CN103544447B - A kind of method preventing confidential information from revealing based on Android system and terminal - Google Patents

A kind of method preventing confidential information from revealing based on Android system and terminal Download PDF

Info

Publication number
CN103544447B
CN103544447B CN201310208989.0A CN201310208989A CN103544447B CN 103544447 B CN103544447 B CN 103544447B CN 201310208989 A CN201310208989 A CN 201310208989A CN 103544447 B CN103544447 B CN 103544447B
Authority
CN
China
Prior art keywords
application
confidential information
android
permission list
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310208989.0A
Other languages
Chinese (zh)
Other versions
CN103544447A (en
Inventor
朱小林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
TCL Corp
Original Assignee
TCL Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by TCL Corp filed Critical TCL Corp
Priority to CN201310208989.0A priority Critical patent/CN103544447B/en
Publication of CN103544447A publication Critical patent/CN103544447A/en
Application granted granted Critical
Publication of CN103544447B publication Critical patent/CN103544447B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Abstract

The invention discloses a kind of method preventing confidential information from revealing based on Android system and terminal, described method includes: A, create for storing the authority of application permission list at Android bottom, and confidential information classification is stored in application permission list;B, Android bottom generate privately owned API, the content of application permission list is set by privately owned API;C, when apply reading machine confidential information time, judge whether this application has permission acquisition confidential information at Android native layer according to application permission list;If application obtains confidential information, return time no and obtain failure information.The present invention generates privately owned API at Android bottom, judge whether this application has permission acquisition confidential information at its native layer, make application directly across Android JNI layer to obtain confidential information, thus the control that confidential information is accessed can not be realized, improve information security.

Description

A kind of method preventing confidential information from revealing based on Android system and terminal
Technical field
The present invention relates to terminal software safety, particularly to a kind of method preventing confidential information from revealing based on Android system and terminal.
Background technology
Based on Android(Android) system has open code, automatically RAM(random access memory is reclaimed, random access memory) thus improve the speed of service, application software is many and most freely, the feature such as simple to operate, Android system is widely used on the digital equipments such as smart mobile phone, panel computer, TV.But, android system there is also some problems, especially in terms of information security.The spendable application software of Android system is a lot, but these softwares there is no and retrained by control, and possible implanted malicious code in software, the quality of the application being downloaded use is very different causes unstable properties.
A lot of application softwaries can arbitrarily obtain the personal information of user in the case of user knows nothing, such as, navigation type application software can obtain the positional information that user is current, a picture beautifies software and may require that acquisition message registration, and the trivial games cutting Citrullus vulgaris etc the most also obtains the positional information of user;This causes the biggest threat to the personal information security of user.Although having when installing application software mandate to remind, but Most users not taking notice of that these are pointed out, usual user does not knows that these application have obtained its confidential information.In order to solve this problem, disclose the solution of some information securities the most on the net, be all based on the standard API(Application Programming of android system Interface, application programming interface) realize.Such as Publication No. CN102289633A, the patent document of the application program method for managing dynamic permission under invention entitled Android platform, when application program accesses the API needing authority, judging that this API is the most disabled according to the record in System Privileges table, user may choose whether that can revise authority access this API to control application program.But; these API are disclosed, easy implanted malicious code or easily crack existing protection priority assignation, in other words; there is software and decode leak in existing rights management mechanism, but implementation information safeguard protection does not ensures that confidential information will not be revealed from software view.
Thus prior art could be improved and improve.
Summary of the invention
In place of above-mentioned the deficiencies in the prior art; it is an object of the invention to provide a kind of method preventing confidential information from revealing based on Android system and terminal, cannot ensure the problem that confidential information will not be revealed solving prior art implementation information safeguard protection from software view.
In order to achieve the above object, this invention takes techniques below scheme:
A kind of method preventing confidential information from revealing based on Android system, comprising:
A, create for storing the authority of application permission list at Android bottom, and confidential information classification is stored in application permission list;
B, Android bottom generate privately owned API, the content of application permission list is set by privately owned API;
C, when apply reading machine confidential information time, judge whether this application has permission acquisition confidential information at Android native layer according to application permission list;The most then application obtains confidential information, returns and obtain failure information time no.
The described method preventing confidential information from revealing based on Android system, wherein, described step B specifically includes:
B1, installation priority assignation application, generate privately owned API at Android bottom;
B2, by privately owned API Access application permission list, amendment application permission list has and obtains the application type of authority and this application has permission the content of confidential information of acquisition;
B3, preserve amended application permission list.
The described method preventing confidential information from revealing based on Android system, wherein, described step C specifically includes:
C1, when apply reading machine confidential information time, this application call privately owned API of standard API Access, read application permission list;
C2, judge whether current application mates with the application in application permission list at Android native layer:
If C3 mates, then in application permission list, inquire about the type that current application has permission the confidential information of acquisition, obtain information data corresponding to the type by standard API and show.
The described method preventing confidential information from revealing based on Android system, wherein, described step C3 also includes: if current application is not mated with the application in application permission list, then generate for pointing out user's current application to have no right to obtain the information of confidential information, and transmits to display screen and show.
The described method preventing confidential information from revealing based on Android system, wherein, in described step C1, during this application call privately owned API of standard API Access, also including the application message obtaining this application, described application message includes the type of the confidential information applying name, bag name, these application needs to obtain.
The described method preventing confidential information from revealing based on Android system, wherein, in described step C2, if the bag name of application is identical in the Bao Mingyu application permission list of current application, is then judged as coupling.
The described method preventing confidential information from revealing based on Android system, wherein, described step C3 also includes:
C31, judge that the type of the confidential information that current application needs to obtain is whether the most identical with the type that application permission list is arranged;
If C32 is identical, then obtains information data corresponding to the type by standard API and show.
The described method preventing confidential information from revealing based on Android system, wherein, described step C32 also includes:
If the type that current application needs type and the application permission list of the confidential information obtained to arrange differs, then generate the information being used for pointing out user's current application acquisition confidential information content wrong, and transmit to display screen and show.
The described method preventing confidential information from revealing based on Android system, wherein, described confidential information includes the machine hardware information, owner's information and communication information;One application has permission and obtains one or more confidential information simultaneously.
A kind of terminal for realizing the described method preventing confidential information from revealing based on Android system, comprising:
Message processing module, for creating the authority for storing application permission list at Android bottom, and is stored in confidential information classification in application permission list;
Privately owned control module, for generating privately owned API at Android bottom, arranges the content of application permission list by privately owned API;
According to application permission list, judge module, for when applying reading machine confidential information, judging whether this application has permission acquisition confidential information at Android native layer.
Compared to prior art, the method preventing confidential information from revealing based on Android system of present invention offer and terminal, privately owned API is generated at Android bottom, confidential information classification is stored in the application permission list of Android bottom, the content of application permission list could can only be set by privately owned API, when applying reading machine confidential information, judge whether this application has permission acquisition confidential information at Android native, make application the interface calling below Android primary layer can not be gone to obtain confidential information directly across Android JNI layer, avoid existing application to walk around Android rights management by standard API and illegally obtain the situation of user profile, thus realize the control that confidential information is accessed, improve Information Security.
Accompanying drawing explanation
Fig. 1 is the present invention Android system structural representation preventing confidential information from revealing based on Android system.
Fig. 2 is the present invention method flow diagram preventing confidential information from revealing based on Android system.
Fig. 3 is the schematic diagram that the present invention application permission preventing confidential information from revealing based on Android system arranges interface.
Fig. 4 is the present invention schematic diagram checking permissions list preventing confidential information from revealing based on Android system.
Fig. 5 is that the present invention is for realizing the structured flowchart of the terminal preventing confidential information from revealing based on Android system.
Detailed description of the invention
The present invention provides a kind of method preventing confidential information from revealing based on Android system and terminal, and for making the purpose of the present invention, technical scheme and effect clearer, clear and definite, the present invention is described in more detail for the embodiment that develops simultaneously referring to the drawings.Should be appreciated that specific embodiment described herein, only in order to explain the present invention, is not intended to limit the present invention.
The present invention is provided with access rights to having applied and accesses content, and the application of users to trust just has permission the confidential information accessing user, does not has the application of authority can not obtain confidential information.The method preventing confidential information from revealing based on Android system that the present invention provides, wherein, as shown in Figure 1, described Android system includes that Android application layer, Android java(mono-kind can write the object oriented program language of cross-platform software) layer, Android JNI(java native interface, java calls this locality) layer, Android native layer and Android bottom.Android java layer is provided that standard API and the logical operations of application adaptation, uses java language to realize.Android native layer uses C/C++ language to realize function compiling.Android JNI layer is used for realizing language conversion, is equivalent to make Android java layer dock with the interface of Android native layer, makes Android java layer can be called the function of Android native layer by Android JNI layer.Please refer to Fig. 1 and Fig. 2, described in prevent confidential information from revealing method include:
S100, create for storing the authority of application permission list at Android bottom, and confidential information classification is stored in application permission list;
S200, Android bottom generate privately owned API, the content of application permission list is set by privately owned API;
S300, when apply reading machine confidential information time, judge whether this application has permission acquisition confidential information at Android native layer according to application permission list;The most then application obtains confidential information, returns and obtain failure information time no.
Can obtain different confidential information based on different application in use, arrange the authority of application and the type of its confidential information that can obtain for the ease of user flexibility, the present invention needs first confidential information to user to classify storage.In the step s 100, described confidential information is divided three classes, and is the machine hardware information, owner's information and communication information respectively.The machine hardware information can be subdivided into the system version of terminal, type of hardware, memory size etc..Owner's information can be subdivided into the title of user, account, password etc..Communication information can be subdivided into address list, short message content, GPS(Global Positioning System, global positioning system) etc..By the classification to confidential information, limit application and obtain the confidential information relevant to its function, it is to avoid the leakage of non-functional relevant confidential information.As navigation type application be only capable of obtain user positional information be easy to navigation, this navigation type application need not also lack of competence obtain user short message content, short message content can be avoided to reveal.
Standard API based on Android is disclosed, even if standard API be have employed the methods such as priority assignation by prior art, it still suffers from certain system vulnerability, and standard API using Android system to provide carries out priority assignation or amendment or acquisition confidential information all exists certain potential safety hazard.To this end, the present embodiment corresponding private privately owned API of program code that increases in existing Android system solves above-mentioned potential safety hazard, then step S200 specifically includes:
Step 21: install priority assignation application, generate privately owned API at Android bottom;
Step 22, by privately owned API Access application permission list, amendment application permission list has and obtains the application type of authority and this application has permission the content of confidential information of acquisition;
Step 23, preserve amended application permission list.
As in figure 2 it is shown, the privately owned API generated in existing Android system after installing priority assignation application, its code is non-public, manufacturer provide.The authority of application is set as data channel by privately owned API, program can be avoided to be cracked and the problem that causes confidential information to be revealed.Generating the application permission list of a blank after installing priority assignation application for the first time, confidential information and application trusty are added this application permission list by user.
On the display screen of terminal, generate an icon after priority assignation application is mounted, after clicking on this icon, occur that permission configuration interface as shown in Figure 3 realizes amendment or updates application permission list.User can become this application to have the right simultaneously to obtain one or more confidential information according to the function setting of application.Click on the icon in this interface can enter the operating instructions add or revise application data.The icon selecting application and selection public information type therein is drop-down menu.When the icon checking permissions list clicked in Fig. 3, occur that authority as shown in Figure 4 checks interface.Assume to apply B for purchasing by group application, its content of address list in acquisition confidential information of having the right.Application C is navigation application, can obtain user's current global positioning system (GPS) information.The content modification of the confidential information that application and this application can be obtained is stored in authority after completing.In Fig. 4, user can delete the confidential information of application (be equivalent to cancel this application and obtain the authority of confidential information) or amendment and this association by this interface.It should be appreciated that Fig. 3 and Fig. 4 is only the interface schematic diagram of the offer of the present embodiment, it can also be made up of other icon arrangement and content.
After setting application permission list by above-mentioned steps, when application needs to obtain user data, judging whether this application has acquisition authority at Android native layer, its basis for estimation is described application permission list, and described step S300 specifically includes:
Step 31, when apply reading machine confidential information time, this application call privately owned API of standard API Access, read application permission list;
Step 32, judge whether current application mates with the application in application permission list at Android native layer;
If step 33 is mated, then in application permission list, inquire about the type that current application has permission the confidential information of acquisition, obtain information data corresponding to the type by standard API and show.
In described step 31, during this application call privately owned API of standard API Access, also including the application message obtaining this application, described application message includes the type of the confidential information applying name, bag name, these application needs to obtain.In described step 32, if the bag name of application is identical in the Bao Mingyu application permission list of current application, then it is judged as coupling.This application has the authority obtaining confidential information, can obtain, from Android bottom, the confidential information with this association arranged application permission list by standard API;Pass sequentially through Android native layer after acquisition, Android JNI layer, Android java layer, the transmission of Android application layer show to display screen.
Described step 33 also includes: if current application is not mated with the application in application permission list, then generate for pointing out user's current application to have no right to obtain the information of confidential information, and transmits to display screen and show.During even current application does not appears in application permission list, then generate for pointing out user's current application to have no right to obtain the information of confidential information at Android native layer, and pass sequentially through Android JNI layer, Android java layer, the transmission of Android application layer show to display screen.
Some application may obtain confidential information incoherent with its function, assume that a navigation application has acquisition authority, but its positional information and address list of requiring to obtain user, user has opened the acquisition authority of positional information, address list and navigation there is no direct relation and be prohibited to obtain, in this case, described step 33 also includes:
Step 331, judge that the type of the confidential information that current application needs to obtain is whether the most identical with the type that application permission list is arranged;
If step 332 is identical, then obtains information data corresponding to the type by standard API and show.
Described step 332 also includes:
If the type that current application needs type and the application permission list of the confidential information obtained to arrange differs, then generate the information being used for pointing out user's current application acquisition confidential information content wrong, and transmit to display screen and show.
After above-mentioned steps 331 to 332, navigation application can obtain the positional information of user by standard API.Address list is not arranged in application permission list, and the information of generation can be shown as " navigation application illegally obtains address list, is prohibited ".The acquisition authority prompting the user whether to need relieving address list with this.
It is emphasized that the present embodiment uses and carry out authority judgement at Android native layer.Prior art generally realizes Android rights management in Android application layer or Android java layer.It is disclosed based on existing standard API, this two-layer arrange application authority or carry out authority judge easily be cracked or artificially change result, the application permission applying use senior can bypass existing Android rights management by standard API and reaches to obtain the purpose of confidential information, causes confidential information to be revealed.And the present invention carries out authority judgement at Android native layer, application can not go the interface calling below Android native layer to obtain confidential information directly across Android JNI layer, and so application cannot evade the title whether having current application in authority Rule of judgment, i.e. application permission list.Meanwhile, described application permission list is set by user oneself, needs the data channel formed by private privately owned API to revise, and other people cannot be introduced into this data channel also cannot arbitrarily change Rule of judgment, further increases confidential information safety guarantee.
Based on the above-mentioned method automatically installing application according to user type, the embodiment of the present invention also provides for a kind of terminal, refers to Fig. 5, described terminal includes the message processing module 101, privately owned control module 102 and the judge module 103 that are sequentially connected with.Create the authority for storing application permission list by message processing module 101 at Android bottom, and confidential information classification is stored in application permission list.Privately owned control module 102 generates privately owned API at Android bottom, is arranged the content of application permission list by privately owned API.When applying reading machine confidential information, it is judged that according to application permission list, module 103 judges whether this application has permission acquisition confidential information at Android native layer.
In the present embodiment, application is when needing reading machine confidential information, calls the privately owned API of standard API Access to read application permission list at Android java layer, the most also obtains the application message of this application.According to the application permission list read, judge module 103 judges whether this application has permission acquisition confidential information, feed back judged result.If the application bag name coupling in the Bao Mingyu application permission list of current application, then message processing module 101 obtains, from Android bottom, the confidential information that this application can obtain by standard API, passes sequentially through Android native layer, Android JNI layer, Android java layer, the transmission of Android application layer show to display screen.If current application does not appears in application permission list, then judge module 103 generates for pointing out user's current application to have no right to obtain the information of confidential information, passes sequentially through Android JNI layer, Android java layer, the transmission of Android application layer show to display screen.
In the present embodiment, described terminal is to use the smart mobile phone of Android system, panel computer or TV.Described terminal also includes generation module and priority assignation module.Described generation module, when installing priority assignation application, generates privately owned API at Android bottom, also creates the authority for storing power application permission list at Android bottom.
In sum, the present invention is directed to the open problem causing its rights management mechanism to there are security breaches of standard API of existing Android system, authority judgement is carried out at Android native layer, make application the interface calling below Android native layer can not be gone to obtain confidential information directly across Android JNI layer, avoid application and evade authority judgement management, it is achieved that the control that confidential information is accessed.Simultaneously, by installing the private privately owned API of priority assignation application generator code, only call this privately owned API and could revise authority Rule of judgment, it is to avoid API is caused authority Rule of judgment to be tampered the confidential information caused by illegal invasion revealing, improve the safety of confidential information.User can also arbitrarily arrange the type of confidential information that application can obtain, the sweetly disposition situation of confidential information permission use, is user-friendly to, improves the competitiveness of product.
It is understood that for those of ordinary skills, can be according to technical scheme and inventive concept thereof in addition equivalent or change, and all these change or replace the protection domain that all should belong to appended claims of the invention.

Claims (10)

1. the method preventing confidential information from revealing based on Android system, it is characterised in that including:
Step A, create for storing the authority of application permission list at Android bottom, and confidential information classification is stored in application permission list;
Step B, Android bottom generate privately owned API, the content of application permission list is set by privately owned API;
Step C, when apply reading machine confidential information time, judge whether this application has permission acquisition confidential information at Android native layer according to application permission list;The most then application obtains confidential information, returns and obtain failure information time no.
The method preventing confidential information from revealing based on Android system the most according to claim 1, it is characterised in that described step B specifically includes:
Step B1, installation priority assignation application, generate privately owned API at Android bottom;
Step B2, by privately owned API Access application permission list, amendment application permission list has and obtains the application type of authority and this application has permission the content of confidential information of acquisition;
Step B3, preserve amended application permission list.
The method preventing confidential information from revealing based on Android system the most according to claim 1, it is characterised in that described step C specifically includes:
Step C1, when apply reading machine confidential information time, this application call privately owned API of standard API Access, read application permission list;
Step C2, judge whether current application mates with the application in application permission list at Android native layer:
If step C3 is mated, then in application permission list, inquire about the type that current application has permission the confidential information of acquisition, obtain information data corresponding to the type by standard API and show.
The method preventing confidential information from revealing based on Android system the most according to claim 3, it is characterized in that, described step C3 also includes: if current application is not mated with the application in application permission list, then generate for pointing out user's current application to have no right to obtain the information of confidential information, and transmit to display screen and show.
The method preventing confidential information from revealing based on Android system the most according to claim 3, it is characterized in that, in described step C1, during this application call privately owned API of standard API Access, also including the application message obtaining this application, described application message includes the type of the confidential information applying name, bag name and this application needs to obtain.
The method preventing confidential information from revealing based on Android system the most according to claim 5, it is characterised in that in described step C2, if the bag name of application is identical in the Bao Mingyu application permission list of current application, is then judged as coupling.
The method preventing confidential information from revealing based on Android system the most according to claim 5, it is characterised in that described step C3 also includes:
Step C31, judge that the type of the confidential information that current application needs to obtain is whether the most identical with the type that application permission list is arranged;
If step C32 is identical, then obtains information data corresponding to the type by standard API and show.
The method preventing confidential information from revealing based on Android system the most according to claim 7, it is characterised in that described step C32 also includes:
If the type that current application needs type and the application permission list of the confidential information obtained to arrange differs, then generate the information being used for pointing out user's current application acquisition confidential information content wrong, and transmit to display screen and show.
The method preventing confidential information from revealing based on Android system the most according to claim 1, it is characterised in that described confidential information includes the machine hardware information, owner's information and communication information;One application has permission and obtains one or more confidential information simultaneously.
10. the terminal being used for realizing the method preventing confidential information from revealing based on Android system as claimed in claim 1, it is characterised in that including:
Message processing module, for creating the authority for storing application permission list at Android bottom, and is stored in confidential information classification in application permission list;
Privately owned control module, for generating privately owned API at Android bottom, arranges the content of application permission list by privately owned API;
According to application permission list, judge module, for when applying reading machine confidential information, judging whether this application has permission acquisition confidential information at Android native layer.
CN201310208989.0A 2013-05-30 2013-05-30 A kind of method preventing confidential information from revealing based on Android system and terminal Active CN103544447B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310208989.0A CN103544447B (en) 2013-05-30 2013-05-30 A kind of method preventing confidential information from revealing based on Android system and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310208989.0A CN103544447B (en) 2013-05-30 2013-05-30 A kind of method preventing confidential information from revealing based on Android system and terminal

Publications (2)

Publication Number Publication Date
CN103544447A CN103544447A (en) 2014-01-29
CN103544447B true CN103544447B (en) 2016-10-12

Family

ID=49967886

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310208989.0A Active CN103544447B (en) 2013-05-30 2013-05-30 A kind of method preventing confidential information from revealing based on Android system and terminal

Country Status (1)

Country Link
CN (1) CN103544447B (en)

Families Citing this family (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103984900B (en) * 2014-05-19 2017-03-01 南京赛宁信息技术有限公司 Android application leak detection method and system
CN105578433B (en) * 2014-10-17 2020-09-15 南京中兴新软件有限责任公司 Terminal short message protection method and device
CN104462997B (en) * 2014-12-04 2017-05-24 北京奇虎测腾科技有限公司 Method, device and system for protecting work data in mobile terminal
CN109684824B (en) * 2014-12-29 2021-09-03 北京奇虎科技有限公司 Process permission configuration method and device
CN105989296B (en) * 2015-01-27 2019-03-19 华为技术有限公司 The method and apparatus for controlling application access
CN105095788B (en) * 2015-06-30 2018-06-29 北京奇虎科技有限公司 The method, apparatus and system of private data guard
US20170012982A1 (en) * 2015-07-10 2017-01-12 Google Inc. Protecting Data From Unauthorized Access
CN105636038B (en) * 2015-07-31 2019-03-08 宇龙计算机通信科技(深圳)有限公司 Information security management method, intelligent wearable device and the terminal of intelligent wearable device
KR20170052083A (en) * 2015-11-03 2017-05-12 에스프린팅솔루션 주식회사 Mage forming apparatus, method for recovering error thereof, mobile apparatus and method recovering error thereof
CN107623659B (en) * 2016-07-14 2020-10-09 精硕科技(北京)股份有限公司 Method and system for acquiring device characteristic ID
CN107704356B (en) * 2017-06-12 2019-06-28 平安科技(深圳)有限公司 Exception stack information acquisition method, device and computer readable storage medium
CN108629189A (en) * 2018-03-20 2018-10-09 蔚来汽车有限公司 Engine end data guard method, device and vehicle
CN109241769B (en) * 2018-08-09 2020-05-15 福州瑞芯微电子股份有限公司 Electronic equipment privacy safety early warning method and system
CN109639884A (en) * 2018-11-21 2019-04-16 惠州Tcl移动通信有限公司 A kind of method, storage medium and terminal device based on Android monitoring sensitive permission
CN110727941B (en) * 2019-08-23 2023-10-13 深圳市轱辘车联数据技术有限公司 Privacy data protection method and device, terminal equipment and storage medium
CN111400757B (en) * 2020-03-13 2022-09-27 西安电子科技大学 Method for preventing native code in android third-party library from revealing user privacy

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102186167A (en) * 2011-04-11 2011-09-14 中兴通讯股份有限公司 Method and system for monitoring applications
CN102572804A (en) * 2011-12-27 2012-07-11 奇智软件(北京)有限公司 Data calling method and device
CN102917346A (en) * 2012-10-17 2013-02-06 浙江大学城市学院 Security policy management system and method for Android-based application program during operation
CN103023871A (en) * 2012-11-16 2013-04-03 华中科技大学 Android privilege escalation attack detection system and method based on cloud platform

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102186167A (en) * 2011-04-11 2011-09-14 中兴通讯股份有限公司 Method and system for monitoring applications
CN102572804A (en) * 2011-12-27 2012-07-11 奇智软件(北京)有限公司 Data calling method and device
CN102917346A (en) * 2012-10-17 2013-02-06 浙江大学城市学院 Security policy management system and method for Android-based application program during operation
CN103023871A (en) * 2012-11-16 2013-04-03 华中科技大学 Android privilege escalation attack detection system and method based on cloud platform

Also Published As

Publication number Publication date
CN103544447A (en) 2014-01-29

Similar Documents

Publication Publication Date Title
CN103544447B (en) A kind of method preventing confidential information from revealing based on Android system and terminal
US8955142B2 (en) Secure execution of unsecured apps on a device
US9537869B2 (en) Geographical restrictions for application usage on a mobile device
US8769305B2 (en) Secure execution of unsecured apps on a device
US8549656B2 (en) Securing and managing apps on a device
US8893298B2 (en) Network linker for secure execution of unsecured apps on a device
US20120246484A1 (en) Secure execution of unsecured apps on a device
US9165139B2 (en) System and method for creating secure applications
US8990920B2 (en) Creating a virtual private network (VPN) for a single app on an internet-enabled device or system
US9065771B2 (en) Managing application execution and data access on a device
KR101970744B1 (en) Trust level activation
US9542552B2 (en) Extensible platform for securing apps on a mobile device using policies and customizable action points
US20140040622A1 (en) Secure unlocking and recovery of a locked wrapped app on a mobile device
CN103890772A (en) Sandboxing technology for webruntime system
US20160055344A1 (en) Data loss prevention during app execution using e-mail enforcement on a mobile device
US20150358356A1 (en) Processing device and method of operation thereof
CN107077565A (en) The collocation method and equipment of a kind of safe configured information
CN103455520A (en) Method and device for accessing Android database
CN106557669A (en) A kind of authority control method and device of application program installation process
CN104268463A (en) Method and device for managing calling authority of camera
US9672353B2 (en) Securing and managing apps on a device using policy gates
US10713370B2 (en) Information rights management through editors implemented in a browser
CN117235771B (en) Permission management and control method of application program and electronic equipment
CN112784263B (en) Bit-locked disk handler management system and method
Zheng Overview of security Enhanced Android’s security architecture

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant