CN110502901A - Configuration information guard method, system and the storage medium of cloud cell phone manufacturer - Google Patents
Configuration information guard method, system and the storage medium of cloud cell phone manufacturer Download PDFInfo
- Publication number
- CN110502901A CN110502901A CN201910698403.0A CN201910698403A CN110502901A CN 110502901 A CN110502901 A CN 110502901A CN 201910698403 A CN201910698403 A CN 201910698403A CN 110502901 A CN110502901 A CN 110502901A
- Authority
- CN
- China
- Prior art keywords
- business
- configuration file
- service
- white list
- application program
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/575—Secure boot
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/30—Security of mobile devices; Security of mobile applications
- H04W12/37—Managing security policies for mobile devices or for controlling mobile applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/22—Processing or transfer of terminal data, e.g. status or physical capabilities
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Stored Programmes (AREA)
Abstract
The invention discloses configuration information guard method, system and the storage medium of cloud cell phone manufacturer, method includes: that business configuration file is added under system directory;Attribute configuration is added by business configuration file, and adds white list application program in business configuration file;According to business configuration file, authorization code is added in the file system configuration file of Android source code;For white list application providing system business service, permission handle is added in white list application program;After the system for brushing customization again, white list application program accesses system business service according to permission handle, and obtains the attribute information in business configuration file;The present invention can be avoided the risk that the service of manufacturer's customization is detected by rogue program, can guarantee the concealment of information on services, highly-safe, can be widely applied to field of cloud computer technology.
Description
Technical field
The present invention relates to the configuration information guard method of field of cloud computer technology, especially cloud cell phone manufacturer, system and deposit
Storage media.
Background technique
With the continuous development of network communications technology, the quantity of cloud cell phone manufacturer is also constantly increasing, current cloud mobile phone
System has been generally used Android operation system, and is customized exploitation to primary android system, so that new system
More it is bonded the use style of user.In order to provide targetedly cloud service to every user, cloud cell phone manufacturer needs in cloud
The many network request interfaces of cell phone system addition, it is also necessary to configure various dynamic options to manage cloud cell phone system.
Most of configuration information is all disposed on/default.prop ,/system/build.prop ,/system/
Under the configuration files such as default.prop, wherein the characteristics of be exactly whatsoever application process, Java (software can be passed through
App development language) layer SystemProperties (system property) class provide function or import Native (local) layer
C, C Plus Plus system_properties header file in function access the attribute configured in the above file.
The configuration method of the prior art has the disadvantages that
1), the information of the above configuration file is all globally shared, and any program process can access, and be will lead to
The sensitive information that manufacturer is configured is exposed, if these information are utilized by some malicious users, or even takes to cloud cell phone manufacturer
Business is attacked, it will is caused certain risk to cloud cell phone system, be can result in service paralysis when serious.
2), these files have strict demand to length of the configuration file to Property Name and attribute value, cause length longer
Configuration content normally can not be arranged and be read.
Summary of the invention
In view of this, the embodiment of the present invention provide a kind of highly-safe cloud cell phone manufacturer configuration information guard method,
System and storage medium.
In a first aspect, the embodiment of the invention provides a kind of configuration information guard method of cloud cell phone manufacturer, including it is following
Step:
Business configuration file is added under system directory;
Attribute configuration is added by business configuration file, and adds white list application program in business configuration file;
According to business configuration file, authorization code is added in the file system configuration file of Android source code;
For white list application providing system business service, permission handle is added in white list application program;
After the system for brushing customization again, white list application program accesses system business service according to permission handle, and obtains
Attribute information in business configuration file.
Further, the suffix of the business configuration file is xml format.
Further, described that attribute configuration is added by business configuration file, and white list is added in business configuration file
The step for application program, comprising the following steps:
Different types of data is configured according to xml format, the different types of data includes but is not limited to long character
String type data and logical type data;
Using the packet name of application program as mark, white list application program is added in business configuration file.
Further, described according to business configuration file, permission is added in the file system configuration file of Android source code
In the step for code,
The file system configuration file is fs_config.c file;
Configuration file after the addition authorization code only allows white list application program directly to access.
Further, described is white list application providing system business service, and power is added in white list application program
The step for limiting handle, comprising the following steps:
It creates and starts from realization service in system service;It is described to inherit Binder class from the service of realization;
It will be Zi realization service registration into service management;
Starting services from realization and loads all configurations in a manner of reading business configuration file;
Wherein, it is described will Zi realize service registration into service management the step for, specifically:
It will be added in service management from the title for realizing service and from the object of realization service.
Further, described after the system for brushing customization again, white list application program accesses system business according to permission handle
The step for servicing, and obtaining the attribute information in business configuration file, comprising the following steps:
After the system for brushing customization again, activation system service;
Pass through system business service registration business service;
Start service management;
IBinder object is obtained by business service;
The transact function of IBinder object is called according to Property Name;
The onTransact function of response business service is driven by Binder;
By the content of system business service acquisition business configuration file, and obtains the corresponding application program of current process and know
Other code;
By inquiring using packet management service the application program identification code, judge whether the application program is white name
Single utility program;If so, performing the next step rapid;Conversely, not responding then;
It is driven by Binder to the white list application program feedback attributes value.
Second aspect, the embodiment of the invention also provides a kind of configuration informations of cloud cell phone manufacturer to protect system, comprising:
Configuration file adds module, for adding business configuration file under system directory;
White list adding module for adding attribute configuration by business configuration file, and adds in business configuration file
Add white list application program;
Permission adding module, for adding in the file system configuration file of Android source code according to business configuration file
Add authorization code;
Handle adding module, for being white list application providing system business service, in white list application program
Add permission handle;
Data obtaining module, for after the system for brushing customization again, white list application program to access system according to permission handle
System business service, and obtain the attribute information in business configuration file.
Further, the suffix of the business configuration file is xml format;
The file system configuration file is fs_config.c file;
Configuration file after the addition authorization code only allows white list application program directly to access.
The third aspect, the embodiment of the invention also provides a kind of configuration informations of cloud cell phone manufacturer to protect system, comprising:
At least one processor;
At least one processor, for storing at least one program;
When at least one described program is executed by least one described processor, so that at least one described processor is realized
The configuration information guard method of the cloud cell phone manufacturer.
Fourth aspect, the embodiment of the invention also provides a kind of storage mediums, wherein being stored with the executable finger of processor
It enables, the executable instruction of the processor is protected for executing the configuration information of the cloud cell phone manufacturer when executed by the processor
Maintaining method.
One or more technical solutions in the embodiments of the present invention have the advantages that the embodiment of the present invention passes through
Business configuration file is added under system directory, by adding white list application program, authorization code and permission handle in advance,
After the system for brushing customization again, white list application program can be only allowed to access system business service, and then obtain business configuration
Attribute information in file;The present invention can be avoided the risk that the service of manufacturer's customization is detected by rogue program, can guarantee to take
The concealment for information of being engaged in, it is highly-safe.
Detailed description of the invention
Fig. 1 is the overall step flow chart of the embodiment of the present invention;
Fig. 2 is the white list application requests flow diagram of the embodiment of the present invention.
Specific embodiment
The present invention is further explained and is illustrated with specific embodiment with reference to the accompanying drawings of the specification.For of the invention real
The step number in example is applied, is arranged only for the purposes of illustrating explanation, any restriction is not done to the sequence between step, is implemented
The execution sequence of each step in example can be adaptively adjusted according to the understanding of those skilled in the art.
The embodiment of the invention provides a kind of configuration information guard methods of cloud cell phone manufacturer, comprising the following steps:
Business configuration file is added under system directory;
Attribute configuration is added by business configuration file, and adds white list application program in business configuration file;
According to business configuration file, authorization code is added in the file system configuration file of Android source code;
For white list application providing system business service, permission handle is added in white list application program;
After the system for brushing customization again, white list application program accesses system business service according to permission handle, and obtains
Attribute information in business configuration file.
It is further used as preferred embodiment, the suffix of the business configuration file is xml format.
It is further used as preferred embodiment, it is described that attribute configuration is added by business configuration file, and match in business
Set the step for white list application program is added in file, comprising the following steps:
Different types of data is configured according to xml format, the different types of data includes but is not limited to long character
String type data and logical type data;
Using the packet name of application program as mark, white list application program is added in business configuration file.
It is further used as preferred embodiment, it is described according to business configuration file, in the file system of Android source code
In the step for adding authorization code in configuration file,
The file system configuration file is fs_config.c file;
Configuration file after the addition authorization code only allows white list application program directly to access.
It is further used as preferred embodiment, described is white list application providing system business service, in white name
The step for permission handle is added in single utility program, comprising the following steps:
It creates and starts from realization service in system service;It is described to inherit Binder class from the service of realization;
It will be Zi realization service registration into service management;
Starting services from realization and loads all configurations in a manner of reading business configuration file;
Wherein, it is described will Zi realize service registration into service management the step for, specifically:
It will be added in service management from the title for realizing service and from the object of realization service.
It is further used as preferred embodiment, described after the system for brushing customization again, white list application program is according to power
The step for limiting handle and access system business service, and obtaining the attribute information in business configuration file, comprising the following steps:
After the system for brushing customization again, activation system service;
Pass through system business service registration business service;
Start service management;
IBinder object is obtained by business service;
The transact function of IBinder object is called according to Property Name;
The onTransact function of response business service is driven by Binder;
By the content of system business service acquisition business configuration file, and obtains the corresponding application program of current process and know
Other code;
By inquiring using packet management service the application program identification code, judge whether the application program is white name
Single utility program;If so, performing the next step rapid;Conversely, not responding then;
It is driven by Binder to the white list application program feedback attributes value.
Corresponding with the method for Fig. 1, the embodiment of the invention also provides a kind of protections of the configuration information of cloud cell phone manufacturer to be
System, comprising:
Configuration file adds module, for adding business configuration file under system directory;
White list adding module for adding attribute configuration by business configuration file, and adds in business configuration file
Add white list application program;
Permission adding module, for adding in the file system configuration file of Android source code according to business configuration file
Add authorization code;
Handle adding module, for being white list application providing system business service, in white list application program
Add permission handle;
Data obtaining module, for after the system for brushing customization again, white list application program to access system according to permission handle
System business service, and obtain the attribute information in business configuration file.
It is further used as preferred embodiment, the suffix of the business configuration file is xml format;
The file system configuration file is fs_config.c file;
Configuration file after the addition authorization code only allows white list application program directly to access.
The technical program is to solve the sensitive configuration information of protection manufacturer, it is ensured that manufacturer oneself is served by energy
It is enough freely normally to read and guarantee that other software application read the attribute again.
The specific implementation step of the configuration information guard method of cloud cell phone manufacturer of the invention is described below in detail:
As described in Figure 2, which realizes that steps are as follows:
S1, the Added Business configuration file under system/system/etc/ catalogue, the business configuration file are that suffix is
The file of xml (extensible markup language), the business configuration file in the present embodiment are temporarily named into business.xml;
Then, it adds attribute if it is long character string type data according to xml reference format addition attribute configuration and matches
The format set is<string name="url">www.google.com</string>, for bool (logical type variable) class
Type data are worth if it is opening for true (true), otherwise are false (vacation), add the format of attribute configuration as <boolean
Name=" on " value=" true "/>, other types are customized.
In addition, the present embodiment adds also in the business configuration file and may have access to the application program of this file content (this is answered
White list application is referred to as with program), using application package name as mark.
S2, in the file system configuration file fs_config.c of Android source code add authorization code " 00400,
AID_SYSTEM, AID_SYSTEM, 0, " system/etc/business.xml " } ", the meaning of the authorization code of the present embodiment
It is ensuring that this document can only allow to possess the application program of system permission and directly access, other programs all do not have permission to access
Content therein.
S3, to need to provide BusinessService service (system business service) white to may have access to provide content
List application, BusinessService service pass through succession Binder (a kind of mode of Android striding course communication) class and will
It is entitled " business " that it is registered to ServiceManager (system service management) addition permission handle, then incites somebody to action
Business.xml content reads storage into memory.
After S4, the above preparation are completed, the system into customization is brushed again, application program can pass through the business
Handle takes the service object IBinder (an interface class of striding course communication) of registration from ServiceManager, white at this time
List application can access system business service by the IBinder object, and IBinder interface is called in white list application
Specified name information is passed in Parcel (small data packets) by transact function, and BusinessService will respond this
Request, BusinessService obtains uid belonging to this request process, and (CUSTOMER ID, each application program have uniquely
Identification code), then packet name is inquired by PackageManagerService (apply packet management service) by the uid, if
It is matched to the white list program that business.xml corresponds to name, then is returned to correct attribute value, otherwise mismatches and is ignored as
The request of this word.
In conclusion the present invention adds business configuration file in system image, suitable for any kind of data and not
Limit lengthy content, realize and carry out the validity judgement of application program by Binder mode, to it is some be not that manufacturer customizes
Application program is filtered processing to reach the detection for Malware.
The embodiment of the invention also provides a kind of configuration informations of cloud cell phone manufacturer to protect system, comprising:
At least one processor;
At least one processor, for storing at least one program;
When at least one described program is executed by least one described processor, so that at least one described processor is realized
The configuration information guard method of the cloud cell phone manufacturer.
Suitable for this system embodiment, this system embodiment is implemented content in above method embodiment
Function is identical as above method embodiment, and the beneficial effect reached and above method embodiment beneficial effect achieved
It is identical.
In addition, the embodiment of the invention also provides a kind of storage mediums, wherein being stored with the executable instruction of processor, institute
The executable instruction of processor is stated when executed by the processor for executing the configuration information protection side of the cloud cell phone manufacturer
Method.
In some selectable embodiments, the function/operation mentioned in a block diagram can not be mentioned according to operational illustrations
The sequence arrived occurs.For example, depending on related function/operation, two boxes continuously shown can actually be by substantially
On simultaneously execute or the box can be performed sometimes with reverse order.In addition, presented in flow chart of the invention and
The embodiment of description is provided in an illustrative manner, and it is an object of the present invention to provide technology is more completely understood.Disclosed method is not
It is limited to operation presented herein and logic flow.Selectable embodiment is it is contemplated that the wherein sequence quilt of various operations
The sub-operation of a part for changing and being wherein described as larger operation is executed independently.
Although in addition, describe the present invention under the background of functional module, but it is to be understood that, unless otherwise opposite
Illustrate, one or more of the function and/or feature can be integrated in single physical device and/or software module
In or one or more functions and/or feature can be implemented in individual physical unit or software module.It can also manage
Solution, the practical realization in relation to each module are discussed in detail for understanding that the present invention is unnecessary.More precisely, examining
Consider in device disclosed herein in the case where the attribute of various functional modules, function and internal relations, engineer's
It will understand that the practical realization of the module in routine techniques.Therefore, those skilled in the art can be in nothing with ordinary skill
Need to realize the present invention illustrated in detail in the claims in the case where undue experimentation.It will also be appreciated that disclosed spy
Determine concept to be merely illustrative, be not intended to limit the scope of the present invention, the scope of the present invention by the appended claims and
The full scope of its equivalent program determines.
It, can be with if the function is realized in the form of SFU software functional unit and when sold or used as an independent product
It is stored in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially in other words
The part of the part that contributes to existing technology or the technical solution can be embodied in the form of software products, the meter
Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be a
People's computer, server or network equipment etc.) it performs all or part of the steps of the method described in the various embodiments of the present invention.
And storage medium above-mentioned includes: that USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited
The various media that can store program code such as reservoir (RAM, Random Access Memory), magnetic or disk.
Expression or logic and/or step described otherwise above herein in flow charts, for example, being considered use
In the order list for the executable instruction for realizing logic function, may be embodied in any computer-readable medium, for
Instruction execution system, device or equipment (such as computer based system, including the system of processor or other can be held from instruction
The instruction fetch of row system, device or equipment and the system executed instruction) it uses, or combine these instruction execution systems, device or set
It is standby and use.For the purpose of this specification, " computer-readable medium ", which can be, any may include, stores, communicates, propagates or pass
Defeated program is for instruction execution system, device or equipment or the dress used in conjunction with these instruction execution systems, device or equipment
It sets.
The more specific example (non-exhaustive list) of computer-readable medium include the following: there are one or more wirings
Electrical connection section (electronic device), portable computer diskette box (magnetic device), random access memory (RAM), read-only memory
(ROM), erasable edit read-only storage (EPROM or flash memory), fiber device and portable optic disk is read-only deposits
Reservoir (CDROM).In addition, computer-readable medium can even is that the paper that can print described program on it or other are suitable
Medium, because can then be edited, be interpreted or when necessary with it for example by carrying out optical scanner to paper or other media
His suitable method is handled electronically to obtain described program, is then stored in computer storage.
It should be appreciated that each section of the invention can be realized with hardware, software, firmware or their combination.Above-mentioned
In embodiment, software that multiple steps or method can be executed in memory and by suitable instruction execution system with storage
Or firmware is realized.It, and in another embodiment, can be under well known in the art for example, if realized with hardware
Any one of column technology or their combination are realized: having a logic gates for realizing logic function to data-signal
Discrete logic, with suitable combinational logic gate circuit specific integrated circuit, programmable gate array (PGA), scene
Programmable gate array (FPGA) etc..
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show
The description of example " or " some examples " etc. means specific features, structure, material or spy described in conjunction with this embodiment or example
Point is included at least one embodiment or example of the invention.In the present specification, schematic expression of the above terms are not
Centainly refer to identical embodiment or example.Moreover, particular features, structures, materials, or characteristics described can be any
One or more embodiment or examples in can be combined in any suitable manner.
Although an embodiment of the present invention has been shown and described, it will be understood by those skilled in the art that: not
A variety of change, modification, replacement and modification can be carried out to these embodiments in the case where being detached from the principle of the present invention and objective, this
The range of invention is defined by the claims and their equivalents.
It is to be illustrated to preferable implementation of the invention, but the present invention is not limited to the embodiment above, it is ripe
Various equivalent deformation or replacement can also be made on the premise of without prejudice to spirit of the invention by knowing those skilled in the art, this
Equivalent deformation or replacement are all included in the scope defined by the claims of the present application a bit.
Claims (10)
1. the configuration information guard method of cloud cell phone manufacturer, it is characterised in that: the following steps are included:
Business configuration file is added under system directory;
Attribute configuration is added by business configuration file, and adds white list application program in business configuration file;
According to business configuration file, authorization code is added in the file system configuration file of Android source code;
For white list application providing system business service, permission handle is added in white list application program;
After the system for brushing customization again, white list application program accesses system business service according to permission handle, and obtains business
Attribute information in configuration file.
2. the configuration information guard method of cloud cell phone manufacturer according to claim 1, it is characterised in that: the business configuration
The suffix of file is xml format.
3. the configuration information guard method of cloud cell phone manufacturer according to claim 1, it is characterised in that: described to pass through business
Configuration file adds attribute configuration, and in business configuration file the step for addition white list application program, including following step
It is rapid:
Different types of data is configured according to xml format, the different types of data includes but is not limited to long character string class
Type data and logical type data;
Using the packet name of application program as mark, white list application program is added in business configuration file.
4. the configuration information guard method of cloud cell phone manufacturer according to claim 1, it is characterised in that: described according to business
Configuration file, in the file system configuration file of Android source code add authorization code the step in,
The file system configuration file is fs_config.c file;
Configuration file after the addition authorization code only allows white list application program directly to access.
5. the configuration information guard method of cloud cell phone manufacturer according to claim 1, it is characterised in that: described is white list
Application providing system business service, in white list application program the step for addition permission handle, comprising the following steps:
It creates and starts from realization service in system service;It is described to inherit Binder class from the service of realization;
It will be Zi realization service registration into service management;
Starting services from realization and loads all configurations in a manner of reading business configuration file;
Wherein, it is described will Zi realize service registration into service management the step for, specifically:
It will be added in service management from the title for realizing service and from the object of realization service.
6. the configuration information guard method of cloud cell phone manufacturer according to claim 1, it is characterised in that: described fixed in brush again
After the system of system, white list application program accesses system business service according to permission handle, and obtains in business configuration file
The step for attribute information, comprising the following steps:
After the system for brushing customization again, activation system service;
Pass through system business service registration business service;
Start service management;
IBinder object is obtained by business service;
The transact function of IBinder object is called according to Property Name;
The onTransact function of response business service is driven by Binder;
By the content of system business service acquisition business configuration file, and obtain the corresponding application program identification of current process
Code;
By inquiring using packet management service the application program identification code, judge whether the application program is that white list is answered
Use program;If so, performing the next step rapid;Conversely, not responding then;
It is driven by Binder to the white list application program feedback attributes value.
7. the configuration information of cloud cell phone manufacturer protects system, it is characterised in that: include:
Configuration file adds module, for adding business configuration file under system directory;
White list adding module for adding attribute configuration by business configuration file, and is added in business configuration file white
Name single utility program;
Permission adding module, for adding power in the file system configuration file of Android source code according to business configuration file
Limit code;
Handle adding module is added in white list application program for being white list application providing system business service
Permission handle;
Data obtaining module, for after the system for brushing customization again, white list application program to access system industry according to permission handle
Business service, and obtain the attribute information in business configuration file.
8. the configuration information of cloud cell phone manufacturer according to claim 7 protects system, it is characterised in that:
The suffix of the business configuration file is xml format;
The file system configuration file is fs_config.c file;
Configuration file after the addition authorization code only allows white list application program directly to access.
9. the configuration information of cloud cell phone manufacturer protects system, it is characterised in that: include:
At least one processor;
At least one processor, for storing at least one program;
When at least one described program is executed by least one described processor, so that at least one described processor is realized as weighed
Benefit requires the configuration information guard method of cloud cell phone manufacturer described in any one of 1-6.
10. a kind of storage medium, wherein being stored with the executable instruction of processor, it is characterised in that: the processor is executable
Instruction when executed by the processor for executes such as cloud cell phone manufacturer of any of claims 1-6 configuration information
Guard method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910698403.0A CN110502901A (en) | 2019-07-31 | 2019-07-31 | Configuration information guard method, system and the storage medium of cloud cell phone manufacturer |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910698403.0A CN110502901A (en) | 2019-07-31 | 2019-07-31 | Configuration information guard method, system and the storage medium of cloud cell phone manufacturer |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110502901A true CN110502901A (en) | 2019-11-26 |
Family
ID=68587061
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910698403.0A Pending CN110502901A (en) | 2019-07-31 | 2019-07-31 | Configuration information guard method, system and the storage medium of cloud cell phone manufacturer |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110502901A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112799690A (en) * | 2021-02-01 | 2021-05-14 | 联想(北京)有限公司 | Information processing method, device, equipment and storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102891854A (en) * | 2012-10-15 | 2013-01-23 | 广州亦云信息技术有限公司 | Cloud server safety control method |
CN104732147A (en) * | 2015-04-13 | 2015-06-24 | 成都睿峰科技有限公司 | Application program processing method |
CN105205413A (en) * | 2015-10-26 | 2015-12-30 | 青岛海信移动通信技术股份有限公司 | Data protecting method and device |
US20180293399A1 (en) * | 2017-04-05 | 2018-10-11 | Tat Wai Chan | Patient privacy de-identification in firewall switches forming VLAN segregation |
CN109450888A (en) * | 2018-11-01 | 2019-03-08 | 泰康保险集团股份有限公司 | Service calling method and device |
CN109711144A (en) * | 2018-12-24 | 2019-05-03 | 广州微算互联信息技术有限公司 | Cloud mobile phone applies black, white list management method |
-
2019
- 2019-07-31 CN CN201910698403.0A patent/CN110502901A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102891854A (en) * | 2012-10-15 | 2013-01-23 | 广州亦云信息技术有限公司 | Cloud server safety control method |
CN104732147A (en) * | 2015-04-13 | 2015-06-24 | 成都睿峰科技有限公司 | Application program processing method |
CN105205413A (en) * | 2015-10-26 | 2015-12-30 | 青岛海信移动通信技术股份有限公司 | Data protecting method and device |
CN108763951A (en) * | 2015-10-26 | 2018-11-06 | 青岛海信移动通信技术股份有限公司 | A kind of guard method of data and device |
US20180293399A1 (en) * | 2017-04-05 | 2018-10-11 | Tat Wai Chan | Patient privacy de-identification in firewall switches forming VLAN segregation |
CN109450888A (en) * | 2018-11-01 | 2019-03-08 | 泰康保险集团股份有限公司 | Service calling method and device |
CN109711144A (en) * | 2018-12-24 | 2019-05-03 | 广州微算互联信息技术有限公司 | Cloud mobile phone applies black, white list management method |
Non-Patent Citations (1)
Title |
---|
CSDN: ""android8.0特许权限白名单"", 《HTTP://BLOG.CSDN.NET/TFSLOVEXIZI/ARTICLE/DETAILS/80999246》 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112799690A (en) * | 2021-02-01 | 2021-05-14 | 联想(北京)有限公司 | Information processing method, device, equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10223329B2 (en) | Policy based data collection, processing, and negotiation for analytics | |
CN110069941A (en) | A kind of interface access authentication method, apparatus and computer-readable medium | |
US8590003B2 (en) | Controlling access to resources by hosted entities | |
IL275042A (en) | Self-adaptive application programming interface level security monitoring | |
CN109818937A (en) | For the control method of Android permission, device and storage medium, electronic device | |
CN110601880B (en) | Cloud platform, service processing method, command interface and computer equipment | |
CN107015996A (en) | A kind of resource access method, apparatus and system | |
CN106599298A (en) | Advertisement blocking method and device and terminal equipment | |
CN105872051A (en) | Capacity open control service platform in government-enterprise cloud platform | |
US20100306833A1 (en) | Autonomous intelligent user identity manager with context recognition capabilities | |
CN107426252A (en) | The method and apparatus that web application firewall services are provided | |
US10783128B2 (en) | Rule based data processing | |
CN110198328A (en) | Client recognition methods, device, computer equipment and storage medium | |
US20160321254A1 (en) | Unsolicited bulk email detection using url tree hashes | |
US10057275B2 (en) | Restricted content publishing with search engine registry | |
CN110199283A (en) | For the system and method that authentication platform is trusted in network function virtualized environment | |
EP2521043A1 (en) | Method for establishing a relationship between semantic data and the running of a widget | |
CN109981745A (en) | A kind of journal file processing method and server | |
CN111427613A (en) | Application program interface API management method and device | |
CN110502901A (en) | Configuration information guard method, system and the storage medium of cloud cell phone manufacturer | |
CN104182493B (en) | A kind of method of data synchronization and device, terminal | |
CN109493046A (en) | Business opportunity information sharing method, electronic device and readable storage medium storing program for executing based on block chain | |
CN106485520A (en) | Across channel communicating control method and server | |
US20190129907A1 (en) | Data transfer system, data transfer apparatus, data transfer method, and computer-readable recording medium | |
CN107979595A (en) | Private data guard method and gateway system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20191126 |
|
RJ01 | Rejection of invention patent application after publication |