaborative office project file in a file sharing state, obtaining a key saving address corresponding to the file saving address, matching and saving the file saving address and the corresponding key saving address, and obtaining the verification result of the key saving address. Therefore, the project file with higher protection level can be prevented from being opened by mistake, and the safety of the project file is improved.
In this embodiment, as an implementation manner, when the member device acquires a file saving address of a collaborative office project file in a file sharing state, the member device may first acquire file project information of the collaborative office project file, and run a file acquisition script in a shared file database according to the file project information to activate the collaborative office project file; then, when the collaborative office project file is in a file sharing state, the member equipment runs a file acquisition script aiming at the file saving address; and finally, the member equipment reads the file storage address by using the file acquisition script. In this way, the file saving address can be automatically read without separate configuration.
In addition, in this embodiment, when acquiring the key storage address corresponding to the file storage address, the member device may first acquire an address information identifier of the file storage address, and perform associated mapping between the address information identifier of the file storage address and an address information identifier of an encrypted data file in a key storage address information base to obtain an address mapping result; the key storage address information base is used for storing a key storage address corresponding to the encrypted data file of the collaborative office project file. Then, when the address mapping result is that the mapping is passed, the member device acquires a secret key saving address corresponding to the file saving address from the secret key saving address information base; otherwise, when the address mapping result is that the mapping is not passed, the member device analyzes the file saving address, generates key acquisition indication information of the file saving address, and compiles the key acquisition indication information to generate a key acquisition instruction; then, the member device writes the secret key obtaining instruction into an actuator, and the actuator operates the secret key obtaining instruction; next, the member device receives a key obtaining file fed back in response to the key obtaining instruction, decompresses the key obtaining file in response to the key obtaining instruction, and generates a key saving address.
In this embodiment, when obtaining the address information identifier of the file saving address and performing association mapping on the address information identifier of the file saving address and the address information identifier of the encrypted data file in the key saving address information base to obtain an address mapping result, the member device may first obtain the address information identifier of the file saving address and perform association mapping on the address information identifier of the file saving address and the address information identifier of the encrypted data file in the key saving address information base; when an address information identifier corresponding to the file saving address exists in the secret key saving address information base, determining that an address mapping result is mapping pass; otherwise, when the address information identifier corresponding to the file saving address does not exist in the key saving address information base, determining that the address mapping result is that the mapping is not passed.
In this embodiment, after the member device performs matching storage on the file storage address and the corresponding key storage address, and obtains the verification result of the key storage address, when obtaining the encrypted data file of the collaborative office project file according to the verification result, the member device may first analyze the key storage address, and obtain, in the cache pool corresponding to the key storage address, the key obtaining file corresponding to the file storage address stored in the key storage address; then, the member equipment acquires address verification information and clock verification information of a file key saving address, compares the address verification information and the clock verification information with standard verification information respectively, and generates a verification result; the standard verification information is address verification information and clock verification information when the collaborative office project file is in a standard state; and when the verification result indicates that the verification is passed, the member equipment analyzes the collaborative office project file and obtains an encrypted data file in the collaborative office project file.
On the other hand, as another embodiment of the present invention, when executing S310 to obtain the encrypted data file in each data block of the collaborative office project file, the member device may further receive a collaborative office operation request, and display a collaborative office operation interface in response to the collaborative office operation request; the cooperative office operation interface comprises a file downloading address and a file version parameter. Then, the member equipment downloads the collaborative file compression package from the cloud server through the file downloading address; next, the member device decompresses the collaborative file compression packet to generate a collaborative office project file; then, the member equipment acquires a project file configuration strategy between a preset file type and a data block division strategy according to the collaborative office project file; next, the member device generates a target data block division strategy corresponding to the file type according to the project file configuration strategy, and performs block division on the collaborative office project file according to the target data block division strategy to generate at least one data block corresponding to the collaborative office project file; and then, the member device extracts data of the at least one data block by using the file version parameter to obtain an encrypted data file in each data block of the collaborative office project file.
Therefore, the user can actively acquire and process the collaborative office project file by actively sending the collaborative office operation request to the member equipment, and the processing flexibility of the collaborative office project file is improved.
In this embodiment, as an implementation manner, when performing S320 to obtain at least two plaintext data files, the member device may first obtain a first encrypted file sequence between each encrypted data file in the first data chunk and the second data chunk; the first data block is a data block of a target plaintext data file corresponding to the first data block, the first encryption file sequence is generated based on a storage sequence number sequence, a storage address sequence and a random verification code sequence between two data blocks, and the first data block and the second data block are two adjacent data blocks in each data block. Then, the member device determines a sub-data block where an encrypted data file is located, in each encrypted data file of the second data block, where the corresponding first encrypted file sequence matches the first encrypted file sequence of the last encrypted data file in the first data block, as a target data block; and then, the member device decrypts the encrypted data file in the target data block and then splices the decrypted encrypted data file in the first data block to generate a plaintext data file. Thus, repeated splicing between data blocks can be avoided.
In addition, based on the above splicing manner, taking the at least two plaintext data files as an example, where the at least two plaintext data files include a first plaintext data file and a second plaintext data file, when the member device executes S330 to obtain at least one to-be-processed collaborative office file, the member device may first perform splicing sequence number prediction in a data chunk following the first data chunk based on a file sequence number of each sub-plaintext data file in the first plaintext data file to obtain an estimated splicing sequence number in which the first plaintext data file is connected to the second data chunk; then, the member device obtains the sequence of the estimated splicing sequence number of the first plaintext data file connected to the second data block and the storage sequence number between the file sequence number of the first sub-plaintext data file in the second plaintext data file, and the sequence is used as the sequence of the target storage sequence number between the first plaintext data file and the second plaintext data file; the first data block where the last sub-plaintext data file in the first plaintext data file is located before the second data block where the first sub-plaintext data file in the second plaintext data file is located in the generation time; next, the member device adjusts the initial storage address sequence by using a preset address adjustment strategy based on the storage address of the last sub-plaintext data file in the first plaintext data file and the initial storage address sequence between the storage addresses of the first sub-plaintext data file in the second plaintext data file, so as to obtain a target storage address sequence of the first plaintext data file and the second plaintext data file; then, the member device fuses and splices at least two sub-plaintext data files which are adjacent to each other in the generation time in the first plaintext data file and the second plaintext data file to obtain an initial fusion file of the first plaintext data file; then, the member device obtains the sequence of encrypted files between the initial fusion file of the first plaintext data file and the initial fusion file of the second plaintext data file to generate random codes, and the generated random codes are used as the sequence of target random verification codes of the first plaintext data file and the second plaintext data file; then, the member device obtains a target fusion sequence between the first plaintext data file and the second plaintext data file based on a target storage sequence number sequence, a target storage address sequence and a target random verification code sequence between the first plaintext data file and the second plaintext data file; and then, the member equipment sequentially fuses the at least two plaintext data files according to the target fusion sequence between the at least two plaintext data files to generate at least one to-be-processed cooperative office file after the at least two plaintext data files are fused.
In addition, based on the same inventive concept as the distributed cooperative office data processing method provided by the present invention, the present invention further provides a distributed cooperative office data processing system 500 as shown in fig. 3, where the distributed cooperative office data processing system 500 is applied to member devices in a distributed cluster system; the distributed cooperative office data processing system 500 includes an acquisition module 510, a decryption module 520, and a stitching module 530.
An obtaining module 510, configured to obtain an encrypted data file in each data block of the collaborative office project file; any one of the encrypted data files is a file obtained by splitting the collaborative office project file and encrypted by one of the data blocks;
a decryption module 520, configured to sequentially decrypt the encrypted data files in each data block based on the encrypted file sequence of the encrypted data files in each data block to obtain at least two plaintext data files; each plaintext data file is obtained by decrypting one encrypted data file in the data blocks of the collaborative office project file;
and the splicing module 530 is configured to fuse and splice the at least two plaintext data files to obtain at least one to-be-processed collaborative office file.
Optionally, as an implementation manner, when the decryption module 520 sequentially decrypts the encrypted data files in each data block based on the encrypted file sequence of the encrypted data files in each data block to obtain at least two plaintext data files, specifically configured to:
acquiring a first encryption file sequence between each encryption data file in the first data block and the second data block; the first data block is a data block of a target plaintext data file corresponding to the first data block, the first encryption file sequence is generated based on a storage sequence number sequence, a storage address sequence and a random verification code sequence between two data blocks, and the first data block and the second data block are two adjacent data blocks in each data block;
determining a sub-data block in which an encrypted data file corresponding to the first encrypted file sequence in each encrypted data file of the second data block is located and matched with a first encrypted file sequence of the last encrypted data file in the first data block as a target data block;
and after the encrypted data file in the target data block is decrypted, splicing the decrypted encrypted data file in the first data block to generate a plaintext data file.
Optionally, as an embodiment, the at least two plaintext data files include a first plaintext data file and a second plaintext data file;
the splicing module 530 is specifically configured to, when performing fusion splicing on the at least two plaintext data files to obtain at least one to-be-processed collaborative office file:
performing splicing sequence number prediction in a data block behind the first data block based on the file sequence number of each sub-plaintext data file in the first plaintext data file to obtain an estimated splicing sequence number of the first plaintext data file connected to the second data block;
acquiring an estimated splicing sequence number of the first plaintext data file connected to the second data block, and a storage sequence number sequence between a file sequence number of a first sub plaintext data file in the second plaintext data file, wherein the storage sequence number sequence is used as a target storage sequence number sequence between the first plaintext data file and the second plaintext data file; the first data block where the last sub-plaintext data file in the first plaintext data file is located before the second data block where the first sub-plaintext data file in the second plaintext data file is located in the generation time;
adjusting the initial storage address sequence by using a preset address adjustment strategy based on the storage address of the last sub-plaintext data file in the first plaintext data file and the initial storage address sequence between the storage addresses of the first sub-plaintext data file in the second plaintext data file to obtain a target storage address sequence of the first plaintext data file and the second plaintext data file;
fusing and splicing at least two sub-plaintext data files which are adjacent in generation time in the first plaintext data file and the second plaintext data file respectively to obtain an initial fusion file of the first plaintext data file;
acquiring an encrypted file sequence between the initial fusion file of the first plaintext data file and the initial fusion file of the second plaintext data file, and generating a random code, wherein the generated random code is used as a target random verification code sequence of the first plaintext data file and the second plaintext data file;
acquiring a target fusion sequence between the first plaintext data file and the second plaintext data file based on a target storage sequence number sequence, a target storage address sequence and a target random verification code sequence between the first plaintext data file and the second plaintext data file;
and aiming at the at least two plaintext data files, sequentially fusing according to a target fusion sequence between the at least two plaintext data files to generate at least one to-be-processed cooperative office file after the at least two plaintext data files are fused.
Optionally, as an implementation manner, when the obtaining module 510 obtains the encrypted data file in each data block of the collaborative office project file, it is specifically configured to:
acquiring a file storage address of a collaborative office project file in a file sharing state; the collaborative office project file comprises at least one encrypted data file, and the file storage address is a storage address corresponding to any encrypted data file in the collaborative office project file;
acquiring a key storage address corresponding to the file storage address; the key saving address is used for saving a decoding key secret key obtaining file of the encrypted data file in the corresponding file saving address;
and matching and storing the file storage address and the corresponding secret key storage address, and acquiring an authentication result of the secret key storage address, and then acquiring an encrypted data file in the collaborative office project file according to the authentication result.
Optionally, as an implementation manner, when acquiring the file saving address of the collaborative office project file in the file sharing state, the acquiring module 510 is specifically configured to:
acquiring file project information of a collaborative office project file, and running a file acquisition script in a shared file database according to the file project information to activate the collaborative office project file;
when the collaborative office project file is in a file sharing state, operating a file acquisition script aiming at the file saving address;
and reading the file storage address by using the file acquisition script.
