Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Sensitive permission control method and device and electronic equipment

A technology of sensitive permissions and control methods, applied in computer security devices, electronic digital data processing, instruments, etc., can solve the problems of different permissions control paths, cost, and inconvenient expansion, so as to reduce user participation and ensure high quality. Guarantee the effect of user experience

Active Publication Date: 2019-12-20
BEIJING UNIV OF POSTS & TELECOMM
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the above-mentioned existing fine-grained permission control methods are basically developed around developers, and there are often the following problems: from the perspective of application developers, using code to implement functions, many permission control options based on this division are difficult for users It is not intuitive enough, and it is difficult for users to understand its actual meaning, which may lead to the granting of too many permissions and the abuse of permissions; most fine-grained permission control methods based on accessed data require users to manually identify private data, while finer-grained The permission control method of permission division requires users to participate in the confirmation and authorization of detailed permissions on a large scale. The degree of manual participation is high and the control efficiency is low. Different developers have different development concepts, which often lead to different divisions of permission control paths. Different paths require a lot of energy and cost, and the versatility is poor, so it is not easy to expand

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Sensitive permission control method and device and electronic equipment
  • Sensitive permission control method and device and electronic equipment
  • Sensitive permission control method and device and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be described in further detail below in conjunction with specific embodiments and with reference to the accompanying drawings.

[0052] It should be noted that all expressions using "first" and "second" in the embodiments of the present invention are to distinguish two entities with the same name but different parameters or parameters that are not the same, see "first" and "second" It is only for the convenience of expression, and should not be construed as a limitation on the embodiments of the present invention, which will not be described one by one in the subsequent embodiments.

[0053] In one aspect, the present invention provides a sensitive authority control method.

[0054] Such as figure 1 As shown, a sensitive permission control method provided by some optional embodiments of the present invention includes:

[0055] S1: Perform static ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a sensitive permission control method and device and electronic equipment, capable of realizing finer-grained, more efficient and safer authority control. The sensitive permission control method comprises the steps: performing static analysis on a target application, and determining a mapping relationship between a control of the target application and sensitive permission;intercepting the sensitive permission request of the target application, and obtaining part of behavior information triggering the sensitive permission request; supplementing the partial behavior information according to the mapping relationship between the control and the sensitive permission to obtain complete behavior information; and determining an authority control decision corresponding tothe sensitive authority request according to the complete behavior information, and responding to the sensitive authority request according to the authority control decision. The sensitive permissioncontrol device comprises a static analysis module, an interception module, a supplement module and a control decision module. The electronic equipment includes a memory, a processor, and a computer program stored on the memory and operable on the processor to implement the sensitive permission control method.

Description

technical field [0001] The present invention relates to the technical field of intelligent terminal application software analysis, in particular to a sensitive authority control method, device and electronic equipment. Background technique [0002] With the rapid popularization of smart terminal devices, the number of application software applicable to smart terminals also shows explosive growth. Although the rapid growth of mobile applications has stimulated the continuous innovation of the Internet and the continuous improvement of functions, it has brought excellent user experience to users, but the ensuing problems such as the abuse of application permissions or the leakage of user privacy data have gradually caused It has a relatively serious negative impact, and has attracted more and more users' attention and attention. [0003] In the existing mobile operating systems, the permission system is often used to protect the integrity of the system and user privacy. When ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31G06F21/45G06F21/56
CPCG06F21/31G06F21/45G06F21/562
Inventor 徐国爱郭燕慧王沙沙葛慧晗
Owner BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products