A way to perform frequent root-privilege operations and get real-time result feedback

A permission and frequent technology, applied in the field of information security, can solve problems such as high memory consumption, frequent channel opening and closing, mobile phone hardware resource consumption, etc., to achieve the effect of controlling occupation and avoiding the reduction of application efficiency and speed

Active Publication Date: 2018-11-13
MWH TECH LLC
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] 1. Unable to obtain real-time feedback information, that is, the result of permission operation
[0005] 2. Since the channel cannot be reused, when it is necessary to selectively operate on files one by one, it is necessary to frequently open and close the channel
This way of use consumes a lot of mobile phone hardware resources, which significantly reduces the smoothness and performance of application execution.
[0006] 3. For multiple root permission operations (for example, you want to delete a file, add a folder, and modify the permissions of a file at the same time), you can only build a shell for each operation and operate it, and the memory consumption is high.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0069] In order to make the object, technical solution and advantages of the present invention clearer, the following examples are given to further describe the present invention in detail.

[0070] The invention mainly solves the problem of high memory consumption caused by frequently calling a root authority tool once to perform authority operations, and at the same time improves the function of root authority acquisition. Main technology of the present invention is as follows:

[0071] 1. Independently analyzed the current root authority operation process, determined the reusable part of the process, and used the Service component of the Android system to package the reusable structure and realize the external access interface;

[0072] 2. Independently define the data structure used to load the targeted files and related operation content of the root authority operation, and build a list to package the data structure. Used to implement multi-type operations on batches;

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for frequently executing root privilege operations and acquiring real-time result feedbacks. The method comprises the following steps of: 1, implanting a root privilege escalation tool into a mobile phone; 2, analyzing reasons of memory consumption; 3, optimizing a process of the root privilege operations; 4, defining a data structure; 5, designing and realizing detection of privilege operation results; 6, designing and realizing execution of different operation requests in batch; and 7, clearing all calling resources and exiting. The method has the following beneficial effects: 1, the information in a specially established file list is allowed to be operated one by one with a root identity and the list may include multiple operations on files; 2, the occupation of a mobile phone memory can be controlled well while the root privilege operations are frequently carried out on the same file or different files, the reduction in the application efficiency and in the speed caused by excessive resource consumptions is avoided; and 3, whether the operations are successful is allowed to be verified and fed back after relevant root operations are completed.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method for frequently performing operations with root authority and obtaining real-time result feedback. Background technique [0002] Root authority is the highest authority of the Linux system. The permission system of Android phones is consistent with that of Linux, but the Android systems released by various manufacturers usually only open permissions for ordinary users. If you need to obtain more data at the system level or belonging to other applications, you need to implant a privilege escalation tool in the mobile phone, and then obtain root privileges through certain operations. The tool runs on the bottom layer of the Android system (Linux layer), so the Android application needs to interact with the tool through a channel. The current common practice is: open the channel, perform ROOT-related operations, and close the channel. However, this prior art ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/44
CPCG06F21/44
Inventor 黄旭杨博
Owner MWH TECH LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products