WO2024078133A1 - 应用权限管理方法、电子设备、计算机可读存储介质 - Google Patents

应用权限管理方法、电子设备、计算机可读存储介质 Download PDF

Info

Publication number
WO2024078133A1
WO2024078133A1 PCT/CN2023/113731 CN2023113731W WO2024078133A1 WO 2024078133 A1 WO2024078133 A1 WO 2024078133A1 CN 2023113731 W CN2023113731 W CN 2023113731W WO 2024078133 A1 WO2024078133 A1 WO 2024078133A1
Authority
WO
WIPO (PCT)
Prior art keywords
application
private data
permission
calling
management method
Prior art date
Application number
PCT/CN2023/113731
Other languages
English (en)
French (fr)
Inventor
杨海城
周金星
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2024078133A1 publication Critical patent/WO2024078133A1/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/125Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules

Definitions

  • the embodiments of the present application relate to the field of terminal technology, and in particular to an application permission management method, an electronic device, and a computer-readable storage medium.
  • the Android system divides permissions into two categories.
  • One is normal permissions, which will not pose a threat to user privacy and security, such as permissions to access the network, permissions to access wireless connections (WiFi, Wireless Fidelity), etc.
  • the other is dangerous permissions, which will threaten user privacy and security, such as permissions to access contacts, photo albums, location information, etc.
  • the Android system has introduced a permission application mechanism since Android 6.0, which means that applications need to dynamically apply for relevant dangerous permissions before they can use certain functions.
  • the application checks whether the application has the dangerous permission. If not, it needs to apply for the dangerous permission before using the function with the dangerous permission. For example, if the application needs to use the photo taking function, it needs to first determine whether the application has permission to use the camera. If not, it needs to apply for it. The application can only use the camera permission after the user authorizes it. If the user refuses, it cannot be used. Even so, there is still the problem of privacy data leakage.
  • an embodiment of the present application provides an application permission management method, including: Determine whether the application abuses the calling authority of the private data; and if the application abuses the calling authority of the private data, revoke the calling authority of the application to the private data.
  • an embodiment of the present application provides an electronic device, comprising: at least one processor; and a memory, wherein at least one computer program is stored in the memory, and when the at least one computer program is executed by the at least one processor, the above-mentioned application permission management method is implemented.
  • an embodiment of the present application provides a computer-readable storage medium, on which a computer program is stored, and when the computer program is executed by a processor, the above-mentioned application permission management method is implemented.
  • FIG1 is a flow chart of an application permission management method provided in an embodiment of the present application.
  • FIG2 is a flowchart of an application permission management method provided by an example of an embodiment of the present application.
  • FIG3 is a block diagram of the composition of an application permission management device provided in an embodiment of the present application.
  • FIG1 is a flow chart of an application permission management method provided in an embodiment of the present application.
  • an embodiment of the present application provides an application permission management method, including: steps 100 and 101 .
  • Step 100 Determine whether the application abuses the calling permission of private data.
  • private data includes but is not limited to at least one of the following: mobile phone number, address book, text messages, call logs, photo albums, emails, schedules, Internet browsing records, consumption records, social media accounts, list of installed applications, location information, clipboard, personal biometric information, International Mobile Equipment Identity (IMEI), International Mobile Subscriber Identification Number (IMSI), Media Access Control (MAC) address, camera, microphone, and sensor.
  • IMEI International Mobile Equipment Identity
  • IMSI International Mobile Subscriber Identification Number
  • MAC Media Access Control
  • the application's permission to call private data includes, but is not limited to, at least one of the following: allowed only during use, allowed only this time, allowed all the time, not allowed, etc.
  • the permission level of always allowed is the highest, the permission level of only allowed during use is the second highest, and the permission level of only allowed this time and not allowed is the lowest.
  • the embodiments of the present application do not limit the timing of determining whether an application abuses the calling permission of private data. For example, it is possible to determine whether an application abuses the calling permission of private data when the application calls private data. In another example, it is also possible to determine whether an application abuses the calling permission of private data on a regular or periodic basis.
  • the application needs to record the application's call record information for the private data each time it calls the private data, so that it can be determined later whether the application has abused the right to call private data based on the call record information.
  • the call record information includes at least one of the following: application information, type information of the private data called, time information of the call, statistical number of calls, and information indicating whether the application has the authority to call the private data.
  • the application permission management method further includes: when the application calls privacy data, determining the application's right to call privacy data; and determining, based on the application's right to call privacy data, whether the application has abused its right to call privacy data.
  • determining whether the application has abused its permission to call privacy data includes at least one of the following: when the application's permission to call privacy data is not disallowed, determining whether the application has abused its permission to call privacy data based on other information; when the application's permission to call privacy data is not disallowed, since the application has called privacy data that the user has not authorized, it can be directly determined that the application has abused its permission to call privacy data, intercepting the application's calling of privacy data, and terminating the process.
  • the embodiment of the present application does not limit the state of the application when determining whether the application abuses the calling permission of private data. For example, it can be determined whether the application abuses the calling permission of private data when the application is started, closed, or running in the background.
  • determining whether an application has abused the calling permission of private data includes: determining whether an application has abused the calling permission of private data according to at least one of the following information: Actions that use the calling permissions of private data:
  • the application transmits private data in plain text
  • the application's permission to access private data The application's permission to access private data.
  • an application calls private data between 23:00 and 5:00 in the morning, and the number of consecutive days is greater than the first threshold, it is determined that the application has abused the right to call private data.
  • the embodiment of the present application may make a judgment on a certain type of private data, or may make a judgment on two or more types of private data.
  • the number of times the application calls private data refers to the sum of the number of times the application calls two or more types of private data
  • the location where the application stores private data refers to the union of the locations where the application stores two or more types of private data
  • the objects with which the application shares private data refers to the union of the objects with which the application shares two or more types of private data
  • the application's calling permission for private data refers to the permission granted to the application to call two or more types of private data. Permissions are ANDed.
  • Step 101 if an application abuses the calling authority of private data, the calling authority of the application to private data is revoked.
  • reclaiming the application's permission to call private data includes: popping up a dialog box for setting the application's permission to call private data so that the user can modify the application's permission to call private data, that is, a "user confirmed reclaim" method.
  • reclaiming the application's calling permission for private data includes at least one of the following: modifying the application's calling permission for private data to a calling permission with a lower permission level than the current permission level; or modifying the application's calling permission for private data to a calling permission corresponding to the lowest permission level, i.e., a "smart recycling" approach.
  • the "step-by-step recovery" method can be used to recover the application's access to private data. That is, the permission level of the application's access to private data is reduced by one level each time. For example, if the current access permission is always allowed, the access permission will be adjusted to allowed only during use. When the application's access to private data needs to be recovered subsequently, it will be adjusted to "allow only this time” or “not allowed” in turn.
  • the "one-time recovery" method can also be used to recover the application's calling rights to private data, that is, directly adjust the application's calling rights to private data to the calling rights corresponding to the lowest permission level, that is, "not allowed.”
  • the application permission management method further includes: if the application abuses the right to call private data, intercepting the application's calling of private data.
  • the application permission management method further includes: if an application abuses the calling permission of private data, determining the severity of the abuse of the calling permission of private data by the application; and revoking the calling permission of private data by the application based on the severity.
  • the number of times an application abuses the calling permission of private data the degree to which the application violates the regulations in calling the same private data, Or whether the application illegally calls at least one of the multiple privacy data to determine the severity of the application's abuse of the calling permission of the privacy data.
  • the application For example, if the number of times the application calls private data in the background is greater than a third threshold, it is determined that the application has abused the right to call private data, and the severity of the abuse of the right to call private data by the application is normal.
  • the number of times the application calls private data is greater than the fourth threshold, and the fourth threshold is greater than the third threshold, and it is determined again that the application has abused the right to call private data, and further the severity of the abuse of the application's right to call private data is determined to be serious.
  • reclaiming an application's access to private data based on severity includes at least one of the following: in the case of normal severity, modifying the application's access to private data to a lower level than the current level; or, in the case of severe severity, modifying the application's access to private data to a lower level than the current level.
  • the application permission management method when an application abuses the calling permission of private data, the application permission management method further includes: determining whether a switch for intelligently recovering application permissions is turned on; and if the switch for intelligently recovering application permissions is turned on, continuing to recover the calling permission of the application to private data.
  • the application permission management method further includes: displaying a prompt message when the application abuses the calling permission of private data, the prompt message being used to prompt the user that the application abuses the calling permission of private data.
  • the application permission management method provided in the embodiment of the present application monitors whether an application abuses the calling permission of private data, thereby improving the security of the private data of the terminal.
  • the application permission management method includes steps 200 to 205 .
  • Step 200 monitor whether the application calls the private data, if yes, continue to step 201; if not, end this process.
  • Step 201 determine the calling authority of the application to the private data, if the calling authority is not not allowed, continue to step 202; if the calling authority is not allowed, execute step 203.
  • Step 202 based on the time and number of times the application calls the private data, determine whether the application abuses the right to call the private data. If yes, proceed to step 203; if no, end this process.
  • Step 203 determine whether the switch of the intelligent recycling application permission is turned on, if so, continue to step 204; if not, end this process.
  • Step 204 intercept the application's behavior of calling the private data, and revoke the application's right to call the private data.
  • Step 205 display a prompt message, where the prompt message is used to remind the user that the application program has abused the calling authority of private data.
  • an embodiment of the present application provides an electronic device, comprising: at least one processor; and a memory, wherein at least one computer program is stored in the memory, and when the at least one computer program is executed by the at least one processor, the above-mentioned application permission management method is implemented.
  • a processor is a device with data processing capabilities, including but not limited to a central processing unit (CPU); a memory is a device with data storage capabilities, including but not limited to random access memory (RAM, more specifically SDRAM, DDR, etc.), read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), and flash memory (FLASH).
  • RAM random access memory
  • ROM read-only memory
  • EEPROM electrically erasable programmable read-only memory
  • FLASH flash memory
  • the processor and memory are connected to each other through a bus, and further connected to other components of the computing device.
  • an embodiment of the present application provides a computer-readable storage medium, on which a computer program is stored, and when the computer program is executed by a processor, the above-mentioned application permission management method is implemented.
  • FIG3 is a block diagram of the composition of an application permission management device provided in an embodiment of the present application.
  • an embodiment of the present application provides an application permission management device.
  • the method comprises: a determination module 301 configured to determine whether an application abuses the calling authority of private data; and a processing module 302 configured to revoke the calling authority of the application to private data if the application abuses the calling authority of private data.
  • the determination module 301 is specifically configured to determine whether the application abuses the right to call privacy data when the application calls privacy data; the processing module 302 is also configured to intercept the application's call to privacy data if the application abuses the right to call privacy data.
  • the determination module 301 is further configured to determine the application's permission to call private data; and determine, based on the application's permission to call private data, whether the application has abused the permission to call private data.
  • the processing module 302 is further configured to determine the severity of the abuse of the calling permission of the private data by the application; and to revoke the calling permission of the private data by the application according to the severity.
  • the processing module 302 is also configured to determine whether the switch for intelligently recovering application permissions is turned on when an application abuses the calling permission of privacy data; if the switch for intelligently recovering application permissions is turned on, continue to execute the recovery of the application's calling permission for privacy data.
  • the determination module 301 is specifically configured to determine whether an application abuses the calling permission of private data in the following manner: determining whether the application abuses the calling permission of private data according to at least one of the following information:
  • the application transmits the private data in plain text
  • the application's permission to access private data The application's permission to access private data.
  • the processing module 302 is specifically configured to implement The application's permission to call private data is now revoked: a setting dialog box for the application's permission to call private data is popped up for the user to modify the application's permission to call private data.
  • the processing module 302 is specifically configured to reclaim the application's calling permission to private data in at least one of the following ways: modifying the application's calling permission to private data to a calling permission with a lower permission level than the current permission level; modifying the application's calling permission to private data to a calling permission corresponding to the lowest permission level.
  • the functional modules/units in the device can be implemented as software, firmware, hardware and appropriate combinations thereof.
  • the division between the functional modules/units mentioned in the above description does not necessarily correspond to the division of physical components; for example, a physical component may have multiple functions, or a function or step may be performed by several physical components in cooperation.
  • Some physical components or all physical components may be implemented as software executed by a processor (such as a central processing unit, a digital signal processor or a microprocessor), or implemented as hardware, or implemented as an integrated circuit, such as an application-specific integrated circuit.
  • Such software may be distributed on a computer-readable medium, which may include a computer storage medium (or non-transitory medium) and a communication medium (or temporary medium).
  • a computer storage medium includes volatile and non-volatile, removable and non-removable media implemented in any method or technology for storing information (such as computer-readable instructions, data structures, program modules or other data).
  • Computer storage media include, but are not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tapes, magnetic disk storage or other magnetic storage, or any other medium that can be used to store the desired information and can be accessed by a computer.
  • communication media typically contain computer-readable instructions, data structures, program modules, or other data in a modulated data signal such as a carrier wave or other transport mechanism, and may include any information delivery media.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Storage Device Security (AREA)
  • Stored Programmes (AREA)

Abstract

本申请提供了一种应用权限管理方法、一种电子设备、一种计算机可读存储介质,所述应用权限管理方法包括:确定应用程序是否存在滥用隐私数据的调用权限的行为;以及在所述应用程序存在滥用所述隐私数据的调用权限的行为的情况下,回收所述应用程序对所述隐私数据的调用权限。

Description

应用权限管理方法、电子设备、计算机可读存储介质
相关申请的交叉引用
本申请要求于2022年10月10日提交的中国专利申请NO.202211263500.5的优先权,该中国专利申请的内容通过引用的方式整体合并于此。
技术领域
本申请实施例涉及终端技术领域,特别涉及应用权限管理方法、电子设备、计算机可读存储介质。
背景技术
安卓(Android)系统把权限分为两类。一类是普通权限,这类权限不会潜藏有危害用户隐私和安全的问题,比如访问网络的权限、访问无线连接(WiFi,Wireless Fidelity)的权限等。另一类是危险权限,这类权限会威胁到用户的隐私和安全问题,比如访问通讯录、相册、位置信息等权限。
Android系统为了安全考虑,从Android 6.0版本开始引入了权限申请机制,即应用程序需要动态申请相关危险权限后才能使用某些功能。应用程序在每次使用该危险权限的功能之前,检查应用程序是否具有该危险权限,如果没有则需要申请该危险权限后才能使用该危险权限的功能。例如,应用程序如果需要使用拍照功能,则需要先判断该应用程序是否具有使用相机的权限,如果没有则需要去申请,等用户授权后该应用程序才能使用相机的权限,如果用户拒绝则无法使用。即便如此,仍然存在隐私数据泄漏的问题。
公开内容
第一方面,本申请实施例提供一种应用权限管理方法,包括: 确定应用程序是否存在滥用隐私数据的调用权限的行为;以及在所述应用程序存在滥用所述隐私数据的调用权限的行为的情况下,回收所述应用程序对所述隐私数据的调用权限。
第二方面,本申请实施例提供一种电子设备,包括:至少一个处理器;以及存储器,存储器上存储有至少一个计算机程序,当所述至少一个计算机程序被所述至少一个处理器执行时,实现上述应用权限管理方法。
第三方面,本申请实施例提供一种计算机可读存储介质,计算机可读存储介质上存储有计算机程序,所述计算机程序被处理器执行时实现上述应用权限管理方法。
附图说明
图1为本申请实施例提供的应用权限管理方法的流程图;
图2为本申请实施例的示例提供的应用权限管理方法的流程图;以及
图3为本申请实施例提供的应用权限管理装置的组成框图。
具体实施方式
为使本领域的技术人员更好地理解本申请的技术方案,下面结合附图对本申请提供的应用权限管理方法、电子设备、计算机可读存储介质进行详细描述。
在下文中将参考附图更充分地描述示例实施例,但是所述示例实施例可以以不同形式来体现,且本申请不应当被解释为限于本文阐述的实施例。提供这些实施例的目的在于使本申请更加透彻和完整,并将使本领域技术人员充分理解本申请的范围。
在不冲突的情况下,本申请各实施例及实施例中的各特征可相互组合。
如本文所使用的,术语“和/或”包括至少一个相关列举条目的任何和所有组合。
本文所使用的术语仅用于描述特定实施例,且不限制本申请。 如本文所使用的,单数形式“一个”和“该”也包括复数形式,除非上下文另外清楚指出。还将理解的是,当本说明书中使用术语“包括”和/或“由……制成”时,指定存在特定特征、整体、步骤、操作、元件和/或组件,但不排除存在或可添加至少一个其它特征、整体、步骤、操作、元件、组件和/或其群组。
除非另外限定,否则本文所用的所有术语(包括技术术语和科学术语)的含义与本领域普通技术人员通常理解的含义相同。还将理解,诸如在常用字典中限定的那些术语应当被解释为具有与其在相关技术以及本申请的背景下的含义一致的含义,且将不解释为具有理想化或过度形式上的含义,除非本文明确如此限定。
目前的应用权限管理方法中,危险权限由用户授权,而用户在授权后无法对应用程序的行为进行控制,从而仍然存在用户的隐私数据被泄露的风险。
图1为本申请实施例提供的应用权限管理方法的流程图。
第一方面,参照图1,本申请实施例提供一种应用权限管理方法,包括:步骤100和101。
步骤100,确定应用程序是否存在滥用隐私数据的调用权限的行为。
在一些实施方式中,隐私数据包括但不限于以下至少之一:手机号码,通讯录,短信,通话记录,相册,邮件,日程,上网记录,消费记录,社交媒体账号,已安装应用列表,位置信息,剪切板,个人生物识别信息,国际移动设备识别码(IMEI,International Mobile Equipment Identity),国际移动用户识别码(IMSI,International Mobile Subscriber Identification Number),媒体访问控制(MAC,Media Access Control)地址,摄像头,麦克风,传感器。
在一些实施方式中,应用程序对隐私数据的调用权限包括但不限于以下至少之一:仅使用期间允许,仅本次允许,始终允许,不允许等。
在一些实施方式中,始终允许的权限级别最高,仅使用期间允许的权限级别次之,然后是仅本次允许,不允许的权限级别最低。
本申请实施例对确定应用程序是否存在滥用隐私数据的调用权限的行为的时机不做限定。例如,可以在应用程序调用隐私数据时,确定应用程序是否存在滥用隐私数据的调用权限的行为。又如,也可以定时或周期性地确定应用程序是否存在滥用隐私数据的调用权限的行为。
不管是在什么样的时机下确定应用程序是否存在滥用隐私数据的调用权限的行为,应用程序在每一次调用隐私数据时,均需要记录应用程序对隐私数据的调用记录信息,以便后续可以根据调用记录信息确定应用程序是否存在滥用隐私数据的调用权限的行为。
在一些实施方式中,调用记录信息包括以下至少之一:应用程序信息,调用的隐私数据的类型信息,调用的时间信息,调用的统计次数信息,表征应用程序是否有调用隐私数据的权限的信息。
在一些实施方式中,如果在应用程序调用隐私数据时,确定应用程序是否存在滥用隐私数据的调用权限的行为,则该应用权限管理方法还包括:在应用程序调用隐私数据时,确定应用程序对隐私数据的调用权限;以及根据应用程序对隐私数据的调用权限,确定应用程序是否存在滥用隐私数据的调用权限的行为。
在一些实施方式中,根据应用程序对隐私数据的调用权限,确定应用程序是否存在滥用隐私数据的调用权限的行为包括以下至少之一:在应用程序对隐私数据的调用权限不是不允许的情况下,根据其他信息确定应用程序是否存在滥用隐私数据的调用权限的行为;在应用程序对隐私数据的调用权限为不允许的情况下,由于应用程序调用了用户未授权的隐私数据,则可以直接确定应用程序存在滥用隐私数据的调用权限的行为,拦截应用程序调用隐私数据的行为,并结束本流程。
本申请实施例对确定应用程序是否存在滥用隐私数据的调用权限时,应用程序所处的状态不做限定。例如,可以在应用程序启动、关闭、后台运行时确定应用程序是否存在滥用隐私数据的调用权限。
在一些实施方式中,确定应用程序是否存在滥用隐私数据的调用权限的行为包括:根据以下信息至少之一确定应用程序是否存在滥 用隐私数据的调用权限的行为:
应用程序调用隐私数据的时间;
应用程序调用隐私数据的次数;
应用程序调用隐私数据的频率;
应用程序存放隐私数据的位置;
应用程序以明文方式传输隐私数据;
应用程序共享隐私数据的对象;
应用程序对隐私数据的调用权限。
例如,应用程序在23:00到凌晨5:00之间的时间段内调用隐私数据,并且持续的天数大于第一阈值,则确定应用程序存在滥用隐私数据的调用权限的行为。
又如,携程旅行应用程序在19:16到19:17这一分钟内调用终端的隐私数据的次数大于第二阈值,则确定携程旅行应用程序存在滥用隐私数据的调用权限的行为。
又如,应用程序将隐私数据存放到公用数据区中,则确定应用程序存在滥用隐私数据的调用权限的行为。
又如,应用程序将隐私数据共享给隐私条款名单之外的应用程序,则确定应用程序存在滥用隐私数据的调用权限的行为。
又如,应用程序在后台调用终端的位置信息,但用户设置的隐私数据的调用权限是“仅使用期间允许”,则确定应用程序存在滥用隐私数据的调用权限的行为。
本申请实施例在确定应用程序是否存在滥用终端的隐私数据的调用权限的行为时,可以针对某一种隐私数据进行判断,也可以针对两种或两种以上隐私数据进行判断。
如果是针对两种或两种以上隐私数据进行判断,那么应用程序调用隐私数据的次数是指应用程序调用两种或两种以上隐私数据的次数之和,应用程序存放隐私数据的位置是指应用程序存放两种或两种以上隐私数据的位置的并集,应用程序共享隐私数据的对象是指应用程序共享两种或两种以上隐私数据的对象的并集,应用程序对隐私数据的调用权限是指将应用程序对两种或两种以上隐私数据的调用 权限做与运算。
步骤101,在应用程序存在滥用隐私数据的调用权限的行为的情况下,回收应用程序对隐私数据的调用权限。
在一些实施方式中,回收应用程序对隐私数据的调用权限包括:弹出应用程序对隐私数据的调用权限的设置对话框,以供用户修改应用程序对隐私数据的调用权限,即“用户确认回收”的方式。
用户可以在设置对话框上随意设置应用程序对隐私数据的调用权限。
在一些实施方式中,回收应用程序对隐私数据的调用权限包括以下至少之一:将应用程序对隐私数据的调用权限修改为权限级别比当前权限级别低的调用权限;或者,将应用程序对隐私数据的调用权限修改为最低权限级别对应的调用权限。即“智能回收”的方式。
例如,可以采用“逐级回收”的方式回收应用程序对隐私数据的调用权限,也就是说,每一次将应用程序对隐私数据的调用权限的权限级别降低一级,如当前的调用权限为始终允许,则将调用权限调整为仅使用期间允许;后续需要回收应用程序对隐私数据的调用权限时,再依次调整为“仅本次允许”、“不允许”。
又如,也可以采用“一次性回收”的方式回收应用程序对隐私数据的调用权限,也就是说,直接将应用程序对隐私数据的调用权限调整为最低权限级别对应的调用权限,即“不允许”。
在一些实施方式中,如果在应用程序调用隐私数据时,确定应用程序是否存在滥用隐私数据的调用权限的行为,则该应用权限管理方法还包括:在应用程序存在滥用隐私数据的调用权限的行为的情况下,拦截应用程序调用隐私数据的行为。
在一些实施方式中,该应用权限管理方法还包括:在应用程序存在滥用隐私数据的调用权限的行为的情况下,确定应用程序滥用隐私数据的调用权限的严重程度;以及根据严重程度回收应用程序对隐私数据的调用权限。
在一些实施方式中,可以根据确定应用程序存在滥用隐私数据的调用权限的行为的次数、应用程序违规调用同一隐私数据的程度、 或应用程序是否违规调用多项隐私数据中的至少一个确定应用程序滥用隐私数据的调用权限的严重程度。
例如,应用程序在后台调用隐私数据的次数大于第三阈值,确定应用程序存在滥用隐私数据的调用权限的行为,且应用程序滥用隐私数据的调用权限的严重程度为普通。
一段时间后,应用程序调用隐私数据的次数大于第四阈值,第四阈值大于第三阈值,再次确定应用程序存在滥用隐私数据的调用权限的行为,进而确定应用程序滥用隐私数据的调用权限的严重程度为严重。
在一些实施方式中,根据严重程度回收应用程序对隐私数据的调用权限包括以下至少之一:在严重程度为普通的情况下,将应用程序对隐私数据的调用权限修改为权限级别比当前权限级别低的调用权限;或者,在严重程度为严重的情况下,将应用程序对隐私数据的调用权限修改为最低权限级别对应的调用权限。
在一些实施方式中,在应用程序存在滥用隐私数据的调用权限的行为的情况下,该应用权限管理方法还包括:确定智能回收应用权限的开关是否打开;在智能回收应用权限的开关打开的情况下,继续执行所述回收应用程序对隐私数据的调用权限。
在一些实施方式中,该应用权限管理方法还包括:在应用程序存在滥用隐私数据的调用权限的行为的情况下,显示提示信息,提示信息用于提示用户应用程序存在滥用隐私数据的调用权限的行为。
在一些实施方式中,在智能回收应用权限的开关关闭的情况下,结束本流程。
本申请实施例提供的应用权限管理方法,对应用程序是否存在滥用隐私数据的调用权限的行为进行监控,提高了终端的隐私数据的安全性。
为了更完整的呈现本申请实施例的应用权限管理方法,下面列举一个示例进行说明,所列举示例不用于限定本申请实施例的保护范围。
示例
如图2所示,应用权限管理方法包括:步骤200至205。
步骤200,监测应用程序是否调用隐私数据,如果是,则继续执行步骤201;如果不是,则结束本流程。
步骤201,确定应用程序对隐私数据的调用权限,如果调用权限不是不允许,则继续执行步骤202;如果调用权限为不允许,则执行步骤203。
步骤202,根据应用程序调用隐私数据的时间和次数确定应用程序是否存在滥用隐私数据的调用权限的行为,如果是,则继续执行步骤203;如果不是,则结束本流程。
步骤203,确定智能回收应用权限的开关是否打开,如果是,则继续执行步骤204;如果不是,则结束本流程。
步骤204,拦截应用程序调用隐私数据的行为,回收应用程序对隐私数据的调用权限。
步骤205,显示提示信息,提示信息用于提示用户应用程序存在滥用隐私数据的调用权限的行为。
第二方面,本申请实施例提供一种电子设备,包括:至少一个处理器;以及存储器,存储器上存储有至少一个计算机程序,当至少一个计算机程序被至少一个处理器执行时,实现上述应用权限管理方法。
处理器为具有数据处理能力的器件,包括但不限于中央处理器(CPU)等;存储器为具有数据存储能力的器件,包括但不限于随机存取存储器(RAM,更具体如SDRAM、DDR等)、只读存储器(ROM)、带电可擦可编程只读存储器(EEPROM)、闪存(FLASH)。
在一些实施方式中,处理器、存储器通过总线相互连接,进而与计算设备的其它组件连接。
第三方面,本申请实施例提供一种计算机可读存储介质,计算机可读存储介质上存储有计算机程序,计算机程序被处理器执行时实现上述应用权限管理方法。
图3为本申请实施例提供的应用权限管理装置的组成框图。
第四方面,参照图3,本申请实施例提供一种应用权限管理装置, 包括:确定模块301,配置为确定应用程序是否存在滥用隐私数据的调用权限的行为;以及处理模块302,配置为在应用程序存在滥用隐私数据的调用权限的行为的情况下,回收应用程序对隐私数据的调用权限。
在一些实施方式中,确定模块301具体配置为在应用程序调用隐私数据时,确定应用程序是否存在滥用隐私数据的调用权限的行为;处理模块302还配置为在应用程序存在滥用隐私数据的调用权限的行为的情况下,拦截应用程序调用隐私数据的行为。
在一些实施方式中,确定模块301还配置为确定应用程序对隐私数据的调用权限;以及根据应用程序对隐私数据的调用权限,确定所述应用程序是否存在滥用隐私数据的调用权限的行为。
在一些实施方式中,处理模块302还配置为确定应用程序滥用隐私数据的调用权限的严重程度;以及根据严重程度回收应用程序对隐私数据的调用权限。
在一些实施方式中,处理模块302还配置为在应用程序存在滥用隐私数据的调用权限的行为的情况下,确定智能回收应用权限的开关是否打开;在智能回收应用权限的开关打开的情况下,继续执行所述回收应用程序对隐私数据的调用权限。
在一些实施方式中,确定模块301具体配置为采用以下方式实现确定应用程序是否存在滥用隐私数据的调用权限的行为:根据以下信息至少之一确定所述应用程序是否存在滥用隐私数据的调用权限的行为:
应用程序调用隐私数据的时间;
应用程序调用隐私数据的次数;
应用程序调用隐私数据的频率;
应用程序存放隐私数据的位置;
应用程序以明文方式传输所述隐私数据;
应用程序共享隐私数据的对象;
应用程序对隐私数据的调用权限。
在一些实施方式中,处理模块302具体配置为采用以下方式实 现回收应用程序对隐私数据的调用权限:弹出应用程序对隐私数据的调用权限的设置对话框,以供用户修改应用程序对隐私数据的调用权限。
在一些实施方式中,处理模块302具体配置为采用以下至少之一方式实现回收应用程序对隐私数据的调用权限:将应用程序对隐私数据的调用权限修改为权限级别比当前权限级别低的调用权限;将应用程序对隐私数据的调用权限修改为最低权限级别对应的调用权限。
上述应用权限管理装置的具体实现过程与前述应用权限管理方法的具体实现过程相同,这里不再赘述。
本领域普通技术人员可以理解,上文中所公开方法中的全部或某些步骤、装置中的功能模块/单元可以被实施为软件、固件、硬件及其适当的组合。在硬件实施方式中,在以上描述中提及的功能模块/单元之间的划分不一定对应于物理组件的划分;例如,一个物理组件可以具有多个功能,或者一个功能或步骤可以由若干物理组件合作执行。某些物理组件或所有物理组件可以被实施为由处理器(如中央处理器、数字信号处理器或微处理器)执行的软件,或者被实施为硬件,或者被实施为集成电路,如专用集成电路。这样的软件可以分布在计算机可读介质上,计算机可读介质可以包括计算机存储介质(或非暂时性介质)和通信介质(或暂时性介质)。如本领域普通技术人员公知的,术语计算机存储介质包括在用于存储信息(诸如计算机可读指令、数据结构、程序模块或其它数据)的任何方法或技术中实施的易失性和非易失性、可移除和不可移除介质。计算机存储介质包括但不限于RAM、ROM、EEPROM、闪存或其它存储器技术、CD-ROM、数字多功能盘(DVD)或其它光盘存储、磁盒、磁带、磁盘存储或其它磁存储器、或者可以用于存储期望的信息并且可以被计算机访问的任何其它的介质。此外,本领域普通技术人员公知的是,通信介质通常包含计算机可读指令、数据结构、程序模块或者诸如载波或其它传输机制之类的调制数据信号中的其它数据,并且可包括任何信息递送介质。
本文已经公开了示例实施例,并且虽然采用了具体术语,但它 们仅用于并仅应当被解释为一般说明性含义,并且不用于限制的目的。在一些实例中,对本领域技术人员显而易见的是,除非另外明确指出,否则与特定实施例相结合描述的特征、特性和/或元素可单独使用,或可与结合其它实施例描述的特征、特性和/或元件组合使用。因此,本领域技术人员将理解,在不脱离由所附的权利要求阐明的本申请的范围的情况下,可进行各种形式和细节上的改变。

Claims (10)

  1. 一种应用权限管理方法,包括:
    确定应用程序是否存在滥用隐私数据的调用权限的行为;以及
    在所述应用程序存在滥用所述隐私数据的调用权限的行为的情况下,回收所述应用程序对所述隐私数据的调用权限。
  2. 根据权利要求1所述的应用权限管理方法,在所述应用程序调用所述隐私数据时,确定所述应用程序是否存在滥用所述隐私数据的调用权限的行为;
    该应用权限管理方法还包括:
    在所述应用程序存在滥用所述隐私数据的调用权限的行为的情况下,拦截所述应用程序调用所述隐私数据的行为。
  3. 根据权利要求2所述的应用权限管理方法,还包括:
    在所述应用程序调用所述隐私数据时,确定所述应用程序对所述隐私数据的调用权限;以及
    根据所述应用程序对所述隐私数据的调用权限,确定所述应用程序是否存在滥用所述隐私数据的调用权限的行为。
  4. 根据权利要求1所述的应用权限管理方法,还包括:
    在所述应用程序存在滥用所述隐私数据的调用权限的行为的情况下,确定所述应用程序滥用所述隐私数据的调用权限的严重程度;以及
    根据所述严重程度回收所述应用程序对所述隐私数据的调用权限。
  5. 根据权利要求1所述的应用权限管理方法,还包括:
    在所述应用程序存在滥用所述隐私数据的调用权限的行为的情况下,确定智能回收应用权限的开关是否打开;以及
    在所述智能回收应用权限的开关打开的情况下,继续执行所述回收所述应用程序对所述隐私数据的调用权限。
  6. 根据权利要求1至5中任意一项所述的应用权限管理方法,其中,所述确定所述应用程序是否存在滥用所述隐私数据的调用权限的行为包括:
    根据以下信息至少之一确定所述应用程序是否存在滥用所述隐私数据的调用权限的行为:
    所述应用程序调用所述隐私数据的时间;
    所述应用程序调用所述隐私数据的次数;
    所述应用程序调用所述隐私数据的频率;
    所述应用程序存放所述隐私数据的位置;
    所述应用程序以明文方式传输所述隐私数据;
    所述应用程序共享所述隐私数据的对象;
    所述应用程序对所述隐私数据的调用权限。
  7. 根据权利要求1至5中任意一项所述的应用权限管理方法,其中,所述回收所述应用程序对所述隐私数据的调用权限包括:
    弹出所述应用程序对所述隐私数据的调用权限的设置对话框,以供用户修改所述应用程序对所述隐私数据的调用权限。
  8. 根据权利要求1至5中任意一项所述的应用权限管理方法,其中,所述回收所述应用程序对所述隐私数据的调用权限包括以下至少之一:
    将所述应用程序对所述隐私数据的调用权限修改为权限级别比当前权限级别低的调用权限;或者
    将所述应用程序对所述隐私数据的调用权限修改为最低权限级别对应的调用权限。
  9. 一种电子设备,包括:
    至少一个处理器;以及
    存储器,所述存储器上存储有至少一个计算机程序,当所述至少一个计算机程序被所述至少一个处理器执行时,实现权利要求1至8中任意一项所述的应用权限管理方法。
  10. 一种计算机可读存储介质,所述计算机可读存储介质上存储有计算机程序,所述计算机程序被处理器执行时实现权利要求1至8中任意一项所述的应用权限管理方法。
PCT/CN2023/113731 2022-10-10 2023-08-18 应用权限管理方法、电子设备、计算机可读存储介质 WO2024078133A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202211263500.5A CN117909938A (zh) 2022-10-10 2022-10-10 应用权限管理方法、电子设备、计算机可读存储介质
CN202211263500.5 2022-10-10

Publications (1)

Publication Number Publication Date
WO2024078133A1 true WO2024078133A1 (zh) 2024-04-18

Family

ID=90668735

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/113731 WO2024078133A1 (zh) 2022-10-10 2023-08-18 应用权限管理方法、电子设备、计算机可读存储介质

Country Status (2)

Country Link
CN (1) CN117909938A (zh)
WO (1) WO2024078133A1 (zh)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130347096A1 (en) * 2012-06-22 2013-12-26 Wistron Corp. Permission management method for applications, electronic device thereof, and computer readable medium
CN109918930A (zh) * 2019-03-11 2019-06-21 维沃移动通信有限公司 一种信息保护方法及终端设备
CN111259421A (zh) * 2020-01-15 2020-06-09 奇安信科技集团股份有限公司 隐私权限的防泄密处理方法、装置、电子设备及存储介质
CN113407228A (zh) * 2021-07-20 2021-09-17 珠海市魅族科技有限公司 一种应用程序的管理方法、装置、设备及存储介质

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130347096A1 (en) * 2012-06-22 2013-12-26 Wistron Corp. Permission management method for applications, electronic device thereof, and computer readable medium
CN109918930A (zh) * 2019-03-11 2019-06-21 维沃移动通信有限公司 一种信息保护方法及终端设备
CN111259421A (zh) * 2020-01-15 2020-06-09 奇安信科技集团股份有限公司 隐私权限的防泄密处理方法、装置、电子设备及存储介质
CN113407228A (zh) * 2021-07-20 2021-09-17 珠海市魅族科技有限公司 一种应用程序的管理方法、装置、设备及存储介质

Also Published As

Publication number Publication date
CN117909938A (zh) 2024-04-19

Similar Documents

Publication Publication Date Title
US10454942B2 (en) Managed clone applications
US9069941B2 (en) Access authorization having embedded policies
US10187425B2 (en) Issuing security commands to a client device
US7818781B2 (en) Behavior blocking access control
WO2016101384A1 (zh) 基于双系统切换的数据安全处理方法及装置
CN108989263A (zh) 短信验证码攻击防护方法、服务器和计算机可读存储介质
US20130198872A1 (en) Method for component access control and electronic device
CN106790172B (zh) 一种文件共享方法及服务器、客户端
EP2540028B1 (en) Protecting account security settings using strong proofs
US9460305B2 (en) System and method for controlling access to encrypted files
CN107426182B (zh) 一种存储管理系统的访问控制方法及系统
US11928450B2 (en) Mobile terminal, method for uninstalling pre-installed application therein, and memory
CN112784262A (zh) 数据访问方法、装置、终端及存储介质
CN112035872A (zh) 一种应用管理方法、终端及计算机存储介质
WO2024078133A1 (zh) 应用权限管理方法、电子设备、计算机可读存储介质
CN109391689A (zh) 一种微服务应用程序编程接口调用的方法及装置
CN110990873A (zh) 一种违规操作的监控方法、计算机设备及存储介质
CN108009432B (zh) 一种访问存储系统的管理方法、装置及设备
CN113645060B (zh) 一种网卡配置方法、数据处理方法及装置
CN108449753B (zh) 一种手机设备读取可信计算环境中的数据的方法
CN111159701A (zh) 第三方页面加载方法、装置、电子设备及存储介质
WO2024131212A1 (zh) 通话处理方法、电子设备、计算机可读存储介质
EP4026357B1 (en) System, method, and computer program for protecting against unintentional deletion of an esim from a mobile device
US20240314136A1 (en) Method for controlling the access of a user to a network, network, and computer program
CN117749395A (zh) 资源访问控制方法、装置、通信设备及可读存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23876338

Country of ref document: EP

Kind code of ref document: A1