CN102663320A - Method for terminal identification developers and dividing developers with different permissions - Google Patents

Method for terminal identification developers and dividing developers with different permissions Download PDF

Info

Publication number
CN102663320A
CN102663320A CN2012101077618A CN201210107761A CN102663320A CN 102663320 A CN102663320 A CN 102663320A CN 2012101077618 A CN2012101077618 A CN 2012101077618A CN 201210107761 A CN201210107761 A CN 201210107761A CN 102663320 A CN102663320 A CN 102663320A
Authority
CN
China
Prior art keywords
developer
application program
territory
file
certificate
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2012101077618A
Other languages
Chinese (zh)
Inventor
陈真
孟陆强
洪逸轩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian Landi Commercial Equipment Co Ltd
Original Assignee
Fujian Landi Commercial Equipment Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian Landi Commercial Equipment Co Ltd filed Critical Fujian Landi Commercial Equipment Co Ltd
Priority to CN2012101077618A priority Critical patent/CN102663320A/en
Publication of CN102663320A publication Critical patent/CN102663320A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention discloses a method for terminal identification developers and dividing the developers with different permissions under an Android platform, wherein the method for terminal identification developers comprises the following steps of: judging whether all developer domain certificates preset in the terminal are unable to check developer public key certificates of an extended signature installation document, if so, stopping the installation process of the extended signature installation document, and, if not, starting the installation process of the extended signature installation document. The method provided by the invention can introduce an extended digital signature authentication mechanism in the installation process of the application program to realize the application program signer identification, so that the system can selectively install the application program. Meanwhile, since terminal equipment can identify the signer of the application program, the terminal equipment can grant different permissions forcalling system interfaces for the application programs of different singers, so that the protection of the terminal equipment system security is strengthened.

Description

Terminal recognition developer and the method for dividing the different rights developer
Technical field
The present invention relates to computer A ndroid system field, the method that relates in particular to terminal recognition developer under a kind of Android platform and divide the different rights developer.
Background technology
The Android system itself provides certain permission (authority of the specific API of application call) mechanism, and according to API (interface) difference of protection, permission can be divided into two types: the permission and the permission of system of application program statement.The functional interface that the former protects current application program to provide to other application programs is stated in the configuration file of application program; The latter is used for other API of protection system level, in system configuration information, states.
The Android application program is installed file, i.e. apk file, and itself is from signing, and signature private key is held by application developer voluntarily.Except the integrality of checking apk file data; Signature certainly among the apk mainly is used for establishing trusting relationship and relevant permission mandate between the application program; Can state in an apk that such as us a permission can only be authorized to state promptly that to the apk that uses the identical credentials signature this permission only can be authorized to other apk from same developer (he holds signature private key).
System permission, particularly those are used for protecting the permission of security sensitive API, only are declared as and can license to the certain applications program, and these application programs must be used the same private key signature with system file.So, not the application program of developing together with system, can not be authorized to these permissioin usually.
But there is following shortcoming in said method,
The apk of shortcoming 1:Android from signature mechanism; Mainly be used for protecting application program and describe the same source relation between the application program; Can not the identification distributor information, promptly can't realize " only having application program just can be mounted " from specific development person's (signer).
Shortcoming 2: because can't originate by identification apk, permission authorization underaction can't be realized " permission is licensed to certain applications program (from specific development person/signer) ".
Summary of the invention
The method that the technical matters that the present invention mainly solves provides terminal recognition developer under a kind of Android platform and divides the different rights developer; In the application program installation process, introduce the digital signature identification mechanism of expansion; Realize the identification of application programs signer; System's set up applications selectively, and application programs mandate more neatly like this.
For solving the problems of the technologies described above, the technical scheme that the present invention adopts is: terminal recognition developer's under a kind of Android platform method is provided, may further comprise the steps,
Judge whether all developer territory certificates that are preset in the said terminal all can't verify developer's public key certificate of expansion signature installation file; If then end the installation procedure that said expansion signature is installed file; If not, then carry out the installation procedure that said expansion signature is installed file.
Wherein, The said step of expanding the installation procedure of signature installation file also comprises step afterwards; Receive in the application program application, and judge whether the developer territory under the said application program has the authority of said calling interface said terminal system calling interface; If then give said application program with the permission grant of said calling interface; If not, then do not give said application program with the permission grant of said calling interface.
Wherein, the generation method that the expansion of said application program signature is installed file specifically may further comprise the steps,
The statement application program is installed file to the application and the generation application program of said terminal system calling interface;
Use developer's private key that said application program is installed file signature, generate signed data;
Application program is installed file, developer's public key certificate and signed data merge, the expansion signature that forms application program is installed file.
Wherein, the said step of expanding the installation procedure of signature installation file specifically may further comprise the steps,
Write down the affiliated developer territory of expansion signature installation file of passing through checking, and the validity of developer's public key certificate in the use expansion signature installation file and the said application program installation of signed data verification file;
Carry out installing the installation procedure of file through the application program of checking.
For solving the problems of the technologies described above, another technical scheme that the present invention adopts is: a kind of method of dividing the different rights developer is provided, may further comprise the steps,
Create different developer territories according to the difference of system interface being called authority, for each developer territory generates private key and developer territory certificate, and to corresponding private key and the developer territory certificate of each developer territory distribution;
Receive PKI and identity information that the developer submits, examine developer's identity;
Said developer is assigned to the developer territory of corresponding authority, and uses corresponding developer territory private key, generate corresponding developer's certificate, and said developer's certificate authority is returned said developer PKI and identity information mandate that the developer submits to.
Wherein, Said developer territory certificate is specially the execution following steps and obtains; Said developer territory certificate is specially the execution following steps and obtains, and use is preset CA root certificate the public key data and the identity information thereof in each developer territory are signed, and obtains developer territory certificate.
The invention has the beneficial effects as follows: file distribution person's information can't be installed by identification application program by the Android system that is different from prior art; Just can not realize only allowing to install function from specific development person's's (signer) application program; The method that the present invention provides terminal recognition developer under a kind of Android platform and divides the different rights developer; In the application program installation process, introduce the digital signature identification mechanism of expansion; Realize the identification of application programs signer, like this system's set up applications selectively.Because the authority of different developers territory calling system interface is different, the developer in different developers territory also just has the authority of different calling interfaces so, and the security of system of terminal device has also been played guaranteeing role.Simultaneously, because the person of signing and issuing that terminal device can recognition application,, thereby strengthen guarantee to the terminal device security of system so terminal device can be to authorizing the authority of different calling system interfaces from the difference person's of signing and issuing application program.
Description of drawings
Fig. 1 is terminal recognition developer's of the present invention method one process flow diagram;
Fig. 2 is terminal recognition developer's of the present invention method one process flow diagram;
Fig. 3 is the process flow diagram that the expansion signature is installed document generating method among the present invention;
Fig. 4 is the process flow diagram that the present invention divides different rights developer method.
Embodiment
By specifying technology contents of the present invention, structural attitude, realized purpose and effect, give explanation below in conjunction with embodiment and conjunction with figs. are detailed.
See also Fig. 1, Fig. 2 and Fig. 3, among some embodiment as shown in Figure 1, the present invention provides terminal recognition developer's under a kind of Android platform method, may further comprise the steps,
Judge whether all developer territory certificates that are preset in the said terminal all can't verify developer's public key certificate of expansion signature installation file; If then end the installation procedure that said expansion signature is installed file; If not, then carry out the installation procedure that said expansion signature is installed file.
Whether before set up applications was installed file, equipment attempted using the developer territory certificate in the equipment of being preset to verify the developer's certificate in the expansion signature installation file successively, file is installed can be mounted in order to judge this application program.Through said process, the present invention introduces the digital signature identification mechanism of expansion in the application program installation process, realizes the identification of application programs signer, like this system's set up applications selectively.
In some embodiment as shown in Figure 2; The said step of expanding the installation procedure of signature installation file also comprises step afterwards; Receive in the application program application, and judge whether the developer territory under the said application program has the authority of said calling interface said terminal system calling interface; If then give said application program with the permission grant of said calling interface; If not, then do not give said application program with the permission grant of said calling interface.
In this process, collect the application of stating in the application program to specific API (interface) authority, for developer territory, then can give the developer with specific API permission grant with specific API authority.
Among some embodiment as shown in Figure 3, the generation method that the expansion of said application program signature is installed file specifically may further comprise the steps,
The statement application program is installed file to the application and the generation application program of said terminal system calling interface;
Use developer's private key that said application program is installed file signature, generate signed data;
Application program is installed file, developer's public key certificate and signed data merge, the expansion signature that forms application program is installed file.
The said step of expanding the installation procedure of signature installation file specifically may further comprise the steps,
Write down the affiliated developer territory of expansion signature installation file of passing through checking, and the validity of developer's public key certificate in the use expansion signature installation file and the said application program installation of signed data verification file;
Carry out installing the installation procedure of file through the application program of checking.
Like this; The identifying that pair developer/signer is just arranged in the installation process, the identification of application programs signer just, system's set up applications selectively like this; And application programs mandate is more neatly given specific developer with specific API permission grant.
See also Fig. 4, for solving the problems of the technologies described above, another technical scheme that the present invention adopts is: a kind of method of dividing the different rights developer is provided, may further comprise the steps,
Create different developer territories according to the difference of system interface being called authority, and be that each developer territory generates corresponding public private key pair, to CA root certificate request public key certificate (developer territory certificate just); And to corresponding private key and the developer territory certificate of each developer territory distribution;
Receive developer's public key data and developer's identity information that the developer submits, examine developer's identity;
Said developer is assigned to can be to the developer territory of authorizing corresponding authority; And the PKI and the identity information signature (promptly authorizing) that use corresponding developer territory private key that the developer is submitted to; Generate corresponding said developer's public key certificate (being developer's certificate), and this public key certificate is issued back the developer.
Here, the present invention said " developer territory " is the set to the certain applications program developer, there is close specific API authority requirement in system, and there is identical trusting degree in system to them.The height of authority corresponding the height of system to developer territory trusting degree, such as the system API of some security sensitive needs high authority, only can be authorized to the developer who trusts fully to system.
Among Fig. 4, " developer's certificate n-m ": m the developer's identity public key certificate that characterizes n developer territory; Its corresponding private key is held by developer n-m, will be used for the apk file of signing; This group certificate is signed by " developer territory n certificate ".
" developer territory n certificate ": the certificate that characterizes n developer territory; Corresponding private key is held by the owner or the network operator of terminal device, is used for to belong to developer's certificate signature in this " developer territory " through the affirmation of examining; Such certificate is signed by specific CA certificate.Such certificate will be by prefabricated to Android equipment, so that the developer's certificate in run time verification application program to be installed.
" CA certificate ": general CA certificate can be used in the time of necessary verifying " developer territory certificate ".
In certain embodiments; Said developer territory certificate is specially the execution following steps and obtains; The terminal device owner or network operator send CA application certificate signature with the public key data and the identity information thereof in developer territory; CA obtains developer territory certificate to after the above-mentioned Information Signature, again this territory certificate authority is returned the terminal device owner or network operator.
In scheme provided by the invention, the terminal device owner or network operator have created the different developer territory of authority earlier, and are that each developer territory generates private key and developer territory certificate; Trusting degree according to the developer is different, they is assigned in the different developer territories, and uses corresponding developer territory private key to sign and issue corresponding developer's public key certificate.Terminal device has the developer territory that difference is called specific API (interface) authority with regard to existing like this; The height corresponding person system of authority is to the height of developer territory trusting degree; The developer that the terminal device owner or network operator trust fully just can be by higher authority, can the responsive API of access security; Possibly just not such authority can not be authorized, the API of security sensitive can't be called by the developer who trusts fully.
When terminal system is asked to safety when from the expansion signature of certain developer's application program file being installed, terminal device will judge whether all developer territory certificates that are preset in the said terminal can't verify all that the expansion signature installs developer's public key certificate of file; If then end the installation procedure that said expansion signature is installed file; If not; Then record is through the developer territory under the expansion signature installation file of checking; And use the expansion signature that the validity that developer's public key certificate and the said application program of signed data verification in the file are installed file is installed, carry out installation procedure through the application program installation file of checking.
In the process of the installation procedure that carries out application program installation file; Terminal system then can be collected and receive in the application program application to said terminal system calling interface, and judges whether the developer territory under the said application program has the authority of said calling interface; If then give said application program with the permission grant of said calling interface; If not, then do not give said application program with the permission grant of said calling interface.
Through as above process, realized the identification of application programs signer, and specific API (interface) has been licensed to specific development person's purpose.
In sum; File distribution person's information can't be installed by identification application program by the Android system that is different from prior art; Just can not realize only allowing to install function from specific development person's's (signer) application program; The method that the present invention provides terminal recognition developer under a kind of Android platform and divides the different rights developer; In the application program installation process, introduce the digital signature identification mechanism of expansion, realize the identification of application programs signer, like this system's set up applications selectively.Because the authority of different developers territory calling system interface is different, the developer in different developers territory also just has the authority of different calling interfaces so, and the security of system of terminal device has also been played guaranteeing role.Simultaneously, because the person of signing and issuing that terminal device can recognition application,, thereby strengthen guarantee to the terminal device security of system so terminal device can be to authorizing the authority of different calling system interfaces from the difference person's of signing and issuing application program.
The above is merely embodiments of the invention; Be not so limit claim of the present invention; Every equivalent structure transformation that utilizes instructions of the present invention and accompanying drawing content to be done, or directly or indirectly be used in other relevant technical fields, all in like manner be included in the scope of patent protection of the present invention.

Claims (6)

1. terminal recognition developer's method under the Android platform is characterized in that, may further comprise the steps,
Judge whether all developer territory certificates that are preset in the said terminal all can't verify developer's public key certificate of expansion signature installation file; If then end the installation procedure that said expansion signature is installed file; If not, then carry out the installation procedure that said expansion signature is installed file.
2. terminal recognition developer's method is characterized in that under the Android platform according to claim 1, and the said step of expanding the installation procedure of signature installation file also comprises step afterwards,
Receive in the application program application, and judge whether the developer territory under the said application program has the authority of said calling interface said terminal system calling interface; If then give said application program with the permission grant of said calling interface; If not, then do not give said application program with the permission grant of said calling interface.
3. terminal recognition developer's method is characterized in that under the Android platform according to claim 1 and 2, and the generation method that the expansion signature of said application program is installed file specifically may further comprise the steps,
The statement application program is installed file to the application and the generation application program of said terminal system calling interface;
Use developer's private key that said application program is installed file signature, generate signed data;
Application program is installed file, developer's public key certificate and signed data merge, the expansion signature that forms application program is installed file.
4. terminal recognition developer's method is characterized in that under the Android platform according to claim 3, and the said step of expanding the installation procedure of signature installation file specifically may further comprise the steps,
Write down the affiliated developer territory of expansion signature installation file of passing through checking, and the validity of developer's public key certificate in the use expansion signature installation file and the said application program installation of signed data verification file;
Carry out installing the installation procedure of file through the application program of checking.
5. a method of dividing the different rights developer is characterized in that, may further comprise the steps,
Create different developer territories according to the difference of system interface being called authority, for each developer territory generates private key and developer territory certificate, and to corresponding private key and the developer territory certificate of each developer territory distribution;
Receive PKI and identity information that the developer submits, examine developer's identity;
Said developer is assigned to the developer territory of corresponding authority, and uses corresponding developer territory private key, generate corresponding developer's certificate, and said developer's certificate authority is returned said developer PKI and identity information mandate that the developer submits to.
6. division different rights developer's according to claim 5 method; It is characterized in that; Said developer territory certificate is specially the execution following steps and obtains, and use is preset CA root certificate the public key data and the identity information thereof in each developer territory are signed, and obtains developer territory certificate.
CN2012101077618A 2012-04-12 2012-04-12 Method for terminal identification developers and dividing developers with different permissions Pending CN102663320A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2012101077618A CN102663320A (en) 2012-04-12 2012-04-12 Method for terminal identification developers and dividing developers with different permissions

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2012101077618A CN102663320A (en) 2012-04-12 2012-04-12 Method for terminal identification developers and dividing developers with different permissions

Publications (1)

Publication Number Publication Date
CN102663320A true CN102663320A (en) 2012-09-12

Family

ID=46772806

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2012101077618A Pending CN102663320A (en) 2012-04-12 2012-04-12 Method for terminal identification developers and dividing developers with different permissions

Country Status (1)

Country Link
CN (1) CN102663320A (en)

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103324506A (en) * 2013-06-24 2013-09-25 上海天奕达电子科技有限公司 Method and mobile phone for controlling installation of Android applications
CN103412767A (en) * 2013-06-09 2013-11-27 百度国际科技(深圳)有限公司 Method and system for recognizing and upgrading application version
CN103530534A (en) * 2013-09-23 2014-01-22 北京理工大学 Android program ROOT authorization method based on signature verification
CN103905390A (en) * 2012-12-26 2014-07-02 联想(北京)有限公司 Permission acquisition method, device, electronic equipment and system
EP2804411A1 (en) * 2013-05-13 2014-11-19 Aspire Technology Limited Method and system for authenticating an application for a mobile data processing terminal
CN104156638A (en) * 2014-06-06 2014-11-19 国家计算机网络与信息安全管理中心 Implementation method of extended signature for Android system software
CN104301331A (en) * 2014-10-31 2015-01-21 北京思特奇信息技术股份有限公司 Service interface permissions validation method and device
CN105227545A (en) * 2015-09-07 2016-01-06 上海联彤网络通讯技术有限公司 The system and method that user and developer divide control is realized in intelligent operating platform
CN105468413A (en) * 2015-11-27 2016-04-06 北京指掌易科技有限公司 Method and apparatus for supporting verification of application software certificate
CN106886711A (en) * 2015-12-15 2017-06-23 北京奇虎科技有限公司 authority request response method and corresponding device
WO2017124960A1 (en) * 2016-01-21 2017-07-27 阿里巴巴集团控股有限公司 Method and device for application program to access interface, and method and device for application program to request authorization
CN107861798A (en) * 2016-09-22 2018-03-30 百度在线网络技术(北京)有限公司 The system-level operations method and device of application
CN108363912A (en) * 2018-02-28 2018-08-03 苏州国芯科技有限公司 A kind of close guarantor's method and device of program code
CN109829285A (en) * 2018-12-03 2019-05-31 深圳市新国都支付技术有限公司 A kind of digital signature method, device, equipment and storage medium
CN109981873A (en) * 2017-12-27 2019-07-05 珠海市君天电子科技有限公司 A kind of address list permission open method, device and electronic equipment
CN111324887A (en) * 2020-02-25 2020-06-23 广东天波信息技术股份有限公司 Installation control method and device for application program
US10873466B2 (en) 2015-11-06 2020-12-22 Huawei International Pte. Ltd. System and method for managing installation of an application package requiring high-risk permission access
CN112560022A (en) * 2020-12-03 2021-03-26 支付宝(杭州)信息技术有限公司 System interface call detection method and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101969440A (en) * 2010-10-28 2011-02-09 四川长虹电器股份有限公司 Software certificate generating method
CN102024124A (en) * 2010-12-20 2011-04-20 中国联合网络通信集团有限公司 Method, device and system for processing mobile widgets as well as client-side
CN102035653A (en) * 2010-11-30 2011-04-27 中国联合网络通信集团有限公司 Controllable distributing method and system used in software examining and verifying stage
CN102300065A (en) * 2011-08-31 2011-12-28 四川长虹电器股份有限公司 Security authentication method for android-platform-based smart television software

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101969440A (en) * 2010-10-28 2011-02-09 四川长虹电器股份有限公司 Software certificate generating method
CN102035653A (en) * 2010-11-30 2011-04-27 中国联合网络通信集团有限公司 Controllable distributing method and system used in software examining and verifying stage
CN102024124A (en) * 2010-12-20 2011-04-20 中国联合网络通信集团有限公司 Method, device and system for processing mobile widgets as well as client-side
CN102300065A (en) * 2011-08-31 2011-12-28 四川长虹电器股份有限公司 Security authentication method for android-platform-based smart television software

Cited By (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103905390B (en) * 2012-12-26 2017-05-24 联想(北京)有限公司 Permission acquisition method, device, electronic equipment and system
CN103905390A (en) * 2012-12-26 2014-07-02 联想(北京)有限公司 Permission acquisition method, device, electronic equipment and system
EP2804411A1 (en) * 2013-05-13 2014-11-19 Aspire Technology Limited Method and system for authenticating an application for a mobile data processing terminal
CN103412767A (en) * 2013-06-09 2013-11-27 百度国际科技(深圳)有限公司 Method and system for recognizing and upgrading application version
CN103324506A (en) * 2013-06-24 2013-09-25 上海天奕达电子科技有限公司 Method and mobile phone for controlling installation of Android applications
CN103530534B (en) * 2013-09-23 2016-06-29 北京理工大学 A kind of Android program ROOT authorization method based on signature verification
CN103530534A (en) * 2013-09-23 2014-01-22 北京理工大学 Android program ROOT authorization method based on signature verification
CN104156638A (en) * 2014-06-06 2014-11-19 国家计算机网络与信息安全管理中心 Implementation method of extended signature for Android system software
CN104301331A (en) * 2014-10-31 2015-01-21 北京思特奇信息技术股份有限公司 Service interface permissions validation method and device
CN105227545A (en) * 2015-09-07 2016-01-06 上海联彤网络通讯技术有限公司 The system and method that user and developer divide control is realized in intelligent operating platform
US11637707B2 (en) 2015-11-06 2023-04-25 Huawei International Pte. Ltd. System and method for managing installation of an application package requiring high-risk permission access
US10873466B2 (en) 2015-11-06 2020-12-22 Huawei International Pte. Ltd. System and method for managing installation of an application package requiring high-risk permission access
CN105468413A (en) * 2015-11-27 2016-04-06 北京指掌易科技有限公司 Method and apparatus for supporting verification of application software certificate
CN105468413B (en) * 2015-11-27 2018-09-18 北京指掌易科技有限公司 A kind of method and apparatus for supporting application software itself certificate to verify
CN106886711A (en) * 2015-12-15 2017-06-23 北京奇虎科技有限公司 authority request response method and corresponding device
WO2017124960A1 (en) * 2016-01-21 2017-07-27 阿里巴巴集团控股有限公司 Method and device for application program to access interface, and method and device for application program to request authorization
US20190138698A1 (en) * 2016-01-21 2019-05-09 Alibaba Group Holding Limited System and method for controlled access to application programming interfaces
US10878066B2 (en) 2016-01-21 2020-12-29 Banma Zhixing Network (Hongkong) Co., Limited System and method for controlled access to application programming interfaces
CN106991298A (en) * 2016-01-21 2017-07-28 阿里巴巴集团控股有限公司 Access method, the authorization requests method and device of application program docking port
CN107861798B (en) * 2016-09-22 2019-06-14 北京小熊博望科技有限公司 The system-level operations method and device of application
CN107861798A (en) * 2016-09-22 2018-03-30 百度在线网络技术(北京)有限公司 The system-level operations method and device of application
CN109981873A (en) * 2017-12-27 2019-07-05 珠海市君天电子科技有限公司 A kind of address list permission open method, device and electronic equipment
CN108363912A (en) * 2018-02-28 2018-08-03 苏州国芯科技有限公司 A kind of close guarantor's method and device of program code
CN109829285A (en) * 2018-12-03 2019-05-31 深圳市新国都支付技术有限公司 A kind of digital signature method, device, equipment and storage medium
CN111324887A (en) * 2020-02-25 2020-06-23 广东天波信息技术股份有限公司 Installation control method and device for application program
CN112560022A (en) * 2020-12-03 2021-03-26 支付宝(杭州)信息技术有限公司 System interface call detection method and device
CN112560022B (en) * 2020-12-03 2024-03-12 支付宝(杭州)信息技术有限公司 Method and device for detecting system interface call

Similar Documents

Publication Publication Date Title
CN102663320A (en) Method for terminal identification developers and dividing developers with different permissions
CN108399329B (en) Method for improving security of trusted application program
CN107463806B (en) Signature and signature verification method for Android application program installation package
CN106991298B (en) Access method of application program to interface, authorization request method and device
CN103888252A (en) UID, PID, and APPID-based control application access permission method
CN110677376B (en) Authentication method, related device and system and computer readable storage medium
CN101969440B (en) Software certificate generating method
US7594108B2 (en) Operator root certificates
CN106612183B (en) Cross digital signature method and system for application software under domestic operating system
CN103677892A (en) Authorization scheme to enable special privilege mode in secure electronic control unit
CN107729746B (en) Installed application program tamper-proofing method and system based on digital signature
CN104753881A (en) WebService security certification access control method based on software digital certificate and timestamp
CN103679005A (en) Method to enable development mode of a secure electronic control unit
RU2011153984A (en) TRUSTED AUTHORITY ADMINISTRATOR (TIM)
CA2632590A1 (en) Method to verify the integrity of components on a trusted platform using integrity database services
KR20080097230A (en) Trusted code groups
CN102340398A (en) Security policy setting and determining method, and method and device for executing operation by application program
WO2017050186A1 (en) Application permission management method and smart pos terminal
CN102244659A (en) Execution method and apparatus of security policy script and security policy system
WO2017008728A1 (en) Method and system for classifying development mode and product mode for terminal
WO2008001060A1 (en) Revoking malware in a computing device
CN103560889A (en) Precision identity authentication method between X509 digital certificate and certificate application
WO2018040972A1 (en) Method and system for improving application security of payment terminal
CN105243311B (en) Fingerprint information safe calling method, fingerprint information safe calling device and mobile terminal
Barrera et al. Baton: Certificate agility for android's decentralized signing infrastructure

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20120912