Security policy configuration method and device applied to SEAndroid (Security-Enhanced Android) system
A technology of security policy and configuration method, applied in the field of system security, can solve problems such as cumbersome operation, and achieve the effect of convenient configuration process
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0029] see figure 1 , the security policy configuration method in the embodiment of the present invention includes:
[0030] Step 101, when the SEAndroid system starts, obtain the BundleContext in the OSGI framework;
[0031] The OSGI mentioned in the embodiment of the present invention will be described below.
[0032] The Open Service Gateway Protocol (OSGI, OpenService Gateway Initiative), also known as the dynamic module system of the Java language, defines an infrastructure for the development of modular applications.
[0033] OSGI consists of two parts: the OSGI framework and OSGI standard services. The OSGI framework is an operating environment that implements and provides OSGI functions, and OSGI standard services define many reusable application programming interfaces (API, Application Programming Interface) for performing common tasks. The specification of the OSGi framework and standard services is managed by the OSGi Alliance. The OSGi framework plays a central...
Embodiment 2
[0063] On the basis of Embodiment 1, the embodiment of the present invention further adds a security policy dynamic replacement scheme, so that after completing the configuration of the default security policy, the user can change the configuration of the security policy as needed, such as figure 2 As described, the security policy configuration method in the embodiment of the present invention includes:
[0064] Steps 201-205. For the specific implementation process of steps 201-205, reference may be made to the description of steps 101-105 in Embodiment 1, which will not be repeated here.
[0065] Step 206, if the input security policy configuration instruction is received, compare the name of the security policy to be configured contained in the above security policy configuration instruction with the name of the security policy currently configured by the SEAndroid system;
[0066] In the embodiment of the present invention, the terminal can provide the user with a securi...
Embodiment 3
[0074] On the basis of Embodiment 1, the embodiment of the present invention further adds a security policy dynamic replacement scheme, so that after completing the configuration of the default security policy, the user can change the configuration of the security policy as needed, and, through the preset The database stores the configured security policies, and the configured security policies can be installed locally without querying and downloading from the cloud server, which makes the security policy configuration faster. Specifically, such as image 3 As described, the security policy configuration method in the embodiment of the present invention includes:
[0075] Steps 301-304. For the specific implementation process of steps 301-304, reference may be made to the description of steps 101-104 in Embodiment 1, which will not be repeated here.
[0076] Step 305, binding and storing the bundle identifier of the currently installed bundle file and the name of the security...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


