Refined enhanced permission control and analysis system of Android platform

An Android platform and Android system technology, which is applied in the Android permission management and analysis system, refines and enhances the field of permission management and analysis system, and can solve the problems of lack of guarantee, less and professional analysis of permissions, and high error rate of results.

Pending Publication Date: 2020-09-25
荆门汇易佳信息科技有限公司
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although Kirin can detect application permission extraction information during installation, Kirin still has some obvious deficiencies: First, the result error rate is high, and Kirin identifies sensitive resources, functional requirements, resource security requirements and security system limitations of the application There are errors and difficulties in other factors, and the final result is not accurate; second, Kirin does not provide solutions, but only prompts users to a certain extent, and does not provide in-depth ability to solve problems; problems, cannot bring flexible processing methods, and play a very limited role in user authority control
[0008] First, with the increasingly complex security environment of the Android system, although the original permission system has played a significant role, it has gradually exposed a large number of problems. When installing an application, the coarse-grained authorization management strategy reads and parses the application in the configuration file. Permission information is displayed to the user on the installation page for the user to view and confirm. Two buttons, Install and Cancel, are provided on the interface. When the user clicks Install, it means that the application adopts all permissions and enters the installation process. When the user clicks Cancel, it means Deny all permissions, cancel the application installation request directly, and the user is still in a very passive position of choosing one or the other
[0009] The second is that the distribution of permissions in the existing technology cannot be dynamically set. In the original Android system, all permissions can only be checked and confirmed during installation. Second Chance for Change
[0010] The third is that in the existing technology, users choose whether to install the application or not only depends on the degree of their urgent needs, do not understand the meaning of permissions, and have no direct perception of the security risk of permissions.
The analysis of permissions is too few and professional. Ordinary users can neither understand the meaning of permissions, nor do they know whether application security is guaranteed. There is nothing that can be used as a reference for users. The hidden dangers brought by permission security are not considered at all. The permission control system The function of the can not play a real role
[0011] Fourth, the existing technology is centered on developers, and there are insufficient permissions system documents. Developers often focus on function realization and ignore the importance of permission applications. In addition to being careless when writing code, the bigger reason is that they themselves have limited understanding of permissions. , there is no comprehensive documentation to help
The emergence of redundant permissions is a favorable condition for malicious applications to use to attack. Accessing important resources and private information of applications through permissions will eventually bring losses to users. The reason is that developers lack understanding of permissions and lack of professional knowledge. Numerous permissions cannot clearly distinguish the corresponding relationship between actual functions and permissions, resulting in misuse and abuse of permissions
[0012] Fifth, the existing technology does not detect the security risks that may be caused by combined permissions. In addition to a single permission that can bring security risks, the use of multiple permissions is also one of the characteristics of malware
[0013] Sixth, the existing technology cannot accurately identify the security risk level of the application program. When the application program is installed, the user can only see the list of permissions applied for by the program. For ordinary users without professional background, the auxiliary information during installation is too formal and has no real Solve the problem
[0014] Seventh, the existing technology lacks reasonable suggestions and security defense strategies. In the existing Android original installation system, the user can only choose to install or cancel after seeing the permission list. When Disturbed by the Potential Impact of Permissions, There Is No Better Choice
Once the user urgently needs to adopt the application, there is no reasonable solution in the actual scenario, only to choose to install or cancel

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Refined enhanced permission control and analysis system of Android platform
  • Refined enhanced permission control and analysis system of Android platform
  • Refined enhanced permission control and analysis system of Android platform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0085] The technical solution of the refined and enhanced rights control and analysis system for the Android platform provided by the present invention will be further described below in conjunction with the accompanying drawings, so that those skilled in the art can better understand the present invention and implement it.

[0086] The refined and enhanced authority control and analysis system for the Android platform provided by the present invention proposes an authority management and control method that integrates refined and enhanced authorization, real-time intelligent deployment, authority combination analysis, calculation of security risk values, and authority threat defense, mainly including refinement Enhanced authorization management and control system and combined authority security detection and analysis system are two major aspects; in the refined and enhanced authorization management and control system, it includes user configuration unit, authority control u...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a refined enhanced permission control and analysis system of an Android platform. A refined enhanced permission control and analysis system and combined permission security detection are combined into a whole; the coarse-grained authorization problem of the current Android system is effectively solved; permission combination analysis is combined, so the user can better understand the security degree of the application program in the permission level, and the actual authority management and control requirements of the user are met; a refined enhanced permission control system is designed and realized, so a user can perform three kinds of refined enhanced control on a single permission; a dynamic permission control system is provided, a permission combination analysisunit is added to an original Android system, a combination possibly causing potential safety hazards is found by analyzing permission, an analysis result is visually displayed to a user, and the useris helped to provide reasonable judgment on whether to authorize installation of an application or not; different levels and danger values are given to the permission, the threat degree of the application program is accurately quantified, and the invention has huge application and popularization value.

Description

technical field [0001] The present invention relates to an Android permission control and analysis system, in particular to a refined and enhanced permission control and analysis system for an Android platform, belonging to the technical field of Android platform permission management and control. Background technique [0002] With the rapid development of mobile Internet, the performance of mobile devices has been greatly improved, the processing speed is getting faster and faster, and the user experience is getting better and better. Mobile phones have become the most important link in people's daily life, and the application scenarios are becoming more and more diverse. change. As an Android system with obvious advantages on various platforms, it is extremely important in today's mobile Internet era and has become the choice of hundreds of millions of users. On the Android platform, users can freely download and install third-party applications through various channels. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/51G06F21/57
CPCG06F21/51G06F21/57G06F2221/2141
Inventor 刘秀萍高宏松
Owner 荆门汇易佳信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products