A B-based access control modeling and security analysis method for android
An access control and analysis method technology, applied in computer security devices, instruments, computing, etc., can solve problems such as security cannot be verified, Android platform access control lacks access control formal models, and solution implementation lacks theoretical analysis and verification.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0041] The present invention will be described in detail below with reference to the accompanying drawings and preferred embodiments, and the purpose and effect of the present invention will become clearer. It should be understood that the specific embodiments described here are only used to explain the present invention and are not intended to limit the present invention.
[0042] Such as figure 1 As shown, the Android access control modeling and security analysis method based on method B of the present invention first incrementally builds the basic model PermSys, then builds the extended model ChainSys, InspIPC, QuireIPC, XmanRule, and finally uses theorem proof and model detection to analyze its security , the specific steps are as follows:
[0043] Step 1: Analysis of authority mechanism
[0044] The modeling of the permission mechanism is a complete formal description of the mechanism specification. First, the modeling goals and assumptions must be put forward, and the b...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com