Supercharge Your Innovation With Domain-Expert AI Agents!

A mobile app permission list automatic verification method and system

A permission and automatic technology, applied in the field of information security, can solve the problems of excessive claims, heavy workload, and low verification efficiency

Active Publication Date: 2021-10-01
烟台中科网络技术研究所 +1
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] The popularity of smart phones has greatly facilitated people's lives. At the same time, in order to enrich the applications of smart phones and meet people's various needs, various apps have emerged. Generally, when regular mobile apps collect personal information, they need to pass privacy The form of the policy and user agreement clearly states the purpose, method and scope of the collection and use of personal information, but at the same time, some merchants still have a large number of mobile apps that violate regulations to collect personal information, excessively claim rights, etc., infringing on the rights and interests of users. problems, which pose a threat to the personal and property safety of users
[0003] At present, in the review of mobile apps, one of the items is to check whether the rights required by the "declaration" are consistent with the rights it "actually" asks for, and this part of the work is to determine the user rights requested by the app and those stipulated in the privacy agreement. Whether the content matches depends on manual inspection. After manually reading the permission list of the current app, check whether there is a corresponding description in the privacy agreement of the app. If there is no corresponding description, it is considered that there is a violation claim. rights behavior, there is currently no automatic verification process method proposed
[0004] As of the end of February 2020, the number of APPs monitored in my country's domestic market is 3.52 million. The manual verification of such a large number of Apps requires a lot of work and will consume a lot of time. The verification efficiency is low, so manual verification is very difficult. Difficult to apply and deploy on a large scale

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A mobile app permission list automatic verification method and system
  • A mobile app permission list automatic verification method and system
  • A mobile app permission list automatic verification method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] The principles and features of the present invention are described below in conjunction with the accompanying drawings, and the examples given are only used to explain the present invention, and are not intended to limit the scope of the present invention.

[0050]Android operating system permissions are divided into native Android operating system permissions, such as ACCESS_FILE-LOCATION, READ_CONTACTS, etc., or permissions customized to adapt to more Launchers, such as uses-permission:com.huawei.launcher2.permission.READ_SETTINGS, uses- permission: com.meizu.android.launcher.permission.READ_SETTINGS, etc., and various Android developers customize permissions such as com.tencent.tim.music.data.permission2, com.ss.android.ugc.live.permission for the convenience of use .READ_ACCOUNT etc. At present, 2068 custom permissions and 135 native Android system permissions are counted from the permission list of 10,000 APPs obtained.

[0051] The permission list in the present ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an automatic verification method for a mobile App authority list, comprising S1, obtaining the actual authority list of the mobile App to be tested, converting it into a vector form, and obtaining the actual authority list vector; S2, acquiring the privacy protocol of the mobile App to be tested, through The trained deep learning classification model is converted into a vector form, and compared with the set threshold to obtain the declared permission list vector; S3, compare whether the actual permission list vector of the mobile app to be tested is consistent with the declared permission list vector, and if they are consistent, determine The mobile app to be tested is "compliant", otherwise the mobile app to be tested is determined to be "non-compliant". The mobile App permission list automatic verification method of the present invention realizes the mobile APP permission list automatic verification, and can determine whether the App has the problem of illegally obtaining user personal information without manually reading and reviewing the content of the App privacy agreement. The invention also discloses an automatic checking system for mobile App authority list.

Description

technical field [0001] The invention relates to the field of information security, in particular to a method and system for automatically verifying a mobile App authority list. Background technique [0002] The popularity of smart phones has greatly facilitated people's lives. At the same time, in order to enrich the applications of smart phones and meet people's various needs, various apps have emerged. Generally, when regular mobile apps collect personal information, they need to pass privacy The form of the policy and user agreement clearly states the purpose, method and scope of the collection and use of personal information, but at the same time, some merchants still have a large number of mobile apps that violate regulations to collect personal information, excessively claim rights, etc., infringing on the rights and interests of users. problems, which pose a threat to the personal and property safety of users. [0003] At present, in the review of mobile apps, one of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06F21/62G06N3/04
CPCG06F21/604G06F21/6245G06F2221/2141G06N3/045
Inventor 王海洋李雪梅刘大伟王丽萍张旋
Owner 烟台中科网络技术研究所
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More