A method and mobile terminal for shielding application permissions
A mobile terminal and application authority technology, applied in the direction of digital data authentication, etc., can solve problems such as function failure, mobile terminal cannot be turned on, mobile terminal cannot flexibly expand other functions, etc., and achieve the effect of improving user experience
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0041] see figure 1 , Embodiment 1 of the present invention provides a method for shielding application permissions, the method comprising:
[0042] 101: Receive a request from a user to block a permission, where the request includes an application ID (Identity, identification) that needs to be blocked and a permission ID that needs to be blocked.
[0043] 102: Detect the application that needs to be blocked, and determine whether the application that needs to be blocked calls the permission that needs to be blocked.
[0044] 103: If the application that needs to be shielded invokes the permission that needs to be shielded, then shield the permission that needs to be shielded according to a predetermined shielding rule.
[0045] The beneficial effect brought by the technical solution provided by the embodiment of the present invention is: by receiving the request of the user to shield the authority, the request includes the application identification and the authority identif...
Embodiment 2
[0047] see figure 2 , Embodiment 2 of the present invention provides a preferred example of a method for shielding application permissions, the method comprising:
[0048] 201: Collect permission information of each application, and display the permission information to the user, so that the user sets the application that needs to be blocked and the permission that needs to be blocked.
[0049] Wherein, the permission information includes the application ID and the permission IDs that the application will call when running.
[0050]Wherein, collecting the permission information of each application is collecting the permission information of each Android application program in the Android system, including each installed Android application program and an Android application program to be installed. Specifically, in the Android system, the permission information of each application is collected through IPC (Inter-Process Communication, inter-process communication), and the pe...
Embodiment 3
[0076] see image 3 , embodiment 3 of the present invention provides a mobile terminal, the mobile terminal includes:
[0077] The receiving module 301 is configured to receive a user's request for shielding permissions, where the request includes the ID of the application that needs to shield the permission and the ID of the permission that needs to be shielded.
[0078] The detecting and judging module 302 is configured to detect the application that needs to be blocked, and judge whether the application that needs to be blocked invokes the permission that needs to be blocked.
[0079] The shielding module 303 is configured to shield the permission to be shielded according to a predetermined shielding rule if the application that needs to shield the permission invokes the permission that needs to be shielded.
[0080] The beneficial effect brought by the technical solution provided by the embodiment of the present invention is: by receiving the request of the user to shield...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 