Unlock instant, AI-driven research and patent intelligence for your innovation.

Privacy rights management method and device

A technology of privacy rights and management methods, applied in the field of privacy rights management methods and devices, can solve problems such as user difficulties, increase high-authority infringement systems, and after-sales service problems of mobile devices, and achieve the effect of improving system security

Active Publication Date: 2016-08-17
BEIJING QIHOO TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] One of the constraints of the existing technology is that the process injection of security software requires the user to crack the mobile device to obtain root privileges, but this is very difficult for ordinary users, and once the device is rooted, it will increase the risk of high privilege violations obtained by malicious applications. system risk
In addition, the current after-sales service of domestic smart mobile device manufacturers does not include the exclusion of devices that have been cracked and obtained root. Therefore, after obtaining the root authority, the after-sales service of the mobile device has also become a problem.
[0005] In addition, there are many android device manufacturers, each of which will modify the system itself, so the existing technical methods have adaptation problems on some devices

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy rights management method and device
  • Privacy rights management method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] Hereinafter, exemplary embodiments of the present disclosure will be described in more detail with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure can be implemented in various forms and should not be limited by the embodiments set forth herein. On the contrary, these embodiments are provided to enable a more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0028] Reference figure 1 , Shows a flow chart of the steps of Embodiment 1 of a privacy authority management method according to an embodiment of the present invention. In this embodiment, a smart terminal installed with an Android system is taken as an example to illustrate the principle of the present invention. However, this description is only exemplary, and the scope of the present invention is not limi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to a method for managing privacy rights, which includes: when a service that requires privacy rights is triggered in an operating system, check and obtain the information of the service at the application framework layer of the operating system, and notify the system application layer to monitor the above-mentioned information; the above-mentioned information acquired at the system application framework layer is monitored at the operating system application layer, and instructions for managing the service are generated according to the information, and the instructions are sent to the application framework layer of the operating system, so that in the The application framework layer instructs the operating system to manage the service according to the instruction. The above method solves the problem of a technical solution that does not require the user to crack the operating system of the user terminal to obtain the highest authority of the operating system, but also can use third-party security software to manage the privacy authority of the operating system, and achieves the beneficial effect of improving system security.

Description

Technical field [0001] The present invention relates to the technical field of information processing, in particular to a privacy authority management method and device. Background technique [0002] Many security software on mobile devices have privacy authority management functions. Users can use security software to control other applications on the device to access key data in the system and implement certain behavior permissions, thereby protecting user privacy, such as reading call records, SMS, send SMS, make a call, turn on the camera. [0003] Taking the android system as an example, the existing security software implements privacy authority management through process injection. By injecting its own dynamic library files into Android's servicemanager, phone and other system processes, adding hooks to the system's interface for reading key data, calling the callback interface of the security software, and returning the corresponding results according to the user's setting...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/55G06F21/60
CPCG06F21/126G06F21/50G06F21/554G06F2221/2141H04W4/16G06F21/6245G06F21/629G06F21/6281G06F21/53H04W12/02
Inventor 胡中王鑫
Owner BEIJING QIHOO TECH CO LTD