Unlock instant, AI-driven research and patent intelligence for your innovation.

Trust management-based mobile application security setting recommendation system

A mobile application and recommendation system technology, applied in the field of information security trust management, can solve problems such as potential safety hazards, inconvenient use, and failure of main functions to achieve good usability and flexible design effects

Active Publication Date: 2017-09-01
XIDIAN UNIV
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, these services directly hand over the rights of permission setting to users without any permission setting recommendation, which is still inconvenient for users who lack professional knowledge, which leads to many security risks. If the scope is too large, private information may be leaked. If the scope is too small, some main functions of the application may not work.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trust management-based mobile application security setting recommendation system
  • Trust management-based mobile application security setting recommendation system
  • Trust management-based mobile application security setting recommendation system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] Such as figure 1 As shown, a mobile application security setting recommendation system based on trust management is aimed at recommending mobile application permission settings to users to achieve the effect of protecting user equipment security and user privacy information, including the following steps:

[0035] 1) Obtain the application a to be detected through the reputation system TruBeRepec o reputation value R_a o , compare R_a o and threshold thr 0 The size of R_a o 0 , then the application to be detected a o If the reputation value of the application is too low, it is recommended that the user refuse to install and use it, and the lowest reputation value of the installed application on the user's device is taken as the threshold value thr 0 ;

[0036] 2) If R_a o ≥ thr 0 , calculate the application to be detected a o The similarity with other installed and used applications on the device, the application to be detected a o The number of application pe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a trust management-based mobile application security setting recommendation system. The system is capable of obtaining credit values of applications on the basis of a credit system, a similar application list installed on mobile equipment and permission setting conditions of each application in the list, similarities of the applications, trust values, for similar applications, of the user and security levels of to-be-set permissions, so as to obtain a risk value allowing a certain permission and then automatically update recommendation suggestions related to mobile application permissions. The system is capable of automatically and continually providing help related to security settings to the users, and can cooperate with a malicious software detection mechanism which is online during operation and a local application behavior detection system. When the fact an application accesses unnecessary sensitive system resources is detected, the recommendation system is capable of automatically giving warning to the users to forbid the malicious behavior, so that the requirements for reliability, security and full automaticity are satisfied, and the user equipment security and user privacy information are effectively protected.

Description

technical field [0001] The invention relates to the technical field of information security trust management, and is a recommendation system for mobile application security settings based on trust management. Background technique [0002] With the rapid development of mobile technology, mobile devices have become an indispensable part of people's daily life. According to statistics, at the end of 2013, 86% of the people in the world owned their own mobile devices. Mobile devices are amazingly changing and improving people's daily life and gradually developing into an open platform that can run various application software. Software with the same or similar functions provided by different application software developers emerges in the market one after another, and there are various types of software, such as social networking, music, online video, communication, games and so on. The rapid increase in the number of mobile applications and the inherent vulnerabilities of mobi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/51G06F21/56G06F21/57
CPCG06F21/51G06F21/566G06F21/577
Inventor 闫峥程艳晓
Owner XIDIAN UNIV