Permission monitoring processing method and device, computer equipment and medium

A processing method and permission technology, applied in the computer field, can solve problems such as a large amount of labor costs, low audit efficiency, and undetectable upgrade codes, and achieve the effect of strengthening control rights

Pending Publication Date: 2021-01-08
GUANGZHOU HUYA TECH CO LTD
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the process of implementing the present invention, the inventor found that the existing technology has the following defects: the review method needs to invest a lot of labor costs, and the review efficiency is low. In addition, the update process of the third-party SDK after access may cause problems in the upgrade code. Add hidden codes to obtain user privacy information, the above upgrade codes cannot be effectively detected in manual audits

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Permission monitoring processing method and device, computer equipment and medium
  • Permission monitoring processing method and device, computer equipment and medium
  • Permission monitoring processing method and device, computer equipment and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0042] figure 1 It is a flow chart of a rights monitoring and processing method provided in Embodiment 1 of the present invention. This embodiment is applicable to the situation of managing the rights of third-party SDKs accessed inside the application program. This method can be executed by a rights monitoring and processing device. The device can be implemented in the form of software and / or hardware, and generally can be integrated into the application program in the form of SDK, plug-in or program code. Such as figure 1 As shown, the method includes:

[0043] Step S101, when it is detected that the target third-party SDK embedded in the application program calls the target permission interface, intercept the call.

[0044] The application program can be various programming languages ​​that users can use, and a collection of programs written in various programming languages ​​to meet the application requirements of users. For example, it can include general-purpose applic...

Embodiment 2

[0062] figure 2 It is a flow chart of another permission monitoring processing method provided by Embodiment 2 of the present invention. This embodiment is optimized on the basis of the above-mentioned embodiments, such as figure 2 As shown, the method includes:

[0063] Step S201, when it is detected that the target third-party SDK embedded in the application program calls the target permission interface, intercept the call.

[0064] image 3 It is a system architecture diagram of an application program provided by Embodiment 2 of the present invention. Such as image 3 As shown, the system architecture of the application program may include an application layer, a system layer, and a privacy control layer. The application layer can include application business codes and third-party SDKs. Wherein, the application business code can be understood as other code modules except the third-party SDK, and the third-party SDK can be understood as the third-party SDK that needs ...

Embodiment 3

[0087] Figure 4 It is a flow chart of another permission monitoring processing method provided by Embodiment 3 of the present invention. This embodiment is optimized on the basis of the above embodiments, as shown in Figure 4 As shown, the method includes:

[0088] Step S301, when it is detected that the target third-party SDK calls the target permission interface, intercept the call, and jump to execute the permission monitoring and processing interface.

[0089] The permission monitoring and processing interface may be an interface for performing permission monitoring and processing on the target third-party SDK when the target third-party SDK calls the target permission interface, and is used to monitor the legitimacy of the call.

[0090] In this embodiment, the target third-party SDK can be a compiled language SDK or a high-level interpreted language SDK. For SDKs of different programming languages, different interception and jump methods can be adopted to intercept ca...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a permission monitoring processing method and device, computer equipment and a medium. The method comprises the following steps: when it is detected that a target third-party SDK embedded in an application program calls a target permission interface, calling is intercepted; and a matched monitoring processing rule is determined according to the target third-party SDK and / orthe target permission interface, and the monitoring processing rule is executed. According to the embodiment of the invention, the target third-party SDK is controlled to call the target permission interface according to the monitoring processing rule, so that the access of the third-party SDK to the privacy interface is automatically controlled, and the control right of the third-party SDK is enhanced.

Description

technical field [0001] Embodiments of the present invention relate to computer technology, and in particular to a method, device, computer equipment and media for authority monitoring and processing. Background technique [0002] Under the current mobile devices, if an application applies for a certain system permission, or can access some private data, all software development kits (Software Development Kit, SDK) inside it can use this permission arbitrarily, sharing Privacy data obtained by this application. [0003] In order to solve third-party privacy issues, application (Application, APP) manufacturers often adopt decompilation and reverse code audit before accessing the third-party SDK. Refuse to access the SDK, or ask them to rectify. [0004] In the process of implementing the present invention, the inventor found that the existing technology has the following defects: the review method needs to invest a lot of labor costs, and the review efficiency is low. In add...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F21/60
CPCG06F21/604G06F21/6245G06F2221/2141
Inventor 江威王小双
Owner GUANGZHOU HUYA TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products