CN103034811B - A kind of method, system and device of file process - Google Patents

A kind of method, system and device of file process Download PDF

Info

Publication number
CN103034811B
CN103034811B CN201110294433.9A CN201110294433A CN103034811B CN 103034811 B CN103034811 B CN 103034811B CN 201110294433 A CN201110294433 A CN 201110294433A CN 103034811 B CN103034811 B CN 103034811B
Authority
CN
China
Prior art keywords
message
inner nuclear
application layer
layer
nuclear layer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201110294433.9A
Other languages
Chinese (zh)
Other versions
CN103034811A (en
Inventor
张宏海
何晗春
戴寅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
New Founder Holdings Development Co ltd
Original Assignee
Peking University Founder Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Peking University Founder Group Co Ltd filed Critical Peking University Founder Group Co Ltd
Priority to CN201110294433.9A priority Critical patent/CN103034811B/en
Publication of CN103034811A publication Critical patent/CN103034811A/en
Application granted granted Critical
Publication of CN103034811B publication Critical patent/CN103034811B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses the method, system and device of a kind of file process, in order to while ensureing the safety of Android operation system, improve the file process ability of Android operation system.The method includes: inner nuclear layer receives the message that application layer sends, and the message received is verified by described inner nuclear layer, when being verified, performs the file manipulation command that the described application layer that described message includes does not has authority to perform.

Description

A kind of method, system and device of file process
Technical field
The present invention relates to operation system technology field, particularly to the method, system and device of a kind of file process.
Background technology
In recent years, Android operation system, due to its increasing income property, is increasingly widely used, and uses the embedded devices such as the smart mobile phone of Android system exploitation, panel computer to emerge in an endless stream.
Android operation system is operating system based on Linux2.6 kernel, and it is divided into four layers: linux kernel layer, system Runtime Library layer, application framework layer and application layer.Wherein, Linux inner core, i.e. kernel layer includes the core system service of Android, such as safety, memory management, management of process etc.;System Runtime Library layer mainly includes program library and android Runtime Library, and program library can be used by assemblies different in android system, and Android Runtime Library provides most of functions of JAVA programming language core library;Application framework layer is the API framework that core application is used, and developer is equally useful these frameworks to develop the application of oneself;Application layer is the operation write with Java language program on a virtual machine.
Owing to Android is based on linux kernel, so the security system of Android is also based on the security architecture foundation of Linux.Linux is a multi-user, the operating system of multitask, and user and assembly play an important role, and different users is different to the access attribute of identical file with assembly, so make linux system safer.Therefore, in Android operation system, system is that each application program creates a user and assembly.These users and assembly Dou Shi domestic consumer, it is impossible to access the data of linux kernel layer, can only access file and the catalogue of corresponding application program, can not access the data of other application programs.So protecting the private data of application program, will apply and application, application is opened with isolation of system, strengthens safety and the vigorousness of system.
Visible, at present in Android operation system, each application program only has system (system) authority, and do not have highest weight to limit, i.e. root (root) authority, thus, private data can only be operated, so, although enhance the safety of system, but also bring some problems simultaneously.Program when application layer, when i.e. application program needs that system file is carried out certain operations, under to system directory, copy or revise file content, attribute, the configuration network address etc., these users being required for having highest weight limit (root authority) can operate, owing to application program only has system authority, it is thus impossible to perform these operations.
Summary of the invention
The embodiment of the present invention provides the method, system and device of a kind of file process, in order to while ensureing the safety of Android operation system, improves the file process ability of Android operation system.
The embodiment of the present invention provides a kind of method of file process, including:
Inner nuclear layer receives the message that application layer sends;
The message received is verified by described inner nuclear layer, when being verified, performs the file manipulation command that the described application layer that described message includes does not has authority to perform.
The embodiment of the present invention provides the system of a kind of file process, including: application layer and inner nuclear layer, wherein,
Described application layer, for sending message to described inner nuclear layer;
Described inner nuclear layer, is used for receiving described message, and verifies the message received, and when being verified, performs the file manipulation command that the described application layer that described message includes does not has authority to perform.
The embodiment of the present invention provides the device of a kind of Business Processing, is applied to inner nuclear layer and includes:
Receive unit, for receiving the message that application layer sends;
Processing unit, for verifying the message received, when being verified, performs the file manipulation command that the described application layer that described message includes does not has authority to perform.
The embodiment of the present invention provides the device of a kind of Business Processing, is applied in application layer, including:
Acquiring unit, for obtaining the first authentication of message code;
Set up unit, for according to described first authentication of message code, and the file manipulation command that described application layer does not has authority to perform, set up message, wherein, the packet header of described message is the first authentication of message code after encryption, and the message body of described message is the file manipulation command that described application layer does not has authority to perform;
Transmitting element, for by socket communication protocol, is sent to described inner nuclear layer by described message.
In the embodiment of the present invention, when application layer in Android operation system does not has the file manipulation command that authority performs, this document is processed order generation message and is sent to inner nuclear layer, this inner nuclear layer has highest weight limit, so, after inner nuclear layer receives message, this message is verified, when being verified, perform the file manipulation command that the described application layer that described message includes does not has authority to perform.Thus, system file can be processed by the application layer of only system authority by having the inner nuclear layer of root authority, improves the file process ability of Android operation system.Further, all of system file is all to be processed by inner nuclear layer, the most each self-isolation of private data of each application program, it is ensured that the safety of operating system.
Accompanying drawing explanation
Fig. 1 is the flow chart of file process in the embodiment of the present invention;
Fig. 2 is the Organization Chart of document handling system in the embodiment of the present invention;
Fig. 3 is the structure chart of document handling apparatus in inner nuclear layer in the embodiment of the present invention;
Fig. 4 is the structure chart of application layer document handling apparatus in the embodiment of the present invention.
Detailed description of the invention
In the embodiment of the present invention, the linux kernel layer i.e. kernel layer of Android operation system has root authority, system file can be processed, so, when system file need to be processed by the program of the application layer of Android operation system, do not possess root authority because of it, then this task must be sent to kernel layer, kernel layer perform this task.Thus, while ensureing the safety of system, improve file process ability.
In the embodiment of the present invention, when application program in Android operation system needs that system file is carried out certain operations, under to system directory, copy or revise file content, attribute, the configuration network address etc., owing to application program only has system authority, therefore, these operations can not be performed, the file manipulation command that authority must not had to perform these is sent to inner nuclear layer, being performed by inner nuclear layer, system file can be processed by the application layer of the most only system authority by having the inner nuclear layer of root authority.
Seeing Fig. 1, in Android operation system, the process of file process includes:
Step 101: application layer sends message to inner nuclear layer, the file manipulation command that the described application layer that this message includes does not has authority to perform.
Before application layer performs file manipulation command, can determine whether that having permission execution this document processes order, when determine do not have authority perform this document process order time, to inner nuclear layer send message, the file manipulation command that the described application layer that this message includes does not has authority to perform.
Here, application layer directly can send the message carrying file manipulation command to inner nuclear layer.Then can retransmit with the message of one safety of assembly, its detailed process includes:
Obtain the first authentication of message code, and according to the first authentication of message code, and application layer does not has the file manipulation command that authority performs, and sets up message, finally, by socket communication protocol, message is sent to inner nuclear layer.Wherein, the packet header of message is the first authentication of message code after encryption, and the message body of message is the file manipulation command that described application layer does not has authority to perform.
The first authentication of message code can be obtained by the user interface of application layer, or, the first authentication of message code is obtained from the memory element of system, then this first authentication of message code is encrypted, by the first authentication of message code after encryption as packet header of message, application layer be there is no file manipulation command that authority the performs message body as message, then, by socket communication protocol, message is sent to inner nuclear layer.
It addition, in the embodiment of the present invention, also can directly use authentication of message code that file manipulation command is encrypted, generate message, this message is sent to inner nuclear layer.
Step 102: inner nuclear layer receives the message that application layer sends.
Various communications protocols can be used between inner nuclear layer and application layer.Such as: in step 101, application layer passes through socket communication protocol, and message is sent to inner nuclear layer, and here, inner nuclear layer monitors socket port, receives, by this socket port, the message that application layer sends.Certainly, the embodiment of the present invention also includes other communication protocol, such as: such as share file, message mailbox etc..
Step 103: the message received is verified by inner nuclear layer, when being verified, performs step 104, and otherwise, flow process terminates.
The packet header of message only can be verified by the embodiment of the present invention, or only the message body of message is verified, or, packet header and message body to message are all verified.Wherein,
When verifying packet header of message, the mode setting up message is different, and inner nuclear layer is the most different to the proof procedure of message, i.e. the decryption protocol of proof procedure is consistent with the cryptographic protocol during establishment message.Such as, the packet header encryption of message, proof procedure includes:
The packet header of the message received is decrypted, it is thus achieved that the second message identifying code, the first authentication of message code of the second message identifying code with preservation is compared, when both are consistent, the packet header of message is verified;Otherwise, checking is not passed through.
In the embodiment of the present invention, inner nuclear layer can be decontroled authority, the most all of file manipulation command can carry out, and therefore, here, is not required to verify the message body of message, when being verified packet header of message, can perform step 104, and otherwise, flow process terminates.
In another embodiment of the present invention, also can only can only the file manipulation command of executable portion to inner nuclear layer fractional open authority, i.e. inner nuclear layer, therefore, inner nuclear layer saves executable file manipulation command, after packet header of message is verified, also needs the message body of message is verified.Detailed process includes:
Inner nuclear layer searches whether the file manipulation command in the message body of message received in the executable file manipulation command preserved;If having, determining that this message is legal message, performing step 104, otherwise, flow process terminates.So, only to inner nuclear layer fractional open authority, the safety of operating system is further increased.
Certainly, in another embodiment of the present invention, can only the message body of message be verified, the file manipulation command during i.e. inner nuclear layer searches whether the message body of message received in the executable file manipulation command preserved;If having, determining that this message is legal message, performing step 104, otherwise, flow process terminates.
Step 104: the file manipulation command that the application layer that inner nuclear layer execution message includes does not has authority to perform, file handling procedure terminates.
The authentication of message received is passed through by inner nuclear layer, can perform the file manipulation command that the application layer in message body does not has authority to perform, it is achieved the process of file.
In the embodiment of the present invention, inner nuclear layer can be performed, by calling execve (constchar*filename, char*constargv [], char*constenvp []) function, the file manipulation command that application layer program does not has authority to perform.
At above-mentioned file handling procedure, system file can be operated by the application layer in Android operation system by inner nuclear layer, improves the file process ability of Android operation system.Meanwhile, all of system file is all to be processed by inner nuclear layer, the most each self-isolation of private data of each application program, it is ensured that the safety of operating system.
In the embodiment of the present invention, the inner nuclear layer of Android operation system must have highest weight to limit, and therefore, before inner nuclear layer receives the message that application layer sends, also needs to activate inner nuclear layer, makes inner nuclear layer have highest weight limit.When being normally applied the starting up of terminal of Android operation system, the inner nuclear layer of this Android operation system is just activated.Here, can defined in the init.rc file of Android operation system one service myserver, executable program server compiled for inner nuclear layer is put into/system/bin catalogue under, inner nuclear layer Programm erver is defined as service to be run, as follows:
servicemyserver/system/bin/server
So, myserver has just had root authority.Owing to init.rc file is to be called by system installing the start of Android operation system when, so service myserver will be created the when of start every time.
File all can be processed by the terminal that have employed Android operation system by said method.Such as: the domestic information terminal that have employed Android operation system carries out network address configuration by said method.After the network address configuration module of application layer obtains IP address, subnet mask, gateway address and the DNS of terminal use's input, they are set up into the message body of message by this configuration module, and obtain authentication of message code and be encrypted, identifying code after encrypting is as the packet header of message, communicate with the server of inner nuclear layer, message is sent to the server of inner nuclear layer.
After the server of inner nuclear layer receives message, message resolved and verifies, if legal message, just obtaining the relevant informations such as the IP address in message body, subnet mask, and the order calling configuration network carries out network configuration.Thus achieve and configure the network address in application layer, i.e. achieve the process of system file.
Wherein, when inner nuclear layer has whole authority, the packet header of message can only be verified by the server of inner nuclear layer.If inner nuclear layer only has part authority, now, after the packet header of message is verified by the server of inner nuclear layer, also need the order judging to perform to configure network, in the executable command preserved, i.e. search whether to configure the order of network, if having, just obtaining the relevant informations such as the IP address in message body, subnet mask, carrying out network configuration.Otherwise, the instruction of invalid packet is returned.
As can be seen here, in the embodiment of the present invention, when application program needs that system file is carried out certain operations, under to system directory, copy or revise file content, attribute, the configuration network address etc., although application program only has system authority, but this application program can carry out these operations by having the inner nuclear layer of root authority,, improve the file process ability of Android operation system.
Method by above-mentioned file process, it is known that the system of the file process in the embodiment of the present invention, sees Fig. 2, including: application layer 100 and inner nuclear layer 200, wherein,
Application layer 100, for sending message to inner nuclear layer 200.
Inner nuclear layer 200, is used for receiving message, and verifies the message received, when being verified, and the file manipulation command that the application layer 100 that execution message includes does not has authority to perform.
In this system, application layer 100, specifically for obtaining the first authentication of message code, according to the first authentication of message code, and application layer does not has the file manipulation command that authority performs, set up message, by socket communication protocol, message is sent to inner nuclear layer, wherein, the packet header of message is the first authentication of message code after encryption, and the message body of message is the file manipulation command that application layer does not has authority to perform.
Inner nuclear layer 200, specifically for monitoring socket port, the message that application layer sends is received by socket port, the packet header of the message received is decrypted, obtain the second message identifying code, the first authentication of message code of the second message identifying code with preservation is compared, when both are consistent, the packet header of described message is verified, the file manipulation command that the application layer that execution message includes does not has authority to perform.
In the embodiment of the present invention, application layer 100 sets up the mode of message can have multiple, and the proof procedure of message is also had multiple by inner nuclear layer 200, and typically, it is consistent with the decryption protocol of inner nuclear layer 200 proof procedure that program layer 100 sets up the cryptographic protocol during message.
It addition, application layer 100 can also have multiple with the communication protocol of inner nuclear layer 200, however it is not limited to socket communication protocol.
All of file manipulation command can be can carry out by inner nuclear layer 200, or, inner nuclear layer 200 can only have part authority, can only the file manipulation command of executable portion.
When this inner nuclear layer 200 only has part authority, specifically for searching whether the file manipulation command in the message body of described message in the executable file manipulation command preserved, if having, determine that described message is legal message.
In this document processing system, also include activating device, be used for activating described inner nuclear layer, make described inner nuclear layer have highest weight limit.
In aforesaid operations system, the device of the file process being applied in inner nuclear layer, see Fig. 3, including: receive unit 310 and processing unit 320.
Receive unit 310, for receiving the message that application layer sends.
Processing unit 320, for verifying the message received, when being verified, performs the file manipulation command that the described application layer that described message includes does not has authority to perform.
Wherein, receive unit 310, specifically for monitoring socket port, receive, by described socket port, the message that application layer sends.
Processing unit 320, specifically for the packet header of the message received is decrypted, obtain the second message identifying code, first authentication of message code of described second message identifying code with preservation is compared, when both are consistent, it is verified, performs the file manipulation command that the described application layer that described message includes does not has authority to perform.
This processing unit 320, specifically for searching whether the file manipulation command in the message body of described message in the executable file manipulation command preserved, if having, determines that described message is legal message.
In aforesaid operations system, the device of the file process being applied in application layer, see Fig. 4, including: acquiring unit 410, set up unit 420, and transmitting element 430.
Acquiring unit 410, for obtaining the first authentication of message code.
Set up unit 420, be used for according to the first authentication of message code, and application layer does not has the file manipulation command that authority performs, set up message, wherein, the packet header of message is the first authentication of message code after encryption, and the message body of message is the file manipulation command that application layer does not has authority to perform.
Transmitting element 430, for by socket communication protocol, is sent to inner nuclear layer by message.
All being described as a example by Android operation system in above-mentioned all of embodiment, but the embodiment of the present invention is not limited to this, all operations system based on Linux inner core can be applied in above-mentioned all of embodiment, such as: Saipan system.
In the embodiment of the present invention, during the file manipulation command that the application layer in operating system based on Linux inner core does not has authority to perform, this document is processed order generation message and is sent to inner nuclear layer, this inner nuclear layer has highest weight limit, so, after inner nuclear layer receives message, this message is verified, when being verified, perform the file manipulation command that the described application layer that described message includes does not has authority to perform.So, operating system based on Linux inner core only has the application layer of system authority by having the inner nuclear layer of root authority, system file can be operated, improve the file process ability of operating system based on Linux inner core.Meanwhile, all of system file is all to be processed by inner nuclear layer, the most each self-isolation of private data of each application program, it is ensured that the safety of operating system.
Obviously, those skilled in the art can carry out various change and modification without departing from the spirit and scope of the present invention to the present invention.So, if these amendments of the present invention and modification belong within the scope of the claims in the present invention and equivalent technologies thereof, then the present invention is also intended to comprise these change and modification.

Claims (12)

1. a method for file process, is applied to Android operation system, it is characterised in that including:
Inner nuclear layer receives the message that application layer sends;
The message received is verified by described inner nuclear layer, when being verified, performs the file manipulation command that the described application layer that described message includes does not has authority to perform;Wherein, described application layer transmission message includes:
Obtain the first authentication of message code;
According to described first authentication of message code, and the file manipulation command that described application layer does not has authority to perform, set up message, wherein, the packet header of described message is the first authentication of message code after encryption, and the message body of described message is the file manipulation command that described application layer does not has authority to perform;
By socket communication protocol, described message is sent to described inner nuclear layer.
2. the method for claim 1, it is characterised in that described inner nuclear layer receives the message of application layer transmission and includes:
Described inner nuclear layer monitors socket port, receives, by described socket port, the message that described application layer sends.
3. the method for claim 1, it is characterised in that the described inner nuclear layer message to receiving carries out checking and includes:
The packet header of the message received is decrypted, it is thus achieved that the second message identifying code;
First authentication of message code of described second message identifying code with preservation is compared, when both are consistent, the packet header of described message is verified.
4. the method as described in claim 1 or 3, it is characterised in that the described inner nuclear layer message to receiving carries out checking and includes:
The file manipulation command in the message body of described message is searched whether in the executable file manipulation command preserved;
If having, determine that described message is legal message.
5. the method for claim 1, it is characterised in that before described inner nuclear layer receives the message that application layer sends, also include:
Activate described inner nuclear layer, make described inner nuclear layer have highest weight limit.
6. a system for file process, is applied to Android operation system, it is characterised in that including: application layer and inner nuclear layer, wherein,
Described application layer, for sending message to described inner nuclear layer;
Described inner nuclear layer, is used for receiving described message, and verifies the message received, and when being verified, performs the file manipulation command that the described application layer that described message includes does not has authority to perform;
Wherein, described application layer, specifically for obtaining the first authentication of message code, according to described first authentication of message code, and described application layer does not has the file manipulation command that authority performs, set up message, by socket communication protocol, described message is sent to described inner nuclear layer, wherein, the packet header of described message is the first authentication of message code after encryption, and the message body of described message is the file manipulation command that described application layer does not has authority to perform.
7. system as claimed in claim 6, it is characterised in that
Described inner nuclear layer, specifically for monitoring socket port, the message that described application layer sends is received by described socket port, the packet header of the message received is decrypted, obtain the second message identifying code, the first authentication of message code of described second message identifying code with preservation is compared, when both are consistent, the packet header of described message is verified, performs the file manipulation command that the described application layer that described message includes does not has authority to perform.
8. system as claimed in claim 7, it is characterised in that
Described inner nuclear layer, specifically for searching whether the file manipulation command in the message body of described message in the executable file manipulation command preserved, if having, determines that described message is legal message.
9. system as claimed in claim 6, it is characterised in that also include:
Activate device, be used for activating described inner nuclear layer, make described inner nuclear layer have highest weight limit.
10. the device of a file process, it is characterised in that be applied in the inner nuclear layer of Android operation system, including:
Receive unit, for receiving the message that application layer sends;
Processing unit, for verifying the message received, when being verified, performs the file manipulation command that the described application layer that described message includes does not has authority to perform;Wherein,
Described reception unit, specifically for monitoring socket port, receives, by described socket port, the message that application layer sends.
11. devices as claimed in claim 10, it is characterised in that
Described processing unit, specifically for the packet header of the message received is decrypted, obtain the second message identifying code, first authentication of message code of described second message identifying code with preservation is compared, when both are consistent, the packet header of described message is verified, performs the file manipulation command that the described application layer that described message includes does not has authority to perform.
12. devices as claimed in claim 10, it is characterised in that
Described processing unit, specifically for searching whether the file manipulation command in the message body of described message in the executable file manipulation command preserved, if having, determines that described message is legal message.
CN201110294433.9A 2011-09-29 2011-09-29 A kind of method, system and device of file process Expired - Fee Related CN103034811B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110294433.9A CN103034811B (en) 2011-09-29 2011-09-29 A kind of method, system and device of file process

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110294433.9A CN103034811B (en) 2011-09-29 2011-09-29 A kind of method, system and device of file process

Publications (2)

Publication Number Publication Date
CN103034811A CN103034811A (en) 2013-04-10
CN103034811B true CN103034811B (en) 2016-08-03

Family

ID=48021697

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110294433.9A Expired - Fee Related CN103034811B (en) 2011-09-29 2011-09-29 A kind of method, system and device of file process

Country Status (1)

Country Link
CN (1) CN103034811B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103544096A (en) * 2013-10-21 2014-01-29 Tcl集团股份有限公司 Method and system for feeding back information in case of operational failure of Android terminal
CN103593218A (en) * 2013-11-29 2014-02-19 苏军生 Terminal suitable for being used by the aged and based on Android operating system
CN106027487B (en) * 2016-04-28 2019-07-23 广州广电运通金融电子股份有限公司 A kind of access management method and system of hardware device
CN106293962B (en) * 2016-08-01 2019-12-20 青岛海信宽带多媒体技术有限公司 Method and device for calling system command
CN106708634B (en) * 2016-12-09 2020-08-25 福建省天奕网络科技有限公司 Communication method and system for VR application equipment and manufacturer equipment

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1349163A (en) * 2001-12-03 2002-05-15 上海交通大学 Safe web page issuing system based on base layer of operation system and capable of preventing distortion of issued file
CN101009699A (en) * 2006-01-25 2007-08-01 姜斌斌 Transparent local security environment system and its implementation method

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050182966A1 (en) * 2004-02-17 2005-08-18 Duc Pham Secure interprocess communications binding system and methods

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1349163A (en) * 2001-12-03 2002-05-15 上海交通大学 Safe web page issuing system based on base layer of operation system and capable of preventing distortion of issued file
CN101009699A (en) * 2006-01-25 2007-08-01 姜斌斌 Transparent local security environment system and its implementation method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
Android OS手机平台的安全机制分析和应用研究;宋杰等;《计算机技术与发展》;20100610;第20卷(第6期);第152-155页 *

Also Published As

Publication number Publication date
CN103034811A (en) 2013-04-10

Similar Documents

Publication Publication Date Title
JP6782307B2 (en) Dynamic access to hosted applications
US8990920B2 (en) Creating a virtual private network (VPN) for a single app on an internet-enabled device or system
US9306933B2 (en) Ensuring network connection security between a wrapped app and a remote server
US20140108792A1 (en) Controlling Device Access to Enterprise Resources in an Orchestration Framework for Connected Devices
JP2016530814A (en) Gateway device to block a large number of VPN connections
WO2016029595A1 (en) Method, device, and equipment for calling open platform and non-volatile computer storage medium
EP2887607A1 (en) Migration of assets of a trusted execution environment
CN109558739B (en) Program running method and device, terminal and readable medium
CN103034811B (en) A kind of method, system and device of file process
US20150150119A1 (en) Framework for fine-grain access control from high-level application permissions
US9245118B2 (en) Methods for identifying key logging activities with a portable device and devices thereof
CN108616521B (en) Network access method, device, equipment and readable storage medium
CN103036852B (en) A kind of method and device realizing network entry
US20100186068A1 (en) Communication apparatus, communication control method, and program
CN106537962B (en) Wireless network configuration, access and access method, device and equipment
Song et al. App’s auto-login function security testing via android os-level virtualization
CN106648770B (en) Generation method, loading method and device of application program installation package
US11689551B2 (en) Automatic identification of applications that circumvent permissions and/or obfuscate data flows
CN111181831B (en) Communication data processing method and device, storage medium and electronic device
WO2015055013A1 (en) Login system based on server, login server, and verification method thereof
KR20150055934A (en) Multi-channel method and device for smartwork security framework based on mobile virtualization environment
US9787658B2 (en) Login system based on server, login server, and verification method thereof
Nazar et al. Rooting Android–Extending the ADB by an auto-connecting WiFi-accessible service
CN113746779A (en) Digital certificate installation method and equipment
CN112131597A (en) Method and device for generating encrypted information and intelligent equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20220908

Address after: 3007, Hengqin international financial center building, No. 58, Huajin street, Hengqin new area, Zhuhai, Guangdong 519031

Patentee after: New founder holdings development Co.,Ltd.

Address before: 100871, Beijing, Haidian District Cheng Fu Road 298, founder building, 9 floor

Patentee before: PEKING UNIVERSITY FOUNDER GROUP Co.,Ltd.

TR01 Transfer of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20160803

CF01 Termination of patent right due to non-payment of annual fee