Method and device for protecting clipboard privacy

A clipboard and privacy technology, applied in the computer field, can solve the problems of high risk of theft and information leakage, and achieve the effect of reducing the risk of information leakage

Active Publication Date: 2021-01-29
SAMSUNG ELECTRONICS CHINA R&D CENT +1
View PDF3 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Existing technologies make clipboard contents, especially account passwords or more private information, more risky to be stolen, which can easily lead to security issues such as information leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for protecting clipboard privacy
  • Method and device for protecting clipboard privacy
  • Method and device for protecting clipboard privacy

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The present disclosure will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain related inventions, rather than to limit the invention. It should also be noted that, for the convenience of description, only the parts related to the related invention are shown in the drawings.

[0031] It should be noted that, in the case of no conflict, the embodiments in the present disclosure and the features in the embodiments can be combined with each other. The present disclosure will be described in detail below with reference to the accompanying drawings and embodiments.

[0032] figure 1 An exemplary system architecture 100 is shown to which embodiments of the method for protecting clipboard privacy or the apparatus for protecting clipboard privacy of the present disclosure can be applied.

[0033] Such as figure 1 As shown, the system...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a method and device for protecting clipboard privacy. The specific implementation mode of the method comprises the following steps: in response to receiving acopy instruction, detecting whether copy information comprises private information or not; if the privacy information is included, encrypting the copy information to generate an encrypted text; storing the encrypted text into a clipboard and marking an encrypted label; in response to receiving a pasting instruction, detecting whether a pasting behavior is a safe action or not; if so, decrypting the clipboard text and returning the decrypted clipboard text; and if the action is a non-secure action, directly returning the encrypted text in the clipboard. According to the embodiment, even if theinformation of the clipboard is stolen, the clipboard cannot be used randomly, so that the risk of information leakage is reduced.

Description

technical field [0001] The embodiments of the present disclosure relate to the field of computer technology, and in particular to a method and device for protecting clipboard privacy. Background technique [0002] The app can easily obtain the clipboard data of the system and provide applications through the clipboard content. Many apps need to use clipboard permissions to scan user clipboard information. When a shopping app shares a link with a WeChat friend, the friend copies the baby’s link in WeChat, and then switches to the shopping app client from the background, and the app will pop up a page asking if you want to jump to the corresponding product page. The principle is simple: when the App is opened (or switched in), the clipboard is scanned, and when it is found that the last copied information is a product shopping link or a related password, it "smartly" guesses the product the user wants to buy information. Although the user experience will be good, when the A...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/62G06F21/64
CPCG06F21/602G06F21/6245G06F21/64
Inventor 游德贵方芳赵竹珺
Owner SAMSUNG ELECTRONICS CHINA R&D CENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products