CN112507361A - Electronic document encryption method for domestic operating system - Google Patents

Electronic document encryption method for domestic operating system Download PDF

Info

Publication number
CN112507361A
CN112507361A CN202011460739.2A CN202011460739A CN112507361A CN 112507361 A CN112507361 A CN 112507361A CN 202011460739 A CN202011460739 A CN 202011460739A CN 112507361 A CN112507361 A CN 112507361A
Authority
CN
China
Prior art keywords
technology
editing software
software
operating system
documents
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011460739.2A
Other languages
Chinese (zh)
Inventor
杨泳
王天齐
余爱华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing North Source Software Co ltd
Beijing VRV Software Corp Ltd
Original Assignee
Beijing North Source Software Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing North Source Software Co ltd filed Critical Beijing North Source Software Co ltd
Priority to CN202011460739.2A priority Critical patent/CN112507361A/en
Publication of CN112507361A publication Critical patent/CN112507361A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/10Text processing
    • G06F40/166Editing, e.g. inserting or deleting

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Bioethics (AREA)
  • Artificial Intelligence (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Computational Linguistics (AREA)
  • Document Processing Apparatus (AREA)

Abstract

The invention provides an electronic document encryption method for a domestic operating system, which comprises the following steps: for different types of character editing software under a domestic operating system, injecting the character editing software by adopting a hook technology; monitoring the operation of windows corresponding to all documents in the text editing software by combining one of an X11 graphical interface development technology, a gtk graphical interface development technology and a JNI technology according to the type of the text editing software; and acquiring a target document of the closed window, and forcibly encrypting the target document. The electronic document encryption method for the domestic operating system can be used for forcibly encrypting documents generated by office software on the domestic operating system, an operator does not need to do manual operation for a part, misoperation is avoided, and office efficiency is improved.

