WO2010078812A1 - 对文档的操作进行控制的方法和装置 - Google Patents

对文档的操作进行控制的方法和装置 Download PDF

Info

Publication number
WO2010078812A1
WO2010078812A1 PCT/CN2009/076125 CN2009076125W WO2010078812A1 WO 2010078812 A1 WO2010078812 A1 WO 2010078812A1 CN 2009076125 W CN2009076125 W CN 2009076125W WO 2010078812 A1 WO2010078812 A1 WO 2010078812A1
Authority
WO
WIPO (PCT)
Prior art keywords
controlled document
data
pasting
currently controlled
document
Prior art date
Application number
PCT/CN2009/076125
Other languages
English (en)
French (fr)
Inventor
俞健
Original Assignee
成都市华为赛门铁克科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 成都市华为赛门铁克科技有限公司 filed Critical 成都市华为赛门铁克科技有限公司
Priority to EP09837369A priority Critical patent/EP2375341A4/en
Publication of WO2010078812A1 publication Critical patent/WO2010078812A1/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogram communication
    • G06F9/543User-generated data transfer, e.g. clipboards, dynamic data exchange [DDE], object linking and embedding [OLE]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/10Text processing
    • G06F40/166Editing, e.g. inserting or deleting
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Definitions

  • the present invention relates to the field of data security technologies, and in particular, to a method and a terminal device for controlling operation of a document.
  • the document encryption software is generally made into a plug-in for a document such as a text document or an electronic document (pdf), and the plug-in is loaded when the document is started.
  • the loaded plug-in is mainly used for: (1) controlling the menu of the document, setting the copy-and-paste menu and button to gray to prevent copying and pasting operations; (2) prohibiting shortcut operations such as Ctrl ⁇ C, Ctrl ⁇ V, Ctrl ⁇ X (3) Copy and paste according to the permission control.
  • the modified document can copy all the contents, the read-only document cannot be copied, and the read-only copyable document can copy the content into the currently controlled document.
  • a technical problem to be solved by embodiments of the present invention is to provide a method and terminal device for controlling the operation of a document. Improve document security and improve user experience.
  • the embodiment of the present invention provides a method for controlling operation of a document, including:
  • the paste operation is intercepted, and when it is determined that the paste operation satisfies the preset authority, the data in the memory space is pasted to the currently controlled document by the paste operation.
  • An embodiment of the present invention provides another method for controlling operation of a document, including: intercepting a copy operation, copying and saving data of a clipboard into a memory space of a currently controlled document process; The content of the currently controlled document;
  • the paste operation is intercepted, and when it is determined that the paste operation satisfies the preset authority, the data in the memory space of the currently controlled document process is pasted to the target controlled document according to the context of the paste operation.
  • the embodiment of the invention further provides a terminal device, where the terminal device includes:
  • a copy unit for intercepting the copy operation, copying and saving the data of the clipboard to the memory space of the currently controlled document process
  • a setting unit configured to set content on the clipboard to null information
  • a judging unit configured to intercept the paste operation, determine the authority of the paste operation, and obtain a judgment result
  • a pasting unit configured to: when the determining result of the determining unit is that the pasting operation satisfies the preset authority, paste the data in the memory space into the currently controlled document by the pasting operation.
  • An embodiment of the present invention further provides another terminal device, where the terminal device includes:
  • a copy unit for intercepting the copy operation, copying and saving the data of the clipboard to the memory space of the currently controlled document process;
  • the data of the clipboard is the content in the currently controlled document;
  • a judging unit configured to intercept the paste operation, determine the authority of the paste operation, and obtain a judgment result
  • a pasting unit configured to paste the data in the memory space of the currently controlled document process to the target controlled document according to the context of the pasting operation when the determining result of the determining unit is that the pasting operation satisfies the preset authority .
  • the above technical solution has the following advantages: by saving the data of the clipboard to the memory space of the currently controlled document process, and setting the content on the clipboard to null information, when the paste operation conforms to the preset authority, Paste the data in the memory space of the current process to the currently controlled document, so that it can be copied and pasted inside the controlled document to improve the user experience.
  • FIG. 1 is a flowchart of a method for controlling operation of a document according to Embodiment 1 of the present invention
  • FIG. 2A is a flowchart of a method for controlling operation of a document according to Embodiment 2 of the present invention
  • FIG. 2B is another embodiment of the present invention
  • FIG. 3A is a schematic diagram of a device for controlling a terminal device according to Embodiment 3 of the present invention
  • FIG. 3B is a schematic diagram of another apparatus for a terminal device according to Embodiment 3 of the present invention.
  • 3C is a schematic diagram of another apparatus for a terminal device according to Embodiment 3 of the present invention.
  • FIG. 4 is a schematic diagram of an apparatus of a terminal device according to Embodiment 4 of the present invention.
  • FIG. 5 is a schematic diagram of an apparatus for a terminal device according to Embodiment 5 of the present invention.
  • FIG. 1 is a flowchart of a method for controlling operation of a document according to Embodiment 1 of the present invention, where the method for controlling operation of a document includes:
  • the content on the clipboard can be set to null information by replacing the data on the clipboard with a space or deleting the data on the clipboard.
  • the embodiment has the following technical effects: the copy-and-paste operation inside the controlled document can be controlled according to the authority, and the data of the clipboard is set to be empty, so that the user cannot paste the content, but the copy and paste can be performed inside the controlled document to improve the user. Experience.
  • Embodiment 2 2A is a flowchart of a method for controlling operation of a document according to Embodiment 2 of the present invention, where the method for controlling operation of a document includes:
  • S201 The terminal device intercepts the copy operation.
  • the desktop right-click menu will add the "Make Encrypted Files" menu, move the mouse to the document to be protected, such as moving the mouse to the xx.doc file, right-click menu, select Make Encrypted Document, and encrypt xx.
  • the doc file becomes a xx.dsm file. Since the file encryption is performed in the operating system when the document encryption software is installed, when the encrypted document (such as xx.dsm document) is opened, the document encryption software is started. This document encryption software registers the operating system window global hook and hooks the operating system window. ( hook windows ) Related functions for copy operations: such as the Set Clipboard Data function and the Get Clipboard Data function, and filter all copy operations.
  • S202 The terminal device copies and saves the data of the clipboard into the memory space of the currently controlled document process.
  • the memory space of a general process has 2G.
  • S203 The terminal device sets the content on the clipboard to null information.
  • the content on the clipboard can be set to null information by replacing the data on the clipboard with a space or deleting the data on the clipboard.
  • S204 The terminal device intercepts the paste operation, determines whether the context of the paste operation belongs to the currently controlled document process, and if yes, executes S205; otherwise, executes S206.
  • the context of the paste operation is the target document for the paste operation.
  • S205 The terminal device pastes the data in the memory space of the current process into the currently controlled document by using a paste operation.
  • S206 The terminal device further determines whether it is a controlled document process other than the currently controlled document, and if yes, performs S207; otherwise, executes S203.
  • S207 The terminal device determines whether the paste operation is allowed according to the preset condition, and if yes, executes S205; otherwise, proceeds to S203.
  • the preset conditions are set according to specific conditions, such as specifying that the aa.dsm file has the right to copy and paste the contents of the cc.dsm file.
  • the data of the clipboard is always only one copy, so the normal copy and paste operation of the operating system is not affected; and the office clipboard is based on the windows clipboard, and the embodiment is used, and no operation is seen in the office clipboard. trace.
  • FIG. 2B is a flowchart of a method for controlling operation of a document according to another embodiment of the present invention, where the method for controlling operation of a document includes:
  • the terminal device intercepts the copy operation.
  • the desktop right-click menu will add the "Make Encrypted Files" menu, move the mouse to the document to be protected, such as moving the mouse to the xx.doc file, right-click menu, select Make Encrypted Document, and encrypt xx.
  • the doc file becomes a xx.dsm file. Since the file encryption is performed in the operating system when the document encryption software is installed, when the encrypted document (such as xx.dsm document) is opened, the document encryption software is started. This document encryption software registers the operating system window global hook and hooks the operating system window. ( hook windows ) Related functions for copy operations: such as the Set Clipboard Data function and the Get Clipboard Data function, and filter all copy operations.
  • the terminal device copies and saves the data of the clipboard to the memory of the currently controlled document process. In space. Among them, the data of the clipboard is the content in the currently controlled document.
  • D203 The terminal device intercepts the paste operation, determines whether the context of the paste operation belongs to the currently controlled document process, and if so, executes D204; otherwise, executes D205.
  • the context of the paste operation is the target document for the paste operation.
  • the terminal device pastes the data in the memory space of the currently controlled document process into the currently controlled document by a paste operation.
  • D205 The terminal device further determines whether the context of the paste operation is a controlled document process other than the currently controlled document, and if so, executes D206; otherwise, executes D208.
  • D206 The terminal device determines whether the paste operation is allowed according to the preset condition. If yes, execute D207, if no, execute D208.
  • the preset condition indicates whether the other controlled document has the right to copy and paste the content in the currently controlled document.
  • the terminal device pastes the data in the memory space of the currently controlled document process into the other controlled document by a paste operation, and ends the process.
  • the terminal device sets the contents of the clipboard to null information.
  • the content on the clipboard is set to null information, that is, the content of the control clipboard is empty.
  • the content on the clipboard can be set to null information by replacing the data on the clipboard with a space or deleting the data on the clipboard.
  • the AA.doc file becomes an AA.dsm file. Because the file encryption is installed in the operating system when the document encryption software is installed, When the AA.dsm document is opened, the document encryption software is started, the content in the currently controlled document (AA.dsm file) is selected for copying, the copy operation is intercepted by the document encryption software, and the document encryption software is replaced with the content in the controlled document.
  • Clipboard content copy and save the contents of the clipboard to the memory space of the currently controlled document process; when the context of the paste operation is other controlled documents, such as the context of the paste operation is CC.dsm, if the preset condition indicates CC.dsm
  • the file has the permission to copy and paste the content in the AA.dsm file, and then the paste operation is determined according to the preset condition, and the data of the memory space of the currently controlled document process (ie, the content in AA.dsm) is pasted into the CC.dsm file. .
  • This embodiment has the following technical effects: the copy-and-paste operation inside the controlled document can be controlled according to the authority. For the paste operation that does not satisfy the preset permission, the data of the clipboard is set as a space, and the content cannot be pasted out.
  • the document encryption software of the terminal encrypts the data stored in the memory space of the currently controlled document process to perform memory protection.
  • Embodiment 1 has the following advantages with respect to Embodiment 1 or Embodiment 2:
  • a third-party cracking program injects a controlled document process
  • the acquired content is encrypted and cannot be identified. This prevents the data of the controlled document from leaking out.
  • Scene 1 Open the controlled document, copy the content in this document, and then copy the content to other uncontrolled documents.
  • the copied content is empty and cannot be copied out.
  • Implementation method based on scenario 1 Install document encryption software, encrypt a certain aa.doc, and aa.doc file becomes aa.dsm file after encryption. Since the file encryption software is installed in the operating system, the file is associated with the operating system, so click When the aa.dsm document is opened, the document encryption software is started. The content in the protected document is selected for copying. The copy operation is intercepted by the document encryption software. The document encryption software replaces the contents of the clipboard with the contents of the protected document, and copies the contents of the clipboard.
  • Scene 2 Open the controlled document Word, copy the content in the currently controlled document, and then paste the content into the currently controlled document, which can be copied and pasted normally.
  • Implementation method based on scenario 2 Install the document encryption software to encrypt an aa.doc. After encryption, the aa.doc file becomes aa.dsm file. Since the file encryption software is installed, the file association is made in the operating system, so click When the aa.dsm document is opened, the document encryption software is started, the content in the protected document (aa.dsm file) is selected for copying, the copy operation is intercepted by the document encryption software, and the document encryption software replaces the clipboard content with the content in the protected document.
  • the contents of the clipboard are copied and saved to the memory space of the currently controlled document process; when the currently controlled document is pasted, the paste operation is intercepted by the document encryption software, and the document encryption software is filtered to determine that the currently controlled document process is correctly transmitted. Decrypt data, paste the currently controlled document into the copied content.
  • Scenario 3 Open the controlled document Word, perform the copy content operation in the currently controlled document, and then copy the content to other controlled documents, and determine whether the copying and pasting can be performed by the preset condition.
  • the preset condition is determined according to the specific The situation setting, such as specifying the aa.dsm file has the right to copy and paste the contents of the cc.dsm file.
  • Implementation method based on scenario 3 Install document encryption software, encrypt a certain aa.doc, and aa.doc file becomes aa.dsm file after encryption. Since the file encryption software is installed in the operating system, the file is associated with the operating system, so click When the aa.dsm document is opened, the document encryption software is started, the content in the protected document (aa.dsm file) is selected for copying, the copy operation is intercepted by the document encryption software, and the document encryption software replaces the clipboard content with the content in the protected document.
  • Scenario 4 A third-party cracking program is used to inject the currently controlled document process, and the obtained copy content is encrypted and cannot be recognized, thereby avoiding leakage of data of the currently controlled document.
  • FIG. 3A, FIG. 3B and FIG. 3C are schematic diagrams of a device for providing a terminal device according to Embodiment 4 of the present invention, where the terminal device includes:
  • the copy unit 301 is configured to intercept the copy operation, copy and save the data of the clipboard to the memory space of the currently controlled document process.
  • the encrypted xx.doc file becomes a xx.dsm file. Since the file encryption is performed in the operating system when the document encryption software is installed, when the encrypted document (such as xx.dsm document) is opened, the copy unit 301 is started, and the copy unit 301 registers the operating system window global hook, and hooks the operating system window to copy. Related functions of the operation: such as the Set Clipboard Data function and the Get Clipboard Data function, and filter all copy operations to intercept the copy operation.
  • the setting unit 302 is configured to set the data on the clipboard to null information after the copy unit 301 copies and saves the data on the clipboard to the memory space of the currently controlled document process.
  • the determining unit 303 is configured to intercept the paste operation, determine the authority of the paste operation, and obtain the judgment result.
  • the pasting unit 304 is configured to paste, when the determining result of the determining unit 303, that the pasting operation meets the preset authority, the data saved in the memory space of the current process by the copying unit 301 to the currently controlled document.
  • the paste unit 304 calls the Set Clipboard Data ( UINT uFormat, Handle hMem ) function of the operating system window, and the Handle hMem parameter of the function is a thief value, so that the memory address pointed to by the function is saved in the memory space of the currently controlled document process.
  • the address of the data so that the data is pasted into the currently controlled document. But for the paste operation that does not meet the preset permissions If you do, you still set the clipboard data to null.
  • the setting unit 302 includes:
  • the replacement subunit 3021 is configured to replace the data on the clipboard with a space after the copy unit 301 copies and saves the data on the clipboard to the memory space of the currently controlled document process; or
  • the setting unit 302 includes:
  • the delete subunit 3022 is configured to delete the data on the clipboard after the copy unit 301 copies and saves the data on the clipboard to the memory space of the currently controlled document process.
  • the determining unit 303 includes:
  • the first determining sub-unit 3031 is configured to: when it is determined that the context of the pasting operation belongs to the currently controlled document process, obtain a judgment result that the pasting operation satisfies the preset authority. At this point, you can perform a paste operation on the currently controlled document.
  • the determining unit 303 includes:
  • the second determining sub-unit 3032 is configured to: when it is determined that the context of the pasting operation belongs to the uncontrolled document process, obtain a judgment that the pasting operation does not satisfy the preset authority.
  • the determining unit 303 includes:
  • the third determining sub-unit 3033 is configured to: when determining that the context of the pasting operation belongs to a controlled document process other than the currently controlled document process, determine whether the paste operation is allowed according to the preset condition, and if yes, obtain the judgment result.
  • the preset permission is satisfied for the pasting operation; otherwise, the judgment result is that the pasting operation does not satisfy the preset authority.
  • This embodiment has the following technical effects: the copy-and-paste operation inside the controlled document can be controlled according to the authority, and the data of the clipboard is still set to a space for the paste operation that does not satisfy the preset authority, and the content cannot be pasted out.
  • FIG. 4 is a schematic diagram of an apparatus for a terminal device according to Embodiment 5 of the present invention.
  • the terminal device provided in this embodiment further includes:
  • the encryption unit 401 is configured to encrypt data stored in the memory space of the currently controlled document process by the copy unit 401 for memory protection.
  • the decrypting unit 402 is configured to determine, when the determining unit 303 determines that the pasting operation meets the preset authority, Decrypt data stored in the memory space of the current process.
  • the embodiment Compared with the terminal device provided in the fourth embodiment, the embodiment has the following advantages: When the third-party cracking program is injected into the controlled document process, the acquired content is encrypted and cannot be identified. This prevents the data of the controlled document from leaking out.
  • FIG 5 is a schematic diagram of an apparatus for a terminal device according to Embodiment 6 of the present invention.
  • the copying unit 501 is configured to intercept the copy operation, copy and save the data of the clipboard into the memory space of the currently controlled document process; the data of the clipboard is the content in the currently controlled document; and the determining unit 502 is configured to: Intercepting the paste operation, judging the permission of the paste operation, and obtaining the judgment result;
  • the pasting unit 503 is configured to: when the determining result of the determining unit 502 is that the pasting operation meets the preset authority, paste the data in the memory space of the currently controlled document process to the target according to the context of the pasting operation. Documentation.
  • the determining unit 502 includes:
  • a fourth determining subunit 5021 configured to determine whether a context of the pasting operation belongs to a currently controlled document process
  • the fifth determining sub-unit 5022 is configured to determine, when the determination result of the fourth determining sub-unit 5021 is that the context of the pasting operation does not belong to the currently controlled document process, determine whether the context of the pasting operation belongs to the current controlled document. Process of other controlled documents outside;
  • the sixth judging sub-unit 5023 is configured to determine, according to the preset condition, whether the permission result of the fifth judging sub-unit 5022 is that the context of the pasting operation belongs to a process other than the currently controlled document. Paste operation;
  • Determining subunit 5024 configured to: when the context of the paste operation belongs to a currently controlled document process or when the context of the paste operation belongs to a process of a controlled document other than the currently controlled document process that allows a paste operation, Determining that the paste operation satisfies a preset authority; when the context of the paste operation is neither a currently controlled document process nor a process of a controlled document other than the currently controlled document process that allows the paste operation , determining that the pasting operation does not satisfy the preset authority.
  • the pasting unit 503 is configured to: when the determining subunit 5024 determines that the pasting operation meets the preset authority and the context of the pasting operation belongs to the currently controlled document process, the current controlled document is The data in the memory space of the program is pasted to the currently controlled document; when the determining subunit determines that the pasting operation satisfies the preset authority and the context of the pasting operation belongs to the other than the currently controlled document process that allows the pasting operation When the process of the document is controlled, the data in the memory space of the currently controlled document process is pasted to the other controlled document.
  • the device also includes:
  • An encryption unit 504 configured to encrypt data stored in the memory space
  • the decrypting unit 505 is configured to decrypt the data in the memory space when the determining result of the determining unit 502 is that the pasting operation satisfies the preset authority;
  • the pasting unit 503 is configured to: when the determining result of the determining unit 502 is that the pasting operation satisfies the preset authority, paste the data decrypted in the memory space to the target by using the pasting operation according to the context of the pasting operation. Controlled document.
  • the setting unit 504 is configured to set the content on the clipboard to null information. Specifically, when the determining unit 5024 determines that the pasting operation does not satisfy the preset authority, the content on the clipboard is set to null information.
  • the above embodiment has the following technical effects: It is possible to control the copy-and-paste operation of the user, permit copying and pasting inside the controlled document, control copying and pasting between the controlled documents, and control copying and pasting between the controlled document and the uncontrolled document. It is convenient for users to copy and paste the currently controlled documents, and at the same time ensure the security of the documents.
  • the storage medium mentioned above may be a magnetic disk, an optical disk, a read-only memory (ROM), or a random access memory (RAM).

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Computational Linguistics (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Artificial Intelligence (AREA)
  • Bioethics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Storage Device Security (AREA)
  • Document Processing Apparatus (AREA)

Description

对文档的操作进行控制的方法和装置
本申请要求于 2008 年 12 月 29 日提交中国专利局、 申请号为 200810189138.5、 发明名称为 "对文档的操作进行控制的方法和装置" 的中国 专利申请的优先权, 其全部内容通过引用结合在本申请中。
技术领域
本发明涉及数据安全技术领域,尤其涉及一种对文档的操作进行控制的方 法和终端设备。
背景技术
随着网络的日益发展, 网络的安全问题越来越突出。人们往往将注意力集 中在来自外部的攻击, 所以花大力气和重金部署网络边界的安全产品,如防火 墙、 入侵检测系统 (IDS, Intrusion detection system)等。 然而, 来自网络内部的 非法操作所造成的安全问题同样不可忽视,其中最典型的就是文档外泄。用户 如果在内网私自访问外网, 就可能会引发信息安全问题, 造成重要数据外泄, 对公司造成重大损失。
现有技术中, 一般会将文档加密软件做成文本文档 (word)、 电子文档 (pdf) 等文档的插件, 文档启动的时候加载插件。 加载的插件主要用于: (1 )控制文 档的菜单, 将复制粘贴菜单和按钮设置成灰色, 以阻止复制粘贴操作; (2 )禁 止 Ctrl〜C, Ctrl〜V, Ctrl〜 X等快捷键操作; ( 3 )根据权限控制复制粘贴, 如, 可修改文档可以将内容全部复制出去, 只读文档不能复制操作, 只读可复制 文档可以将内容复制进当前受控文档。
在对现有技术的研究和实践过程中 , 发明人发现现有技术中至少存在如 下缺陷:只能将内容复制进受控文档 ,但是不能在受控文档内部进行复制粘贴 , 给用户造成不方便。
发明内容
本发明实施例要解决的技术问题是提供一种对文档的操作进行控制的方 法和终端设备。 能够提高文档的安全性, 提高用户体验。
为解决上述技术问题, 本发明实施例是通过以下技术方案实现的: 本发明实施例提供了一种对文档的操作进行控制的方法, 包括:
截获复制操作,将剪贴板的数据复制并保存到当前受控文档进程的内存空 间, 并将所述剪贴板上的内容设置为空信息;
截获粘贴操作, 当确定所述粘贴操作满足预设的权限时,通过所述粘贴操 作将所述内存空间中的数据粘贴到当前受控文档。
本发明实施例提供了另一种对文档的操作进行控制的方法, 包括: 截获复制操作,将剪贴板的数据复制并保存到当前受控文档进程的内存空 间中; 所述剪贴板的数据是当前受控文档中的内容;
截获粘贴操作, 当确定所述粘贴操作满足预设的权限时,根据粘贴操作的 上下文, 将当前受控文档进程的内存空间中的数据粘贴到目标受控文档。
本发明实施例还提供了一种终端设备, 所述终端设备包括:
复制单元,用于截获复制操作,将剪贴板的数据复制并保存到当前受控文 档进程的内存空间;
设置单元, 用于将所述剪贴板上的内容设置为空信息;
判断单元, 用于截获粘贴操作, 对所述粘贴操作的权限进行判断, 获得判 断结果;
粘贴单元,用于所述判断单元的判断结果为所述粘贴操作满足预设的权限 时 , 通过所述粘贴操作将所述内存空间中的数据粘贴到当前受控文档。
本发明实施例还提供了另一种终端设备, 所述终端设备包括:
复制单元,用于截获复制操作,将剪贴板的数据复制并保存到当前受控文 档进程的内存空间中; 所述剪贴板的数据是当前受控文档中的内容;
判断单元, 用于截获粘贴操作, 对所述粘贴操作的权限进行判断, 获得判 断结果;
粘贴单元,用于当所述判断单元的判断结果为所述粘贴操作满足预设的权 限时,才 据粘贴操作的上下文,将当前受控文档进程的内存空间中的数据粘贴 到目标受控文档。
以上技术方案具有以下优点:通过将剪贴板的数据保存到当前受控文档进 程的内存空间, 并将所述剪贴板上的内容设置为空信息, 当粘贴操作符合预设 的权限时 ,则将通过粘贴操作将当前进程的内存空间中的数据粘贴到当前受控 文档, 从而可在受控文档内部进行复制粘贴, 提高用户体验。
附图说明 图 1是本发明实施例一提供的对文档的操作进行控制的方法流程图; 图 2A是本发明实施例二提供的对文档的操作进行控制的方法流程图; 图 2B是本发明另一实施例提供的对文档的操作进行控制的方法流程图; 图 3A是本发明实施例三提供的一种终端设备的装置示意图;
图 3B是本发明实施例三提供的另一种终端设备的装置示意图;
图 3 C是本发明实施例三提供的又一种终端设备的装置示意图;
图 4是本发明实施例四提供的终端设备的装置示意图;
图 5是本发明实施例五提供的终端设备的装置示意图。
具体实施方式
下面将结合本发明实施例中的附图, 对本发明实施例中的技术方案进行清 楚、 完整地描述, 显然, 所描述的实施例仅仅是本发明一部分实施例, 而不是 全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有作出创造 性劳动前提下所获得的所有其他实施例, 都属于本发明保护的范围。
实施例一、
参见图 1 ,为本发明实施例一提供的对文档的操作进行控制的方法流程图 , 所述对文档的操作进行控制的方法包括:
S101 : 截获复制操作。
S102: 将剪贴板的数据复制并保存到当前受控文档进程的内存空间。
S103: 将剪贴板上的内容设置为空信息;
具体的,可采用将剪贴板上的数据替换为空格的方式或将剪贴板上的数据 删除的方式, 将剪贴板上的内容设置为空信息。
S104: 截获粘贴操作;
S105: 当所述粘贴操作满足预设的权限时,通过所述粘贴操作将所述内存 空间中的数据粘贴到当前受控文档。
本实施例具有以下技术效果:可以根据权限控制受控文档内部的复制粘贴 操作,设置剪贴板的数据为空信息使用户无法将内容粘贴出去,但可在受控文 档内部进行复制粘贴, 提高用户体验。
实施例二、 参见图 2A, 为本发明实施例二提供的对文档的操作进行控制的方法流程 图, 所述对文档的操作进行控制的方法包括:
S201 : 终端设备截获复制操作。
在具体的实施过程中, 首先需要在终端安装文档加密软件。 安装完成后, 桌面右键菜单会增加 "制作加密文件" 菜单, 将鼠标移到需要保护的文档上, 如将鼠标移到 xx.doc文档上,点击右键菜单,选择制作加密文档,加密后 xx.doc 文件变成 xx.dsm文件。 由于安装文档加密软件时, 在操作系统做了文件关联, 因此打开加密文档(如 xx.dsm文档)时, 会启动文档加密软件, 此文档加密软 件注册操作系统窗口全局钩子, 钩住操作系统窗口 ( hook windows )复制操作 的相关函数: 如 Set Clipboard Data函数和 Get Clipboard Data函数, 并对所有复 制操作进行过滤。
S202:终端设备将剪贴板的数据复制并保存到当前受控文档进程的内存空 间中。
一般进程的内存空间有 2G。
S203: 终端设备将剪贴板上的内容设置为空信息。
具体的,可采用将剪贴板上的数据替换为空格的方式或将剪贴板上的数据 删除的方式, 将剪贴板上的内容设置为空信息。
S204: 终端设备截获粘贴操作,判断该粘贴操作的上下文是否属于当前受 控文档进程, 如果是, 执行 S205; 否则, 执行 S206。
其中, 粘贴操作的上下文是进行粘贴操作的目标文档。
例如, 在受保护的 word文档里面, 点击右键(或者 Ctrl + c快捷键)对文 档中选中的内容 "aa"进行复制; 然后向打开的其他文档如 txt文件、 word文件、 email邮箱等粘贴内容, 则此时其他文档 (如 txt文件、 word文件、 email邮箱) 为进行粘贴操作的目标文档。
S205:终端设备通过粘贴操作将当前进程的内存空间中的数据粘贴到当前 受控文档。
例如, 调用操作系统窗口的 SetClipboardData ( UINT uFormat , Handle hMem ) 函数, 对此函数的 Handle hMem参数赋值, 使得函数指向的内存地址 为保存在当前受控文档进程的内存空间中的数据的地址 ,从而将数据粘贴到当 前受控文档中。
S206: 终端设备进一步判断是否为除当前受控文档外的受控文档进程,如 果是, 执行 S207; 否则, 执行 S203。
S207:终端设备根据预设条件判断是否允许粘贴操作,如果是,执行 S205; 否则, 进入 S203。
其中, 上述预设的条件根据具体情况设定, 如规定 aa.dsm文件具有复制粘 贴 cc.dsm文件中内容的权限。
本实施例中, 不管是 office、 pdf、 cad, 图片等等, 都支持本文档本进程复 制粘贴, 但是拷贝不出去。 例如, 在受保护的 word文档里面, 点击右键(或者 Ctrl + c快捷键)对文档中选中的内容 "aa"进行复制; 然后向打开的其他文档 如 txt文件、 word文件、 email邮箱等粘贴内容, 结果粘贴不到任何内容; 在受 保护的 word文档里面进行粘贴操作, 可以粘贴 "aa"。
本实施例中, 剪贴板的数据始终只有一份, 所以不影响操作系统正常的复 制粘贴操作; 并且 office剪贴板基于 windows剪贴板, 采用该实施例, 在 office 剪贴板中看不到任何操作的痕迹。
参见图 2B , 为本发明另一实施例提供的对文档的操作进行控制的方法流 程图, 所述对文档的操作进行控制的方法包括:
D201 : 终端设备截获复制操作。
在具体的实施过程中, 首先需要在终端安装文档加密软件。 安装完成后, 桌面右键菜单会增加 "制作加密文件" 菜单, 将鼠标移到需要保护的文档上, 如将鼠标移到 xx.doc文档上,点击右键菜单,选择制作加密文档,加密后 xx.doc 文件变成 xx.dsm文件。 由于安装文档加密软件时, 在操作系统做了文件关联, 因此打开加密文档(如 xx.dsm文档)时, 会启动文档加密软件, 此文档加密软 件注册操作系统窗口全局钩子, 钩住操作系统窗口 ( hook windows )复制操作 的相关函数: 如 Set Clipboard Data函数和 Get Clipboard Data函数, 并对所有复 制操作进行过滤。
D202: 终端设备将剪贴板的数据复制并保存到当前受控文档进程的内存 空间中。 其中, 剪贴板的数据是当前受控文档中的内容。
D203 : 终端设备截获粘贴操作, 判断该粘贴操作的上下文是否属于当前 受控文档进程, 如果是, 执行 D204; 否则, 执行 D205。
其中, 粘贴操作的上下文是进行粘贴操作的目标文档。
例如, 在受保护的 word文档里面, 点击右键(或者 Ctrl + c快捷键)对文 档中选中的内容 "aa"进行复制; 然后向打开的其他文档如 txt文件、 word文件、 email邮箱等粘贴内容, 则此时其他文档 (如 txt文件、 word文件、 email邮箱) 为进行粘贴操作的目标文档。
D204: 终端设备通过粘贴操作将当前受控文档进程的内存空间中的数据 粘贴到当前受控文档。
例如, 调用操作系统窗口的 SetClipboardData ( UINT uFormat , Handle hMem ) 函数, 对此函数的 Handle hMem参数赋值, 使得函数指向的内存地址 为保存在当前受控文档进程的内存空间中的数据的地址,从而将数据粘贴到当 前受控文档中。
D205: 终端设备进一步判断粘贴操作的上下文是否为除当前受控文档外 的其他受控文档进程, 如果是, 执行 D206; 否则, 执行 D208。
D206: 终端设备根据预设条件判断是否允许粘贴操作, 如果是, 执行 D207, 如果否, 执行 D208。 其中, 预设条件表示所述其他受控文档是否具有 复制粘贴当前受控文档中内容的权限。
D207: 终端设备通过粘贴操作将当前受控文档进程的内存空间中的数据 粘贴到所述其他受控文档中, 结束本流程。
D208: 终端设备将剪贴板上的内容设置为空信息。
该步骤中将剪贴板上的内容设置为空信息即控制剪贴板的内容为空。
具体的,可采用将剪贴板上的数据替换为空格的方式或将剪贴板上的数据 删除的方式, 将剪贴板上的内容设置为空信息。
如下举实例说明:
安装文档加密软件, 对某 AA.doc进行加密, 加密后 AA.doc文件变成 AA.dsm文件, 由于安装文档加密软件时, 在操作系统做了文件关联, 所以点 击打开 AA.dsm文档的时候会启动文档加密软件, 选中当前受控文档 ( AA.dsm 文件)中的内容进行复制, 复制操作被文档加密软件截获, 文档加密软件用受 控文档中的内容替换剪贴板内容,对剪贴板内容复制并且保存至当前受控文档 进程的内存空间; 当粘贴操作的上下文为其他受控文档, 比如粘贴操作的上 下文为 CC.dsm,若预设条件表示 CC.dsm文件具有复制粘贴 AA.dsm文件中内容 的权限, 则根据预设条件确定允许粘贴操作,将当前受控文档进程的内存空间 的数据(即 AA.dsm中的内容) 粘贴到 CC.dsm文件中。
本实施例具有以下技术效果:可以根据权限控制受控文档内部的复制粘贴 操作, 对于不满足预设权限的粘贴操作, 设置剪贴板的数据为空格, 无法将内 容粘贴出去。
实施例三、
该实施例相对于实施例一而言, S202之后, 还可以包括如下过程: 终端的文档加密软件对保存在当前受控文档进程的内存空间中的数据进 行加密, 进行内存保护。
相应的, 在 S205之前, 还包括:
对保存在当前受控文档进程的内存空间中的数据进行解密。
该实施例相对于实施例一或实施二而言,具有如下优点: 当第三方破解程 序注入受控文档进程, 获取的内容是加密的, 无法识别。 从而防止了受控文档 的数据不外泄。
下面基于具体场景对本发明实施例提供的对文档的操作进行控制的方法 进行伴细描述:
场景一、打开受控文档, 在本文档内进行复制内容操作, 然后将内容复制 到其他非受控文档, 复制内容为空, 无法复制出去。
基于场景一的实施方式: 安装文档加密软件, 对某 aa.doc进行加密, 加密 后 aa.doc文件变成 aa.dsm文件, 由于安装文档加密软件时, 在操作系统做了文 件关联, 所以点击打开 aa.dsm文档的时候会启动文档加密软件, 选中保护文档 中的内容进行复制, 复制操作被文档加密软件截获, 文档加密软件用保护文档 中的内容替换剪贴板内容,对剪贴板内容复制, 并且保存至当前受控文档进程 的内存空间; 在其他文档如 xx.txt或者 xx.doc进行粘贴的时候, 粘贴操作被文档 加密软件截获, 文档加密软件经过过滤判断为非受控文档进程, 不传递数据, 非受控文档进程无法粘贴到复制的内容。
场景二、 打开受控文档 Word, 在当前受控文档内进行复制内容操作, 然 后将内容粘贴到当前受控文档, 可以正常复制粘贴。
基于场景二的实施方式: 安装文档加密软件, 对某 aa.doc进行加密, 加密 后 aa.doc文件变成 aa.dsm文件, 由于安装文档加密软件时, 在操作系统做了文 件关联, 所以点击打开 aa.dsm文档的时候会启动文档加密软件, 选中保护文档 ( aa.dsm文件)中的内容进行复制, 复制操作被文档加密软件截获, 文档加密 软件用保护文档中的内容替换剪贴板内容,对剪贴板内容复制并且保存至当前 受控文档进程的内存空间; 在当前受控文档进行粘贴的时候, 粘贴操作被文档 加密软件截获, 文档加密软件经过过滤判断为当前受控文档进程,传递正确解 密数据, 当前受控文档粘贴到复制的内容。
场景三、 打开受控文档 Word, 在当前受控文档内进行复制内容操作, 然 后将内容复制到的其他受控文档 , 通过预设的条件来判断是否可以复制粘贴 , 该预设的条件根据具体情况设定, 如规定 aa.dsm文件具有复制粘贴 cc.dsm文件 中内容的权限。
基于场景三的实施方式: 安装文档加密软件, 对某 aa.doc进行加密, 加密 后 aa.doc文件变成 aa.dsm文件, 由于安装文档加密软件时, 在操作系统做了文 件关联, 所以点击打开 aa.dsm文档的时候会启动文档加密软件, 选中保护文档 ( aa.dsm文件) 中的内容进行复制, 复制操作被文档加密软件截获, 文档加密 软件用保护文档中的内容替换剪贴板内容,对剪贴板内容复制并且保存至当前 受控文档进程的内存空间; 在其他受控文档如 bb.dsm进行粘贴的时候, 粘贴操 作被文档加密软件截获, 文档加密软件经过过滤判断为非 aa.dsm文档, 不传递 数据, 其他受控文档无法粘贴到复制的内容。
场景四、用第三方破解程序来注入当前受控文档进程,获取的复制内容是 加密的, 无法识别, 避免了当前受控文档的数据的外泄。
基于场景四的实施方式: 安装文档加密软件, 对某 aa.doc进行加密, 加密 后 aa.doc文件变成 aa.dsm文件, 由于安装文档加密软件时, 在操作系统做了文 件关联, 所以点击打开 aa.dsm文档的时候会启动文档加密软件, 选中保护文档 ( aa.dsm文件) 中的内容进行复制, 复制操作被文档加密软件截获, 文档加密 软件替换剪贴板内容,将剪贴板内容保存到当前受控文档进程的内存空间; 并 且加密。 其他木马程序注入到当前受控文档进程, 进行内存暴力搜索, 由于复 制内容受加密保护,因此无法破解获取内容,避免了当前受控文档内容的外泄。
以上对本发明实施例提供的对文档的操作进行控制的方法进行了描述, 下 面对本发明实施例提供的终端设备进行描述。
实施例四、
参见图 3A、 图 3B和图 3C, 为本发明实施例四提供的终端设备的装置示意 图, 该终端设备包括:
复制单元 301 , 用于截获复制操作, 将剪贴板的数据复制并保存到当前受 控文档进程的内存空间。
例如, 选择制作加密文档, 加密后 xx.doc文件变成 xx.dsm文件。 由于安装 文档加密软件时, 在操作系统做了文件关联, 因此打开加密文档(如 xx.dsm文 档)时, 启动复制单元 301, 此复制单元 301注册操作系统窗口全局钩子, 钩住 操作系统窗口复制操作的相关函数: 如 Set Clipboard Data函数和 Get Clipboard Data函数, 并对所有复制操作进行过滤, 从而截获复制操作。
设置单元 302,用于在复制单元 301将剪贴板上的数据复制并保存到当前受 控文档进程的内存空间后, 将剪贴板上的数据设置为空信息。
判断单元 303 , 用于截获粘贴操作, 对粘贴操作的权限进行判断, 获得判 断结果。
粘贴单元 304,用于当判断单元 303的判断结果为粘贴操作满足预设的权限 时 , 通过所述粘贴操作将复制单元 301保存在当前进程的内存空间中的数据粘 贴到当前受控文档。例如,粘贴单元 304调用操作系统窗口的 Set Clipboard Data ( UINT uFormat, Handle hMem ) 函数, 对此函数的 Handle hMem参数贼值, 使得函数指向的内存地址为保存在当前受控文档进程的内存空间中的数据的 地址,从而将数据粘贴到当前受控文档中。但是对于不满足预设权限的粘贴操 作, 则仍然设置剪贴板的数据为空信息。
参阅图 3B, 其中, 设置单元 302包括:
替换子单元 3021 , 用于在复制单元 301将剪贴板上的数据复制并保存到当 前受控文档进程的内存空间后, 将所述剪贴板上的数据替换为空格; 或
参阅图 3C, 设置单元 302包括:
删除子单元 3022, 用于在复制单元 301将剪贴板上的数据复制并保存到当 前受控文档进程的内存空间后, 将所述剪贴板上的数据删除。
其中, 判断单元 303包括:
第一判断子单元 3031 ,用于在判断得到粘贴操作的上下文属于当前受控文 档进程时, 则获得判断结果为粘贴操作满足预设的权限。此时可以在当前受控 文档执行粘贴操作。
其中, 判断单元 303包括:
第二判断子单元 3032,用于在判断得到所述粘贴操作的上下文属于非受控 文档进程时 , 则获得判断所述粘贴操作不满足预设的权限。
其中, 判断单元 303包括:
第三判断子单元 3033 ,用于在判断得到所述粘贴操作的上下文属于除当前 受控文档进程外的受控文档进程时 , 则根据预设条件判断是否允许粘贴操作 , 如果是, 获得判断结果为所述粘贴操作满足预设的权限; 否则, 获得判断结果 为所述粘贴操作不满足预设的权限。
本实施例具有以下技术效果:可以根据权限控制受控文档内部的复制粘贴 操作,对于不满足预设权限的粘贴操作仍然设置剪贴板的数据为空格, 无法将 内容粘贴出去。
实施例五、
参见图 4, 为本发明实施例五提供的终端设备的装置示意图, 在实施例三 提供的终端设备的基础上, 本实施例提供的终端设备还包括:
加密单元 401,用于对复制单元 401保存在当前受控文档进程的内存空间中 的数据进行加密, 做内存保护。
解密单元 402, 用于判断单元 303判断结果为粘贴操作满足预设的权限时, 对保存在当前进程的内存空间中的数据进行解密。
本实施例相对于实施例四提供的终端设备而言,具有如下优点: 当第三方 破解程序注入受控文档进程, 获取的内容是加密的, 无法识别。 从而防止了受 控文档的数据不外泄。
实施例六、
参见图 5, 为本发明实施例六提供的终端设备的装置示意图,
复制单元 501 , 用于截获复制操作, 将剪贴板的数据复制并保存到当前受 控文档进程的内存空间中; 所述剪贴板的数据是当前受控文档中的内容; 判断单元 502, 用于截获粘贴操作, 对所述粘贴操作的权限进行判断, 获 得判断结果;
粘贴单元 503,用于当所述判断单元 502的判断结果为所述粘贴操作满足预 设的权限时,根据粘贴操作的上下文,将当前受控文档进程的内存空间中的数 据粘贴到目标受控文档。
具体的, 判断单元 502包括:
第四判断子单元 5021 , 用于判断所述粘贴操作的上下文是否属于当前受 控文档进程;
第五判断子单元 5022, 用于在第四判断子单元 5021的判断结果为所述粘 贴操作的上下文不属于当前受控文档进程时,判断所述粘贴操作的上下文是否 属于除当前受控文档之外的其他受控文档的进程;
第六判断子单元 5023 , 用于在第五判断子单元 5022的判断结果为所述粘 贴操作的上下文属于除当前受控文档之外的其他受控文档的进程时,根据预设 条件判断是否允许粘贴操作;
确定子单元 5024, 用于当所述粘贴操作的上下文属于当前受控文档进程 或当所述粘贴操作的上下文属于允许粘贴操作的除当前受控文档进程之外的 其他受控文档的进程时,确定所述粘贴操作满足预设的权限; 当所述粘贴操作 的上下文既不属于当前受控文档进程,也不属于允许粘贴操作的除当前受控文 档进程之外的其他受控文档的进程时, 确定所述粘贴操作不满足预设的权限。
所述粘贴单元 503, 用于当确定子单元 5024确定所述粘贴操作满足预设 的权限且所述粘贴操作的上下文属于当前受控文档进程时 ,将当前受控文档进 程的内存空间中的数据粘贴到当前受控文档;当确定子单元确定所述粘贴操作 满足预设的权限且所述粘贴操作的上下文属于允许粘贴操作的除当前受控文 档进程之外的其他受控文档的进程时,将当前受控文档进程的内存空间中的数 据粘贴到所述其他受控文档。
该设备还包括:
加密单元 504 , 用于对保存在所述内存空间中的数据进行加密;
解密单元 505,用于在判断单元 502的判断结果为所述粘贴操作满足预设的 权限时, 对所述内存空间中的数据进行解密;
所述粘贴单元 503 ,用于所述判断单元 502的判断结果为所述粘贴操作满足 预设的权限时,根据粘贴操作的上下文,通过所述粘贴操作将内存空间中解密 得到的数据粘贴到目标受控文档。
设置单元 504, 用于将所述剪贴板上的内容设置为空信息, 具体的, 在确 定子单元 5024确定粘贴操作不满足预设的权限时,将剪贴板上的内容设置为空 信息。
以上实施例具有以下技术效果: 可以控制用户的复制粘贴操作, 允许在受 控文档内部进行复制粘贴; 控制在受控文档间的复制粘贴; 控制受控文档和非 受控文档间的复制粘贴。 方便用户对当前受控文档的复制粘贴操作 , 同时保证 文档的安全性。
本领域普通技术人员可以理解实现上述方法实施例中的全部或部分步骤 是可以通过程序来指令相关的硬件完成,所述的程序可以存储于一种计算机可 读存储介质中。
上述提到的存储介质可为磁碟、 光盘、 只读存储记忆体 (Read-Only Memory, ROM )或随机存储记忆体 ( Random Access Memory, RAM )等。
以上对本发明实施例进行了详细介绍,本文中应用了具体个例对本发明的 原理及实施方式进行了阐述,以上实施例的说明只是用于帮助理解本发明的方 法及其核心思想; 同时, 对于本领域的一般技术人员, 依据本发明的思想, 在 具体实施方式及应用范围上均会有改变之处, 综上所述,本说明书内容不应理 解为对本发明的限制。

Claims

权 利 要 求
1、 一种对文档的操作进行控制的方法, 其特征在于, 包括:
截获复制操作,将剪贴板的数据复制并保存到当前受控文档进程的内存空 间, 并将所述剪贴板上的内容设置为空信息;
截获粘贴操作, 当确定所述粘贴操作满足预设的权限时,通过所述粘贴操 作将所述内存空间中的数据粘贴到当前受控文档。
2、根据权利要求 1所述的方法, 其特征在于, 将所述剪贴板上的内容设置 为空信息, 具体包括:
将所述剪贴板上的数据替换为空格; 或
将所述剪贴板上的数据删除。
3、根据权利要求 1所述的方法, 其特征在于, 所述将剪贴板的数据复制并 保存到当前受控文档进程的内存空间之后, 还包括:
对保存在所述内存空间中的数据进行加密;
相应的,通过所述粘贴操作将所述内存空间中的数据粘贴到当前受控文档 之前, 还包括:
对所述内存空间中的数据进行解密。
4、根据权利要求 1所述的方法, 其特征在于, 所述确定粘贴操作满足预设 的权限包括:
若所述粘贴操作的上下文属于当前受控文档进程时,则确定所述粘贴操作 满足预设的权限。
5、根据权利要求 1所述的方法, 其特征在于, 所述确定粘贴操作满足预设 的权限包括:
若所述粘贴操作的上下文属于除当前受控文档进程外的受控文档进程时, 则根据预设条件判断是否允许粘贴操作,如果是,确定所述粘贴操作满足预设 的权限; 否则, 确定所述粘贴操作不满足预设的权限。
6、 一种对文档的操作进行控制的方法, 其特征在于, 包括:
截获复制操作,将剪贴板的数据复制并保存到当前受控文档进程的内存空 间中; 所述剪贴板的数据是当前受控文档中的内容;
截获粘贴操作, 当确定所述粘贴操作满足预设的权限时,根据粘贴操作的 上下文, 将当前受控文档进程的内存空间中的数据粘贴到目标受控文档。
7、 根据权利要求 6所述的方法, 其特征在于,
所述确定粘贴操作满足预设的权限包括:
若所述粘贴操作的上下文属于当前受控文档进程时,则确定所述粘贴操作 满足预设的权限;
所述将当前受控文档进程的内存空间中的数据粘贴到目标受控文档包括: 将当前受控文档进程的内存空间中的数据粘贴到当前受控文档。
8、 根据权利要求 6所述的方法, 其特征在于,
所述确定粘贴操作满足预设的权限包括:
若所述粘贴操作的上下文属于除当前受控文档外的其他受控文档的进程 时,且根据预设条件判断允许粘贴操作,则确定所述粘贴操作满足预设的权限; 所述预设条件表示所述其他受控文档是否具有复制粘贴当前受控文档中内容 的权限;
所述将当前受控文档进程的内存空间中的数据粘贴到目标受控文档包括: 将当前受控文档进程的内存空间中的数据粘贴到所述其他受控文档。
9、 根据权利要求 6、 7或者 8所述的方法, 其特征在于, 还包括: 当确定所述粘贴操作不满足预设的权限时 ,将所述剪贴板上的内容设置为 空信息。
10、 根据权利要求 6所述的方法, 其特征在于, 所述将剪贴板的数据复制 并保存到当前受控文档进程的内存空间之后, 还包括:
对保存在所述内存空间中的数据进行加密;
相应的,将当前受控文档进程的内存空间中的数据粘贴到目标受控文档之 前, 还包括:
对所述内存空间中的数据进行解密。
11、 一种终端设备, 其特征在于, 所述终端设备包括:
复制单元,用于截获复制操作,将剪贴板的数据复制并保存到当前受控文 档进程的内存空间;
设置单元, 用于将所述剪贴板上的内容设置为空信息;
判断单元, 用于截获粘贴操作, 对所述粘贴操作的权限进行判断, 获得判 断结果;
粘贴单元,用于所述判断单元的判断结果为所述粘贴操作满足预设的权限 时 , 通过所述粘贴操作将所述内存空间中的数据粘贴到当前受控文档。
12、 根据权利要求 11所述的终端设备, 其特征在于, 所述设置单元包括: 替换子单元, 用于将所述剪贴板上的数据替换为空格; 或
删除子单元, 用于将所述剪贴板上的数据删除。
13、根据权利要求 11所述的终端设备,其特征在于,所述终端设备还包括: 加密单元 , 用于对保存在所述内存空间中的数据进行加密;
解密单元, 用于在判断单元的判断结果为所述粘贴操作满足预设的权限 时, 对所述内存空间中的数据进行解密;
所述粘贴单元,用于所述判断单元的判断结果为所述粘贴操作满足预设的 权限时, 通过所述粘贴操作将内存空间中解密得到的数据粘贴到当前受控文 档。
14、 根据权利要求 11所述的终端设备, 其特征在于, 所述判断单元包括: 第一判断子单元,用于在判断得到所述粘贴操作的上下文属于当前受控文 档进程时, 获得判断结果为所述粘贴操作满足预设的权限;
第二判断子单元,用于在判断得到所述粘贴操作的上下文属于非受控文档 进程时 , 获得判断结果为所述粘贴操作不满足预设的权限;
第三判断子单元,用于在判断得到所述粘贴操作的上下文属于除当前受控 文档进程外的受控文档进程时,根据预设条件判断是否允许粘贴操作,如果是, 获得判断结果为所述粘贴操作满足预设的权限; 否则,获得判断结果为所述粘 贴操作不满足预设的权限。
15、 一种终端设备, 其特征在于, 所述终端设备包括:
复制单元,用于截获复制操作,将剪贴板的数据复制并保存到当前受控文 档进程的内存空间中; 所述剪贴板的数据是当前受控文档中的内容;
判断单元, 用于截获粘贴操作, 对所述粘贴操作的权限进行判断, 获得判 断结果;
粘贴单元,用于当所述判断单元的判断结果为所述粘贴操作满足预设的权 限时,才 据粘贴操作的上下文,将当前受控文档进程的内存空间中的数据粘贴 到目标受控文档。
16、 根据权利要求 15所述的终端设备, 其特征在于, 所述判断单元包括: 第四判断子单元,用于判断所述粘贴操作的上下文是否属于当前受控文档 进程;
第五判断子单元,用于在第四判断子单元的判断结果为所述粘贴操作的上 下文不属于当前受控文档进程时,判断所述粘贴操作的上下文是否属于除当前 受控文档之外的其他受控文档的进程;
第六判断子单元,用于在第五判断子单元的判断结果为所述粘贴操作的上 下文属于除当前受控文档之外的其他受控文档的进程时,根据预设条件判断是 否允许粘贴操作;
确定子单元,用于当所述粘贴操作的上下文属于当前受控文档进程或当所 述粘贴操作的上下文属于允许粘贴操作的除当前受控文档进程之外的其他受 控文档的进程时,确定所述粘贴操作满足预设的权限; 当所述粘贴操作的上下 文既不属于当前受控文档进程,也不属于允许粘贴操作的除当前受控文档进程 之外的其他受控文档的进程时, 确定所述粘贴操作不满足预设的权限;
所述粘贴单元,用于当确定子单元确定所述粘贴操作满足预设的权限且所 述粘贴操作的上下文属于当前受控文档进程时,将当前受控文档进程的内存空 间中的数据粘贴到当前受控文档;当确定子单元确定所述粘贴操作满足预设的 权限且所述粘贴操作的上下文属于允许粘贴操作的除当前受控文档进程之外 的其他受控文档的进程时,将当前受控文档进程的内存空间中的数据粘贴到所 述其他受控文档。
17、 根据权利要求 16所述的终端设备, 其特征在于, 还包括:
设置单元, 用于当确定子单元确定所述粘贴操作不满足预设的权限时,将 所述剪贴板上的内容设置为空信息。
18、 根据权利要求 15所述的终端设备, 其特征在于, 还包括:
加密单元, 用于对保存在所述内存空间中的数据进行加密;
解密单元, 用于在判断单元的判断结果为所述粘贴操作满足预设的权限 时, 对所述内存空间中的数据进行解密;
所述粘贴单元,用于所述判断单元的判断结果为所述粘贴操作满足预设的 权限时,根据粘贴操作的上下文,通过所述粘贴操作将内存空间中解密得到的 数据粘贴到目标受控文档。
PCT/CN2009/076125 2008-12-29 2009-12-28 对文档的操作进行控制的方法和装置 WO2010078812A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP09837369A EP2375341A4 (en) 2008-12-29 2009-12-28 METHOD AND APPARATUS FOR CONTROLLING THE OPERATION OF A DOCUMENT

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CNA2008101891385A CN101441622A (zh) 2008-12-29 2008-12-29 对文档的操作进行控制的方法和装置
CN200810189138.5 2008-12-29

Publications (1)

Publication Number Publication Date
WO2010078812A1 true WO2010078812A1 (zh) 2010-07-15

Family

ID=40726061

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2009/076125 WO2010078812A1 (zh) 2008-12-29 2009-12-28 对文档的操作进行控制的方法和装置

Country Status (3)

Country Link
EP (1) EP2375341A4 (zh)
CN (1) CN101441622A (zh)
WO (1) WO2010078812A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102141933A (zh) * 2011-01-17 2011-08-03 博视联(苏州)信息科技有限公司 提供计算机应用程序多次复用粘贴的系统及其方法
CN113792326A (zh) * 2021-08-02 2021-12-14 厦门天锐科技股份有限公司 一种文件内容限制复制的方法及装置

Families Citing this family (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101441622A (zh) * 2008-12-29 2009-05-27 成都市华为赛门铁克科技有限公司 对文档的操作进行控制的方法和装置
JP5560691B2 (ja) * 2009-12-16 2014-07-30 富士ゼロックス株式会社 文書利用管理システム、文書処理装置、操作権限管理装置、文書管理装置及びプログラム
CN102609642A (zh) * 2012-01-09 2012-07-25 中标软件有限公司 一种剪贴板控制方法及系统
CN103077161A (zh) * 2013-01-09 2013-05-01 广东欧珀移动通信有限公司 一种复制粘贴方法、装置及移动终端
KR20150004638A (ko) * 2013-07-03 2015-01-13 삼성전자주식회사 터치 제어 방법 및 그 전자 장치
CN105988986A (zh) * 2015-02-26 2016-10-05 阿里巴巴集团控股有限公司 一种信息处理方法及装置
CN105956464A (zh) * 2016-04-25 2016-09-21 北京珊瑚灵御科技有限公司 一种基于Android平台的剪切板控制系统和方法
PL3491772T3 (pl) * 2016-07-29 2022-08-08 Permanent Privacy Ltd. Aplikacje związane z bezpiecznym szyfrowaniem
CN106354569A (zh) * 2016-08-27 2017-01-25 深圳市金立通信设备有限公司 一种信息处理的方法及终端
CN106548087A (zh) * 2016-09-27 2017-03-29 武汉开目信息技术股份有限公司 一种基于应用软件操作事件的文档防扩散保护装置及方法
CN108229150B (zh) * 2016-12-21 2020-08-04 腾讯科技(深圳)有限公司 客户端的信息校验方法和装置
CN107908332A (zh) * 2017-11-23 2018-04-13 东软集团股份有限公司 一种应用内文本复制方法、复制装置、存储介质和电子设备
CN109739658A (zh) * 2018-11-30 2019-05-10 北京海泰方圆科技股份有限公司 一种数据操作方法及装置
CN109857571B (zh) * 2018-12-29 2021-03-12 奇安信科技集团股份有限公司 剪贴板控制方法及装置
CN109658759A (zh) * 2019-02-26 2019-04-19 安康学院 一种新型电工电子实验报告与考评系统
CN110309004A (zh) * 2019-06-25 2019-10-08 维沃移动通信有限公司 数据的处理方法及终端
CN118036051B (zh) * 2024-04-15 2024-06-21 闪捷信息科技有限公司 数据转移保护方法、装置、存储介质和电子设备

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1997009817A2 (en) * 1995-08-27 1997-03-13 Aliroo Ltd. Document processing
CN1735870A (zh) * 2003-01-20 2006-02-15 富士通株式会社 复制防止装置、复制防止方法以及使计算机执行该方法的程序
CN1783038A (zh) * 2004-11-29 2006-06-07 富士通株式会社 信息泄漏防止方法、装置及其程序
CN101441622A (zh) * 2008-12-29 2009-05-27 成都市华为赛门铁克科技有限公司 对文档的操作进行控制的方法和装置

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070011749A1 (en) * 2005-07-11 2007-01-11 Simdesk Technologies Secure clipboard function

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1997009817A2 (en) * 1995-08-27 1997-03-13 Aliroo Ltd. Document processing
CN1735870A (zh) * 2003-01-20 2006-02-15 富士通株式会社 复制防止装置、复制防止方法以及使计算机执行该方法的程序
CN1783038A (zh) * 2004-11-29 2006-06-07 富士通株式会社 信息泄漏防止方法、装置及其程序
CN101441622A (zh) * 2008-12-29 2009-05-27 成都市华为赛门铁克科技有限公司 对文档的操作进行控制的方法和装置

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102141933A (zh) * 2011-01-17 2011-08-03 博视联(苏州)信息科技有限公司 提供计算机应用程序多次复用粘贴的系统及其方法
CN113792326A (zh) * 2021-08-02 2021-12-14 厦门天锐科技股份有限公司 一种文件内容限制复制的方法及装置
CN113792326B (zh) * 2021-08-02 2023-12-15 厦门天锐科技股份有限公司 一种文件内容限制复制的方法及装置

Also Published As

Publication number Publication date
CN101441622A (zh) 2009-05-27
EP2375341A1 (en) 2011-10-12
EP2375341A4 (en) 2012-01-11

Similar Documents

Publication Publication Date Title
WO2010078812A1 (zh) 对文档的操作进行控制的方法和装置
US9692597B2 (en) Apparatus and method for content handling
US10268827B2 (en) Method and system for securing data
EP3192002B1 (en) Preserving data protection with policy
US8544060B1 (en) Method and system for detecting and protecting against potential data loss from unknown applications
JP5429157B2 (ja) 機密情報漏洩防止システム及び機密情報漏洩防止方法
KR101705550B1 (ko) 보안 저장 영역에 대한 응용 프로그램의 접근 제어 방법 및 장치
US9418232B1 (en) Providing data loss prevention for copying data to unauthorized media
EP3275158A1 (en) Policy enforcement
US10650158B2 (en) System and method for secure file access of derivative works
US9245108B1 (en) Dynamic adjustment of the file format to identify untrusted files
CN104077244A (zh) 基于进程隔离加密机制的安全保密盘模型及其生成方法
US10547531B2 (en) Systems and methods for enforcing data loss prevention policies
US11295029B1 (en) Computer file security using extended metadata
US10503920B2 (en) Methods and systems for management of data stored in discrete data containers
US9792444B2 (en) Inoculator and antibody for computer security
RU2546585C2 (ru) Система и способ предоставления прав доступа приложениям к файлам компьютера
US9607176B2 (en) Secure copy and paste of mobile app data
US10366242B2 (en) Prevention of a predetermined action regarding data
US20190065701A1 (en) System to enable copying of data from a digitally protected file without compromising security of the content
KR101552688B1 (ko) 엔드포인트 단의 사용자 정책 설정에 따른 데이터 보안 방법 및 시스템
EP2921982B1 (en) Apparatus and method for content handling
US20240171528A1 (en) Information processing method and storage medium

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 09837369

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2009837369

Country of ref document: EP