A mobile terminal data processing method

A data processing and mobile terminal technology, applied in the field of mobile Internet, can solve problems such as potential safety hazards, incomplete development documents, and user misunderstandings, and achieve the effect of improving security and reliability

Active Publication Date: 2018-03-30
四川携恩空服科技有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Developers follow the minimum principle when writing Android applications, that is, only request permissions related to these operations and resources for which operations or resources are used. However, many development documents themselves are not perfect, or the permission names are relatively close, resulting in Too many permissions that will not be used
The attacker will not only bring misunderstanding to the user, make the user doubt the reliability of the program and the confidentiality of personal privacy, but also be used by other malicious programs due to the existing loopholes, bringing security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A mobile terminal data processing method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The following and accompanying appendices illustrating the principles of the invention Figure 1 A detailed description of one or more embodiments of the invention is provided together. The invention is described in connection with such embodiments, but the invention is not limited to any embodiment. The scope of the invention is limited only by the claims and the invention encompasses numerous alternatives, modifications and equivalents. In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. These details are provided for the purpose of example and the invention may be practiced according to the claims without some or all of these specific details.

[0021] One aspect of the present invention provides a method for processing data in a mobile terminal. figure 1 It is a flowchart of a mobile terminal data processing method according to an embodiment of the present invention.

[0022...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a mobile terminal data processing method. The mobile terminal data processing method comprises the following steps: checking files in an application program installation package; extracting all APIs in the program for use; analyzing corresponding permission required by the APIs to acquire a least permission list used by the program; simplifying a permission list requested by the application program through the least permission list; deleting requested but not used permissions. The mobile terminal data processing method provided by the invention can analyze and restrain permissions of the application program, and improves the safety and the reliability of the program without influencing correct operation of the program.

Description

technical field [0001] The invention relates to the mobile Internet, in particular to a mobile terminal data processing method. Background technique [0002] With the development of the mobile Internet, the penetration rate of portable terminal equipment continues to increase, and people pay more and more attention to security issues. While more and more applications bring convenience to users, they also store user private data. Due to the open source of the system and the openness of the application market, the Android platform is extremely vulnerable to attacks. If an application wants to perform certain operations or use certain resources through the API provided by the system, it must have the corresponding permission of the API. These permissions must be requested in the program's Manifest file. When the application is installed, the system will check and remind the user which permissions the application specifically requests. [0003] Developers follow the minimum p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/52G06F21/57
CPCG06F21/52G06F21/577G06F2221/033
Inventor 郭亮惠孛
Owner 四川携恩空服科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products