CN112463402A - Clipboard control method and system based on macOS operating system - Google Patents

Clipboard control method and system based on macOS operating system Download PDF

Info

Publication number
CN112463402A
CN112463402A CN202011212170.8A CN202011212170A CN112463402A CN 112463402 A CN112463402 A CN 112463402A CN 202011212170 A CN202011212170 A CN 202011212170A CN 112463402 A CN112463402 A CN 112463402A
Authority
CN
China
Prior art keywords
clipboard
software
content
control
control function
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011212170.8A
Other languages
Chinese (zh)
Inventor
戴剑勇
谢永胜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Vamtoo Information Safety Technology Co ltd
Original Assignee
Zhejiang Vamtoo Information Safety Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Vamtoo Information Safety Technology Co ltd filed Critical Zhejiang Vamtoo Information Safety Technology Co ltd
Priority to CN202011212170.8A priority Critical patent/CN112463402A/en
Publication of CN112463402A publication Critical patent/CN112463402A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogram communication
    • G06F9/543User-generated data transfer, e.g. clipboards, dynamic data exchange [DDE], object linking and embedding [OLE]

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a method and a system for controlling a shear plate based on a macOS operating system, wherein the method comprises the following steps: pre-establishing at least one credit granting software directory, and acquiring at least one of a software process name, a software unique identification code and a software signature of credit granting software; pre-establishing a credit content directory; establishing a safety control function configuration file, and storing the safety control function configuration file; acquiring a clipboard service process of a macOS operating system, and injecting a control module and a safety control function configuration file into the clipboard service process; the control module replaces a process communication function in the shear plate service process with a safety control function according to a safety control function configuration file; and when the clipboard service is called, executing the clipboard control operation according to the safety control function.

Description

Clipboard control method and system based on macOS operating system
Technical Field
The invention relates to the field of computers, in particular to a clipboard control method and a clipboard control system based on a macOS operating system.
Background
At present, the file content is leaked by copying or cutting by using a cutting board of a system, and then pasting the copied file content to communication software to cause a leakage accident, such as a leakage accident caused by copying to qq or WeChat. However, since there is no security control system for the clipboard within the macOS operating system, it is easy to cause a compromise of the file contents at the time of copy-and-paste.
Disclosure of Invention
One of the objectives of the present invention is to provide a clipboard control method and system based on a macOS operating system, where the clipboard control method and system set a security control function and use the security control function to replace a process communication function in a clipboard process of the macOS operating system, so as to directly call the security control function in starting a clipboard operation, and control the clipboard operation according to the logic of the security control function, thereby ensuring that the clipboard operation is safe and controllable.
The invention also aims to provide a clipboard control method and system based on a macOS operating system, wherein the method and system identify whether the clipboard is trusted software by pre-constructing a trusted software directory and acquiring at least one of a software process name, a software unique identification code and a software signature, and respectively execute clipboard control operations with different security levels according to the trusted software and non-trusted software.
The invention also aims to provide a clipboard control method and a clipboard control system based on a macOS operating system, wherein the method and the system pre-construct a credit content directory, acquire character contents to be pasted when pasting operation is carried out, compare the character contents with the contents in the credit content directory, and prohibit the pasting operation of the character contents if the same or similar character contents exist.
Another object of the present invention is to provide a clipboard control method and system based on a macOS operating system, which further determine whether the copied or pasted contents are from trusted software when the copied or pasted operation is performed, and further determine that the copied or pasted contents are trusted contents if the copied or pasted contents are from the trusted software.
Another object of the present invention is to provide a clipboard control method and system based on a macOS operating system, where the method and system control the copy and paste operation of the clipboard in a software and content cooperative manner, and the method can avoid the copy and paste operation of a single software control or a single content control in some specific scenes, and has high adaptability and practicability.
In order to achieve at least one of the above objects, the present invention further provides a clipboard control method based on a macOS operating system, comprising the steps of:
pre-establishing at least one credit software directory, and acquiring and storing at least one of a software process name, a software unique identification code and a software signature of the credit software;
pre-establishing a credit content directory;
establishing a safety control function configuration file, and storing the safety control function configuration file;
acquiring a clipboard service process of a macOS operating system, and injecting a control module and a safety control function configuration file into the clipboard service process;
the control module replaces a process communication function in the shear plate service process with a safety control function according to a safety control function configuration file;
and when the clipboard service is called, executing the clipboard control operation according to the safety control function.
According to one preferred embodiment of the present invention, the shear plate control operation comprises the steps of: and acquiring a software process name, a software unique identification code and a software signature of calling the clipboard service, comparing the software process name, the software unique identification code and the software signature with a pre-established credit granting software directory, judging that the software calling the clipboard service is credit granting software if any one of the software process name, the software unique identification code and the software signature exists, and executing a first clipboard control operation or a second clipboard control operation by the safety control function according to the identified software.
According to one preferred embodiment of the present invention, the cut content is obtained, the cut content is compared with the pre-established credit contents, if the same content exists in the credit contents directory, the cut content is determined to be the credit content, and the security control function executes the third clipboard control operation or the fourth clipboard control operation according to the identified cut content.
According to one preferred embodiment of the present invention, the first shear plate controlling operation includes the operations of:
if the software calling the clipboard service is judged to be the credit granting software, allowing any content in the credit granting software to execute cutting, copying and pasting operations to any software according to the safety control function.
According to a preferred embodiment of the present invention, the second shear plate controlling operation comprises the steps of:
and if the software calling the clipboard service is judged to be non-trusted software, prohibiting any content of any non-trusted software from being cut, copied and pasted to any software according to the safety control function.
According to a preferred embodiment of the present invention, the third shear plate controlling operation comprises the steps of: and if the identified cut content is the credit granting content, allowing the credit granting content to be pasted to credit granting software and/or non-credit granting software according to the security control function.
According to one preferred embodiment of the present invention, the fourth shear plate controlling operation comprises the steps of: and if the identified cut content is the non-trusted content, prohibiting the non-trusted content from being pasted to trusted software and/or non-trusted software according to a safety control function.
According to one preferred embodiment of the present invention, when there is a copy behavior, the control module obtains the copy content through the clipboard control process, and allows or prohibits the copy content from caching data in the clipboard of the macOS operating system according to the security control function.
According to a preferred embodiment of the present invention, when there is a paste behavior, the control module obtains the paste instruction through the clipboard communication process, and further allows or prohibits obtaining the cache data of the clipboard of the macOS operating system according to the security function.
To implement at least one of the above inventions, the present invention further provides a clipboard control system based on a macOS operating system, the system comprising:
the judging module is used for judging whether the clipboard operation object is the credit granting software or not and whether the clipboard operation content belongs to the credit granting content or not;
a control module that stores a security control function;
the receiving module is used for acquiring a copying instruction, a cutting instruction and a pasting instruction and inputting the instructions into the control module;
the shear plate control service module is used for injecting the control module into a shear plate control process;
the control module is injected into a clipboard control process of the macOS operating system, and a control instruction is output according to the credit granting information and the safety control function by acquiring the credit granting information of the judgment module.
Drawings
FIG. 1 is a flowchart illustrating a preferred embodiment of a clipboard control method based on a macOS operating system according to the present invention;
FIG. 2 is a diagram of a preferred embodiment of the copy logic of the security control function in the present invention;
FIG. 3 is a diagram of a preferred embodiment of the security function control number paste logic of the present invention;
FIG. 4 is a schematic diagram of a clipboard control system based on a macOS operating system according to the present invention;
FIG. 5 is a schematic diagram showing the operation of the control module of the present invention.
Detailed Description
The following description is presented to disclose the invention so as to enable any person skilled in the art to practice the invention. The preferred embodiments in the following description are given by way of example only, and other obvious variations will occur to those skilled in the art. The basic principles of the invention, as defined in the following description, may be applied to other embodiments, variations, modifications, equivalents, and other technical solutions without departing from the spirit and scope of the invention.
It will be understood by those skilled in the art that in the present disclosure, the terms "longitudinal," "lateral," "upper," "lower," "front," "rear," "left," "right," "vertical," "horizontal," "top," "bottom," "inner," "outer," and the like are used in an orientation or positional relationship indicated in the drawings for ease of description and simplicity of description, and do not indicate or imply that the referenced devices or components must be in a particular orientation, constructed and operated in a particular orientation, and thus the above terms are not to be construed as limiting the present invention.
It is understood that the terms "a" and "an" should be interpreted as meaning that a number of one element or element is one in one embodiment, while a number of other elements is one in another embodiment, and the terms "a" and "an" should not be interpreted as limiting the number.
Referring to fig. 1 to 5, the present invention provides a clipboard control method and system based on a macOS operating system, where the system includes a clipboard control service module, a control module configured in advance is injected into a clipboard control process by the clipboard control service module, a security control function is preset, the security control function executes corresponding logic instructions according to different scenes, the clipboard control service module obtains a configuration file of the security control function, and injects the configuration file of the security control function into the clipboard control process in a remote manner, and further, the control module replaces a process communication function, i.e., an xpc function, in the clipboard control process by using a HOOK manner according to the configuration file of the security control function. Therefore, the clipboard control process includes the processing logic of the safety control function, and when a certain condition is met, the control module executes the corresponding processing logic according to the safety control function.
For example, when the macOS operating system is started, the clipboard control service module reads a security control function in the configuration of the security control function, and injects the security control function into a clipboard control process (pboard) of the macOS operating system itself, and further replaces an inter-process communication function in the clipboard control process with the security control function through the control module, and the clipboard process of the macOS operating system itself can directly call the injected security control function to execute a clipboard operation. The control module obtains a software process name, a software unique identification code and a software signature of running software in the system and is used for judging whether the software belongs to trusted software.
It should be noted that the clipboard service control module establishes a credit software directory and a credit content directory in advance, the security control function executes related clipboard operations according to the credit software and the credit content, specifically, by establishing at least one of a software process name, a software unique identification code and a software signature of the credit software, and storing the credit software feature value list in the security control function, when the software runs, the control module obtains at least one of the software process name, the software unique identification code and a software feature value in the software signature through inter-clipboard control process communication in the macOS operating system, and further compares the software process name, the software unique identification code and the software feature value in the software signature with the credit software feature value list in the security control function, so as to judge the credit information of the running software. The clipboard operation is further performed according to a safety control function.
The safety control function executes operations including but not limited to a first clipboard operation, a second clipboard operation, a third clipboard operation and a fourth clipboard operation according to the information of the credit granting software and the information of the credit granting content, wherein when the control module acquires the software characteristic value and judges the software characteristic value as the credit granting software, the safety control function further executes the first clipboard operation according to the safety control function:
if the software calling the clipboard service is judged to be the credit granting software, allowing any content in the credit granting software to execute cutting, copying and pasting operations to any software according to the safety control function.
The first shear plate operation specifically comprises: obtaining copy or cut content in the running software, obtaining a software characteristic value by the control module, comparing the communication between the control processes of the clipboards in the macOS operating system with a credit software characteristic value in the security control function, judging that the running software is the credit software if the same software characteristic value exists, allowing the copy or cut content in the credit software to be stored in a cache in the control processes of the clipboards by the security control function after the running software is judged to be the credit software by the security control function, and allowing the control module to obtain the copy or cut content of the cache when executing the paste operation so as to further complete the paste operation.
The second shear plate operation comprises: and if the software calling the clipboard service is judged to be non-trusted software, prohibiting any content of any non-trusted software from being cut, copied and pasted to any software according to the safety control function.
Wherein the second shear plate specifically operates to include: the method comprises the steps of obtaining copy or cut contents in running software, obtaining a software characteristic value by a control module, comparing the software characteristic value with a credit software characteristic value through communication between control processes of a clipboard in a macOS operating system, judging that the software is non-credit software if the same characteristic value does not exist, and after the safety control function judges that the running software is the non-credit software, prohibiting the copy or cut contents in the software from being stored in a cache in the control process of the clipboard by the safety control function, or prohibiting the control module from obtaining the copy or cut contents of the cache when executing a paste operation, and finishing the operation of prohibiting copy or paste, so that the condition that any contents in the non-credit software cannot be copied, cut and pasted can be ensured.
The third shear plate operation comprises: and if the identified copied or cut content is the credit granting content, allowing the credit granting content to be pasted to credit granting software and/or non-credit granting software according to the security control function.
The third shear plate operation specifically comprises: obtaining copy or cut content, comparing the obtained copy or cut content with the credit content in the security control function through communication between the control processes of the clipboards in the macOS operating system by the control module, if the same content exists, judging that the copy or cut content is the credit content, and after judging that the copy or cut content is the credit content by the security control function, allowing the copy or cut content in the software to be stored in a cache in the control processes of the clipboards by the security control function, and when a paste operation is executed, allowing the control module to obtain the copy or cut content of the cache to further complete the paste operation.
The fourth shear plate operation comprises: and if the identified cut content is the non-trusted content, prohibiting the non-trusted content from being pasted to trusted software and/or non-trusted software according to a safety control function.
The fourth shear plate operation specifically comprises:
obtaining copy or cut content, comparing the obtained copy or cut content with the credit content in the security control function through communication between the control processes of the clipboards in the macOS operating system by the control module, if the same content does not exist, judging that the copy or cut content is non-credit content, and after judging that the copy or cut content is non-credit content by the security control function, prohibiting the copy or cut content in the software from being stored in a cache in the control processes of the clipboards by the security control function, or when a paste operation is executed, prohibiting the copy or cut content of the cache from being obtained by the control module by the security control function, and further prohibiting the paste operation.
It should be noted that, in another preferred embodiment of the present invention, the non-trusted contents list data is optionally created and is transmitted to the clipboard control process in the macOS operating system through the clipboard control service module, so that it is possible to control the non-trusted contents to perform the clipboard operation by determining whether the cut or copied contents belong to the non-trusted contents, and if the cut or copied contents belong to the non-trusted contents. In this embodiment, the copying and pasting of the specific file or specific character can be controlled to avoid divulgence, and the trusted content can be logically determined by determining whether the content is in the trusted software, and if the content belongs to the corresponding trusted software, the copied and cut content can be directly determined to be the trusted content.
It should be noted that, in the above embodiment, the first clipboard operation, the second clipboard operation, the third clipboard operation, and the fourth clipboard operation are executed separately, and in another preferred embodiment of the present invention, after the determination by the credit software in the first clipboard is completed, the security control function further determines whether the copied and cut content belongs to the credit content, and if so, the third clipboard operation or the fourth clipboard operation is executed further; or after the second clipboard operation is completed to judge the non-trusted software, the third clipboard or the fourth clipboard operation is further executed, in the embodiment, the clipboard can be effectively controlled to copy, cut and paste contents between the trusted software and the non-trusted software, so that the content security can be guaranteed and the fluency of content transmission can be considered at the same time.
For example, referring to fig. 5, the software characteristic values of the software A, B, C, D are respectively obtained through inter-process communication of the clipboard control, whether the software in the software A, B, C, D is trusted software is determined, if the software a and B are determined as trusted software, and the software C and D are non-trusted software, after the security control function obtains the copy and cut content and determines as trusted content, the security control function may execute a third clipboard operation on the software a according to the security control function, where the third clipboard operation may be specifically preset to allow clipboard operation to the non-trusted software, and therefore, the content in the software a may be copied, cut, and pasted into the software C or D. Or if the content copied or cut in the software B obtained according to the security control function is non-trusted content, the security control function executes a fourth clipboard operation on the software B, where the fourth clipboard operation may be specifically preset to prohibit the clipboard operation on the non-trusted software, so that the non-trusted content in the software B cannot be copied, cut, and pasted into the software C or D.
In particular, according to the embodiments of the present disclosure, the processes described above with reference to the flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method illustrated in the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network via the communication section, and/or installed from a removable medium. The computer program, when executed by a Central Processing Unit (CPU), performs the above-described functions defined in the method of the present application. It should be noted that the computer readable medium mentioned above in the present application may be a computer readable signal medium or a computer readable storage medium or any combination of the two. The computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wire segments, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present application, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In this application, however, a computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless section, wire section, fiber optic cable, RF, etc., or any suitable combination of the foregoing.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
It will be understood by those skilled in the art that the embodiments of the present invention described above and illustrated in the drawings are given by way of example only and not by way of limitation, the objects of the invention having been fully and effectively achieved, the functional and structural principles of the present invention having been shown and described in the embodiments, and that various changes or modifications may be made in the embodiments of the present invention without departing from such principles.

Claims (10)

1. A clipboard control method based on a macOS operating system is characterized by comprising the following steps:
pre-establishing at least one credit software directory, and acquiring and storing at least one of a software process name, a software unique identification code and a software signature of the credit software;
pre-establishing a credit content directory;
establishing a safety control function configuration file, and storing the safety control function configuration file;
acquiring a clipboard service process of a macOS operating system, and injecting a control module and a safety control function configuration file into the clipboard service process;
the control module replaces a process communication function in the shear plate service process with a safety control function according to a safety control function configuration file;
and when the clipboard service is called, executing the clipboard control operation according to the safety control function.
2. The macOS operating system-based clipboard control method of claim 1, wherein said clipboard control operation comprises the steps of: and acquiring a software process name, a software unique identification code and a software signature of calling the clipboard service, comparing the software process name, the software unique identification code and the software signature with a pre-established credit granting software directory, judging that the software calling the clipboard service is credit granting software if any one of the software process name, the software unique identification code and the software signature exists, and executing a first clipboard control operation or a second clipboard control operation by the safety control function according to the identified software.
3. The macOS-operating-system-based clipboard control method of claim 1, wherein the clipboard control method comprises obtaining the clipboard content, comparing the clipboard content with pre-established credit content, determining the clipboard content as the credit content if the same content exists in the credit content directory, and the security control function performing a third clipboard control operation or a fourth clipboard control operation according to the identified clipboard content.
4. The macOS operating system-based clipboard control method of claim 2, wherein the first clipboard control operation comprises the operations of:
if the software calling the clipboard service is judged to be the credit granting software, allowing any content in the credit granting software to execute cutting, copying and pasting operations to any software according to the safety control function.
5. The macOS operating system-based clipboard control method of claim 2, wherein said second clipboard control operation comprises the steps of:
and if the software calling the clipboard service is judged to be non-trusted software, prohibiting any content of any non-trusted software from being cut, copied and pasted to any software according to the safety control function.
6. The macOS operating system-based clipboard control method of claim 3, wherein said third clipboard control operation comprises the steps of: and if the identified cut content is the credit granting content, allowing the credit granting content to be pasted to credit granting software and/or non-credit granting software according to the security control function.
7. The macOS operating system-based clipboard control method of claim 3, wherein the fourth clipboard control operation comprises the steps of: and if the identified cut content is the non-trusted content, prohibiting the non-trusted content from being pasted to trusted software and/or non-trusted software according to a safety control function.
8. The macOS-operating-system-based clipboard control method of claim 1, wherein when there is a copy behavior, the control module obtains the copy content through a clipboard control process, and allows or prohibits the copy content from caching data in the macOS-operating-system clipboard according to the security control function.
9. The macOS-OS-based clipboard control method of claim 1, wherein when there is a paste behavior, the control module obtains the paste instruction through a clipboard communication process, and further allows or prohibits obtaining the macOS-OS clipboard cache data according to a security function.
10. A clipboard control system based on a macOS operating system, the system comprising:
the judging module is used for judging whether the clipboard operation object is the credit granting software or not and whether the clipboard operation content belongs to the credit granting content or not;
a control module that stores a security control function;
the receiving module is used for acquiring a copying instruction, a cutting instruction and a pasting instruction and inputting the instructions into the control module;
the shear plate control service module is used for injecting the control module into a shear plate control process;
the control module is injected into a clipboard control process of the macOS operating system, and a control instruction is output according to the credit granting information and the safety control function by acquiring the credit granting information of the judgment module.
CN202011212170.8A 2020-11-03 2020-11-03 Clipboard control method and system based on macOS operating system Pending CN112463402A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011212170.8A CN112463402A (en) 2020-11-03 2020-11-03 Clipboard control method and system based on macOS operating system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011212170.8A CN112463402A (en) 2020-11-03 2020-11-03 Clipboard control method and system based on macOS operating system

Publications (1)

Publication Number Publication Date
CN112463402A true CN112463402A (en) 2021-03-09

Family

ID=74835021

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011212170.8A Pending CN112463402A (en) 2020-11-03 2020-11-03 Clipboard control method and system based on macOS operating system

Country Status (1)

Country Link
CN (1) CN112463402A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113778714A (en) * 2021-09-13 2021-12-10 北京技德系统技术有限公司 Linux-compatible Android-compatible shear plate sharing method and device
CN114356614A (en) * 2022-03-17 2022-04-15 北京蔚领时代科技有限公司 Shear plate data isolation method and device

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101101621A (en) * 2007-07-10 2008-01-09 北京鼎信高科信息技术有限公司 Method for monitoring windows system clipboard through windows system service
CN103605930A (en) * 2013-11-27 2014-02-26 湖北民族学院 Double file anti-divulging method and system based on HOOK and filtering driving
CN103995990A (en) * 2014-05-14 2014-08-20 江苏敏捷科技股份有限公司 Method for preventing electronic documents from divulging secrets
CN104239764A (en) * 2014-10-15 2014-12-24 北京奇虎科技有限公司 Terminal device and system function management and control method and device of terminal device
CN104680079A (en) * 2015-02-04 2015-06-03 上海信息安全工程技术研究中心 Electronic document security management system and electronic document security management method
CN105956464A (en) * 2016-04-25 2016-09-21 北京珊瑚灵御科技有限公司 Android platform-based clipboard control system and method
CN106203111A (en) * 2016-07-04 2016-12-07 北京金山安全软件有限公司 Method and device for preventing clipboard data from being modified and terminal equipment
WO2017162081A1 (en) * 2016-03-22 2017-09-28 中兴通讯股份有限公司 Method and system for controlling access to clipboard, and storage medium
CN111539010A (en) * 2020-06-16 2020-08-14 北京明朝万达科技股份有限公司 Clipboard control method and device, electronic equipment and computer-readable storage medium
CN111753263A (en) * 2020-06-22 2020-10-09 浙江华途信息安全技术股份有限公司 Non-inductive encryption and decryption method based on macOS system

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101101621A (en) * 2007-07-10 2008-01-09 北京鼎信高科信息技术有限公司 Method for monitoring windows system clipboard through windows system service
CN103605930A (en) * 2013-11-27 2014-02-26 湖北民族学院 Double file anti-divulging method and system based on HOOK and filtering driving
CN103995990A (en) * 2014-05-14 2014-08-20 江苏敏捷科技股份有限公司 Method for preventing electronic documents from divulging secrets
CN104239764A (en) * 2014-10-15 2014-12-24 北京奇虎科技有限公司 Terminal device and system function management and control method and device of terminal device
CN104680079A (en) * 2015-02-04 2015-06-03 上海信息安全工程技术研究中心 Electronic document security management system and electronic document security management method
WO2017162081A1 (en) * 2016-03-22 2017-09-28 中兴通讯股份有限公司 Method and system for controlling access to clipboard, and storage medium
CN105956464A (en) * 2016-04-25 2016-09-21 北京珊瑚灵御科技有限公司 Android platform-based clipboard control system and method
CN106203111A (en) * 2016-07-04 2016-12-07 北京金山安全软件有限公司 Method and device for preventing clipboard data from being modified and terminal equipment
CN111539010A (en) * 2020-06-16 2020-08-14 北京明朝万达科技股份有限公司 Clipboard control method and device, electronic equipment and computer-readable storage medium
CN111753263A (en) * 2020-06-22 2020-10-09 浙江华途信息安全技术股份有限公司 Non-inductive encryption and decryption method based on macOS system

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113778714A (en) * 2021-09-13 2021-12-10 北京技德系统技术有限公司 Linux-compatible Android-compatible shear plate sharing method and device
CN113778714B (en) * 2021-09-13 2024-01-09 北京技德系统技术有限公司 Shared shear plate method and device compatible with Android for Linux
CN114356614A (en) * 2022-03-17 2022-04-15 北京蔚领时代科技有限公司 Shear plate data isolation method and device

Similar Documents

Publication Publication Date Title
CN106330958B (en) Secure access method and device
CN103744686B (en) Control method and the system of installation is applied in intelligent terminal
CN103324506A (en) Method and mobile phone for controlling installation of Android applications
CN112463402A (en) Clipboard control method and system based on macOS operating system
US20190174302A1 (en) Data backup method, storage medium and electronic device
US20160292437A1 (en) Technique for data loss prevention for a cloud sync application
CN105426748A (en) Rule file updating method and device
CN115935321B (en) Method, device and storage medium for accessing algorithm library
CN113239386A (en) API (application program interface) permission control method and device
CN111259460B (en) Locking state information display method and device
CN113688618A (en) Custom form-based field permission editing method and system
CN110990798B (en) Application program permission configuration method and device, electronic equipment and storage medium
CN105468941B (en) Authority control method and device
CN106919812B (en) Application process authority management method and device
CN107633174B (en) User input management method and device and terminal
CN107368738A (en) A kind of anti-Root method and devices of smart machine
CN106843917B (en) Driver loading method and device
CN112347468A (en) Memory data updating method, device, equipment and storage medium
CN107292614A (en) Pay class application management method, device and mobile terminal
CN111125744B (en) Code branch merging method, system, computer device and readable storage medium
CN108875396B (en) File operation method, USIM card, terminal and readable storage medium
CN102467622B (en) Method and device for monitoring opened file
CN106022105B (en) A kind of command processing method and device
CN106603625B (en) Data protection method and device
CN111125793B (en) Trusted verification method and system for object memory in access control

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination