CN113094698A - Authority management method in android application virtualization environment - Google Patents

Authority management method in android application virtualization environment Download PDF

Info

Publication number
CN113094698A
CN113094698A CN202110428023.2A CN202110428023A CN113094698A CN 113094698 A CN113094698 A CN 113094698A CN 202110428023 A CN202110428023 A CN 202110428023A CN 113094698 A CN113094698 A CN 113094698A
Authority
CN
China
Prior art keywords
value
range
time
limit
active
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110428023.2A
Other languages
Chinese (zh)
Other versions
CN113094698B (en
Inventor
徐宏
王家良
徐赟
华红锋
吴剑锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Tiankuan Technology Co ltd
Original Assignee
Hangzhou Tiankuan Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Tiankuan Technology Co ltd filed Critical Hangzhou Tiankuan Technology Co ltd
Priority to CN202110428023.2A priority Critical patent/CN113094698B/en
Publication of CN113094698A publication Critical patent/CN113094698A/en
Application granted granted Critical
Publication of CN113094698B publication Critical patent/CN113094698B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/033Test or assess software
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2135Metering

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a permission management method in an android application virtualization environment, which comprises the steps that firstly, when a user needs to operate a demand control, the source of the demand control can be automatically checked, a reduction value is automatically defined according to a check result, then after the user calls the corresponding demand control, a priority value Yx needs to be input, then operation associated data of the corresponding demand control can be automatically obtained, a computing power base number, a process base number and an active base number are obtained, and an upper limit is determined according to the computing power base number, the process base number and the active base number to obtain a computing power range, a process range and an active range; then, the running of the demand control in the virtual environment is monitored, and the real-time computing power, the real-time association process and the real-time activation times of the demand control are obtained in real time; monitoring the limit reaching situation and the limit exceeding situation of all indexes; and calculating a limit value based on the situations, and finally defining the authority of the demand control according to the limit value, and automatically stopping the operation of the demand control to a certain extent.

Description

Authority management method in android application virtualization environment
Technical Field
The invention belongs to the field of authority management, relates to a virtual environment equipment operation management technology, and particularly relates to an authority management method in an android application virtualization environment.
Background
The publication No. CN112269639A discloses a rights management method for virtual devices, which solves the security risk problem, the flexibility problem of rights control, and the priority problem of virtual device usage that are brought to sharing devices when sharing device virtualization capabilities among intelligent devices in the conventional technology. The virtual equipment authority management is refined, and the virtualization capability of the sharing equipment is described for the requesting equipment through the virtual equipment description table; maintaining the record of the authorization equipment and the use range of the virtual equipment by the authorization equipment through an authority management description table; and realizing the use authority management of the virtual equipment through the virtual equipment state table and the virtual equipment priority use range. The invention is suitable for intelligent equipment.
Patent with publication number CN107391028A also discloses a method and device for controlling virtual volume permissions, which relate to the technical field of cloud computing and are used for improving the security of user data under virtualization deployment. The method comprises the following steps: the virtualization management platform receives a request for using a virtual volume sent by a user; the virtualization management platform allocating a virtual volume to the user based on the request; the virtual volume comprises an authority storage space, check information is recorded in the authority storage space, the check information and the user have a unique corresponding relation, and the check information is used for verifying the authority of any user before any user operates the virtual volume.
However, both of them are defined based on the authority of the virtual environment for the user, but there is no reasonable authority management way for the program running in the virtual environment, and there is no unexpected situation that the running of different software is violated, or the running of redundant controls is stolen, which results in the running of the virtual environment, thereby providing a solution based on this.
Disclosure of Invention
The invention aims to provide a permission management method in an android application virtualization environment.
The purpose of the invention can be realized by the following technical scheme:
a method for managing authority in an android application virtualization environment specifically comprises the following steps:
the method comprises the following steps: when a user needs to operate the requirement control, the source of the requirement control is automatically checked, and the reduction value Zs is automatically defined according to the check result;
step two: after a user calls a corresponding demand control, a priority value Yx needs to be input, and the value of the priority value satisfies 0< Yx < 1;
step three: acquiring running associated data of a corresponding requirement control to obtain a computing power base, a process base and an active base;
step four: determining an upper limit according to the computing power base number, the process base number and the active base number to obtain a computing power range, a process range and an active range;
step five: starting the running of a demand control in the virtual environment;
step six: acquiring real-time computing power, real-time association process and real-time activation times of the required control in real time;
step seven: then acquiring the times of reaching the computing power range corresponding to the real-time computing power and the duration time corresponding to each time, marking the times as reaching limit times, and accumulating the duration time to obtain a reaching limit value;
acquiring the times of reaching the process range of the corresponding real-time association process and the duration time of each time, marking the times as reaching limit times II, and accumulating the duration time to obtain a reaching limit value II;
acquiring the number of times that the corresponding real-time active times reach the active range and the duration time corresponding to each time, marking the number of times as a third reaching time limit, and accumulating the duration time to obtain a third reaching time limit value;
step eight: when any index exceeds the limit, automatically obtaining a doubling proportion, wherein the doubling proportion is equal to the number of doubling bases multiplied by the number of times of exceeding the limit; the doubling base number is a preset value;
step nine: calculating a limit value by using a formula, specifically:
a limit value { (number of times of reaching limit + number of times of reaching limit two + number of times of reaching limit three) × 0.437+0.563 [ (value of time of reaching limit one + value of time of reaching limit two + value of time of reaching limit three) } multiplication radix;
step ten: defining the authority of the required control according to the limit value;
the specific way of authority definition is as follows: when the threshold value is less than X1, early warning information is automatically generated, a window is automatically popped up to remind a user to select to continue executing the corresponding demand control, and the user can interrupt the execution of the demand control at the moment;
when the X1 is not more than the threshold value < X2, the execution of the corresponding demand control is automatically called and stopped;
when the combined limit value is larger than or equal to X2, the operation of the required space is automatically called and stopped, and when the corresponding required control is once in the condition, the ranges of the calculation force range, the process range and the active range are automatically reduced by twenty percent of the maximum value of the corresponding range; when the maximum value of any range of the calculation force range, the process range and the active range is zero, the operation of the corresponding requirement control is directly forbidden.
Further, the requirement control is corresponding software and program which the user needs to run by means of the virtual environment.
Further, the specific way of defining the reduction value Zs according to the safety verification result is as follows:
