CN111796909B - Lightweight mobile application virtualization system - Google Patents

Lightweight mobile application virtualization system Download PDF

Info

Publication number
CN111796909B
CN111796909B CN202010588083.6A CN202010588083A CN111796909B CN 111796909 B CN111796909 B CN 111796909B CN 202010588083 A CN202010588083 A CN 202010588083A CN 111796909 B CN111796909 B CN 111796909B
Authority
CN
China
Prior art keywords
container
application
request
creating
service
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010588083.6A
Other languages
Chinese (zh)
Other versions
CN111796909A (en
Inventor
王总辉
章新豪
刘沛宇
陈文智
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang University ZJU
Original Assignee
Zhejiang University ZJU
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang University ZJU filed Critical Zhejiang University ZJU
Priority to CN202010588083.6A priority Critical patent/CN111796909B/en
Publication of CN111796909A publication Critical patent/CN111796909A/en
Application granted granted Critical
Publication of CN111796909B publication Critical patent/CN111796909B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45504Abstract machines for programme code execution, e.g. Java virtual machine [JVM], interpreters, emulators
    • G06F9/45516Runtime code conversion or optimisation
    • G06F9/45525Optimisation or modification within the same instruction set architecture, e.g. HP Dynamo
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Stored Programmes (AREA)

Abstract

The invention discloses a lightweight mobile application virtualization system, which comprises a container starting auxiliary process and an AMS process which are arranged in an Android system, and a container root process for managing containers; the container starts an auxiliary process to construct an Intent data packet, creates and sends a request for creating a virtualized application to the AMS process according to the Intent data packet; the AMS process receives a request for creating a virtualized application, analyzes the received Intent data packet, and sends a request for creating a container process to the container root process according to the Intent data packet; the container root process creates and initializes an application running environment, creates a container process after receiving a request for creating the container process, obtains package information of the container application from the AMS process according to the sent request for loading the container application, and starts the container application. To reduce the system resources that need to be occupied by application virtualization.

Description

Lightweight mobile application virtualization system
Technical Field
The invention belongs to the technical field of virtualization, and particularly relates to a lightweight mobile application virtualization system.
Background
The advent and popularity of mobile smart devices has created a number of problems and challenges. The huge demand of the mobile application market guides the mobile application development threshold to be reduced, and in addition, an imperfect authority mechanism and security model of an intelligent device operating system are adopted, so that the mobile operating system becomes the most attractive target of the current virus software. Meanwhile, the dependence of users on mobile applications is increased, and a plurality of terminal devices are required to play different roles of the users to meet different application scene requirements so as to protect personal privacy and data security of the users.
The virtualization technology has the characteristics of improving the safety of applications and meeting the requirements of solving multiple scene roles, and the combination of the virtualization technology and a mobile operating system is an important direction of the current solution. Unlike traditional operating system application virtualization, an android operating system can be operated after the kernel initialization of the android device is completed, and a large number of system services are operated in the android system to allow user-state processes to access system resources. The apps in the application market need to be installed, loaded and run in the android system framework, and are controlled and managed by the android system. The existing solutions are that a complete android operating system is operated in a virtual machine or a container through system-level virtualization, such as Cells, condroid, nezha and Gemini, resource access service is provided for user applications, and then target applications are operated in virtualized operating system environments, so that response time and resource consumption of application virtualization are greatly increased, and the method is not applicable to intelligent equipment terminals with limited resources.
Application publication number CN106572014a discloses a virtualized network system, application publication number CN103207762a discloses a storage virtualized system, and both virtualized systems are not suitable for an Android system.
Disclosure of Invention
The invention aims to provide a lightweight mobile application virtualization system so as to reduce system resources required to be occupied by application virtualization and improve the availability of the application virtualization on intelligent mobile equipment.
In order to achieve the above object, the present invention provides the following technical solutions:
a lightweight mobile application virtualization system comprises a container starting auxiliary process and a Activity Manager Service (AMS) process which are arranged in an Android system, and a container root process for managing containers;
the container starts an auxiliary process to construct an Intent data packet, and creates and sends a request for creating a virtualized application to the Activity Manager Service process according to the Intent data packet;
the Activity Manager Service process receives a request for creating a virtualized application, analyzes the received Intent data packet, and sends a request for creating a container process to a container root process according to the Intent data packet; sending package information of the container application to the container root process according to the received loading container application request;
the container root process creates and initializes an application running environment, creates a container process after receiving a request for creating the container process, obtains package information of the container application from the Activity Manager Service process according to the sent request for loading the container application, and starts the container application.
When an Intnt data packet is constructed, a FLAG_ACTIVITY_CONTAINER identifier for identifying that the virtualized application is requested to be started is added to the Intnt data packet.
Preferably, before sending the request for creating the container application, the container starting auxiliary process further performs application checking, initiates a target component query request to the Package Manager Service, checks whether the target component to be started is installed, if the target component is not installed, initiates a target component installation request to the Package Manager Service, and installs the target application according to the installation package address of the target application transmitted by the target component installation request.
Preferably, after analyzing the Intint data packet, the Activity Manager Service checks whether the target application program is installed in the current Android system according to the packet name and UID of the target application program recorded in the Intint data, if the installation record exists, it looks up and judges whether the application process of the target application program exists, if the application process does not exist, it creates a new record according to the packet name and UID of the target application program, so as to store the information of the application program;
checking whether the Intnt data contains a FLAG_ACTIVITY_CONTAINER FLAG, and if so, sending a CONTAINER process creation request to the CONTAINER root process through a CONTAINER socket.
Preferably, the creating and initializing the application running environment by the container root process includes:
creating a Java virtual machine, registering a jni function, loading a zygoteInit class in the jni function, and preloading Java class and Android resources.
Preferably, the creating a container process includes:
checking abi of uid, gid, gids, capabilities security authority and application program in the request of creating the container process, and checking to create a corresponding sub-process by calling a fork system call and loading an ActivityThread for initializing the container application;
during initialization, the ActivityThread can set a system path to be used in the application, set the position where the certificate of the current application is stored, set the name of a process and create a Binder thread pool for processing Binder communication of Android system services.
Preferably, after receiving the request for loading the container application, the activityManagerservice searches package information of the container application according to the uid of the sender of the Binder request, and transmits the package information to the container process;
and the container process loads and starts the target container application after receiving the packet information of the target container application.
