Safety identification method, between android application programs, based on user right

An Android application, identification method technology, applied in the direction of user identity/authority verification, digital data authentication, electrical components, etc.

Active Publication Date: 2014-02-05
王堃
View PDF6 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, two problems need to be solved, one is the identity authentication problem between the main program and the p

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety identification method, between android application programs, based on user right
  • Safety identification method, between android application programs, based on user right

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] 1. When a user logs in in the main program, the main program performs character calculations on the user name and user password to obtain a string UserID containing user identification information, and the server also retains the UserID. After the user successfully logs in, the server will assign a time-sensitive verification code TempKey to the user. The TempKey is randomly generated and stored in the server for a short period of time (such as half an hour). After the timeout, the TempKey will become invalid. The server side also saves the package name and signature information of the main program and all plug-in programs, as well as the FunctionID used for identification of the plug-in programs.

[0061] A security identification method between Android application programs based on user rights in the present invention is based on three subjects in the Android system, the three subjects, one is the server side, and the other is the Android application program as the mai...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a safety identification method, between android application programs, based on user right. Based on three main bodies in an android system, a safety identification method between an application program and another application program arranged independently and used as a plug-in of the first application program is designed in android equipment. The method is based on user right. Different users logging in a main program has different execution rights on a called plug-in program. A safety identification method based on user right is executed on the plug-in program when a main program loading plug-in program is designed. A safety identification method based on user right is executed on the main program when the designed plug-in program is called.

Description

technical field [0001] The invention is a security identification method between Android application programs based on user authority, which can identify whether the program has been tampered with, and can identify the login user authority of the calling program when the program is called, and belongs to the development of Android application programs security area. Background technique [0002] In Android application development, there is a plug-in development method. In this plug-in development method, both the main program and the plug-in program exist in the Android system in the form of independent applications, and they can be installed independently, but the plug-in program does not provide a startup interface for the Android system, and can only be used in the main program. to make the call. However, due to the openness of the Android platform, this plug-in form will encounter various security problems. For example, the security authentication problem between the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L29/06G06F21/44
Inventor 王堃房硕孙雁飞吴蒙郭篁徐贺
Owner 王堃
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products