Method and device for application program authority management

An application and permission management technology, applied in the field of network security, can solve problems such as inability to prohibit applications, and achieve the effect of saving power and improving running speed

Active Publication Date: 2015-03-25
BEIJING QIHOO TECH CO LTD
View PDF6 Cites 69 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, the method of calling the PM disable function cannot prohibit self-starting applications through Service and Content Provider.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for application program authority management
  • Method and device for application program authority management
  • Method and device for application program authority management

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054]The present invention will be described more fully hereinafter with reference to the accompanying drawings, in which exemplary embodiments of the invention are illustrated. The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments are only part of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0055] The Android system has four major components: Activity, Service, Broadcast Receiver and Content Provider, all of which can be managed by ActivityManagerService. It will be executed through ActivityManagerService when the application is self-started.

[0056] The environment to which the me...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and device for application program authority management. The method comprises the steps that a self-starting request to an application program in a broadcasting or service mode is received; a local strategy database is searched for an intercepting strategy corresponding to a packet identifier of the application program, the request is sent to a cloud server through a remote strategy interface, the fed-back intercepting strategy corresponding to the packet identifier of the application program is obtained, and the obtained intercepting strategy is stored in an application program authorization authority list; whether the self-starting request to the application program in the broadcasting or service mode is intercepted or not is judged according to the packet identifier of the application program carried in the self-starting request, and if the packet identifier of the application program is consistent with the intercepting strategy stored in the application program authorization authority list, the self-starting request to the application program in the broadcasting or service mode is intercepted. Occupancy of some useless self-starting application programs on terminal resources can be reduced as much as possible.

Description

technical field [0001] The present invention relates to the technical field of network security, in particular to a method, device, system and mobile terminal for application rights management. Background technique [0002] At present, there are mainly three ways for each software in the terminal to start automatically: the first is to register some broadcasts (Broadcast) in the system, and use these broadcasts to invoke the specified application program; the second is to use the service (Service ) to invoke the specified application; the third is to invoke the specified application through the content provider (Content Provider). [0003] The self-starting applications in the above three ways are not all necessary conditions for the operation of the system or other applications. The operation of some application programs in the terminal does not depend on the operation of other application programs, and some automatic The startup application program is not what the user ex...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56H04L29/08
CPCG06F21/566G06F2221/031H04L67/025
Inventor 张越王浩
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products