CN106778208A - The access processing method and device of application program - Google Patents

The access processing method and device of application program Download PDF

Info

Publication number
CN106778208A
CN106778208A CN201611093519.4A CN201611093519A CN106778208A CN 106778208 A CN106778208 A CN 106778208A CN 201611093519 A CN201611093519 A CN 201611093519A CN 106778208 A CN106778208 A CN 106778208A
Authority
CN
China
Prior art keywords
application program
access
interface
kernel interface
authority
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611093519.4A
Other languages
Chinese (zh)
Inventor
杨斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen TCL New Technology Co Ltd
Original Assignee
Shenzhen TCL New Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen TCL New Technology Co Ltd filed Critical Shenzhen TCL New Technology Co Ltd
Priority to CN201611093519.4A priority Critical patent/CN106778208A/en
Priority to PCT/CN2016/112862 priority patent/WO2018098881A1/en
Publication of CN106778208A publication Critical patent/CN106778208A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of access processing method of application program.The access processing method of the application program includes:Detection currently calls access system kernel interface with the presence or absence of application program by system;When there is currently application program and call access system kernel interface by system, judge whether the application program has the authority of the access system kernel interface;When the application program is without the authority for accessing the system kernel interface, intercepts the system and call, to prevent the application program from accessing system kernel interface.The invention also discloses a kind of access process device of application program.The present invention can prevent unauthorized applications from accessing system kernel interface, improve system operation security.

Description

The access processing method and device of application program
Technical field
The present invention relates to application access safety field, more particularly to application program access processing method and device.
Background technology
With the popularization and application of intelligent terminal, increasing user is using intelligent terminal.On intelligent terminal, use Family can download various types of application programs with difference in functionality, such as instant messaging class application program, audio-visual class application Program, office class application program etc..Although the use of these application programs brings many facilities to our life, not Can guarantee that the absolute safety that application program is accessed.Such as, some application programs can stealthily call core network interface on backstage Access server, not only results in the loss of user network flow, can also be in the case where being allowed without user automatically system Interior private data information is sent to remote server, and then invades privacy of user.
In the prior art, security sweep is carried out to application program generally when application program is installed, scanning application program is It is no to have the despiteful interface interchange of hiding band, but this mode can only carry out once safety when application program is installed and sweep Retouch, if after the completion of application program installs scanning, further if backstage updates native codes by remotely accessing mode, Then still there is potential safety hazard.
The content of the invention
Access processing method and device it is a primary object of the present invention to provide a kind of application program, it is intended to solve existing In technology, application program carries out the technical problem that still there is potential safety hazard after security sweep.
To achieve the above object, the access processing method of a kind of application program that the present invention is provided, the application program Access processing method includes:
Detection currently calls access system kernel interface with the presence or absence of application program by system;
When there is currently application program by system call access system kernel interface when, whether judge the application program With the authority for accessing the system kernel interface;
When the application program is without the authority for accessing the system kernel interface, intercepts the system and call, with Prevent the application program from accessing system kernel interface.
Preferably, it is described when there is currently application program and call access system kernel interface by system, judge described The authority whether application program has the access system kernel interface includes:
When there is currently application program and call access system kernel interface by system, the body of the application program is obtained Part information, application program access the permissions mapping table of kernel interface;
According to the identity information, the permissions mapping table, judge whether the application program has and access system kernel The authority of interface.
Preferably, the access processing method of the application program also includes:
Detect whether there is the instruction of the modification permissions mapping table, if in the presence of generation authority modification early warning.
Preferably, it is described when the application program is without the authority for accessing the system kernel interface, intercept described System is called, and is included with preventing the application program from accessing system kernel interface:
When the application program is without the authority for accessing the system kernel interface, intercepts the system and call, with Prevent the application program from accessing system kernel interface, and generate interception early warning.
Preferably, it is described when there is currently application program and call access system kernel interface by system, judge described Whether application program includes after having the authority for accessing the system kernel interface:
When the application program has the authority for accessing the system kernel interface, according to preset Function Mapping table, Determine that the system calls corresponding kernel function, the kernel function is performed for calling.
Additionally, to achieve the above object, the present invention also provides a kind of access process device of application program, the application journey The access process device of sequence includes:
Detection module, currently call access system kernel interface by system with the presence or absence of application program for detecting;
Judge module, for when there is currently application program by system call access system kernel interface when, judge institute State whether application program has the authority for accessing the system kernel interface;
Processing module, for when the application program is without the authority for accessing the system kernel interface, intercepting institute The system of stating is called, to prevent the application program from accessing system kernel interface.
Preferably, the judge module includes:
Acquiring unit, for when there is currently application program by system call access system kernel interface when, obtain institute State the permissions mapping table that the identity information of application program, application program access kernel interface;
Judging unit, for according to the identity information, the permissions mapping table, judging whether the application program has Access the authority of system kernel interface.
Preferably, the detection module is additionally operable to:
Detect whether there is the instruction of the modification permissions mapping table, if in the presence of generation authority modification early warning.
Preferably, the processing module is specifically additionally operable to:
When the application program is without the authority for accessing the system kernel interface, intercepts the system and call, with Prevent the application program from accessing system kernel interface, and generate interception early warning.
Preferably, the processing module is additionally operable to:
When the application program has the authority for accessing the system kernel interface, according to preset Function Mapping table, Determine that the system calls corresponding kernel function, the kernel function is performed for calling.
In the present invention, when generally being run with despiteful application program, it is to realize a certain function or purpose, typically all can Call to access system kernel interface by system, and then potential safety hazard is caused to user.Therefore, can be by detecting whether exist Whether application program calls access system kernel interface by system, when it is present, then has access system to the application program The authority of kernel interface is judged, if the application program intercepts the system that the application program sends without corresponding authority Call, to prevent the application program unauthorized access system kernel interface.The present invention can carry out the base of security sweep in application program On plinth, further prevent unauthorized applications from accessing system kernel interface, and then the security that lifting system is run.
Brief description of the drawings
Fig. 1 is the schematic flow sheet of the embodiment of access processing method one of application program of the present invention;
Fig. 2 be application program of the present invention access processing method in the embodiment of Android system one space divide schematic diagram;
Fig. 3 is the refinement schematic flow sheet of step S20 in Fig. 1;
Fig. 4 is the high-level schematic functional block diagram of the embodiment of access process device one of application program of the present invention;
Fig. 5 is the refinement high-level schematic functional block diagram of judge module in Fig. 4.
The realization of the object of the invention, functional characteristics and advantage will be described further referring to the drawings in conjunction with the embodiments.
Specific embodiment
It should be appreciated that specific embodiment described herein is only used to explain the present invention, it is not intended to limit the present invention.
Core concept of the invention is:When generally being run with despiteful application program, it is to realize a certain function or mesh , typically can all call to access system kernel interface by system, and then potential safety hazard is caused to user.Therefore, the present invention In, specifically when application program calls access kernel by system, complete to intercept, and then fundamentally prevent the non-of application program Method is accessed, the security of lifting system operation.
Additionally, for ease of the present invention will be described, lower mask body is illustrated with Android system.
The present invention provides a kind of access processing method of application program.
Reference picture 1, Fig. 1 is the schematic flow sheet of the embodiment of access processing method one of application program of the present invention.In this reality Apply in example, the access processing method of application program includes:
Step S10, detection currently calls access system kernel interface with the presence or absence of application program by system;
Whole virtual address space is generally divided into two parts by Android system:User's space and kernel spacing.And advise It is fixed, user's space can not direct access kernel space, and kernel spacing can then access user's space.Drawn by such rank Point, can cause that kernel spacing is more stable, safe.But, if program process needs to access kernel or using in certain Kernel function, then generally need to call (System Call) to complete by system.In Android system, it is user that system is called The unique channel of space access kernel spacing.As shown in Figure 2.System call be kernel provide one group of function interface, it is caused The process run on user's space can be interacted and kernel between.
For example, consumer process calls some resources of access hardware devices or operating system etc. by system.Android system In all application programs when running, all visiting tall and erect system of paying one's respects can be called by Android system API API generation systems System kernel, such as network interface, file system interface, CPU frequency modulation interfaces etc..In the present embodiment, for application program by being System calls the type for accessing system kernel interface not limit, for example, network interface, file system interface, CPU frequency modulation interfaces etc..
Additionally, in the present embodiment, not limited for the mode that the system that detection application program is produced is called, with specific reference to reality Needs are configured.
Step S20, when there is currently application program by system call access system kernel interface when, judge the application Whether program has the authority for accessing the system kernel interface;
