CN113656355A - File processing method and device, nonvolatile storage medium and processor - Google Patents

File processing method and device, nonvolatile storage medium and processor Download PDF

Info

Publication number
CN113656355A
CN113656355A CN202110921549.4A CN202110921549A CN113656355A CN 113656355 A CN113656355 A CN 113656355A CN 202110921549 A CN202110921549 A CN 202110921549A CN 113656355 A CN113656355 A CN 113656355A
Authority
CN
China
Prior art keywords
file
clipboard
user
pictures
temporary
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110921549.4A
Other languages
Chinese (zh)
Inventor
龙科
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian Wanxiang Electronics Technology Co Ltd
Original Assignee
Xian Wanxiang Electronics Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian Wanxiang Electronics Technology Co Ltd filed Critical Xian Wanxiang Electronics Technology Co Ltd
Priority to CN202110921549.4A priority Critical patent/CN113656355A/en
Publication of CN113656355A publication Critical patent/CN113656355A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/16File or folder operations, e.g. details of user interfaces specifically adapted to file systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogram communication
    • G06F9/543User-generated data transfer, e.g. clipboards, dynamic data exchange [DDE], object linking and embedding [OLE]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Computer Hardware Design (AREA)
  • Storage Device Security (AREA)
  • Document Processing Apparatus (AREA)

Abstract

The application discloses a file processing method and device, a nonvolatile storage medium and a processor. Wherein, the method comprises the following steps: determining the access authority of a user to a file stored on a shared file platform; setting temporary authority for a user to process a file by using a shear plate according to the access authority, wherein the shear plate is a tool for the user to operate the file; and processing the file by utilizing the clipboard according to the temporary permission. The method and the device solve the technical problem that potential safety hazards exist in the existing shared file management.

Description

File processing method and device, nonvolatile storage medium and processor
Technical Field
The present application relates to the field of file management, and in particular, to a file processing method and apparatus, a non-volatile storage medium, and a processor.
Background
Fig. 1 is a schematic diagram of a cloud office system, and as shown in fig. 1, the cloud office system is based on a VGTP image transmission protocol and mainly includes a zero terminal (a built-in VGTP-R terminal, referred to as an R terminal for short) and a cloud server terminal (a built-in VGTP-S terminal, referred to as an S terminal for short). The R end is used for receiving an image from a cloud desktop, transmitting local mouse and keyboard information to the cloud end in a reverse direction, and injecting the information into a cloud desktop corresponding to the current R end by the cloud end, wherein the cloud desktop is generated by virtual machines/physical machines (VM/PM) distributed to a current zero terminal by a cloud server; the S end is an image acquisition and coding module running in the cloud virtual operating system and is responsible for performing the function of injecting data input by a user. The cloud server is generally based on an IAAS architecture, is a server with a strong virtual host, and can provide management functions of a plurality of virtual machines through hypervisor to provide a running hardware environment for the VM/PM.
In the cloud office scenario, generally, a user can log in to a corresponding VM/PM by inputting a user name and a password in a zero terminal, and then perform required office operations in a virtual machine.
In many units, in order to perform uniform and secure management on shared files, some public or confidential files are usually placed on a shared folder or a shared file server, and different types of users can access different files, for example, some files are shared in all units, all people can view the files, or some files are only disclosed in a department, and only members in the department can view the files.
At present, in the management of shared files, the limitation is set on whether the files can be accessed only according to different user identities, and for the files which can be accessed, the users can still save the information in a document copying mode except that the users cannot modify the files, so that the existing management of the shared files still has potential safety hazards.
In view of the above problems, no effective solution has been proposed.
Disclosure of Invention
The embodiment of the application provides a file processing method and device, a nonvolatile storage medium and a processor, so as to at least solve the technical problem of potential safety hazard in the existing shared file management.
According to an aspect of an embodiment of the present application, there is provided a file processing method, including: determining the access authority of a user to a file stored on a shared file platform; setting temporary authority for a user to process a file by using a shear plate according to the access authority, wherein the shear plate is a tool for the user to operate the file; and processing the file by utilizing the clipboard according to the temporary permission.
Optionally, the access rights include: the name of the file which the user has access to and the operation authority of the file which the user has access to; the operation authority comprises the following steps: the method comprises the steps of prohibiting copying pictures and characters in the file, permitting copying pictures and characters in the file, prohibiting copying pictures in the file and permitting copying characters in the file, permitting copying pictures in the file and prohibiting copying characters in the file.
Optionally, the setting of the temporary permission for the user to process the file by using the clipboard according to the access permission includes: if the access right is to prohibit copying of pictures and characters in the file, setting a temporary right to prohibit copying of pictures and characters in the file by using the clipboard in the process of processing the file by using the clipboard; if the access authority is to allow the pictures and the characters in the file to be copied, setting a temporary authority to allow the pictures and the characters in the file to be copied by using the clipboard in the process of processing the file by using the clipboard; if the access right is to prohibit copying of pictures in the file and to allow copying of characters in the file, the temporary right is set to allow only the use of the clipboard to copy characters in the file in the process of processing the file by using the clipboard; if the access right is to allow the picture in the file to be copied and to prohibit the text in the file from being copied, the temporary right is set to only allow the picture in the file to be copied by using the clipboard in the process of processing the file by using the clipboard.
Optionally, processing the file according to the temporary permission by using the clipboard includes: and managing the content of the file written into the clipboard according to the temporary permission.
Optionally, managing the content of the file written in the clipboard according to the temporary permission includes: if the temporary authority is to forbid the use of the clipboard to copy pictures and characters in the file, one of the following operations is executed: deleting pictures and characters of the file written in the clipboard or refusing to respond and executing pasting operation by using the clipboard; if the temporary authority is that the pictures and the characters in the file are allowed to be copied by using the clipboard, responding to the execution of pasting operation by using the clipboard; if the temporary permission is only to allow the text in the file to be copied by using the clipboard, one of the following operations is performed: deleting the pictures of the files written into the clipboard or pasting only the pictures of the written files when pasting operation is executed by using the clipboard; if the temporary permission is to allow only the picture in the file to be copied by using the clipboard, one of the following operations is performed: and deleting the characters of the file written into the clipboard or pasting only the written characters of the file when the pasting operation is executed by using the clipboard.
Optionally, before managing the content of the file written in the clipboard according to the temporary permission, the method further includes: judging whether the content of the file written into the clipboard is a binary stream or not; and if so, determining the content of the file written into the clipboard as a picture.
Optionally, determining the access authority of the user to the file stored on the shared file platform includes: acquiring an account number used by a user for logging in a shared file platform; and determining the access authority of the user to the file stored on the shared file platform according to the account.
According to another aspect of the embodiments of the present application, there is also provided a file processing apparatus, including: the determining module is used for determining the access authority of a user to the file stored on the shared file platform; the device comprises a setting module, a file processing module and a display module, wherein the setting module is used for setting temporary permission of a user for processing a file by using a clipboard according to access permission, and the clipboard is a tool for the user to operate the file; and the processing module is used for processing the file according to the temporary permission by utilizing the clipboard.
According to still another aspect of the embodiments of the present application, there is provided a non-volatile storage medium, where the non-volatile storage medium includes a stored program, and the device where the non-volatile storage medium is located is controlled to execute the above processing method of the file when the program runs.
According to still another aspect of the embodiments of the present application, there is also provided a processor configured to execute a program stored in a memory, where the program executes the above processing method for a file.
In the embodiment of the application, the access authority of a user to a file stored on a shared file platform is determined; setting temporary authority for a user to process a file by using a shear plate according to the access authority, wherein the shear plate is a tool for the user to operate the file; the mode that the clipboard is used for processing the file according to the temporary permission is utilized, a more detailed access strategy is set for the user, and the access strategy is implemented based on the control of the clipboard in the VM/PM, so that different users have different copying permissions for the shared file, the technical effect of ensuring the safety of the content of the shared file is achieved, and the technical problem that the existing shared file management has potential safety hazards is solved.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
FIG. 1 is a schematic diagram of a cloud office system;
FIG. 2 is a method of processing a document according to an embodiment of the present application;
fig. 3 is a schematic diagram of a cloud game server according to an embodiment of the present application;
fig. 4 is a block diagram of a file processing apparatus according to an embodiment of the present application.
Detailed Description
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only partial embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that the terms "first," "second," and the like in the description and claims of this application and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the application described herein are capable of operation in sequences other than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
According to an embodiment of the present application, there is provided an embodiment of a method for processing a file, it should be noted that the steps shown in the flowchart of the figure may be executed in a computer system such as a set of computer executable instructions, and that although a logical order is shown in the flowchart, in some cases, the steps shown or described may be executed in an order different from that here.
Fig. 2 is a document processing method according to an embodiment of the present application, and as shown in fig. 2, the method includes the following steps:
step S202, determining the access authority of a user to a file stored on a shared file platform;
according to an alternative embodiment of the present application, the step S202 of determining the access authority of the user to the file stored on the shared file platform includes the following steps: acquiring an account number used by a user for logging in a shared file platform; and determining the access authority of the user to the file stored on the shared file platform according to the account.
Fig. 3 is a schematic diagram of a cloud game server according to an embodiment of the present application, and as shown in fig. 3, the cloud game server includes a file sharing platform, and when a user logs in the file sharing platform through a VM/PM, the file sharing platform determines a file access right of the current user according to a user account. In actual implementation, an administrator sets file access authority of each user, and records are formed and stored in the file sharing platform.
Step S204, setting a temporary authority for a user to process the file by using a shear plate according to the access authority, wherein the shear plate is a tool for the user to operate the file;
and sending the determined file access authority to the current VM/PM, and setting the temporary authority of the current clipboard according to the file access authority after the VM/PM receives the file access authority. The temporary authority refers to a time limit in a period that a user accesses the file sharing platform, and file information safety on the file sharing platform is ensured by managing and controlling the user content copying authority in the time period.
And step S206, processing the file according to the temporary authority by using the clipboard.
When the user accesses the shared file, the current VM/PM controls the copied content according to the temporary authority of the clipboard.
Through the steps, more detailed access strategies are set for the users, and the access strategies are implemented based on the control of the clipboard in the VM/PM, so that different users have different copy rights for the shared files, and the technical effect of ensuring the safety of the content of the shared files is achieved.
According to an optional embodiment of the present application, the access right includes: the name of the file which the user has access to and the operation authority of the file which the user has access to; the operation authority comprises the following steps: the method comprises the steps of prohibiting copying pictures and characters in the file, permitting copying pictures and characters in the file, prohibiting copying pictures in the file and permitting copying characters in the file, permitting copying pictures in the file and prohibiting copying characters in the file.
The file access authority not only comprises files which can be accessed by the current user, but also comprises the operation authority of the files which can be accessed by the user, and the operation authority comprises: non-replicable and replicable; aiming at the situation of copying, different authorities are further set, including: text only, pictures only, and text and pictures. Thus, in general, a user may have four rights to files that the user may access: the graphics and text can not be copied, the graphics and text can be copied, only the picture can be copied, and only the text can be copied.
In this step, the file sharing platform may query the local user permission record to determine the file access permission of the user.
According to another alternative embodiment of the present application, the step S204 is executed to set a temporary permission for the user to process the file by using the clipboard according to the access permission, and is implemented by the following method: if the access right is to prohibit copying of pictures and characters in the file, setting a temporary right to prohibit copying of pictures and characters in the file by using the clipboard in the process of processing the file by using the clipboard; if the access authority is to allow the pictures and the characters in the file to be copied, setting a temporary authority to allow the pictures and the characters in the file to be copied by using the clipboard in the process of processing the file by using the clipboard; if the access right is to prohibit copying of pictures in the file and to allow copying of characters in the file, the temporary right is set to allow only the use of the clipboard to copy characters in the file in the process of processing the file by using the clipboard; if the access right is to allow the picture in the file to be copied and to prohibit the text in the file from being copied, the temporary right is set to only allow the picture in the file to be copied by using the clipboard in the process of processing the file by using the clipboard.
Specifically, if the access right of the current user is that the image and text cannot be copied, the temporary right of the clipboard is that the image and text copying is prohibited during the period of accessing the file sharing platform; if the access right of the current user is the reproducible graph and text, the temporary right of the shear plate is not limited; if the access authority of the current user is that only pictures can be copied, the temporary authority of the clipboard is that only pictures can be copied during the period of accessing the file sharing platform; if the access authority of the current user is only text copying, the temporary authority of the clipboard is only text copying during the period of accessing the file sharing platform.
It should be noted that, when the user logs out of the file sharing platform, the temporary permission of the clipboard is also cancelled.
In some optional embodiments of the present application, the step S206 is executed by processing the file according to the temporary permission by using the clipboard, and the method includes: and managing the content of the file written into the clipboard according to the temporary permission.
According to an optional embodiment of the application, if the access right of the user is the reproducible graphics context, the content of the clipboard when the user accesses the shared file is not controlled; if the access right of the user is that the image and text cannot be copied, the user is prohibited from pasting the image and text content; if the access right of the user is that the picture can only be copied, allowing the user to paste the picture and forbidding the user to paste the characters; and if the access right of the user is that only the characters can be copied, allowing the user to paste the characters, and forbidding the user to paste the pictures.
In other alternative embodiments of the present application, managing the content of the file written to the clipboard according to the temporary permission includes: if the temporary authority is to forbid the use of the clipboard to copy pictures and characters in the file, one of the following operations is executed: deleting pictures and characters of the file written in the clipboard or refusing to respond and executing pasting operation by using the clipboard; if the temporary authority is that the pictures and the characters in the file are allowed to be copied by using the clipboard, responding to the execution of pasting operation by using the clipboard; if the temporary permission is only to allow the text in the file to be copied by using the clipboard, one of the following operations is performed: deleting the pictures of the files written into the clipboard or pasting only the pictures of the written files when pasting operation is executed by using the clipboard; if the temporary permission is to allow only the picture in the file to be copied by using the clipboard, one of the following operations is performed: and deleting the characters of the file written into the clipboard or pasting only the written characters of the file when the pasting operation is executed by using the clipboard.
In this step, the content pasted by the clipboard by the user is managed and controlled by the following method:
when the user has copied content written to the clipboard, the type of content written (image and/or text) is detected.
If the access right of the user is that the image and text cannot be copied, deleting the written content of the current user in the clipboard (so that the subsequent pasting is unsuccessful); or, not in response to the user's paste operation. The difference between the two modes is that the first mode is that the content to be pasted is directly deleted in the cutting board, then the pasting operation of the user is normally executed, but the pasting is unsuccessful because the content in the cutting board is empty; the second way is that no processing is performed on the clipboard content, but when a subsequent user initiates a paste operation, no response is made to the operation, so that the paste is unsuccessful.
If the access right of the user is that only the picture can be copied, deleting the currently written text content in the clipboard, and reserving the picture content, so that only the picture content can be pasted in the subsequent pasting process; or, when the user initiates the paste operation, only the picture content is pasted without pasting the characters, and the mode does not need to delete the clipboard content.
If the access right of the user is that only the characters can be copied, deleting the currently written picture content in the cutting board, and keeping the character content, so that only the character content can be pasted during subsequent pasting; or, when the user initiates the paste operation, only the characters are pasted, and the pictures are not pasted, so that the content of the clipboard does not need to be deleted.
According to an optional embodiment of the present application, before managing the content of the file written into the clipboard according to the temporary permission, it is further required to determine whether the content of the file written into the clipboard is a binary stream; and if so, determining the content of the file written into the clipboard as a picture.
The function of the clipboard provides a class. This class allows types of input including, but not limited to: plain text, binary stream (picture), html/rich text format, file index. Therefore, when the content is written in the clipboard, it can be judged whether the content is a binary stream, and if the content is a binary stream, it is determined that the written content is a picture.
Fig. 4 is a block diagram of a document processing apparatus according to an embodiment of the present application, and as shown in fig. 4, the apparatus includes:
a determining module 40, configured to determine an access right of a user to a file stored on a shared file platform;
referring to fig. 3, when a user logs in the file sharing platform through the VM/PM, the file sharing platform determines the file access authority of the current user according to the user account. In actual implementation, an administrator sets file access authority of each user, and records are formed and stored in the file sharing platform.
The setting module 42 is configured to set a temporary permission for the user to process the file by using the clipboard according to the access permission, where the clipboard is a tool for the user to operate the file;
and sending the determined file access authority to the current VM/PM, and setting the temporary authority of the current clipboard according to the file access authority after the VM/PM receives the file access authority. The temporary authority refers to a time limit in a period that a user accesses the file sharing platform, and file information safety on the file sharing platform is ensured by managing and controlling the user content copying authority in the time period.
And the processing module 44 is used for processing the file according to the temporary permission by using the clipboard.
When the user accesses the shared file, the current VM/PM controls the copied content according to the temporary authority of the clipboard.
Through the device, more detailed access strategies are set for users, and the access strategies are implemented based on the control of the clipboard in the VM/PM, so that different users have different copy rights for the shared files, and the technical effect of ensuring the safety of the content of the shared files is achieved.
It should be noted that, reference may be made to the description related to the embodiment shown in fig. 2 for a preferred implementation of the embodiment shown in fig. 4, and details are not described here again.
The embodiment of the application also provides a nonvolatile storage medium, wherein the nonvolatile storage medium comprises a stored program, and the device where the nonvolatile storage medium is located is controlled to execute the processing method of the file when the program runs.
The nonvolatile storage medium stores a program for executing the following functions: determining the access authority of a user to a file stored on a shared file platform; setting temporary authority for a user to process a file by using a shear plate according to the access authority, wherein the shear plate is a tool for the user to operate the file; and processing the file by utilizing the clipboard according to the temporary permission.
The embodiment of the application also provides a processor, wherein the processor is used for running the program stored in the memory, and the program is used for executing the processing method of the file when running.
The processor is used for running a program for executing the following functions: determining the access authority of a user to a file stored on a shared file platform; setting temporary authority for a user to process a file by using a shear plate according to the access authority, wherein the shear plate is a tool for the user to operate the file; and processing the file by utilizing the clipboard according to the temporary permission.
The above-mentioned serial numbers of the embodiments of the present application are merely for description and do not represent the merits of the embodiments.
In the above embodiments of the present application, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the embodiments provided in the present application, it should be understood that the disclosed technology can be implemented in other ways. The above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units may be a logical division, and in actual implementation, there may be another division, for example, multiple units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, units or modules, and may be in an electrical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be embodied in the form of a software product, which is stored in a storage medium and includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and other various media capable of storing program codes.
The foregoing is only a preferred embodiment of the present application and it should be noted that those skilled in the art can make several improvements and modifications without departing from the principle of the present application, and these improvements and modifications should also be considered as the protection scope of the present application.

Claims (10)

1. A method for processing a file, comprising:
determining the access authority of a user to a file stored on a shared file platform;
setting temporary authority for the user to process the file by using a clipboard according to the access authority, wherein the clipboard is a tool for the user to operate the file;
and processing the file by utilizing the clipboard according to the temporary permission.
2. The method of claim 1,
the access rights include: the name of the file which the user has access to and the operation authority of the file which the user has access to;
the operation authority comprises: prohibiting copying of pictures and text in the file, permitting copying of pictures and text in the file, prohibiting copying of pictures in the file and permitting copying of text in the file, permitting copying of pictures in the file, and prohibiting copying of text in the file.
3. The method of claim 2, wherein setting the temporary permission for the user to process the file by using a clipboard according to the access permission comprises:
if the access authority is that the pictures and the characters in the file are prohibited from being copied, setting the temporary authority as that the pictures and the characters in the file are prohibited from being copied by using the clipboard in the process of processing the file by using the clipboard;
if the access authority is that the pictures and the characters in the file are allowed to be copied, setting the temporary authority as that the pictures and the characters in the file are allowed to be copied by using the clipboard in the process of processing the file by using the clipboard;
if the access right is that the pictures in the file are prohibited to be copied and the characters in the file are allowed to be copied, setting the temporary right as that only the characters in the file are allowed to be copied by using the clipboard in the process of processing the file by using the clipboard;
if the access right is that the picture in the file is allowed to be copied and the text in the file is prohibited to be copied, the temporary right is set to be that the picture in the file is only allowed to be copied by using the clipboard in the process of processing the file by using the clipboard.
4. The method of claim 3, wherein processing the document in accordance with the temporary permission using the clipboard comprises:
and managing the content of the file written into the clipboard according to the temporary permission.
5. The method of claim 4, wherein managing the content of the file written to the clipboard in accordance with the temporary permission comprises:
if the temporary authority is to forbid the use of the clipboard to copy pictures and characters in the file, executing one of the following operations: deleting the pictures and characters of the file written in the clipboard or refusing to respond to the pictures and characters by using the clipboard to execute pasting operation;
if the temporary permission is that the pictures and the characters in the file are allowed to be copied by using the clipboard, responding to the execution of pasting operation by using the clipboard;
if the temporary authority is only to allow the text in the file to be copied by using the clipboard, one of the following operations is executed: deleting the pictures of the files written into the clipboard or pasting only the written pictures of the files when pasting operation is executed by using the clipboard;
if the temporary permission is to allow only the picture in the file to be copied by using the clipboard, one of the following operations is performed: deleting the characters of the file written into the clipboard or pasting only the written characters of the file when pasting operation is executed by using the clipboard.
6. The method of claim 4, wherein prior to managing the content of the file written to the clipboard in accordance with the temporary permission, the method further comprises:
judging whether the content of the file written into the clipboard is a binary stream or not;
and if so, determining the content of the file written into the clipboard as the picture.
7. The method of claim 1, wherein determining user access rights to files stored on the shared file platform comprises:
acquiring an account number used by the user for logging in the shared file platform;
and determining the access authority of the user to the file stored on the shared file platform according to the account.
8. A device for processing a document, comprising:
the determining module is used for determining the access authority of a user to the file stored on the shared file platform;
the setting module is used for setting temporary permission when the user processes the file by utilizing a clipboard according to the access permission, wherein the clipboard is a tool for the user to operate the file;
and the processing module is used for processing the file by utilizing the clipboard according to the temporary permission.
9. A non-volatile storage medium, characterized in that the non-volatile storage medium comprises a stored program, wherein when the program runs, a device where the non-volatile storage medium is located is controlled to execute the processing method of the file according to any one of claims 1 to 7.
10. A processor for executing a program stored in a memory, wherein,
the program executes a method of processing a file according to any one of claims 1 to 7.
CN202110921549.4A 2021-08-11 2021-08-11 File processing method and device, nonvolatile storage medium and processor Pending CN113656355A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110921549.4A CN113656355A (en) 2021-08-11 2021-08-11 File processing method and device, nonvolatile storage medium and processor

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110921549.4A CN113656355A (en) 2021-08-11 2021-08-11 File processing method and device, nonvolatile storage medium and processor

Publications (1)

Publication Number Publication Date
CN113656355A true CN113656355A (en) 2021-11-16

Family

ID=78480197

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110921549.4A Pending CN113656355A (en) 2021-08-11 2021-08-11 File processing method and device, nonvolatile storage medium and processor

Country Status (1)

Country Link
CN (1) CN113656355A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115309569A (en) * 2022-10-10 2022-11-08 北京蔚领时代科技有限公司 Arm cloud game data intercommunication method and system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115309569A (en) * 2022-10-10 2022-11-08 北京蔚领时代科技有限公司 Arm cloud game data intercommunication method and system
CN115309569B (en) * 2022-10-10 2023-02-07 北京蔚领时代科技有限公司 Arm cloud game data intercommunication method and system

Similar Documents

Publication Publication Date Title
US10404708B2 (en) System for secure file access
JP4578119B2 (en) Information processing apparatus and security ensuring method in information processing apparatus
US8136117B2 (en) Information processor and information processing system
US20070011469A1 (en) Secure local storage of files
US20070011749A1 (en) Secure clipboard function
US10650158B2 (en) System and method for secure file access of derivative works
JP7146812B2 (en) Auxiliary storage device with independent restoration area and equipment to which this is applied
CN113254892B (en) Access processing method, device, storage medium and electronic equipment
US11778539B2 (en) Role-based access control system
US20180026986A1 (en) Data loss prevention system and data loss prevention method
CN104704506A (en) System control
CN115098038A (en) Method, device and medium for binding mounted directory
CN113553618A (en) File security protection method and device
CN113656355A (en) File processing method and device, nonvolatile storage medium and processor
AU2018341708B2 (en) Policy based persistence
JP4342242B2 (en) Secure file sharing method and apparatus
CN112347439A (en) Method and system for visitor login access
CN112202711A (en) Network access control method and device of terminal, electronic equipment and storage medium
CN115292740A (en) Method and device for managing clipboard and nonvolatile storage medium
CN113986858B (en) Linux compatible android system shared file operation method and device
CN111309698A (en) Disk redirection method, device and system
CN115118515A (en) AD domain control method, device and medium based on distributed system
CN114861160A (en) Method, device, equipment and storage medium for improving non-administrator account authority
CN113946798A (en) Method and system for sharing files among multiple operating system terminals
CN113656817A (en) Data encryption method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination