Unlock instant, AI-driven research and patent intelligence for your innovation.

Control method and device based on private data calling

A privacy data, control technology, applied in the field of information security, can solve problems such as hidden safety hazards, and achieve the effect of ensuring security

Active Publication Date: 2021-05-07
ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
View PDF6 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since each small program obtains the private data of users on the platform application, for platform applications, if the behavior of obtaining private data by the small program is not controlled, there will undoubtedly be serious security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Control method and device based on private data calling
  • Control method and device based on private data calling
  • Control method and device based on private data calling

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] In order for those skilled in the art to better understand the technical solutions in the embodiments of this specification, the technical solutions in the embodiments of this specification will be described in detail below in conjunction with the drawings in the embodiments of this specification. Obviously, the described implementation Examples are only some of the embodiments in this specification, not all of them. All other embodiments obtained by persons of ordinary skill in the art based on the embodiments in this specification shall fall within the scope of protection.

[0021] The terms used in this specification are for the purpose of describing particular embodiments only, and are not intended to limit the specification. As used in this specification and the appended claims, the singular forms "a", "the", and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood that the term "and / or...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a control method and device based on privacy data calling. calling permissions of all applets are pre-configured according to basic functions of all the applets, and the calling permissions are used for describing legal behavior sequences and / or illegal behavior sequences corresponding to all kinds of privacy data called by the applets. The method comprises the following steps: acquiring an actual behavior sequence operated by a target applet before calling privacy data; and determining whether to prohibit the target applet from calling the private data or not by utilizing the acquired behavior sequence, the type of the private data and a pre-configured calling permission of the target applet.

Description

technical field [0001] This specification relates to the field of information security technology, and in particular to a control method and device based on private data calls. Background technique [0002] Small program technology allows users to directly use the services of other applications on the platform application without downloading other applications. Among them, other applications rely on the platform application in the form of small programs, and can enjoy the user experience of the platform application. . [0003] During the operation of the applet, the user's data needs to be invoked for business processing, and the user's data includes not only some conventional data, but also some data of great value to the user, such as the user's private data. Since each applet obtains the private data of users on the platform application, for platform applications, if the behavior of obtaining private data by the applet is not controlled, there will undoubtedly be serious...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62
CPCG06F21/6245G06F21/6281
Inventor 赵豪乜聚虎陈薇婷
Owner ALIPAY (HANGZHOU) INFORMATION TECH CO LTD