技术领域technical field
本发明涉及智能设备的系统权限管理控制技术领域,尤其涉及一种root权限获取方法、装置、终端设备及存储介质。The present invention relates to the technical field of system authority management and control of smart devices, in particular to a root authority acquisition method, device, terminal equipment and storage medium.
背景技术Background technique
众所周知,root权限是指Android类操作系统(包括Linux、Unix)的系统管理员权限,类似于Windows系统中的Administrator权限;root权限可以访问和修改用户的移动设备中几乎所有的文件。As we all know, root authority refers to the system administrator authority of Android operating system (including Linux, Unix), similar to the Administrator authority in Windows system; root authority can access and modify almost all files in the user's mobile device.
因此,目前移动终端系统对于root权限的管理是非常严格的,通常情况下多数应用或程序都不具备root权限,用户为了方便对系统进行修改或安装部分第三方应用程序,一般都是借助于一些root工具来对终端的操作系统进行root,这些root工具的原理基本都是利用一些安全漏洞,获取到最高权限,即在操作系统中加入一个任何用户都可以获取root权限的su(Switch User切换用户)程序,任意应用程序都可以通过调用该su程序来获得root权限。Therefore, the current mobile terminal system is very strict about the management of root privileges. Usually, most applications or programs do not have root privileges. In order to facilitate the modification of the system or install some third-party applications, users generally rely on some The root tool is used to root the operating system of the terminal. The principle of these root tools is to use some security holes to obtain the highest authority, that is, to add a su (Switch User switch user) to the operating system that any user can obtain root authority. ) program, any application program can obtain root authority by calling the su program.
可见,在现有root方案中,一旦对操作系统成功root之后,任意用户或应用程序都可以对系统的任意资源进行读、写、删等操作,给系统带来了一定的安全隐患。It can be seen that in the existing root solution, once the operating system is successfully rooted, any user or application can perform operations such as reading, writing, and deleting any resource of the system, which brings certain security risks to the system.
发明内容Contents of the invention
本发明实施例提供一种root权限获取方法、装置、终端设备及存储介质,能有效解决现有技术在获取root权限后,暴露系统的最高权限,给系统带来安全隐患的技术问题。Embodiments of the present invention provide a method, device, terminal device, and storage medium for obtaining root authority, which can effectively solve the technical problem of exposing the highest authority of the system after obtaining root authority in the prior art and bringing security risks to the system.
本发明一实施例提供一种root权限获取方法,包括:An embodiment of the present invention provides a method for obtaining root authority, including:
响应root权限获取请求指令,调用预先添加至系统中的获取root权限修改程序,以对系统发起root权限请求;其中,所述获取root权限修改程序为在获取root权限程序的基础上,设置限制获取root权限的预设传递参数和添加传递参数检测和判断机制的程序;In response to the root authority acquisition request instruction, call the root authority modification program pre-added to the system to initiate a root authority request to the system; wherein, the root authority modification program is based on obtaining the root authority program and setting restrictions The default transfer parameters of root authority and the program of adding transfer parameter detection and judgment mechanism;
根据所述获取root权限修改程序检测所述对系统发起root权限请求后是否有输入传递参数;Whether there is input transmission parameter after the said root authority request is initiated to the system according to the root authority modification program detection;
如果检测到有输入传递参数,则判断所述传递参数是否与预设传递参数一致,如果所述传递参数与所述预设传递参数一致,则root权限获取成功,如果所述传递参数与所述预设传递参数不一致,root权限获取失败。If it is detected that there is an input transfer parameter, it is judged whether the transfer parameter is consistent with the preset transfer parameter, if the transfer parameter is consistent with the preset transfer parameter, the root authority is obtained successfully, if the transfer parameter is consistent with the The parameters passed by default are inconsistent, and the root permission fails to be obtained.
与现有技术相比,本发明实施例公开的root权限获取方法,所述获取root权限修改程序为在获取root权限程序的基础上,设置限制获取root权限的预设传递参数和添加传递参数检测和判断机制的程序;使得应用程序在调用该获取root权限修改程序对系统进行root权限请求时,需要通过检测是否有传递参数的输入并判断输入的传递参数是否与所述预设传递参数一致,只有输入的传递参数与所述预设传递参数一致,才能相应地获得root权限。即只有知道该预设传递参数的用户才能使应用程序获得系统的root权限,从而防止了在系统中添加获取root权限程序来获得root权限后,任意应用程序都可以通过调用该获取root权限程序来获得root权限。因此,能够有效解决现有技术在获取root权限后,暴露系统的最高权限,给系统带来安全隐患的技术问题。Compared with the prior art, in the method for acquiring root authority disclosed in the embodiment of the present invention, the modification program for obtaining root authority is based on the procedure for obtaining root authority, setting preset transmission parameters that limit the acquisition of root authority and adding transmission parameter detection and a program of judging mechanism; so that when the application program calls the root permission modification program to request the system for root permission, it needs to detect whether there is an input of a transmission parameter and judge whether the input transmission parameter is consistent with the preset transmission parameter, Only when the input transfer parameters are consistent with the preset transfer parameters can the corresponding root authority be obtained. That is, only users who know the parameters passed by the preset can enable the application program to obtain the root authority of the system, thus preventing any application program from calling the root authority program to obtain the root authority after adding the root authority program to the system. Get root privileges. Therefore, it can effectively solve the technical problem that the highest authority of the system is exposed after obtaining the root authority in the prior art, which brings security risks to the system.
优选地,所述获取root权限程序为获取root权限的su程序。Preferably, the program for obtaining root authority is an su program for obtaining root authority.
优选地,所述获取root权限修改程序预先添加到系统指定目录下。Preferably, the modifying program for obtaining root authority is pre-added to the specified directory of the system.
优选地,所述指定目录为“/system/bin”或“/system/xbin/”。Preferably, the specified directory is "/system/bin" or "/system/xbin/".
优选地,所述预设传递参数为数字、字符串或数字与字符串的组合。Preferably, the preset delivery parameters are numbers, character strings or a combination of numbers and character strings.
优选地,所述预设传递参数为厂商服务器上的配置参数。Preferably, the preset delivery parameters are configuration parameters on the manufacturer's server.
本发明另一实施例对应提供了一种root权限获取装置,包括:Another embodiment of the present invention provides a device for obtaining root authority correspondingly, including:
权限请求单元,用以响应root权限获取请求指令,调用预先添加至系统中的获取root权限修改程序,以对系统发起root权限请求;The authority request unit is used to respond to the root authority acquisition request instruction, and calls the root authority modification program pre-added to the system to initiate a root authority request to the system;
参数检测单元,用以根据所述获取root权限修改程序检测所述对系统发起root权限请求后是否有输入传递参数;A parameter detection unit, used to detect whether there is an input transmission parameter after the root authority request is initiated to the system according to the modification program for obtaining root authority;
权限判定单元,用以如果检测到有输入传递参数,则判断所述传递参数是否与预设传递参数一致,如果所述传递参数与所述预设传递参数一致,则root权限获取成功,如果所述传递参数与所述预设传递参数不一致,root权限获取失败;The authority judging unit is used to determine whether the transmission parameter is consistent with the preset transmission parameter if it is detected that there is an input transmission parameter. If the transmission parameter is consistent with the preset transmission parameter, the root authority is obtained successfully. If the The above transfer parameters are inconsistent with the preset transfer parameters, and root permission acquisition fails;
其中,所述获取root权限修改程序为在获取root权限程序的基础上,设置限制获取root权限的预设传递参数和传递参数检测和判断机制的程序。Wherein, the modifying program for obtaining root authority is a program for setting preset transmission parameters and transmission parameter detection and judging mechanisms for restricting the acquisition of root authority on the basis of the root authority acquisition program.