Description

Electronic document encryption method for domestic operating system
Technical Field
The invention relates to the technical field of computers, in particular to an electronic document encryption method for a domestic operating system.
Background
With the increase of domestic operating systems in the security-related industry year by year, the requirement for document office under the domestic operating systems is increased greatly, the document office under the corresponding domestic operating systems is increased gradually, no effective forced encryption protection method is provided, and due to improper protection and misoperation, more and more security divulgence events are caused.
At present, office document files under the national systems of the confidential industry, such as the standardized kylin, the standardized Galaxy kylin, the standardized Cucubeb, the standardized deep system and the like, have no effective mandatory encryption protection measures, and only the manual active encryption is carried out by each software system to ensure the protection mode of the documents, the automatic active encryption can not be carried out after the documents are subjected to office operation, and each document operated by an operator can not be automatically encrypted and protected.
Therefore, a method for forcibly encrypting an electronic document for a domestic operating system is needed.
Disclosure of Invention
The invention provides an electronic document encryption method for a domestic operating system, which is used for overcoming the defect that each electronic document cannot be automatically encrypted in the prior art and realizing automatic and forced encryption of the electronic document.
The invention provides an electronic document encryption method for a domestic operating system, which comprises the following steps:
for different types of character editing software under a domestic operating system, injecting the character editing software by adopting a hook technology;
monitoring the operation of windows corresponding to all documents in the text editing software by combining one of an X11 graphical interface development technology, a gtk graphical interface development technology and a JNI technology according to the type of the text editing software;
and acquiring a target document of the closed window, and forcibly encrypting the target document.
According to the electronic document encryption method for the domestic operating system provided by the invention, the operation of windows corresponding to all documents in the text editing software is monitored by combining one of an X11 graphical interface development technology, a gtk graphical interface development technology and a JNI technology according to the type of the text editing software, and the method comprises the following steps:
if the text editing software is Jinshan WPS software, acquiring X11 attributes of windows corresponding to all documents by utilizing an X11 technology;
and monitoring the X11 attribute of the window by a hook technology, thereby monitoring the operation of the window corresponding to all the documents in the text editing software.
The invention provides an electronic document encryption method for a domestic operating system, wherein the step of acquiring a target document of a closed window comprises the following steps:
and acquiring the target document according to the X11 attribute of the closed window.
The invention provides an electronic document encryption method for a domestic operating system, which monitors the operation of windows corresponding to all documents in the text editing software by combining one of an X11 graphical interface development technology, a gtk graphical interface development technology and a JNI technology according to the type of the text editing software, and comprises the following steps:
if the character editing software is the office software for ever, monitoring windows of all documents by using corresponding plug-ins;
when the document is closed, the JNI technology returns to the hook technology, so that all documents are monitored by the hook technology.
The invention provides an electronic document encryption method for a domestic operating system, which monitors the operation of windows corresponding to all documents in the text editing software by combining one of an X11 graphical interface development technology, a gtk graphical interface development technology and a JNI technology according to the type of the text editing software, and comprises the following steps:
and if the text editing software is text editor software, acquiring X11 attributes of windows corresponding to all documents by using an X11 technology, so as to monitor the operation of the windows corresponding to all the documents in the text editing software.
The invention provides an electronic document encryption method for a domestic operating system, wherein the step of acquiring a target document of a closed window comprises the following steps:
and determining the target document from all documents through the transmission of the gtk signal and the destruction of the gtk container.
According to the electronic document encryption method for the domestic operating system, the text editor software is a pluma or a gedit.
The invention also provides an electronic document encryption system for the domestic operating system, which comprises the following components:
the injection module is used for injecting the character editing software by adopting a hook technology for different types of character editing software under a domestic operating system;
the monitoring module is used for monitoring the operation of windows corresponding to all documents in the text editing software by combining one of an X11 graphical interface development technology, a gtk graphical interface development technology and a JNI technology according to the type of the text editing software;
and the encryption module is used for acquiring the target document of the closed window and forcibly encrypting the target document.
The invention also provides an electronic device, which comprises a memory, a processor and a computer program stored on the memory and capable of running on the processor, wherein the processor executes the program to realize the steps of the electronic document encryption method for the domestic operating system.
The present invention also provides a non-transitory computer readable storage medium having stored thereon a computer program which, when executed by a processor, implements the steps of the method for encrypting an electronic document for a domestic operating system as described in any one of the above.
The electronic document encryption method for the domestic operating system can be used for forcibly encrypting documents generated by office software on the domestic operating system, an operator does not need to do partial manual operation, misoperation is avoided, and office efficiency is improved; the method plays a promoting role in improving the risk resistance of enterprise infrastructure and information systems; the safety of key information infrastructure and important information systems is guaranteed, and the safety of business systems of enterprises and public institutions is improved comprehensively; the safety guarantee capability of key infrastructure and an important information system is further enhanced; good demonstration effect is brought to the interior of an enterprise, so that the competitiveness of the enterprise is improved; the demonstration function can be expanded to the whole IT industry, and huge social benefits are generated.
Drawings
In order to more clearly illustrate the technical solutions of the present invention or the prior art, the drawings needed for the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and those skilled in the art can also obtain other drawings according to the drawings without creative efforts.
FIG. 1 is a flowchart of an electronic document encryption method for a domestic operating system according to the present invention;
FIG. 2 is a second flowchart of an electronic document encryption method for a domestic operating system according to the present invention;
FIG. 3 is a schematic structural diagram of an electronic document encryption system for a domestic operating system according to the present invention;
fig. 4 is a schematic physical structure diagram of an electronic device provided in the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention clearer, the technical solutions of the present invention will be clearly and completely described below with reference to the accompanying drawings, and it is obvious that the described embodiments are some, but not all embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In order to ensure information security, prevent information leakage of each process node in the use of a document and conform to the localization trend of a secret-related user, an electronic document protection technology is designed, and automatic forced encryption is guaranteed to be carried out at the end of the document in the whole operation period process of the document.
In order to support the automatic forced encryption processing of editable electronic documents under the domestic operating system, the following problems need to be solved:
the method solves the problem of how to automatically and forcibly encrypt, and accurately identifies the closed document operation window of the user operating the Jinshan WPS software, the Yongzhong Office software and the text editor (the Pluma software under the winning bid kylin system and the Yin river kylin system and the gedit software under the Zhongkoidyu system) and forcibly and actively encrypts the document when the user closes the document operation window after the user operates the document Office software by using the Office software on the premise that the document Office software of the existing Jinshan WPS software, the Yongzhong Office software and the text editor software is not modified.
The method solves the fundamental problems that how to correspondingly adapt and support different Office software in a domestic operating system, the realization of each software has larger difference, for example, Jinshan WPS software is realized by adopting Qt development, Yongzhong Office software is realized by adopting java, a pluma editor and a gedit editor are developed by adopting gtk, and the identification of closing of the window of the Office document of each software and the identification of the opened document are problems.
The embodiment of the invention provides an electronic document encryption method for a domestic operating system, which comprises the following steps of:
110, for different types of character editing software under a domestic operating system, injecting the character editing software by adopting a hook technology;
in the existing domestic operating system, the domestic operating system comprises the winning numbers kylin, Galaxy kylin and Chinese Korea, the used Office software comprises Jinshan WPS software, Yongzhong Office software and txt text editors, the txt text editors of different domestic operating systems are different, the winning numbers kylin and Galaxy kylin are pluma software, and the Chinese Korea is gedit software.
The injection of the hook technology into the text editing software also binds the hook technology with the text editing software, namely the hook technology is bound with the operation of a document opened in the text editing software.
For Windows systems, the hook technology is based on an event-driven mechanism, and it is said that the whole system is implemented by message passing. hook is a special message handling mechanism that monitors various event messages in a system or process, intercepts messages destined for a target window, and handles them. Therefore, the hook can be customized in the system to monitor the occurrence of specific events in the system, and perform specific functions, such as screen word extraction, log monitoring, keyboard interception, mouse input and the like.
The hook is of various types, each hook can intercept corresponding messages, for example, a keyboard hook can intercept keyboard messages, a shell hook can intercept, start and close messages of an application program, and the like. Hooks can be divided into thread hooks, which can monitor event messages for a given thread, and system hooks, which monitor event messages for all threads in the system. Because system hooks affect all applications in the system, the hook functions must be placed in separate Dynamic Link Libraries (DLLs).
Therefore, hook is an interception mechanism of Windows messages, and can intercept messages of a single process (thread hook), messages of all processes (system hook), and perform customized processing on the intercepted messages. The Windows message carries information useful for some programs, such as Mouse type information, window handle information, Mouse position information and the like, and the screen word-taking function of the Jinshan word-taking device can be performed by intercepting the messages.
120, monitoring the operation of the windows corresponding to all the documents in the text editing software by combining one of an X11 graphical interface development technology, a gtk graphical interface development technology and a JNI technology according to the type of the text editing software;
different types of character editing software are developed by different development programs, namely C + + and java, and the underlying programs of different development software are different, so that one of an X11 graphical interface development technology, a gtk graphical interface development technology and a JNI technology is selected to monitor the operation of a window where a document is located.
The drawing of the windows of the software is based on the existing X11 graphical interface protocol and the gtk graphic library of the domestic operating system.
And 130, acquiring a target document of the closed window, and forcibly encrypting the target document.
The forced encryption method is based on a domestic operating system, adopts hook technology, and combines X11 graphical interface development technology, gtk graphical interface development technology, JNI technology and the like. And then, aiming at different office software and complex conditions thereof, the targeted processing is carried out, and the correct and error-free forced encryption is realized.
Meanwhile, the document operation of the office software is controlled by using a common method from the most basic. The document office is accompanied by the opening and closing of the document for reading and writing, and the opening and closing of the document are hooked by using a hook technology, so that the hook technology can monitor the whole life cycle of the office software operating document on the premise of not modifying the office software.
The hook technology can monitor the operations of opening, closing, reading, writing and the like of a document, and can monitor the operations of opening, closing and the like of a software interface window by combining the X11 graphical interface development technology and the event function of the hook X11.
The electronic document encryption method for the domestic operating system can be used for forcibly encrypting documents generated by office software on the domestic operating system, an operator does not need to do partial manual operation, misoperation is avoided, and office efficiency is improved; the method plays a promoting role in improving the risk resistance of enterprise infrastructure and information systems; the safety of key information infrastructure and important information systems is guaranteed, and the safety of business systems of enterprises and public institutions is improved comprehensively; the safety guarantee capability of key infrastructure and an important information system is further enhanced; good demonstration effect is brought to the interior of an enterprise, so that the competitiveness of the enterprise is improved; the demonstration function can be expanded to the whole IT industry, and huge social benefits are generated.
On the basis of the foregoing embodiment, preferably, the monitoring, according to the type of the text editing software, the operations of windows corresponding to all documents in the text editing software in combination with one of an X11 graphical interface development technology, a gtk graphical interface development technology, and a JNI technology includes:
if the text editing software is Jinshan WPS software, acquiring X11 attributes of windows corresponding to all documents by utilizing an X11 technology;
and monitoring the X11 attribute of the window by a hook technology, thereby monitoring the operation of the window corresponding to all the documents in the text editing software.
On the basis of the above embodiment, preferably, the target document is acquired according to the X11 attribute of the closed window.
For the Jinshan WPS software, when a program runs, injecting the program into the running of the Jinshan WPS software through a hook technology, opening a document by using the Jinshan WPS software, monitoring the opening of the document by using the hook program, recording information of the opened document, and acquiring X11 attributes of each window by using an X11 technology, wherein the X11 attributes are in one-to-one correspondence with the windows.
The method comprises the steps that a plurality of documents are opened by a Kingshan WPS program, when a certain document is closed, the hook technology can know which window is closed through an x11 attribute, the document corresponding to the closed window is a target document, and when the user completes the selection and closing of the document, the hook monitoring software interface window partially recognizes the closing of the window, recognizes the document and enforces encryption in the background.
On the basis of the foregoing embodiment, preferably, the monitoring, according to the type of the text editing software, the operations of windows corresponding to all documents in the text editing software in combination with one of an X11 graphical interface development technology, a gtk graphical interface development technology, and a JNI technology includes:
if the character editing software is the office software for ever, monitoring windows of all documents by using corresponding plug-ins;
when the document is closed, the JNI technology returns to the hook technology, so that all documents are monitored by the hook technology.
On the basis of the foregoing embodiment, preferably, the monitoring, according to the type of the text editing software, the operations of windows corresponding to all documents in the text editing software in combination with one of an X11 graphical interface development technology, a gtk graphical interface development technology, and a JNI technology includes:
and if the text editing software is text editor software, acquiring X11 attributes of windows corresponding to all documents by using an X11 technology, so as to monitor the operation of the windows corresponding to all the documents in the text editing software.
For the permanently middle Office software, the permanently middle Office software is developed by java, and is injected into the software running through a hook technology during the software running, and the hook technology is developed by C + +, so that the permanently middle Office software and the hook technology cannot be directly connected.
However, due to the convenience of the Office software plug-in, the plug-in and the JNI technology are adopted, the Office is developed by java, the hook technology is developed by c + +, and the JNI can be regarded as an interaction bridge between java and c + +.
The operation and closing of the document is recognized by the plug-in, returned to the hook program by the JNI technique upon closing, and enforced encryption is performed in the background.
On the basis of the foregoing embodiment, preferably, the monitoring, according to the type of the text editing software, the operations of windows corresponding to all documents in the text editing software in combination with one of an X11 graphical interface development technology, a gtk graphical interface development technology, and a JNI technology includes:
and if the text editing software is text editor software, acquiring X11 attributes of windows corresponding to all documents by using an X11 technology, so as to monitor the operation of the windows corresponding to all the documents in the text editing software.
On the basis of the foregoing embodiment, preferably, the acquiring a target document of a closed window includes:
and determining the target document from all documents through the transmission of the gtk signal and the destruction of the gtk container.
For the text editor software, when a user runs the software, the user opens a document by injecting the text editor software into the running of the software through a hook technology, a hook program monitors the opening of the document, and records the information of the document and performs specific binding with the X11 attribute of the window acquired by using the X11 technology.
Due to the difference of two software items, namely, the Pluma and the gedit, the text editor combines the technology of the development of the gtk graphical interface, carries out special processing on the gtk signal transmission and the destruction of the gtk container, monitors the closing of the text document and realizes the forced encryption when the text document is closed in the background.
An electronic document encryption method for a domestic operating system provided by a preferred embodiment of the present invention, as shown in fig. 2, includes:
(1) and a starting node, wherein the user opens an office software operation document.
(2) hook injection scheme into Office software program and persistent Office load third party plug-ins.
(3) And judging the type of the office software.
(4) Both the Jinshan WPS software and the text editor have saved and associated bindings for information on the open document and the X11 property of the current window.
(5) The hook injection part monitors X11 window events of the Kingshan WPS software and events of gtk of a text editor, and the ever Office software monitors window closing of a user on an Office document by a developed plug-in.
(6) And the Office software in the perpetual process calls back to the injection part through a JNI technology, and returns the information of the document operated by the user.
(7) Reading a file header of an office document currently closed by a user to judge whether the file is an encrypted file, and directly closing the office program if the file is the encrypted file; instead of encrypting the document, the encryption part is called to directly encrypt, thereby realizing the forced encryption of the plaintext file.
The embodiment of the present invention provides an electronic document encryption system for a domestic operating system, as shown in fig. 3, the system includes an injection module 310, a monitoring module 320, and an encryption module 330, wherein:
the injection module 310 is configured to inject different types of text editing software under a domestic operating system into the text editing software by using a hook technology;
the monitoring module 320 is configured to monitor, according to the type of the text editing software, operations of windows corresponding to all documents in the text editing software in combination with one of an X11 graphical interface development technology, a gtk graphical interface development technology, and a JNI technology;
the encryption module 330 is configured to obtain a target document of the closed window, and perform forced encryption on the target document.
The present embodiment is a system embodiment corresponding to the above method embodiment, and please refer to the above method embodiment for details, which is not described herein again.
An embodiment of the present invention provides an electronic device, as shown in fig. 4, the electronic device may include: a processor (processor)410, a communication Interface 420, a memory (memory)430 and a communication bus 440, wherein the processor 410, the communication Interface 420 and the memory 430 are communicated with each other via the communication bus 440. Processor 410 may invoke logic instructions in memory 430 to perform a method of electronic document encryption for a domestic operating system, the method comprising:
for different types of character editing software under a domestic operating system, injecting the character editing software by adopting a hook technology;
monitoring the operation of windows corresponding to all documents in the text editing software by combining one of an X11 graphical interface development technology, a gtk graphical interface development technology and a JNI technology according to the type of the text editing software;
and acquiring a target document of the closed window, and forcibly encrypting the target document.
In addition, the logic instructions in the memory 430 may be implemented in the form of software functional units and stored in a computer readable storage medium when the software functional units are sold or used as independent products. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
In another aspect, the present invention also provides a computer program product, which includes a computer program stored on a non-transitory computer-readable storage medium, the computer program including program instructions, when the program instructions are executed by a computer, the computer being capable of executing a method for encrypting an electronic document for a domestic operating system provided by the above methods, the method including:
for different types of character editing software under a domestic operating system, injecting the character editing software by adopting a hook technology;
monitoring the operation of windows corresponding to all documents in the text editing software by combining one of an X11 graphical interface development technology, a gtk graphical interface development technology and a JNI technology according to the type of the text editing software;
and acquiring a target document of the closed window, and forcibly encrypting the target document.
In yet another aspect, the present invention also provides a non-transitory computer-readable storage medium, on which a computer program is stored, the computer program being implemented by a processor to perform the method for encrypting an electronic document for a domestic operating system provided in the above aspects, the method comprising:
for different types of character editing software under a domestic operating system, injecting the character editing software by adopting a hook technology;
monitoring the operation of windows corresponding to all documents in the text editing software by combining one of an X11 graphical interface development technology, a gtk graphical interface development technology and a JNI technology according to the type of the text editing software;
and acquiring a target document of the closed window, and forcibly encrypting the target document.
The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
Through the above description of the embodiments, those skilled in the art will clearly understand that each embodiment can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware. With this understanding in mind, the above-described technical solutions may be embodied in the form of a software product, which can be stored in a computer-readable storage medium such as ROM/RAM, magnetic disk, optical disk, etc., and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the methods described in the embodiments or some parts of the embodiments.
Finally, it should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (10)

1. An electronic document encryption method for a domestic operating system is characterized by comprising the following steps:
for different types of character editing software under a domestic operating system, injecting the character editing software by adopting a hook technology;
monitoring the operation of windows corresponding to all documents in the text editing software by combining one of an X11 graphical interface development technology, a gtk graphical interface development technology and a JNI technology according to the type of the text editing software;
and acquiring a target document of the closed window, and forcibly encrypting the target document.
2. The method for encrypting the electronic document according to claim 1, wherein the monitoring the operation of the windows corresponding to all the documents in the text editing software according to the type of the text editing software by combining one of an X11 graphical interface development technology, a gtk graphical interface development technology and a JNI technology comprises:
if the text editing software is Jinshan WPS software, acquiring X11 attributes of windows corresponding to all documents by utilizing an X11 technology;
and monitoring the X11 attribute of the window by a hook technology, thereby monitoring the operation of the window corresponding to all the documents in the text editing software.
3. The method for encrypting the electronic document aiming at the domestic operating system according to claim 2, wherein the obtaining the target document of the closed window comprises:
and acquiring the target document according to the X11 attribute of the closed window.
4. The method for encrypting the electronic document according to claim 1, wherein the monitoring the operation of the windows corresponding to all the documents in the text editing software according to the type of the text editing software by combining one of an X11 graphical interface development technology, a gtk graphical interface development technology and a JNI technology comprises:
if the character editing software is the office software for ever, monitoring windows of all documents by using corresponding plug-ins;
when the document is closed, the JNI technology returns to the hook technology, so that all documents are monitored by the hook technology.
5. The method for encrypting the electronic document according to claim 1, wherein the monitoring the operation of the windows corresponding to all the documents in the text editing software according to the type of the text editing software by combining one of an X11 graphical interface development technology, a gtk graphical interface development technology and a JNI technology comprises:
and if the text editing software is text editor software, acquiring X11 attributes of windows corresponding to all documents by using an X11 technology, so as to monitor the operation of the windows corresponding to all the documents in the text editing software.
6. The electronic document encryption method for the domestic operating system according to claim 5, wherein said obtaining the target document of the closed window comprises:
and determining the target document from all documents through the transmission of the gtk signal and the destruction of the gtk container.
7. The method for encrypting the electronic document aiming at the domestic operating system according to claim 5, wherein said text editor software is a pluma or a getit.
8. An electronic document encryption system for a homemade operating system, comprising:
the injection module is used for injecting the character editing software by adopting a hook technology for different types of character editing software under a domestic operating system;
the monitoring module is used for monitoring the operation of windows corresponding to all documents in the text editing software by combining one of an X11 graphical interface development technology, a gtk graphical interface development technology and a JNI technology according to the type of the text editing software;
and the encryption module is used for acquiring the target document of the closed window and forcibly encrypting the target document.
9. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the steps of the method for encrypting an electronic document for a domestic operating system according to any one of claims 1 to 7 when executing the program.
10. A non-transitory computer readable storage medium, on which a computer program is stored, wherein the computer program, when executed by a processor, implements the steps of the method for encrypting an electronic document for a domestic operating system according to any one of claims 1 to 7.
CN202011460739.2A 2020-12-11 2020-12-11 Electronic document encryption method for domestic operating system Pending CN112507361A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011460739.2A CN112507361A (en) 2020-12-11 2020-12-11 Electronic document encryption method for domestic operating system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011460739.2A CN112507361A (en) 2020-12-11 2020-12-11 Electronic document encryption method for domestic operating system

Publications (1)

Publication Number Publication Date
CN112507361A true CN112507361A (en) 2021-03-16

Family

ID=74972031

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011460739.2A Pending CN112507361A (en) 2020-12-11 2020-12-11 Electronic document encryption method for domestic operating system

Country Status (1)

Country Link
CN (1) CN112507361A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113761524A (en) * 2021-09-03 2021-12-07 奇安信科技集团股份有限公司 Active window auditing method and system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6185681B1 (en) * 1998-05-07 2001-02-06 Stephen Zizzi Method of transparent encryption and decryption for an electronic document management system
US20040059912A1 (en) * 1998-05-07 2004-03-25 Stephen Zizzi Encrypting file system
JP2006331005A (en) * 2005-05-25 2006-12-07 ▲らい▼揚科技股▲ふん▼有限公司 Method for protecting document for application software
US20160239673A1 (en) * 2015-02-13 2016-08-18 Protected Mobility, Llc System and method for secure document embedding

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6185681B1 (en) * 1998-05-07 2001-02-06 Stephen Zizzi Method of transparent encryption and decryption for an electronic document management system
US20040059912A1 (en) * 1998-05-07 2004-03-25 Stephen Zizzi Encrypting file system
JP2006331005A (en) * 2005-05-25 2006-12-07 ▲らい▼揚科技股▲ふん▼有限公司 Method for protecting document for application software
US20160239673A1 (en) * 2015-02-13 2016-08-18 Protected Mobility, Llc System and method for secure document embedding

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113761524A (en) * 2021-09-03 2021-12-07 奇安信科技集团股份有限公司 Active window auditing method and system

Similar Documents

Publication Publication Date Title
CN108595989B (en) Mobile APP safety protection system and method under iOS
CN104268055B (en) The monitoring method and device of a kind of program exception
US10834115B2 (en) Methods and systems for providing security for page framing
US9892263B2 (en) System, method and apparatus to visually configure an analysis of a program
WO2016101384A1 (en) Dual-system switch based data security processing method and apparatus
CN105975867B (en) A kind of data processing method
CN102467628A (en) Method for protecting data based on browser kernel intercept technology
CN111539010B (en) Clipboard control method, device, electronic equipment and computer readable storage medium
CN101620620B (en) Method and device for analyzing webpage
WO2023091206A1 (en) Automatic generation of security labels to apply encryption
WO2022078366A1 (en) Application protection method and apparatus, device and medium
Xiao et al. Detection and prevention of code injection attacks on HTML5-based apps
CN110807191B (en) Safe operation method and device of application program
CN114036495B (en) Method and device for updating privatized deployment verification code system
CN112257037B (en) Process watermarking method, system and electronic equipment
CN112507361A (en) Electronic document encryption method for domestic operating system
Balinsky et al. System call interception framework for data leak prevention
CN113656815A (en) Document processing method and device, electronic equipment and storage medium
CN109065077B (en) Method and device for manufacturing encrypted optical disk
CN109657458B (en) Method, storage medium, device and system for protecting key string data in IOS
CN109684846A (en) A kind of file extraction method and device
CN108427559B (en) Script file generation and calling method and device
CN113407931A (en) Password management method and device and input terminal
CN108229180A (en) Sectional drawing data processing method, device and electronic equipment
US20230229816A1 (en) Enabling Secure Debug Logging

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination