Unlock instant, AI-driven research and patent intelligence for your innovation.

A method and mobile terminal for shielding application permissions

A mobile terminal and application authority technology, applied in the direction of digital data authentication, etc., can solve problems such as function failure, mobile terminal cannot be turned on, mobile terminal cannot flexibly expand other functions, etc., and achieve the effect of improving user experience

Active Publication Date: 2015-10-28
TENCENT TECH (SHENZHEN) CO LTD +1
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] After modifying the source code of the Android system, first, the user needs to reinstall the modified Android system, which may cause the mobile terminal to fail to boot, crash, and function failure; second, the modified Android system will not be able to be upgraded, resulting in mobile terminals Cannot flexibly expand other functions

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and mobile terminal for shielding application permissions
  • A method and mobile terminal for shielding application permissions
  • A method and mobile terminal for shielding application permissions

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0041] see figure 1 , Embodiment 1 of the present invention provides a method for shielding application permissions, the method comprising:

[0042] 101: Receive a request from a user to block a permission, where the request includes an application ID (Identity, identification) that needs to be blocked and a permission ID that needs to be blocked.

[0043] 102: Detect the application that needs to be blocked, and determine whether the application that needs to be blocked calls the permission that needs to be blocked.

[0044] 103: If the application that needs to be shielded invokes the permission that needs to be shielded, then shield the permission that needs to be shielded according to a predetermined shielding rule.

[0045] The beneficial effect brought by the technical solution provided by the embodiment of the present invention is: by receiving the request of the user to shield the authority, the request includes the application identification and the authority identif...

Embodiment 2

[0047] see figure 2 , Embodiment 2 of the present invention provides a preferred example of a method for shielding application permissions, the method comprising:

[0048] 201: Collect permission information of each application, and display the permission information to the user, so that the user sets the application that needs to be blocked and the permission that needs to be blocked.

[0049] Wherein, the permission information includes the application ID and the permission IDs that the application will call when running.

[0050]Wherein, collecting the permission information of each application is collecting the permission information of each Android application program in the Android system, including each installed Android application program and an Android application program to be installed. Specifically, in the Android system, the permission information of each application is collected through IPC (Inter-Process Communication, inter-process communication), and the pe...

Embodiment 3

[0076] see image 3 , embodiment 3 of the present invention provides a mobile terminal, the mobile terminal includes:

[0077] The receiving module 301 is configured to receive a user's request for shielding permissions, where the request includes the ID of the application that needs to shield the permission and the ID of the permission that needs to be shielded.

[0078] The detecting and judging module 302 is configured to detect the application that needs to be blocked, and judge whether the application that needs to be blocked invokes the permission that needs to be blocked.

[0079] The shielding module 303 is configured to shield the permission to be shielded according to a predetermined shielding rule if the application that needs to shield the permission invokes the permission that needs to be shielded.

[0080] The beneficial effect brought by the technical solution provided by the embodiment of the present invention is: by receiving the request of the user to shield...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for shielding application permission and a mobile terminal, belonging to the field of the mobile terminal. The method comprises the steps of receiving a request of permission shielding of a user, wherein the request comprises an application identification in need of the permission shielding and a permission identification needing to be shielded; detecting the application in need of the permission shielding, and judging whether the application in need of the permission shielding calls the permission needing to be shielded or not; and shielding the permission needing to be shielded according to a preset shielding rule if so. The mobile terminal comprises a receiving module, a detection judging module and a shielding module. According to the technical scheme disclosed by the invention, the shielding of the application in need of the permission shielding can call the permission needing to be shielded according to the wish of the user; source codes of an Android system can be prevented from being changed, the shielding can be carried out when the application in need of the permission shielding calls the permission needing to be shielded, the Android system is not needed to be reinstalled by the user, and the user experience can be increased.

Description

technical field [0001] The invention relates to the field of mobile terminals, in particular to a method for shielding application permissions and a mobile terminal. Background technique [0002] The Android (Android) system is mainly used in mobile terminals and is an open source operating system based on Linux. Due to the openness of the source code, the Android system divides the realization of all sensitive functions in the mobile terminal, such as reading system contacts, system text messages, system call records, sending text messages and networking, etc., in the form of access rights. [0003] For the division of access rights, when developing Android applications, application developers need to declare their required permission information to the Android system in accordance with the Android specification in the configuration file. Wherein, when the user installs the Android application program, the Android system will read the permission information declared by the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/30
Inventor 梁家辉
Owner TENCENT TECH (SHENZHEN) CO LTD