会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Method, apparatus, and system for managing mobile communication devices
    • 用于管理移动通信设备的方法,装置和系统
    • US08588194B2
    • 2013-11-19
    • US12832135
    • 2010-07-08
    • Shuhua Chen
    • Shuhua Chen
    • H04W4/00
    • H04L41/08H04L67/125H04L69/08
    • A method for managing mobile communications devices includes: receiving a management instruction delivered by an ACS through a TR069 protocol; converting the management instruction into a command identifiable to a mobile communications device, and sending the identifiable command to the mobile communications device; receiving a response instruction sent by the mobile communications device after the mobile communications device executes the identifiable command; and encapsulating the response instruction into a TR069 response message, and sending the message to the ACS. Through the method and apparatus for managing mobile communications devices, a management instruction is converted into a command identifiable to the mobile communications device; the mobile communications device executes the relevant operations according to the instruction and implements the relevant services, thus implementing unified management for mobile communications devices.
    • 一种用于管理移动通信设备的方法包括:通过TR069协议接收由ACS发送的管理指令; 将所述管理指令转换成可识别为移动通信设备的命令,以及向所述移动通信设备发送所述可识别命令; 在所述移动通信设备执行所述可识别命令之后,接收由所述移动通信设备发送的响应指令; 并将响应指令封装到TR069响应消息中,并将消息发送到ACS。 通过用于管理移动通信设备的方法和装置,将管理指令转换成可识别到移动通信设备的命令; 移动通信设备根据指令执行相关操作,实现相关业务,实现移动通信设备的统一管理。
    • 3. 发明授权
    • Secured application package files for mobile computing devices
    • 用于移动计算设备的安全应用程序包文件
    • US08892876B1
    • 2014-11-18
    • US13451807
    • 2012-04-20
    • Zhentao HuangShuhua ChenYinfeng Qiu
    • Zhentao HuangShuhua ChenYinfeng Qiu
    • G06F21/00G06F21/62
    • G06F21/6218G06F21/6209
    • An ANDROID application package (APK) file for an application is repackaged into a secured APK file to protect a Dalvik executable (DEX) file of the application. The DEX file is encrypted to generate an encrypted DEX file that is included in the secured APK file along with a stub DEX file. The secured APK file is received in a mobile computing device where the stub DEX file is started to start a wrapper Activity. The wrapper Activity replaces an APK class loader of a mobile operating system of the mobile computing device with a decryptor class loader. The decryptor class loader decrypts the encrypted DEX file to recover the DEX file, and loads classes of the DEX file into a Dalvik virtual machine. The original Activity of the application is then started to provide the functionality of the application in the mobile computing device.
    • 应用程序的ANDROID应用程序包(APK)文件被重新打包到安全的APK文件中,以保护应用程序的Dalvik可执行文件(DEX)文件。 DEX文件被加密以生成加密的DEX文件,其中包含在安全的APK文件中以及存根DEX文件。 安全的APK文件被接收在移动计算设备中,其中启动存根DEX文件以启动包装器活动。 包装器活动用解密器类加载器替换移动计算设备的移动操作系统的APK类加载器。 解密器类加载器解密加密的DEX文件以恢复DEX文件,并将DEX文件的类加载到Dalvik虚拟机中。 然后开始应用程序的原始活动以在移动计算设备中提供应用的功能。
    • 4. 发明授权
    • Android application virtual environment
    • Android应用虚拟环境
    • US08887152B1
    • 2014-11-11
    • US13289313
    • 2011-11-04
    • Shuhua ChenJinzhi GuoYinfeng Qiu
    • Shuhua ChenJinzhi GuoYinfeng Qiu
    • G06F9/445
    • G06F9/44568G06F9/45504
    • The behavior of an installed application within the Android device is modified. The program code is modified to allow a security application to load and run the application within its own context. The modified program code is repacked into a modified APK file, executed within the context of the security application. A component within a target application includes APIs for starting other components. These APIs are modified to use a new intent object which points to a proxy component. A modified target application is executed. The security application loads the target application into memory without installing it. The security application includes a component of each type and creates a proxy component instance for each component in the target application. A proxy component under control of the security application is created for each component within the target application. The target application is executed under the control of the security application.
    • Android设备中已安装的应用程序的行为已被修改。 修改程序代码以允许安全应用程序在其上下文中加载和运行应用程序。 经修改的程序代码被重新打包成经修改的APK文件,在安全应用程序的上下文中执行。 目标应用程序中的组件包括用于启动其他组件的API。 这些API被修改为使用指向代理组件的新意图对象。 执行修改的目标应用程序。 安全应用程序将目标应用程序加载到内存中而不安装它。 安全应用程序包括每种类型的组件,并为目标应用程序中的每个组件创建代理组件实例。 为目标应用程序中的每个组件创建一个由安全应用程序控制的代理组件。 目标应用程序在安全应用程序的控制下执行。