In order to realize the application virtualization instance, the container root process sets a container identifier for each container as a container application instance ID, wherein the container identifier maps the matching relationship between the container application instance and the corresponding application process record;
through the container identifier and the application program ID, when the container identifier and the application program ID cannot be matched with the existing container identifier and the existing application program ID, a new container process and a new Activity Stack are created for the container application, and the same-application multi-virtualization instance is realized.
Preferably, the container root process also creates a list of allowed access rights for each container, and sets a name Namespace ID for each list of allowed access rights;
when the container application is to access the system service of the Android system through the service manager service of the Android system, the service manager service opens the corresponding system service to the container application according to the access service contained in the permission access authority list corresponding to the Namespace ID.
Compared with the prior art, the invention has the following beneficial effects:
the lightweight mobile application virtualization system provided by the invention realizes application level virtualization by utilizing a container technology under the android operating system environment, and the same application can be provided with a plurality of virtualization instances, and meanwhile, the access limit of the virtualization application to system services is controlled. The system resource occupied by application virtualization is reduced, the availability of the application virtualization on the intelligent mobile device is improved, and huge support is provided for improving the safety of the application and solving the requirements of multiple scene roles.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a block diagram of a lightweight mobile application virtualization system provided by an embodiment;
FIG. 2 is an exemplary diagram of an application virtualization multi-instance provided by an embodiment;
fig. 3 is a flow chart of system service access control provided by an embodiment.
Detailed Description
The present invention will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present invention more apparent. It should be understood that the detailed description is presented by way of example only and is not intended to limit the scope of the invention.
In order to realize application level virtualization in an android operating system environment, the same application can be provided with a plurality of virtualization instances, and access limitation of the virtualization application to system services is controlled. A lightweight mobile application virtualization system is provided, as shown in fig. 1, and comprises container start auxiliary processes, namely a container start auxiliary tool process and a Activity Manager Service process, arranged in an Android system, and a container root process, namely a container-init process, used for managing containers. The container tool sends a request for creating a virtualized application to an android system service ActivityManagerservice process, and after the container-init process initializes an application running environment and receives an ActivityManagerservice starting application request, the process is created and a target application is loaded. The operation flow of the whole system is shown in figure 1.
The container starting auxiliary process, the container tool, is arranged in the Android system host, and mainly achieves the functions of constructing the Intnt, checking the application and sending a request for creating the virtualized application to the ActivityManagerservice.
For constructing an Intnt flow, a CONTAINER tool constructs an Intnt data packet according to a user identifier of a starter and a target application component name, wherein the Intnt data packet is a data packet used for data transmission by an android system, a FLAG_ACTIVITY_CONTAINER identifier is added to the Intnt data packet, and the FLAG_ACTIVITY_CONTAINER identifier is used for identifying whether a normal application or a virtualized application is requested to be started.
Before sending the request for starting and creating the container application, the container starting auxiliary process also performs application checking, initiates a target component query request to the Package Manager Service to check whether the target component to be started is installed, initiates a target component installation request to the Package Manager Service if the target component is not installed, and installs the target application according to the installation package address of the target application transmitted by the target component installation request.
After the application checking is finished, the container starts a request for creating the virtualized application, which is initiated by the auxiliary process to the ActivityManagerService, and the request for creating the virtualized application is sent to an android system on the host machine by the aid of an Intent data packet created before.
The ActivityManagerService process is a service process of the android system, and is subjected to functional modification, and the ActivityManagerService is mainly used for processing and creating a virtualized application request.
After receiving a virtualized application creating request, an ActivityManagerService process analyzes an Intent data packet contained in the virtualized application creating request, checks whether a target application is installed in a current Android system according to a packet name and a UID of the target application recorded in the Intent data, searches and judges whether an application process of the target application exists if an installation record exists, and creates a new record according to the packet name and the UID of the target application if the application process does not exist, so as to store information of the application;
checking whether the Intnt data contains a FLAG_ACTIVITY_CONTAINER FLAG, and if so, sending a CONTAINER process creation request to the CONTAINER root process through a CONTAINER socket.
The container root process container-init is a core for realizing the virtualized application, and is mainly used for creating and initializing an application running environment, creating a container process and starting the container application, and each part is described in detail below.
In the process of creating and initializing an application running environment, a container root process, namely a container-init, mainly creates a Java virtual machine, registers a jni function, loads a zygoteInit class in the jni function, and preloads Java class and Android resources.
The method comprises the steps that a container root process creates a container process after receiving a container process creation request, specifically checks abi of uid, gid, gids, capabilities security authority and application program in the container process creation request, and then calls a fork system to call and create a corresponding sub-process and loads an ActivityThread to initialize container application;
during initialization, the ActivityThread can set a system path to be used in the application, set the position where the certificate of the current application is stored, set the name of a process and create a Binder thread pool for processing Binder communication of Android system services.
After receiving a request for loading the container application, activityManagerService searches package information of the container application according to the uid of a sender of the Binder request and transmits the package information to the container process; the container process loads and starts the target container application after receiving the packet information of the target container application.
When the target application started by the container is not started in the host or other containers, the Activity ManagerService creates a new container process and an Activity Stack for the target application to start and store the Activity of the target application because the application process record matched with the target application process record and the Activity Stack cannot be found. When the host or other container starts the target application with the same name, the activityManagerservice will not create the corresponding container process and the Activity Stack due to the existence of the record ID, resulting in failure of starting the container process.
When the target application started by the container is not started in the host or other containers, as the application process Record matched with the target application cannot be found in the Activity Record and the Activity Stack, the Activity ManagerService can create a new container process and an Activity Stack for the target application so as to start and store the activities of the target application. When a host or other container starts up multiple virtualized instances of an existing application, the activitymanageservicedoes not create a corresponding container process and Activity Stack due to the existence of the record ID, resulting in a failed start-up of the application virtualization.
FIG. 2 depicts an application virtualization multi-instance solution, where the container root process sets a container identifier for each container as a container application instance ID, the container identifier mapping the matching relationship of the container application instance to the corresponding application process record;
in the embodiment, the IPC Namespace ID of the container is used as the identifier of the user ID, different containers have different IPC Namespace IDs, and the application records of different containers are isolated from each other due to the different identifiers of the user IDs. When the ActivityManagerService searches the record according to the UID+APPId as an index, only an application record list corresponding to the current container is searched, and when similar applications are started, a new container process and a new Activity Stack are created for the application container because the UID+APPId cannot be matched, so that the same-application multi-virtualization instance is realized.
The android application virtualized instance and the user on the host share the android system service on the host, and the application instance obtains the address of the corresponding service through the service manager service and can obtain the corresponding system resource through the system service, so that the risk of data leakage on the host, such as sensor data of equipment, network information and the like, is increased.
As shown in fig. 3, the lightweight mobile application virtualization system performs access rights control on the access rights of the system service on the android application virtualization instance. Specifically, the container root process also creates a permission access list for each container, and sets a name Namespace ID for each permission access list; when the container application is to access the system service of the Android system through the service manager service of the Android system, the service manager service opens the corresponding system service to the container application according to the access service contained in the permission access authority list corresponding to the Namespace ID.
When the user application wants to acquire the service, the service inquiry request is required to be sent to the service manager, the service manager service calls the do_find_service method after receiving the request, and the service address is inquired according to the service name sent by the requester. If the corresponding service address exists, checking whether the service requester meets the SELinux service access authority, and if so, returning the service address to the Binderclient. When creating an application container, we write the system service name that the container is allowed to access into the configuration file. When the container runs, the name of the container, the IPC Namespace ID of the container and the system services that the container is allowed to access are mapped by parsing the application container. When the virtualized application instance wants to acquire a service, the IPC Namespace of the current process is sent to the servicemanager through current- > nsproxy- > ipc_ns. After the servicemanager receives the service inquiry request and checks that the SELinux service access authority of the request sender is satisfied, whether the current request caller can acquire the requested service name is checked through the mapping from the Namespace ID to the system service, and if the check is not passed, the acquisition of the system resource is refused.
The lightweight mobile application virtualization system provided by the embodiment is designed on the android operating system and realizes lightweight application level virtualization, and compared with the existing system level virtualization, the lightweight mobile application virtualization system reduces consumption of system resources such as response time, memory occupation, disk occupation and the like of application virtualization in a mode of sharing android system services by a plurality of application instances. Meanwhile, the technical implementation of the lightweight mobile application virtualization system modifies the source code of the android system, enhances the portability of the scheme, and can be adapted to the android systems customized by different versions and different manufacturers.
The foregoing detailed description of the preferred embodiments and advantages of the invention will be appreciated that the foregoing description is merely illustrative of the presently preferred embodiments of the invention, and that no changes, additions, substitutions and equivalents of those embodiments are intended to be included within the scope of the invention.

Claims (9)

1. The lightweight mobile application virtualization system is characterized by comprising a container starting auxiliary process and a Activity Manager Service process which are arranged in an Android system, and a container root process for managing containers;
the container starts an auxiliary process to construct an Intent data packet, and creates and sends a virtualized application creating request to the Activity Manager Service process according to the Intent data packet;
the Activity Manager Service process receives a request for creating a virtualized application, analyzes the received Intent data packet, and sends a request for creating a container process to the container root process according to the Intent data packet; sending package information of the container application to the container root process according to the received loading container application request;
the container root process creates and initializes an application running environment, creates a container process after receiving a request for creating the container process, obtains package information of the container application from the Activity Manager Service process according to the sent request for loading the container application, and starts the container application.
2. The lightweight mobile application virtualization system of claim 1, wherein upon construction of an Intent packet, a FLAG_ACTIVITY_CONTAINER identification is added to the Intent packet to identify that the virtualized application is requested to be launched.
3. The lightweight mobile application virtualization system of claim 1 wherein the container launch assist process further performs an application check before sending a request to launch the creation container application, initiates a target component query request to Package Manager Service to see if the target component to be launched is installed, initiates a target component install request to Package Manager Service if the target component is not installed, and installs the target application based on the installation package address of the target application entered by the target component install request.
4. The lightweight mobile application virtualization system according to claim 1, wherein after the Activity Manager Service parses the Intent data packet, it checks whether the target application is installed in the current Android system according to the packet name and UID of the target application recorded in the Intent data, if the installation record exists, it searches and judges whether the application process of the target application exists, if the application process does not exist, it creates a new record according to the packet name and UID of the target application, so as to store the information of the application;
checking whether the Intnt data contains a FLAG_ACTIVITY_CONTAINER FLAG, and if so, sending a CONTAINER process creation request to the CONTAINER root process through a CONTAINER socket.
5. The lightweight mobile application virtualization system of claim 1 wherein the container root process creating and initializing an application runtime environment comprises:
creating a Java virtual machine, registering a jni function, loading a zygoteInit class in the jni function, and preloading Java class and Android resources.
6. The lightweight mobile application virtualization system of claim 1, wherein said creating a container process comprises:
checking abi of uid, gid, gids, capabilities security authority and application program in the request of creating the container process, and checking to create a corresponding sub-process by calling a fork system call and loading an ActivityThread for initializing the container application;
during initialization, the ActivityThread can set a system path to be used in the application, set the position where the certificate of the current application is stored, set the name of a process and create a Binder thread pool for processing Binder communication of Android system services.
7. The lightweight mobile application virtualization system of claim 1, wherein the activitymanageservice, upon receiving a container application loading request, searches for package information of a container application according to a uid of a sender of a Binder request and transmits the package information to the container process;
and the container process loads and starts the target container application after receiving the packet information of the target container application.
8. The lightweight mobile application virtualization system of any one of claims 1-7 wherein the container root process sets a container identifier for each container as a container application instance ID, the container identifier mapping a matching relationship of the container application instance to a corresponding application process record;
through the container identifier and the application program ID, when the container identifier and the application program ID cannot be matched with the existing container identifier and the existing application program ID, a new container process and a new Activity Stack are created for the container application, and the same-application multi-virtualization instance is realized.
9. The lightweight mobile application virtualization system of any one of claims 1-7 wherein the container root process further creates a list of allowed access rights for each container, setting a name Namespace ID for each allowed access rights list;
when the container application is to access the system service of the Android system through the service manager service of the Android system, the service manager service opens the corresponding system service to the container application according to the access service contained in the permission access authority list corresponding to the Namespace ID.
CN202010588083.6A 2020-06-24 2020-06-24 Lightweight mobile application virtualization system Active CN111796909B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010588083.6A CN111796909B (en) 2020-06-24 2020-06-24 Lightweight mobile application virtualization system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010588083.6A CN111796909B (en) 2020-06-24 2020-06-24 Lightweight mobile application virtualization system

Publications (2)

Publication Number Publication Date
CN111796909A CN111796909A (en) 2020-10-20
CN111796909B true CN111796909B (en) 2024-04-02

Family

ID=72803178

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010588083.6A Active CN111796909B (en) 2020-06-24 2020-06-24 Lightweight mobile application virtualization system

Country Status (1)

Country Link
CN (1) CN111796909B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110769320B (en) * 2019-11-19 2021-10-15 三星电子(中国)研发中心 Method, system and device for sharing content by intelligent equipment

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20130093804A (en) * 2012-01-06 2013-08-23 한국전자통신연구원 Apparatus and method for secure and consistent runtime based confidential execution of application services
CN103593225A (en) * 2013-10-30 2014-02-19 浙江大学 Method for multiplexing Binder IPC mechanism by multiple Android systems in mobile virtualization scene
CN106095530A (en) * 2016-06-08 2016-11-09 电子科技大学 The container of a kind of many android system automatically creates and startup method
GB201700073D0 (en) * 2017-01-04 2017-02-15 Cisco Tech Inc Method and apparatus for container-based virtualisation
CN106471791A (en) * 2015-04-07 2017-03-01 华为技术有限公司 Method and apparatus for the PC cluster framework based on mobile device
CN106897611A (en) * 2017-03-03 2017-06-27 金光 Secure virtual mobile applications running environment system and method and application without root authority

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20130093804A (en) * 2012-01-06 2013-08-23 한국전자통신연구원 Apparatus and method for secure and consistent runtime based confidential execution of application services
CN103593225A (en) * 2013-10-30 2014-02-19 浙江大学 Method for multiplexing Binder IPC mechanism by multiple Android systems in mobile virtualization scene
CN106471791A (en) * 2015-04-07 2017-03-01 华为技术有限公司 Method and apparatus for the PC cluster framework based on mobile device
CN106095530A (en) * 2016-06-08 2016-11-09 电子科技大学 The container of a kind of many android system automatically creates and startup method
GB201700073D0 (en) * 2017-01-04 2017-02-15 Cisco Tech Inc Method and apparatus for container-based virtualisation
CN106897611A (en) * 2017-03-03 2017-06-27 金光 Secure virtual mobile applications running environment system and method and application without root authority

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
一种基于组件的应用虚拟化方法;王千;张激;高元钧;计算机工程;第39卷(第11期);全文 *

Also Published As

Publication number Publication date
CN111796909A (en) 2020-10-20

Similar Documents

Publication Publication Date Title
CN108170503B (en) Method, terminal and storage medium for cross-system android application running
CN101755271B (en) Method and apparatus for managing access privilege in CLDC OSGI environment
CN110011823B (en) Remote management implementation method and device for Internet of things equipment
US5566326A (en) Copy file mechanism for transferring files between a host system and an emulated file system
US8621081B2 (en) Hypervisor controlled user device that enables available user device resources to be used for cloud computing
US20140033208A1 (en) Method and device for loading application program
CN105550595A (en) Private data access method and system for intelligent communication equipment
US7770202B2 (en) Cross assembly call interception
US10411957B2 (en) Method and device for integrating multiple virtual desktop architectures
CN115378735B (en) Data processing method and device, storage medium and electronic equipment
US7444624B2 (en) Method for the secure interpretation of programs in electronic devices
CN115374481B (en) Data desensitization processing method and device, storage medium and electronic equipment
WO2022170946A1 (en) Access control method and related apparatus
CN111796909B (en) Lightweight mobile application virtualization system
CN115048642B (en) Communication method between trusted applications in multi-trusted execution environment and electronic equipment
CN111339173A (en) Data sharing method, server and readable storage medium
CN116467704A (en) Resource calling method and device
CN111666579B (en) Computer device, access control method thereof and computer readable medium
US20180210770A1 (en) Enabling wpd devices to be managed at the capability level
CN110502354B (en) Java intelligent card and calling method of application program interface thereof
US10862757B2 (en) Isolating a redirected biometric device to a remote session
CN108804236B (en) AIDL file sharing method and system
CN117235771B (en) Permission management and control method of application program and electronic equipment
CN111984343B (en) Plug-in resource searching method, device, equipment and readable storage medium
CN115981576B (en) Method for sharing data, electronic device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB03 Change of inventor or designer information
CB03 Change of inventor or designer information

Inventor after: Wang Zonghui

Inventor after: Zhang Xinhao

Inventor after: Liu Peiyu

Inventor after: Chen Wenzhi

Inventor before: Wang Zonghui

Inventor before: Zhang Xinhao

Inventor before: Liu Peiyu

Inventor before: Chen Wenzhi

GR01 Patent grant
GR01 Patent grant