Method for granting user temporary root authority

A temporary, authorized technology, applied in security devices, digital data protection, electrical components, etc., can solve the problem of not knowing the specific situation of the user root, disputes, etc., and achieve the effect of convenient use habits and simple use behaviors

Active Publication Date: 2014-04-23
宋易霄
View PDF3 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when many users try to obtain root privileges, various problems occur on their mobile phones due to misoperation and o

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for granting user temporary root authority
  • Method for granting user temporary root authority
  • Method for granting user temporary root authority

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0020] The following describes the implementation of the present invention through specific specific examples. Those skilled in the art can easily understand other advantages and effects of the present invention from the content disclosed in this specification. The present invention can also be implemented or applied through other different specific embodiments, and various details in this specification can also be modified or changed based on different viewpoints and applications without departing from the spirit of the present invention.

[0021] It should be noted that the illustrations provided in this embodiment only illustrate the basic idea of ​​the present invention in a schematic way, and the figures only show the components related to the present invention instead of the number, shape, and shape of the components in actual implementation. For size drawing, the type, quantity, and proportion of each component can be changed at will during actual implementation, and the co...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for granting a user temporary root authority. The method at least comprises the following steps: after a root cloud authorization request sent by a mobile phone is received by a root server, the mobile phone information is request to be provided to perform authentication on the mobile phone identity; the root server is used to judge whether the mobile phone is a legal mobile phone produced by the company of the mobile phone manufacturer according to the mobile phone information provided by the mobile phone; if the mobile phone is a legal mobile phone produced by the company of the mobile phone manufacturer, then a root cloud authorization temporary configuration file is pushed to the mobile phone side; and the root server is used to update root information stored in the mobile phone. The management method for granting the user temporary root authority of the invention can be used to make the mobile phone manufacturer understand whether the user to perform the root operations and understand the number of the root operations so as to understand the utilization habit and other information of the user, so that the manufacturer can conveniently position the reason and responsibility of generated problems.

Description

technical field [0001] The invention relates to the technical field of mobile phone root authority setting, in particular to a method for granting temporary root authority to a user. Background technique [0002] Root authority is a kind of system authority, which can be understood as the same concept as SYSTEM authority. But the root authority is higher than the Administrator authority. root is a super administrator user account in , linux and unix systems, which can control all objects in the operating system. After obtaining the root authority, it means that the highest authority of the mobile phone has been obtained, and all operations of adding, deleting, modifying and checking can be performed on any file (including system files) in the mobile phone. [0003] When users get a mobile phone, they will try to get root privileges, install and add whatever they want. However, when many users try to obtain root permissions, various problems occur in their mobile phones du...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/08H04W12/06G06F21/60
Inventor 刘云峰
Owner 宋易霄
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products