Check patentability & draft patents in minutes with Patsnap Eureka AI!

An electronic device and a safety protection method for the electronic device

An electronic device and protected technology, applied in the field of communications, can solve the problems of user privacy data being stolen, users can no longer modify access rights, application access rights can no longer be changed, etc., to achieve the effect of ensuring security

Active Publication Date: 2016-08-17
LENOVO (BEIJING) LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] For the method of protecting private data using the system's own rights management mechanism, for example, the rights management mechanism of the Android system, this method can only limit the rights of the application by granting access authorization to the application when the application software is installed. Once the software is installed, you can no longer change the access rights of the application
That is to say, for an application, which services it applies to the user for access rights when it is installed, the user cannot modify the access rights of the application until it is uninstalled.
Because some applications will force users to authorize access to the services they apply for, otherwise the application software cannot be installed. Therefore, even using the system's own rights management mechanism cannot effectively prevent illegal access to applications, so that user privacy data still exists. risk of theft

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An electronic device and a safety protection method for the electronic device
  • An electronic device and a safety protection method for the electronic device
  • An electronic device and a safety protection method for the electronic device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0047] see figure 1 , showing a schematic diagram of Embodiment 1 of an electronic device of the present invention. The electronic device has at least one application, at least one service, an application and service interaction layer, and an operating system; wherein each of the at least one service corresponds to a service interface for the at least one application to call;

[0048] a first service 101 in the at least one service, used for acquiring first data or executing a first function;

[0049] The first application 102 in the at least one application is configured to call the first service interface of the first service through the application and service interaction layer, and request the first service to obtain the first data or execute the first function;

[0050] The application and service interaction layer 103 is configured to obtain service information called by the first application when the first application calls the first service interface, and determine w...

Embodiment 2

[0069] see figure 2 , showing a schematic diagram of Embodiment 2 of an electronic device of the present invention, and the electronic device further includes:

[0070] A specific service 105 for receiving the user's security settings;

[0071] The application and service interaction layer 103 is specifically configured to judge whether the service invoked by the first application is a protected service by invoking the specific service.

[0072] The electronic device in this embodiment of the present invention may also receive user settings, and after the application is installed, redefine the access authority of the application according to the user's needs, that is, the user's access authorization to the application is no longer simply subject to the application's compulsion After the application is installed, users can authorize access to it according to their own wishes, which provides a technical basis for proactively defending against illegal access to the application....

Embodiment 3

[0074] see image 3 , showing a schematic diagram of Embodiment 3 of an electronic device of the present invention, and the electronic device further includes:

[0075] The service management 105 is configured to receive the request of the first application, and send the first service interface of the first service to the first application.

[0076] The access behavior of the application to the service is realized by calling the service interface of the service. Therefore, before the application initiates access to the service, it needs to know the service interface to be called. The service management stores the information of multiple services and service interfaces of the electronic device, and the application can obtain the service interface to be called by sending a request to the service management.

[0077] In addition, it should be noted that the application and service interaction layer in the embodiment of the present invention may be embodied as a dynamic library I...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an electronic device and a security protection method. The electronic device has at least one application, at least one service, an application and service interaction layer, and an operating system. In the embodiment of the present invention, when an application invokes a service through the application and service interaction layer, the service information invoked by the application is obtained, and when the service invoked by the application is determined to be a protected service according to the service information, the access behavior of the application is protected to realize the protection of the application. Active monitoring and defense of access behavior ensures the security of user privacy data.

Description

technical field [0001] The present invention relates to the field of communication technologies, and in particular, to an electronic device and a security protection method for the electronic device. Background technique [0002] With the increasingly powerful functions of intelligent terminals, intelligent terminals have gradually been integrated into people's daily life. Users can download and install applications provided by third-party service providers such as software and games through the Internet, and expand the functions of the terminal through such applications. , which not only facilitates the use of users, but also provides opportunities for malicious applications. After the malicious application is installed on the smart terminal, it can obtain the user's private data without the user's knowledge, for example, illegally monitor the user's phone calls, text messages, illegally obtain the user's contact information and other private data, these behaviors of malici...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04W12/00H04M1/725H04W12/37
Inventor 李甘王灿刘永锋
Owner LENOVO (BEIJING) LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More