It is right to avoid the system from calling when the system for detecting the presence of application program generation is called in the present embodiment The system kernel interface answered performs corresponding kernel function, accordingly, it would be desirable to first determining whether the application program has accesses the system The authority of kernel interface.In the present embodiment, do not limited for judgment mode, such as, corresponding permissions mapping table can be pre-set and entered Row judges.
It should be further stated that, as shown in Fig. 2 in the present embodiment, the filtering letter carried especially by system kernel Several systems to all application programs are called and filtered, and then determine whether the application program has access corresponding system kernel The authority of interface.
Further, since filter function needs to be carried out under the privilege level pattern of Android system, therefore, to application program System call filtered before, it is necessary to by system model by user class patten transformation be privilege level pattern.Wherein, use Family class pattern and privilege level pattern are two kinds of level of security patterns of Android system, and usual all of application program is all run In user class pattern, and the system function of Android kernel then operates in privilege level pattern.Meanwhile, under privilege level pattern, Any system that filter function can scan any application program is called.
In the present embodiment, for user class patten transformation for the implementation of privilege level pattern is not limited.Such as, pass through Trap instruction generation system calls the instruction to trigger processor to interrupt, and then is privilege level mould by user class patten transformation Formula.
Step S30, when the application program is without the authority for accessing system kernel interface, intercepts the system and adjusts With to prevent the application program from accessing system kernel interface.
In the present embodiment, when it is determined that current application program is without the authority for accessing system kernel interface, then intercepting should System produced by application program is called, and then fundamentally prevents have despiteful application program access system kernel interface, So as to cause potential safety hazard.
In the present embodiment, the mode that the system produced for intercepting application program is called is not limited, such as, in kernel spacing In, when Android system is under privilege level pattern, the interception function pair unauthorized applications carried by system kernel System is called and intercepted.
In the present embodiment, when generally being run with despiteful application program, it is to realize a certain function or purpose, typically all Can call to access system kernel interface by system, and then potential safety hazard is caused to user.Therefore, can be by detecting whether to deposit Access system kernel interface is called by system in application program, when it is present, is to whether the application program has to access then The authority of kernel interface of uniting is judged, if the application program does not have corresponding authority, intercept that the application program sends is System is called, to prevent the application program unauthorized access system kernel interface.The present invention can carry out security sweep in application program On the basis of, further prevent unauthorized applications from accessing system kernel interface, and then the security that lifting system is run.
Reference picture 3, Fig. 3 is the refinement schematic flow sheet of step S20 in Fig. 1.In the present embodiment, above-mentioned steps S20 enters one Step includes:
Step S201, when there is currently application program and call access system kernel interface by system, obtain it is described should The permissions mapping table of kernel interface is accessed with the identity information of program, application program;
In the present embodiment, the identity information of the application program to obtaining is not limited, such as can be process PID, application program Title, application category, application program confidence level etc..For example, obtain application program identity information can be into Journey PID:1234, application name:A, application category:File management class, application program confidence level:Rank 3.
In the present embodiment, the permissions mapping table that application program accesses kernel interface can be previously according to the class of application program Not, the confidence level of application program, secret rank of kernel interface etc. are configured.
For example, the application program that the classification according to application program is set accesses the permissions mapping table of kernel interface, such as the institute of table 1 Show.
Table 1
Application category System kernel interface access rights
File management Interface A, B, C
Word processing Total interface
Picture presentation Interface A, B, C, D, E
For example, the application program that the confidence level according to application program is set accesses the permissions mapping table of kernel interface, such as table 2 It is shown:
Table 2
Application program confidence level System kernel interface access rights
Rank 1 Interface A, B, C
Rank 2 Interface A, B, C
Rank 3 Interface A, B, C, D, E
Step S202, according to the identity information, the permissions mapping table, judges whether the application program has and accesses The authority of system kernel interface.
In the present embodiment, if exist application program by system call access Android system kernel interface, get as Application program shown in table 1 and the mapping relations between the access rights of kernel interface, and get the identity letter of application program Breath, the identity information according to the application program learns that the application program belongs to picture presentation classification, then can determine whether that this should according to table 1 With program without the authority for accessing Android system kernel interface.
Further, in another embodiment of access processing method of application program of the present invention, based on the invention described above application The embodiment of access processing method one of program, in the present embodiment, includes after step S20:
When the application program has the authority for accessing the system kernel interface, according to preset Function Mapping table, Determine that the system calls corresponding kernel function, the kernel function is performed for calling.
In the present embodiment, if application program has the authority for accessing system kernel network interface, the application program is just Access system kernel network interface can only be called by system.
In an alternate embodiment of the present invention, if application program calls access system kernel network interface by system, and Judge that the application program has the authority for accessing system kernel network interface, then the corresponding kernel letter of calling system call number Number, to reach the purpose that the application program accesses system kernel network interface.System call number is that application program is adjusted by system Produced with when accessing system kernel.
In the present embodiment, when there is application program lawful authority to access system kernel interface, application program is by answering Called using system with DLL, and generation system call number, adjusted with the system by being found out in subsystem call table With a number corresponding Android system kernel function, so as to call the kernel function in Android system kernel, to realize application program System to Android system kernel interface is called.
Further, in another embodiment of access processing method of application program of the present invention, based on the invention described above application The embodiment of access processing method one of program, in the present embodiment, step S30 specifically also includes:
When the application program is without the authority for accessing system kernel interface, intercepts the system and call, and generate Intercept early warning.
In the present embodiment, when application program accesses system kernel without lawful authority, stop application program and access system The mode of system kernel is not limited, and can be that the application program is called by the system that API API is produced to intercept, This program process can also directly be killed.And kernel spacing return user's space is exited, system will produce invasion report And user, such as application name C are pushed to, in time T, Android system kernel interface is illegally called, prevented ", may be used also To send voice prompt prompting user.
Further, in another embodiment of access processing method of application program of the present invention, the access process side of application program Method also includes:
Detect whether there is the instruction of the modification permissions mapping table, if in the presence of generation authority modification early warning.
In the present embodiment, the mapping relations between application program and the access rights of kernel interface can be by preset Rule is formulated.For example, in an alternate embodiment of the present invention, presetting rule is:The application journey that only intelligent terminal is carried Sequence has the authority for accessing kernel interface, is accessed so as to the application program for only having its system to carry on the intelligent terminal just has The authority of kernel interface, other third party softwares on intelligent terminal are without the power for accessing system kernel interface Limit.
In the present embodiment, the mapping relations between application program and the access rights of kernel interface can also be pre- by user First formulate, in the present embodiment, the mapping that user is formulated between application program and the access rights of Android system kernel interface is closed The mode of system is not limited, such as function classification, confidence level of application program of title, application program according to application program etc. Formulated, the type to Android system kernel interface is not limited, for example network interface, file system interface, CPU frequency modulation interfaces Be could be arranged to without the authority of calling to Android system kernel interface Deng, application program, it is also possible to be set to that there is one kind Or various authority is called to Android system kernel interface.
In an alternate embodiment of the present invention, if the application program of user A entitled to formulate with kernel interface Mapping relations between access rights are:The application program has calls Android system core network interface authority, and this applies journey Sequence A just have call Android system core network interface authority.
In another alternative embodiment of the invention, if user connects to what the application program of file management classification was formulated with kernel Mouthful access rights between mapping relations be:The application program of file management classification has calls Android system kernel file system System interface authority, now, the application program of the All Files management category in Android system is respectively provided with calls Android system kernel File system interface authority.
In another alternative embodiment of the invention, if user formulates confidence level for the application program of rank 5 and kernel Mapping relations between the access rights of interface are:Confidence level calls Android system kernel CPU for the application program of rank 5 has The authority of frequency modulation interface and network interface, now, all confidence levels in Android system are that the application program of rank 5 is respectively provided with tune With Android system kernel CPU frequency modulation interface and the authority of network interface.
In the present embodiment, the mapping that user is formulated between application program and the access rights of Android system kernel interface is closed The scene of system is not limited.For example can be when application program is installed, or when application program is run.
In an alternate embodiment of the present invention, when application program is installed, an interface is ejected, should be answered so that user formulates With the mapping relations between the access rights of program and Android system kernel interface.
Further, in another alternative embodiment of the invention, under user class pattern, when certain application program uses system When system calls access system kernel, system is privilege level pattern by user class patten transformation by operation trap instruction, and is led to Cross and detect that the total interface that the application program is carried is called under privilege level pattern, according to the interface that the application program is carried Call the corresponding kernel interface inquiry user application program whether to have and call one or more kernels in these kernel interfaces The authority of interface.
Optionally, if user determines the access of the application program and Android system kernel interface when application program is installed Mapping relations between authority, then store the mapping relations, until user deletes the mapping relations manually for a long time.It is optional , if user every time using certain application program when all need to determine the application program and Android system kernel interface access rights it Between mapping relations, can be by the mapping relations interim storage, when user terminates use this time to the application program, closing should The mapping relations are automatically deleted after the process of application program.
In the present embodiment, after permissions mapping table generation, just the information to the permissions mapping table is monitored.When should The permissions mapping table is changed with program application, when application program submits to modification authority to ask, such as certain application before deleting Mapping relations or newly-increased mapping between certain application program and system kernel interface between program and system kernel interface are closed System, then generate a warning picture, points out user to need to carry out authentication, can be by password authentification, fingerprint authentication, face The modes such as portion's identification, only can just complete the operation of modification authority mapping table by certification;The permissions mapping table is not believed otherwise Breath makes modification.
In the present embodiment, by determining that the mapping between application program and the access rights of Android system kernel interface is closed System so that the peace that can be called in its extent of competence only can be just called with the application program for accessing system kernel interface authority Tall and erect system kernel interface, on the one hand gives user more preferable use feeling, on the other hand improves the security of Android kernel.
Further, the present invention provides a kind of access process device of application program.
Reference picture 4, Fig. 4 is the high-level schematic functional block diagram of the embodiment of access process device one of application program of the present invention. In the present embodiment, the access process device of application program includes:
Detection module 10, currently call access system kernel interface by system with the presence or absence of application program for detecting;
Whole virtual address space is generally divided into two parts by Android system:User's space and kernel spacing.And advise It is fixed, user's space can not direct access kernel space, and kernel spacing can then access user's space.Drawn by such rank Point, can cause that kernel spacing is more stable, safe.But, if program process needs to access kernel or using in certain Kernel function, then generally need to call (System Call) to complete by system.In Android system, it is user that system is called The unique channel of space access kernel spacing.As shown in Figure 2.System call be kernel provide one group of function interface, it is caused The process run on user's space can be interacted and kernel between.
For example, consumer process calls some resources of access hardware devices or operating system etc. by system.Android system In all application programs when running, all visiting tall and erect system of paying one's respects can be called by Android system API API generation systems System kernel, such as network interface, file system interface, CPU frequency modulation interfaces etc..In the present embodiment, for application program by being System calls the type for accessing system kernel interface not limit, for example, network interface, file system interface, CPU frequency modulation interfaces etc..
Additionally, in the present embodiment, not limited for the mode that the system that detection application program is produced is called, with specific reference to reality Needs are configured.
Judge module 20, for when there is currently application program by system call access system kernel interface when, judge Whether the application program has the authority for accessing system kernel interface;
It is right to avoid the system from calling when the system for detecting the presence of application program generation is called in the present embodiment The system kernel interface answered performs corresponding kernel function, accordingly, it would be desirable to first determining whether the application program has accesses the system The authority of kernel interface.In the present embodiment, do not limited for judgment mode, such as, corresponding permissions mapping table can be pre-set and entered Row judges.
It should be further stated that, as shown in Fig. 2 in the present embodiment, the filtering letter carried especially by system kernel Several systems to all application programs are called and filtered, and then determine whether the application program has access corresponding system kernel The authority of interface.
Further, since filter function needs to be carried out under the privilege level pattern of Android system, therefore, to application program System call filtered before, it is necessary to by system model by user class patten transformation be privilege level pattern.Wherein, use Family class pattern and privilege level pattern are two kinds of level of security patterns of Android system, and usual all of application program is all run In user class pattern, and the system function of Android kernel then operates in privilege level pattern.Meanwhile, under privilege level pattern, Any system that filter function can scan any application program is called.
In the present embodiment, for user class patten transformation for the implementation of privilege level pattern is not limited.Such as, pass through Trap instruction generation system calls the instruction to trigger processor to interrupt, and then is privilege level mould by user class patten transformation Formula.
Processing module 30, for when the application program is without the authority for accessing system kernel interface, intercepting described System is called, to prevent the application program from accessing system kernel interface.
In the present embodiment, when it is determined that current application program is without the authority for accessing system kernel interface, then intercepting should System produced by application program is called, and then fundamentally prevents have despiteful application program access system kernel interface, So as to cause potential safety hazard.
In the present embodiment, the mode that the system produced for intercepting application program is called is not limited, such as, in kernel spacing In, when Android system is under privilege level pattern, the interception function pair unauthorized applications carried by system kernel System is called and intercepted.
In the present embodiment, when generally being run with despiteful application program, it is to realize a certain function or purpose, typically all Can call to access system kernel interface by system, and then potential safety hazard is caused to user.Therefore, can be by detecting whether to deposit Access system kernel interface is called by system in application program, when it is present, is to whether the application program has to access then The authority of kernel interface of uniting is judged, if the application program does not have corresponding authority, intercept that the application program sends is System is called, to prevent the application program unauthorized access system kernel interface.The present invention can carry out security sweep in application program On the basis of, further prevent unauthorized applications from accessing system kernel interface, and then the security that lifting system is run.
Reference picture 5, Fig. 5 is the refinement high-level schematic functional block diagram of judge module in Fig. 4, in the present embodiment judge module 20 Including:
Acquiring unit 201, for when there is currently application program by system call access system kernel interface when, obtain The identity information of the application program, application program access the permissions mapping table of kernel interface;
In the present embodiment, the identity information of the application program to obtaining is not limited, such as can be process PID, application program Title, application category, application program confidence level etc..For example, obtain application program identity information can be into Journey PID:1234, application name:A, application category:File management class, application program confidence level:Rank 3.
In the present embodiment, the permissions mapping table that application program accesses kernel interface can be previously according to the class of application program Not, the confidence level of application program, secret rank of kernel interface etc. are configured.
For example, the application program that the classification according to application program is set accesses the permissions mapping table of kernel interface, such as the institute of table 3 Show.
Table 3
Application category System kernel interface access rights
File management Interface A, B, C
Word processing Total interface
Picture presentation Interface A, B, C, D, E
For example, the application program that the confidence level according to application program is set accesses the permissions mapping table of kernel interface, such as table 4 It is shown:
Table 4
Application program confidence level System kernel interface access rights
Rank 1 Interface A, B, C
Rank 2 Interface A, B, C
Rank 3 Interface A, B, C, D, E
Judging unit 202, for according to the identity information, the permissions mapping table, whether judging the application program With the authority for accessing system kernel interface.
In the present embodiment, if exist application program by system call access Android system kernel interface, get as Application program shown in table 3 and the mapping relations between the access rights of kernel interface, and get the identity letter of application program Breath, the identity information according to the application program learns that the application program belongs to picture presentation classification, then can determine whether that this should according to table 3 With program without the authority for accessing Android system kernel interface.
Further, in another embodiment of access process device of application program of the present invention, based on the invention described above application The embodiment of access process device one of program, in the present embodiment, processing module 30 is additionally operable to:
When the application program has the authority for accessing the system kernel interface, according to preset Function Mapping table, Determine that the system calls corresponding kernel function, the kernel function is performed for calling.
In the present embodiment, if application program has the authority for accessing system kernel network interface, the application program is just Access system kernel network interface can only be called by system.
In an alternate embodiment of the present invention, if application program calls access system kernel network interface by system, and Judge that the application program has the authority for accessing system kernel network interface, then the corresponding kernel letter of calling system call number Number, to reach the purpose that the application program accesses system kernel network interface.System call number is that application program is adjusted by system Produced with when accessing system kernel.
In the present embodiment, when there is application program lawful authority to access system kernel interface, application program is by answering Called using system with DLL, and generation system call number, adjusted with the system by being found out in subsystem call table With a number corresponding Android system kernel function, so as to call the kernel function in Android system kernel, to realize application program System to Android system kernel interface is called.
Further, in another embodiment of access process device of application program of the present invention, based on the invention described above application The embodiment of access process device one of program, in the present embodiment, processing module 30 is specifically additionally operable to:
When the application program is without the authority for accessing system kernel interface, intercepts the system and call, and generate Intercept early warning.
In the present embodiment, when application program accesses system kernel without lawful authority, stop application program and access system The mode of system kernel is not limited, and can be that the application program is called by the system that API API is produced to intercept, This program process can also directly be killed.And kernel spacing return user's space is exited, system will produce invasion report And user, such as application name C are pushed to, in time T, Android system kernel interface is illegally called, prevented ", may be used also To send voice prompt prompting user.
Further, in another embodiment of access process device of application program of the present invention, based on the invention described above application The embodiment of access process device one of program, in the present embodiment, detection module 10 is additionally operable to:
Detect whether there is the instruction of the modification permissions mapping table, if in the presence of generation authority modification early warning.
In the present embodiment, the mapping relations between application program and the access rights of kernel interface can be by preset Rule is formulated.For example, in an alternate embodiment of the present invention, presetting rule is:The application journey that only intelligent terminal is carried Sequence has the authority for accessing kernel interface, is accessed so as to the application program for only having its system to carry on the intelligent terminal just has The authority of kernel interface, other third party softwares on intelligent terminal are without the power for accessing system kernel interface Limit.
In the present embodiment, the mapping relations between application program and the access rights of kernel interface can also be pre- by user First formulate, in the present embodiment, the mapping that user is formulated between application program and the access rights of Android system kernel interface is closed The mode of system is not limited, such as function classification, confidence level of application program of title, application program according to application program etc. Formulated, the type to Android system kernel interface is not limited, for example network interface, file system interface, CPU frequency modulation interfaces Be could be arranged to without the authority of calling to Android system kernel interface Deng, application program, it is also possible to be set to that there is one kind Or various authority is called to Android system kernel interface.
In an alternate embodiment of the present invention, if the application program of user A entitled to formulate with kernel interface Mapping relations between access rights are:The application program has calls Android system core network interface authority, and this applies journey Sequence A just have call Android system core network interface authority.
In another alternative embodiment of the invention, if user connects to what the application program of file management classification was formulated with kernel Mouthful access rights between mapping relations be:The application program of file management classification has calls Android system kernel file system System interface authority, now, the application program of the All Files management category in Android system is respectively provided with calls Android system kernel File system interface authority.
In another alternative embodiment of the invention, if user formulates confidence level for the application program of rank 5 and kernel Mapping relations between the access rights of interface are:Confidence level calls Android system kernel CPU for the application program of rank 5 has The authority of frequency modulation interface and network interface, now, all confidence levels in Android system are that the application program of rank 5 is respectively provided with tune With Android system kernel CPU frequency modulation interface and the authority of network interface.
In the present embodiment, the mapping that user is formulated between application program and the access rights of Android system kernel interface is closed The scene of system is not limited.For example can be when application program is installed, or when application program is run.
In an alternate embodiment of the present invention, when application program is installed, an interface is ejected, should be answered so that user formulates With the mapping relations between the access rights of program and Android system kernel interface.
Further, in another alternative embodiment of the invention, under user class pattern, when certain application program uses system When system calls access system kernel, system is privilege level pattern by user class patten transformation by operation trap instruction, and is led to Cross and detect that the total interface that the application program is carried is called under privilege level pattern, according to the interface that the application program is carried Call the corresponding kernel interface inquiry user application program whether to have and call one or more kernels in these kernel interfaces The authority of interface.
Optionally, if user determines the access of the application program and Android system kernel interface when application program is installed Mapping relations between authority, then store the mapping relations, until user deletes the mapping relations manually for a long time.It is optional , if user every time using certain application program when all need to determine the application program and Android system kernel interface access rights it Between mapping relations, can be by the mapping relations interim storage, when user terminates use this time to the application program, closing should The mapping relations are automatically deleted after the process of application program.
In the present embodiment, after permissions mapping table generation, just the information to the permissions mapping table is monitored.Answering When changing the permissions mapping table with program application and submitting to modification authority to ask, such as certain application program and system before deleting Mapping relations or newly-increased mapping relations between certain application program and system kernel interface between kernel interface, then generate one Individual warning picture, points out user to need to carry out authentication, can be by the side such as password authentification, fingerprint authentication, face recognition Formula, only can just complete the operation of modification authority mapping table by certification;Otherwise modification is not made to the permissions mapping table information.
In the present embodiment, by determining that the mapping between application program and the access rights of Android system kernel interface is closed System so that the peace that can be called in its extent of competence only can be just called with the application program for accessing system kernel interface authority Tall and erect system kernel interface, on the one hand gives user more preferable use feeling, on the other hand improves the security of Android kernel.
The preferred embodiments of the present invention are these are only, the scope of the claims of the invention is not thereby limited, it is every to utilize this hair Equivalent structure or equivalent flow conversion that bright specification and accompanying drawing content are made, or directly or indirectly it is used in other related skills Art field, is included within the scope of the present invention.

Claims (10)

1. a kind of access processing method of application program, it is characterised in that the access processing method of the application program includes:
Detection currently calls access system kernel interface with the presence or absence of application program by system;
When there is currently application program by system call access system kernel interface when, judge whether the application program has Access the authority of the system kernel interface;
When the application program is without the authority for accessing the system kernel interface, intercepts the system and call, to prevent The application program accesses system kernel interface.
2. the access processing method of application program as claimed in claim 1, it is characterised in that described there is currently applies journey When sequence calls access system kernel interface by system, judge whether the application program has and access the system kernel interface Authority include:
When there is currently application program and call access system kernel interface by system, the identity letter of the application program is obtained Breath, application program access the permissions mapping table of kernel interface;
According to the identity information, the permissions mapping table, judge whether the application program has and access system kernel interface Authority.
3. the access processing method of application program as claimed in claim 2, it is characterised in that at the access of the application program Reason method also includes:
Detect whether there is the instruction of the modification permissions mapping table, if in the presence of generation authority modification early warning.
4. the access processing method of application program as claimed in claim 1, it is characterised in that it is described when the application program not During with the authority for accessing the system kernel interface, intercept the system and call, to prevent the application program from accessing system Kernel interface includes:
When the application program is without the authority for accessing the system kernel interface, intercepts the system and call, to prevent The application program accesses system kernel interface, and generates interception early warning.
5. the access processing method of the application program as any one of claim 1-4, it is characterised in that described when current When there is application program and calling access system kernel interface by system, judge whether the application program has the access system Include after the authority of system kernel interface:
When the application program has the authority for accessing the system kernel interface, according to preset Function Mapping table, it is determined that The system calls corresponding kernel function, and the kernel function is performed for calling.
6. the access process device of a kind of application program, it is characterised in that the access process device of the application program includes:
Detection module, currently call access system kernel interface by system with the presence or absence of application program for detecting;
Judge module, for when there is currently application program and call access system kernel interface by system, judge it is described should Whether there is the authority for accessing the system kernel interface with program;
Processing module, for when the application program is without the authority for accessing the system kernel interface, intercepting the system System is called, to prevent the application program from accessing system kernel interface.
7. the access process device of application program as claimed in claim 6, it is characterised in that the judge module includes:
Acquiring unit, for when there is currently application program and call access system kernel interface by system, obtain it is described should The permissions mapping table of kernel interface is accessed with the identity information of program, application program;
Judging unit, accesses for according to the identity information, the permissions mapping table, judging whether the application program has The authority of system kernel interface.
8. the access process device of application program as claimed in claim 7, it is characterised in that the detection module is additionally operable to:
Detect whether there is the instruction of the modification permissions mapping table, if in the presence of generation authority modification early warning.
9. the access process device of application program as claimed in claim 6, it is characterised in that the processing module is specifically also used In:
When the application program is without the authority for accessing the system kernel interface, intercepts the system and call, to prevent The application program accesses system kernel interface, and generates interception early warning.
10. the access process device of the application program as any one of claim 6-9, it is characterised in that the treatment Module is additionally operable to:
When the application program has the authority for accessing the system kernel interface, according to preset Function Mapping table, it is determined that The system calls corresponding kernel function, and the kernel function is performed for calling.
CN201611093519.4A 2016-12-01 2016-12-01 The access processing method and device of application program Pending CN106778208A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201611093519.4A CN106778208A (en) 2016-12-01 2016-12-01 The access processing method and device of application program
PCT/CN2016/112862 WO2018098881A1 (en) 2016-12-01 2016-12-29 Access processing method and device for application

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611093519.4A CN106778208A (en) 2016-12-01 2016-12-01 The access processing method and device of application program

Publications (1)

Publication Number Publication Date
CN106778208A true CN106778208A (en) 2017-05-31

Family

ID=58882696

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611093519.4A Pending CN106778208A (en) 2016-12-01 2016-12-01 The access processing method and device of application program

Country Status (2)

Country Link
CN (1) CN106778208A (en)
WO (1) WO2018098881A1 (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107679412A (en) * 2017-09-15 2018-02-09 福建星瑞格软件有限公司 A kind of data interception storehouse accesses the method and device of data
CN110276209A (en) * 2019-06-28 2019-09-24 维沃移动通信有限公司 A kind of alarm method and mobile terminal
CN110287694A (en) * 2019-06-26 2019-09-27 维沃移动通信有限公司 Application management method, mobile terminal and storage medium
CN111079135A (en) * 2019-11-27 2020-04-28 浪潮商用机器有限公司 Kernel access method, device and medium
CN111083541A (en) * 2019-12-30 2020-04-28 深圳Tcl数字技术有限公司 Interface calling method and device, smart television and readable storage medium
CN111124506A (en) * 2019-11-12 2020-05-08 中国电子科技集团公司第三十研究所 Operation card driving implementation method based on application layer
CN112084490A (en) * 2020-09-09 2020-12-15 南京烽火星空通信发展有限公司 Method and system for realizing protection of software source code based on Linux kernel calling
CN112163130A (en) * 2020-10-28 2021-01-01 河北时代电子有限公司 Access processing method for social security data query
CN112199662A (en) * 2020-12-09 2021-01-08 江苏东大集成电路系统工程技术有限公司 Permission verification system based on self-adaptive plug-in

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109871287A (en) * 2018-12-15 2019-06-11 中国平安人寿保险股份有限公司 Interface call method, device, computer installation and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102542182A (en) * 2010-12-15 2012-07-04 苏州凌霄科技有限公司 Device and method for controlling mandatory access based on Windows platform
CN103268451A (en) * 2013-06-08 2013-08-28 上海斐讯数据通信技术有限公司 Dynamic permission management system based on mobile terminal
US8621624B2 (en) * 2008-06-17 2013-12-31 Electronics And Telecommunications Research Institute Apparatus and method for preventing anomaly of application program
CN103593238A (en) * 2012-08-16 2014-02-19 腾讯科技(深圳)有限公司 Method and device for controlling invocation of application programming interfaces
CN104680084A (en) * 2015-03-20 2015-06-03 北京瑞星信息技术有限公司 Method and system for protecting user privacy in computer
CN105701415A (en) * 2016-01-04 2016-06-22 上海斐讯数据通信技术有限公司 Kernel authority management system and method of mobile terminal

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8621624B2 (en) * 2008-06-17 2013-12-31 Electronics And Telecommunications Research Institute Apparatus and method for preventing anomaly of application program
CN102542182A (en) * 2010-12-15 2012-07-04 苏州凌霄科技有限公司 Device and method for controlling mandatory access based on Windows platform
CN103593238A (en) * 2012-08-16 2014-02-19 腾讯科技(深圳)有限公司 Method and device for controlling invocation of application programming interfaces
CN103268451A (en) * 2013-06-08 2013-08-28 上海斐讯数据通信技术有限公司 Dynamic permission management system based on mobile terminal
CN104680084A (en) * 2015-03-20 2015-06-03 北京瑞星信息技术有限公司 Method and system for protecting user privacy in computer
CN105701415A (en) * 2016-01-04 2016-06-22 上海斐讯数据通信技术有限公司 Kernel authority management system and method of mobile terminal

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107679412B (en) * 2017-09-15 2021-05-18 福建星瑞格软件有限公司 Method and device for intercepting database access data
CN107679412A (en) * 2017-09-15 2018-02-09 福建星瑞格软件有限公司 A kind of data interception storehouse accesses the method and device of data
CN110287694A (en) * 2019-06-26 2019-09-27 维沃移动通信有限公司 Application management method, mobile terminal and storage medium
CN110287694B (en) * 2019-06-26 2021-08-20 维沃移动通信有限公司 Application program management method, mobile terminal and storage medium
CN110276209A (en) * 2019-06-28 2019-09-24 维沃移动通信有限公司 A kind of alarm method and mobile terminal
CN110276209B (en) * 2019-06-28 2022-01-28 维沃移动通信有限公司 Alarm method and mobile terminal
CN111124506A (en) * 2019-11-12 2020-05-08 中国电子科技集团公司第三十研究所 Operation card driving implementation method based on application layer
CN111079135A (en) * 2019-11-27 2020-04-28 浪潮商用机器有限公司 Kernel access method, device and medium
CN111083541A (en) * 2019-12-30 2020-04-28 深圳Tcl数字技术有限公司 Interface calling method and device, smart television and readable storage medium
CN112084490A (en) * 2020-09-09 2020-12-15 南京烽火星空通信发展有限公司 Method and system for realizing protection of software source code based on Linux kernel calling
CN112163130A (en) * 2020-10-28 2021-01-01 河北时代电子有限公司 Access processing method for social security data query
CN112199662B (en) * 2020-12-09 2021-02-19 江苏东大集成电路系统工程技术有限公司 Permission verification system based on self-adaptive plug-in
CN112199662A (en) * 2020-12-09 2021-01-08 江苏东大集成电路系统工程技术有限公司 Permission verification system based on self-adaptive plug-in

Also Published As

Publication number Publication date
WO2018098881A1 (en) 2018-06-07

Similar Documents

Publication Publication Date Title
CN106778208A (en) The access processing method and device of application program
CN104462978B (en) A kind of method and apparatus of application program rights management
EP2562673B1 (en) Apparatus and method for securing mobile terminal
DE112012001389T5 (en) Secure execution of an unsecured app on a device
DE112015003902T5 (en) Enforce service policies in embedded UICC cards
CN104361281B (en) A kind of solution of Android platform phishing attack
CN110534107A (en) Sound control method, device, system and the electronic equipment of smart machine
CN104462889A (en) Application authority management method and device
CN103136472A (en) Method and mobile device of stopping application program to steal privacy
WO2014012500A1 (en) Method and device for processing messages
US9455985B2 (en) Method for secure key injection with biometric sensors
CN106330958A (en) Secure accessing method and device
CN105847303A (en) Verification method and system of intelligent access control unit
US9801061B2 (en) Multi-factor user authentication based on decoy security questions
US9977924B2 (en) Method and device for providing notification indicating loss of terminal
CN105847451A (en) Method and system for controlling intelligent access control unit by using mobile terminal
CN105915544A (en) Intelligent entrance guard management method and intelligent entrance guard system
CN105869255A (en) Intelligent access control method and system based on mobile terminal
CN107566375B (en) Access control method and device
CN110766850B (en) Visitor information management method, access control system, server and storage medium
CN116127485A (en) Encryption method for database data, storage medium and computer equipment
KR100832804B1 (en) Database security system and method based on profiling
CN105678137A (en) Method and device for identity recognition
CN105703909A (en) Authentication method and electronic equipment
CN108694329A (en) A kind of mobile intelligent terminal security incident based on software and hardware combining is credible record system and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170531