Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for evaluating personal information protection capability of application software in real-time running state

A technology for application software and information protection, applied in the direction of digital data protection, platform integrity maintenance, instruments, etc., can solve problems such as inability to accurately reflect APP personal information management, differences, and inability to reflect user information or data

Pending Publication Date: 2021-07-23
中电数据服务有限公司
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this cannot accurately reflect the management of personal information by the APP. There are two main reasons. First, the permissions obtained by the APP may be necessary for the normal operation of the APP, or have been authorized by the user; or authorized by the user, cannot reflect whether the user information or data obtained through these permissions is used for the purpose stated by the APP, or changes and expands its purpose of use
[0005] Under normal circumstances, people install the APP to run and use it. Then, during the use process, it will be opened according to the need, or a certain or certain permissions must be opened, so that the personal information protection ability of the APP can be protected in the running state and in the static state. There are differences in loading and unloading

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for evaluating personal information protection capability of application software in real-time running state
  • Method for evaluating personal information protection capability of application software in real-time running state
  • Method for evaluating personal information protection capability of application software in real-time running state

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] In order to better understand the present invention, the method and system of the present invention will be further described below with reference to the description of the embodiments in conjunction with the accompanying drawings.

[0018] In the following detailed description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. However, it will be understood by those skilled in the art that the present invention may be practiced without these specific details. In the embodiments, well-known methods, procedures, components have not been described in detail so as not to unnecessarily obscure the embodiments.

[0019] see figure 1 As shown, the present invention provides a method for evaluating the personal information protection capability of application software in a real-time running state, including:

[0020] S1: Determine the application permissions of the application software (APP) related to personal inf...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for evaluating personal information protection capability of an APP in a real-time running state, according to application behaviors and influence factors of personal information security related to the application software (APP), a personal information security calculation strategy of the application software (APP) is generated, and according to different application behaviors and influence factors, each application permission is assigned; an APP static personal information protection capability score is calculated and taken as an initial value; then the influence of the important privacy authority obtained by the APP on the personal information protection capability of the APP is analyzed and calculated; and finally, the score of the personal information protection capability of the APP during real-time operation is calculated, guidance is provided for evaluating the personal information protection capability of the APP, a user to select and use the APP is guided, the user can be assisted to fully understand the influence of opening / closing of different permissions on the personal information protection capability of the APP, and therefore, the user can be guided to carefully open the APP permission or timely close the permission for use compensation.

Description

technical field [0001] The invention belongs to the field of personal information protection, and in particular relates to a method for evaluating the personal information protection capability of application software in a real-time running state. Background technique [0002] At present, with the rapid development of mobile Internet technology, mobile handheld devices mainly based on smart phones are greatly popularized and constantly changing and affecting the lives of the public. The Android system, as one of the mainstream operating systems for smart phones, was released by Google and released eleven new versions in a row, which has occupied more than half of the market share of smart phone operating systems. App is an application program running on the Android system. With the increase of the number of users, the download volume of the application program has exceeded 10 billion. In China, more than 70% of users do not have access to Google services, and a large number...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/62G06F21/53
CPCG06F21/6281G06F21/629G06F21/6245G06F21/53
Inventor 左晓栋崔占华张弛刘雨桁周亚超
Owner 中电数据服务有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products