A sandbox shelling method and system based on an android virtual machine
A virtual machine and sandbox technology, applied in the field of information security, can solve the problems of mobile phone sensitive information theft, system crash, security risks, etc., and achieve the effect of ensuring the security of the device environment, simple use and high efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
specific Embodiment 1
[0097] combine image 3 As shown, the present invention provides a function of modifying the Android system framework code based on the Android system principle. The steps of this function are as follows:
[0098] S01, start the Android virtual machine until the system framework code is loaded.
[0099] S02, using the system dvmJarOpen to load the custom Android virtual machine code package of the present invention to obtain a DexFile object.
[0100] S03, calling dvmSetBootPathExtraDex to store the above DexFile object in bootClassPathOptExtra.
[0101] S04, call loadAllClass, and loop to find the classes in the above DexFile, so all of them are added to the hashTable for subsequent use.
[0102] S041, classloader and DvmDex are not provided here for class search, use dvmFindSystemClassNoInit to search from bootclass.
[0103] S042, use dexFindClass to search directly from bootClassPathOptExtra, and return if found, otherwise go to the next step.
[0104] S043, use dexFi...
specific Embodiment 2
[0106] This system refers to the operating principle of the Android system, and implements the interfaces from Activity, Application to ActivityThread, etc., which are directly called by applications. It also implements classes related to environment and resources such as ApplicationInfo, LoadedApk, Context, etc. Since many system principles are involved, this embodiment only describes the reference steps.
[0107] S01, the control module starts the dalvik virtual machine.
[0108] S02, the control module uses the function of Embodiment 1 to load the jar package of the system framework.
[0109] S03, pass in the target application app path, and parse to obtain the Application name and the main Activity name.
[0110] S04, use the Jni interface FindClass to find the target Application class, and call Initialize the function and call NewObject to generate an object.
[0111] S05, use the Jni interface FindClass to find the ActivityThread. At this time, the ActivityThread i...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com



