Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

93 results about "Superuser" patented technology

In computing, the superuser is a special user account used for system administration. Depending on the operating system (OS), the actual name of this account might be root, administrator, admin or supervisor. In some cases, the actual name of the account is not the determining factor; on Unix-like systems, for example, the user with a user identifier (UID) of zero is the superuser, regardless of the name of that account; and in systems which implement a role based security model, any user with the role of superuser (or its synonyms) can carry out all actions of the superuser account. The principle of least privilege recommends that most users and applications run under an ordinary account to perform their work, as a superuser account is capable of making unrestricted, potentially adverse, system-wide changes.

Method and system for transferring money in business-to-business internet transactions

A method for enabling two businesses to complete a transaction that includes payment from one business (the buyer) to another business (the seller). A payment enabler operates the money transfer service over a computer network of nodes, such as the Internet. Typically, the buyer and the seller use the money transfer service of the payment enabler to consummate a transaction that they have arranged over the computer network through a business-to-business transaction facilitator that enables businesses to arrange deals over the computer network. During registration with the payment enabler, a buyer typically provides information about a bank account from which the seller will be paid, and the seller typically provides information about a bank account for receiving the funds from the buyer. The payment enabler facilitates payments for transactions between businesses by enabling the employees of a business registered with the payment enabler to direct the various phases of the payment process on behalf of the business for which those employees work. A super user employee, identified by the business during registration with the payment enabler, has the power to register other employees of the business with the payment enabler and to specify the privileges that the payment enabler should grant each employee to act on behalf of the business.
Owner:THE WESTERN UNION CO

Method and mobile terminal for realizing root request management through manufacturer server

The invention provides a method and a mobile terminal for realizing root request management through a manufacturer server. After the mobile terminal is used to grant a user root authority through the manufacturer server, a SU program is pushed to a system/bin directory, and an improved version Superuser.apk is installed, the APK has the manufacturer cloud server interaction capability to send various root authority escalation requests on the mobile terminal to the manufacturer server, and the manufacturer server is used to establish a sqlite database file according to an unique IMEI number of the mobile terminal to manage the root authority request white list and black list. The evaluation information of the server on the authority escalation request safety is fed back to the mobile terminal for being referenced by end users in the judgment process; and a message of the agreement of authority evaluation is sent to the server for finally determination, and a corresponding authority evaluation command executed after the determination message which is fed back is acquired by the mobile terminal. According to the invention, not only the user can get the root authority permission, and but also the root environment of the user can be managed, controlled and effectively reminded by the manufacturer server.
Owner:天津汇智网络科技有限公司

Sub-zone protecting method and device of Android system

ActiveCN104268462AEffective control authority switchingFree from malicious tamperingDigital data authenticationPlatform integrity maintainanceUser PrivilegeComputer science
The invention provides a sub-zone protecting method and device of the Android system. The method comprises the following steps: setting mounting commands in system kernel and enabling all mounting commands carry with nosuid properties; adding identification information to a default directory, wherein the identification information is used for showing that the directory is a protected sub-zone; transferring the mounting commands; determining whether the directory of the mounting command objects contains the identification information; if so, stopping performing the mounting commands; otherwise, performing the mounting commands. According to the technical scheme, the method and device have the advantages that the authority management mechanism is perfected; in addition, the security defense scheme is further set under the condition that vulnerability occurs in the authority management defense; therefore, the user authority switching can be effectively controlled, and meanwhile, the protected sub-area and the file in the protected sub-area can be prevented from malicious tempering; moreover, the sub-zone can be prevented from malicious tempering after the superuser authority is obtained by a special mode.
Owner:银捷尼科(福建)科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products