Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for controlling application access

A technology of application access and application domain, which is applied in the direction of program control device, computer security device, user identity/authority verification, etc.

Active Publication Date: 2019-03-19
HUAWEI TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the embodiments of the present invention provide a method and device for controlling application access to solve the problem of how to formulate access control policies simply and conveniently, thereby improving terminal security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for controlling application access
  • Method and device for controlling application access
  • Method and device for controlling application access

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the drawings in the embodiments of the present invention. Obviously, the described embodiments are part of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts shall fall within the protection scope of the present invention.

[0053] It should be understood that the technical solutions of the embodiments of the present invention can be applied to mobile terminals based on various operating systems, such as: Android (Android) operating system, Apple (iOS) operating system, Microsoft (Windows Phone) operating system, Symbian (Symbian) operating system, BlackBerry (BlackBerry OS) operating system, Microsoft (WindowsMobile) operating system, etc. For the convenience of description, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and device for controlling application access. The method includes: acquiring a graph input by a user; generating an access strategy graph according to the graph, the access strategy graph representing an access rule for allowing access between at least two applications; converting the access strategy graph into an access control strategy that can be recognized by the system , the access control policy is used to indicate whether to allow access between applications; according to the access control policy, the access between the at least two applications is controlled. The method and device for controlling application access in the embodiments of the present invention obtain the graphics input by the user, and convert the access strategy map formed by the graphics into an access control strategy that the system can recognize, so as to control application access according to the access control strategy, so that the user The access control policy of each application in the system can be written in a simple, intuitive and flexible graphical manner, thereby improving the security performance of the system and improving user experience.

Description

technical field [0001] The present invention relates to the field of terminals, in particular to a method and device for controlling application access in the field of terminals. Background technique [0002] In recent years, mobile phones based on the Android (Android) operating system have occupied an increasing market share in the smart terminal market, but malicious software targeting the Android operating system has emerged in an endless stream. In the Android operating system, the sensitivity levels of different application data are usually different. For example, because application data such as text messages and contacts involve user privacy, the sensitivity level is higher, while the sensitivity level of general application data is lower. Therefore, in the current Android operating system, an effective application access control scheme is needed. [0003] Currently, a widely used and mature access control scheme is a control scheme provided by a Security Enhanced A...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62
CPCG06F21/604G06F2221/2141G06F3/0486G06F9/44G06F11/3656G06F21/44G06F21/57G06F21/6218H04L9/32H04L12/22H04L63/205H04W88/02
Inventor 李志陶敬
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products