Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Resource access control method and terminal

A resource access and resource technology, applied in the electronic field, can solve problems such as the inability to guarantee the security of designated resource access, the inability to protect designated resources by mobile terminals, and security risks.

Inactive Publication Date: 2017-08-11
SHENZHEN GIONEE COMM EQUIP
View PDF2 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] One is to redefine the private interface, that is, to privatize the interface of the specified resource on the mobile terminal. Only the developer knows the access interface of the specified resource, and third-party applications and other unauthorized applications cannot obtain the private interface. It is also impossible to access the resources of the instruction. However, due to the complexity of the internal personnel of the development company, the security of the private interface information cannot be guaranteed. Once the private interface is leaked, the access security of the specified resources cannot be guaranteed.
[0005] The other is to do some security encryption protection before calling the access interface of the specified resource, for example: authenticate or unlock before calling the access interface of the specified resource. This method can protect the access interface of the specified resource to a certain extent However, in some abnormal cases, if a third-party application or other unauthorized application bypasses the authentication mechanism, it can also normally call the access interface of the specified resource, and there are certain security risks
[0006] In summary, the existing methods of restricting unauthorized applications from accessing designated resources are less secure and cannot effectively protect designated resources on mobile terminals.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Resource access control method and terminal
  • Resource access control method and terminal
  • Resource access control method and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0028] It should be understood that when used in this specification and the appended claims, the terms "comprising" and "comprises" indicate the presence of described features, integers, steps, operations, elements and / or components, but do not exclude one or Presence or addition of multiple other features, integers, steps, operations, elements, components and / or collections thereof.

[0029] It should also be understood that the terminology used ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments of the invention provide a resource access control method and a terminal. The method comprises the steps of receiving a request of calling an access interface of a specified resource from a caller; calling a permission management interface to obtain a package name of the caller and sending the package name to a permission management service; transmitting the package name to a package management service by the permission management service, thereby enabling the package management service to return information related to the caller according to the package name; calling an intermediate layer interface of interaction between an operation system and a trusted execution environment by the permission management service, and sending the information related to the caller to a trusted application in the trusted execution environment; and reading preset white list information corresponding to the specified resource by the trusted application, performing identity verification on the caller, transmitting a verification result to a kernel driver for enabling the kernel driver to judge whether the caller is allowed to call the access interface or not according to the verification result, and executing corresponding response operation. According to the method and the terminal, the specified resource on the terminal can be effectively protected, so that the security of the terminal is improved.

Description

technical field [0001] The embodiments of the present invention relate to the field of electronic technology, and in particular, to a resource access control method and terminal. Background technique [0002] Some hardware or software resources on the mobile terminal are originally designed to be used only by specific applications, and do not allow third-party applications and other unauthorized applications to have access. If third-party applications or other unauthorized applications obtain When it comes to the access methods of these hardware or software resources, the security of mobile terminal information may involve risks. [0003] At present, in order to improve the security of mobile terminal information, the following methods are generally used to restrict unauthorized applications from accessing designated resources: [0004] One is to redefine the private interface, that is, to privatize the interface of the specified resource on the mobile terminal. Only the de...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/44G06F21/60G06F21/62
CPCG06F21/44G06F21/604G06F21/629G06F2221/2141
Inventor 黄儒鸿熊林
Owner SHENZHEN GIONEE COMM EQUIP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products