与现有技术相比,本发明实施例公开的root权限获取装置通过调用获取root权限修改程序对系统进行root权限请求时,需要通过检测是否有传递参数的输入并判断输入的传递参数是否与所述预设传递参数一致,只有输入的传递参数与所述预设传递参数一致,才能相应地获得root权限,从而防止了在系统中添加获取root权限程序来获得root权限后,任意应用程序都可以通过调用该获取root权限程序来获得root权限,能够有效解决现有技术在获取root权限后,暴露系统的最高权限,给系统带来安全隐患的技术问题。Compared with the prior art, when the device for obtaining root authority disclosed in the embodiment of the present invention requests the system for root authority by calling the root authority modification program, it needs to detect whether there is an input of a transmission parameter and determine whether the input transmission parameter is consistent with the required The above preset transfer parameters are the same, and only the input transfer parameters are consistent with the preset transfer parameters, and the root authority can be obtained accordingly, thus preventing any application program from adding the root authority program to the system to obtain the root authority. Obtaining the root authority by invoking the program for obtaining the root authority can effectively solve the technical problem of exposing the highest authority of the system after obtaining the root authority and bringing security risks to the system in the prior art.
本发明另一实施例提供了一种终端设备,包括处理器、存储器以及存储在所述存储器中且被配置为由所述处理器执行的计算机程序,所述处理器执行所述计算机程序时实现上述发明实施例所述的root权限获取方法。Another embodiment of the present invention provides a terminal device, including a processor, a memory, and a computer program stored in the memory and configured to be executed by the processor. When the processor executes the computer program, the The method for obtaining root authority described in the embodiment of the invention above.
本发明另一实施例提供了一种存储介质,所述存储介质包括存储的计算机程序,其中,在所述计算机程序运行时控制所述存储介质所在设备执行上述发明实施例所述的root权限获取方法。Another embodiment of the present invention provides a storage medium, the storage medium includes a stored computer program, wherein, when the computer program is running, the device where the storage medium is located is controlled to perform the root authority acquisition described in the above-mentioned embodiments of the invention method.
附图说明Description of drawings
图1是本发明第一实施例提供的一种root权限获取方法的流程示意图。Fig. 1 is a schematic flowchart of a method for obtaining root authority provided by the first embodiment of the present invention.
图2是本发明第二实施例提供的一种root权限获取装置的结构示意图。Fig. 2 is a schematic structural diagram of a device for obtaining root authority provided by a second embodiment of the present invention.
具体实施方式Detailed ways
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.
参见图1,是本发明第一实施例提供的一种root权限获取方法的流程示意图,包括:Referring to FIG. 1, it is a schematic flow diagram of a method for obtaining root authority provided by the first embodiment of the present invention, including:
S101、响应root权限获取请求指令,调用预先添加至系统中的获取root权限修改程序,以对系统发起root权限请求。S101. Responding to the root permission acquisition request instruction, call a root permission modification program pre-added to the system to initiate a root permission request to the system.
在本实施例中,所述系统为Android系统、Linux系统、Unix系统等,但不局限于此。In this embodiment, the system is an Android system, a Linux system, a Unix system, etc., but it is not limited thereto.
在本实施例中,所述获取root权限修改程序为对获取root权限的su程序的代码进行修改,添加限制应用程序获得root权限的预设传递参数和传递参数检测及判断机制的程序。所述获取root权限修改程序预先添加至系统的指定目录下,所述指定目录为“/system/bin”或“/system/xbin/”。In this embodiment, the modifying program for obtaining root authority is to modify the code of the su program for obtaining root authority, and add a preset transmission parameter and a transmission parameter detection and judgment mechanism that restrict the application program from obtaining root authority. The modifying program for obtaining root authority is pre-added to a specified directory of the system, and the specified directory is "/system/bin" or "/system/xbin/".
S102、根据所述获取root权限修改程序检测所述对系统发起root权限请求后是否有输入传递参数。S102. Detect whether there is an input transfer parameter after the root authority request is initiated to the system according to the modifying program for obtaining root authority.
具体地,运行所述获取root权限修改程序,所述获取root权限修改程序的传递参数检测机制会检测在需要获取root权限判断的地方是否有传递参数的输入,如果没有,则获取root权限修改程序运行结束,root权限获取失败。如果所述获取root权限修改程序的传递参数检测机制检测到在需要获取root权限判断的地方有传递参数的输入,则执行步骤S103。Specifically, run the modified program for obtaining root privileges, the transmission parameter detection mechanism of the modified program for obtaining root privileges can detect whether there is an input of transmission parameters at the place where root privileges need to be judged, if not, then obtain the modified program for root privileges At the end of the operation, the acquisition of root permissions failed. If the transfer parameter detection mechanism of the modifying program for obtaining root authority detects that there is an input of a transfer parameter at a place where root authority needs to be determined, step S103 is executed.
在本实施例中,所述预设传递参数可为多种形式,例如,所述预设传递参数为数字、字符串或数字与字符串的组合、或所述预设传递参数为厂商服务器上的配置参数。In this embodiment, the preset delivery parameters can be in various forms, for example, the preset delivery parameters are numbers, character strings or a combination of numbers and character strings, or the preset delivery parameters are configuration parameters.
S103、如果检测到有输入传递参数,则判断所述传递参数是否与预设传递参数一致,如果所述传递参数与所述预设传递参数一致,则root权限获取成功,如果所述传递参数与所述预设传递参数不一致,root权限获取失败。S103. If it is detected that there is an input transfer parameter, then judge whether the transfer parameter is consistent with the preset transfer parameter, if the transfer parameter is consistent with the preset transfer parameter, then the root authority is obtained successfully, if the transfer parameter is consistent with the preset transfer parameter The preset transfer parameters are inconsistent, and root permission acquisition fails.
具体地,如果所述获取root权限修改程序检测到在需要使用root权限判断的地方有传递参数的输入,所述获取root权限修改程序继续运行,判断所述输入的传递参数与系统中预设传递参数是否一致,如果所述输入的传递参数与所述预设传递参数不一致,则,所述获取root权限修改程序运行结束,root权限获取失败;如果所述输入的传递参数与所述预设传递参数一致,则所述获取root权限修改程序继续运行直到root权限获取成功,获取root权限的应用程序便可执行相应的root权限操作。Specifically, if the modification program for obtaining root authority detects that there is an input of a transmission parameter at a place where root authority judgment is required, the modification program for obtaining root authority continues to run, and judges that the input transmission parameter is consistent with the preset transmission in the system. Whether the parameters are consistent, if the input transfer parameters are inconsistent with the preset transfer parameters, then the modification program for obtaining root privileges ends, and the acquisition of root privileges fails; if the input transfer parameters are inconsistent with the preset transfer parameters If the parameters are the same, the modifying program for acquiring the root authority continues to run until the root authority is obtained successfully, and the application program that acquires the root authority can execute the corresponding root authority operation.
与现有技术相比,本发明实施例所述root权限获取方法,所述获取root权限修改程序为在获取root权限的su程序的基础上,设置限制获取root权限的预设传递参数和添加传递参数检测和判断机制的程序;使得应用程序在调用该获取root权限修改程序对系统进行root权限请求时,需要通过检测是否有传递参数的输入并判断输入的传递参数是否与所述预设传递参数一致,只有输入的传递参数与所述预设传递参数一致,才能相应地获得root权限。即只有知道该预设传递参数的用户才能使应用程序获得系统的root权限,并且每次获取root权限都需要进行传递参数的检测和判断,从而防止了在系统中添加获取root权限程序来获得root权限后,任意应用程序都可以通过调用该获取root权限程序来获得root权限。因此,能够有效解决现有技术在获取root权限后,暴露系统的最高权限,给系统带来安全隐患的技术问题。Compared with the prior art, in the method for acquiring root authority described in the embodiments of the present invention, the modification program for obtaining root authority is based on the su program for obtaining root authority, setting the preset transmission parameters and adding transmission that limit the acquisition of root authority The program of the parameter detection and judgment mechanism; when the application program calls the root authority modification program to request the system for root authority, it needs to detect whether there is an input of the transmission parameter and judge whether the input transmission parameter is consistent with the preset transmission parameter Consistent, only when the input transfer parameters are consistent with the preset transfer parameters, can the corresponding root authority be obtained. That is, only users who know the preset transfer parameters can enable the application to obtain the root privilege of the system, and each time the root privilege is obtained, the detection and judgment of the transfer parameters are required, thus preventing the addition of a root privilege program to the system to obtain root After obtaining the permission, any application program can obtain the root permission by calling the procedure for obtaining the root permission. Therefore, it can effectively solve the technical problem that the highest authority of the system is exposed after obtaining the root authority in the prior art, which brings security risks to the system.
本发明第二实施例提供了一种root权限获取装置200,包括:The second embodiment of the present invention provides a root authority acquisition device 200, including:
权限请求单元201,用以响应root权限获取请求指令,调用预先添加至系统中的获取root权限修改程序,以对系统发起root权限请求;The authority request unit 201 is used to respond to the root authority acquisition request instruction, and call the root authority modification program pre-added to the system to initiate a root authority request to the system;
参数检测单元202,用以根据所述获取root权限修改程序检测所述对系统发起root权限请求后是否有输入传递参数;The parameter detection unit 202 is used to detect whether there is an input transmission parameter after the root authority request is initiated to the system according to the root authority modification program;
权限判定单元203,用以当检测到有输入传递参数,则判断所述传递参数是否与预设传递参数一致,如果所述传递参数与所述预设传递参数一致,则root权限获取成功,如果所述传递参数与所述预设传递参数不一致,root权限获取失败;The authority determination unit 203 is used to determine whether the transmission parameter is consistent with the preset transmission parameter when it is detected that there is an input transmission parameter. If the transmission parameter is consistent with the preset transmission parameter, the root authority is obtained successfully. If The transfer parameters are inconsistent with the preset transfer parameters, and the acquisition of root authority fails;
其中,所述获取root权限修改程序为在获取root权限程序的基础上,设置限制获取root权限的预设传递参数和传递参数检测和判断机制的程序。Wherein, the modifying program for obtaining root authority is a program for setting preset transmission parameters and transmission parameter detection and judging mechanisms for restricting the acquisition of root authority on the basis of the root authority acquisition program.
在本实施例中,所述获取root权限程序为获取root权限的su程序,所述获取root权限修改程序预先添加至系统的指定目录下,所述指定目录为“/system/bin”或“/system/xbin/”。In this embodiment, the program for obtaining root authority is the su program for obtaining root authority, and the modification program for obtaining root authority is pre-added to a specified directory of the system, and the specified directory is "/system/bin" or "/ system/xbin/".
在本实施例中,所述预设传递参数为预先对su程序进行修改而设置的,用以限制root权限的获取;所述预设传递参数可为多种形式,例如,所述预设传递参数为数字、字符串或数字与字符串的组合、或所述预设传递参数为厂商服务器上的配置参数。In this embodiment, the preset transfer parameters are set to modify the su program in advance to limit the acquisition of root authority; the preset transfer parameters can be in various forms, for example, the preset transfer The parameter is a number, a character string or a combination of a number and a character string, or the preset transfer parameter is a configuration parameter on the manufacturer's server.
与现有技术相比,本发明实施例公开的root权限获取装置在调用获取root权限修改程序对系统进行root权限请求时,需要通过检测是否有传递参数的输入并判断输入的传递参数是否与所述预设传递参数一致,只有输入的传递参数与所述预设传递参数一致,才能相应地获得root权限,从而防止了通过在系统中添加su程序来获得root权限后,任意应用程序都可以通过调用该su程序来获得root权限。因此,能够有效解决现有技术在获取root权限后,暴露系统的最高权限,给系统带来安全隐患的技术问题。Compared with the prior art, when the device for obtaining root authority disclosed in the embodiment of the present invention invokes the root authority modification program to request the system for root authority, it needs to detect whether there is an input of a transfer parameter and judge whether the input transfer parameter is consistent with the required value. The above preset transfer parameters are the same, and only the input transfer parameters are consistent with the preset transfer parameters, and the root authority can be obtained accordingly, thus preventing any application program from being able to obtain the root authority by adding the su program in the system. Call the su program to gain root privileges. Therefore, it can effectively solve the technical problem that the highest authority of the system is exposed after obtaining the root authority in the prior art, which brings security risks to the system.
本发明第三实施例提供了一种终端设备,包括处理器、存储器以及存储在所述存储器中且被配置为由所述处理器执行的计算机程序,所述处理器执行所述计算机程序时实现上述发明实施例所述的root权限获取方法。A third embodiment of the present invention provides a terminal device, including a processor, a memory, and a computer program stored in the memory and configured to be executed by the processor. When the processor executes the computer program, the The method for obtaining root authority described in the embodiment of the invention above.
本发明第四实施例提供了一种存储介质,所述存储介质包括存储的计算机程序,其中,在所述计算机程序运行时控制所述存储介质所在设备执行上述发明实施例所述的root权限获取方法。The fourth embodiment of the present invention provides a storage medium, the storage medium includes a stored computer program, wherein when the computer program is running, the device where the storage medium is located is controlled to perform the root authority acquisition described in the above-mentioned embodiments of the invention method.
示例性的,第三及第四实施例中,所述计算机程序可以被分割成一个或多个模块/单元,所述一个或者多个模块/单元被存储在所述存储器中,并由所述处理器执行,以完成本发明。所述一个或多个模块/单元可以是能够完成特定功能的一系列计算机程序指令段,该指令段用于描述所述计算机程序在所述终端中的执行过程。Exemplarily, in the third and fourth embodiments, the computer program can be divided into one or more modules/units, and the one or more modules/units are stored in the memory, and the The processor executes to complete the present invention. The one or more modules/units may be a series of computer program instruction segments capable of accomplishing specific functions, and the instruction segments are used to describe the execution process of the computer program in the terminal.
所称处理器可以是中央处理单元(Central Processing Unit,CPU),还可以是其他通用处理器、数字信号处理器(Digital Signal Processor,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、现成可编程门阵列(Field-Programmable Gate Array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等,所述处理器是所述终端的控制中心,利用各种接口和线路连接整个终端的各个部分。The so-called processor can be a central processing unit (Central Processing Unit, CPU), and can also be other general-purpose processors, digital signal processors (Digital Signal Processor, DSP), application specific integrated circuits (Application Specific Integrated Circuit, ASIC), off-the-shelf Programmable gate array (Field-Programmable Gate Array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, etc. The general-purpose processor may be a microprocessor or any conventional processor, etc. The processor is the control center of the terminal, and various interfaces and lines are used to connect various parts of the entire terminal.
所述存储器可用于存储所述计算机程序和/或模块,所述处理器通过运行或执行存储在所述存储器内的计算机程序和/或模块,以及调用存储在存储器内的数据,实现所述终端设备的各种功能。所述存储器可主要包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需的应用程序(比如声音播放功能、图像播放功能等)等;存储数据区可存储根据手机的使用所创建的数据(比如音频数据、电话本等)等。此外,存储器可以包括高速随机存取存储器,还可以包括非易失性存储器,例如硬盘、内存、插接式硬盘,智能存储卡(Smart Media Card,SMC),安全数字(Secure Digital,SD)卡,闪存卡(Flash Card)、至少一个磁盘存储器件、闪存器件、或其他易失性固态存储器件。The memory can be used to store the computer programs and/or modules, and the processor implements the terminal by running or executing the computer programs and/or modules stored in the memory and calling the data stored in the memory various functions of the device. The memory may mainly include a program storage area and a data storage area, wherein the program storage area may store an operating system, at least one application program required by a function (such as a sound playback function, an image playback function, etc.) and the like; the storage data area may store Data created based on the use of the mobile phone (such as audio data, phonebook, etc.), etc. In addition, the memory may include high-speed random access memory, and may also include non-volatile memory, such as hard disk, internal memory, plug-in hard disk, smart memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card , a flash memory card (Flash Card), at least one magnetic disk storage device, flash memory device, or other volatile solid-state storage devices.
其中,所述终端集成的模块/单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本发明实现上述实施例方法中的全部或部分流程,也可以通过计算机程序来指令相关的硬件来完成,所述的计算机程序可存储于一计算机可读存储介质中,该计算机程序在被处理器执行时,可实现上述各个方法实施例的步骤。其中,所述计算机程序包括计算机程序代码,所述计算机程序代码可以为源代码形式、对象代码形式、可执行文件或某些中间形式等。所述计算机可读介质可以包括:能够携带所述计算机程序代码的任何实体或装置、记录介质、U盘、移动硬盘、磁碟、光盘、计算机存储器、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、电载波信号、电信信号以及软件分发介质等。Wherein, if the terminal integrated module/unit is implemented in the form of a software function unit and sold or used as an independent product, it can be stored in a computer-readable storage medium. Based on this understanding, the present invention realizes all or part of the processes in the methods of the above embodiments, and can also be completed by instructing related hardware through a computer program. The computer program can be stored in a computer-readable storage medium, and the computer When the program is executed by the processor, the steps in the above-mentioned various method embodiments can be realized. Wherein, the computer program includes computer program code, and the computer program code may be in the form of source code, object code, executable file or some intermediate form. The computer-readable medium may include: any entity or device capable of carrying the computer program code, a recording medium, a U disk, a removable hard disk, a magnetic disk, an optical disk, a computer memory, and a read-only memory (ROM, Read-Only Memory) , Random Access Memory (RAM, Random Access Memory), electrical carrier signal, telecommunication signal, and software distribution medium, etc.
需说明的是,以上所描述的装置实施例仅仅是示意性的,其中所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部模块来实现本实施例方案的目的。另外,本发明提供的装置实施例附图中,模块之间的连接关系表示它们之间具有通信连接,具体可以实现为一条或多条通信总线或信号线。本领域普通技术人员在不付出创造性劳动的情况下,即可以理解并实施。It should be noted that the device embodiments described above are only illustrative, and the units described as separate components may or may not be physically separated, and the components shown as units may or may not be physically separated. A unit can be located in one place, or it can be distributed to multiple network units. Part or all of the modules can be selected according to actual needs to achieve the purpose of the solution of this embodiment. In addition, in the drawings of the device embodiments provided by the present invention, the connection relationship between the modules indicates that they have a communication connection, which can be specifically implemented as one or more communication buses or signal lines. It can be understood and implemented by those skilled in the art without creative effort.
以上所述是本发明的优选实施方式,应当指出,对于本技术领域的普通技术人员来说,在不脱离本发明原理的前提下,还可以做出若干改进和润饰,这些改进和润饰也视为本发明的保护范围。The above description is a preferred embodiment of the present invention, and it should be pointed out that for those skilled in the art, without departing from the principle of the present invention, some improvements and modifications can also be made, and these improvements and modifications are also considered Be the protection scope of the present invention.
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201810413965.1ACN108846281A (en) | 2018-05-02 | 2018-05-02 | root permission obtaining method and device, terminal equipment and storage medium |
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201810413965.1ACN108846281A (en) | 2018-05-02 | 2018-05-02 | root permission obtaining method and device, terminal equipment and storage medium |
| Publication Number | Publication Date |
|---|---|
| CN108846281Atrue CN108846281A (en) | 2018-11-20 |
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201810413965.1APendingCN108846281A (en) | 2018-05-02 | 2018-05-02 | root permission obtaining method and device, terminal equipment and storage medium |
| Country | Link |
|---|---|
| CN (1) | CN108846281A (en) |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN109657448A (en)* | 2018-12-21 | 2019-04-19 | 惠州Tcl移动通信有限公司 | A kind of method, apparatus, electronic equipment and storage medium obtaining Root authority |
| CN110855832A (en)* | 2019-11-11 | 2020-02-28 | 诺百爱(杭州)科技有限责任公司 | Method and device for assisting call and electronic equipment |
| CN114372256A (en)* | 2022-01-07 | 2022-04-19 | 北京百度网讯科技有限公司 | Application program running method, device, equipment and storage medium |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN103473502A (en)* | 2013-09-16 | 2013-12-25 | 惠州Tcl移动通信有限公司 | Method and system for acquiring Root rights of android-based mobile terminal |
| CN107392010A (en)* | 2017-06-19 | 2017-11-24 | 阿里巴巴集团控股有限公司 | Perform method and device, terminal device, the storage medium of Root operations |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN103473502A (en)* | 2013-09-16 | 2013-12-25 | 惠州Tcl移动通信有限公司 | Method and system for acquiring Root rights of android-based mobile terminal |
| CN107392010A (en)* | 2017-06-19 | 2017-11-24 | 阿里巴巴集团控股有限公司 | Perform method and device, terminal device, the storage medium of Root operations |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN109657448A (en)* | 2018-12-21 | 2019-04-19 | 惠州Tcl移动通信有限公司 | A kind of method, apparatus, electronic equipment and storage medium obtaining Root authority |
| CN110855832A (en)* | 2019-11-11 | 2020-02-28 | 诺百爱(杭州)科技有限责任公司 | Method and device for assisting call and electronic equipment |
| CN114372256A (en)* | 2022-01-07 | 2022-04-19 | 北京百度网讯科技有限公司 | Application program running method, device, equipment and storage medium |
| Publication | Publication Date | Title |
|---|---|---|
| US11689575B2 (en) | Network access by applications in an enterprise managed device system | |
| CN107622203B (en) | Sensitive information protection method, device, storage medium and electronic device | |
| CN108427649B (en) | Access management method, terminal device, system and storage medium of USB interface | |
| US9235584B2 (en) | Self-removal of enterprise app data | |
| CN111919198B (en) | Kernel function callback method and system | |
| CN108804938B (en) | Authority detection method and device, electronic equipment and readable storage medium | |
| CN108920945B (en) | Method, device, terminal device and storage medium for obtaining and deleting root authority | |
| CN113836529B (en) | Process detection method, device, storage medium and computer equipment | |
| CN113312669B (en) | Password synchronization method, device and storage medium | |
| CA2959574C (en) | Access control system and access control method | |
| US20240211601A1 (en) | Firmware policy enforcement via a security processor | |
| CN108846281A (en) | root permission obtaining method and device, terminal equipment and storage medium | |
| WO2022078366A1 (en) | Application protection method and apparatus, device and medium | |
| WO2019161582A1 (en) | Mobile storage device and encryption method and apparatus therefor | |
| US9942267B1 (en) | Endpoint segregation to prevent scripting attacks | |
| US12067121B2 (en) | Trusted boot method and apparatus, electronic device, and readable storage medium | |
| CN111506549B (en) | Block chain-based file processing system, method, device and storage medium | |
| WO2018233549A1 (en) | Payment application management method, device and mobile terminal | |
| CN108776633A (en) | Method, terminal device and the computer readable storage medium of monitoring process operation | |
| CN119317916A (en) | Network-aware endpoint data loss prevention for web transactions | |
| CN113946854B (en) | File access control method and device and computer readable storage medium | |
| CN114861160A (en) | Method and device, device, and storage medium for enhancing authority of non-administrator account | |
| CN109784041B (en) | Event processing method and device, storage medium and electronic device | |
| CN111783082A (en) | Process tracing method, device, terminal and computer-readable storage medium | |
| US10044728B1 (en) | Endpoint segregation to prevent scripting attacks |
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| RJ01 | Rejection of invention patent application after publication | Application publication date:20181120 | |
| RJ01 | Rejection of invention patent application after publication |