Information security management method, terminal device, and computer readable storage medium

A management method and information security technology, applied in the field of information security management and computer-readable storage media, can solve the problems of irrelevance of functions, hidden dangers of user privacy and property security, inability to effectively protect user privacy and property security, etc., to ensure normal Effects of use, security of privacy and property

Inactive Publication Date: 2018-12-04
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF7 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Although users can decide whether to grant application permissions according to their own wishes, many applications now excessively apply for permissions that are not related to the application's own functions for their own benefit, and in order to force users to grant all the permissions they require, they will be rejected when the user refuses. When granting all the permissions it asks for, deny the user service, so in order to be able to use the application, most users will eventually choose to agree
[0004] As a result, authority management loses its own role in the end, and instead legalizes the privacy theft of bad applications, which brings great hidden dangers to users' privacy and property security.
Therefore, there are loopholes in the existing rights management method, which cannot effectively protect the user's privacy and property security.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information security management method, terminal device, and computer readable storage medium
  • Information security management method, terminal device, and computer readable storage medium
  • Information security management method, terminal device, and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the drawings in the embodiments of the present invention.

[0045] It should be understood that when used in this specification and the appended claims, the terms "comprising" and "comprises" indicate the presence of described features, integers, steps, operations, elements and / or components, but do not exclude one or Presence or addition of multiple other features, integers, steps, operations, elements, components and / or collections thereof.

[0046] It should also be understood that the terminology used in the description of the present invention is for the purpose of describing particular embodiments only and is not intended to be limiting of the present invention. As used in this specification and the appended claims, the singular forms "a", "an" and "the" are intended to include plural referents unless the context clearly dictates...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Embodiments of the invention disclose an information security management method, a terminal device, and a computer readable storage medium. The method comprises: receiving a first operation request ofa target application; obtaining a target authority corresponding to the first operation request of the target application; if the target authority is forbidden, returning simulated data to the targetapplication, to make the target application still operate normally under an unauthorized condition; if the target authority is allowed, determining whether to return the simulated data to the targetapplication according to degree of importance of the target authority and operating states of the target application. Through sending the simulated data to the application, the target application canbe ensured to operate normally under an unauthorized condition.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to an information security management method, a terminal device and a computer-readable storage medium. Background technique [0002] When the user installs an application and uses the entry interface for the first time, various permission requests will always pop up, such as the need to access the address book, the need to access the SMS record, the need to start the camera, and so on. However, not all permission requests of the application are necessary for the application to run, and only some permissions that can activate the functions of the application are necessary. For example, the camera needs to be turned on when the payment software uses the function of scanning the QR code, and the microphone needs to be turned on when the voice input is used. If the corresponding permissions cannot be mobilized, the software functions will definitely be blocked. Si...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60
CPCG06F21/604G06F2221/2141
Inventor 邓海丰
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products