Method for examining security of Android system and enhancing use safety of mobile phone
A system security and mobile phone technology, applied in the direction of digital data protection, digital data authentication, platform integrity maintenance, etc., to achieve the effect of strengthening security management, improving use safety, and improving use safety
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0026] see Figure 1-2 , in an embodiment of the present invention: a method for checking the safety of the Android system and strengthening the safety of the mobile phone, comprising the following steps:
[0027] Step 1: Enable the Android system that comes with the mobile phone. There are certain kernel loopholes in the Android system. In the early days of Android, criminals often used loopholes in some user-level programs to root the phone. Now they mainly rely on kernel loopholes. Android introduces new kernel modules and driver solutions from different manufacturers to the Linux kernel, which introduces new security risks to the system kernel. Whether it is Qualcomm, MTK or Huawei Hisilicon chips, there have been some kernel vulnerabilities. This is a main attack point of the Android platform kernel; with Google introducing SE Linux into Android, the attack surface has been reduced, but it cannot completely solve the problem of kernel vulnerability exploitation; from the ...
Embodiment 2
[0033] see Figure 3-5 , a method to verify the security of the Android system and strengthen the security of mobile phones, to verify SEAndroid security access example: when we want to download a file from the mobile phone to the computer, we use the adb pull command to achieve it, when we execute the adb pull command At this time, the daemon process adbd on the mobile phone actually reads the specified file and sends the read content to the adb process running on the computer. Next, follow the steps below to try to download from the Samsung Download the file / system / bin / gpsd on the Note II to the computer:
[0034] Step 1: Execute the ls-1 command to check the existence of the / system / bin / gpsd file on the mobile phone, and its permission bits based on the traditional Linux UID / GID; as can be seen from the output of the command, if only the traditional Linux UID / GPSD is considered GID security mechanism, the / system / bin / gpsd file on the phone is readable by all users;
[00...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