Optionally, as an implementation manner, when acquiring the key saving address corresponding to the file saving address, the acquiring module 510 is specifically configured to:
acquiring an address information identifier of the file saving address, and performing associated mapping on the address information identifier of the file saving address and an address information identifier of an encrypted data file in a key saving address information base to obtain an address mapping result; the key saving address information base is used for storing a key saving address corresponding to an encrypted data file of the collaborative office project file;
when the address mapping result is that the mapping is passed, acquiring a secret key saving address corresponding to the file saving address from the secret key saving address information base;
when the address mapping result is that the mapping does not pass, analyzing the file storage address, generating key acquisition indication information of the file storage address, and compiling the key acquisition indication information to generate a key acquisition instruction;
writing the secret key obtaining instruction into an actuator, and operating the secret key obtaining instruction by the actuator;
and receiving a key acquisition file fed back in response to the key acquisition instruction, decompressing the key acquisition file in response to the key acquisition instruction, and generating a key storage address.
Optionally, as an implementation manner, when the obtaining module 510 obtains the address information identifier of the file saving address, and performs associated mapping on the address information identifier of the file saving address and the address information identifier of the encrypted data file in the key saving address information base to obtain an address mapping result, specifically configured to:
acquiring an address information identifier of the file saving address, and performing association mapping on the address information identifier of the file saving address and an address information identifier of an encrypted data file in a key saving address information base;
when the address information identifier corresponding to the file saving address exists in the secret key saving address information base, determining that the address mapping result is that the mapping is passed;
and when the address information identifier corresponding to the file saving address does not exist in the key saving address information base, determining that the address mapping result is that the mapping is not passed.
Optionally, as an implementation manner, after the file saving address and the corresponding key saving address are stored in a matching manner, and a verification result of the key saving address is obtained, and then the obtaining module 510 is specifically configured to, when obtaining the encrypted data file of the collaborative office project file according to the verification result, perform:
analyzing the key storage address, and acquiring a key acquisition file corresponding to the file storage address stored in the key storage address from a cache pool corresponding to the key storage address;
acquiring address verification information and clock verification information of a file key saving address, respectively comparing and verifying the address verification information and the clock verification information with standard verification information, and generating a verification result; the standard verification information is address verification information and clock verification information when the collaborative office project file is in a standard state;
and when the verification result indicates that the verification is passed, analyzing the collaborative office project file and obtaining an encrypted data file in the collaborative office project file.
Optionally, as an implementation manner, when the obtaining module 510 obtains the encrypted data file in each data block of the collaborative office project file, it is specifically configured to:
receiving a cooperative office operation request, and responding to the cooperative office operation request to display a cooperative office operation interface; the cooperative office operation interface comprises a file downloading address and a file version parameter;
downloading the collaborative file compression package from the cloud server through the file downloading address;
decompressing the collaborative file compression packet to generate a collaborative office project file;
acquiring a project file configuration strategy between a preset file type and a data block division strategy according to the collaborative office project file;
generating a target data block division strategy of the file type according to the project file configuration strategy, and performing block division on the collaborative office project file according to the target data block division strategy to generate at least one data block corresponding to the collaborative office project file;
and performing data extraction on the at least one data block by using the file version parameter to obtain an encrypted data file in each data block of the collaborative office project file.
In the embodiments provided in the present invention, it should be understood that the disclosed apparatus and method can be implemented in other ways. The apparatus embodiments described above are merely illustrative, and for example, the flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of apparatus, methods and computer program products according to some embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s).
It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved.
It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
In addition, the functional modules in some embodiments of the present invention may be integrated together to form an independent part, or each module may exist separately, or two or more modules may be integrated to form an independent part.
The functions, if implemented in the form of software functional modules and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to perform all or part of the steps of the method according to some embodiments of the present invention. And the aforementioned storage medium includes: u disk, removable hard disk, read only memory, random access memory, magnetic or optical disk, etc. for storing program codes.
