Data processing method and device, electronic equipment and storage medium

A data processing device and data processing technology, applied in the field of data processing, can solve problems such as malicious passwords in data

Pending Publication Date: 2020-10-16
XIAMEN MEITUZHIJIA TECH
View PDF11 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the inventors have found through research that in the prior art, there are some malicious codes that will issue malicious passwords in the background, without the user's permission, directly call the system interface to write the malicious passwords into the system clipboard, thus there is a problem of writing There is a problem with malicious passwords in the data of the system clipboard

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data processing method and device, electronic equipment and storage medium
  • Data processing method and device, electronic equipment and storage medium
  • Data processing method and device, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] In the prior art, it is assumed that there is a company A, which has an application program called "calculator" under its name, and the user's electronic device can download the "calculator" application program of company A. However, the "Calculator" application integrates some software development kits (Software Development Kit, SDK) (cooperation, advertising and promotion) outside Company A, referred to as "third-party SDK", and Company A does not know about these "third-party SDKs". Three-party SDK" specific operations. For profit-making purposes, some "third-party SDKs" may issue advertising promotion passwords from the background of "third-party SDKs" without notifying Company A or against Company A's wishes to obtain revenue. As long as the "Calculator" application is started, triggering the execution of the code of the "third-party SDK" connected, it is possible for the "third-party SDK" to issue an advertisement promotion password from the background.

[0047] ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a data processing method and device, electronic equipment and a storage medium, and relates to the technical field of data processing. The data processing method comprises the steps: firstly, when a clipboard service is started, obtaining a preset clipboard object and clipboard content, and enabling the preset clipboard object to store a system clipboard object; secondly, judging whether the clipboard content is legal data or not through the preset clipboard object; then, if the data is legal data, writing the clipboard content into the system clipboard object through the preset clipboard object; and finally, if the clipboard content is not legal data, judging that the clipboard content is a malicious password. Through the arrangement, the problemthat malicious passwords exist in data written into a system clipboard in the prior art can be solved.

Description

technical field [0001] The present application relates to the technical field of data processing, and in particular, to a data processing method and device, electronic equipment, and a storage medium. Background technique [0002] The usage method of the existing advertisement promotion password is: copying, that is, copying into the clipboard of the mobile phone system. When the copying is completed and the user enters the corresponding application interface, the corresponding promotional advertisement will pop up automatically. The user clicks to enter the promotional advertisement, and the beneficiary of the promotional password can reap certain benefits after viewing, clicking, purchasing and placing an order. , it may be rebates, promotion commissions, or store popularity, etc. Therefore, the key to gaining benefits is to be able to copy promotional passwords into the system clipboard. The normal and compliant process should be the user's active choice to copy. [00...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/54G06F21/55G06F21/52G06Q30/02
CPCG06F9/543G06F21/554G06F21/52G06Q30/0241
Inventor 陈鸿图
Owner XIAMEN MEITUZHIJIA TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products