Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Access control method of resources of Android system

A system resource and access control technology, applied in the field of access control for Android system resources, can solve problems such as complex implementation

Inactive Publication Date: 2014-04-02
XI AN JIAOTONG UNIV
View PDF4 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Dynamic monitoring: (1) Changing the system source code makes the implementation complex; (2) The Hook API method needs to hook different APIs for different behaviors
These methods have flaws, and they cannot easily and quickly discover malicious applications and fully guarantee the safety of users.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method of resources of Android system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The present invention will be further described in detail in conjunction with the accompanying drawings and specific embodiments.

[0027] The present invention is an access control method oriented to Android system resources, through which the access control of all sensitive system resources shown in Table 1 is realized, and can be effectively intercepted, specifically comprising the following steps:

[0028] Step 1: Obtain the code injection address of ServiceManager: including the starting address addr1 and offset address addr2 of ServiceManager processing resource requests;

[0029] The present invention finds that ServiceManager is the entry point for processing system resource calls and access. When an application needs to apply for system resources (such as microphones, cameras, etc.), ServiceManager will be started first, and then ServiceManager will perform corresponding processing according to the request. By analyzing the ServiceManager source code, it is obt...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an access control method of resources of an Android system. The access control method comprises the following steps of 1) when upper-layer application requests to utilize the system resources, transferring ServiceManager, when running to a breaking point, reading information of a memory by a monitor program so as to obtain information of the request resources and information of the application sending the request; judging whether the request resources and the application sending the request need to be intercepted by the monitor program or not, if so, entering the step 2); if not, normally transferring the ServiceManager to distribute the system resources; 2) popping up a dialog box to prompt a user.

Description

Technical field: [0001] The invention belongs to the field of security protection of intelligent terminals based on the Android system, and in particular relates to an access control method for resources of the Android system. Background technique: [0002] With the increasing popularity of the Android system, more and more device manufacturers are turning to the Android system, and the number of applications based on the system is also growing explosively. The subsequent security issues are becoming more and more serious. How to quickly detect application security and ensure user application security is a huge challenge. First of all, due to the difference of the system, the traditional security detection method for Windows system is no longer applicable; secondly, the open source of the Android system provides a superior space for malicious application developers; in addition, the Android system has different versions and lacks uniformity. Finally, the Android application...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/55G06F21/52
CPCG06F21/52G06F21/552
Inventor 桂小林代敏郭岳龙赵建强田丰林建财安健
Owner XI AN JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products