CN103218267A - Method and device for system process of terminal to distribute data to application program process - Google Patents

Method and device for system process of terminal to distribute data to application program process Download PDF

Info

Publication number
CN103218267A
CN103218267A CN2013101329172A CN201310132917A CN103218267A CN 103218267 A CN103218267 A CN 103218267A CN 2013101329172 A CN2013101329172 A CN 2013101329172A CN 201310132917 A CN201310132917 A CN 201310132917A CN 103218267 A CN103218267 A CN 103218267A
Authority
CN
China
Prior art keywords
data
system process
process module
described system
legitimacy
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2013101329172A
Other languages
Chinese (zh)
Inventor
李厚辰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Baidu Netcom Science and Technology Co Ltd
Original Assignee
Beijing Baidu Netcom Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Baidu Netcom Science and Technology Co Ltd filed Critical Beijing Baidu Netcom Science and Technology Co Ltd
Priority to CN2013101329172A priority Critical patent/CN103218267A/en
Publication of CN103218267A publication Critical patent/CN103218267A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Information Transfer Between Computers (AREA)

Abstract

The invention provides a method and a device for the system process of a terminal to distribute data to an application program process, and the method comprises the following steps of receiving data from a network and judging whether the data need to be distributed directionally or not by the system process; if so, extracting information related to an application program process finally receiving the data from the data by the system process; requesting to send the data to the application program process by the system process according to the extracted information, and judging the legality of the system process by the application program process; and if the system process is judged to be legal, receiving the data by the application program process. The invention provides a set of effective safety mechanism from the view of a terminal system, and data directional distribution can be guaranteed to be credible and not to be counterfeited with very high safety intensity, so that the data subjected to directional distribution can be guaranteed to come from a credible system process. While the data is guaranteed to be distributed safely and reliably, the low coupling between the system and an application program is realized.

Description

The system process of terminal is to method, the device of program process distributing data
Technical field
The present invention relates to terminal manufacturing technology field, relate in particular to a kind of system process that is used for terminal to the method for program process distributing data and be used for the data delivery device of terminal.
Background technology
Usually (for example adopt conventional inter-process communication mechanisms in the operating system of portable terminal at present, carry out interprocess communication by media such as shared drive, socket, pipeline, message queues) realize that system process sends data to program process, these interprocess communication modes guarantee that just data can be sent to another process by a process, and data transmit leg and data receiver are not carried out validity checking.Fail so in fact to guarantee that the data that program process receives as the data receiver are to come from system process or any other trusted party process, if thereby will cause to receive data with a program process, so in fact, any process can send data to this program process as data receiver, and security is low.For this reason, can carry out the scheme in the source of dissection process authentication data to the data content that receives by the agreement of consulting to define thereby propose a kind of take over party, but still there is following shortcoming in this scheme:
(1) data protocol needs transmit leg and take over party to define jointly, and this agreement must be secret (promptly, have only transmit leg and take over party to know), the data that could make transmit leg send can be received uprightly really to be handled and guarantees that the transmit leg of data is legal.That is to say that this agreement is in the same place transmit leg and take over party's strong coupling.But, as open terminal system, can not produce strong coupling with all application programs, that is to say that the secret agreement can't be overlapped with each application program definition one by system.Therefore, the terminal system service is as data receiver, and such scheme is infeasible.
(2) take over party differentiates with the take over party the data content and has received data and be treated to prerequisite.That is to say that data are operated after entering recipient's process.Thus, be easy to bring potential safety hazard, introduce security breaches.
Summary of the invention
The present invention is intended to one of solve the problems of the technologies described above at least.
For this reason, one object of the present invention be to propose a kind of can be safely and reliably with data distribution to the method for the system process that is used for terminal of specifying the recipient to the program process distributing data.
Another object of the present invention is to propose a kind of data delivery device that is used for terminal.
To achieve these goals, according to the system process that is used for terminal of the embodiment of the first aspect present invention method to the program process distributing data, may further comprise the steps: system process receives the data of automatic network and judges whether described data need to be directed distribution; If then described system process is from described extracting data and the final relevant information of program process that receives described data; Described system process sends described data and is judged the legitimacy of described system process by described program process to described program process request according to described information; And if be legal to the result of the judgement of the legitimacy of described system process, then described program process receives described data.
According to the system process that is used for terminal of the embodiment of the invention method to the program process distributing data, provide a cover effective security mechanism from the angle of terminal system, guarantee that with very high security intensity the data-directed distribution is believable and can not be by counterfeit, thereby the data of guaranteeing this directed distribution are to come from believable system process.When guaranteeing the secure and trusted distributing data, also realized the low coupling between system and application program.
To achieve these goals, the data delivery device that is used for terminal according to the embodiment of second aspect present invention, comprise system process module and program process module, wherein: described system process module receives the data of automatic network and judges whether described data need to be directed distribution; If then described system process module is from described extracting data and the final relevant information of program process module that receives described data; Described system process module sends described data and is judged the legitimacy of described system process by described program process module to the request of described program process module according to described information; And if be legal to the result of the judgement of the legitimacy of described system process module, then described program process module receives described data.
The data delivery device that is used for terminal according to the embodiment of the invention, provide a cover effective security mechanism, guarantee that with very high security intensity the data-directed distribution is believable and can not be by counterfeit, thereby the data of guaranteeing this directed distribution are to come from believable system process.When guaranteeing the secure and trusted distributing data, also realized the low coupling between system and application program.
Aspect that the present invention adds and advantage part in the following description provide, and part will become obviously from the following description, or recognize by practice of the present invention.
Description of drawings
Above-mentioned and/or additional aspect of the present invention and advantage be from obviously and easily understanding becoming the description of embodiment below in conjunction with accompanying drawing, wherein,
Fig. 1 is used for the process flow diagram of the system process of terminal to the method for program process distributing data according to an embodiment of the invention;
Fig. 2 is that system process sends data and judged the process flow diagram of the legitimacy of system process by program process to the program process request according to an embodiment of the invention;
Fig. 3 is used for the process flow diagram of the system process of terminal to the method for program process distributing data in accordance with another embodiment of the present invention;
Fig. 4 is the structured flowchart that is used for the data-directed distribution in accordance with a preferred embodiment of the present invention;
Fig. 5 is the process flow diagram of data-directed distribution in accordance with a preferred embodiment of the present invention; And
Fig. 6 is the synoptic diagram that is used for the data delivery device of terminal according to an embodiment of the invention.
Embodiment
Describe embodiments of the invention below in detail, the example of described embodiment is shown in the drawings, and wherein identical from start to finish or similar label is represented identical or similar elements or the element with identical or similar functions.Below by the embodiment that is described with reference to the drawings is exemplary, only is used to explain the present invention, and can not be interpreted as limitation of the present invention.On the contrary, embodiments of the invention comprise and fall into appended spirit that adds the right claim and all changes, modification and the equivalent in the intension scope.
In description of the invention, it will be appreciated that term " first ", " second " etc. only are used to describe purpose, and can not be interpreted as indication or hint relative importance.In description of the invention, need to prove that unless clear and definite regulation and qualification are arranged in addition, term " links to each other ", " connection " should do broad understanding, for example, can be fixedly connected, also can be to removably connect, or connect integratedly; Can be mechanical connection, also can be to be electrically connected; Can be directly to link to each other, also can link to each other indirectly by intermediary.For the ordinary skill in the art, can concrete condition understand above-mentioned term concrete implication in the present invention.In addition, in description of the invention, except as otherwise noted, the implication of " a plurality of " is two or more.
Describe and to be understood that in the process flow diagram or in this any process otherwise described or method, expression comprises module, fragment or the part of code of the executable instruction of the step that one or more is used to realize specific logical function or process, and the scope of preferred implementation of the present invention comprises other realization, wherein can be not according to order shown or that discuss, comprise according to related function by the mode of basic while or by opposite order, carry out function, this should be understood by the embodiments of the invention person of ordinary skill in the field.
Describe according to the system process that is used for terminal of the embodiment of the invention method and device below with reference to accompanying drawing to the program process distributing data.
Fig. 1 is used for the process flow diagram of the system process of terminal to the method for program process distributing data according to an embodiment of the invention.
As shown in Figure 1, the system process that is used for terminal comprises the steps to the method for program process distributing data.
Step S101, system process receive the data of automatic network and judge whether the data of coming automatic network that receive need to be directed distribution.
In an embodiment of the present invention, system process comprises that terminal system offers all system-level services of user, draws together all notes, phone, the data of radio data network transmission and the data of internet transmission etc. from output packet.After system process for example receives note data, according to note data content recognition short message type, then note upwards is distributed to note for normal short message and uses according to normal flow, then continue the processing of following step for the note of the directed distribution of needs; After system process for example receives network data, according to the socket(socket) packet content recognition data type, then data distribution is realized module to Upper Level Network Protocol for general data, then continue following processing for the directed data of distributing of needs according to normal flow.
Step S102 need be directed distribution if system process is judged the data of coming automatic network, and then system process comes the extracting data and the final relevant information of program process that receives data of automatic network from this.
In one embodiment of the invention, the information relevant with the application program of final reception data comprises: recipient's application package name, receive data the application component name, receive the relevant certificate information of the application signature of data, recipient's application version number etc., the certificate information indication corresponding application program that wherein the application package name is relevant with the application signature that receives data, the application component in the application component name indication application program of reception data.
Step S103, system process sends data and judges that by program process request sends the legitimacy of the system process of data to the program process request according to the information of extracting among the step S102.
Fig. 2 is that system process sends data and judged the process flow diagram of the legitimacy of system process by program process to the program process request according to an embodiment of the invention.As shown in Figure 2, step S103 specifically may further comprise the steps:
Step S1031, system process are used for the handle of subsequent communications to the program process acquisition request.
Step S1032 after program process receives request, carries out the first time to the legitimacy of system process and judges.
Wherein, application program can comprise the assembly of some system definitions, and application program is used the data-directed distribution services by the directed distributing data receiving unit that using system provides.This orientation distributing data receiving unit is held the basic token (base token) of system definition, has encapsulated the safety inspection strategy and the algorithm of communication process in base token, and has encapsulated the details realization of data communication process.Application program only needs several abstract methods of this program assembly class of simple realization, can in application component, finish expansion base token, realize one and belong to the privately owned token of application component (token), thereby can communicate with the data distribution person in the system process to finish Data Receiving.Should be understood that an application program can comprise any a plurality of assembly, each assembly can be held maximum tokens.
Particularly, this orientation distributing data receiving unit is that (for example class is by name: com.baidu.security.DatadispatcherServiceBase) for an abstract class, the application program of use data-directed distribution services need realize inheriting the class in this abstract class, and realize the abstract method of this abstract class, this class could be as the application component that receives directed distributing data.With Activity, the Service of Android system, Provider supervisor component class seemingly, application program is several directed distributing data receiving units of instantiation arbitrarily.As shown in table 1 below is the abstract method of the directed distributing data receiving unit of one embodiment of the invention.
Figure BDA00003060389400051
The abstract method of the directed distributing data receiving unit of table 1
In one embodiment of the invention, directed distributing data receiving unit carries out twice inspection to the legitimacy of system process, has only by twice legitimacy and judges, could realize Data Receiving.Judgement for the first time is that the requestor that data are distributed is verified, particularly, judge that for the first time referring to program process judges user ID, process ID and the unique identification data (can be to have only the enciphered data of specifying the sender to generate) etc. of system process.
Step S1033, if be legal to the result who judges the first time of the legitimacy of system process, then program process sends to system process with handle.
On the contrary, if be illegal to the result who judges the first time of the legitimacy of system process, then program process can return the notice (step S1037) of communication failure to system process.
Step S1034, system process sends to program process according to handle with data.Particularly, the data that needs are distributed send by the reception or the specified protocol of handle.
Step S1035, program process carry out the second time to the legitimacy of system process and judge.
In one embodiment of the invention, for the second time legitimacy judges it is that sender's the legitimacy of data is judged.Particularly, judge for the second time the judgement that the handle that refers to user ID, process ID, unique identification data and use to system process etc. carries out.
Step S1036, if to judging it is legal the second time of the legitimacy of system process, then program process receives data.
On the contrary, if the result that judge the second time of the legitimacy of system process is illegal, then program process can return the notice (step S1038) that receives data failure to system process.Should be understood that step S1037 and step S1038 are optionally.
Step S104, if be legal to the result of the judgement of the legitimacy of system process, then program process receives data.After program process receives data, just can the practical operation data have been come according to the concrete service logic of application program.
According to the system process that is used for terminal of the embodiment of the invention method to the program process distributing data, provide a cover effective security mechanism from the angle of terminal system, guarantee that with very high security intensity the data-directed distribution is believable and can not be by counterfeit, thereby the data of guaranteeing this directed distribution are to come from believable system process.When guaranteeing the secure and trusted distributing data, also realized the low coupling between system and application program.
Fig. 3 is for being used for the process flow diagram of the system process of terminal to the method for program process distributing data in accordance with another embodiment of the present invention.As shown in Figure 3, the system process that is used for terminal according to the embodiment of the invention comprises the steps to the method for program process distributing data.
Step S201, system process receive the data of automatic network and judgment data whether to need to be directed distribution.
Step S202 need be directed distribution if system process is judged the data of coming automatic network, and then system process is from extracting data and the final relevant information of program process that receives data.
Step S203, system process sends data and is judged the legitimacy of system process by program process to the program process request according to the information extracted.
Step S204, if be legal to the result of the judgement of the legitimacy of system process, then program process receives data.
Step S205 after program process receives data, returns the reception data to system process and finishes notice.
Step S206, if be illegal to the result of the judgement of the legitimacy of system process, then program process returns the notice that receives data failure to system process.
Should be understood that step S205 and step S206 all are optional.
Fig. 4 is the structured flowchart that is used for the data-directed distribution in accordance with a preferred embodiment of the present invention.As shown in Figure 4, the wireless receiving layer is the middleware of the GSM/GPRS/EDGE module of terminal system, and the data of all notes, phone, radio data network transmission are all passed through this radio interface layer and received and upwards be distributed to application layer.The internet data transport module is used to receive internet data.The note data that the filtering short message device is responsible for terminal system is received filters, according to note data content recognition short message type.Packet filtering is responsible for the network data that terminal system receives is filtered, according to packet content recognition data type.The data that data distribution person does directed distribution to needs are carried out safe and reliable distribution and are supported credible checking in the distribution procedure, wherein Data Receiving person's detector is used for from the extracting data recipient's who receives information, and finds the appointment recipient of data according to the information of extracting; The trusted communications module is responsible for that data accurately are distributed to specified application and the secure verification module in application program provides data to support the credible checking in the distribution procedure.Application program comprises the assembly of some system definitions, and each assembly is held maximum tokens.Requestor's scope check module in the token is responsible for the requestor's who initiates the data-directed distribution legitimacy is checked.After finishing safety inspection, transfer to the data that Data Receiving person receives distribution.
Fig. 5 is the process flow diagram of data-directed distribution according to an embodiment of the invention.As shown in Figure 5, whether at first receive data by first floor system module (wireless receiving layer and network data transmission module), by filtrator (filtering short message device and packet filtering) data being handled judgment data then is the data that need directed distribution.If, then data are transferred to data distribution person and handle, finally receive the related data of the program assembly of data from extracting data, accurately find recipient's assembly according to the related data of program assembly.Then, the trusted communications module is obtained the handle that is used for subsequent communications to recipient's components request.The corresponding assembly of application program is received request, transfers to the token processing request that assembly is held.Requestor's scope check module of token verifies at first whether the requestor is legal, if legal, then return the handle that is used for subsequent communications and gives the requestor.The trusted communications module successfully gets access to handle, and the data of needs distributions interface or the specified protocol by handle sent.After token in the corresponding assembly of application program was received data, whether the verification msg sender was legal once more for the requestor's scope check module in the token, if legal, then transferred to Data Receiving person and received data.
The present invention also proposes a kind of data delivery device that is used for terminal on the other hand.
Fig. 6 is the structured flowchart that is used for the data delivery device of terminal according to an embodiment of the invention.As shown in Figure 6, the data delivery device that is used for terminal comprises system process module 100 and program process module 200.
System process module 100 receives the data of automatic network and judges whether these data need to be directed distribution.If desired, then system process module 100 from the relevant information of extracting data and the final program process module that receives data 200.Then, system process module 100 sends data and by the legitimacy of program process module 200 judgement system process modules 100 according to the information relevant with program process module 200 to 200 requests of program process module.If the judged result to the legitimacy of system process module 100 is legal, then program process module 200 receives data.
The data delivery device that is used for terminal according to the embodiment of the invention, provide a cover effective security mechanism, guarantee that with very high security intensity the data-directed distribution is believable and can not be by counterfeit, thereby the data of guaranteeing this directed distribution are to come from believable system process.When guaranteeing the secure and trusted distributing data, also realized the low coupling between system and application program.
In one embodiment of the invention, if be illegal to the result of the judgement of the legitimacy of system process module 100, program process module 200 can be returned the notice that receives data failure to system process module 100.
In another embodiment of the present invention, program process module 200 also can be returned the reception data to system process module 100 and finish notice after receiving data.
In one embodiment of the invention, system process module 100 sends data and judges that by program process module 200 step of the legitimacy of system process module 100 comprises to 200 requests of program process module according to information: system process module 100 is used for the handle of subsequent communications to program process module 200 acquisition request; The legitimacy of 200 pairs of system process modules 100 of program process module is carried out the first time and is judged; If the result that judged the first time of the legitimacy of system process module 100 is legal, then program process module 200 sends to system process module 100 with handle; System process module 100 sends to program process module 200 according to handle with data; The legitimacy of 200 pairs of system process modules 100 of program process module is carried out the second time and is judged, if be legal to the result who judges the second time of the legitimacy of system process module 100, then program process module 100 receives data.
Particularly, judge for the first time and comprise user ID, process ID and the unique identification data of system process module 100 are judged.Judgement for the second time comprises to be judged the handle of user ID, process ID, unique identification data and the use of system process module.
In addition, if be illegal to the result who judges the first time of the legitimacy of system process module 100, then program process module 200 is returned the notice of communication failure to system process module 100.If the result that judged the second time of the legitimacy of system process module is illegal, then program process module 200 is returned the notice that receives data failure to the system process module.
The concrete workflow of system process module 100 and program process module 200 can repeat no more with reference to the description of said method embodiment herein.
In an embodiment of the present invention, terminal can be various terminals such as notebook, desktop computer, mobile phone, PDA, net book.
Should be appreciated that each several part of the present invention can realize with hardware, software, firmware or their combination.In the above-described embodiment, a plurality of steps or method can realize with being stored in the storer and by software or firmware that suitable instruction execution system is carried out.For example, if realize with hardware, the same in another embodiment, in the available following technology well known in the art each or their combination realize: have the discrete logic that is used for data-signal is realized the logic gates of logic function, special IC with suitable combinational logic gate circuit, programmable gate array (PGA), field programmable gate array (FPGA) etc.
In the description of this instructions, concrete feature, structure, material or characteristics that the description of reference term " embodiment ", " some embodiment ", " example ", " concrete example " or " some examples " etc. means in conjunction with this embodiment or example description are contained at least one embodiment of the present invention or the example.In this manual, the schematic statement to above-mentioned term not necessarily refers to identical embodiment or example.And concrete feature, structure, material or the characteristics of description can be with the suitable manner combination in any one or more embodiment or example.
Although illustrated and described embodiments of the invention, for the ordinary skill in the art, be appreciated that without departing from the principles and spirit of the present invention and can carry out multiple variation, modification, replacement and modification that scope of the present invention is by claims and be equal to and limit to these embodiment.

Claims (12)

1. a method that is used for the system process of terminal to the program process distributing data is characterized in that, may further comprise the steps:
System process receives the data of automatic network and judges whether described data need to be directed distribution;
If then described system process is from described extracting data and the final relevant information of program process that receives described data;
Described system process sends described data and is judged the legitimacy of described system process by described program process to described program process request according to described information; And
If the result to the judgement of the legitimacy of described system process is legal, then described program process receives described data.
2. method according to claim 1 is characterized in that, further comprises step:
If the result to the judgement of the legitimacy of described system process is illegal, then described program process returns the notice that receives data failure to described system process.
3. method according to claim 1 is characterized in that, further comprises step:
Described program process returns the reception data to described system process and finishes notice.
4. according to each described method in the claim 1 to 3, it is characterized in that described system process sends described data and judges that by described program process the step of the legitimacy of described system process comprises to described program process request according to described information:
Described system process is used for the handle of subsequent communications to described program process acquisition request;
Described program process carries out the first time to the legitimacy of described system process and judges;
If the result that judged the first time of the legitimacy of described system process is legal, then described program process sends to described system process with described handle;
Described system process sends to described program process according to described handle with described data;
Described program process carries out the second time to the legitimacy of described system process to be judged,
If be legal to the result who judges the second time of the legitimacy of described system process wherein, then described program process receives described data.
5. method according to claim 4 is characterized in that,
Judge described for the first time and comprise that user ID, process ID and unique identification data to described system process judge; And
Judge described for the second time and comprise that the handle of user ID, process ID, unique identification data and use to described system process judges.
6. method according to claim 4 is characterized in that, further comprises step:
If the result that judged the first time of the legitimacy of described system process is illegal, then described program process returns the notice of communication failure to described system process,
If be illegal to the result who judges the second time of the legitimacy of described system process wherein, then described program process returns the notice that receives data failure to described system process.
7. a data delivery device that is used for terminal is characterized in that, comprises system process module and program process module, wherein:
Described system process module receives the data of automatic network and judges whether described data need to be directed distribution;
If then described system process module is from described extracting data and the final relevant information of program process module that receives described data;
Described system process module sends described data and is judged the legitimacy of described system process module by described program process module to the request of described program process module according to described information; And
If the result to the judgement of the legitimacy of described system process module is legal, then described program process module receives described data.
8. device according to claim 7 is characterized in that,
If the result to the judgement of the legitimacy of described system process module is illegal, then described program process module is returned the notice that receives data failure to described system process module.
9. device according to claim 7 is characterized in that,
Described program process module is returned the reception data to described system process module and is finished notice.
10. according to each described device in the claim 7 to 9, it is characterized in that described system process module sends described data and judges that by described program process module the step of the legitimacy of described system process module comprises to the request of described program process module according to described information:
Described system process module is used for the handle of subsequent communications to described program process module acquisition request;
Described program process module is carried out the first time to the legitimacy of described system process module and is judged;
If the result that judged the first time of the legitimacy of described system process module is legal, then described program process module sends to described system process module with described handle;
Described system process module sends to described program process module according to described handle with described data;
Described program process module is carried out the judgement second time to the legitimacy of described system process module,
If be legal to the result who judges the second time of the legitimacy of described system process module wherein, then described program process module receives described data.
11. device according to claim 10 is characterized in that,
The described judgement first time comprises to be judged user ID, process ID and the unique identification data of described system process module; And
The described judgement second time comprises to be judged the handle of user ID, process ID, unique identification data and the use of described system process module.
12. device according to claim 10 is characterized in that,
If the result that judged the first time of the legitimacy of described system process module is illegal, then described program process module is returned the notice of communication failure to described system process module,
If be illegal to the result who judges the second time of the legitimacy of described system process module wherein, then described program process module is returned the notice that receives data failure to described system process module.
CN2013101329172A 2013-04-16 2013-04-16 Method and device for system process of terminal to distribute data to application program process Pending CN103218267A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2013101329172A CN103218267A (en) 2013-04-16 2013-04-16 Method and device for system process of terminal to distribute data to application program process

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2013101329172A CN103218267A (en) 2013-04-16 2013-04-16 Method and device for system process of terminal to distribute data to application program process

Publications (1)

Publication Number Publication Date
CN103218267A true CN103218267A (en) 2013-07-24

Family

ID=48816088

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2013101329172A Pending CN103218267A (en) 2013-04-16 2013-04-16 Method and device for system process of terminal to distribute data to application program process

Country Status (1)

Country Link
CN (1) CN103218267A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103546559A (en) * 2013-10-24 2014-01-29 网宿科技股份有限公司 Method and device for distributing data
CN107291500A (en) * 2017-06-21 2017-10-24 北京奇虎科技有限公司 The data distributing method and device of launching process

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040199768A1 (en) * 2003-04-04 2004-10-07 Nail Robert A. System and method for enabling enterprise application security
CN1975680A (en) * 2006-11-27 2007-06-06 浙江大学 Method for realizing interprocess asynchronous communication based on Java
CN101739300A (en) * 2008-11-18 2010-06-16 中兴通讯股份有限公司 Method and system for inter-process communication of multimedia terminal
CN1983296B (en) * 2005-12-12 2010-09-08 北京瑞星信息技术有限公司 Method and device for preventing illegal program from scavenging
CN102137123A (en) * 2010-01-25 2011-07-27 腾讯科技(北京)有限公司 Device and method for realizing process-to-process communication of different application programs on mobile terminal
US20120185875A1 (en) * 2010-07-16 2012-07-19 International Business Machines Corporation Interprocess communication using a single semaphore
CN102662753A (en) * 2012-04-19 2012-09-12 重庆网力视界科技有限公司 Progress-isolated monitoring method and system
CN102693163A (en) * 2012-04-28 2012-09-26 杭州格畅科技有限公司 Response communication method in application on on-line application platform and on-line application platform

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040199768A1 (en) * 2003-04-04 2004-10-07 Nail Robert A. System and method for enabling enterprise application security
CN1983296B (en) * 2005-12-12 2010-09-08 北京瑞星信息技术有限公司 Method and device for preventing illegal program from scavenging
CN1975680A (en) * 2006-11-27 2007-06-06 浙江大学 Method for realizing interprocess asynchronous communication based on Java
CN101739300A (en) * 2008-11-18 2010-06-16 中兴通讯股份有限公司 Method and system for inter-process communication of multimedia terminal
CN102137123A (en) * 2010-01-25 2011-07-27 腾讯科技(北京)有限公司 Device and method for realizing process-to-process communication of different application programs on mobile terminal
US20120185875A1 (en) * 2010-07-16 2012-07-19 International Business Machines Corporation Interprocess communication using a single semaphore
CN102662753A (en) * 2012-04-19 2012-09-12 重庆网力视界科技有限公司 Progress-isolated monitoring method and system
CN102693163A (en) * 2012-04-28 2012-09-26 杭州格畅科技有限公司 Response communication method in application on on-line application platform and on-line application platform

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103546559A (en) * 2013-10-24 2014-01-29 网宿科技股份有限公司 Method and device for distributing data
WO2015058705A1 (en) * 2013-10-24 2015-04-30 网宿科技股份有限公司 Data distribution method and apparatus
CN107291500A (en) * 2017-06-21 2017-10-24 北京奇虎科技有限公司 The data distributing method and device of launching process

Similar Documents

Publication Publication Date Title
US11489678B2 (en) Platform attestation and registration for servers
CN108200050B (en) Single sign-on server, method and computer readable storage medium
CN113766507B (en) Service layer dynamic authorization
CN104021333B (en) Mobile security watch bag
CN101873331B (en) Safety authentication method and system
CN102546171A (en) Secure element authentication
CN102281286A (en) Flexible end-point compliance and strong authentication for distributed hybrid enterprises
US9942047B2 (en) Controlling application access to mobile device functions
CN103155513A (en) Method and apparatus for accelerated authentication
KR101253341B1 (en) System and method for verifying counterfeit or falsification of application for mobile
WO2015090042A1 (en) A validity verification method and intermediate server
CN107872447A (en) Electronic device, server, communication system and communication method
CN104023032A (en) Application limited unloading method based on dependable execution environment technology, server and terminal
EP2875460A1 (en) Anti-cloning system and method
CN110958119A (en) Identity verification method and device
CN106453353B (en) A kind of method in user end certification cloud
US20150180862A1 (en) Method of generating one-time password and apparatus for performing the same
US11475139B2 (en) System and method for providing secure data access
CN103218267A (en) Method and device for system process of terminal to distribute data to application program process
US11968526B2 (en) Identity management on a mobile device
CN106412897A (en) WiFi authentication method based on server
CN111527731B (en) Method for limiting memory write access in IOT devices
KR101308152B1 (en) Registration method for mobile otp device by smart device
CN116436624A (en) Storage system access method and device, computer readable medium and electronic equipment
US11425124B2 (en) Method for cloud assisted authorization of IoT identity bootstrapping

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20130724