CN110262908A - A kind of processing method and processing device of shear plate data - Google Patents

A kind of processing method and processing device of shear plate data Download PDF

Info

Publication number
CN110262908A
CN110262908A CN201910540099.7A CN201910540099A CN110262908A CN 110262908 A CN110262908 A CN 110262908A CN 201910540099 A CN201910540099 A CN 201910540099A CN 110262908 A CN110262908 A CN 110262908A
Authority
CN
China
Prior art keywords
data
shear plate
plate data
encryption
vocabulary
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910540099.7A
Other languages
Chinese (zh)
Inventor
文为为
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gree Electric Appliances Inc of Zhuhai
Original Assignee
Gree Electric Appliances Inc of Zhuhai
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gree Electric Appliances Inc of Zhuhai filed Critical Gree Electric Appliances Inc of Zhuhai
Priority to CN201910540099.7A priority Critical patent/CN110262908A/en
Publication of CN110262908A publication Critical patent/CN110262908A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogram communication
    • G06F9/543User-generated data transfer, e.g. clipboards, dynamic data exchange [DDE], object linking and embedding [OLE]

Abstract

The application provides a kind of processing method and processing device of shear plate data, for improving the safety of shear plate data.This method comprises: obtaining shear plate data when detecting to data progress shearing manipulation or duplication operation;Whether judge in the shear plate data comprising at least one vocabulary in preset lexical set;If the shear plate data are encrypted comprising at least one vocabulary in the preset lexical set in the shear plate data;Data after encryption are sent to shear plate.

Description

A kind of processing method and processing device of shear plate data
Technical field
This application involves computing technique field more particularly to a kind of processing method and processing devices of shear plate data.
Background technique
When user replicates data or when shearing manipulation, which can be buffered on shear plate, and user answers System or this partial data of shearing manipulation are referred to as shear plate data.Shear plate in terminal device be usually it is general, that is, appoint Meaning application can be monitored arbitrarily and replicate shear plate data, but so, shear plate data may will be leaked, Jin Erzao It is lost at user.
Summary of the invention
The embodiment of the present application provides a kind of processing method and processing device of shear plate data, for adding to shear plate data It is close, improve the safety of shear plate data.
In a first aspect, providing a kind of method for encrypting shear plate data, comprising:
When detecting to data progress shearing manipulation or duplication operation, shear plate data are obtained;
Whether judge in the shear plate data comprising at least one vocabulary in preset lexical set;
If comprising at least one vocabulary in the preset lexical set in the shear plate data, to the shearing Plate data are encrypted;
Data after encryption are sent to shear plate.
In the embodiment of the present application, before shear plate data are sent to shear plate data, can to shear plate data into Row encryption ensure that the safety of shear plate data.And before encrypting to shear plate data, it can first determine that this is cut Whether cutting plate data include vocabulary in preset lexical set, if the shear plate data include vocabulary, just to the shear plate Data are encrypted, and relative to the mode all encrypted to all shear plate data, can reduce the data volume of encryption, And then reduce the computing cost of encryption shear plate data.And due in the embodiment of the present application, for not including preset word finder The data of vocabulary can be improved user and paste acquisition not comprising the vocabulary in preset lexical set without being encrypted in conjunction Data efficiency promotes the experience that user uses shear plate.
In a kind of possible embodiment, if in the shear plate data comprising in the preset lexical set at least One vocabulary, then be encrypted the data, comprising:
If including at least one vocabulary in the preset lexical set in the shear plate data, it is determined that described to cut The security level of cutting plate data;
According to the security level of the shear plate data, the Encryption Algorithm for encrypting the shear plate data is determined;
According to described for encrypting the Encryption Algorithm of the shear plate data, the shear plate data are carried out at encryption Reason.
In the embodiment of the present application, after determining in shear plate data comprising the vocabulary in preset lexical set, really The security level for the shear plate data for needing to encrypt calmly determines the shear plate data according to the security level of shear plate data Encryption Algorithm, that is to say, that Encryption Algorithm used by the data of different security levels may be not fully identical, so not only Corresponding data can be encrypted, guarantee the safety of corresponding data, since the low Encryption Algorithm of encryption intensity is general Computing cost is relatively small, therefore carries out classification encryption to data, moreover it is possible to reduce the computing cost of processing unit as far as possible.
In a kind of possible embodiment, the security level of the data is determined, comprising:
Determine the security level of the shear plate data, comprising:
Determine the security level of each vocabulary at least one described vocabulary, at least one described vocabulary belonging to safety Highest-ranking security level is the security level of the shear plate data;Or,
According to the corresponding application of the shear plate data and corresponding relationship, the corresponding peace of the shear plate data is determined Full rank;Wherein, the corresponding application of the shear plate data refers to from the shear plate data source in the application, described right The corresponding relationship that should be related between different application and different security levels.
In the embodiment of the present application, the safety levels of two kinds of determining shear plate data is provided otherwise, one is with shearing The corresponding highest security level of corresponding vocabulary in plate data meets sensitive letter for the corresponding security level of shear plate data The security requirements of breath;One is according to shear plate data source using corresponding security level, as the shear plate data Security level, meet the demand for security of the data of separate sources.Flexible choice, raising processing can be carried out according to actual needs The flexibility of device encryption shear plate data.
In a kind of possible embodiment,
If comprising at least one vocabulary in the preset lexical set in the shear plate data, to the shearing Plate data are encrypted, comprising:
The shear plate data are encrypted according to the first Encryption Algorithm, obtain ciphertext character string;
Processing is packaged to the ciphertext character string and the shear plate data, the data after obtaining encryption.
In the embodiment of the present application, shear plate data are encrypted, and using encrypted ciphertext character string as data Head is packaged together with shear plate data, verifies whether shear plate data are tampered according to data head convenient for the later period.
In a kind of possible embodiment, after the data after encryption are sent to shear plate, comprising:
When detecting the operation for obtaining the shear plate data from shear plate, the encryption is obtained from the shear plate Data that treated;
According to first Encryption Algorithm, the ciphertext character string in the data after the encryption is decrypted Processing, the data after obtaining decryption processing;
If the data after the decryption processing match with the data in the data after the encryption, according to Data after the decryption processing are sent to the shear plate or phase by the operation that the shear plate data are obtained from shear plate It should apply;
If the data in the data after data and the encryption after decryption processing mismatch, the user is prompted The shear plate data have been tampered.
In the embodiment of the present application, whether usurped using the data that the data head after decryption processing is verified after encryption Change, it is the data being not tampered with that guarantee, which is supplied to the data of user, improves the safety of the data of user, avoids illegal point Son distort after the data implantation respective application such as virus the case where.
In a kind of possible embodiment, processing is packaged to the ciphertext character string and the shear plate data, is obtained Data after obtaining encryption, comprising:
The shear plate data are pre-encrypted according to the second Encryption Algorithm, the data after obtaining pre-encrypt;
Obscure processing to the data after the pre-encrypt, data that acquisition obscures that treated;
The ciphertext character string is made and it is described obscure that treated data be packaged processing, after acquisition encryption Data.In the embodiment of the present application, other than increasing and can be used for verifying the data head of shear plate data, also to shear plate number Processing is obscured according to encryption is carried out, and is increased the difficulty that criminal cracks data, is further increased the encryption of encryption shear plate data Intensity.
Second aspect provides a kind of processing unit of shear plate data, comprising:
Module is obtained, for obtaining shear plate data when detecting to data progress shearing manipulation or duplication operation;
Judgment module, for whether judging in the shear plate data comprising at least one word in preset lexical set It converges;
Encrypting module, if in the shear plate data including at least one vocabulary in the preset lexical set, The shear plate data are encrypted;
Sending module, for the data after encryption to be sent to shear plate.
In a kind of possible embodiment, the encrypting module is specifically used for:
If including at least one vocabulary in the preset lexical set in the shear plate data, it is determined that described to cut The security level of cutting plate data;
According to the security level of the shear plate data, the Encryption Algorithm for encrypting the shear plate data is determined;
According to described for encrypting the Encryption Algorithm of the shear plate data, the shear plate data are carried out at encryption Reason.
In a kind of possible embodiment, the encrypting module is specifically used for:
Determine the security level of each vocabulary at least one described vocabulary, at least one described vocabulary belonging to safety Highest-ranking security level is the security level of the shear plate data;Or,
According to the corresponding application of the shear plate data and corresponding relationship, the corresponding peace of the shear plate data is determined Full rank;Wherein, the corresponding application of the shear plate data refers to from the shear plate data source in the application, described right The corresponding relationship that should be related between different application and different security levels.
In a kind of possible embodiment, the encrypting module is specifically used for:
The shear plate data are encrypted according to the first Encryption Algorithm, obtain ciphertext character string;
Processing is packaged to the ciphertext character string and the shear plate data, the data after obtaining encryption.
In a kind of possible embodiment, the processing unit further includes deciphering module and cue module, in which:
The acquisition module, is also used to after the data after encryption are sent to shear plate, is detecting from cutting When obtaining the operation of the shear plate data in cutting plate, the data after the encryption are obtained from the shear plate;
The deciphering module, according to first Encryption Algorithm, to the ciphertext in the data after the encryption Character string is decrypted, the data after obtaining decryption processing;
The sending module, if the data being also used to after the decryption processing and the number in the data after the encryption According to matching, then according to the operation for obtaining the shear plate data from shear plate, by the data after the decryption processing It is sent to the shear plate or respective application;
The cue module, if not for the data in the data after the data and the encryption after decryption processing Match, then shear plate data described in the user is prompted to be tampered.
In a kind of possible embodiment, the encrypting module is specifically used for:
The shear plate data are pre-encrypted according to the second Encryption Algorithm, the data after obtaining pre-encrypt;
Obscure processing to the data after the pre-encrypt, data that acquisition obscures that treated;
The ciphertext character string is made and it is described obscure that treated data be packaged processing, after acquisition encryption Data.
The third aspect provides a kind of processing unit of shear plate data, comprising:
At least one processor, and
The memory being connect at least one described processor communication;
Wherein, the memory is stored with the instruction that can be executed by least one described processor, described at least one It manages device and is realized as described in any one of first aspect and a kind of possible embodiment by executing the instruction of the memory storage Method.
Fourth aspect, provides a kind of computer readable storage medium, and the computer-readable recording medium storage has calculating Machine instruction, when the computer instruction is run on computers, so that computer is executed as first aspect and one kind are possible Method described in any one of embodiment.
Detailed description of the invention
Fig. 1 is a kind of application scenario diagram of the processing method of shear plate data provided by the embodiments of the present application;
Fig. 2 is a kind of flow chart of the processing method of shear plate data provided by the embodiments of the present application;
Fig. 3 is a kind of process schematic one for encrypting shear plate data mode provided by the embodiments of the present application;
Fig. 4 is a kind of process schematic two for encrypting shear plate data mode provided by the embodiments of the present application;
Fig. 5 is a kind of process schematic for decrypting shear plate data mode provided by the embodiments of the present application;
Fig. 6 is a kind of structure chart one of the processing unit of shear plate data provided by the embodiments of the present application;
Fig. 7 is a kind of structure chart two of the processing unit of shear plate data provided by the embodiments of the present application.
Specific embodiment
In order to better understand technical solution provided by the embodiments of the present application, below in conjunction with Figure of description and specifically Embodiment be described in detail.
Below to this application involves the prior art be illustrated.
After user carries out shearing manipulation or duplication operation, any application in terminal device can access shear plate number According to then criminal may monitor shear plate data.For example, since ideal money wallet address and private key are generally longer, User is usually to be copied to the ideal money wallet address and private key in corresponding application using shearing or duplication.If illegal Molecule monitors shear plate, obtain the ideal money wallet address and private key so that can use the user virtual wallet address and Private key obtains the property in the virtual wallet of user.
In consideration of it, the embodiment of the present application provides a kind of processing method of shear plate data, this method is held by processing unit Row, which can be realized by the software module in terminal device, be operated in the software module such as terminal device The plug-in unit etc. of the included service (service) of system or insertion in an operating system, the included service of operating system for example can be with By operating system service in shear plate service (Clip boardService) Lai Shixian.Wherein, terminal device such as mobile phone Or personal computer etc..
First the application scenarios of this method are illustrated below.
Fig. 1 is please referred to, includes the first application 11, processing unit 12, shear plate 13 and second in the application scenarios using 14. First application 11 and the second application 14 refer to user installation in terminal device or the included application of terminal device, and first applies 11 It can be identical application with the second application 14, be also possible to different applications.
Specifically, after user carries out duplication operation either shearing manipulation to the data in the first application 11, the data Shear plate data are treated as, the response duplication of processing unit 12 operation either shearing manipulation judges whether the shear plate data wrap Containing the vocabulary in preset lexical set, if comprising, then the shear plate data are encrypted, and will be after encryption Data be sent to shear plate 13.
User is carrying out duplication operation either after shearing manipulation to the data in the first application 11, user may want by The data affix in the second application 14, when detecting that user carries out obtaining the operation of data from shear plate 13, processing dress 12 are set in response to the operation, the data after encryption are decrypted, and the data after decryption are sent to second and are answered With 14.
In Fig. 1 on the basis of application scenarios, below with reference to Fig. 2, the processing unit 12 in the embodiment of the present application is related to Judge whether data include vocabulary process in preset lexical set, shear plate data encryption treatment process and data deciphering Treatment process etc. describes in detail.
User wants to reduce input service amount, or wants the data in an application copying to another application In, user can execute duplication operation or shearing manipulation to data.Processing unit 12 executes step 201, i.e., in detection user When executing duplication operation or shearing manipulation to data, shear plate data are obtained.
Wherein, it after there are many kinds of the modes for replicating operation, such as user can choose data, is answered using shortcut key System operation also can use mouse and click copy command, and duplication operation etc. can also be triggered by voice-input device.Shearing behaviour The mode of work is referred to the mode of duplication operation, and details are not described herein again.The content-form of data such as text, picture, video Or voice etc..
Specifically, processing unit 12 is provided with the application in access terminal device and the permission of shear plate 13 in advance.Place For reason device 12 when detecting that user executes duplication or shearing manipulation to data, processing unit 12 is operated in response to duplication or shearing Operation currently executes in duplication operation or the corresponding application of shearing manipulation from user and obtains the shear plate data.The shear plate number It can also include data format according to the data content chosen including user.Other than obtaining shear plate data, it can also obtain Which the corresponding application of shear plate data, that is, shear plate data source are applied in.For example, processing unit 12 from first Using obtaining the shear plate data in 11, then the corresponding application of shear plate data is first to apply 11.
As one embodiment, shear plate data are analyzed for the ease of 12 later period of processing unit, processing unit 12 The contextual information of the shear plate data can be obtained while obtaining the shear plate data.Contextual information refers to shearing Data in plate data preset range, such as shear plate data are passage, before contextual information is then the shear plate data A part of content behind the content of face a part and the shear plate data.
Processing unit 12 executes step 202, that is, judges whether wrap in shear plate data after obtaining the shear plate data Containing at least one vocabulary in preset lexical set.
Specifically, prestoring lexical set in processing unit 12 or lexical set is stored in other positions of terminal device It sets, processing unit 12 has permission to access the position, obtains the lexical set.
Wherein, lexical set includes the vocabulary for characterizing important personal information, and personal information includes proprietary information, identity Information etc..Lexical set can also include the corresponding security level of each vocabulary, and it is corresponding that security level can be understood as the vocabulary Data for user significance level., may be bigger to the loss of user's bring such as after the leakage of some vocabulary, then should The security level of vocabulary may be higher.
Such as lexical set is as shown in table 1.
Table 1
After processing unit 12 obtains the shear plate data, processing unit 12 by the shear plate data and lexical set into Row matching.Content as previously discussed, the content-form of shear plate data may be diversified, different content-form, Processing unit 12 by shear plate data and lexical set carry out matched mode may also different from, in different Appearance form carries out matched mode with lexical set to shear plate data and is illustrated.
A kind of matching way are as follows:
Processing unit 12 obtains the corresponding keyword of shear plate data, utilizes by analyzing shear plate data The keyword is matched with the vocabulary in lexical set.
A1, if the content-form of shear plate data is text, processing unit 12 splits text, obtains the shearing The vocabulary that plate data include, these vocabulary are the keyword of the shear plate data.
A2, if the content-form of shear plate data is picture, processing unit 12 carries out optical character to shear plate data It identifies (Optical Character Recognition, OCR), identifies text in the picture, the text identified then can be with For the corresponding keyword of shear plate data.Or image classification processing is carried out to image, and the key element in image is obtained, it should Key element is the corresponding keyword of shear plate data, such as character, face in image etc..
A3, if the content-form of shear plate data is video, processing unit 12 can be believed according to the context of the video Cease the keyword for determining the video.
A4, if the content-form of shear plate data is voice, which can be utilized speech recognition by processing unit 12 Technology is converted to sentence, carries out deconsolidation process to the sentence, obtains the corresponding vocabulary of shear plate data, these vocabulary are then this The corresponding keyword of shear plate data.
After the keyword for obtaining shear plate data, processing unit 12 can use matching way by keyword and vocabulary Set is matched, and there are many matching ways, is illustrated below.
A kind of matching way are as follows:
Exist and the keyword and identical vocabulary specifically, processing unit 12 can determine in lexical set, it is determined that Comprising the vocabulary in preset lexical set in the shear plate data, and it is capable of determining that include in the shear plate data pre- If lexical set in vocabulary number.If the keyword of the shear plate data not with word identical in lexical set It converges, it is determined that do not include the vocabulary in preset remittance lexical set in the shear plate data.
In the embodiment of the present application, directly adopt accurate matched mode and matched, if include in shear plate data with Identical vocabulary in lexical set, it is determined that the shear plate data include vocabulary, and such matching way is simply direct, processing dress Whether set 12 quickly can directly judge in shear plate data comprising vocabulary.
A kind of matching way are as follows:
Processing unit 12 can be matched keyword with lexical set using fuzzy match mode:
Specifically, processing unit 12 can also determine the corresponding term vector of keyword in shear plate data, if crucial The similarity of the term vector of vocabulary in the term vector of word and preset lexical set is greater than or equal to preset threshold, it is determined that should Comprising the vocabulary in preset lexical set in shear plate data, and determine for the vocabulary for including in the shear plate data Number.Processing unit 12 can obtain the term vector that model determines each vocabulary according to preset term vector.
In the embodiment of the present application, fuzzy matching is carried out using the term vector of keyword and the term vector of vocabulary, it can be with depth The feature for excavating keyword, farthest matches the data comprising vocabulary, avoids omitting significant data.
Processing unit 12 is not if it is determined that include the vocabulary in preset lexical set, processing unit in the shear plate data 12 are not encrypted the data, execute step 203, i.e., the shear plate data are sent to shear plate.If it is determined that should Comprising at least one vocabulary in preset lexical set in data, 204 are thened follow the steps, i.e., shear plate data are encrypted Processing.
There are many kinds of the modes that data are encrypted in processing unit 12, is illustrated below.
Mode one:
Referring to figure 3., which specifically includes:
Step 301, the security level of data is determined;
Step 302, according to the security level of data, the Encryption Algorithm for encrypting shear plate data is determined.
Step 303, according to the Encryption Algorithm for encrypting shear plate data, shear plate data are encrypted.
The mode for executing step 301 to processing unit 12 below illustrates.
B1, processing unit 12 determine shear plate according to the corresponding security level of one or more vocabulary for including in data The security level of data.The security level of shear plate data is higher, indicates that the significance level of shear plate data is higher, is equivalent to this Shear plate data are more important.
Specifically, in step 203, processing unit 12 obtains at least one vocabulary that shear plate data include, according to pre- The security level of each vocabulary in lexical set is deposited, so that it is determined that every at least one vocabulary for including in shear plate data out The security level of a vocabulary.Due in shear plate data may with comprising or multiple vocabulary, processing unit 12 determine the shearing Vocabulary in plate data may correspond to multiple security levels, and processing unit 12 can be by the highest safety level of vocabulary medium security level Security level not as the shear plate data.
For example, the shear plate data that processing unit 12 obtains are " address XLLXXXXXXXXXXXXXXXXXXXXXXX ", Processing unit 12 determines that the shear plate data are ideal money wallet address, for continuing the lexical set shown in the table 1, processing Device 12 determines that the security level of the shear plate data is 3 according to table 1.
B2, processing unit 12 determine the peace of shear plate data according to the corresponding application of shear plate data and corresponding relationship Full rank.
Specifically, corresponding relationship is prestored in processing unit 12, i.e., it is each to apply corresponding security level.Such as step above 201 contents discussed, processing unit 12 also obtain the shear plate data source in which while obtaining shear plate data Using then processing unit 12 can determine the shear plate according to the corresponding application of shear plate data and corresponding relationship The corresponding security level of data.
Such as processing unit 12 prestores corresponding relationship shown in the following table 2.
Table 2
Using Security level
It reads application and (1 is applied, using 2) 1
Social application (applies 3, using 4) 2
Payment application (applies 5, using 6) 3
Processing unit 12 determines the shear plate data source in applying 1, and processing unit 12 is corresponding according to shown in upper table 2 to close It is to determine that the security level of the shear plate data is 1.
After determining the corresponding security level of shear plate data, processing unit 12 executes step 302.
Specifically, processing unit 12 is determined according to the corresponding security level of shear plate data for encrypting shear plate number According to corresponding Encryption Algorithm.
In order to meet the encryption requirements of the high shear plate data of security level, the security level of data is higher, the data pair The Encryption Algorithm encryption intensity answered is higher.In general, the encryption intensity of Encryption Algorithm is lower, and Encryption Algorithm is corresponding encrypted The computing cost that journey is related to is relatively small, and for the computing cost of opposite saving processing unit 12, the low data of security level can With the algorithm low using encryption intensity.
For example, the relationship of different security levels and different Encryption Algorithm is as shown in table 3 below.
Table 3
Security level Encryption Algorithm
1 Base64 Encryption Algorithm
2 Md5 encryption algorithm
3 SHA256 Encryption Algorithm
When determining that the corresponding security level of shear plate data is 1, the corresponding Encryption Algorithm of the shear plate data is used Base64 Encryption Algorithm.
In the embodiment of the present application, the data of 12 pairs of processing unit different security levels carry out different Encryption Algorithm and add It is close, it on the one hand can guarantee all to encrypt all data comprising default vocabulary, on the other hand to the data comprising vocabulary Classified again, in the case where meeting the encryption requirements of data of different security levels, reduces encryption shear plate data as far as possible Computing cost.
After processing unit 12 determines the Encryption Algorithm for encrypting shear plate data, step 303 is executed.
Specifically, processing unit 12 is according to the Encryption Algorithm to shear plate data after the corresponding Encryption Algorithm of determination It is encrypted, since shear plate data being encrypted, is arbitrarily monitored acquisition by criminal so as to avoid data, make The case where at shear plate leaking data.
Shear plate data are encrypted using corresponding Encryption Algorithm, take too many supplementary lessons for number when criminal obtains the encryption vacation After used Encryption Algorithm, it is also possible that cracking out corresponding shear plate data, and then shear plate data are carried out It distorts, therefore in order to reduce the case where shear plate data are tampered, a kind of pair of shear plate data is provided below and are encrypted Mode.
Mode two:
Data are encrypted according to the first Encryption Algorithm, obtain ciphertext character string;To ciphertext character string and shear plate number It is handled according to being packaged, the data after obtaining encryption.
Specifically, first Encryption Algorithm can be the algorithm determined by the mode in step 302, it is also possible to locate A kind of algorithm of preset fixation obtains after encrypting according to the first Encryption Algorithm to shear plate data in reason device 12 Ciphertext character string after must encrypting.After obtaining ciphertext character string, ciphertext character string and shear plate data can be encapsulated Together, the data after encryption are obtained, such as using ciphertext character string as data head, data head and data are encapsulated in one It rises.Encapsulation can be understood as combining shear plate data and ciphertext character string according to preset data form.
In the cipher mode of mode two, when by shear plate data together with ciphertext string wrapper, convenient for processing dress Set whether 12 Late Stage Verification data are tampered.
Mode three:
Referring to figure 4., which includes step 401, is encrypted according to the first Encryption Algorithm to shear plate data, is obtained Ciphertext character string;
Step 402, shear plate data are pre-encrypted according to the second Encryption Algorithm, the data after obtaining pre-encrypt;
Step 403, obscure processing to the data after pre-encrypt, data that acquisition obscures that treated;
Step 404, to ciphertext character string and obscure that treated data are packaged processing, the number after acquisition encryption According to.
Specifically, the first Encryption Algorithm in step 401 is referred to the interior of the first Encryption Algorithm discussed in mode two Hold, details are not described herein again.After obtaining ciphertext character string, in order to further increase the encryption intensity of data, the application is implemented Also shear plate data are encrypted in example, processing unit 12 is pre-encrypted shear plate data according to the second Encryption Algorithm, Data after obtaining pre-encrypt.Wherein, the second Encryption Algorithm can be identical as the first Encryption Algorithm, can also be different.
After obtaining the data after pre-encrypt, in order to increase the safety of data, processing unit is to the number after pre-encrypt According to obscure processing, such as interpolation is carried out to the data after pre-encrypt and obscures processing, obtains data of obscuring that treated.
As one embodiment, it is decrypted for the ease of 12 later period of processing unit, processing unit 12 can be in pre-encrypt The enterprising row interpolation processing in position is fixed in data afterwards.
After acquisition data of obscuring that treated, processing unit can be using ciphertext character string as data head, and encapsulation is mixed Confuse that treated data, data after obtaining encryption.Encapsulation is referred to discuss content above, and details are not described herein again.
In the cipher mode of mode three, processing unit 12 carries out encryption to data and obscures processing, improves encryption intensity, most Big degree ensures shear plate data safety.
For example, the first Encryption Algorithm is md5 encryption algorithm, to shear plate data, " address is processing unit 12 After XXXXXXXXXXXXXXXXXXXXXXXXXX " is encrypted, can obtain ciphertext character string is " 2ce1ae2a4388f14 b7f4c998de2e6e5b6”。
Second Encryption Algorithm is pre-encrypted using base64, the data " 5Zyw5Z2A5Li6WFhY after obtaining pre-encrypt WFhYWFhYWFhYWFhYWFhYWFhYWFhYWFg=" is inserted directly into the data after pre-encrypt in first and second " 5 " obscure that treated data are as follows to obtain:
55Zyw5Z2A5Li6WFhYWFhYWFhYWFhYWFhYWFhYWFhYWFhYWFg=.
The data of obscuring that treated are being obtained, by ciphertext character string and is obscuring that treated data is packaged together, from And it is as follows to obtain the data after encryption:
“2ce1ae2a4388f14b7f4c998de2e6e5b6+55Zyw5Z2A5Li6WFhYWFhYWFhYWFhYWFhYW FhYWFhYWFhYWFg=".
As one embodiment, the cipher mode of mode one and mode two can combine, the encryption of mode one and mode three Mode can also combine, i.e., the first Encryption Algorithm in mode two and mode three can be determined with pass-through mode one.
After obtaining the data after encryption, processing unit 12 executes step 205, i.e., by the data after encryption It is sent to shear plate 13.Since processing unit 12 has carried out encryption to shear plate data, so criminal is difficult to crack Data after the encryption guarantee the safety of shear plate data.
Specifically, processing unit 12 may be by servicing to realize as previously discussed, therefore, processing unit 12 will not For storing the data after encryption, but the data after the encryption are sent in shear plate 13.
Processing unit 12 executes step 206, i.e., when detecting the operation for obtaining data from shear plate 13, from shear plate The data after encryption are obtained in 13.
Wherein, the operation such as user that data are obtained from shear plate 13 carries out paste operation, obtains from shear plate 13 There are many kinds of the modes of the operation of data, is referred to the mode that the user discussed above carries out duplication operation, no longer superfluous herein It states.
After obtaining the data after encryption, processing unit 12 executes step 207, i.e., to the data after encryption It is decrypted.
Specifically, processing unit 12 is decrypted according to the inverse process of encryption data, decryption obtains corresponding data, below The corresponding decryption processes of the ciphering process are illustrated with adding.
Decryption processes one:
Referring to figure 5., which includes: step 501, according to the first Encryption Algorithm, after encryption Data head in data is decrypted.
Specifically, processing unit 12 encrypts data according to the cipher mode of mode two above, processing unit 12 is pressed According to used first Encryption Algorithm is encrypted before, ciphertext character string is decrypted, is obtained at decryption after decryption processing The content of shear plate data after reason.Processing unit 12 executes step 502, i.e., shear plate data after judge decryption processing with add Whether the data in close treated data match, if matching executes step 503, i.e., by the shear plate data after decryption processing It is sent to respective application or shear plate.If the shear plate data after decryption processing are sent to shear plate 13, respective application Required shear plate data are acquired from shear plate 13.If it does not match, execute step 504, i.e. prompt user shearing Plate data have been tampered.
Wherein, matching can be understood as the data in the data after encryption there are with the data head after decryption processing Identical data, matching is further understood that data verification, using the shear plate data after decryption processing to encryption The data in data afterwards are verified.
Specifically, such as the content that mode two is discussed above, since the ciphertext character string in the data after encryption is several It is obtained according to encryption itself, further includes the shear plate data not encrypted in the data after encryption.If after decryption processing Shear plate data it is identical as the data in the data after encryption, it indicate that shear plate data are not tampered with, processing The shear plate data are sent to respective application by device 12, respective application be execute obtained from shear plate data operation institute it is right The application answered, such as user need to copy to shear plate data using in A, then being then respective application using A.If decryption Shear plate data that treated and the data in the data after encryption are not identical, then it represents that shear plate data are tampered, then Prompt user's shear plate data have been tampered, and there are many modes of prompt, such as pop-up floating window prompts etc..
As one embodiment, the number after the shear plate data and encryption after processing unit 12 determines decryption processing When data in are not identical, processing unit 12 can delete shear plate data, and criminal is avoided to be implanted into virus etc..
Decryption processes two:
If cipher mode is encrypted using mode three above, processing unit 12 passes through the step of discussing above 501 mode obtains after the shear plate data after decryption processing, it is also necessary to in the data after encryption in addition to ciphertext word Data except symbol string, then carry out obscuring inversely processing, it handles and then is decrypted according to the second Encryption Algorithm, obtained Shear plate data, then judge encrypting and decrypting treated whether shear plate data and shear plate data match.If decryption processing Shear plate data and shear plate Data Matching afterwards, then follow the steps 503, and shear plate data are sent to respective application.If Shear plate data and shear plate data after decryption processing mismatch, and then follow the steps 504, that is, have prompted user's shear plate data It is tampered.
In a kind of possible embodiment, terminal device may support multiple shear plates 13 simultaneously, and processing unit 12 can also To execute above-mentioned encryption and decrypting process to the shear plate data in multiple shear plates 13 simultaneously.
Specifically, processor device 12 may include multiple independent process, each process be responsible for a shear plate 13 into Row communication, and the corresponding shear plate data of the shear plate are decrypted and are encrypted, it realizes simultaneously to multiple shear plates 13 Data are handled.
Based on identical inventive concept, the embodiment of the present application also provides a kind of processing unit of shear plate data, the shearing The processing unit of plate data is equivalent to the processing unit 12 discussed above, please refers to Fig. 6, which includes:
Module 601 is obtained, for obtaining shear plate number when detecting to data progress shearing manipulation or duplication operation According to;
Judgment module 602, for whether judging in shear plate data comprising at least one word in preset lexical set It converges;
Encrypting module 603, if comprising at least one vocabulary in preset lexical set in shear plate data, to shearing Plate data are encrypted;
Sending module 604, for the data after encryption to be sent to shear plate.
In a kind of possible embodiment, encrypting module 603 is specifically used for:
If including at least one vocabulary in preset lexical set in shear plate data, it is determined that the peace of shear plate data Full rank;
According to the security level of shear plate data, the Encryption Algorithm for encrypting shear plate data is determined;
According to the Encryption Algorithm for encrypting shear plate data, shear plate data are encrypted.
In a kind of possible embodiment, encrypting module 603 is specifically used for:
Determine the security level of each vocabulary at least one vocabulary, affiliated security level highest at least one vocabulary Security level be shear plate data security level;Or,
According to the corresponding application of data and corresponding relationship, the corresponding security level of shear plate data is determined;Wherein, it cuts The corresponding application of cutting plate data refers to that from shear plate data source, in application, corresponding relationship is different application and different security levels Between corresponding relationship.
In a kind of possible embodiment, encrypting module 603 is specifically used for:
Shear plate data are encrypted according to the first Encryption Algorithm, obtain ciphertext character string;
Processing is packaged to ciphertext character string and shear plate data, the data after obtaining encryption.
In a kind of possible embodiment, which further includes deciphering module 605 and cue module 606, in which:
Module 601 is obtained, is also used to after the data after encryption are sent to shear plate 13, is being detected from cutting When obtaining the operation of shear plate data in cutting plate 13, the data after encryption are obtained from shear plate 13;
Deciphering module 605, for being carried out to the ciphertext character string in the data after encryption according to the first Encryption Algorithm Decryption processing, the data after obtaining decryption processing;
Sending module 604, if the data being also used in the data after decryption processing and the data after encryption match, Then according to the operation for obtaining shear plate data from shear plate 13, the data after decryption processing are sent to shear plate 13 or corresponding Using;
Cue module 606, if being mismatched for the data in the data after the data and encryption after decryption processing, Prompt user's shear plate data have been tampered.
In a kind of possible embodiment, encrypting module 603 is specifically used for:
Shear plate data are pre-encrypted according to the second Encryption Algorithm, the data after obtaining pre-encrypt;
Obscure processing to the data after pre-encrypt, data that acquisition obscures that treated;
Ciphertext character string is made and obscures that treated data is packaged processing, the data after acquisition encryption.
Based on identical inventive concept, the embodiment of the present application also provides a kind of processing unit of shear plate data, the shearing The processing unit of plate data is equivalent to the processing unit 12 discussed above, please refers to Fig. 7, which includes:
At least one processor 701, and
With the memory 702 of at least one processor 701 communication connection;
Wherein, memory 702 is stored with the instruction that can be executed by least one processor 701, at least one processor 701 The processing method of shear plate data as previously discussed is realized by executing the instruction that memory 702 stores.
It is but not limit the quantity of processor 701 actually by taking a processor 701 as an example in Fig. 7.
As one embodiment, the processor 701 in Fig. 7 may be implemented to obtain module 601, judgment module in Fig. 6 above 602, the function of encrypting module 603, sending module 604, deciphering module 605 and cue module 606.
Based on identical inventive concept, the embodiment of the present application provides a kind of computer readable storage medium, the computer Readable storage medium storing program for executing is stored with computer instruction, when the computer instruction is run on computers, so that computer executes The processing method of shear plate data as previously discussed.
It should be understood by those skilled in the art that, embodiments herein can provide as method, system or computer program Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the application Apply the form of example.Moreover, it wherein includes the computer of computer usable program code that the application, which can be used in one or more, The computer program implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) produces The form of product.
The application is referring to method, the process of equipment (system) and computer program product according to the embodiment of the present application Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates, Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one The step of function of being specified in a box or multiple boxes.
Although the preferred embodiment of the application has been described, it is created once a person skilled in the art knows basic Property concept, then additional changes and modifications can be made to these embodiments.So it includes excellent that the following claims are intended to be interpreted as It selects embodiment and falls into all change and modification of the application range.
Obviously, those skilled in the art can carry out various modification and variations without departing from the essence of the application to the application Mind and range.In this way, if these modifications and variations of the application belong to the range of the claim of this application and its equivalent technologies Within, then the application is also intended to include these modifications and variations.

Claims (14)

1. a kind of processing method of shear plate data characterized by comprising
When detecting to data progress shearing manipulation or duplication operation, shear plate data are obtained;
Whether judge in the shear plate data comprising at least one vocabulary in preset lexical set;
If comprising at least one vocabulary in the preset lexical set in the shear plate data, to the shear plate number According to being encrypted;
Data after encryption are sent to shear plate.
2. the method as described in claim 1, which is characterized in that if in the shear plate data including the preset word finder At least one vocabulary in conjunction, then be encrypted the data, comprising:
If including at least one vocabulary in the preset lexical set in the shear plate data, it is determined that the shear plate The security level of data;
According to the security level of the shear plate data, the Encryption Algorithm for encrypting the shear plate data is determined;
According to described for encrypting the Encryption Algorithm of the shear plate data, the shear plate data are encrypted.
3. method according to claim 2, which is characterized in that determine the security level of the shear plate data, comprising:
Determine the security level of each vocabulary at least one described vocabulary, at least one described vocabulary belonging to security level Highest security level is the security level of the shear plate data;Or,
According to the corresponding application of the shear plate data and corresponding relationship, the corresponding safety level of the shear plate data is determined Not;Wherein, the corresponding application of the shear plate data refers to from the shear plate data source in the application, the corresponding pass It is the corresponding relationship between different application and different security levels.
4. method a method according to any one of claims 1-3, which is characterized in that if comprising described preset in the shear plate data At least one vocabulary in lexical set is then encrypted the shear plate data, comprising:
The shear plate data are encrypted according to the first Encryption Algorithm, obtain ciphertext character string;
Processing is packaged to the ciphertext character string and the shear plate data, the data after obtaining encryption.
5. method as claimed in claim 4, which is characterized in that after the data after encryption are sent to shear plate, Include:
When detecting the operation for obtaining the shear plate data from the shear plate, the encryption is obtained from the shear plate Data that treated;
According to first Encryption Algorithm, place is decrypted to the ciphertext character string in the data after the encryption Reason, the data after obtaining decryption processing;
If the data after the decryption processing match with the data in the data after the encryption, according to described from cutting Data after the decryption processing are sent to the shear plate or accordingly answered by the operation that the shear plate data are obtained in cutting plate With;
If the data in the data after data and the encryption after decryption processing mismatch, prompt described in the user Shear plate data have been tampered.
6. method as claimed in claim 4, which is characterized in that sealed to the ciphertext character string and the shear plate data Dress processing, the data after obtaining encryption, comprising:
The shear plate data are pre-encrypted according to the second Encryption Algorithm, the data after obtaining pre-encrypt;
Obscure processing to the data after the pre-encrypt, data that acquisition obscures that treated;
The ciphertext character string is made and described obscure that treated data is packaged processing, the number after acquisition encryption According to.
7. a kind of processing unit of shear plate data characterized by comprising
Module is obtained, for obtaining shear plate data when detecting to data progress shearing manipulation or duplication operation;
Judgment module, for whether judging in the shear plate data comprising at least one vocabulary in preset lexical set;
Encrypting module, if comprising at least one vocabulary in the preset lexical set in the shear plate data, to institute Shear plate data are stated to be encrypted;
Sending module, for the data after encryption to be sent to shear plate.
8. processing unit as claimed in claim 7, which is characterized in that the encrypting module is specifically used for:
If including at least one vocabulary in the preset lexical set in the shear plate data, it is determined that the shear plate The security level of data;
According to the security level of the shear plate data, the Encryption Algorithm for encrypting the shear plate data is determined;
According to described for encrypting the Encryption Algorithm of the shear plate data, the shear plate data are encrypted.
9. processing unit as claimed in claim 8, which is characterized in that the encrypting module is specifically used for:
Determine the security level of each vocabulary at least one described vocabulary, at least one described vocabulary belonging to security level Highest security level is the security level of the shear plate data;Or,
According to the corresponding application of the shear plate data and corresponding relationship, the corresponding safety level of the shear plate data is determined Not;Wherein, the corresponding application of the shear plate data refers to from the shear plate data source in the application, the corresponding pass It is the corresponding relationship between different application and different security levels.
10. the processing unit as described in claim 7-9 is any, which is characterized in that the encrypting module is specifically used for:
The shear plate data are encrypted according to the first Encryption Algorithm, obtain ciphertext character string;
Processing is packaged to the ciphertext character string and the shear plate data, the data after obtaining encryption.
11. processing unit as claimed in claim 10, which is characterized in that the processing unit further includes deciphering module and prompt Module, in which:
The acquisition module, is also used to after the data after encryption are sent to shear plate, is detecting from shear plate When the middle operation for obtaining the shear plate data, the data after the encryption are obtained from the shear plate;
The deciphering module, according to first Encryption Algorithm, to the ciphertext character in the data after the encryption String is decrypted, the data after obtaining decryption processing;
The sending module, if the data being also used to after the decryption processing and the data phase in the data after the encryption Matching sends the data after the decryption processing then according to the operation for obtaining the shear plate data from shear plate To the shear plate or respective application;
The cue module, if the data in the data after the data and the encryption after decryption processing mismatch, Shear plate data described in the user are then prompted to be tampered.
12. processing unit as claimed in claim 10, which is characterized in that the encrypting module is specifically used for:
The shear plate data are pre-encrypted according to the second Encryption Algorithm, the data after obtaining pre-encrypt;
Obscure processing to the data after the pre-encrypt, data that acquisition obscures that treated;
The ciphertext character string is made and described obscure that treated data is packaged processing, the number after acquisition encryption According to.
13. a kind of processing unit of shear plate data characterized by comprising
At least one processor, and
The memory being connect at least one described processor communication;
Wherein, the memory is stored with the instruction that can be executed by least one described processor, at least one described processor Such as method of any of claims 1-6 is realized in instruction by executing the memory storage.
14. a kind of computer readable storage medium, which is characterized in that the computer-readable recording medium storage has computer to refer to It enables, when the computer instruction is run on computers, so that computer is executed as of any of claims 1-6 Method.
CN201910540099.7A 2019-06-21 2019-06-21 A kind of processing method and processing device of shear plate data Pending CN110262908A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910540099.7A CN110262908A (en) 2019-06-21 2019-06-21 A kind of processing method and processing device of shear plate data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910540099.7A CN110262908A (en) 2019-06-21 2019-06-21 A kind of processing method and processing device of shear plate data

Publications (1)

Publication Number Publication Date
CN110262908A true CN110262908A (en) 2019-09-20

Family

ID=67920079

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910540099.7A Pending CN110262908A (en) 2019-06-21 2019-06-21 A kind of processing method and processing device of shear plate data

Country Status (1)

Country Link
CN (1) CN110262908A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111581665A (en) * 2020-05-09 2020-08-25 维沃移动通信有限公司 Data processing method and device and electronic equipment
CN112433871A (en) * 2020-12-09 2021-03-02 江苏通付盾信息安全技术有限公司 Shear plate data protection method and device
CN113806714A (en) * 2020-06-14 2021-12-17 武汉斗鱼鱼乐网络科技有限公司 Safe transmission method and device for white list information of application program
CN117113417A (en) * 2023-10-18 2023-11-24 中孚安全技术有限公司 Method, system, equipment and medium for managing and controlling clipboard under Linux system

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102609642A (en) * 2012-01-09 2012-07-25 中标软件有限公司 Clipboard control method and clipboard control system
US20140040638A1 (en) * 2011-10-11 2014-02-06 Citrix Systems, Inc. Policy-Based Application Management
US20140267339A1 (en) * 2013-03-15 2014-09-18 Adobe Systems Incorporated Secure Cloud-Based Clipboard for Touch Devices
CN104579627A (en) * 2014-12-06 2015-04-29 上海移远通信技术有限公司 Data encryption method and system
CN105099672A (en) * 2015-08-04 2015-11-25 东南大学 Hybrid encryption method and device for realizing the same
CN105184181A (en) * 2015-06-15 2015-12-23 北京天诚同创电气有限公司 File encryption method, file decryption method and file encryption device
CN105468990A (en) * 2014-09-04 2016-04-06 中国移动通信集团安徽有限公司 Sensitive information management control method and apparatus
CN106446714A (en) * 2016-10-12 2017-02-22 北京元心科技有限公司 Data access method and device of multi-clipboard
CN108959941A (en) * 2018-06-21 2018-12-07 Oppo(重庆)智能科技有限公司 Data ciphering method, device and electronic device
CN109428710A (en) * 2017-08-22 2019-03-05 深圳光启智能光子技术有限公司 Data transmission method, device, storage medium and processor
CN109740363A (en) * 2019-01-04 2019-05-10 贵州大学 Rating documents desensitization encryption method
CN109857571A (en) * 2018-12-29 2019-06-07 北京奇安信科技有限公司 Clipbook control method and device
CN109889340A (en) * 2019-03-19 2019-06-14 北京信息科技大学 A kind of adaptive cipher key distribution mechanisms based on QKD network

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140040638A1 (en) * 2011-10-11 2014-02-06 Citrix Systems, Inc. Policy-Based Application Management
CN102609642A (en) * 2012-01-09 2012-07-25 中标软件有限公司 Clipboard control method and clipboard control system
US20140267339A1 (en) * 2013-03-15 2014-09-18 Adobe Systems Incorporated Secure Cloud-Based Clipboard for Touch Devices
CN105468990A (en) * 2014-09-04 2016-04-06 中国移动通信集团安徽有限公司 Sensitive information management control method and apparatus
CN104579627A (en) * 2014-12-06 2015-04-29 上海移远通信技术有限公司 Data encryption method and system
CN105184181A (en) * 2015-06-15 2015-12-23 北京天诚同创电气有限公司 File encryption method, file decryption method and file encryption device
CN105099672A (en) * 2015-08-04 2015-11-25 东南大学 Hybrid encryption method and device for realizing the same
CN106446714A (en) * 2016-10-12 2017-02-22 北京元心科技有限公司 Data access method and device of multi-clipboard
CN109428710A (en) * 2017-08-22 2019-03-05 深圳光启智能光子技术有限公司 Data transmission method, device, storage medium and processor
CN108959941A (en) * 2018-06-21 2018-12-07 Oppo(重庆)智能科技有限公司 Data ciphering method, device and electronic device
CN109857571A (en) * 2018-12-29 2019-06-07 北京奇安信科技有限公司 Clipbook control method and device
CN109740363A (en) * 2019-01-04 2019-05-10 贵州大学 Rating documents desensitization encryption method
CN109889340A (en) * 2019-03-19 2019-06-14 北京信息科技大学 A kind of adaptive cipher key distribution mechanisms based on QKD network

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111581665A (en) * 2020-05-09 2020-08-25 维沃移动通信有限公司 Data processing method and device and electronic equipment
CN111581665B (en) * 2020-05-09 2021-07-06 维沃移动通信有限公司 Data processing method and device and electronic equipment
CN113806714A (en) * 2020-06-14 2021-12-17 武汉斗鱼鱼乐网络科技有限公司 Safe transmission method and device for white list information of application program
CN112433871A (en) * 2020-12-09 2021-03-02 江苏通付盾信息安全技术有限公司 Shear plate data protection method and device
CN117113417A (en) * 2023-10-18 2023-11-24 中孚安全技术有限公司 Method, system, equipment and medium for managing and controlling clipboard under Linux system

Similar Documents

Publication Publication Date Title
CN110262908A (en) A kind of processing method and processing device of shear plate data
US20170295013A1 (en) Method for fulfilling a cryptographic request requiring a value of a private key
US20220035922A1 (en) Blockchain-based data processing method, apparatus, and device
US20240015141A1 (en) Secure message search
CN106991298B (en) Access method of application program to interface, authorization request method and device
CN103294961A (en) Method and device for file encrypting/decrypting
CN110637301B (en) Reducing disclosure of sensitive data in virtual machines
CN105681039A (en) Method and device for secret key generation and corresponding decryption
CN109741063A (en) Digital signature method and device based on block chain
US10382209B2 (en) Privacy control using unique identifiers associated with sensitive data elements of a group
CN107528830B (en) Account login method, system and storage medium
CN107196907A (en) A kind of guard method of Android SO files and device
CN109936546B (en) Data encryption storage method and device and computing equipment
CN108416224A (en) A kind of data encryption/decryption method and device
CN109711178A (en) A kind of storage method of key-value pair, device, equipment and storage medium
US8745375B2 (en) Handling of the usage of software in a disconnected computing environment
EP3193262A1 (en) Database operation method and device
CN113282959A (en) Service data processing method and device and electronic equipment
US20180247111A1 (en) Binding data to a person's identity
US9275233B1 (en) Generation and use of a modified protected file
CN109560925A (en) Key information Supply Method and the device for utilizing key information Supply Method
CN108985109A (en) A kind of date storage method and device
CN106161365B (en) Data processing method and device and terminal
KR101679183B1 (en) Server and method for electronic signature
US9537842B2 (en) Secondary communications channel facilitating document security

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination