CN117113417A - Method, system, equipment and medium for managing and controlling clipboard under Linux system - Google Patents

Method, system, equipment and medium for managing and controlling clipboard under Linux system Download PDF

Info

Publication number
CN117113417A
CN117113417A CN202311346157.5A CN202311346157A CN117113417A CN 117113417 A CN117113417 A CN 117113417A CN 202311346157 A CN202311346157 A CN 202311346157A CN 117113417 A CN117113417 A CN 117113417A
Authority
CN
China
Prior art keywords
clipboard
program
content
preset
control program
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311346157.5A
Other languages
Chinese (zh)
Inventor
李本学
张雷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhongfu Safety Technology Co Ltd
Original Assignee
Zhongfu Safety Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhongfu Safety Technology Co Ltd filed Critical Zhongfu Safety Technology Co Ltd
Priority to CN202311346157.5A priority Critical patent/CN117113417A/en
Publication of CN117113417A publication Critical patent/CN117113417A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/629Protecting access to data via a platform, e.g. using keys or access control rules to features or functions of an application
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/556Detecting local intrusion or implementing counter-measures involving covert channels, i.e. data leakage between processes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogram communication
    • G06F9/543User-generated data transfer, e.g. clipboards, dynamic data exchange [DDE], object linking and embedding [OLE]

Abstract

The application discloses a method, a system, equipment and a medium for managing and controlling a clipboard in a Linux system, which mainly relate to the technical field of clipboard management and control and are used for solving the problems that the existing clipboard function can cause leakage of sensitive information, can be utilized by malicious programs to steal and tamper information, and a user carelessly sticks unsafe content to cause system safety. Comprising the following steps: monitoring the change condition of the clipboard owner in real time through a monitoring program; when the change of the clipboard owner is monitored, the current clipboard content is stored in a control program, and the control program is set as the clipboard owner; when the system program triggers the clipboard content pasting operation, a pasting request is generated and sent to a management and control program; determining whether preset program information of a system program in a paste request accords with preset rules or not through a management and control program; and returning clipboard contents to the system program when the preset rules are met.

