Method and mobile device of stopping application program to steal privacy
An application and privacy technology, applied in the field of information security, can solve problems such as missing and kill applications, and achieve the effect of reducing difficulty and preventing theft.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0041] see figure 1 , a method for preventing application programs from stealing privacy, the execution subject of the method may be a mobile device, and the mobile device may specifically be a mobile phone or a tablet computer, etc., specifically including the following operations:
[0042] Step 101: When the application is installed, analyze the operation authority of the application, and determine whether the application has the operation authority to call private information or privacy events;
[0043] Step 102: When the application program has the operation permission of the privacy information or the privacy event, determine the operation permission state of the privacy information or the privacy event;
[0044] Step 103: When the application program is running, if the operation permission status is prohibited, the application program is prohibited from calling the private information or privacy event, and if the operation permission status is allowed, the application pr...
Embodiment 2
[0047] see figure 2, a method for preventing application programs from stealing privacy, the execution subject of the method may specifically be a mobile device, wherein the mobile device may specifically be a device such as a mobile phone or a tablet computer, and specifically includes the following steps:
[0048] Step 201: When the application program is installed, perform preprocessing on the application program, wherein the preprocessing on the application program includes but not limited to performing virus scanning on the application program;
[0049] Specifically, performing virus scanning processing on the application program includes:
[0050] Match applications against signatures within pre-stored malware libraries;
[0051] When the application program matches the characteristics in the malicious program library, it prompts that the application program is a malicious program and warns the user to prohibit the installation of the application program, terminates th...
Embodiment 3
[0076] see image 3 , a mobile device, the mobile device is specifically the same as the mobile device in method embodiment 2, such as a mobile phone or a tablet computer, and specifically includes: an analysis module 301, a first determination module 302, and a second determination module 303;
[0077] An analysis module 301, configured to analyze the operation authority of the application program when the application program is installed, and determine whether the application program has the operation authority to call private information or privacy events;
[0078] The first determination module 302 is configured to determine the operation permission state of the privacy information or the privacy event when the application program has the operation authority of the privacy information or the privacy event;
[0079] The second determination module 303 is used to prohibit the application program from calling the private information or privacy event if the operation permissio...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 