Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Plug-in security control method and device and storage medium

A security control and plug-in technology, applied in the direction of program control devices, computer security devices, program control design, etc., can solve problems such as equipment operation safety hazards, achieve effective control, improve stability and security effects

Pending Publication Date: 2021-07-02
ZTE CORP
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At the same time, the plug-in also needs to change the data of the device in order to start the corresponding software services (such as opening the ftp network service, capturing and analyzing characteristic messages, file storage operations, etc.), and the opening of the device capability interface to the plug-in technically meets the dynamic deployment of the plug-in business requirements, but it brings relatively large security risks, such as plug-ins arbitrarily accessing device interfaces, plug-ins accessing device interfaces without authorization, etc. In particular, if plug-ins maliciously use interface security vulnerabilities to attack devices or obtain sensitive data, It will bring a very large safety hazard to the operation of the equipment.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Plug-in security control method and device and storage medium
  • Plug-in security control method and device and storage medium
  • Plug-in security control method and device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0033] In this embodiment, a plug-in security control method is provided, figure 1 is a flowchart of a plug-in security control method according to Embodiment 1 of the present invention, such as figure 1 As shown, the process includes the following steps:

[0034] Step S102, receiving an access request from the plug-in to the device capability interface;

[0035] Step S104, query the interface permission configuration policy library corresponding to the plug-in, and determine whether the plug-in has access rights to the device capability interface, wherein the interface permission configuration policy library of the plug-in records that the plug-in has access to multiple Access rights to the device capability interface;

[0036] Step S106: Control the plug-in's access to the device capability interface according to the determination result of whether the plug-in has access authority to the device capability interface.

[0037] Through the above steps, when the access reques...

Embodiment 2

[0057] In this embodiment, a plug-in security control device is also provided, which is used to implement the above embodiments and preferred implementation modes, and what has already been described will not be repeated. As used below, the term "module" may be a combination of software and / or hardware that realizes a predetermined function. Although the devices described in the following embodiments are preferably implemented in software, implementations in hardware, or a combination of software and hardware are also possible and contemplated.

[0058] figure 2 is a structural block diagram of a plug-in safety control device according to Embodiment 2 of the present invention, such as figure 2 As shown, the device includes a plug-in security authorization execution unit 22, which is used for:

[0059] Receive the access request of the plug-in to the device capability interface;

[0060] Query the interface permission configuration policy library corresponding to the plug-...

Embodiment 3

[0078] An embodiment of the present invention also provides a storage medium, in which a computer program is stored, wherein the computer program is set to execute the steps in any one of the above method embodiments when running.

[0079] Optionally, in this embodiment, the above-mentioned storage medium may be configured to store a computer program for performing the following steps:

[0080] Step S1, receiving an access request from a plug-in to a device capability interface;

[0081] Step S2, query the interface permission configuration policy library corresponding to the plug-in, and determine whether the plug-in has access rights to the device capability interface, wherein the interface permission configuration policy library of the plug-in records that the plug-in has access to multiple Access rights to the device capability interface;

[0082] Step S3, controlling the plug-in's access to the device capability interface according to the determination result of whether ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a plug-in security control method and device and a storage medium. The method comprises the following steps that an access request of a plug-in to an equipment capability interface is received; an interface permission configuration strategy library corresponding to the plug-in is inquired, whether the plug-in has access permission to the equipment capability interfaces or not is determined, and the access permission of the plug-in to multiple equipment capability interfaces is recorded in the interface permission configuration strategy library of the plug-in; and the access of the plug-in to the equipment capability interface is controlled according to the determination result of whether the plug-in has the access authority to the equipment capability interface. According to the method and the device, the problem of how to control the safe operation of the plug-in is solved, so that the effect of improving the operation stability and safety of the equipment is achieved.

Description

technical field [0001] The present invention relates to the technical field of plug-in operation security control, in particular, to a plug-in security control method, device and storage medium. Background technique [0002] The Open Service Gateway Initiative (OSGi for short), as an open source plug-in management framework, is increasingly used in various embedded devices, such as home networking devices such as home gateways and set-top boxes. These devices use the plug-in dynamic deployment technology of the OSGi system to improve the dynamic expansion capability of the device's business. Compared with the traditional static deployment, the business deployment method is lighter and more flexible. [0003] However, the business operation of the plug-in depends on some capability interfaces of the device itself. For example, the plug-in needs to query the data information of the device (such as network data, system resource usage, etc.), so that the plug-in can complete bus...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56G06F21/57G06F21/62G06F9/445
CPCG06F9/44526G06F21/566G06F21/577G06F21/6218
Inventor 刘俊峰卢小张
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products