CN115544497A - Safe screen capture prevention system in Wayland environment - Google Patents

Safe screen capture prevention system in Wayland environment Download PDF

Info

Publication number
CN115544497A
CN115544497A CN202211545162.4A CN202211545162A CN115544497A CN 115544497 A CN115544497 A CN 115544497A CN 202211545162 A CN202211545162 A CN 202211545162A CN 115544497 A CN115544497 A CN 115544497A
Authority
CN
China
Prior art keywords
wayland
control
screenshot
application
synthesizer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202211545162.4A
Other languages
Chinese (zh)
Other versions
CN115544497B (en
Inventor
易强
周磊
张铎
陈霖翔
王勇军
刘意虎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Kirin Software Co Ltd
Original Assignee
Kirin Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Kirin Software Co Ltd filed Critical Kirin Software Co Ltd
Priority to CN202211545162.4A priority Critical patent/CN115544497B/en
Publication of CN115544497A publication Critical patent/CN115544497A/en
Application granted granted Critical
Publication of CN115544497B publication Critical patent/CN115544497B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/53Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Digital Computer Display Output (AREA)

Abstract

The invention relates to a safe anti-screenshot system in a Wayland environment, which is realized by expanding a Wayland protocol based on Xwayland and Wayland synthesizers in the Wayland environment, and the final screenshot management is realized by a management list based on the Wayland synthesizers. The method improves the condition that screen capturing software in the prior system can randomly capture the content of any window into the condition that sensitive window management and control are realized by adding a protocol on a Wayland layer, and supports multiple scenes of managing and controlling multiple windows, minimizing the managed windows, exiting windows abnormally and the like. Privacy, flexibility and expandability are better.

Description

Safe screen capture prevention system in Wayland environment
Technical Field
The invention relates to the technical field of data security management and control, in particular to a security screen capture prevention system in a Wayland environment.
Background
The kylin operating system is a highly safe and highly reliable domestic operating system which is created for the general field and the special field. At present, domestic CPUs (central processing units) such as Feiteng, spread, loongson, shenwei, mega-core, hai-light and the like can be simultaneously supported.
The safe screen capture prevention method for the Wayland environment achieves the purpose of protecting the safety of user privacy data by controlling screen capture application, screen capture range, full screen capture and thumbnail display. Screenshot software common in a management and control system is supported, such as: kylin-screenshot, flameshot, weChat screenshot, and the like.
The Chinese invention patent (application number 202011348616.X, anti-screen-capture method, device, computer equipment and storage medium) monitors whether a target method of a target interface is called, and if the target method is monitored, original window attribute data in the target method is acquired; and modifying the original window attribute data according to the target data to obtain target window attribute data. And the target data is used for setting the target interface as an interface for prohibiting screen capture, and then the target interface is displayed according to the target window attribute data, so that the screen capture prevention effect of all window objects is reinforced, the reinforcement quality is improved, the screen capture of malicious programs is prevented, the malicious programs are prevented from being captured comprehensively, and information leakage is avoided. Although the invention meets the requirement of screen capture prevention by designing and monitoring whether the target method of the target interface is called, the invention does not relate to the problem of screen capture prevention under Wayland environment considered by the invention.
Chinese invention patent (202110835897. X, a screen capture prevention processing method, a computing device and a readable storage medium) the present invention discloses a screen capture prevention processing method, which is executed in a computing device, wherein the computing device runs an operating system, and the operating system runs one or more application programs, and the method comprises: when receiving an anti-screenshot starting instruction sent by a first process, starting an anti-screenshot function; when receiving an anti-screenshot closing instruction sent by a second process, judging whether other processes with an anti-screenshot function started exist at present; if other processes with the screen capture prevention function started exist, the starting state of the screen capture prevention function is continuously kept; and if no other processes with the screen capture prevention function started exist, closing the screen capture prevention function. The invention also discloses corresponding computing equipment and a readable storage medium. The anti-screenshot processing method can ensure the security of the confidential documents and cannot influence the normal screenshot of the non-confidential documents by the user. Although the invention meets the requirements of screen capture prevention by designing a DBUS interface communication method, the invention does not relate to the problem of screen capture prevention under the Wayland environment considered by the invention.
The user can capture images in any area of the screen under the current kylin operating system, but in some specific scenes of banks, national defense, governments and other units, certain limitation needs to be made on screenshot contents or areas due to the requirement of information security. For example, when user information exists in a certain program in the screen, the screenshot must be shielded to prevent information leakage. Therefore, how to raise the information security requirement on the kylin system is an important issue facing the present.
Disclosure of Invention
In order to solve the defects of the prior art, the invention provides a safe screen capture prevention system in a Wayland environment, which is realized by expanding a Wayland protocol based on Xwayland and a Wayland synthesizer in the Wayland environment, wherein the final screen capture control is realized by a control list in the Wayland synthesizer based on the Wayland synthesizer, and the control list in the Wayland synthesizer comprises a full screen control list and a sensitive window control list;
the method comprises the following steps that a Wayland protocol registered in a Wayland synthesizer is a screenshot management and control extension protocol, and the Wayland synthesizer directly realizes screenshot management and control on the Wayland application through the protocol;
the protocol registered in Xwayland is an X extension protocol, and information interaction with the Wayland synthesizer is completed through the X extension protocol, so that the Wayland synthesizer indirectly realizes screenshot management and control management of X application.
The method comprises the steps that a screenshot control extension protocol is registered in a screenshot control interface in a Wayland synthesizer, a screenshot control request of the Wayland application is directly processed through the screenshot control interface, and the screenshot control request is written into a control list;
the X extension protocol is registered in a screenshot control interface in Xwayland, the screenshot control request applied by the X is forwarded to the screenshot control interface of the Wayland synthesizer through the X extension protocol, and the screenshot control request is written into a control list through the screenshot control interface of the Wayland synthesizer.
And simultaneously realizing a full screen management and control list in Xwayland, wherein the full screen management and control list is used for uniformly maintaining the full screen management and control condition of the X application.
When the Xwayland realizes the full screen capture control of the X application, the unified maintenance of the full screen capture control condition of the X application is realized through the following mechanisms, and meanwhile, the information interaction with the Wayland synthesizer is realized:
step S1: verifying the control authority of the X application full screen screenshot: the Xwayland inquires whether X application requests full screen capture control; if yes, executing step S2, otherwise, executing step S3;
step S2: if the current X application is the only application requesting full screen capture control, xwayland requests the full screen capture control from the Wayland synthesizer, and adds the current X application into a full screen control list of Xwayland, otherwise, only adds the current X application into the full screen control list of Xwayland, and does not request the full screen capture control from the Wayland synthesizer;
and step S3: and removing the corresponding X application from the full screen control list of the Xwayland, judging whether the full screen control list is empty or not, and requesting a Wayland synthesizer to cancel a control strategy of the full screen screenshot control under the condition that the full screen control list is empty.
The Wayland synthesizer and the Xwayland also realize full screen capture control on the X application through the following mechanisms:
step Sl: xwayland processes more than one X application, and the processed more than one X application is regarded as one Wayland application by a Wayland synthesizer, and is hereinafter referred to as an equivalent Wayland application;
step Sm: verify "equivalent Wayland application" full screen capture governance: the Wayland synthesizer inquires whether full screen capture control is requested by an equivalent Wayland application; if yes, executing step Sn, otherwise, executing step So;
step Sn: judging whether the 'equivalent Wayland application' is the only application requesting full screen screenshot control, if not, only adding the 'equivalent Wayland application' into a full screen control list of the Wayland synthesizer, and if so, setting a full screen control identifier for the Wayland synthesizer and simultaneously adding the 'equivalent Wayland application' into the full screen control list of the Wayland synthesizer;
step So: and (3) removing the corresponding 'equivalent Wayland application' from the management and control list of the Wayland synthesizer, judging whether the management and control list is empty, and canceling the setting of the full screen capture management and control identification by the Wayland synthesizer under the condition that the management and control list is empty.
When the Wayland synthesizer realizes full screen capture control on the Wayland application, the Wayland synthesizer is realized through the following mechanisms:
step Sa: verifying Wayland application full screen capture control authority: the Wayland synthesizer inquires whether a Wayland application requests full screen capture control; if yes, executing the step Sb, and if not, executing the step Sc;
and Sb: judging whether the current Wayland application is the only application requesting full screen screenshot management control, if not, only adding the current Wayland application into a full screen management control list of a Wayland synthesizer, and if so, setting a full screen management control identifier for the Wayland synthesizer and simultaneously adding the current Wayland application into the full screen management control list of the Wayland synthesizer;
step Sc: and removing the corresponding Wayland application from the management and control list of the Wayland synthesizer, judging whether the management and control list is empty, and canceling the setting of the full screen capture management and control identification by the Wayland synthesizer under the condition that the management and control list is empty.
The Wayland synthesizer is provided with a screenshot interface, and the screenshot interface is directly or indirectly called when an X screenshot application or a Wayland screenshot application carries out screenshot;
when the screenshot interface is used for an X screenshot application or a Wayland screenshot application, screenshot control information about the X application or the Wayland application written in a Wayland synthesizer control list is read.
When the Wayland screenshot is applied to screenshot, a screenshot interface of a Wayland synthesizer is directly called;
when the screenshot application is used for screenshot, a screenshot interface of the Wayland synthesizer is indirectly called through the screenshot interface in the Xwayland so as to obtain screenshot control information about the application X written in a Wayland synthesizer control list.
The method improves the condition that screen capturing software in the prior system can randomly capture the content of any window into the condition that sensitive window management and control are realized by adding a protocol on a Wayland layer, and supports multiple scenes of managing and controlling multiple windows, minimizing the managed windows, exiting windows abnormally and the like. Privacy, flexibility and expandability are better.
Drawings
FIG. 1 is a logical framework diagram of a security anti-screenshot system in a Wayland environment disclosed by the invention.
FIG. 2 is a flow chart of the Wayland synthesizer full screen screenshot management based on the present invention.
FIG. 3 is a flow chart of a Wayland synthesizer screenshot interface implementation in accordance with the present invention.
Detailed Description
In order to further understand the technical scheme and the advantages of the present invention, the technical scheme and the advantages thereof are described in detail below with reference to the accompanying drawings.
The safe anti-screen-capture method in the Wayland environment is realized based on the kylin operating system, and the method is realized by adding an extension protocol. Generally, there are three general ways to capture a picture: window screenshots, full screen screenshots, and area screenshots. When the window displays sensitive information or private data, the method can manage and control the window and content when the screenshot tool captures the screenshot according to the three conditions. The method mainly comprises the following functions: and screenshot control of a sensitive window and full-screen screenshot control.
The sensitive window screenshot management and control comprises the following steps: setting/recovering the control of the sensitive window, controlling the multiple sensitive windows, automatically adjusting the control strategy of the sensitive window when the window is closed, automatically adjusting the control strategy of the minimization of the sensitive window and the like.
Full screen capture management and control: through the verified process, the prohibition of full screen capture, automatic adjustment of a full screen capture control strategy when the process is closed and the like can be set/recovered.
Fig. 1 is a logic framework diagram of a security anti-screenshot system in a Wayland environment disclosed in the present invention, and as shown in fig. 1, the present invention extends implementation of the Wayland protocol based on libwayland library (including service end and client end implementation of the Wayland protocol) and a Wayland synthesizer in the Wayland environment. The Wayland application directly uses the protocol interface to implement the Wayland application's control settings for windows or full screen shots. And the Wayland synthesizer responds to the request of the Wayland application and completes the control of the screenshot software.
For X application, an extension protocol is added by depending on an X framework, and the extension protocol utilizes a C/S model communication mechanism of X11 to transmit data. The X application program is used as a client to call a screenshot control interface to realize the control setting of the X application program on the window; and the server side realizes that the screenshot control interface forwards the screenshot control message to the Wayland synthesizer. And the Wayland synthesizer responds to the request and completes the control of the screenshot software.
In the Wayland environment, regardless of an X screenshot application or a Wayland screenshot application, screenshot is finally completed by using a screenshot effect of a Wayland synthesizer, so screenshot management and control can be realized in the screenshot effect of the Wayland synthesizer.
For screenshot management and control (including sensitive window screenshot management and full screen screenshot management and control) applications, the X application is implemented by a management and control list (including a full screen management and control list and a sensitive window management and control list) in a Wayland synthesizer when the sensitive window screenshot management and control is set, but when the full screen screenshot management and control is performed, the X application needs to add a full screen management and control list in Xwayland, that is, the Xwayland maintains the full screen screenshot management and control of the X application uniformly.
As shown in fig. 1, a screenshot interface is implemented in the Wayland synthesizer, and is used for direct or indirect calling when the screenshot is performed by the X screenshot application or the Wayland screenshot application; when the screenshot interface is used for an X screenshot application or a Wayland screenshot application, screenshot control information about the X application or the Wayland application written in a Wayland synthesizer control list is read.
When the Wayland screenshot is applied to screenshot, a screenshot interface of a Wayland synthesizer is directly called; when the screenshot application is used for screenshot, a screenshot interface of the Wayland synthesizer is indirectly called through the screenshot interface in the Xwayland to obtain screenshot management and control information about the application X written in a Wayland synthesizer management and control list.
Based on the safe screen capture prevention system in the Wayland environment, the safe screen capture is realized by combining the following specific mechanisms:
1. a set of screenshot control extension protocol is defined based on a Wayland protocol, the protocol comprises three interfaces of sensitive window screenshot control, full screen screenshot control and control window inquiry, the screenshot control extension protocol is implemented in a screenshot control interface of a Wayland synthesizer, the screenshot control extension protocol only provides a way for information transmission between the Wayland synthesizer and Xwayland, and the specific functions of the screenshot control extension protocol are implemented by combining internal logics of the Wayland synthesizer and Xwayland.
2. A set of X expansion protocols are defined based on an X framework, and support X applications to indirectly use a Wayland screenshot control interface, including sensitive window screenshot control, full-screen screenshot control and control window query.
3. And an X screenshot control interface (including sensitive window screenshot control, full screen screenshot control and control window query) is realized, when screenshot control is carried out, the X application screenshot control is realized through an X extension protocol, and after Xwayland receives a request, the sensitive window control request of the X application is forwarded to the Wayland synthesizer. Xwayland will manage the request case of full screen capture control at the same time.
If the X application requests full screen capture control, verifying that the X application has a global capture control authority, then inquiring whether X application has requested full screen capture control or not by Xwayland, if the current X application is the only application requesting full screen capture control, requesting full screen capture control from a Wayland synthesizer by Xwayland, adding the current X application into a full screen control list of Xwayland, otherwise, only adding the current X application into the full screen control list, not requesting full screen capture control from the Wayland synthesizer, and when the full screen control list is empty, requesting full screen capture control from the Wayland again by Xwayland to cancel the control. At this time, the plurality of X applications are treated by Xwayland, and are regarded as one Wayland application by the Wayland synthesizer.
If the X application requests the screenshot management and control of the sensitive window, the Xwayland directly forwards the request to the Wayland synthesizer after receiving the request, and the Wayland synthesizer adds the corresponding X application into a sensitive window management and control list. The sensitive window management is different from the full screen capture management, and a plurality of X applications are not required to be processed into one Wayland application.
4. The method includes the steps that a Wayland screenshot control interface (including sensitive window screenshot control, full screen screenshot control and control window inquiry) is achieved, when screenshot control is needed, a Wayland application directly uses the screenshot control interface of a Wayland protocol to request a synthesizer to control full screen screenshot or sensitive window screenshot, and the Wayland synthesizer adds the application to a control list or sets an identifier.
FIG. 2 is a flow chart of the Wayland synthesizer full screen screenshot management and control based on the present invention: if the WAyland application requests full screen capture control, the global screen capture control authority of the WAyland application is verified firstly, then a Wayland synthesizer inquires whether the WAyland application requests full screen capture control, if the current WAyland application is the only application requesting full screen capture control, the Wayland synthesizer sets a full screen capture control identifier and adds the full screen capture control identifier into a full screen control list, otherwise, only adds the full screen control list, and does not set the full screen capture control identifier. When the full screen control list is empty, the Wayland cancels the setting of the full screen screenshot control identification. It should be noted that the Wayland application includes both the Wayland application that directly requests full-screen management from the Wayland synthesizer and the Wayland application that is treated by the Wayland synthesizer as a Wayland application, and it is understood that all the X applications are treated as a Wayland application in the Wayland synthesizer.
If the Wayland application requests the sensitive window screenshot management and control, the Wayland synthesizer adds the corresponding Wayland application to the sensitive window management and control list after receiving the request.
5. FIG. 3 is a flow chart of a Wayland synthesizer screenshot interface implementation in accordance with the present invention: when the Wayland screenshot interface is realized, the X screenshot application and the Wayland screenshot application acquire screenshot data through the screenshot interface, the screenshot data are returned by the Wayland synthesizer, and when the Wayland returns the data, the managed area (a sensitive window or a full screen) is modified into black.
Furthermore, the Wayland synthesizer may determine the global screenshot mark, modify all the contents to black if the mark exists, continue to determine whether the sensitive window management and control list has a managed window if the mark does not exist, acquire information such as the position and size of the corresponding window if the window exists, and modify the corresponding area in the screenshot to black.
6. When the application exits or abnormally ends, the X application resets the global management state of the window through the Xwayland and informs the Wayland synthesizer, and the Wayland application resets the window or the global management state through the Wayland synthesizer. That is, when the application exits or abnormally ends, the Wayland synthesizer receives the relevant message, and automatically adjusts the management and control list or adjusts the global management and control flag.
In the present invention, wayland is a communication protocol that specifies a communication method between a display service and a client thereof, and a display service using this protocol is called a Wayland synthesizer. In a Linux-based graphical display operating system, the Wayland synthesizer and the X display service belong to the same class, and are used for replacing the old X display service. Desktop graphical display systems centered on Wayland synthesizers constitute the Wayland environment.
In the present invention, the so-called Xwayland is an Xorg service operating on a wayland synthesizer. It has been separated from the main Xorg service, which allows running X clients in the wayland session.
In the present invention, the meaning of the X extension protocol refers to: x Server defines 119 interfaces, and interfaces other than 128 are for EXTENSIONs (# define EXTENSION _ BASE 128). But multiple interfaces may be implemented per extension, while ProcVector only prepares one entry for each extension. Therefore, the extension protocol needs to distribute itself if there are multiple interfaces. The implementation of each extension protocol requires unified processing from the respective corresponding extension protocol entry.
The invention fully utilizes an expansion protocol basic frame under an X frame and utilizes a Client/Server communication mode under the X frame to realize the control of the screen capture of the content of the X window under the Wayland environment through the modification of the Xwayland. The method improves the condition that screen capturing software in the prior system can optionally capture the content of any window into the condition that sensitive window management and control are realized by adding a protocol on a Wayland layer, and supports multiple scenes such as multiple windows, minimization of the managed window, abnormal exit of the window and the like. Privacy, flexibility and expandability are better.
Although the present invention has been described with reference to the preferred embodiments, it should be understood that the scope of the present invention is not limited thereto, and those skilled in the art will appreciate that various changes and modifications can be made without departing from the spirit and scope of the present invention.

Claims (8)

1. A safe screen capture prevention system in a Wayland environment is characterized in that: expanding a Wayland protocol to realize the Wayland protocol based on Xwayland and Wayland synthesizers in the Wayland environment, wherein the final screenshot control is realized by a control list based on the Wayland synthesizers, and the control list in the Wayland synthesizers comprises a full-screen control list and a sensitive window control list;
the method comprises the following steps that a Wayland protocol registered in a Wayland synthesizer is a screenshot management and control extension protocol, and the Wayland synthesizer directly realizes screenshot management and control on the Wayland application through the protocol;
the protocol registered in Xwayland is an X extension protocol, and information interaction with the Wayland synthesizer is completed through the X extension protocol, so that the Wayland synthesizer indirectly realizes screenshot management and control management of X application.
2. The Wayland environment security screen capture prevention system of claim 1, wherein:
the screenshot control extension protocol is registered in a screenshot control interface in the Wayland synthesizer, and a screenshot control request of the Wayland application is directly processed through the screenshot control interface and written into a control list;
the X extension protocol is registered in a screenshot control interface in Xwayland, the screenshot control request applied by the X is forwarded to the screenshot control interface of the Wayland synthesizer through the X extension protocol, and the screenshot control request is written into a control list through the screenshot control interface of the Wayland synthesizer.
3. The Wayland environment security screen capture prevention system of claim 2, wherein: and a full screen management and control list is simultaneously realized in Xwayland, and is used for uniformly maintaining the full screen capture management and control condition of the X application.
4. The Wayland environment security screen capture prevention system of claim 3, wherein: when Xwayland realizes full screen capture management and control on X application, the method realizes unified maintenance of the full screen capture management and control condition of the X application through the following mechanism, and simultaneously realizes information interaction with a Wayland synthesizer:
step S1: verifying the control authority of the X application full screen capture: xwayland inquires whether X application requests full screen capture control; if yes, executing step S2, otherwise, executing step S3;
step S2: if the current X application is the only application requesting full screen capture control, xwayland requests the full screen capture control from the Wayland synthesizer, and adds the current X application into a full screen control list of Xwayland, otherwise, only adds the current X application into the full screen control list of Xwayland, and does not request the full screen capture control from the Wayland synthesizer;
and step S3: and removing the corresponding X application from the full screen management and control list of the Xwayland, judging whether the full screen management and control list is empty, and requesting a Wayland synthesizer to cancel a management and control strategy of full screen screenshot management and control under the condition that the full screen management and control list is empty.
5. The Wayland environment security screen capture prevention system of claim 4, wherein: wayland synthesizers and Xwayland also enable full screen shot governance of X applications by:
step Sl: xwayland processes more than one X application, and the processed more than one X application is regarded as one Wayland application by a Wayland synthesizer, and is hereinafter referred to as an equivalent Wayland application;
step Sm: verify "equivalent Wayland application" full screen capture governance: the Wayland synthesizer inquires whether 'equivalent Wayland application' requests full screen screenshot management; if yes, executing step Sn, otherwise, executing step So;
step Sn: judging whether the 'equivalent Wayland application' is the only application requesting full screen screenshot control, if not, only adding the 'equivalent Wayland application' into a full screen control list of the Wayland synthesizer, and if so, setting a full screen control identifier for the Wayland synthesizer and simultaneously adding the 'equivalent Wayland application' into the full screen control list of the Wayland synthesizer;
step So: and (3) removing the corresponding 'equivalent Wayland application' from the control list of the Wayland synthesizer, judging whether the control list is empty, and canceling the setting of the full-screen screenshot control identification by the Wayland synthesizer under the condition that the control list is empty.
6. The Wayland environment security screen capture prevention system of claim 2, wherein: when the Wayland synthesizer implements full screen capture control on the Wayland application, the Wayland synthesizer is implemented by the following mechanisms:
step Sa: verifying Wayland application full screen capture control authority: the Wayland synthesizer inquires whether a Wayland application requests full screen capture control; if yes, executing the step Sb, and if not, executing the step Sc;
and Sb: judging whether the current Wayland application is the only application requesting full screen screenshot control, if not, only adding the current Wayland application into a full screen control list of a Wayland synthesizer, and if so, setting a full screen control identifier for the Wayland synthesizer and simultaneously adding the current Wayland application into the full screen control list of the Wayland synthesizer;
step Sc: and removing the corresponding Wayland application from the management and control list of the Wayland synthesizer, judging whether the management and control list is empty, and canceling the setting of the full screen capture management and control identification by the Wayland synthesizer under the condition that the management and control list is empty.
7. The Wayland environment security screen capture prevention system of claim 1, wherein: the Wayland synthesizer is provided with a screenshot interface for direct or indirect calling when an X screenshot application or a Wayland screenshot application carries out screenshot;
when the screenshot interface is used for an X screenshot application or a Wayland screenshot application, screenshot control information about the X application or the Wayland application written in a Wayland synthesizer control list is read.
8. The Wayland environment security screen capture prevention system of claim 7, wherein: when the Wayland screenshot is applied to screenshot, a screenshot interface of a Wayland synthesizer is directly called;
when the screenshot application is used for screenshot, a screenshot interface of the Wayland synthesizer is indirectly called through the screenshot interface in the Xwayland so as to obtain screenshot control information about the application X written in a Wayland synthesizer control list.
CN202211545162.4A 2022-12-05 2022-12-05 Safe screen capture prevention system in Wayland environment Active CN115544497B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211545162.4A CN115544497B (en) 2022-12-05 2022-12-05 Safe screen capture prevention system in Wayland environment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211545162.4A CN115544497B (en) 2022-12-05 2022-12-05 Safe screen capture prevention system in Wayland environment

Publications (2)

Publication Number Publication Date
CN115544497A true CN115544497A (en) 2022-12-30
CN115544497B CN115544497B (en) 2023-03-28

Family

ID=84722315

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211545162.4A Active CN115544497B (en) 2022-12-05 2022-12-05 Safe screen capture prevention system in Wayland environment

Country Status (1)

Country Link
CN (1) CN115544497B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150161754A1 (en) * 2013-12-10 2015-06-11 Joel Solomon Isaacson System and method for remote graphics using non-pixel rendering interfaces
CN114741081A (en) * 2022-06-13 2022-07-12 北京麟卓信息科技有限公司 Cross-operation environment display output sharing method based on heterogeneous cache access
CN114969747A (en) * 2022-08-02 2022-08-30 北京麟卓信息科技有限公司 Screen capture limiting method for android application on desktop system
CN115373878A (en) * 2022-10-27 2022-11-22 麒麟软件有限公司 Anti-screenshot extended protocol implementation system based on X framework

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150161754A1 (en) * 2013-12-10 2015-06-11 Joel Solomon Isaacson System and method for remote graphics using non-pixel rendering interfaces
CN114741081A (en) * 2022-06-13 2022-07-12 北京麟卓信息科技有限公司 Cross-operation environment display output sharing method based on heterogeneous cache access
CN114969747A (en) * 2022-08-02 2022-08-30 北京麟卓信息科技有限公司 Screen capture limiting method for android application on desktop system
CN115373878A (en) * 2022-10-27 2022-11-22 麒麟软件有限公司 Anti-screenshot extended protocol implementation system based on X framework

Also Published As

Publication number Publication date
CN115544497B (en) 2023-03-28

Similar Documents

Publication Publication Date Title
US20190097807A1 (en) Network access control based on distributed ledger
US7673324B2 (en) Method and system for tracking an operating performed on an information asset with metadata associated therewith
CN104318171B (en) Android private data guard methods and system based on rights label
US8578374B2 (en) System and method for managing virtual machines
US20100299759A1 (en) Digital information security system, kernal driver apparatus and digital information security method
US9083692B2 (en) Apparatus and method of providing security to cloud data to prevent unauthorized access
JP6442751B2 (en) Information processing apparatus, information processing system, control method, and program
CA2797880C (en) Method and apparatus for implementing real-time protection
CN106790172B (en) File sharing method, server and client
DE112011103580B4 (en) A method, secure entity, system, and computer program product for securely managing user access to a file system
WO2014150339A2 (en) Method and system for enabling communications between unrelated applications
CN109951337B (en) Virtual operation and maintenance fortress system
US11556634B2 (en) Systems and methods for event-based application control
EP2960817A1 (en) Radiation image inspection system and method based on b/s architecture
US20180300474A1 (en) Program behavior monitoring control apparatus, distributed object creation management apparatus, recording medium, and program behavior monitoring system
US9355226B2 (en) Digital rights management system implemented on a scanner
CN110443050B (en) Method and system for processing counterfeit process in file transparent encryption and decryption system
CN109657490B (en) Transparent encryption and decryption method and system for office files
CN115373878B (en) Anti-screenshot extension protocol implementation system based on X framework
CN115544497B (en) Safe screen capture prevention system in Wayland environment
US11720706B2 (en) Inline data loss prevention for a group-based communication system
CN116522299A (en) Application program window watermark adding method and device based on Linux system
CN105631357A (en) System and method for protecting information security of mobile terminals
CN109460654B (en) Service control method, service control system, server and computer storage medium
US20120030760A1 (en) Method and apparatus for combating web-based surreptitious binary installations

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant