CN108205631A - A kind of content copying methods and device - Google Patents
A kind of content copying methods and device Download PDFInfo
- Publication number
- CN108205631A CN108205631A CN201711443566.1A CN201711443566A CN108205631A CN 108205631 A CN108205631 A CN 108205631A CN 201711443566 A CN201711443566 A CN 201711443566A CN 108205631 A CN108205631 A CN 108205631A
- Authority
- CN
- China
- Prior art keywords
- storage space
- application
- content
- clipboard
- event
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 56
- 238000012544 monitoring process Methods 0.000 claims abstract description 21
- 230000010076 replication Effects 0.000 claims description 10
- 230000001960 triggered effect Effects 0.000 abstract description 17
- 238000003825 pressing Methods 0.000 description 7
- 238000005520 cutting process Methods 0.000 description 4
- 230000006870 function Effects 0.000 description 4
- 238000010586 diagram Methods 0.000 description 3
- 238000006467 substitution reaction Methods 0.000 description 2
- 238000004590 computer program Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000008447 perception Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/54—Interprogram communication
- G06F9/543—User-generated data transfer, e.g. clipboards, dynamic data exchange [DDE], object linking and embedding [OLE]
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Storage Device Security (AREA)
Abstract
A kind of content copying methods and device, to prevent from copying to the content in the first application in other applications, the control event that will not be triggered to user's long-press device screen impacts.This method includes:It monitors the entry event of the first application and exits event;When listening to when exiting event of first application, the first content in shear plate memory space is saved in corresponding first memory space of first application, and empty the shear plate memory space;When the entry event for monitoring first application, the first content in the described first corresponding first memory space of application is saved in the shear plate memory space.
Description
Technical Field
The present invention relates to the field of communications, and in particular, to a content replication method and apparatus.
Background
With the popularization of intelligent terminals, the office work in a mode of carrying a Device (BYOD) by itself is more and more widely applied. BYOD means that office software of many companies is installed on a user's own terminal device so that the user can use company resources to work without being limited by time, place, equipment, personnel, network environment, and the like.
Office software of a company is generally installed on terminal equipment such as a personal computer, a mobile phone, a tablet computer and the like in an application form. In order to ensure the data security of mobile office, it is necessary to ensure that enterprise data such as text and pictures in office applications are not pasted into other applications installed on a terminal device through the copy function of the device.
In order to prevent the protected enterprise data in office applications from being pasted into other applications through the copy function of the device, the currently commonly adopted method is as follows: the user is prohibited from triggering a control event of the device by long pressing the screen of the device. However, since the control event of the device triggered by long pressing the device screen includes not only copying but also other functions such as selecting, sharing, collecting, reminding, deleting, downloading, adding to mail, etc., if the method of triggering the event of the device by long pressing the device screen by the user to prevent the contents from being copied to each other between the applications is prohibited, other control events are also prohibited.
Disclosure of Invention
The invention provides a content copying method and a content copying device, which are used for preventing content in a protected application from being copied into other applications and cannot influence a control event triggered by a user pressing a device screen for a long time.
In a first aspect, a method for content replication is provided, the method comprising:
monitoring an entry event and an exit event of a first application;
when an exit event of the first application is monitored, storing first content in a clipboard storage space into a first storage space corresponding to the first application, and emptying the clipboard storage space;
when an entry event of the first application is monitored, the first content in the first storage space corresponding to the first application is saved in the clipboard storage space.
In a second aspect, there is provided a content copying apparatus, the apparatus comprising:
the monitoring module is used for monitoring an entry event and an exit event of the first application;
the first saving module is used for saving the first content in the clipboard storage space to the first storage space corresponding to the first application and emptying the clipboard storage space when the quit event of the first application is monitored;
and the first assignment module is used for saving the first content in the first storage space corresponding to the first application into the clipboard storage space when monitoring the entry event of the first application.
In the embodiment of the invention, by monitoring the entry event and the exit event of the first application, when the exit event of the first application is monitored, the first content in the clipboard storage space is stored in the first storage space corresponding to the first application, and the clipboard storage space is emptied, that is, the content in the clipboard is emptied, so that the content in the first application is ensured not to be copied into the second application; when the first application entering event is monitored, the first content in the first storage space corresponding to the first application is stored in the clipboard storage space, so that the user can realize the copying of the content in the same first application, the content in the first application is prevented from being copied into the second application, and other control events triggered by the user pressing the device screen for a long time cannot be influenced.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings required in the description of the embodiments of the present invention or the prior art will be briefly introduced below. It should be apparent that the drawings in the following description are merely some of the embodiments described in the present invention, and that other drawings may be obtained by those skilled in the art from these drawings.
Fig. 1 is a schematic flow chart of a content replication method according to an embodiment of the present invention;
fig. 2 is a flowchart illustrating a content replication method according to a second embodiment of the present invention;
fig. 3 is a flowchart illustrating a content replication method according to a third embodiment of the present invention;
fig. 4 is a schematic structural diagram of a content copying apparatus according to a fourth embodiment of the present invention;
fig. 5 is a schematic structural diagram of a content copying apparatus according to a fifth embodiment of the present invention.
Detailed Description
In the related art, a method for prohibiting a user from copying contents in a protected application to other applications is provided, which empties a clipboard storage space when a page in the application is closed or when the page in the application is shifted from a foreground operation to a background operation, so that the contents displayed in the page cannot be copied to other places. Although the method can prevent the content in the application from being copied to the second application, the content in different pages in the same application cannot be copied with each other. Meanwhile, when the user copies content from the second application a and pastes the content into the second application B, if the user opens the first application before pasting the content into the application B, even if the copy or cut operation of the content is not performed in the first application, when the first application is closed, the content in the second application a stored in the clipboard storage space is emptied, and the content in the second application a cannot be pasted into the second application B, and the copy or cut operation needs to be performed again in the second application a, which affects user experience.
Different from the prior art, the embodiment of the invention monitors the entry event and the exit event of the first application, and when the exit event of the first application is monitored, the first content in the clipboard storage space is stored in the first storage space corresponding to the first application, and the clipboard storage space is cleared, so that the content in the first application cannot be copied to the second application; when the first application entering event is monitored, the first content in the first storage space corresponding to the first application is stored in the clipboard storage space, so that the user can realize the copying of the content in the same first application, the content in the first application is prevented from being copied into the second application, and other control events triggered by the user pressing the device screen for a long time cannot be influenced.
In order to make the aforementioned objects, features and advantages of the present invention comprehensible, embodiments accompanied with figures are described in detail below.
Fig. 1 is a schematic flow chart of a content copying method according to an embodiment of the present invention. In the embodiment of the present invention, the main body responsible for executing the content copying method may be the terminal device installed with the first application, or may be the first application. The method is described below with an execution subject as a terminal device, and includes the following steps:
s101: and monitoring an entry event and an exit event of the first application.
In this embodiment, the first application is a content-protected application, i.e., the content in the first application cannot be copied to other applications; the second application is an application whose content is not protected, i.e. the content in the second application can be copied to other applications.
Here, the entry event of the first application may include the following cases:
in one case, the first application enters the active state from the inactive state. Optionally, at this time, a human-computer interaction interface of the first application may be displayed to the user; or,
another situation may be that the first application is already started at this time, and it is monitored that the first application enters the foreground running state from the background running state, that is, it is considered that an entry event of the first application is detected. The two situations are collectively called as a first application entry in the invention.
The exit event may include the following: in one case, the first application enters a complete exit state from a foreground running state; or,
in another case, the first application enters the background running state from the foreground running state, and the two cases are collectively referred to as the exit of the first application in the present invention.
S102: when the exit event of the first application is monitored, the first content in the clipboard storage space is stored in the first storage space corresponding to the first application, and the clipboard storage space is emptied.
In a specific implementation, the clipboard storage space is a storage space provided by the operating system of the terminal device for temporarily storing the copied content or the cut content for the copy event and the cut event. The first storage space is a storage space provided by the operating system of the terminal device for the first application, and is used for temporarily storing the first content copied or cut by the user from the first application.
The first content is the content which is copied to the clipboard storage space by a user through triggering a copy event or a cut event, and comprises text, pictures and the like which can be copied.
Here, the first content in the clipboard storage space may be saved to the first storage space corresponding to the first application in the following manner:
when the terminal device monitors the exit event of the first application, whether the first content exists in the storage space of the clipboard is detected by detecting whether a copy event or a cut event is triggered after the first application is monitored to enter the terminal device for the last time and before the first application exits the terminal device for the next time.
For example, if the first content is: "ABCDEFG", then the first content saved to the first storage space is also "ABCDEFG".
Optionally, after the first content is saved in the first storage space, a data identifier may be added to the first storage space, where the data identifier is used to indicate that the first content is in the first storage space.
Correspondingly, if the first content does not exist in the clipboard storage space at this time, a data identifier for indicating that the first storage space is empty is added to the first storage space.
For example, the data added to the first storage space indicating that the first storage space is empty is identified as "null", and the data added to the first storage space indicating that the first content is stored in the first storage space is identified as "full".
In particular, with respect to the above-described embodiments,
if the detection is after the first application is monitored to enter for the last time, and a copy event or a cut event is triggered before the first application exits for the last time, the first content in the clipboard storage space is saved into the first storage space.
Once the storage event or the cutting event is triggered, the first content is necessarily stored in the clipboard storage space, so that when the replication event or the cutting event is triggered is monitored, the first content in the clipboard storage space at the moment only needs to be stored in the first storage space.
For example, if the first content is: "1234567", then the first content stored in the first storage space is also "1234567".
If the copy event or the cut event is not triggered after the last monitoring of the first application entry event and before the first application exit event this time, it is considered that no operation is required on the clipboard storage space at this time.
In another optional embodiment, when the first content in the clipboard storage space is saved in the first storage space, a data identifier may be further added to the first storage space, where the data identifier is used to indicate that the first content is in the first storage space.
And if the first content does not exist in the clipboard storage space at the moment, adding a data identifier for indicating that the first storage space is empty to the first storage space.
For example, the data added to the first storage space indicating that the first storage space is empty is identified as "null", and the data added to the first storage space indicating that the first content is stored in the first storage space is identified as "full".
In another alternative embodiment, in practice, not all content in a first application can be copied to a second application, for example, content in a certain first application includes: enterprise technical data, enterprise product data; the enterprise technical data cannot be copied to the second application as the technical secret, and the enterprise product data is information to be distributed to the public and can be copied to the second application, so that the content in the first application is selectively prevented from being copied to the second application. At this time, when an exit event of the first application is monitored, storing the first content in the clipboard storage space into the first storage space corresponding to the first application, and when the clipboard storage space is emptied, when the exit event of the first application is monitored, acquiring security configuration information corresponding to the first content;
and if the security configuration information indicates that the first content cannot be acquired by the second application, storing the first content in the clipboard storage space into the first storage space corresponding to the first application, and clearing the clipboard storage space.
In a specific implementation, the security configuration corresponding to the first content is set by the application at the time of installation. For first content which cannot be copied to a second application, the corresponding security configuration information is used for indicating that the first content cannot be acquired by the second application; for the first content which can be copied to the second application, the corresponding security configuration information is used for indicating that the first content can be acquired by the second application.
Therefore, when a quit event of the first application is detected, the security configuration information corresponding to the first content is acquired first, and when the security configuration information corresponding to the first content indicates that the first content cannot be acquired by the second application, the first content in the clipboard storage space is stored in the first storage space corresponding to the first application, and the clipboard storage space is emptied. If the security configuration information corresponding to the first content indicates that the first content can be acquired by the second application, the clipboard is kept unchanged.
S103: when an entry event of a first application is monitored, first content in a first storage space corresponding to the first application is saved in a clipboard storage space.
Here, the monitored entry event of the first application is an entry event after the last monitoring of the exit event of the first application. If the first application is installed and the first application is monitored for the entering event, the first content in the first storage space does not need to be saved in the clipboard storage space because the first content does not exist in the first storage space.
When the method is implemented, the first content in the first storage space corresponding to the first application may be saved in the clipboard storage space in the following manner.
When the terminal device monitors an entry event of the first application, whether the first content is stored in the current first storage space is detected. If the first content is stored in the first storage space at this time, the first content is stored in the clipboard storage space.
For example, if it is detected that the first content "keldhxwisjds" is stored in the first storage space, the first content "keldhxwisjds" is copied to the clipboard storage space.
And if the first content is not stored in the current first storage space, namely no content is stored in the current first storage space, the clipboard is not processed.
Here, it should be noted that, when detecting whether the first content is currently stored in the first storage space, whether the first content is currently stored in the first storage space may be detected by accessing the first storage space to detect whether the first content is currently stored in the first storage space. The method of detecting the data identifier of the first storage space to indicate that the first storage space has the first content or indicate that the first storage space is empty may also be adopted to detect whether the first content is currently stored in the first storage space.
In the content copying method provided by the embodiment of the invention, by monitoring an entry event and an exit event of a first application, when the exit event of the first application is monitored, first content in a clipboard storage space is stored in a first storage space corresponding to the first application, and the clipboard storage space is emptied, so that the content in the first application cannot be copied into a second application; when the first application entering event is monitored, the first content in the first storage space corresponding to the first application is stored in the clipboard storage space, so that the user can realize the copying of the content in the same first application, the content in the first application is prevented from being copied into the second application, and other control events triggered by the user pressing the device screen for a long time cannot be influenced.
Fig. 2 is a schematic flow chart of another content copying method according to a second embodiment of the present invention. On the basis of the above embodiment, in the content copying method provided by the embodiment of the present invention:
s201: before saving the first content in the first storage space corresponding to the first application to the clipboard storage space, the method further includes: and saving the second content of the second application in the clipboard storage space to a second storage space corresponding to the second application.
In a specific implementation, the second storage space is a storage space provided by an operating system of the terminal device for an application other than the first application. The second storage space is used for temporarily storing second content copied or cut by the user from the second application.
Here, it is to be noted that, in one terminal apparatus, a plurality of content-protected applications and a plurality of content-unprotected applications may be installed; optionally, each content-protected application is uniquely associated with a first storage space; the plurality of content unprotected applications have a second storage space in common.
And storing the second content of the second application in the clipboard storage space into a second storage space corresponding to the second application, wherein the second content can be executed when the second application exits or when an entry event of the first application is monitored.
When the terminal device monitors the entry event of the first application, any one of the following methods may be adopted to store the second content of the second application in the clipboard storage space into the second storage space corresponding to the second application.
I, detecting whether second content exists in the clipboard storage space by accessing the clipboard storage space; or,
and II, detecting whether the second content exists in the storage space of the clipboard by detecting whether a copy event or a cut event is triggered after the first application is monitored to exit for the last time and before the first application enters for the next time.
Specifically, in the above embodiment (i), after the exit event of the content-protected first application is monitored, the first content in the clipboard storage space is stored in the first storage space corresponding to the first application, and the clipboard is emptied, so that after the first application exits and before the next entry of the first application, if the memory exists in the clipboard storage space, the content of the second application whose content is not protected is stored. And if the second content exists in the clipboard storage space at the moment, saving the second content in the clipboard storage space to the second storage space.
For example, if the second content is: "ABCDEFG", then the second content saved to the second storage space is also "ABCDEFG".
Optionally, after the second content in the clipboard storage space is saved in the second storage space, a data identifier may be added to the second storage space, where the data identifier is used to indicate that the second storage space has the second content.
Correspondingly, if the second content does not exist in the clipboard storage space at this time, a data identifier for indicating that the second storage space is empty is added to the second storage space.
For example, the data added to the second storage space indicating that the second storage space is empty is identified as "null", and the data added to the second storage space indicating that the second content is stored in the second storage space is identified as "full".
Specifically, in the above embodiment (II),
(1) if a copy event or a cut event is triggered before the first application enters this time, the second content in the clipboard storage space is saved to the second storage space.
Since the second content is inevitably stored in the clipboard storage space once the storage event or the clipping event is triggered when the user uses the second application, when the copy event or the clipping event is triggered, it is only necessary to store the second content in the clipboard storage space into the second storage space.
For example, if the second content is: "1234567", then the second content stored in the second storage space is also "1234567".
If a copy event or a cut event is not triggered before the last monitoring of the first application entry, then it is assumed that no operations are required on clipboard storage.
Or,
(2) and if the condition that the copying event or the cutting event is triggered before the first application is monitored to enter is detected, storing the second content in the clipboard storage space into the second storage space, and adding two data identifications for the second storage space, wherein the data identifications are used for indicating that the first content exists in the second storage space.
And if the second content does not exist in the clipboard storage space at the moment, adding a data identifier for indicating that the second storage space is empty to the second storage space.
For example, the data added to the second storage space indicating that the second storage space is empty is identified as "null", and the data added to the second storage space indicating that the second content is stored in the second storage space is identified as "full".
S202: when the exit event of the first application is monitored, the first content in the clipboard storage space is stored in the first storage space corresponding to the first application, and after the clipboard storage space is emptied, the second content in the second storage space corresponding to the second application is stored in the clipboard storage space.
In a specific implementation, the following manner may be adopted to store the second content in the second storage space corresponding to the second application into the clipboard storage space.
And when the terminal equipment monitors the exit event of the first application, detecting whether the second content is stored in the current second storage space. And if the second content is stored in the second storage space at the moment, storing the second content into the clipboard storage space.
For example, if it is detected that the second content "keldhxwisjds" is stored in the second storage space, the second content "keldhxwisjds" is copied to the clipboard storage space.
And if the second content is not stored in the current second storage space, namely no content is stored in the current second storage space, the clipboard is not processed.
Here, it should be noted that, when detecting whether the second content is currently stored in the second storage space, whether the second content is currently stored in the second storage space may be detected by accessing the second storage space to detect whether the first content is currently stored in the second storage space. The method of detecting the data identifier of the second storage space to indicate that the second storage space has the second content or indicate that the second storage space is empty may also be adopted to detect whether the second content is currently stored in the second storage space.
By adopting the embodiment, after the first application is monitored to enter, the second content in the clipboard storage space is stored in the second storage space corresponding to the second application; and when the exit event of the first application is monitored, storing second content in a second storage space corresponding to the second application into the clipboard storage space, so that the clipboard storage space can be restored to a state before the first application is opened. When the content in the second application a is copied to the second application B, if the user opens the first application before pasting the content to the application B, when the first application is closed, the clipboard storage space is also restored to the state before opening the first application, so that the content to be copied to the second application B does not need to be copied or cut again from the second application a, and the pasting is directly performed in the second application B, thereby improving the user's perception.
In addition, in another optional embodiment, in the step S201, after the second content of the second application in the clipboard storage space is stored in the second storage space corresponding to the second application, the clipboard storage space may be emptied, so that the second content of the second application cannot be copied into the first application, and the first application and the second application are completely isolated, that is, the content in the first application cannot be copied into the second application, and the content in the second application cannot be copied into the first application.
In another embodiment of the present invention, in order to prevent a second application from accessing a first storage space corresponding to a first application to obtain a first content after saving the first content in the first storage space, the method further includes, after saving the first content in the clipboard storage space in the first storage space corresponding to the first application:
encrypting the first content in the first storage space;
saving the first content in the first storage space corresponding to the first application to the clipboard storage space, including:
and decrypting the first content in the first storage space and storing the first content in the clipboard storage space.
In this way, it can be ensured that only the first application can obtain the first content in the first storage space. And because the first content is encrypted, even if a second application accesses the first storage space and obtains the encrypted first content from the first storage space, the encrypted first content cannot be decrypted, and thus the first content cannot be obtained.
In another alternative embodiment, when installing an application, an application protection list may be configured in a configuration file of the application, and when recognizing that an application of the same vendor is installed, an identification of the application may be added to the application protection list. Applications that are in the same application protection list may allow copying of content to each other.
For example, if a third application is also installed in the terminal device. When the first application and the third application belong to the same enterprise manufacturer, the two application identifications can be added to the same application protection list, and the first application and the third application are allowed to copy contents mutually.
When the third application does not belong to the same vendor, the first application and the third application are not added to the same application protection list, and mutual content copying between the first application and the third application is not allowed.
In the content replication method provided in the embodiment of the present invention, after monitoring an entry event of a first application, the method further includes: and detecting whether the first application and the third application are in the same application protection list, and if the first application and the third application are in the same application protection list, storing the contents stored in the third storage space and the first storage space for a later time into the clipboard storage space.
In one embodiment, the first application and the third application each have their own storage space, and when an exit event of the first application is detected, the content in the clipboard is copied to the first storage space, and when an exit event of the third application is detected, the content in the clipboard is copied to the third storage space. The first storage space and the third storage space are isolated from each other. In order to realize that the contents between the two applications can be copied with each other, the contents stored in the two storage spaces can be restored to the clipboard.
In the alternative, it is possible to,
and if the first application and the third application are in the same application protection list, the third storage space corresponding to the third application and the first storage space corresponding to the first application are the same storage space. By the embodiment, the content of the application belonging to the same manufacturer can be copied mutually.
Referring to fig. 3, a third embodiment of the present invention further provides a content replication method, where the method includes:
s301: an entry event and an exit event of the first application are monitored.
S302: and when the entry event of the first application is monitored, storing the content A corresponding to the second application in the clipboard storage space into the space A.
S303: the shear plate is emptied. Step 303 is an optional operation, and contents copied or cut by other applications may be brought into the first application through the clipboard without clearing the clipboard. If step S303 is not performed, S304 is performed after S302 is performed.
S304: in the running process of the first application, a user executes a cutting operation or a copying operation, and the content B to be copied or cut is stored in the clipboard storage space.
S305: and when the exit event of the first application is monitored, storing the corresponding content B in the first application in the clipboard storage space into the space B.
S306: the shear plate is emptied.
S307: and saving the content A corresponding to the second application saved in the space A into the clipboard storage space to restore the state of the clipboard storage space before S302.
By the method, the first application and the second application can be divided, so that the first application can be isolated from the second application, the content of the second application cannot be copied into the first application, and the content of the first application cannot be copied into the second application.
In addition, in another optional embodiment, the content replication method provided by the present invention may further include:
monitoring an exit event of the first application;
when the exit event of the first application is monitored, the first content in the clipboard storage space is stored in the first storage space corresponding to the first application, and the clipboard storage space is emptied.
And when the entering event of the first application is monitored, the second content in the storage space of the clipboard is not saved in the second storage space, and the clipboard is not emptied.
Or, when the entry event of the first application is monitored, the clipboard will not be emptied although the second content in the clipboard storage space will be saved to the second storage space.
In this way, copying of content in the second application into the first application may be achieved.
Based on the same inventive concept, the embodiment of the present invention further provides a content copying method apparatus corresponding to the content copying method, and as the principle of the apparatus in the embodiment of the present invention for solving the problem is similar to the content copying method described above in the embodiment of the present invention, the implementation of the apparatus may refer to the implementation of the method, and repeated details are not described again.
As shown in fig. 4, a content copying apparatus provided in the fourth embodiment of the present invention is applied to a terminal device, and includes:
a monitoring module 41, configured to monitor an entry event and an exit event of the first application;
the first saving module 42 is configured to, when an exit event of the first application is monitored, save the first content in the clipboard storage space to the first storage space corresponding to the first application, and clear the clipboard storage space;
and the first assignment module 43 is configured to, when an entry event of the first application is monitored, store the first content in the first storage space corresponding to the first application into the clipboard storage space.
Optionally, the apparatus further comprises: a second saving module 44, configured to save the second content of the second application in the clipboard storage space to the second storage space corresponding to the second application before saving the first content in the first storage space corresponding to the first application to the clipboard storage space;
the second assignment module 45 is configured to, when an exit event of the first application is monitored, store the first content in the clipboard storage space into the first storage space corresponding to the first application, and after the clipboard storage space is cleared, store the second content in the second storage space corresponding to the second application into the clipboard storage space.
Optionally, the first saving module 44 is further configured to: and after the second content of the second application in the clipboard storage space is stored in the second storage space corresponding to the second application, the clipboard storage space is emptied.
Optionally, the first assigning module 43 is further configured to detect whether the first application and the third application are in the same application protection list after an entry event of the first application is monitored, and applications of the same vendor are in the same application protection list;
if the first application and the third application are in the same application protection list, saving the content with the later saving time in the third storage space and the first storage space corresponding to the third application into the clipboard storage space, or,
and if the first application and the third application are in the same application protection list, the third storage space corresponding to the third application and the first storage space corresponding to the first application are the same storage space.
Optionally, the first saving module 42 is specifically configured to: detecting whether first content exists in a clipboard storage space;
if the first content exists in the clipboard storage space, storing the first content in the clipboard storage space into the first storage space, and adding a data identifier for indicating that the first storage space has the first content;
and if the first content does not exist in the clipboard storage space, adding a data identifier for indicating that the first storage space is empty to the first storage space.
Optionally, the first saving module 42 is further configured to encrypt the first content in the first storage space after saving the first content in the clipboard storage space into the first storage space corresponding to the first application;
and the first assignment module is specifically used for decrypting the first content in the first storage space and then storing the first content in the clipboard storage space.
Optionally, the first saving module 42 is specifically configured to: when an exit event of the first application is monitored, security configuration information corresponding to the first content is acquired;
and if the security configuration information indicates that the first content cannot be acquired by the second application, storing the first content in the clipboard storage space into the first storage space corresponding to the first application, and clearing the clipboard storage space.
As shown in fig. 5, which is a schematic diagram of a content copying apparatus according to a fifth embodiment of the present invention, the content copying apparatus 50 includes: a processor 51, a memory 52 and a bus 53, wherein the memory 52 stores execution instructions, and when the device is operated, the processor 51 communicates with the memory 52 via the bus 53, and the processor 51 executes the following execution instructions stored in the memory 52:
monitoring an entry event and an exit event of a first application;
when an exit event of the first application is monitored, storing first content in the clipboard storage space into a first storage space corresponding to the first application, and emptying the clipboard storage space;
when an entry event of a first application is monitored, first content in a first storage space corresponding to the first application is saved in a clipboard storage space.
Optionally, the processor 51 is further configured to save the first content in the first storage space corresponding to the first application to the clipboard storage space, and the method further includes: storing second content of a second application in the clipboard storage space into a second storage space corresponding to the second application;
then, when an exit event of the first application is monitored, after saving the first content in the clipboard storage space to the first storage space corresponding to the first application and emptying the clipboard storage space, the method further includes: and saving the second content in the second storage space corresponding to the second application into the clipboard storage space.
Optionally, after saving the second content of the second application in the clipboard storage space to the second storage space corresponding to the second application, the processor 51 is further configured to: the clipboard storage space is emptied.
Optionally, the processor 51 is further configured to, after monitoring an entry event of the first application, further include:
detecting whether the first application and the third application are in the same application protection list or not, wherein the applications of the same manufacturer are in the same application protection list;
if the first application and the third application are in the same application protection list, saving the content with the later saving time in the third storage space and the first storage space corresponding to the third application into the clipboard storage space, or,
and if the first application and the third application are in the same application protection list, the third storage space corresponding to the third application and the first storage space corresponding to the first application are the same storage space.
Optionally, the processor 51 is specifically configured to detect whether the first content exists in the clipboard storage space;
if the first content exists in the clipboard storage space, storing the first content in the clipboard storage space into the first storage space, and adding a data identifier for indicating that the first storage space has the first content;
and if the first content does not exist in the clipboard storage space, adding a data identifier for indicating that the first storage space is empty to the first storage space.
Optionally, the processor 51 is further configured to encrypt the first content in the first storage space after saving the first content in the clipboard storage space into the first storage space corresponding to the first application; when the first content in the first storage space corresponding to the first application is stored in the clipboard storage space, the first content in the first storage space is decrypted and then stored in the clipboard storage space.
Optionally, the processor 51 is specifically configured to: when an exit event of the first application is monitored, security configuration information corresponding to the first content is acquired;
and if the security configuration information indicates that the first content cannot be acquired by the second application, storing the first content in the clipboard storage space into the first storage space corresponding to the first application, and clearing the clipboard storage space.
The method for content copying apparatus and the computer program product of the apparatus provided in the embodiments of the present invention include a computer readable storage medium storing a program code, where instructions included in the program code may be used to execute the method in the foregoing method embodiments, and specific implementation may refer to the method embodiments, and details are not described herein again.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the system and the apparatus described above may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and all the changes or substitutions should be covered within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.
Claims (10)
1. A method for content replication, the method comprising:
monitoring an entry event and an exit event of a first application;
when an exit event of the first application is monitored, storing first content in a clipboard storage space into a first storage space corresponding to the first application, and emptying the clipboard storage space;
when an entry event of the first application is monitored, the first content in the first storage space corresponding to the first application is saved in the clipboard storage space.
2. The method of claim 1,
before saving the first content in the first storage space corresponding to the first application to the clipboard storage space, the method further comprises: saving second content of a second application in the clipboard storage space to a second storage space corresponding to the second application;
when the exit event of the first application is monitored, after the first content in the clipboard storage space is saved in the first storage space corresponding to the first application and the clipboard storage space is emptied, the method further includes: saving the second content in the second storage space corresponding to the second application to the clipboard storage space.
3. The method of claim 2, wherein after saving the second content of the second application in the clipboard storage space to the second storage space corresponding to the second application, further comprising: emptying the clipboard storage space.
4. The method of claim 1, wherein after monitoring the entry event of the first application, further comprising:
detecting whether the first application and the third application are in the same application protection list or not, wherein the applications of the same manufacturer are in the same application protection list;
if the first application and the third application are in the same application protection list, saving the third storage space corresponding to the third application and the content with the later saving time in the first storage space into the clipboard storage space, or,
and if the first application and the third application are in the same application protection list, the third storage space corresponding to the third application and the first storage space corresponding to the first application are the same storage space.
5. The method according to claim 1, wherein saving the first content in the clipboard storage space to the first storage space corresponding to the first application comprises:
detecting whether the first content exists in the clipboard storage space;
if the first content exists in the clipboard storage space, storing a first internal part in the clipboard storage space into the first storage space, and adding a data identifier for indicating that the first storage space has the first content to the first storage space;
and if the first content does not exist in the clipboard storage space, adding a data identifier for indicating that the first storage space is empty to the first storage space.
6. A content copying apparatus, characterized in that the apparatus comprises:
the monitoring module is used for monitoring an entry event and an exit event of the first application;
the first saving module is used for saving the first content in the clipboard storage space to the first storage space corresponding to the first application and emptying the clipboard storage space when the quit event of the first application is monitored;
and the first assignment module is used for saving the first content in the first storage space corresponding to the first application into the clipboard storage space when monitoring the entry event of the first application.
7. The apparatus of claim 6, further comprising:
a second saving module, configured to save a second content of a second application in the clipboard storage space to a second storage space corresponding to the second application before saving the first content in the first storage space corresponding to the first application to the clipboard storage space;
the second assignment module is configured to, when an exit event of the first application is monitored, store the first content in the clipboard storage space into the first storage space corresponding to the first application, and after the clipboard storage space is emptied, store the second content in the second storage space corresponding to the second application into the clipboard storage space.
8. The apparatus according to claim 7, wherein the second saving module is further configured to empty the clipboard storage space after saving the second content of the second application in the clipboard storage space into the second storage space corresponding to the second application.
9. The apparatus of claim 6, wherein the first assignment module is further configured to detect whether the first application and the third application are in a same application protection list after an entry event of the first application is monitored, and applications of a same vendor are in a same application protection list;
if the first application and the third application are in the same application protection list, saving the third storage space corresponding to the third application and the content with the later saving time in the first storage space into the clipboard storage space, or,
and if the first application and the third application are in the same application protection list, the third storage space corresponding to the third application and the first storage space corresponding to the first application are the same storage space.
10. The apparatus of claim 6, wherein the first saving module is specifically configured to: detecting whether the first content exists in the clipboard storage space;
if the first content exists in the clipboard storage space, storing a first internal part in the clipboard storage space into the first storage space, and adding a data identifier for indicating that the first storage space has the first content to the first storage space;
and if the first content does not exist in the clipboard storage space, adding a data identifier for indicating that the first storage space is empty to the first storage space.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711443566.1A CN108205631A (en) | 2017-12-27 | 2017-12-27 | A kind of content copying methods and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711443566.1A CN108205631A (en) | 2017-12-27 | 2017-12-27 | A kind of content copying methods and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108205631A true CN108205631A (en) | 2018-06-26 |
Family
ID=62605945
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711443566.1A Pending CN108205631A (en) | 2017-12-27 | 2017-12-27 | A kind of content copying methods and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108205631A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112416622A (en) * | 2020-11-26 | 2021-02-26 | 江苏通付盾信息安全技术有限公司 | Clipboard data protection method and device, computer equipment and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102043927A (en) * | 2010-12-29 | 2011-05-04 | 北京深思洛克软件技术股份有限公司 | Computer system for data divulgence protection |
CN104268479A (en) * | 2014-09-29 | 2015-01-07 | 北京奇虎科技有限公司 | Text operation isolating method, device and mobile terminal |
CN105956464A (en) * | 2016-04-25 | 2016-09-21 | 北京珊瑚灵御科技有限公司 | Android platform-based clipboard control system and method |
US20160306964A1 (en) * | 2015-04-14 | 2016-10-20 | Avecto Limited | Computer device and method for isolating untrusted content on a clipboard |
CN107220555A (en) * | 2016-03-22 | 2017-09-29 | 中兴通讯股份有限公司 | A kind of shear plate access control method and system |
-
2017
- 2017-12-27 CN CN201711443566.1A patent/CN108205631A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102043927A (en) * | 2010-12-29 | 2011-05-04 | 北京深思洛克软件技术股份有限公司 | Computer system for data divulgence protection |
CN104268479A (en) * | 2014-09-29 | 2015-01-07 | 北京奇虎科技有限公司 | Text operation isolating method, device and mobile terminal |
US20160306964A1 (en) * | 2015-04-14 | 2016-10-20 | Avecto Limited | Computer device and method for isolating untrusted content on a clipboard |
CN107220555A (en) * | 2016-03-22 | 2017-09-29 | 中兴通讯股份有限公司 | A kind of shear plate access control method and system |
CN105956464A (en) * | 2016-04-25 | 2016-09-21 | 北京珊瑚灵御科技有限公司 | Android platform-based clipboard control system and method |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112416622A (en) * | 2020-11-26 | 2021-02-26 | 江苏通付盾信息安全技术有限公司 | Clipboard data protection method and device, computer equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20200280540A1 (en) | Network containment of compromised machines | |
EP3374922B1 (en) | Systems and methods for protecting backed-up data from ransomware attacks | |
EP2551786B1 (en) | Efficient securing of data on mobile devices | |
CN104102882B (en) | Protection method and device for privacy data of application program | |
US11750623B2 (en) | System and method for conducting a detailed computerized surveillance in a computerized environment | |
WO2016101384A1 (en) | Dual-system switch based data security processing method and apparatus | |
US11100241B2 (en) | Virtual trap protection of data elements | |
CN109117664B (en) | Access control method and device for application program | |
CN106971120B (en) | Method and device for realizing file protection and computing equipment | |
EP3014515B1 (en) | Systems and methods for directing application updates | |
US10735468B1 (en) | Systems and methods for evaluating security services | |
CN108334404B (en) | Application program running method and device | |
CN112417484A (en) | Resource file protection method and device, computer equipment and storage medium | |
CN111259382A (en) | Malicious behavior identification method, device and system and storage medium | |
CN108959917A (en) | A kind of method, apparatus, equipment and the readable storage medium storing program for executing of Email detection | |
CN116305290A (en) | System log security detection method and device, electronic equipment and storage medium | |
US10616245B2 (en) | Real-time remediation respective of security incidents | |
CN109446847B (en) | Configuration method of dual-system peripheral resources, terminal equipment and storage medium | |
CN113779562A (en) | Zero trust based computer virus protection method, device, equipment and medium | |
US9785775B1 (en) | Malware management | |
CN108205631A (en) | A kind of content copying methods and device | |
CN115952491B (en) | Method, device, electronic equipment and medium for hook objective function | |
CN104408376A (en) | File protection method, equipment and system | |
US8037537B1 (en) | System, method, and computer program product for conditionally securing data stored on a peripheral device coupled to a system, based on a state of the system | |
JP2017204173A (en) | Data protection program, data protection method, and data protection system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180626 |