CN102981835A - Android application program permanent Root permission acquiring method - Google Patents

Android application program permanent Root permission acquiring method Download PDF

Info

Publication number
CN102981835A
CN102981835A CN2012104366499A CN201210436649A CN102981835A CN 102981835 A CN102981835 A CN 102981835A CN 2012104366499 A CN2012104366499 A CN 2012104366499A CN 201210436649 A CN201210436649 A CN 201210436649A CN 102981835 A CN102981835 A CN 102981835A
Authority
CN
China
Prior art keywords
application program
executable program
android
authority
file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2012104366499A
Other languages
Chinese (zh)
Other versions
CN102981835B (en
Inventor
张长安
刘德建
陈宏展
罗上清
潘运武
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Baidu com Times Technology Beijing Co Ltd
Original Assignee
FUZHOU BOYUAN WIRELESS NETWORK TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by FUZHOU BOYUAN WIRELESS NETWORK TECHNOLOGY Co Ltd filed Critical FUZHOU BOYUAN WIRELESS NETWORK TECHNOLOGY Co Ltd
Priority to CN201210436649.9A priority Critical patent/CN102981835B/en
Publication of CN102981835A publication Critical patent/CN102981835A/en
Application granted granted Critical
Publication of CN102981835B publication Critical patent/CN102981835B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Stored Programmes (AREA)

Abstract

The invention provides an android application program permanent Root permission acquiring method. The method includes the steps of editing operations where Root permission is needed, compiling the operations into an executable program document, containing the executable program document into an application program which is authorized through a one-time subscriber unit (su) program, copying the executable program document to a /system/bin directory, modifying an owner and a group of the executable program document to be a root, and setting the subscriber unit identification (suid) position. As a result, the executable program document can have the Root permission every time the executable program document is executed so as to prevent an authorized window from popping out again. Due to changes of requirements, the executable program document is likely to need upgrading. Therefore, the executable program document needs achieving a self-upgrading function so as to prevent the authorized window from popping out again when upgrading. The android application program permanent Root permission acquiring method executes various operations with the identification of the Root. Even if the application program is reinstalled and upgraded, the su program authorization operation does not need repeating again. Therefore, the android application program permanent Root permission acquiring method brings great convenience to users.

Description

The Android application program is forever obtained the method for Root authority
[technical field]
The present invention relates to the application program rights management techniques field on the Android system, relate in particular on the Android mobile phone of a kind of Root, the Android application program is forever obtained the method for Root authority.
[background technology]
In the Android Android system, third party application is to move with casual user's identity, and this is just so that the authority of this application program is restricted, in the time of will accessing or revise the Android system file such as application program, and will the failure because of insufficient permission.The Android mobile phone that has has now carried out the Root setting, and this Root is the super administrator account in the class unix systems such as Linux.For the Android mobile phone, usual said Root, be exactly to pass through the whole bag of tricks in fact, the su program file of system is copied to/the system/bin catalogue under, and the SuperUser empowerment management is installed, third party application can be carried out the operation that needs the Root authority by su program (the su program is the rights management file).But the mobile phone of Root setting, can third party application just directly have the operation of Root authority? actually this is not so, on the mobile phone of Root, can under/system/bin catalogue, deposit the file of a su program by name, and the SuperUser(empowerment management is installed) application program.Other application programs are wanted to carry out with the Root authority, just must carry out shell-command by the su program, and this moment, SuperUser will eject the mandate dialog box, and the user must click permission, and order could successfully be performed.When click allows, if do not select " remembeing " option, use so when carrying out shell-command by the su program at every turn, all can eject and authorize the dialog box of reminding.In addition, if application program updating, even if remembered so before to allow to have operated, when carrying out shell-command by the su program again, also to again carry out repetitive endowment by the su program.
The dialog box that the mandate of ejecting is in addition reminded can be brought following problem: when the third party on the operating handset uses on an interface of mobile phone for the user, authorize the ejection of frame not have too large problem, because user's this moment is seeing that mobile phone is in some operation of execution, the user can find timely to authorize dialog box to eject and confirm, just operation is more loaded down with trivial details.But, the operation interface of some application program and no longer on the mobile phone, but on the pc machine, the user is connected to the pc machine with mobile phone, then come managing mobile phone by the pc machine, at this moment, the user can't remove to pay close attention to mobile phone screen, so, the user just can not in time find and confirm when authorizing dialog box to eject, and can authorize frame to show because mobile phone enters screen protection, so just cause authorization failure.Certainly, the user can choose " remembeing " option when authorizing for the first time, and just need not authorize next time again, but application program is often to upgrade version, after the renewal, re-starts again mandate, brings very big inconvenience for user's use.
A kind of " the application program method for managing dynamic permission under the Android platform " is provided in the prior art, see that publication number is: CN102289633A, open day be: the Chinese patent of 2011.12.21 comprises that Dynamic Selection was preserved self System Privileges table when application program was installed; After the installation, the user revises described System Privileges table by the man-machine interface Dynamic Selection; When access needed the API of authority, the Android platform judged whether that according to the record in the System Privileges table of this application program this API is disabled; When described API was disabled, whether this application program was selected to revise by the man-machine interface prompting user; If user selection is revised authority, the Android platform allows the described API of this application access, otherwise this application program withdraws from access.This right management method, the user can reach the authority that the personal experience revises application program at any time as required, thereby can prevent to a great extent the malice access resources of application program, the hazardous acts such as modification, steal personal information.If but the application program under the method Android platform is when having renewal, the rights management of this setting will be lost efficacy, and also will again advance configuration, troublesome poeration.
Here it is to be noted in order to allow audit crew be more readily understood the present invention:
1, among the Linux, the problem of file permission:
File permission: each Linux file has four kinds of access rights: readable (r), can write (w), can carry out (x), lack of competence (-).
Authority classification: the owner, group membership, other users.The authority of every class can be used letter representation, represents such as rwxrwxr-x: namely the owner and group membership have the authority of reading and writing, execution, and other users only have the authority reading and carry out (be the rwx ' owner ' rwx ' group membership ' other users of r-x ' ').Digital representation: so-called digital representation, refer to r, w and x are represented with 4,2,1 respectively, what do not have granted rights (-) then is 0, then the authority addition, as follows: file permission is rwxr-xr-x, is converted to numeral for (421) (401) (401), is expressed as 755 after the addition.
2, Linux user and grouping:
Linux is a multi-task and multi-user operating system.
Multitask: operation in the time of on a plurality of foreground applications and the background service program macroscopic view.
The multi-user: a plurality of users are the login system operation simultaneously; The protection and limitation mechanism of setting up for the privacy that guarantees the user.
All there is a power user in the common multi-user system, the root user among the Linux for example, administrator in the Windows system etc., can exist several to have other users of different authority classification grades in the system, such as the domestic consumer that is set up by the power user etc., Linux distribution version all requires to set up a domestic consumer when mounted mostly at present, and uses this user to log in.
3, user's group:
Can divide into groups to the user, user's group can comprise a plurality of users, and a user also can belong to a plurality of groupings simultaneously.
For example, following grouping and user are arranged:
Grouping group1 comprises user user1, user2
Grouping group2 comprises user user2
Create a file f by the user1 among the group1 now, specifying its authority is 775, and user1 and user2 have the authority of reading and writing, execution, the authority that the user2 among the group2 then only reads and carries out to file f so
4, the flag suid in the system:
Suid is the meaning of Set User ID
If a file has been set up the suid flag, but can shows on the execute bit of possessory authority and can carry out on the position of (x), for example:
Rwsr-xr-x represents that but execute bit is set up in the possessory authority in the classification of suid and authority.
The numeral that digital representation: suid is corresponding is 4, just is expressed as 4755 such as rwsr-xr-x
The effect of suid: allow when originally not having the user of corresponding authority to move this program, can access the resource (namely allowing some resources not have the access rights that had of access rights) that he does not have the authority access.
For example, user user1 and user2 are arranged; Create an ordinary file f by user user1 now, its authority is rwxr-xr-x(755), and create an executable file r, and its authority is that rwxr-xr-x(does not arrange suid), this moment is by user2 working procedure r, the validated user id(euid of r) be exactly user2, because user2 is to the unwritten authority of file f, so the r program also just can't revised file f; If be provided with the suid of file f, namely authority changes rwsr-xr-x(4755 into), the euid of r will be set to its possessory id again by user2 working procedure r this moment, i.e. user1, also just can revised file f.
[summary of the invention]
The technical problem to be solved in the present invention is to provide a kind of Android application program forever to obtain the method for Root authority, and when it solved application program with Root identity fill order, SuperUser can repeatedly eject the problem of reminding of authorizing.
The present invention is achieved in that a kind of Android application program forever obtains the method for Root authority, comprises the steps:
Step 1, the operation that needs in the Android application program to use the Root authority is write by the C/C++ language, and be compiled into an Android system executable program file, and described executable program file can realize self-upgrade function with the function of communicating by letter of Android application program; Executable program file is packaged in the Android application program;
Step 2, judge at Android system/whether have described executable program file under the catalogue of system/bin, no, then enter step 3; Be, judge then whether executable program file needs upgrading, upgrade, then the Android application program is set up with this executable program file and is communicated by letter, and calls self-upgrade function, this executable program file is carried out upgrading processing, and change step 8 over to; Do not upgrade, then directly enter step 8;
The su program of step 3, Android application program operation Android system is carried out the first time to the operation user and is authorized;
Step 4, with Android system /the system catalogue weighs carry for can write state;
Step 5, with Android system /authority of system/bin catalogue arranges, with guarantee the Android application program right/catalogue of system/bin has the authority of writing;
Step 6, described executable program file is copied under the catalogue of described/system/bin, and revise this executable program file authority classification the owner and under be grouped into Root;
Step 7, the suid flag of executable program file is set, the suid flag is set after, executable program file just can be performed by the Android application program with possessory identity, namely has the operation of Root authority;
Step 8, Android application program are carried out executable program file and are communicated by letter with its foundation, this moment, the Android application program need to be used the operation of Root authority as long as carry out by executable program file, need not to carry out repetitive endowment by the su program of Android system.
The present invention has following advantage: the present invention writes the operation that needs are used the Root authority, and be compiled into an executable program file, this executable program file is disposed, arranged, can make so the each execution of this document all have the Root authority, thereby avoid again ejecting the mandate frame.Because the change of demand, this document program may need upgrading, so file need to realize the function of oneself's upgrading, needs again to eject when avoiding upgrading and authorizes frame.The present invention carries out various operations by this document with the identity of Root, even if application program is reset, upgraded, also need not to carry out the su program authorization operation of repetition again, brings great convenience for user's use.
[description of drawings]
Fig. 1 is the inventive method schematic flow sheet.
[embodiment]
As shown in Figure 1, a kind of Android application program of the present invention is forever obtained the method for Root authority, comprises the steps:
Step 1, the operation that needs in the Android application program to use the Root authority is write by the C/C++ language, and be compiled into an Android system executable program file (as, the name of this executable program file is called mySu), and described executable program file can realize self-upgrade function with the function of communicating by letter of Android application program; Executable program file is packaged in the Android application program;
Step 2, judge at Android system/whether have described executable program file under the catalogue of system/bin, no, then enter step 3; Be, judge then whether executable program file needs upgrading, upgrade, then the Android application program is set up communicate by letter (borrowing during this communication has the function of communicating by letter in executable program file with the Android application program) with this executable program file, and call self-upgrade function, this executable program file is carried out upgrading processing, and change step 8 over to; Do not upgrade, then directly enter step 8;
The su program of step 3, Android application program operation Android system is carried out the first time to the operation user and is authorized; It is specially: the su program of Android application program operation Android system, and obtain the output stream of su program, su order afterwards can directly write order and execution toward output stream, and need not to rerun the su program, so just only need subscriber authorisation once to get final product, at this moment, the output stream of past su program writes an arbitrarily character order, and (this character order is inessential order, such as " id "), this character order mainly is in order to allow the SuperUser of Android system can eject the mandate dialog box, at this moment, the SuperUser of Android system can eject the mandate dialog box, and the operation user clicks permission, then continues to carry out described step 4, the operation user clicks refusal, then process ends.
Step 4, with Android system /the system catalogue weighs carry for can write state; It is specially: the output stream toward the su program writes the first order, with Android system /the system catalogue weighs carry for can write state, this first order is: " mount-o remount-w-t[type] [device]/system ", wherein [type] is for wanting the file system type of carry, [device] is for wanting the equipment of carry, these two are/relevant parameter of system catalogue carry, are to obtain by the shell-command of carrying out Android system.
Step 5, with Android system /authority of system/bin catalogue arranges, with guarantee the Android application program right/catalogue of system/bin has the authority of writing; It is specially: the output stream toward the su program writes the second order, with Android system /authority of system/bin catalogue changes 777 into, with guarantee the Android application program right/catalogue of system/bin has the authority of writing, this second order is: " chmod 777/system/bin ".
Step 6, described executable program file is copied under the catalogue of described/system/bin, and revise this executable program file authority classification the owner and under be grouped into Root; It is specially: the output stream toward the su program writes the 3rd order, executable program file is copied under the catalogue of described/system/bin, the 3rd order is " dd if=[fromPath] of=[toPath] ", wherein [fromPath] is the path at executable program file place this moment, [toPath] is the path that will copy to, namely/and the title of system/bin/ executable program file; And the output stream of past su program writes the 4th order, revise the classification of this executable program file authority the owner and under be grouped into root, the 4th order is " title of chown root:root/system/bin/ executable program file (be " mySu ", this title also can be replaced with other name) ".
Step 7, the suid flag of executable program file is set, the suid flag is set after, executable program file just can be performed by the Android application program with possessory identity, namely has the operation of Root authority; It is specially: the output stream toward the su program writes the 5th order, the suid flag of executable program file is set, and the executable program file authority is set to readable the execution, be that the executable program file authority is set to 4755, wherein " 4 " are the suid flags, executable program file just can be performed by the Android application program with possessory identity, namely has the operation of Root authority; Application program can forever be obtained the operation of Root authority like this; The 5th order is: " title of chmod 4755/system/bin/ executable program file (being " mySu ") ".
Step 8, Android application program are carried out executable program file and are communicated by letter with its foundation, this moment, the Android application program need to be used the operation of Root authority as long as carry out by executable program file, need not to carry out repetitive endowment by the su program of Android system.
Wherein, the operation of described Root authority comprises: obtain file directory, mourn in silence installation procedure and Uninstaller etc.
Here it is worth mentioning that:
The difference of carry and heavy carry, carry:
In the linux system, memory device need to be mounted to certain catalogue, we could normally use in file management; Then generally can see the carry information of each catalogue by carrying out the mount order among the shell, for example :/dev/block/mmcblk0p9/system ext4 ro; This information represents: memory device "/dev/block/mmcblk0p9 " is mounted to/the system catalogue, and its file system type is " ext4 ", and its access limit is " ro " (read-only)
Heavy carry: generally carry out the remount order by shell and carry out again carry memory device: for example: " mount-o remount-w-t ext4/dev/block/mmcblk0p9/system ", the heavy carry of expression general/system, its file system type is " ext4 ", its memory device is "/dev/block/mmcblk0p9 ", its access limit is " w ", i.e. readable writing.What relate in the step 4 is the operation that weighs carry.
In a word, the present invention carries out various operations by this document with the identity of Root, even if application program is reset, upgraded, also need not to carry out the su program authorization operation of repetition again, brings great convenience for user's use.
The above only is preferred embodiment of the present invention, and all equalizations of doing according to the present patent application claim change and modify, and all should belong to covering scope of the present invention.

Claims (7)

1. an Android application program is forever obtained the method for Root authority, it is characterized in that: comprise the steps:
Step 1, the operation that needs in the Android application program to use the Root authority is write by the C/C++ language, and be compiled into an Android system executable program file, and described executable program file can realize self-upgrade function with the function of communicating by letter of Android application program; Executable program file is packaged in the Android application program;
Step 2, judge at Android system/whether have described executable program file under the catalogue of system/bin, no, then enter step 3; Be, judge then whether executable program file needs upgrading, upgrade, then the Android application program is set up with this executable program file and is communicated by letter, and calls self-upgrade function, this executable program file is carried out upgrading processing, and change step 8 over to; Do not upgrade, then directly enter step 8;
The su program of step 3, Android application program operation Android system is carried out the first time to the operation user and is authorized;
Step 4, with Android system /the system catalogue weighs carry for can write state;
Step 5, with Android system /authority of system/bin catalogue arranges, with guarantee the Android application program right/catalogue of system/bin has the authority of writing;
Step 6, described executable program file is copied under the catalogue of described/system/bin, and revise this executable program file authority classification the owner and under be grouped into Root;
Step 7, the suid flag of executable program file is set, the suid flag is set after, executable program file just can be performed by the Android application program with possessory identity, namely has the operation of Root authority;
Step 8, Android application program are carried out executable program file and are communicated by letter with its foundation, this moment, the Android application program need to be used the operation of Root authority as long as carry out by executable program file, need not to carry out repetitive endowment by the su program of Android system.
2. Android application program according to claim 1 is forever obtained the method for Root authority, it is characterized in that: the operation of described Root authority comprises: obtain file directory, mourn in silence installation procedure and Uninstaller.
3. Android application program according to claim 1 is forever obtained the method for Root authority, it is characterized in that: described step 3 is specially: the su program of Android application program operation Android system, and obtain the output stream of su program, su order afterwards can directly write order and execution toward output stream, at this moment, output stream toward the su program writes an arbitrarily character order, the SuperUser of Android system can eject the mandate dialog box, the operation user clicks permission, then continue to carry out described step 4, the operation user clicks refusal, then process ends.
4. Android application program according to claim 1 is forever obtained the method for Root authority, it is characterized in that: described step 4 is specially: the output stream toward the su program writes the first order, with Android system /the system catalogue weighs carry for can write state, this first order is: " mount-oremount-w – t[type] [device]/system ", wherein [type] is for wanting the file system type of carry, [device] is for wanting the equipment of carry, these two are/relevant parameter of system catalogue carry, are to obtain by the shell-command of carrying out Android system.
5. Android application program according to claim 1 is forever obtained the method for Root authority, it is characterized in that: described step 5 is specially: the output stream toward the su program writes the second order, with Android system /authority of system/bin catalogue changes 777 into, with guarantee the Android application program right/catalogue of system/bin has the authority of writing, this second order is: " chmod 777/system/bin ".
6. Android application program according to claim 1 is forever obtained the method for Root authority, it is characterized in that: described step 6 is specially: the output stream toward the su program writes the 3rd order, executable program file is copied under the catalogue of described/system/bin, the 3rd order is " dd if=[fromPath] of=[toPath] ", wherein [fromPath] is the path at executable program file place this moment, [toPath] is the path that will copy to, namely/and the title of system/bin/ executable program file; And write the 4th order toward the output stream of su program, revise this executable program file authority classification the owner and under be grouped into root, the 4th order is " title of chown root:root/system/bin/ executable program file ".
7. Android application program according to claim 1 is forever obtained the method for Root authority, it is characterized in that: described step 7 is specially: the output stream toward the su program writes the 5th order, the suid flag of executable program file is set, and the executable program file authority is set to readable the execution, be that the executable program file authority is set to 4755, wherein " 4 " are the suid flags, executable program file just can be performed by the Android application program with possessory identity, namely has the operation of Root authority; The 5th order is: " title of chmod 4755/system/bin/ executable program file ".
CN201210436649.9A 2012-11-02 2012-11-02 Android application program permanent Root permission acquiring method Active CN102981835B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210436649.9A CN102981835B (en) 2012-11-02 2012-11-02 Android application program permanent Root permission acquiring method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210436649.9A CN102981835B (en) 2012-11-02 2012-11-02 Android application program permanent Root permission acquiring method

Publications (2)

Publication Number Publication Date
CN102981835A true CN102981835A (en) 2013-03-20
CN102981835B CN102981835B (en) 2015-06-10

Family

ID=47855900

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210436649.9A Active CN102981835B (en) 2012-11-02 2012-11-02 Android application program permanent Root permission acquiring method

Country Status (1)

Country Link
CN (1) CN102981835B (en)

Cited By (44)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103152366A (en) * 2013-04-10 2013-06-12 珠海市魅族科技有限公司 Method, terminal and server for obtaining terminal authorization
CN103198265A (en) * 2013-03-28 2013-07-10 上海斐讯数据通信技术有限公司 Method for starting root permission of mobile device
CN103324482A (en) * 2013-06-27 2013-09-25 苏州创智宏云信息科技有限公司 Android one-key root permission software
CN103324537A (en) * 2013-05-17 2013-09-25 Tcl集团股份有限公司 Resource sharing method and device
CN103365685A (en) * 2013-06-03 2013-10-23 深圳创维无线技术有限公司 Super authority method and super authority device based on android
CN103473502A (en) * 2013-09-16 2013-12-25 惠州Tcl移动通信有限公司 Method and system for acquiring Root rights of android-based mobile terminal
CN103530534A (en) * 2013-09-23 2014-01-22 北京理工大学 Android program ROOT authorization method based on signature verification
CN103559431A (en) * 2013-11-11 2014-02-05 北京国双科技有限公司 Detection method, device and system of Android system user permission
CN103714287A (en) * 2013-12-25 2014-04-09 北京奇虎科技有限公司 Method and device for obtaining temporary Root authority
CN103826215A (en) * 2014-02-11 2014-05-28 北京奇虎科技有限公司 Method and apparatus for carrying out root authority management at terminal equipment
CN103888294A (en) * 2014-02-28 2014-06-25 广州视睿电子科技有限公司 Method and device for assigning router in Android system
CN104063303A (en) * 2014-06-30 2014-09-24 上海斐讯数据通信技术有限公司 Method for acquiring and freeing root permissions
CN104134036A (en) * 2014-07-26 2014-11-05 珠海市君天电子科技有限公司 Method and device for obtaining Root permission
WO2014183534A1 (en) * 2013-11-12 2014-11-20 中兴通讯股份有限公司 Method and apparatus of automatically backing up application data and performing restoration as required
CN104199711A (en) * 2014-09-29 2014-12-10 北京奇虎科技有限公司 Method and device for creating root access
CN104217158A (en) * 2014-09-17 2014-12-17 青岛海信移动通信技术股份有限公司 Method for detecting system state of intelligent terminal and intelligent terminal
CN104252587A (en) * 2013-06-25 2014-12-31 腾讯科技(深圳)有限公司 File pulling method, device and system
CN104348628A (en) * 2014-12-01 2015-02-11 北京奇虎科技有限公司 Method and device for obtaining local Root authority
CN104391729A (en) * 2014-12-19 2015-03-04 北京奇虎科技有限公司 Root privilege based procedure upgrading method and device
CN104484611A (en) * 2014-11-10 2015-04-01 福建联迪商用设备有限公司 Partition-mounting control method and device of Android system
CN104506639A (en) * 2014-12-29 2015-04-08 北京奇虎科技有限公司 Root right acquiring method and device
CN104572158A (en) * 2013-10-29 2015-04-29 腾讯科技(深圳)有限公司 Method and device for running application program by superuser identity
CN104714760A (en) * 2015-03-05 2015-06-17 青岛海信宽带多媒体技术有限公司 Method and device for read and write storage device
CN104809403A (en) * 2014-01-24 2015-07-29 红板凳科技股份有限公司 Root-preventing white screen method
CN105243325A (en) * 2015-09-29 2016-01-13 北京奇虎科技有限公司 Method for residual process file in mobile terminal, mobile terminal and server
CN105630544A (en) * 2015-12-21 2016-06-01 小米科技有限责任公司 System updating control method and apparatus as well as server device
CN105956457A (en) * 2016-04-27 2016-09-21 四川秘无痕信息安全技术有限责任公司 Method for frequently executing root privilege operations and acquiring real-time result feedbacks
CN106529332A (en) * 2016-10-25 2017-03-22 广东欧珀移动通信有限公司 Permission control method and apparatus for mobile terminal, and mobile terminal
CN106559546A (en) * 2015-09-28 2017-04-05 腾讯科技(深圳)有限公司 Method and apparatus of the control software using network internet
CN106650408A (en) * 2016-12-09 2017-05-10 武汉斗鱼网络科技有限公司 Method and system used for judging existence of root authority in Android system
CN106919812A (en) * 2015-12-26 2017-07-04 腾讯科技(深圳)有限公司 A kind of application process right management method and device
CN107068150A (en) * 2017-05-03 2017-08-18 安利军 A kind of Android intelligent sounds control method and system
CN108595214A (en) * 2018-04-11 2018-09-28 北京海杭通讯科技有限公司 Android user versions obtain the method and system of root privileges under SELinux compulsory modes
CN108920945A (en) * 2018-05-02 2018-11-30 广州视源电子科技股份有限公司 root authority obtaining and deleting method and device, terminal equipment and storage medium
CN109271781A (en) * 2018-09-13 2019-01-25 西安交通大学 A kind of application program acquisition super authority behavioral value method and system based on kernel
CN109815726A (en) * 2017-11-21 2019-05-28 中标软件有限公司 The method and its background program building method of ordinary user's modification system file
CN109815680A (en) * 2018-12-27 2019-05-28 歌尔股份有限公司 Management method, device, terminal device and the storage medium of application permission
CN110457894A (en) * 2019-08-06 2019-11-15 惠州Tcl移动通信有限公司 Distribution method, device, storage medium and the terminal device of root authority
CN113254916A (en) * 2021-05-25 2021-08-13 深圳市瑞驰信息技术有限公司 Implementation method of root switch of android system
CN113688377A (en) * 2021-07-27 2021-11-23 青岛中科英泰商用系统股份有限公司 Root authority management method and system of Android device
CN114090055A (en) * 2021-11-10 2022-02-25 北京鲸鲮信息系统技术有限公司 Application program updating method and device, terminal and storage medium
CN115391794A (en) * 2022-10-27 2022-11-25 中孚安全技术有限公司 Method, system and equipment for adding permission in application program starting process
CN115499420A (en) * 2022-09-14 2022-12-20 苏州龙信信息科技有限公司 Data transmission method and device, electronic equipment and storage medium
CN116702163A (en) * 2022-09-27 2023-09-05 荣耀终端有限公司 Authority management method and terminal equipment

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030028508A1 (en) * 2001-08-06 2003-02-06 Joseph Quinlan Method and apparatus for controlling the performance of a file system mount operation by a user lacking superuser authority
CN102289633A (en) * 2011-09-02 2011-12-21 广东欧珀移动通信有限公司 Method for managing dynamic permission of application program under Android platform

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030028508A1 (en) * 2001-08-06 2003-02-06 Joseph Quinlan Method and apparatus for controlling the performance of a file system mount operation by a user lacking superuser authority
CN102289633A (en) * 2011-09-02 2011-12-21 广东欧珀移动通信有限公司 Method for managing dynamic permission of application program under Android platform

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
AIY_YA: "《Android root权限获取原理详解》", 9 August 2012 *
COLIN: "《Android root权限破解原理分析》", 30 August 2011 *
姜颖韬: "浅析Android平台ROOT权限", 《科技经济市场》 *

Cited By (66)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103198265A (en) * 2013-03-28 2013-07-10 上海斐讯数据通信技术有限公司 Method for starting root permission of mobile device
CN103152366A (en) * 2013-04-10 2013-06-12 珠海市魅族科技有限公司 Method, terminal and server for obtaining terminal authorization
CN103152366B (en) * 2013-04-10 2015-12-23 魅族科技(中国)有限公司 Obtain the method for terminal authorization, terminal and server
CN103324537A (en) * 2013-05-17 2013-09-25 Tcl集团股份有限公司 Resource sharing method and device
CN103365685A (en) * 2013-06-03 2013-10-23 深圳创维无线技术有限公司 Super authority method and super authority device based on android
CN104252587B (en) * 2013-06-25 2018-04-27 腾讯科技(深圳)有限公司 Pull the method, apparatus and system of file
CN104252587A (en) * 2013-06-25 2014-12-31 腾讯科技(深圳)有限公司 File pulling method, device and system
CN103324482A (en) * 2013-06-27 2013-09-25 苏州创智宏云信息科技有限公司 Android one-key root permission software
CN103473502A (en) * 2013-09-16 2013-12-25 惠州Tcl移动通信有限公司 Method and system for acquiring Root rights of android-based mobile terminal
CN103530534A (en) * 2013-09-23 2014-01-22 北京理工大学 Android program ROOT authorization method based on signature verification
CN103530534B (en) * 2013-09-23 2016-06-29 北京理工大学 A kind of Android program ROOT authorization method based on signature verification
CN104572158A (en) * 2013-10-29 2015-04-29 腾讯科技(深圳)有限公司 Method and device for running application program by superuser identity
CN104572158B (en) * 2013-10-29 2019-01-04 腾讯科技(深圳)有限公司 One kind running application program method and device with power user's identity
CN103559431A (en) * 2013-11-11 2014-02-05 北京国双科技有限公司 Detection method, device and system of Android system user permission
US9864657B2 (en) 2013-11-12 2018-01-09 Zte Corporation Method and apparatus of automatically backing up application data and performing restoration as required
WO2014183534A1 (en) * 2013-11-12 2014-11-20 中兴通讯股份有限公司 Method and apparatus of automatically backing up application data and performing restoration as required
CN104636375A (en) * 2013-11-12 2015-05-20 中兴通讯股份有限公司 Method and device for automatically backing up application data and restoring application data according to needs
CN104636375B (en) * 2013-11-12 2019-05-07 中兴通讯股份有限公司 A kind of automated back-up application data and the method and device restored on demand
CN103714287B (en) * 2013-12-25 2015-07-01 北京奇虎科技有限公司 Method and device for obtaining temporary Root authority
CN103714287A (en) * 2013-12-25 2014-04-09 北京奇虎科技有限公司 Method and device for obtaining temporary Root authority
CN104809403A (en) * 2014-01-24 2015-07-29 红板凳科技股份有限公司 Root-preventing white screen method
CN103826215B (en) * 2014-02-11 2018-03-02 北京奇虎科技有限公司 A kind of method and apparatus for carrying out Root authority management on the terminal device
CN103826215A (en) * 2014-02-11 2014-05-28 北京奇虎科技有限公司 Method and apparatus for carrying out root authority management at terminal equipment
CN103888294A (en) * 2014-02-28 2014-06-25 广州视睿电子科技有限公司 Method and device for assigning router in Android system
CN103888294B (en) * 2014-02-28 2017-10-27 广州视睿电子科技有限公司 Method and device for assigning router in Android system
CN104063303A (en) * 2014-06-30 2014-09-24 上海斐讯数据通信技术有限公司 Method for acquiring and freeing root permissions
CN104063303B (en) * 2014-06-30 2019-07-16 上海斐讯数据通信技术有限公司 A method of obtaining and discharge root authority
CN104134036A (en) * 2014-07-26 2014-11-05 珠海市君天电子科技有限公司 Method and device for obtaining Root permission
CN104134036B (en) * 2014-07-26 2017-05-10 珠海市君天电子科技有限公司 Method and device for obtaining Root permission
CN104217158A (en) * 2014-09-17 2014-12-17 青岛海信移动通信技术股份有限公司 Method for detecting system state of intelligent terminal and intelligent terminal
CN104199711A (en) * 2014-09-29 2014-12-10 北京奇虎科技有限公司 Method and device for creating root access
CN104199711B (en) * 2014-09-29 2018-02-13 北京奇虎科技有限公司 The method and apparatus for establishing root authority
CN104484611A (en) * 2014-11-10 2015-04-01 福建联迪商用设备有限公司 Partition-mounting control method and device of Android system
CN104348628A (en) * 2014-12-01 2015-02-11 北京奇虎科技有限公司 Method and device for obtaining local Root authority
CN104391729B (en) * 2014-12-19 2018-05-01 北京奇虎科技有限公司 Programme upgrade method and device based on Root authority
CN104391729A (en) * 2014-12-19 2015-03-04 北京奇虎科技有限公司 Root privilege based procedure upgrading method and device
CN104506639A (en) * 2014-12-29 2015-04-08 北京奇虎科技有限公司 Root right acquiring method and device
CN104714760B (en) * 2015-03-05 2018-05-15 青岛海信宽带多媒体技术有限公司 A kind of method and device for reading and writing storage device
CN104714760A (en) * 2015-03-05 2015-06-17 青岛海信宽带多媒体技术有限公司 Method and device for read and write storage device
CN106559546A (en) * 2015-09-28 2017-04-05 腾讯科技(深圳)有限公司 Method and apparatus of the control software using network internet
CN105243325A (en) * 2015-09-29 2016-01-13 北京奇虎科技有限公司 Method for residual process file in mobile terminal, mobile terminal and server
CN105630544A (en) * 2015-12-21 2016-06-01 小米科技有限责任公司 System updating control method and apparatus as well as server device
CN106919812A (en) * 2015-12-26 2017-07-04 腾讯科技(深圳)有限公司 A kind of application process right management method and device
CN106919812B (en) * 2015-12-26 2020-06-16 腾讯科技(深圳)有限公司 Application process authority management method and device
CN105956457B (en) * 2016-04-27 2018-11-13 四川秘无痕信息安全技术有限责任公司 A method of it frequently executing root authority and operates and obtain real-time results feedback
CN105956457A (en) * 2016-04-27 2016-09-21 四川秘无痕信息安全技术有限责任公司 Method for frequently executing root privilege operations and acquiring real-time result feedbacks
CN106529332B (en) * 2016-10-25 2019-08-13 Oppo广东移动通信有限公司 A kind of authority control method of mobile terminal, device and mobile terminal
CN106529332A (en) * 2016-10-25 2017-03-22 广东欧珀移动通信有限公司 Permission control method and apparatus for mobile terminal, and mobile terminal
CN106650408B (en) * 2016-12-09 2020-08-04 武汉斗鱼网络科技有限公司 Method and system for judging whether android system has root permission
CN106650408A (en) * 2016-12-09 2017-05-10 武汉斗鱼网络科技有限公司 Method and system used for judging existence of root authority in Android system
CN107068150A (en) * 2017-05-03 2017-08-18 安利军 A kind of Android intelligent sounds control method and system
CN109815726A (en) * 2017-11-21 2019-05-28 中标软件有限公司 The method and its background program building method of ordinary user's modification system file
CN108595214A (en) * 2018-04-11 2018-09-28 北京海杭通讯科技有限公司 Android user versions obtain the method and system of root privileges under SELinux compulsory modes
CN108920945B (en) * 2018-05-02 2020-10-02 广州视源电子科技股份有限公司 root authority obtaining and deleting method and device, terminal equipment and storage medium
CN108920945A (en) * 2018-05-02 2018-11-30 广州视源电子科技股份有限公司 root authority obtaining and deleting method and device, terminal equipment and storage medium
CN109271781A (en) * 2018-09-13 2019-01-25 西安交通大学 A kind of application program acquisition super authority behavioral value method and system based on kernel
CN109815680A (en) * 2018-12-27 2019-05-28 歌尔股份有限公司 Management method, device, terminal device and the storage medium of application permission
CN109815680B (en) * 2018-12-27 2021-08-31 歌尔股份有限公司 Application authority management method and device, terminal equipment and storage medium
CN110457894A (en) * 2019-08-06 2019-11-15 惠州Tcl移动通信有限公司 Distribution method, device, storage medium and the terminal device of root authority
CN113254916A (en) * 2021-05-25 2021-08-13 深圳市瑞驰信息技术有限公司 Implementation method of root switch of android system
CN113688377A (en) * 2021-07-27 2021-11-23 青岛中科英泰商用系统股份有限公司 Root authority management method and system of Android device
CN113688377B (en) * 2021-07-27 2024-07-09 青岛中科英泰商用系统股份有限公司 Root authority management method and system of Android device
CN114090055A (en) * 2021-11-10 2022-02-25 北京鲸鲮信息系统技术有限公司 Application program updating method and device, terminal and storage medium
CN115499420A (en) * 2022-09-14 2022-12-20 苏州龙信信息科技有限公司 Data transmission method and device, electronic equipment and storage medium
CN116702163A (en) * 2022-09-27 2023-09-05 荣耀终端有限公司 Authority management method and terminal equipment
CN115391794A (en) * 2022-10-27 2022-11-25 中孚安全技术有限公司 Method, system and equipment for adding permission in application program starting process

Also Published As

Publication number Publication date
CN102981835B (en) 2015-06-10

Similar Documents

Publication Publication Date Title
CN102981835B (en) Android application program permanent Root permission acquiring method
US9075955B2 (en) Managing permission settings applied to applications
US8955142B2 (en) Secure execution of unsecured apps on a device
US8549656B2 (en) Securing and managing apps on a device
CN103544447B (en) A kind of method preventing confidential information from revealing based on Android system and terminal
CN105046146B (en) A kind of resource access method of Android system
CN102289633A (en) Method for managing dynamic permission of application program under Android platform
CN104156660B (en) A kind of Android authority fine-grained access control method based on running environment state
CN104267982A (en) Application program start control system and method
Elkhodary et al. A survey of approaches to adaptive application security
CN104036202A (en) Method and equipment for isolating enterprise applications
US12047239B2 (en) Configuration management for co-management
US11108831B2 (en) Machine policy configuration for managed devices
CN103617389A (en) Terminal rights management method and terminal device
JP2004158007A (en) Computer access authorization
CN105373714B (en) A kind of user authority control method and device
CN101309478B (en) Method for mobile terminal data access
CN111651738A (en) Fine-grained role authority unified management method based on front-end and back-end separation framework and electronic device
CA2830880C (en) Managing permission settings applied to applications
CN104063303A (en) Method for acquiring and freeing root permissions
CN103763370B (en) A kind of method, system and device for changing mobile terminal workspace screen-lock password
US9692788B2 (en) Method and system for domain creation and bootstrapping
US9953104B2 (en) Controlling access to one or more datasets of an operating system in use
KR101345959B1 (en) Method for multi-user authority management for single-user mobile handset platform and mobile handset using the same
CN110826027B (en) Method and system for distributing computer software user permission

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C41 Transfer of patent application or patent right or utility model
TR01 Transfer of patent right

Effective date of registration: 20160106

Address after: 100000, No. two, building 17, Zhongguancun Software Park, 8 northeast Wang Xi Road, Beijing, Haidian District, A2

Patentee after: BAIDU.COM TIMES TECHNOLOGY (BEIJING) Co.,Ltd.

Address before: 350000, 403A building, four floor, Torch Innovation Building, 8 star road, Fuzhou Development Zone, Fuzhou, Fujian, China

Patentee before: Fuzhou Boyuan Wireless Network Technology Co., Ltd.