CN110262908A - A method and device for processing shear plate data - Google Patents
A method and device for processing shear plate data Download PDFInfo
- Publication number
- CN110262908A CN110262908A CN201910540099.7A CN201910540099A CN110262908A CN 110262908 A CN110262908 A CN 110262908A CN 201910540099 A CN201910540099 A CN 201910540099A CN 110262908 A CN110262908 A CN 110262908A
- Authority
- CN
- China
- Prior art keywords
- data
- clipboard
- vocabulary
- clipboard data
- encrypted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/54—Interprogram communication
- G06F9/543—User-generated data transfer, e.g. clipboards, dynamic data exchange [DDE], object linking and embedding [OLE]
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Storage Device Security (AREA)
Abstract
本申请提供一种剪切板数据的处理方法及装置,用于提高剪切板数据的安全性。该方法包括:在检测到对数据进行剪切操作或复制操作时,获取剪切板数据;判断所述剪切板数据中是否包含预设的词汇集合中的至少一个词汇;若所述剪切板数据中包含所述预设的词汇集合中的至少一个词汇,则对所述剪切板数据进行加密处理;将加密处理后的数据发送给剪切板。
The present application provides a method and device for processing clipboard data, which are used to improve the security of clipboard data. The method includes: acquiring clipboard data when detecting a cut operation or a copy operation on data; judging whether the clipboard data contains at least one word in a preset vocabulary set; if the cut If the board data contains at least one vocabulary in the preset vocabulary set, the clipboard data is encrypted; and the encrypted data is sent to the clipboard.
Description
技术领域technical field
本申请涉及计算技术领域,尤其涉及一种剪切板数据的处理方法及装置。The present application relates to the field of computing technology, in particular to a method and device for processing shear plate data.
背景技术Background technique
当用户对数据进行复制或剪切操作时,该数据会被缓存在剪切板上,用户进行复制或剪切操作的这部分数据被称为剪切板数据。终端设备中的剪切板一般是通用的,即任意应用可以随意监听并复制剪切板数据,但是这样一来,剪切板数据可能会被泄露,进而造成用户损失。When the user performs a copy or cut operation on data, the data will be cached on the clipboard, and the part of the data that the user performs the copy or cut operation is called clipboard data. The clipboard in the terminal device is generally universal, that is, any application can listen to and copy the clipboard data at will, but in this way, the clipboard data may be leaked, causing user losses.
发明内容Contents of the invention
本申请实施例提供一种剪切板数据的处理方法及装置,用于对剪切板数据进行加密,提高剪切板数据的安全性。Embodiments of the present application provide a clipboard data processing method and device, which are used to encrypt the clipboard data and improve the security of the clipboard data.
第一方面,提供一种加密剪切板数据的方法,包括:In the first aspect, a method for encrypting clipboard data is provided, including:
在检测到对数据进行剪切操作或复制操作时,获取剪切板数据;Obtain clipboard data when a cut or copy operation is detected on the data;
判断所述剪切板数据中是否包含预设的词汇集合中的至少一个词汇;judging whether the clipboard data contains at least one vocabulary in the preset vocabulary set;
若所述剪切板数据中包含所述预设的词汇集合中的至少一个词汇,则对所述剪切板数据进行加密处理;If the clipboard data contains at least one vocabulary in the preset vocabulary set, then encrypt the clipboard data;
将加密处理后的数据发送给剪切板。Send the encrypted data to the clipboard.
在本申请实施例中,在将剪切板数据发送给剪切板数据之前,会对剪切板数据进行加密处理,保证了剪切板数据的安全。且,在对剪切板数据进行加密之前,会先确定该剪切板数据是否包含预设的词汇集合中的词汇,如果该剪切板数据包含词汇,才对该剪切板数据进行加密处理,相对于对所有剪切板数据都进行加密的方式,能够减少加密的数据量,进而减少加密剪切板数据的计算开销。且,由于本申请实施例中,对于不包含预设的词汇集合中词汇的数据无需进行加密,可以提高用户粘贴获取不包含预设的词汇集合中的词汇的数据效率,提升用户使用剪切板的体验。In the embodiment of the present application, before the clipboard data is sent to the clipboard data, the clipboard data is encrypted to ensure the security of the clipboard data. Moreover, before encrypting the clipboard data, it will be determined whether the clipboard data contains the vocabulary in the preset vocabulary set, and if the clipboard data contains vocabulary, the clipboard data will be encrypted , compared with the method of encrypting all clipboard data, it can reduce the amount of encrypted data, thereby reducing the computational overhead of encrypting clipboard data. Moreover, since in the embodiment of the present application, there is no need to encrypt the data that does not contain the vocabulary in the preset vocabulary set, it can improve the efficiency of the user pasting and obtaining the data that does not contain the vocabulary in the preset vocabulary set, and improve the user's use of the clipboard. experience.
在一种可能的实施例中,若所述剪切板数据中包含所述预设的词汇集合中的至少一个词汇,则对所述数据进行加密处理,包括:In a possible embodiment, if the clipboard data contains at least one vocabulary in the preset vocabulary set, encrypting the data includes:
若所述剪切板数据中包含所述预设的词汇集合中的至少一个词汇,则确定所述剪切板数据的安全级别;If the clipboard data contains at least one vocabulary in the preset vocabulary set, then determine the security level of the clipboard data;
根据所述剪切板数据的安全级别,确定用于加密所述剪切板数据的加密算法;Determine an encryption algorithm for encrypting the clipboard data according to the security level of the clipboard data;
根据所述用于加密所述剪切板数据的加密算法,对所述剪切板数据进行加密处理。Perform encryption processing on the clipboard data according to the encryption algorithm used to encrypt the clipboard data.
在本申请实施例中,当确定剪切板数据中包含预设的词汇集合中的词汇之后,确定需要加密的剪切板数据的安全级别,根据剪切板数据的安全级别,确定该剪切板数据的加密算法,也就是说,不同安全级别的数据所采用的加密算法可能并不完全相同,这样不仅能够对相应数据进行加密处理,保证相应数据的安全性,由于加密强度低的加密算法一般计算开销相对较小,因此对数据进行分类加密,还能尽量降低处理装置的计算开销。In this embodiment of the application, after it is determined that the clipboard data contains the vocabulary in the preset vocabulary set, the security level of the clipboard data that needs to be encrypted is determined, and the clipboard data is determined according to the security level of the clipboard data. The encryption algorithm of board data, that is to say, the encryption algorithms used by data with different security levels may not be exactly the same, so that not only can the corresponding data be encrypted to ensure the security of the corresponding data, but the encryption algorithm with low encryption strength Generally, the calculation overhead is relatively small, so classifying and encrypting the data can also reduce the calculation overhead of the processing device as much as possible.
在一种可能的实施例中,确定所述数据的安全级别,包括:In a possible embodiment, determining the security level of the data includes:
确定所述剪切板数据的安全级别,包括:Determine the security level of the clipboard data, including:
确定所述至少一个词汇中每个词汇的安全级别,所述至少一个词汇中所属的安全级别最高的安全级别为所述剪切板数据的安全级别;或,determining the security level of each vocabulary in the at least one vocabulary, and the security level with the highest security level in the at least one vocabulary is the security level of the clipboard data; or,
根据所述剪切板数据对应的应用,以及对应关系,确定所述剪切板数据对应的安全级别;其中,所述剪切板数据对应的应用是指从所述剪切板数据来源于所述应用,所述对应关系为不同应用与不同安全级别之间的对应关系。According to the application corresponding to the clipboard data and the corresponding relationship, determine the security level corresponding to the clipboard data; wherein, the application corresponding to the clipboard data means that the clipboard data comes from the The above-mentioned application, the correspondence is the correspondence between different applications and different security levels.
在本申请实施例中,提供两种确定剪切板数据的安全级别的方式,一种是以剪切板数据中对应的词汇对应的最高安全级别,为该剪切板数据对应的安全级别,满足敏感信息的加密要求;一种是根据剪切板数据来源的应用所对应的安全级别,作为该剪切板数据的安全级别,满足不同来源的数据的安全需求。可以根据实际需求进行灵活选择,提高处理装置加密剪切板数据的灵活性。In the embodiment of the present application, two ways of determining the security level of the clipboard data are provided, one is the highest security level corresponding to the corresponding vocabulary in the clipboard data, which is the security level corresponding to the clipboard data, Meet the encryption requirements of sensitive information; one is to use the security level corresponding to the application of the clipboard data source as the security level of the clipboard data to meet the security requirements of data from different sources. It can be flexibly selected according to actual needs, and the flexibility of the encrypted clipboard data of the processing device can be improved.
在一种可能的实施例中,In one possible embodiment,
若所述剪切板数据中包含所述预设的词汇集合中的至少一个词汇,则对所述剪切板数据进行加密处理,包括:If the clipboard data contains at least one vocabulary in the preset vocabulary set, then encrypting the clipboard data includes:
按照第一加密算法对所述剪切板数据进行加密,获得密文字符串;Encrypt the clipboard data according to a first encryption algorithm to obtain a ciphertext string;
对所述密文字符串与所述剪切板数据进行封装处理,获得加密处理后的数据。Encapsulating the ciphertext string and the clipboard data to obtain encrypted data.
在本申请实施例中,将剪切板数据进行加密,并将加密后的密文字符串作为数据头与剪切板数据封装在一起,便于后期根据数据头验证剪切板数据是否被篡改。In the embodiment of the present application, the clipboard data is encrypted, and the encrypted ciphertext string is used as a data header and encapsulated together with the clipboard data, so as to facilitate later verification based on the data header whether the clipboard data has been tampered with.
在一种可能的实施例中,在将加密处理后的数据发送给剪切板之后,包括:In a possible embodiment, after sending the encrypted data to the clipboard, include:
在检测到从剪切板中获取所述剪切板数据的操作时,从所述剪切板获取所述加密处理后的数据;When an operation of obtaining the clipboard data from the clipboard is detected, obtain the encrypted data from the clipboard;
按照所述第一加密算法,对所述加密处理后的数据中的所述密文字符串进行解密处理,获得解密处理后的数据;According to the first encryption algorithm, decrypt the ciphertext character string in the encrypted data to obtain the decrypted data;
若所述解密处理后的数据与所述加密处理后的数据中的数据相匹配,则根据所述从剪切板中获取所述剪切板数据的操作,将所述解密处理后的数据发送给所述剪切板或相应应用;If the data after the decryption process matches the data in the data after the encryption process, then according to the operation of obtaining the clipboard data from the clipboard, send the data after the decryption process to the clipboard or corresponding application;
若解密处理后的数据与所述加密处理后的数据中的数据不匹配,则提示所述用户所述剪切板数据已被篡改。If the decrypted data does not match the encrypted data, the user is prompted that the clipboard data has been tampered with.
在本申请实施例中,利用解密处理后的数据头验证加密处理后的数据是否被篡改,保证提供给用户的数据是没有被篡改的数据,提高用户的数据的安全性,避免将不法分子篡改后的病毒等数据植入相应应用的情况。In the embodiment of this application, the decrypted data header is used to verify whether the encrypted data has been tampered with, so as to ensure that the data provided to the user is not tampered data, improve the security of the user's data, and avoid tampering by criminals. After the virus and other data are implanted into the corresponding application.
在一种可能的实施例中,对所述密文字符串与所述剪切板数据进行封装处理,获得加密处理后的数据,包括:In a possible embodiment, encapsulating the ciphertext string and the clipboard data to obtain encrypted data includes:
按照第二加密算法对所述剪切板数据进行预加密,获得预加密后的数据;Pre-encrypting the clipboard data according to a second encryption algorithm to obtain pre-encrypted data;
对所述预加密后的数据进行混淆处理,获得混淆处理后的数据;Obfuscating the pre-encrypted data to obtain the obfuscated data;
对所述密文字符串作和所述混淆处理后的数据进行封装处理,获得加密处理后的数据。在本申请实施例中,除了增加可以用于验证剪切板数据的数据头之外,还对剪切板数据进行加密混淆处理,增加不法分子破解数据的难度,进一步提高加密剪切板数据的加密强度。Encapsulating the ciphertext string and the obfuscated data to obtain encrypted data. In this embodiment of the application, in addition to adding a data header that can be used to verify the clipboard data, the clipboard data is also encrypted and obfuscated to increase the difficulty for criminals to crack the data and further improve the security of the encrypted clipboard data. encryption strength.
第二方面,提供一种剪切板数据的处理装置,包括:In a second aspect, a processing device for clipboard data is provided, including:
获取模块,用于在检测到对数据进行剪切操作或复制操作时,获取剪切板数据;An acquisition module, configured to acquire clipboard data when a cut or copy operation is detected on the data;
判断模块,用于判断所述剪切板数据中是否包含预设的词汇集合中的至少一个词汇;A judging module, configured to judge whether the clipboard data contains at least one vocabulary in the preset vocabulary set;
加密模块,若所述剪切板数据中包含所述预设的词汇集合中的至少一个词汇,则对所述剪切板数据进行加密处理;An encryption module, if the clipboard data contains at least one vocabulary in the preset vocabulary set, then encrypt the clipboard data;
发送模块,用于将加密处理后的数据发送给剪切板。The sending module is used to send the encrypted data to the clipboard.
在一种可能的实施例中,所述加密模块具体用于:In a possible embodiment, the encryption module is specifically used for:
若所述剪切板数据中包含所述预设的词汇集合中的至少一个词汇,则确定所述剪切板数据的安全级别;If the clipboard data contains at least one vocabulary in the preset vocabulary set, then determine the security level of the clipboard data;
根据所述剪切板数据的安全级别,确定用于加密所述剪切板数据的加密算法;Determine an encryption algorithm for encrypting the clipboard data according to the security level of the clipboard data;
根据所述用于加密所述剪切板数据的加密算法,对所述剪切板数据进行加密处理。Perform encryption processing on the clipboard data according to the encryption algorithm used to encrypt the clipboard data.
在一种可能的实施例中,所述加密模块具体用于:In a possible embodiment, the encryption module is specifically used for:
确定所述至少一个词汇中每个词汇的安全级别,所述至少一个词汇中所属的安全级别最高的安全级别为所述剪切板数据的安全级别;或,determining the security level of each vocabulary in the at least one vocabulary, and the security level with the highest security level in the at least one vocabulary is the security level of the clipboard data; or,
根据所述剪切板数据对应的应用,以及对应关系,确定所述剪切板数据对应的安全级别;其中,所述剪切板数据对应的应用是指从所述剪切板数据来源于所述应用,所述对应关系为不同应用与不同安全级别之间的对应关系。According to the application corresponding to the clipboard data and the corresponding relationship, determine the security level corresponding to the clipboard data; wherein, the application corresponding to the clipboard data means that the clipboard data comes from the The above-mentioned application, the correspondence is the correspondence between different applications and different security levels.
在一种可能的实施例中,所述加密模块具体用于:In a possible embodiment, the encryption module is specifically used for:
按照第一加密算法对所述剪切板数据进行加密,获得密文字符串;Encrypt the clipboard data according to a first encryption algorithm to obtain a ciphertext string;
对所述密文字符串与所述剪切板数据进行封装处理,获得加密处理后的数据。Encapsulating the ciphertext string and the clipboard data to obtain encrypted data.
在一种可能的实施例中,所述处理装置还包括解密模块和提示模块,其中:In a possible embodiment, the processing device further includes a decryption module and a prompt module, wherein:
所述获取模块,还用于在将加密处理后的数据发送给剪切板之后,在检测到从剪切板中获取所述剪切板数据的操作时,从所述剪切板获取所述加密处理后的数据;The obtaining module is further configured to obtain the data from the clipboard when an operation of obtaining the clipboard data from the clipboard is detected after the encrypted data is sent to the clipboard. encrypted data;
所述解密模块,按照所述第一加密算法,对所述加密处理后的数据中的所述密文字符串进行解密处理,获得解密处理后的数据;The decryption module, according to the first encryption algorithm, decrypts the ciphertext string in the encrypted data to obtain the decrypted data;
所述发送模块,还用于若所述解密处理后的数据与所述加密处理后的数据中的数据相匹配,则根据所述从剪切板中获取所述剪切板数据的操作,将所述解密处理后的数据发送给所述剪切板或相应应用;The sending module is further configured to, if the decrypted data matches the data in the encrypted data, according to the operation of obtaining the clipboard data from the clipboard, send The decrypted data is sent to the clipboard or a corresponding application;
所述提示模块,用于若解密处理后的数据与所述加密处理后的数据中的数据不匹配,则提示所述用户所述剪切板数据已被篡改。The prompting module is configured to prompt the user that the clipboard data has been tampered with if the decrypted data does not match the encrypted data.
在一种可能的实施例中,所述加密模块具体用于:In a possible embodiment, the encryption module is specifically used for:
按照第二加密算法对所述剪切板数据进行预加密,获得预加密后的数据;Pre-encrypting the clipboard data according to a second encryption algorithm to obtain pre-encrypted data;
对所述预加密后的数据进行混淆处理,获得混淆处理后的数据;Obfuscating the pre-encrypted data to obtain the obfuscated data;
对所述密文字符串作和所述混淆处理后的数据进行封装处理,获得加密处理后的数据。Encapsulating the ciphertext string and the obfuscated data to obtain encrypted data.
第三方面,提供一种剪切板数据的处理装置,包括:In a third aspect, a processing device for clipboard data is provided, including:
至少一个处理器,以及at least one processor, and
与所述至少一个处理器通信连接的存储器;memory communicatively coupled to the at least one processor;
其中,所述存储器存储有可被所述至少一个处理器执行的指令,所述至少一个处理器通过执行所述存储器存储的指令实现如第一方面及一种可能的实施例中任一项所述的方法。Wherein, the memory stores instructions that can be executed by the at least one processor, and the at least one processor executes the instructions stored in the memory to implement the instructions described in any one of the first aspect and a possible embodiment. described method.
第四方面,提供一种计算机可读存储介质,所述计算机可读存储介质存储有计算机指令,当所述计算机指令在计算机上运行时,使得计算机执行如第一方面及一种可能的实施例中任一项所述的方法。In a fourth aspect, a computer-readable storage medium is provided, the computer-readable storage medium stores computer instructions, and when the computer instructions are run on a computer, the computer executes the first aspect and a possible embodiment. any one of the methods described.
附图说明Description of drawings
图1为本申请实施例提供的一种剪切板数据的处理方法的应用场景图;FIG. 1 is an application scene diagram of a method for processing clipboard data provided by an embodiment of the present application;
图2为本申请实施例提供的一种剪切板数据的处理方法的流程图;FIG. 2 is a flow chart of a method for processing clipboard data provided in an embodiment of the present application;
图3为本申请实施例提供的一种加密剪切板数据方式的过程示意图一;FIG. 3 is a schematic diagram of a process of encrypting clipboard data provided by an embodiment of the present application;
图4为本申请实施例提供的一种加密剪切板数据方式的过程示意图二;FIG. 4 is a second schematic diagram of the process of encrypting clipboard data provided by the embodiment of the present application;
图5为本申请实施例提供的一种解密剪切板数据方式的过程示意图;FIG. 5 is a schematic diagram of a process of decrypting clipboard data provided by an embodiment of the present application;
图6为本申请实施例提供的一种剪切板数据的处理装置的结构图一;FIG. 6 is a first structural diagram of a processing device for clipboard data provided by an embodiment of the present application;
图7为本申请实施例提供的一种剪切板数据的处理装置的结构图二。FIG. 7 is a second structural diagram of a processing device for clipboard data provided by an embodiment of the present application.
具体实施方式Detailed ways
为了更好的理解本申请实施例提供的技术方案,下面将结合说明书附图以及具体的实施方式进行详细的说明。In order to better understand the technical solutions provided by the embodiments of the present application, a detailed description will be given below in conjunction with the accompanying drawings and specific implementation manners.
下面对本申请涉及的现有技术进行说明。The prior art related to this application will be described below.
用户进行剪切操作或复制操作之后,终端设备中的任意应用都可以访问剪切板数据,那么不法分子可能会监听剪切板数据。例如,由于虚拟货币钱包地址和私钥一般较长,用户通常是利用剪切或复制将该虚拟货币钱包地址和私钥复制到对应的应用中。如果不法分子监听剪切板,获得该虚拟货币钱包地址和私钥进而可以利用该用户的虚拟钱包地址和私钥,获取用户的虚拟钱包中的财产。After the user performs a cut or copy operation, any application in the terminal device can access the clipboard data, and criminals may monitor the clipboard data. For example, since the virtual currency wallet address and private key are generally relatively long, the user usually copies the virtual currency wallet address and private key into the corresponding application by cutting or copying. If criminals listen to the clipboard and obtain the virtual currency wallet address and private key, they can use the user's virtual wallet address and private key to obtain the property in the user's virtual wallet.
鉴于此,本申请实施例提供一种剪切板数据的处理方法,该方法由处理装置来执行,该处理装置可以通过终端设备中的软件模块来实现,该软件模块例如终端设备中操作系统自带的服务(service)或嵌入在操作系统中的插件等,操作系统自带的服务例如可以通过操作系统服务中的剪切板服务(Clip boardService)来实现。其中,终端设备例如手机或个人计算机等。In view of this, an embodiment of the present application provides a method for processing clipboard data, the method is executed by a processing device, and the processing device can be implemented by a software module in the terminal device, such as the operating system in the terminal device. The service (service) of the belt or the plug-in embedded in the operating system, etc., the service of the operating system can be realized by the clipboard service (Clip boardService) in the operating system service, for example. Wherein, the terminal device is, for example, a mobile phone or a personal computer.
下面先对该方法的应用场景进行说明。The application scenario of the method will be described below first.
请参照图1,该应用场景中包括第一应用11、处理装置12、剪切板13和第二应用14。第一应用11和第二应用14是指终端设备中的用户安装或终端设备自带的应用,第一应用11和第二应用14可以是相同的应用,也可以是不同的应用。Referring to FIG. 1 , the application scenario includes a first application 11 , a processing device 12 , a clipboard 13 and a second application 14 . The first application 11 and the second application 14 refer to applications installed by the user in the terminal device or provided by the terminal device. The first application 11 and the second application 14 may be the same application or different applications.
具体的,用户对第一应用11中的数据进行复制操作或者是剪切操作之后,该数据就视为剪切板数据,处理装置12响应复制操作或者是剪切操作,判断该剪切板数据是否包含预设的词汇集合中的词汇,如果包含,再对该剪切板数据进行加密处理,并将加密处理后的数据发送给剪切板13。Specifically, after the user performs a copy operation or a cut operation on the data in the first application 11, the data is regarded as clipboard data, and the processing device 12 responds to the copy operation or cut operation, and determines whether the clipboard data Whether the vocabulary in the preset vocabulary set is included, and if so, the clipboard data is encrypted, and the encrypted data is sent to the clipboard 13 .
用户在对第一应用11中的数据进行复制操作或者是剪切操作之后,用户可能想将该数据粘贴至第二应用14中,当检测到用户进行从剪切板13中获取数据的操作时,处理装置12响应于该操作,对加密处理后的数据进行解密处理,并将解密后的数据发送给第二应用14。After the user performs a copy operation or cut operation on the data in the first application 11, the user may want to paste the data into the second application 14, when it is detected that the user performs an operation of obtaining data from the clipboard 13 In response to this operation, the processing device 12 decrypts the encrypted data and sends the decrypted data to the second application 14 .
在图1中应用场景的基础上,下面结合图2,对本申请实施例中的处理装置12涉及的判断数据是否包含预设的词汇集合中词汇过程、剪切板数据加密处理过程以及数据解密处理过程等进行详细介绍。On the basis of the application scenario in FIG. 1, in conjunction with FIG. 2, the judging data involved in the processing device 12 in the embodiment of the present application includes the vocabulary process in the preset vocabulary set, the clipboard data encryption process, and the data decryption process. process etc. are described in detail.
用户想要减少输入工作量,或者想要将一个应用中的数据复制到另外一个应用中,用户可以对数据执行复制操作,或者剪切操作。处理装置12执行步骤201,即在检测用户对数据执行复制操作或剪切操作时,获取剪切板数据。Users want to reduce the input workload, or want to copy data in one application to another application, the user can perform copy operation or cut operation on the data. The processing device 12 executes step 201, that is, acquires the clipboard data when detecting that the user performs a copy operation or a cut operation on the data.
其中,复制操作的方式有很多种,例如用户可以选中数据之后,利用快捷键进行复制操作,也可以利用鼠标点击复制命令,也可以借助语音输入设备触发复制操作等。剪切操作的方式可以参照复制操作的方式,此处不再赘述。数据的内容形式例如文字、图片、视频或语音等。Among them, there are many ways of copying. For example, after the user selects the data, he can use the shortcut key to perform the copying operation, he can also use the mouse to click the copying command, and he can also use the voice input device to trigger the copying operation, etc. The manner of the cutting operation may refer to the manner of the copying operation, which will not be repeated here. The content form of the data is text, picture, video or voice, etc.
具体的,处理装置12提前设置有访问终端设备中的应用以及剪切板13的权限。处理装置12在检测到用户对数据执行复制或剪切操作时,处理装置12响应于复制操作或剪切操作,从用户当前执行复制操作或剪切操作对应的应用中获取该剪切板数据。该剪切板数据包括用户选中的数据内容,还可以包括数据格式。除了获取剪切板数据之外,还可以获得该剪切板数据对应的应用,也就是剪切板数据来源于哪一个应用。例如,处理装置12从第一应用11中获得该剪切板数据,那么该剪切板数据对应的应用为第一应用11。Specifically, the processing device 12 is set in advance with permissions to access applications in the terminal device and the clipboard 13 . When the processing device 12 detects that the user performs a copy or cut operation on the data, the processing device 12 responds to the copy operation or the cut operation, and acquires the clipboard data from the application corresponding to the user's current copy or cut operation. The clipboard data includes the data content selected by the user, and may also include the data format. In addition to obtaining the clipboard data, the application corresponding to the clipboard data can also be obtained, that is, which application the clipboard data comes from. For example, the processing device 12 obtains the clipboard data from the first application 11 , then the application corresponding to the clipboard data is the first application 11 .
作为一种实施例,为了便于处理装置12后期对剪切板数据进行分析,处理装置12可以在获取该剪切板数据的同时,获取该剪切板数据的上下文信息。上下文信息是指剪切板数据预设范围内的数据,例如剪切板数据为一段文字,上下文信息则为该剪切板数据前面一部分的内容,以及该剪切板数据后面一部分的内容。As an embodiment, in order to facilitate the analysis of the clipboard data by the processing device 12 later, the processing device 12 may acquire the context information of the clipboard data while acquiring the clipboard data. The context information refers to the data within the preset range of the clipboard data. For example, the clipboard data is a piece of text, and the context information refers to the content of the previous part of the clipboard data and the content of the latter part of the clipboard data.
处理装置12在获取该剪切板数据之后,执行步骤202,即判断剪切板数据中是否包含预设的词汇集合中的至少一个词汇。After the processing device 12 acquires the clipboard data, it executes step 202 , that is, it determines whether the clipboard data contains at least one vocabulary in the preset vocabulary set.
具体的,处理装置12中预存有词汇集合,或者词汇集合存储在终端设备的其它位置,处理装置12有权限访问该位置,获取该词汇集合。Specifically, the vocabulary set is pre-stored in the processing device 12, or the vocabulary set is stored in another location of the terminal device, and the processing device 12 has the right to access the location to obtain the vocabulary set.
其中,词汇集合包括用于表征重要个人信息的词汇,个人信息包括财产信息、身份信息等。词汇集合还可以包括各个词汇对应的安全级别,安全级别可以理解为该词汇对应的数据对于用户的重要程度。例如有些词汇泄露之后,给用户带来的损失可能更大,那么该词汇的安全级别可能越高。The vocabulary set includes vocabulary used to represent important personal information, and the personal information includes property information, identity information, and the like. The vocabulary set may also include a security level corresponding to each vocabulary, and the security level may be understood as the importance of the data corresponding to the vocabulary to the user. For example, after some vocabulary is leaked, the loss to users may be greater, and the security level of the vocabulary may be higher.
例如词汇集合如表1所示。For example, the vocabulary set is shown in Table 1.
表1Table 1
在处理装置12获取该剪切板数据之后,处理装置12将该剪切板数据与词汇集合进行匹配。如前文论述的内容,剪切板数据的内容形式可能是多种多样的,不同的内容形式,处理装置12将剪切板数据与词汇集合进行匹配的方式可能也有所区别,下面结合不同的内容形式,对剪切板数据与词汇集合进行匹配的方式进行说明。After the processing device 12 acquires the clipboard data, the processing device 12 matches the clipboard data with the vocabulary set. As discussed above, the content forms of the clipboard data may be varied. For different content forms, the processing device 12 may also have different ways of matching the clipboard data with the vocabulary set. The following combines different contents Form, which describes how the clipboard data is matched to the vocabulary set.
一种匹配方式为:One way to match is:
处理装置12通过对剪切板数据进行分析,获得该剪切板数据对应的关键词,利用该关键词与词汇集合中的词汇进行匹配。The processing device 12 obtains keywords corresponding to the clipboard data by analyzing the clipboard data, and uses the keywords to match the words in the vocabulary set.
A1,如果剪切板数据的内容形式为文字,处理装置12对文字进行拆分,获得该剪切板数据包括的词汇,这些词汇为该剪切板数据的关键词。A1. If the content of the clipboard data is in the form of text, the processing device 12 splits the text to obtain vocabulary included in the clipboard data, and these vocabulary are keywords of the clipboard data.
A2,如果剪切板数据的内容形式为图片,处理装置12对剪切板数据进行光学字符识别(Optical Character Recognition,OCR),识别出该图片中文字,识别出的文字则可以为该剪切板数据对应的关键词。或者对图像进行图像分类处理,得到图像中的关键元素,该关键元素为该剪切板数据对应的关键词,例如图像中的字符、人脸等。A2, if the content form of the clipboard data is a picture, the processing device 12 performs optical character recognition (Optical Character Recognition, OCR) on the clipboard data, and recognizes the text in the picture, and the recognized text can be the clipboard data. Key words corresponding to board data. Alternatively, image classification processing is performed on the image to obtain key elements in the image, which are keywords corresponding to the clipboard data, such as characters and human faces in the image.
A3,如果剪切板数据的内容形式为视频,处理装置12可以根据该视频的上下文信息确定该视频的关键词。A3, if the content of the clipboard data is a video, the processing device 12 may determine the keywords of the video according to the context information of the video.
A4,如果剪切板数据的内容形式为语音,处理装置12可以将该语音利用语音识别技术转换为语句,对该语句进行拆分处理,获得该剪切板数据对应的词汇,这些词汇则为该剪切板数据对应的关键词。A4, if the content of the clipboard data is in the form of speech, the processing device 12 can convert the speech into a sentence using speech recognition technology, split and process the sentence, and obtain the vocabulary corresponding to the clipboard data. These vocabulary are The keyword corresponding to the clipboard data.
在获得剪切板数据的关键词之后,处理装置12可以采用匹配方式将关键词与词汇集合进行匹配,匹配方式有多种,下面进行示例说明。After obtaining the keywords of the clipboard data, the processing device 12 may use a matching method to match the keywords with the vocabulary set. There are many matching methods, and an example will be described below.
一种匹配方式为:One way to match is:
具体的,处理装置12可以确定词汇集合中存在与该关键词与相同的词汇,则确定该剪切板数据中包含预设的词汇集合中的词汇,以及能够确定出该剪切板数据中包含的预设的词汇集合中的词汇的个数。如果该剪切板数据的关键词没有与词汇集合中相同的词汇,则确定该剪切板数据中不包含预设的汇词汇集合中的词汇。Specifically, the processing device 12 may determine that there is a vocabulary identical to the keyword in the vocabulary set, then determine that the clipboard data contains the vocabulary in the preset vocabulary set, and determine that the clipboard data contains The number of words in the preset vocabulary set. If the keyword in the clipboard data does not have the same vocabulary as that in the vocabulary set, it is determined that the clipboard data does not contain the vocabulary in the preset vocabulary vocabulary set.
本申请实施例中,直接采用精确匹配的方式进行匹配,如果剪切板数据中包括与词汇集合中相同的词汇,则确定该剪切板数据包含词汇,这样的匹配方式简单直接,处理装置12能够快速直接地判断剪切板数据中是否包含词汇。In the embodiment of the present application, the exact matching method is directly used for matching. If the clipboard data includes the same vocabulary as the vocabulary set, it is determined that the clipboard data contains vocabulary. Such a matching method is simple and direct. The processing device 12 It can quickly and directly determine whether the clipboard data contains words.
一种匹配方式为:One way to match is:
处理装置12可以采用模糊匹配方式将关键词与词汇集合进行匹配:The processing device 12 can match keywords and vocabulary sets in a fuzzy matching manner:
具体的,处理装置12也可以确定剪切板数据中的关键词对应的词向量,如果关键词的词向量与预设的词汇集合中的词汇的词向量的相似度大于或等于预设阈值,则确定该剪切板数据中包含预设的词汇集合中的词汇,以及确定该剪切板数据中包括的词汇的个数。处理装置12可以根据预设的词向量获取模型确定各个词汇的词向量。Specifically, the processing device 12 may also determine the word vector corresponding to the keyword in the clipboard data, if the similarity between the word vector of the keyword and the word vector of the vocabulary in the preset vocabulary set is greater than or equal to the preset threshold, Then it is determined that the clipboard data includes the vocabulary in the preset vocabulary set, and the number of the vocabulary included in the clipboard data is determined. The processing device 12 may determine the word vectors of each vocabulary according to a preset word vector acquisition model.
本申请实施例中,利用关键词的词向量与词汇的词向量进行模糊匹配,可以深度挖掘关键词的特征,最大程度地匹配出包含词汇的数据,避免遗漏重要数据。In the embodiment of the present application, the word vectors of keywords and word vectors of vocabulary are used for fuzzy matching, which can deeply mine the characteristics of keywords, match the data containing vocabulary to the greatest extent, and avoid missing important data.
处理装置12如果确定该剪切板数据中不包含预设的词汇集合中的词汇,处理装置12不对该数据进行加密处理,执行步骤203,即将该剪切板数据发送给剪切板。如果确定该数据中包含预设的词汇集合中的至少一个词汇,则执行步骤204,即对剪切板数据进行加密处理。If the processing device 12 determines that the clipboard data does not contain the vocabulary in the preset vocabulary set, the processing device 12 does not encrypt the data, and executes step 203, that is, sends the clipboard data to the clipboard. If it is determined that the data contains at least one vocabulary in the preset vocabulary set, step 204 is executed, that is, the clipboard data is encrypted.
处理装置12对数据进行加密处理的方式有很多种,下面进行示例说明。There are many ways for the processing device 12 to encrypt data, and examples are described below.
方式一:method one:
请参照图3,该方式具体包括:Please refer to Figure 3, this method specifically includes:
步骤301,确定数据的安全级别;Step 301, determining the security level of the data;
步骤302,根据数据的安全级别,确定用于加密剪切板数据的加密算法。Step 302, according to the security level of the data, determine the encryption algorithm used to encrypt the clipboard data.
步骤303,根据用于加密剪切板数据的加密算法,对剪切板数据进行加密处理。Step 303, encrypting the clipboard data according to the encryption algorithm used to encrypt the clipboard data.
下面对处理装置12执行步骤301的方式进行示例说明。The manner in which the processing device 12 executes step 301 is described below with an example.
B1,处理装置12根据数据中包含的一个或多个词汇对应的安全级别,确定剪切板数据的安全级别。剪切板数据的安全级别越高,表示剪切板数据的重要程度越高,相当于该剪切板数据越重要。B1, the processing device 12 determines the security level of the clipboard data according to the security level corresponding to one or more words included in the data. The higher the security level of the clipboard data, the higher the importance of the clipboard data, which is equivalent to the more important the clipboard data.
具体的,在步骤203中,处理装置12获得剪切板数据包含的至少一个词汇,根据预存中词汇集合中每个词汇的安全级别,从而确定出剪切板数据中包含的至少一个词汇中每个词汇的安全级别。由于剪切板数据中可能同包含或多个词汇,处理装置12确定出该剪切板数据中的词汇可能对应多个安全级别,处理装置12可以将词汇中安全级别最高的安全级别作为该剪切板数据的安全级别。Specifically, in step 203, the processing device 12 obtains at least one vocabulary contained in the clipboard data, and according to the security level of each vocabulary in the pre-stored vocabulary set, determines each The security level of a vocabulary. Since the clipboard data may contain one or more words, the processing device 12 determines that the words in the clipboard data may correspond to multiple security levels, and the processing device 12 may use the security level with the highest security level in the vocabulary as the clipboard data. Security level for sliced data.
例如,处理装置12获取的剪切板数据为“地址为XLLXXXXXXXXXXXXXXXXXXXXXXX”,处理装置12确定该剪切板数据为虚拟货币钱包地址,继续以表1所示的词汇集合为例,处理装置12根据表1确定该剪切板数据的安全等级为3。For example, the clipboard data obtained by the processing device 12 is "the address is XLLXXXXXXXXXXXXXXXXXXXXXX", the processing device 12 determines that the clipboard data is the address of the virtual currency wallet, continuing to take the vocabulary set shown in Table 1 as an example, the processing device 12 according to the table 1 Determine that the security level of the clipboard data is 3.
B2,处理装置12根据剪切板数据对应的应用,以及对应关系确定剪切板数据的安全级别。B2, the processing device 12 determines the security level of the clipboard data according to the application corresponding to the clipboard data and the corresponding relationship.
具体的,处理装置12中预存有对应关系,即各个应用对应的安全级别。如前文步骤201论述的内容,处理装置12在获取剪切板数据的同时,也获取了该剪切板数据来源于哪个应用,那么处理装置12可以根据该剪切板数据对应的应用,以及对应关系,确定出该剪切板数据对应的安全级别。Specifically, the corresponding relationship is pre-stored in the processing device 12, that is, the security level corresponding to each application. As discussed in step 201 above, when the processing device 12 obtains the clipboard data, it also obtains which application the clipboard data comes from, then the processing device 12 can use the application corresponding to the clipboard data and the corresponding relationship to determine the security level corresponding to the clipboard data.
例如处理装置12预存有下表2所示的对应关系。For example, the processing device 12 pre-stores the correspondence shown in Table 2 below.
表2Table 2
处理装置12确定该剪切板数据来源于应用1,处理装置12根据上表2所示的对应关系确定该剪切板数据的安全级别为1。The processing device 12 determines that the clipboard data comes from application 1, and the processing device 12 determines that the security level of the clipboard data is 1 according to the correspondence shown in Table 2 above.
在确定剪切板数据对应的安全级别之后,处理装置12执行步骤302。After determining the security level corresponding to the clipboard data, the processing device 12 executes step 302 .
具体的,处理装置12根据剪切板数据对应的安全级别,确定出用于加密剪切板数据对应的加密算法。Specifically, the processing device 12 determines the corresponding encryption algorithm for encrypting the clipboard data according to the security level corresponding to the clipboard data.
为了满足安全级别高的剪切板数据的加密需求,数据的安全级别越高,该数据对应的加密算法加密强度越高。一般来说,加密算法的加密强度越低,加密算法对应的加密过程涉及的计算开销相对较小,为了相对节省处理装置12的计算开销,安全级别低的数据可以采用加密强度低的算法。In order to meet the encryption requirements of clipboard data with a high security level, the higher the security level of the data, the higher the encryption strength of the encryption algorithm corresponding to the data. Generally speaking, the lower the encryption strength of the encryption algorithm, the less computational overhead involved in the encryption process corresponding to the encryption algorithm. In order to relatively save the computational overhead of the processing device 12, data with a low security level can use an algorithm with low encryption strength.
例如,不同安全级别和不同加密算法的关系如下表3所示。For example, the relationship between different security levels and different encryption algorithms is shown in Table 3 below.
表3table 3
当确定剪切板数据对应的安全级别为1,该剪切板数据对应的加密算法采用Base64加密算法。When it is determined that the security level corresponding to the clipboard data is 1, the encryption algorithm corresponding to the clipboard data adopts the Base64 encryption algorithm.
本申请实施例中,处理装置12对不同安全级别的数据进行不同的加密算法进行加密,一方面可以保证对所有包含预设词汇的数据都进行加密,另一方面对包含词汇的数据进行再分类,在满足不同安全级别的数据的加密需求的情况下,尽量降低加密剪切板数据的计算开销。In the embodiment of the present application, the processing device 12 encrypts data with different security levels using different encryption algorithms. On the one hand, it can ensure that all data containing preset vocabulary is encrypted, and on the other hand, it can reclassify data containing vocabulary , in the case of meeting the encryption requirements of data with different security levels, try to reduce the computational overhead of encrypting clipboard data.
处理装置12确定用于加密剪切板数据的加密算法之后,执行步骤303。After the processing device 12 determines the encryption algorithm used to encrypt the clipboard data, step 303 is executed.
具体的,在确定相应的加密算法之后,处理装置12按照该加密算法对剪切板数据进行加密,由于对剪切板数据进行加密处理,从而避免了数据被不法分子随意监听获取,造成剪切板数据泄露的情况。Specifically, after determining the corresponding encryption algorithm, the processing device 12 encrypts the clipboard data according to the encryption algorithm. Since the clipboard data is encrypted, the data is prevented from being arbitrarily monitored and obtained by criminals, resulting in clipping data. board data breaches.
采用相应的加密算法对剪切板数据进行加密,当不法分子获得加密该假期恶补数据所使用的加密算法之后,还是有可能破解出相应的剪切板数据,进而对剪切板数据进行篡改,因此为了减少剪切板数据被篡改的情况,下面提供一种对剪切板数据进行加密处理的方式。Use the corresponding encryption algorithm to encrypt the clipboard data. After criminals obtain the encryption algorithm used to encrypt the holiday supplementary data, it is still possible to crack the corresponding clipboard data and then tamper with the clipboard data. , so in order to reduce the situation that the clipboard data is tampered with, the following provides a way to encrypt the clipboard data.
方式二:Method 2:
按照第一加密算法对数据进行加密,获得密文字符串;对密文字符串和剪切板数据进行封装处理,获得加密处理后的数据。The data is encrypted according to the first encryption algorithm to obtain a ciphertext string; the ciphertext string and clipboard data are encapsulated to obtain encrypted data.
具体的,该第一加密算法可以是通过步骤302中的方式确定出的算法,也可以是处理装置12中预设的固定的一种算法,在按照第一加密算法对剪切板数据进行加密之后,获得加密之后的密文字符串。在获得密文字符串之后,可以将密文字符串和剪切板数据封装在一起,获得加密处理后的数据,例如将密文字符串作为数据头,将数据头和数据封装在一起。封装可以理解为将剪切板数据和密文字符串按照预设数据格式组合在一起。Specifically, the first encryption algorithm may be the algorithm determined by the method in step 302, or it may be a fixed algorithm preset in the processing device 12, and the clipboard data is encrypted according to the first encryption algorithm. After that, the encrypted ciphertext string is obtained. After the ciphertext string is obtained, the ciphertext string and the clipboard data can be encapsulated together to obtain encrypted data, for example, the ciphertext string is used as the data header, and the data header and the data are encapsulated together. Encapsulation can be understood as combining clipboard data and ciphertext strings in a preset data format.
在方式二的加密方式中,将剪切板数据与密文字符串封装在一起时,便于处理装置12后期验证数据是否被篡改。In the encryption method of the second method, when the clipboard data and the ciphertext string are encapsulated together, it is convenient for the processing device 12 to later verify whether the data has been tampered with.
方式三:Method 3:
请参照图4,该方式包括步骤401,按照第一加密算法对剪切板数据进行加密,获得密文字符串;Please refer to FIG. 4 , the method includes step 401, encrypting the clipboard data according to the first encryption algorithm to obtain a ciphertext string;
步骤402,按照第二加密算法对剪切板数据进行预加密,获得预加密后的数据;Step 402, pre-encrypt the clipboard data according to the second encryption algorithm, and obtain the pre-encrypted data;
步骤403,对预加密后的数据进行混淆处理,获得混淆处理后的数据;Step 403, obfuscating the pre-encrypted data to obtain the obfuscated data;
步骤404,对密文字符串和混淆处理后的数据进行封装处理,获得加密处理后的数据。Step 404, encapsulating the ciphertext string and the obfuscated data to obtain encrypted data.
具体的,步骤401中的第一加密算法可以参照方式二中论述的第一加密算法的内容,此处不再赘述。在获得密文字符串之后,为了进一步提高数据的加密强度,本申请实施例中还对剪切板数据进行加密,处理装置12按照第二加密算法对剪切板数据进行预加密,获得预加密后的数据。其中,第二加密算法可以与第一加密算法相同,也可以不同。Specifically, for the first encryption algorithm in step 401, reference may be made to the content of the first encryption algorithm discussed in Mode 2, which will not be repeated here. After obtaining the ciphertext string, in order to further improve the encryption strength of the data, the clipboard data is also encrypted in the embodiment of the present application, and the processing device 12 pre-encrypts the clipboard data according to the second encryption algorithm to obtain the pre-encryption after the data. Wherein, the second encryption algorithm may be the same as or different from the first encryption algorithm.
在获得预加密后的数据之后,为了增加数据的安全性,处理装置对预加密后的数据进行混淆处理,例如对预加密后的数据进行插值混淆处理,获得混淆处理后的数据。After obtaining the pre-encrypted data, in order to increase data security, the processing device performs obfuscation processing on the pre-encrypted data, for example, performs interpolation obfuscation processing on the pre-encrypted data to obtain obfuscated data.
作为一种实施例,为了便于处理装置12后期进行解密,处理装置12可以在预加密后的数据中固定位置上进行插值处理。As an embodiment, in order to facilitate the processing device 12 to decrypt later, the processing device 12 may perform interpolation processing at a fixed position in the pre-encrypted data.
在获得混淆处理后的数据之后,处理装置可以将密文字符串作为数据头,封装混淆处理后的数据,获得加密处理后的数据。封装可以参照前文论述内容,此处不再赘述。After obtaining the obfuscated data, the processing device may use the ciphertext string as a data header, encapsulate the obfuscated data, and obtain encrypted data. The encapsulation can refer to the content discussed above, and will not be repeated here.
在方式三的加密方式中,处理装置12对数据进行加密混淆处理,提高加密强度,最大程度保障剪切板数据安全。In the third encryption method, the processing device 12 encrypts and obfuscates the data to increase the encryption strength and ensure the security of the clipboard data to the greatest extent.
例如,第一加密算法为MD5加密算法,处理装置12对剪切板数据“地址为XXXXXXXXXXXXXXXXXXXXXXXXXX”进行加密之后,可以获得密文字符串为“2ce1ae2a4388f14b7f4c998de2e6e5b6”。For example, the first encryption algorithm is the MD5 encryption algorithm. After the processing device 12 encrypts the clipboard data "the address is XXXXXXXXXXXXXXXXXXXXXXXXXX", the ciphertext string "2ce1ae2a4388f14b7f4c998de2e6e5b6" can be obtained.
第二加密算法使用base64进行预加密,获得预加密后的数据“5Zyw5Z2A5Li6WFhYWFhYWFhYWFhYWFhYWFhYWFhYWFhYWFg=”,对预加密后的数据在第一位和第二位直接插入“5”,从而获得混淆处理后的数据如下:The second encryption algorithm uses base64 for pre-encryption to obtain the pre-encrypted data "5Zyw5Z2A5Li6WFhYWFhYWFhYWFhYWFhYWFhYWFhYWFhYWFg=", insert "5" directly into the first and second digits of the pre-encrypted data, and obtain the obfuscated data as follows:
55Zyw5Z2A5Li6WFhYWFhYWFhYWFhYWFhYWFhYWFhYWFhYWFg=。55Zyw5Z2A5Li6WFhYWFhYWFhYWFhYWFhYWFhYWFhYWFhYWFg=.
在获得该混淆处理后的数据,将密文字符串和混淆处理后的数据封装在一起,从而获得加密处理后的数据如下:After obtaining the obfuscated data, the ciphertext string and the obfuscated data are encapsulated together to obtain the encrypted data as follows:
“2ce1ae2a4388f14b7f4c998de2e6e5b6+55Zyw5Z2A5Li6WFhYWFhYWFhYWFhYWFhYWFhYWFhYWFhYWFg=”。"2ce1ae2a4388f14b7f4c998de2e6e5b6+55Zyw5Z2A5Li6WFhYWFhYWFhYWFhYWFhYWFhYWFhYWFhYWFg=".
作为一种实施例,方式一和方式二的加密方式可以结合,方式一和方式三的加密方式也可以结合,即方式二和方式三中的第一加密算法可以通过方式一确定出的。As an embodiment, the encryption methods of method 1 and method 2 can be combined, and the encryption methods of method 1 and method 3 can also be combined, that is, the first encryption algorithm in method 2 and method 3 can be determined through method 1.
在获得加密处理后的数据之后,处理装置12执行步骤205,即将加密处理后的数据发送给剪切板13。由于处理装置12对剪切板数据进行了加密处理,所以不法分子很难破解该加密处理后的数据,保证剪切板数据的安全性。After obtaining the encrypted data, the processing device 12 executes step 205 , that is, sends the encrypted data to the clipboard 13 . Since the processing device 12 encrypts the clipboard data, it is difficult for lawbreakers to decipher the encrypted data, ensuring the security of the clipboard data.
具体的,如前文论述的处理装置12可能是通过服务来实现,因此,处理装置12不会用于存储加密处理后的数据,而是将该加密处理后的数据发送给剪切板13中。Specifically, the processing device 12 discussed above may be implemented through a service. Therefore, the processing device 12 will not store encrypted data, but send the encrypted data to the clipboard 13 .
处理装置12执行步骤206,即在检测到从剪切板13中获取数据的操作时,从剪切板13中获取加密处理后的数据。The processing device 12 executes step 206 , that is, when an operation of obtaining data from the clipboard 13 is detected, obtain encrypted data from the clipboard 13 .
其中,从剪切板13中获取数据的操作例如用户进行粘贴操作,从剪切板13中获取数据的操作的方式有很多种,可以参照前文论述的用户进行复制操作的方式,此处不再赘述。Among them, the operation of obtaining data from the clipboard 13, for example, the user performs a paste operation, and there are many ways to obtain data from the clipboard 13. You can refer to the way the user performs the copy operation discussed above, which will not be repeated here. repeat.
在获取加密处理后的数据之后,处理装置12执行步骤207,即对加密处理后的数据进行解密处理。After acquiring the encrypted data, the processing device 12 executes step 207, that is, decrypts the encrypted data.
具体的,处理装置12按照加密数据的逆过程进行解密,解密获得相应的数据,下面以加对该加密过程对应的解密处理过程进行示例说明。Specifically, the processing device 12 decrypts the encrypted data according to the reverse process, and decrypts to obtain the corresponding data. The decryption process corresponding to the encryption process will be described as an example below.
解密处理过程一:Decryption process one:
请参照图5,该解密处理过程包括:步骤501,按照第一加密算法,对加密处理后的数据中的数据头进行解密处理。Referring to FIG. 5 , the decryption process includes: step 501 , according to the first encryption algorithm, decrypting the data header in the encrypted data.
具体的,处理装置12按照前文方式二的加密方式对数据进行加密,处理装置12按照之前加密所使用的第一加密算法,对密文字符串进行解密处理,解密处理后得到解密处理后的剪切板数据的内容。处理装置12执行步骤502,即判断解密处理后的剪切板数据与加密处理后的数据中的数据是否匹配,如果匹配执行步骤503,即将解密处理后的剪切板数据发送给相应应用或剪切板。如果将解密处理后的剪切板数据发送给剪切板13,则相应应用从剪切板13中获取得到所需的剪切板数据。如果不匹配,则执行步骤504,即提示用户剪切板数据已被篡改。Specifically, the processing device 12 encrypts the data according to the encryption method of the second method above, and the processing device 12 decrypts the ciphertext string according to the first encryption algorithm used in the previous encryption, and obtains the decrypted clip after decryption. The content of the sliced data. The processing device 12 executes step 502, that is, judges whether the decrypted clipboard data matches the data in the encrypted data, and if they match, executes step 503, that is, sends the decrypted clipboard data to the corresponding application or clipboard. Cutting board. If the decrypted clipboard data is sent to the clipboard 13 , the corresponding application obtains the required clipboard data from the clipboard 13 . If not, execute step 504, that is, prompt the user that the clipboard data has been tampered with.
其中,匹配可以理解为加密处理后的数据中的数据存在有与解密处理后的数据头相同的数据,匹配可以进一步理解为数据验证,利用解密处理后的剪切板数据对加密处理后的数据中的数据进行验证。Among them, matching can be understood as the data in the encrypted data has the same data as the decrypted data header, and matching can be further understood as data verification, using the decrypted clipboard data to encrypt the encrypted data. The data in is verified.
具体的,如前文方式二论述的内容,由于加密处理后的数据中的密文字符串是数据本身加密得到的,加密处理后的数据中还包括没有加密的剪切板数据。如果解密处理后的剪切板数据与加密处理后的数据中的数据相同,那就表示剪切板数据没有被篡改,处理装置12将该剪切板数据发送给相应应用,相应应用是执行从剪切板中获取数据的操作所对应的应用,例如用户需要将剪切板数据复制到应用A中,那么应用A则为相应应用。如果解密处理后的剪切板数据与加密处理后的数据中的数据不相同,则表示剪切板数据被篡改,则提示用户该剪切板数据已被篡改,提示的方式有多种,例如弹出浮窗进行提示等。Specifically, as discussed in the second method above, since the ciphertext string in the encrypted data is obtained by encrypting the data itself, the encrypted data also includes unencrypted clipboard data. If the decrypted clipboard data is the same as the data in the encrypted data, it means that the clipboard data has not been tampered with, and the processing device 12 sends the clipboard data to the corresponding application. The application corresponding to the operation of obtaining data in the clipboard, for example, if the user needs to copy the clipboard data to application A, then application A is the corresponding application. If the decrypted clipboard data is different from the encrypted data, it means that the clipboard data has been tampered with, and the user will be prompted that the clipboard data has been tampered with. There are many ways to prompt, for example A floating window pops up for prompts, etc.
作为一种实施例,当处理装置12确定解密处理后的剪切板数据与加密处理后的数据中的数据不相同时,处理装置12可以删除剪切板数据,避免不法分子植入病毒等。As an example, when the processing device 12 determines that the decrypted clipboard data is different from the encrypted data, the processing device 12 may delete the clipboard data to prevent criminals from implanting viruses.
解密处理过程二:Decryption process two:
如果加密方式采用的是前文方式三进行加密,则处理装置12通过前文论述的步骤501的方式获得解密处理后的剪切板数据之后,还需要对加密处理后的数据中除了密文字符串之外的数据,再进行混淆逆处理,处理之后,再根据第二加密算法进行解密处理,获得剪切板数据,再判断加密解密处理后的剪切板数据和剪切板数据是否匹配。如果解密处理后的剪切板数据和剪切板数据匹配,则执行步骤503,将剪切板数据发送给相应应用。如果解密处理后的剪切板数据和剪切板数据不匹配,则执行步骤504,即提示用户剪切板数据已被篡改。If the encryption method adopts the above-mentioned method three to encrypt, after the processing device 12 obtains the decrypted clipboard data through the method of step 501 discussed above, it also needs to encrypt the encrypted data except for the ciphertext string. After the processing, the decryption process is performed according to the second encryption algorithm to obtain the clipboard data, and then it is judged whether the encrypted and decrypted clipboard data matches the clipboard data. If the decrypted clipboard data matches the clipboard data, step 503 is executed to send the clipboard data to the corresponding application. If the decrypted clipboard data does not match the clipboard data, step 504 is executed, that is, the user is prompted that the clipboard data has been tampered with.
在一种可能的实施例中,终端设备可能同时支持多个剪切板13,处理装置12也可以同时对多个剪切板13中的剪切板数据执行上述加密及解密过程。In a possible embodiment, the terminal device may support multiple clipboards 13 at the same time, and the processing device 12 may also perform the above encryption and decryption process on the clipboard data in the multiple clipboards 13 at the same time.
具体的,处理器装置12可以包括多个独立进程,每个进程负责对一个剪切板13进行通信,以及对该剪切板对应的剪切板数据进行解密和加密,实现同时对多个剪切板13的数据进行处理。Specifically, the processor device 12 may include a plurality of independent processes, and each process is responsible for communicating with a clipboard 13, and decrypting and encrypting the clipboard data corresponding to the clipboard, so as to realize simultaneous processing of multiple clipboards. Cutting plate 13 data for processing.
基于相同的发明构思,本申请实施例还提供一种剪切板数据的处理装置,该剪切板数据的处理装置相当于前文论述的处理装置12,请参照图6,该处理装置12包括:Based on the same inventive concept, the embodiment of the present application also provides a processing device for shearing plate data, which is equivalent to the processing device 12 discussed above. Please refer to FIG. 6 , the processing device 12 includes:
获取模块601,用于在检测到对数据进行剪切操作或复制操作时,获取剪切板数据;An acquisition module 601, configured to acquire clipboard data when it is detected that a cut operation or a copy operation is performed on the data;
判断模块602,用于判断剪切板数据中是否包含预设的词汇集合中的至少一个词汇;A judging module 602, configured to judge whether the clipboard data contains at least one vocabulary in the preset vocabulary set;
加密模块603,若剪切板数据中包含预设的词汇集合中的至少一个词汇,则对剪切板数据进行加密处理;Encryption module 603, if the clipboard data contains at least one vocabulary in the preset vocabulary set, then encrypt the clipboard data;
发送模块604,用于将加密处理后的数据发送给剪切板。The sending module 604 is configured to send the encrypted data to the clipboard.
在一种可能的实施例中,加密模块603具体用于:In a possible embodiment, the encryption module 603 is specifically configured to:
若剪切板数据中包含预设的词汇集合中的至少一个词汇,则确定剪切板数据的安全级别;If the clipboard data contains at least one vocabulary in the preset vocabulary set, then determine the security level of the clipboard data;
根据剪切板数据的安全级别,确定用于加密剪切板数据的加密算法;Determine the encryption algorithm used to encrypt the clipboard data according to the security level of the clipboard data;
根据用于加密剪切板数据的加密算法,对剪切板数据进行加密处理。Encrypt the clipboard data according to the encryption algorithm used to encrypt the clipboard data.
在一种可能的实施例中,加密模块603具体用于:In a possible embodiment, the encryption module 603 is specifically configured to:
确定至少一个词汇中每个词汇的安全级别,至少一个词汇中所属的安全级别最高的安全级别为剪切板数据的安全级别;或,determining the security level of each vocabulary in the at least one vocabulary, the security level of the highest security level belonging to the at least one vocabulary is the security level of the clipboard data; or,
根据数据对应的应用,以及对应关系,确定剪切板数据对应的安全级别;其中,剪切板数据对应的应用是指从剪切板数据来源于应用,对应关系为不同应用与不同安全级别之间的对应关系。According to the application corresponding to the data and the corresponding relationship, determine the security level corresponding to the clipboard data; among them, the application corresponding to the clipboard data refers to the application from which the clipboard data comes from, and the corresponding relationship is between different applications and different security levels. Correspondence between.
在一种可能的实施例中,加密模块603具体用于:In a possible embodiment, the encryption module 603 is specifically configured to:
按照第一加密算法对剪切板数据进行加密,获得密文字符串;Encrypt the clipboard data according to the first encryption algorithm to obtain a ciphertext string;
对密文字符串与剪切板数据进行封装处理,获得加密处理后的数据。Encapsulate the ciphertext string and clipboard data to obtain encrypted data.
在一种可能的实施例中,该处理装置还包括解密模块605和提示模块606,其中:In a possible embodiment, the processing device further includes a decryption module 605 and a prompt module 606, wherein:
获取模块601,还用于在将加密处理后的数据发送给剪切板13之后,在检测到从剪切板13中获取剪切板数据的操作时,从剪切板13获取加密处理后的数据;The obtaining module 601 is further configured to obtain the encrypted data from the clipboard 13 when an operation of obtaining the clipboard data from the clipboard 13 is detected after the encrypted data is sent to the clipboard 13. data;
解密模块605,用于按照第一加密算法,对加密处理后的数据中的密文字符串进行解密处理,获得解密处理后的数据;Decryption module 605, configured to decrypt the ciphertext string in the encrypted data according to the first encryption algorithm, and obtain the decrypted data;
发送模块604,还用于若解密处理后的数据与加密处理后的数据中的数据相匹配,则根据从剪切板13中获取剪切板数据的操作,将解密处理后的数据发送给剪切板13或相应应用;The sending module 604 is also configured to send the decrypted data to the clipboard according to the operation of obtaining the clipboard data from the clipboard 13 if the decrypted data matches the data in the encrypted data. Cutting board 13 or corresponding application;
提示模块606,用于若解密处理后的数据与加密处理后的数据中的数据不匹配,则提示用户剪切板数据已被篡改。The prompting module 606 is configured to prompt the user that the clipboard data has been tampered with if the decrypted data does not match the encrypted data.
在一种可能的实施例中,加密模块603具体用于:In a possible embodiment, the encryption module 603 is specifically configured to:
按照第二加密算法对剪切板数据进行预加密,获得预加密后的数据;Pre-encrypt the clipboard data according to the second encryption algorithm to obtain pre-encrypted data;
对预加密后的数据进行混淆处理,获得混淆处理后的数据;Obfuscate the pre-encrypted data to obtain the obfuscated data;
对密文字符串作和混淆处理后的数据进行封装处理,获得加密处理后的数据。Encapsulate the encrypted and obfuscated data to obtain encrypted data.
基于相同的发明构思,本申请实施例还提供一种剪切板数据的处理装置,该剪切板数据的处理装置相当于前文论述的处理装置12,请参照图7,该装置包括:Based on the same inventive concept, the embodiment of the present application also provides a processing device for shearing plate data, which is equivalent to the processing device 12 discussed above, please refer to FIG. 7 , the device includes:
至少一个处理器701,以及at least one processor 701, and
与至少一个处理器701通信连接的存储器702;a memory 702 communicatively connected to at least one processor 701;
其中,存储器702存储有可被至少一个处理器701执行的指令,至少一个处理器701通过执行存储器702存储的指令实现如前文论述的剪切板数据的处理方法。The memory 702 stores instructions executable by at least one processor 701, and at least one processor 701 implements the clipboard data processing method discussed above by executing the instructions stored in the memory 702.
图7中是以一个处理器701为例,但是实际上不限制处理器701的数量。One processor 701 is taken as an example in FIG. 7 , but the number of processors 701 is not limited actually.
作为一种实施例,图7中的处理器701可以实现前文图6中获取模块601、判断模块602、加密模块603、发送模块604、解密模块605和提示模块606的功能。As an example, the processor 701 in FIG. 7 can implement the functions of the acquiring module 601, judging module 602, encrypting module 603, sending module 604, decrypting module 605 and prompting module 606 in FIG. 6 above.
基于相同的发明构思,本申请实施例提供一种计算机可读存储介质,所述计算机可读存储介质存储有计算机指令,当所述计算机指令在计算机上运行时,使得计算机执行如前文论述的剪切板数据的处理方法。Based on the same inventive concept, an embodiment of the present application provides a computer-readable storage medium, the computer-readable storage medium stores computer instructions, and when the computer instructions are run on the computer, the computer executes the above-mentioned clipping method. The processing method of cutting board data.
本领域内的技术人员应明白,本申请的实施例可提供为方法、系统、或计算机程序产品。因此,本申请可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本申请可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。Those skilled in the art should understand that the embodiments of the present application may be provided as methods, systems, or computer program products. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein.
本申请是参照根据本申请实施例的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。The present application is described with reference to flowcharts and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the present application. It should be understood that each procedure and/or block in the flowchart and/or block diagram, and a combination of procedures and/or blocks in the flowchart and/or block diagram can be realized by computer program instructions. These computer program instructions may be provided to a general purpose computer, special purpose computer, embedded processor, or processor of other programmable data processing equipment to produce a machine such that the instructions executed by the processor of the computer or other programmable data processing equipment produce a An apparatus for realizing the functions specified in one or more procedures of the flowchart and/or one or more blocks of the block diagram.
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。These computer program instructions may also be stored in a computer-readable memory capable of directing a computer or other programmable data processing apparatus to operate in a specific manner, such that the instructions stored in the computer-readable memory produce an article of manufacture comprising instruction means, the instructions The device realizes the function specified in one or more procedures of the flowchart and/or one or more blocks of the block diagram.
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。These computer program instructions can also be loaded onto a computer or other programmable data processing device, causing a series of operational steps to be performed on the computer or other programmable device to produce a computer-implemented process, thereby The instructions provide steps for implementing the functions specified in the flow chart or blocks of the flowchart and/or the block or blocks of the block diagrams.
尽管已描述了本申请的优选实施例,但本领域内的技术人员一旦得知了基本创造性概念,则可对这些实施例做出另外的变更和修改。所以,所附权利要求意欲解释为包括优选实施例以及落入本申请范围的所有变更和修改。While preferred embodiments of the present application have been described, additional changes and modifications to these embodiments can be made by those skilled in the art once the basic inventive concept is appreciated. Therefore, the appended claims are intended to be construed to cover the preferred embodiment and all changes and modifications which fall within the scope of the application.
显然,本领域的技术人员可以对本申请进行各种改动和变型而不脱离本申请的精神和范围。这样,倘若本申请的这些修改和变型属于本申请权利要求及其等同技术的范围之内,则本申请也意图包含这些改动和变型在内。Obviously, those skilled in the art can make various changes and modifications to the application without departing from the spirit and scope of the application. In this way, if these modifications and variations of the present application fall within the scope of the claims of the present application and their equivalent technologies, the present application is also intended to include these modifications and variations.
Claims (14)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201910540099.7A CN110262908A (en) | 2019-06-21 | 2019-06-21 | A method and device for processing shear plate data |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201910540099.7A CN110262908A (en) | 2019-06-21 | 2019-06-21 | A method and device for processing shear plate data |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN110262908A true CN110262908A (en) | 2019-09-20 |
Family
ID=67920079
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201910540099.7A Pending CN110262908A (en) | 2019-06-21 | 2019-06-21 | A method and device for processing shear plate data |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN110262908A (en) |
Cited By (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN111581665A (en) * | 2020-05-09 | 2020-08-25 | 维沃移动通信有限公司 | Data processing method and device and electronic equipment |
| CN112433871A (en) * | 2020-12-09 | 2021-03-02 | 江苏通付盾信息安全技术有限公司 | Shear plate data protection method and device |
| CN113806714A (en) * | 2020-06-14 | 2021-12-17 | 武汉斗鱼鱼乐网络科技有限公司 | Method and device for safe transmission of whitelist information of an application |
| CN117113417A (en) * | 2023-10-18 | 2023-11-24 | 中孚安全技术有限公司 | Method, system, equipment and medium for managing and controlling clipboard under Linux system |
Citations (13)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN102609642A (en) * | 2012-01-09 | 2012-07-25 | 中标软件有限公司 | Clipboard control method and clipboard control system |
| US20140040638A1 (en) * | 2011-10-11 | 2014-02-06 | Citrix Systems, Inc. | Policy-Based Application Management |
| US20140267339A1 (en) * | 2013-03-15 | 2014-09-18 | Adobe Systems Incorporated | Secure Cloud-Based Clipboard for Touch Devices |
| CN104579627A (en) * | 2014-12-06 | 2015-04-29 | 上海移远通信技术有限公司 | Data encryption method and system |
| CN105099672A (en) * | 2015-08-04 | 2015-11-25 | 东南大学 | Hybrid encryption method and device for realizing the same |
| CN105184181A (en) * | 2015-06-15 | 2015-12-23 | 北京天诚同创电气有限公司 | File encryption method, file decryption method and file encryption device |
| CN105468990A (en) * | 2014-09-04 | 2016-04-06 | 中国移动通信集团安徽有限公司 | Sensitive information management control method and apparatus |
| CN106446714A (en) * | 2016-10-12 | 2017-02-22 | 北京元心科技有限公司 | Data access method and device of multi-clipboard |
| CN108959941A (en) * | 2018-06-21 | 2018-12-07 | Oppo(重庆)智能科技有限公司 | Data ciphering method, device and electronic device |
| CN109428710A (en) * | 2017-08-22 | 2019-03-05 | 深圳光启智能光子技术有限公司 | Data transmission method, device, storage medium and processor |
| CN109740363A (en) * | 2019-01-04 | 2019-05-10 | 贵州大学 | Document classification desensitization encryption method |
| CN109857571A (en) * | 2018-12-29 | 2019-06-07 | 北京奇安信科技有限公司 | Clipbook control method and device |
| CN109889340A (en) * | 2019-03-19 | 2019-06-14 | 北京信息科技大学 | An Adaptive Key Distribution Mechanism Based on QKD Network |
-
2019
- 2019-06-21 CN CN201910540099.7A patent/CN110262908A/en active Pending
Patent Citations (13)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20140040638A1 (en) * | 2011-10-11 | 2014-02-06 | Citrix Systems, Inc. | Policy-Based Application Management |
| CN102609642A (en) * | 2012-01-09 | 2012-07-25 | 中标软件有限公司 | Clipboard control method and clipboard control system |
| US20140267339A1 (en) * | 2013-03-15 | 2014-09-18 | Adobe Systems Incorporated | Secure Cloud-Based Clipboard for Touch Devices |
| CN105468990A (en) * | 2014-09-04 | 2016-04-06 | 中国移动通信集团安徽有限公司 | Sensitive information management control method and apparatus |
| CN104579627A (en) * | 2014-12-06 | 2015-04-29 | 上海移远通信技术有限公司 | Data encryption method and system |
| CN105184181A (en) * | 2015-06-15 | 2015-12-23 | 北京天诚同创电气有限公司 | File encryption method, file decryption method and file encryption device |
| CN105099672A (en) * | 2015-08-04 | 2015-11-25 | 东南大学 | Hybrid encryption method and device for realizing the same |
| CN106446714A (en) * | 2016-10-12 | 2017-02-22 | 北京元心科技有限公司 | Data access method and device of multi-clipboard |
| CN109428710A (en) * | 2017-08-22 | 2019-03-05 | 深圳光启智能光子技术有限公司 | Data transmission method, device, storage medium and processor |
| CN108959941A (en) * | 2018-06-21 | 2018-12-07 | Oppo(重庆)智能科技有限公司 | Data ciphering method, device and electronic device |
| CN109857571A (en) * | 2018-12-29 | 2019-06-07 | 北京奇安信科技有限公司 | Clipbook control method and device |
| CN109740363A (en) * | 2019-01-04 | 2019-05-10 | 贵州大学 | Document classification desensitization encryption method |
| CN109889340A (en) * | 2019-03-19 | 2019-06-14 | 北京信息科技大学 | An Adaptive Key Distribution Mechanism Based on QKD Network |
Cited By (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN111581665A (en) * | 2020-05-09 | 2020-08-25 | 维沃移动通信有限公司 | Data processing method and device and electronic equipment |
| CN111581665B (en) * | 2020-05-09 | 2021-07-06 | 维沃移动通信有限公司 | Data processing method, apparatus and electronic equipment |
| CN113806714A (en) * | 2020-06-14 | 2021-12-17 | 武汉斗鱼鱼乐网络科技有限公司 | Method and device for safe transmission of whitelist information of an application |
| CN112433871A (en) * | 2020-12-09 | 2021-03-02 | 江苏通付盾信息安全技术有限公司 | Shear plate data protection method and device |
| CN117113417A (en) * | 2023-10-18 | 2023-11-24 | 中孚安全技术有限公司 | Method, system, equipment and medium for managing and controlling clipboard under Linux system |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US20210374445A1 (en) | Systems and methods for liveness-verified, biometric-based encryption | |
| US9411975B2 (en) | Methods and apparatus to securely share data | |
| WO2022252632A1 (en) | Data encryption processing method and apparatus, computer device, and storage medium | |
| US20160117518A1 (en) | File Encryption/Decryption Device And File Encryption/Decryption Method | |
| US8811612B2 (en) | Using file metadata for data obfuscation | |
| US20160094347A1 (en) | Method and system for secure management of computer applications | |
| CN105577379A (en) | An information processing method and device | |
| CN110262908A (en) | A method and device for processing shear plate data | |
| CN108197485A (en) | terminal data encryption method and system, terminal data decryption method and system | |
| US20200145389A1 (en) | Controlling Access to Data | |
| WO2022028289A1 (en) | Data encryption method and apparatus, data decryption method and apparatus, terminal, and storage medium | |
| CN111859435B (en) | Data security processing method and device | |
| CN204360381U (en) | mobile device | |
| US11455404B2 (en) | Deduplication in a trusted execution environment | |
| US12147508B2 (en) | Systems and methods for securely processing content | |
| WO2020044095A1 (en) | File encryption method and apparatus, device, terminal, server, and computer-readable storage medium | |
| CN107092816A (en) | A kind of Android application programs reinforcement means | |
| CN110830261B (en) | Encryption method, device, computer equipment and storage medium | |
| CN108108632A (en) | A kind of multifactor file watermark generation extracting method and system | |
| WO2020181818A1 (en) | Encryption and decryption method for electronic file and device | |
| CN113672954A (en) | Feature extraction method and device and electronic equipment | |
| CN104504310A (en) | Method and device for software protection based on shell technology | |
| CN103605927A (en) | Encryption and decryption method based on embedded Linux system | |
| CN118233132A (en) | Data security transmission method, device, equipment and medium | |
| CN107404476B (en) | Method and device for protecting data security in big data cloud environment |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| RJ01 | Rejection of invention patent application after publication | ||
| RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190920 |