Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and mobile device of stopping application program to steal privacy

An application and privacy technology, applied in the field of information security, can solve problems such as missing and kill applications, and achieve the effect of reducing difficulty and preventing theft.

Active Publication Date: 2013-06-05
TENCENT TECH (SHENZHEN) CO LTD
View PDF6 Cites 41 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] According to the above description, we can know that in order to really characterize an application that maliciously steals privacy, it is necessary to have samples first and then extract features. For uncollected samples and their corresponding features, it is not necessarily possible to clearly characterize whether the application is Malicious privacy-stealing applications, in addition, some real malicious privacy-stealing applications may also be missed due to flaws in the scanning technology standards of antivirus engines

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and mobile device of stopping application program to steal privacy
  • Method and mobile device of stopping application program to steal privacy
  • Method and mobile device of stopping application program to steal privacy

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0041] see figure 1 , a method for preventing application programs from stealing privacy, the execution subject of the method may be a mobile device, and the mobile device may specifically be a mobile phone or a tablet computer, etc., specifically including the following operations:

[0042] Step 101: When the application is installed, analyze the operation authority of the application, and determine whether the application has the operation authority to call private information or privacy events;

[0043] Step 102: When the application program has the operation permission of the privacy information or the privacy event, determine the operation permission state of the privacy information or the privacy event;

[0044] Step 103: When the application program is running, if the operation permission status is prohibited, the application program is prohibited from calling the private information or privacy event, and if the operation permission status is allowed, the application pr...

Embodiment 2

[0047] see figure 2, a method for preventing application programs from stealing privacy, the execution subject of the method may specifically be a mobile device, wherein the mobile device may specifically be a device such as a mobile phone or a tablet computer, and specifically includes the following steps:

[0048] Step 201: When the application program is installed, perform preprocessing on the application program, wherein the preprocessing on the application program includes but not limited to performing virus scanning on the application program;

[0049] Specifically, performing virus scanning processing on the application program includes:

[0050] Match applications against signatures within pre-stored malware libraries;

[0051] When the application program matches the characteristics in the malicious program library, it prompts that the application program is a malicious program and warns the user to prohibit the installation of the application program, terminates th...

Embodiment 3

[0076] see image 3 , a mobile device, the mobile device is specifically the same as the mobile device in method embodiment 2, such as a mobile phone or a tablet computer, and specifically includes: an analysis module 301, a first determination module 302, and a second determination module 303;

[0077] An analysis module 301, configured to analyze the operation authority of the application program when the application program is installed, and determine whether the application program has the operation authority to call private information or privacy events;

[0078] The first determination module 302 is configured to determine the operation permission state of the privacy information or the privacy event when the application program has the operation authority of the privacy information or the privacy event;

[0079] The second determination module 303 is used to prohibit the application program from calling the private information or privacy event if the operation permissio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a mobile device of stopping application programs to steal privacy, and belongs to the field of information security. The method includes the steps of analyzing operating authorizations of the application programs when the application programs are installed, and ensuring whether the application programs have the operating authorizations to call privacy information or privacy events or not; when the application programs have the operating authorizations to call the privacy information or the privacy events, ensuring an operation license status of the privacy information or the privacy events; when the operation license status is in a banned status, forbidding the application programs to call for the privacy information or the privacy events, if the operation license status is in a permitted status, permitting the application programs to call the privacy information or the privacy events. The method ensures an operation license status of the privacy information or the privacy events when the application programs are installed, and the confirmation prescription is in a package and easy-to-install mode, a certain professional knowledge is unnecessary for users, and the operation difficulty of the users is reduced.

Description

technical field [0001] The invention relates to the field of information security, in particular to a method for preventing application programs from stealing privacy and a mobile device. Background technique [0002] With the rapid development of computer technology, more and more applications have been developed and installed on mobile devices, making people's lives richer and faster. However, the rapid development of computer technology has also brought about an endless stream of viruses and Trojan horses, which are maliciously embedded in application programs. Viruses and Trojan horses may steal users' privacy, which will bring people certain economic and spiritual losses. [0003] The currently commonly used anti-malicious privacy theft scheme is generally scanning and anti-dumping. Specifically, first determine the samples of malicious privacy-stealing programs, and then extract features from the samples and add them to the malicious program library; when the applica...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56
CPCG06F21/56G06F21/30G06F21/50G06F21/51G06F21/554
Inventor 陆兆华
Owner TENCENT TECH (SHENZHEN) CO LTD