Android: G.Pullareddy Engineering College, Kurnool
Android: G.Pullareddy Engineering College, Kurnool
ANDROID
PRESENTED BY
There are four building blocks to an Android uses a special class called Intent
provides a common file system that any The Android APIs contain
application can use to store and read files support for SQLite. Your
application can create and use a restrictions on the specific operations that
private SQLite database. Each a particular process can perform, and per-
database is private to the URI permissions for granting ad-hoc
package that creates it. access to specific pieces of data.
System Architecture
Content Providers
A central design point of the
A content provider is a optional
Android security architecture is that no
component of an application that exposes
application, by default, has permission to
read/write access to an application's
perform any operations that would
private data, subject to whatever
adversely impact other applications, the
restrictions it wants to impose. Content
operating system, or the user. This
providers implement a standard request
includes reading or writing the user's
syntax for data, and a standard access
private data such as contacts or e-mails,
mechanism for the returned data. Android
reading or writing another application's
supplies a number of content providers for
files, performing network access, keeping
standard data types, such as personal
the device awake, etc.
contacts.
An application's process is a secure
Network sandbox. It can't disrupt other applications,
except by explicitly declaring the
Don't forget that you can also use
permissions it needs for additional
the network to store and retrieve data.
capabilities not provided by the basic
sandbox. These permissions it requests can
Security and Permissions in Android
be handled by the operating in various
ways, typically by automatically allowing
Android is a multi-process system,
or disallowing based on certificates or by
where each application (and parts of the
prompting the user. The permissions
system) runs in its own process. Most
required by an application are declared
security between applications and the
statically in that application, so they can be
system is enforced at the process level
known up-front at install time and will not
through standard Linux facilities, such as
change after that.
user and group IDs that are assigned to
applications. Additional finer-grained
security features are provided through a
"permission" mechanism that enforces
Application Signing A basic Android application has no
permissions associated with it, meaning it
All Android applications (.apk files) must can not do anything that would adversely
be signed with a certificate whose private impact the user experience or any data on
key is held by their developer. This the device. To make use of protected
certificate identifies the author of the features of the device, you must include in
application. The certificate does not need your AndroidManifest.xml one or more
to be signed by a certificate authority: it is <uses-permission> tags declaring the
perfectly allowable, and typical, for permissions that your application needs.
Android applications to use self-signed The permissions provided by the Android
certificates. The certificate is used only to system can be found at Manifest.
establish trust relationships between permission. Any application may also
applications, not for wholesale control define and enforce its own permissions, so
over whether an application can be this is not a comprehensive list of all
installed. The most significant ways that possible permissions.
signatures impact security is by A particular permission may be enforced at
determining who can access signature- a number of places during your program's
based permissions and who can share user operation:
IDs. • At the time of a call
into the system, to prevent
User IDs and File Access an application from
executing certain functions.
Each Android package (.apk) file installed
• When starting an
on the device is given its own unique
activity, to prevent
Linux user ID, creating a sandbox for it
applications from launching
and preventing it from touching other
activities of other
applications (or other applications from
applications.
touching it). This user ID is assigned to it
• Both sending and
when the application is installed on the
receiving broadcasts, to
device, and remains constant for the
control who can receive
duration of its life on that device.
your broadcast or who can
Using Permissions
send a broadcast to you.
• When accessing and viewing a list of permissions
operating on a content (android:label) or details on a single
provider. permission ( android:description). The
Conclusion
General Android
http://code.google.com/android/kb/general.html#c. Retrieved on
29 August 2008.