CN115310111A - Permission white list management method, device, equipment, server and medium - Google Patents

Permission white list management method, device, equipment, server and medium Download PDF

Info

Publication number
CN115310111A
CN115310111A CN202211030213.XA CN202211030213A CN115310111A CN 115310111 A CN115310111 A CN 115310111A CN 202211030213 A CN202211030213 A CN 202211030213A CN 115310111 A CN115310111 A CN 115310111A
Authority
CN
China
Prior art keywords
file
signature
configuration file
result
feedback information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211030213.XA
Other languages
Chinese (zh)
Inventor
唐仕斌
陈淑武
王志强
马志光
杜家鸿
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
XIAMEN FOUR-FAITH COMMUNICATION TECHNOLOGY CO LTD
Original Assignee
XIAMEN FOUR-FAITH COMMUNICATION TECHNOLOGY CO LTD
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by XIAMEN FOUR-FAITH COMMUNICATION TECHNOLOGY CO LTD filed Critical XIAMEN FOUR-FAITH COMMUNICATION TECHNOLOGY CO LTD
Priority to CN202211030213.XA priority Critical patent/CN115310111A/en
Publication of CN115310111A publication Critical patent/CN115310111A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Abstract

The invention provides a method, a device, equipment, a server and a medium for managing an authority white list, wherein the method comprises the following steps: adding the file protection command into a su program, and uploading identification information of equipment to a server when the networking state is detected to be normal; receiving and storing feedback information generated by the server based on the identification information; performing signature verification on the feedback information to generate a verification result, and acquiring the file name of the application program package when the feedback information is judged not to be tampered according to the verification result; calculating the file name and generating a calculation result; and when the operation result is judged to be matched with the feedback information, granting the root authority to the application program package. The method aims to solve the problems that viruses are easy to appear in the root operation of the existing third party, the personal information of a user is stolen, and the safety is poor, so that the safety and the stability of the system are influenced.

Description

Permission white list management method, device, equipment, server and medium
Technical Field
The invention relates to the field of mobile communication equipment, in particular to a method, a device, equipment, a server and a medium for managing an authority white list.
Background
In the industrial application field, the equipment is often used without a person on duty or without a display device for man-machine interaction; the programs that different devices allow root rights are different based on the particular usage scenario or environment, and the network environment of the devices is not necessarily or real-time efficient. Currently, in order to ensure the equipment safety of common users, terminal manufacturers on the market mostly do not open Root rights when equipment leaves a factory, and if a user wants to perform differentiated customization on a system of an intelligent terminal, the Root rights need to be acquired; the Root operation can only be carried out by using a third party Root tool, but once the Root authority of the third party tool is opened, the system has open Root authority to all applications, namely after the Root operation is carried out by the third party Root tool, the equipment has permanent Root, the third party Root operation can relate to a bottom core of an operating system, the system can be unstable and even rushed, the third party Root tool can have viruses, personal information of a user is stolen, and the poor safety condition occurs, so that great safety hidden dangers exist, and after the third party Root tool is used, part of files of the system can be modified or replaced, so that the stability of the system can also be influenced.
In view of this, the present application is presented.
Disclosure of Invention
In view of the above, an object of the present invention is to provide a method, an apparatus, a device, a server and a medium for managing an authority white list, which can effectively solve the problems in the prior art that virus is easily generated in root operation of a third party, personal information of a user is stolen, and security is poor, thereby affecting security and stability of a system.
The invention provides a method for managing a permission white list, which comprises the following steps:
adding a file protection command into a su program, and uploading identification information of equipment to a server when the normal networking state is detected;
receiving and storing feedback information generated by the server based on the identification information;
performing signature verification on the feedback information to generate a verification result, and acquiring the file name of the application program package when the feedback information is judged not to be tampered according to the verification result;
calculating the file name and generating a calculation result;
and when the operation result is judged to be matched with the feedback information, granting root permission to the application program package.
Preferably, the signature verification is performed on the feedback information to generate a verification result, specifically:
analyzing the signature file to generate signature information data, wherein the feedback information comprises a configuration file and a signature file;
verifying the signature information data by using a secret key, and judging whether the signature information data is matched with signature information of an equipment system;
if yes, the feedback information is not tampered;
and if not, the feedback information is tampered.
Preferably, the file name is operated, and an operation result is generated, specifically:
matching the calculation result with the configuration file;
if the configuration file does not exist, or the configuration file exists, and a corresponding program list does not exist in the configuration file, the matching is unsuccessful;
and if the configuration file exists and the corresponding program list exists in the configuration file, the matching is successful.
The invention also provides a method for managing the permission white list, which comprises the following steps:
acquiring identification information reported by the equipment;
comparing and identifying the identification information with a database to generate an identification result, and judging whether the identification result has an authority function;
if so, pushing the configuration file and the signature file corresponding to the identification information to equipment;
if not, pushing the configuration file and the signature file is not carried out.
Preferably, before acquiring the identification information reported by the device, the method further includes:
acquiring identification information reported by the equipment;
generating a configuration file and a signature file, and storing the configuration file by default, wherein the configuration file is in a json format;
and signing the configuration file by using a public key to generate a signature result, and storing the signature result in the signature file.
The invention also provides a root authority white list management device, which comprises the following steps:
the data uploading unit is used for adding the file protection command to the su program and uploading the identification information of the equipment to the server when the normal networking state is detected;
the data receiving unit is used for receiving and storing the feedback information generated by the server based on the identification information;
the data verification unit is used for performing signature verification on the feedback information to generate a verification result, and acquiring the file name of the application program package when the feedback information is judged not to be tampered according to the verification result;
the data operation unit is used for operating the file name and generating an operation result;
and the permission granting unit is used for granting the root permission to the application program package when the operation result is judged to be matched with the feedback information.
The invention also provides a device for managing the authority white list, which comprises the following components:
an information obtaining unit, configured to obtain identification information reported by the device;
the comparison and identification unit is used for comparing and identifying the identification information with a database to generate an identification result and judging whether the identification result has the authority function or not;
the file pushing unit is used for pushing the configuration file and the signature file corresponding to the identification information to equipment;
and the file keeping unit is used for not pushing the configuration file and the signature file.
The invention also provides an authority white list management device, which comprises a processor, a memory and a computer program which is stored in the memory and configured to be executed by the processor, wherein the processor realizes the authority white list management method when executing the computer program.
The present invention also provides a server, including a processor, a memory, and a computer program stored in the memory and configured to be executed by the processor, wherein the processor implements a method for managing a white list of permissions as described in any one of the above when executing the computer program.
The present invention also provides a readable storage medium storing a computer program, which can be executed by a processor of a device on which the storage medium is located, to implement a method for managing a whitelist of permissions as described in any one of the above.
In summary, according to the method, the apparatus, the device, the server and the medium for managing the root permission white list provided in this embodiment, the root permission white list is stored and managed on the server, the white list is bound with the device identification information, and after the device is connected to the network, the non-root white list configuration file is synchronously pushed to the corresponding device; and after the root authority white list management ensures that the root white list configuration file is safe and effective through public key signature verification, offline management and root authority application verification are carried out. The corresponding white list can be flexibly configured according to different application scenes, so that the purposes of no leakage and no tampering are achieved, and the safety of the system can be further ensured. Therefore, the problems that viruses easily appear in the root operation of a third party, the personal information of a user is stolen, the safety is poor, and the safety and the stability of a system are influenced in the prior art are solved.
Drawings
Fig. 1 is a first flowchart of a method for managing a white list of permissions according to an embodiment of the present invention.
Fig. 2 is a second flow chart of the authority white list management method according to the embodiment of the present invention.
Fig. 3 is a schematic diagram of a first module of an authority white list management apparatus according to an embodiment of the present invention.
Fig. 4 is a schematic diagram illustrating a second module of an authority white list management apparatus according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the technical solutions of the embodiments of the present invention will be described clearly and completely with reference to the accompanying drawings of the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all embodiments of the present invention. All other embodiments, which can be obtained by a person skilled in the art without any inventive step based on the embodiments of the present invention, are within the scope of the present invention. Thus, the following detailed description of the embodiments of the present invention, as presented in the figures, is not intended to limit the scope of the invention, as claimed, but is merely representative of selected embodiments of the invention. All other embodiments, which can be obtained by a person skilled in the art without any inventive step based on the embodiments of the present invention, are within the scope of the present invention.
The following detailed description of specific embodiments of the invention refers to the accompanying drawings.
The invention discloses a method, a device, equipment, a server and a medium for managing a permission white list, which at least solve the defects of the prior art to a certain extent.
Referring to fig. 1, a first embodiment of the present invention provides a method for managing a white list of permissions, which can be executed by a white list of permissions management device (hereinafter referred to as a first management device), and in particular, executed by one or more processors in the first management device, so as to implement the following steps:
s101, adding a file protection command into a su program, and uploading identification information of equipment to a server when the networking state is detected to be normal;
in this embodiment, the first management device may be a user terminal device (such as a smart phone, a smart computer, or other smart devices), and the user terminal device may establish a communication connection with a server in the cloud to implement data interaction.
The root operation of a third-party root tool used by a traditional android system on the market has the following two defects: firstly, once the root authority of the third-party tool is opened, the system is open to all applications, so that great potential safety hazards exist, and part of files of the system can be modified or replaced after the third-party tool is used, so that the stability of the system can be influenced; secondly, when a root system and app application program root permission application is executed by a third-party tool, a root request needs to be initiated to a server through real-time networking, and human-computer interaction confirmation is needed, so that the method is not suitable for an unattended use scene. In the industrial application field, equipment usually performs human-computer interaction when unattended or display equipment is not available; the programs that different devices allow root rights are different based on the particular usage scenario or environment, and the network environment of the devices is not necessarily or real-time efficient. And the situation that viruses easily appear in the root operation by a third party, personal information of a user is stolen, and the safety is poor, so that the safety and the stability of the system are influenced.
Specifically, in this embodiment, when the system firmware is packaged, the file protection command chattr + i of the linux file system is added to the pre-manufactured and modified su program, the attribute of the su program is increased, the constraint of the file attribute is used to ensure that the su file cannot be deleted, renamed and linked, and at the same time, the content cannot be written in or added newly, so that a third party program or root tool software is prevented from tampering with the su file preset by the system. The SU program file means that if the application program needs to use the root authority of the system, the root authority can be applied to the system by running the SU program in the system.
In this embodiment, the first management device detects an equipment networking state in real time, and when the first management device connects to a network, automatically reports identification information of the first management device to a server, where the identification information includes an IMEI, an SN, a version, a model, and the like of the equipment.
S102, receiving and storing feedback information generated by the server based on the identification information;
s103, performing signature verification on the feedback information to generate a verification result, and acquiring a file name of the application program package when the feedback information is judged not to be tampered according to the verification result;
specifically, step S103 includes: analyzing the signature file to generate signature information data, wherein the feedback information comprises a configuration file and a signature file;
verifying the signature information data by using a secret key, and judging whether the signature information data is matched with signature information of an equipment system;
if yes, the feedback information is not tampered;
and if not, the feedback information is tampered.
Specifically, in this embodiment, the base64 compressed information in the signature file is analyzed, and the signature information data is generated by restoration; the key is used to verify that the signature information matches the signature information of the device system. The private key stored by the server is matched with the public key preset in the terminal equipment, and the private key and the public key are matched for verification in the verification process; if the signature verification fails, the program of the first management device actively removes the configuration file and the signature file which are pushed and issued by the server to the first management device, so that a third party server or the program is prevented from importing the tampered configuration file into the device for use, and the security and the effectiveness of the configuration file are ensured
In this embodiment, the APP may initiate a root request, run the modified SU program, and the SU program obtains an application package name by reading the current process pid state information in the proc directory, and sends a broadcast to the first management device to request the permission.
S104, calculating the file name and generating a calculation result;
specifically, step S104 includes: matching the calculation result with the configuration file;
if the configuration file does not exist, or the configuration file exists and a corresponding program list does not exist in the configuration file, the matching is unsuccessful;
and if the configuration file exists and the corresponding program list exists in the configuration file, the matching is successful.
And S105, when the operation result is judged to be matched with the feedback information, granting root permission to the application program package.
Specifically, in this embodiment, the first management device performs sha256 calculation on the APP application package name, searches the calculation result in the configuration file, and processes the search result. If the equipment has no configuration file, refusing authorization and prompting that the white list is not configured on the system UI; if the configuration file is pushed and a corresponding program list exists in the configuration file, root authority is granted; and if the configuration file is pushed, but the corresponding program list does not exist in the configuration file, refusing to grant the root authority, and prompting that the application cannot use the root authority in the white list on the system UI. The first management equipment only needs to manage the root authority through the verified configuration file without networking verification, namely the configuration file is locally stored after verification, the root authority application management only needs to be compared with the local configuration file for verification without networking, human-computer interaction confirmation is not needed, timely verification and feedback of the APP application root application are guaranteed, and stability and timeliness of operation of the method are improved.
Referring to fig. 2, a second embodiment of the present invention provides a method for managing a white list of rights, which can be executed by a root rights white list management device (hereinafter referred to as a second management device), and in particular, executed by one or more processors in the second management device, so as to implement the following steps:
s201, acquiring identification information reported by the equipment;
in this embodiment, the second management device may be a server located at a cloud, and the server at the cloud may establish a communication connection with a user terminal device (such as a smart phone, a smart computer, or other intelligent devices) to implement data interaction.
In particular, in this embodiment, data for management may be stored in the server, and the user terminal may acquire corresponding feedback information by sending the identification information to the server to manage the root authority of the system.
S202, comparing and identifying the identification information with a database to generate an identification result, and judging whether the identification result has an authority function;
s203, if yes, pushing the configuration file and the signature file corresponding to the identification information to equipment;
and S204, if not, pushing the configuration file and the signature file is not carried out.
Specifically, in this embodiment, the server compares the reported device identification information with a database on the server to identify whether the current device has a root white list permission function, and if the device has the root white list permission function, the server actively pushes a corresponding root white list configuration file package. If not, the server does not push the configuration file.
In a possible embodiment of the present invention, before acquiring the identification information reported by the device, the method further includes:
acquiring identification information reported by the equipment;
generating a configuration file and a signature file, and storing the configuration file by default, wherein the configuration file is in a json format;
and signing the configuration file by using a public key to generate a signature result, and storing the signature result in the signature file.
Specifically, in this embodiment, the configuration file uses a json format, and each of the files represents a sha256 hash value of an APP application package name that allows root; that is, the configuration file content is stored by using the sha256 hash value of the APP application package name, and represents the application package name allowing root, but does not directly use the APP application package name, so as to reduce direct readability of the configuration file and prevent APP application list leakage. When the white list of the APP is configured, a hash value is directly generated by using a sha256 hash algorithm for comparison, and the efficiency of searching and matching the configuration file is improved to a certain extent.
In this embodiment, the configuration file is stored in the server by default, the server uses the public key to perform RSA-SHA256 signature on the configuration file, signature verification is required, it is ensured that the package. Conf cannot be tampered, leakage and tampering are avoided, and the security of the system can be further ensured; and storing the signature result in the signature file in a base64 format, configuring and binding identification information of corresponding equipment on the server by the uploaded configuration file, and managing root authority of the offline equipment by the server by maintaining the configuration file and the identification information of the equipment.
In summary, after the first management device connects to the network, the identification information of the device is sent to the server, and according to the obtained identification information, the server actively pushes the corresponding configuration file and signature file to the device and stores the configuration file and signature file. And the configuration file is ensured not to be tampered by carrying out signature verification on the signature file. And performing sha256 calculation on the application package name, searching a calculation result in a configuration file, judging whether a hash value exists, and if so, granting root authority. If not, refusing to grant root authority; the method has the advantages that a stable and safe root function is realized, effective operation can be guaranteed under the unattended and equipment offline states, meanwhile, the improved SU can reject damage of a third-party root tool to a system, a corresponding white list can be flexibly configured according to different application scenes, leakage and tampering are avoided, and the safety of messages can be guaranteed. The terminal equipment uploads identification information to the server, and the server sends a corresponding configuration file, so that the flexibility and operability of the server are improved; the application program matched with the white list can acquire root authority, and other application programs only do system UI (user interface) prompting without influence, so that the system safety is improved.
Referring to fig. 3, a third embodiment of the present invention provides an authority white list management apparatus, including:
a data uploading unit 101, configured to add a file protection command to a su program, and when detecting that a networking state is normal, upload identification information of a device to a server;
a data receiving unit 102, configured to receive and store feedback information generated by the server based on the identification information;
the data verification unit 103 is configured to perform signature verification on the feedback information, generate a verification result, and obtain a file name of the application package when it is determined that the feedback information is not tampered according to the verification result;
a data operation unit 104, configured to perform an operation on the file name and generate an operation result;
and the permission granting unit 105 is configured to grant a root permission to the application package when it is determined that the operation result matches the feedback information.
Referring to fig. 4, a fourth embodiment of the present invention provides an authority white list management apparatus, including:
an information obtaining unit 201, configured to obtain identifier information reported by the device;
a comparison and identification unit 202, configured to compare and identify the identifier information with a database, generate an identification result, and determine whether the identification result has an authority function;
a file pushing unit 203, configured to push the configuration file and the signature file corresponding to the identification information to a device;
a file keeping unit 204, configured to not push the configuration file and the signature file.
A fifth embodiment of the present invention provides an authority white list management device, including a processor, a memory, and a computer program stored in the memory and configured to be executed by the processor, where the processor implements an authority white list management method as described in any one of the above items when executing the computer program.
A sixth embodiment of the present invention provides a server, which includes a processor, a memory, and a computer program stored in the memory and configured to be executed by the processor, and the processor implements a method for managing an authority white list as described in any one of the above items when executing the computer program.
A seventh embodiment of the present invention provides a readable storage medium storing a computer program, which is executable by a processor of a device on which the storage medium is located, to implement a method for managing an authority white list as described in any one of the above.
Illustratively, the computer programs described in the fifth, sixth and seventh embodiments of the present invention may be divided into one or more modules, which are stored in the memory and executed by the processor to complete the present invention. The one or more modules may be a series of computer program instruction segments capable of performing certain functions, which are used for describing the execution process of the computer program in the device for implementing a permission white list management. For example, the apparatus described in the third and fourth embodiments of the present invention.
The Processor may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic, discrete hardware components, etc. The general processor may be a microprocessor or the processor may be any conventional processor, etc., and the processor is a control center of the authority white list management method, and various interfaces and lines are used to connect the whole implementation to various parts of the authority white list management method.
The memory may be used to store the computer programs and/or modules, and the processor may implement the various functions of an authority white list management method by running or executing the computer programs and/or modules stored in the memory and calling data stored in the memory. The memory may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required by at least one function (such as a sound playing function, a text conversion function, etc.), and the like; the storage data area may store data (such as audio data, text message data, etc.) created according to the use of the cellular phone, etc. In addition, the memory may include high speed random access memory, and may also include non-volatile memory, such as a hard disk, a memory, a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), at least one magnetic disk storage device, a Flash memory device, or other volatile solid state storage device.
Wherein the implemented module, if implemented in the form of a software functional unit and sold or used as a stand-alone product, can be stored in a computer readable storage medium. Based on such understanding, all or part of the flow of the method according to the embodiments of the present invention may also be implemented by a computer program, which may be stored in a computer-readable storage medium, and when the computer program is executed by a processor, the steps of the method embodiments may be implemented. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer-readable medium may include: any entity or device capable of carrying the computer program code, recording medium, usb disk, removable hard disk, magnetic disk, optical disk, computer Memory, read-Only Memory (ROM), random Access Memory (RAM), electrical carrier wave signals, telecommunications signals, software distribution medium, and the like. It should be noted that the computer readable medium may contain content that is subject to appropriate increase or decrease as required by legislation and patent practice in jurisdictions, for example, in some jurisdictions, computer readable media does not include electrical carrier signals and telecommunications signals as is required by legislation and patent practice.
It should be noted that the above-described device embodiments are merely illustrative, where the units described as separate parts may or may not be physically separate, and the parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on multiple network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment. In addition, in the drawings of the embodiment of the apparatus provided by the present invention, the connection relationship between the modules indicates that there is a communication connection therebetween, and may be specifically implemented as one or more communication buses or signal lines. One of ordinary skill in the art can understand and implement it without inventive effort.
The above is only a preferred embodiment of the present invention, and the protection scope of the present invention is not limited to the above-mentioned embodiments, and all technical solutions belonging to the idea of the present invention belong to the protection scope of the present invention.

Claims (10)

1. A method for managing a whitelist of permissions, comprising:
adding a file protection command into a su program, and uploading identification information of equipment to a server when the normal networking state is detected;
receiving and storing feedback information generated by the server based on the identification information;
performing signature verification on the feedback information to generate a verification result, and acquiring the file name of the application program package when the feedback information is judged not to be tampered according to the verification result;
calculating the file name and generating a calculation result;
and when the operation result is judged to be matched with the feedback information, granting the root authority to the application program package.
2. The authority white list management method according to claim 1, wherein signature verification is performed on the feedback information to generate a verification result, and specifically:
analyzing the signature file to generate signature information data, wherein the feedback information comprises a configuration file and a signature file;
verifying the signature information data by using a secret key, and judging whether the signature information data is matched with signature information of an equipment system;
if yes, the feedback information is not tampered;
and if not, the feedback information is tampered.
3. The authority white list management method according to claim 2, wherein the file name is operated, and an operation result is generated, specifically:
matching the calculation result with the configuration file;
if the configuration file does not exist, or the configuration file exists, and a corresponding program list does not exist in the configuration file, the matching is unsuccessful;
and if the configuration file exists and the corresponding program list exists in the configuration file, the matching is successful.
4. A method for managing a whitelist of permissions, comprising:
acquiring identification information reported by the equipment;
comparing and identifying the identification information with a database to generate an identification result, and judging whether the identification result has the authority function;
if so, pushing the configuration file and the signature file corresponding to the identification information to equipment;
if not, pushing the configuration file and the signature file is not carried out.
5. The method of claim 4, wherein before obtaining the identification information reported by the device, the method further comprises:
generating a configuration file and a signature file, and storing the configuration file by default, wherein the configuration file is in a json format;
and signing the configuration file by using a public key to generate a signature result, and storing the signature result in the signature file.
6. An authority white list management apparatus, comprising:
the data uploading unit is used for adding the file protection command to the su program and uploading the identification information of the equipment to the server when the normal networking state is detected;
the data receiving unit is used for receiving and storing the feedback information generated by the server based on the identification information;
the data verification unit is used for performing signature verification on the feedback information to generate a verification result, and acquiring the file name of the application program package when the feedback information is judged not to be tampered according to the verification result;
the data operation unit is used for operating the file name and generating an operation result;
and the permission granting unit is used for granting the root permission to the application program package when the operation result is judged to be matched with the feedback information.
7. An authority white list management apparatus, comprising:
an information obtaining unit, configured to obtain the identifier information reported by the device;
the comparison and identification unit is used for comparing and identifying the identification information with a database to generate an identification result and judging whether the identification result has the authority function or not;
the file pushing unit is used for pushing the configuration file and the signature file corresponding to the identification information to equipment;
and the file keeping unit is used for not pushing the configuration file and the signature file.
8. An authority white list management device, comprising a processor, a memory, and a computer program stored in the memory and configured to be executed by the processor, wherein the processor, when executing the computer program, implements an authority white list management method according to any one of claims 1 to 3.
9. A server comprising a processor, a memory, and a computer program stored in the memory and configured to be executed by the processor, the processor implementing a method of rights white list management as claimed in any of claims 4 to 5 when executing the computer program.
10. A readable storage medium, in which a computer program is stored, the computer program being executable by a processor of a device in which the storage medium is located, for implementing a method for rights white list management as claimed in any one of claims 1 to 5.
CN202211030213.XA 2022-08-26 2022-08-26 Permission white list management method, device, equipment, server and medium Pending CN115310111A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211030213.XA CN115310111A (en) 2022-08-26 2022-08-26 Permission white list management method, device, equipment, server and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211030213.XA CN115310111A (en) 2022-08-26 2022-08-26 Permission white list management method, device, equipment, server and medium

Publications (1)

Publication Number Publication Date
CN115310111A true CN115310111A (en) 2022-11-08

Family

ID=83864296

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211030213.XA Pending CN115310111A (en) 2022-08-26 2022-08-26 Permission white list management method, device, equipment, server and medium

Country Status (1)

Country Link
CN (1) CN115310111A (en)

Similar Documents

Publication Publication Date Title
US11323260B2 (en) Method and device for identity verification
US9870463B2 (en) Permission management method, apparatus, and terminal
CN111181975B (en) Account management method, device, equipment and storage medium
CN108377272B (en) Method and system for managing terminal of Internet of things
CN103747433B (en) Method for realizing root request management through manufacturer server and mobile terminal
JP2012084159A (en) Apparatus and methods for managing firmware verification on wireless device
CN108875373B (en) Mobile storage medium file control method, device and system and electronic equipment
CN104506487B (en) The credible execution method of privacy policy under cloud environment
WO2013075419A1 (en) Method for managing right to use of function, and mobile terminal
US20140258128A1 (en) Method for managing fund security and mobile terminal
CN105024986A (en) Account login method, device and system
US10176317B2 (en) Method and apparatus for managing super user password on smart mobile terminal
CN111241559A (en) Training model protection method, device, system, equipment and computer storage medium
US20140317704A1 (en) Method and system for enabling the federation of unrelated applications
CN111159595A (en) Page loading method, system, computer equipment and computer readable storage medium
CN106209569B (en) Authentication method and device for enterprise instant messaging
CN106941504B (en) Cloud management authority control method and system
CN106022110B (en) The method and device of identification push platform application
CN111090616B (en) File management method, corresponding device, equipment and storage medium
CN111046436A (en) System level package management-based signature authentication method and server
CN113312669B (en) Password synchronization method, device and storage medium
US20230205849A1 (en) Digital and physical asset tracking and authentication via non-fungible tokens on a distributed ledger
CN115310111A (en) Permission white list management method, device, equipment, server and medium
CN116244764A (en) Method and system for generating device unique ID of Android device
CN106485104B (en) Automatic restoration method, device and system for terminal security policy

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination