CN114945176B - Clipboard access control method, electronic equipment and storage medium - Google Patents

Clipboard access control method, electronic equipment and storage medium Download PDF

Info

Publication number
CN114945176B
CN114945176B CN202210382343.3A CN202210382343A CN114945176B CN 114945176 B CN114945176 B CN 114945176B CN 202210382343 A CN202210382343 A CN 202210382343A CN 114945176 B CN114945176 B CN 114945176B
Authority
CN
China
Prior art keywords
application
copy information
information
applications
copy
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210382343.3A
Other languages
Chinese (zh)
Other versions
CN114945176A (en
Inventor
赵晓娜
蒲兴
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Honor Device Co Ltd
Original Assignee
Honor Device Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Honor Device Co Ltd filed Critical Honor Device Co Ltd
Priority to CN202210382343.3A priority Critical patent/CN114945176B/en
Publication of CN114945176A publication Critical patent/CN114945176A/en
Application granted granted Critical
Publication of CN114945176B publication Critical patent/CN114945176B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogram communication
    • G06F9/543User-generated data transfer, e.g. clipboards, dynamic data exchange [DDE], object linking and embedding [OLE]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • H04W12/37Managing security policies for mobile devices or for controlling mobile applications
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2209/00Indexing scheme relating to G06F9/00
    • G06F2209/54Indexing scheme relating to G06F9/54
    • G06F2209/543Local
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Automation & Control Theory (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the application provides a shear plate access control method, electronic equipment and a storage medium, and relates to the field of intelligent terminals. The method comprises the following steps: acquiring copy information in a first application; when a read request of the second application for the copy information is received, determining whether the second application is a target application corresponding to the copy information; and if the second application is the target application corresponding to the copy information, sending the copy information to the second application. According to the embodiment of the application, information leakage caused by illegal access of data in the system shear plate by some applications can be avoided, and the safety of copying and pasting information by using the system shear plate is improved.

Description

Clipboard access control method, electronic equipment and storage medium
Technical Field
The application relates to the technical field of intelligent terminals, in particular to a shear plate access control method, electronic equipment and a storage medium.
Background
The mobile phone clipboard function has been widely used as a basic function, and a user can arbitrarily copy/clip his/her desired contents in a certain application and then paste the contents to a desired place in other applications. However, the clipboard often contains user sensitive data, such as a bank card number, a password, a verification code, an identity card number, a telephone, an address and the like, and the user sensitive data is easy to have risks of illegal access or leakage by application, and even is excessively utilized, so that the aim of advertisement pushing is fulfilled. The existing clipboard protection scheme cannot effectively protect the privacy of a user.
Disclosure of Invention
In view of the foregoing, it is necessary to provide a method, an electronic device, and a storage medium for managing access to a system clipboard, so as to improve the security of copying and pasting information by using the system clipboard by avoiding illegal access or leakage of data in the system clipboard by some applications.
In a first aspect, an embodiment of the present application provides a method for controlling access to a clipboard, which is applied to an electronic device, and the method includes: acquiring copy information in a first application; when a read request of the second application for the copy information is received, determining whether the second application is a target application corresponding to the copy information; and if the second application is the target application corresponding to the copy information, sending the copy information to the second application. According to the technical scheme, the situation that data in the system shear plate are illegally accessed or leaked by some applications can be avoided, and the safety of copying and pasting information by using the system shear plate is improved.
In one implementation, after obtaining the copy information in the first application, the method further includes: acquiring context information corresponding to the copy information; and analyzing the context information to determine the target application corresponding to the copy information. According to the technical scheme, the target pasting application corresponding to the copy information in the system cut-off board can be determined based on the context analysis, the copy information is associated with the corresponding target application, only the target pasting application associated with the copy information is allowed to access and read the copy information in the system cut-off board, the condition that data in the system cut-off board are illegally accessed or leaked by some applications can be avoided, and the safety of copying and pasting the information by the system cut-off board is improved.
In one implementation manner, after determining the target application corresponding to the copy information, the method further includes: and displaying the association prompt of the copy information and the target application according to a preset prompt rule. By the technical scheme, the user can intuitively determine the target application corresponding to the copy information.
In one implementation manner, the obtaining the context information corresponding to the copy information includes: and acquiring screen content corresponding to the first application, identifying the screen content, and acquiring context information corresponding to the copy information. According to the technical scheme, the context information corresponding to the copy information can be accurately acquired.
In one implementation, the analyzing the context information includes: analyzing the context information based on specific keyword matching; or analyzing the context information based on machine learning; or analyzing the context information based on deep learning. By the technical scheme, the accuracy of the context analysis can be improved.
In one implementation manner, the analyzing the context information, and determining the target application corresponding to the copy information includes: if a plurality of applications are determined after the context information is analyzed, displaying the plurality of applications; and determining a target application corresponding to the copy information in the plurality of applications based on the selection of the plurality of applications by the user. According to the technical scheme, the target application is determined through the selection of the user, so that the accuracy of determining the target application can be improved.
In one implementation, the displaying the plurality of applications includes: according to a preset selection rule, determining candidate applications in the plurality of applications; and displaying the candidate application. According to the technical scheme, excessive application display on the display interface of the electronic equipment can be avoided.
In one implementation, after the system clipboard determines a plurality of applications based on the context analysis, the determined plurality of applications may be sent to a first application, the first application determines candidate applications among the plurality of applications according to a preset selection rule, and displays the candidate applications. According to the technical scheme, the first application can determine candidate applications in a plurality of applications.
In another implementation, after the system clipboard determines a plurality of applications based on the context analysis, a candidate application may be determined in the plurality of applications according to a preset selection rule, and the determined candidate application may be sent to a first application, so that the first application displays the candidate application. According to the technical scheme, the system clipboard can determine candidate applications in a plurality of applications.
In one implementation, the determining candidate applications among the plurality of applications according to a preset selection rule includes: determining candidate applications in the plurality of applications according to the matching probability; or determining candidate applications in the plurality of applications according to the applications installed on the electronic equipment. By the technical scheme, the accuracy of determining candidate applications can be improved.
In one implementation manner, the analyzing the context information, and determining the target application corresponding to the copy information includes: if the context information is analyzed and the target application corresponding to the copy information cannot be determined, or if the context information is analyzed and a plurality of applications are determined, a first control is displayed on a display interface corresponding to the first application, and the first control is used for assisting a user in determining the target application corresponding to the copy information; and determining a target application corresponding to the copy information based on the operation of the user on the first control. According to the technical scheme, under the condition that the target application cannot be determined through the context information, the target application corresponding to the copy information is determined based on the operation of the user on the first control, so that the accuracy of determining the target application can be improved.
In one implementation manner, the determining, based on the selection of the first control by the user, the target application corresponding to the copy information includes: based on the operation of the user on the first control, displaying a second control, wherein the second control comprises at least one piece of application information; and determining a target application corresponding to the copy information based on the operation of the user on the second control. According to the technical scheme, the target application corresponding to the copy information is determined through the operation of the user on the two controls, so that the accuracy of determining the target application can be improved.
In one implementation, the method further comprises: and if the second application is not the target application corresponding to the copy information, displaying an inquiry bullet frame and/or a rejection prompt. According to the technical scheme, when the second application is not the target application corresponding to the copy information, the second application can be prompted to the user.
In one implementation manner, if the second application is not the target application corresponding to the copy information, displaying the query frame and/or the reject prompt includes: and if the second application is not the target application corresponding to the copy information and the sensitivity level of the copy information is greater than a preset sensitivity threshold, displaying an inquiry frame and/or a rejection prompt. By adopting the technical scheme, the number of times of inquiring the bullet frame and/or rejecting the prompt can be reduced.
In one implementation, the determining whether the second application is the target application corresponding to the copy information includes: and if the sensitivity level of the copy information is greater than a preset sensitivity threshold, determining whether the second application is a target application corresponding to the copy information. According to the technical scheme, under the condition that the replication information sensitivity level is higher, the second application is verified, and under the condition that the replication information sensitivity level is lower, the second application is not verified, so that the energy loss of the electronic equipment can be reduced.
In one implementation, the method further comprises: if the sensitivity level is smaller than or equal to the preset sensitivity threshold, the copy information is sent to the second application; or if the sensitivity level is smaller than or equal to the preset sensitivity threshold, displaying a reading prompt corresponding to the second application; and determining whether to send the copy information to the second application based on the operation of the reading prompt by the user. According to the technical scheme, under the condition that the replication information sensitivity level is higher, the second application can be operated in more modes, and the diversity and the flexibility of access control are improved.
In a second aspect, an embodiment of the present application provides a method for controlling access to a clipboard, where the method is applied to an electronic device, and the method includes: when the user determines the copy information in the third application, displaying a third control on a preset position corresponding to the copy information; and determining a fourth application based on the operation of the user on the third control, wherein the fourth application has the reading authority of the copy information. According to the technical scheme, the application with the reading authority can be determined for the copy information, the situation that data in the system shear plate is illegally accessed or leaked by some applications is avoided, and the security of copying and pasting information by using the system shear plate is improved.
In one implementation, the third control includes an application search control for searching for an installed application in the electronic device; or the third control comprises an application list, wherein the application list comprises a plurality of applications determined based on context analysis of the copy information. According to the technical scheme, the efficiency of determining the fourth application by the user can be improved through the application search control or the application list.
In one implementation, after determining the fourth application in the applications, the method further includes: and displaying the association prompt of the copy information and the fourth application according to a preset prompt rule. By the technical scheme, the user can intuitively determine the target application corresponding to the copy information.
In a third aspect, embodiments of the present application provide an electronic device including a memory and a processor; the memory is used for storing program instructions; the processor is used for reading the program instructions stored in the memory to realize the clipboard access control method.
In a fourth aspect, embodiments of the present application provide a computer-readable storage medium having stored therein computer-readable instructions that, when executed by a processor, implement a clipboard access management method as described above.
The technical effects of the third aspect and the fourth aspect may be referred to in the description related to the method designed in the method section above, and are not described herein.
Drawings
Fig. 1 is a flowchart of a method for managing and controlling access to a clipboard according to an embodiment of the present application.
Fig. 2 is a schematic diagram of a verification code short message provided in an embodiment of the present application.
Fig. 3 is a schematic diagram of an order sms provided in an embodiment of the present application.
Fig. 4 is a schematic diagram of an application selection prompt provided in an embodiment of the present application.
Fig. 5 is a schematic diagram of an application list provided in an embodiment of the present application.
Fig. 6 is a schematic diagram of a management and control prompt provided in an embodiment of the present application.
Fig. 7 is a schematic diagram of a risk prompt provided in an embodiment of the present application.
Fig. 8 is a flowchart of a method for managing and controlling access to a clipboard according to an embodiment of the present application.
Fig. 9 is a schematic diagram of an access hint provided in an embodiment of the present application.
Fig. 10 is a flowchart of a method for managing and controlling access to a clipboard according to an embodiment of the present application.
Fig. 11 is a flowchart of a method for managing and controlling access to a clipboard according to an embodiment of the present application.
Fig. 12 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
The terms "first" and "second" are used below for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defining "a first" or "a second" may explicitly or implicitly include one or more such feature. In describing embodiments of the present application, words such as "exemplary," "or," "such as," and the like are used to mean serving as an example, instance, or illustration. Any embodiment or design described herein as "exemplary" or "for example" should not be construed as preferred or advantageous over other embodiments or designs. Rather, the use of words such as "exemplary," "or," "such as," and the like are intended to present related concepts in a concrete fashion.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs. The terminology used in the description of the present application is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. It should be understood that, "/" means or, unless otherwise indicated herein. For example, A/B may represent A or B. The term "and/or" in this application is merely an association relationship describing an association object, and means that three relationships may exist. For example, a and/or B may represent: a exists alone, A and B exist simultaneously, and B exists alone. "at least one" means one or more. "plurality" means two or more than two. For example, at least one of a, b or c may represent: seven cases of a, b, c, a and b, a and c, b and c, a, b and c. It will be appreciated that the order of the steps shown in the flowcharts herein may be changed and some may be omitted.
The mobile phone clipboard function has been widely used as a basic function, and a user can arbitrarily copy/clip his/her desired contents in a certain application and then paste the contents to a desired place in other applications. However, the clipboard often contains user sensitive data, such as a bank card number, a password, a verification code, an identification card number, a telephone, an address, and the like, which are easy to risk being illegally accessed or revealed by an application, and even being excessively utilized to achieve the purpose of advertisement pushing. The existing clipboard protection scheme cannot effectively protect the privacy of a user.
In order to solve the technical problem that user sensitive data in a clipboard is easy to be illegally accessed or leaked by an application, the embodiment of the application provides a clipboard access control method, which is applied to electronic equipment and used for avoiding the situation that the data in the clipboard is illegally accessed or leaked by some applications, and improving the safety of user data. Specifically, when the clipboard replication information is utilized, the embodiment of the application can determine the associated application corresponding to the replication information, when the application sends a read request for the replication information, determine whether the application is the associated application corresponding to the replication information, and if the application is determined to be the associated application corresponding to the replication information, grant the read request for the replication information to the application. Otherwise, if the application is not the associated application corresponding to the copy information, rejecting the read request of the application to the copy information.
It is understood that the electronic device in the present application may be a mobile phone, tablet, desktop, laptop, handheld, notebook, ultra-mobile personal computer (UMPC), netbook, as well as a cellular phone, personal digital assistant (personal digital assistant, PDA), artificial intelligence (artificial intelligence, AI) device, wearable device, vehicle-mounted device, smart home device, and/or smart city device. The embodiment of the application does not particularly limit the specific form of the electronic device. The method for managing and controlling access to the clipboard provided by the application is described in detail below by taking the application of the method provided by the application to a mobile phone as an example in combination with the accompanying drawings.
Fig. 1 is a schematic diagram of a method for managing access to a clipboard, where the method is applied to an electronic device, and the electronic device includes a first application, a second application, and a system clipboard. As shown in fig. 1, the method may include:
the first application determines 101 the copy information selected by the user.
The first application determines copy information selected by a User after detecting a copy operation of the User on a User Interface (UI).
In some embodiments of the present application, if the user-selected copy information includes a uniform resource identifier (Uniform Resource Identifier, URI), the first application may create a Content Provider (Content Provider) for storing the copy information.
102, the first application invokes the system clipboard.
After determining the copy information selected by the user, the first application may send a copy operation command to the system clipboard service to invoke the system clipboard to write the copy information.
And 103, writing the copy information by the system clipboard, and storing the copy information.
104, the system cut board acquires the context information corresponding to the copy information, analyzes the context information and determines the target pasting application corresponding to the copy information.
In the embodiment of the application, the target pasting application is an application which authorizes or allows pasting of the copy information and has the authority to read the copy information. The target paste application may include one or more applications. The context information corresponding to the copy information generally includes information related to the copy information. For example, as shown in fig. 2, the information received by the electronic device is schematically shown, and some verification code notifications include an application corresponding to the verification code, that is, a target pasting application corresponding to the verification code. By analyzing the verification code notification, the application in the verification code notification can be determined to be the target paste application corresponding to the copy information (e.g., verification code), such as the XX video in fig. 2 can be determined to be the target paste application corresponding to the copy information (e.g., verification code "308859").
For another example, as shown in fig. 3, another information diagram received by the electronic device is shown, and some order notifications include an order number and also include a service provider corresponding to the order. By analyzing the order notification, an application that the service provider corresponding to the order provides service for the user can be determined as a target pasting application corresponding to the copy information (e.g., order number). As shown in FIG. 3, the service provider corresponding to the order in an order notification is XX buying, the application served by the service provider is application A, and application A can be determined to be the target pasting application corresponding to the copy information (e.g., order number "123456").
In some embodiments of the present application, the system clipboard obtaining the context information corresponding to the copy information may include: and acquiring the screen content currently corresponding to the first application, identifying the screen content, and acquiring the context information corresponding to the copy information. A system screen service may be invoked to obtain the current screen content of the electronic device.
In some embodiments, the contextual information may be analyzed based on a particular keyword match. For example, the specific keyword may include an application name, after the user copies the verification code of a piece of information in the short message application, the user performs application name matching on the information, and determines the application name included in the short message. The application corresponding to the application name may be determined as the target pasting application, or the application corresponding to the application name may be determined as the target pasting application after the application corresponding to the application name is determined to be installed on the electronic device. For example, an application list installed on the electronic device may be acquired, and after the acquired application list is determined to include an application corresponding to the application name, the application is determined to be a target application. In addition, the semantic analysis can be performed on the context information based on algorithms such as machine learning, deep learning and the like, so as to determine the target pasting application. Further, the target paste application may also be determined by recognition of specific characters (e.g., brackets "[ MEANS FOR ] etc.) in combination with semantic parsing of the context information. For example, an application in a particular character may be determined as a target paste application.
The above method of analyzing the context information is merely illustrative, not limiting, and other ways of analyzing the context information may be used.
In some embodiments of the present application, if a plurality of applications are determined after the context information is analyzed, one or more target pasting applications may be determined among the plurality of applications based on a selection of a user, or the plurality of applications may be all determined as target pasting applications.
Determining one or more target paste applications among the plurality of applications based on the user's selection may include: the system clipboard sends the determined multiple applications to the first application; the first application presents the plurality of applications to a user; the first application determines a target paste application among the plurality of applications based on the user's selection and sends the determined target paste application to the system clipboard. When the system clipboard transmits the determined plurality of applications to the first application, the algorithm analysis result may be transmitted to the first application. The plurality of applications may be all applications calculated by the system clipboard, and the determining of the partial applications among the plurality of applications may be based on a preset selection rule. The preset selection rule may include selecting an application matching probability that has a matching probability greater than a preset threshold value among all applications to represent a matching degree of the application of the context information corresponding to the copy information. The higher the probability of matching, the higher the degree of matching of the application to the copy information. Or may be selected from a number of applications (e.g., selecting the application with the probability value of the first five) among all applications. Or it may also be to select all applications installed by the electronic device or select some applications installed by the electronic device among the plurality of applications after comparison with the local installed application list, and so on.
The first application may present all the multiple applications sent by the system clipboard, or may present part of the applications in the multiple applications according to a preset selection rule (e.g., present an application with a relatively high probability, present an application in which all or part of the applications are installed, which is determined by comparing the application with a local installed application list, etc.). After the first application receives the plurality of applications sent by the system clipboard, the plurality of applications can be directly displayed without presenting the plurality of applications. The application search box is used for assisting a user in determining a target pasting application corresponding to the copy information. The application search box can facilitate the user to search the application so as to improve the efficiency of determining the target pasting application.
It may be appreciated that, if the system clipboard determines a plurality of applications based on the analysis of the context information, the system clipboard may not send the determined application information of the plurality of applications to the first application, and may directly request the first application to determine the target paste application. After the first application receives the request sent by the system cut-off board, an application selection button can be displayed on an interface corresponding to the first application, and the application selection button is used for assisting a user in determining a target pasting application. And determining a target pasting application corresponding to the copy information based on the selection of the application selection button by the user. The application selection button may be displayed at a preset position corresponding to the copy information. For example, as shown in fig. 4, an application selection button of "copy to" is displayed next to the copy information (456456). When the user clicks the "copy to" application selection button, an application list for displaying applications installed on the electronic device may be popped up for the user to select a target paste application, as shown in fig. 5. The user may select from a list of applications that pop up to determine one or more target paste applications. It will be appreciated that the pop-up application list may display applications installed on the electronic device in a preset display rule, such as displaying applications installed on the electronic device according to the frequency with which the user uses the application. As shown in fig. 5, the pop-up application list may further include an application search box to facilitate the user to input an application name for searching applications, and it may be appreciated that the application search box may also be popped up separately.
In some embodiments of the present application, after determining the target pasting application corresponding to the copy information, a prompt for the target pasting application may also be generated and displayed according to a preset prompt rule. For example, after determining that the target pasting application corresponding to the copy information is application C, a prompt as shown in fig. 6 is generated and displayed, and the user is prompted to allow only application C to access and acquire the copy content (456456). By displaying the prompt for the target pasting application, a user can intuitively determine the target pasting application corresponding to the copy information.
The second application sends 105 a read request for the copy information to the system clipboard.
The system clipboard determines 106 whether the second application is a target paste application.
In some embodiments of the present application, after determining the target paste application corresponding to the copy information, the method further includes: and associating the copy information with the target pasting application to obtain association information. And if a read request of the second application to the copy information is received, the system cut-off board determines whether the second application is the target pasting application according to the association relation.
And if the second application is not the target pasting application, the system cut board refuses the reading request of the second application and does not send the copy information to the second application. After the system clipboard determines not to send the copy information to the second application, a rejection prompt may be popped up to the user. The rejection prompt is used to prompt the user that the second application has been rejected. Wherein the rejection prompt may include the second application information and the behavior of the second information being rejected (attempt to read the clipboard behavior). The rejection prompt may also include a rejection reason (e.g., the copy information allows only the target paste application to read, does not allow other applications to read, etc.). As shown in fig. 7, the rejection prompt may be displayed on the display interface of the electronic device in a box-flicking mode, where the rejection prompt includes a second application name (XXX video), and a rejection action (attempting to obtain the copy content of this time) corresponding to the second application.
In some embodiments of the present application, if the second application is not the target pasting application, the system clipboard may display an inquiry box for inquiring whether the user allows the second application to read the copy information, and determining whether to send the copy information to the second application based on a selection of the user. It will be appreciated that if the second application is not the target paste application, the system clipboard may display a prompt box that may include content related to reject prompts and query boxes. On the prompt box, the user can learn about the rejected second application and can choose whether to allow the second application to read the copy information. In some embodiments of the present application, after determining the copy information selected by the user, the first application determines a sensitivity level of the copy information, and if the second application is not the target paste application and the sensitivity level of the copy information is greater than a preset sensitivity threshold, the system clipboard may display an inquiry box or a rejection prompt. And only when the sensitivity level of the copied information is larger than a preset sensitivity threshold, the behavior of reading the copied information for the application without the reading authority is generated to reject the prompt or inquiry bullet frame, so that the occurrence frequency of the reject prompt or inquiry bullet frame can be reduced.
If the second application is the target pasting application, the system clipboard executes 107 to send the copy information to the second application. In some embodiments of the present application, after the system clipboard sends the replication information to the second application, the system clipboard deletes the saved replication information, and if there is associated information corresponding to the replication information, the system clipboard may delete the associated information corresponding to the replication information. The system clipboard sends the copy information to the second application, and a use prompt corresponding to the second application can be generated to prompt the user that the second application has acquired the copy content, so that the user perceives the process that the second application accesses the system clipboard, and the safety of the data of the system clipboard is improved.
In some embodiments of the present application, after 103 in fig. 1 is executed, if the target paste application cannot be determined according to the analysis of the context information, or if the determined target paste application is not installed by the electronic device, an application selection button may be displayed on an interface corresponding to the first application, and the description of the application selection button may be referred to the above description and will not be repeated herein.
According to the embodiment, the system cut-off board determines the target pasting application corresponding to the copy information in the system cut-off board based on the context analysis, and associates the copy information with the corresponding target pasting application, so that only the target pasting application associated with the copy information is allowed to access and read the copy information in the system cut-off board, the condition that data in the system cut-off board is illegally accessed or leaked by some applications can be avoided, and the safety of copying and pasting the information by the system cut-off board is improved.
In some embodiments of the present application, as shown in fig. 8, after the system clipboard writes the copy information and saves the copy information, the method further includes:
the system clipboard determines 201 the sensitivity level of the replicated information.
Sensitivity levels corresponding to different information may be set, with different information types corresponding to the same or different sensitivity levels. For example, two sensitivity levels (sensitive and insensitive) may be set, or three sensitivity levels and more may be set, and the sensitivity levels may be set according to actual conditions, without any limitation. For example, sensitivity levels may be sequentially increased by 1-N levels (e.g., non-sensitive, generally sensitive, more sensitive, highly sensitive, etc.).
In some embodiments of the present application, the system clipboard may invoke a system data management service to determine the sensitivity level of the replicated information. The system data management service may determine a sensitivity level of the copy information according to a keyword matching rule, for example, by presetting keywords, matching the copy information with preset keywords, and determining the sensitivity level of the copy information, where each keyword may correspond to one sensitivity level. The system data management service may also determine the sensitivity level of the replicated information based on a preset recognition model (e.g., machine learning or deep learning model). The method for determining the sensitivity level of the copy information by the system data management service may be selected according to the actual situation, and the above examples are only illustrative, and not limiting, and the system data management service may determine the sensitivity level of the copy information based on other methods.
202, the system clipboard determines whether the sensitivity level of the copied information is greater than a preset sensitivity threshold.
The sensitivity threshold may be preset according to the sensitivity level. For example, when the sensitivity level is 3 or more, the sensitivity level 2 may be set as the preset sensitivity threshold, and if the sensitivity level of a piece of copy information is greater than the sensitivity level 2, it is determined that the sensitivity level of the copy information is greater than the preset sensitivity threshold.
If the sensitivity level of the copy information is greater than the preset sensitivity threshold, executing 104 and subsequent processes in fig. 1; if the sensitivity level of the duplicated information is less than or equal to the preset sensitivity threshold, it is determined that the duplicated information is not required to be safely managed, and as a result, the steps 104 and the subsequent steps 104 in fig. 1 are not continuously executed. When the sensitivity level of the copy information is smaller than or equal to the preset sensitivity threshold, if a read request of the second application for the copy information is received, the copy information may be directly sent to the second application, or after the system clipboard may prompt and solicit comments from the user, it is determined whether to send the copy information to the second application according to whether the user is authorized or not. For example, as shown in fig. 9, the system clipboard may prompt and solicit comments from the user in a box-like manner. As shown in fig. 9, a determination button (consent) and a rejection button (rejection) may be included in the bullet frame, and the copy information is transmitted to the second application when the user selects the determination button; when the user selects the reject button, rejecting the read request of the second application, and generating a corresponding reject prompt.
It is to be understood that the execution time nodes 201-202 in fig. 8 are merely illustrative. The execution time nodes 201-202 in fig. 8 may be set according to practical situations, and are not limited in any way herein. For example, 201-202 in FIG. 8 may be performed after 105 in FIG. 1, and if the sensitivity level of the copy information is greater than the preset sensitivity threshold, 106 in FIG. 1 is performed. If the sensitivity level of the duplicate information is less than or equal to the preset sensitivity threshold, it is determined that the duplicate information does not need to be securely managed, and the process is ended, and the execution of 106 in fig. 1 is not continued, so that the duplicate information can be directly sent to the second application. Alternatively, the system clipboard may determine whether to send the copy information to the second application based on whether the user is authorized or not after the suggestion is solicited from the user. In addition, 201-202 in fig. 8 may be performed at any node before or after 102-105 in fig. 1, such as 201-202 in fig. 8 after 101 in fig. 1, 201-202 in fig. 8 after 105 in fig. 1, and 201-202 in fig. 8 after 106 in fig. 1 determines no.
It will be appreciated that 201 and 202 in fig. 8 may also be separately executed at different time nodes, and may be similar to the above description of executing time nodes, for example, executing 201 after 103 in fig. 1 and executing after 105 or 106 in fig. 1 if the determination result is no, which is not limited in this embodiment of the present application, but is to ensure that 201 is executed first.
According to the embodiment, before the context information corresponding to the copy information is analyzed, the sensitivity level of the copy information is determined, and when the sensitivity level of the copy information is smaller than or equal to the preset sensitivity threshold value, the context information corresponding to the copy information is not analyzed, so that the context analysis on the non-sensitive information can be avoided on the premise that the security management and control of the sensitive information in the system shear plate can be realized, and unnecessary energy loss is reduced.
Fig. 10 is a schematic diagram of a method for managing access to a clipboard according to an embodiment of the present application, where the method is applied to an electronic device, and the electronic device includes a first application, a second application, and a system clipboard. As shown in fig. 10, the method may include:
the first application determines 301 the copy information selected by the user.
302, a first application acquires context information corresponding to the copy information, analyzes the context information and determines a target pasting application corresponding to the copy information.
303, the first application invokes the system clipboard.
And 304, writing the copy information into the system clipboard, and storing the copy information and a target pasting application corresponding to the copy information.
The second application sends 305 a read request for the copy information to the system clipboard.
306, a system clipboard determines whether the second application is the target paste application.
If the second application is not the target paste application, the system clipboard executes 308, refuses the read request of the second application, and does not send the copy information to the second application. Alternatively, the user may be asked whether the second application is allowed to read the copy information in the form of a box or the like, and then it is determined whether to transmit the copy information to the second application based on the user's selection. If the second application is the target paste application, the system clipboard executes 307, sending the copy information to the second application.
For some embodiments 301-307 in fig. 10, please refer to the related descriptions of 101-107 in fig. 1, and detailed descriptions thereof are omitted herein.
According to the embodiment, the first application determines the target pasting application corresponding to the copy information selected by the user based on the context analysis, and after the copy information is associated with the target pasting application corresponding to the copy information, the system cut-off board is called to store the copy information and the target pasting application associated with the copy information, so that only the target pasting application associated with the copy information is allowed to access and read the copy information in the system cut-off board, the condition that data in the system cut-off board is illegally accessed or leaked by some applications can be avoided, and the security of the copy information in the system cut-off board is improved.
In some embodiments of the present application, as shown in fig. 11, after the system clipboard writes the copy information and stores the copy information and the target paste application corresponding to the copy information in fig. 10, the method further includes:
the system clipboard determines 401 the sensitivity level of the replicated information.
The system clipboard determines 402 whether the sensitivity level of the replicated information is greater than a preset sensitivity threshold.
If the sensitivity level of the copy information is greater than the preset sensitivity threshold and a read request for the copy information sent by the second application is received, 306 in fig. 10 is executed. If the sensitivity level of the duplicated information is less than or equal to the preset sensitivity threshold, it is determined that the duplicated information is not required to be safely managed, and the process is ended without continuing to execute the subsequent step 402 in fig. 10. When the sensitivity level of the copy information is smaller than or equal to the preset sensitivity threshold, if a read request of the second application for the copy information is received, the copy information may be directly sent to the second application, or after the system clipboard may prompt and solicit comments from the user, it is determined whether to send the copy information to the second application according to whether the user is authorized or not.
For some embodiments 401-402 in fig. 11, please refer to the related descriptions of 201-202 in fig. 8, and detailed descriptions thereof are omitted herein.
It will be appreciated that the execution time nodes 401-402 in fig. 11 may be set according to actual situations, and are not limited in any way herein. 401-402 in fig. 11 may be performed after 305 in fig. 10, and if the sensitivity level of the copy information is greater than the preset sensitivity threshold, 306 in fig. 10 is performed; if the sensitivity level of the duplicate information is less than or equal to the preset sensitivity threshold, it is determined that the duplicate information does not need to be securely managed, and the process is ended without further executing the steps 306 and 306 in fig. 10, the duplicate information may be directly sent to the second application, or the system clipboard may determine whether to send the duplicate information to the second application according to whether the user is authorized after the user is notified and solicited of comments. 401-402 in fig. 11 may also be performed at any one of the nodes before or after 302-305 in fig. 10, such as 401-402 in fig. 11 after 301 in fig. 10, 401-402 in fig. 11 after 305 in fig. 10.
It should be noted that, in the embodiment of the present application, the logic for comparing the sensitivity level of the copy information with the preset sensitivity threshold in fig. 8 and 11 is not limited, and whether the sensitivity level of the copy information is greater than the preset sensitivity threshold or not may be determined as described above, or whether the sensitivity level of the copy information is greater than or equal to the preset sensitivity threshold may be determined.
According to the embodiment, before the context information corresponding to the copy information is analyzed, the sensitivity level of the copy information is determined, and when the sensitivity level of the copy information is smaller than or equal to the preset sensitivity threshold value, the context information corresponding to the copy information is not analyzed, so that the context analysis on the non-sensitive information can be avoided on the premise that the security management and control of the sensitive information in the system shear plate can be realized, and unnecessary energy loss is reduced.
Fig. 12 is a schematic structural diagram of an electronic device 100 according to an embodiment of the present application. Referring to fig. 12, the electronic device 100 may include a processor 110, an external memory interface 120, an internal memory 121, a universal serial bus (universal serial bus, USB) interface 130, a charge management module 120, a power management module 141, a battery 142, an antenna 1, an antenna 2, a mobile communication module 150, a wireless communication module 160, an audio module 170, a speaker 170A, a receiver 170B, a microphone 170C, an earphone interface 170D, a sensor module 180, keys 190, a motor 191, an indicator 192, a camera 193, a display 194, and a subscriber identity module (subscriber identification module, SIM) card interface 195, etc. The sensor module 180 may include a pressure sensor 180A, a gyro sensor 180B, an air pressure sensor 180C, a magnetic sensor 180D, an acceleration sensor 180E, a distance sensor 180F, a proximity sensor 180G, a fingerprint sensor 180H, a temperature sensor 180J, a touch sensor 180K, an ambient light sensor 180L, a bone conduction sensor 180M, and the like.
It should be understood that the illustrated structure of the embodiment of the present invention does not constitute a specific limitation on the electronic device 100. In other embodiments of the present application, electronic device 100 may include more or fewer components than shown, or certain components may be combined, or certain components may be split, or different arrangements of components. The illustrated components may be implemented in hardware, software, or a combination of software and hardware.
The processor 110 may include one or more processing units, such as: the processor 110 may include an application processor (application processor, AP), a modem processor, a graphics processor (graphics processing unit, GPU), an image signal processor (image signal processor, ISP), a controller, a video codec, a digital signal processor (digital signal processor, DSP), a baseband processor, and/or a neural network processor (neural-network processing unit, NPU), etc.
A memory may also be provided in the processor 110 for storing instructions and data. In some embodiments, the memory in the processor 110 is a cache memory. The memory may hold instructions or data that the processor 110 has just used or recycled. If the processor 110 needs to reuse the instruction or data, it can be called directly from the memory. Repeated accesses are avoided and the latency of the processor 110 is reduced, thereby improving the efficiency of the system.
In some embodiments, the processor 110 may include one or more interfaces. The interfaces may include an integrated circuit (inter-integrated circuit, I1C) interface, an integrated circuit built-in audio (inter-integrated circuit sound, I2S) interface, a pulse code modulation (pulse code modulation, PCM) interface, a universal asynchronous receiver transmitter (universal asynchronous receiver/transmitter, UART) interface, a mobile industry processor interface (mobile industry processor interface, MIPI), a general-purpose input/output (GPIO) interface, a subscriber identity module (subscriber identity module, SIM) interface, and/or a universal serial bus (universal serial bus, USB) interface, among others.
The I1C interface is a bi-directional synchronous serial bus comprising a serial data line (SDA) and a serial clock line (derail clock line, SCL). The I2S interface may be used for audio communication.
PCM interfaces may also be used for audio communication to sample, quantize and encode analog signals. In some embodiments, the audio module 170 and the wireless communication module 160 may be coupled through a PCM bus interface.
The UART interface is a universal serial data bus for asynchronous communications. The bus may be a bi-directional communication bus. It converts the data to be transmitted between serial communication and parallel communication. In some embodiments, a UART interface is typically used to connect the processor 110 with the wireless communication module 160. For example: the processor 110 communicates with a bluetooth module in the wireless communication module 160 through a UART interface to implement a bluetooth function.
The MIPI interface may be used to connect the processor 110 to peripheral devices such as a display 194, a camera 193, and the like. The MIPI interfaces include camera serial interfaces (camera serial interface, CSI), display serial interfaces (display serial interface, DSI), and the like. In some embodiments, processor 110 and camera 193 communicate through a CSI interface to implement the photographing functions of electronic device 100. The processor 110 and the display 194 communicate via a DSI interface to implement the display functionality of the electronic device 100.
The GPIO interface may be configured by software. The GPIO interface may be configured as a control signal or as a data signal. In some embodiments, a GPIO interface may be used to connect the processor 110 with the camera 193, the display 194, the wireless communication module 160, the audio module 170, the sensor module 180, and the like. The GPIO interface may also be configured as an I1C interface, an I2S interface, a UART interface, an MIPI interface, etc.
The USB interface 130 is an interface conforming to the USB standard specification, and may specifically be a Mini USB interface, a Micro USB interface, a USB Type C interface, or the like. The USB interface 130 may be used to connect a charger to charge the electronic device 100, and may also be used to transfer data between the electronic device 100 and a peripheral device. And can also be used for connecting with a headset, and playing audio through the headset. The interface may also be used to connect other electronic devices 100, such as AR devices, etc.
It should be understood that the interfacing relationship between the modules illustrated in the embodiments of the present invention is only illustrative, and is not meant to limit the structure of the electronic device 100. In other embodiments of the present application, the electronic device 100 may also use different interfacing manners, or a combination of multiple interfacing manners in the foregoing embodiments.
The charge management module 140 is configured to receive a charge input from a charger. The charger can be a wireless charger or a wired charger.
The power management module 141 is used for connecting the battery 142, and the charge management module 140 and the processor 110. The power management module 141 receives input from the battery 142 and/or the charge management module 140 to power the processor 110, the internal memory 121, the display 194, the camera 193, the wireless communication module 160, and the like. The power management module 141 may also be configured to monitor battery capacity, battery cycle number, battery health (leakage, impedance) and other parameters.
The wireless communication function of the electronic device 100 may be implemented by the antenna 1, the antenna 2, the mobile communication module 150, the wireless communication module 160, a modem processor, a baseband processor, and the like.
The antennas 1 and 2 are used for transmitting and receiving electromagnetic wave signals. Each antenna in the electronic device 100 may be used to cover a single or multiple communication bands. Different antennas may also be multiplexed to improve the utilization of the antennas. For example: the antenna 1 may be multiplexed into a diversity antenna of a wireless local area network. In other embodiments, the antenna may be used in conjunction with a tuning switch.
The mobile communication module 150 may provide a solution for wireless communication including 2G/3G/4G/5G, etc., applied to the electronic device 100. The mobile communication module 150 may include at least one filter, switch, power amplifier, low noise amplifier (low noise amplifier, LNA), etc. The mobile communication module 150 may receive electromagnetic waves from the antenna 1, perform processes such as filtering, amplifying, and the like on the received electromagnetic waves, and transmit the processed electromagnetic waves to the modem processor for demodulation. The mobile communication module 150 can amplify the signal modulated by the modem processor, and convert the signal into electromagnetic waves through the antenna 1 to radiate.
The modem processor may include a modulator and a demodulator. The modulator is used for modulating the low-frequency baseband signal to be transmitted into a medium-high frequency signal. The demodulator is used for demodulating the received electromagnetic wave signal into a low-frequency baseband signal. The demodulator then transmits the demodulated low frequency baseband signal to the baseband processor for processing. The low frequency baseband signal is processed by the baseband processor and then transferred to the application processor. The application processor outputs sound signals through an audio device (not limited to the speaker 170A, the receiver 170B, etc.), or displays images or video through the display screen 194. In some embodiments, the modem processor may be a stand-alone device. In other embodiments, the modem processor may be provided in the same device as the mobile communication module 150 or other functional module, independent of the processor 110.
The wireless communication module 160 may provide solutions for wireless communication including wireless local area network (wireless local area networks, WLAN), bluetooth (BT), global navigation satellite system (global navigation satellite system, GNSS), frequency modulation (frequency modulation, FM), near field wireless communication technology (near field communication, NFC), infrared technology (IR), etc. applied on the electronic device 100. The wireless communication module 160 may be one or more devices that integrate at least one communication processing module. The wireless communication module 160 receives electromagnetic waves via the antenna 2, modulates the electromagnetic wave signals, filters the electromagnetic wave signals, and transmits the processed signals to the processor 110. The wireless communication module 160 may also receive a signal to be transmitted from the processor 110, frequency modulate it, amplify it, and convert it to electromagnetic waves for radiation via the antenna 2.
The electronic device 100 implements display functions through a GPU, a display screen 194, an application processor, and the like. The GPU is a microprocessor that serves exception alerts, and is connected to the display 194 and the application processor. The GPU is used to perform mathematical and geometric calculations for graphics rendering. Processor 110 may include one or more GPUs that execute program instructions to generate or change display information.
The display screen 194 is used to display images, videos, and the like. The display 194 includes a display panel. The display panel may employ a liquid crystal display (liquid crystal display, LCD), an organic light-emitting diode (OLED), an active-matrix organic light-emitting diode (AMOLED) or an active-matrix organic light-emitting diode (matrix organic light emitting diode), a flexible light-emitting diode (flex), a mini, a Micro led, a Micro-OLED, a quantum dot light-emitting diode (quantum dot light emitting diodes, QLED), or the like.
In some embodiments, the electronic device 100 may include 1 or N display screens 194, N being a positive integer greater than 1. The electronic device 100 may implement photographing functions through an ISP, a camera 193, a video codec, a GPU, a display screen 194, an application processor, and the like.
The camera 193 is used to capture still images or video. The object generates an optical image through the lens and projects the optical image onto the photosensitive element. The photosensitive element may be a charge coupled device (charge coupled device, CCD) or a Complementary Metal Oxide Semiconductor (CMOS) phototransistor. The photosensitive element converts the optical signal into an electrical signal, which is then transferred to the ISP to be converted into a digital image signal. The ISP outputs the digital image signal to the DSP for processing. The DSP converts the digital image signal into an image signal in a standard RGB, YUV, or the like format. In some embodiments, electronic device 100 may include 1 or N cameras 193, N being a positive integer greater than 1.
The digital signal processor is used for processing digital signals, and can process other digital signals besides digital image signals. For example, when the electronic device 100 selects a frequency bin, the digital signal processor is used to fourier transform the frequency bin energy, or the like.
Video codecs are used to compress or decompress digital video. The electronic device 100 may support one or more video codecs. In this way, the electronic device 100 may play or record video in a variety of encoding formats, such as: dynamic picture experts group (moving picture experts group, MPEG) 1, MPEG2, MPEG3, MPEG4, etc.
The NPU is a neural-network (NN) computing processor, and can rapidly process input information by referencing a biological neural network structure, for example, referencing a transmission mode between human brain neurons, and can also continuously perform self-learning. Applications such as intelligent awareness of the electronic device 100 may be implemented through the NPU, for example: image recognition, face recognition, speech recognition, text understanding, etc.
The internal memory 121 may include one or more random access memories (random access memory, RAM) and one or more non-volatile memories (NVM). In the embodiment of the present application, the internal memory 121 may also be referred to as a memory. In some embodiments, a processor (e.g., CPU) may store in memory the presentation time for each presentation of the guidance information and the cumulative number of times the guidance information is presented.
The external memory interface 120 may be used to connect external non-volatile memory to enable expansion of the memory capabilities of the electronic device 100. The external nonvolatile memory communicates with the processor 110 through the external memory interface 120 to implement a data storage function. For example, files such as music and video are stored in an external nonvolatile memory.
The electronic device 100 may implement audio functions through an audio module 170, a speaker 170A, a receiver 170B, a microphone 170C, an earphone interface 170D, an application processor, and the like. Such as music playing, recording, etc.
The audio module 170 is used to convert digital audio information into an analog audio signal output and also to convert an analog audio input into a digital audio signal. The audio module 170 may also be used to encode and decode audio signals.
The speaker 170A, also referred to as a "horn," is used to convert audio electrical signals into sound signals. The electronic device 100 may listen to music, or to hands-free conversations, through the speaker 170A.
A receiver 170B, also referred to as a "earpiece", is used to convert the audio electrical signal into a sound signal. When electronic device 100 is answering a telephone call or voice message, voice may be received by placing receiver 170B in close proximity to the human ear.
Microphone 170C, also referred to as a "microphone" or "microphone", is used to convert sound signals into electrical signals. When making a call or transmitting voice information, the user can sound near the microphone 170C through the mouth, inputting a sound signal to the microphone 170C. The electronic device 100 may be provided with at least one microphone 170C. In other embodiments, the electronic device 100 may be provided with two microphones 170C, and may implement a noise reduction function in addition to collecting sound signals. In other embodiments, the electronic device 100 may also be provided with three, four, or more microphones 170C to enable collection of sound signals, noise reduction, identification of sound sources, directional recording functions, etc.
The earphone interface 170D is used to connect a wired earphone. The headset interface 170D may be a USB interface 130 or a 3.5mm open mobile electronic device 100 platform (open mobile terminal platform, OMTP) standard interface, a american cellular telecommunications industry association (cellular telecommunications industry association of the USA, CTIA) standard interface.
The pressure sensor 180A is used to sense a pressure signal, and may convert the pressure signal into an electrical signal. In some embodiments, the pressure sensor 180A may be disposed on the display screen 194. The pressure sensor 180A is of various types, such as a resistive pressure sensor, an inductive pressure sensor, a capacitive pressure sensor, and the like. The capacitive pressure sensor may be a capacitive pressure sensor comprising at least two parallel plates with conductive material. The capacitance between the electrodes changes when a force is applied to the pressure sensor 180A. The electronic device 100 determines the strength of the pressure from the change in capacitance. When a touch operation is applied to the display screen 194, the electronic apparatus 100 detects the touch operation intensity according to the pressure sensor 180A. The electronic device 100 may also calculate the location of the touch based on the detection signal of the pressure sensor 180A.
The gyro sensor 180B may be used to determine a motion gesture of the electronic device 100. In some embodiments, the desktop card displayed on the display interface may be updated with the positioning of the gyroscopic sensor 180B.
The air pressure sensor 180C is used to measure air pressure. In some embodiments, electronic device 100 calculates altitude from barometric pressure values measured by barometric pressure sensor 180C, aiding in positioning and navigation.
The magnetic sensor 180D includes a hall sensor. The electronic device 100 may detect the opening and closing of the flip cover using the magnetic sensor 180D. In some embodiments, when the electronic device 100 is a flip machine, the electronic device 100 may detect the opening and closing of the flip according to the magnetic sensor 180D. And then according to the detected opening and closing state of the leather sheath or the opening and closing state of the flip, the characteristics of automatic unlocking of the flip and the like are set.
The acceleration sensor 180E may detect the magnitude of acceleration of the electronic device 100 in various directions (typically three axes). The magnitude and direction of gravity may be detected when the electronic device 100 is stationary. The method can also be used for identifying the gesture of the electronic equipment 100, and can be applied to applications such as horizontal and vertical screen switching, pedometers and the like.
A distance sensor 180F for measuring a distance. The electronic device 100 may measure the distance by infrared or laser. In some embodiments, the electronic device 100 may range using the distance sensor 180F to achieve quick focus.
The proximity light sensor 180G may include, for example, a Light Emitting Diode (LED) and a light detector, such as a photodiode. The light emitting diode may be an infrared light emitting diode. The electronic device 100 emits infrared light outward through the light emitting diode. The electronic device 100 detects infrared reflected light from nearby objects using a photodiode. When sufficient reflected light is detected, it may be determined that there is an object in the vicinity of the electronic device 100.
The ambient light sensor 180L is used to sense ambient light level. The electronic device 100 may adaptively adjust the brightness of the display 194 based on the perceived ambient light level. The ambient light sensor 180L may also be used to automatically adjust white balance when taking a photograph. Ambient light sensor 180L may also cooperate with proximity light sensor 180G to detect whether electronic device 100 is in a pocket to prevent false touches.
The fingerprint sensor 180H is used to collect a fingerprint. The electronic device 100 may utilize the collected fingerprint feature to unlock the fingerprint, access the application lock, photograph the fingerprint, answer the incoming call, etc.
The temperature sensor 180J is for detecting temperature.
The touch sensor 180K, also referred to as a "touch device". The touch sensor 180K may be disposed on the display screen 194, and the touch sensor 180K and the display screen 194 form a touch screen, which is also called a "touch screen". The touch sensor 180K is for detecting a touch operation acting thereon or thereabout. The touch sensor may communicate the detected touch operation to the application processor to determine the touch event type. Visual output related to touch operations may be provided through the display 194. In other embodiments, the touch sensor 180K may also be disposed on the surface of the electronic device 100 at a different location than the display 194. In some embodiments of the present application, the target paste application may be determined based on a user touch operation on the touch sensor 180K.
The bone conduction sensor 180M may acquire a vibration signal. In some embodiments, bone conduction sensor 180M may acquire a vibration signal of a human vocal tract vibrating bone pieces. The bone conduction sensor 180M may also contact the pulse of the human body to receive the blood pressure pulsation signal. In some embodiments, bone conduction sensor 180M may also be provided in a headset, in combination with an osteoinductive headset. The audio module 170 may analyze the voice signal based on the vibration signal of the sound portion vibration bone block obtained by the bone conduction sensor 180M, so as to implement a voice function. The application processor may analyze the heart rate information based on the blood pressure beat signal acquired by the bone conduction sensor 180M, so as to implement a heart rate detection function.
The keys 190 include a power-on key, a volume key, etc. The keys 190 may be mechanical keys. Or may be a touch key. The electronic device 100 may receive key inputs, generating key signal inputs related to user settings and function controls of the electronic device 100.
The motor 191 may generate a vibration cue. The motor 191 may be used for incoming call vibration alerting as well as for touch vibration feedback. For example, touch operations acting on different applications (e.g., photographing, audio playing, etc.) may correspond to different vibration feedback effects. The motor 191 may also correspond to different vibration feedback effects by touching different areas of the display screen 194. Different application scenarios (such as time reminding, receiving information, alarm clock, game, etc.) can also correspond to different vibration feedback effects. The touch vibration feedback effect may also support customization.
The indicator 192 may be an indicator light, may be used to indicate a state of charge, a change in charge, a message indicating a missed call, a notification, etc.
The SIM card interface 195 is used to connect a SIM card. The SIM card may be inserted into the SIM card interface 195, or removed from the SIM card interface 195 to enable contact and separation with the electronic device 100. The electronic device 100 may support 1 or N SIM card interfaces, N being a positive integer greater than 1. The SIM card interface 195 may support Nano SIM cards, micro SIM cards, and the like. The same SIM card interface 195 may be plugged into multiple frames of cards simultaneously. The multi-frame cards may be of the same type or of different types. The SIM card interface 195 may also be compatible with different types of SIM cards. The SIM card interface 195 may also be compatible with external memory cards. The electronic device 100 interacts with the network through the SIM card to realize functions such as communication and data communication. In some embodiments, the electronic device 100 employs esims, i.e.: an embedded SIM card. The eSIM card can be embedded in the electronic device 100 and cannot be separated from the electronic device 100.
The present embodiment also provides a computer storage medium having stored therein computer instructions that, when executed on the electronic device 100, cause the electronic device 100 to execute the above-described related method steps to implement the shear-plate access management method in the above-described embodiments.
The present embodiment also provides a computer program product which, when run on a computer, causes the computer to perform the above-mentioned related steps to implement the method for controlling access to a clipboard in the above-mentioned embodiments.
In addition, embodiments of the present application also provide an apparatus, which may be specifically a chip, a component, or a module, and may include a processor and a memory connected to each other; the memory is used for storing computer-executed instructions, and when the device is operated, the processor can execute the computer-executed instructions stored in the memory, so that the chip executes the clipboard access control method in the method embodiments.
The electronic device, the computer storage medium, the computer program product, or the chip provided in this embodiment are used to execute the corresponding methods provided above, so that the beneficial effects thereof can be referred to the beneficial effects in the corresponding methods provided above, and will not be described herein.
From the foregoing description of the embodiments, it will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-described division of functional modules is illustrated, and in practical application, the above-described functional allocation may be implemented by different functional modules according to needs, i.e. the internal structure of the apparatus is divided into different functional modules to implement all or part of the functions described above.
In the several embodiments provided in this application, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the apparatus embodiments described above are merely illustrative, e.g., the division of the modules or units is merely a logical function division, and there may be additional divisions when actually implemented, e.g., multiple units or components may be combined or integrated into another apparatus, or some features may be omitted or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, which may be in electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and the parts displayed as units may be one physical unit or a plurality of physical units, may be located in one place, or may be distributed in a plurality of different places. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in each embodiment of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
The integrated unit may be stored in a readable storage medium if implemented in the form of a software functional unit and sold or used as a stand-alone product. Based on such understanding, the technical solution of the embodiments of the present application may be essentially or a part contributing to the prior art or all or part of the technical solution may be embodied in the form of a software product stored in a storage medium, including several instructions to cause a device (may be a single-chip microcomputer, a chip or the like) or a processor (processor) to perform all or part of the steps of the methods of the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (Random Access Memory, RAM), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
Finally, it should be noted that the above embodiments are merely for illustrating the technical solution of the present application and not for limiting, and although the present application has been described in detail with reference to the preferred embodiments, it should be understood by those skilled in the art that the technical solution of the present application may be modified or substituted without departing from the spirit and scope of the technical solution of the present application.

Claims (16)

1. A method for managing access to a clipboard, the method being applied to an electronic device, the method comprising:
acquiring copy information in a first application;
acquiring screen content corresponding to the first application, identifying the screen content, and acquiring context information corresponding to the copy information;
analyzing the context information and determining a target application corresponding to the copy information;
when a read request of the second application for the copy information is received, determining whether the second application is a target application corresponding to the copy information;
and if the second application is the target application corresponding to the copy information, sending the copy information to the second application.
2. The method for managing access to a clipboard according to claim 1, wherein after determining a target application to which the copy information corresponds, the method further comprises:
and displaying the association prompt of the copy information and the target application according to a preset prompt rule.
3. The method of claim 1, wherein the analyzing the context information comprises:
analyzing the context information based on specific keyword matching; or alternatively
Analyzing the context information based on machine learning; or alternatively
The contextual information is analyzed based on deep learning.
4. The method of claim 1, wherein the analyzing the context information to determine the target application corresponding to the copy information includes:
if a plurality of applications are determined after the context information is analyzed, displaying the plurality of applications;
and determining a target application corresponding to the copy information in the plurality of applications based on the selection of the plurality of applications by the user.
5. The method of managing access to a clipboard of claim 4, wherein said displaying said plurality of applications comprises:
according to a preset selection rule, determining candidate applications in the plurality of applications;
and displaying the candidate application.
6. The method of claim 5, wherein determining candidate applications among the plurality of applications according to a preset selection rule comprises:
determining the candidate application in the plurality of applications according to the matching probability; or alternatively
And determining the candidate application in the plurality of applications according to the applications installed on the electronic equipment.
7. The method of claim 1, wherein the analyzing the context information to determine the target application corresponding to the copy information includes:
if the context information is analyzed and the target application corresponding to the copy information cannot be determined, or if the context information is analyzed and a plurality of applications are determined, a first control is displayed on a display interface corresponding to the first application, and the first control is used for assisting a user in determining the target application corresponding to the copy information;
and determining a target application corresponding to the copy information based on the operation of the user on the first control.
8. The method of managing access to a clipboard according to claim 7, wherein the determining, based on the selection of the first control by the user, a target application corresponding to the copy information comprises:
displaying a second control based on the operation of the user on the first control, wherein the second control comprises at least one piece of application information;
and determining a target application corresponding to the copy information based on the operation of the user on the second control.
9. The method of shear-plate access management as defined in claim 1, further comprising:
And if the second application is not the target application corresponding to the copy information, displaying an inquiry bullet frame and/or a rejection prompt.
10. The method of claim 9, wherein displaying an inquiry box and/or a reject hint if the second application is not the target application corresponding to the copy information comprises:
and if the second application is not the target application corresponding to the copy information and the sensitivity level of the copy information is greater than a preset sensitivity threshold, displaying an inquiry frame and/or a rejection prompt.
11. The method according to any one of claims 1 to 10, wherein determining whether the second application is the target application corresponding to the copy information includes:
and if the sensitivity level is greater than a preset sensitivity threshold, determining whether the second application is a target application corresponding to the copy information.
12. The method of shear-plate access management as defined in claim 11, further comprising:
if the sensitivity level is smaller than or equal to the preset sensitivity threshold, the copy information is sent to the second application; or alternatively
If the sensitivity level is smaller than or equal to the preset sensitivity threshold, displaying a reading prompt corresponding to the second application; and determining whether to send the copy information to the second application based on the operation of the reading prompt by the user.
13. A method for managing access to a clipboard, the method being applied to an electronic device, the method comprising:
when a user determines copy information in a third application, displaying a third control on a preset position corresponding to the copy information, wherein the third control comprises an application search control, and the application search control is used for searching applications installed in the electronic equipment; or the third control comprises an application list, wherein the application list comprises a plurality of applications determined based on context analysis of the copy information;
and determining a fourth application based on the operation of the user on the third control, wherein the fourth application has the reading authority of the copy information.
14. The method of managing access to a clipboard of claim 13, wherein after determining a fourth one of the applications, the method further comprises:
and displaying the association prompt of the copy information and the fourth application according to a preset prompt rule.
15. An electronic device comprising a memory and a processor;
the memory is used for storing program instructions;
the processor is configured to read the program instructions stored in the memory, so as to implement the method for managing access to a clipboard according to any one of claims 1 to 14.
16. A computer readable storage medium having stored therein computer readable instructions which when executed by a processor implement the shear-plate access management method of any of claims 1 to 14.
CN202210382343.3A 2022-04-12 2022-04-12 Clipboard access control method, electronic equipment and storage medium Active CN114945176B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210382343.3A CN114945176B (en) 2022-04-12 2022-04-12 Clipboard access control method, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210382343.3A CN114945176B (en) 2022-04-12 2022-04-12 Clipboard access control method, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN114945176A CN114945176A (en) 2022-08-26
CN114945176B true CN114945176B (en) 2023-05-30

Family

ID=82907068

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210382343.3A Active CN114945176B (en) 2022-04-12 2022-04-12 Clipboard access control method, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN114945176B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113127235A (en) * 2021-04-26 2021-07-16 珠海市魅族科技有限公司 Data management method and device of clipboard, computer equipment and storage medium
CN113220477A (en) * 2021-04-26 2021-08-06 珠海市魅族科技有限公司 Shear plate reading control method and device, electronic equipment and storage medium

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050172241A1 (en) * 2004-01-08 2005-08-04 International Business Machines Corporation System and method for improved direct system clipboard
CN107220555B (en) * 2016-03-22 2022-04-19 中兴通讯股份有限公司 Clipboard access control method and system
US10514833B2 (en) * 2016-12-30 2019-12-24 Google Llc Contextual paste target prediction
CN109784036A (en) * 2018-12-12 2019-05-21 平安科技(深圳)有限公司 Anti- processing method of divulging a secret, device, medium and the electronic equipment of application program
CN112287372B (en) * 2020-11-11 2023-05-26 三星电子(中国)研发中心 Method and apparatus for protecting clipboard privacy

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113127235A (en) * 2021-04-26 2021-07-16 珠海市魅族科技有限公司 Data management method and device of clipboard, computer equipment and storage medium
CN113220477A (en) * 2021-04-26 2021-08-06 珠海市魅族科技有限公司 Shear plate reading control method and device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN114945176A (en) 2022-08-26

Similar Documents

Publication Publication Date Title
EP3916534A1 (en) Shortcut function activation method and electronic device
CN113704014B (en) Log acquisition system, method, electronic device and storage medium
CN114173204B (en) Message prompting method, electronic equipment and system
EP3859576B1 (en) Application permission management method and electronic device
CN114553814B (en) Method and device for processing push message
CN113196732B (en) Cross-device authentication method and related device
CN116048831B (en) Target signal processing method and electronic equipment
WO2023051094A1 (en) Memory recovery method and apparatus, electronic device, and readable storage medium
CN115550423B (en) Data communication method, electronic device and storage medium
CN114698078B (en) Transmission power adjustment method, electronic device, and storage medium
WO2022252812A1 (en) Information protection method and electronic device
CN114945176B (en) Clipboard access control method, electronic equipment and storage medium
WO2022022466A1 (en) Method and apparatus for determining file storage position, and terminal
CN116527266A (en) Data aggregation method and related equipment
CN111339513B (en) Data sharing method and device
CN116450259A (en) Service abnormality reminding method, electronic equipment and storage medium
CN116828100A (en) Bluetooth audio playing method, electronic equipment and storage medium
CN114971107A (en) Privacy risk feedback method and device and first terminal equipment
CN114329595B (en) Application program detection method, device, storage medium and program product
CN114077323B (en) Touch screen false touch prevention method of electronic equipment, electronic equipment and chip system
CN115792431B (en) Abnormal position detection method and electronic equipment
CN117082419B (en) Speaker control method, system, device, apparatus and storage medium
CN114666441B (en) Method for calling capabilities of other devices, electronic device, system and storage medium
CN116048324B (en) Desktop management method, electronic device and storage medium
CN115016666B (en) Touch processing method, terminal equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant