CN111858094B - Data copying and pasting method and system and electronic equipment - Google Patents

Data copying and pasting method and system and electronic equipment Download PDF

Info

Publication number
CN111858094B
CN111858094B CN202010674484.3A CN202010674484A CN111858094B CN 111858094 B CN111858094 B CN 111858094B CN 202010674484 A CN202010674484 A CN 202010674484A CN 111858094 B CN111858094 B CN 111858094B
Authority
CN
China
Prior art keywords
data
copy
copied
copying
attribute information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010674484.3A
Other languages
Chinese (zh)
Other versions
CN111858094A (en
Inventor
丁敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Haitai Fangyuan High Technology Co Ltd
Original Assignee
Beijing Haitai Fangyuan High Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Haitai Fangyuan High Technology Co Ltd filed Critical Beijing Haitai Fangyuan High Technology Co Ltd
Priority to CN202010674484.3A priority Critical patent/CN111858094B/en
Publication of CN111858094A publication Critical patent/CN111858094A/en
Application granted granted Critical
Publication of CN111858094B publication Critical patent/CN111858094B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogram communication
    • G06F9/543User-generated data transfer, e.g. clipboards, dynamic data exchange [DDE], object linking and embedding [OLE]

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a data copying and pasting method, a system and electronic equipment, wherein the method comprises the steps of responding to a data copying instruction, and if the data to be copied has corresponding copying attribute information, encrypting the data to be copied based on the copying type corresponding to the copying attribute information, wherein the data to be copied is sent by a server; copying the attribute information and the encrypted data to be copied to a clipboard; and responding to the data pasting instruction, decrypting the encrypted data to be copied on the clipboard based on the copying type corresponding to the copying attribute information on the clipboard, and pasting the decrypted data to be copied. The embodiment of the invention encrypts the data to be copied according to the copy attribute information of the data to be copied during copying, thereby realizing the functions of limiting copying and protecting the data, and solving the problem that the data in a browser webpage can still be copied and pasted to cause information leakage even if a forbidden script is set in the prior art.

Description

Data copying and pasting method and system and electronic equipment
Technical Field
The invention relates to the technical field of information security, in particular to a data copying and pasting method, a data copying and pasting system and electronic equipment.
Background
When data in a browser webpage is copied, the data is copied to a clipboard of a system, when the data is pasted, the data is copied from the clipboard of the system, and for some data with copying limitation requirements, in the prior art, the data is generally limited by setting a forbidden script.
The script is an executable file written according to a certain format by using a specific descriptive language, and based on information security considerations, the existing browser adds a function of invalidating the received script, and at this time, even if the data in the browser webpage is configured with the disabled script, the data in the browser webpage can still be freely copied and pasted due to the disabled script invalidation.
Therefore, the prior art has the problem that even if the forbidden scripts are set, data in the browser webpage can still be copied and pasted, so that information leakage is caused.
Disclosure of Invention
The invention provides a data copying and pasting method, a data copying and pasting system and electronic equipment, which are used for encrypting data to be copied during copying so as to realize the functions of limiting copying and protecting the data.
According to a first aspect of embodiments of the present application, there is provided a data copy and paste method, including:
responding to a data replication instruction, and if the data to be replicated has corresponding replication attribute information, encrypting the data to be replicated based on the replication type corresponding to the replication attribute information, wherein the data to be replicated is sent by a server;
copying the copy attribute information and the encrypted data to be copied to a clipboard;
and responding to a data pasting instruction, decrypting the encrypted data to be copied on the clipboard based on the copy type corresponding to the copy attribute information on the clipboard, and pasting the decrypted data to be copied.
Optionally, encrypting the data to be copied based on the copy type corresponding to the copy attribute information includes:
if the copy type is in-webpage copy, generating a webpage encryption key through a preset first key and the address of the webpage to which the data to be copied belongs, and encrypting the data to be copied based on the webpage encryption key; or
If the copying type is in-domain copying, generating a domain name encryption key through a preset second key and a domain name of a webpage to which the data to be copied belongs, and encrypting the data to be copied based on the webpage encryption key; or
And if the copying type is in-browser copying, encrypting the data to be copied through a preset third key.
Optionally, decrypting the encrypted data to be copied on the clipboard based on the copy type corresponding to the copy attribute information on the clipboard includes:
if the copy type is in-webpage copy, generating a webpage decryption key according to the first key and the address of the current webpage, and decrypting the encrypted data to be copied on the clipboard through the webpage decryption key; or
If the copying type is in-domain copying, generating a domain name decryption key according to the second key and the domain name of the current webpage, and decrypting the encrypted data to be copied on the clipboard through the domain name decryption key; or
And if the copying type is in-browser copying, decrypting the encrypted data to be copied on the clipboard through the third key.
Optionally, the copying the copy attribute information and the encrypted data to be copied to a clipboard further includes:
copying a verification value obtained by performing hash processing on the verification parameter corresponding to the copy type to a shear plate; if the copy type is in-page copy, the verification parameter is the address of the page to which the data to be copied belongs; if the copying type is in-domain copying, the verification parameter is the domain name of the webpage to which the data to be copied belongs;
before decrypting the encrypted data to be copied on the clipboard based on the copy type corresponding to the copy attribute information on the clipboard, the method further includes:
performing hash processing on the paste parameter corresponding to the copy type to obtain a paste value, verifying the paste value based on the verification value, and if the paste value is the same as the verification value, successfully verifying; if the copy type is in-webpage copy, the paste parameter is the address of the current webpage; and if the copying type is in-domain copying, the pasting parameter is the domain name of the current webpage.
Optionally, if the verification is unsuccessful, the pasted data to be copied is displayed in a ciphertext form.
Optionally, before encrypting the data to be copied based on the copy type corresponding to the copy attribute information, the method further includes:
and receiving the copy attribute information sent by the server and/or the copy attribute information set by the user.
Optionally, the encrypting the data to be copied based on the copy type corresponding to the copy attribute information further includes:
and if the replication attribute information sent by the server and the replication attribute information set by the user exist at the same time, encrypting the data to be replicated by the replication type corresponding to the replication attribute information with high priority in the replication attribute information sent by the server and the replication attribute information set by the user.
According to a second aspect of the embodiments of the present application, there is provided a data copy and paste method, including:
receiving a data acquisition request of a client;
sending the data to be acquired and the corresponding copy attribute information to a client so that the client responds to a data copy instruction aiming at the data, encrypts the data to be copied based on the copy type corresponding to the copy attribute information, responds to a data paste instruction, decrypts the encrypted data to be copied based on the copy type corresponding to the copy attribute information on the clipboard, and then pastes the decrypted data.
According to a third aspect of embodiments of the present application, there is provided a data copy and paste apparatus, including:
the system comprises an encryption module, a data replication module and a data replication module, wherein the encryption module is configured to execute a response data replication instruction, and if the data to be replicated has corresponding replication attribute information, the data to be replicated is encrypted based on a replication type corresponding to the replication attribute information, and the data to be replicated is sent by a server;
the copying module is configured to copy the copying attribute information and the encrypted data to be copied to a clipboard;
and the pasting module is configured to execute a response data pasting instruction, decrypt the encrypted data to be copied on the clipboard based on the copy type corresponding to the copy attribute information on the clipboard, and paste the decrypted data to be copied.
Optionally, the encrypting module is configured to encrypt the data to be copied based on a copy type corresponding to the copy attribute information, and includes:
if the copy type is in-webpage copy, generating a webpage encryption key through a preset first key and the address of the webpage to which the data to be copied belongs, and encrypting the data to be copied based on the webpage encryption key; or
If the copying type is in-domain copying, generating a domain name encryption key through a preset second key and a domain name of a webpage to which the data to be copied belongs, and encrypting the data to be copied based on the webpage encryption key; or
And if the copying type is in-browser copying, encrypting the data to be copied through a preset third key.
Optionally, the system further comprises a decryption module configured to:
if the copy type is in-webpage copy, generating a webpage decryption key according to the first key and the address of the current webpage, and decrypting the encrypted data to be copied on the clipboard through the webpage decryption key; or
If the copying type is in-domain copying, generating a domain name decryption key according to the second key and the domain name of the current webpage, and decrypting the encrypted data to be copied on the clipboard through the domain name decryption key; or
And if the copying type is in-browser copying, decrypting the encrypted data to be copied on the clipboard through the third key.
Optionally, a verification module is further included, the verification module configured to:
the copying the attribute information and the encrypted data to be copied to the clipboard further comprises:
copying a verification value obtained by performing hash processing on the verification parameter corresponding to the copy type to a shear plate; if the copy type is in-page copy, the verification parameter is the address of the page to which the data to be copied belongs; if the copying type is in-domain copying, the verification parameter is the domain name of the webpage to which the data to be copied belongs;
before decrypting the encrypted data to be copied on the clipboard based on the copy type corresponding to the copy attribute information on the clipboard, the method further includes:
performing hash processing on the paste parameter corresponding to the copy type to obtain a paste value, verifying the paste value based on the verification value, and if the paste value is the same as the verification value, successfully verifying; if the copy type is in-webpage copy, the paste parameter is the address of the current webpage; and if the copying type is in-domain copying, the pasting parameter is the domain name of the current webpage.
Optionally, if the verification is unsuccessful, the pasted data to be copied is displayed in a ciphertext form.
Optionally, before encrypting the data to be copied based on the copy type corresponding to the copy attribute information, the method further includes:
and receiving the copy attribute information sent by the server and/or the copy attribute information set by the user.
Optionally, the encrypting the data to be copied based on the copy type corresponding to the copy attribute information further includes:
and if the replication attribute information sent by the server and the replication attribute information set by the user exist at the same time, encrypting the data to be replicated by the replication type corresponding to the replication attribute information with high priority in the replication attribute information sent by the server and the replication attribute information set by the user.
According to a fourth aspect of the embodiments of the present application, there is provided a data copy and paste apparatus, the apparatus including:
the receiving module is configured to execute receiving of a data acquisition request of a client;
the sending module is configured to execute sending of data to be acquired and corresponding copy attribute information to a client, so that the client responds to a data copy instruction for the data, encrypts the data to be copied based on a copy type corresponding to the copy attribute information, responds to a data paste instruction, decrypts the encrypted data to be copied based on the copy type corresponding to the copy attribute information on the clipboard, and then pastes the decrypted data.
According to a fifth aspect of embodiments of the present disclosure, there is provided an electronic apparatus including: a memory for storing executable instructions;
a processor, configured to read and execute executable instructions stored in the memory to implement the data copy and paste method according to any one of the first aspect of the embodiments of the present disclosure;
according to a sixth aspect of embodiments of the present disclosure, there is provided a server including: a memory for storing executable instructions;
a processor configured to read and execute the executable instructions stored in the memory to implement the data copy and paste method according to any one of the second aspect of the embodiments of the disclosure.
According to a seventh aspect of the embodiments of the present application, there is provided a chip, the chip is coupled with a memory in a user equipment, so that the chip invokes program instructions stored in the memory when running, thereby implementing the above aspects of the embodiments of the present application and any method that may be involved in the aspects.
According to an eighth aspect of the embodiments of the present application, there is provided a computer-readable storage medium storing program instructions, which, when executed on a computer, cause the computer to perform the above aspects of the embodiments of the present application and any of the methods that the aspects relate to.
According to a ninth aspect of embodiments of the present application, there is provided a computer program product, which, when run on an electronic device, causes the electronic device to perform a method of implementing the various aspects of embodiments of the present application and any possible ones of the various aspects.
In addition, for technical effects brought by any one implementation manner of the second aspect to the ninth aspect, reference may be made to technical effects brought by different implementation manners of the first aspect, and details are not described here.
The data copying and pasting method, the data copying and pasting system and the electronic equipment have the following beneficial effects that:
according to the data copying and pasting method, the data copying and pasting system and the electronic equipment, the function of limiting copying and pasting is achieved through the mode of encrypting the data to be copied, the encryption process is based on the copying attribute information of the data to be copied, therefore, decryption needs to be carried out according to the copying attribute information of the data to be copied when the data to be copied are pasted, the data to be copied on the clipboard can be well protected, and the problem that information leakage is caused because the data in a browser webpage can still be copied and pasted even though a forbidden script is set in the prior art is solved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive exercise.
Fig. 1 is a schematic diagram of a system architecture for data copy and paste according to an embodiment of the present invention;
fig. 2 is a schematic diagram of a data copy and paste method according to an embodiment of the present invention;
fig. 3 is a schematic diagram of a data copy and paste method according to an embodiment of the present invention;
fig. 4 is a schematic diagram of a data copy and paste method according to an embodiment of the present invention;
fig. 5 is a schematic diagram of a data copying and pasting apparatus according to an embodiment of the present invention;
fig. 6 is a schematic diagram of a data copying and pasting apparatus according to an embodiment of the present invention;
fig. 7 is a schematic structural diagram of an electronic device for data copy and paste according to an embodiment of the present invention;
fig. 8 is a schematic structural diagram of a server according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention clearer, the present invention will be described in further detail with reference to the accompanying drawings, and it is apparent that the described embodiments are only a part of the embodiments of the present invention, not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The term "and/or" in the embodiments of the present invention describes an association relationship of associated objects, and indicates that three relationships may exist, for example, a and/or B may indicate: a exists alone, A and B exist simultaneously, and B exists alone. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship.
Some of the words that appear in the text are explained below:
1. the term "server" in the embodiments of the present disclosure refers to a device that provides computing services. Since the server needs to respond to and process the service request, the server generally has the capability of assuming and securing the service.
2. The term "client" in the embodiments of the present disclosure refers to a program that provides a local service for a client, corresponding to a server. Except for some applications which only run locally, the application is generally installed on a common client and needs to be operated together with a server. For this kind of application, a corresponding server and a corresponding service program are required in the network to provide corresponding services, such as database services, email services, etc., so that a specific communication connection needs to be established between the client and the server to ensure the normal operation of the application program.
The application scenario described in the embodiment of the present invention is for more clearly illustrating the technical solution of the embodiment of the present invention, and does not form a limitation on the technical solution provided in the embodiment of the present invention, and it can be known by a person skilled in the art that with the occurrence of a new application scenario, the technical solution provided in the embodiment of the present invention is also applicable to similar technical problems. In the description of the present invention, the term "plurality" means two or more unless otherwise specified.
In the prior art, a function of invalidating the received script is added to the browser based on the information security, and even if the disabled script is configured on the data in the browser webpage, the data in the browser webpage can still be freely copied and pasted due to the disabled script invalidation. The prior art has the problem that even if a forbidden script is set, data in a browser webpage can still be copied and pasted, so that information leakage is caused.
Moreover, for some data, a user or a backend server may want to be able to copy and paste in the web page, or between different web pages in the same domain name in a browser, or between different applications, and the prior art cannot meet the above personalization requirement.
Based on this, the embodiment of the present application proposes a data copy and paste system, and fig. 1 is a schematic diagram of a framework of a data copy and paste system according to an exemplary embodiment, as shown in fig. 1, including a client 101 and a server 102.
The client 101 is configured to respond to a data replication instruction, and encrypt the data to be replicated based on a replication type corresponding to replication attribute information if the data to be replicated has the corresponding replication attribute information, where the data to be replicated is sent by a server; copying the attribute information and the encrypted data to be copied to a clipboard; and responding to the data pasting instruction, decrypting the encrypted data to be copied on the clipboard based on the copying type corresponding to the copying attribute information on the clipboard, and pasting the decrypted data to be copied.
A server 102, configured to receive a data acquisition request from a client; and sending the data to be acquired and the corresponding copy attribute information to the client so that the client responds to a data copy instruction aiming at the data, encrypts the data to be copied based on the copy type corresponding to the copy attribute information, responds to a data paste instruction, decrypts the encrypted data to be copied based on the copy type corresponding to the copy attribute information on the shear plate, and then pastes the decrypted data.
In this embodiment of the present application, there is a corresponding relationship between the copy attribute information and the copy type, where the corresponding relationship may be, but is not limited to, a corresponding relationship that is established for the server 102 and sent to the client 101, and may also be a corresponding relationship that is established for the client 101 and sent to the server 102, where in this embodiment of the present application, the copy attribute information defines a copy and paste condition of the data to be copied, and the copy attribute information may be, but is not limited to, represented by the identification information, and specifically, the copy type corresponding to the copy attribute information includes the following:
1) in-web copy
The copy type is copy in web page, which means that the data to be copied is only allowed to be pasted in the web page to which the data to be copied belongs after being copied to the clipboard, the copy attribute information may be a corresponding serial number, for example, ID1 may indicate that the copy type of the data to be copied is copy in web page, it should be noted that, under the condition that the copy type is copy in web page, the embodiment of the present application enables the data to be copied to be normally displayed only in the same web page when being pasted through an encryption manner, and a specific implementation manner will be given in the following description.
2) In-domain replication
The copying type is in-domain copying, which means that the data to be copied is only allowed to be pasted in the web page of the domain name to which the data to be copied belongs after being copied to the clipboard, and similarly, the copying attribute information may be a corresponding serial number, for example, ID2 may indicate that the copying type of the data to be copied is in-domain copying, it should be noted that, under the condition that the copying type is in-domain copying, the data to be copied is enabled to be normally displayed only in the web page of the same domain name when being pasted in the embodiment of the present application by means of encryption, and a specific implementation manner will be given in the following description.
3) In-browser replication
The copy type is copy in the browser, which means that the data to be copied is only allowed to be pasted in the web page of the browser to which the data to be copied belongs after being copied to the clipboard, and similarly, the copy attribute information may be a corresponding serial number, for example, ID3 may indicate that the copy type of the data to be copied is copy in the browser, it should be noted that, under the condition that the copy type is copy in the browser, the embodiment of the present application enables the data to be copied to be normally displayed only in the web page of the same browser when being pasted in an encrypted manner, and specific embodiments will be given in the following description.
In this embodiment of the present application, in-application copy may also be set, where in-application copy indicates that after being copied to a clipboard, data to be copied is only allowed to be pasted in an application to which the data to be copied belongs, and as an optional implementation manner, in this embodiment of the present application, data to be copied may also be set to be copied in different applications of the same type, or copied in a plurality of preset applications, specifically, a person skilled in the art may set the data according to actual needs, and no limitation is made herein.
The copy attribute information in the embodiment of the present application may also be set to general copy, that is, the copy mode is not limited, and the data to be copied is not encrypted when copying.
In order to realize the personalized requirements of the user or the server 102, the copy attribute information corresponding to the data to be copied may be the copy attribute information carried by the server 102 when sending the data to be copied, may also be the copy attribute information set by the user, and may also include the copy attribute information carried by the server 102 when sending the data to be copied and the copy attribute information set by the user;
if the copy attribute information sent by the server 102 and the copy attribute information set by the user are received at the same time, then to realize the personalized requirements of the user or the server 102, a corresponding priority may be set for the copy attribute information, the setting of the priority indicates that if the data to be copied has more than two copy attribute information at the same time, the data to be copied is copied and pasted according to the copy attribute information with higher priority, and a specific priority corresponding relationship may be set by a person skilled in the art according to the actual requirements, as an optional implementation manner, the priority of the copy attribute information corresponding to the copy type of copying in-web page copying may be set to be greater than the priority of the copy attribute information corresponding to the copy type of copying in-web page copying, and the priority of the copy attribute information corresponding to the copy type of copying in-domain copying is greater than the priority of the copy attribute information corresponding to the copy type of copying in-web page copying in, i.e. priority ID1> priority ID2> priority ID 3;
correspondingly, if the copy attribute information sent by the server 102 and the copy attribute information set by the user are received, and the copy type corresponding to the copy attribute information with high priority in the copy attribute information sent by the server 102 and the copy attribute information set by the user is encrypted, it should be noted that the server 102 carries the copy attribute information when sending the data to be copied to the client 101, and the copy attribute information set by the user is in the process of responding to the copy instruction, when the user sets the copy attribute information in the embodiment of the present application, the priority of the copy attribute information sent by the server 102 and the copy attribute information set by the user is judged, and if the priority of the copy attribute information sent by the server 102 is greater than the priority of the copy attribute information set by the user, the data to be copied is encrypted by the copy type corresponding to the copy attribute information sent by the server 102, otherwise, the data to be copied is encrypted according to the copy type corresponding to the copy attribute information set by the user.
In the embodiment of the present application, different encryption manners are set for different copy types, which specifically include the following:
1) if the copy type is in-webpage copy, generating a webpage encryption key through a preset first key and the address of a webpage to which the data to be copied belongs, and encrypting the data to be copied based on the webpage encryption key;
in the embodiment of the application, the preset first key is a key generated when the browser is started, specifically, the preset first key may be randomly generated data, or may also be data generated by a key generation algorithm, which is not limited herein;
if the data to be copied in the webpage is D1The preset first secret key is K1Then pass K1And web page address A1Generating a web page encryption key K1A1Then encrypt the key K through the webpage1A1Data D to be copied1Encrypting to obtain encrypted data K to be copied1A1D1
2) If the copying type is in-domain copying, generating a domain name encryption key through a preset second key and a domain name of a webpage to which the data to be copied belongs, and encrypting the data to be copied based on the webpage encryption key;
in the embodiment of the application, the preset second key is a key generated when the browser is started, specifically, the preset second key may be randomly generated data, or may also be data generated by using a key generation algorithm, which is not limited herein;
if the data to be copied in the webpage is D2The preset second secret key is K2Then pass K2And domain name address A2Generating a domain name encryption key K2A2Then encrypt the secret key K through the domain name2A2Data D to be copied2Encrypting to obtain encrypted data K to be copied2A2D2
3) If the copying type is copying in the browser, encrypting the data to be copied by a preset third key;
in this embodiment of the application, the preset third key is a key generated when the browser is started, and may specifically be randomly generated data, or data generated by using a key generation algorithm, which is not limited herein.
If the data to be copied in the webpage is D3The preset third secret key is K3Then pass K3Data D to be copied2Encrypting to obtain encrypted data K to be copied3D3
The preset first key, the preset second key and the preset third key may be the same key, or may be different keys set for different copy types, and in order to better ensure the security of the data to be copied, the preset key may be generated again but not limited to once when the browser is started every time, or the preset key may be generated again when the browser is started after a preset interval time.
In the embodiment of the present application, corresponding decryption modes may be set for different encryption modes, which specifically includes the following modes:
1) if the copy type is in-webpage copy, generating a webpage decryption key according to the first key and the address of the current webpage, and decrypting the encrypted data to be copied on the clipboard through the webpage decryption key;
when data is pasted, a generation mode of a decryption key is determined according to a copy type, for example, if the copy type is determined to be in-web copy through copy attribute information on a clipboard, a webpage decryption key is generated through the mode, and the encrypted data to be copied on the clipboard is decrypted through the generated webpage decryption key.
2) If the copying type is the in-domain copying, generating a domain name decryption key according to the second key and the domain name of the current webpage, and decrypting the encrypted data to be copied on the clipboard through the domain name decryption key;
when data is pasted, a generation mode of a decryption key is determined according to a copy type, for example, if the copy type is determined to be in-domain copy through the copy attribute information on the clipboard, a domain name decryption key is generated through the mode, and the encrypted data to be copied on the clipboard is decrypted through the generated domain name decryption key.
3) And if the copying type is in-browser copying, decrypting the encrypted data to be copied on the clipboard by using a third key.
When data is pasted, a generation mode of a decryption key is determined according to a copy type, for example, if the copy type is determined to be in-browser copy through the copy attribute information on the clipboard, the encrypted data to be copied on the clipboard is decrypted directly through a preset third key.
The above process can implement the function of restricting copy and paste, and can implement personalized copy and paste, but the user determines whether the copy and paste is successful by determining whether the data to be copied and pasted is a ciphertext, and the embodiment of the present application further provides a verification method, so that the client 101 can determine whether the copy and paste is successful, and the specific implementation manner is as follows:
copying a verification value obtained by performing hash processing on the verification parameter corresponding to the copy type to a shear plate; if the copy type is in-page copy, the verification parameter is the address of the page to which the data to be copied belongs; if the copying type is in-domain copying, verifying the parameters as the domain name of the webpage to which the data to be copied belongs;
for example, if the copy type is in-page copy, the verification parameter is address A of the page to which the data to be copied belongs1At this time, A is1Obtaining a webpage verification value HA after Hash processing1If the copying type is copying in the domain name, the verification parameter is the domain name A of the webpage to which the data to be copied belongs2At this time, A is2Obtaining a domain name verification value HA after Hash processing2
Based on the copy type corresponding to the copy attribute information on the clipboard, before decrypting the encrypted data to be copied on the clipboard, the method further includes:
performing hash processing on the paste parameter corresponding to the copy type to obtain a paste value, verifying the paste value based on the verification value, and if the paste value is the same as the verification value, successfully verifying; if the copying type is in-webpage copying, the pasting parameter is the address of the current webpage; and if the copying type is in-domain copying, the pasting parameter is the domain name of the current webpage.
The verification success indicates that the current copying and pasting condition meets the requirement of the copying type on the clipboard, decryption can be performed through the decryption mode, and if the verification is unsuccessful, the current copying and pasting condition does not meet the requirement of the copying type on the clipboard.
For example, if the copy attribute information of the data to be copied on the clipboard is determined to be D3Then directly passing through the preset third secret key K3And decrypting the encrypted data to be copied on the shear plate, and pasting the decrypted data to be copied.
If the copy attribute information of the data to be copied on the clipboard is determined to be D2Then the domain name A of the current webpage is used2Obtaining HA after Hash processing2', determine HA2' with HA2Whether the two are equal or not is judged, if so, the two are copied to the same domain name, and at the moment, a preset second secret key K is passed2And the domain name A of the current webpage2' Generation of Domain name decryption Key K2A2', by K2A2And decrypting the encrypted data to be copied on the clipboard and pasting the decrypted data to be copied.
If the copy attribute information of the data to be copied on the clipboard is determined to be D1Then address A of the current web page is used1Obtaining HA after Hash processing1', determine HA1' with HA1Whether the two are equal or not is judged, if so, the two are copied to the same webpage address, and at the moment, the preset first secret key K is passed1And the domain name A of the current webpage1' Generation of Web Page decryption Key K1A1', by K1A1And decrypting the encrypted data to be copied on the clipboard and pasting the decrypted data to be copied.
As shown in fig. 2, an embodiment of the present invention further provides a data copy and paste method, which is applied to a client, and includes:
step S201, responding to a data copying instruction, and if the data to be copied has corresponding copying attribute information, encrypting the data to be copied based on a copying type corresponding to the copying attribute information, wherein the data to be copied is sent by a server;
step S202, copying the attribute information and the encrypted data to be copied to a clipboard;
step S203, responding to the data pasting instruction, decrypting the encrypted data to be copied on the clipboard based on the copy type corresponding to the copy attribute information on the clipboard, and pasting the decrypted data to be copied.
Optionally, encrypting the data to be copied based on the copy type corresponding to the copy attribute information includes:
if the copy type is in-webpage copy, generating a webpage encryption key through a preset first key and the address of the webpage to which the data to be copied belongs, and encrypting the data to be copied based on the webpage encryption key; or
If the copying type is in-domain copying, generating a domain name encryption key through a preset second key and a domain name of a webpage to which the data to be copied belongs, and encrypting the data to be copied based on the webpage encryption key; or
And if the copying type is in-browser copying, encrypting the data to be copied through a preset third key.
Optionally, decrypting the encrypted data to be copied on the clipboard based on the copy type corresponding to the copy attribute information on the clipboard includes:
if the copy type is in-webpage copy, generating a webpage decryption key according to the first key and the address of the current webpage, and decrypting the encrypted data to be copied on the clipboard through the webpage decryption key; or
If the copying type is in-domain copying, generating a domain name decryption key according to the second key and the domain name of the current webpage, and decrypting the encrypted data to be copied on the clipboard through the domain name decryption key; or
And if the copying type is in-browser copying, decrypting the encrypted data to be copied on the clipboard through the third key.
Optionally, the copying the copy attribute information and the encrypted data to be copied to a clipboard further includes:
copying a verification value obtained by performing hash processing on the verification parameter corresponding to the copy type to a shear plate; if the copy type is in-page copy, the verification parameter is the address of the page to which the data to be copied belongs; if the copying type is in-domain copying, the verification parameter is the domain name of the webpage to which the data to be copied belongs;
before decrypting the encrypted data to be copied on the clipboard based on the copy type corresponding to the copy attribute information on the clipboard, the method further includes:
performing hash processing on the paste parameter corresponding to the copy type to obtain a paste value, verifying the paste value based on the verification value, and if the paste value is the same as the verification value, successfully verifying; if the copy type is in-webpage copy, the paste parameter is the address of the current webpage; and if the copying type is in-domain copying, the pasting parameter is the domain name of the current webpage.
Optionally, if the verification is unsuccessful, the pasted data to be copied is displayed in a ciphertext form.
Optionally, before encrypting the data to be copied based on the copy type corresponding to the copy attribute information, the method further includes:
and receiving the copy attribute information sent by the server and/or the copy attribute information set by the user.
Optionally, the encrypting the data to be copied based on the copy type corresponding to the copy attribute information further includes:
and if the replication attribute information sent by the server and the replication attribute information set by the user exist at the same time, encrypting the data to be replicated by the replication type corresponding to the replication attribute information with high priority in the replication attribute information sent by the server and the replication attribute information set by the user.
Based on the same inventive concept, the embodiment of the present invention further provides a data copy and paste method, which is applied to a server, as shown in fig. 3, because the method corresponds to the method corresponding to the client for data copy and paste in the embodiment of the present invention, and the principle of the method for solving the problem is similar to that of the client, the implementation of the method can refer to the implementation of the client, and repeated details are not repeated.
Step S301, receiving a data acquisition request of a client;
step S302, sending the data to be acquired and the corresponding copy attribute information to the client, so that the client responds to a data copy instruction for the data, encrypts the data to be copied based on the copy type corresponding to the copy attribute information, responds to a data paste instruction, decrypts the encrypted data to be copied based on the copy type corresponding to the copy attribute information on the clipboard, and pastes the decrypted data.
In the above description, the data copy and paste method is described from the client and the server, and then an example of the implementation of the data copy and paste method in cooperation with the client and the server is given to better understand the implementation of the scheme provided in the embodiment of the present invention. Such an explanation does not mean that the two must be implemented in cooperation or separately, and actually, when the client and the server are implemented separately, the problems on the client side and the server side are solved separately, and when the two are used in combination, a better technical effect is obtained.
As shown in fig. 4, a flowchart of a method for performing data copy and paste by cooperation between a server and a client in the embodiment of the present invention specifically includes:
step S401, a server receives a data acquisition request of a client;
step S402, the server sends the data to be acquired and the corresponding copy attribute information to the client;
step S403, the client responds to the data copying instruction, and if the data to be copied has the corresponding copying attribute information, the data to be copied is encrypted based on the copying type corresponding to the copying attribute information;
step S404, copying the attribute information and the encrypted data to be copied to a clipboard by the client;
step S405, the client responds to the data pasting instruction, decrypts the encrypted data to be copied on the clipboard based on the copy type corresponding to the copy attribute information on the clipboard, and pastes the decrypted data to be copied.
In the above description, a data copy and paste method according to the present invention is described, and an apparatus for executing the data copy and paste is described below.
Please refer to fig. 5, which illustrates a data copy and paste apparatus according to an embodiment of the present invention, including:
an encryption module 501 configured to execute a response data copying instruction, and if the data to be copied has corresponding copy attribute information, encrypt the data to be copied based on a copy type corresponding to the copy attribute information, where the data to be copied is sent by a server;
a copy module 502 configured to copy the copy attribute information and the encrypted data to be copied onto a clipboard;
the pasting module 503 is configured to execute a response data pasting instruction, decrypt the encrypted data to be copied on the clipboard based on the copy type corresponding to the copy attribute information on the clipboard, and paste the decrypted data to be copied.
Optionally, the encrypting module 501 is configured to encrypt the data to be copied based on the copy type corresponding to the copy attribute information, and includes:
if the copy type is in-webpage copy, generating a webpage encryption key through a preset first key and the address of the webpage to which the data to be copied belongs, and encrypting the data to be copied based on the webpage encryption key; or
If the copying type is in-domain copying, generating a domain name encryption key through a preset second key and a domain name of a webpage to which the data to be copied belongs, and encrypting the data to be copied based on the webpage encryption key; or
And if the copying type is in-browser copying, encrypting the data to be copied through a preset third key.
Optionally, a decryption module 504 is further included, the decryption module configured to:
if the copy type is in-webpage copy, generating a webpage decryption key according to the first key and the address of the current webpage, and decrypting the encrypted data to be copied on the clipboard through the webpage decryption key; or
If the copying type is in-domain copying, generating a domain name decryption key according to the second key and the domain name of the current webpage, and decrypting the encrypted data to be copied on the clipboard through the domain name decryption key; or
And if the copying type is in-browser copying, decrypting the encrypted data to be copied on the clipboard through the third key.
Optionally, a verification module 505 is further included, the verification module 505 configured to:
the copying the attribute information and the encrypted data to be copied to the clipboard further comprises:
copying a verification value obtained by performing hash processing on the verification parameter corresponding to the copy type to a shear plate; if the copy type is in-page copy, the verification parameter is the address of the page to which the data to be copied belongs; if the copying type is in-domain copying, the verification parameter is the domain name of the webpage to which the data to be copied belongs;
before decrypting the encrypted data to be copied on the clipboard based on the copy type corresponding to the copy attribute information on the clipboard, the method further includes:
performing hash processing on the paste parameter corresponding to the copy type to obtain a paste value, verifying the paste value based on the verification value, and if the paste value is the same as the verification value, successfully verifying; if the copy type is in-webpage copy, the paste parameter is the address of the current webpage; and if the copying type is in-domain copying, the pasting parameter is the domain name of the current webpage.
Optionally, if the verification is unsuccessful, the pasted data to be copied is displayed in a ciphertext form.
Optionally, before encrypting the data to be copied based on the copy type corresponding to the copy attribute information, the method further includes:
and receiving the copy attribute information sent by the server and/or the copy attribute information set by the user.
Optionally, the encrypting the data to be copied based on the copy type corresponding to the copy attribute information further includes:
and if the copy attribute information sent by the server and the copy attribute information set by the user are received, encrypting the data to be copied by the copy type corresponding to the copy attribute information with high priority in the copy attribute information sent by the server and the copy attribute information set by the user.
Please refer to fig. 6, which illustrates a data copy and paste apparatus according to an embodiment of the present invention, including:
a receiving module 601 configured to receive a data acquisition request of a client;
the sending module 602 is configured to send the data to be acquired and the corresponding copy attribute information to the client, so that the client responds to a data copy instruction for the data, encrypts the data to be copied based on the copy type corresponding to the copy attribute information, responds to a data paste instruction, decrypts the encrypted data to be copied based on the copy type corresponding to the copy attribute information on the clipboard, and then pastes the decrypted data.
The above describes a data copy and paste apparatus in the present embodiment from the perspective of a modular functional entity, and the following describes an electronic device for data copy and paste in the present embodiment from the perspective of hardware processing.
Referring to fig. 7, in an embodiment of the present application, an electronic device for data copy and paste includes:
a processor 701 and a memory 702, and a bus system 709;
wherein the memory stores program code that, when executed by the processor, causes the processor to perform the following:
responding to a data replication instruction, and if the data to be replicated has corresponding replication attribute information, encrypting the data to be replicated based on the replication type corresponding to the replication attribute information, wherein the data to be replicated is sent by a server;
copying the copy attribute information and the encrypted data to be copied to a clipboard;
and responding to a data pasting instruction, decrypting the encrypted data to be copied on the clipboard based on the copy type corresponding to the copy attribute information on the clipboard, and pasting the decrypted data to be copied.
Fig. 7 is a schematic diagram of an electronic device for data copy and paste according to an embodiment of the present disclosure, where the device 700 may have a relatively large difference due to different configurations or performances, and may include one or more processors (CPU) 701 (e.g., one or more processors), a memory 702, and one or more storage media 703 (e.g., one or more mass storage devices) for storing applications 704 or data 705. Memory 702 and storage medium 703 may be, among other things, transient storage or persistent storage. The program stored in the storage medium 703 may include one or more modules (not shown), and each module may include a series of instructions operating on the information processing apparatus. Further, the processor 701 may be configured to communicate with the storage medium 703 to execute a series of instruction operations in the storage medium 703 on the device 700.
The device 700 may also include one or more wired or wireless network interfaces 707, one or more input-output interfaces 708, and/or one or more operating systems 706, such as Windows Server, Mac OS X, Unix, Linux, FreeBSD, etc.
Optionally, the processor 701 is configured to encrypt the data to be copied based on a copy type corresponding to the copy attribute information, and includes:
if the copy type is in-webpage copy, generating a webpage encryption key through a preset first key and the address of the webpage to which the data to be copied belongs, and encrypting the data to be copied based on the webpage encryption key; or
If the copying type is in-domain copying, generating a domain name encryption key through a preset second key and a domain name of a webpage to which the data to be copied belongs, and encrypting the data to be copied based on the webpage encryption key; or
And if the copying type is in-browser copying, encrypting the data to be copied through a preset third key.
Optionally, the processor 701 is configured to decrypt the encrypted data to be copied on the clipboard based on the copy type corresponding to the copy attribute information on the clipboard, including:
if the copy type is in-webpage copy, generating a webpage decryption key according to the first key and the address of the current webpage, and decrypting the encrypted data to be copied on the clipboard through the webpage decryption key; or
If the copying type is in-domain copying, generating a domain name decryption key according to the second key and the domain name of the current webpage, and decrypting the encrypted data to be copied on the clipboard through the domain name decryption key; or
And if the copying type is in-browser copying, decrypting the encrypted data to be copied on the clipboard through the third key.
Optionally, the processor 701 is configured to copy the copy attribute information and the encrypted data to be copied to a clipboard, and further includes:
copying a verification value obtained by performing hash processing on the verification parameter corresponding to the copy type to a shear plate; if the copy type is in-page copy, the verification parameter is the address of the page to which the data to be copied belongs; if the copying type is in-domain copying, the verification parameter is the domain name of the webpage to which the data to be copied belongs;
before decrypting the encrypted data to be copied on the clipboard based on the copy type corresponding to the copy attribute information on the clipboard, the method further includes:
performing hash processing on the paste parameter corresponding to the copy type to obtain a paste value, verifying the paste value based on the verification value, and if the paste value is the same as the verification value, successfully verifying; if the copy type is in-webpage copy, the paste parameter is the address of the current webpage; and if the copying type is in-domain copying, the pasting parameter is the domain name of the current webpage.
Optionally, if the verification is unsuccessful, the pasted data to be copied is displayed in a ciphertext form.
Optionally, before encrypting the data to be copied based on the copy type corresponding to the copy attribute information, the processor 701 is configured to further include:
and receiving the copy attribute information sent by the server and/or the copy attribute information set by the user.
Optionally, the processor 701 is configured to encrypt the data to be copied based on a copy type corresponding to the copy attribute information, and further includes:
and if the copy attribute information sent by the server and the copy attribute information set by the user are received, encrypting the data to be copied by the copy type corresponding to the copy attribute information with high priority in the copy attribute information sent by the server and the copy attribute information set by the user.
Referring to fig. 8, in an embodiment of the present application, a server includes:
a processor 801 and memory 802, and a bus system 809;
wherein the memory stores program code that, when executed by the processor, causes the processor to perform the following:
receiving a data acquisition request of a client;
sending the data to be acquired and the corresponding copy attribute information to a client so that the client responds to a data copy instruction aiming at the data, encrypts the data to be copied based on the copy type corresponding to the copy attribute information, responds to a data paste instruction, decrypts the encrypted data to be copied based on the copy type corresponding to the copy attribute information on the clipboard, and then pastes the decrypted data.
Fig. 8 is a schematic diagram of a server 800 according to an embodiment of the present disclosure, where the server 800 may have a relatively large difference due to different configurations or performances, and may include one or more processors (CPU) 801 (e.g., one or more processors) and a memory 802, and one or more storage media 803 (e.g., one or more mass storage devices) for storing applications 804 or data 805. Memory 802 and storage medium 803 may be, among other things, transient storage or persistent storage. The program stored in the storage medium 803 may include one or more modules (not shown), and each module may include a series of instruction operations for the information processing apparatus. Still further, the processor 801 may be configured to communicate with the storage medium 803 to execute a series of instruction operations in the storage medium 803 on the server 800.
The Server 800 may also include one or more wired or wireless network interfaces 807, one or more input-output interfaces 808, and/or one or more operating systems 806, such as Windows Server, Mac OS X, Unix, Linux, FreeBSD, etc.
The embodiment of the present invention further provides a computer-readable storage medium, which includes instructions, and when the computer-readable storage medium runs on a computer, the computer is caused to execute the method for copying and pasting data provided by the above embodiment.
The embodiment of the present application further provides a computer program product, which includes a computer program, where the computer program includes program instructions, and when the program instructions are executed by an electronic device, the electronic device is caused to execute the method for copying and pasting data provided in the foregoing embodiment.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described apparatuses and modules may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the modules is merely a logical division, and in actual implementation, there may be other divisions, for example, multiple modules or components may be combined or integrated into another system, or some features may be omitted, or not implemented. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or modules, and may be in an electrical, mechanical or other form.
The modules described as separate parts may or may not be physically separate, and parts displayed as modules may or may not be physical modules, may be located in one place, or may be distributed on a plurality of network modules. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment.
In addition, functional modules in the embodiments of the present application may be integrated into one processing module, or each of the modules may exist alone physically, or two or more modules are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The integrated module, if implemented in the form of a software functional module and sold or used as a stand-alone product, may be stored in a computer readable storage medium.
In the above embodiments, the implementation may be wholly or partially realized by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product.
The computer program product includes one or more computer instructions. When loaded and executed on a computer, cause the processes or functions described in accordance with the embodiments of the application to occur, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored in a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, from one website site, computer, server, or data center to another website site, computer, server, or data center via wired (e.g., coaxial cable, fiber optic, Digital Subscriber Line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that a computer can store or a data storage device, such as a server, a data center, etc., that is integrated with one or more available media. The usable medium may be a magnetic medium (e.g., floppy disk, hard disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., Solid State Disk (SSD)), among others.
The technical solutions provided by the present application are introduced in detail, and the present application applies specific examples to explain the principles and embodiments of the present application, and the descriptions of the above examples are only used to help understand the method and the core ideas of the present application; meanwhile, for a person skilled in the art, according to the idea of the present application, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present application.

Claims (16)

1. A data copying and pasting method is applied to a client and is characterized by comprising the following steps:
responding to a data replication instruction, and if the data to be replicated has corresponding replication attribute information, encrypting the data to be replicated based on the replication type corresponding to the replication attribute information, wherein the data to be replicated is sent by a server;
copying the copy attribute information and the encrypted data to be copied to a clipboard;
responding to a data pasting instruction, decrypting the encrypted data to be copied on the shear plate based on the copying type corresponding to the copying attribute information on the shear plate, and pasting the decrypted data to be copied;
encrypting the data to be copied based on the copy type corresponding to the copy attribute information, wherein the encrypting comprises:
if the copy type is in-webpage copy, generating a webpage encryption key through a preset first key and the address of the webpage to which the data to be copied belongs, and encrypting the data to be copied based on the webpage encryption key; or
If the copying type is in-domain copying, generating a domain name encryption key through a preset second key and a domain name of a webpage to which the data to be copied belongs, and encrypting the data to be copied based on the webpage encryption key; or
And if the copying type is in-browser copying, encrypting the data to be copied through a preset third key.
2. The method according to claim 1, wherein decrypting the encrypted data to be copied on the clipboard based on the copy type corresponding to the copy attribute information on the clipboard comprises:
if the copy type is in-webpage copy, generating a webpage decryption key according to the first key and the address of the current webpage, and decrypting the encrypted data to be copied on the clipboard through the webpage decryption key; or
If the copying type is in-domain copying, generating a domain name decryption key according to the second key and the domain name of the current webpage, and decrypting the encrypted data to be copied on the clipboard through the domain name decryption key; or
And if the copying type is in-browser copying, decrypting the encrypted data to be copied on the clipboard through the third key.
3. The method according to claim 2, wherein the copying the copy attribute information and the encrypted data to be copied to a clipboard further comprises:
copying a verification value obtained by performing hash processing on the verification parameter corresponding to the copy type to a shear plate; if the copy type is in-page copy, the verification parameter is the address of the page to which the data to be copied belongs; if the copying type is in-domain copying, the verification parameter is the domain name of the webpage to which the data to be copied belongs;
before decrypting the encrypted data to be copied on the clipboard based on the copy type corresponding to the copy attribute information on the clipboard, the method further includes:
performing hash processing on the paste parameter corresponding to the copy type to obtain a paste value, verifying the paste value based on the verification value, and if the paste value is the same as the verification value, successfully verifying; if the copy type is in-webpage copy, the paste parameter is the address of the current webpage; and if the copying type is in-domain copying, the pasting parameter is the domain name of the current webpage.
4. The method of claim 3, wherein if the verification is unsuccessful, the pasted data to be copied is displayed in a ciphertext form.
5. The method according to claim 1, wherein before encrypting the data to be copied based on the copy type corresponding to the copy attribute information, the method further comprises:
and receiving the copy attribute information sent by the server and/or the copy attribute information set by the user.
6. The method according to claim 5, wherein the encrypting the data to be copied based on the copy type corresponding to the copy attribute information further comprises:
and if the replication attribute information sent by the server and the replication attribute information set by the user exist at the same time, encrypting the data to be replicated by the replication type corresponding to the replication attribute information with high priority in the replication attribute information sent by the server and the replication attribute information set by the user.
7. A data copying and pasting method is applied to a server and is characterized by comprising the following steps:
receiving a data acquisition request of a client;
sending the data to be acquired and the corresponding copy attribute information to a client so that the client responds to a data copy instruction aiming at the data, encrypts the data to be copied based on the copy type corresponding to the copy attribute information, responds to a data paste instruction, decrypts the encrypted data to be copied based on the copy type corresponding to the copy attribute information on a shear plate, and pastes the decrypted data;
encrypting the data to be copied based on the copy type corresponding to the copy attribute information, wherein the encrypting comprises the following steps:
if the copy type is in-webpage copy, generating a webpage encryption key through a preset first key and the address of the webpage to which the data to be copied belongs, and encrypting the data to be copied based on the webpage encryption key; or
If the copying type is in-domain copying, generating a domain name encryption key through a preset second key and a domain name of a webpage to which the data to be copied belongs, and encrypting the data to be copied based on the webpage encryption key; or
And if the copying type is in-browser copying, encrypting the data to be copied through a preset third key.
8. A data copy and paste apparatus, comprising:
the system comprises an encryption module, a data replication module and a data replication module, wherein the encryption module is configured to execute a response data replication instruction, and if the data to be replicated has corresponding replication attribute information, the data to be replicated is encrypted based on a replication type corresponding to the replication attribute information, and the data to be replicated is sent by a server;
the copying module is configured to copy the copying attribute information and the encrypted data to be copied to a clipboard;
the pasting module is configured to execute a response data pasting instruction, decrypt the encrypted data to be copied on the clipboard based on the copy type corresponding to the copy attribute information on the clipboard, and paste the decrypted data to be copied;
wherein the encryption module is configured to encrypt the data to be copied based on a copy type corresponding to the copy attribute information, and includes:
if the copy type is in-webpage copy, generating a webpage encryption key through a preset first key and the address of the webpage to which the data to be copied belongs, and encrypting the data to be copied based on the webpage encryption key; or
If the copying type is in-domain copying, generating a domain name encryption key through a preset second key and a domain name of a webpage to which the data to be copied belongs, and encrypting the data to be copied based on the webpage encryption key; or
And if the copying type is in-browser copying, encrypting the data to be copied through a preset third key.
9. The apparatus of claim 8, further comprising a decryption module configured to:
if the copy type is in-webpage copy, generating a webpage decryption key according to the first key and the address of the current webpage, and decrypting the encrypted data to be copied on the clipboard through the webpage decryption key; or
If the copying type is in-domain copying, generating a domain name decryption key according to the second key and the domain name of the current webpage, and decrypting the encrypted data to be copied on the clipboard through the domain name decryption key; or
And if the copying type is in-browser copying, decrypting the encrypted data to be copied on the clipboard through the third key.
10. The apparatus of claim 9, further comprising a verification module configured to:
the copying the attribute information and the encrypted data to be copied to the clipboard further comprises:
copying a verification value obtained by performing hash processing on the verification parameter corresponding to the copy type to a shear plate; if the copy type is in-page copy, the verification parameter is the address of the page to which the data to be copied belongs; if the copying type is in-domain copying, the verification parameter is the domain name of the webpage to which the data to be copied belongs;
before decrypting the encrypted data to be copied on the clipboard based on the copy type corresponding to the copy attribute information on the clipboard, the method further includes:
performing hash processing on the paste parameter corresponding to the copy type to obtain a paste value, verifying the paste value based on the verification value, and if the paste value is the same as the verification value, successfully verifying; if the copy type is in-webpage copy, the paste parameter is the address of the current webpage; and if the copying type is in-domain copying, the pasting parameter is the domain name of the current webpage.
11. The apparatus of claim 10, wherein if the verification is unsuccessful, the pasted data to be copied is displayed in a ciphertext form.
12. The apparatus according to claim 8, wherein before the encryption module encrypts the data to be copied based on the copy type corresponding to the copy attribute information, the encryption module is further configured to:
receiving the replication attribute information sent by the server and/or the replication attribute information set by the user;
the encrypting the data to be copied based on the copy type corresponding to the copy attribute information further includes:
and if the copy attribute information sent by the server and the copy attribute information set by the user are received, encrypting the data to be copied by the copy type corresponding to the copy attribute information with high priority in the copy attribute information sent by the server and the copy attribute information set by the user.
13. A data copy and paste apparatus, comprising:
the receiving module is configured to execute receiving of a data acquisition request of a client;
the sending module is configured to execute sending of data to be acquired and corresponding copy attribute information to a client, so that the client responds to a data copy instruction for the data, encrypts the data to be copied based on a copy type corresponding to the copy attribute information, responds to a data paste instruction, decrypts the encrypted data to be copied based on the copy type corresponding to the copy attribute information on the clipboard, and then pastes the decrypted data;
encrypting the data to be copied based on the copy type corresponding to the copy attribute information, wherein the encrypting comprises the following steps:
if the copy type is in-webpage copy, generating a webpage encryption key through a preset first key and the address of the webpage to which the data to be copied belongs, and encrypting the data to be copied based on the webpage encryption key; or
If the copying type is in-domain copying, generating a domain name encryption key through a preset second key and a domain name of a webpage to which the data to be copied belongs, and encrypting the data to be copied based on the webpage encryption key; or
And if the copying type is in-browser copying, encrypting the data to be copied through a preset third key.
14. An electronic device, comprising:
a processor;
a memory for storing the processor-executable instructions;
wherein the processor is configured to execute the instructions to implement the data copy and paste method according to any one of claims 1 to 6.
15. A server, comprising:
a processor;
a memory for storing the processor-executable instructions;
wherein the processor is configured to execute the instructions to implement the data copy and paste method of claim 7.
16. A computer-readable storage medium comprising computer program instructions which, when run on a computer, cause the computer to perform the method of any of claims 1 to 6, or the method of claim 7.
CN202010674484.3A 2020-07-14 2020-07-14 Data copying and pasting method and system and electronic equipment Active CN111858094B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010674484.3A CN111858094B (en) 2020-07-14 2020-07-14 Data copying and pasting method and system and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010674484.3A CN111858094B (en) 2020-07-14 2020-07-14 Data copying and pasting method and system and electronic equipment

Publications (2)

Publication Number Publication Date
CN111858094A CN111858094A (en) 2020-10-30
CN111858094B true CN111858094B (en) 2021-05-18

Family

ID=72983444

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010674484.3A Active CN111858094B (en) 2020-07-14 2020-07-14 Data copying and pasting method and system and electronic equipment

Country Status (1)

Country Link
CN (1) CN111858094B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113297605B (en) * 2021-06-24 2023-05-05 中国建设银行股份有限公司 Copy data management method, apparatus, electronic device, and computer readable medium
CN116451186B (en) * 2023-04-21 2023-11-17 广州掌动智能科技有限公司 Sensitive data security protection method and system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101339788A (en) * 2007-07-03 2009-01-07 株式会社日立制作所 Receiving device
US10579542B2 (en) * 2017-05-10 2020-03-03 Revbits, LLC Browser session storage as storage for private key in public-key encryption schema
CN111226429A (en) * 2018-09-21 2020-06-02 思杰***有限公司 System and method for intercepting and enhancing SAAS application calls via an embedded browser

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU6835896A (en) * 1995-08-27 1997-03-27 Aliroo Ltd. Document processing
JP2006155155A (en) * 2004-11-29 2006-06-15 Fujitsu Ltd Information leakage preventing device and method, and its program
US9392077B2 (en) * 2012-10-12 2016-07-12 Citrix Systems, Inc. Coordinating a computing activity across applications and devices having multiple operation modes in an orchestration framework for connected devices
CN103605930B (en) * 2013-11-27 2016-04-13 湖北民族学院 A kind of dualized file based on HOOK and filtration drive prevents divulging a secret method and system
CN103605917A (en) * 2013-12-11 2014-02-26 武钢集团昆明钢铁股份有限公司 Spreadsheet system based on multi-user environment and implementation method of spreadsheet system
CN104506545B (en) * 2014-12-30 2017-12-22 北京奇安信科技有限公司 Leakage prevention method and device
US10339302B2 (en) * 2015-05-21 2019-07-02 Airwatch Llc Creating multiple workspaces in a device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101339788A (en) * 2007-07-03 2009-01-07 株式会社日立制作所 Receiving device
US10579542B2 (en) * 2017-05-10 2020-03-03 Revbits, LLC Browser session storage as storage for private key in public-key encryption schema
CN111226429A (en) * 2018-09-21 2020-06-02 思杰***有限公司 System and method for intercepting and enhancing SAAS application calls via an embedded browser

Also Published As

Publication number Publication date
CN111858094A (en) 2020-10-30

Similar Documents

Publication Publication Date Title
EP3852338B1 (en) Method and apparatus for verifying digital identity, device and storage medium
US11509458B2 (en) Method and system for securely replicating encrypted deduplicated storages
EP3289750B1 (en) Autonomous private key recovery
US10255089B2 (en) Self-deleting virtual machines
WO2021164166A1 (en) Service data protection method, apparatus and device, and readable storage medium
CN104243419A (en) Data processing method, device and system based on secure shell protocol
US20200089867A1 (en) System and method for authentication
CN111858094B (en) Data copying and pasting method and system and electronic equipment
Kotla et al. Pasture: Secure offline data access using commodity trusted hardware
CN113342473B (en) Data processing method, migration method of secure virtual machine, related device and architecture
WO2019120038A1 (en) Encrypted storage of data
US20130061059A1 (en) Information processing apparatus, information processing method, and non-transitory computer readable medium
US9270649B1 (en) Secure software authenticator data transfer between processing devices
CN108154037B (en) Inter-process data transmission method and device
CN112416525B (en) Device driver initialization method, direct storage access method and related device
CN112416526B (en) Direct storage access method, device and related equipment
US11601285B2 (en) Securely authorizing service level access to a backup system using a specialized access key
CN113656817A (en) Data encryption method
CN109933994B (en) Data hierarchical storage method and device and computing equipment
CN102426635B (en) Display device for file information, display method and system
CN112564888B (en) Method and equipment for deploying private cloud
US20240022435A1 (en) Secure distribution of a client certificate private key to client-based services
CN114339630B (en) Method and device for protecting short message
US20240022554A1 (en) Secure exchange of certificate authority certificate inline as part of file transfer protocol
CN114329574B (en) Encrypted partition access control method and system based on domain management platform and computing equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CB03 Change of inventor or designer information

Inventor after: An Xiaojiang

Inventor after: Hu Boliang

Inventor after: Jiang Hongyu

Inventor before: Ding Min

CB03 Change of inventor or designer information