Check patentability & draft patents in minutes with Patsnap Eureka AI!

Application permission processing method, terminal and server

A processing method and a technology of application permissions, applied in the field of information processing, can solve problems such as indeterminate permission applications, privacy data leakage, etc.

Active Publication Date: 2018-09-14
VIVO MOBILE COMM CO LTD
View PDF8 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention provides a method for processing application rights to solve the problem that the user cannot determine whether the pop-up permission application on the display interface is a malicious application, and accepts the permission application for malicious permissions to cause privacy data leakage.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application permission processing method, terminal and server
  • Application permission processing method, terminal and server
  • Application permission processing method, terminal and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0041] figure 1 It is a flow chart of an application authority processing method according to an embodiment of the present invention. figure 1 The shown application permission processing method is applied to the terminal, and the method includes:

[0042] Step 101. When detecting a permission application initiated by an application, obtain permission-related information of the permission application.

[0043] Existing operating systems such as the Android operating system have become the main targets of malicious application software. Malicious application software will induce users to abuse permissions. Obtain the user's private data, and the leakage of private data will pose a threat to the security of the user's private data. For example, a calculator application applies for malicious permissions such as address book permissions to obtain user address book data.

[0044] In order to solve the above problems, an embodiment of the present invention provides a method for pr...

Embodiment 2

[0070] figure 2 It is a flowchart of an application permission processing method according to another embodiment of the present invention. figure 2 The shown application permission processing method is applied to the terminal, and the method includes:

[0071] Step 201. When detecting a permission application initiated by an application, obtain permission-related information of the permission application.

[0072] For details, refer to the above step 101, which will not be repeated here.

[0073] Step 202, upload the permission-related information to the server.

[0074] After obtaining the permission-related information of the permission application initiated by the application, upload the permission-related information to the server, so that the server generates risk assessment information according to the permission-related information.

[0075] Step 203, receiving the risk assessment information fed back by the server, the risk assessment information is generated by t...

Embodiment 3

[0098] image 3 It is a flowchart of an application permission processing method according to another embodiment of the present invention. image 3 The shown application permission processing method is applied to the terminal, and the method includes:

[0099] Step 301. When detecting a permission application initiated by an application, obtain permission-related information of the permission application.

[0100] The information content contained in the permission-related information can be various, such as the package name of the application installation package, the identification of the target permission applied for by the permission application, and the scene information for determining the usage scenario of the application when the permission application is initiated. When the permission-related information includes the package name of the application installation package and the identification of the target permission applied for by the permission application, the appl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses an application permission processing method, a terminal and a server. The method is applied to the terminal, and the method comprises: a permission request initiated by an application is detected, permission related information of the permission request is acquired, and corresponding risk assessment information is acquired according to the permission related information, wherein the risk assessment information indicates whether a target permission applied by the permission request is at risk, and the risk assessment information is displayed on a display interface of the terminal for a user to perform permission management. Since the risk assessment information indicates whether the target permission applied by the permission request is at risk, theuser can manage the applied permission by referring to the risk assessment information, the occurrence of authorization of permissions that are at risk is effectively reduced or avoided, and the security of the user's private data is ensured.

Description

technical field [0001] Embodiments of the present invention relate to the technical field of information processing, and in particular, to a method for processing application rights, a terminal, and a server. Background technique [0002] In the existing Android operating system, when the application software is installed, an application interface for permission application for the required permission will pop up on the display interface. Only when the user accepts the permission application, the application software is allowed to be installed on the terminal. [0003] When the installed application software is a malicious application software, in addition to popping up the application interface for the permission application for the required permission, the malicious application software will also pop up the application interface for the permission application for the malicious permission, inducing the user to abuse the permission to obtain the user's private data. [0004...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/12G06F21/51G06F21/57
CPCG06F21/12G06F21/51G06F21/577
Inventor 丘力达
Owner VIVO MOBILE COMM CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More