The above description is only a partial example of the present invention, and is not intended to limit the present invention, and it is obvious to those skilled in the art that various modifications and variations can be made in the present invention. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned.

Claims (8)

1. A distributed cooperative office data processing method is characterized in that the method is applied to member equipment in a distributed cluster system; the method comprises the following steps:
acquiring encrypted data files in each data block of the collaborative office project file; any one of the encrypted data files is a file obtained by splitting the collaborative office project file and encrypted by one of the data blocks;
sequentially decrypting the encrypted data files in each data block based on the encrypted file sequence of the encrypted data files in each data block to obtain at least two plaintext data files; each plaintext data file is obtained by decrypting one encrypted data file in the data blocks of the collaborative office project file;
fusing and splicing the at least two plaintext data files to obtain at least one to-be-processed cooperative office file;
wherein the sequentially decrypting the encrypted data files in each data block based on the encrypted file sequence of the encrypted data files in each data block to obtain at least two plaintext data files comprises:
acquiring a first encryption file sequence between each encryption data file in the first data block and the second data block; the first data block is a data block of a target plaintext data file corresponding to the first data block, the first encryption file sequence is generated based on a storage sequence number sequence, a storage address sequence and a random verification code sequence between two data blocks, and the first data block and the second data block are two adjacent data blocks in each data block;
determining a sub-data block in which an encrypted data file corresponding to the first encrypted file sequence in each encrypted data file of the second data block is located and matched with a first encrypted file sequence of the last encrypted data file in the first data block as a target data block;
after the encrypted data file in the target data block is decrypted, the encrypted data file in the target data block is spliced with the decrypted encrypted data file in the first data block to generate a plaintext data file;
wherein the at least two plaintext data files comprise a first plaintext data file and a second plaintext data file;
the fusing and splicing of the at least two plaintext data files to obtain at least one to-be-processed collaborative office file comprises the following steps:
performing splicing sequence number prediction in a data block behind the first data block based on the file sequence number of each sub-plaintext data file in the first plaintext data file to obtain an estimated splicing sequence number of the first plaintext data file connected to the second data block;
acquiring an estimated splicing sequence number of the first plaintext data file connected to the second data block, and a storage sequence number sequence between a file sequence number of a first sub plaintext data file in the second plaintext data file, wherein the storage sequence number sequence is used as a target storage sequence number sequence between the first plaintext data file and the second plaintext data file; the first data block where the last sub-plaintext data file in the first plaintext data file is located before the second data block where the first sub-plaintext data file in the second plaintext data file is located in the generation time;
adjusting the initial storage address sequence by using a preset address adjustment strategy based on the storage address of the last sub-plaintext data file in the first plaintext data file and the initial storage address sequence between the storage addresses of the first sub-plaintext data file in the second plaintext data file to obtain a target storage address sequence of the first plaintext data file and the second plaintext data file;
fusing and splicing at least two sub-plaintext data files which are adjacent in generation time in the first plaintext data file and the second plaintext data file respectively to obtain an initial fusion file of the first plaintext data file;
acquiring an encrypted file sequence between the initial fusion file of the first plaintext data file and the initial fusion file of the second plaintext data file, and generating a random code, wherein the generated random code is used as a target random verification code sequence of the first plaintext data file and the second plaintext data file;
acquiring a target fusion sequence between the first plaintext data file and the second plaintext data file based on a target storage sequence number sequence, a target storage address sequence and a target random verification code sequence between the first plaintext data file and the second plaintext data file;
and aiming at the at least two plaintext data files, sequentially fusing according to a target fusion sequence between the at least two plaintext data files to generate at least one to-be-processed cooperative office file after the at least two plaintext data files are fused.
2. The method of claim 1, wherein the obtaining the encrypted data file in each data block of the collaborative office project file comprises:
acquiring a file storage address of a collaborative office project file in a file sharing state; the collaborative office project file comprises at least one encrypted data file, and the file storage address is a storage address corresponding to any encrypted data file in the collaborative office project file;
acquiring a key storage address corresponding to the file storage address; the key saving address is used for saving a decoding key acquisition file of the encrypted data file in the corresponding file saving address;
and matching and storing the file storage address and the corresponding secret key storage address, and acquiring an authentication result of the secret key storage address, and then acquiring an encrypted data file in the collaborative office project file according to the authentication result.
3. The method according to claim 2, wherein the obtaining the file saving address of the collaborative office project file in the file sharing state comprises:
acquiring file project information of a collaborative office project file, and running a file acquisition script in a shared file database according to the file project information to activate the collaborative office project file;
when the collaborative office project file is in a file sharing state, operating a file acquisition script aiming at the file saving address;
and reading the file storage address by using the file acquisition script.
4. The method according to claim 2, wherein the obtaining a key saving address corresponding to the file saving address comprises:
acquiring an address information identifier of the file saving address, and performing associated mapping on the address information identifier of the file saving address and an address information identifier of an encrypted data file in a key saving address information base to obtain an address mapping result; the key saving address information base is used for storing a key saving address corresponding to an encrypted data file of the collaborative office project file;
when the address mapping result is that the mapping is passed, acquiring a secret key saving address corresponding to the file saving address from the secret key saving address information base;
when the address mapping result is that the mapping does not pass, analyzing the file storage address, generating key acquisition indication information of the file storage address, and compiling the key acquisition indication information to generate a key acquisition instruction;
writing the secret key obtaining instruction into an actuator, and operating the secret key obtaining instruction by the actuator;
and receiving a key acquisition file fed back in response to the key acquisition instruction, decompressing the key acquisition file in response to the key acquisition instruction, and generating a key storage address.
5. The method according to claim 4, wherein the obtaining the address information identifier of the file saving address, and performing associated mapping on the address information identifier of the file saving address and the address information identifier of the encrypted data file in a key saving address information base to obtain an address mapping result comprises:
acquiring an address information identifier of the file saving address, and performing association mapping on the address information identifier of the file saving address and an address information identifier of an encrypted data file in a key saving address information base;
when the address information identifier corresponding to the file saving address exists in the secret key saving address information base, determining that the address mapping result is that the mapping is passed;
and when the address information identifier corresponding to the file saving address does not exist in the key saving address information base, determining that the address mapping result is that the mapping is not passed.
6. The method according to claim 2, wherein the matching and storing the file storage address and the corresponding key storage address, and obtaining the verification result of the key storage address, and then obtaining the encrypted data file of the collaborative office project file according to the verification result, comprises:
analyzing the key storage address, and acquiring a key acquisition file corresponding to the file storage address stored in the key storage address from a cache pool corresponding to the key storage address;
acquiring address verification information and clock verification information of a file key saving address, respectively comparing and verifying the address verification information and the clock verification information with standard verification information, and generating a verification result; the standard verification information is address verification information and clock verification information when the collaborative office project file is in a standard state;
and when the verification result indicates that the verification is passed, analyzing the collaborative office project file and obtaining an encrypted data file in the collaborative office project file.
7. The method of claim 1, wherein the obtaining the encrypted data file in each data block of the collaborative office project file comprises:
receiving a cooperative office operation request, and responding to the cooperative office operation request to display a cooperative office operation interface; the cooperative office operation interface comprises a file downloading address and a file version parameter;
downloading the collaborative file compression package from the cloud server through the file downloading address;
decompressing the collaborative file compression packet to generate a collaborative office project file;
acquiring a project file configuration strategy between a preset file type and a data block division strategy according to the collaborative office project file;
generating a target data block division strategy of the file type according to the project file configuration strategy, and performing block division on the collaborative office project file according to the target data block division strategy to generate at least one data block corresponding to the collaborative office project file;
and performing data extraction on the at least one data block by using the file version parameter to obtain an encrypted data file in each data block of the collaborative office project file.
8. A distributed cooperative office data processing system is characterized in that the system is applied to member equipment in a distributed cluster system; the system comprises:
the acquisition module is used for acquiring encrypted data files in each data block of the collaborative office project file; any one of the encrypted data files is a file obtained by splitting the collaborative office project file and encrypted by one of the data blocks;
the decryption module is used for sequentially decrypting the encrypted data files in each data block based on the encrypted file sequence of the encrypted data files in each data block to obtain at least two plaintext data files; each plaintext data file is obtained by decrypting one encrypted data file in the data blocks of the collaborative office project file;
the splicing module is used for performing fusion splicing on the at least two plaintext data files to obtain at least one to-be-processed cooperative office file;
the decryption module is specifically configured to, when sequentially decrypting the encrypted data files in each data block based on the encrypted file sequence of the encrypted data files in each data block to obtain at least two plaintext data files:
acquiring a first encryption file sequence between each encryption data file in the first data block and the second data block; the first data block is a data block of a target plaintext data file corresponding to the first data block, the first encryption file sequence is generated based on a storage sequence number sequence, a storage address sequence and a random verification code sequence between two data blocks, and the first data block and the second data block are two adjacent data blocks in each data block;
determining a sub-data block in which an encrypted data file corresponding to the first encrypted file sequence in each encrypted data file of the second data block is located and matched with a first encrypted file sequence of the last encrypted data file in the first data block as a target data block;
after the encrypted data file in the target data block is decrypted, the encrypted data file in the target data block is spliced with the decrypted encrypted data file in the first data block to generate a plaintext data file;
wherein the at least two plaintext data files comprise a first plaintext data file and a second plaintext data file;
the splicing module is specifically configured to, when performing fusion splicing on the at least two plaintext data files to obtain at least one to-be-processed collaborative office file:
performing splicing sequence number prediction in a data block behind the first data block based on the file sequence number of each sub-plaintext data file in the first plaintext data file to obtain an estimated splicing sequence number of the first plaintext data file connected to the second data block;
acquiring an estimated splicing sequence number of the first plaintext data file connected to the second data block, and a storage sequence number sequence between a file sequence number of a first sub plaintext data file in the second plaintext data file, wherein the storage sequence number sequence is used as a target storage sequence number sequence between the first plaintext data file and the second plaintext data file; the first data block where the last sub-plaintext data file in the first plaintext data file is located before the second data block where the first sub-plaintext data file in the second plaintext data file is located in the generation time;
adjusting the initial storage address sequence by using a preset address adjustment strategy based on the storage address of the last sub-plaintext data file in the first plaintext data file and the initial storage address sequence between the storage addresses of the first sub-plaintext data file in the second plaintext data file to obtain a target storage address sequence of the first plaintext data file and the second plaintext data file;
fusing and splicing at least two sub-plaintext data files which are adjacent in generation time in the first plaintext data file and the second plaintext data file respectively to obtain an initial fusion file of the first plaintext data file;
acquiring an encrypted file sequence between the initial fusion file of the first plaintext data file and the initial fusion file of the second plaintext data file, and generating a random code, wherein the generated random code is used as a target random verification code sequence of the first plaintext data file and the second plaintext data file;
acquiring a target fusion sequence between the first plaintext data file and the second plaintext data file based on a target storage sequence number sequence, a target storage address sequence and a target random verification code sequence between the first plaintext data file and the second plaintext data file;
and aiming at the at least two plaintext data files, sequentially fusing according to a target fusion sequence between the at least two plaintext data files to generate at least one to-be-processed cooperative office file after the at least two plaintext data files are fused.
CN202011596044.7A 2020-12-29 2020-12-29 Distributed cooperative office data processing method and system Active CN112734361B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011596044.7A CN112734361B (en) 2020-12-29 2020-12-29 Distributed cooperative office data processing method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011596044.7A CN112734361B (en) 2020-12-29 2020-12-29 Distributed cooperative office data processing method and system

Publications (2)

Publication Number Publication Date
CN112734361A CN112734361A (en) 2021-04-30
CN112734361B true CN112734361B (en) 2021-12-07

Family

ID=75611264

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011596044.7A Active CN112734361B (en) 2020-12-29 2020-12-29 Distributed cooperative office data processing method and system

Country Status (1)

Country Link
CN (1) CN112734361B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113742754A (en) * 2021-09-15 2021-12-03 广东电网有限责任公司 Fixed value file encryption method and related device
CN114218593B (en) * 2021-12-20 2024-01-09 南京宁铎科技有限公司 Information security detection method based on office equipment
CN116882945B (en) * 2023-09-05 2023-12-26 圣奥科技股份有限公司 Collaborative office method, equipment and medium based on office area station information

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100915615B1 (en) * 2008-09-10 2009-09-03 (주)셀런에스엔 Encryption and decryption module for hardisk having partitioning function with user card
US8266430B1 (en) * 2007-11-29 2012-09-11 Emc Corporation Selective shredding in a deduplication system
CN107204986A (en) * 2017-06-27 2017-09-26 四川捷云信通信息技术有限公司 High in the clouds storage encryption method, decryption method and high in the clouds storage encryption device
CN109145639A (en) * 2018-07-27 2019-01-04 北京北信源信息安全技术有限公司 File encrypting method, decryption method and device
CN111709038A (en) * 2020-05-07 2020-09-25 北京中科凡语科技有限公司 File encryption and decryption method, distributed storage system, equipment and storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8266430B1 (en) * 2007-11-29 2012-09-11 Emc Corporation Selective shredding in a deduplication system
KR100915615B1 (en) * 2008-09-10 2009-09-03 (주)셀런에스엔 Encryption and decryption module for hardisk having partitioning function with user card
CN107204986A (en) * 2017-06-27 2017-09-26 四川捷云信通信息技术有限公司 High in the clouds storage encryption method, decryption method and high in the clouds storage encryption device
CN109145639A (en) * 2018-07-27 2019-01-04 北京北信源信息安全技术有限公司 File encrypting method, decryption method and device
CN111709038A (en) * 2020-05-07 2020-09-25 北京中科凡语科技有限公司 File encryption and decryption method, distributed storage system, equipment and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
简易文件加密/解密***设计与实现;毕智超;《经营管理者》;20161215(第35期);全文 *

Also Published As

Publication number Publication date
CN112734361A (en) 2021-04-30

Similar Documents

Publication Publication Date Title
CN112734361B (en) Distributed cooperative office data processing method and system
CN110400221B (en) Data processing method, system, storage medium and computer equipment
CN111539813B (en) Method, device, equipment and system for backtracking processing of business behaviors
CN107948152B (en) Information storage method, information acquisition method, information storage device, information acquisition device and information acquisition equipment
CN112788036B (en) Identity verification method and device
US8875227B2 (en) Privacy aware authenticated map-reduce
CN107908632B (en) Website file processing method and device, website file processing platform and storage medium
CN106899563B (en) Authentication method and device, authentication code generation method and device and authentication system
CN109743161B (en) Information encryption method, electronic device and computer readable medium
CN112307504B (en) Secure multiparty computing method, device, electronic equipment and storage medium
CN108055585A (en) Data processing method, set top box upgrading method, terminal and set-top box
CN110990492B (en) Information processing method, device and equipment
CN112287376A (en) Method and device for processing private data
CN108418679B (en) Method and device for processing secret key under multiple data centers and electronic equipment
CN113129008B (en) Data processing method, device, computer readable medium and electronic equipment
CN110602132A (en) Data encryption and decryption processing method
CN112100689B (en) Trusted data processing method, device and equipment
CN108235067B (en) Authentication method and device for video stream address
CN109995534B (en) Method and device for carrying out security authentication on application program
CN116644485A (en) Anti-counterfeiting authentication method and device for server memory, electronic equipment and storage medium
CN112632588A (en) Text encryption method and device
CN112769565A (en) Method and device for upgrading cryptographic algorithm, computing equipment and medium
CN112148345A (en) Applet package transmitting method, apparatus, electronic device and computer readable medium
CN112559825B (en) Service processing method, device, computing equipment and medium
CN114866337B (en) Shared data auditing method and device, equipment, storage medium and program product thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant