CN112698964A - Data processing method, system, electronic device and medium - Google Patents
Data processing method, system, electronic device and medium Download PDFInfo
- Publication number
- CN112698964A CN112698964A CN202011535643.8A CN202011535643A CN112698964A CN 112698964 A CN112698964 A CN 112698964A CN 202011535643 A CN202011535643 A CN 202011535643A CN 112698964 A CN112698964 A CN 112698964A
- Authority
- CN
- China
- Prior art keywords
- clipboard
- data
- processing method
- data processing
- intercepted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/54—Interprogram communication
- G06F9/543—User-generated data transfer, e.g. clipboards, dynamic data exchange [DDE], object linking and embedding [OLE]
Abstract
The invention provides a data processing method, a data processing system, electronic equipment and a medium. The method comprises the following steps: monitoring a clipboard event related to a clipboard; if a clipboard event is monitored, clipboard data to be transferred to a clipboard are intercepted; and transmitting the intercepted clipboard data to a clipboard server. The clipboard preemption program in the data processing method of the invention monitors clipboard events through the monitoring module aiming at the clipboard, and the client for acquiring the clipboard data acquires the clipboard data, thereby realizing the preemption of the clipboard data and realizing the purpose of ensuring that the clipboard data is successfully set to the clipboard. The clipboard preemption program of the invention can adapt to various application scenes and realize flexible application combined with other functions, has strong compatibility, ensures the effects of successfully preempting the clipboard data and efficiently preempting the clipboard data, and simultaneously minimizes the use of resources.
Description
Technical Field
The present invention relates to the field of operating systems, and in particular, to a data processing method, system, electronic device, and medium.
Background
Under a domestic operating system, there is not much scheme for preempting a clipboard at present, that is, before data is transferred to the clipboard, the preempting clipboard intercepts the data and sets the data to the clipboard, so that the purpose of reliably setting the data to the clipboard every time data is copied is achieved. The encryption and decryption of clipboard data for an application is the current correlation technique that is closest to preempting the clipboard.
The existing clipboard technology based on the domestic operating system has the following disadvantages:
1. typically clipboard data for a particular application.
2. Compatibility with the system is not particularly good.
3. The clipboard of the Linux system is of a c/s architecture, the permissions of the clients designed by the clipboard are parallel, the clipboard business logic and the clients are parallel, the control of other clients is difficult to realize, and the system stability and the system performance are also reduced even if the control of other clients can be realized.
4. The existing clipboard technology generally calculates and processes too much data, occupies more machine resources and has low reaction speed.
In summary, due to the above technical problems in the prior art, it is necessary to provide a reliable and efficient method for processing data on a clipboard.
Disclosure of Invention
Embodiments of the present invention provide a data processing method, system, electronic device, and medium, to solve the defects of poor adaptability, inflexible application, poor compatibility, and low efficiency in the prior art, and achieve the effects of being capable of adapting to various application scenarios, implementing flexible application in combination with other functions, having strong compatibility, ensuring successful preemption of clipboard data, and efficiently preempting clipboard data.
Specifically, the embodiment of the invention provides the following technical scheme:
in a first aspect, an embodiment of the present invention provides a data processing method, including:
monitoring a clipboard event related to a clipboard;
if a clipboard event is monitored, clipboard data to be transferred to a clipboard are intercepted; and
and transmitting the intercepted clipboard data to a clipboard server.
Further, the listening for clipboard events related to a clipboard comprises:
listening for actions performed by all processes in relation to the clipboard.
Further, the actions performed by the listening all processes in relation to the clipboard include:
and monitoring actions performed by all processes for transferring data to the clipboard.
Further, the actions performed by the listening all processes in relation to the clipboard include:
intercepting action messages of all processes related to the clipboard.
Further, the listening for clipboard events related to a clipboard comprises:
and receiving an action message related to the clipboard, and notifying a client for acquiring clipboard data after receiving the message, wherein the client intercepts the clipboard data to be transferred to the clipboard after receiving the notification.
Further, the transmitting the intercepted clipboard data to a clipboard server comprises:
and judging whether the clipboard data is the clipboard data needing to be monitored, and if so, transmitting the intercepted clipboard data to a clipboard server.
Further, the transmitting the intercepted clipboard data to a clipboard server comprises:
and adding an identifier to the clipboard data.
Further, the identified content includes a source and a destination of the clipboard data.
Further, the method further comprises:
based on at least the identification, a client in the operating system, other than the client for obtaining clipboard data, performs an operation related to the identification.
Further, the data processing method is used in a Linux operating system.
In a second aspect, the present invention provides a data processing system comprising:
the monitoring module is used for monitoring clipboard events related to the clipboard;
the data intercepting module is used for intercepting the clipboard data to be transferred to the clipboard if the clipboard event is intercepted; and
and the transmission module is used for transmitting the intercepted clipboard data to the clipboard server.
In a third aspect, the present invention provides an electronic device, comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the steps of the data processing method as described above when executing the program.
In a fourth aspect, the present invention provides a non-transitory computer readable storage medium having a computer program stored thereon, wherein the computer program, when executed by a processor, implements the steps of the data processing method as described above.
The data processing method provided by the invention is particularly suitable for a domestic Linux-based secondary development operating system. The clipboard preemption program in the data processing method of the invention monitors clipboard events through the monitor program, and intercepts the clipboard data by the client used for acquiring the clipboard data, thereby realizing the preemption of the clipboard data and realizing the purpose of ensuring the successful setting of the clipboard data to the clipboard.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and those skilled in the art can also obtain other drawings according to the drawings without creative efforts.
FIG. 1 is a flowchart of a data processing method according to an embodiment of the present invention;
fig. 2 is a second flowchart of a data processing method according to an embodiment of the invention;
FIG. 3 is a block diagram of a data processing system according to an embodiment of the present invention; and
fig. 4 is a schematic structural diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In the prior art, there are not many schemes for preempting a clipboard at present, and encryption and decryption are the related technologies closest to the preempting clipboard at present.
Some applications in the system need to process clipboard data, for example, an application needs to encrypt the clipboard, but due to the design problem of the application itself, the data cannot be successfully copied to the clipboard, but the data is temporarily stored in the disk, and since the storage has a cache function for storing small data, the design of the application will cause that the data is only put in the clipboard when the data queue temporarily stored in the disk reaches a certain amount, but the encrypted data of the encrypted clipboard at each time is different from the requirements of the client itself. The client needs to feel that the data copied to the clipboard each time is encrypted, but with the design, the client actually feels that the clipboard is encrypted only once after a plurality of clipboard operations, and in addition, the display of an interface is difficult to perform, and the statistics are troublesome. Since the design of the application is performed by a specialized person, it is very difficult to implement the storage of the data copied each time into the clipboard by modifying the design of the application.
In the Windows environment, clipboard technology has developed to be very stable and mature. Windows divides the clipboard into a logical address space, and the processing of clipboard data can be said to be very easy.
For the domestic operating system based on the secondary development of Linux, the development of the kernel of the system is very little, the design of the system is less, the clipboard is used as a main system module, the research is less due to the reasons, the technology is immature, and the compatibility of the product made by the clipboard is poor.
Most clipboard data processing programs of the prior art perform a large number of operations, which results in low efficiency. The low efficiency can cause a series of bad chain reactions and poor customer experience
In summary, the existing clipboard technology based on the domestic operating system has the following disadvantages:
1. typically clipboard data for a particular application.
2. Compatibility with the system is not particularly good.
3. The clipboard of the Linux system is of a c/s architecture, the permissions of the clients designed by the clipboard are parallel, the clipboard business logic and the clients are parallel, and therefore other clients are difficult to control, and even if the other clients can be controlled, the system stability and the system performance are also reduced.
4. The existing clipboard technology generally calculates and processes too much data, occupies more machine resources and has low reflection speed.
In view of the foregoing problems, the present invention provides a data processing method, system, electronic device, and medium, where the improved clipboard-specific data processing method has the beneficial effects of being capable of adapting to various application scenarios, realizing flexible application in combination with other functions, having strong compatibility, ensuring successful clipboard data preemption, efficiently preempting clipboard data, and minimizing resource usage. The invention will now be explained and illustrated in detail by means of specific examples.
Fig. 1 and fig. 2 show flowcharts of a data processing method provided by an embodiment of the present invention. As shown in fig. 1 and fig. 2, a data processing method provided in an embodiment of the present invention includes the following steps:
step 110: monitoring a clipboard event related to a clipboard;
step 120: if a clipboard event is monitored, clipboard data to be transferred to a clipboard are intercepted; and
step 130: and transmitting the intercepted clipboard data to a clipboard server.
In this example, clipboard events related to the clipboard, such as the copying of data onto the clipboard to be performed by the processes of the respective applications, are monitored by the monitoring module.
If a clipboard event is monitored, before each client transfers data to a clipboard through the clipboard event, clipboard data to be transferred to the clipboard is intercepted from a corresponding process, and specifically, the clipboard data to be transferred to the clipboard is intercepted through an interface of the corresponding process.
After the slave process intercepts clipboard data to be transferred to the clipboard, the intercepted clipboard data is set to the clipboard, i.e., the clipboard server.
For an application process that does not clip data, such an application process usually temporarily puts data into a disk, and when pasting the data to another application program, the process of such a type may fail to paste the data because the data is empty when pasting the data of the board, i.e., the process fails to paste the data. The invention perfectly solves the problem, copies the data and puts the data into the temporary disk file, and the invention preempts the data and puts the data into the clipboard again by preempting the clipboard data program.
In this example, the system clipboard data is monitored first, and then, the system clipboard is reset without any data processing, so as to achieve the purpose of preempting data.
In the embodiment, the clipboard data are preempted timely and efficiently by monitoring the clipboard events related to the clipboard, and the preempted clipboard data are set to the clipboard, so that the data corresponding to each copying operation executed by each application can be successfully copied to the clipboard server, and the problem of poor user experience caused by the fact that some applications do not copy the data to the clipboard successfully or timely but temporarily store the temporary data to a disk is avoided.
Based on the above embodiments, in a data processing method according to another embodiment of the present invention,
listening for clipboard events related to the clipboard includes:
listening for actions performed by all processes in relation to the clipboard.
In one example, actions performed by all processes in relation to the clipboard are intercepted, which in one example are the operations described above to copy data onto the clipboard.
And putting the acquired clipboard data to a specified client.
In the above embodiment, the preempting clipboard data program first analyzes clipboard data interaction between the kernel system and the application program, that is, monitors actions performed by all processes related to the clipboard, and takes data in a system-optimized data transfer manner, that is, takes clipboard data in a client form, so that the use of resources is minimized, that is, the preempting program saves resources most, and such a preempting manner is also very efficient.
Based on any of the embodiments described above, in a data processing method provided by another embodiment of the present invention,
listening for actions performed by all processes in relation to the clipboard includes:
and monitoring actions performed by all processes for transferring data to the clipboard.
In one example, the action is the copy data to clipboard operation described above. Of course, other operations or actions may be performed, and are not described in detail herein.
The method comprises the steps of monitoring actions of transferring data to a clipboard, which are executed by all processes, and when the processes of all applications execute the operation of copying the data to the clipboard, the program can quickly identify the actions, and acquiring corresponding data from the processes of all applications before the processes of all applications successfully copy the data to the clipboard.
In the embodiment, the actions of transferring the data to the clipboard, which are executed by all the processes, are monitored, so that the actions of copying are quickly identified, the data are quickly acquired, and the data are efficiently and reliably set to the clipboard.
Based on any of the embodiments described above, in a data processing method provided by another embodiment of the present invention,
listening for actions performed by all processes in relation to the clipboard includes:
intercepting action messages of all processes related to the clipboard.
In one example, a clipboard event related to a clipboard is listened to by intercepting (capturing) all processes' action messages related to the clipboard, and informing a monitoring module (a client for obtaining clipboard data) that a clipboard change has occurred.
In the above embodiments, by intercepting (capturing) all processes' action messages related to the clipboard to listen to clipboard events related to the clipboard, efficient and flexible data location and retrieval can be achieved.
Based on any of the embodiments described above, in a data processing method provided by another embodiment of the present invention,
intercepting clipboard data to be transferred to a clipboard comprises:
clipboard data is intercepted by a client for obtaining clipboard data.
In one example, clipboard data is intercepted by a client for obtaining clipboard data. The Linux clipboard server is a server of all clients, so when monitoring whether the clipboard data changes, a message notification is registered in the server, the server is made to tell the client, so that the purpose of monitoring is achieved, and the clipboard data is acquired by calling the clipboard data by the client.
In the above embodiment, the clipboard preemption program realizes preemption of the clipboard data by the client and the clipboard server for obtaining the clipboard data, and ensures the purpose of setting the clipboard data to the clipboard. And meanwhile, the data is taken by using a data transfer mode optimized by the system, so that the efficiency is highest.
Based on any of the embodiments described above, in a data processing method provided by another embodiment of the present invention,
the listening for clipboard events related to a clipboard comprises:
the clipboard server receives the action message related to the clipboard, and after receiving the message, notifies the client for obtaining the clipboard data, wherein after receiving the notification, the client intercepts the clipboard data to be transferred to the clipboard.
The client obtains clipboard data from the process that performed the copy.
In the above embodiment, the clipboard preemption program realizes preemption of the clipboard data and ensures the purpose of setting the clipboard data to the clipboard. And meanwhile, the data is taken by using a data transfer mode optimized by the system, so that the efficiency is highest.
Based on any of the embodiments described above, in a data processing method provided by another embodiment of the present invention,
transmitting the intercepted clipboard data to a clipboard server comprises:
and judging whether the clipboard data is the clipboard data needing to be monitored, and if so, transmitting the intercepted clipboard data to a clipboard server.
The client is a client specially used for intercepting the clipboard data, the specific clipboard data is monitored by checking the clipboard message to be concerned, and some clipboard data do not need to be monitored by the client, so that the operation of setting the clipboard data to the clipboard does not need to be executed.
In the embodiment, whether the clipboard data belongs to the clipboard data which needs to be monitored by the client is judged, so that the subsequent operation of setting the clipboard data which does not need to be monitored by the client to the clipboard is avoided, resources are saved, and the efficiency is improved.
Based on any of the embodiments described above, in a data processing method provided by another embodiment of the present invention,
transmitting the intercepted clipboard data to a clipboard server comprises:
and processing the clipboard data.
In the above embodiment, the data is processed while being set to the clipboard, so as to facilitate the subsequent client to perform a predetermined operation on the data.
Based on any of the embodiments described above, in a data processing method provided by another embodiment of the present invention,
transmitting the intercepted clipboard data to a clipboard server comprises:
and adding an identifier to the clipboard data.
When the clipboard data is set to the clipboard, the clipboard data is added with an identifier, which may be, in one example, a code added to the clipboard data that can embody the source and destination of the clipboard data.
In the above embodiment, by adding the identifier to the clipboard data, convenience is provided for a subsequent client to perform a specific operation.
Based on any of the embodiments described above, in a data processing method provided by another embodiment of the present invention,
the identified content includes a source and a destination of clipboard data.
One example of content identified herein is code added to clipboard data that can embody the source and destination of the clipboard data. Of course, the identifier may be of other types according to different client requirements, and is not described herein again.
In the embodiment, by adding the identifier capable of reflecting the source and the destination of the clipboard data to the clipboard data, convenience is provided for a subsequent client to execute a specific operation.
Based on any of the embodiments described above, in a data processing method provided by another embodiment of the present invention,
the method further comprises:
based on at least the identification, a client in the operating system, other than the client for obtaining clipboard data, performs an operation related to the identification.
Clients in the operating system other than the client for obtaining clipboard data can recognize the identifier, perform operations related to the identifier based on the content of the identifier, or better perform some functions of the client using the content of the identifier, and so on.
In the above embodiment, the client in the operating system may perform the relevant operation by reading the identifier, and such a data processing method is more efficient and saves resources.
Based on any of the embodiments described above, in a data processing method provided by another embodiment of the present invention,
the data processing method is used in a Linux operating system.
Specifically, the data processing method is used in a domestic Linux-based secondary development operating system. The clipboard preemption program of the invention is designed for a domestic operating system based on Linux secondary development.
The domestic operating system developed based on Linux twice has the following problems:
the operating system which is mainly patterned by Microsoft is favored in China almost, even an IT development enterprise of Linux generally develops applications, the development of a kernel and the like is not needed because of open sources, in short, the system is designed less, a clipboard is used as a main system module, the research of the reasons is less, the technology is immature, and the compatibility of products manufactured by the clipboard is poor.
At present, in a domestic operating system, a clipboard technology is mainly used for an encryption and decryption technology for a certain application, and has limitations. The reason is that the development of the domestic operating system under the open source Linux system is completely because the domestic operating system has just started for security in recent years, so the support of the domestic operating system on the clipboard generally supports a single application or depends on more environments, and the development of the application is based on the system and under the condition that the system is not stable, so the application has certain dependence on the system, and the clipboard technology and certain application are closely related.
The clipboard in the Linux system is of a c/s architecture, and the permissions of the clients designed by the clipboard are parallel. The clipboard business logic itself is also a parallel authority with each client. It is not very good to implement the control of the other clients themselves, i.e. it is not very reliable.
Due to the above clipboard related problems of the Linux operating system, the clipboard preemption program is designed to solve the above clipboard related problems of the Linux operating system. Meanwhile, in order to ensure that resources are used in a minimized mode, the clipboard preemption program of the invention takes the design characteristics of a Linux system as a trigger point, and develops the most resource-saving functional application.
In addition, the invention considers that the clipboard has no established data address in the Linux system, so the clipboard data can not be encrypted and decrypted like the Windows system under the Linux. Therefore, the data is taken from the Server of the clipboard, and the clipboard data is updated after the data is processed, namely, the data is processed according to the business logic.
In the above embodiment, the clipboard preemption program of the present invention realizes preemption of the clipboard data by creating the client and the clipboard server for acquiring the clipboard data, and ensures the purpose of setting the clipboard data to the clipboard, thereby solving the above technical problems in the current domestic operating system.
Adaptation for various application scenarios and flexible application in conjunction with other functionality
The client needs to preempt the clipboard to provide preempted data for the client, but sometimes needs to do some data processing during preemption and sometimes does not do so because of the requirement when the business is huge, and the program has the superiority of design, namely, the clipboard preempts each operation, so that no matter what kind of application or environment, the program for preemption can always process the data or keep the original data as required, and the application is very flexible to meet different business requirements. In addition, even if some applications store the copied data in the temporary disk directory every time, the preemption clipboard can preempt the data every time and help to place the data in the clipboard, so that the problem that a client feels that the data copied to the clipboard every time cannot be encrypted because the storage of small data has a cache function, and the client feels that the clipboard is encrypted only after a plurality of clipboard operations.
Regarding compatibility
The clipboard preemption program of the invention deeply researches the working principle of the bottom layer of the clipboard, and the compatibility is suitable for the matching problem of almost various Linux distribution versions and different versions of the same distribution version. The clipboard architecture is summarized below each Linux version, and the clipboard architecture of Linux is found to be a model of c/s architecture, so that the c/s architecture is not changed even if the Linux version is upgraded, and the c/s architecture is upgraded by optimizing certain details and certain functions in the c/s architecture. The invention grasps the details of the clipboard architecture and the development rule of the Linux system, and does a great deal of work for compatibility at a certain height, thereby solving the problem of great difference of single release version of the Linux system and the problem of great change of numerous Linux release versions.
Concerning high efficiency
The high efficiency means that under the condition of ensuring that clipboard data is occupied, the CPU is not consumed too much.
The simpler the design efficiency is higher, the better the large-scale system development can be adapted to. In order to ensure the minimum use of resources, the clipboard preemption program develops the most resource-saving functional application by taking the design characteristics of the Linux system as a trigger point.
Under Linux, communication is carried out between application processes, between a kernel and application programs and between the application programs through a socket. Preempting the clipboard data program first analyzes the clipboard data interaction between the kernel system and the application program, and takes the data in a data transfer manner optimized by the system. The invention does not make a driver to develop a clipboard program, and mainly considers the efficiency and the compatibility of the application.
The software of the invention firstly monitors the system clipboard data, hardly processes any data and then resets the clipboard data to the system clipboard, thus achieving the purpose of preempting the data.
Ensuring successful preemption of clipboard data
The invention adopts a simpler and very guaranteed mode to realize that: every time the clipboard data changes, the program sets the data to the clipboard once, ensuring that the last clipboard data is always preempted to obtain the clipboard data. The invention adopts a flexible mechanism to ensure that the clipboard data changes every time, namely, a certain process puts the data on the clipboard, and the clipboard preemption program inevitably takes the data and sets the data in the clipboard. Therefore, the final data of the clipboard is the data which is processed by preempting the clipboard, so that the design of the invention can be ensured to preempt the clipboard data.
The contribution of the invention in the technical aspect is at least as follows: technical support is provided for development of subsequent clipboard technology, and when a clipboard encryption and decryption developer finds that certain application is encrypted, certain data of the application is not successfully copied to a clipboard, the technology can be used as a technical basis to easily develop business functions related to clipboard encryption and decryption.
The invention makes at least the following contributions in an economic aspect: the invention has high efficiency of processing data, greatly reduces the dependence degree on higher hardware for a large-scale system or a huge data statistical module, and saves the hardware cost. The response speed to the client request is improved, and higher service benefits are generated.
The data processing method provided by the invention is particularly suitable for a domestic Linux-based secondary development operating system. The clipboard preemption program in the data processing method of the invention monitors clipboard events through the monitoring module aiming at the clipboard, and intercepts the clipboard data through the client used for acquiring the clipboard data, thereby realizing the preemption of the clipboard data and realizing the purpose of ensuring the successful setting of the clipboard data to the clipboard.
The data processing system provided by the present invention is described below, and the data processing system described below and the data processing method described above may be referred to correspondingly.
FIG. 3 illustrates a block diagram of a data processing system, which, as shown in FIG. 3, may include:
a listening module 310, configured to listen for clipboard events related to a clipboard;
an intercept data module 320, configured to intercept clipboard data to be transferred to a clipboard if a clipboard event is heard; and
the transmitting module 330 is configured to transmit the intercepted clipboard data to the clipboard server.
Fig. 4 illustrates a physical structure diagram of an electronic device, which may include, as shown in fig. 4: a processor (processor)410, a communication Interface 420, a memory (memory)430 and a communication bus 440, wherein the processor 410, the communication Interface 420 and the memory 430 are communicated with each other via the communication bus 440. The processor 410 may call logical instructions in the memory 430 to perform a data processing method comprising:
monitoring a clipboard event related to a clipboard;
if a clipboard event is monitored, intercepting clipboard data to be transferred to a clipboard through a client terminal specially used for acquiring the clipboard data; and
and transmitting the intercepted clipboard data to a clipboard server.
It will be appreciated that the detailed functions and extended functions that the computer program may perform may be as described with reference to the above embodiments.
Based on the same inventive concept, yet another embodiment of the present invention provides a non-transitory computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements all the steps of the above-described data processing method.
It will be appreciated that the detailed functions and extended functions that the computer program may perform may be as described with reference to the above embodiments.
Based on the same inventive concept, yet another embodiment of the present invention provides a computer program product, which includes a computer program, and when the computer program is executed by a processor, the computer program implements all the steps of the above-mentioned data processing method.
It will be appreciated that the detailed functions and extended functions that the computer program may perform may be as described with reference to the above embodiments.
In addition, the logic instructions in the memory may be implemented in the form of software functional units and may be stored in a computer readable storage medium when sold or used as a stand-alone product. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the embodiment of the present invention. One of ordinary skill in the art can understand and implement it without inventive effort.
Through the above description of the embodiments, those skilled in the art will clearly understand that each embodiment can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware. Based on such understanding, the above technical solutions may be essentially or partially implemented in the form of software products, which may be stored in a computer-readable storage medium, such as ROM/RAM, magnetic disk, optical disk, etc., and include instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the security defense method according to the embodiments or some parts of the embodiments.
Moreover, in the present invention, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
Furthermore, in the present disclosure, reference to the description of the terms "one embodiment," "some embodiments," "an example," "a specific example," or "some examples" or the like means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the present disclosure. In this specification, the schematic representations of the terms used above are not necessarily intended to refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, various embodiments or examples and features of different embodiments or examples described in this specification can be combined and combined by one skilled in the art without contradiction.
Finally, it should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.
Claims (12)
1. A data processing method, comprising:
monitoring a clipboard event related to a clipboard;
if a clipboard event is monitored, clipboard data to be transferred to a clipboard are intercepted; and
and transmitting the intercepted clipboard data to a clipboard server.
2. The data processing method of claim 1,
the listening for clipboard events related to a clipboard comprises:
listening for actions performed by all processes in relation to the clipboard.
3. The data processing method of claim 2,
the actions performed by the listening all processes in relation to the clipboard include:
and monitoring actions performed by all processes for transferring data to the clipboard.
4. The data processing method of claim 2,
the actions performed by the listening all processes in relation to the clipboard include:
intercepting action messages of all processes related to the clipboard.
5. The data processing method of claim 1,
the listening for clipboard events related to a clipboard comprises:
and receiving an action message related to the clipboard, and notifying a client special for obtaining clipboard data after receiving the message, wherein the client intercepts the clipboard data to be transferred to the clipboard after receiving the notification.
6. The data processing method of claim 1,
the transmitting the intercepted clipboard data to a clipboard server comprises:
and judging whether the clipboard data is the clipboard data needing to be monitored, and if so, transmitting the intercepted clipboard data to a clipboard server.
7. The data processing method of claim 1,
the transmitting the intercepted clipboard data to a clipboard server comprises:
and adding an identifier to the clipboard data, wherein the content of the identifier comprises the source and the destination of the clipboard data.
8. The data processing method of claim 7,
the method further comprises:
based on at least the identification, a client in the operating system, other than the client for obtaining clipboard data, performs an operation related to the identification.
9. The data processing method according to any one of claims 1 to 8,
the data processing method is used in a Linux operating system.
10. A data processing system, comprising:
the monitoring module is used for monitoring clipboard events related to the clipboard;
the data intercepting module is used for intercepting the clipboard data to be transferred to the clipboard if the clipboard event is intercepted; and
and the transmission module is used for transmitting the intercepted clipboard data to the clipboard server.
11. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the steps of the data processing method according to any of claims 1-9 are implemented when the program is executed by the processor.
12. A non-transitory computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the data processing method according to any one of claims 1 to 9.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011535643.8A CN112698964A (en) | 2020-12-23 | 2020-12-23 | Data processing method, system, electronic device and medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011535643.8A CN112698964A (en) | 2020-12-23 | 2020-12-23 | Data processing method, system, electronic device and medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112698964A true CN112698964A (en) | 2021-04-23 |
Family
ID=75510731
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011535643.8A Pending CN112698964A (en) | 2020-12-23 | 2020-12-23 | Data processing method, system, electronic device and medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112698964A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117113417A (en) * | 2023-10-18 | 2023-11-24 | 中孚安全技术有限公司 | Method, system, equipment and medium for managing and controlling clipboard under Linux system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040100496A1 (en) * | 2002-11-18 | 2004-05-27 | Monte Creasor | System and method for manipulating multiple clip items of data |
CN101226486A (en) * | 2006-09-29 | 2008-07-23 | 阿森图尔环球服务有限责任公司 | Computer-implemented clipboard |
CN105956464A (en) * | 2016-04-25 | 2016-09-21 | 北京珊瑚灵御科技有限公司 | Android platform-based clipboard control system and method |
CN110769048A (en) * | 2019-10-17 | 2020-02-07 | 山东乾云启创信息科技股份有限公司 | Seamless connection method and system for local virtual desktop and remote virtual desktop |
CN111539010A (en) * | 2020-06-16 | 2020-08-14 | 北京明朝万达科技股份有限公司 | Clipboard control method and device, electronic equipment and computer-readable storage medium |
-
2020
- 2020-12-23 CN CN202011535643.8A patent/CN112698964A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040100496A1 (en) * | 2002-11-18 | 2004-05-27 | Monte Creasor | System and method for manipulating multiple clip items of data |
CN101226486A (en) * | 2006-09-29 | 2008-07-23 | 阿森图尔环球服务有限责任公司 | Computer-implemented clipboard |
CN105956464A (en) * | 2016-04-25 | 2016-09-21 | 北京珊瑚灵御科技有限公司 | Android platform-based clipboard control system and method |
CN110769048A (en) * | 2019-10-17 | 2020-02-07 | 山东乾云启创信息科技股份有限公司 | Seamless connection method and system for local virtual desktop and remote virtual desktop |
CN111539010A (en) * | 2020-06-16 | 2020-08-14 | 北京明朝万达科技股份有限公司 | Clipboard control method and device, electronic equipment and computer-readable storage medium |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117113417A (en) * | 2023-10-18 | 2023-11-24 | 中孚安全技术有限公司 | Method, system, equipment and medium for managing and controlling clipboard under Linux system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108449410B (en) | Message management method, system and related device in cloud platform | |
CN108885568B (en) | System and computer-implemented method for processing multiple data items within a data source through an on-demand code execution environment | |
US20180373517A1 (en) | Systems, methods, and apparatuses for docker image downloading | |
CN109284205B (en) | Snapshot backup method and device, computer equipment and storage medium | |
CN111338774B (en) | Distributed timing task scheduling system and computing device | |
CN108681777B (en) | Method and device for running machine learning program based on distributed system | |
WO2019201039A1 (en) | Method and system for updating application and application server | |
US20050060608A1 (en) | Maximizing processor utilization and minimizing network bandwidth requirements in throughput compute clusters | |
JP2018045671A (en) | Method and apparatus for scheduling cloud server | |
CN111045854B (en) | Method, apparatus and computer readable medium for managing service containers | |
KR101891423B1 (en) | Broadcasting management information using fountain codes | |
CN106557288B (en) | Method and device for acquiring printing data | |
US10404568B2 (en) | Agent manager for distributed transaction monitoring system | |
CN108984544B (en) | Method and device for modifying configuration information of distributed system | |
WO2024016624A1 (en) | Multi-cluster access method and system | |
CN112698964A (en) | Data processing method, system, electronic device and medium | |
US20070050447A1 (en) | Method and device arrangement for managing a client/server environment | |
CN109450997B (en) | Data cross-terminal migration method and device, computer equipment and storage medium | |
CN110798358B (en) | Distributed service identification method and device, computer readable medium and electronic equipment | |
CN106657195B (en) | Task processing method and relay device | |
WO2020252724A1 (en) | Log processing method and device, and computer-readable storage medium | |
CN115292740A (en) | Method and device for managing clipboard and nonvolatile storage medium | |
CN110968257B (en) | Method, apparatus and computer program product for storage management | |
CN113626251A (en) | Method, apparatus and computer program product for migrating backup systems | |
CN107766093B (en) | Function module sharing method and client |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |