CN112507361A - Electronic document encryption method for domestic operating system - Google Patents
Electronic document encryption method for domestic operating system Download PDFInfo
- Publication number
- CN112507361A CN112507361A CN202011460739.2A CN202011460739A CN112507361A CN 112507361 A CN112507361 A CN 112507361A CN 202011460739 A CN202011460739 A CN 202011460739A CN 112507361 A CN112507361 A CN 112507361A
- Authority
- CN
- China
- Prior art keywords
- technology
- editing software
- software
- operating system
- documents
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 58
- 238000005516 engineering process Methods 0.000 claims abstract description 117
- 238000011161 development Methods 0.000 claims abstract description 48
- 238000012544 monitoring process Methods 0.000 claims abstract description 31
- 238000004590 computer program Methods 0.000 claims description 10
- 238000002347 injection Methods 0.000 claims description 8
- 239000007924 injection Substances 0.000 claims description 8
- 235000019129 pluma Nutrition 0.000 claims description 6
- 235000019070 pluma del Caribe Nutrition 0.000 claims description 6
- 230000006378 damage Effects 0.000 claims description 4
- 230000005540 biological transmission Effects 0.000 claims description 3
- 244000276444 pluma Species 0.000 claims description 3
- 239000000243 solution Substances 0.000 description 9
- 230000006870 function Effects 0.000 description 6
- 230000008569 process Effects 0.000 description 6
- 238000004891 communication Methods 0.000 description 4
- 238000012545 processing Methods 0.000 description 4
- 230000008901 benefit Effects 0.000 description 3
- 230000007246 mechanism Effects 0.000 description 3
- 238000010586 diagram Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000001737 promoting effect Effects 0.000 description 2
- 230000027455 binding Effects 0.000 description 1
- 238000009739 binding Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000000605 extraction Methods 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 230000004807 localization Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000002085 persistent effect Effects 0.000 description 1
- 244000291751 pluma del Caribe Species 0.000 description 1
- 230000008054 signal transmission Effects 0.000 description 1
- 230000009870 specific binding Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F40/00—Handling natural language data
- G06F40/10—Text processing
- G06F40/166—Editing, e.g. inserting or deleting
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Bioethics (AREA)
- Artificial Intelligence (AREA)
- Audiology, Speech & Language Pathology (AREA)
- Computational Linguistics (AREA)
- Document Processing Apparatus (AREA)
Abstract
The invention provides an electronic document encryption method for a domestic operating system, which comprises the following steps: for different types of character editing software under a domestic operating system, injecting the character editing software by adopting a hook technology; monitoring the operation of windows corresponding to all documents in the text editing software by combining one of an X11 graphical interface development technology, a gtk graphical interface development technology and a JNI technology according to the type of the text editing software; and acquiring a target document of the closed window, and forcibly encrypting the target document. The electronic document encryption method for the domestic operating system can be used for forcibly encrypting documents generated by office software on the domestic operating system, an operator does not need to do manual operation for a part, misoperation is avoided, and office efficiency is improved.
Description
Technical Field
The invention relates to the technical field of computers, in particular to an electronic document encryption method for a domestic operating system.
Background
With the increase of domestic operating systems in the security-related industry year by year, the requirement for document office under the domestic operating systems is increased greatly, the document office under the corresponding domestic operating systems is increased gradually, no effective forced encryption protection method is provided, and due to improper protection and misoperation, more and more security divulgence events are caused.
At present, office document files under the national systems of the confidential industry, such as the standardized kylin, the standardized Galaxy kylin, the standardized Cucubeb, the standardized deep system and the like, have no effective mandatory encryption protection measures, and only the manual active encryption is carried out by each software system to ensure the protection mode of the documents, the automatic active encryption can not be carried out after the documents are subjected to office operation, and each document operated by an operator can not be automatically encrypted and protected.
Therefore, a method for forcibly encrypting an electronic document for a domestic operating system is needed.
Disclosure of Invention
The invention provides an electronic document encryption method for a domestic operating system, which is used for overcoming the defect that each electronic document cannot be automatically encrypted in the prior art and realizing automatic and forced encryption of the electronic document.
The invention provides an electronic document encryption method for a domestic operating system, which comprises the following steps:
for different types of character editing software under a domestic operating system, injecting the character editing software by adopting a hook technology;
monitoring the operation of windows corresponding to all documents in the text editing software by combining one of an X11 graphical interface development technology, a gtk graphical interface development technology and a JNI technology according to the type of the text editing software;
and acquiring a target document of the closed window, and forcibly encrypting the target document.
According to the electronic document encryption method for the domestic operating system provided by the invention, the operation of windows corresponding to all documents in the text editing software is monitored by combining one of an X11 graphical interface development technology, a gtk graphical interface development technology and a JNI technology according to the type of the text editing software, and the method comprises the following steps:
if the text editing software is Jinshan WPS software, acquiring X11 attributes of windows corresponding to all documents by utilizing an X11 technology;
and monitoring the X11 attribute of the window by a hook technology, thereby monitoring the operation of the window corresponding to all the documents in the text editing software.
The invention provides an electronic document encryption method for a domestic operating system, wherein the step of acquiring a target document of a closed window comprises the following steps:
and acquiring the target document according to the X11 attribute of the closed window.
The invention provides an electronic document encryption method for a domestic operating system, which monitors the operation of windows corresponding to all documents in the text editing software by combining one of an X11 graphical interface development technology, a gtk graphical interface development technology and a JNI technology according to the type of the text editing software, and comprises the following steps:
if the character editing software is the office software for ever, monitoring windows of all documents by using corresponding plug-ins;
when the document is closed, the JNI technology returns to the hook technology, so that all documents are monitored by the hook technology.
The invention provides an electronic document encryption method for a domestic operating system, which monitors the operation of windows corresponding to all documents in the text editing software by combining one of an X11 graphical interface development technology, a gtk graphical interface development technology and a JNI technology according to the type of the text editing software, and comprises the following steps:
and if the text editing software is text editor software, acquiring X11 attributes of windows corresponding to all documents by using an X11 technology, so as to monitor the operation of the windows corresponding to all the documents in the text editing software.
The invention provides an electronic document encryption method for a domestic operating system, wherein the step of acquiring a target document of a closed window comprises the following steps:
and determining the target document from all documents through the transmission of the gtk signal and the destruction of the gtk container.
According to the electronic document encryption method for the domestic operating system, the text editor software is a pluma or a gedit.
The invention also provides an electronic document encryption system for the domestic operating system, which comprises the following components:
the injection module is used for injecting the character editing software by adopting a hook technology for different types of character editing software under a domestic operating system;
the monitoring module is used for monitoring the operation of windows corresponding to all documents in the text editing software by combining one of an X11 graphical interface development technology, a gtk graphical interface development technology and a JNI technology according to the type of the text editing software;
and the encryption module is used for acquiring the target document of the closed window and forcibly encrypting the target document.
The invention also provides an electronic device, which comprises a memory, a processor and a computer program stored on the memory and capable of running on the processor, wherein the processor executes the program to realize the steps of the electronic document encryption method for the domestic operating system.
The present invention also provides a non-transitory computer readable storage medium having stored thereon a computer program which, when executed by a processor, implements the steps of the method for encrypting an electronic document for a domestic operating system as described in any one of the above.
The electronic document encryption method for the domestic operating system can be used for forcibly encrypting documents generated by office software on the domestic operating system, an operator does not need to do partial manual operation, misoperation is avoided, and office efficiency is improved; the method plays a promoting role in improving the risk resistance of enterprise infrastructure and information systems; the safety of key information infrastructure and important information systems is guaranteed, and the safety of business systems of enterprises and public institutions is improved comprehensively; the safety guarantee capability of key infrastructure and an important information system is further enhanced; good demonstration effect is brought to the interior of an enterprise, so that the competitiveness of the enterprise is improved; the demonstration function can be expanded to the whole IT industry, and huge social benefits are generated.
Drawings
In order to more clearly illustrate the technical solutions of the present invention or the prior art, the drawings needed for the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and those skilled in the art can also obtain other drawings according to the drawings without creative efforts.
FIG. 1 is a flowchart of an electronic document encryption method for a domestic operating system according to the present invention;
FIG. 2 is a second flowchart of an electronic document encryption method for a domestic operating system according to the present invention;
FIG. 3 is a schematic structural diagram of an electronic document encryption system for a domestic operating system according to the present invention;
fig. 4 is a schematic physical structure diagram of an electronic device provided in the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention clearer, the technical solutions of the present invention will be clearly and completely described below with reference to the accompanying drawings, and it is obvious that the described embodiments are some, but not all embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In order to ensure information security, prevent information leakage of each process node in the use of a document and conform to the localization trend of a secret-related user, an electronic document protection technology is designed, and automatic forced encryption is guaranteed to be carried out at the end of the document in the whole operation period process of the document.
In order to support the automatic forced encryption processing of editable electronic documents under the domestic operating system, the following problems need to be solved:
the method solves the problem of how to automatically and forcibly encrypt, and accurately identifies the closed document operation window of the user operating the Jinshan WPS software, the Yongzhong Office software and the text editor (the Pluma software under the winning bid kylin system and the Yin river kylin system and the gedit software under the Zhongkoidyu system) and forcibly and actively encrypts the document when the user closes the document operation window after the user operates the document Office software by using the Office software on the premise that the document Office software of the existing Jinshan WPS software, the Yongzhong Office software and the text editor software is not modified.
The method solves the fundamental problems that how to correspondingly adapt and support different Office software in a domestic operating system, the realization of each software has larger difference, for example, Jinshan WPS software is realized by adopting Qt development, Yongzhong Office software is realized by adopting java, a pluma editor and a gedit editor are developed by adopting gtk, and the identification of closing of the window of the Office document of each software and the identification of the opened document are problems.
The embodiment of the invention provides an electronic document encryption method for a domestic operating system, which comprises the following steps of:
110, for different types of character editing software under a domestic operating system, injecting the character editing software by adopting a hook technology;
in the existing domestic operating system, the domestic operating system comprises the winning numbers kylin, Galaxy kylin and Chinese Korea, the used Office software comprises Jinshan WPS software, Yongzhong Office software and txt text editors, the txt text editors of different domestic operating systems are different, the winning numbers kylin and Galaxy kylin are pluma software, and the Chinese Korea is gedit software.
The injection of the hook technology into the text editing software also binds the hook technology with the text editing software, namely the hook technology is bound with the operation of a document opened in the text editing software.
For Windows systems, the hook technology is based on an event-driven mechanism, and it is said that the whole system is implemented by message passing. hook is a special message handling mechanism that monitors various event messages in a system or process, intercepts messages destined for a target window, and handles them. Therefore, the hook can be customized in the system to monitor the occurrence of specific events in the system, and perform specific functions, such as screen word extraction, log monitoring, keyboard interception, mouse input and the like.
The hook is of various types, each hook can intercept corresponding messages, for example, a keyboard hook can intercept keyboard messages, a shell hook can intercept, start and close messages of an application program, and the like. Hooks can be divided into thread hooks, which can monitor event messages for a given thread, and system hooks, which monitor event messages for all threads in the system. Because system hooks affect all applications in the system, the hook functions must be placed in separate Dynamic Link Libraries (DLLs).
Therefore, hook is an interception mechanism of Windows messages, and can intercept messages of a single process (thread hook), messages of all processes (system hook), and perform customized processing on the intercepted messages. The Windows message carries information useful for some programs, such as Mouse type information, window handle information, Mouse position information and the like, and the screen word-taking function of the Jinshan word-taking device can be performed by intercepting the messages.
120, monitoring the operation of the windows corresponding to all the documents in the text editing software by combining one of an X11 graphical interface development technology, a gtk graphical interface development technology and a JNI technology according to the type of the text editing software;
different types of character editing software are developed by different development programs, namely C + + and java, and the underlying programs of different development software are different, so that one of an X11 graphical interface development technology, a gtk graphical interface development technology and a JNI technology is selected to monitor the operation of a window where a document is located.
The drawing of the windows of the software is based on the existing X11 graphical interface protocol and the gtk graphic library of the domestic operating system.
And 130, acquiring a target document of the closed window, and forcibly encrypting the target document.
The forced encryption method is based on a domestic operating system, adopts hook technology, and combines X11 graphical interface development technology, gtk graphical interface development technology, JNI technology and the like. And then, aiming at different office software and complex conditions thereof, the targeted processing is carried out, and the correct and error-free forced encryption is realized.
Meanwhile, the document operation of the office software is controlled by using a common method from the most basic. The document office is accompanied by the opening and closing of the document for reading and writing, and the opening and closing of the document are hooked by using a hook technology, so that the hook technology can monitor the whole life cycle of the office software operating document on the premise of not modifying the office software.
The hook technology can monitor the operations of opening, closing, reading, writing and the like of a document, and can monitor the operations of opening, closing and the like of a software interface window by combining the X11 graphical interface development technology and the event function of the hook X11.
The electronic document encryption method for the domestic operating system can be used for forcibly encrypting documents generated by office software on the domestic operating system, an operator does not need to do partial manual operation, misoperation is avoided, and office efficiency is improved; the method plays a promoting role in improving the risk resistance of enterprise infrastructure and information systems; the safety of key information infrastructure and important information systems is guaranteed, and the safety of business systems of enterprises and public institutions is improved comprehensively; the safety guarantee capability of key infrastructure and an important information system is further enhanced; good demonstration effect is brought to the interior of an enterprise, so that the competitiveness of the enterprise is improved; the demonstration function can be expanded to the whole IT industry, and huge social benefits are generated.
On the basis of the foregoing embodiment, preferably, the monitoring, according to the type of the text editing software, the operations of windows corresponding to all documents in the text editing software in combination with one of an X11 graphical interface development technology, a gtk graphical interface development technology, and a JNI technology includes:
if the text editing software is Jinshan WPS software, acquiring X11 attributes of windows corresponding to all documents by utilizing an X11 technology;
and monitoring the X11 attribute of the window by a hook technology, thereby monitoring the operation of the window corresponding to all the documents in the text editing software.
On the basis of the above embodiment, preferably, the target document is acquired according to the X11 attribute of the closed window.
For the Jinshan WPS software, when a program runs, injecting the program into the running of the Jinshan WPS software through a hook technology, opening a document by using the Jinshan WPS software, monitoring the opening of the document by using the hook program, recording information of the opened document, and acquiring X11 attributes of each window by using an X11 technology, wherein the X11 attributes are in one-to-one correspondence with the windows.
The method comprises the steps that a plurality of documents are opened by a Kingshan WPS program, when a certain document is closed, the hook technology can know which window is closed through an x11 attribute, the document corresponding to the closed window is a target document, and when the user completes the selection and closing of the document, the hook monitoring software interface window partially recognizes the closing of the window, recognizes the document and enforces encryption in the background.
On the basis of the foregoing embodiment, preferably, the monitoring, according to the type of the text editing software, the operations of windows corresponding to all documents in the text editing software in combination with one of an X11 graphical interface development technology, a gtk graphical interface development technology, and a JNI technology includes:
if the character editing software is the office software for ever, monitoring windows of all documents by using corresponding plug-ins;
when the document is closed, the JNI technology returns to the hook technology, so that all documents are monitored by the hook technology.
On the basis of the foregoing embodiment, preferably, the monitoring, according to the type of the text editing software, the operations of windows corresponding to all documents in the text editing software in combination with one of an X11 graphical interface development technology, a gtk graphical interface development technology, and a JNI technology includes:
and if the text editing software is text editor software, acquiring X11 attributes of windows corresponding to all documents by using an X11 technology, so as to monitor the operation of the windows corresponding to all the documents in the text editing software.
For the permanently middle Office software, the permanently middle Office software is developed by java, and is injected into the software running through a hook technology during the software running, and the hook technology is developed by C + +, so that the permanently middle Office software and the hook technology cannot be directly connected.
However, due to the convenience of the Office software plug-in, the plug-in and the JNI technology are adopted, the Office is developed by java, the hook technology is developed by c + +, and the JNI can be regarded as an interaction bridge between java and c + +.
The operation and closing of the document is recognized by the plug-in, returned to the hook program by the JNI technique upon closing, and enforced encryption is performed in the background.
On the basis of the foregoing embodiment, preferably, the monitoring, according to the type of the text editing software, the operations of windows corresponding to all documents in the text editing software in combination with one of an X11 graphical interface development technology, a gtk graphical interface development technology, and a JNI technology includes:
and if the text editing software is text editor software, acquiring X11 attributes of windows corresponding to all documents by using an X11 technology, so as to monitor the operation of the windows corresponding to all the documents in the text editing software.
On the basis of the foregoing embodiment, preferably, the acquiring a target document of a closed window includes:
and determining the target document from all documents through the transmission of the gtk signal and the destruction of the gtk container.
For the text editor software, when a user runs the software, the user opens a document by injecting the text editor software into the running of the software through a hook technology, a hook program monitors the opening of the document, and records the information of the document and performs specific binding with the X11 attribute of the window acquired by using the X11 technology.
Due to the difference of two software items, namely, the Pluma and the gedit, the text editor combines the technology of the development of the gtk graphical interface, carries out special processing on the gtk signal transmission and the destruction of the gtk container, monitors the closing of the text document and realizes the forced encryption when the text document is closed in the background.
An electronic document encryption method for a domestic operating system provided by a preferred embodiment of the present invention, as shown in fig. 2, includes:
(1) and a starting node, wherein the user opens an office software operation document.
(2) hook injection scheme into Office software program and persistent Office load third party plug-ins.
(3) And judging the type of the office software.
(4) Both the Jinshan WPS software and the text editor have saved and associated bindings for information on the open document and the X11 property of the current window.
(5) The hook injection part monitors X11 window events of the Kingshan WPS software and events of gtk of a text editor, and the ever Office software monitors window closing of a user on an Office document by a developed plug-in.
(6) And the Office software in the perpetual process calls back to the injection part through a JNI technology, and returns the information of the document operated by the user.
(7) Reading a file header of an office document currently closed by a user to judge whether the file is an encrypted file, and directly closing the office program if the file is the encrypted file; instead of encrypting the document, the encryption part is called to directly encrypt, thereby realizing the forced encryption of the plaintext file.
The embodiment of the present invention provides an electronic document encryption system for a domestic operating system, as shown in fig. 3, the system includes an injection module 310, a monitoring module 320, and an encryption module 330, wherein:
the injection module 310 is configured to inject different types of text editing software under a domestic operating system into the text editing software by using a hook technology;
the monitoring module 320 is configured to monitor, according to the type of the text editing software, operations of windows corresponding to all documents in the text editing software in combination with one of an X11 graphical interface development technology, a gtk graphical interface development technology, and a JNI technology;
the encryption module 330 is configured to obtain a target document of the closed window, and perform forced encryption on the target document.
The present embodiment is a system embodiment corresponding to the above method embodiment, and please refer to the above method embodiment for details, which is not described herein again.
An embodiment of the present invention provides an electronic device, as shown in fig. 4, the electronic device may include: a processor (processor)410, a communication Interface 420, a memory (memory)430 and a communication bus 440, wherein the processor 410, the communication Interface 420 and the memory 430 are communicated with each other via the communication bus 440. Processor 410 may invoke logic instructions in memory 430 to perform a method of electronic document encryption for a domestic operating system, the method comprising:
for different types of character editing software under a domestic operating system, injecting the character editing software by adopting a hook technology;
monitoring the operation of windows corresponding to all documents in the text editing software by combining one of an X11 graphical interface development technology, a gtk graphical interface development technology and a JNI technology according to the type of the text editing software;
and acquiring a target document of the closed window, and forcibly encrypting the target document.
In addition, the logic instructions in the memory 430 may be implemented in the form of software functional units and stored in a computer readable storage medium when the software functional units are sold or used as independent products. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
In another aspect, the present invention also provides a computer program product, which includes a computer program stored on a non-transitory computer-readable storage medium, the computer program including program instructions, when the program instructions are executed by a computer, the computer being capable of executing a method for encrypting an electronic document for a domestic operating system provided by the above methods, the method including:
for different types of character editing software under a domestic operating system, injecting the character editing software by adopting a hook technology;
monitoring the operation of windows corresponding to all documents in the text editing software by combining one of an X11 graphical interface development technology, a gtk graphical interface development technology and a JNI technology according to the type of the text editing software;
and acquiring a target document of the closed window, and forcibly encrypting the target document.
In yet another aspect, the present invention also provides a non-transitory computer-readable storage medium, on which a computer program is stored, the computer program being implemented by a processor to perform the method for encrypting an electronic document for a domestic operating system provided in the above aspects, the method comprising:
for different types of character editing software under a domestic operating system, injecting the character editing software by adopting a hook technology;
monitoring the operation of windows corresponding to all documents in the text editing software by combining one of an X11 graphical interface development technology, a gtk graphical interface development technology and a JNI technology according to the type of the text editing software;
and acquiring a target document of the closed window, and forcibly encrypting the target document.
The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
Through the above description of the embodiments, those skilled in the art will clearly understand that each embodiment can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware. With this understanding in mind, the above-described technical solutions may be embodied in the form of a software product, which can be stored in a computer-readable storage medium such as ROM/RAM, magnetic disk, optical disk, etc., and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the methods described in the embodiments or some parts of the embodiments.
Finally, it should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.
Claims (10)
1. An electronic document encryption method for a domestic operating system is characterized by comprising the following steps:
for different types of character editing software under a domestic operating system, injecting the character editing software by adopting a hook technology;
monitoring the operation of windows corresponding to all documents in the text editing software by combining one of an X11 graphical interface development technology, a gtk graphical interface development technology and a JNI technology according to the type of the text editing software;
and acquiring a target document of the closed window, and forcibly encrypting the target document.
2. The method for encrypting the electronic document according to claim 1, wherein the monitoring the operation of the windows corresponding to all the documents in the text editing software according to the type of the text editing software by combining one of an X11 graphical interface development technology, a gtk graphical interface development technology and a JNI technology comprises:
if the text editing software is Jinshan WPS software, acquiring X11 attributes of windows corresponding to all documents by utilizing an X11 technology;
and monitoring the X11 attribute of the window by a hook technology, thereby monitoring the operation of the window corresponding to all the documents in the text editing software.
3. The method for encrypting the electronic document aiming at the domestic operating system according to claim 2, wherein the obtaining the target document of the closed window comprises:
and acquiring the target document according to the X11 attribute of the closed window.
4. The method for encrypting the electronic document according to claim 1, wherein the monitoring the operation of the windows corresponding to all the documents in the text editing software according to the type of the text editing software by combining one of an X11 graphical interface development technology, a gtk graphical interface development technology and a JNI technology comprises:
if the character editing software is the office software for ever, monitoring windows of all documents by using corresponding plug-ins;
when the document is closed, the JNI technology returns to the hook technology, so that all documents are monitored by the hook technology.
5. The method for encrypting the electronic document according to claim 1, wherein the monitoring the operation of the windows corresponding to all the documents in the text editing software according to the type of the text editing software by combining one of an X11 graphical interface development technology, a gtk graphical interface development technology and a JNI technology comprises:
and if the text editing software is text editor software, acquiring X11 attributes of windows corresponding to all documents by using an X11 technology, so as to monitor the operation of the windows corresponding to all the documents in the text editing software.
6. The electronic document encryption method for the domestic operating system according to claim 5, wherein said obtaining the target document of the closed window comprises:
and determining the target document from all documents through the transmission of the gtk signal and the destruction of the gtk container.
7. The method for encrypting the electronic document aiming at the domestic operating system according to claim 5, wherein said text editor software is a pluma or a getit.
8. An electronic document encryption system for a homemade operating system, comprising:
the injection module is used for injecting the character editing software by adopting a hook technology for different types of character editing software under a domestic operating system;
the monitoring module is used for monitoring the operation of windows corresponding to all documents in the text editing software by combining one of an X11 graphical interface development technology, a gtk graphical interface development technology and a JNI technology according to the type of the text editing software;
and the encryption module is used for acquiring the target document of the closed window and forcibly encrypting the target document.
9. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the steps of the method for encrypting an electronic document for a domestic operating system according to any one of claims 1 to 7 when executing the program.
10. A non-transitory computer readable storage medium, on which a computer program is stored, wherein the computer program, when executed by a processor, implements the steps of the method for encrypting an electronic document for a domestic operating system according to any one of claims 1 to 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011460739.2A CN112507361A (en) | 2020-12-11 | 2020-12-11 | Electronic document encryption method for domestic operating system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011460739.2A CN112507361A (en) | 2020-12-11 | 2020-12-11 | Electronic document encryption method for domestic operating system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112507361A true CN112507361A (en) | 2021-03-16 |
Family
ID=74972031
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011460739.2A Pending CN112507361A (en) | 2020-12-11 | 2020-12-11 | Electronic document encryption method for domestic operating system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112507361A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113761524A (en) * | 2021-09-03 | 2021-12-07 | 奇安信科技集团股份有限公司 | Active window auditing method and system |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6185681B1 (en) * | 1998-05-07 | 2001-02-06 | Stephen Zizzi | Method of transparent encryption and decryption for an electronic document management system |
US20040059912A1 (en) * | 1998-05-07 | 2004-03-25 | Stephen Zizzi | Encrypting file system |
JP2006331005A (en) * | 2005-05-25 | 2006-12-07 | ▲らい▼揚科技股▲ふん▼有限公司 | Method for protecting document for application software |
US20160239673A1 (en) * | 2015-02-13 | 2016-08-18 | Protected Mobility, Llc | System and method for secure document embedding |
-
2020
- 2020-12-11 CN CN202011460739.2A patent/CN112507361A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6185681B1 (en) * | 1998-05-07 | 2001-02-06 | Stephen Zizzi | Method of transparent encryption and decryption for an electronic document management system |
US20040059912A1 (en) * | 1998-05-07 | 2004-03-25 | Stephen Zizzi | Encrypting file system |
JP2006331005A (en) * | 2005-05-25 | 2006-12-07 | ▲らい▼揚科技股▲ふん▼有限公司 | Method for protecting document for application software |
US20160239673A1 (en) * | 2015-02-13 | 2016-08-18 | Protected Mobility, Llc | System and method for secure document embedding |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113761524A (en) * | 2021-09-03 | 2021-12-07 | 奇安信科技集团股份有限公司 | Active window auditing method and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108595989B (en) | Mobile APP safety protection system and method under iOS | |
CN104268055B (en) | The monitoring method and device of a kind of program exception | |
US10834115B2 (en) | Methods and systems for providing security for page framing | |
US9892263B2 (en) | System, method and apparatus to visually configure an analysis of a program | |
WO2016101384A1 (en) | Dual-system switch based data security processing method and apparatus | |
CN105975867B (en) | A kind of data processing method | |
CN102467628A (en) | Method for protecting data based on browser kernel intercept technology | |
CN111539010B (en) | Clipboard control method, device, electronic equipment and computer readable storage medium | |
CN101620620B (en) | Method and device for analyzing webpage | |
WO2023091206A1 (en) | Automatic generation of security labels to apply encryption | |
WO2022078366A1 (en) | Application protection method and apparatus, device and medium | |
Xiao et al. | Detection and prevention of code injection attacks on HTML5-based apps | |
CN110807191B (en) | Safe operation method and device of application program | |
CN114036495B (en) | Method and device for updating privatized deployment verification code system | |
CN112257037B (en) | Process watermarking method, system and electronic equipment | |
CN112507361A (en) | Electronic document encryption method for domestic operating system | |
Balinsky et al. | System call interception framework for data leak prevention | |
CN113656815A (en) | Document processing method and device, electronic equipment and storage medium | |
CN109065077B (en) | Method and device for manufacturing encrypted optical disk | |
CN109657458B (en) | Method, storage medium, device and system for protecting key string data in IOS | |
CN109684846A (en) | A kind of file extraction method and device | |
CN108427559B (en) | Script file generation and calling method and device | |
CN113407931A (en) | Password management method and device and input terminal | |
CN108229180A (en) | Sectional drawing data processing method, device and electronic equipment | |
US20230229816A1 (en) | Enabling Secure Debug Logging |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |