Method for detecting excessive weight search and computer readable storage medium
A detection method and storage medium technology, applied in computer security devices, calculations, instruments, etc., can solve the problems of consuming a lot of time and labor costs, difficulty in troubleshooting, and the inability of users to intuitively know the details of permissions and abuse of permissions, etc. Achieve the effect of reducing the difficulty of investigation, shortening the investigation time, and facilitating detection
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0040] Please refer to Figure 2-4 , Embodiment 1 of the present invention is: a detection method for over-claiming applications, which is suitable for modularly assembled mobile applications on Android and iOS platforms, such as figure 2 As shown, the method includes the following steps:
[0041] S1: Declare all permissions and obtain the permission declaration library, which is to uniformly declare all permissions that can be used by applications.
[0042] Specifically, in an actual application scenario, an online editor can be developed to define the permission statement of iOS and Android. The specific content is as follows, and all permissions allowed to be used by the application are saved on this page in real time. Specific implementation logic: the branch of development corresponds to an xml definition file stored on the server, read this file at the front end, analyze it, the administrator can modify this file, and then test it. After testing, a corresponding test ...
Embodiment 2
[0056] This embodiment is a computer-readable storage medium corresponding to the above-mentioned embodiments, on which a computer program is stored, and when the program is executed by a processor, the following steps are implemented:
[0057] Declare all permissions and get the permission declaration library;
[0058] Select the authority corresponding to the business component from the authority statement general library, and generate the component authority statement of the business component according to the preset authority statement format, the component authority statement includes the authority and its Reason for use;
[0059] Edit the application according to the business components required by the application, and generate the application permission statement of the application according to the component permission statement of the business component included in the application, and the application permission statement includes the permissions that the application c...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


