CN111222122A - Application authority management method and device and embedded equipment - Google Patents

Application authority management method and device and embedded equipment Download PDF

Info

Publication number
CN111222122A
CN111222122A CN201911406281.XA CN201911406281A CN111222122A CN 111222122 A CN111222122 A CN 111222122A CN 201911406281 A CN201911406281 A CN 201911406281A CN 111222122 A CN111222122 A CN 111222122A
Authority
CN
China
Prior art keywords
application
permission
authority
list
apk file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911406281.XA
Other languages
Chinese (zh)
Inventor
刘茜
卞芳
梁宵
黄艳丽
李孝猛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Aisino Corp
Original Assignee
Aisino Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Aisino Corp filed Critical Aisino Corp
Priority to CN201911406281.XA priority Critical patent/CN111222122A/en
Publication of CN111222122A publication Critical patent/CN111222122A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Stored Programmes (AREA)

Abstract

The invention discloses an application authority management method, an application authority management device and an embedded device. The method is applied to an Android Things platform and comprises the following steps: aiming at any application in an application list, acquiring the latest apk file of the application; acquiring the apk file of the application before the update; reading the authority recorded in the latest apk file to form a current authority list; reading the authority recorded in the apk file before the update to form an authority list before the update; and comparing the current permission list with the permission list before updating to generate a consistent permission list, a newly added permission list and/or a newly deleted permission list. According to the method, the authorization permission acquired before and after the application on the Android Things platform is analyzed, and the malicious permission which is introduced in the updating process and is irrelevant to the application function is determined, so that the malicious function is prevented from being executed efficiently and conveniently by utilizing the malicious permission.

Description

Application authority management method and device and embedded equipment
Technical Field
The invention relates to the technical field of embedded equipment, in particular to an application authority management method and device and embedded equipment.
Background
Android Things is an operating system for internet of Things-oriented applications launched by Google in 2016, 12 months. The same tools, Android frames and Google APIs as those used for Android development are used, so that application development facing the Internet of things is simpler, and the method is widely applied.
Typically, an application on the Android Things platform does not pop up a dialog box to ask the user whether the application is authorized for before authorization. Therefore, the malicious intrusion can acquire additional authorization, execute malicious functions, steal personal information of the user and the like under the condition that the user cannot be aware of the malicious intrusion, and cause security threats.
Disclosure of Invention
The invention provides an application authority management method, an application authority management device and embedded equipment, and aims to solve the problem that the application authority management security of the existing android things platform is low.
In a first aspect, the invention provides an application authority management method applied to an Android Things platform, which includes the following steps:
for any application within the application manifest,
acquiring the latest apk file of the application; acquiring the apk file of the application before the update;
reading the authority recorded in the latest apk file to form a current authority list;
reading the authority recorded in the apk file before the update to form an authority list before the update;
and comparing the current permission list with the permission list before updating to generate a consistent permission list, a newly added permission list and/or a newly deleted permission list.
Further, the application authority management method further includes:
determining sensitive authorities in a consistent authority list according to a dangerous authority list provided by Android Things; and/or
Determining the sensitive authority in the newly added authority list according to a dangerous authority list provided by the Android Things and a safety authority list corresponding to the application function; and/or
And determining the safety permission in the new deletion permission list according to the dangerous permission list provided by the Android Things and the safety permission list corresponding to the function of the application.
Further, the application authority management method further includes:
generating a verified apk file:
deleting the sensitive permission in the consistent permission list from the latest apk file;
deleting the sensitive permission in the newly added permission list from the latest apk file;
and adding the security permission in the new deletion permission list to the latest apk file.
Further, the application authority management method further includes:
running the verified apk file to update the application;
wherein, the apk file comprises a Manifest file;
the security authority for the application is described in a statement beginning with android in the Manifest file.
Further, the application authority management method further includes:
scanning log records of applications installed on the embedded device, determining the applications which are updated once in a set monitoring period, and forming an application list.
In a second aspect, the present invention provides an application authority management apparatus configured in an embedded device applying an Android Things platform, where the apparatus includes:
an apk file acquisition unit configured to:
acquiring the latest apk file of the target application; acquiring an apk file before the latest update of the target application;
a permission list generation unit operable to:
reading the authority recorded in the latest apk file of the target application to form a current authority list;
reading the authority recorded in the apk file before the latest updating of the target application to form an authority list before updating;
a permission comparison unit, configured to:
and comparing the current permission list with the permission list before updating to generate a consistent permission list, a newly added permission list and/or a newly deleted permission list.
Further, the application authority management device further includes:
a security/sensitive permission determination unit to:
determining sensitive authorities in a consistent authority list according to a dangerous authority list provided by Android Things; and/or
Determining the sensitive authority in the newly added authority list according to a dangerous authority list provided by the Android Things and a safety authority list corresponding to the application function; and/or
And determining the safety permission in the new deletion permission list according to the dangerous permission list provided by the Android Things and the safety permission list corresponding to the function of the application.
Further, the application authority management device further includes:
a verified apk file generating unit, configured to:
generating a verified apk file:
deleting the sensitive permission in the consistent permission list from the latest apk file;
deleting the sensitive permission in the newly added permission list from the latest apk file;
and adding the security permission in the new deletion permission list to the latest apk file.
Further, the application authority management device further includes:
a target application update unit to:
running the verified apk file to update the application;
wherein, the apk file comprises a Manifest file;
the security authority for the application is described in a statement beginning with android in the Manifest file.
In a third aspect, the present invention provides an application rights management embedded device,
configuring an application developed based on an Android Things platform;
the application authority management device described in the second aspect is configured.
According to the application permission management method, the device and the embedded equipment, the authorization permission obtained before and after the application on the Android Things platform is updated is analyzed, and the malicious permission which is introduced in the updating process and is irrelevant to the application function is determined, so that malicious operations such as malicious function execution, user personal information stealing and the like by utilizing the malicious permission are avoided, the privacy of users is protected, the safety of the application program and the embedded equipment developed based on the Android Things platform is improved, and the method, the device and the embedded equipment are efficient and convenient.
Drawings
A more complete understanding of exemplary embodiments of the present invention may be had by reference to the following drawings in which:
fig. 1 is a schematic flow chart of a rights management method before and after application update of an Android Things platform according to a preferred embodiment of the present invention;
fig. 2 is a schematic composition diagram of a rights management device before and after an application update of an Android Things platform according to a preferred embodiment of the present invention;
fig. 3 is a flowchart of a rights management method before and after an application of an Android Things platform is updated according to another preferred embodiment of the present invention.
Detailed Description
The exemplary embodiments of the present invention will now be described with reference to the accompanying drawings, however, the present invention may be embodied in many different forms and is not limited to the embodiments described herein, which are provided for complete and complete disclosure of the present invention and to fully convey the scope of the present invention to those skilled in the art. The terminology used in the exemplary embodiments illustrated in the accompanying drawings is not intended to be limiting of the invention. In the drawings, the same units/elements are denoted by the same reference numerals.
Unless otherwise defined, terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. Further, it will be understood that terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the relevant art and will not be interpreted in an idealized or overly formal sense.
The application program of the Android platform can actively ask the user whether to authorize the application permissions for other applications or devices on the equipment at run time if the application permissions need to be obtained for the permissions. If the pay bank app can be installed, or when a user needs to use a camera in the pay bank app to take a picture, the Android operating system is requested to obtain the use permission of the camera on the smart phone of the user.
In general, an application running on the Android Things platform does not need to acquire information or instructions through a human-computer interaction interface. In addition, the embedded device developed based on the Android Things platform is not provided with a human-computer interaction interface for popping up a running dialog box. Thus, Android Things applications do not support the application of permissions to users at runtime, but instead pre-authorize all permissions declared in the Manifest file when the application is installed.
However, when an application is installed on the Android threads platform, a mechanism that all permissions requested for the application are authorized by default leads to the problems of permission abuse (such as user information leakage caused by accessing external equipment and accessing a recording or shooting function) or excessive application permission, and reduces the safety or the use performance of the equipment, and the like.
For example, malicious intrusion is authorized by updating an application program to obtain additional rights that are unrelated to the functions of the embedded device or the functions of the application, thereby performing malicious functions, stealing user personal information, and the like.
The invention provides a method, a device and a user terminal for managing application permission of an Android thins platform, which are triggered by application program updating, and aims to solve the problem that additional permission can be introduced to the application program of the Android thining platform to cause security threat during updating.
As shown in fig. 1, the application authority management method according to the embodiment of the present invention is applied to an Android Things platform, and includes:
for any application within the application manifest,
step S100: acquiring the latest apk file of the application; acquiring the apk file of the application before the update;
step S200: reading the authority recorded in the latest apk file to form a current authority list;
reading the authority recorded in the apk file before the update to form an authority list before the update;
step S300: and comparing the current permission list with the permission list before updating to generate a consistent permission list, a newly added permission list and/or a newly deleted permission list.
According to the application permission management method, the authorization permission acquired before and after the application on the Android Things platform is updated is analyzed, and the malicious permission which is introduced in the updating process and is irrelevant to the application function is determined, so that malicious operations such as executing the malicious function by using the malicious permission, stealing user personal information and the like are avoided, the privacy of a user is protected, and the safety of an application program and embedded equipment developed based on the Android Things platform is improved.
Further, the application authority management method of the embodiment further includes:
determining sensitive authorities in a consistent authority list according to a dangerous authority list provided by Android Things; and/or
Determining the sensitive authority in the newly added authority list according to a dangerous authority list provided by the Android Things and a safety authority list corresponding to the application function; and/or
And determining the safety permission in the new deletion permission list according to the dangerous permission list provided by the Android Things and the safety permission list corresponding to the function of the application.
It should be understood that a dangerous or sensitive right is a right that requires denial of authorization; security rights are the rights that an application function must have in order to execute. Further, the application authority management method of the embodiment further includes:
generating a verified apk file:
deleting the sensitive permission in the consistent permission list from the latest apk file;
deleting the sensitive permission in the newly added permission list from the latest apk file;
and adding the security permission in the new deletion permission list to the latest apk file.
The application permission management method of the embodiment deletes the sensitive permission from the latest apk file, and adds the security permission to the latest apk file, thereby actively performing permission management on the target application.
Further, the application authority management method of the embodiment further includes:
running the verified apk file to update the application;
wherein, the apk file comprises a Manifest file;
the security authority for the application is described in a statement beginning with android in the Manifest file.
According to the application authority management method, the verified apk file is operated, the target application is updated, normal operation of the application can be guaranteed, and functional loss or safety risk caused by abuse authorization or wrong authorization is avoided.
Further, the application authority management method of the embodiment further includes:
scanning log records of applications installed on the embedded device, determining the applications which are updated once in a set monitoring period, and forming an application list.
It should be understood that the set monitoring period is determined according to the update frequency of the application installed on the embedded device, and may be a day, a week, or several hours. Within this set monitoring period, the application has done and only done one update.
It should be understood that multiple updates may be applied during the set monitoring period. At this time, the update closest to the current time is taken.
As shown in fig. 2, an application authority management apparatus according to an embodiment of the present invention is configured in an embedded device applying an Android Things platform, and the apparatus includes:
an apk file acquiring unit 10 for:
acquiring the latest apk file of the target application; acquiring an apk file before the latest update of the target application;
a permission list generating unit 20 for:
reading the authority recorded in the latest apk file of the target application to form a current authority list;
reading the authority recorded in the apk file before the latest updating of the target application to form an authority list before updating;
a permission comparison unit 30, configured to:
and comparing the current permission list with the permission list before updating to generate a consistent permission list, a newly added permission list and/or a newly deleted permission list.
Further, the application authority management apparatus of this embodiment further includes:
a security/sensitive permission determination unit to:
determining sensitive authorities in a consistent authority list according to a dangerous authority list provided by Android Things; and/or
Determining the sensitive authority in the newly added authority list according to a dangerous authority list provided by the Android Things and a safety authority list corresponding to the application function; and/or
And determining the safety permission in the new deletion permission list according to the dangerous permission list provided by the Android Things and the safety permission list corresponding to the function of the application.
Further, the application authority management apparatus of this embodiment further includes:
a verified apk file generating unit, configured to:
generating a verified apk file:
deleting the sensitive permission in the consistent permission list from the latest apk file;
deleting the sensitive permission in the newly added permission list from the latest apk file;
and adding the security permission in the new deletion permission list to the latest apk file.
Further, the application authority management apparatus of this embodiment further includes:
a target application update unit to:
running the verified apk file to update the application;
wherein, the apk file comprises a Manifest file;
the security authority for the application is described in a statement beginning with android in the Manifest file.
The application authority management embedded equipment provided by the embodiment of the invention is configured with an application developed based on an Android Things platform;
the application authority management device of the foregoing embodiment is configured.
The application permission management method, the application permission management device and the user terminal solve the problem that the Android Things platform does not support the application of the dynamic permission during running, so that the user permission is abused or maliciously used.
Specifically, the collected authority lists in the Manifest files before and after application updating are analyzed, and the same authority items before and after updating, deleted authority items after updating and newly added authority items after updating are analyzed.
Aiming at the application function, by combining with the dangerous authority possibly causing potential safety hazard in the Android authority protection level provided by the Google official, judging whether the application adds malicious authority irrelevant to the application function through updating, and actively responding to the safety threat possibly caused by the malicious authority.
The function used here means a function to be provided by a predetermined application program; whereas a dangerous or sensitive right is a right that is independent of the function that the application should have. For example, the application aiming at the electronic access control obtains the positioning authority through declaration; at this time, the positioning authority belongs to the danger authority obtained by the access control application.
In specific implementation, the application authority management method can read an apk file of an application by using Python or other scripting languages, and after decompression, a manifest file is obtained; whether the file contains the sentence at the beginning of the android and the key for describing the authority name determined in advance is judged by reading the file line by line, so that whether the related authority is recorded is determined.
According to the application authority management method provided by the embodiment of the invention, the corresponding detection result can be output according to the input APK file, and the method is simple to implement, efficient and convenient.
The application permission management method is applied to an Android Things platform, analyzes the permission list in the Manifest file by compiling scripts and forming an automation program, provides service for dangerous permission analysis according to Google official Android permission protection level and application function, and responds to possible safety threats.
The application authority management method of the embodiment of the invention forms a tool for providing the authority analysis service. During programming, source codes are not required to be provided, script codes can be adopted for implementation, and script instructions can be directly written, so that the method is simple and easy to use.
The process of rights analysis and management is described in detail with reference to fig. 3:
1) acquiring an APK file of an application program of a version before updating;
acquiring an APK file of an application program of an updated version;
2) acquiring a Manifest file of an application program of a version before updating;
acquiring a Manifest file of an updated version of an application program; the Manifest file is used for declaring the authority of the application program;
3) analyzing the two Manifest files obtained in step 2):
reading the file line by line, acquiring a statement at the beginning of' android.
4) Determining the permission difference before and after application updating, and identifying the same permission before and after updating, the added permission and the deleted permission;
5) and responding to the authority which may generate the potential safety hazard in the function of the application and the Android authority protection level by taking the authority which may generate the collected user data, the data leakage and the like as the potential safety hazard.
Table 1 shows a sensitive authority list provided by google, which usually causes a security risk. For specific applications, a sensitive permission list causing potential safety hazards needs to be determined according to the functions of the applications.
TABLE 1 list of permissions that typically raise a safety hazard
Figure BDA0002348723320000091
Figure BDA0002348723320000101
During specific implementation, the authority in the application Manifest file before and after updating, the same authority before and after updating, and the authority for deleting and adding after updating are collected by the script;
analyzing according to the application function and the authority possibly causing the security threat in the Google official Android authority level protection, and responding to the potential safety hazard possibly generated in advance;
in summary, the application permission management method in the embodiment of the present invention obtains the addition and deletion permissions after updating by collecting the application permissions before and after updating, and analyzes according to the application function and the dangerous permission list, so that security threats such as privacy disclosure and permission abuse caused by permissions can be discovered before application use, and a security guarantee is provided for a user.
The application authority management method has certain universality and can be used for applications on an Android Things platform.
An Android Application Package (APK) is an application package file format used by an Android operating system for distributing and installing mobile applications and middleware.
The code of an Android application program is required to be run on an Android device, and the code must be compiled first and then packaged into a file which can be recognized by an Android system to be run, and the file format which can be recognized and run by the Android system is 'APK'.
An APK file contains compiled code files (. dex files), file resources (resources), native resource files (assets), certificates (certifies), and manifest files (manifest files).
The APK file is based on ZIP file format, and is similar to the JAR file in construction mode, and the Internet media types are as follows: application/vnd.android.package-archive.
The invention has been described above by reference to a few embodiments. However, other embodiments of the invention than the one disclosed above are equally possible within the scope of the invention, as would be apparent to a person skilled in the art from the appended claims.
Generally, all terms used in the claims are to be interpreted according to their ordinary meaning in the technical field, unless explicitly defined otherwise herein. All references to "a// the [ device, component, etc ]" are to be interpreted openly as at least one instance of a device, component, etc., unless explicitly stated otherwise. The steps of any method disclosed herein do not have to be performed in the exact order disclosed, unless explicitly stated.

Claims (10)

1. The application authority management method is applied to an Android Things platform and comprises the following steps:
for any application within the application manifest,
acquiring the latest apk file of the application; acquiring the apk file of the application before the update;
reading the authority recorded in the latest apk file to form a current authority list;
reading the authority recorded in the apk file before the update to form an authority list before the update;
and comparing the current permission list with the permission list before updating to generate a consistent permission list, a newly added permission list and/or a newly deleted permission list.
2. The application rights management method of claim 1, further comprising:
determining sensitive authorities in a consistent authority list according to a dangerous authority list provided by Android Things; and/or
Determining the sensitive authority in the newly added authority list according to a dangerous authority list provided by the Android Things and a safety authority list corresponding to the application function; and/or
And determining the safety permission in the new deletion permission list according to the dangerous permission list provided by the Android Things and the safety permission list corresponding to the function of the application.
3. The application rights management method of claim 2, further comprising:
generating a verified apk file:
deleting the sensitive permission in the consistent permission list from the latest apk file;
deleting the sensitive permission in the newly added permission list from the latest apk file;
and adding the security permission in the new deletion permission list to the latest apk file.
4. The application rights management method of claim 3, further comprising:
running the verified apk file to update the application;
wherein, the apk file comprises a Manifest file;
the security authority for the application is described in a statement beginning with android in the Manifest file.
5. The application rights management method of claim 1, further comprising:
scanning log records of applications installed on the embedded device, determining the applications which are updated once in a set monitoring period, and forming an application list.
6. An application authority management device, configured in an embedded device applying an Android Things platform, the device comprising:
an apk file acquisition unit configured to:
acquiring the latest apk file of the target application; acquiring an apk file before the latest update of the target application;
a permission list generation unit operable to:
reading the authority recorded in the latest apk file of the target application to form a current authority list;
reading the authority recorded in the apk file before the latest updating of the target application to form an authority list before updating;
a permission comparison unit, configured to:
and comparing the current permission list with the permission list before updating to generate a consistent permission list, a newly added permission list and/or a newly deleted permission list.
7. The application right management device according to claim 6, further comprising:
a security/sensitive permission determination unit to:
determining sensitive authorities in a consistent authority list according to a dangerous authority list provided by Android Things; and/or
Determining the sensitive authority in the newly added authority list according to a dangerous authority list provided by the Android Things and a safety authority list corresponding to the application function; and/or
And determining the safety permission in the new deletion permission list according to the dangerous permission list provided by the Android Things and the safety permission list corresponding to the function of the application.
8. The application right management device according to claim 7, further comprising:
a verified apk file generating unit, configured to:
generating a verified apk file:
deleting the sensitive permission in the consistent permission list from the latest apk file;
deleting the sensitive permission in the newly added permission list from the latest apk file;
and adding the security permission in the new deletion permission list to the latest apk file.
9. The application right management device according to claim 8, further comprising:
a target application update unit to:
running the verified apk file to update the application;
wherein, the apk file comprises a Manifest file;
the security authority for the application is described in a statement beginning with android in the Manifest file.
10. An application rights management embedded device, characterized in that,
configuring an application developed based on an Android Things platform;
an application rights management device according to any of claims 6 to 9 is configured.
CN201911406281.XA 2019-12-31 2019-12-31 Application authority management method and device and embedded equipment Pending CN111222122A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911406281.XA CN111222122A (en) 2019-12-31 2019-12-31 Application authority management method and device and embedded equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911406281.XA CN111222122A (en) 2019-12-31 2019-12-31 Application authority management method and device and embedded equipment

Publications (1)

Publication Number Publication Date
CN111222122A true CN111222122A (en) 2020-06-02

Family

ID=70832774

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911406281.XA Pending CN111222122A (en) 2019-12-31 2019-12-31 Application authority management method and device and embedded equipment

Country Status (1)

Country Link
CN (1) CN111222122A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114743297A (en) * 2022-03-30 2022-07-12 广东医科大学顺德妇女儿童医院(佛山市顺德区妇幼保健院) Inpatient passing management method and system
CN116702163A (en) * 2022-09-27 2023-09-05 荣耀终端有限公司 Authority management method and terminal equipment

Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110099636A1 (en) * 2009-10-22 2011-04-28 Innostor Technology Corporation Read-only protection method for removable storage medium
CN102630320A (en) * 2010-10-04 2012-08-08 松下电器产业株式会社 Information processing device and method for preventing unauthorized application cooperation
CN102867143A (en) * 2012-08-22 2013-01-09 中国科学技术大学 Quick filtering method for malicious application programs
KR20130013459A (en) * 2011-07-28 2013-02-06 주식회사 포스코아이씨티 Method and system for managing mobile terminal
CN103310153A (en) * 2013-04-28 2013-09-18 中国人民解放军理工大学 Fine-grained authority control method based on Android platform
CN103546436A (en) * 2012-07-13 2014-01-29 中兴通讯股份有限公司 Security control method, terminal, and cloud server
CN103761472A (en) * 2014-02-21 2014-04-30 北京奇虎科技有限公司 Application program accessing method and device based on intelligent terminal
CN103839000A (en) * 2014-02-21 2014-06-04 北京奇虎科技有限公司 Application program installation method and device based on intelligent terminal equipment
CN104462978A (en) * 2014-12-24 2015-03-25 北京奇虎科技有限公司 Method and device for application program authority management
CN105068921A (en) * 2015-07-23 2015-11-18 清华大学 App comparative analysis based Android application store credibility evaluation method
CN106295311A (en) * 2016-08-05 2017-01-04 北京智能管家科技有限公司 A kind of system authority control method and device
CN107133513A (en) * 2017-05-10 2017-09-05 中南大学 It is a kind of support Android run when authority mechanism third-party application between communications access control method
CN108681671A (en) * 2018-05-21 2018-10-19 中国科学技术大学 A kind of Android mobile attacks source tracing method
CN109076126A (en) * 2017-03-21 2018-12-21 华为技术有限公司 Permission update method and terminal device
CN109815682A (en) * 2018-12-27 2019-05-28 北京字节跳动网络技术有限公司 A kind of pair of permission is tracked the method, apparatus and computer readable medium of management
CN110298176A (en) * 2018-10-25 2019-10-01 贵州财经大学 Intelligent terminal App permission privacy risk monitoring and evaluation system and method

Patent Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110099636A1 (en) * 2009-10-22 2011-04-28 Innostor Technology Corporation Read-only protection method for removable storage medium
CN102630320A (en) * 2010-10-04 2012-08-08 松下电器产业株式会社 Information processing device and method for preventing unauthorized application cooperation
KR20130013459A (en) * 2011-07-28 2013-02-06 주식회사 포스코아이씨티 Method and system for managing mobile terminal
CN103546436A (en) * 2012-07-13 2014-01-29 中兴通讯股份有限公司 Security control method, terminal, and cloud server
CN102867143A (en) * 2012-08-22 2013-01-09 中国科学技术大学 Quick filtering method for malicious application programs
CN103310153A (en) * 2013-04-28 2013-09-18 中国人民解放军理工大学 Fine-grained authority control method based on Android platform
CN103761472A (en) * 2014-02-21 2014-04-30 北京奇虎科技有限公司 Application program accessing method and device based on intelligent terminal
CN103839000A (en) * 2014-02-21 2014-06-04 北京奇虎科技有限公司 Application program installation method and device based on intelligent terminal equipment
CN104462978A (en) * 2014-12-24 2015-03-25 北京奇虎科技有限公司 Method and device for application program authority management
CN105068921A (en) * 2015-07-23 2015-11-18 清华大学 App comparative analysis based Android application store credibility evaluation method
CN106295311A (en) * 2016-08-05 2017-01-04 北京智能管家科技有限公司 A kind of system authority control method and device
CN109076126A (en) * 2017-03-21 2018-12-21 华为技术有限公司 Permission update method and terminal device
CN107133513A (en) * 2017-05-10 2017-09-05 中南大学 It is a kind of support Android run when authority mechanism third-party application between communications access control method
CN108681671A (en) * 2018-05-21 2018-10-19 中国科学技术大学 A kind of Android mobile attacks source tracing method
CN110298176A (en) * 2018-10-25 2019-10-01 贵州财经大学 Intelligent terminal App permission privacy risk monitoring and evaluation system and method
CN109815682A (en) * 2018-12-27 2019-05-28 北京字节跳动网络技术有限公司 A kind of pair of permission is tracked the method, apparatus and computer readable medium of management

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114743297A (en) * 2022-03-30 2022-07-12 广东医科大学顺德妇女儿童医院(佛山市顺德区妇幼保健院) Inpatient passing management method and system
CN114743297B (en) * 2022-03-30 2023-08-08 广东医科大学顺德妇女儿童医院(佛山市顺德区妇幼保健院) Hospitalized patient passing management method and system
CN116702163A (en) * 2022-09-27 2023-09-05 荣耀终端有限公司 Authority management method and terminal equipment

Similar Documents

Publication Publication Date Title
TWI696950B (en) Method for detecting high-level functionality of application executing on computing device, and system and computer program thereof
KR102546601B1 (en) Method and apparatus for protecting kernel control-flow integrity using static binary instrumentaiton
US9158919B2 (en) Threat level assessment of applications
US7613918B2 (en) System and method for enforcing a security context on a downloadable
CN108763951B (en) Data protection method and device
US10783041B2 (en) Backup and recovery of data files using hard links
Schmeelk et al. Android malware static analysis techniques
US20060053492A1 (en) Software tracking protection system
CN104392176A (en) Mobile terminal and method for intercepting device manager authority thereof
US7890756B2 (en) Verification system and method for accessing resources in a computing environment
CN106557669A (en) A kind of authority control method and device of application program installation process
KR20160098912A (en) Method for Re-adjusting Application Permission and User terminal for performing the same Method
JP2010182196A (en) Information processing apparatus and file verification system
Singh et al. Analysis of malicious behavior of android apps
CN106557687A (en) A kind of authority control method and device of application program installation process
CN111222122A (en) Application authority management method and device and embedded equipment
US9967263B2 (en) File security management apparatus and management method for system protection
EP3574428B1 (en) Safe data access through any data channel
US20040250086A1 (en) Method and system for protecting against software misuse and malicious code
CN106982428B (en) Security configuration method, security control device and security configuration device
CN107392010B (en) Root operation execution method and device, terminal equipment and storage medium
CN116450373A (en) Code running method, device, equipment and computer readable storage medium
Msgna et al. Secure application execution in mobile devices
US8788845B1 (en) Data access security
US11611570B2 (en) Attack signature generation

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination