CN103034811A - File processing method and system and device - Google Patents

File processing method and system and device Download PDF

Info

Publication number
CN103034811A
CN103034811A CN2011102944339A CN201110294433A CN103034811A CN 103034811 A CN103034811 A CN 103034811A CN 2011102944339 A CN2011102944339 A CN 2011102944339A CN 201110294433 A CN201110294433 A CN 201110294433A CN 103034811 A CN103034811 A CN 103034811A
Authority
CN
China
Prior art keywords
message
inner nuclear
application layer
layer
identifying code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2011102944339A
Other languages
Chinese (zh)
Other versions
CN103034811B (en
Inventor
张宏海
何晗春
戴寅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
New Founder Holdings Development Co ltd
Original Assignee
Peking University Founder Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Peking University Founder Group Co Ltd filed Critical Peking University Founder Group Co Ltd
Priority to CN201110294433.9A priority Critical patent/CN103034811B/en
Publication of CN103034811A publication Critical patent/CN103034811A/en
Application granted granted Critical
Publication of CN103034811B publication Critical patent/CN103034811B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Telephone Function (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a file processing method, a file processing system and a file processing device. The file processing method, the file processing system and the file processing device are used for improving file processing capacity of an Android operating system while guaranteeing the safety of the Android operating system. The file processing method comprises that a kernel layer receives messages sent from an application program layer and checks the received messages. When the messages pass the check, file processing commands which the application program layer has no authority to carry out contained in the messages are carried out.

Description

A kind of method, system and device of file processing
Technical field
The present invention relates to the operation system technology field, particularly a kind of method, system and device of file processing.
Background technology
In recent years, Android operating system is because its increasing income property more and more is widely used, and the embedded devices such as the smart mobile phone of employing Android system exploitation, panel computer emerge in an endless stream.
Android operating system is based on the operating system of Linux 2.6 kernels, and it is divided into four layers: linux inner nuclear layer, system's Runtime Library layer, application framework layer and application layer.Wherein, the linux kernel layer, namely the kernel layer has comprised the core system service of Android, such as security, memory management, management of process etc.; System's Runtime Library layer mainly comprises routine library and android Runtime Library, and routine library can be used by assemblies different in the Android system, and the Android Runtime Library provides most of functions of JAVA programming language core library; The application framework layer is the employed API framework of core application, and the developer can develop with these frameworks the application of oneself equally; Application layer is the program on the virtual machine of operating in of writing with Java language.
Because Android is based on linux kernel, the security architecture of Linux sets up so the security system of Android also is based on.Linux is the operating system of a multi-user, multitask, and user and assembly play an important role, and different users is different to the access attribute of identical file with assembly, makes like this linux system safer.Therefore, in Android operating system, system has created a user and assembly for each application program.These users and assembly all are domestic consumers, can not access the data of linux inner nuclear layer, can only access file and the catalogue of corresponding application program, can not access the data of other application programs.The private data of protection application program will be used and use like this, use with isolation of system and open, and strengthen Security of the system and robustness.
As seen, at present in the Android operating system, each application program only has system (system) authority, and do not have a highest weight limit, i.e. root (root) authority, thereby, can only operate private data, like this, although strengthened Security of the system, some problems have also been brought simultaneously.Program when application layer, be that application program is need to carry out certain operations to system file the time, such as copy or revised file content, attribute under to system directory, configuration network address etc., these all need the user who has highest weight limit (root authority) to operate, because application program only has the system authority, therefore, can not carry out these operations.
Summary of the invention
The embodiment of the invention provides a kind of method, system and device of file processing, in order in the security that guarantees Android operating system, improves the file processing ability of Android operating system.
The embodiment of the invention provides a kind of method of file processing, comprising:
Inner nuclear layer receives the message that application layer sends;
Described inner nuclear layer is verified the message that receives, and when checking is passed through, carries out the file manipulation command that the described application layer that comprises in the described message does not have authority to carry out.
The embodiment of the invention provides a kind of system of file processing, comprising: application layer and inner nuclear layer, wherein,
Described application layer is used for sending message to described inner nuclear layer;
Described inner nuclear layer is used for receiving described message, and the message that receives is verified, when checking is passed through, carries out the file manipulation command that the described application layer that comprises in the described message does not have authority to carry out.
The embodiment of the invention provides a kind of device of business processing, is applied to comprise in the inner nuclear layer:
Receiving element is used for receiving the message that application layer sends;
Processing unit is used for the message that receives is verified, when checking is passed through, carries out the file manipulation command that the described application layer that comprises in the described message does not have authority to carry out.
The embodiment of the invention provides a kind of device of business processing, is applied to comprise in the application layer:
Acquiring unit is used for obtaining the first message identifying code;
Set up the unit, be used for according to described the first message identifying code, and described application layer does not have the file manipulation command of authority execution, set up message, wherein, the packet header of described message is the file manipulation command that described application layer does not have authority to carry out for the first message identifying code after encrypting, the message body of described message;
Transmitting element is used for by socket communication protocol described message being sent to described inner nuclear layer.
In the embodiment of the invention, when the application layer in the Android operating system does not have the file manipulation command of authority execution, this document processing command is generated message send to inner nuclear layer, this inner nuclear layer has the highest weight limit, like this, after inner nuclear layer receives message, this message is verified, when checking is passed through, carry out the file manipulation command that the described application layer that comprises in the described message does not have authority to carry out.Thereby, only have the application layer of system authority to process system file by the inner nuclear layer with root authority, improve the file processing ability of Android operating system.And all system files all are to be processed by inner nuclear layer, and the private data of each application program is each self-isolation still, has guaranteed the security of operating system.
Description of drawings
Fig. 1 is the process flow diagram that embodiment of the invention File is processed;
Fig. 2 is the Organization Chart of embodiment of the invention File disposal system;
Fig. 3 is the structural drawing of inner nuclear layer File treating apparatus in the embodiment of the invention;
Fig. 4 is the structural drawing of application layer document handling apparatus in the embodiment of the invention.
Embodiment
In the embodiment of the invention, the linux inner nuclear layer of Android operating system is that the kernel layer has the root authority, can process system file, like this, when the program of the application layer of Android operating system needs process system file, because it does not possess the root authority, then this task must be sent to the kernel layer, carry out this task by the kernel layer.Thereby, when guaranteeing Security of the system, improved the file processing ability.
In the embodiment of the invention, when the application program in the Android operating system need to be carried out certain operations to system file, such as copy or revised file content, attribute under to system directory, configuration network address etc., because application program only has the system authority, therefore, can not carry out these operations, the file manipulation command that these must not had authority to carry out sends to inner nuclear layer, carried out by inner nuclear layer, namely only have the application layer of system authority to process system file by the inner nuclear layer with root authority.
Referring to Fig. 1, the process that Android operating system File is processed comprises:
Step 101: application layer sends message to inner nuclear layer, the file manipulation command that the described application layer that comprises in this message does not have authority to carry out.
Before the application layer execute file processing command, can judge whether authority execution this document processing command, when determining not have authority to carry out this document processing command, send message to inner nuclear layer, the file manipulation command that the described application layer that comprises in this message does not have authority to carry out.
Here, application layer can directly send to inner nuclear layer and carry the message of file manipulation command.The message of an all right safety of assembly, and then send, its detailed process comprises:
Obtain the first message identifying code, and according to the first message identifying code, and the application layer file manipulation command that do not have authority to carry out, set up message, last, by socket communication protocol, message is sent to inner nuclear layer.Wherein, the packet header of message is the file manipulation command that described application layer does not have authority to carry out for the first message identifying code after encrypting, the message body of message.
Can obtain the first message identifying code by the user interface of application layer, perhaps, from the storage unit of system, obtain the first message identifying code, then this first message identifying code is encrypted, with the packet header of the first message identifying code after encrypting as message, application layer there is not the file manipulation command of authority execution as the message body of message, then, by socket communication protocol, message is sent to inner nuclear layer.
In addition, in the embodiment of the invention, also can directly adopt the authentication of message code that file manipulation command is encrypted, generate message, this message is sent to inner nuclear layer.
Step 102: inner nuclear layer receives the message that application layer sends.
Can adopt various communications protocols between inner nuclear layer and the application layer.For example: in the step 101, application layer sends to inner nuclear layer by socket communication protocol with message, and here, inner nuclear layer is monitored the socket port, receives the message that application layer sends by this socket port.Certainly, the embodiment of the invention also comprises other communication protocol, for example: such as shared file, message mailbox etc.
Step 103: inner nuclear layer is verified the message that receives, verifies when passing through, and execution in step 104, otherwise flow process finishes.
Can only verify the packet header of message in the embodiment of the invention, or only the message body of message be verified, perhaps, packet header and the message body of message all be verified.Wherein,
When the packet header of message was verified, the mode of setting up message was different, and inner nuclear layer is also different to the proof procedure of message, and namely the decryption protocol of proof procedure is consistent with the cryptographic protocol in setting up the message process.For example, has encrypted in the packet header of message, and proof procedure comprises:
Packet header to the message that receives is decrypted, and obtains the second message identifying code, and the first message identifying code of the second message identifying code and preservation is compared, and when both are consistent, the packet header of message are verified pass through; Otherwise checking is not passed through.
In the embodiment of the invention, can decontrol authority to inner nuclear layer, namely all file manipulation commands can be carried out, therefore, here, do not need the message body of message is verified, when the packet header checking of message is passed through, get final product execution in step 104, otherwise flow process finishes.
In another embodiment of the present invention, also can be only to inner nuclear layer open authority partly, the file manipulation command that namely inner nuclear layer can only operating part, therefore, preserved executable file manipulation command in the inner nuclear layer, after the packet header checking of message is passed through, also needed the message body of message is verified.Detailed process comprises:
Inner nuclear layer is searched the file manipulation command in the message body whether message that receives is arranged in the executable file manipulation command of preserving; If have, determine that this message is legal message, execution in step 104, otherwise flow process finishes.Like this, only inner nuclear layer is partly opened authority, the security that has further improved operating system.
Certainly, in another embodiment of the present invention, can only verify to the message body of message that namely inner nuclear layer is searched the file manipulation command in the message body whether message that receives is arranged in the executable file manipulation command of preserving; If have, determine that this message is legal message, execution in step 104, otherwise flow process finishes.
Step 104: inner nuclear layer is carried out the file manipulation command that the application layer that comprises in the message does not have authority to carry out, and file handling procedure finishes.
Inner nuclear layer has passed through the authentication of message that receives, and can carry out the file manipulation command that the application layer in the message message body does not have authority to carry out, and realizes the processing of file.
In the embodiment of the invention, can carry out the file manipulation command that the application layer program does not have authority to carry out by calling execve (const char*filename, char*const argv[], char*const envp[]) function to inner nuclear layer.
At above-mentioned file handling procedure, the application layer in the Android operating system can operate system file by inner nuclear layer, has improved the file processing ability of Android operating system.Simultaneously, all system files all are to be processed by inner nuclear layer, and the private data of each application program is each self-isolation still, has guaranteed the security of operating system.
In the embodiment of the invention, the inner nuclear layer of Android operating system must have the highest weight limit, therefore, receives at inner nuclear layer before the message of application layer transmission, also need activate inner nuclear layer, makes inner nuclear layer have the highest weight limit.When generally using the starting up of terminal of Android operating system, the inner nuclear layer of this Android operating system just is activated.Here, can in the init.rc of Android operating system file, define a service myserver, the executable program server that inner nuclear layer is compiled puts into/the system/bin catalogue under, inner nuclear layer Programm erver is defined as the service that will move, as follows:
service?myserver/system/bin/server
Like this, myserver has just had the root authority.Because the init.rc file is by system call, so service myserver will be created when starting shooting at every turn in the start that Android operating system is installed.
Adopted the terminal of Android operating system all can process file by said method.For example: adopted the domestic information terminal of Android operating system to carry out network address configuration by said method.After the network address configuration module of application layer obtains IP address, subnet mask, gateway address and the DNS of terminal user's input, in this configuration module they are set up into the message body of message, and obtain the authentication of message code and be encrypted, with the packet header of the identifying code after encrypting as message, communicate with the server of inner nuclear layer, message is sent to the server of inner nuclear layer.
After the server of inner nuclear layer receives message, message is resolved and verified, if legal message, just obtain the relevant informations such as IP address in the message body, subnet mask, and network configuration is carried out in the order of calling configuration network.So just realized namely having realized the processing of system file in application layer configuration network address.
Wherein, when inner nuclear layer had whole authority, the server of inner nuclear layer can only verify the packet header of message.If inner nuclear layer only has the part authority, at this moment, after the server of inner nuclear layer verifies the packet header of message, also need judge the order that to carry out configuration network, namely in the executable command of preserving, search the order whether configuration network is arranged, if have, just obtain the relevant informations such as IP address in the message body, subnet mask, carry out network configuration.Otherwise, return the instruction of invalid packet.
This shows, in the embodiment of the invention, when application program need to be carried out certain operations to system file, such as copy or revised file content, attribute under to system directory, configuration network address etc., although application program only has the system authority, this application program can be carried out by the inner nuclear layer with root authority these operations,, the file processing ability of raising Android operating system.
By the method for above-mentioned file processing, the system of the file processing in the embodiment of the invention as can be known referring to Fig. 2, comprising: application layer 100 and inner nuclear layer 200, wherein,
Application layer 100 is used for sending message to inner nuclear layer 200.
Inner nuclear layer 200 is used for receiving message, and the message that receives is verified, when checking is passed through, carries out the file manipulation command that the application layer 100 that comprises in the message does not have authority to carry out.
In this system, application layer 100, concrete being used for obtained the first message identifying code, and according to the first message identifying code, and application layer does not have the file manipulation command of authority execution, set up message, by socket communication protocol, message is sent to inner nuclear layer, wherein, the packet header of message is the file manipulation command that application layer does not have authority to carry out for the first message identifying code after encrypting, the message body of message.
Inner nuclear layer 200, the concrete monitoring socket port that is used for, receive the message that application layer sends by the socket port, packet header to the message that receives is decrypted, obtain the second message identifying code, the first message identifying code of the second message identifying code and preservation is compared, when both are consistent, packet header checking to described message is passed through, and carries out the file manipulation command that the application layer that comprises in the message does not have authority to carry out.
The mode that application layer 100 is set up message in the embodiment of the invention can have multiple, and the proof procedure of 200 pairs of messages of inner nuclear layer also has multiple, and is general, and the cryptographic protocol that program layer 100 is set up in the message process is consistent with the decryption protocol of inner nuclear layer 200 proof procedures.
In addition, the communication protocol of application layer 100 and inner nuclear layer 200 also can have multiple, is not limited to socket communication protocol.
Inner nuclear layer 200 can be carried out all file manipulation commands, and perhaps, inner nuclear layer 200 can only have the part authority, file manipulation command that can only operating part.
When 200 of this inner nuclear layers had the part authority, concrete file manipulation command for searching in the executable file manipulation command of preserving in the message body whether described message is arranged if having, determined that described message is legal message.
In this document disposal system, also comprise active device, be used for activating described inner nuclear layer, make described inner nuclear layer have the highest weight limit.
In the aforesaid operations system, be applied to the device of the file processing in the inner nuclear layer, referring to Fig. 3, comprising: receiving element 310 and processing unit 320.
Receiving element 310 is used for receiving the message that application layer sends.
Processing unit 320 is used for the message that receives is verified, when checking is passed through, carries out the file manipulation command that the described application layer that comprises in the described message does not have authority to carry out.
Wherein, receiving element 310, the concrete monitoring socket port that is used for receives the message that application layer sends by described socket port.
Processing unit 320, concrete being used for is decrypted the packet header of the message that receives, obtain the second message identifying code, the first message identifying code of described the second message identifying code and preservation is compared, when both are consistent, checking is passed through, and carries out the file manipulation command that the described application layer that comprises in the described message does not have authority to carry out.
This processing unit 320, concrete file manipulation command for searching in the executable file manipulation command of preserving in the message body whether described message is arranged if having, determines that described message is legal message.
In the aforesaid operations system, be applied to the device of the file processing in the application layer, referring to Fig. 4, comprising: acquiring unit 410, set up unit 420, and transmitting element 430.
Acquiring unit 410 is used for obtaining the first message identifying code.
Set up unit 420, be used for according to the first message identifying code, and application layer does not have the file manipulation command of authority execution, set up message, wherein, the packet header of message is the file manipulation command that application layer does not have authority to carry out for the first message identifying code after encrypting, the message body of message.
Transmitting element 430 is used for by socket communication protocol message being sent to inner nuclear layer.
All be described as an example of Android operating system example among above-mentioned all embodiment, but the embodiment of the invention is not limited to this, can be applied among above-mentioned all embodiment, for example based on all operations system of linux kernel layer: the Saipan system.
In the embodiment of the invention, when not having the file manipulation command of authority execution based on the application layer in the operating system of linux kernel layer, this document processing command is generated message send to inner nuclear layer, this inner nuclear layer has the highest weight limit, like this, after inner nuclear layer receives message, this message is verified, when checking is passed through, carry out the file manipulation command that the described application layer that comprises in the described message does not have authority to carry out.Like this, only have the application layer of system authority system file to be operated by the inner nuclear layer with root authority in the operating system based on the linux kernel layer, improved the file processing ability based on the operating system of linux kernel layer.Simultaneously, all system files all are to be processed by inner nuclear layer, and the private data of each application program is each self-isolation still, has guaranteed the security of operating system.
Obviously, those skilled in the art can carry out various changes and modification to the present invention and not break away from the spirit and scope of the present invention.Like this, if of the present invention these are revised and modification belongs within the scope of claim of the present invention and equivalent technologies thereof, then the present invention also is intended to comprise these changes and modification interior.

Claims (15)

1. the method for a file processing is characterized in that, comprising:
Inner nuclear layer receives the message that application layer sends;
Described inner nuclear layer is verified the message that receives, and when checking is passed through, carries out the file manipulation command that the described application layer that comprises in the described message does not have authority to carry out.
2. the method for claim 1 is characterized in that, described application layer sends message and comprises:
Obtain the first message identifying code;
According to described the first message identifying code, and described application layer does not have the file manipulation command of authority execution, set up message, wherein, the packet header of described message is the file manipulation command that described application layer does not have authority to carry out for the first message identifying code after encrypting, the message body of described message;
By socket communication protocol, described message is sent to described inner nuclear layer.
3. method as claimed in claim 2 is characterized in that, the message that described inner nuclear layer receives the application layer transmission comprises:
Described inner nuclear layer is monitored the socket port, receives the message that described application layer sends by described socket port.
4. method as claimed in claim 2 is characterized in that, described inner nuclear layer is verified the message that receives and comprised:
Packet header to the message that receives is decrypted, and obtains the second message identifying code;
The first message identifying code of described the second message identifying code and preservation is compared, when both are consistent, the packet header checking of described message is passed through.
5. such as claim 2 or 4 described methods, it is characterized in that described inner nuclear layer is verified the message that receives and comprised:
In the executable file manipulation command of preserving, search the file manipulation command in the message body whether described message is arranged;
If have, determine that described message is legal message.
6. the method for claim 1 is characterized in that, described inner nuclear layer receives before the message of application layer transmission, also comprises:
Activate described inner nuclear layer, make described inner nuclear layer have the highest weight limit.
7. the system of a file processing is characterized in that, comprising: application layer and inner nuclear layer, wherein,
Described application layer is used for sending message to described inner nuclear layer;
Described inner nuclear layer is used for receiving described message, and the message that receives is verified, when checking is passed through, carries out the file manipulation command that the described application layer that comprises in the described message does not have authority to carry out.
8. system as claimed in claim 7 is characterized in that,
Described application layer, concrete for obtaining the first message identifying code, according to described the first message identifying code, and the described application layer file manipulation command that do not have authority to carry out, set up message, by socket communication protocol, described message is sent to described inner nuclear layer, wherein, the packet header of described message is the file manipulation command that described application layer does not have authority to carry out for the first message identifying code after encrypting, the message body of described message;
Described inner nuclear layer, the concrete monitoring socket port that is used for, receive the message that described application layer sends by described socket port, packet header to the message that receives is decrypted, obtain the second message identifying code, the first message identifying code of described the second message identifying code and preservation is compared, when both are consistent, packet header checking to described message is passed through, and carries out the file manipulation command that the described application layer that comprises in the described message does not have authority to carry out.
9. system as claimed in claim 8 is characterized in that,
Described inner nuclear layer, concrete file manipulation command for searching in the executable file manipulation command of preserving in the message body whether described message is arranged if having, determines that described message is legal message.
10. system as claimed in claim 7 is characterized in that, also comprises:
Active device is used for activating described inner nuclear layer, makes described inner nuclear layer have the highest weight limit.
11. the device of a file processing is characterized in that, is applied to comprise in the inner nuclear layer:
Receiving element is used for receiving the message that application layer sends;
Processing unit is used for the message that receives is verified, when checking is passed through, carries out the file manipulation command that the described application layer that comprises in the described message does not have authority to carry out.
12. device as claimed in claim 11 is characterized in that,
Described receiving element, the concrete monitoring socket port that is used for receives the message that application layer sends by described socket port.
13. device as claimed in claim 11 is characterized in that,
Described processing unit, concrete being used for is decrypted the packet header of the message that receives, obtain the second message identifying code, the first message identifying code of described the second message identifying code and preservation is compared, when both are consistent, packet header checking to described message is passed through, and carries out the file manipulation command that the described application layer that comprises in the described message does not have authority to carry out.
14. such as claim 11 or 13 described devices, it is characterized in that,
Described processing unit, concrete file manipulation command for searching in the executable file manipulation command of preserving in the message body whether described message is arranged if having, determines that described message is legal message.
15. the device of a file processing is characterized in that, is applied to comprise in the application layer:
Acquiring unit is used for obtaining the first message identifying code;
Set up the unit, be used for according to described the first message identifying code, and described application layer does not have the file manipulation command of authority execution, set up message, wherein, the packet header of described message is the file manipulation command that described application layer does not have authority to carry out for the first message identifying code after encrypting, the message body of described message;
Transmitting element is used for by socket communication protocol described message being sent to described inner nuclear layer.
CN201110294433.9A 2011-09-29 2011-09-29 A kind of method, system and device of file process Expired - Fee Related CN103034811B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110294433.9A CN103034811B (en) 2011-09-29 2011-09-29 A kind of method, system and device of file process

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110294433.9A CN103034811B (en) 2011-09-29 2011-09-29 A kind of method, system and device of file process

Publications (2)

Publication Number Publication Date
CN103034811A true CN103034811A (en) 2013-04-10
CN103034811B CN103034811B (en) 2016-08-03

Family

ID=48021697

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110294433.9A Expired - Fee Related CN103034811B (en) 2011-09-29 2011-09-29 A kind of method, system and device of file process

Country Status (1)

Country Link
CN (1) CN103034811B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103544096A (en) * 2013-10-21 2014-01-29 Tcl集团股份有限公司 Method and system for feeding back information in case of operational failure of Android terminal
CN103593218A (en) * 2013-11-29 2014-02-19 苏军生 Terminal suitable for being used by the aged and based on Android operating system
CN106293962A (en) * 2016-08-01 2017-01-04 青岛海信宽带多媒体技术有限公司 A kind of method and apparatus of calling system order
CN106708634A (en) * 2016-12-09 2017-05-24 福建省天奕网络科技有限公司 Communication method and system for VR application device and manufacturer device
WO2017185952A1 (en) * 2016-04-28 2017-11-02 广州广电运通金融电子股份有限公司 Hardware device access management method and system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1349163A (en) * 2001-12-03 2002-05-15 上海交通大学 Safe web page issuing system based on base layer of operation system and capable of preventing distortion of issued file
US20050182966A1 (en) * 2004-02-17 2005-08-18 Duc Pham Secure interprocess communications binding system and methods
CN101009699A (en) * 2006-01-25 2007-08-01 姜斌斌 Transparent local security environment system and its implementation method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1349163A (en) * 2001-12-03 2002-05-15 上海交通大学 Safe web page issuing system based on base layer of operation system and capable of preventing distortion of issued file
US20050182966A1 (en) * 2004-02-17 2005-08-18 Duc Pham Secure interprocess communications binding system and methods
CN101009699A (en) * 2006-01-25 2007-08-01 姜斌斌 Transparent local security environment system and its implementation method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
宋杰等: "Android OS手机平台的安全机制分析和应用研究", 《计算机技术与发展》, vol. 20, no. 6, 10 June 2010 (2010-06-10), pages 152 - 155 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103544096A (en) * 2013-10-21 2014-01-29 Tcl集团股份有限公司 Method and system for feeding back information in case of operational failure of Android terminal
CN103593218A (en) * 2013-11-29 2014-02-19 苏军生 Terminal suitable for being used by the aged and based on Android operating system
WO2017185952A1 (en) * 2016-04-28 2017-11-02 广州广电运通金融电子股份有限公司 Hardware device access management method and system
CN106293962A (en) * 2016-08-01 2017-01-04 青岛海信宽带多媒体技术有限公司 A kind of method and apparatus of calling system order
CN106293962B (en) * 2016-08-01 2019-12-20 青岛海信宽带多媒体技术有限公司 Method and device for calling system command
CN106708634A (en) * 2016-12-09 2017-05-24 福建省天奕网络科技有限公司 Communication method and system for VR application device and manufacturer device

Also Published As

Publication number Publication date
CN103034811B (en) 2016-08-03

Similar Documents

Publication Publication Date Title
CN105791284B (en) A kind of data security transmission device and method
US10867049B2 (en) Dynamic security module terminal device and method of operating same
WO2016029595A1 (en) Method, device, and equipment for calling open platform and non-volatile computer storage medium
CN101783801A (en) Software protection method based on network, client side and server
CN105787373A (en) Android terminal data leak-proof method in mobile office system
US9245118B2 (en) Methods for identifying key logging activities with a portable device and devices thereof
CN105631312A (en) Method and system for processing rogue programs
CN103034811A (en) File processing method and system and device
CN103036852A (en) Method and device for achieving network login
Ritzdorf Analyzing covert channels on mobile devices
US20170279777A1 (en) File signature system and method
CN112162873A (en) Remote calling method, electronic device and storage medium
CN106537962A (en) Method, device, and equipment for wireless network configuration, access, and visit
Song et al. App’s auto-login function security testing via android os-level virtualization
Nazar et al. Rooting Android–Extending the ADB by an auto-connecting WiFi-accessible service
CN114679287A (en) Data processing method, system, electronic device and storage medium
CN111181831A (en) Communication data processing method and device, storage medium and electronic device
CN116975850B (en) Contract operation method, contract operation device, electronic equipment and storage medium
KR101667117B1 (en) Method and device to defend against the phishing of short message service based on operating system
Ali et al. Enhancing Stealthiness & Efficiency of Android Trojans and Defense Possibilities (EnSEAD)-Android's Malware Attack, Stealthiness and Defense: An Improvement
Teng et al. A forensic examination of four popular cross‐platform file‐sharing apps with Wi‐Fi P2P
CN117240618B (en) Household cloud box access method, device, equipment and storage medium
EP3662640B1 (en) Data communication with devices having no direct access or only restricted access to communication networks
KR101330434B1 (en) Method and system for accessing to server of terminal device
Cristalli STATIC AND DYNAMIC ANALYSES FOR PROTECTING THE JAVA SOFTWARE EXECUTION ENVIRONMENT

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20220908

Address after: 3007, Hengqin international financial center building, No. 58, Huajin street, Hengqin new area, Zhuhai, Guangdong 519031

Patentee after: New founder holdings development Co.,Ltd.

Address before: 100871, Beijing, Haidian District Cheng Fu Road 298, founder building, 9 floor

Patentee before: PEKING UNIVERSITY FOUNDER GROUP Co.,Ltd.

TR01 Transfer of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20160803

CF01 Termination of patent right due to non-payment of annual fee