System security permission treatment state machine model based on intelligent terminal

A technology for system security and processing status, which is applied in the fields of electrical digital data processing, computer security devices, instruments, etc., and can solve the security risks of users' intelligent terminals

Inactive Publication Date: 2015-01-28
PHICOMM (SHANGHAI) CO LTD
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the prior art, after an application is installed, the permissions of the application will not change again. Some applications only list all the permissions at the beginning of the installation, and when faced with a large number of permissions, It is difficult for ordinary users to know which permissions the application requires and what risks those permissions may bring. They can only authorize all of them directly. In the native Androi

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System security permission treatment state machine model based on intelligent terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The present invention will be further elaborated below by describing a preferred specific embodiment in detail in conjunction with the accompanying drawings.

[0021] A state machine model for system security authority processing based on an intelligent terminal, which is set on an operating system platform of a mobile terminal. The operating system includes an authority use interception module and an authority request decision-making module, wherein the authority request decision-making module controls the application authority Permission classification is carried out, and the permission categories include: authorized permission, pending permission and blocked permission; the permission usage interception module monitors the category of permissions, and dynamically adjusts between permission categories through the permission request decision module.

[0022] A permission can be adjusted from a blocked or pending permission to an authorized permission if and only if the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a system security permission treatment state machine model based on an intelligent terminal, and the model is arranged on an operating system platform, the operating system comprises a permission using intercepting module and a permission request decision module, wherein the permission request decision module is used to classify the application program permission, the permission category respectively contains authorized permission, undetermined permission and blocked permission; the permission using intercepting module is used to monitor the permission category and the permission category is dynamically adjusted by the permission request decision module. By the system security permission treatment state machine model, each permission request of an inner nuclear layer and an application framework is intercepted and identified so as to realize dynamic treatment, so that controllable permission management and control is executed by an user to further detail and analyze the permission state transfer of the user.

Description

technical field [0001] The invention relates to the technical field of mobile terminals, in particular to a state machine model for system security authority processing based on an intelligent terminal. Background technique [0002] At present, the security problems of smart terminals have become very prominent, and the reason why smart terminals face security risks largely comes from third-party applications. In the prior art, after an application is installed, the permissions of the application will not change again. Some applications only list all the permissions at the beginning of the installation, and when faced with a large number of permissions, It is difficult for ordinary users to know which permissions the application requires and what risks those permissions may bring. They can only authorize all of them directly. In the native Android system, after the user successfully installs an application, the application has The permissions will not change again; after us...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/62
CPCG06F21/629G06F2221/033
Inventor 金果
Owner PHICOMM (SHANGHAI) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products