Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for detecting excessive weight search and computer readable storage medium

A detection method and storage medium technology, applied in computer security devices, calculations, instruments, etc., can solve the problems of consuming a lot of time and labor costs, difficulty in troubleshooting, and the inability of users to intuitively know the details of permissions and abuse of permissions, etc. Achieve the effect of reducing the difficulty of investigation, shortening the investigation time, and facilitating detection

Active Publication Date: 2020-02-25
FUJIAN TIANQUAN EDUCATION TECH LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Disadvantage 1: The declaration of permissions is declared by each component party in the code, and external users cannot intuitively know the details of permissions and whether there is any abuse of permissions
[0004] Disadvantage 2: The application is assembled from various mobile service components, and only the final result will be displayed in the claim list of the final application. If there is a situation of abuse of authority, it is impossible to accurately locate which mobile service declares to use this authority. making it very difficult to investigate
[0005] Disadvantage 3: In response to the recent warning issued by the Ministry of Public Security requiring that APPs need to have privacy clauses, and to explain the usage scenarios of high-sensitivity permissions applied for by APPs, the original solution needs to manually check what each permission is declared to do. Once the number of applications increases , will consume a lot of time and labor costs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for detecting excessive weight search and computer readable storage medium
  • Method for detecting excessive weight search and computer readable storage medium
  • Method for detecting excessive weight search and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0040] Please refer to Figure 2-4 , Embodiment 1 of the present invention is: a detection method for over-claiming applications, which is suitable for modularly assembled mobile applications on Android and iOS platforms, such as figure 2 As shown, the method includes the following steps:

[0041] S1: Declare all permissions and obtain the permission declaration library, which is to uniformly declare all permissions that can be used by applications.

[0042] Specifically, in an actual application scenario, an online editor can be developed to define the permission statement of iOS and Android. The specific content is as follows, and all permissions allowed to be used by the application are saved on this page in real time. Specific implementation logic: the branch of development corresponds to an xml definition file stored on the server, read this file at the front end, analyze it, the administrator can modify this file, and then test it. After testing, a corresponding test ...

Embodiment 2

[0056] This embodiment is a computer-readable storage medium corresponding to the above-mentioned embodiments, on which a computer program is stored, and when the program is executed by a processor, the following steps are implemented:

[0057] Declare all permissions and get the permission declaration library;

[0058] Select the authority corresponding to the business component from the authority statement general library, and generate the component authority statement of the business component according to the preset authority statement format, the component authority statement includes the authority and its Reason for use;

[0059] Edit the application according to the business components required by the application, and generate the application permission statement of the application according to the component permission statement of the business component included in the application, and the application permission statement includes the permissions that the application c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an application excessive weight detection method and a computer readable storage medium, and the method comprises the steps: carrying out the declaration of all authorities, and obtaining an authority declaration total library; selecting permission corresponding to the service component from a permission declaration general library, generating a component permission declaration of the service component according to a preset permission declaration format, editing an application according to the service component required by the application, and generating an applicationpermission declaration of the application according to the component permission declaration of the service component contained in the application; verifying the component permission declaration of each service component of the application; and if the verification is passed, performing excessive right searching detection on the application according to the application right declaration of the application. According to the method and the device, the service components with excessive right seeking behaviors in the application can be accurately positioned.

Description

technical field [0001] The present invention relates to the technical field of authority management, in particular to a detection method and a computer-readable storage medium for applying excessive claims. Background technique [0002] As mobile devices become more ubiquitous in our daily lives, the number of mobile application developers is increasing day by day. In order to meet the needs of customization and save development costs, more and more companies adopt the solution of modular packaging of mobile service components. The permissions required by each mobile service component are defined by the provider of the mobile service component in their respective component codes, and then the specific application permission list is produced after the application is produced through the assembly process of the mobile service component. But there are the following disadvantages: [0003] Disadvantage 1: The declaration of permissions is declared by each component party in th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F8/30G06F21/60
CPCG06F8/30G06F21/604
Inventor 刘德建吴仁海张华焱鄢宜扬郭玉湖陈宏
Owner FUJIAN TIANQUAN EDUCATION TECH LTD