Unlock instant, AI-driven research and patent intelligence for your innovation.

Application permission verification method and device, equipment and storage medium

A technology of application authority and verification method, which is applied in the direction of multi-program device, computer security device, digital data authentication, etc., can solve the problems of authority abuse and amplification, and achieve the effect of improving the security of authority opening

Pending Publication Date: 2021-07-16
MEIZU TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If application A applies for installation permission, then the application B shared with it has installation permission, which will lead to permission abuse and magnification.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application permission verification method and device, equipment and storage medium
  • Application permission verification method and device, equipment and storage medium
  • Application permission verification method and device, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0030] In this example, it is determined whether the first application is a shared application according to related attributes of the first application.

[0031] Taking the Android system as an example, you can obtain the uid attribute of the first application through the relevant standard interface in the Android system, and query the application package name corresponding to the uid attribute in the system service based on the uid attribute. If the application package name is multiple , it means that the uid attribute is common to multiple applications, thus, it is determined that the first application is a shared application.

example 2

[0033] In this example, the application identification of the first application is determined, and the application identification list set of all shared applications is obtained. Each application identification list set contains the application identifications of multiple applications sharing the same permission. If the application identification belongs to the application identification list set, it is considered that the first application belongs to the shared application.

[0034] Step 102, if the first application belongs to a shared application, obtain a preset development permission of the first application.

[0035] In this embodiment, if the first application belongs to a shared application, the preset development permission of the first application is obtained, wherein the preset development permission of the first application can be understood as the required application permission set during the development of the first application , which can be reflected in the co...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an application permission verification method and device, equipment and a storage medium, and relates to the technical field of computer application, and the method comprises the steps: responding to a verification request of a function permission of a first application, and judging whether the first application belongs to a shared application or not; if the first application belongs to the shared application, obtaining a preset development permission of the first application; judging whether a function permission corresponding to the verification request belongs to a preset development permission or not; and if the function permission does not belong to the preset development permission, feeding back a verification failure notification corresponding to the verification request. Therefore, for the application with the shared permission, the permission verification is carried out according to the permission information of the application, the problem that the permission is abused and amplified due to the fact that permission verification is directly carried out based on the shared permission is avoided, and the permission opening safety of the application is improved.

Description

technical field [0001] The present disclosure relates to the technical field of computer applications, and in particular to a method, device, device and storage medium for verifying application permissions. Background technique [0002] Usually, each application in the system (such as the Android system) of the terminal device is managed as a sandbox, and data between applications is independent and safe. There is a special case where permissions can be shared between applications with the same signature (shareduid, for development, it is the android:sharedUserId attribute). The scope of permissions shared between applications with shareuid includes Android permissions, data directories, etc. [0003] However, when sharing the above-mentioned applications, such as application A and application B, application A applies for and authorizes the permission, and application B directly authorizes the permission without defining or applying. If application A applies for the instal...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/44G06F21/62G06F9/54
CPCG06F9/542G06F21/44G06F21/6218
Inventor 黄超华
Owner MEIZU TECH CO LTD