Security policy setting and determining method, and method and device for executing operation by application program

A technology of security policy and application program, which is applied in the field of communication, can solve the problem of inflexibility in the scheme of assigning security policies, and achieve the effect of improving flexibility

Inactive Publication Date: 2012-02-01
CHINA MOBILE COMM CO LTD
View PDF3 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Embodiments of the present invention provide a method and device for setting security policies to solv

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security policy setting and determining method, and method and device for executing operation by application program
  • Security policy setting and determining method, and method and device for executing operation by application program
  • Security policy setting and determining method, and method and device for executing operation by application program

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0029] When the inventor analyzed the security policy distribution scheme provided by the prior art, he found that its shortcomings are mainly reflected in the following two points:

[0030] 1. The static nature of the certificate system. After the application is signed by the signing certificate, a series of security attributes such as its security domain mapping and security authority are determined statically, which cannot be dynamically configurable and adjustable;

[0031] 2. The unity and simplicity of the security system. When the security policy distribution scheme provided by the prior art is adopted, it is selected from a plurality of preset security policies, which results in that the application program identifier will be mapped to a number of fixed security domains. Analysis shows that these security domains may not reflect all the operations that the application can perform.

[0032] In order to solve the above-mentioned problems in the solution of assigning a securit...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a security policy setting method and device which are used for solving the problem of an inflexible scheme of distributing security policy to an application program. The method comprises the following steps of: determining the security policy of the application program; and setting and sending security policy information used for indicating the security policy in a signing certificate where the application program is signed. Correspondingly, the embodiment of the invention also provides a security policy determination method and device and a method and device for executing operation by the application program.

Description

technical field [0001] The present invention relates to the field of communication technologies, and in particular to a security policy setting method and device, a security policy determination method and device, and an application program execution operation method and device. Background technique [0002] The application authentication technology on mobile terminals has become one of the mainstream technologies for security protection of application behavior on smart terminals. Both Windows Mobile platform and Symbian platform have their corresponding application signature authentication mechanisms. [0003] The application signature authentication mechanism refers to the use of digital certificates to sign the application programs running in the mobile terminal. The process of implementing the signature mainly includes: first, the developer of the application program applies to the certificate issuer authorized by the mobile terminal operating system manufacturer to obtai...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L29/06
Inventor 匡硕樊科袁园程子川
Owner CHINA MOBILE COMM CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products