Network permission control method and apparatus of application program

An application program and authority control technology, applied in security devices, electrical components, wireless communication, etc., can solve the problems of network authority confusion, the inability to prohibit application program A from accessing the Internet, and network authority rules that cannot be backed up and used, etc., to achieve control accuracy high effect

Inactive Publication Date: 2015-08-26
XIAOMI INC
View PDF9 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There are multiple applications sharing a UID. Assuming that application A and application B share a UID, it is impossible to prohibit application A from accessing the Internet and open the network permissions of application B at the same time.
In addition, since the UID is assigned by the system when the application is installed, the UID assigned to the same application on different smart terminals is different. When the user restores the network permission rules of the application in the data backup of the application to another When it is on a smart terminal, there will be confusion of network permissions, resulting in network permission rules that cannot be backed up and used
[0004] It can be seen from the above that the network authority control in related technologies uses UID as the identity of the application program. The control granularity of this control method is not fine enough, resulting in very low accuracy of network authority control.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network permission control method and apparatus of application program
  • Network permission control method and apparatus of application program
  • Network permission control method and apparatus of application program

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059]Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present disclosure as recited in the appended claims.

[0060] figure 1 It is a flowchart of a method for controlling network authority of an application program according to an exemplary embodiment, and the method is applied to a smart terminal, such as figure 1 As shown, the method may include the following steps:

[0061] In step S110, when it is detected that the application program requests to connect to the network, the package name ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiments of the disclosure disclose a network permission control method and apparatus of an application program. When an application program makes a request of network connection, a package name corresponding to the application program is obtained, and a network permission rule corresponding to the application program is obtained according to the package name of the application program; and on the basis of the network permission rule corresponding to the application program, a networking state of the application program is controlled. The package name is a unique identification mark of the application program; different application programs have different corresponding package names; and thus the various application programs can be distinguished by the package names. Because the networking states of the application programs are controlled based on the package names of the appliction programs, a phenomenon that networking states of application programs sharing the same UID can not be controlled respectively can be prevented and a phenomenon that the network permission rule can not be backed up to another intelligent terminal can also be avoided. Therefore, the networking states of the application programs can be controlled by using the package names of the application programs as the identity marks of the application programs, so that the control precision is improved.

Description

technical field [0001] The present disclosure relates to the technical field of smart terminals, and in particular, to a method and device for controlling network authority of application programs. Background technique [0002] With the rapid improvement of mobile network transmission speed, users use smart terminals to move online faster and faster. However, when users enjoy a fast and smooth network speed, if the network permissions of applications are not restricted, many applications will use the mobile network unrestrainedly, which will consume a lot of mobile traffic and cause economic losses for users. Therefore, the network permission control of the application program is an indispensable part to realize the network security. [0003] In related technologies, the network authority control of the application program is controlled by using UID (User Identification, user identification) as the identity identification of the application program. For example, the network...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04W12/37H04W12/69
CPCH04W12/06
Inventor 王乐张扬乜聚虎
Owner XIAOMI INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products