Application permission verification method and device, equipment and storage medium
A technology of application authority and verification method, which is applied in the direction of multi-program device, computer security device, digital data authentication, etc., can solve the problems of authority abuse and amplification, and achieve the effect of improving the security of authority opening
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
example 1
[0030] In this example, it is determined whether the first application is a shared application according to related attributes of the first application.
[0031] Taking the Android system as an example, you can obtain the uid attribute of the first application through the relevant standard interface in the Android system, and query the application package name corresponding to the uid attribute in the system service based on the uid attribute. If the application package name is multiple , it means that the uid attribute is common to multiple applications, thus, it is determined that the first application is a shared application.
example 2
[0033] In this example, the application identification of the first application is determined, and the application identification list set of all shared applications is obtained. Each application identification list set contains the application identifications of multiple applications sharing the same permission. If the application identification belongs to the application identification list set, it is considered that the first application belongs to the shared application.
[0034] Step 102, if the first application belongs to a shared application, obtain a preset development permission of the first application.
[0035] In this embodiment, if the first application belongs to a shared application, the preset development permission of the first application is obtained, wherein the preset development permission of the first application can be understood as the required application permission set during the development of the first application , which can be reflected in the co...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


