CN111191220A - root mode switching method and device, terminal and computer storage medium - Google Patents

root mode switching method and device, terminal and computer storage medium Download PDF

Info

Publication number
CN111191220A
CN111191220A CN201811363306.8A CN201811363306A CN111191220A CN 111191220 A CN111191220 A CN 111191220A CN 201811363306 A CN201811363306 A CN 201811363306A CN 111191220 A CN111191220 A CN 111191220A
Authority
CN
China
Prior art keywords
dynamic password
matching
root mode
mode switching
switching
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811363306.8A
Other languages
Chinese (zh)
Inventor
熊友军
蒋永俊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ubtech Robotics Corp
Original Assignee
Ubtech Robotics Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ubtech Robotics Corp filed Critical Ubtech Robotics Corp
Priority to CN201811363306.8A priority Critical patent/CN111191220A/en
Publication of CN111191220A publication Critical patent/CN111191220A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/74Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2149Restricted operating environment

Abstract

The invention is suitable for the technical field of computer application, and provides a root mode switching method, a root mode switching device, a root mode switching terminal and a computer storage medium, wherein the method comprises the following steps: executing the user mode switching executable file according to the received user mode switching command, and outputting a first dynamic password; receiving a second dynamic password generated by the server according to the first dynamic password, and matching the second dynamic password with the first dynamic password; if the matching is successful, switching to the root mode, and if the matching is unsuccessful, refusing to switch to the root mode; only a user capable of acquiring a second dynamic password matched with the first dynamic password from the server can enter the root mode of the system, the problem that the system security is threatened due to the fact that a common user cuts into the root mode is effectively avoided, and the security of the root mode switching is improved.

Description

root mode switching method and device, terminal and computer storage medium
Technical Field
The invention belongs to the technical field of computer application, and particularly relates to a root mode switching method, a root mode switching device, a root mode switching terminal and a computer storage medium.
Background
Currently, a system of a terminal prohibits a user from obtaining a highest management mode, that is, the system does not support the user to execute a command such as "su" to switch into a root highest administrator mode (hereinafter referred to as a root mode). If it is desired to switch into the root mode, it is common to add another command in the release system that is the same as the "su" command to disguise and use that command to switch into the root mode.
However, such disguised commands have the disadvantage of being easy to leak, and once leaked, any ordinary user can use the disguised commands to switch into the root mode again, so that the system security is threatened, and even the development result is stolen or tampered.
Disclosure of Invention
In view of this, embodiments of the present invention provide a method, an apparatus, a terminal, and a computer storage medium for switching a root mode, which can solve the technical problem that system security is threatened when a general user switches into the root mode.
A first aspect of an embodiment of the present invention provides a method for switching root modes, including:
executing the user mode switching executable file according to the received user mode switching command, and outputting a first dynamic password;
receiving a second dynamic password generated by the server according to the first dynamic password, and matching the second dynamic password with the first dynamic password;
and if the matching is successful, switching to the root mode, and if the matching is unsuccessful, refusing to switch to the root mode.
A second aspect of an embodiment of the present invention provides a root mode switching apparatus, including:
the output unit is used for executing the user mode switching executable file according to the received user mode switching command and outputting a first dynamic password;
the matching unit is used for receiving a second dynamic password generated by the server according to the first dynamic password and matching the second dynamic password with the first dynamic password;
and the switching unit is used for switching to the root mode if the matching is successful, and refusing to switch to the root mode if the matching is unsuccessful.
A third aspect of the embodiments of the present invention provides a terminal, including a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor implements the steps of the method when executing the computer program.
A fourth aspect of the embodiments of the present invention provides a computer storage medium storing a computer program, wherein the computer program is configured to implement the steps of the method when executed by a processor.
In the embodiment of the invention, the terminal executes the user mode switching executable file according to the received user mode switching command and outputs the first dynamic password, then, receiving a second dynamic password generated by the server according to the first dynamic password, matching the second dynamic password with the first dynamic password, thereby switching to a root mode when the second dynamic password is successfully matched with the first dynamic password, refusing to switch to a root mode when the second dynamic password is unsuccessfully matched with the first dynamic password, only a user capable of acquiring a second dynamic password matched with the first dynamic password from the server can switch into the root mode of the system, so that the problem that the system security is threatened due to the fact that a common user switches into the root mode is effectively avoided, and the security of the root mode switching is improved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the embodiments or the prior art descriptions will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive exercise.
Fig. 1 is a schematic flowchart of a root mode switching method provided in an embodiment of the present invention;
fig. 2 is a schematic flowchart of a specific implementation of step 102 of a root mode switching method according to an embodiment of the present invention;
FIG. 3 is a schematic diagram of a root mode switching apparatus according to an embodiment of the present invention;
fig. 4 is a schematic diagram of a terminal according to an embodiment of the present invention.
Detailed Description
In the following description, for purposes of explanation and not limitation, specific details are set forth, such as particular system structures, techniques, etc. in order to provide a thorough understanding of the embodiments of the invention. It will be apparent, however, to one skilled in the art that the present invention may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present invention with unnecessary detail.
In order to explain the technical means of the present invention, the following description will be given by way of specific examples.
It will be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It is also to be understood that the terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in the specification and the appended claims, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
In specific implementation, the terminal device described in the embodiment of the present invention includes, but is not limited to, a terminal using an Android system. For example, the terminal may be a terminal device such as a smartphone, a tablet, a wearable device, and a smart robot, which supports various applications, such as one or more of the following: a drawing application, a presentation application, a word processing application, a website creation application, a disc burning application, a spreadsheet application, a gaming application, a telephone application, a video conferencing application, an email application, an instant messaging application, an exercise support application, a photo management application, a digital camera application, a web browsing application, a digital music player application, and/or a digital video player application.
Various applications that may be executed on the terminal device may use at least one common physical user interface device, such as a touch-sensitive surface. One or more functions of the touch-sensitive surface and corresponding information displayed on the terminal device may be adjusted and/or changed between applications and/or within respective applications. In this way, a common physical architecture (e.g., touch-sensitive surface) of the terminal device may support various applications with user interfaces that are intuitive and transparent to the user.
The terminal can operate all objects in the root mode, for example, any process can be started and stopped, redundant system applications can be eliminated, applications can be installed or uninstalled in a silent mode, privacy behavior monitoring and the like can be achieved. Because the root mode is so strong and has so many system permissions, there is a very large potential safety hazard in starting the root mode, and if the root mode is acquired by malicious software, a great unexpected loss may be caused to a user, so a mobile phone manufacturer generally defaults to closing the root mode of the system. However, for handset manufacturers, when maintaining or upgrading handsets, support of the root mode may be needed, and therefore, a way to switch to the root mode is still provided.
In the embodiment of the invention, the terminal executes the user mode switching executable file according to the received user mode switching command and outputs the first dynamic password, then the second dynamic password generated by the server according to the first dynamic password is received, and the second dynamic password is matched with the first dynamic password, so that the second dynamic password is switched to the root mode when the second dynamic password is successfully matched with the first dynamic password, and the second dynamic password is not successfully matched with the first dynamic password, and only a user capable of acquiring the second dynamic password matched with the first dynamic password from the server can switch into the root mode of the system, thereby effectively avoiding the problem that the system security is threatened by common users when the common users switch into the root mode, and improving the security of the root mode switching.
Referring to fig. 1, fig. 1 is a schematic flowchart of a root mode switching method according to an embodiment of the present invention. The main execution body of the method in this embodiment is a root mode switching device, which can be implemented by software and/or hardware, is integrated in a terminal, and is suitable for situations where root mode secure switching is required. The method for switching the root mode as shown in fig. 1 may include: step 101 to step 103.
Step 101, executing the user mode switching executable file according to the received user mode switching command, and outputting a first dynamic password.
In the embodiment of the invention, when the terminal receives the user mode switching command, the terminal indicates that the user needs to obtain the highest management authority, that is, the terminal needs to switch the current common user mode of the system to the root mode, so the terminal needs to execute the user mode switching executable file according to the received user mode switching command.
The user mode switching command can be a mode switching command which is triggered on the upper computer and sent to the terminal by the upper computer, and can also be a mode switching command which is triggered on the terminal by a user. For example, when the host computer is a computer and the terminal is a mobile phone, the user mode switching command may be a mode switching command sent by the computer to the mobile phone.
Optionally, the user mode switching executable file may be a su executable file.
In practical application, because the system authority in the root mode is too strong, the root mode in the Android platform is closed by default, a user cannot directly open and close the root mode in the Android platform through a user control interface, and the method for switching into the root mode is mainly obtained by executing a binary executable file su executable file.
In the embodiment of the invention, when the user mode switching executable file is executed, the first dynamic password needs to be output.
The first dynamic password may be a set of random numbers. For example, the random number is a random number of a preset byte length.
Specifically, in some embodiments of the present invention, before the terminal executes the user mode switching executable file according to the received user mode switching command in step 101, the method includes: a first dynamic password generation function is inserted in the user mode switch executable file.
For example, a random number generation function is inserted into a function header of the su executable file, so that the first dynamic password may be output first when the su executable file is executed by the terminal. The random number generated by the random number generation function is dynamically generated, and the first dynamic passwords acquired by the user every time are different, so that the safety of the root mode can be further improved.
102, receiving a second dynamic password generated by the server according to the first dynamic password, and matching the second dynamic password with the first dynamic password; and if the matching is successful, switching to the root mode, and if the matching is unsuccessful, refusing to switch to the root mode.
In the embodiment of the invention, the terminal starts to wait for the input of the second dynamic password after outputting the first dynamic password.
For example, the second dynamic password may be a second dynamic password that is generated by the server according to the first dynamic password and transmitted to the terminal after the terminal transmits the first dynamic password to the server, or may be a second dynamic password that is generated by the server according to the first dynamic password and transmitted to the terminal after a user transmits a password acquisition request carrying the first dynamic password to the server by using a web browsing application on the terminal or on an upper computer.
For example, the second dynamic password may be a password obtained by encrypting the first dynamic password by a server using an encryption algorithm, and the server may be a server of a manufacturer of the terminal.
That is to say, the second dynamic password may be obtained only by a user authorized by a manufacturer of the terminal, for example, the user authorized by the manufacturer of the terminal is a terminal maintenance person of the manufacturer of the terminal, so as to avoid the problem that the system security is threatened by a common user switching into a root mode.
Optionally, as shown in fig. 2, in some embodiments of the present invention, step 102 may include steps 201 to 203.
Step 201, receiving a second dynamic password generated by the server according to the first dynamic password.
Step 202, a third dynamic password corresponding to the first dynamic password is generated by using the second dynamic password generation function.
Step 203, determining whether the second dynamic password is the same as the third dynamic password, if the second dynamic password is the same as the third dynamic password, the second dynamic password is successfully matched with the third dynamic password, and if the second dynamic password is not the same as the third dynamic password, the second dynamic password is not successfully matched with the third dynamic password.
The first dynamic password and the second dynamic password are different passwords, so that after the terminal receives the second dynamic password and matches the second dynamic password with the first dynamic password, the terminal can generate a third dynamic password in real time according to the first dynamic password, the second dynamic password and the third dynamic password are successfully matched when the second dynamic password is judged to be the same as the third dynamic password, and the second dynamic password and the third dynamic password are unsuccessfully matched when the second dynamic password is not the same as the third dynamic password.
In practical application, when the terminal executes the user mode switching executable file according to the received user mode switching command, the terminal can generate and output a first dynamic password A by calling a first dynamic password generating function, and wait for the user to input a second dynamic password B, wherein the A, B value is a password which can be in one-to-one correspondence after being calculated by a preset encryption algorithm, the preset encryption algorithm can be written into the user mode switching executable file and a web server, the user inputs the first dynamic password A by opening a web page, the second dynamic password B can be obtained by executing the encryption algorithm by the web server, the terminal performs matching between the second dynamic password B and the first dynamic password A, and switches to a root mode when the matching between the second dynamic password B and the first dynamic password A is successful, and when the matching between the second dynamic password B and the first dynamic password A is unsuccessful, switching to the root mode is refused, so that only a user who can obtain the second dynamic password matched with the first dynamic password from the server can start the root mode of the system, and the problem that the system security is threatened due to the fact that a common user cuts into the root mode is effectively avoided. And the safety of the root mode switching can be ensured under the condition that the root mode switching principle is disclosed, the attack, tampering and data leakage of the system are effectively prevented, and meanwhile, a manufacturer of the terminal can conveniently cut into the root mode, so that the debugging and maintenance of the terminal are facilitated.
The embodiment of the present invention further provides a root mode switching device, which includes a module for executing each step in the foregoing root mode switching method, and the device can be integrated in the above terminal. Where not described in detail in the apparatus, reference is made to the description of the aforementioned process.
Referring to fig. 3, fig. 3 is a schematic block diagram of a root mode switching device according to an embodiment of the present invention. The root mode switching device 3 of the present embodiment includes: an output unit 31, a matching unit 32 and a switching unit 33.
An output unit 31, configured to execute the user mode switching executable file according to the received user mode switching command, and output a first dynamic password;
the matching unit 32 is configured to receive a second dynamic password generated by the server according to the first dynamic password, and match the second dynamic password with the first dynamic password;
and the switching unit 33 is configured to switch to the root mode if the matching is successful, and refuse to switch to the root mode if the matching is unsuccessful.
Optionally, the switching device further includes:
and the inserting unit is used for inserting the first dynamic password generating function into the user mode switching executable file.
The insertion unit is further specifically configured to insert a random number generation function in the su executable file.
Optionally, the matching unit is further specifically configured to generate a third dynamic password corresponding to the first dynamic password by using a second dynamic password generation function, and match the second dynamic password with the third dynamic password.
Wherein, match second dynamic password and third dynamic password, include: and judging whether the second dynamic password is the same as the third dynamic password, if so, successfully matching the second dynamic password with the third dynamic password, and if not, unsuccessfully matching the second dynamic password with the third dynamic password.
Fig. 4 is a schematic diagram of a terminal according to an embodiment of the present invention. As shown in fig. 4, the terminal 4 of this embodiment includes: a processor 40, a memory 41 and a computer program 42 stored in the memory 41 and executable on the processor 40, for example a program for root mode switching. The processor 40 executes the computer program 42 to implement the steps in the above-mentioned root mode switching method embodiment, such as the steps 101 to 102 shown in fig. 1. Alternatively, the processor 40, when executing the computer program 42, implements the functions of the various modules/units in the various device embodiments described above, such as the functions of the units 31 to 33 shown in fig. 3.
Illustratively, the computer program 42 may be partitioned into one or more modules/units, which are stored in the memory 41 and executed by the processor 40 to implement the present invention. One or more of the modules/units may be a series of computer program instruction segments capable of performing specific functions, which are used to describe the execution of the computer program 42 in the terminal 4. For example, the computer program 42 may be divided into an output unit, a matching unit, and a switching unit (unit in a virtual device), and each module has the following specific functions:
the output unit is used for executing the user mode switching executable file according to the received user mode switching command and outputting a first dynamic password;
the matching unit is used for receiving a second dynamic password generated by the server according to the first dynamic password and matching the second dynamic password with the first dynamic password;
and the switching unit is used for switching to the root mode if the matching is successful, and refusing to switch to the root mode if the matching is unsuccessful.
The terminal 4 may include, but is not limited to, a processor 40, a memory 41. Those skilled in the art will appreciate that fig. 4 is merely an example of a terminal 4 and does not constitute a limitation of terminal 4 and may include more or less components than those shown, or combine certain components, or different components, e.g., the terminal device may also include input output devices, network access devices, buses, etc.
The Processor 40 may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic, discrete hardware components, etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The memory 41 may be an internal storage unit of the terminal 4, such as a hard disk or a memory of the terminal 4. The memory 41 may also be an external storage device of the terminal 4, such as a plug-in hard disk provided on the terminal 4, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like. Further, the memory 41 may also include both an internal storage unit of the terminal 4 and an external storage device. The memory 41 is used for storing computer programs and other programs and data required by the terminal device. The memory 41 may also be used to temporarily store data that has been output or is to be output.
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-mentioned division of the functional units and modules is illustrated, and in practical applications, the above-mentioned function distribution may be performed by different functional units and modules according to needs, that is, the internal structure of the apparatus is divided into different functional units or modules, so as to perform all or part of the functions described above. Each functional unit and module in the embodiments may be integrated in one processing unit, or each unit may exist alone physically, or two or more units are integrated in one unit, and the integrated unit may be implemented in a form of hardware, or in a form of software functional unit. In addition, specific names of the functional units and modules are only for convenience of distinguishing from each other, and are not used for limiting the protection scope of the present application. The specific working processes of the units and modules in the system may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and reference may be made to the related descriptions of other embodiments for parts that are not described or illustrated in a certain embodiment.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
In the embodiments provided in the present invention, it should be understood that the disclosed apparatus/terminal device and method may be implemented in other ways. For example, the above-described embodiments of the apparatus/terminal device are merely illustrative, and for example, a module or a unit may be divided into only one logical function, and may be implemented in other ways, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
Units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated modules/units, if implemented in the form of software functional units and sold or used as separate products, may be stored in a computer readable storage medium. Based on such understanding, all or part of the flow in the method according to the embodiments of the present invention may also be implemented by a computer program to instruct related hardware, where the computer program may be stored in a computer readable storage medium, and when the computer program is executed by a processor, the computer program may implement the steps of the embodiments of the method. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer readable medium may include: any entity or device capable of carrying computer program code, recording medium, U.S. disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-Only Memory (ROM), Random Access Memory (RAM), electrical carrier wave signals, telecommunications signals, software distribution media, and the like. It should be noted that the computer readable medium may contain other components which may be suitably increased or decreased as required by legislation and patent practice in jurisdictions, for example, in some jurisdictions, in accordance with legislation and patent practice, the computer readable medium does not include electrical carrier signals and telecommunications signals.
The above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the spirit and scope of the embodiments of the present invention, and are intended to be included within the scope of the present invention.

Claims (10)

1. A method for switching a root mode, comprising:
executing the user mode switching executable file according to the received user mode switching command, and outputting a first dynamic password;
receiving a second dynamic password generated by the server according to the first dynamic password, and matching the second dynamic password with the first dynamic password;
and if the matching is successful, switching to the root mode, and if the matching is unsuccessful, refusing to switch to the root mode.
2. The handover method according to claim 1, wherein before executing the user mode handover executable file according to the received user mode handover command, comprising:
inserting a first dynamic password generation function in the user mode switch executable file.
3. The method of claim 2, wherein inserting a first dynamic password generation function in the user mode switch executable file comprises:
a random number generation function is inserted in the su executable file.
4. The handover method according to any one of claims 1 to 3, wherein the matching the second dynamic password with the first dynamic password comprises:
and generating a third dynamic password corresponding to the first dynamic password by using a second dynamic password generating function, and matching the second dynamic password with the third dynamic password.
5. The handover method of claim 4, wherein the matching the second dynamic password with the third dynamic password comprises:
and judging whether the second dynamic password is the same as the third dynamic password, if so, successfully matching the second dynamic password with the third dynamic password, and if not, unsuccessfully matching the second dynamic password with the third dynamic password.
6. A root mode switching device, comprising:
the output unit is used for executing the user mode switching executable file according to the received user mode switching command and outputting a first dynamic password;
the matching unit is used for receiving a second dynamic password generated by the server according to the first dynamic password and matching the second dynamic password with the first dynamic password;
and the switching unit is used for switching to the root mode if the matching is successful, and refusing to switch to the root mode if the matching is unsuccessful.
7. The switching device of claim 6, wherein the switching device further comprises:
an inserting unit, configured to insert a first dynamic password generating function in the user mode switching executable file.
8. The switching apparatus as claimed in claim 7, wherein the inserting unit is further specifically configured to insert a random number generation function in the su executable file.
9. A terminal comprising a memory, a processor and a computer program stored in the memory and executable on the processor, characterized in that the processor implements the steps of the method according to any of claims 1 to 5 when executing the computer program.
10. A computer storage medium, in which a computer program is stored which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 5.
CN201811363306.8A 2018-11-15 2018-11-15 root mode switching method and device, terminal and computer storage medium Pending CN111191220A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811363306.8A CN111191220A (en) 2018-11-15 2018-11-15 root mode switching method and device, terminal and computer storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811363306.8A CN111191220A (en) 2018-11-15 2018-11-15 root mode switching method and device, terminal and computer storage medium

Publications (1)

Publication Number Publication Date
CN111191220A true CN111191220A (en) 2020-05-22

Family

ID=70707092

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811363306.8A Pending CN111191220A (en) 2018-11-15 2018-11-15 root mode switching method and device, terminal and computer storage medium

Country Status (1)

Country Link
CN (1) CN111191220A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101651546A (en) * 2009-09-11 2010-02-17 福建天晴在线互动科技有限公司 Method for off-line generation of dynamic password and debarkation authentication and synchronization of server
US20110238982A1 (en) * 2000-05-19 2011-09-29 Intertrust Technologies Corp. Trust-Management Systems and Methods
CN103152366A (en) * 2013-04-10 2013-06-12 珠海市魅族科技有限公司 Method, terminal and server for obtaining terminal authorization
CN103198265A (en) * 2013-03-28 2013-07-10 上海斐讯数据通信技术有限公司 Method for starting root permission of mobile device
CN103324482A (en) * 2013-06-27 2013-09-25 苏州创智宏云信息科技有限公司 Android one-key root permission software
CN103473502A (en) * 2013-09-16 2013-12-25 惠州Tcl移动通信有限公司 Method and system for acquiring Root rights of android-based mobile terminal

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110238982A1 (en) * 2000-05-19 2011-09-29 Intertrust Technologies Corp. Trust-Management Systems and Methods
CN101651546A (en) * 2009-09-11 2010-02-17 福建天晴在线互动科技有限公司 Method for off-line generation of dynamic password and debarkation authentication and synchronization of server
CN103198265A (en) * 2013-03-28 2013-07-10 上海斐讯数据通信技术有限公司 Method for starting root permission of mobile device
CN103152366A (en) * 2013-04-10 2013-06-12 珠海市魅族科技有限公司 Method, terminal and server for obtaining terminal authorization
CN103324482A (en) * 2013-06-27 2013-09-25 苏州创智宏云信息科技有限公司 Android one-key root permission software
CN103473502A (en) * 2013-09-16 2013-12-25 惠州Tcl移动通信有限公司 Method and system for acquiring Root rights of android-based mobile terminal

Similar Documents

Publication Publication Date Title
CN112771826B (en) Application program login method, application program login device and mobile terminal
CN103391374B (en) Dual system terminal supporting seamless switching
US8769305B2 (en) Secure execution of unsecured apps on a device
US10659226B2 (en) Data encryption method, decryption method, apparatus, and system
US9378344B2 (en) Method and apparatus for protecting information based on data card
CN108229144B (en) Verification method of application program, terminal equipment and storage medium
US10713381B2 (en) Method and apparatus for securely calling fingerprint information, and mobile terminal
CN110598384B (en) Information protection method, information protection device and mobile terminal
KR20230064623A (en) Mobile devices with secure personal memory
CN106203141A (en) The data processing method of a kind of application and device
CN111245620B (en) Mobile security application architecture in terminal and construction method thereof
CN108540591B (en) Address book management method, address book management device and electronic equipment
CN109977692B (en) Data processing method and device, storage medium and electronic equipment
CN107368738B (en) Root prevention method and Root prevention device for intelligent equipment
CN107992319B (en) Patch data updating method and device
CN111241556A (en) Data security storage method and device, storage medium and terminal
WO2016026333A1 (en) Data protection method, device and storage medium in connection between terminal and pc
CN115688120A (en) Secure chip firmware importing method, secure chip and computer readable storage medium
CN111191220A (en) root mode switching method and device, terminal and computer storage medium
CN105184173A (en) Method and device for request processing
CN110362983B (en) Method and device for ensuring consistency of dual-domain system and electronic equipment
CN112636914B (en) Identity verification method, identity verification device and smart card
CN103052060A (en) Method for improving information security of mobile terminal and mobile terminal
CN113836529A (en) Process detection method, device, storage medium and computer equipment
CN107480545B (en) Data protection method and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200522

RJ01 Rejection of invention patent application after publication