Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for examining security of Android system and enhancing use safety of mobile phone

A system security and mobile phone technology, applied in the direction of digital data protection, digital data authentication, platform integrity maintenance, etc., to achieve the effect of strengthening security management, improving use safety, and improving use safety

Inactive Publication Date: 2017-11-14
深圳市乐唯科技开发有限公司
View PDF2 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Android platform kernel vulnerabilities have been continuously exposed for a long time, and vulnerability exploitation and prevention are still hot spots

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for examining security of Android system and enhancing use safety of mobile phone
  • Method for examining security of Android system and enhancing use safety of mobile phone
  • Method for examining security of Android system and enhancing use safety of mobile phone

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0026] see Figure 1-2 , in an embodiment of the present invention: a method for checking the safety of the Android system and strengthening the safety of the mobile phone, comprising the following steps:

[0027] Step 1: Enable the Android system that comes with the mobile phone. There are certain kernel loopholes in the Android system. In the early days of Android, criminals often used loopholes in some user-level programs to root the phone. Now they mainly rely on kernel loopholes. Android introduces new kernel modules and driver solutions from different manufacturers to the Linux kernel, which introduces new security risks to the system kernel. Whether it is Qualcomm, MTK or Huawei Hisilicon chips, there have been some kernel vulnerabilities. This is a main attack point of the Android platform kernel; with Google introducing SE Linux into Android, the attack surface has been reduced, but it cannot completely solve the problem of kernel vulnerability exploitation; from the ...

Embodiment 2

[0033] see Figure 3-5 , a method to verify the security of the Android system and strengthen the security of mobile phones, to verify SEAndroid security access example: when we want to download a file from the mobile phone to the computer, we use the adb pull command to achieve it, when we execute the adb pull command At this time, the daemon process adbd on the mobile phone actually reads the specified file and sends the read content to the adb process running on the computer. Next, follow the steps below to try to download from the Samsung Download the file / system / bin / gpsd on the Note II to the computer:

[0034] Step 1: Execute the ls-1 command to check the existence of the / system / bin / gpsd file on the mobile phone, and its permission bits based on the traditional Linux UID / GID; as can be seen from the output of the command, if only the traditional Linux UID / GPSD is considered GID security mechanism, the / system / bin / gpsd file on the phone is readable by all users;

[00...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for examining the security of an Android system and enhancing the use safety of a mobile phone. The method comprises the steps of firstly starting an Android system installed in a mobile phone, introducing a set of security mechanism based on SE Linux into the Android system, integrating a program capable of actively defending privacy acquisition into an ROM code or API Hook of a manufacturer based on an SE Android mechanism, formulating a safety access strategy based on the SE Android mechanism by a system administrator, stipulating that a progress corresponds to a visited file, and finally, digitally signing application programs relevant with the Android system by virtue of a private key based on the SE Android system. By knowing a Linux core, the bug direction is researched, and the security management is enhanced based on an SE Android security mechanism; by utilizing application program signatures, the illegal manipulation of the application programs is avoided, and meanwhile, the attack principle of Android malicious software is known, so that the use safety of an Android mobile phone is improved; the Android mobile phone can be clearly and effectively used, and a user can know an Android technique and see through Android apk deceitful tricks in the market, so that the use safety of the user is improved.

Description

technical field [0001] The invention relates to the technical field of security protection of smart phones, in particular to a method for checking the security of an Android system and enhancing the security of mobile phones. Background technique [0002] With the popularity of smart phones and the rapid development of social networks, more and more people are using mobile phones. According to statistics from the 2017 Google I / O Conference, there are more than 2 billion activated devices using the Android operating system worldwide. Android is the most used operating system in the world. Many domestic manufacturers such as Huawei, Xiaomi, and Meizu are very popular among young people. However, Android still has many hidden dangers in its technical security. We must not only know how to use mobile phones, but also use mobile phones safely to ensure the safety of our property and privacy. [0003] In the early Android system, lawbreakers often exploited some user-level prog...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57G06F21/45G06F21/62
Inventor 周聪伟
Owner 深圳市乐唯科技开发有限公司