Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Application program privacy authority management method and device

A technology of privacy rights and applications, which is applied in the field of privacy rights management of applications, can solve problems such as difficulty in judging whether privacy rights are normal, a large number of human resources, and not necessarily accurate, so as to improve user experience, improve privacy security, and reduce The effect of labor costs

Active Publication Date: 2014-06-25
KENIU NETWORK TECH BEIJING
View PDF5 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, the excessive acquisition of privacy by mobile terminals has always attracted the attention of users and security software. Many applications will require permissions beyond the actual functions of the application. Let the user upload the contact list by default; the worse application will step into the scope of crime, for example, it will secretly send deduction information, or be used as a peeping tool for hackers, etc.
But there are problems: in the first way, it is difficult for the user to judge whether the privacy permissions obtained by the application are normal; in the second way, a lot of human resources need to be invested, and it is not necessarily accurate

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application program privacy authority management method and device
  • Application program privacy authority management method and device
  • Application program privacy authority management method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary and are intended to explain the present invention and should not be construed as limiting the present invention.

[0024] The method and device for managing privacy rights of applications according to the embodiments of the present invention will be described below with reference to the accompanying drawings.

[0025] figure 1 It is a flowchart of a method for managing privacy rights of an application program according to an embodiment of the present invention.

[0026] like figure 1 As shown, the app's privacy rights management method may include:

[0027] S101. Obtain at least one privacy permission of an application program in a mobile ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an application program privacy authority management method and device. The method comprises the steps that at least one privacy authority of an application program in the mobile terminal is obtained; a management page is provided in the mobile terminal, and user assessing information of the at least one privacy authority corresponding to the application program is obtained; the at least one privacy authority and the user assessing information corresponding to the at least one privacy authority are shown in the management page, wherein at least one selecting key is included in the management page; and triggering operation on the at least one selecting key of a user is received, and according to the triggering operation, authorization management is carried out on the at least one privacy authority. According to the management method, the user can clearly know which application programs obtain the privacy authority excessively, the user can conveniently manage the privacy authority, the privacy safety of the user is improved, user experience is improved, manual analysis is of no need, and labor cost is greatly lowered.

Description

technical field [0001] The present invention relates to the technical field of mobile terminals, in particular to a method and device for managing privacy rights of application programs. Background technique [0002] At present, the excessive acquisition of privacy by mobile terminals has always attracted the attention of users and security software. Many applications will require permissions beyond the actual functions of the application, which is manifested in collecting the serial number and location information of mobile terminals without (actively) informing, and luring Let the user upload the contact list by default; the worse application will step into the scope of crime, for example, it will secretly send deduction information, or it will be used as a peeping tool for hackers. [0003] At present, the privacy permissions of apps can be obtained mainly in the following two ways: one is the list of permissions that can be obtained by checking out apps through the manif...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/55G06F21/62
CPCG06F21/6245G06F21/554G06F2221/2141
Inventor 吴俊达罗亚峰
Owner KENIU NETWORK TECH BEIJING
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products