Sub-zone protecting method and device of Android system

A technology for Android systems and protection devices, applied in computer security devices, platform integrity maintenance, instruments, etc.

Active Publication Date: 2015-01-07
银捷尼科(福建)科技有限公司
View PDF5 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There are flaws in this security mechanism: there is a super user in Linux, and the user has complete system access control authority. Malware can gain super user authority through the loopholes in the application software in the system, and then control the entire system.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Sub-zone protecting method and device of Android system
  • Sub-zone protecting method and device of Android system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] In order to explain in detail the technical content, structural features, achieved goals and effects of the technical solution, the following will be described in detail in conjunction with specific embodiments and accompanying drawings.

[0039] see figure 1 , is a flow chart of the partition protection method of the Android system described in an embodiment of the present invention; the method includes the following steps:

[0040] S1. Set the mount commands in the system kernel, so that all mount commands have the nosuid attribute;

[0041] S2. Add identification information to the preset directory, where the identification information is used to indicate that the directory is a protected partition;

[0042] S3. Call the mount command, and judge whether there is the identification information in the directory where the mount command object is located; if so, enter step S4, otherwise enter step S5;

[0043] S4. The mount command is not executed.

[0044] S5. Execut...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a sub-zone protecting method and device of the Android system. The method comprises the following steps: setting mounting commands in system kernel and enabling all mounting commands carry with nosuid properties; adding identification information to a default directory, wherein the identification information is used for showing that the directory is a protected sub-zone; transferring the mounting commands; determining whether the directory of the mounting command objects contains the identification information; if so, stopping performing the mounting commands; otherwise, performing the mounting commands. According to the technical scheme, the method and device have the advantages that the authority management mechanism is perfected; in addition, the security defense scheme is further set under the condition that vulnerability occurs in the authority management defense; therefore, the user authority switching can be effectively controlled, and meanwhile, the protected sub-area and the file in the protected sub-area can be prevented from malicious tempering; moreover, the sub-zone can be prevented from malicious tempering after the superuser authority is obtained by a special mode.

Description

technical field [0001] The invention relates to the technical field of software system security, in particular to a partition protection method and device for an Android system. Background technique [0002] With the rise of the mobile Internet, mobile smart devices have been integrated into people's daily life. As far as 2012 is concerned, according to IDC statistics, the shipment of Android smart devices ranks first. After rooting the Android smart device, you can get a better gaming experience, but it also brings new security problems. After the virus Trojan horse obtains the Root permission, it can attack the system wantonly. [0003] In the past few years of research, the security of the Android system has been a fascinating subject. Most of the methods proposed at present are aimed at non-Root systems, such as installing antivirus software on Android systems. Although many achievements have been made, none of the methods can completely solve the security problems of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/50G06F21/30
CPCG06F21/6218G06F2221/2141
Inventor 黄有焱叶国华吴璇沈敏亮吴庆棋
Owner 银捷尼科(福建)科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products