Intelligent terminal App permission privacy risk monitoring and evaluation system and method

A smart terminal and evaluation system technology, applied in the field of computer security, can solve problems such as difficulty in implementation, low calculation efficiency, difficulty in data acquisition, and complicated calculation methods for authority privacy risks

Active Publication Date: 2019-10-01
GUIZHOU UNIVERSITY OF FINANCE AND ECONOMICS
View PDF9 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] In the process of calculating App privacy risk value, this scheme needs multiple input values ​​such as privacy leakage items and their privacy discrimination, privacy items and their sensitivity, and user attitudes. In actual operation, it is difficult to obtain data, especially user privacy attitudes. Difficult to obtain; in addition, the calculation method of authority privacy risk used in this method is complicated, and the implementation difficulty and calculation efficiency are low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intelligent terminal App permission privacy risk monitoring and evaluation system and method
  • Intelligent terminal App permission privacy risk monitoring and evaluation system and method
  • Intelligent terminal App permission privacy risk monitoring and evaluation system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 2

[0065] Embodiment 2 of the present invention: Android mobile phone upgrades and installs App authority privacy risk monitoring and evaluation and privacy leakage blocking

[0066] This embodiment is designed in order to further illustrate the principle of the present invention and facilitate the skilled person to better understand the process of the present invention. Assume that on the Android 7.X mobile phone produced by manufacturer A, an instant messaging app released by a certain developer is upgraded on the mobile phone, and no other apps of the developer have been installed on the mobile phone. During the upgrade process, the app already has 5 Permissions, 2 new permissions are requested. This embodiment process is as follows:

[0067] Steps 1) to 2) are the same as Steps 1) to 2) in Example 1.

[0068] 3) The client App information collection module collects relevant information of the App to be detected AppInformation = (name, version, developer, permittedList, requ...

Embodiment 3

[0072] Embodiment 3 of the present invention: Monitoring and evaluation of privacy risks of Android mobile phones and blocking of privacy leakage of newly installed App permissions with multiple APPs installed by the same developer

[0073] In this embodiment, it is assumed that the user has already installed two different apps from the same developer (such as a map app and a picture sharing app) on his Android 7.x mobile phone from manufacturer A, and now installs the instant messaging app. The example is as follows:

[0074] Steps 1) to 2) are the same as Steps 1) to 2) in Example 1.

[0075] 3) The client-side App information collection module collects relevant information about the App to be detected AppInformation=(name, version, developer, permittedList, requestPermissionList, functionList, OS), where the permittedList is an empty set, the OS is Android 7.x, and the collected ones are installed Developer App information sameDeveloperInstalledApp=(1 ,version 1 ,permitte...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an intelligent terminal App permission privacy risk monitoring and evaluation system and method. Aiming to solve the problem of privacy disclosure of a user caused by user permission abuse in the application process of an existing intelligent terminal App and solve the technical problems of large data acquisition amount, high calculation complexity, high implementation difficulty, easy misjudgment and the like in the prior art, the invention provides an intelligent terminal App permission privacy risk detection and evaluation method and a privacy disclosure blocking system, being characterized by collecting an App permission list and related information; calculating permission analysis of an App to be detected, an App of the same kind, an App of the same function and an App of the same developer and privacy information sensitivity of related permissions, so as to provide the privacy disclosure risk evaluation method for the intelligent terminal App permission, and providing an unloading prompt for blocking high-risk App permission or App according to permission privacy disclosure risk grading, so that efficient, convenient and accurate intelligent terminal App permission privacy disclosure risk evaluation and blocking are realized, and the privacy of a user is protected.

Description

technical field [0001] The invention relates to the technical field of computer security, in particular to a system and method for monitoring and evaluating privacy risks of app permissions of smart terminals. Background technique [0002] Smart terminals including mobile phones and tablet computers have become a necessity in people's lives, storing a large amount of personal sensitive information, such as address book, location, personal files, photos, etc. All kinds of Apps installed on smart terminals provide us with the convenience of communication, social networking, office, payment, and games. At the same time, these Apps request various sensitive information such as reading files, address books, and locations when installing / running. Permissions, especially some Apps often request and have permissions that are irrelevant or have very little relevance to the completion of their functions, resulting in a serious risk of privacy leakage. Apps such as games and maps have...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57G06F21/62
CPCG06F21/57G06F21/6245
Inventor 丁红发彭长根田有亮
Owner GUIZHOU UNIVERSITY OF FINANCE AND ECONOMICS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products