Description

Method, system, equipment and medium for managing and controlling clipboard under Linux system
Technical Field
The application relates to the technical field of clipboard management and control, in particular to a method, a system, equipment and a medium for clipboard management and control under a Linux system.
Background
Under Linux systems, clipboards are a temporary storage area for temporary storage of text or other data that allows a user to copy and paste selected text or data from one application to another.
Currently, clipboard functions in Linux systems are basically open, for example: a cloud clipboard realization method, equipment, a system and a storage medium (CN 202211143844.2) are provided, a global transfer center is utilized to communicate a plurality of working parties in a user working space, global access under a cloud office environment can be realized, and users can interact information and data in the working space without barriers; the cloud clipboard management and control center is used for broadcasting first event information provided by a worker who has a cut/copy event to other workers in a user working space through the global transfer center, and is used for coordinating copying of related data through the global transfer center under the triggering of the worker who has a paste event. Accordingly, global clipping of cross-terminal, cross-ecology, cross-cloud instance, cross-virtual and real and cross-region can be realized in the user working space.
However, the openness of the clipboard function in the current Linux system may cause leakage of sensitive information, such as passwords, account numbers, private text, and the like. Lack of effective management of clipboard content may be exploited by malicious programs for information theft and tampering. In addition, users inadvertently pasting unsafe content may also cause system security problems.
Disclosure of Invention
Aiming at the defects in the prior art, the application provides a method, a system, equipment and a medium for managing and controlling a clipboard in a Linux system, which are used for solving the problems that the existing clipboard function can cause leakage of sensitive information, can be utilized by malicious programs to steal and tamper information, and a user can attach unsafe content carelessly to cause system safety.
In a first aspect, the present application provides a method for managing and controlling clipboards in a Linux system, where the method includes: monitoring the change condition of the clipboard owner in real time through a monitoring program; when the change of the clipboard owner is monitored, the current clipboard content is stored in a control program, and the control program is set as the clipboard owner; when the system program triggers the clipboard content pasting operation, a pasting request is generated and sent to a management and control program; determining whether preset program information of a system program in a paste request accords with preset rules or not through a management and control program; and returning clipboard contents to the system program when the preset rules are met.
Further, after saving the current clipboard content to the management and control program and setting the management and control program as the clipboard owner, the method further comprises: after the control program obtains the clipboard content, determining the data type of the clipboard content through a preset detection algorithm; the preset detection algorithm at least comprises a sensitive data detection rule and an error data detection rule; after the data type is determined to be sensitive data, processing clipboard content through a preset processing program, and updating the clipboard content into processed content; the preset processing program at least comprises the following steps: watermarking operation program, encryption operation program; after the data type is determined to be the error data, acquiring the modified clipboard content through a preset modification window, and updating the clipboard content to the modified content.
Further, the method further comprises: adding a preset detection algorithm and a preset processing program to the control program through a preset program input interface; and modifying a preset detection algorithm and a preset processing program in the control program through a preset program modification interface.
Further, the method for saving the current clipboard content to the management and control program specifically comprises the following steps: and acquiring the content of the current clipboard by using an API (application program interface) of the Linux system, and storing the content in an internal cache of the management and control program.
In a second aspect, the present application provides a system for managing and controlling clipboards in a Linux system, where the system includes: the monitoring module is used for monitoring the change condition of the clipboard owner in real time through a monitoring program; the setting module is used for storing the current clipboard content into the control program when the change of the clipboard owner is monitored, and setting the control program as the clipboard owner; the sending module is used for generating a paste request when the system program triggers the clipboard content paste operation and sending the paste request to the management and control program; the return module is used for determining whether preset program information of the system program in the paste request accords with preset rules or not through the management and control program; and returning clipboard contents to the system program when the preset rules are met.
Further, the content changing module is used for determining the data type of the clipboard content through a preset detection algorithm after the control program acquires the clipboard content; the preset detection algorithm at least comprises a sensitive data detection rule and an error data detection rule; after the data type is determined to be sensitive data, processing clipboard content through a preset processing program, and updating the clipboard content into processed content; the preset processing program at least comprises the following steps: watermarking operation program, encryption operation program; after the data type is determined to be the error data, acquiring the modified clipboard content through a preset modification window, and updating the clipboard content to the modified content.
Further, the content changing module comprises an algorithm-program changing unit, which is used for adding a preset detection algorithm and a preset processing program to the control program through a preset program input interface; and modifying a preset detection algorithm and a preset processing program in the control program through a preset program modification interface.
Further, the setting module includes a storage unit, configured to acquire the current clipboard content by using an API of the Linux system, and store the current clipboard content in an internal cache of the management and control program.
In a third aspect, the present application provides a device for managing and controlling clipboards in a Linux system, where the device includes: a processor; and a memory having executable code stored thereon that, when executed, causes the processor to perform a method of clipboard management under a Linux system as in any of the above.
In a fourth aspect, the present application provides a non-volatile computer storage medium having stored thereon computer instructions which, when executed, implement a method of clipboard management under a Linux system as in any of the above.
As will be appreciated by those skilled in the art, the present application has at least the following beneficial effects:
by the scheme provided by the application, the management and the safety protection of the content of the clipboard of the Linux system can be realized. The control program is used as a clipboard owner, can inspect and control the content of the clipboard, and prevents sensitive information from being leaked and unsafe data from being pasted. Meanwhile, the management and control program can limit the pasting action according to a preset rule, so that the system safety is ensured.
Drawings
Some embodiments of the present disclosure are described below with reference to the accompanying drawings, in which:
fig. 1 is a flowchart of a method for managing and controlling clipboards in a Linux system according to an embodiment of the present application.
Fig. 2 is a schematic diagram of an internal structure of a system for managing and controlling clipboards in a Linux system according to an embodiment of the present application.
Fig. 3 is a schematic diagram of an internal structure of a device for managing and controlling clipboards in a Linux system according to an embodiment of the present application.
Detailed Description
It should be understood by those skilled in the art that the embodiments described below are only preferred embodiments of the present disclosure, and do not represent that the present disclosure can be realized only by the preferred embodiments, which are merely for explaining the technical principles of the present disclosure, not for limiting the scope of the present disclosure. Based on the preferred embodiments provided by the present disclosure, all other embodiments that may be obtained by one of ordinary skill in the art without inventive effort shall still fall within the scope of the present disclosure.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article or apparatus that comprises an element.
The following describes the technical scheme provided by the embodiment of the application in detail through the attached drawings.
The embodiment of the application provides a method for managing and controlling clipboards in a Linux system, which is shown in fig. 1 and mainly comprises the following steps:
step 110, monitoring the change condition of the clipboard owner in real time through a monitoring program.
It should be noted that the monitoring program may be any feasible code program capable of monitoring the change condition of the clipboard owner, and the specific implementation manner of the monitoring program may be implemented by the prior art or a method. The clipboard owner is a window associated with information on the clipboard. When a window places data on the clipboard, particularly when it calls the employee clipboard function, the window will become the clipboard owner. The window remains the clipboard owner until it closes or another window clears the clipboard (i.e., the next step, the clipboard owner changes).
And 120, when the change of the clipboard owner is monitored, saving the current clipboard content into a control program, and setting the control program as the clipboard owner.
It should be noted that the control program may be an intelligent chip; the program may be a program for management control of the system itself (for example, a Management Control Program management control program in the system), and the operations corresponding to the management control program in the "clipboard owner" and the following steps in this step may be realized based on a pre-configured code.
The saving of the current clipboard content to the management and control program may specifically be:
the current clipboard content is obtained using the API (Application Programming Interface application program interface) interface of the Linux system and saved in the internal cache of the hypervisor.
In addition, after the clipboard content is obtained, the clipboard content can be subjected to secret searching, watermarking operation, encryption operation, direct modification and the like.
The specific process can be as follows: after the control program obtains the clipboard content, determining the data type of the clipboard content through a preset detection algorithm; the preset detection algorithm at least comprises a sensitive data detection rule and an error data detection rule; after the data type is determined to be sensitive data, processing clipboard content through a preset processing program, and updating the clipboard content into processed content; the preset processing program at least comprises the following steps: watermarking operation program, encryption operation program; after the data type is determined to be the error data, acquiring the modified clipboard content through a preset modification window, and updating the clipboard content to the modified content.
It should be noted that the preset detection algorithm may be any feasible text recognition algorithm capable of detecting a data type of the content (including a sensitive data detection rule and an erroneous data detection rule). The sensitive data may be identification card data (the sensitive data detection rule corresponds to a rule for detecting whether the identification card data is or not). In addition, the application is not limited to the specific content corresponding to the sensitive data, and can be identity card data or any other feasible data, and a person skilled in the art can determine the specific content corresponding to the sensitive data and the sensitive data detection rule according to the actual situation. The error data may be data with a wrongly written word (the error data detection rule may correspond to a detection rule of the wrongly written word), and similarly, a person skilled in the art may determine the specific content corresponding to the error data and the error data detection rule according to the actual situation. In addition, the watermarking operation program and the encryption operation program can be realized by the existing program, and the specific content of the program is not limited by the application.
In addition, the present application may modify or replace the preset detection algorithm and the preset processing program in order to achieve the accuracy of "determining the data type of the clipboard content" and the accuracy of "clipboard content update".
The specific process can be as follows:
adding a preset detection algorithm and a preset processing program to the control program through a preset program input interface; and modifying a preset detection algorithm and a preset processing program in the control program through a preset program modification interface.
And 130, when the system program triggers the clipboard content pasting operation, a pasting request is generated and sent to the management and control program.
It should be noted that, the system program is any program in the Linux system that triggers the clipboard content pasting operation.
Step 140, determining whether preset program information of the system program in the paste request accords with preset rules or not through a management and control program; and returning clipboard contents to the system program when the preset rules are met.
It should be noted that the preset program information is information preset in the Linux system by the system program, for example, a program name. The preset rules are preset conditions by the person skilled in the art, and the specific content of the preset rules can be determined by the person skilled in the art according to actual requirements. As an example, the preset rule may be a preset attachable name database, and the preset rule is satisfied when the program name in the preset program information is in the attachable name database.
In addition, fig. 2 is a system for managing and controlling clipboards in a Linux system according to an embodiment of the present application. As shown in fig. 2, the system provided by the embodiment of the present application mainly includes:
the monitoring module 210 in the system monitors changes in clipboard owners in real time through a monitoring program.
It should be noted that, the monitoring module 210 may be any feasible device or apparatus capable of monitoring the change condition of the clipboard owner in real time through the monitoring program.
The setup module 220 in the system, upon monitoring the clipboard owner change, saves the current clipboard content to the hypervisor and sets the hypervisor as the clipboard owner.
It should be noted that, the setting module 220 may be any feasible device or apparatus capable of saving the current clipboard content to the control program when the change of the clipboard owner is monitored, and setting the control program as the clipboard owner.
The saving of the current clipboard content to the management and control program may specifically be:
the current clipboard content is obtained by the saving unit 221 in the setting module 220 using the API interface of the Linux system, and is saved in the internal cache of the management and control program.
In addition, after the clipboard content is obtained, the system can perform secret searching, watermarking operation, encryption operation, direct modification and the like on the clipboard content.
The specific process can be as follows:
after the control program obtains the clipboard content, the content changing module 250 in the system determines the data type of the clipboard content through a preset detection algorithm; the preset detection algorithm at least comprises a sensitive data detection rule and an error data detection rule; after the data type is determined to be sensitive data, processing clipboard content through a preset processing program, and updating the clipboard content into processed content; the preset processing program at least comprises the following steps: watermarking operation program, encryption operation program; after the data type is determined to be the error data, acquiring the modified clipboard content through a preset modification window, and updating the clipboard content to the modified content.
The content changing module 250 may be any feasible device or apparatus capable of updating the clipboard content.
In addition, the system may modify or replace the preset detection algorithm and the preset processing program in order to achieve the accuracy of "determining the data type of the clipboard content" and the accuracy of "clipboard content update".
The specific process can be as follows:
the algorithm-program changing unit 251 in the system content changing module 250 adds a preset detection algorithm and a preset processing program to the management and control program through a preset program input interface; and modifying a preset detection algorithm and a preset processing program in the control program through a preset program modification interface.
The sending module 230 in the system generates a paste request when the system program triggers a clipboard content paste operation, and sends the paste request to the management and control program.
It should be noted that, the sending module 230 may be any feasible device or apparatus capable of generating a paste request and sending the paste request to the management and control program when the system program triggers a clipboard content paste operation.
The return module 240 in the system determines whether the preset program information of the system program in the paste request accords with the preset rule through the management and control program; and returning clipboard contents to the system program when the preset rules are met.
It should be noted that, the return module 240 may be any feasible control program capable of determining whether the preset program information of the system program in the paste request meets the preset rule; to return the clipboard content to the system program when the preset rules are met, and the like.
The method embodiment of the application is based on the same inventive concept, and the embodiment of the application also provides a device for managing and controlling the clipboard in the Linux system. As shown in fig. 3, the apparatus includes: a processor; and a memory having executable code stored thereon that, when executed, causes the processor to perform a method of clipboard management under a Linux system as in the above embodiments.
Specifically, the server monitors the change condition of the clipboard owner in real time through a monitoring program; when the change of the clipboard owner is monitored, the current clipboard content is stored in a control program, and the control program is set as the clipboard owner; when the system program triggers the clipboard content pasting operation, a pasting request is generated and sent to a management and control program; determining whether preset program information of a system program in a paste request accords with preset rules or not through a management and control program; and returning clipboard contents to the system program when the preset rules are met.
In addition, the embodiment of the application also provides a nonvolatile computer storage medium, on which executable instructions are stored, and when the executable instructions are executed, the method for managing clipboards under the Linux system is realized.
Thus far, the technical solution of the present disclosure has been described in connection with the foregoing embodiments, but it is easily understood by those skilled in the art that the protective scope of the present disclosure is not limited to only these specific embodiments. The technical solutions in the above embodiments may be split and combined by those skilled in the art without departing from the technical principles of the present disclosure, and equivalent modifications or substitutions may be made to related technical features, which all fall within the scope of the present disclosure.

Claims (10)

1. A method for managing and controlling clipboards in a Linux system is characterized by comprising the following steps:
monitoring the change condition of the clipboard owner in real time through a monitoring program;
when the change of the clipboard owner is monitored, the current clipboard content is stored in a control program, and the control program is set as the clipboard owner;
when the system program triggers the clipboard content pasting operation, a pasting request is generated and sent to a management and control program;
determining whether preset program information of a system program in a paste request accords with preset rules or not through a management and control program; and returning clipboard contents to the system program when the preset rules are met.
2. The method for clipboard management under a Linux system according to claim 1, wherein after saving the current clipboard content into a management control program and setting the management control program as a clipboard owner, the method further comprises:
after the control program obtains the clipboard content, determining the data type of the clipboard content through a preset detection algorithm; the preset detection algorithm at least comprises a sensitive data detection rule and an error data detection rule;
after the data type is determined to be sensitive data, processing clipboard content through a preset processing program, and updating the clipboard content into processed content; the preset processing program at least comprises the following steps: watermarking operation program, encryption operation program;
after the data type is determined to be the error data, acquiring the modified clipboard content through a preset modification window, and updating the clipboard content to the modified content.
3. The method for clipboard management under a Linux system of claim 2, further comprising:
adding a preset detection algorithm and a preset processing program to the control program through a preset program input interface;
and modifying a preset detection algorithm and a preset processing program in the control program through a preset program modification interface.
4. The method for managing and controlling clipboards in a Linux system according to claim 1, wherein the storing the current clipboard content in a managing and controlling program specifically comprises:
and acquiring the content of the current clipboard by using an API (application program interface) of the Linux system, and storing the content in an internal cache of the management and control program.
5. A system for clipboard management and control in a Linux system, the system comprising:
the monitoring module is used for monitoring the change condition of the clipboard owner in real time through a monitoring program;
the setting module is used for storing the current clipboard content into the control program when the change of the clipboard owner is monitored, and setting the control program as the clipboard owner;
the sending module is used for generating a paste request when the system program triggers the clipboard content paste operation and sending the paste request to the management and control program;
the return module is used for determining whether preset program information of the system program in the paste request accords with preset rules or not through the management and control program; and returning clipboard contents to the system program when the preset rules are met.
6. The system for managing and controlling clipboards under a Linux system according to claim 5, wherein the content altering module,
the method comprises the steps that after the control program obtains the clipboard content, the data type of the clipboard content is determined through a preset detection algorithm; the preset detection algorithm at least comprises a sensitive data detection rule and an error data detection rule; after the data type is determined to be sensitive data, processing clipboard content through a preset processing program, and updating the clipboard content into processed content; the preset processing program at least comprises the following steps: watermarking operation program, encryption operation program; after the data type is determined to be the error data, acquiring the modified clipboard content through a preset modification window, and updating the clipboard content to the modified content.
7. The system for managing and controlling clipboards under a Linux system according to claim 6, wherein the content altering module comprises an algorithm-program altering unit,
the control method comprises the steps of adding a preset detection algorithm and a preset processing program to a control program through a preset program input interface; and modifying a preset detection algorithm and a preset processing program in the control program through a preset program modification interface.
8. The system for managing and controlling clipboards under a Linux system according to claim 5, wherein the setting module comprises a storing unit,
and the API interface is used for acquiring the current clipboard content by using the Linux system and storing the current clipboard content in an internal cache of the management and control program.
9. A device for clipboard management and control in a Linux system, the device comprising:
a processor;
and a memory having executable code stored thereon that, when executed, causes the processor to perform a method of clipboard management under a Linux system according to any of claims 1-4.
10. A non-transitory computer storage medium having stored thereon computer instructions which, when executed, implement a method of clipboard management under a Linux system according to any of claims 1-4.
CN202311346157.5A 2023-10-18 2023-10-18 Method, system, equipment and medium for managing and controlling clipboard under Linux system Pending CN117113417A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311346157.5A CN117113417A (en) 2023-10-18 2023-10-18 Method, system, equipment and medium for managing and controlling clipboard under Linux system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311346157.5A CN117113417A (en) 2023-10-18 2023-10-18 Method, system, equipment and medium for managing and controlling clipboard under Linux system

Publications (1)

Publication Number Publication Date
CN117113417A true CN117113417A (en) 2023-11-24

Family

ID=88800415

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311346157.5A Pending CN117113417A (en) 2023-10-18 2023-10-18 Method, system, equipment and medium for managing and controlling clipboard under Linux system

Country Status (1)

Country Link
CN (1) CN117113417A (en)

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101226486A (en) * 2006-09-29 2008-07-23 阿森图尔环球服务有限责任公司 Computer-implemented clipboard
CN106776078A (en) * 2016-12-28 2017-05-31 北京金山安全软件有限公司 Clipboard content processing method and device and terminal equipment
CN109117670A (en) * 2018-08-16 2019-01-01 海南新软软件有限公司 A kind of realization shear plate data encryption and decryption method, apparatus and hardware device
CN110262908A (en) * 2019-06-21 2019-09-20 珠海格力电器股份有限公司 A kind of processing method and processing device of shear plate data
CN111539010A (en) * 2020-06-16 2020-08-14 北京明朝万达科技股份有限公司 Clipboard control method and device, electronic equipment and computer-readable storage medium
CN111782424A (en) * 2020-07-03 2020-10-16 厦门美图之家科技有限公司 Data processing method and device, electronic equipment and storage medium
CN112287372A (en) * 2020-11-11 2021-01-29 三星电子(中国)研发中心 Method and apparatus for protecting clipboard privacy
CN112698964A (en) * 2020-12-23 2021-04-23 北京北信源软件股份有限公司 Data processing method, system, electronic device and medium
CN112783666A (en) * 2019-11-08 2021-05-11 珠海金山办公软件有限公司 Clipboard content editing method and device in electronic document and storage medium
CN113779592A (en) * 2021-08-06 2021-12-10 南京信息职业技术学院 Intelligent equipment shear plate data encryption system and method
CN115292740A (en) * 2022-10-09 2022-11-04 北京时代亿信科技股份有限公司 Method and device for managing clipboard and nonvolatile storage medium
CN115344835A (en) * 2022-08-03 2022-11-15 阿里巴巴(中国)有限公司 Picture processing method, storage medium and computer terminal

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101226486A (en) * 2006-09-29 2008-07-23 阿森图尔环球服务有限责任公司 Computer-implemented clipboard
CN106776078A (en) * 2016-12-28 2017-05-31 北京金山安全软件有限公司 Clipboard content processing method and device and terminal equipment
CN109117670A (en) * 2018-08-16 2019-01-01 海南新软软件有限公司 A kind of realization shear plate data encryption and decryption method, apparatus and hardware device
CN110262908A (en) * 2019-06-21 2019-09-20 珠海格力电器股份有限公司 A kind of processing method and processing device of shear plate data
CN112783666A (en) * 2019-11-08 2021-05-11 珠海金山办公软件有限公司 Clipboard content editing method and device in electronic document and storage medium
CN111539010A (en) * 2020-06-16 2020-08-14 北京明朝万达科技股份有限公司 Clipboard control method and device, electronic equipment and computer-readable storage medium
CN111782424A (en) * 2020-07-03 2020-10-16 厦门美图之家科技有限公司 Data processing method and device, electronic equipment and storage medium
CN112287372A (en) * 2020-11-11 2021-01-29 三星电子(中国)研发中心 Method and apparatus for protecting clipboard privacy
CN112698964A (en) * 2020-12-23 2021-04-23 北京北信源软件股份有限公司 Data processing method, system, electronic device and medium
CN113779592A (en) * 2021-08-06 2021-12-10 南京信息职业技术学院 Intelligent equipment shear plate data encryption system and method
CN115344835A (en) * 2022-08-03 2022-11-15 阿里巴巴(中国)有限公司 Picture processing method, storage medium and computer terminal
CN115292740A (en) * 2022-10-09 2022-11-04 北京时代亿信科技股份有限公司 Method and device for managing clipboard and nonvolatile storage medium

Similar Documents

Publication Publication Date Title
US11270267B2 (en) Sensitive information management
CN106101113B (en) A kind of cloud computing data security annotation management method and system
CN104735091B (en) A kind of user access control method and apparatus based on linux system
CN110363026B (en) File operation method, device, equipment, system and computer readable storage medium
CN103826215A (en) Method and apparatus for carrying out root authority management at terminal equipment
CN106897586B (en) Application Programming Interface (API) authority management method and device
CN111475825B (en) Role authority setting method and device
WO2016145849A1 (en) Short message security management method, device and terminal
CN112445805A (en) Data query method and device
US11636219B2 (en) System, method, and apparatus for enhanced whitelisting
CN106982428B (en) Security configuration method, security control device and security configuration device
CN108334788B (en) File tamper-proofing method and device
CN117113417A (en) Method, system, equipment and medium for managing and controlling clipboard under Linux system
CN111008377A (en) Account monitoring method and device, computer equipment and storage medium
EP4071600A1 (en) Method and system for generating and executing a software appliance
CN111222122A (en) Application authority management method and device and embedded equipment
CN113590264A (en) File tamper-proofing method and device under container environment
WO2018065750A1 (en) Enhanced computer objects security
EP3493093B1 (en) Data protection method for preventing of re-pasting of confidential data
KR20100132930A (en) System and method for preventing collision between different digital documents protection system
CN111199046A (en) Content protection method and device based on enterprise browser
CN115952006B (en) Method, system, device, server and storage medium for detecting resource leakage
CN109753799B (en) Tamper-proofing method and system for Android application program and computer storage medium
CN112947864A (en) Metadata storage method, device, equipment and storage medium
CN114154155A (en) Target program generation method, lasso program detection method, device and equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination