CN102663320A - Method for terminal identification developers and dividing developers with different permissions - Google Patents
Method for terminal identification developers and dividing developers with different permissions Download PDFInfo
- Publication number
- CN102663320A CN102663320A CN2012101077618A CN201210107761A CN102663320A CN 102663320 A CN102663320 A CN 102663320A CN 2012101077618 A CN2012101077618 A CN 2012101077618A CN 201210107761 A CN201210107761 A CN 201210107761A CN 102663320 A CN102663320 A CN 102663320A
- Authority
- CN
- China
- Prior art keywords
- developer
- application program
- territory
- file
- certificate
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Abstract
The invention discloses a method for terminal identification developers and dividing the developers with different permissions under an Android platform, wherein the method for terminal identification developers comprises the following steps of: judging whether all developer domain certificates preset in the terminal are unable to check developer public key certificates of an extended signature installation document, if so, stopping the installation process of the extended signature installation document, and, if not, starting the installation process of the extended signature installation document. The method provided by the invention can introduce an extended digital signature authentication mechanism in the installation process of the application program to realize the application program signer identification, so that the system can selectively install the application program. Meanwhile, since terminal equipment can identify the signer of the application program, the terminal equipment can grant different permissions forcalling system interfaces for the application programs of different singers, so that the protection of the terminal equipment system security is strengthened.
Description
Technical field
The present invention relates to computer A ndroid system field, the method that relates in particular to terminal recognition developer under a kind of Android platform and divide the different rights developer.
Background technology
The Android system itself provides certain permission (authority of the specific API of application call) mechanism, and according to API (interface) difference of protection, permission can be divided into two types: the permission and the permission of system of application program statement.The functional interface that the former protects current application program to provide to other application programs is stated in the configuration file of application program; The latter is used for other API of protection system level, in system configuration information, states.
The Android application program is installed file, i.e. apk file, and itself is from signing, and signature private key is held by application developer voluntarily.Except the integrality of checking apk file data; Signature certainly among the apk mainly is used for establishing trusting relationship and relevant permission mandate between the application program; Can state in an apk that such as us a permission can only be authorized to state promptly that to the apk that uses the identical credentials signature this permission only can be authorized to other apk from same developer (he holds signature private key).
System permission, particularly those are used for protecting the permission of security sensitive API, only are declared as and can license to the certain applications program, and these application programs must be used the same private key signature with system file.So, not the application program of developing together with system, can not be authorized to these permissioin usually.
But there is following shortcoming in said method,
The apk of shortcoming 1:Android from signature mechanism; Mainly be used for protecting application program and describe the same source relation between the application program; Can not the identification distributor information, promptly can't realize " only having application program just can be mounted " from specific development person's (signer).
Shortcoming 2: because can't originate by identification apk, permission authorization underaction can't be realized " permission is licensed to certain applications program (from specific development person/signer) ".
Summary of the invention
The method that the technical matters that the present invention mainly solves provides terminal recognition developer under a kind of Android platform and divides the different rights developer; In the application program installation process, introduce the digital signature identification mechanism of expansion; Realize the identification of application programs signer; System's set up applications selectively, and application programs mandate more neatly like this.
For solving the problems of the technologies described above, the technical scheme that the present invention adopts is: terminal recognition developer's under a kind of Android platform method is provided, may further comprise the steps,
Judge whether all developer territory certificates that are preset in the said terminal all can't verify developer's public key certificate of expansion signature installation file; If then end the installation procedure that said expansion signature is installed file; If not, then carry out the installation procedure that said expansion signature is installed file.
Wherein, The said step of expanding the installation procedure of signature installation file also comprises step afterwards; Receive in the application program application, and judge whether the developer territory under the said application program has the authority of said calling interface said terminal system calling interface; If then give said application program with the permission grant of said calling interface; If not, then do not give said application program with the permission grant of said calling interface.
Wherein, the generation method that the expansion of said application program signature is installed file specifically may further comprise the steps,
The statement application program is installed file to the application and the generation application program of said terminal system calling interface;
Use developer's private key that said application program is installed file signature, generate signed data;
Application program is installed file, developer's public key certificate and signed data merge, the expansion signature that forms application program is installed file.
Wherein, the said step of expanding the installation procedure of signature installation file specifically may further comprise the steps,
Write down the affiliated developer territory of expansion signature installation file of passing through checking, and the validity of developer's public key certificate in the use expansion signature installation file and the said application program installation of signed data verification file;
Carry out installing the installation procedure of file through the application program of checking.
For solving the problems of the technologies described above, another technical scheme that the present invention adopts is: a kind of method of dividing the different rights developer is provided, may further comprise the steps,
Create different developer territories according to the difference of system interface being called authority, for each developer territory generates private key and developer territory certificate, and to corresponding private key and the developer territory certificate of each developer territory distribution;
Receive PKI and identity information that the developer submits, examine developer's identity;
Said developer is assigned to the developer territory of corresponding authority, and uses corresponding developer territory private key, generate corresponding developer's certificate, and said developer's certificate authority is returned said developer PKI and identity information mandate that the developer submits to.
Wherein, Said developer territory certificate is specially the execution following steps and obtains; Said developer territory certificate is specially the execution following steps and obtains, and use is preset CA root certificate the public key data and the identity information thereof in each developer territory are signed, and obtains developer territory certificate.
The invention has the beneficial effects as follows: file distribution person's information can't be installed by identification application program by the Android system that is different from prior art; Just can not realize only allowing to install function from specific development person's's (signer) application program; The method that the present invention provides terminal recognition developer under a kind of Android platform and divides the different rights developer; In the application program installation process, introduce the digital signature identification mechanism of expansion; Realize the identification of application programs signer, like this system's set up applications selectively.Because the authority of different developers territory calling system interface is different, the developer in different developers territory also just has the authority of different calling interfaces so, and the security of system of terminal device has also been played guaranteeing role.Simultaneously, because the person of signing and issuing that terminal device can recognition application,, thereby strengthen guarantee to the terminal device security of system so terminal device can be to authorizing the authority of different calling system interfaces from the difference person's of signing and issuing application program.
Description of drawings
Fig. 1 is terminal recognition developer's of the present invention method one process flow diagram;
Fig. 2 is terminal recognition developer's of the present invention method one process flow diagram;
Fig. 3 is the process flow diagram that the expansion signature is installed document generating method among the present invention;
Fig. 4 is the process flow diagram that the present invention divides different rights developer method.
Embodiment
By specifying technology contents of the present invention, structural attitude, realized purpose and effect, give explanation below in conjunction with embodiment and conjunction with figs. are detailed.
See also Fig. 1, Fig. 2 and Fig. 3, among some embodiment as shown in Figure 1, the present invention provides terminal recognition developer's under a kind of Android platform method, may further comprise the steps,
Judge whether all developer territory certificates that are preset in the said terminal all can't verify developer's public key certificate of expansion signature installation file; If then end the installation procedure that said expansion signature is installed file; If not, then carry out the installation procedure that said expansion signature is installed file.
Whether before set up applications was installed file, equipment attempted using the developer territory certificate in the equipment of being preset to verify the developer's certificate in the expansion signature installation file successively, file is installed can be mounted in order to judge this application program.Through said process, the present invention introduces the digital signature identification mechanism of expansion in the application program installation process, realizes the identification of application programs signer, like this system's set up applications selectively.
In some embodiment as shown in Figure 2; The said step of expanding the installation procedure of signature installation file also comprises step afterwards; Receive in the application program application, and judge whether the developer territory under the said application program has the authority of said calling interface said terminal system calling interface; If then give said application program with the permission grant of said calling interface; If not, then do not give said application program with the permission grant of said calling interface.
In this process, collect the application of stating in the application program to specific API (interface) authority, for developer territory, then can give the developer with specific API permission grant with specific API authority.
Among some embodiment as shown in Figure 3, the generation method that the expansion of said application program signature is installed file specifically may further comprise the steps,
The statement application program is installed file to the application and the generation application program of said terminal system calling interface;
Use developer's private key that said application program is installed file signature, generate signed data;
Application program is installed file, developer's public key certificate and signed data merge, the expansion signature that forms application program is installed file.
The said step of expanding the installation procedure of signature installation file specifically may further comprise the steps,
Write down the affiliated developer territory of expansion signature installation file of passing through checking, and the validity of developer's public key certificate in the use expansion signature installation file and the said application program installation of signed data verification file;
Carry out installing the installation procedure of file through the application program of checking.
Like this; The identifying that pair developer/signer is just arranged in the installation process, the identification of application programs signer just, system's set up applications selectively like this; And application programs mandate is more neatly given specific developer with specific API permission grant.
See also Fig. 4, for solving the problems of the technologies described above, another technical scheme that the present invention adopts is: a kind of method of dividing the different rights developer is provided, may further comprise the steps,
Create different developer territories according to the difference of system interface being called authority, and be that each developer territory generates corresponding public private key pair, to CA root certificate request public key certificate (developer territory certificate just); And to corresponding private key and the developer territory certificate of each developer territory distribution;
Receive developer's public key data and developer's identity information that the developer submits, examine developer's identity;
Said developer is assigned to can be to the developer territory of authorizing corresponding authority; And the PKI and the identity information signature (promptly authorizing) that use corresponding developer territory private key that the developer is submitted to; Generate corresponding said developer's public key certificate (being developer's certificate), and this public key certificate is issued back the developer.
Here, the present invention said " developer territory " is the set to the certain applications program developer, there is close specific API authority requirement in system, and there is identical trusting degree in system to them.The height of authority corresponding the height of system to developer territory trusting degree, such as the system API of some security sensitive needs high authority, only can be authorized to the developer who trusts fully to system.
Among Fig. 4, " developer's certificate n-m ": m the developer's identity public key certificate that characterizes n developer territory; Its corresponding private key is held by developer n-m, will be used for the apk file of signing; This group certificate is signed by " developer territory n certificate ".
" developer territory n certificate ": the certificate that characterizes n developer territory; Corresponding private key is held by the owner or the network operator of terminal device, is used for to belong to developer's certificate signature in this " developer territory " through the affirmation of examining; Such certificate is signed by specific CA certificate.Such certificate will be by prefabricated to Android equipment, so that the developer's certificate in run time verification application program to be installed.
" CA certificate ": general CA certificate can be used in the time of necessary verifying " developer territory certificate ".
In certain embodiments; Said developer territory certificate is specially the execution following steps and obtains; The terminal device owner or network operator send CA application certificate signature with the public key data and the identity information thereof in developer territory; CA obtains developer territory certificate to after the above-mentioned Information Signature, again this territory certificate authority is returned the terminal device owner or network operator.
In scheme provided by the invention, the terminal device owner or network operator have created the different developer territory of authority earlier, and are that each developer territory generates private key and developer territory certificate; Trusting degree according to the developer is different, they is assigned in the different developer territories, and uses corresponding developer territory private key to sign and issue corresponding developer's public key certificate.Terminal device has the developer territory that difference is called specific API (interface) authority with regard to existing like this; The height corresponding person system of authority is to the height of developer territory trusting degree; The developer that the terminal device owner or network operator trust fully just can be by higher authority, can the responsive API of access security; Possibly just not such authority can not be authorized, the API of security sensitive can't be called by the developer who trusts fully.
When terminal system is asked to safety when from the expansion signature of certain developer's application program file being installed, terminal device will judge whether all developer territory certificates that are preset in the said terminal can't verify all that the expansion signature installs developer's public key certificate of file; If then end the installation procedure that said expansion signature is installed file; If not; Then record is through the developer territory under the expansion signature installation file of checking; And use the expansion signature that the validity that developer's public key certificate and the said application program of signed data verification in the file are installed file is installed, carry out installation procedure through the application program installation file of checking.
In the process of the installation procedure that carries out application program installation file; Terminal system then can be collected and receive in the application program application to said terminal system calling interface, and judges whether the developer territory under the said application program has the authority of said calling interface; If then give said application program with the permission grant of said calling interface; If not, then do not give said application program with the permission grant of said calling interface.
Through as above process, realized the identification of application programs signer, and specific API (interface) has been licensed to specific development person's purpose.
In sum; File distribution person's information can't be installed by identification application program by the Android system that is different from prior art; Just can not realize only allowing to install function from specific development person's's (signer) application program; The method that the present invention provides terminal recognition developer under a kind of Android platform and divides the different rights developer; In the application program installation process, introduce the digital signature identification mechanism of expansion, realize the identification of application programs signer, like this system's set up applications selectively.Because the authority of different developers territory calling system interface is different, the developer in different developers territory also just has the authority of different calling interfaces so, and the security of system of terminal device has also been played guaranteeing role.Simultaneously, because the person of signing and issuing that terminal device can recognition application,, thereby strengthen guarantee to the terminal device security of system so terminal device can be to authorizing the authority of different calling system interfaces from the difference person's of signing and issuing application program.
The above is merely embodiments of the invention; Be not so limit claim of the present invention; Every equivalent structure transformation that utilizes instructions of the present invention and accompanying drawing content to be done, or directly or indirectly be used in other relevant technical fields, all in like manner be included in the scope of patent protection of the present invention.
Claims (6)
1. terminal recognition developer's method under the Android platform is characterized in that, may further comprise the steps,
Judge whether all developer territory certificates that are preset in the said terminal all can't verify developer's public key certificate of expansion signature installation file; If then end the installation procedure that said expansion signature is installed file; If not, then carry out the installation procedure that said expansion signature is installed file.
2. terminal recognition developer's method is characterized in that under the Android platform according to claim 1, and the said step of expanding the installation procedure of signature installation file also comprises step afterwards,
Receive in the application program application, and judge whether the developer territory under the said application program has the authority of said calling interface said terminal system calling interface; If then give said application program with the permission grant of said calling interface; If not, then do not give said application program with the permission grant of said calling interface.
3. terminal recognition developer's method is characterized in that under the Android platform according to claim 1 and 2, and the generation method that the expansion signature of said application program is installed file specifically may further comprise the steps,
The statement application program is installed file to the application and the generation application program of said terminal system calling interface;
Use developer's private key that said application program is installed file signature, generate signed data;
Application program is installed file, developer's public key certificate and signed data merge, the expansion signature that forms application program is installed file.
4. terminal recognition developer's method is characterized in that under the Android platform according to claim 3, and the said step of expanding the installation procedure of signature installation file specifically may further comprise the steps,
Write down the affiliated developer territory of expansion signature installation file of passing through checking, and the validity of developer's public key certificate in the use expansion signature installation file and the said application program installation of signed data verification file;
Carry out installing the installation procedure of file through the application program of checking.
5. a method of dividing the different rights developer is characterized in that, may further comprise the steps,
Create different developer territories according to the difference of system interface being called authority, for each developer territory generates private key and developer territory certificate, and to corresponding private key and the developer territory certificate of each developer territory distribution;
Receive PKI and identity information that the developer submits, examine developer's identity;
Said developer is assigned to the developer territory of corresponding authority, and uses corresponding developer territory private key, generate corresponding developer's certificate, and said developer's certificate authority is returned said developer PKI and identity information mandate that the developer submits to.
6. division different rights developer's according to claim 5 method; It is characterized in that; Said developer territory certificate is specially the execution following steps and obtains, and use is preset CA root certificate the public key data and the identity information thereof in each developer territory are signed, and obtains developer territory certificate.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2012101077618A CN102663320A (en) | 2012-04-12 | 2012-04-12 | Method for terminal identification developers and dividing developers with different permissions |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2012101077618A CN102663320A (en) | 2012-04-12 | 2012-04-12 | Method for terminal identification developers and dividing developers with different permissions |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102663320A true CN102663320A (en) | 2012-09-12 |
Family
ID=46772806
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2012101077618A Pending CN102663320A (en) | 2012-04-12 | 2012-04-12 | Method for terminal identification developers and dividing developers with different permissions |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102663320A (en) |
Cited By (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103324506A (en) * | 2013-06-24 | 2013-09-25 | 上海天奕达电子科技有限公司 | Method and mobile phone for controlling installation of Android applications |
CN103412767A (en) * | 2013-06-09 | 2013-11-27 | 百度国际科技(深圳)有限公司 | Method and system for recognizing and upgrading application version |
CN103530534A (en) * | 2013-09-23 | 2014-01-22 | 北京理工大学 | Android program ROOT authorization method based on signature verification |
CN103905390A (en) * | 2012-12-26 | 2014-07-02 | 联想(北京)有限公司 | Permission acquisition method, device, electronic equipment and system |
EP2804411A1 (en) * | 2013-05-13 | 2014-11-19 | Aspire Technology Limited | Method and system for authenticating an application for a mobile data processing terminal |
CN104156638A (en) * | 2014-06-06 | 2014-11-19 | 国家计算机网络与信息安全管理中心 | Implementation method of extended signature for Android system software |
CN104301331A (en) * | 2014-10-31 | 2015-01-21 | 北京思特奇信息技术股份有限公司 | Service interface permissions validation method and device |
CN105227545A (en) * | 2015-09-07 | 2016-01-06 | 上海联彤网络通讯技术有限公司 | The system and method that user and developer divide control is realized in intelligent operating platform |
CN105468413A (en) * | 2015-11-27 | 2016-04-06 | 北京指掌易科技有限公司 | Method and apparatus for supporting verification of application software certificate |
CN106886711A (en) * | 2015-12-15 | 2017-06-23 | 北京奇虎科技有限公司 | authority request response method and corresponding device |
WO2017124960A1 (en) * | 2016-01-21 | 2017-07-27 | 阿里巴巴集团控股有限公司 | Method and device for application program to access interface, and method and device for application program to request authorization |
CN107861798A (en) * | 2016-09-22 | 2018-03-30 | 百度在线网络技术(北京)有限公司 | The system-level operations method and device of application |
CN108363912A (en) * | 2018-02-28 | 2018-08-03 | 苏州国芯科技有限公司 | A kind of close guarantor's method and device of program code |
CN109829285A (en) * | 2018-12-03 | 2019-05-31 | 深圳市新国都支付技术有限公司 | A kind of digital signature method, device, equipment and storage medium |
CN109981873A (en) * | 2017-12-27 | 2019-07-05 | 珠海市君天电子科技有限公司 | A kind of address list permission open method, device and electronic equipment |
CN111324887A (en) * | 2020-02-25 | 2020-06-23 | 广东天波信息技术股份有限公司 | Installation control method and device for application program |
US10873466B2 (en) | 2015-11-06 | 2020-12-22 | Huawei International Pte. Ltd. | System and method for managing installation of an application package requiring high-risk permission access |
CN112560022A (en) * | 2020-12-03 | 2021-03-26 | 支付宝(杭州)信息技术有限公司 | System interface call detection method and device |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101969440A (en) * | 2010-10-28 | 2011-02-09 | 四川长虹电器股份有限公司 | Software certificate generating method |
CN102024124A (en) * | 2010-12-20 | 2011-04-20 | 中国联合网络通信集团有限公司 | Method, device and system for processing mobile widgets as well as client-side |
CN102035653A (en) * | 2010-11-30 | 2011-04-27 | 中国联合网络通信集团有限公司 | Controllable distributing method and system used in software examining and verifying stage |
CN102300065A (en) * | 2011-08-31 | 2011-12-28 | 四川长虹电器股份有限公司 | Security authentication method for android-platform-based smart television software |
-
2012
- 2012-04-12 CN CN2012101077618A patent/CN102663320A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101969440A (en) * | 2010-10-28 | 2011-02-09 | 四川长虹电器股份有限公司 | Software certificate generating method |
CN102035653A (en) * | 2010-11-30 | 2011-04-27 | 中国联合网络通信集团有限公司 | Controllable distributing method and system used in software examining and verifying stage |
CN102024124A (en) * | 2010-12-20 | 2011-04-20 | 中国联合网络通信集团有限公司 | Method, device and system for processing mobile widgets as well as client-side |
CN102300065A (en) * | 2011-08-31 | 2011-12-28 | 四川长虹电器股份有限公司 | Security authentication method for android-platform-based smart television software |
Cited By (27)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103905390B (en) * | 2012-12-26 | 2017-05-24 | 联想(北京)有限公司 | Permission acquisition method, device, electronic equipment and system |
CN103905390A (en) * | 2012-12-26 | 2014-07-02 | 联想(北京)有限公司 | Permission acquisition method, device, electronic equipment and system |
EP2804411A1 (en) * | 2013-05-13 | 2014-11-19 | Aspire Technology Limited | Method and system for authenticating an application for a mobile data processing terminal |
CN103412767A (en) * | 2013-06-09 | 2013-11-27 | 百度国际科技(深圳)有限公司 | Method and system for recognizing and upgrading application version |
CN103324506A (en) * | 2013-06-24 | 2013-09-25 | 上海天奕达电子科技有限公司 | Method and mobile phone for controlling installation of Android applications |
CN103530534B (en) * | 2013-09-23 | 2016-06-29 | 北京理工大学 | A kind of Android program ROOT authorization method based on signature verification |
CN103530534A (en) * | 2013-09-23 | 2014-01-22 | 北京理工大学 | Android program ROOT authorization method based on signature verification |
CN104156638A (en) * | 2014-06-06 | 2014-11-19 | 国家计算机网络与信息安全管理中心 | Implementation method of extended signature for Android system software |
CN104301331A (en) * | 2014-10-31 | 2015-01-21 | 北京思特奇信息技术股份有限公司 | Service interface permissions validation method and device |
CN105227545A (en) * | 2015-09-07 | 2016-01-06 | 上海联彤网络通讯技术有限公司 | The system and method that user and developer divide control is realized in intelligent operating platform |
US11637707B2 (en) | 2015-11-06 | 2023-04-25 | Huawei International Pte. Ltd. | System and method for managing installation of an application package requiring high-risk permission access |
US10873466B2 (en) | 2015-11-06 | 2020-12-22 | Huawei International Pte. Ltd. | System and method for managing installation of an application package requiring high-risk permission access |
CN105468413A (en) * | 2015-11-27 | 2016-04-06 | 北京指掌易科技有限公司 | Method and apparatus for supporting verification of application software certificate |
CN105468413B (en) * | 2015-11-27 | 2018-09-18 | 北京指掌易科技有限公司 | A kind of method and apparatus for supporting application software itself certificate to verify |
CN106886711A (en) * | 2015-12-15 | 2017-06-23 | 北京奇虎科技有限公司 | authority request response method and corresponding device |
WO2017124960A1 (en) * | 2016-01-21 | 2017-07-27 | 阿里巴巴集团控股有限公司 | Method and device for application program to access interface, and method and device for application program to request authorization |
US20190138698A1 (en) * | 2016-01-21 | 2019-05-09 | Alibaba Group Holding Limited | System and method for controlled access to application programming interfaces |
US10878066B2 (en) | 2016-01-21 | 2020-12-29 | Banma Zhixing Network (Hongkong) Co., Limited | System and method for controlled access to application programming interfaces |
CN106991298A (en) * | 2016-01-21 | 2017-07-28 | 阿里巴巴集团控股有限公司 | Access method, the authorization requests method and device of application program docking port |
CN107861798B (en) * | 2016-09-22 | 2019-06-14 | 北京小熊博望科技有限公司 | The system-level operations method and device of application |
CN107861798A (en) * | 2016-09-22 | 2018-03-30 | 百度在线网络技术(北京)有限公司 | The system-level operations method and device of application |
CN109981873A (en) * | 2017-12-27 | 2019-07-05 | 珠海市君天电子科技有限公司 | A kind of address list permission open method, device and electronic equipment |
CN108363912A (en) * | 2018-02-28 | 2018-08-03 | 苏州国芯科技有限公司 | A kind of close guarantor's method and device of program code |
CN109829285A (en) * | 2018-12-03 | 2019-05-31 | 深圳市新国都支付技术有限公司 | A kind of digital signature method, device, equipment and storage medium |
CN111324887A (en) * | 2020-02-25 | 2020-06-23 | 广东天波信息技术股份有限公司 | Installation control method and device for application program |
CN112560022A (en) * | 2020-12-03 | 2021-03-26 | 支付宝(杭州)信息技术有限公司 | System interface call detection method and device |
CN112560022B (en) * | 2020-12-03 | 2024-03-12 | 支付宝(杭州)信息技术有限公司 | Method and device for detecting system interface call |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102663320A (en) | Method for terminal identification developers and dividing developers with different permissions | |
CN108399329B (en) | Method for improving security of trusted application program | |
CN107463806B (en) | Signature and signature verification method for Android application program installation package | |
CN106991298B (en) | Access method of application program to interface, authorization request method and device | |
CN103888252A (en) | UID, PID, and APPID-based control application access permission method | |
CN110677376B (en) | Authentication method, related device and system and computer readable storage medium | |
CN101969440B (en) | Software certificate generating method | |
US7594108B2 (en) | Operator root certificates | |
CN106612183B (en) | Cross digital signature method and system for application software under domestic operating system | |
CN103677892A (en) | Authorization scheme to enable special privilege mode in secure electronic control unit | |
CN107729746B (en) | Installed application program tamper-proofing method and system based on digital signature | |
CN104753881A (en) | WebService security certification access control method based on software digital certificate and timestamp | |
CN103679005A (en) | Method to enable development mode of a secure electronic control unit | |
RU2011153984A (en) | TRUSTED AUTHORITY ADMINISTRATOR (TIM) | |
CA2632590A1 (en) | Method to verify the integrity of components on a trusted platform using integrity database services | |
KR20080097230A (en) | Trusted code groups | |
CN102340398A (en) | Security policy setting and determining method, and method and device for executing operation by application program | |
WO2017050186A1 (en) | Application permission management method and smart pos terminal | |
CN102244659A (en) | Execution method and apparatus of security policy script and security policy system | |
WO2017008728A1 (en) | Method and system for classifying development mode and product mode for terminal | |
WO2008001060A1 (en) | Revoking malware in a computing device | |
CN103560889A (en) | Precision identity authentication method between X509 digital certificate and certificate application | |
WO2018040972A1 (en) | Method and system for improving application security of payment terminal | |
CN105243311B (en) | Fingerprint information safe calling method, fingerprint information safe calling device and mobile terminal | |
Barrera et al. | Baton: Certificate agility for android's decentralized signing infrastructure |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20120912 |