Application permission management method and system, and equipment

A technology for applying permissions and management methods, applied in the terminal field, which can solve the problems of low security and inflexible management mechanism.

Inactive Publication Date: 2017-03-01
CHINA MOBILE COMM GRP CO LTD
View PDF5 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] Embodiments of the present invention provide a management method, device and system for application rights, which are used to solve the problems of inflexible management mechanisms and low security in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application permission management method and system, and equipment
  • Application permission management method and system, and equipment
  • Application permission management method and system, and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0046] Embodiment 1 of the present invention provides a method for managing application rights, specifically, as figure 1 As shown, it is a schematic flowchart of the method for managing application rights described in Embodiment 1 of the present invention, and the method for managing application rights may include the following steps:

[0047] Step 101: Determine whether the application is installed or in use, and if it is installed, execute step 102; if it is in use, execute step 103.

[0048] Step 102: If it is detected that the application has applied for sensitive permissions, send an application permission query request to the network side device, and receive the network side device according to the application permission query request, and the application and the application permissions possessed by the application Corresponding relationship between the returned first application permission usage suggestion, and according to the first application permission usage sugges...

Embodiment 2

[0100] Embodiment 2 of the present invention provides a method for managing application permissions with a network-side device as the execution subject, specifically, as figure 2 As shown, it is a schematic flowchart of a method for managing application rights described in Embodiment 2 of the present invention. The method for managing application rights may include the following steps:

[0101] Step 201: Determine whether the application is installed or in use, and if it is installed, execute step 202; if it is in use, execute step 203.

[0102] Step 202: If an application permission query request sent by the terminal-side device during the application installation process is received, the application permission query request is sent to the terminal-side device when it detects that the application has applied for sensitive permissions. sent by the network side device; according to the application permission query request and the corresponding relationship between the applicat...

Embodiment 3

[0140] In the following, the method for managing application rights involved in Embodiment 1 and Embodiment 2 of the present invention will be specifically described by taking interactive execution between a terminal-side device and a network-side device as an example.

[0141] like image 3 As shown, it is a schematic flowchart of the first application rights management method described in Embodiment 3 of the present invention. The first application rights management method is applicable to application installation scenarios, and includes the following steps:

[0142] Step 301: During the application installation process, the terminal-side device monitors whether the application has applied for sensitive permissions.

[0143] Specifically, the terminal-side device can monitor whether the application has applied for sensitive permissions by analyzing the configuration file of the application (such as manifest.xml, etc.).

[0144] Step 302: If the terminal-side device detects ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an application permission management method and system, and equipment. Through mutual matching between a terminal side and a network side, a corresponding advice is provided for sensitive permission setting in an installation process and a use process of an application, so that effective application permission management is provided for a terminal user; therefore, the problems of inflexible permission management mechanism, relatively low safety and the like existing in the current application permission management method are solved; and particularly, the problem that the application permission cannot be controlled when a root permission is not cracked and obtained is solved, so that the flexibility of the application permission management and the safety of the system are improved, and the application experience of the user is reinforced.

Description

technical field [0001] The present invention relates to the technical field of terminals, in particular to a method, device and system for managing application rights. Background technique [0002] With the continuous development of terminal technology, the number and types of applications (that is, APPs) installed on the terminal are increasing, such as communication applications, shopping applications, and dating applications. Most of these applications often obtain the private information of the end user during installation or use, such as user location information, user contact information, user call record information, and user SMS record information, etc., thus making the end user's privacy There is a risk that the information may be maliciously used. Therefore, in order to avoid the above problems, it is necessary to control or manage the permissions of each application installed on the terminal accordingly. [0003] Specifically, taking a terminal with an Android sy...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/51G06F21/30
CPCG06F21/51G06F21/30
Inventor 刘威
Owner CHINA MOBILE COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products