A clipboard access control method and system
An access control and clipboard technology, applied in instrumentation, computing, electrical and digital data processing, etc., can solve problems such as clipping data leakage, and achieve the effect of ensuring security and improving experience.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0047] Please refer to figure 1 , a flowchart of an illegal application's stealing and tampering attack on private clipping data on the clipboard, the steps specifically include the following:
[0048] S111, the illegal application program 102 obtains the Clip board Manager (clip board manager) object 106 by calling the Get method in the operation component 103 (such as the Activity component), so as to realize the operation of the clip board;
[0049] S112, the illegal application program 102 creates an object that implements the On Primary Clip Changed Listener (clipboard listener) interface 105, and rewrites the private clipping data change notification method in the clipboard;
[0050] S113, the illegal application 102 adds the object created in S112 to the clipboard listener list 106, so that when the private clipping data of the clipboard changes, the change notification of the object will be invoked;
[0051] S114, the legitimate application program 101 uses the clipbo...
Embodiment 2
[0079] image 3 Another clipboard access control method provided in this embodiment, in this embodiment, the method is to take the Android system as an example, and the clipboard access control method provided in this embodiment is further described, and its specific Proceed as follows:
[0080] S311, registering a broadcast listener on the secure clipboard service 309, and processing a request broadcast from a legitimate application program to send private clipping data;
[0081]S312, the illegal application 302 obtains the ClipboardManager object 306 by calling the Get method in the Activity component 303, so as to realize the operation of the system clipboard;
[0082] S313, the illegal application 302 creates an object that implements the OnPrimaryClipChangedListener interface 305, and rewrites the clipping data change notification method in the system clipboard;
[0083] S314, the illegal application 302 adds the object created in step S313 to the system clipboard liste...
Embodiment 3
[0104] Figure 4 The clipboard access control system 40 provided for this embodiment, in this implementation China, the clipboard access control system includes:
[0105] The private clipboard setting module 401 is used to set a private clipboard for legal applications; preferably, when setting a private clipboard, a private clipboard can be set for each legal application for storage by the legal application own private cut data.
[0106] A secure clipboard service setting module 402, configured to set a secure clipboard service for the private clipboard;
[0107] A data acquisition module 403, configured to acquire the private cut data of the legal application;
[0108] The storage module 404 is configured to store the private clipping data in the private clipboard; when each legal application program sets its own independent private clipboard, the storage module 404 is specifically to store the private clipping data of the legal application The program's own private clipp...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


