Unlock instant, AI-driven research and patent intelligence for your innovation.

A clipboard access control method and system

An access control and clipboard technology, applied in instrumentation, computing, electrical and digital data processing, etc., can solve problems such as clipping data leakage, and achieve the effect of ensuring security and improving experience.

Active Publication Date: 2022-04-19
ZTE CORP +1
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The main technical problem to be solved by the present invention is to provide a clipboard access control method and system to solve the technical problem of clipping data leakage caused by illegal application programs monitoring the system clipboard data in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A clipboard access control method and system
  • A clipboard access control method and system
  • A clipboard access control method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0047] Please refer to figure 1 , a flowchart of an illegal application's stealing and tampering attack on private clipping data on the clipboard, the steps specifically include the following:

[0048] S111, the illegal application program 102 obtains the Clip board Manager (clip board manager) object 106 by calling the Get method in the operation component 103 (such as the Activity component), so as to realize the operation of the clip board;

[0049] S112, the illegal application program 102 creates an object that implements the On Primary Clip Changed Listener (clipboard listener) interface 105, and rewrites the private clipping data change notification method in the clipboard;

[0050] S113, the illegal application 102 adds the object created in S112 to the clipboard listener list 106, so that when the private clipping data of the clipboard changes, the change notification of the object will be invoked;

[0051] S114, the legitimate application program 101 uses the clipbo...

Embodiment 2

[0079] image 3 Another clipboard access control method provided in this embodiment, in this embodiment, the method is to take the Android system as an example, and the clipboard access control method provided in this embodiment is further described, and its specific Proceed as follows:

[0080] S311, registering a broadcast listener on the secure clipboard service 309, and processing a request broadcast from a legitimate application program to send private clipping data;

[0081]S312, the illegal application 302 obtains the ClipboardManager object 306 by calling the Get method in the Activity component 303, so as to realize the operation of the system clipboard;

[0082] S313, the illegal application 302 creates an object that implements the OnPrimaryClipChangedListener interface 305, and rewrites the clipping data change notification method in the system clipboard;

[0083] S314, the illegal application 302 adds the object created in step S313 to the system clipboard liste...

Embodiment 3

[0104] Figure 4 The clipboard access control system 40 provided for this embodiment, in this implementation China, the clipboard access control system includes:

[0105] The private clipboard setting module 401 is used to set a private clipboard for legal applications; preferably, when setting a private clipboard, a private clipboard can be set for each legal application for storage by the legal application own private cut data.

[0106] A secure clipboard service setting module 402, configured to set a secure clipboard service for the private clipboard;

[0107] A data acquisition module 403, configured to acquire the private cut data of the legal application;

[0108] The storage module 404 is configured to store the private clipping data in the private clipboard; when each legal application program sets its own independent private clipboard, the storage module 404 is specifically to store the private clipping data of the legal application The program's own private clipp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a clipboard access control method and system. The method includes setting a private clipboard and a secure clipboard service for a legal application, and storing the acquired private clipping data of the legal application. Into the private clipboard, thereby realizing the adjustment of the legal application program reading data from the system clipboard to read from the private clipboard, thereby blocking the data of the system clipboard by the illegal application program Obtain the clipboard data in the legal application through monitoring; the method also receives the data acquisition request sent by the requester application program, and checks the authority through the secure clipboard service. The cached private clipping data is sent to the requester application, which solves the potential safety hazard of data leakage when the user accesses the clipboard in the BYOD environment, thereby ensuring the security of the clipping data and also Improved user experience.

Description

technical field [0001] The invention relates to the technical field of mobile terminal security, in particular to a clipboard access control method and system. Background technique [0002] With the rapid development and wide application of mobile intelligent technology and intelligent terminal equipment, its functions are also showing more and more diversified trends, and mobile applications and services are also becoming more and more abundant. The Android system is currently the most popular smart terminal platform, and Google Play alone provides more than 1 million Android applications. The wide application of smart terminals and the increasing abundance of mobile applications make it possible for them to enter the field of mobile office. Bring Your Own Device (BYOD) has become a research hotspot and a future enterprise development trend due to its advantages of flexible work, efficiency improvement and cost saving. [0003] However, it is precisely because of the wide...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62
CPCG06F21/6245G06F21/629G06F2221/2141G06F21/62
Inventor 俞研董振江吴家顺王蔚
Owner ZTE CORP