Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security management method and device

A technology for security management and designated files, which is applied in the computer field, can solve problems such as the difficulty of ordinary users, and achieve the effect of protecting system security and preventing malicious behaviors

Inactive Publication Date: 2016-12-07
BEIJING ERENEBEN INFORMATION TECH
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, it is difficult for ordinary users to obtain Root privileges, so various third-party Root tool programs such as Root Master, Brush Master, and Brush Wizard have emerged to assist ordinary users in obtaining Root privileges.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security management method and device
  • Security management method and device
  • Security management method and device

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0029] see figure 1 , the first embodiment of the present invention provides a security management method, the method includes:

[0030] Step 11, when it is detected that the system is implanted with a specified file, a prompt message is displayed to prompt the user whether to delete the specified file, wherein the specified file is used to help an application program that does not have the superuser permission to obtain the superuser permission;

[0031] Monitor various operations of various applications in the system in real time in the background, and display a prompt message when it detects that an application has implanted a specified file into the system. The prompt information may include a button for triggering a delete instruction or a no-delete instruction, which is used to prompt and guide the user to choose whether to delete the specified file.

[0032] Wherein, the specified file is used to help an application program without Root permission to obtain Root permis...

no. 2 example

[0039] see figure 2 , the second embodiment of the present invention provides a security management method, the method comprising:

[0040] Step 21, after detecting that the system starts, disable the specified service;

[0041] Regardless of the Linux kernel (kernel) or the Android system, there are some loopholes. For different loopholes, different third-party Root tool programs have different principles and schemes for obtaining Root permissions. Implanting a specific file, that is, establishing a channel between the system and the application program, so that the application program can obtain Root authority through the channel.

[0042] Specifically, the third-party root tool program first stores related tool programs for cracking the system in the userdata folder, then searches for system vulnerabilities, obtains root privileges, and remounts the system under the prerequisite of obtaining root privileges, and uploads the system to the system Implant the above-mentione...

no. 3 example

[0064] see image 3 , the third embodiment of the present invention provides a safety management device, the device includes:

[0065] A monitoring module 31, configured to monitor whether the system is implanted with a specified file;

[0066] The prompting module 32 is used to display prompt information when the monitoring module 31 detects that the system is implanted with a specified file to prompt the user whether to delete the specified file, wherein the specified file is used to help an application program that does not have superuser authority to obtain the specified file. superuser privileges;

[0067] An instruction obtaining module 33, configured to obtain the deletion instruction triggered by the user according to the prompt information;

[0068] The security management module 34 is configured to delete the specified file according to the deletion instruction acquired by the instruction acquisition module 33 .

[0069] For other details of implementing the techn...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a security management method applied to mobile terminals. The security management method comprises the following steps: when the fact that an assigned file is implanted into a system is monitored, a prompt message is displayed to prompt a user whether to delete the assigned file or not, wherein the assigned file is used for helping an application without a superuser permission obtain the superuser permission; a deletion instruction triggered by the user according to the prompt message is acquired; the assigned file is deleted according to the deletion instruction. Meanwhile, the invention provides a security management device. According to the security management method and device, the fact that a malicious application performs malicious acts by obtaining the superuser permission and endangers system security can be effectively prevented.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a safety management method and device. Background technique [0002] The Android (Android) operating system is one of the mainstream operating systems developed based on Linux and widely used in mobile terminals. Since Linux is a multi-user coexisting operating system, in order to prevent some users from performing malicious or wrong operations on the system, Android classifies and restricts user permissions, and different users are granted different permissions. Among them, Root (super user) authority has the highest authority of the entire system. Users who have obtained Root authority have absolute control authority of the entire system. They can perform operations in the system including starting or stopping a process, adding or disabling hardware, and deleting disk files. and other operations that may endanger system security. [0003] However, it is difficult for ordina...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56
Inventor 姚自强朱少杰周佳杜国楹
Owner BEIJING ERENEBEN INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products