CN110502901A - Configuration information guard method, system and the storage medium of cloud cell phone manufacturer - Google Patents

Configuration information guard method, system and the storage medium of cloud cell phone manufacturer Download PDF

Info

Publication number
CN110502901A
CN110502901A CN201910698403.0A CN201910698403A CN110502901A CN 110502901 A CN110502901 A CN 110502901A CN 201910698403 A CN201910698403 A CN 201910698403A CN 110502901 A CN110502901 A CN 110502901A
Authority
CN
China
Prior art keywords
business
configuration file
service
white list
application program
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910698403.0A
Other languages
Chinese (zh)
Inventor
周立群
黄小勇
雷磊
黄坚
李全斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hunan Micro Computing Internet Information Technology Co Ltd
Original Assignee
Hunan Micro Computing Internet Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hunan Micro Computing Internet Information Technology Co Ltd filed Critical Hunan Micro Computing Internet Information Technology Co Ltd
Priority to CN201910698403.0A priority Critical patent/CN110502901A/en
Publication of CN110502901A publication Critical patent/CN110502901A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/575Secure boot
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • H04W12/37Managing security policies for mobile devices or for controlling mobile applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/22Processing or transfer of terminal data, e.g. status or physical capabilities

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Stored Programmes (AREA)

Abstract

The invention discloses configuration information guard method, system and the storage medium of cloud cell phone manufacturer, method includes: that business configuration file is added under system directory;Attribute configuration is added by business configuration file, and adds white list application program in business configuration file;According to business configuration file, authorization code is added in the file system configuration file of Android source code;For white list application providing system business service, permission handle is added in white list application program;After the system for brushing customization again, white list application program accesses system business service according to permission handle, and obtains the attribute information in business configuration file;The present invention can be avoided the risk that the service of manufacturer's customization is detected by rogue program, can guarantee the concealment of information on services, highly-safe, can be widely applied to field of cloud computer technology.

Description

Configuration information guard method, system and the storage medium of cloud cell phone manufacturer
Technical field
The present invention relates to the configuration information guard method of field of cloud computer technology, especially cloud cell phone manufacturer, system and deposit Storage media.
Background technique
With the continuous development of network communications technology, the quantity of cloud cell phone manufacturer is also constantly increasing, current cloud mobile phone System has been generally used Android operation system, and is customized exploitation to primary android system, so that new system More it is bonded the use style of user.In order to provide targetedly cloud service to every user, cloud cell phone manufacturer needs in cloud The many network request interfaces of cell phone system addition, it is also necessary to configure various dynamic options to manage cloud cell phone system.
Most of configuration information is all disposed on/default.prop ,/system/build.prop ,/system/ Under the configuration files such as default.prop, wherein the characteristics of be exactly whatsoever application process, Java (software can be passed through App development language) layer SystemProperties (system property) class provide function or import Native (local) layer C, C Plus Plus system_properties header file in function access the attribute configured in the above file.
The configuration method of the prior art has the disadvantages that
1), the information of the above configuration file is all globally shared, and any program process can access, and be will lead to The sensitive information that manufacturer is configured is exposed, if these information are utilized by some malicious users, or even takes to cloud cell phone manufacturer Business is attacked, it will is caused certain risk to cloud cell phone system, be can result in service paralysis when serious.
2), these files have strict demand to length of the configuration file to Property Name and attribute value, cause length longer Configuration content normally can not be arranged and be read.
Summary of the invention
In view of this, the embodiment of the present invention provide a kind of highly-safe cloud cell phone manufacturer configuration information guard method, System and storage medium.
In a first aspect, the embodiment of the invention provides a kind of configuration information guard method of cloud cell phone manufacturer, including it is following Step:
Business configuration file is added under system directory;
Attribute configuration is added by business configuration file, and adds white list application program in business configuration file;
According to business configuration file, authorization code is added in the file system configuration file of Android source code;
For white list application providing system business service, permission handle is added in white list application program;
After the system for brushing customization again, white list application program accesses system business service according to permission handle, and obtains Attribute information in business configuration file.
Further, the suffix of the business configuration file is xml format.
Further, described that attribute configuration is added by business configuration file, and white list is added in business configuration file The step for application program, comprising the following steps:
Different types of data is configured according to xml format, the different types of data includes but is not limited to long character String type data and logical type data;
Using the packet name of application program as mark, white list application program is added in business configuration file.
Further, described according to business configuration file, permission is added in the file system configuration file of Android source code In the step for code,
The file system configuration file is fs_config.c file;
Configuration file after the addition authorization code only allows white list application program directly to access.
Further, described is white list application providing system business service, and power is added in white list application program The step for limiting handle, comprising the following steps:
It creates and starts from realization service in system service;It is described to inherit Binder class from the service of realization;
It will be Zi realization service registration into service management;
Starting services from realization and loads all configurations in a manner of reading business configuration file;
Wherein, it is described will Zi realize service registration into service management the step for, specifically:
It will be added in service management from the title for realizing service and from the object of realization service.
Further, described after the system for brushing customization again, white list application program accesses system business according to permission handle The step for servicing, and obtaining the attribute information in business configuration file, comprising the following steps:
After the system for brushing customization again, activation system service;
Pass through system business service registration business service;
Start service management;
IBinder object is obtained by business service;
The transact function of IBinder object is called according to Property Name;
The onTransact function of response business service is driven by Binder;
By the content of system business service acquisition business configuration file, and obtains the corresponding application program of current process and know Other code;
By inquiring using packet management service the application program identification code, judge whether the application program is white name Single utility program;If so, performing the next step rapid;Conversely, not responding then;
It is driven by Binder to the white list application program feedback attributes value.
Second aspect, the embodiment of the invention also provides a kind of configuration informations of cloud cell phone manufacturer to protect system, comprising:
Configuration file adds module, for adding business configuration file under system directory;
White list adding module for adding attribute configuration by business configuration file, and adds in business configuration file Add white list application program;
Permission adding module, for adding in the file system configuration file of Android source code according to business configuration file Add authorization code;
Handle adding module, for being white list application providing system business service, in white list application program Add permission handle;
Data obtaining module, for after the system for brushing customization again, white list application program to access system according to permission handle System business service, and obtain the attribute information in business configuration file.
Further, the suffix of the business configuration file is xml format;
The file system configuration file is fs_config.c file;
Configuration file after the addition authorization code only allows white list application program directly to access.
The third aspect, the embodiment of the invention also provides a kind of configuration informations of cloud cell phone manufacturer to protect system, comprising:
At least one processor;
At least one processor, for storing at least one program;
When at least one described program is executed by least one described processor, so that at least one described processor is realized The configuration information guard method of the cloud cell phone manufacturer.
Fourth aspect, the embodiment of the invention also provides a kind of storage mediums, wherein being stored with the executable finger of processor It enables, the executable instruction of the processor is protected for executing the configuration information of the cloud cell phone manufacturer when executed by the processor Maintaining method.
One or more technical solutions in the embodiments of the present invention have the advantages that the embodiment of the present invention passes through Business configuration file is added under system directory, by adding white list application program, authorization code and permission handle in advance, After the system for brushing customization again, white list application program can be only allowed to access system business service, and then obtain business configuration Attribute information in file;The present invention can be avoided the risk that the service of manufacturer's customization is detected by rogue program, can guarantee to take The concealment for information of being engaged in, it is highly-safe.
Detailed description of the invention
Fig. 1 is the overall step flow chart of the embodiment of the present invention;
Fig. 2 is the white list application requests flow diagram of the embodiment of the present invention.
Specific embodiment
The present invention is further explained and is illustrated with specific embodiment with reference to the accompanying drawings of the specification.For of the invention real The step number in example is applied, is arranged only for the purposes of illustrating explanation, any restriction is not done to the sequence between step, is implemented The execution sequence of each step in example can be adaptively adjusted according to the understanding of those skilled in the art.
The embodiment of the invention provides a kind of configuration information guard methods of cloud cell phone manufacturer, comprising the following steps:
Business configuration file is added under system directory;
Attribute configuration is added by business configuration file, and adds white list application program in business configuration file;
According to business configuration file, authorization code is added in the file system configuration file of Android source code;
For white list application providing system business service, permission handle is added in white list application program;
After the system for brushing customization again, white list application program accesses system business service according to permission handle, and obtains Attribute information in business configuration file.
It is further used as preferred embodiment, the suffix of the business configuration file is xml format.
It is further used as preferred embodiment, it is described that attribute configuration is added by business configuration file, and match in business Set the step for white list application program is added in file, comprising the following steps:
Different types of data is configured according to xml format, the different types of data includes but is not limited to long character String type data and logical type data;
Using the packet name of application program as mark, white list application program is added in business configuration file.
It is further used as preferred embodiment, it is described according to business configuration file, in the file system of Android source code In the step for adding authorization code in configuration file,
The file system configuration file is fs_config.c file;
Configuration file after the addition authorization code only allows white list application program directly to access.
It is further used as preferred embodiment, described is white list application providing system business service, in white name The step for permission handle is added in single utility program, comprising the following steps:
It creates and starts from realization service in system service;It is described to inherit Binder class from the service of realization;
It will be Zi realization service registration into service management;
Starting services from realization and loads all configurations in a manner of reading business configuration file;
Wherein, it is described will Zi realize service registration into service management the step for, specifically:
It will be added in service management from the title for realizing service and from the object of realization service.
It is further used as preferred embodiment, described after the system for brushing customization again, white list application program is according to power The step for limiting handle and access system business service, and obtaining the attribute information in business configuration file, comprising the following steps:
After the system for brushing customization again, activation system service;
Pass through system business service registration business service;
Start service management;
IBinder object is obtained by business service;
The transact function of IBinder object is called according to Property Name;
The onTransact function of response business service is driven by Binder;
By the content of system business service acquisition business configuration file, and obtains the corresponding application program of current process and know Other code;
By inquiring using packet management service the application program identification code, judge whether the application program is white name Single utility program;If so, performing the next step rapid;Conversely, not responding then;
It is driven by Binder to the white list application program feedback attributes value.
Corresponding with the method for Fig. 1, the embodiment of the invention also provides a kind of protections of the configuration information of cloud cell phone manufacturer to be System, comprising:
Configuration file adds module, for adding business configuration file under system directory;
White list adding module for adding attribute configuration by business configuration file, and adds in business configuration file Add white list application program;
Permission adding module, for adding in the file system configuration file of Android source code according to business configuration file Add authorization code;
Handle adding module, for being white list application providing system business service, in white list application program Add permission handle;
Data obtaining module, for after the system for brushing customization again, white list application program to access system according to permission handle System business service, and obtain the attribute information in business configuration file.
It is further used as preferred embodiment, the suffix of the business configuration file is xml format;
The file system configuration file is fs_config.c file;
Configuration file after the addition authorization code only allows white list application program directly to access.
The technical program is to solve the sensitive configuration information of protection manufacturer, it is ensured that manufacturer oneself is served by energy It is enough freely normally to read and guarantee that other software application read the attribute again.
The specific implementation step of the configuration information guard method of cloud cell phone manufacturer of the invention is described below in detail:
As described in Figure 2, which realizes that steps are as follows:
S1, the Added Business configuration file under system/system/etc/ catalogue, the business configuration file are that suffix is The file of xml (extensible markup language), the business configuration file in the present embodiment are temporarily named into business.xml;
Then, it adds attribute if it is long character string type data according to xml reference format addition attribute configuration and matches The format set is<string name="url">www.google.com</string>, for bool (logical type variable) class Type data are worth if it is opening for true (true), otherwise are false (vacation), add the format of attribute configuration as <boolean Name=" on " value=" true "/>, other types are customized.
In addition, the present embodiment adds also in the business configuration file and may have access to the application program of this file content (this is answered White list application is referred to as with program), using application package name as mark.
S2, in the file system configuration file fs_config.c of Android source code add authorization code " 00400, AID_SYSTEM, AID_SYSTEM, 0, " system/etc/business.xml " } ", the meaning of the authorization code of the present embodiment It is ensuring that this document can only allow to possess the application program of system permission and directly access, other programs all do not have permission to access Content therein.
S3, to need to provide BusinessService service (system business service) white to may have access to provide content List application, BusinessService service pass through succession Binder (a kind of mode of Android striding course communication) class and will It is entitled " business " that it is registered to ServiceManager (system service management) addition permission handle, then incites somebody to action Business.xml content reads storage into memory.
After S4, the above preparation are completed, the system into customization is brushed again, application program can pass through the business Handle takes the service object IBinder (an interface class of striding course communication) of registration from ServiceManager, white at this time List application can access system business service by the IBinder object, and IBinder interface is called in white list application Specified name information is passed in Parcel (small data packets) by transact function, and BusinessService will respond this Request, BusinessService obtains uid belonging to this request process, and (CUSTOMER ID, each application program have uniquely Identification code), then packet name is inquired by PackageManagerService (apply packet management service) by the uid, if It is matched to the white list program that business.xml corresponds to name, then is returned to correct attribute value, otherwise mismatches and is ignored as The request of this word.
In conclusion the present invention adds business configuration file in system image, suitable for any kind of data and not Limit lengthy content, realize and carry out the validity judgement of application program by Binder mode, to it is some be not that manufacturer customizes Application program is filtered processing to reach the detection for Malware.
The embodiment of the invention also provides a kind of configuration informations of cloud cell phone manufacturer to protect system, comprising:
At least one processor;
At least one processor, for storing at least one program;
When at least one described program is executed by least one described processor, so that at least one described processor is realized The configuration information guard method of the cloud cell phone manufacturer.
Suitable for this system embodiment, this system embodiment is implemented content in above method embodiment Function is identical as above method embodiment, and the beneficial effect reached and above method embodiment beneficial effect achieved It is identical.
In addition, the embodiment of the invention also provides a kind of storage mediums, wherein being stored with the executable instruction of processor, institute The executable instruction of processor is stated when executed by the processor for executing the configuration information protection side of the cloud cell phone manufacturer Method.
In some selectable embodiments, the function/operation mentioned in a block diagram can not be mentioned according to operational illustrations The sequence arrived occurs.For example, depending on related function/operation, two boxes continuously shown can actually be by substantially On simultaneously execute or the box can be performed sometimes with reverse order.In addition, presented in flow chart of the invention and The embodiment of description is provided in an illustrative manner, and it is an object of the present invention to provide technology is more completely understood.Disclosed method is not It is limited to operation presented herein and logic flow.Selectable embodiment is it is contemplated that the wherein sequence quilt of various operations The sub-operation of a part for changing and being wherein described as larger operation is executed independently.
Although in addition, describe the present invention under the background of functional module, but it is to be understood that, unless otherwise opposite Illustrate, one or more of the function and/or feature can be integrated in single physical device and/or software module In or one or more functions and/or feature can be implemented in individual physical unit or software module.It can also manage Solution, the practical realization in relation to each module are discussed in detail for understanding that the present invention is unnecessary.More precisely, examining Consider in device disclosed herein in the case where the attribute of various functional modules, function and internal relations, engineer's It will understand that the practical realization of the module in routine techniques.Therefore, those skilled in the art can be in nothing with ordinary skill Need to realize the present invention illustrated in detail in the claims in the case where undue experimentation.It will also be appreciated that disclosed spy Determine concept to be merely illustrative, be not intended to limit the scope of the present invention, the scope of the present invention by the appended claims and The full scope of its equivalent program determines.
It, can be with if the function is realized in the form of SFU software functional unit and when sold or used as an independent product It is stored in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially in other words The part of the part that contributes to existing technology or the technical solution can be embodied in the form of software products, the meter Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be a People's computer, server or network equipment etc.) it performs all or part of the steps of the method described in the various embodiments of the present invention. And storage medium above-mentioned includes: that USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited The various media that can store program code such as reservoir (RAM, Random Access Memory), magnetic or disk.
Expression or logic and/or step described otherwise above herein in flow charts, for example, being considered use In the order list for the executable instruction for realizing logic function, may be embodied in any computer-readable medium, for Instruction execution system, device or equipment (such as computer based system, including the system of processor or other can be held from instruction The instruction fetch of row system, device or equipment and the system executed instruction) it uses, or combine these instruction execution systems, device or set It is standby and use.For the purpose of this specification, " computer-readable medium ", which can be, any may include, stores, communicates, propagates or pass Defeated program is for instruction execution system, device or equipment or the dress used in conjunction with these instruction execution systems, device or equipment It sets.
The more specific example (non-exhaustive list) of computer-readable medium include the following: there are one or more wirings Electrical connection section (electronic device), portable computer diskette box (magnetic device), random access memory (RAM), read-only memory (ROM), erasable edit read-only storage (EPROM or flash memory), fiber device and portable optic disk is read-only deposits Reservoir (CDROM).In addition, computer-readable medium can even is that the paper that can print described program on it or other are suitable Medium, because can then be edited, be interpreted or when necessary with it for example by carrying out optical scanner to paper or other media His suitable method is handled electronically to obtain described program, is then stored in computer storage.
It should be appreciated that each section of the invention can be realized with hardware, software, firmware or their combination.Above-mentioned In embodiment, software that multiple steps or method can be executed in memory and by suitable instruction execution system with storage Or firmware is realized.It, and in another embodiment, can be under well known in the art for example, if realized with hardware Any one of column technology or their combination are realized: having a logic gates for realizing logic function to data-signal Discrete logic, with suitable combinational logic gate circuit specific integrated circuit, programmable gate array (PGA), scene Programmable gate array (FPGA) etc..
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show The description of example " or " some examples " etc. means specific features, structure, material or spy described in conjunction with this embodiment or example Point is included at least one embodiment or example of the invention.In the present specification, schematic expression of the above terms are not Centainly refer to identical embodiment or example.Moreover, particular features, structures, materials, or characteristics described can be any One or more embodiment or examples in can be combined in any suitable manner.
Although an embodiment of the present invention has been shown and described, it will be understood by those skilled in the art that: not A variety of change, modification, replacement and modification can be carried out to these embodiments in the case where being detached from the principle of the present invention and objective, this The range of invention is defined by the claims and their equivalents.
It is to be illustrated to preferable implementation of the invention, but the present invention is not limited to the embodiment above, it is ripe Various equivalent deformation or replacement can also be made on the premise of without prejudice to spirit of the invention by knowing those skilled in the art, this Equivalent deformation or replacement are all included in the scope defined by the claims of the present application a bit.

Claims (10)

1. the configuration information guard method of cloud cell phone manufacturer, it is characterised in that: the following steps are included:
Business configuration file is added under system directory;
Attribute configuration is added by business configuration file, and adds white list application program in business configuration file;
According to business configuration file, authorization code is added in the file system configuration file of Android source code;
For white list application providing system business service, permission handle is added in white list application program;
After the system for brushing customization again, white list application program accesses system business service according to permission handle, and obtains business Attribute information in configuration file.
2. the configuration information guard method of cloud cell phone manufacturer according to claim 1, it is characterised in that: the business configuration The suffix of file is xml format.
3. the configuration information guard method of cloud cell phone manufacturer according to claim 1, it is characterised in that: described to pass through business Configuration file adds attribute configuration, and in business configuration file the step for addition white list application program, including following step It is rapid:
Different types of data is configured according to xml format, the different types of data includes but is not limited to long character string class Type data and logical type data;
Using the packet name of application program as mark, white list application program is added in business configuration file.
4. the configuration information guard method of cloud cell phone manufacturer according to claim 1, it is characterised in that: described according to business Configuration file, in the file system configuration file of Android source code add authorization code the step in,
The file system configuration file is fs_config.c file;
Configuration file after the addition authorization code only allows white list application program directly to access.
5. the configuration information guard method of cloud cell phone manufacturer according to claim 1, it is characterised in that: described is white list Application providing system business service, in white list application program the step for addition permission handle, comprising the following steps:
It creates and starts from realization service in system service;It is described to inherit Binder class from the service of realization;
It will be Zi realization service registration into service management;
Starting services from realization and loads all configurations in a manner of reading business configuration file;
Wherein, it is described will Zi realize service registration into service management the step for, specifically:
It will be added in service management from the title for realizing service and from the object of realization service.
6. the configuration information guard method of cloud cell phone manufacturer according to claim 1, it is characterised in that: described fixed in brush again After the system of system, white list application program accesses system business service according to permission handle, and obtains in business configuration file The step for attribute information, comprising the following steps:
After the system for brushing customization again, activation system service;
Pass through system business service registration business service;
Start service management;
IBinder object is obtained by business service;
The transact function of IBinder object is called according to Property Name;
The onTransact function of response business service is driven by Binder;
By the content of system business service acquisition business configuration file, and obtain the corresponding application program identification of current process Code;
By inquiring using packet management service the application program identification code, judge whether the application program is that white list is answered Use program;If so, performing the next step rapid;Conversely, not responding then;
It is driven by Binder to the white list application program feedback attributes value.
7. the configuration information of cloud cell phone manufacturer protects system, it is characterised in that: include:
Configuration file adds module, for adding business configuration file under system directory;
White list adding module for adding attribute configuration by business configuration file, and is added in business configuration file white Name single utility program;
Permission adding module, for adding power in the file system configuration file of Android source code according to business configuration file Limit code;
Handle adding module is added in white list application program for being white list application providing system business service Permission handle;
Data obtaining module, for after the system for brushing customization again, white list application program to access system industry according to permission handle Business service, and obtain the attribute information in business configuration file.
8. the configuration information of cloud cell phone manufacturer according to claim 7 protects system, it is characterised in that:
The suffix of the business configuration file is xml format;
The file system configuration file is fs_config.c file;
Configuration file after the addition authorization code only allows white list application program directly to access.
9. the configuration information of cloud cell phone manufacturer protects system, it is characterised in that: include:
At least one processor;
At least one processor, for storing at least one program;
When at least one described program is executed by least one described processor, so that at least one described processor is realized as weighed Benefit requires the configuration information guard method of cloud cell phone manufacturer described in any one of 1-6.
10. a kind of storage medium, wherein being stored with the executable instruction of processor, it is characterised in that: the processor is executable Instruction when executed by the processor for executes such as cloud cell phone manufacturer of any of claims 1-6 configuration information Guard method.
CN201910698403.0A 2019-07-31 2019-07-31 Configuration information guard method, system and the storage medium of cloud cell phone manufacturer Pending CN110502901A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910698403.0A CN110502901A (en) 2019-07-31 2019-07-31 Configuration information guard method, system and the storage medium of cloud cell phone manufacturer

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910698403.0A CN110502901A (en) 2019-07-31 2019-07-31 Configuration information guard method, system and the storage medium of cloud cell phone manufacturer

Publications (1)

Publication Number Publication Date
CN110502901A true CN110502901A (en) 2019-11-26

Family

ID=68587061

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910698403.0A Pending CN110502901A (en) 2019-07-31 2019-07-31 Configuration information guard method, system and the storage medium of cloud cell phone manufacturer

Country Status (1)

Country Link
CN (1) CN110502901A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112799690A (en) * 2021-02-01 2021-05-14 联想(北京)有限公司 Information processing method, device, equipment and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102891854A (en) * 2012-10-15 2013-01-23 广州亦云信息技术有限公司 Cloud server safety control method
CN104732147A (en) * 2015-04-13 2015-06-24 成都睿峰科技有限公司 Application program processing method
CN105205413A (en) * 2015-10-26 2015-12-30 青岛海信移动通信技术股份有限公司 Data protecting method and device
US20180293399A1 (en) * 2017-04-05 2018-10-11 Tat Wai Chan Patient privacy de-identification in firewall switches forming VLAN segregation
CN109450888A (en) * 2018-11-01 2019-03-08 泰康保险集团股份有限公司 Service calling method and device
CN109711144A (en) * 2018-12-24 2019-05-03 广州微算互联信息技术有限公司 Cloud mobile phone applies black, white list management method

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102891854A (en) * 2012-10-15 2013-01-23 广州亦云信息技术有限公司 Cloud server safety control method
CN104732147A (en) * 2015-04-13 2015-06-24 成都睿峰科技有限公司 Application program processing method
CN105205413A (en) * 2015-10-26 2015-12-30 青岛海信移动通信技术股份有限公司 Data protecting method and device
CN108763951A (en) * 2015-10-26 2018-11-06 青岛海信移动通信技术股份有限公司 A kind of guard method of data and device
US20180293399A1 (en) * 2017-04-05 2018-10-11 Tat Wai Chan Patient privacy de-identification in firewall switches forming VLAN segregation
CN109450888A (en) * 2018-11-01 2019-03-08 泰康保险集团股份有限公司 Service calling method and device
CN109711144A (en) * 2018-12-24 2019-05-03 广州微算互联信息技术有限公司 Cloud mobile phone applies black, white list management method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
CSDN: ""android8.0特许权限白名单"", 《HTTP://BLOG.CSDN.NET/TFSLOVEXIZI/ARTICLE/DETAILS/80999246》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112799690A (en) * 2021-02-01 2021-05-14 联想(北京)有限公司 Information processing method, device, equipment and storage medium

Similar Documents

Publication Publication Date Title
US10223329B2 (en) Policy based data collection, processing, and negotiation for analytics
CN110069941A (en) A kind of interface access authentication method, apparatus and computer-readable medium
US8590003B2 (en) Controlling access to resources by hosted entities
IL275042A (en) Self-adaptive application programming interface level security monitoring
CN109818937A (en) For the control method of Android permission, device and storage medium, electronic device
CN110601880B (en) Cloud platform, service processing method, command interface and computer equipment
CN107015996A (en) A kind of resource access method, apparatus and system
CN106599298A (en) Advertisement blocking method and device and terminal equipment
CN105872051A (en) Capacity open control service platform in government-enterprise cloud platform
US20100306833A1 (en) Autonomous intelligent user identity manager with context recognition capabilities
CN107426252A (en) The method and apparatus that web application firewall services are provided
US10783128B2 (en) Rule based data processing
CN110198328A (en) Client recognition methods, device, computer equipment and storage medium
US20160321254A1 (en) Unsolicited bulk email detection using url tree hashes
US10057275B2 (en) Restricted content publishing with search engine registry
CN110199283A (en) For the system and method that authentication platform is trusted in network function virtualized environment
EP2521043A1 (en) Method for establishing a relationship between semantic data and the running of a widget
CN109981745A (en) A kind of journal file processing method and server
CN111427613A (en) Application program interface API management method and device
CN110502901A (en) Configuration information guard method, system and the storage medium of cloud cell phone manufacturer
CN104182493B (en) A kind of method of data synchronization and device, terminal
CN109493046A (en) Business opportunity information sharing method, electronic device and readable storage medium storing program for executing based on block chain
CN106485520A (en) Across channel communicating control method and server
US20190129907A1 (en) Data transfer system, data transfer apparatus, data transfer method, and computer-readable recording medium
CN107979595A (en) Private data guard method and gateway system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20191126

RJ01 Rejection of invention patent application after publication