Method for terminal authority management and terminal

A rights management and terminal technology, applied in electronic digital data processing, instruments, digital data authentication, etc., can solve the problems of sensitive data leakage, privacy theft, relying on manual judgment, etc., to protect data security and reduce malicious application misauthorization Effect

Inactive Publication Date: 2015-04-29
BEIJING NETQIN TECH
View PDF7 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing checks for applications requiring ROOT permissions rely too much on human judgment: for professional users, they can take relatively cautious operations from the permission description; for non-professional (ordinary) users, they usually ignore this This permission description leads to over-authorization of applications, which makes some applications obtain ROOT permissions that should not be obtained, and brings potential violations of users' legitimate rights and interests, such as privacy theft, illegal acquisition of location information, and secret feedback of key system data. Behavior
[0004] For example, a malicious map application may request sensitive storage areas (e.g., user identity information, bank account, credit card information, phone book, etc.) from the user when installed and / or run. Read and write permissions, which will lead to sensitive data leakage and damage the interests of users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for terminal authority management and terminal
  • Method for terminal authority management and terminal
  • Method for terminal authority management and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The preferred embodiments of the present invention will be described in detail below with reference to the accompanying drawings, and unnecessary details and functions for the present invention will be omitted during the description to avoid confusing the understanding of the present invention. Hereinafter, the present invention is described in detail by taking the scenario where the present invention is applied to a wireless mobile communication system as an example. But the present invention is not limited thereto, and the present invention can also be applied to a fixed communication system, a wired communication system, or any hybrid structure of a wireless mobile communication system, a fixed communication system, a wired communication system, and the like. As far as the mobile communication system is concerned, the present invention is not limited to the specific communication protocols of the various mobile communication terminals involved, and may include (but no...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for terminal authority management and a corresponding terminal. The method comprises the following steps: a) monitoring an authority request on the terminal; b) comparing an application which initiates the authority request with an application white list which is maintained on the terminal; c) executing corresponding authority management according to a comparison result.

Description

technical field [0001] The present invention relates to the field of terminal management, more specifically to a method for rights management executed on a terminal and a corresponding terminal. Background technique [0002] With the increasing popularity of mobile terminals, it has become an indispensable and important part of production and life in modern society. Therefore, information security on mobile terminals has become a subject of widespread concern. On the current mainstream mobile terminals (especially smart terminals based on the Android platform), whether the application can use ROOT permissions (similar permissions include (and are not limited to) administrator (Administrator) permissions, etc.), mainly through manual (User) participation method to determine whether to grant ROOT access to the application. [0003] As is well known to those skilled in the art, the ROOT authority usually represents the highest authority on a system. With this authority, a thi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31
CPCG06F21/45G06F2221/2141
Inventor 陈继
Owner BEIJING NETQIN TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products