when the source is safe, defining a reduction value Zs as 1;
when the source is unknown, the reduction value Zs is defined to be 0.85;
when a security threat exists in the source, the reduction value Zs is defined to be 0.35.
Further, a specific acquisition method of the operation associated data is as follows:
s1: acquiring an operation record corresponding to a demand control, acquiring a calculation force demand corresponding to the demand control in each operation in the last half year, and marking the calculation force demand as Sli, wherein i is 1.. n; evaluating the calculation power demand to obtain a calculation power base number;
s2: acquiring the number of associated processes corresponding to the requirement control in each running process in the last half year, wherein the number of the associated processes is the number of other processes which need to be assisted when the corresponding requirement control runs; processing the associated process number by the aid of a high-low evaluation principle, and marking the obtained numerical value as a process base number;
s3: and then acquiring the active times of the demand control in each running process, wherein the active times are defined in the following mode:
in the one-time running process, when the calculation power of the corresponding demand control is called to exceed thirty percent of the calculation power base number and the interruption times do not exceed T1 time, T1 is a preset numerical value and represents one time of activation, and the activation times of each running are obtained;
evaluating the activity times, and marking the obtained numerical value as an active base number;
s4: and obtaining a computing power base, a process base and an active base.
Further, the specific determination process for determining the upper limit is as follows:
s01: acquiring a reduced value Zs and a priority value Yx of a corresponding running control;
s02: acquiring a computing power base number, a process base number and an active base number;
s03: and (3) solving the upper limit of the calculation force according to the calculation force base number:
upper limit of calculated force (calculated force basis) (1+ Zs Yx); obtaining the calculation force range as the calculation force base number-calculation force upper limit;
s04: sequentially substituting the process base number and the active base number into the formula of the step S03 to obtain a process range and an active range;
s05: and obtaining a calculation force range, a progress range and an active range.
Further, the specific manner of high-low scoring is as follows:
sequencing the Sli from large to small;
taking values from the first position until the ratio of the number of the values to the total number is B1, calculating the average value of the values, and marking the average value as an apparent value;
taking values from the last name until the ratio of the number of the values to the total number is B1, calculating the average value of the values, and marking the average value as an under-view value; b1 and B2 are preset values and satisfy B1+ B2<1, and B1 is not more than B2;
and solving the mean value of the upward-looking value and the downward-looking value to obtain the calculation power base number.
The invention has the beneficial effects that:
firstly, when a user needs to operate a demand control, automatically verifying a demand control source, automatically defining a reduction value according to a verification result, then, after the user calls a corresponding demand control, inputting a priority value Yx, then, automatically acquiring operation associated data of the corresponding demand control to obtain a computing power base number, a process base number and an active base number, and determining an upper limit according to the computing power base number, the process base number and the active base number to obtain a computing power range, a process range and an active range;
then, the running of the demand control in the virtual environment is monitored, and the real-time computing power, the real-time association process and the real-time activation times of the demand control are obtained in real time; monitoring the limit reaching situation and the limit exceeding situation of all indexes; and calculating a limit value based on the conditions, and finally defining the authority of the demand control according to the limit value, and automatically stopping the operation of the demand control to a certain extent, even forbidding the operation of the related demand control, thereby avoiding the illegal operation of the demand control. The invention is simple, effective and easy to use.
Detailed Description
A method for managing authority in an android application virtualization environment specifically comprises the following steps:
the method comprises the following steps: when a user needs to operate the requirement control, the source of the requirement control is automatically checked, and the reduction value Zs is automatically defined according to the check result; the requirement control is corresponding software or a program which needs to run by virtue of a virtual environment;
the verification mode is to store the safety of a corresponding source in a database by means of the prior art; defining a reduction value Zs according to the safety check result:
when the source is safe, defining a reduction value Zs as 1;
when the source is unknown, the reduction value Zs is defined to be 0.85;
when the source has a security threat, defining a reduction value Zs of 0.35;
step two: after a user calls a corresponding demand control, a priority value Yx needs to be input, and the specific value of the priority value satisfies 0< Yx < 1;
step three: the method for acquiring the operation associated data of the corresponding requirement control comprises the following steps:
s1: acquiring an operation record corresponding to a demand control, acquiring a calculation force demand corresponding to the demand control in each operation in the last half year, and marking the calculation force demand as Sli, wherein i is 1.. n; the calculation power demand is evaluated in a high-low mode, and the specific high-low evaluation mode is as follows:
sequencing the Sli from large to small;
taking values from the first position until the ratio of the number of the values to the total number is B1, calculating the average value of the values, and marking the average value as an apparent value;
taking values from the last name until the ratio of the number of the values to the total number is B1, calculating the average value of the values, and marking the average value as an under-view value; b1 and B2 are preset values and satisfy B1+ B2<1, and B1 is not more than B2;
calculating the mean value of the upper vision value and the lower vision value to obtain the calculation power base number;
s2: acquiring the number of associated processes corresponding to the requirement control in each running process in the last half year, wherein the number of the associated processes is the number of other processes which need to be assisted when the corresponding requirement control runs; processing the associated process number by the aid of a high-low evaluation principle, and marking the obtained numerical value as a process base number;
s3: and then acquiring the active times of the demand control in each running process, wherein the active times are defined in the following mode:
in the one-time running process, when the calculation power of the corresponding demand control is called to exceed thirty percent of the calculation power base number and the interruption times do not exceed T1 time, T1 is a preset numerical value and represents one time of activation, and the activation times of each running are obtained;
evaluating the activity times, and marking the obtained numerical value as an active base number;
s4: obtaining a computing power base number, a process base number and an active base number;
step four: and determining an upper limit according to the computing power base number, the process base number and the active base number, wherein the specific determination process comprises the following steps:
s01: acquiring a reduced value Zs and a priority value Yx of a corresponding running control;
s02: acquiring a computing power base number, a process base number and an active base number;
s03: and (3) solving the upper limit of the calculation force according to the calculation force base number:
upper limit of calculated force (calculated force basis) (1+ Zs Yx); obtaining the calculation force range as the calculation force base number-calculation force upper limit;
s04: sequentially substituting the process base number and the active base number into the formula of the step S03 to obtain a process range and an active range;
s05: obtaining a calculation force range, a process range and an active range;
step five: starting the running of a demand control in the virtual environment;
step six: acquiring real-time computing power, real-time association process and real-time activation times of the required control in real time;
step seven: then acquiring the times of reaching the computing power range corresponding to the real-time computing power and the duration time corresponding to each time, marking the times as reaching limit times, and accumulating the duration time to obtain a reaching limit value;
acquiring the times of reaching the process range of the corresponding real-time association process and the duration time of each time, marking the times as reaching limit times II, and accumulating the duration time to obtain a reaching limit value II;
acquiring the number of times that the corresponding real-time active times reach the active range and the duration time corresponding to each time, marking the number of times as a third reaching time limit, and accumulating the duration time to obtain a third reaching time limit value;
step eight: when any index exceeds the limit, automatically obtaining a doubling proportion, wherein the doubling proportion is equal to the number of doubling bases multiplied by the number of times of exceeding the limit; the doubling base number is a preset value;
step nine: calculating a limit value by using a formula, specifically:
a limit value { (number of times of reaching limit + number of times of reaching limit two + number of times of reaching limit three) × 0.437+0.563 [ (value of time of reaching limit one + value of time of reaching limit two + value of time of reaching limit three) } multiplication radix;
step ten: defining the authority of the required control according to the limit value; the method specifically comprises the following steps:
when the threshold value is less than X1, early warning information is automatically generated, a window is automatically popped up to remind a user to select to continue executing the corresponding demand control, and the user can interrupt the execution of the demand control at the moment;
when the X1 is not more than the threshold value < X2, the execution of the corresponding demand control is automatically called and stopped;
when the combined limit value is larger than or equal to X2, the operation of the required space is automatically called and stopped, and when the corresponding required control is once in the condition, the ranges of the calculation force range, the process range and the active range are automatically reduced by twenty percent of the maximum value of the corresponding range; when the maximum value of any range of the calculation force range, the process range and the active range is zero, the operation of the corresponding requirement control is directly forbidden.
Firstly, when a user needs to operate a demand control, automatically verifying a source of the demand control, automatically defining a reduction value according to a verification result, then, after the user calls the corresponding demand control, needing to input a priority value Yx, then, automatically acquiring operation associated data of the corresponding demand control, obtaining a computing power base number, a process base number and an active base number, and determining an upper limit according to the computing power base number, the process base number and the active base number to obtain a computing power range, a process range and an active range;
then, the running of the demand control in the virtual environment is monitored, and the real-time computing power, the real-time association process and the real-time activation times of the demand control are obtained in real time; monitoring the limit reaching situation and the limit exceeding situation of all indexes; and calculating a limit value based on the conditions, and finally defining the authority of the demand control according to the limit value, and automatically stopping the operation of the demand control to a certain extent, even forbidding the operation of the related demand control, thereby avoiding the illegal operation of the demand control. The invention is simple, effective and easy to use.
The foregoing is merely exemplary and illustrative of the present invention and various modifications, additions and substitutions may be made by those skilled in the art to the specific embodiments described without departing from the scope of the invention as defined in the following claims.

Claims (8)

1. A method for managing authority in a virtualized environment of an android application is characterized by comprising the following steps:
the method comprises the following steps: acquiring real-time computing power, real-time association process and real-time activation times of the required control in real time;
step two: then acquiring the times of reaching the computing power range corresponding to the real-time computing power and the duration time corresponding to each time, marking the times as reaching limit times, and accumulating the duration time to obtain a reaching limit value;
acquiring the times of reaching the process range of the corresponding real-time association process and the duration time of each time, marking the times as reaching limit times II, and accumulating the duration time to obtain a reaching limit value II;
acquiring the number of times that the corresponding real-time active times reach the active range and the duration time corresponding to each time, marking the number of times as a third reaching time limit, and accumulating the duration time to obtain a third reaching time limit value;
step three: when any index exceeds the limit, automatically obtaining a doubling proportion, wherein the doubling proportion is equal to the number of doubling bases multiplied by the number of times of exceeding the limit; the doubling base number is a preset value;
step four: calculating a limit value by using a formula, specifically:
a limit value { (number of times of reaching limit + number of times of reaching limit two + number of times of reaching limit three) × 0.437+0.563 [ (value of time of reaching limit one + value of time of reaching limit two + value of time of reaching limit three) } multiplication radix;
step five: defining the authority of the required control according to the limit value;
the specific way of authority definition is as follows: when the threshold value is less than X1, early warning information is automatically generated, a window is automatically popped up to remind a user to select to continue executing the corresponding demand control, and the user can interrupt the execution of the demand control at the moment;
when the X1 is not more than the threshold value < X2, the execution of the corresponding demand control is automatically called and stopped;
when the combined limit value is larger than or equal to X2, the operation of the required space is automatically called and stopped, and when the corresponding required control is once in the condition, the ranges of the calculation force range, the process range and the active range are automatically reduced by twenty percent of the maximum value of the corresponding range; when the maximum value of any range of the calculation force range, the process range and the active range is zero, the operation of the corresponding requirement control is directly forbidden.
2. The method for managing the authority in the virtualized environment of the android application as claimed in claim 1, wherein the requirement control is corresponding software or program that the user needs to run by means of the virtualized environment.
3. The method for managing the authority in the virtualized environment of the android application according to claim 1, wherein the specific manner of defining the reduction value Zs according to the result of the security check is as follows:
when the source is safe, defining a reduction value Zs as 1;
when the source is unknown, the reduction value Zs is defined to be 0.85;
when a security threat exists in the source, the reduction value Zs is defined to be 0.35.
4. The method for managing the permission in the virtualized environment of the android application according to claim 1, wherein a specific method for acquiring the running associated data is as follows:
s1: acquiring an operation record corresponding to a demand control, acquiring a calculation force demand corresponding to the demand control in each operation in the last half year, and marking the calculation force demand as Sli, wherein i is 1.. n; evaluating the calculation power demand to obtain a calculation power base number;
s2: acquiring the number of associated processes corresponding to the requirement control in each running process in the last half year, wherein the number of the associated processes is the number of other processes which need to be assisted when the corresponding requirement control runs; processing the associated process number by the aid of a high-low evaluation principle, and marking the obtained numerical value as a process base number;
s3: then acquiring the active times of the demand control in each running process in the last half year,
evaluating the activity times, and marking the obtained numerical value as an active base number;
s4: and obtaining a computing power base, a process base and an active base.
5. The method for managing the authority in the virtualized environment of the android application according to claim 1, wherein the specific determination process of the upper limit determination is as follows:
s01: acquiring a reduced value Zs and a priority value Yx of a corresponding running control;
s02: acquiring a computing power base number, a process base number and an active base number;
s03: and (3) solving the upper limit of the calculation force according to the calculation force base number:
upper limit of calculated force (calculated force basis) (1+ Zs Yx); obtaining the calculation force range as the calculation force base number-calculation force upper limit;
s04: sequentially substituting the process base number and the active base number into the formula of the step S03 to obtain a process range and an active range;
s05: and obtaining a calculation force range, a progress range and an active range.
6. The method for managing the authority in the virtualized environment of the android application according to claim 4, wherein the specific manner of the high-low scores is as follows:
sequencing the Sli from large to small;
taking values from the first position until the ratio of the number of the values to the total number is B1, calculating the average value of the values, and marking the average value as an apparent value;
taking values from the last name until the ratio of the number of the values to the total number is B1, calculating the average value of the values, and marking the average value as an under-view value; b1 and B2 are preset values and satisfy B1+ B2<1, and B1 is not more than B2;
and solving the mean value of the upward-looking value and the downward-looking value to obtain the calculation power base number.
7. The method for managing the authority in the virtualized environment of android application of claim 4, wherein the active number in step S3 is defined by:
in one operation process, when the calculation power of the corresponding demand control is called to exceed thirty percent of the calculation power base number and the interruption times do not exceed the time of T1, T1 is a preset numerical value and represents that the corresponding demand control is active once, and the active times of each operation are obtained.
8. The method for managing the authority in the virtualized environment of the android application as claimed in claim 1, wherein before performing the operation of the first step, the following steps are further performed:
the method comprises the following steps: when a user needs to operate the requirement control, the source of the requirement control is automatically checked, and the reduction value Zs is automatically defined according to the check result;
step two: after a user calls a corresponding demand control, a priority value Yx needs to be input, and the value of the priority value satisfies 0< Yx < 1;
step three: acquiring running associated data of a corresponding requirement control to obtain a computing power base, a process base and an active base;
step four: determining an upper limit according to the computing power base number, the process base number and the active base number to obtain a computing power range, a process range and an active range;
step five: the execution of the demand control in the virtual environment is initiated.
CN202110428023.2A 2021-04-21 2021-04-21 Authority management method in android application virtualization environment Active CN113094698B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110428023.2A CN113094698B (en) 2021-04-21 2021-04-21 Authority management method in android application virtualization environment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110428023.2A CN113094698B (en) 2021-04-21 2021-04-21 Authority management method in android application virtualization environment

Publications (2)

Publication Number Publication Date
CN113094698A true CN113094698A (en) 2021-07-09
CN113094698B CN113094698B (en) 2022-05-24

Family

ID=76679467

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110428023.2A Active CN113094698B (en) 2021-04-21 2021-04-21 Authority management method in android application virtualization environment

Country Status (1)

Country Link
CN (1) CN113094698B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130212713A1 (en) * 2012-02-13 2013-08-15 Nokia Corporation Method and apparatus for providing backend support for device control in risk conditions
CN107347081A (en) * 2017-09-05 2017-11-14 杭州安恒信息技术有限公司 A kind of method and device of virtual secure integrated management
CN109784087A (en) * 2018-12-13 2019-05-21 平安科技(深圳)有限公司 Method, apparatus, medium and the electronic equipment of virtual platform user authority management
CN111010586A (en) * 2019-12-19 2020-04-14 腾讯科技(深圳)有限公司 Live broadcast method, device, equipment and storage medium based on artificial intelligence
CN112269639A (en) * 2020-10-29 2021-01-26 四川长虹电器股份有限公司 Authority management method of virtual equipment

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130212713A1 (en) * 2012-02-13 2013-08-15 Nokia Corporation Method and apparatus for providing backend support for device control in risk conditions
CN107347081A (en) * 2017-09-05 2017-11-14 杭州安恒信息技术有限公司 A kind of method and device of virtual secure integrated management
CN109784087A (en) * 2018-12-13 2019-05-21 平安科技(深圳)有限公司 Method, apparatus, medium and the electronic equipment of virtual platform user authority management
CN111010586A (en) * 2019-12-19 2020-04-14 腾讯科技(深圳)有限公司 Live broadcast method, device, equipment and storage medium based on artificial intelligence
CN112269639A (en) * 2020-10-29 2021-01-26 四川长虹电器股份有限公司 Authority management method of virtual equipment

Also Published As

Publication number Publication date
CN113094698B (en) 2022-05-24

Similar Documents

Publication Publication Date Title
CN109871695B (en) Trusted computing platform with computing and protection parallel dual-architecture
CN104484594B (en) A kind of franchise distribution method of the Linux system based on capability mechanism
CN107003891A (en) Virtual machine switching method, device, electronic equipment and computer program product
CN111865885A (en) Access control method, device, equipment and storage medium
CN103793646A (en) Virtual machine safety monitoring method based on behavior recognition
CN111159762B (en) Subject credibility verification method and system under mandatory access control
CN106155646B (en) Method and device for limiting external application program to call service
CN104079569A (en) BLP improved model integrated with credibility level and authentication access method
CN107426196A (en) A kind of method and system of identification WEB invasions
CN113094698B (en) Authority management method in android application virtualization environment
CN104268462B (en) A kind of partition protecting method and apparatus of Android system
CN102184373B (en) Method for designing safety core of operation system based on protection mode and virtualization mechanism
CN108062486A (en) A kind of storage protection device for dereference storage control
CN109409087A (en) It is anti-to propose power detection method and equipment
CN108287779A (en) A kind of Windows startup items monitoring method and system
CN103440176A (en) Protection method and device for memory in real-time operation system
CN105701416B (en) Forced access control method, device and physical host
CN117290841A (en) Single-chip system, method for operating a single-chip system and motor vehicle
CN117032831A (en) Trusted DCS upper computer system, starting method thereof and software starting method thereof
CN102541646B (en) Task scheduling method suitable for hard real-time system
CN109495436B (en) Trusted cloud platform measurement system and method
CN1157962A (en) System, method, and article of manufacture for access control on method invocation on protected object in object oriented system
CN108230166A (en) A kind of computational methods, storage medium and terminal device for exempting premium
CN113360729A (en) Big data based information security monitoring method and system and cloud platform
CN112287397B (en) System and method for improving and guaranteeing safety of patient information transmission

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant