CN102981835B - Android application program permanent Root permission acquiring method - Google Patents

Android application program permanent Root permission acquiring method Download PDF

Info

Publication number
CN102981835B
CN102981835B CN201210436649.9A CN201210436649A CN102981835B CN 102981835 B CN102981835 B CN 102981835B CN 201210436649 A CN201210436649 A CN 201210436649A CN 102981835 B CN102981835 B CN 102981835B
Authority
CN
China
Prior art keywords
application program
executable program
android
file
android application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201210436649.9A
Other languages
Chinese (zh)
Other versions
CN102981835A (en
Inventor
张长安
刘德建
陈宏展
罗上清
潘运武
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Baidu com Times Technology Beijing Co Ltd
Original Assignee
FUZHOU BOYUAN WIRELESS NETWORK TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by FUZHOU BOYUAN WIRELESS NETWORK TECHNOLOGY Co Ltd filed Critical FUZHOU BOYUAN WIRELESS NETWORK TECHNOLOGY Co Ltd
Priority to CN201210436649.9A priority Critical patent/CN102981835B/en
Publication of CN102981835A publication Critical patent/CN102981835A/en
Application granted granted Critical
Publication of CN102981835B publication Critical patent/CN102981835B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Stored Programmes (AREA)

Abstract

The invention provides an android application program permanent Root permission acquiring method. The method includes the steps of editing operations where Root permission is needed, compiling the operations into an executable program document, containing the executable program document into an application program which is authorized through a one-time subscriber unit (su) program, copying the executable program document to a /system/bin directory, modifying an owner and a group of the executable program document to be a root, and setting the subscriber unit identification (suid) position. As a result, the executable program document can have the Root permission every time the executable program document is executed so as to prevent an authorized window from popping out again. Due to changes of requirements, the executable program document is likely to need upgrading. Therefore, the executable program document needs achieving a self-upgrading function so as to prevent the authorized window from popping out again when upgrading. The android application program permanent Root permission acquiring method executes various operations with the identification of the Root. Even if the application program is reinstalled and upgraded, the su program authorization operation does not need repeating again. Therefore, the android application program permanent Root permission acquiring method brings great convenience to users.

Description

Android application program forever obtains the method for Root authority
[technical field]
The present invention relates to the application program rights management techniques field on Android system, particularly relate in the Android mobile phone of a kind of Root, Android application program forever obtains the method for Root authority.
[background technology]
In Android android system, third party application carries out running with the identity of casual user, and this just makes the limited authority system of this application program, as application program to access or revise Android system file time, will the failure because of insufficient permission.The Android mobile phone had now has carried out Root setting, and this Root is the super administrator account in the class unix systems such as Linux.For Android phone, usual said Root, be exactly by various method in fact, the su program file of system is copied to/system/bin catalogue under, and SuperUser empowerment management is installed, third party application can perform by su program (su program is rights management file) operation needing Root authority.But the mobile phone of Root setting, can third party application just directly have the operation of Root authority? actually this is not so, on the mobile phone of Root, the file of a su program by name can be deposited under/system/bin catalogue, and SuperUser (empowerment management) application program is installed.Other application programs are wanted to perform with Root authority, and just must perform shell-command by su program, and now, SuperUser will eject mandate dialog box, user must click permission, and order could successfully be performed.When click allows, if do not select " remembeing " option, when so application performs shell-command by su program at every turn, all can eject the dialog box of authorizing and reminding.In addition, if application program updating, even if remembered so before to allow to operate, then when performing shell-command by su program, also again to carry out repetitive endowment by su program.
The dialog box that the mandate of ejecting in addition is reminded can bring following problem: during for the third-party application of user on an interface of mobile phone on operating handset, authorize the ejection not too large problem of frame, because now user look at mobile phone in some operation of execution, user can find to authorize dialog box eject and confirm timely, and just operation is more loaded down with trivial details.But, the operation interface of some application program no longer on mobile phone, but on pc machine, mobile phone is connected to pc machine by user, then managing mobile phone is carried out by pc machine, now, user can't go to pay close attention to mobile phone screen, so, when authorizing dialog box to eject, user just can not Timeliness coverage confirming, and because mobile phone enters screen protection, frame can be authorized to show, so just cause authorization failure.Certainly, user, when first time authorizes, can choose " remembeing " option, and next time just need not authorize again, but application program often can upgrade version, after renewal, re-starts mandate again, bring very big inconvenience to the use of user.
One " the application program method for managing dynamic permission under Android platform " is provided in prior art, see that publication number is: CN102289633A, publication date is: the Chinese patent of 2011.12.21, comprises Dynamic Selection when application program is installed and preserves its own system authority list; After installation, user revises described System Privileges table by man-machine interface Dynamic Selection; When access needs the API of authority, according to the record in the System Privileges table of this application program, Android platform judges whether that this API is disabled; When described API is disabled, whether this application program selects amendment by man-machine interface prompting user; If user selects to revise authority, Android platform allows this application program to access described API, otherwise this application program exits access.This right management method, user can as required and personal experience revise the authority of application program at any time, thus the malice access resources of application program can be prevented to a great extent, the hazardous acts such as amendment, steal personal information.If but when the application program under the method Android platform has a renewal, the rights management of this setting will be lost efficacy, also again configuration to be entered, troublesome poeration.
Here it is to be noted to be easier to understand the present invention:
1, in Linux, the problem of file permission:
File permission: each Linux file has four kinds of access rights: readable (r), (w) can be write, can (x) be performed, lack of competence (-).
Authority is classified: the owner, group membership, other users.The authority of every class can use letter representation, as rwxrwxr-x represents: namely the owner and group membership have the authority of reading and writing, execution, other users only have authority (i.e. rwx ' the owner ' rwx ' group membership reading and perform ' other users of r-x ' ').Digital representation: so-called digital representation, refer to and r, w and x are represented with 4,2,1 respectively, what do not have granted rights (-) is then 0, then authority is added, as follows: file permission is rwxr-xr-x, be converted to numeral for (421) (401) (401), after addition, be expressed as 755.
2, Linux user and grouping:
Linux is a multi-task and multi-user operating system.
Multitask: multiple foreground application and background service program macroscopically while run.
Multi-user: multiple user is login system operation simultaneously; For ensureing the privacy of user and the protection of setting up and restriction scheme.
A power user is all there is in common multi-user system, such as, root user in Linux, administrator etc. in Windows system, other users that several have different authority classification grades can be there are in system, the domestic consumer etc. such as set up by power user, Linux distribution version all requires to set up a domestic consumer when mounted mostly at present, and uses this user to log in.
3, user's group:
Can divide into groups to user, user's group can comprise multiple user, and a user also can belong to multiple grouping simultaneously.
Such as, following grouping and user is had:
Grouping group1, comprises user user1, user2
Grouping group2, comprises user user2
Create a file f by the user1 in group1 now, specify its authority to be 775, so user1 and user2 has the authority of reading and writing, execution to file f, the authority that the user2 in group2 then only reads and performs
4, the flag suid in system:
Suid is the meaning of Set User ID
If a file has been set up suid flag, can execute bit can performing on the position of (x) of possessory authority can be shown, such as:
Rwsr-xr-x represents in the possessory authority in suid and authority classification and can execute bit be set up.
The numeral that digital representation: suid is corresponding is 4, as rwsr-xr-x is just expressed as 4755
The effect of suid: allow when originally not having the user of corresponding authority to run this program, can access resource that he does not have authority to access (what namely allow some resources not have access rights has had access rights).
Such as, user user1 and user2 is had; Create an ordinary file f by user user1 now, its authority is rwxr-xr-x (755), and create an executable file r, and its authority is rwxr-xr-x (not arranging suid), now by user2 working procedure r, the validated user id (euid) of r is exactly user2, because user2 is to the unwritten authority of file f, so r program also just cannot revise file f; If be provided with the suid of file f, namely authority changes rwsr-xr-x (4755) into, now will be set to its possessory id, i.e. user1 by the euid of user2 working procedure r, r again, and also just can revise file f.
[summary of the invention]
The technical problem to be solved in the present invention, is to provide a kind of Android application program forever to obtain the method for Root authority, and when it solves application program with Root identity fill order, SuperUser repeatedly can eject the problem of authorizing and reminding.
The present invention is achieved in that a kind of Android application program forever obtains the method for Root authority, comprises the steps:
Step 1, will the operation of using Root authority in Android application program, be needed to be write by C/C++ language, and be compiled into an Android system executable program file, and the function of described executable program file energy teaching display stand upgrade function and the communication with Android application program; Executable program file is packaged in Android application program;
Step 2, under Android system judgement/system/bin catalogue under whether there is described executable program file, no, then enter step 3; Be then judge that executable program file is the need of upgrading, upgrade, then Android application program is set up with this executable program file and is communicated, and calls self-upgrade function, carries out upgrading processing, and proceed to step 8 to this executable program file; Do not upgrade, then directly enter step 8;
The su program that step 3, Android application program run Android system carries out first time mandate to operation user;
Step 4, by Android system /system catalogue carries out weight carry for can write state;
Step 5, by Android system /authority of system/bin catalogue arranges, with ensure Android application program right/catalogue of system/bin has the authority write;
Step 6, described executable program file copied to described/system/bin catalogue under, and revise the owner of this executable program file authority classification and be affiliatedly grouped into Root;
Step 7, arrange the suid flag of executable program file, after arranging suid flag, namely executable program file just with possessory identity performed by Android application program, can have the operation of Root authority;
Step 8, Android application program perform executable program file and communicate with its foundation, as long as now Android application program needs the operation of using Root authority to be undertaken performing by executable program file, carry out repetitive endowment without the need to the su program by Android system.
Tool of the present invention has the following advantages: the present invention writes needing the operation of using Root authority, and be compiled into an executable program file, this executable program file is carried out dispose, arrange, this file can be made so at every turn to perform and all to have Root authority, thus avoid again ejecting mandate frame.Due to the variation of demand, this file routine may need upgrading, therefore the file function that needs teaching display stand upgrade, to avoid needing again to eject mandate frame during renewal.The present invention performs various operation by this file with the identity of Root, even if application program is reset, upgraded, also without the need to carrying out the su program authorization operation of repetition again, brings great convenience to the use of user.
[accompanying drawing explanation]
Fig. 1 is the inventive method schematic flow sheet.
[embodiment]
As shown in Figure 1, a kind of Android application program of the present invention forever obtains the method for Root authority, comprises the steps:
Step 1, will the operation of using Root authority in Android application program, be needed to be write by C/C++ language, and be compiled into an Android system executable program file (as, the name of this executable program file is called mySu), and the function of described executable program file energy teaching display stand upgrade function and the communication with Android application program; Executable program file is packaged in Android application program;
Step 2, under Android system judgement/system/bin catalogue under whether there is described executable program file, no, then enter step 3; Be, then judge that executable program file is the need of upgrading, upgrade, then Android application program is set up with this executable program file communicate (borrowing the function having communication in executable program file and Android application program during this communication), and call self-upgrade function, upgrading processing is carried out to this executable program file, and proceeds to step 8; Do not upgrade, then directly enter step 8;
The su program that step 3, Android application program run Android system carries out first time mandate to operation user, it is specially: Android application program runs the su program of Android system, and obtain the output stream of su program, su order afterwards can directly be ordered toward output stream write and perform, and without the need to reruning su program, so just only need subscriber authorisation once, now, output stream toward su program writes an arbitrary character Command, and (this character Command is inessential order, as " id "), this character Command is mainly in order to allow the SuperUser of Android system can eject mandate dialog box, now, the SuperUser of Android system can eject mandate dialog box, operation user clicks permission, then continue to perform described step 4, operation user clicks refusal, then process ends.
Step 4, by Android system /system catalogue carries out weight carry for can write state; It is specially: toward output stream write first order of su program, by Android system /system catalogue carries out weight carry for can write state, this first order is: " mount – o remount – w – t [type] [device]/system ", wherein [type] is the file system type wanting carry, [device] is for wanting the equipment of carry, these two is /the relevant parameter of system catalogue carry, is that the shell-command by performing Android system obtains.
Step 5, by Android system /authority of system/bin catalogue arranges, with ensure Android application program right/catalogue of system/bin has the authority write; It is specially: toward output stream write second order of su program, by Android system /authority of system/bin catalogue changes 777 into, with ensure Android application program right/catalogue of system/bin has the authority write, this second order is: " chmod 777/system/bin ".
Step 6, described executable program file copied to described/system/bin catalogue under, and revise the owner of this executable program file authority classification and be affiliatedly grouped into Root; It is specially: toward output stream write the 3rd order of su program, under executable program file being copied to the catalogue of described/system/bin, 3rd order is " dd if=[fromPath] of=[toPath] ", wherein [fromPath] is the path at executable program file now place, [toPath] path for copying to, the title of namely/system/bin/ executable program file; And order toward the output stream write the 4th of su program, revise the owner of this executable program file authority classification and be affiliatedly grouped into root, 4th order is " title (be " mySu ", this title also can be replaced with other name) of chown root:root/system/bin/ executable program file ".
Step 7, arrange the suid flag of executable program file, after arranging suid flag, namely executable program file just with possessory identity performed by Android application program, can have the operation of Root authority; It is specially: toward output stream write the 5th order of su program, the suid flag of executable program file is set, and be readable execution by executable program file priority assignation, namely executable program file priority assignation is 4755, wherein " 4 " are suid flags, namely executable program file just with possessory identity performed by Android application program, can have the operation of Root authority; Such application program forever can obtain the operation of Root authority; 5th order is: " title (being " mySu ") of chmod 4755/system/bin/ executable program file ".
Step 8, Android application program perform executable program file and communicate with its foundation, as long as now Android application program needs the operation of using Root authority to be undertaken performing by executable program file, carry out repetitive endowment without the need to the su program by Android system.
Wherein, the operation of described Root authority comprises: obtain file directory, mourn in silence installation procedure and Uninstaller etc.
Here it is worth mentioning that:
The difference of carry and heavy carry, carry:
In linux system, need memory device to be mounted to certain catalogue, we normally could use in file management; The then general carry information can seeing each catalogue by performing mount order in shell, such as :/dev/block/mmcblk0p9/system ext4ro; This information represents: memory device "/dev/block/mmcblk0p9 " is mounted to/system catalogue, and its file system type is " ext4 ", and its access limit is " ro " (read-only)
Heavy carry: generally perform remount order by shell and carry out carry memory device again: such as: " mount – o remount – w – t ext4/dev/block/mmcblk0p9/system ", represent the heavy carry of general/system, its file system type is " ext4 ", its memory device is "/dev/block/mmcblk0p9 ", its access limit is "-w ", namely readablely writes.What relate in step 4 is the operation carrying out heavy carry.
In a word, the present invention performs various operation by this file with the identity of Root, even if application program is reset, upgraded, also without the need to carrying out the su program authorization operation of repetition again, brings great convenience to the use of user.
The foregoing is only preferred embodiment of the present invention, all equalizations done according to the present patent application the scope of the claims change and modify, and all should belong to covering scope of the present invention.

Claims (7)

1. Android application program forever obtains a method for Root authority, it is characterized in that: comprise the steps:
Step 1, will the operation of using Root authority in Android application program, be needed to be write by C/C++ language, and be compiled into an Android system executable program file, and the function of described executable program file energy teaching display stand upgrade function and the communication with Android application program; Executable program file packing is integrated in Android application program;
Step 2, under Android system judgement/system/bin catalogue under whether there is described executable program file, no, then enter step 3; Be then judge that executable program file is the need of upgrading, upgrade, then Android application program is set up with this executable program file and is communicated, and calls self-upgrade function, carries out upgrading processing, and proceed to step 8 to this executable program file; Do not upgrade, then directly enter step 8;
The su program that step 3, Android application program run Android system carries out first time mandate to operation user;
Step 4, by Android system /system catalogue carries out weight carry for can write state;
Step 5, by Android system /authority of system/bin catalogue arranges, with ensure Android application program right/catalogue of system/bin has the authority write;
Step 6, described executable program file copied to described/system/bin catalogue under, and revise the owner of this executable program file authority classification and be affiliatedly grouped into Root;
Step 7, arrange the suid flag of executable program file, after arranging suid flag, namely executable program file just with possessory identity performed by Android application program, can have the operation of Root authority;
Step 8, Android application program perform executable program file and communicate with its foundation, as long as now Android application program needs the operation of using Root authority to be undertaken performing by executable program file, carry out repetitive endowment without the need to the su program by Android system.
2. Android application program according to claim 1 forever obtains the method for Root authority, it is characterized in that: the operation of described Root authority comprises: obtain file directory, mourn in silence installation procedure and Uninstaller.
3. Android application program according to claim 1 forever obtains the method for Root authority, it is characterized in that: described step 3 is specially: Android application program runs the su program of Android system, and obtain the output stream of su program, su order afterwards can directly be ordered toward output stream write and perform, now, toward the output stream write one arbitrary character Command of su program, the SuperUser of Android system can eject mandate dialog box, operation user clicks permission, then continue to perform described step 4, operation user clicks refusal, then process ends.
4. Android application program according to claim 1 forever obtains the method for Root authority, it is characterized in that: described step 4 is specially: toward output stream write first order of su program, by Android system /system catalogue carries out weight carry for can write state, this first order is: " mount – o remount – w – t [type] [device]/system ", wherein [type] is the file system type wanting carry, [device] is for wanting the equipment of carry, these two is /the relevant parameter of system catalogue carry, obtained by the shell-command of execution Android system.
5. Android application program according to claim 1 forever obtains the method for Root authority, it is characterized in that: described step 5 is specially: toward output stream write second order of su program, by Android system /authority of system/bin catalogue changes 777 into, with ensure Android application program right/catalogue of system/bin has the authority write, this second order is: " chmod 777/system/bin ".
6. Android application program according to claim 1 forever obtains the method for Root authority, it is characterized in that: described step 6 is specially: toward output stream write the 3rd order of su program, under executable program file being copied to the catalogue of described/system/bin, 3rd order is " dd if=[fromPath] of=[toPath] ", wherein [fromPath] is the path at executable program file now place, [toPath] path for copying to, the title of namely/system/bin/ executable program file; And toward output stream write the 4th order of su program, revise the owner of this executable program file authority classification and be affiliatedly grouped into root, the 4th order is " title of chown root:root/system/bin/ executable program file ".
7. Android application program according to claim 1 forever obtains the method for Root authority, it is characterized in that: described step 7 is specially: toward output stream write the 5th order of su program, the suid flag of executable program file is set, and be readable execution by executable program file priority assignation, namely executable program file priority assignation is 4755, wherein " 4 " are suid flags, namely executable program file just with possessory identity performed by Android application program, can have the operation of Root authority; 5th order is: " title of chmod 4755/system/bin/ executable program file ".
CN201210436649.9A 2012-11-02 2012-11-02 Android application program permanent Root permission acquiring method Active CN102981835B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210436649.9A CN102981835B (en) 2012-11-02 2012-11-02 Android application program permanent Root permission acquiring method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210436649.9A CN102981835B (en) 2012-11-02 2012-11-02 Android application program permanent Root permission acquiring method

Publications (2)

Publication Number Publication Date
CN102981835A CN102981835A (en) 2013-03-20
CN102981835B true CN102981835B (en) 2015-06-10

Family

ID=47855900

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210436649.9A Active CN102981835B (en) 2012-11-02 2012-11-02 Android application program permanent Root permission acquiring method

Country Status (1)

Country Link
CN (1) CN102981835B (en)

Families Citing this family (43)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103198265B (en) * 2013-03-28 2017-12-05 上海斐讯数据通信技术有限公司 A kind of method for opening mobile device root authority
CN103152366B (en) * 2013-04-10 2015-12-23 魅族科技(中国)有限公司 Obtain the method for terminal authorization, terminal and server
CN103324537A (en) * 2013-05-17 2013-09-25 Tcl集团股份有限公司 Resource sharing method and device
CN103365685A (en) * 2013-06-03 2013-10-23 深圳创维无线技术有限公司 Super authority method and super authority device based on android
CN104252587B (en) * 2013-06-25 2018-04-27 腾讯科技(深圳)有限公司 Pull the method, apparatus and system of file
CN103324482A (en) * 2013-06-27 2013-09-25 苏州创智宏云信息科技有限公司 Android one-key root permission software
CN103473502A (en) * 2013-09-16 2013-12-25 惠州Tcl移动通信有限公司 Method and system for acquiring Root rights of android-based mobile terminal
CN103530534B (en) * 2013-09-23 2016-06-29 北京理工大学 A kind of Android program ROOT authorization method based on signature verification
CN104572158B (en) * 2013-10-29 2019-01-04 腾讯科技(深圳)有限公司 One kind running application program method and device with power user's identity
CN103559431A (en) * 2013-11-11 2014-02-05 北京国双科技有限公司 Detection method, device and system of Android system user permission
CN104636375B (en) 2013-11-12 2019-05-07 中兴通讯股份有限公司 A kind of automated back-up application data and the method and device restored on demand
CN103714287B (en) * 2013-12-25 2015-07-01 北京奇虎科技有限公司 Method and device for obtaining temporary Root authority
CN104809403A (en) * 2014-01-24 2015-07-29 红板凳科技股份有限公司 Root-preventing white screen method
CN103826215B (en) * 2014-02-11 2018-03-02 北京奇虎科技有限公司 A kind of method and apparatus for carrying out Root authority management on the terminal device
CN103888294B (en) * 2014-02-28 2017-10-27 广州视睿电子科技有限公司 Method and device for assigning router in Android system
CN104063303B (en) * 2014-06-30 2019-07-16 上海斐讯数据通信技术有限公司 A method of obtaining and discharge root authority
CN104134036B (en) * 2014-07-26 2017-05-10 珠海市君天电子科技有限公司 Method and device for obtaining Root permission
CN104217158A (en) * 2014-09-17 2014-12-17 青岛海信移动通信技术股份有限公司 Method for detecting system state of intelligent terminal and intelligent terminal
CN104199711B (en) * 2014-09-29 2018-02-13 北京奇虎科技有限公司 The method and apparatus for establishing root authority
CN104484611B (en) * 2014-11-10 2018-12-21 福建联迪商用设备有限公司 A kind of the subregion carry management-control method and device of android system
CN104348628A (en) * 2014-12-01 2015-02-11 北京奇虎科技有限公司 Method and device for obtaining local Root authority
CN104391729B (en) * 2014-12-19 2018-05-01 北京奇虎科技有限公司 Programme upgrade method and device based on Root authority
CN104506639A (en) * 2014-12-29 2015-04-08 北京奇虎科技有限公司 Root right acquiring method and device
CN108279855B (en) * 2015-03-05 2021-07-06 青岛海信宽带多媒体技术有限公司 Method for reading and writing storage device
CN106559546B (en) * 2015-09-28 2020-09-04 腾讯科技(深圳)有限公司 Method and device for controlling software to use network networking
CN105243325A (en) * 2015-09-29 2016-01-13 北京奇虎科技有限公司 Method for residual process file in mobile terminal, mobile terminal and server
CN105630544A (en) * 2015-12-21 2016-06-01 小米科技有限责任公司 System updating control method and apparatus as well as server device
CN106919812B (en) * 2015-12-26 2020-06-16 腾讯科技(深圳)有限公司 Application process authority management method and device
CN105956457B (en) * 2016-04-27 2018-11-13 四川秘无痕信息安全技术有限责任公司 A method of it frequently executing root authority and operates and obtain real-time results feedback
CN106529332B (en) * 2016-10-25 2019-08-13 Oppo广东移动通信有限公司 A kind of authority control method of mobile terminal, device and mobile terminal
CN106650408B (en) * 2016-12-09 2020-08-04 武汉斗鱼网络科技有限公司 Method and system for judging whether android system has root permission
CN107068150A (en) * 2017-05-03 2017-08-18 安利军 A kind of Android intelligent sounds control method and system
CN109815726A (en) * 2017-11-21 2019-05-28 中标软件有限公司 The method and its background program building method of ordinary user's modification system file
CN108595214A (en) * 2018-04-11 2018-09-28 北京海杭通讯科技有限公司 Android user versions obtain the method and system of root privileges under SELinux compulsory modes
CN108920945B (en) * 2018-05-02 2020-10-02 广州视源电子科技股份有限公司 root authority obtaining and deleting method and device, terminal equipment and storage medium
CN109271781B (en) * 2018-09-13 2020-11-17 西安交通大学 Method and system for detecting super authority obtaining behavior of application program based on kernel
CN109815680B (en) * 2018-12-27 2021-08-31 歌尔股份有限公司 Application authority management method and device, terminal equipment and storage medium
CN110457894B (en) * 2019-08-06 2021-08-03 惠州Tcl移动通信有限公司 root authority distribution method and device, storage medium and terminal equipment
CN113254916A (en) * 2021-05-25 2021-08-13 深圳市瑞驰信息技术有限公司 Implementation method of root switch of android system
CN113688377B (en) * 2021-07-27 2024-07-09 青岛中科英泰商用***股份有限公司 Root authority management method and system of Android device
CN115499420A (en) * 2022-09-14 2022-12-20 苏州龙信信息科技有限公司 Data transmission method and device, electronic equipment and storage medium
CN116702163B (en) * 2022-09-27 2024-06-21 荣耀终端有限公司 Authority management method and terminal equipment
CN115391794A (en) * 2022-10-27 2022-11-25 中孚安全技术有限公司 Method, system and equipment for adding permission in application program starting process

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030028508A1 (en) * 2001-08-06 2003-02-06 Joseph Quinlan Method and apparatus for controlling the performance of a file system mount operation by a user lacking superuser authority
CN102289633A (en) * 2011-09-02 2011-12-21 广东欧珀移动通信有限公司 Method for managing dynamic permission of application program under Android platform

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030028508A1 (en) * 2001-08-06 2003-02-06 Joseph Quinlan Method and apparatus for controlling the performance of a file system mount operation by a user lacking superuser authority
CN102289633A (en) * 2011-09-02 2011-12-21 广东欧珀移动通信有限公司 Method for managing dynamic permission of application program under Android platform

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
AIY_YA.HTTP://BLOG.SINA.COM.ZH/S/BLOG_9659CD4201018UJX.HTML.《ANDROID ROOT权限获取原理详解》.2012, *
COLIN.HTTP://WWW.360DOC.COM/CONTENT/11/1220/00/4165_173524951.SHTML.《ANDROID ROOT权限破解原理分析》.2011, *
浅析Android平台ROOT权限;姜颖韬;《科技经济市场》;20111031(第10期);全文 *

Also Published As

Publication number Publication date
CN102981835A (en) 2013-03-20

Similar Documents

Publication Publication Date Title
CN102981835B (en) Android application program permanent Root permission acquiring method
US9075955B2 (en) Managing permission settings applied to applications
CN103544447B (en) A kind of method preventing confidential information from revealing based on Android system and terminal
DE112012001389T5 (en) Secure execution of an unsecured app on a device
CN109829286B (en) User authority management system and method for WEB application
CN103905651A (en) Method and system for application permission management in intelligent terminal
CN104156660B (en) A kind of Android authority fine-grained access control method based on running environment state
CN103870306A (en) Method and device for installing application program on basis of intelligent terminal equipment
CN105046146A (en) Resource access method of Android system
US11743295B2 (en) Methods and apparatus to provide resource security
CN104267982A (en) Application program start control system and method
Elkhodary et al. A survey of approaches to adaptive application security
CN103455520A (en) Method and device for accessing Android database
CN106169042A (en) The method and device of administration authority
CN105205413A (en) Data protecting method and device
JP2004158007A (en) Computer access authorization
CN105373714B (en) A kind of user authority control method and device
CN104281803A (en) System permission management method and equipment
CA2830880C (en) Managing permission settings applied to applications
CN111651738A (en) Fine-grained role authority unified management method based on front-end and back-end separation framework and electronic device
CN103763370B (en) A kind of method, system and device for changing mobile terminal workspace screen-lock password
CN105868639A (en) Kernel vulnerability repair method and device
CN103906045B (en) A kind of monitoring method and system of mobile terminal privacy taking and carring away
CN105786551A (en) Application program operation access control method and system
CN103885784A (en) Method for establishing Android platform with security module and plugging function

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C41 Transfer of patent application or patent right or utility model
TR01 Transfer of patent right

Effective date of registration: 20160106

Address after: 100000, No. two, building 17, Zhongguancun Software Park, 8 northeast Wang Xi Road, Beijing, Haidian District, A2

Patentee after: BAIDU.COM TIMES TECHNOLOGY (BEIJING) Co.,Ltd.

Address before: 350000, 403A building, four floor, Torch Innovation Building, 8 star road, Fuzhou Development Zone, Fuzhou, Fujian, China

Patentee before: Fuzhou Boyuan Wireless Network Technology Co., Ltd.