Access control method and device, and related equipment

A technology of access control and system partition, which is applied in the field of communication, can solve problems such as mobile device damage, mobile phone OTA upgrade failure, and failure to boot, so as to improve security and avoid OTA upgrade failure.

Active Publication Date: 2016-07-27
四川苏格通讯技术有限公司 +1
View PDF5 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, modifying the system partition file will cause great damage to the mobile device. Taking the mobile phone as an example, if some files in the system partition of the mobile phone are deleted, it is likely to cause the OTA upgrade of the mobile phone to fail, and even cause the mobile phone to become a brick and cannot be turned on.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method and device, and related equipment
  • Access control method and device, and related equipment
  • Access control method and device, and related equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The principles and features of the present invention will be described below in conjunction with the accompanying drawings, and the examples given are only used to explain the present invention, and are not intended to limit the scope of the present invention. For those of ordinary skill in the art, all embodiments obtained according to the spirit of the present invention shall belong to the protection scope of the present invention without any creative effort.

[0040] figure 1 It is a flow chart of the access control method in Embodiment 1 of the present invention. The access control method of this embodiment can be applied to an Android system, and the Android system can be an Android system in a mobile device such as a smart phone or a tablet computer. Such as figure 1 As shown, in this embodiment, the access control method may include the following steps:

[0041] Step S101, receiving a request to reload the system partition into a readable and writable state, t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an access control method and device, and related equipment, wherein the access control method is applied in an Android system. The method comprises following steps of receiving a request for reloading a system subarea as a read-write state, wherein parameters which are input by a requester and are used for obtaining the read-write privileges of the system subarea are carried in the request; detecting whether the parameters which are input by a requester and are used for obtaining the read-write privileges of the system subarea in the request are consistent with special parameters prebuilt in a recovery mode program or not; and processing the request according to a detection result. According to the method, the device and the equipment, through limiting the read-write privileges of the file system of the mobile equipment, the damage possibly brought to the original system subarea file of the mobile equipment is indirectly limited, therefore, the security of the system subarea file of the mobile equipment is improved, and an OTA (Over-the-Air Technology) update failure resulting from the damage of the system subarea file can be avoided.

Description

technical field [0001] The present invention relates to the communication field, in particular to an access control method, device and related equipment. Background technique [0002] At present, smart mobile devices have been widely used. The operating system is an important part of a smart mobile device. Among them, Linux is a set of Unix-like operating systems that are free to use and spread freely. It is a multi-user, multi-tasking, multi-threading and multi-CPU operating system based on POSIX and UNIX. Linux can run major UNIX utility software, application programs and network protocols. Linux supports both 32-bit and 64-bit hardware. Linux inherits Unix's network-centric design idea and is a multi-user network operating system with stable performance. Linux is mostly used in the embedded operating system of mobile phones. [0003] The terms related to mobile devices are explained below. [0004] For the Android (Android) operating system, the System partition (al...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F9/445
CPCG06F8/65G06F21/6218G06F2221/2141
Inventor 常健
Owner 四川苏格通讯技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products