CN113094698A - Authority management method in android application virtualization environment - Google Patents
Authority management method in android application virtualization environment Download PDFInfo
- Publication number
- CN113094698A CN113094698A CN202110428023.2A CN202110428023A CN113094698A CN 113094698 A CN113094698 A CN 113094698A CN 202110428023 A CN202110428023 A CN 202110428023A CN 113094698 A CN113094698 A CN 113094698A
- Authority
- CN
- China
- Prior art keywords
- value
- range
- time
- limit
- active
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/033—Test or assess software
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2135—Metering
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses a permission management method in an android application virtualization environment, which comprises the steps that firstly, when a user needs to operate a demand control, the source of the demand control can be automatically checked, a reduction value is automatically defined according to a check result, then after the user calls the corresponding demand control, a priority value Yx needs to be input, then operation associated data of the corresponding demand control can be automatically obtained, a computing power base number, a process base number and an active base number are obtained, and an upper limit is determined according to the computing power base number, the process base number and the active base number to obtain a computing power range, a process range and an active range; then, the running of the demand control in the virtual environment is monitored, and the real-time computing power, the real-time association process and the real-time activation times of the demand control are obtained in real time; monitoring the limit reaching situation and the limit exceeding situation of all indexes; and calculating a limit value based on the situations, and finally defining the authority of the demand control according to the limit value, and automatically stopping the operation of the demand control to a certain extent.
Description
Technical Field
The invention belongs to the field of authority management, relates to a virtual environment equipment operation management technology, and particularly relates to an authority management method in an android application virtualization environment.
Background
The publication No. CN112269639A discloses a rights management method for virtual devices, which solves the security risk problem, the flexibility problem of rights control, and the priority problem of virtual device usage that are brought to sharing devices when sharing device virtualization capabilities among intelligent devices in the conventional technology. The virtual equipment authority management is refined, and the virtualization capability of the sharing equipment is described for the requesting equipment through the virtual equipment description table; maintaining the record of the authorization equipment and the use range of the virtual equipment by the authorization equipment through an authority management description table; and realizing the use authority management of the virtual equipment through the virtual equipment state table and the virtual equipment priority use range. The invention is suitable for intelligent equipment.
Patent with publication number CN107391028A also discloses a method and device for controlling virtual volume permissions, which relate to the technical field of cloud computing and are used for improving the security of user data under virtualization deployment. The method comprises the following steps: the virtualization management platform receives a request for using a virtual volume sent by a user; the virtualization management platform allocating a virtual volume to the user based on the request; the virtual volume comprises an authority storage space, check information is recorded in the authority storage space, the check information and the user have a unique corresponding relation, and the check information is used for verifying the authority of any user before any user operates the virtual volume.
However, both of them are defined based on the authority of the virtual environment for the user, but there is no reasonable authority management way for the program running in the virtual environment, and there is no unexpected situation that the running of different software is violated, or the running of redundant controls is stolen, which results in the running of the virtual environment, thereby providing a solution based on this.
Disclosure of Invention
The invention aims to provide a permission management method in an android application virtualization environment.
The purpose of the invention can be realized by the following technical scheme:
a method for managing authority in an android application virtualization environment specifically comprises the following steps:
the method comprises the following steps: when a user needs to operate the requirement control, the source of the requirement control is automatically checked, and the reduction value Zs is automatically defined according to the check result;
step two: after a user calls a corresponding demand control, a priority value Yx needs to be input, and the value of the priority value satisfies 0< Yx < 1;
step three: acquiring running associated data of a corresponding requirement control to obtain a computing power base, a process base and an active base;
step four: determining an upper limit according to the computing power base number, the process base number and the active base number to obtain a computing power range, a process range and an active range;
step five: starting the running of a demand control in the virtual environment;
step six: acquiring real-time computing power, real-time association process and real-time activation times of the required control in real time;
step seven: then acquiring the times of reaching the computing power range corresponding to the real-time computing power and the duration time corresponding to each time, marking the times as reaching limit times, and accumulating the duration time to obtain a reaching limit value;
acquiring the times of reaching the process range of the corresponding real-time association process and the duration time of each time, marking the times as reaching limit times II, and accumulating the duration time to obtain a reaching limit value II;
acquiring the number of times that the corresponding real-time active times reach the active range and the duration time corresponding to each time, marking the number of times as a third reaching time limit, and accumulating the duration time to obtain a third reaching time limit value;
step eight: when any index exceeds the limit, automatically obtaining a doubling proportion, wherein the doubling proportion is equal to the number of doubling bases multiplied by the number of times of exceeding the limit; the doubling base number is a preset value;
step nine: calculating a limit value by using a formula, specifically:
a limit value { (number of times of reaching limit + number of times of reaching limit two + number of times of reaching limit three) × 0.437+0.563 [ (value of time of reaching limit one + value of time of reaching limit two + value of time of reaching limit three) } multiplication radix;
step ten: defining the authority of the required control according to the limit value;
the specific way of authority definition is as follows: when the threshold value is less than X1, early warning information is automatically generated, a window is automatically popped up to remind a user to select to continue executing the corresponding demand control, and the user can interrupt the execution of the demand control at the moment;
when the X1 is not more than the threshold value < X2, the execution of the corresponding demand control is automatically called and stopped;
when the combined limit value is larger than or equal to X2, the operation of the required space is automatically called and stopped, and when the corresponding required control is once in the condition, the ranges of the calculation force range, the process range and the active range are automatically reduced by twenty percent of the maximum value of the corresponding range; when the maximum value of any range of the calculation force range, the process range and the active range is zero, the operation of the corresponding requirement control is directly forbidden.
Further, the requirement control is corresponding software and program which the user needs to run by means of the virtual environment.
Further, the specific way of defining the reduction value Zs according to the safety verification result is as follows:
when the source is safe, defining a reduction value Zs as 1;
when the source is unknown, the reduction value Zs is defined to be 0.85;
when a security threat exists in the source, the reduction value Zs is defined to be 0.35.
Further, a specific acquisition method of the operation associated data is as follows:
s1: acquiring an operation record corresponding to a demand control, acquiring a calculation force demand corresponding to the demand control in each operation in the last half year, and marking the calculation force demand as Sli, wherein i is 1.. n; evaluating the calculation power demand to obtain a calculation power base number;
s2: acquiring the number of associated processes corresponding to the requirement control in each running process in the last half year, wherein the number of the associated processes is the number of other processes which need to be assisted when the corresponding requirement control runs; processing the associated process number by the aid of a high-low evaluation principle, and marking the obtained numerical value as a process base number;
s3: and then acquiring the active times of the demand control in each running process, wherein the active times are defined in the following mode:
in the one-time running process, when the calculation power of the corresponding demand control is called to exceed thirty percent of the calculation power base number and the interruption times do not exceed T1 time, T1 is a preset numerical value and represents one time of activation, and the activation times of each running are obtained;
evaluating the activity times, and marking the obtained numerical value as an active base number;
s4: and obtaining a computing power base, a process base and an active base.
Further, the specific determination process for determining the upper limit is as follows:
s01: acquiring a reduced value Zs and a priority value Yx of a corresponding running control;
s02: acquiring a computing power base number, a process base number and an active base number;
s03: and (3) solving the upper limit of the calculation force according to the calculation force base number:
upper limit of calculated force (calculated force basis) (1+ Zs Yx); obtaining the calculation force range as the calculation force base number-calculation force upper limit;
s04: sequentially substituting the process base number and the active base number into the formula of the step S03 to obtain a process range and an active range;
s05: and obtaining a calculation force range, a progress range and an active range.
Further, the specific manner of high-low scoring is as follows:
sequencing the Sli from large to small;
taking values from the first position until the ratio of the number of the values to the total number is B1, calculating the average value of the values, and marking the average value as an apparent value;
taking values from the last name until the ratio of the number of the values to the total number is B1, calculating the average value of the values, and marking the average value as an under-view value; b1 and B2 are preset values and satisfy B1+ B2<1, and B1 is not more than B2;
and solving the mean value of the upward-looking value and the downward-looking value to obtain the calculation power base number.
The invention has the beneficial effects that:
firstly, when a user needs to operate a demand control, automatically verifying a demand control source, automatically defining a reduction value according to a verification result, then, after the user calls a corresponding demand control, inputting a priority value Yx, then, automatically acquiring operation associated data of the corresponding demand control to obtain a computing power base number, a process base number and an active base number, and determining an upper limit according to the computing power base number, the process base number and the active base number to obtain a computing power range, a process range and an active range;
then, the running of the demand control in the virtual environment is monitored, and the real-time computing power, the real-time association process and the real-time activation times of the demand control are obtained in real time; monitoring the limit reaching situation and the limit exceeding situation of all indexes; and calculating a limit value based on the conditions, and finally defining the authority of the demand control according to the limit value, and automatically stopping the operation of the demand control to a certain extent, even forbidding the operation of the related demand control, thereby avoiding the illegal operation of the demand control. The invention is simple, effective and easy to use.
Detailed Description
A method for managing authority in an android application virtualization environment specifically comprises the following steps:
the method comprises the following steps: when a user needs to operate the requirement control, the source of the requirement control is automatically checked, and the reduction value Zs is automatically defined according to the check result; the requirement control is corresponding software or a program which needs to run by virtue of a virtual environment;
the verification mode is to store the safety of a corresponding source in a database by means of the prior art; defining a reduction value Zs according to the safety check result:
when the source is safe, defining a reduction value Zs as 1;
when the source is unknown, the reduction value Zs is defined to be 0.85;
when the source has a security threat, defining a reduction value Zs of 0.35;
step two: after a user calls a corresponding demand control, a priority value Yx needs to be input, and the specific value of the priority value satisfies 0< Yx < 1;
step three: the method for acquiring the operation associated data of the corresponding requirement control comprises the following steps:
s1: acquiring an operation record corresponding to a demand control, acquiring a calculation force demand corresponding to the demand control in each operation in the last half year, and marking the calculation force demand as Sli, wherein i is 1.. n; the calculation power demand is evaluated in a high-low mode, and the specific high-low evaluation mode is as follows:
sequencing the Sli from large to small;
taking values from the first position until the ratio of the number of the values to the total number is B1, calculating the average value of the values, and marking the average value as an apparent value;
taking values from the last name until the ratio of the number of the values to the total number is B1, calculating the average value of the values, and marking the average value as an under-view value; b1 and B2 are preset values and satisfy B1+ B2<1, and B1 is not more than B2;
calculating the mean value of the upper vision value and the lower vision value to obtain the calculation power base number;
s2: acquiring the number of associated processes corresponding to the requirement control in each running process in the last half year, wherein the number of the associated processes is the number of other processes which need to be assisted when the corresponding requirement control runs; processing the associated process number by the aid of a high-low evaluation principle, and marking the obtained numerical value as a process base number;
s3: and then acquiring the active times of the demand control in each running process, wherein the active times are defined in the following mode:
in the one-time running process, when the calculation power of the corresponding demand control is called to exceed thirty percent of the calculation power base number and the interruption times do not exceed T1 time, T1 is a preset numerical value and represents one time of activation, and the activation times of each running are obtained;
evaluating the activity times, and marking the obtained numerical value as an active base number;
s4: obtaining a computing power base number, a process base number and an active base number;
step four: and determining an upper limit according to the computing power base number, the process base number and the active base number, wherein the specific determination process comprises the following steps:
s01: acquiring a reduced value Zs and a priority value Yx of a corresponding running control;
s02: acquiring a computing power base number, a process base number and an active base number;
s03: and (3) solving the upper limit of the calculation force according to the calculation force base number:
upper limit of calculated force (calculated force basis) (1+ Zs Yx); obtaining the calculation force range as the calculation force base number-calculation force upper limit;
s04: sequentially substituting the process base number and the active base number into the formula of the step S03 to obtain a process range and an active range;
s05: obtaining a calculation force range, a process range and an active range;
step five: starting the running of a demand control in the virtual environment;
step six: acquiring real-time computing power, real-time association process and real-time activation times of the required control in real time;
step seven: then acquiring the times of reaching the computing power range corresponding to the real-time computing power and the duration time corresponding to each time, marking the times as reaching limit times, and accumulating the duration time to obtain a reaching limit value;
acquiring the times of reaching the process range of the corresponding real-time association process and the duration time of each time, marking the times as reaching limit times II, and accumulating the duration time to obtain a reaching limit value II;
acquiring the number of times that the corresponding real-time active times reach the active range and the duration time corresponding to each time, marking the number of times as a third reaching time limit, and accumulating the duration time to obtain a third reaching time limit value;
step eight: when any index exceeds the limit, automatically obtaining a doubling proportion, wherein the doubling proportion is equal to the number of doubling bases multiplied by the number of times of exceeding the limit; the doubling base number is a preset value;
step nine: calculating a limit value by using a formula, specifically:
a limit value { (number of times of reaching limit + number of times of reaching limit two + number of times of reaching limit three) × 0.437+0.563 [ (value of time of reaching limit one + value of time of reaching limit two + value of time of reaching limit three) } multiplication radix;
step ten: defining the authority of the required control according to the limit value; the method specifically comprises the following steps:
when the threshold value is less than X1, early warning information is automatically generated, a window is automatically popped up to remind a user to select to continue executing the corresponding demand control, and the user can interrupt the execution of the demand control at the moment;
when the X1 is not more than the threshold value < X2, the execution of the corresponding demand control is automatically called and stopped;
when the combined limit value is larger than or equal to X2, the operation of the required space is automatically called and stopped, and when the corresponding required control is once in the condition, the ranges of the calculation force range, the process range and the active range are automatically reduced by twenty percent of the maximum value of the corresponding range; when the maximum value of any range of the calculation force range, the process range and the active range is zero, the operation of the corresponding requirement control is directly forbidden.
Firstly, when a user needs to operate a demand control, automatically verifying a source of the demand control, automatically defining a reduction value according to a verification result, then, after the user calls the corresponding demand control, needing to input a priority value Yx, then, automatically acquiring operation associated data of the corresponding demand control, obtaining a computing power base number, a process base number and an active base number, and determining an upper limit according to the computing power base number, the process base number and the active base number to obtain a computing power range, a process range and an active range;
then, the running of the demand control in the virtual environment is monitored, and the real-time computing power, the real-time association process and the real-time activation times of the demand control are obtained in real time; monitoring the limit reaching situation and the limit exceeding situation of all indexes; and calculating a limit value based on the conditions, and finally defining the authority of the demand control according to the limit value, and automatically stopping the operation of the demand control to a certain extent, even forbidding the operation of the related demand control, thereby avoiding the illegal operation of the demand control. The invention is simple, effective and easy to use.
The foregoing is merely exemplary and illustrative of the present invention and various modifications, additions and substitutions may be made by those skilled in the art to the specific embodiments described without departing from the scope of the invention as defined in the following claims.
Claims (8)
1. A method for managing authority in a virtualized environment of an android application is characterized by comprising the following steps:
the method comprises the following steps: acquiring real-time computing power, real-time association process and real-time activation times of the required control in real time;
step two: then acquiring the times of reaching the computing power range corresponding to the real-time computing power and the duration time corresponding to each time, marking the times as reaching limit times, and accumulating the duration time to obtain a reaching limit value;
acquiring the times of reaching the process range of the corresponding real-time association process and the duration time of each time, marking the times as reaching limit times II, and accumulating the duration time to obtain a reaching limit value II;
acquiring the number of times that the corresponding real-time active times reach the active range and the duration time corresponding to each time, marking the number of times as a third reaching time limit, and accumulating the duration time to obtain a third reaching time limit value;
step three: when any index exceeds the limit, automatically obtaining a doubling proportion, wherein the doubling proportion is equal to the number of doubling bases multiplied by the number of times of exceeding the limit; the doubling base number is a preset value;
step four: calculating a limit value by using a formula, specifically:
a limit value { (number of times of reaching limit + number of times of reaching limit two + number of times of reaching limit three) × 0.437+0.563 [ (value of time of reaching limit one + value of time of reaching limit two + value of time of reaching limit three) } multiplication radix;
step five: defining the authority of the required control according to the limit value;
the specific way of authority definition is as follows: when the threshold value is less than X1, early warning information is automatically generated, a window is automatically popped up to remind a user to select to continue executing the corresponding demand control, and the user can interrupt the execution of the demand control at the moment;
when the X1 is not more than the threshold value < X2, the execution of the corresponding demand control is automatically called and stopped;
when the combined limit value is larger than or equal to X2, the operation of the required space is automatically called and stopped, and when the corresponding required control is once in the condition, the ranges of the calculation force range, the process range and the active range are automatically reduced by twenty percent of the maximum value of the corresponding range; when the maximum value of any range of the calculation force range, the process range and the active range is zero, the operation of the corresponding requirement control is directly forbidden.
2. The method for managing the authority in the virtualized environment of the android application as claimed in claim 1, wherein the requirement control is corresponding software or program that the user needs to run by means of the virtualized environment.
3. The method for managing the authority in the virtualized environment of the android application according to claim 1, wherein the specific manner of defining the reduction value Zs according to the result of the security check is as follows:
when the source is safe, defining a reduction value Zs as 1;
when the source is unknown, the reduction value Zs is defined to be 0.85;
when a security threat exists in the source, the reduction value Zs is defined to be 0.35.
4. The method for managing the permission in the virtualized environment of the android application according to claim 1, wherein a specific method for acquiring the running associated data is as follows:
s1: acquiring an operation record corresponding to a demand control, acquiring a calculation force demand corresponding to the demand control in each operation in the last half year, and marking the calculation force demand as Sli, wherein i is 1.. n; evaluating the calculation power demand to obtain a calculation power base number;
s2: acquiring the number of associated processes corresponding to the requirement control in each running process in the last half year, wherein the number of the associated processes is the number of other processes which need to be assisted when the corresponding requirement control runs; processing the associated process number by the aid of a high-low evaluation principle, and marking the obtained numerical value as a process base number;
s3: then acquiring the active times of the demand control in each running process in the last half year,
evaluating the activity times, and marking the obtained numerical value as an active base number;
s4: and obtaining a computing power base, a process base and an active base.
5. The method for managing the authority in the virtualized environment of the android application according to claim 1, wherein the specific determination process of the upper limit determination is as follows:
s01: acquiring a reduced value Zs and a priority value Yx of a corresponding running control;
s02: acquiring a computing power base number, a process base number and an active base number;
s03: and (3) solving the upper limit of the calculation force according to the calculation force base number:
upper limit of calculated force (calculated force basis) (1+ Zs Yx); obtaining the calculation force range as the calculation force base number-calculation force upper limit;
s04: sequentially substituting the process base number and the active base number into the formula of the step S03 to obtain a process range and an active range;
s05: and obtaining a calculation force range, a progress range and an active range.
6. The method for managing the authority in the virtualized environment of the android application according to claim 4, wherein the specific manner of the high-low scores is as follows:
sequencing the Sli from large to small;
taking values from the first position until the ratio of the number of the values to the total number is B1, calculating the average value of the values, and marking the average value as an apparent value;
taking values from the last name until the ratio of the number of the values to the total number is B1, calculating the average value of the values, and marking the average value as an under-view value; b1 and B2 are preset values and satisfy B1+ B2<1, and B1 is not more than B2;
and solving the mean value of the upward-looking value and the downward-looking value to obtain the calculation power base number.
7. The method for managing the authority in the virtualized environment of android application of claim 4, wherein the active number in step S3 is defined by:
in one operation process, when the calculation power of the corresponding demand control is called to exceed thirty percent of the calculation power base number and the interruption times do not exceed the time of T1, T1 is a preset numerical value and represents that the corresponding demand control is active once, and the active times of each operation are obtained.
8. The method for managing the authority in the virtualized environment of the android application as claimed in claim 1, wherein before performing the operation of the first step, the following steps are further performed:
the method comprises the following steps: when a user needs to operate the requirement control, the source of the requirement control is automatically checked, and the reduction value Zs is automatically defined according to the check result;
step two: after a user calls a corresponding demand control, a priority value Yx needs to be input, and the value of the priority value satisfies 0< Yx < 1;
step three: acquiring running associated data of a corresponding requirement control to obtain a computing power base, a process base and an active base;
step four: determining an upper limit according to the computing power base number, the process base number and the active base number to obtain a computing power range, a process range and an active range;
step five: the execution of the demand control in the virtual environment is initiated.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110428023.2A CN113094698B (en) | 2021-04-21 | 2021-04-21 | Authority management method in android application virtualization environment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110428023.2A CN113094698B (en) | 2021-04-21 | 2021-04-21 | Authority management method in android application virtualization environment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113094698A true CN113094698A (en) | 2021-07-09 |
CN113094698B CN113094698B (en) | 2022-05-24 |
Family
ID=76679467
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110428023.2A Active CN113094698B (en) | 2021-04-21 | 2021-04-21 | Authority management method in android application virtualization environment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113094698B (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130212713A1 (en) * | 2012-02-13 | 2013-08-15 | Nokia Corporation | Method and apparatus for providing backend support for device control in risk conditions |
CN107347081A (en) * | 2017-09-05 | 2017-11-14 | 杭州安恒信息技术有限公司 | A kind of method and device of virtual secure integrated management |
CN109784087A (en) * | 2018-12-13 | 2019-05-21 | 平安科技(深圳)有限公司 | Method, apparatus, medium and the electronic equipment of virtual platform user authority management |
CN111010586A (en) * | 2019-12-19 | 2020-04-14 | 腾讯科技(深圳)有限公司 | Live broadcast method, device, equipment and storage medium based on artificial intelligence |
CN112269639A (en) * | 2020-10-29 | 2021-01-26 | 四川长虹电器股份有限公司 | Authority management method of virtual equipment |
-
2021
- 2021-04-21 CN CN202110428023.2A patent/CN113094698B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130212713A1 (en) * | 2012-02-13 | 2013-08-15 | Nokia Corporation | Method and apparatus for providing backend support for device control in risk conditions |
CN107347081A (en) * | 2017-09-05 | 2017-11-14 | 杭州安恒信息技术有限公司 | A kind of method and device of virtual secure integrated management |
CN109784087A (en) * | 2018-12-13 | 2019-05-21 | 平安科技(深圳)有限公司 | Method, apparatus, medium and the electronic equipment of virtual platform user authority management |
CN111010586A (en) * | 2019-12-19 | 2020-04-14 | 腾讯科技(深圳)有限公司 | Live broadcast method, device, equipment and storage medium based on artificial intelligence |
CN112269639A (en) * | 2020-10-29 | 2021-01-26 | 四川长虹电器股份有限公司 | Authority management method of virtual equipment |
Also Published As
Publication number | Publication date |
---|---|
CN113094698B (en) | 2022-05-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109871695B (en) | Trusted computing platform with computing and protection parallel dual-architecture | |
CN104484594B (en) | A kind of franchise distribution method of the Linux system based on capability mechanism | |
CN107003891A (en) | Virtual machine switching method, device, electronic equipment and computer program product | |
CN111865885A (en) | Access control method, device, equipment and storage medium | |
CN103793646A (en) | Virtual machine safety monitoring method based on behavior recognition | |
CN111159762B (en) | Subject credibility verification method and system under mandatory access control | |
CN106155646B (en) | Method and device for limiting external application program to call service | |
CN104079569A (en) | BLP improved model integrated with credibility level and authentication access method | |
CN107426196A (en) | A kind of method and system of identification WEB invasions | |
CN113094698B (en) | Authority management method in android application virtualization environment | |
CN104268462B (en) | A kind of partition protecting method and apparatus of Android system | |
CN102184373B (en) | Method for designing safety core of operation system based on protection mode and virtualization mechanism | |
CN108062486A (en) | A kind of storage protection device for dereference storage control | |
CN109409087A (en) | It is anti-to propose power detection method and equipment | |
CN108287779A (en) | A kind of Windows startup items monitoring method and system | |
CN103440176A (en) | Protection method and device for memory in real-time operation system | |
CN105701416B (en) | Forced access control method, device and physical host | |
CN117290841A (en) | Single-chip system, method for operating a single-chip system and motor vehicle | |
CN117032831A (en) | Trusted DCS upper computer system, starting method thereof and software starting method thereof | |
CN102541646B (en) | Task scheduling method suitable for hard real-time system | |
CN109495436B (en) | Trusted cloud platform measurement system and method | |
CN1157962A (en) | System, method, and article of manufacture for access control on method invocation on protected object in object oriented system | |
CN108230166A (en) | A kind of computational methods, storage medium and terminal device for exempting premium | |
CN113360729A (en) | Big data based information security monitoring method and system and cloud platform | |
CN112287397B (en) | System and method for improving and guaranteeing safety of patient information transmission |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |