CN103440467A - Method for controlling mobile terminal through ADB connection - Google Patents
Method for controlling mobile terminal through ADB connection Download PDFInfo
- Publication number
- CN103440467A CN103440467A CN2013103884160A CN201310388416A CN103440467A CN 103440467 A CN103440467 A CN 103440467A CN 2013103884160 A CN2013103884160 A CN 2013103884160A CN 201310388416 A CN201310388416 A CN 201310388416A CN 103440467 A CN103440467 A CN 103440467A
- Authority
- CN
- China
- Prior art keywords
- mobile terminal
- adb
- application
- authentication
- connects
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Abstract
The invention discloses a method for controlling a mobile terminal through ADB connection. The method comprises the steps that firstly, application applies to a mobile terminal factory for certification to acquire a certification ID identifying the application exclusively; when the application sends operation requests to a mobile terminal through ADB connection, whether the operation requests accord with a predetermined permission or not is judged, if the operation requests accord with the predetermined permission, the mobile terminal conducts permission certification on the application through the certification ID contained by ADB connection information, if the permission certification succeeds, the mobile terminal automatically determines the operation requests and carries out corresponding operation according to the operation requests, and if the permission certification fails, the mobile terminal automatically rejects the operation requests. According to the method for controlling a mobile terminal through ADB connection, because permission certification is added to limit operation permission of the PC terminal application in the mobile terminal, the mobile terminal or a mobile terminal user is effectively prevented from being harmed maliciously.
Description
Technical field
The present invention relates to the communications field, relate in particular to a kind of ADB of utilization and connect the method for controlling mobile terminal.
Background technology
The full name of ADB is Android Debug Bridge, i.e. Android debugging bridge, and it mainly plays the effect of debugging bridge.By the ADB instrument, can management equipment or the state of mobile-terminal simulator.Can also carry out a lot of mobile terminal operations, as mounting software, system upgrade, operation shell-command etc.Therefore, it is exactly that the mobile terminal of Android system and the bridge of PC end are equipped with in connection that ADB connects, and utilizes ADB to connect and can allow the user on PC, mobile terminal comprehensively be operated.
From the Android4.2 version, ADB has had coupling, has meaned the function of PC end, mean PC with a RSA public key,, when ADB connects, PC can provide a asymmetrical RSA public key and private key, for pointing out the user whether to allow ADB to connect, wherein, private key is kept at the PC end, and public key can pass to mobile terminal, wherein, RSA public key can unique identification PC.But mobile terminal is None-identified for the application of initiating the ADB connection in ADB connects.
The most important thing is, current Android platform connects without any restriction ADB, as long as the drive installation of PC end completes, any application, process can be carried out the ADB connection.Because the authority of ADB is very large, there are a lot of potential safety hazards in the arbitrariness that in prior art, ADB connects, to mobile terminal and mobile phone users, can cause larger infringement.
Therefore, there is defect in prior art, needs to improve.
Summary of the invention
The technical problem to be solved in the present invention is, the unrestricted defect of operating right connected for the above-mentioned ADB of prior art, provide a kind of ADB of utilization to connect the method for controlling mobile terminal.
The technical solution adopted for the present invention to solve the technical problems is: construct a kind of ADB of utilization and connect the method for controlling mobile terminal, said method comprising the steps of:
S1, for the application of the mobile terminal that is stored in PC end to mobile terminal producer application authentication, to obtain the authentication ID of the described application of unique identification;
S2, use mobile terminal receive from described PC termination the ADB link information that described application sends;
S3, set up ADB be connected between described application and described mobile terminal, and described application is connected to described mobile terminal transmit operation request by described ADB;
S4, described mobile terminal judge whether described operation requests meets predetermined right, if meet, described mobile terminal is automatically confirmed described operation requests and carried out corresponding operation according to described operation requests, if do not meet, forwards step S5 to;
The described authentication ID that S5, described mobile terminal comprise according to described ADB link information carries out purview certification to described application, if described purview certification success, described mobile terminal is automatically confirmed described operation requests and is carried out corresponding operation according to described operation requests, if described purview certification failure, described mobile terminal is the described operation requests of refusal automatically.
In the method for utilizing ADB to connect the control mobile terminal of the present invention, described step S2 further comprises: before entering described step S3, use described mobile terminal to carry out the PC authentication to described ADB link information;
Described PC authentication comprises that whether the address of the described PC end that judges that described ADB link information comprises is legal, if legal, manual confirmation is set up described ADB and connected, if illegal, manually refuse described ADB and connects.
In the method for utilizing ADB to connect the control mobile terminal of the present invention, judge that the whether legal step in address of described PC end comprises:
If described PC end does not have historical linkage record with described mobile terminal, described mobile terminal shows the address of described PC end and the information that described PC end is strange PC end, and whether the information and the individual that according to described mobile terminal, show require manual confirmation legal;
If described PC end and the existing historical linkage record of described mobile terminal, described mobile terminal shows that the address of described PC end and described PC end are the information of reliable PC end, and whether the information and the individual that according to described mobile terminal, show require manual confirmation legal.
In the method for utilizing ADB to connect the control mobile terminal of the present invention, further comprising the steps of:
S12, the operation of further using described mobile terminal to authenticate described PC before described step S2 are set in advance.
In the method for utilizing ADB to connect the control mobile terminal of the present invention, described step S2 further comprises:
Before entering described step S3, the described authentication ID that uses described mobile terminal to comprise according to described ADB link information judges whether described application connects in the application blacklist at ADB, if be applied in ADB connects in the application blacklist described, automatically the described ADB of refusal connects, if described application does not connect in the application blacklist at ADB, automatically set up described ADB and connect.
In the method for utilizing ADB to connect the control mobile terminal of the present invention, described step S2 further comprises:
Before entering described step S3, the address of the described PC end that uses described mobile terminal to comprise according to described ADB link information judges whether described PC end connects in the PC blacklist at ADB, if described PC end connects in the PC blacklist at ADB, automatically the described ADB of refusal connects, if described PC end does not connect in the PC blacklist at ADB, automatically set up described ADB and connect.
In the method for utilizing ADB to connect the control mobile terminal of the present invention, in described step S1, the authentication authority that described application submits to described application to apply for during to mobile terminal producer application authentication simultaneously, if the authentication application of described application is agreed by described mobile terminal producer, offer described authentication ID of described application and described authentication authority and described authentication ID are bound.
In the method for utilizing ADB to connect the control mobile terminal of the present invention, in described step S5, described purview certification comprises: judge whether the authority that described operation requests relates to is the corresponding described authentication authority of described authentication ID of described application.
In the method for utilizing ADB to connect the control mobile terminal of the present invention, described authentication authority comprises: Android installation kit, unloading Android installation kit are installed, are read address list or start application.
In the method for utilizing ADB to connect the control mobile terminal of the present invention, described predetermined right comprises: screenshotss, backup and reduction data and analog input event.
Implement the ADB that utilizes of the present invention and connect the method for controlling mobile terminal, have following beneficial effect: the authority that the present invention relates to the operation requests be applied in the ADB connection surpasses the situation of predetermined right, according to the authentication ID obtained in mobile terminal producer before this application, application is carried out to purview certification, only have the purview certification success just to confirm the relevant operation requests of this application, so can limit the operating right that is applied in mobile terminal of PC end, effectively prevent the malicious harm to mobile terminal or mobile phone users, and, the present invention also provided manual PC authentication before setting up the ADB connection, the PC authentication comprises that whether the address of the PC end that this ADB of judgement initiation connects is legal, only having legal PC end just can set up ADB connects, the PC authentication need to be set in advance at mobile terminal, so can facilitate the user according to the personal like, select whether to start the PC authentication, hommization more.Further, the present invention can also be detected application and/or the PC end of initiating the ADB connection before setting up the ADB connection: can detect it for certain class application and whether be present in ADB connection application blacklist, for certain PC end, whether can detect it is present in ADB connection PC blacklist, two parts of blacklists are set, help more easily mobile terminal to tackle illegal ADB and connect.
The accompanying drawing explanation
Below in conjunction with drawings and Examples, the invention will be further described, in accompanying drawing:
Fig. 1 is that the present invention utilizes ADB to connect the process flow diagram of the method for controlling mobile terminal;
Fig. 2 is that the present invention utilizes ADB to connect the process flow diagram of the first embodiment of the method for controlling mobile terminal;
Fig. 3 is that the present invention utilizes ADB to connect the process flow diagram of the second embodiment of the method for controlling mobile terminal.
Embodiment
Understand for technical characterictic of the present invention, purpose and effect being had more clearly, now contrast accompanying drawing and describe the specific embodiment of the present invention in detail.
The present invention, in order to solve the unrestricted defect of above-mentioned ADB attended operation authority of prior art, provides a kind of ADB of utilization to connect the method for controlling mobile terminal, with reference to figure 1, is that the present invention utilizes ADB to connect the process flow diagram of the method for controlling mobile terminal;
Said method comprising the steps of:
S1, for the application of the mobile terminal that is stored in PC end to mobile terminal producer application authentication, to obtain the authentication ID of the described application of unique identification;
Application should submit to during to mobile terminal producer application authentication this application to need the authentication authority of application simultaneously, if the authentication application of this application is agreed by mobile terminal producer, offer authentication ID of application and will authenticate authority and bound with authentication ID, mobile terminal producer is stored in the information of the authentication ID of this application and authentication authority in the source database of producer on the one hand, mobile terminal producer copies to source database in the local data base of mobile terminal on the other hand, at ADB, connect in control, mobile terminal can be according to the information of local data base, the operating right of the authentication ID that application is provided and application application carries out and the checking of the authentication ID of local data base and corresponding authentication authority thereof.
Whether mobile terminal producer agrees that the authentication application of application is passed judgment on according to the degree of belief of this application of various channels reaction, such as network, and note, phone etc.
The authentication application of considering follow-up application may be after some mobile terminal dispatches from the factory, perhaps the very poor needs of prestige of some application of feedback information of process user are removed it and have been applied for successful authentication authority or even authentication ID, therefore, mobile terminal producer is upgraded the data in the local data base of mobile terminal according to the data timing of source database.
Concrete, the authentication authority comprises to be installed the Android installation kit, unload the Android installation kit, reads address list or starts application.
In specific embodiment, mobile terminal is the mobile terminal that the Android system is installed.
S2, use mobile terminal receive from the PC termination ADB link information that described application sends;
The ADB link information comprises the configuration information that authentication ID, RSA public key and other ADB connect.Having mentioned authentication ID in step S1 can certain application of unique identification, and RSA public key can certain PC end of unique identification again.
S3, set up ADB be connected between described application and described mobile terminal, and described application is connected to described mobile terminal transmit operation request by described ADB;
The ADB establishment of connection is to connect arbitrarily in the prior art, that is to say as long as the ADB connection is initiated in application and can set up the ADB connection, consider the injury to mobile terminal that arbitrariness that ADB connects causes, preferably, the present invention can also select the ADB establishment of connection is filtered, and such as arranging, ADB connects the application blacklist and/or ADB connects the PC blacklist.
The foundation that ADB connects the application blacklist is mainly for certain application, if mobile phone users wants to shield according to the personal like ADB connection that certain application is initiated, after this is applied certain and sets up ADB and connect, it can be added to ADB connects in the application blacklist, the ADB that this application so, is afterwards initiated connects and will automatically be rejected at this.Wherein, mobile terminal is identified according to authentication ID for the identification of application.
In like manner, the foundation that ADB connects the PC blacklist is mainly for certain PC end, mobile phone users wants to shield according to the personal like ADB connection that certain PC end is initiated, certain of this PC end apply certain initiate ADB connect in or certain set up after ADB connects, this PC end can be added to ADB connects in the application blacklist, the ADB that any application of this PC end so, is afterwards initiated connects and will automatically be rejected at this.Wherein, mobile terminal is identified according to RSA public key for the identification of PC end, and now requiring mobile terminal is that the later version of Android4.2 is installed.
In the first embodiment, with reference to figure 2, be that the present invention utilizes ADB to connect the process flow diagram of the first embodiment of the method for controlling mobile terminal; Comprised following two blacklist filtration steps before setting up the ADB connection:
The described authentication ID that S231, described mobile terminal comprise according to described ADB link information judges whether described application connects in the application blacklist at ADB, if so, automatically refuses described ADB and connects, and if not, automatically sets up described ADB and connects.
The address of stating the PC end that S232, described mobile terminal comprise according to described ADB link information judges whether described PC end connects in the PC blacklist at ADB, if so, automatically refuses described ADB and connects, and if not, automatically sets up described ADB and connects.
Connecting for ADB the application blacklist is connected PC blacklist foundation with ADB in the first embodiment is after certain ADB is successfully established, and it is added to corresponding blacklist and gets final product.The present invention also can add blacklist by it before connecting foundation, specifically referring to the second follow-up embodiment.
S4, described mobile terminal judge whether described operation requests meets predetermined right, and if so, described mobile terminal is automatically confirmed described operation requests and carried out corresponding operation according to described operation requests, if not, goes to step S5;
Predetermined right mainly comprises: screenshotss, backup and reduction data and analog input event etc.
The described authentication ID that S5, described mobile terminal comprise according to described ADB link information carries out purview certification to described application, if described purview certification success, described mobile terminal is automatically confirmed described operation requests and is carried out corresponding operation according to described operation requests, the corresponding operation that the application execution is follow-up; If described purview certification failure, described mobile terminal is the described operation requests of refusal automatically.After the refusal request, ADB connects still existence, goes to step S3, and application can continue to initiate other operation requests.
Purview certification comprises and judges whether the authority that described operation requests relates to is the corresponding described authentication authority of described authentication ID of described application.
The above-mentioned purview certification for application is the mobile terminal automated validation, in concrete enforcement, for the control hommization more that makes ADB connect, and provide more ADB right to choose to the user, in the second embodiment of the present invention, increased the content of a PC authentication for above-mentioned steps S2, the PC authentication is from the different of purview certification, the Valuation Standard of PC authentication determined by the user, and whether the step of PC authentication starts and need the user to set in advance.
With reference to figure 3, be that the present invention utilizes ADB to connect the process flow diagram of the second embodiment of the method for controlling mobile terminal.
The second embodiment of the present invention is from the different of the first embodiment: comprise step S12 between step S1 and S2, also comprise step S233 after step S22;
S12, the operation of using described mobile terminal to authenticate described PC are set in advance;
The PC authentication need to be set in advance at mobile terminal, so can facilitate the user according to the personal like, selects whether to start the PC authentication, hommization more.
S233, use described mobile terminal to carry out the PC authentication to described ADB link information;
Described PC authentication comprises that whether the address of the described PC end that judges that described ADB link information comprises is legal, if fruit is, manual confirmation is set up described ADB and is connected, if not, manually the described ADB of refusal connects, preferably, manually after refusal, this PC end can added to ADB connection PC blacklist, now the same mobile terminal that requires is that the later version of Android4.2 is installed.Certainly, connect the interpolation of application blacklist for ADB, also can before ADB connects, arrange, but consider the operation of crossing predetermined right of ADB is carried out to purview certification, therefore, need not increase loaded down with trivial details step just to realizing connecting front increase blacklist function.
Whether the above-mentioned address that judges described PC end is legal specifically comprises:
If described PC end does not have historical linkage record with described mobile terminal, described mobile terminal shows the address of described PC end and the information that described PC end is strange PC end, and whether the information and the individual confirmation request that according to described mobile terminal, show be legal;
If described PC end and the existing historical linkage record of described mobile terminal, described mobile terminal shows that the address of described PC end and described PC end are the information of reliable PC end, and whether the information and the individual confirmation request that according to described mobile terminal, show be legal.
The present invention considers when the PC end is carried out to the PC authentication, from user's angle just in order to tackle some strange PC, for the certain user, thinking it unnecessary will be by the PC end of manual confirmation, ADB can be set and connect the PC white list, when the ADB of certain of initiating at PC end connects, list the RSA public key of this PC end of sign in ADB and connect the PC white list and get final product.
In sum, when being applied in authority that the operation requests of ADB in connecting relate in the present invention and surpassing predetermined right, according to the authentication ID obtained in mobile terminal producer before this application, application is carried out to purview certification, only have the purview certification success just to confirm the relevant operation requests of this application, so can limit the operating right that is applied in mobile terminal, effectively prevent the malicious harm to mobile terminal or mobile phone users.
And, the present invention also provided manual PC authentication before setting up the ADB connection, the PC authentication comprises that whether the address of the PC end that this ADB of judgement initiation connects is legal, only having legal PC end just can set up ADB connects, in addition, consider after the step that has increased manual confirmation PC authentication, think that for some user complete believable PC holds, increase this step and just seem undoubtedly unnecessary loaded down with trivial details, therefore, the present invention can also, on the basis that increases the PC authentication, carry out the filtration that ADB connects the PC white list before ADB connects foundation.Wherein, the PC authentication need to set in advance at mobile terminal, so can facilitate the user according to the personal like, selects whether to start the PC authentication, hommization more.
Further, in order to overcome the arbitrariness of ADB establishment of connection, the controllability that provides ADB to connect, the present invention also is provided at and sets up ADB and increase ADB before connecting and connect the application blacklist and is connected the filtering function of PC blacklist with ADB: can detect it for certain class application and whether be present in ADB and connect and apply blacklist, for certain PC end, can detect it and whether be present in ADB connection PC blacklist, two parts of blacklists are set, help more easily mobile terminal to tackle illegal ADB and connect.
The above is described embodiments of the invention by reference to the accompanying drawings; but the present invention is not limited to above-mentioned embodiment; above-mentioned embodiment is only schematic; rather than restrictive; those of ordinary skill in the art is under enlightenment of the present invention; not breaking away from the scope situation that aim of the present invention and claim protect, also can make a lot of forms, within these all belong to protection of the present invention.
Claims (10)
1. one kind is utilized ADB to connect the method for controlling mobile terminal, it is characterized in that, said method comprising the steps of:
S1, for the application of the mobile terminal that is stored in PC end to mobile terminal producer application authentication, to obtain the authentication ID of the described application of unique identification;
S2, use mobile terminal receive from described PC termination the ADB link information that described application sends;
S3, set up ADB be connected between described application and described mobile terminal, and described application is connected to described mobile terminal transmit operation request by described ADB;
S4, described mobile terminal judge whether described operation requests meets predetermined right, if meet, described mobile terminal is automatically confirmed described operation requests and carried out corresponding operation according to described operation requests, if do not meet, forwards step S5 to;
The described authentication ID that S5, described mobile terminal comprise according to described ADB link information carries out purview certification to described application, if described purview certification success, described mobile terminal is automatically confirmed described operation requests and is carried out corresponding operation according to described operation requests, if described purview certification failure, described mobile terminal is the described operation requests of refusal automatically.
2. the ADB that utilizes according to claim 1 connects the method for controlling mobile terminal, it is characterized in that, described step S2 further comprises: before entering described step S3, use described mobile terminal to carry out the PC authentication to described ADB link information;
Described PC authentication comprises that whether the address of the described PC end that judges that described ADB link information comprises is legal, if legal, manual confirmation is set up described ADB and connected, if illegal, manually refuse described ADB and connects.
3. the ADB that utilizes according to claim 2 connects the method for controlling mobile terminal, it is characterized in that, judges that the whether legal step in address of described PC end comprises:
If described PC end does not have historical linkage record with described mobile terminal, described mobile terminal shows the address of described PC end and the information that described PC end is strange PC end, and whether the information and the individual that according to described mobile terminal, show require manual confirmation legal;
If described PC end and the existing historical linkage record of described mobile terminal, described mobile terminal shows that the address of described PC end and described PC end are the information of reliable PC end, and whether the information and the individual that according to described mobile terminal, show require manual confirmation legal.
4. the ADB that utilizes according to claim 2 connects the method for controlling mobile terminal, it is characterized in that, further comprising the steps of:
S12, the operation of further using described mobile terminal to authenticate described PC before described step S2 are set in advance.
5. the ADB that utilizes according to claim 1 connects the method for controlling mobile terminal, it is characterized in that, described step S2 further comprises:
Before entering described step S3, the described authentication ID that uses described mobile terminal to comprise according to described ADB link information judges whether described application connects in the application blacklist at ADB, if be applied in described ADB connects in the application blacklist described, automatically the described ADB of refusal connects, if described application does not connect in the application blacklist at described ADB, automatically set up described ADB and connect.
6. the ADB that utilizes according to claim 1 connects the method for controlling mobile terminal, it is characterized in that, described step S2 further comprises:
Before entering described step S3, the address of the described PC end that uses described mobile terminal to comprise according to described ADB link information judges whether described PC end connects in the PC blacklist at ADB, if described PC end connects in the PC blacklist at described ADB, automatically the described ADB of refusal connects, if described PC end does not connect in the PC blacklist at described ADB, automatically set up described ADB and connect.
7. the ADB that utilizes according to claim 1 connects the method for controlling mobile terminal, it is characterized in that, in described step S1, the authentication authority that described application submits to described application to apply for during to mobile terminal producer application authentication simultaneously, if the authentication application of described application is agreed by described mobile terminal producer, offer described authentication ID of described application and described authentication authority and described authentication ID are bound.
8. the ADB that utilizes according to claim 7 connects the method for controlling mobile terminal, it is characterized in that, in described step S5, described purview certification comprises: judge whether the authority that described operation requests relates to is the corresponding described authentication authority of described authentication ID of described application.
9. the ADB that utilizes according to claim 7 connects the method for controlling mobile terminal, it is characterized in that, described authentication authority comprises: Android installation kit, unloading Android installation kit are installed, are read address list or start application.
10. the ADB that utilizes according to claim 1 connects the method for controlling mobile terminal, it is characterized in that, described predetermined right comprises: screenshotss, backup and reduction data and analog input event.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310388416.0A CN103440467B (en) | 2013-08-30 | 2013-08-30 | ADB is utilized to connect the method controlling mobile terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310388416.0A CN103440467B (en) | 2013-08-30 | 2013-08-30 | ADB is utilized to connect the method controlling mobile terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103440467A true CN103440467A (en) | 2013-12-11 |
CN103440467B CN103440467B (en) | 2016-06-15 |
Family
ID=49694160
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310388416.0A Active CN103440467B (en) | 2013-08-30 | 2013-08-30 | ADB is utilized to connect the method controlling mobile terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103440467B (en) |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104268112A (en) * | 2014-09-19 | 2015-01-07 | 福州瑞芯微电子有限公司 | Method and device for connecting ADB devices |
CN104978248A (en) * | 2014-10-15 | 2015-10-14 | 武汉安天信息技术有限责任公司 | Method and system for remotely managing mobile terminal APP on basis of ADB |
CN105204884A (en) * | 2014-06-27 | 2015-12-30 | 联想(北京)有限公司 | Information processing method and electronic equipment |
CN105279460A (en) * | 2014-07-24 | 2016-01-27 | 中兴通讯股份有限公司 | Method and device for starting USB (Universal Serial Bus) debugging mode interface, and terminal |
CN105354134A (en) * | 2015-11-04 | 2016-02-24 | 惠州Tcl移动通信有限公司 | Mobile terminal and commissioning method therefor |
CN105512538A (en) * | 2015-12-11 | 2016-04-20 | 北京元心科技有限公司 | debugging method and system of intelligent mobile operating system |
CN105701373A (en) * | 2015-12-28 | 2016-06-22 | 东软集团股份有限公司 | ADB interface opening method and apparatus |
CN106022106A (en) * | 2016-05-30 | 2016-10-12 | 努比亚技术有限公司 | Application installation method and device and terminal |
CN106612178A (en) * | 2015-10-22 | 2017-05-03 | 哈尔滨安天科技股份有限公司 | Method and device for protecting security of Android adb data transmission |
CN107273722A (en) * | 2017-06-21 | 2017-10-20 | 厦门盈趣汽车电子有限公司 | A kind of platform application auto-destruct system and method |
CN107402876A (en) * | 2016-05-18 | 2017-11-28 | 中兴通讯股份有限公司 | A kind of method and terminal of startup ADB debugging |
TWI612425B (en) * | 2014-11-24 | 2018-01-21 | Linknext Technologies Co Ltd | Control method for external control module of portable electronic device |
CN108280343A (en) * | 2017-01-06 | 2018-07-13 | 广州市动景计算机科技有限公司 | The method, apparatus and system of application security are detected under Android environment |
CN108734033A (en) * | 2017-04-14 | 2018-11-02 | 北京京东尚科信息技术有限公司 | A kind of method and apparatus for realizing secure interactive between system |
CN112989316A (en) * | 2021-02-24 | 2021-06-18 | 福州汇思博信息技术有限公司 | ADB authorization authentication method and system |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102254113A (en) * | 2011-06-27 | 2011-11-23 | 深圳市安之天信息技术有限公司 | Method and system for detecting and intercepting malicious code of mobile terminal |
US20120151269A1 (en) * | 2010-12-10 | 2012-06-14 | Helix Technology Inc. | Mobile communication terminal capable of testing application and method thereof |
CN103077058A (en) * | 2013-01-06 | 2013-05-01 | 邓海勤 | Method and device for installing application program |
-
2013
- 2013-08-30 CN CN201310388416.0A patent/CN103440467B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120151269A1 (en) * | 2010-12-10 | 2012-06-14 | Helix Technology Inc. | Mobile communication terminal capable of testing application and method thereof |
CN102254113A (en) * | 2011-06-27 | 2011-11-23 | 深圳市安之天信息技术有限公司 | Method and system for detecting and intercepting malicious code of mobile terminal |
CN103077058A (en) * | 2013-01-06 | 2013-05-01 | 邓海勤 | Method and device for installing application program |
Cited By (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105204884A (en) * | 2014-06-27 | 2015-12-30 | 联想(北京)有限公司 | Information processing method and electronic equipment |
CN105279460A (en) * | 2014-07-24 | 2016-01-27 | 中兴通讯股份有限公司 | Method and device for starting USB (Universal Serial Bus) debugging mode interface, and terminal |
CN104268112A (en) * | 2014-09-19 | 2015-01-07 | 福州瑞芯微电子有限公司 | Method and device for connecting ADB devices |
CN104978248A (en) * | 2014-10-15 | 2015-10-14 | 武汉安天信息技术有限责任公司 | Method and system for remotely managing mobile terminal APP on basis of ADB |
CN104978248B (en) * | 2014-10-15 | 2017-09-29 | 武汉安天信息技术有限责任公司 | A kind of method and system based on ADB remote management of movable terminal APP |
TWI612425B (en) * | 2014-11-24 | 2018-01-21 | Linknext Technologies Co Ltd | Control method for external control module of portable electronic device |
CN106612178A (en) * | 2015-10-22 | 2017-05-03 | 哈尔滨安天科技股份有限公司 | Method and device for protecting security of Android adb data transmission |
CN105354134A (en) * | 2015-11-04 | 2016-02-24 | 惠州Tcl移动通信有限公司 | Mobile terminal and commissioning method therefor |
CN105512538A (en) * | 2015-12-11 | 2016-04-20 | 北京元心科技有限公司 | debugging method and system of intelligent mobile operating system |
CN105512538B (en) * | 2015-12-11 | 2019-04-26 | 北京元心科技有限公司 | Debugging method and system of intelligent mobile operating system |
CN105701373A (en) * | 2015-12-28 | 2016-06-22 | 东软集团股份有限公司 | ADB interface opening method and apparatus |
CN105701373B (en) * | 2015-12-28 | 2019-08-30 | 东软集团股份有限公司 | The method and apparatus for opening ADB interface |
CN107402876A (en) * | 2016-05-18 | 2017-11-28 | 中兴通讯股份有限公司 | A kind of method and terminal of startup ADB debugging |
CN106022106A (en) * | 2016-05-30 | 2016-10-12 | 努比亚技术有限公司 | Application installation method and device and terminal |
CN108280343A (en) * | 2017-01-06 | 2018-07-13 | 广州市动景计算机科技有限公司 | The method, apparatus and system of application security are detected under Android environment |
CN108734033A (en) * | 2017-04-14 | 2018-11-02 | 北京京东尚科信息技术有限公司 | A kind of method and apparatus for realizing secure interactive between system |
CN107273722A (en) * | 2017-06-21 | 2017-10-20 | 厦门盈趣汽车电子有限公司 | A kind of platform application auto-destruct system and method |
CN112989316A (en) * | 2021-02-24 | 2021-06-18 | 福州汇思博信息技术有限公司 | ADB authorization authentication method and system |
CN112989316B (en) * | 2021-02-24 | 2022-08-16 | 福州汇思博信息技术有限公司 | ADB authorization authentication method and system |
Also Published As
Publication number | Publication date |
---|---|
CN103440467B (en) | 2016-06-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103440467A (en) | Method for controlling mobile terminal through ADB connection | |
CN103744686B (en) | Control method and the system of installation is applied in intelligent terminal | |
CN102521548B (en) | Method for managing using rights of function and mobile terminal | |
US10136324B2 (en) | Method and apparatus for reading verification information | |
US20110247013A1 (en) | Method for Communicating Between Applications on an External Device and Vehicle Systems | |
CN102404706B (en) | Method for managing tariff safety and mobile terminal | |
CN105843653A (en) | TA (trusted application) configuration method and device | |
EP3480720B1 (en) | Method and system for downloading software based on mobile terminal | |
CN105227321A (en) | Information processing method, server and client | |
RU2005120690A (en) | PROTECTED MEDIA TRACT AND RESOLUTION RESPONSE UNIT | |
CN102413220B (en) | Method for controlling right of using connection function and mobile terminal | |
CN103473498A (en) | Application program security verification method and terminal | |
CN105262823A (en) | Method, apparatus and system for controlling terminal | |
CN106357807A (en) | Data processing method, device and system | |
CN105357224B (en) | A kind of registration of intelligent domestic gateway, removing method and system | |
CN104462898B (en) | File destination guard method and device based on android system | |
CN105590052A (en) | Method for controlling installation of browser plug-in | |
CN102968588A (en) | Intelligent terminal system | |
CN103092661A (en) | Intelligent mobile terminal software installation method and system | |
CN108664805B (en) | Application program safety verification method and system | |
CN106919812A (en) | A kind of application process right management method and device | |
CN104102887B (en) | A kind of operating system security login authentication implementation method | |
CN106657067A (en) | Smart secret key control system of mobile security network | |
CN111488620A (en) | File processing method and device, mobile terminal and storage medium | |
CN105704780A (en) | Wireless network access method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CP01 | Change in the name or title of a patent holder | ||
CP01 | Change in the name or title of a patent holder |
Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18 Patentee after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS CORP., Ltd. Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18 Patentee before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS CORP., Ltd. |