Unlock instant, AI-driven research and patent intelligence for your innovation.

How to use the account proxy module to connect to the superuser account shell

A super user and agent module technology, applied in the field of super user account command interpreter, can solve problems such as difficult computer device debugging, inability to copy or move, inability to replace programs, etc., and achieve the effect of avoiding security problems

Inactive Publication Date: 2016-12-21
MEDIATEK INC
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, it is difficult to debug a computer device that has been sent
For example, in this case it is not possible to replace damaged programs, to dump memory and to copy or move system files
In addition, even if a superuser account is available through complex authentication mechanisms, it can still be compromised by hackers, resulting in the leakage of private user data and confidential program code

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • How to use the account proxy module to connect to the superuser account shell
  • How to use the account proxy module to connect to the superuser account shell
  • How to use the account proxy module to connect to the superuser account shell

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0012] Certain terms are used in the description and claims to refer to particular elements. Those skilled in the art should understand that hardware manufacturers may use different terms to refer to the same component. The specification and claims do not use the difference in name as a way to distinguish components, but use the difference in function of components as a criterion for distinguishing. "Include" or "comprising" mentioned in the entire specification and claims is an open term, so it should be interpreted as "including but not limited to". In addition, the term "coupled" herein includes any direct and indirect means of electrical connection. Therefore, if it is described that the first device is coupled to the second device, it means that the first device may be directly electrically connected to the second device, or indirectly electrically connected to the second device through other devices or connection means.

[0013] Please refer to figure 1 , figure 1 It...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method of using an account agent to access a superuser account shell of a computer device is disclosed. The method includes receiving an authentication request; verifying whether an identity authentication is passed; when the identity authentication is passed, establishing a secure channel between the account agent and a normal user account shell; and allowing controlling the superuser account shell of the computer device through the normal user account shell.

Description

technical field [0001] The present invention relates to a method for connecting a superuser account command interpreter (superus eraccount shell) of a computer device, in particular to a method for connecting a super user account command interpreter of a computer device using an account agent (account agent) module method. Background technique [0002] A user account identifies a user by user name, password, or other credentials that allow the user to log into the computer's operating system. In a UNIX (UNIX-based) operating system, each user has a corresponding user identity (UserIdentification, UID), which is used to identify the user and system resources related to the user. In many operating systems, the superuser or root user is a special account used for system administration and may correspond to user identity 0. Superusers have all the privileges or permissions of all files and programs, so they can perform many things that ordinary users cannot, such as changing t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/08H04L29/06
CPCG06F21/31G06F2221/2145
Inventor 黄京光
Owner MEDIATEK INC