CN106462697B - Ancillary service management method and device - Google Patents

Ancillary service management method and device Download PDF

Info

Publication number
CN106462697B
CN106462697B CN201680000855.1A CN201680000855A CN106462697B CN 106462697 B CN106462697 B CN 106462697B CN 201680000855 A CN201680000855 A CN 201680000855A CN 106462697 B CN106462697 B CN 106462697B
Authority
CN
China
Prior art keywords
application program
application
mark
list
ancillary service
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201680000855.1A
Other languages
Chinese (zh)
Other versions
CN106462697A (en
Inventor
伍亮雄
刘海涛
刘鸣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Publication of CN106462697A publication Critical patent/CN106462697A/en
Application granted granted Critical
Publication of CN106462697B publication Critical patent/CN106462697B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2149Restricted operating environment

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Stored Programmes (AREA)

Abstract

The embodiment of the invention provides a kind of ancillary service management method and devices, it is related to information security field, the described method includes: when meeting the application demand of permission of ancillary service offer, show the empowerment management interface of ancillary service, empowerment management interface includes the mark of destination application, and destination application is the application program after being filtered by the corresponding blacklist list of ancillary service and/or white list;Wherein, empowerment management interface is used to authorize the user interface for the permission that ancillary service provides to destination application for user;The application program of malice is solved to the problem of after the permission of android system application ancillary service, carrying out malicious operation in the unwitting situation of user using simulation click function;Application program can be filtered by having reached, and shield the mark of malicious application, avoid user from authorizing the permission of ancillary service offer to malicious application, to improve the effect of the safety of operating system.

Description

Ancillary service management method and device
Technical field
The present embodiments relate to information security field, in particular to a kind of ancillary service management method and device.
Background technique
Ancillary service (accessibility service) is to be directed to have obstacle crowd to be provided in android system Service.Have that obstacle crowd includes blind person, deaf-mute, there are people of physical handicaps etc..
Summary of the invention
In order to solve the problems, such as the relevant technologies, the embodiment of the invention provides a kind of ancillary service management method and devices. The technical solution is as follows:
In a first aspect, providing a kind of ancillary service management method, which comprises
When meeting the application demand of permission of ancillary service offer, the empowerment management interface of ancillary service is shown, it is described Empowerment management interface includes the mark of destination application, and the destination application is corresponding black by the ancillary service List list and/or white list be filtered after application program;
Wherein, the empowerment management interface is used to authorize the ancillary service to the destination application for user and provide Permission user interface.
In one embodiment, the method also includes:
First the application list is obtained, described first the application list includes the mark of at least one the first application program Know, first application program is the application program for the permission that the application ancillary service provides;
The mark of first application program was carried out according to the blacklist list and/or the white list Filter, obtains the mark of the destination application.
In one embodiment, described to be carried out according to mark of the blacklist list to first application program Filter, obtains the mark of the destination application, comprising:
That detects first application program identifies whether to belong to the blacklist list;
If the mark of first application program is not belonging to the blacklist list, by the mark of first application program Know the mark for being determined as the destination application.
In one embodiment, described to be carried out according to mark of the white list to first application program Filter, obtains the mark of the destination application, comprising:
That detects first application program identifies whether to belong to the white list;
If the mark of first application program belongs to the white list, by the mark of first application program It is determined as the mark of the destination application.
In one embodiment, the method also includes:
User is received to the authorized order of the destination application by the empowerment management interface;
The permission that the ancillary service provides is authorized to the destination application according to the authorized order.
In one embodiment, the method also includes:
Second the application list is obtained, described second the application list includes the mark of at least one the second application program Know, second application program is to have authorized the application program for the permission that the ancillary service provides;
According to the blacklist list and/or the white list to described in having authorized of second application program Permission is cancelled.
In one embodiment, it is described according to the blacklist list to described in having authorized of second application program Permission is cancelled, comprising:
That detects second application program identifies whether to belong to the blacklist list;
If the mark of second application program belongs to the blacklist list, by empowerment management process to described the The permission of two application programs authorized is cancelled.
In one embodiment, it is described according to the white list to described in having authorized of second application program Permission is cancelled, comprising:
That detects second application program identifies whether to belong to the white list;
If the mark of second application program is not belonging to the white list, by empowerment management process to described The permission of second application program authorized is cancelled.
In one embodiment, the method also includes:
It is configured by the destination application that cloud server includes to the empowerment management interface.
In one embodiment, the destination application for including to the empowerment management interface by cloud server It is configured, comprising:
Rule downloads the blacklist list and/or the white list, institute from cloud server to schedule It states blacklist list and/or the white list is the list updated in the cloud server.
Second aspect, provides a kind of ancillary service managing device, and described device includes:
Interface display module, for showing ancillary service when meeting the application demand of permission of ancillary service offer Empowerment management interface, the empowerment management interface include the mark of destination application, and the destination application is to pass through institute State the corresponding blacklist list of ancillary service and/or white list be filtered after application program;
Wherein, the empowerment management interface is used to authorize the ancillary service to the destination application for user and provide Permission user interface.
In one embodiment, described device further include:
First obtains module, and for obtaining first the application list, described first the application list includes at least one The mark of a first application program, first application program are the application programs for the permission that the application ancillary service provides;
First filtering module, for being applied according to the blacklist list and/or the white list to described first The mark of program is filtered, and obtains the mark of the destination application.
In one embodiment, first filtering module, comprising:
First detection unit identifies whether to belong to the blacklist list for detect first application program;
First determination unit, if the mark for first application program is not belonging to the blacklist list, by institute The mark for stating the first application program is determined as the mark of the destination application.
In one embodiment, first filtering module, comprising:
Second detection unit identifies whether to belong to the white list for detect first application program;
Second determination unit will be described if the mark for first application program belongs to the white list The mark of first application program is determined as the mark of the destination application.
In one embodiment, described device further include:
Command reception module, for receiving authorization of the user to the destination application by the empowerment management interface Instruction;
Right-granting module is mentioned for authorizing the ancillary service to the destination application according to the authorized order The permission of confession.
In one embodiment, described device further include:
Second obtains module, and for obtaining second the application list, described second the application list includes at least one The mark of a second application program, second application program are to have authorized the application journey for the permission that the ancillary service provides Sequence;
Permission cancels module, for being applied according to the blacklist list and/or the white list to described second The permission of program authorized is cancelled.
In one embodiment, the permission cancels module, comprising:
Third detection unit identifies whether to belong to the blacklist list for detect second application program;
First cancels unit, if the mark for second application program belongs to the blacklist list, by awarding Power managing process cancels the permission of second application program authorized.
In one embodiment, the permission cancels module, comprising:
4th detection unit identifies whether to belong to the white list for detect second application program;
Second cancellation unit passes through if the mark for second application program is not belonging to the white list Empowerment management process cancels the permission of second application program authorized.
In one embodiment, described device further include:
Setup module, the destination application for including to the empowerment management interface by cloud server are set It sets.
In one embodiment, the setup module, comprising:
List download unit, for rule to schedule from cloud server download the blacklist list and/or The white list, the blacklist list and/or the white list are the column updated in the cloud server Table.
The third aspect provides a kind of ancillary service managing device, comprising:
Processor;
For storing the memory of the executable instruction of the processor;
Wherein, the processor is configured to:
When meeting the application demand of permission of ancillary service offer, the empowerment management interface of ancillary service is shown, it is described Empowerment management interface includes the mark of destination application, and the destination application is corresponding black by the ancillary service List list and/or white list be filtered after application program;
Wherein, the empowerment management interface is used to authorize the ancillary service to the destination application for user and provide Permission user interface.
The beneficial effect of technical solution provided in an embodiment of the present invention is:
Application program is filtered to obtain by using the corresponding blacklist list of ancillary service and/or white list Destination application, the displaying target application program in empowerment management interface solve the application program of malice to Android system After the permission of system application ancillary service, asking for malicious operation is carried out in the unwitting situation of user using simulation click function Topic;Application program can be filtered by having reached, and the mark of filtered non-malicious application program is shown in empowerment management interface Know, shield the mark of malicious application, avoids user from authorizing the permission of ancillary service offer to malicious application, to mention The high effect of the safety of operating system.
Detailed description of the invention
To describe the technical solutions in the embodiments of the present invention more clearly, make required in being described below to embodiment Attached drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for For those of ordinary skill in the art, without creative efforts, it can also be obtained according to these attached drawings other Attached drawing.
Fig. 1 is a kind of schematic diagram at the miscellaneous function interface provided in an embodiment of the present invention being related to;
Fig. 2A is the flow chart of ancillary service management method provided by one embodiment of the present invention;
Fig. 2 B is the schematic diagram of ancillary service administration interface provided by one embodiment of the present invention;
Fig. 3 A is the flow chart for the ancillary service management method that another embodiment of the present invention provides;
Fig. 3 B is the schematic diagram for the ancillary service administration interface that another embodiment of the present invention provides;
Fig. 3 C is the schematic diagram for the ancillary service administration interface that another embodiment of the present invention provides;
Fig. 4 A is the flow chart for the ancillary service management method that another embodiment of the present invention provides;
Fig. 4 B is the schematic diagram for the ancillary service administration interface that another embodiment of the present invention provides;
Fig. 5 A is the flow chart for the ancillary service management method that another embodiment of the present invention provides;
Fig. 5 B is the schematic diagram for the ancillary service administration interface that another embodiment of the present invention provides;
Fig. 5 C is the schematic diagram for the ancillary service administration interface that another embodiment of the present invention provides;
Fig. 6 A is the flow chart for the ancillary service management method that another embodiment of the present invention provides;
Fig. 6 B is the schematic diagram for the ancillary service administration interface that another embodiment of the present invention provides;
Fig. 7 is the structural block diagram of ancillary service managing device provided by one embodiment of the present invention;
Fig. 8 is the structural block diagram for the ancillary service managing device that another embodiment of the present invention provides;
Fig. 9 is the structural schematic diagram of terminal provided by one embodiment of the present invention.
Specific embodiment
To make the object, technical solutions and advantages of the present invention clearer, below in conjunction with attached drawing to embodiment party of the present invention Formula is described in further detail.
The each embodiment of the present invention is applied to be illustrated in terminal with ancillary service management method.Terminal can be Mobile phone, tablet computer, E-book reader, MP3 player (Moving Picture Experts Group Audio Layer III, dynamic image expert's compression standard audio level 3), MP4 (Moving Picture Experts Group Audio Layer IV, dynamic image expert's compression standard audio level 4) player, wearable device, pocket computer on knee and platform Formula computer etc..
Optionally, operation has Android (Android) operating system, abbreviation android system in terminal.Android behaviour Ancillary service (accessibility service), also referred to as miscellaneous function, Barrier-free Service, accessible function are provided with as system Energy, accessible miscellaneous function.In the system set interface of android system, it is typically provided with the set interface of ancillary service.It should Set interface is the empowerment management interface of ancillary service.
Optionally, multiple application programs can be run in terminal, application program can assist taking to the operating system application of terminal The permission that business provides.Optionally, the permission that ancillary service is provided with for realizing voice prompt function, for realizing physical feedback The permission of function, for realizing the permission of simulation click function, for realizing permission of text enlarging function etc..These permission energy Enough blind person or deaf-mute etc. is helped to have use of the obstacle crowd to terminal.
Application program is able to use provided by ancillary service to after android system application to the permission of ancillary service Various permissions.In the various permissions that ancillary service provides, exists for realizing the permission of simulation click function, simulate click function It is a kind of function of being used to help blind person and click screen.After application program has for realizing the permission of simulation click function, The click signal of program instruction analog subscriber on a user interface can be used, to control control shown in user interface Part.
As shown in Figure 1, being provided with the corresponding user interface of miscellaneous function in the system set interface of android system 100.It is shown in the corresponding user interface 100 of the miscellaneous function and all applies for or applied answering to the permission of ancillary service Use program.
The application programs of some malice is currently, there are to after the permission of android system application ancillary service, uses simulation Click function carries out malicious operation in the unwitting situation of user, and malicious operation includes: to obtain the power for not obtaining user's authorization Limit, unload competing product application program, the system setting for modifying operating system etc..
Fig. 2A is please referred to, it illustrates the signals of the interface of ancillary service management method provided by one embodiment of the present invention Figure.The present embodiment is applied to be illustrated in terminal with the ancillary service management method.The ancillary service management method can To comprise the following steps:
Step 202, it is determined whether meet the application demand of the permission of ancillary service;
Optionally, application demand is that application program states predetermined code in installation package file, which is to use In the code for the permission that application ancillary service provides.
Step 204, it when meeting ancillary service authority application demand, shows the empowerment management interface of ancillary service, authorizes Administration interface includes the mark of destination application, destination application be by the corresponding blacklist list of ancillary service and/ Or white list be filtered after application program;
Wherein, empowerment management interface is used to authorize the user for the permission that ancillary service provides to destination application for user Interface.
Optionally, the mark of destination application is the packet name of destination application.
As shown in Figure 2 B, user clicks " ancillary service management " option in " more settings " interface 200, takes into auxiliary Business administration interface 210 is shown in ancillary service administration interface 210 when meeting the application demand of permission of ancillary service offer Mark 001, the mark of application program 002, the mark 004 of the mark of application program 003 and application program of application program.Using The mark 001 of program, the mark of application program 002, the mark 004 of the mark of application program 003 and application program are by auxiliary Application program after helping the corresponding blacklist list of service and/or white list to be filtered.
In conclusion ancillary service management method provided in this embodiment, by using the corresponding blacklist of ancillary service List and/or white list are filtered application program to obtain destination application, show mesh in empowerment management interface Application program is marked, the application program of malice is solved to after the permission of android system application ancillary service, simulation is used to click Function carries out the problem of malicious operation in the unwitting situation of user;Application program can be filtered by having reached, authorization The mark that filtered non-malicious application program is shown in administration interface, shields the mark of malicious application, avoids user couple Malicious application authorizes the permission of ancillary service offer, to improve the effect of the safety of operating system.
Fig. 3 A is please referred to, it illustrates the flow charts for the ancillary service management method that another embodiment of the present invention provides. The present embodiment is applied to be illustrated in terminal with the ancillary service management method.The ancillary service management method can wrap Include the following steps:
Step 301, terminal receives trigger signal;
Optionally, which is the signal for showing the empowerment management interface of ancillary service.
Step 302, terminal obtains the corresponding blacklist list of ancillary service;
Optionally, terminal is previously stored with blacklist list, which is stored with the mark of malicious application. Malicious application is that the program of malicious operation is executed using the permission that ancillary service provides.
The mark of application program is used for the unique identification application program.Optionally, the mark of application program is application program Packet name (packet name).
Step 303, terminal obtains first the application list, and first the application list includes at least one first application The mark of program, the first application program are the application programs for the permission for applying for that ancillary service provides.
Ancillary service is to service provided by obstacle crowd in android system to have.
The first application program in first the application list states predetermined code in installation package file, the predetermined generation Code is the code for applying for the permission of ancillary service offer.Optionally, android system is by calling Accessibility Manager.getInstalledAccessibilityServiceList () function obtains first the application list.
The first application program in first the application list usually not yet applies for the permission provided to ancillary service Application program is also possible to have authorized application program (such as the older version in operating system of the permission of ancillary service offer It is authorized in this).
As shown in Figure 3B, first the application list L01 includes the mark A of the first application program, the first application program Identify B, the first application program mark C, the first application program mark D, the first application program mark E and first apply journey The mark F of sequence.
Step 304, terminal detect the first application program identify whether belong to blacklist list.
It include the mark of malicious application in blacklist list.
It as shown in Figure 3B, include the mark of malicious application: the mark B of the first application program and the in blacklist list The mark E of one application program.
Optionally, it is previously stored with blacklist list in terminal, alternatively, terminal downloads blacklist list from server. Optionally, blacklist list is updated according to prefixed time interval.
Optionally, terminal traverses the mark of the first application program in the first list of application, the first application of detection The identifying whether of program belongs to blacklist list.
Step 305, if the mark of the first application program is not belonging to blacklist list, terminal is by the mark of the first application program Know the mark for being determined as destination application.
Destination application is the application program after being filtered by the corresponding blacklist list of ancillary service.Target is answered It is the application program of non-malicious with program.
As shown in Figure 3B, terminal obtains the mark A of the first application program, the mark C of the first application program, the by traversal The mark D of the one application program and mark F of the first application program is not belonging to blacklist list, and terminal is by the mark of the first application program Know A, the mark C of the first application program, the mark D of the first application program and the mark F of the first application program to be determined as target and answer With the mark of program.
Step 306, terminal shows the empowerment management interface of ancillary service;Empowerment management interface includes destination application Mark;
Destination application is the application program after being filtered by the corresponding blacklist list of ancillary service;Wherein, Empowerment management interface is used to authorize the user interface for the permission that ancillary service provides to destination application for user.
Optionally, terminal shields and does not show the mark for belonging to the first application program of blacklist list.
As shown in Figure 3B, terminal shows the empowerment management interface 300 of ancillary service, includes the in empowerment management interface 300 The mark for identifying D and the first application program for identifying C, the first application program for identifying A, the first application program of one application program F.Terminal shields and does not show the mark E of the mark B and the first application program of the first application program.
After terminal shows empowerment management interface, user can carry out relevant operation step according to the guidance at empowerment management interface Suddenly, as follows:
Step 307, terminal receives user to the authorized order of destination application by empowerment management interface.
User clicks the management button triggering authorized order provided in empowerment management interface, and terminal receives user and answers target With the authorized order of program.
As shown in Figure 3 C, user clicks the mark A of the first application program in empowerment management interface 300, answers into first With the corresponding interface 003 the mark A of program, empowerment management button a is provided in interface 003, user clicks the empowerment management button A, triggering terminal authorize the mark A of the first application program.The authorization is directed to the first application program and authorizes ancillary service The permission of offer.
Optionally, authorized order opens permission or cancellation permission for authorizing.
Step 308, terminal authorizes the permission that ancillary service provides to destination application according to authorized order.
For example, terminal authorizes the permission " from this automatic installation new version " to game application.From this, the game application Program has the function that automatic installation new version is realized using simulation click function.
It should be noted that blacklist list is the pre-stored list of terminal inner, alternatively, blacklist list is cloud The list collected and constantly updated in server.
Step 309, terminal to schedule rule from cloud server download blacklist list, blacklist list be The updated list of cloud server.
Optionally, predetermined time rule includes Fixed Time Interval and/or is not fixed time interval.
The blacklist list that terminal is downloaded using cloud server is updated existing blacklist list.
In conclusion ancillary service management method provided in this embodiment, in the mistake for the permission that application ancillary service provides Cheng Zhong is filtered application program to obtain destination application, award by using the corresponding blacklist list of ancillary service Displaying target application program in administration interface is weighed, solves the application program of malice to android system application ancillary service After permission, using simulation click function malicious operation is carried out in the unwitting situation of user the problem of;Having reached can correspond to It is filtered with program, the mark of filtered non-malicious application program is shown in empowerment management interface, shield malicious application journey The mark of sequence avoids user from authorizing the permission of ancillary service offer to malicious application, to improve the peace of operating system The effect of full property.
In addition, being also updated by cloud server to blacklist list, the essence of shielding malicious application is improved Exactness.
Fig. 4 A is please referred to, it illustrates the flow charts for the ancillary service management method that another embodiment of the present invention provides. The present embodiment is applied to be illustrated in terminal with the ancillary service management method.The ancillary service management method can wrap Include the following steps:
Step 401, terminal receives trigger signal;
Optionally, which is the signal for showing the empowerment management interface of ancillary service.
Step 402, terminal obtains the corresponding white list of ancillary service;
Optionally, terminal is previously stored with white list, which is stored with the mark of non-malicious application program Know.Non-malicious application program is that the program of normal operating is executed using the permission that ancillary service provides.
The mark of application program is used for the unique identification application program.Optionally, the mark of application program is application program Packet name (packet name).
Step 403, terminal obtains first the application list, and first the application list includes at least one first application The mark of program, the first application program are the application programs for the permission for applying for that ancillary service provides.
Ancillary service is to service provided by obstacle crowd in android system to have.
The first application program in first the application list states predetermined code in installation package file, the predetermined generation Code is the code for applying for the permission of ancillary service offer.Optionally, android system is by calling Accessibility Manager.getInstalledAccessibilityServiceList () function obtains first the application list.
The first application program in first the application list usually not yet applies for the permission provided to ancillary service Application program is also possible to have authorized application program (such as the older version in operating system of the permission of ancillary service offer It is authorized in this).
As shown in Figure 4 B, first the application list L02 includes the mark X of the first application program, the first application program Identify Y, the first application program mark Z, the first application program mark O, the first application program mark P and first apply journey The mark Q of sequence.
Step 404, terminal detect the first application program identify whether belong to white list.
White list includes the mark of non-malicious application program.
As shown in Figure 4 B, include the mark of non-malicious application program in white list: the mark X of the first application program, The mark O for identifying Z, the first application program for identifying Y, the first application program of first application program.
Optionally, it is previously stored with white list in terminal, alternatively, terminal downloads white list from server. Optionally, white list is updated according to prefixed time interval.
Optionally, terminal traverses the mark of the first application program in the first list of application, the first application of detection The identifying whether of program belongs to white list.
Step 405, if the mark of the first application program belongs to white list, terminal is by the mark of the first application program It is determined as the mark of destination application.
Destination application is the application program after being filtered by the corresponding white list of ancillary service.
As shown in Figure 4 B, terminal obtains the mark X of the first application program, the mark Y of the first application program, the by traversal The mark Z of one application program, the mark O of the first application program belong to white list.Terminal is then by the mark of the first application program Know X, the mark Y of the first application program, the mark Z of the first application program, the first application program mark O be determined as target application The mark of program.
Step 406, terminal shows the empowerment management interface of ancillary service, and empowerment management interface includes destination application Mark;
Destination application is the application program after being filtered by the corresponding white list of ancillary service;Wherein, Empowerment management interface is used to authorize the user interface for the permission that ancillary service provides to destination application for user.
Optionally, terminal shields and does not show the mark for being not belonging to the first application program of white list.
As shown in Figure 4 B, terminal shows the empowerment management interface 400 of ancillary service, includes the in empowerment management interface 400 The mark for identifying Z, the first application program for identifying Y, the first application program for identifying X, the first application program of one application program O.Terminal shields and does not show the mark Q of the mark P and the first application program of the first application program.
After terminal shows empowerment management interface, user can carry out relevant operation step according to the guidance at empowerment management interface Suddenly, as follows:
Step 407, terminal receives user to the authorized order of destination application by empowerment management interface.
User clicks the management button triggering authorized order provided in empowerment management interface, and terminal receives user and answers target With the authorized order of program.The authorization is directed to the permission that the first application program authorizes ancillary service offer.
Step 408, terminal authorizes the permission that ancillary service provides to destination application according to authorized order.
For example, terminal authorizes the permission " from this automatic installation new version " to game application.From this, the game application Program has the function that automatic installation new version is realized using simulation click function.
It should be noted that white list is the pre-stored list of terminal inner, alternatively, white list is cloud The list collected and constantly updated in server.
Step 409, terminal to schedule rule from cloud server download white list, white list be The updated list of cloud server.
Optionally, predetermined time rule includes Fixed Time Interval and/or is not fixed time interval.
The white list that terminal is downloaded using cloud server is updated existing white list.
In conclusion ancillary service management method provided in this embodiment, in the mistake for the permission that application ancillary service provides Cheng Zhong is filtered application program to obtain destination application, award by using the corresponding white list of ancillary service Displaying target application program in administration interface is weighed, solves the application program of malice to android system application ancillary service After permission, using simulation click function malicious operation is carried out in the unwitting situation of user the problem of;Having reached can correspond to It is filtered with program, the mark of filtered non-malicious application program is shown in empowerment management interface, shield malicious application journey The mark of sequence avoids user from authorizing the permission of ancillary service offer to malicious application, to improve the peace of operating system The effect of full property.
In addition, being also updated by cloud server to white list, the essence of shielding malicious application is improved Exactness.
Fig. 5 A is please referred to, it illustrates the flow charts for the ancillary service management method that another embodiment of the present invention provides. The present embodiment is applied to be illustrated in terminal with the ancillary service management method.The ancillary service management method can wrap Include the following steps:
Step 501, after OTA upgrading, terminal obtains the corresponding blacklist list of ancillary service.
After OTA (Over-the-Air Technology, space download technology) upgrading, terminal is obtained from OTA upgrade package The corresponding blacklist list of ancillary service.
Blacklist list is stored with the mark of malicious application.Malicious application is the power provided using ancillary service Limit executes the program of malicious operation.
The mark of application program is used for the unique identification application program.Optionally, the mark of application program is application program Packet name (packet name).
Step 502, terminal obtains second the application list, and second the application list includes at least one second application The mark of program, the second application program are to have authorized the application program of the permission of ancillary service offer.
Ancillary service is to service provided by obstacle crowd in android system to have.
The second application program in second the application list has usually authorized answering for the permission of ancillary service offer With program (for example being authorized in the older version of operating system).
For example, the second application program V of the permission " from this automatic installation new version " has been awarded.
As shown in Figure 5 B, second the application list L03 includes the mark K of the second application program, the second application program Identify the mark G for identifying H and the second application program of J, the second application program.
Step 503, terminal detect the second application program identify whether belong to blacklist list.
It include the mark of malicious application in blacklist list.It as shown in Figure 5 B, include that malice is answered in blacklist list With the mark of program: the mark G of the second application program.
Optionally, it is previously stored with blacklist list in terminal, alternatively, terminal downloads blacklist list from server. Optionally, blacklist list is updated according to prefixed time interval.
Optionally, terminal traverses the mark of the second application program in the second list of application, the second application of detection The identifying whether of program belongs to blacklist list.
Step 504, if the mark of the second application program belongs to blacklist list, terminal passes through empowerment management process to The permission of two application programs authorized is cancelled.
The permission of second application program authorized cancel and refers to that second application program no longer has and has authorized Permission.For example, the second application program G has permission " from this automatic installation new version ", after cancelling the permission authorized, then Second application program G no longer has the permission " from this automatic installation new version ".
If the mark of the second application program is not belonging to blacklist list, terminal is kept to being not belonging to the of blacklist list The authorization of two application programs.
As shown in Figure 5 B, terminal show that the mark G of the second application program belongs to blacklist list by traversal, cancels second The permission that application program G has been authorized.Terminal keeps awarding for the second application program K, the second application program J and the second application program H Power.Management terminal terminal shows the empowerment management interface 500 of ancillary service, includes second in empowerment management interface 500 using journey The mark H for identifying J and the second application program for identifying K, the second application program of sequence.Management terminal terminal shields and does not show the The mark G of two application programs.
For another example shown in Fig. 5 C, in former empowerment management interface 005 including the second application program mark K, second apply journey Sequence mark J, the second application program mark H and the second application program mark G, cancel the second application program G permission after, The mark J and second application program of mark K, the second application program in empowerment management interface 500 including the second application program Identify H.
The present embodiment can be implemented in conjunction with above-mentioned Fig. 2A, Fig. 3 A and Fig. 4 A illustrated embodiment.
In conclusion ancillary service management method provided in this embodiment, by using the corresponding blacklist of ancillary service List is filtered to obtain destination application to the application program for the permission for having authorized ancillary service offer, in empowerment management circle Displaying target application program in face solves the application program of malice to after the permission of android system application ancillary service, makes The problem of carrying out malicious operation in the unwitting situation of user with simulation click function;Having reached can take to auxiliary has been authorized The application program for the permission provided of being engaged in is filtered, and cancels the permission for belonging to the application program of blacklist list, empowerment management circle The mark that filtered non-malicious application program is shown in face, shields the mark of malicious application, avoids user to maliciously answering The permission that ancillary service offer is provided with program, to improve the effect of the safety of operating system.
Fig. 6 A is please referred to, it illustrates the flow charts for the ancillary service management method that another embodiment of the present invention provides. The present embodiment is applied to be illustrated in terminal with the ancillary service management method.The ancillary service management method can wrap Include the following steps:
Step 601, after OTA upgrading, terminal obtains the corresponding white list of ancillary service.
After OTA (Over-the-Air Technology, space download technology) upgrading, terminal is obtained from OTA upgrade package The corresponding white list of ancillary service.
White list is stored with the mark of non-malicious application program.Non-malicious application program is provided using ancillary service Permission execute normal operating program.
The mark of application program is used for the unique identification application program.Optionally, the mark of application program is application program Packet name (packet name).
Step 602, terminal obtains second the application list, and second the application list includes at least one second application The mark of program, the second application program are to have authorized the application program of the permission of ancillary service offer.
Ancillary service is to service provided by obstacle crowd in android system to have.
The second application program in second the application list has usually authorized answering for the permission of ancillary service offer With program (for example being authorized in the older version of operating system).
As shown in Figure 6B, second the application list L04 includes the mark W of the second application program, the second application program Identify the mark R for identifying T and the second application program for identifying U, the second application program of I, the second application program.
Step 603, terminal detect the second application program identify whether belong to white list.
White list includes the mark of non-malicious application program.It as shown in Figure 6B, include non-malicious in white list The mark of application program: the mark R for identifying T and the second application program for identifying U, the second application program of the second application program.
Optionally, it is previously stored with white list in terminal, alternatively, terminal downloads white list from server. Optionally, white list is updated according to prefixed time interval.
Step 604, if the mark of the second application program is not belonging to white list, terminal passes through empowerment management process pair The permission of second application program authorized is cancelled.
Destination application is the application program after being filtered by the corresponding white list of ancillary service.
If the mark of the second application program belongs to white list, belong to white list second is answered in terminal holding With the authorization of program.
As shown in Figure 6B, terminal by traversal obtain the second application program mark W and the second application program mark I not Belong to white list, cancels the permission that the second application program W and the second application program I has been authorized.Terminal keeps the second application The authorization of program U, the second application program T and the second application program R.Terminal shows the empowerment management interface 600 of ancillary service, awards Weigh the mark for identifying T and the second application program for identifying U, the second application program in administration interface 600 including the second application program Know R.Management terminal terminal shields and does not show the mark I of the mark W and the second application program of the second application program.
The present embodiment can be implemented in conjunction with above-mentioned Fig. 2A, Fig. 3 A and Fig. 4 A illustrated embodiment.
In conclusion ancillary service management method provided in this embodiment, by using the corresponding white list of ancillary service List is filtered to obtain destination application to the application program for the permission for having authorized ancillary service offer, in empowerment management circle Displaying target application program in face solves the application program of malice to after the permission of android system application ancillary service, makes The problem of carrying out malicious operation in the unwitting situation of user with simulation click function;Having reached can take to auxiliary has been authorized The application program for the permission provided of being engaged in is filtered, and cancels the permission for belonging to the application program for being not belonging to white list, authorization The mark that filtered non-malicious application program is shown in administration interface, shields the mark of malicious application, avoids user couple Malicious application authorizes the permission of ancillary service offer, to improve the effect of the safety of operating system.
Following is apparatus of the present invention embodiment, can be used for executing embodiment of the present invention method.For apparatus of the present invention reality Undisclosed details in example is applied, embodiment of the present invention method is please referred to.
Referring to FIG. 7, it illustrates the structural block diagram of ancillary service managing device provided by one embodiment of the present invention, The ancillary service managing device being implemented in combination with as some or all of of terminal by software, hardware or both.It should Ancillary service managing device may include:
Demand determining module 720 is used to determine whether to meet the application demand of the permission of ancillary service;
Interface display module 740, for showing ancillary service when meeting the application demand of permission of ancillary service offer Empowerment management interface, empowerment management interface includes the mark of destination application, and destination application is to pass through ancillary service Corresponding blacklist list and/or white list be filtered after application program;
Wherein, empowerment management interface is used to authorize the user for the permission that ancillary service provides to destination application for user Interface.
In conclusion ancillary service managing device provided in this embodiment, by using the corresponding blacklist of ancillary service List and/or white list are filtered application program to obtain destination application, show mesh in empowerment management interface Application program is marked, the application program of malice is solved to after the permission of android system application ancillary service, simulation is used to click Function carries out the problem of malicious operation in the unwitting situation of user;Application program can be filtered by having reached, authorization The mark that filtered non-malicious application program is shown in administration interface, shields the mark of malicious application, avoids user couple Malicious application authorizes the permission of ancillary service offer, to improve the effect of the safety of operating system.
Referring to FIG. 8, the structure box of the ancillary service managing device provided it illustrates another embodiment of the present invention Figure, which being implemented in combination with as some or all of of terminal by software, hardware or both. The ancillary service managing device may include:
Interface display module 820, for showing ancillary service when meeting the application demand of permission of ancillary service offer Empowerment management interface, empowerment management interface includes the mark of destination application, and destination application is to pass through ancillary service Corresponding blacklist list and/or white list be filtered after application program;
Wherein, empowerment management interface is used to authorize the user for the permission that ancillary service provides to destination application for user Interface.
In one embodiment,
The device further include:
First obtains module 830, and for obtaining first the application list, first the application list includes at least one The mark of first application program, the first application program are the application programs for the permission for applying for that ancillary service provides;
First filtering module 840, for the mark according to blacklist list and/or white list to the first application program It is filtered, obtains the mark of destination application.
In one embodiment,
First filtering module 840, comprising:
First detection unit 841, for detect the first application program identify whether belong to blacklist list;
First determination unit 842, if the mark for the first application program is not belonging to blacklist list, by the first application The mark of program is determined as the mark of destination application.
In one embodiment,
First filtering module 840, comprising:
Second detection unit 843, for detect the first application program identify whether belong to white list;
Second determination unit 844 applies journey for first if the mark for the first application program belongs to white list The mark of sequence is determined as the mark of destination application.
In one embodiment,
The device further include:
Command reception module 850, for receiving user to the authorized order of destination application by empowerment management interface;
Right-granting module 860, for authorizing the permission that ancillary service provides to destination application according to authorized order.
In one embodiment,
The device further include:
Second obtains module 870, and for obtaining second the application list, second the application list includes at least one The mark of second application program, the second application program are to have authorized the application program of the permission of ancillary service offer;
Permission cancels module 880, for having awarded to the second application program according to blacklist list and/or white list The permission given is cancelled.
In one embodiment,
Permission cancels module 880, comprising:
Third detection unit 881, for detect the second application program identify whether belong to blacklist list;
First cancellation unit 882 passes through empowerment management if the mark for the second application program belongs to blacklist list Process cancels the permission of the second application program authorized.
In one embodiment,
Permission cancels module 880, comprising:
4th detection unit 883, for detect the second application program identify whether belong to white list;
Second cancels unit 884, if the mark for the second application program is not belonging to white list, passes through authorization pipe Reason process cancels the permission of the second application program authorized.
In one embodiment,
The device further include:
Setup module 890, the destination application for including to empowerment management interface by cloud server are set It sets.
In one embodiment,
Setup module 890, comprising:
List download unit 891, for regular from cloud server downloading blacklist list and/or white to schedule List list, blacklist list and/or white list are the lists that server update is crossed beyond the clouds.
In conclusion ancillary service managing device provided in this embodiment, by using the corresponding blacklist of ancillary service List and/or white list are filtered application program to obtain destination application, show mesh in empowerment management interface Application program is marked, the application program of malice is solved to after the permission of android system application ancillary service, simulation is used to click Function carries out the problem of malicious operation in the unwitting situation of user;Application program can be filtered by having reached, authorization The mark that filtered non-malicious application program is shown in administration interface, shields the mark of malicious application, avoids user couple Malicious application authorizes the permission of ancillary service offer, to improve the effect of the safety of operating system.
In addition, also being taken by using the corresponding blacklist list of ancillary service and/or white list to auxiliary has been authorized The application program for the permission provided of being engaged in is filtered to obtain destination application, the displaying target application journey in empowerment management interface Sequence;The application program for the permission for having authorized ancillary service offer can be filtered by having reached, and cancellation belongs to blacklist list And/or it is not belonging to the permission of the application program of white list, filtered non-malicious application journey is shown in empowerment management interface The mark of sequence shields the mark of malicious application, improves the effect of the safety of operating system.
In addition, being also updated by cloud server to blacklist list and/or white list, improves shielding and dislike The accuracy for application program of anticipating.
It illustrates the block diagrams of terminal 900 provided by one embodiment of the present invention by Fig. 9.The terminal may include radio frequency (RF, Radio Frequency) circuit 901, the memory 902, defeated that includes one or more computer readable storage medium Enter unit 903, display unit 904, sensor 905, voicefrequency circuit 906, Wireless Fidelity (WiFi, Wireless Fidelity) The components such as module 907, the processor 908 for including one or more than one processing core and power supply 909.Art technology Personnel are appreciated that the restriction of the not structure paired terminal of terminal structure shown in Fig. 9, may include more more or less than illustrating Component, perhaps combine certain components or different component layouts.Wherein:
RF circuit 901 can be used for receiving and sending messages or communication process in, signal sends and receivees, particularly, by base station After downlink information receives, one or the processing of more than one processor 908 are transferred to;In addition, the data for being related to uplink are sent to Base station.In general, RF circuit 901 includes but is not limited to antenna, at least one amplifier, tuner, one or more oscillators, uses Family identity module (SIM, Subscriber Identity Module) card, transceiver, coupler, low-noise amplifier (LNA, Low Noise Amplifier), duplexer etc..In addition, RF circuit 901 can also by wireless communication with network and its He communicates equipment.Any communication standard or agreement, including but not limited to global system for mobile telecommunications system can be used in the wireless communication Unite (GSM, Global System of Mobile communication), general packet radio service (GPRS, General Packet Radio Service), CDMA (CDMA, Code Division Multiple Access), wideband code division it is more Location (WCDMA, Wideband Code Division Multiple Access), long term evolution (LTE, Long Term Evolution), Email, short message service (SMS, Short Messaging Service) etc..
Memory 902 can be used for storing software program and module, and processor 908 is stored in memory 902 by operation Software program and module, thereby executing various function application and data processing.Memory 902 can mainly include storage journey Sequence area and storage data area, wherein storing program area can the (ratio of application program needed for storage program area, at least one function Such as sound-playing function, image player function) etc.;Storage data area, which can be stored, uses created data according to terminal (such as audio data, phone directory etc.) etc..In addition, memory 902 may include high-speed random access memory, can also include Nonvolatile memory, for example, at least a disk memory, flush memory device or other volatile solid-state parts.Phase Ying Di, memory 902 can also include Memory Controller, to provide processor 908 and input unit 903 to memory 902 Access.
Input unit 903 can be used for receiving the number or character information of input, and generate and user setting and function Control related keyboard, mouse, operating stick, optics or trackball signal input.Specifically, in a specific embodiment In, input unit 903 may include touch sensitive surface and other input equipments.Touch sensitive surface, also referred to as touch display screen or touching Control plate, collect user on it or nearby touch operation (such as user using any suitable object such as finger, stylus or Operation of the attachment on touch sensitive surface or near touch sensitive surface), and corresponding connection dress is driven according to preset formula It sets.Optionally, touch sensitive surface may include both touch detecting apparatus and touch controller.Wherein, touch detecting apparatus is examined The touch orientation of user is surveyed, and detects touch operation bring signal, transmits a signal to touch controller;Touch controller from Touch information is received on touch detecting apparatus, and is converted into contact coordinate, then gives processor 908, and can reception processing Order that device 908 is sent simultaneously is executed.Furthermore, it is possible to a variety of using resistance-type, condenser type, infrared ray and surface acoustic wave etc. Type realizes touch sensitive surface.In addition to touch sensitive surface, input unit 903 can also include other input equipments.Specifically, other are defeated Entering equipment can include but is not limited to physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse One of mark, operating stick etc. are a variety of.
Display unit 904 can be used for showing information input by user or be supplied to user information and terminal it is various Graphical user interface, these graphical user interface can be made of figure, text, icon, video and any combination thereof.Than Such as, display unit 904, for showing that the empowerment management interface of ancillary service, empowerment management interface include destination application Mark.Display unit 904 may include display panel, optionally, can use liquid crystal display (LCD, Liquid Crystal Display), the forms such as Organic Light Emitting Diode (OLED, Organic Light-Emitting Diode) configure display surface Plate.Further, touch sensitive surface can cover display panel, after touch sensitive surface detects touch operation on it or nearby, Processor 908 is sent to determine the type of touch event, is followed by subsequent processing device 908 according to the type of touch event in display panel It is upper that corresponding visual output is provided.Although touch sensitive surface and display panel are realized as two independent components in Fig. 9 Input and input function, but in some embodiments it is possible to it is touch sensitive surface and display panel is integrated and realize and input and defeated Function out.
Terminal may also include at least one sensor 905, such as optical sensor, motion sensor and other sensors. Specifically, optical sensor may include ambient light sensor and proximity sensor, wherein ambient light sensor can be according to ambient light Light and shade adjust the brightness of display panel, proximity sensor can close display panel and/or back when terminal is moved in one's ear Light.As a kind of motion sensor, gravity accelerometer can detect (generally three axis) acceleration in all directions Size can detect that size and the direction of gravity when static, can be used to identify mobile phone posture application (such as horizontal/vertical screen switching, Dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;It can also configure as terminal The other sensors such as gyroscope, barometer, hygrometer, thermometer, infrared sensor, details are not described herein.
Voicefrequency circuit 906, loudspeaker, microphone can provide the audio interface between user and terminal.Voicefrequency circuit 906 can By the electric signal after the audio data received conversion, it is transferred to loudspeaker, voice signal output is converted to by loudspeaker;It is another The voice signal of collection is converted to electric signal by aspect, microphone, is converted to audio data after being received by voicefrequency circuit 906, then After the processing of audio data output processor 908, it is sent to such as another terminal through RF circuit 901, or by audio data Output is further processed to memory 902.Voicefrequency circuit 906 is also possible that earphone jack, with provide peripheral hardware earphone with The communication of terminal.
WiFi belongs to short range wireless transmission technology, and terminal can help user's transceiver electronics postal by WiFi module 907 Part, browsing webpage and access streaming video etc., it provides wireless broadband internet access for user.Although Fig. 9 is shown WiFi module 907, but it is understood that, and it is not belonging to must be configured into for terminal, it can according to need do not changing completely Become in the range of the essence of invention and omits.
Processor 908 is the control centre of terminal, using the various pieces of various interfaces and connection whole mobile phone, is led to It crosses operation or executes the software program and/or module being stored in memory 902, and call and be stored in memory 902 Data execute the various functions and processing data of terminal, to carry out integral monitoring to mobile phone.Optionally, processor 908 can wrap Include one or more processing cores;Preferably, processor 908 can integrate application processor and modem processor, wherein answer With the main processing operation system of processor, user interface and application program etc., modem processor mainly handles wireless communication. It is understood that above-mentioned modem processor can not also be integrated into processor 908.
Terminal further includes the power supply 909 (such as battery) powered to all parts, it is preferred that power supply can pass through power supply pipe Reason system and processor 908 are logically contiguous, to realize management charging, electric discharge and power managed by power-supply management system Etc. functions.Power supply 909 can also include one or more direct current or AC power source, recharging system, power failure inspection The random components such as slowdown monitoring circuit, power adapter or inverter, power supply status indicator.
Although being not shown, terminal can also be including bluetooth module etc., and details are not described herein.Specifically in the present embodiment, eventually Processor 908 in end can run the one or more program instruction being stored in memory 902, to realize above-mentioned Ancillary service management method provided in each embodiment of the method.
Those of ordinary skill in the art will appreciate that all or part of the steps in the various methods of above-described embodiment is can It is completed with instructing relevant hardware by program, which can be stored in a computer readable storage medium, storage Medium may include: read-only memory (ROM, Read Only Memory), random access memory (RAM, Random Access Memory), disk or CD etc..
Those of ordinary skill in the art will appreciate that realizing that all or part of the steps of above-described embodiment can pass through hardware It completes, relevant hardware can also be instructed to complete by program, the program can store in a kind of computer-readable In storage medium, storage medium mentioned above can be read-only memory, disk or CD etc..
The foregoing is merely presently preferred embodiments of the present invention, is not intended to limit the invention, it is all in spirit of the invention and Within principle, any modification, equivalent replacement, improvement and so on be should all be included in the protection scope of the present invention.

Claims (17)

1. a kind of ancillary service management method, which is characterized in that the described method includes:
When meeting the application demand of permission of ancillary service offer, the empowerment management interface of ancillary service, the authorization are shown Administration interface includes the mark of destination application, and the destination application is by the corresponding blacklist of the ancillary service List and/or white list be filtered after application program;
Wherein, the empowerment management interface is used to authorize the power that the ancillary service provides to the destination application for user The user interface of limit;
The method also includes:
User is received to the authorized order of the destination application by the empowerment management interface;
The permission that the ancillary service provides, the ancillary service are authorized to the destination application according to the authorized order It is to there is service provided by obstacle crowd;
The method also includes:
Second the application list is obtained, described second the application list includes the mark of at least one the second application program, Second application program is to have authorized the application program for the permission that the ancillary service provides;
According to the blacklist list and/or the white list to the permission of second application program authorized Cancelled.
2. the method according to claim 1, wherein the method also includes:
First the application list is obtained, described first the application list includes the mark of at least one the first application program, First application program is the application program for the permission that the application ancillary service provides;
The mark of first application program is filtered according to the blacklist list and/or the white list, is obtained To the mark of the destination application.
3. according to the method described in claim 2, it is characterized in that, described apply according to the blacklist list to described first The mark of program is filtered, and obtains the mark of the destination application, comprising:
That detects first application program identifies whether to belong to the blacklist list;
If the mark of first application program is not belonging to the blacklist list, and the mark of first application program is true It is set to the mark of the destination application.
4. according to the method described in claim 2, it is characterized in that, described apply according to the white list to described first The mark of program is filtered, and obtains the mark of the destination application, comprising:
That detects first application program identifies whether to belong to the white list;
If the mark of first application program belongs to the white list, the mark of first application program is determined For the mark of the destination application.
5. the method according to claim 1, wherein described apply according to the blacklist list to described second The permission of program authorized is cancelled, comprising:
That detects second application program identifies whether to belong to the blacklist list;
If the mark of second application program belongs to the blacklist list, answered by empowerment management process described second Cancelled with the permission of program authorized.
6. the method according to claim 1, wherein described apply according to the white list to described second The permission of program authorized is cancelled, comprising:
That detects second application program identifies whether to belong to the white list;
If the mark of second application program is not belonging to the white list, by empowerment management process to described second The permission of application program authorized is cancelled.
7. method according to any one of claims 1 to 6, which is characterized in that the method also includes:
It is configured by the destination application that cloud server includes to the empowerment management interface.
8. the method according to the description of claim 7 is characterized in that it is described by cloud server to the empowerment management interface Including destination application be configured, comprising:
Rule downloads the blacklist list and/or the white list from cloud server to schedule, described black List list and/or the white list are the lists updated in the cloud server.
9. a kind of ancillary service managing device, which is characterized in that described device includes:
Interface display module, for showing the authorization of ancillary service when meeting the application demand of permission of ancillary service offer Administration interface, the empowerment management interface include the mark of destination application, and the destination application is by described auxiliary Application program after helping the corresponding blacklist list of service and/or white list to be filtered;
Wherein, the empowerment management interface is used to authorize the power that the ancillary service provides to the destination application for user The user interface of limit;
Described device further include:
Command reception module refers to the authorization of the destination application for receiving user by the empowerment management interface It enables;
Right-granting module, for authorizing what the ancillary service provided to the destination application according to the authorized order Permission, the ancillary service are to there is service provided by obstacle crowd;
Described device further include:
Second obtains module, for obtaining second the application list, described second the application list include at least one the The mark of two application programs, second application program are to have authorized the application program for the permission that the ancillary service provides;
Permission cancels module, is used for according to the blacklist list and/or the white list to second application program The permission authorized cancelled.
10. device according to claim 9, which is characterized in that described device further include:
First obtains module, for obtaining first the application list, described first the application list include at least one the The mark of one application program, first application program are the application programs for the permission that the application ancillary service provides;
First filtering module is used for according to the blacklist list and/or the white list to first application program Mark be filtered, obtain the mark of the destination application.
11. device according to claim 10, which is characterized in that first filtering module, comprising:
First detection unit identifies whether to belong to the blacklist list for detect first application program;
First determination unit, if the mark for first application program is not belonging to the blacklist list, by described The mark of one application program is determined as the mark of the destination application.
12. device according to claim 10, which is characterized in that first filtering module, comprising:
Second detection unit identifies whether to belong to the white list for detect first application program;
Second determination unit, if the mark for first application program belongs to the white list, by described first The mark of application program is determined as the mark of the destination application.
13. device according to claim 9, which is characterized in that the permission cancels module, comprising:
Third detection unit identifies whether to belong to the blacklist list for detect second application program;
First cancels unit, if the mark for second application program belongs to the blacklist list, passes through authorization pipe Reason process cancels the permission of second application program authorized.
14. device according to claim 9, which is characterized in that the permission cancels module, comprising:
4th detection unit identifies whether to belong to the white list for detect second application program;
Second cancellation unit passes through authorization if the mark for second application program is not belonging to the white list Managing process cancels the permission of second application program authorized.
15. according to any device of claim 9 to 14, which is characterized in that described device further include:
Setup module, the destination application for including to the empowerment management interface by cloud server are configured.
16. device according to claim 15, which is characterized in that the setup module, comprising:
List download unit, for regular from the cloud server downloading blacklist list and/or described to schedule White list, the blacklist list and/or the white list are the lists updated in the cloud server.
17. a kind of ancillary service managing device characterized by comprising
Processor;
For storing the memory of the executable instruction of the processor;
Wherein, the processor is configured to:
When meeting the application demand of permission of ancillary service offer, the empowerment management interface of ancillary service, the authorization are shown Administration interface includes the mark of destination application, and the destination application is by the corresponding blacklist of the ancillary service List and/or white list be filtered after application program;
Wherein, the empowerment management interface is used to authorize the power that the ancillary service provides to the destination application for user The user interface of limit;
The processor is also configured to
User is received to the authorized order of the destination application by the empowerment management interface;
The permission that the ancillary service provides, the ancillary service are authorized to the destination application according to the authorized order It is to there is service provided by obstacle crowd;
The processor is also configured to
Second the application list is obtained, described second the application list includes the mark of at least one the second application program, Second application program is to have authorized the application program for the permission that the ancillary service provides;
According to the blacklist list and/or the white list to the permission of second application program authorized Cancelled.
CN201680000855.1A 2016-09-09 2016-09-09 Ancillary service management method and device Active CN106462697B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2016/098590 WO2018045564A1 (en) 2016-09-09 2016-09-09 Auxiliary service management method and apparatus

Publications (2)

Publication Number Publication Date
CN106462697A CN106462697A (en) 2017-02-22
CN106462697B true CN106462697B (en) 2019-11-26

Family

ID=58215929

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201680000855.1A Active CN106462697B (en) 2016-09-09 2016-09-09 Ancillary service management method and device

Country Status (2)

Country Link
CN (1) CN106462697B (en)
WO (1) WO2018045564A1 (en)

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018045564A1 (en) * 2016-09-09 2018-03-15 北京小米移动软件有限公司 Auxiliary service management method and apparatus
CN107908953A (en) * 2017-11-21 2018-04-13 广东欧珀移动通信有限公司 Notifications service control method, device, terminal device and storage medium
CN108647070B (en) * 2018-04-18 2022-02-22 Oppo广东移动通信有限公司 Information reminding method and device, mobile terminal and computer readable medium
CN110581831B (en) * 2018-06-11 2021-12-03 腾讯科技(深圳)有限公司 Communication method, information acquisition method, electronic device, and storage medium
CN108920944B (en) * 2018-06-12 2023-05-23 腾讯科技(深圳)有限公司 Method and device for detecting auxiliary click event, computer equipment and storage medium
CN109710338A (en) * 2018-12-24 2019-05-03 努比亚技术有限公司 A kind of searching method of mobile terminal, mobile terminal and storage medium
CN110086925A (en) * 2019-03-28 2019-08-02 努比亚技术有限公司 A kind of application processing method and mobile terminal
CN110008693A (en) * 2019-04-12 2019-07-12 深圳市趣创科技有限公司 Security application encrypts ensuring method and device and system and storage medium
CN111757024A (en) * 2020-07-30 2020-10-09 青岛海信传媒网络技术有限公司 Method for controlling intelligent image mode switching and display equipment
CN112764832A (en) * 2021-01-21 2021-05-07 青岛海信移动通信技术股份有限公司 Application program installing and uninstalling method and communication terminal
CN113792327B (en) * 2021-08-12 2022-09-02 荣耀终端有限公司 Authority management method, user interface and electronic equipment
CN115859228A (en) * 2022-12-01 2023-03-28 湖南于一科技有限公司 Method, device, equipment and storage medium for preventing information leakage in application program

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1927065A1 (en) * 2005-09-23 2008-06-04 Intel Corporation Method for computing platform data protection
CN103299658A (en) * 2010-11-19 2013-09-11 移动熨斗公司 Management of mobile applications
CN103686722A (en) * 2012-09-13 2014-03-26 中兴通讯股份有限公司 Access control method and device
CN104462978A (en) * 2014-12-24 2015-03-25 北京奇虎科技有限公司 Method and device for application program authority management

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101115023A (en) * 2006-07-25 2008-01-30 华为技术有限公司 Method for subscripting, amending, canceling subscription authority and desubscripting CBCS service
CN103544035A (en) * 2013-10-21 2014-01-29 北京奇虎科技有限公司 Application clearing method and device for mobile terminal
WO2018045564A1 (en) * 2016-09-09 2018-03-15 北京小米移动软件有限公司 Auxiliary service management method and apparatus

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1927065A1 (en) * 2005-09-23 2008-06-04 Intel Corporation Method for computing platform data protection
CN103299658A (en) * 2010-11-19 2013-09-11 移动熨斗公司 Management of mobile applications
CN103686722A (en) * 2012-09-13 2014-03-26 中兴通讯股份有限公司 Access control method and device
CN104462978A (en) * 2014-12-24 2015-03-25 北京奇虎科技有限公司 Method and device for application program authority management

Also Published As

Publication number Publication date
CN106462697A (en) 2017-02-22
WO2018045564A1 (en) 2018-03-15

Similar Documents

Publication Publication Date Title
CN106462697B (en) Ancillary service management method and device
CN104519485B (en) Communication means, device and system between a kind of terminal
CN105278937B (en) A kind of method and device showing pop-up box message
CN105024984B (en) Authority setting method, apparatus and system
CN108280349A (en) Protect method, mobile terminal and the computer readable storage medium of system kernel layer
CN106709347B (en) Using the method and device of operation
CN104123276B (en) The hold-up interception method of pop-up, device and system in a kind of browser
CN106612250A (en) Resource utilization authority judgment system and method
CN105162591B (en) Equipment login method and device
CN105096157A (en) Virtual article receiving method, sending method, interaction method and device
CN106570358A (en) Method and device for setting application permissions
CN105389259B (en) A kind of method, apparatus and system for carrying out Application testing
CN106131930A (en) A kind of WiFi network connection control method, device and terminal
CN104820546B (en) Function information methods of exhibiting and device
CN106951139A (en) Message notifying frame display methods and device
CN107219951A (en) Touch screen control method, device, storage medium and terminal device
CN105808043B (en) A kind of setting method and mobile terminal of terminal applies
CN107104930A (en) It is a kind of that the methods, devices and systems for checking authority are set
CN108762829A (en) A kind of method, client and terminal for image beautification
CN107465646B (en) A kind of application method for down loading, system and relevant device
CN106708501B (en) Activity monitoring method and device
EP2869233B1 (en) Method, device and terminal for protecting application program
CN104135504A (en) An application-based service providing method, device and system
CN109446435A (en) Information display device, method, system and computer readable storage medium
CN110430252B (en) Resource data processing method and device, equipment and readable storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant