CN111581665B - Data processing method and device and electronic equipment - Google Patents

Data processing method and device and electronic equipment Download PDF

Info

Publication number
CN111581665B
CN111581665B CN202010385645.7A CN202010385645A CN111581665B CN 111581665 B CN111581665 B CN 111581665B CN 202010385645 A CN202010385645 A CN 202010385645A CN 111581665 B CN111581665 B CN 111581665B
Authority
CN
China
Prior art keywords
content
preset
condition
storage area
pasting
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010385645.7A
Other languages
Chinese (zh)
Other versions
CN111581665A (en
Inventor
王尚之
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN202010385645.7A priority Critical patent/CN111581665B/en
Publication of CN111581665A publication Critical patent/CN111581665A/en
Application granted granted Critical
Publication of CN111581665B publication Critical patent/CN111581665B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Landscapes

  • Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Medical Informatics (AREA)
  • Storage Device Security (AREA)

Abstract

The application discloses a data processing method, a data processing device and electronic equipment, and belongs to the technical field of communication. The method comprises the following steps: receiving a copy operation of first content; under the condition that a preset privacy condition is met, carrying out privacy protection processing on the first content to obtain second content; saving the second content to a clipboard; and in the case of receiving a first pasting operation, pasting the second content in the cutting board in a first area, wherein the first area is an area associated with the first pasting operation. Therefore, the copied content is subjected to privacy protection processing, the processed content is stored in the clipboard, and the processed content stored in the clipboard is pasted when being pasted, so that the privacy data in the original copied content can be prevented from being leaked through the clipboard, and the safety of the clipboard in the using process is improved.

Description

Data processing method and device and electronic equipment
Technical Field
The application belongs to the technical field of communication, and particularly relates to a data processing method and device and electronic equipment.
Background
At present, mobile terminals such as mobile phones become indispensable electronic products in daily life, and users often use a clipboard to complete a copy and paste function in the process of inputting data by using the mobile terminals. In the prior art, a clipboard is an open functional module, and any application module can directly access the clipboard and acquire data in the clipboard, so that privacy data in the clipboard are easily leaked.
Therefore, the safety of the existing shear plate in the using process is poor.
Disclosure of Invention
The embodiment of the application aims to provide a data processing method, a data processing device and electronic equipment, and can solve the problem that the existing shear plate is poor in safety in the using process.
In order to solve the technical problem, the present application is implemented as follows:
in a first aspect, an embodiment of the present application provides a data processing method, where the method includes:
receiving a copy operation of first content;
under the condition that a preset privacy condition is met, carrying out privacy protection processing on the first content to obtain second content;
saving the second content to a clipboard;
and in the case of receiving a first pasting operation, pasting the second content in the cutting board in a first area, wherein the first area is an area associated with the first pasting operation.
In a second aspect, an embodiment of the present application provides a data processing apparatus, including:
a receiving module, configured to receive a copy operation on first content;
the safety processing module is used for carrying out privacy protection processing on the first content under the condition that a preset privacy condition is met to obtain second content;
the first storage module is used for storing the second content into the clipboard;
the first pasting module is used for pasting the second content in the cutting board to a first area under the condition that a first pasting operation is received, wherein the first area is an area related to the first pasting operation.
In a third aspect, an embodiment of the present application provides an electronic device, which includes a processor, a memory, and a program or instructions stored on the memory and executable on the processor, and when executed by the processor, the program or instructions implement the steps of the method according to the first aspect.
In a fourth aspect, embodiments of the present application provide a readable storage medium, on which a program or instructions are stored, which when executed by a processor implement the steps of the method according to the first aspect.
In a fifth aspect, an embodiment of the present application provides a chip, where the chip includes a processor and a communication interface, where the communication interface is coupled to the processor, and the processor is configured to execute a program or instructions to implement the method according to the first aspect.
In an embodiment of the present application, a copy operation of first content is received; under the condition that a preset privacy condition is met, carrying out privacy protection processing on the first content to obtain second content; saving the second content to a clipboard; and in the case of receiving a first pasting operation, pasting the second content in the cutting board in a first area, wherein the first area is an area associated with the first pasting operation. Therefore, the copied content is subjected to privacy protection processing, the processed content is stored in the clipboard, and the processed content stored in the clipboard is pasted when being pasted, so that the privacy data in the original copied content can be prevented from being leaked through the clipboard, and the safety of the clipboard in the using process is improved.
Drawings
Fig. 1 is a flowchart of a data processing method provided in an embodiment of the present application;
FIG. 2 is a schematic view of a copy operation interface provided in an embodiment of the present application;
FIG. 3 is a schematic diagram of a security risk reminder interface according to an embodiment of the present application;
FIG. 4 is a schematic diagram of an interface for a user to manually process data according to an embodiment of the present application;
fig. 5 is a schematic view of a pasting operation interface provided in an embodiment of the present application;
FIG. 6 is a timing diagram of data processing according to an embodiment of the present disclosure;
FIG. 7 is a schematic interface diagram before and after data cleaning according to an embodiment of the present application;
FIG. 8 is a schematic diagram of a data cleansing mechanism provided in an embodiment of the present application;
fig. 9 is an exemplary flowchart of a data processing method provided in an embodiment of the present application;
fig. 10 is a schematic structural diagram of a data processing apparatus according to an embodiment of the present application;
fig. 11 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some, but not all, embodiments of the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The terms first, second and the like in the description and in the claims of the present application are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the application are capable of operation in sequences other than those illustrated or described herein. In addition, "and/or" in the specification and claims means at least one of connected objects, a character "/" generally means that a preceding and succeeding related objects are in an "or" relationship.
The data processing method provided by the embodiment of the present application is described in detail below with reference to the accompanying drawings through specific embodiments and application scenarios thereof.
Referring to fig. 1, fig. 1 is a flowchart of a data processing method according to an embodiment of the present application, and as shown in fig. 1, the method includes the following steps:
step 101, receiving a copy operation of a first content.
The first content may be any content that the user desires to copy, and may be text content in general, or may be content that can be copied, such as pictures.
When a user desires to copy the first content, the user may select the first content and select a copy or cut option among operation options popped up by the system, so that the system may receive a copy operation for the first content.
And 102, under the condition that a preset privacy condition is met, carrying out privacy protection processing on the first content to obtain second content.
In the embodiment of the application, the preset privacy condition can be preset according to actual requirements.
Specifically, the preset privacy condition may include any one of:
the copy operation is a secure copy operation;
starting a safe copy mode;
the first content comprises private content.
That is, in this embodiment of the present application, the copy operation may include a general copy operation and a secure copy operation, and when a user desires to perform a secure copy operation to prevent privacy of the copied content from being revealed, the secure copy operation may be performed on the first content, for example, as shown in fig. 2, after the user selects the content 20 desired to be copied, an operation window 21 of a clipboard may be popped up, and a secure copy option and a general copy option may be provided in this window, and the user may select the secure copy option in the operation window 21 to enter a privacy protection process flow for the copied content.
Alternatively, the secure copy mode may be turned on in advance, or turned on by default, so that the privacy protection processing flow for the copied content is automatically entered only when the copy operation is received. For example, the user may turn on secure copy mode in system settings, or the system may default to a secure copy mode enabled.
For example, in the case that the first content is identified to include the private content, it is confirmed that a preset privacy condition is satisfied, so as to enter the privacy protection processing flow for the copied content, and in the case that the first content is identified to not include the private content, the processing may be performed according to a conventional copy and paste flow.
Therefore, when the copy operation of the first content is a secure copy operation, or a secure copy mode is started, or the first content is identified to include privacy content, it can be confirmed that a preset privacy condition is currently met, and privacy protection processing can be performed on the first content, that is, the first content can be transmitted to a secure processing module, so that the privacy content and the privacy type in the first content can be identified through the secure processing module, and the privacy content is correspondingly processed in a confidential mode according to the privacy type.
Specifically, the performing of the privacy protection processing on the first content may be performing encryption, de-identification and other processing on the privacy content in the first content, so that the privacy content in the first content is not directly displayed in a plaintext manner, and the content subjected to the privacy protection processing is the second content.
For example, the original content copied is: name: zhang III, identification number: 100000100000000001, the subject calendar, cell phone number: 12300000001, respectively; the content subjected to the privacy protection processing may be: name: zhang III, identification number: 100000 × × 0001, the subject calendar, the mobile phone number: 123****0001.
Optionally, the step 102 includes:
under the condition that the first content is identified to include private content, outputting a security risk prompt message box, wherein the security risk prompt message box includes at least two security processing options, and the at least two security processing options include an automatic processing option and a manual processing option;
performing privacy protection processing on the identified privacy content in the first content in the case of receiving a selection operation of the automatic processing option;
and receiving a selection operation of a user on target content in the first content and carrying out privacy protection processing on the target content under the condition of receiving the selection operation of the manual processing option.
In an optional embodiment, after receiving the copy operation on the first content, it may be identified whether the first content includes private content, and in particular, in a case where a user performs a general copy operation or does not turn on a secure copy mode, the first content may be subjected to privacy identification, for example, the first content may be passed to a secure processing module for privacy detection to identify whether the private content exists therein.
In the case that the first content is identified to include the private content, a security risk prompt message box may be output, and a warning message for prompting the user to copy the content including the private content and having a risk of privacy disclosure may be displayed in the security risk prompt message box, and a plurality of security processing options may be provided in the security risk prompt message box for the user to select, for example, an automatic processing option, a manual processing option, and a non-processing option.
For example, as shown in fig. 3, in the case where it is recognized that the content 30 selected by the user to be copied includes private content, a security risk prompt message box 31 may pop up, and the security risk prompt message box 31 may display "do the copied content include private content, there is a risk of privacy disclosure, and security processing is required? The prompt message of the ' can display three options of ' yes ', ' manual ' and ' no ' for the user to select, wherein the ' yes ' option corresponds to the automatic processing mode, the ' manual ' option corresponds to the manual processing mode, and the ' no ' corresponds to the non-processing mode.
If the user desires to automatically perform privacy protection processing on the first content, an automatic processing option may be selected, for example, a yes option in fig. 3 is clicked, so that the system may receive a selection operation on the automatic processing option, and further perform privacy protection processing on the identified privacy content in the first content to obtain a processed second content.
If the user desires to manually perform the privacy protection processing on the first content, a manual processing option may be selected, for example, a "manual" option in fig. 3 is clicked, so that the system may receive a selection operation on the manual processing option, enter a manual processing mode, and select, by the user, a target content that needs to be subjected to the privacy protection processing from the first content, thereby performing the privacy protection processing on the target content selected by the user.
For example, referring to fig. 4, after the user selects the manual processing, the original content interface 41 may be displayed so that the user selects the target content desired to be processed, such as the target content selected by the user and required to be processed may be underlined, after the user selects the target content, the privacy protection processing may be performed on the selected target content, and after the processing is completed, the processed content preview interface 42 may be displayed below the original content interface 41, and the confirmation key may be clicked after the confirmation is correct, or the return key may be clicked when the reprocessing is required to be reprocessed.
If the user does not desire to perform any privacy protection processing on the first content, the user may select an option not to process, for example, click the "no" option in fig. 3, so that the step of performing privacy protection processing on the first content may be skipped, and the routine copy and paste flow may be directly entered.
Thus, under the condition that the copied content is identified to include the private content, various different processing options are provided for the user to select, and the diversified requirements of the user can be flexibly met.
And step 103, storing the second content into a clipboard.
After the second content subjected to privacy protection processing is obtained, the second content can be stored in the clipboard for subsequent pasting, so that the content subjected to privacy protection processing can be accessed in the clipboard, the purpose of preventing other application modules from stealing the original copied content by accessing the clipboard can be achieved, and the data security of the clipboard in the copying process is ensured.
And 104, pasting the second content in the cutting board to a first area under the condition that a first pasting operation is received, wherein the first area is an area related to the first pasting operation.
The purpose of the user to copy the content is generally to implement quick paste, so that when receiving the first paste operation, the second content stored in the clipboard may be pasted to the area associated with the first paste operation, for example, after the user performs the copy operation on the selected first content, as shown in fig. 5, the user further performs the paste operation in a dialog input box 50, and it can be understood that the user desires to paste the copied first content, but since the first content includes the private information, the second content stored in the clipboard may be pasted to the dialog input box, and the input second content may be sent to the current dialog object.
Optionally, after the step 101, the method further includes:
and storing the first content to a preset storage area, wherein the preset storage area is a safe storage area with authority.
In an optional implementation manner, after receiving a copy operation on a first content, the processed second content may be stored in the clipboard, and the first content may also be stored in a preset storage area, so that a user may view the copied original content from the first content, or the user may paste the original content when necessary, where the preset storage area may be an independent secure storage area with authority, that is, data in the area cannot be publicly and randomly accessed and needs user authorization to access the view, and the preset storage area may be a secure storage area in the clipboard, and the second content may be a general storage area stored in the clipboard, that is, a storage area that can be publicly accessed.
As shown in fig. 6, a sequence diagram of data processing for processing and storing the first content may be shown, where the copied original content, that is, the first content, may be sent to a security processing module for security processing, that is, privacy protection processing, the processed content, that is, the second content, may be stored in a storage area in the clipboard, and the original content may be stored in a secure storage area.
Further, after saving the first content to a preset storage area, the method may further include any one of:
displaying the first content in the preset storage area under the condition that the viewing operation of the first content is received;
deleting the first content in the preset storage area under the condition that a preset deletion condition is met;
and when a second pasting operation on the first content is received and user authorization is obtained, pasting the first content in the preset storage area in a second area, wherein the second area is an area associated with the second pasting operation.
After the first content is stored in the preset storage area, in order to meet the access requirement of a user, the first content in the preset storage area may be displayed under the condition that a viewing operation on the first content is received, so that the user can view the complete original content which is not subjected to protection processing, where the viewing operation may be an access operation on the preset storage area, and when the preset storage area is a secure storage area in the clipboard, the viewing operation may be an operation of accessing an entry of the secure storage area in the clipboard, and in order to ensure data security, the user may need to authorize to access, such as inputting a password, a fingerprint, or performing face recognition.
In order to prevent the data in the preset storage area from being stolen by malicious personnel or malicious applications to cause the disclosure of user privacy, a data cleaning mechanism may be set to clean up the copied original content in time, specifically, the first content in the preset storage area may be deleted if a preset deletion condition is met, where the preset deletion condition may be preset according to an actual requirement.
Optionally, the preset deletion condition includes any one of:
receiving a paste operation on the first content;
receiving a paste operation on the second content;
the storage time of the first content in the preset storage area reaches a preset time;
a deletion operation for the first content is received.
That is, there may be a plurality of different ways to trigger deletion of the first content in the preset storage area, one of which may be to clean the first content after detecting that the user has performed the paste operation on the related content. For example, referring to fig. 7, after the user uses the data in the clipboard, that is, pastes the second content in the clipboard, the data in the preset storage area can be cleared in time, that is, the first content in the preset storage area is deleted, so that the privacy data in the preset storage area is prevented from being stolen.
The second method may be a periodic cleaning method, for example, when the storage duration of the first content in the preset storage area reaches a preset duration, the first content is deleted, the preset duration may be a default setting of the system or may be set by a user, for example, the user may set that data may be stored for only 5 minutes, and when the first content is stored for 5 minutes in the preset storage area, the data is deleted.
And thirdly, the method can be realized by combining the two modes, the first content is deleted as long as the pasting operation on the related content is received, or the storage time of the first content in the preset storage area reaches the preset time, namely if the pasting operation on the related content is not received, the time for deleting can be determined according to the storage time of the first content in the preset storage area.
And the fourth step may be manual deletion by a user, and the user may perform a deletion operation on the first content after using the first content or when desiring to delete the first content, thereby triggering the system to delete the first content.
For example, a data scrubbing mechanism in secure copy mode may be as shown in FIG. 8, i.e., four mechanisms may be illustrated to trigger scrubbing of data in a secure storage area.
Therefore, the data in the preset storage area can be cleared in time through the different preset deleting conditions, and the purpose of avoiding the privacy disclosure of the user can be achieved.
In consideration of the fact that in an actual copy and paste application scenario, a user generally needs to paste copied original content rather than processed content, an implementation scheme for safely pasting original content can be provided in order to meet the user's needs and also take into consideration the premise of safe copying.
Specifically, when a user desires to paste original content, that is, the first content, a second paste operation may be performed on the first content, and the user is required to grant an authority to acquire the first content stored in a preset storage area, and paste the first content in an area desired by the user, that is, an area associated with the second paste operation. The user authorization mode may be a mode of inputting a preset operation, inputting a password, a fingerprint, or performing face recognition, the preset operation may be an operation of inputting a preset value for acquiring data in the preset storage area, such as a preset sliding track, and in order to save the user operation, authorization verification may be performed while the second pasting operation is performed, such as extracting a fingerprint of the user when the second pasting operation is input for verification, and the like.
Therefore, by the mode, the requirement of pasting the original content by the user can be met, and the data safety in the preset storage area can be ensured.
It should be noted that, when the user performs a paste operation on the first content without authorization, only the second content may be pasted, that is, when the first paste operation is received and the user authorization is not obtained, the second content in the clipboard may be pasted in the first area associated with the first paste operation; and when a second pasting operation for the first content is received and the user authorization is obtained, pasting the first content in the preset storage area to a second area associated with the second pasting operation.
The following describes a specific implementation of the embodiment of the present application with reference to fig. 9:
step 901, receiving the copy or cut operation of the user to the selected content;
step 902, whether a secure copy mode is selected; if yes, go to step 903, otherwise go to step 905;
step 903, transmitting the selected content to a security processing module for security processing, namely privacy protection processing;
step 904, storing the processed content in a clipboard, and storing the original content in a safe storage area;
step 905, identifying whether privacy content exists in the selected content; if yes, go to step 906, otherwise go to step 908;
step 906, prompting a user that a safety risk exists, and receiving a safety processing mode selected by the user; if the user selects automatic processing, go to step 903; if the user selects manual processing, go to step 907;
step 907, receiving an operation of selecting the content to be processed by the user, and performing security processing on the content selected by the user;
step 908, receiving a paste operation of a user;
in step 909, the data in the secure storage area is deleted after the user's paste operation is received.
The data processing method in the embodiment of the application receives a copy operation of a first content; under the condition that a preset privacy condition is met, carrying out privacy protection processing on the first content to obtain second content; saving the second content to a clipboard; and in the case of receiving a first pasting operation, pasting the second content in the cutting board in a first area, wherein the first area is an area associated with the first pasting operation. Therefore, the copied content is subjected to privacy protection processing, the processed content is stored in the clipboard, and the processed content stored in the clipboard is pasted when being pasted, so that the privacy data in the original copied content can be prevented from being leaked through the clipboard, and the safety of the clipboard in the using process is improved.
It should be noted that, in the data processing method provided in the embodiment of the present application, the execution main body may be a data processing apparatus, or a control module in the data processing apparatus for executing the loaded data processing method. In the embodiment of the present application, a data processing apparatus executes a loaded data processing method as an example, and the data processing method provided in the embodiment of the present application is described.
Referring to fig. 10, fig. 10 is a schematic structural diagram of a data processing apparatus according to an embodiment of the present application, and as shown in fig. 10, the data processing apparatus 1000 includes:
a receiving module 1001 configured to receive a copy operation on first content;
the security processing module 1002 is configured to, when a preset privacy condition is met, perform privacy protection processing on the first content to obtain a second content;
a first storage module 1003, configured to store the second content in a clipboard;
a first pasting module 1004, configured to, in a case that a first pasting operation is received, paste the second content in the clipboard in a first area, where the first area is an area associated with the first pasting operation.
Optionally, the data processing apparatus 1000 further includes:
and the second storage module is used for storing the first content to a preset storage area, wherein the preset storage area is a safe storage area with authority.
Optionally, the data processing apparatus 1000 further includes any one of:
the display module is used for displaying the first content in the preset storage area under the condition that the viewing operation of the first content is received;
the deleting module is used for deleting the first content in the preset storage area under the condition that a preset deleting condition is met;
and the second pasting module is used for pasting the first content in the preset storage area in a second area under the condition that a second pasting operation on the first content is received and user authorization is obtained, wherein the second area is an area associated with the second pasting operation.
Optionally, the preset deletion condition includes any one of:
receiving a paste operation on the first content;
receiving a paste operation on the second content;
the storage time of the first content in the preset storage area reaches a preset time;
a deletion operation for the first content is received.
Optionally, the preset privacy condition includes any one of:
the copy operation is a secure copy operation;
starting a safe copy mode;
the first content comprises private content.
Optionally, the security processing module 1002 includes:
the output unit is used for outputting a security risk prompt message box under the condition that the first content is identified to include private content, wherein the security risk prompt message box includes at least two security processing options, and the at least two security processing options include an automatic processing option and a manual processing option;
a first security processing unit configured to perform privacy protection processing on the identified private content in the first content in a case where a selection operation of the automatic processing option is received;
and the second safety processing unit is used for receiving the selection operation of the user on the target content in the first content and carrying out privacy protection processing on the target content under the condition of receiving the selection operation of the manual processing option.
The data processing device in the embodiment of the present application may be a device, or may be a component, an integrated circuit, or a chip in a terminal. The device can be mobile electronic equipment or non-mobile electronic equipment. By way of example, the mobile electronic device may be a mobile phone, a tablet computer, a notebook computer, a palm top computer, a vehicle-mounted electronic device, a wearable device, an ultra-mobile personal computer (UMPC), a netbook or a Personal Digital Assistant (PDA), and the like, and the non-mobile electronic device may be a server, a Network Attached Storage (NAS), a Personal Computer (PC), a Television (TV), a teller machine or a self-service machine, and the like, and the embodiments of the present application are not particularly limited.
The data processing apparatus in the embodiment of the present application may be an apparatus having an operating system. The operating system may be an Android (Android) operating system, an ios operating system, or other possible operating systems, and embodiments of the present application are not limited specifically.
The data processing apparatus provided in the embodiment of the present application can implement each process implemented by the data processing apparatus in the method embodiments of fig. 1 to fig. 9, and is not described here again to avoid repetition.
The data processing device in the embodiment of the application receives a copy operation of a first content; under the condition that a preset privacy condition is met, carrying out privacy protection processing on the first content to obtain second content; saving the second content to a clipboard; and in the case of receiving a first pasting operation, pasting the second content in the cutting board in a first area, wherein the first area is an area associated with the first pasting operation. Therefore, the copied content is subjected to privacy protection processing, the processed content is stored in the clipboard, and the processed content stored in the clipboard is pasted when being pasted, so that the privacy data in the original copied content can be prevented from being leaked through the clipboard, and the safety of the clipboard in the using process is improved.
Optionally, an embodiment of the present application further provides an electronic device, which includes a processor, a memory, and a program or an instruction stored in the memory and capable of running on the processor, where the program or the instruction is executed by the processor to implement each process of the data processing method embodiment, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here.
It should be noted that the electronic devices in the embodiments of the present application include the mobile electronic devices and the non-mobile electronic devices described above.
Fig. 11 is a schematic diagram of a hardware structure of an electronic device implementing an embodiment of the present application.
The electronic device 1100 includes, but is not limited to: a radio frequency unit 1101, a network module 1102, an audio output unit 1103, an input unit 1104, a sensor 1105, a display unit 1106, a user input unit 1107, an interface unit 1108, a memory 1109, a processor 1110, and the like.
Those skilled in the art will appreciate that the electronic device 1100 may further include a power source (e.g., a battery) for supplying power to the various components, and the power source may be logically connected to the processor 1110 via a power management system, so as to manage charging, discharging, and power consumption management functions via the power management system. The electronic device structure shown in fig. 11 does not constitute a limitation of the electronic device, and the electronic device may include more or less components than those shown, or combine some components, or arrange different components, and thus, the description is not repeated here.
Wherein, the user input unit 1107 is configured to receive a copy operation on the first content;
the processor 1110 is configured to perform privacy protection processing on the first content to obtain a second content when a preset privacy condition is met; saving the second content to a clipboard; and in the case of receiving a first pasting operation, pasting the second content in the cutting board in a first area, wherein the first area is an area associated with the first pasting operation.
Optionally, the processor 1110 is further configured to store the first content in a preset storage area, where the preset storage area is a secure storage area with a right.
Optionally, the processor 1110 is further configured to any one of:
displaying the first content in the preset storage area under the condition that the viewing operation of the first content is received;
deleting the first content in the preset storage area under the condition that a preset deletion condition is met;
and when a second pasting operation on the first content is received and user authorization is obtained, pasting the first content in the preset storage area in a second area, wherein the second area is an area associated with the second pasting operation.
Optionally, the preset deletion condition includes any one of:
receiving a paste operation on the first content;
receiving a paste operation on the second content;
the storage time of the first content in the preset storage area reaches a preset time;
a deletion operation for the first content is received.
Optionally, the preset privacy condition includes any one of:
the copy operation is a secure copy operation;
starting a safe copy mode;
the first content comprises private content.
Optionally, the processor 1110 is further configured to:
under the condition that the first content is identified to include private content, outputting a security risk prompt message box, wherein the security risk prompt message box includes at least two security processing options, and the at least two security processing options include an automatic processing option and a manual processing option;
performing privacy protection processing on the identified privacy content in the first content in the case of receiving a selection operation of the automatic processing option;
and receiving a selection operation of a user on target content in the first content and carrying out privacy protection processing on the target content under the condition of receiving the selection operation of the manual processing option.
The electronic device 1100 in the embodiment of the present application performs privacy protection processing on copied content, stores the processed content in the clipboard, and pastes the processed content stored in the clipboard when pasting, so that it is possible to avoid leakage of privacy data in the original copied content through the clipboard, and improve the security of the clipboard in the using process.
The embodiment of the present application further provides a readable storage medium, where a program or an instruction is stored on the readable storage medium, and when the program or the instruction is executed by a processor, the program or the instruction implements each process of the data processing method embodiment, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here.
The processor is the processor in the electronic device described in the above embodiment. The readable storage medium includes a computer readable storage medium, such as a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and so on.
The embodiment of the present application further provides a chip, where the chip includes a processor and a communication interface, the communication interface is coupled to the processor, and the processor is configured to execute a program or an instruction to implement each process of the data processing method embodiment, and can achieve the same technical effect, and the details are not repeated here to avoid repetition.
It should be understood that the chips mentioned in the embodiments of the present application may also be referred to as system-on-chip, system-on-chip or system-on-chip, etc.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element. Further, it should be noted that the scope of the methods and apparatus of the embodiments of the present application is not limited to performing the functions in the order illustrated or discussed, but may include performing the functions in a substantially simultaneous manner or in a reverse order based on the functions involved, e.g., the methods described may be performed in an order different than that described, and various steps may be added, omitted, or combined. In addition, features described with reference to certain examples may be combined in other examples.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present application may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present application.
While the present embodiments have been described with reference to the accompanying drawings, it is to be understood that the invention is not limited to the precise embodiments described above, which are meant to be illustrative and not restrictive, and that various changes may be made therein by those skilled in the art without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (10)

1. A data processing method, comprising:
receiving a copy operation of first content;
under the condition that a preset privacy condition is met, carrying out privacy protection processing on the first content to obtain second content;
saving the second content to a clipboard;
in the case of receiving a first pasting operation, pasting the second content in the cutting board in a first area, wherein the first area is an area associated with the first pasting operation;
after the receiving the copy operation on the first content, the method further comprises:
and storing the first content to a preset storage area, wherein the preset storage area is a safe storage area with authority.
2. The method according to claim 1, wherein after saving the first content to a preset storage area, the method further comprises any one of:
displaying the first content in the preset storage area under the condition that the viewing operation of the first content is received;
deleting the first content in the preset storage area under the condition that a preset deletion condition is met;
and when a second pasting operation on the first content is received and user authorization is obtained, pasting the first content in the preset storage area in a second area, wherein the second area is an area associated with the second pasting operation.
3. The method according to claim 2, wherein the preset deletion condition comprises any one of:
receiving a paste operation on the first content;
receiving a paste operation on the second content;
the storage time of the first content in the preset storage area reaches a preset time;
a deletion operation for the first content is received.
4. The method according to claim 1, wherein the preset privacy condition comprises any one of:
the copy operation is a secure copy operation;
starting a safe copy mode;
the first content comprises private content.
5. A data processing apparatus, comprising:
a receiving module, configured to receive a copy operation on first content;
the safety processing module is used for carrying out privacy protection processing on the first content under the condition that a preset privacy condition is met to obtain second content;
the first storage module is used for storing the second content into the clipboard;
a first pasting module, configured to, in a case that a first pasting operation is received, paste the second content in the clipboard in a first area, where the first area is an area associated with the first pasting operation;
the data processing apparatus further includes:
and the second storage module is used for storing the first content to a preset storage area, wherein the preset storage area is a safe storage area with authority.
6. The data processing apparatus of claim 5, further comprising any of:
the display module is used for displaying the first content in the preset storage area under the condition that the viewing operation of the first content is received;
the deleting module is used for deleting the first content in the preset storage area under the condition that a preset deleting condition is met;
and the second pasting module is used for pasting the first content in the preset storage area in a second area under the condition that a second pasting operation on the first content is received and user authorization is obtained, wherein the second area is an area associated with the second pasting operation.
7. The data processing apparatus according to claim 6, wherein the preset deletion condition comprises any one of:
receiving a paste operation on the first content;
receiving a paste operation on the second content;
the storage time of the first content in the preset storage area reaches a preset time;
a deletion operation for the first content is received.
8. The data processing apparatus according to claim 5, wherein the preset privacy condition includes any one of:
the copy operation is a secure copy operation;
starting a safe copy mode;
the first content comprises private content.
9. An electronic device comprising a processor, a memory and a program or instructions stored on the memory and executable on the processor, which program or instructions, when executed by the processor, implement the steps of the data processing method according to any one of claims 1-4.
10. A readable storage medium, characterized in that it stores thereon a program or instructions which, when executed by a processor, implement the steps of the data processing method according to any one of claims 1-4.
CN202010385645.7A 2020-05-09 2020-05-09 Data processing method and device and electronic equipment Active CN111581665B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010385645.7A CN111581665B (en) 2020-05-09 2020-05-09 Data processing method and device and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010385645.7A CN111581665B (en) 2020-05-09 2020-05-09 Data processing method and device and electronic equipment

Publications (2)

Publication Number Publication Date
CN111581665A CN111581665A (en) 2020-08-25
CN111581665B true CN111581665B (en) 2021-07-06

Family

ID=72117319

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010385645.7A Active CN111581665B (en) 2020-05-09 2020-05-09 Data processing method and device and electronic equipment

Country Status (1)

Country Link
CN (1) CN111581665B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112035878A (en) * 2020-08-31 2020-12-04 维沃移动通信(杭州)有限公司 Information display method and device and electronic equipment
CN112270004B (en) * 2020-10-28 2022-05-06 维沃移动通信有限公司 Content encryption method and device and electronic equipment
CN112287372B (en) * 2020-11-11 2023-05-26 三星电子(中国)研发中心 Method and apparatus for protecting clipboard privacy
CN114580006A (en) * 2020-11-30 2022-06-03 京东方科技集团股份有限公司 Resource access control method and electronic equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102609642A (en) * 2012-01-09 2012-07-25 中标软件有限公司 Clipboard control method and clipboard control system
CN105956464A (en) * 2016-04-25 2016-09-21 北京珊瑚灵御科技有限公司 Android platform-based clipboard control system and method
CN107220555A (en) * 2016-03-22 2017-09-29 中兴通讯股份有限公司 A kind of shear plate access control method and system
CN109117670A (en) * 2018-08-16 2019-01-01 海南新软软件有限公司 A kind of realization shear plate data encryption and decryption method, apparatus and hardware device
CN110262908A (en) * 2019-06-21 2019-09-20 珠海格力电器股份有限公司 A kind of processing method and processing device of shear plate data

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104361294B (en) * 2014-10-28 2017-08-25 深圳市大成天下信息技术有限公司 A kind of document protection method, equipment and system
US11113420B2 (en) * 2018-03-27 2021-09-07 Vmware, Inc. Policy based clipboard access
CN110309004A (en) * 2019-06-25 2019-10-08 维沃移动通信有限公司 The processing method and terminal of data

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102609642A (en) * 2012-01-09 2012-07-25 中标软件有限公司 Clipboard control method and clipboard control system
CN107220555A (en) * 2016-03-22 2017-09-29 中兴通讯股份有限公司 A kind of shear plate access control method and system
CN105956464A (en) * 2016-04-25 2016-09-21 北京珊瑚灵御科技有限公司 Android platform-based clipboard control system and method
CN109117670A (en) * 2018-08-16 2019-01-01 海南新软软件有限公司 A kind of realization shear plate data encryption and decryption method, apparatus and hardware device
CN110262908A (en) * 2019-06-21 2019-09-20 珠海格力电器股份有限公司 A kind of processing method and processing device of shear plate data

Also Published As

Publication number Publication date
CN111581665A (en) 2020-08-25

Similar Documents

Publication Publication Date Title
CN111581665B (en) Data processing method and device and electronic equipment
WO2016101384A1 (en) Dual-system switch based data security processing method and apparatus
US20170286321A1 (en) Dual-system-based data storage method and terminal
US9131374B1 (en) Knowledge-based authentication for restricting access to mobile devices
CN112804445B (en) Display method and device and electronic equipment
US9378344B2 (en) Method and apparatus for protecting information based on data card
CN106096425A (en) System permission starting method, device and equipment
CN106446632A (en) Hide display starting device and hide display starting method for application programs
CN102880560A (en) User privacy data protection method and mobile terminal using user privacy data protection method
CN104008346A (en) Method and device for starting privacy mode of data processing device
CN112580014A (en) Verification code obtaining method and device
CN112417420A (en) Information processing method and device and electronic equipment
CN112163239A (en) Privacy information protection method and device and electronic equipment
CN112035878A (en) Information display method and device and electronic equipment
CN112533072A (en) Image sending method and device and electronic equipment
CN111917628A (en) Message processing method and device and electronic equipment
CN112887922B (en) Message sending method and electronic equipment
CN113965614A (en) Session creation method and device and electronic equipment
CN112235412B (en) Message processing method and device
CN112016080A (en) Application authority management method and device and electronic equipment
CN112270004B (en) Content encryption method and device and electronic equipment
CN113138675B (en) Information display method and device and electronic equipment
CN113312662A (en) Message processing method and device and electronic equipment
CN112134987B (en) Information processing method and device and electronic equipment
CN111565382B (en) Transmission method and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant