CN106462697B - Ancillary service management method and device - Google Patents
Ancillary service management method and device Download PDFInfo
- Publication number
- CN106462697B CN106462697B CN201680000855.1A CN201680000855A CN106462697B CN 106462697 B CN106462697 B CN 106462697B CN 201680000855 A CN201680000855 A CN 201680000855A CN 106462697 B CN106462697 B CN 106462697B
- Authority
- CN
- China
- Prior art keywords
- application program
- application
- mark
- list
- ancillary service
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2149—Restricted operating environment
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Stored Programmes (AREA)
Abstract
The embodiment of the invention provides a kind of ancillary service management method and devices, it is related to information security field, the described method includes: when meeting the application demand of permission of ancillary service offer, show the empowerment management interface of ancillary service, empowerment management interface includes the mark of destination application, and destination application is the application program after being filtered by the corresponding blacklist list of ancillary service and/or white list;Wherein, empowerment management interface is used to authorize the user interface for the permission that ancillary service provides to destination application for user;The application program of malice is solved to the problem of after the permission of android system application ancillary service, carrying out malicious operation in the unwitting situation of user using simulation click function;Application program can be filtered by having reached, and shield the mark of malicious application, avoid user from authorizing the permission of ancillary service offer to malicious application, to improve the effect of the safety of operating system.
Description
Technical field
The present embodiments relate to information security field, in particular to a kind of ancillary service management method and device.
Background technique
Ancillary service (accessibility service) is to be directed to have obstacle crowd to be provided in android system
Service.Have that obstacle crowd includes blind person, deaf-mute, there are people of physical handicaps etc..
Summary of the invention
In order to solve the problems, such as the relevant technologies, the embodiment of the invention provides a kind of ancillary service management method and devices.
The technical solution is as follows:
In a first aspect, providing a kind of ancillary service management method, which comprises
When meeting the application demand of permission of ancillary service offer, the empowerment management interface of ancillary service is shown, it is described
Empowerment management interface includes the mark of destination application, and the destination application is corresponding black by the ancillary service
List list and/or white list be filtered after application program;
Wherein, the empowerment management interface is used to authorize the ancillary service to the destination application for user and provide
Permission user interface.
In one embodiment, the method also includes:
First the application list is obtained, described first the application list includes the mark of at least one the first application program
Know, first application program is the application program for the permission that the application ancillary service provides;
The mark of first application program was carried out according to the blacklist list and/or the white list
Filter, obtains the mark of the destination application.
In one embodiment, described to be carried out according to mark of the blacklist list to first application program
Filter, obtains the mark of the destination application, comprising:
That detects first application program identifies whether to belong to the blacklist list;
If the mark of first application program is not belonging to the blacklist list, by the mark of first application program
Know the mark for being determined as the destination application.
In one embodiment, described to be carried out according to mark of the white list to first application program
Filter, obtains the mark of the destination application, comprising:
That detects first application program identifies whether to belong to the white list;
If the mark of first application program belongs to the white list, by the mark of first application program
It is determined as the mark of the destination application.
In one embodiment, the method also includes:
User is received to the authorized order of the destination application by the empowerment management interface;
The permission that the ancillary service provides is authorized to the destination application according to the authorized order.
In one embodiment, the method also includes:
Second the application list is obtained, described second the application list includes the mark of at least one the second application program
Know, second application program is to have authorized the application program for the permission that the ancillary service provides;
According to the blacklist list and/or the white list to described in having authorized of second application program
Permission is cancelled.
In one embodiment, it is described according to the blacklist list to described in having authorized of second application program
Permission is cancelled, comprising:
That detects second application program identifies whether to belong to the blacklist list;
If the mark of second application program belongs to the blacklist list, by empowerment management process to described the
The permission of two application programs authorized is cancelled.
In one embodiment, it is described according to the white list to described in having authorized of second application program
Permission is cancelled, comprising:
That detects second application program identifies whether to belong to the white list;
If the mark of second application program is not belonging to the white list, by empowerment management process to described
The permission of second application program authorized is cancelled.
In one embodiment, the method also includes:
It is configured by the destination application that cloud server includes to the empowerment management interface.
In one embodiment, the destination application for including to the empowerment management interface by cloud server
It is configured, comprising:
Rule downloads the blacklist list and/or the white list, institute from cloud server to schedule
It states blacklist list and/or the white list is the list updated in the cloud server.
Second aspect, provides a kind of ancillary service managing device, and described device includes:
Interface display module, for showing ancillary service when meeting the application demand of permission of ancillary service offer
Empowerment management interface, the empowerment management interface include the mark of destination application, and the destination application is to pass through institute
State the corresponding blacklist list of ancillary service and/or white list be filtered after application program;
Wherein, the empowerment management interface is used to authorize the ancillary service to the destination application for user and provide
Permission user interface.
In one embodiment, described device further include:
First obtains module, and for obtaining first the application list, described first the application list includes at least one
The mark of a first application program, first application program are the application programs for the permission that the application ancillary service provides;
First filtering module, for being applied according to the blacklist list and/or the white list to described first
The mark of program is filtered, and obtains the mark of the destination application.
In one embodiment, first filtering module, comprising:
First detection unit identifies whether to belong to the blacklist list for detect first application program;
First determination unit, if the mark for first application program is not belonging to the blacklist list, by institute
The mark for stating the first application program is determined as the mark of the destination application.
In one embodiment, first filtering module, comprising:
Second detection unit identifies whether to belong to the white list for detect first application program;
Second determination unit will be described if the mark for first application program belongs to the white list
The mark of first application program is determined as the mark of the destination application.
In one embodiment, described device further include:
Command reception module, for receiving authorization of the user to the destination application by the empowerment management interface
Instruction;
Right-granting module is mentioned for authorizing the ancillary service to the destination application according to the authorized order
The permission of confession.
In one embodiment, described device further include:
Second obtains module, and for obtaining second the application list, described second the application list includes at least one
The mark of a second application program, second application program are to have authorized the application journey for the permission that the ancillary service provides
Sequence;
Permission cancels module, for being applied according to the blacklist list and/or the white list to described second
The permission of program authorized is cancelled.
In one embodiment, the permission cancels module, comprising:
Third detection unit identifies whether to belong to the blacklist list for detect second application program;
First cancels unit, if the mark for second application program belongs to the blacklist list, by awarding
Power managing process cancels the permission of second application program authorized.
In one embodiment, the permission cancels module, comprising:
4th detection unit identifies whether to belong to the white list for detect second application program;
Second cancellation unit passes through if the mark for second application program is not belonging to the white list
Empowerment management process cancels the permission of second application program authorized.
In one embodiment, described device further include:
Setup module, the destination application for including to the empowerment management interface by cloud server are set
It sets.
In one embodiment, the setup module, comprising:
List download unit, for rule to schedule from cloud server download the blacklist list and/or
The white list, the blacklist list and/or the white list are the column updated in the cloud server
Table.
The third aspect provides a kind of ancillary service managing device, comprising:
Processor;
For storing the memory of the executable instruction of the processor;
Wherein, the processor is configured to:
When meeting the application demand of permission of ancillary service offer, the empowerment management interface of ancillary service is shown, it is described
Empowerment management interface includes the mark of destination application, and the destination application is corresponding black by the ancillary service
List list and/or white list be filtered after application program;
Wherein, the empowerment management interface is used to authorize the ancillary service to the destination application for user and provide
Permission user interface.
The beneficial effect of technical solution provided in an embodiment of the present invention is:
Application program is filtered to obtain by using the corresponding blacklist list of ancillary service and/or white list
Destination application, the displaying target application program in empowerment management interface solve the application program of malice to Android system
After the permission of system application ancillary service, asking for malicious operation is carried out in the unwitting situation of user using simulation click function
Topic;Application program can be filtered by having reached, and the mark of filtered non-malicious application program is shown in empowerment management interface
Know, shield the mark of malicious application, avoids user from authorizing the permission of ancillary service offer to malicious application, to mention
The high effect of the safety of operating system.
Detailed description of the invention
To describe the technical solutions in the embodiments of the present invention more clearly, make required in being described below to embodiment
Attached drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for
For those of ordinary skill in the art, without creative efforts, it can also be obtained according to these attached drawings other
Attached drawing.
Fig. 1 is a kind of schematic diagram at the miscellaneous function interface provided in an embodiment of the present invention being related to;
Fig. 2A is the flow chart of ancillary service management method provided by one embodiment of the present invention;
Fig. 2 B is the schematic diagram of ancillary service administration interface provided by one embodiment of the present invention;
Fig. 3 A is the flow chart for the ancillary service management method that another embodiment of the present invention provides;
Fig. 3 B is the schematic diagram for the ancillary service administration interface that another embodiment of the present invention provides;
Fig. 3 C is the schematic diagram for the ancillary service administration interface that another embodiment of the present invention provides;
Fig. 4 A is the flow chart for the ancillary service management method that another embodiment of the present invention provides;
Fig. 4 B is the schematic diagram for the ancillary service administration interface that another embodiment of the present invention provides;
Fig. 5 A is the flow chart for the ancillary service management method that another embodiment of the present invention provides;
Fig. 5 B is the schematic diagram for the ancillary service administration interface that another embodiment of the present invention provides;
Fig. 5 C is the schematic diagram for the ancillary service administration interface that another embodiment of the present invention provides;
Fig. 6 A is the flow chart for the ancillary service management method that another embodiment of the present invention provides;
Fig. 6 B is the schematic diagram for the ancillary service administration interface that another embodiment of the present invention provides;
Fig. 7 is the structural block diagram of ancillary service managing device provided by one embodiment of the present invention;
Fig. 8 is the structural block diagram for the ancillary service managing device that another embodiment of the present invention provides;
Fig. 9 is the structural schematic diagram of terminal provided by one embodiment of the present invention.
Specific embodiment
To make the object, technical solutions and advantages of the present invention clearer, below in conjunction with attached drawing to embodiment party of the present invention
Formula is described in further detail.
The each embodiment of the present invention is applied to be illustrated in terminal with ancillary service management method.Terminal can be
Mobile phone, tablet computer, E-book reader, MP3 player (Moving Picture Experts Group Audio Layer
III, dynamic image expert's compression standard audio level 3), MP4 (Moving Picture Experts Group Audio
Layer IV, dynamic image expert's compression standard audio level 4) player, wearable device, pocket computer on knee and platform
Formula computer etc..
Optionally, operation has Android (Android) operating system, abbreviation android system in terminal.Android behaviour
Ancillary service (accessibility service), also referred to as miscellaneous function, Barrier-free Service, accessible function are provided with as system
Energy, accessible miscellaneous function.In the system set interface of android system, it is typically provided with the set interface of ancillary service.It should
Set interface is the empowerment management interface of ancillary service.
Optionally, multiple application programs can be run in terminal, application program can assist taking to the operating system application of terminal
The permission that business provides.Optionally, the permission that ancillary service is provided with for realizing voice prompt function, for realizing physical feedback
The permission of function, for realizing the permission of simulation click function, for realizing permission of text enlarging function etc..These permission energy
Enough blind person or deaf-mute etc. is helped to have use of the obstacle crowd to terminal.
Application program is able to use provided by ancillary service to after android system application to the permission of ancillary service
Various permissions.In the various permissions that ancillary service provides, exists for realizing the permission of simulation click function, simulate click function
It is a kind of function of being used to help blind person and click screen.After application program has for realizing the permission of simulation click function,
The click signal of program instruction analog subscriber on a user interface can be used, to control control shown in user interface
Part.
As shown in Figure 1, being provided with the corresponding user interface of miscellaneous function in the system set interface of android system
100.It is shown in the corresponding user interface 100 of the miscellaneous function and all applies for or applied answering to the permission of ancillary service
Use program.
The application programs of some malice is currently, there are to after the permission of android system application ancillary service, uses simulation
Click function carries out malicious operation in the unwitting situation of user, and malicious operation includes: to obtain the power for not obtaining user's authorization
Limit, unload competing product application program, the system setting for modifying operating system etc..
Fig. 2A is please referred to, it illustrates the signals of the interface of ancillary service management method provided by one embodiment of the present invention
Figure.The present embodiment is applied to be illustrated in terminal with the ancillary service management method.The ancillary service management method can
To comprise the following steps:
Step 202, it is determined whether meet the application demand of the permission of ancillary service;
Optionally, application demand is that application program states predetermined code in installation package file, which is to use
In the code for the permission that application ancillary service provides.
Step 204, it when meeting ancillary service authority application demand, shows the empowerment management interface of ancillary service, authorizes
Administration interface includes the mark of destination application, destination application be by the corresponding blacklist list of ancillary service and/
Or white list be filtered after application program;
Wherein, empowerment management interface is used to authorize the user for the permission that ancillary service provides to destination application for user
Interface.
Optionally, the mark of destination application is the packet name of destination application.
As shown in Figure 2 B, user clicks " ancillary service management " option in " more settings " interface 200, takes into auxiliary
Business administration interface 210 is shown in ancillary service administration interface 210 when meeting the application demand of permission of ancillary service offer
Mark 001, the mark of application program 002, the mark 004 of the mark of application program 003 and application program of application program.Using
The mark 001 of program, the mark of application program 002, the mark 004 of the mark of application program 003 and application program are by auxiliary
Application program after helping the corresponding blacklist list of service and/or white list to be filtered.
In conclusion ancillary service management method provided in this embodiment, by using the corresponding blacklist of ancillary service
List and/or white list are filtered application program to obtain destination application, show mesh in empowerment management interface
Application program is marked, the application program of malice is solved to after the permission of android system application ancillary service, simulation is used to click
Function carries out the problem of malicious operation in the unwitting situation of user;Application program can be filtered by having reached, authorization
The mark that filtered non-malicious application program is shown in administration interface, shields the mark of malicious application, avoids user couple
Malicious application authorizes the permission of ancillary service offer, to improve the effect of the safety of operating system.
Fig. 3 A is please referred to, it illustrates the flow charts for the ancillary service management method that another embodiment of the present invention provides.
The present embodiment is applied to be illustrated in terminal with the ancillary service management method.The ancillary service management method can wrap
Include the following steps:
Step 301, terminal receives trigger signal;
Optionally, which is the signal for showing the empowerment management interface of ancillary service.
Step 302, terminal obtains the corresponding blacklist list of ancillary service;
Optionally, terminal is previously stored with blacklist list, which is stored with the mark of malicious application.
Malicious application is that the program of malicious operation is executed using the permission that ancillary service provides.
The mark of application program is used for the unique identification application program.Optionally, the mark of application program is application program
Packet name (packet name).
Step 303, terminal obtains first the application list, and first the application list includes at least one first application
The mark of program, the first application program are the application programs for the permission for applying for that ancillary service provides.
Ancillary service is to service provided by obstacle crowd in android system to have.
The first application program in first the application list states predetermined code in installation package file, the predetermined generation
Code is the code for applying for the permission of ancillary service offer.Optionally, android system is by calling Accessibility
Manager.getInstalledAccessibilityServiceList () function obtains first the application list.
The first application program in first the application list usually not yet applies for the permission provided to ancillary service
Application program is also possible to have authorized application program (such as the older version in operating system of the permission of ancillary service offer
It is authorized in this).
As shown in Figure 3B, first the application list L01 includes the mark A of the first application program, the first application program
Identify B, the first application program mark C, the first application program mark D, the first application program mark E and first apply journey
The mark F of sequence.
Step 304, terminal detect the first application program identify whether belong to blacklist list.
It include the mark of malicious application in blacklist list.
It as shown in Figure 3B, include the mark of malicious application: the mark B of the first application program and the in blacklist list
The mark E of one application program.
Optionally, it is previously stored with blacklist list in terminal, alternatively, terminal downloads blacklist list from server.
Optionally, blacklist list is updated according to prefixed time interval.
Optionally, terminal traverses the mark of the first application program in the first list of application, the first application of detection
The identifying whether of program belongs to blacklist list.
Step 305, if the mark of the first application program is not belonging to blacklist list, terminal is by the mark of the first application program
Know the mark for being determined as destination application.
Destination application is the application program after being filtered by the corresponding blacklist list of ancillary service.Target is answered
It is the application program of non-malicious with program.
As shown in Figure 3B, terminal obtains the mark A of the first application program, the mark C of the first application program, the by traversal
The mark D of the one application program and mark F of the first application program is not belonging to blacklist list, and terminal is by the mark of the first application program
Know A, the mark C of the first application program, the mark D of the first application program and the mark F of the first application program to be determined as target and answer
With the mark of program.
Step 306, terminal shows the empowerment management interface of ancillary service;Empowerment management interface includes destination application
Mark;
Destination application is the application program after being filtered by the corresponding blacklist list of ancillary service;Wherein,
Empowerment management interface is used to authorize the user interface for the permission that ancillary service provides to destination application for user.
Optionally, terminal shields and does not show the mark for belonging to the first application program of blacklist list.
As shown in Figure 3B, terminal shows the empowerment management interface 300 of ancillary service, includes the in empowerment management interface 300
The mark for identifying D and the first application program for identifying C, the first application program for identifying A, the first application program of one application program
F.Terminal shields and does not show the mark E of the mark B and the first application program of the first application program.
After terminal shows empowerment management interface, user can carry out relevant operation step according to the guidance at empowerment management interface
Suddenly, as follows:
Step 307, terminal receives user to the authorized order of destination application by empowerment management interface.
User clicks the management button triggering authorized order provided in empowerment management interface, and terminal receives user and answers target
With the authorized order of program.
As shown in Figure 3 C, user clicks the mark A of the first application program in empowerment management interface 300, answers into first
With the corresponding interface 003 the mark A of program, empowerment management button a is provided in interface 003, user clicks the empowerment management button
A, triggering terminal authorize the mark A of the first application program.The authorization is directed to the first application program and authorizes ancillary service
The permission of offer.
Optionally, authorized order opens permission or cancellation permission for authorizing.
Step 308, terminal authorizes the permission that ancillary service provides to destination application according to authorized order.
For example, terminal authorizes the permission " from this automatic installation new version " to game application.From this, the game application
Program has the function that automatic installation new version is realized using simulation click function.
It should be noted that blacklist list is the pre-stored list of terminal inner, alternatively, blacklist list is cloud
The list collected and constantly updated in server.
Step 309, terminal to schedule rule from cloud server download blacklist list, blacklist list be
The updated list of cloud server.
Optionally, predetermined time rule includes Fixed Time Interval and/or is not fixed time interval.
The blacklist list that terminal is downloaded using cloud server is updated existing blacklist list.
In conclusion ancillary service management method provided in this embodiment, in the mistake for the permission that application ancillary service provides
Cheng Zhong is filtered application program to obtain destination application, award by using the corresponding blacklist list of ancillary service
Displaying target application program in administration interface is weighed, solves the application program of malice to android system application ancillary service
After permission, using simulation click function malicious operation is carried out in the unwitting situation of user the problem of;Having reached can correspond to
It is filtered with program, the mark of filtered non-malicious application program is shown in empowerment management interface, shield malicious application journey
The mark of sequence avoids user from authorizing the permission of ancillary service offer to malicious application, to improve the peace of operating system
The effect of full property.
In addition, being also updated by cloud server to blacklist list, the essence of shielding malicious application is improved
Exactness.
Fig. 4 A is please referred to, it illustrates the flow charts for the ancillary service management method that another embodiment of the present invention provides.
The present embodiment is applied to be illustrated in terminal with the ancillary service management method.The ancillary service management method can wrap
Include the following steps:
Step 401, terminal receives trigger signal;
Optionally, which is the signal for showing the empowerment management interface of ancillary service.
Step 402, terminal obtains the corresponding white list of ancillary service;
Optionally, terminal is previously stored with white list, which is stored with the mark of non-malicious application program
Know.Non-malicious application program is that the program of normal operating is executed using the permission that ancillary service provides.
The mark of application program is used for the unique identification application program.Optionally, the mark of application program is application program
Packet name (packet name).
Step 403, terminal obtains first the application list, and first the application list includes at least one first application
The mark of program, the first application program are the application programs for the permission for applying for that ancillary service provides.
Ancillary service is to service provided by obstacle crowd in android system to have.
The first application program in first the application list states predetermined code in installation package file, the predetermined generation
Code is the code for applying for the permission of ancillary service offer.Optionally, android system is by calling Accessibility
Manager.getInstalledAccessibilityServiceList () function obtains first the application list.
The first application program in first the application list usually not yet applies for the permission provided to ancillary service
Application program is also possible to have authorized application program (such as the older version in operating system of the permission of ancillary service offer
It is authorized in this).
As shown in Figure 4 B, first the application list L02 includes the mark X of the first application program, the first application program
Identify Y, the first application program mark Z, the first application program mark O, the first application program mark P and first apply journey
The mark Q of sequence.
Step 404, terminal detect the first application program identify whether belong to white list.
White list includes the mark of non-malicious application program.
As shown in Figure 4 B, include the mark of non-malicious application program in white list: the mark X of the first application program,
The mark O for identifying Z, the first application program for identifying Y, the first application program of first application program.
Optionally, it is previously stored with white list in terminal, alternatively, terminal downloads white list from server.
Optionally, white list is updated according to prefixed time interval.
Optionally, terminal traverses the mark of the first application program in the first list of application, the first application of detection
The identifying whether of program belongs to white list.
Step 405, if the mark of the first application program belongs to white list, terminal is by the mark of the first application program
It is determined as the mark of destination application.
Destination application is the application program after being filtered by the corresponding white list of ancillary service.
As shown in Figure 4 B, terminal obtains the mark X of the first application program, the mark Y of the first application program, the by traversal
The mark Z of one application program, the mark O of the first application program belong to white list.Terminal is then by the mark of the first application program
Know X, the mark Y of the first application program, the mark Z of the first application program, the first application program mark O be determined as target application
The mark of program.
Step 406, terminal shows the empowerment management interface of ancillary service, and empowerment management interface includes destination application
Mark;
Destination application is the application program after being filtered by the corresponding white list of ancillary service;Wherein,
Empowerment management interface is used to authorize the user interface for the permission that ancillary service provides to destination application for user.
Optionally, terminal shields and does not show the mark for being not belonging to the first application program of white list.
As shown in Figure 4 B, terminal shows the empowerment management interface 400 of ancillary service, includes the in empowerment management interface 400
The mark for identifying Z, the first application program for identifying Y, the first application program for identifying X, the first application program of one application program
O.Terminal shields and does not show the mark Q of the mark P and the first application program of the first application program.
After terminal shows empowerment management interface, user can carry out relevant operation step according to the guidance at empowerment management interface
Suddenly, as follows:
Step 407, terminal receives user to the authorized order of destination application by empowerment management interface.
User clicks the management button triggering authorized order provided in empowerment management interface, and terminal receives user and answers target
With the authorized order of program.The authorization is directed to the permission that the first application program authorizes ancillary service offer.
Step 408, terminal authorizes the permission that ancillary service provides to destination application according to authorized order.
For example, terminal authorizes the permission " from this automatic installation new version " to game application.From this, the game application
Program has the function that automatic installation new version is realized using simulation click function.
It should be noted that white list is the pre-stored list of terminal inner, alternatively, white list is cloud
The list collected and constantly updated in server.
Step 409, terminal to schedule rule from cloud server download white list, white list be
The updated list of cloud server.
Optionally, predetermined time rule includes Fixed Time Interval and/or is not fixed time interval.
The white list that terminal is downloaded using cloud server is updated existing white list.
In conclusion ancillary service management method provided in this embodiment, in the mistake for the permission that application ancillary service provides
Cheng Zhong is filtered application program to obtain destination application, award by using the corresponding white list of ancillary service
Displaying target application program in administration interface is weighed, solves the application program of malice to android system application ancillary service
After permission, using simulation click function malicious operation is carried out in the unwitting situation of user the problem of;Having reached can correspond to
It is filtered with program, the mark of filtered non-malicious application program is shown in empowerment management interface, shield malicious application journey
The mark of sequence avoids user from authorizing the permission of ancillary service offer to malicious application, to improve the peace of operating system
The effect of full property.
In addition, being also updated by cloud server to white list, the essence of shielding malicious application is improved
Exactness.
Fig. 5 A is please referred to, it illustrates the flow charts for the ancillary service management method that another embodiment of the present invention provides.
The present embodiment is applied to be illustrated in terminal with the ancillary service management method.The ancillary service management method can wrap
Include the following steps:
Step 501, after OTA upgrading, terminal obtains the corresponding blacklist list of ancillary service.
After OTA (Over-the-Air Technology, space download technology) upgrading, terminal is obtained from OTA upgrade package
The corresponding blacklist list of ancillary service.
Blacklist list is stored with the mark of malicious application.Malicious application is the power provided using ancillary service
Limit executes the program of malicious operation.
The mark of application program is used for the unique identification application program.Optionally, the mark of application program is application program
Packet name (packet name).
Step 502, terminal obtains second the application list, and second the application list includes at least one second application
The mark of program, the second application program are to have authorized the application program of the permission of ancillary service offer.
Ancillary service is to service provided by obstacle crowd in android system to have.
The second application program in second the application list has usually authorized answering for the permission of ancillary service offer
With program (for example being authorized in the older version of operating system).
For example, the second application program V of the permission " from this automatic installation new version " has been awarded.
As shown in Figure 5 B, second the application list L03 includes the mark K of the second application program, the second application program
Identify the mark G for identifying H and the second application program of J, the second application program.
Step 503, terminal detect the second application program identify whether belong to blacklist list.
It include the mark of malicious application in blacklist list.It as shown in Figure 5 B, include that malice is answered in blacklist list
With the mark of program: the mark G of the second application program.
Optionally, it is previously stored with blacklist list in terminal, alternatively, terminal downloads blacklist list from server.
Optionally, blacklist list is updated according to prefixed time interval.
Optionally, terminal traverses the mark of the second application program in the second list of application, the second application of detection
The identifying whether of program belongs to blacklist list.
Step 504, if the mark of the second application program belongs to blacklist list, terminal passes through empowerment management process to
The permission of two application programs authorized is cancelled.
The permission of second application program authorized cancel and refers to that second application program no longer has and has authorized
Permission.For example, the second application program G has permission " from this automatic installation new version ", after cancelling the permission authorized, then
Second application program G no longer has the permission " from this automatic installation new version ".
If the mark of the second application program is not belonging to blacklist list, terminal is kept to being not belonging to the of blacklist list
The authorization of two application programs.
As shown in Figure 5 B, terminal show that the mark G of the second application program belongs to blacklist list by traversal, cancels second
The permission that application program G has been authorized.Terminal keeps awarding for the second application program K, the second application program J and the second application program H
Power.Management terminal terminal shows the empowerment management interface 500 of ancillary service, includes second in empowerment management interface 500 using journey
The mark H for identifying J and the second application program for identifying K, the second application program of sequence.Management terminal terminal shields and does not show the
The mark G of two application programs.
For another example shown in Fig. 5 C, in former empowerment management interface 005 including the second application program mark K, second apply journey
Sequence mark J, the second application program mark H and the second application program mark G, cancel the second application program G permission after,
The mark J and second application program of mark K, the second application program in empowerment management interface 500 including the second application program
Identify H.
The present embodiment can be implemented in conjunction with above-mentioned Fig. 2A, Fig. 3 A and Fig. 4 A illustrated embodiment.
In conclusion ancillary service management method provided in this embodiment, by using the corresponding blacklist of ancillary service
List is filtered to obtain destination application to the application program for the permission for having authorized ancillary service offer, in empowerment management circle
Displaying target application program in face solves the application program of malice to after the permission of android system application ancillary service, makes
The problem of carrying out malicious operation in the unwitting situation of user with simulation click function;Having reached can take to auxiliary has been authorized
The application program for the permission provided of being engaged in is filtered, and cancels the permission for belonging to the application program of blacklist list, empowerment management circle
The mark that filtered non-malicious application program is shown in face, shields the mark of malicious application, avoids user to maliciously answering
The permission that ancillary service offer is provided with program, to improve the effect of the safety of operating system.
Fig. 6 A is please referred to, it illustrates the flow charts for the ancillary service management method that another embodiment of the present invention provides.
The present embodiment is applied to be illustrated in terminal with the ancillary service management method.The ancillary service management method can wrap
Include the following steps:
Step 601, after OTA upgrading, terminal obtains the corresponding white list of ancillary service.
After OTA (Over-the-Air Technology, space download technology) upgrading, terminal is obtained from OTA upgrade package
The corresponding white list of ancillary service.
White list is stored with the mark of non-malicious application program.Non-malicious application program is provided using ancillary service
Permission execute normal operating program.
The mark of application program is used for the unique identification application program.Optionally, the mark of application program is application program
Packet name (packet name).
Step 602, terminal obtains second the application list, and second the application list includes at least one second application
The mark of program, the second application program are to have authorized the application program of the permission of ancillary service offer.
Ancillary service is to service provided by obstacle crowd in android system to have.
The second application program in second the application list has usually authorized answering for the permission of ancillary service offer
With program (for example being authorized in the older version of operating system).
As shown in Figure 6B, second the application list L04 includes the mark W of the second application program, the second application program
Identify the mark R for identifying T and the second application program for identifying U, the second application program of I, the second application program.
Step 603, terminal detect the second application program identify whether belong to white list.
White list includes the mark of non-malicious application program.It as shown in Figure 6B, include non-malicious in white list
The mark of application program: the mark R for identifying T and the second application program for identifying U, the second application program of the second application program.
Optionally, it is previously stored with white list in terminal, alternatively, terminal downloads white list from server.
Optionally, white list is updated according to prefixed time interval.
Step 604, if the mark of the second application program is not belonging to white list, terminal passes through empowerment management process pair
The permission of second application program authorized is cancelled.
Destination application is the application program after being filtered by the corresponding white list of ancillary service.
If the mark of the second application program belongs to white list, belong to white list second is answered in terminal holding
With the authorization of program.
As shown in Figure 6B, terminal by traversal obtain the second application program mark W and the second application program mark I not
Belong to white list, cancels the permission that the second application program W and the second application program I has been authorized.Terminal keeps the second application
The authorization of program U, the second application program T and the second application program R.Terminal shows the empowerment management interface 600 of ancillary service, awards
Weigh the mark for identifying T and the second application program for identifying U, the second application program in administration interface 600 including the second application program
Know R.Management terminal terminal shields and does not show the mark I of the mark W and the second application program of the second application program.
The present embodiment can be implemented in conjunction with above-mentioned Fig. 2A, Fig. 3 A and Fig. 4 A illustrated embodiment.
In conclusion ancillary service management method provided in this embodiment, by using the corresponding white list of ancillary service
List is filtered to obtain destination application to the application program for the permission for having authorized ancillary service offer, in empowerment management circle
Displaying target application program in face solves the application program of malice to after the permission of android system application ancillary service, makes
The problem of carrying out malicious operation in the unwitting situation of user with simulation click function;Having reached can take to auxiliary has been authorized
The application program for the permission provided of being engaged in is filtered, and cancels the permission for belonging to the application program for being not belonging to white list, authorization
The mark that filtered non-malicious application program is shown in administration interface, shields the mark of malicious application, avoids user couple
Malicious application authorizes the permission of ancillary service offer, to improve the effect of the safety of operating system.
Following is apparatus of the present invention embodiment, can be used for executing embodiment of the present invention method.For apparatus of the present invention reality
Undisclosed details in example is applied, embodiment of the present invention method is please referred to.
Referring to FIG. 7, it illustrates the structural block diagram of ancillary service managing device provided by one embodiment of the present invention,
The ancillary service managing device being implemented in combination with as some or all of of terminal by software, hardware or both.It should
Ancillary service managing device may include:
Demand determining module 720 is used to determine whether to meet the application demand of the permission of ancillary service;
Interface display module 740, for showing ancillary service when meeting the application demand of permission of ancillary service offer
Empowerment management interface, empowerment management interface includes the mark of destination application, and destination application is to pass through ancillary service
Corresponding blacklist list and/or white list be filtered after application program;
Wherein, empowerment management interface is used to authorize the user for the permission that ancillary service provides to destination application for user
Interface.
In conclusion ancillary service managing device provided in this embodiment, by using the corresponding blacklist of ancillary service
List and/or white list are filtered application program to obtain destination application, show mesh in empowerment management interface
Application program is marked, the application program of malice is solved to after the permission of android system application ancillary service, simulation is used to click
Function carries out the problem of malicious operation in the unwitting situation of user;Application program can be filtered by having reached, authorization
The mark that filtered non-malicious application program is shown in administration interface, shields the mark of malicious application, avoids user couple
Malicious application authorizes the permission of ancillary service offer, to improve the effect of the safety of operating system.
Referring to FIG. 8, the structure box of the ancillary service managing device provided it illustrates another embodiment of the present invention
Figure, which being implemented in combination with as some or all of of terminal by software, hardware or both.
The ancillary service managing device may include:
Interface display module 820, for showing ancillary service when meeting the application demand of permission of ancillary service offer
Empowerment management interface, empowerment management interface includes the mark of destination application, and destination application is to pass through ancillary service
Corresponding blacklist list and/or white list be filtered after application program;
Wherein, empowerment management interface is used to authorize the user for the permission that ancillary service provides to destination application for user
Interface.
In one embodiment,
The device further include:
First obtains module 830, and for obtaining first the application list, first the application list includes at least one
The mark of first application program, the first application program are the application programs for the permission for applying for that ancillary service provides;
First filtering module 840, for the mark according to blacklist list and/or white list to the first application program
It is filtered, obtains the mark of destination application.
In one embodiment,
First filtering module 840, comprising:
First detection unit 841, for detect the first application program identify whether belong to blacklist list;
First determination unit 842, if the mark for the first application program is not belonging to blacklist list, by the first application
The mark of program is determined as the mark of destination application.
In one embodiment,
First filtering module 840, comprising:
Second detection unit 843, for detect the first application program identify whether belong to white list;
Second determination unit 844 applies journey for first if the mark for the first application program belongs to white list
The mark of sequence is determined as the mark of destination application.
In one embodiment,
The device further include:
Command reception module 850, for receiving user to the authorized order of destination application by empowerment management interface;
Right-granting module 860, for authorizing the permission that ancillary service provides to destination application according to authorized order.
In one embodiment,
The device further include:
Second obtains module 870, and for obtaining second the application list, second the application list includes at least one
The mark of second application program, the second application program are to have authorized the application program of the permission of ancillary service offer;
Permission cancels module 880, for having awarded to the second application program according to blacklist list and/or white list
The permission given is cancelled.
In one embodiment,
Permission cancels module 880, comprising:
Third detection unit 881, for detect the second application program identify whether belong to blacklist list;
First cancellation unit 882 passes through empowerment management if the mark for the second application program belongs to blacklist list
Process cancels the permission of the second application program authorized.
In one embodiment,
Permission cancels module 880, comprising:
4th detection unit 883, for detect the second application program identify whether belong to white list;
Second cancels unit 884, if the mark for the second application program is not belonging to white list, passes through authorization pipe
Reason process cancels the permission of the second application program authorized.
In one embodiment,
The device further include:
Setup module 890, the destination application for including to empowerment management interface by cloud server are set
It sets.
In one embodiment,
Setup module 890, comprising:
List download unit 891, for regular from cloud server downloading blacklist list and/or white to schedule
List list, blacklist list and/or white list are the lists that server update is crossed beyond the clouds.
In conclusion ancillary service managing device provided in this embodiment, by using the corresponding blacklist of ancillary service
List and/or white list are filtered application program to obtain destination application, show mesh in empowerment management interface
Application program is marked, the application program of malice is solved to after the permission of android system application ancillary service, simulation is used to click
Function carries out the problem of malicious operation in the unwitting situation of user;Application program can be filtered by having reached, authorization
The mark that filtered non-malicious application program is shown in administration interface, shields the mark of malicious application, avoids user couple
Malicious application authorizes the permission of ancillary service offer, to improve the effect of the safety of operating system.
In addition, also being taken by using the corresponding blacklist list of ancillary service and/or white list to auxiliary has been authorized
The application program for the permission provided of being engaged in is filtered to obtain destination application, the displaying target application journey in empowerment management interface
Sequence;The application program for the permission for having authorized ancillary service offer can be filtered by having reached, and cancellation belongs to blacklist list
And/or it is not belonging to the permission of the application program of white list, filtered non-malicious application journey is shown in empowerment management interface
The mark of sequence shields the mark of malicious application, improves the effect of the safety of operating system.
In addition, being also updated by cloud server to blacklist list and/or white list, improves shielding and dislike
The accuracy for application program of anticipating.
It illustrates the block diagrams of terminal 900 provided by one embodiment of the present invention by Fig. 9.The terminal may include radio frequency (RF,
Radio Frequency) circuit 901, the memory 902, defeated that includes one or more computer readable storage medium
Enter unit 903, display unit 904, sensor 905, voicefrequency circuit 906, Wireless Fidelity (WiFi, Wireless Fidelity)
The components such as module 907, the processor 908 for including one or more than one processing core and power supply 909.Art technology
Personnel are appreciated that the restriction of the not structure paired terminal of terminal structure shown in Fig. 9, may include more more or less than illustrating
Component, perhaps combine certain components or different component layouts.Wherein:
RF circuit 901 can be used for receiving and sending messages or communication process in, signal sends and receivees, particularly, by base station
After downlink information receives, one or the processing of more than one processor 908 are transferred to;In addition, the data for being related to uplink are sent to
Base station.In general, RF circuit 901 includes but is not limited to antenna, at least one amplifier, tuner, one or more oscillators, uses
Family identity module (SIM, Subscriber Identity Module) card, transceiver, coupler, low-noise amplifier
(LNA, Low Noise Amplifier), duplexer etc..In addition, RF circuit 901 can also by wireless communication with network and its
He communicates equipment.Any communication standard or agreement, including but not limited to global system for mobile telecommunications system can be used in the wireless communication
Unite (GSM, Global System of Mobile communication), general packet radio service (GPRS, General
Packet Radio Service), CDMA (CDMA, Code Division Multiple Access), wideband code division it is more
Location (WCDMA, Wideband Code Division Multiple Access), long term evolution (LTE, Long Term
Evolution), Email, short message service (SMS, Short Messaging Service) etc..
Memory 902 can be used for storing software program and module, and processor 908 is stored in memory 902 by operation
Software program and module, thereby executing various function application and data processing.Memory 902 can mainly include storage journey
Sequence area and storage data area, wherein storing program area can the (ratio of application program needed for storage program area, at least one function
Such as sound-playing function, image player function) etc.;Storage data area, which can be stored, uses created data according to terminal
(such as audio data, phone directory etc.) etc..In addition, memory 902 may include high-speed random access memory, can also include
Nonvolatile memory, for example, at least a disk memory, flush memory device or other volatile solid-state parts.Phase
Ying Di, memory 902 can also include Memory Controller, to provide processor 908 and input unit 903 to memory 902
Access.
Input unit 903 can be used for receiving the number or character information of input, and generate and user setting and function
Control related keyboard, mouse, operating stick, optics or trackball signal input.Specifically, in a specific embodiment
In, input unit 903 may include touch sensitive surface and other input equipments.Touch sensitive surface, also referred to as touch display screen or touching
Control plate, collect user on it or nearby touch operation (such as user using any suitable object such as finger, stylus or
Operation of the attachment on touch sensitive surface or near touch sensitive surface), and corresponding connection dress is driven according to preset formula
It sets.Optionally, touch sensitive surface may include both touch detecting apparatus and touch controller.Wherein, touch detecting apparatus is examined
The touch orientation of user is surveyed, and detects touch operation bring signal, transmits a signal to touch controller;Touch controller from
Touch information is received on touch detecting apparatus, and is converted into contact coordinate, then gives processor 908, and can reception processing
Order that device 908 is sent simultaneously is executed.Furthermore, it is possible to a variety of using resistance-type, condenser type, infrared ray and surface acoustic wave etc.
Type realizes touch sensitive surface.In addition to touch sensitive surface, input unit 903 can also include other input equipments.Specifically, other are defeated
Entering equipment can include but is not limited to physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse
One of mark, operating stick etc. are a variety of.
Display unit 904 can be used for showing information input by user or be supplied to user information and terminal it is various
Graphical user interface, these graphical user interface can be made of figure, text, icon, video and any combination thereof.Than
Such as, display unit 904, for showing that the empowerment management interface of ancillary service, empowerment management interface include destination application
Mark.Display unit 904 may include display panel, optionally, can use liquid crystal display (LCD, Liquid Crystal
Display), the forms such as Organic Light Emitting Diode (OLED, Organic Light-Emitting Diode) configure display surface
Plate.Further, touch sensitive surface can cover display panel, after touch sensitive surface detects touch operation on it or nearby,
Processor 908 is sent to determine the type of touch event, is followed by subsequent processing device 908 according to the type of touch event in display panel
It is upper that corresponding visual output is provided.Although touch sensitive surface and display panel are realized as two independent components in Fig. 9
Input and input function, but in some embodiments it is possible to it is touch sensitive surface and display panel is integrated and realize and input and defeated
Function out.
Terminal may also include at least one sensor 905, such as optical sensor, motion sensor and other sensors.
Specifically, optical sensor may include ambient light sensor and proximity sensor, wherein ambient light sensor can be according to ambient light
Light and shade adjust the brightness of display panel, proximity sensor can close display panel and/or back when terminal is moved in one's ear
Light.As a kind of motion sensor, gravity accelerometer can detect (generally three axis) acceleration in all directions
Size can detect that size and the direction of gravity when static, can be used to identify mobile phone posture application (such as horizontal/vertical screen switching,
Dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;It can also configure as terminal
The other sensors such as gyroscope, barometer, hygrometer, thermometer, infrared sensor, details are not described herein.
Voicefrequency circuit 906, loudspeaker, microphone can provide the audio interface between user and terminal.Voicefrequency circuit 906 can
By the electric signal after the audio data received conversion, it is transferred to loudspeaker, voice signal output is converted to by loudspeaker;It is another
The voice signal of collection is converted to electric signal by aspect, microphone, is converted to audio data after being received by voicefrequency circuit 906, then
After the processing of audio data output processor 908, it is sent to such as another terminal through RF circuit 901, or by audio data
Output is further processed to memory 902.Voicefrequency circuit 906 is also possible that earphone jack, with provide peripheral hardware earphone with
The communication of terminal.
WiFi belongs to short range wireless transmission technology, and terminal can help user's transceiver electronics postal by WiFi module 907
Part, browsing webpage and access streaming video etc., it provides wireless broadband internet access for user.Although Fig. 9 is shown
WiFi module 907, but it is understood that, and it is not belonging to must be configured into for terminal, it can according to need do not changing completely
Become in the range of the essence of invention and omits.
Processor 908 is the control centre of terminal, using the various pieces of various interfaces and connection whole mobile phone, is led to
It crosses operation or executes the software program and/or module being stored in memory 902, and call and be stored in memory 902
Data execute the various functions and processing data of terminal, to carry out integral monitoring to mobile phone.Optionally, processor 908 can wrap
Include one or more processing cores;Preferably, processor 908 can integrate application processor and modem processor, wherein answer
With the main processing operation system of processor, user interface and application program etc., modem processor mainly handles wireless communication.
It is understood that above-mentioned modem processor can not also be integrated into processor 908.
Terminal further includes the power supply 909 (such as battery) powered to all parts, it is preferred that power supply can pass through power supply pipe
Reason system and processor 908 are logically contiguous, to realize management charging, electric discharge and power managed by power-supply management system
Etc. functions.Power supply 909 can also include one or more direct current or AC power source, recharging system, power failure inspection
The random components such as slowdown monitoring circuit, power adapter or inverter, power supply status indicator.
Although being not shown, terminal can also be including bluetooth module etc., and details are not described herein.Specifically in the present embodiment, eventually
Processor 908 in end can run the one or more program instruction being stored in memory 902, to realize above-mentioned
Ancillary service management method provided in each embodiment of the method.
Those of ordinary skill in the art will appreciate that all or part of the steps in the various methods of above-described embodiment is can
It is completed with instructing relevant hardware by program, which can be stored in a computer readable storage medium, storage
Medium may include: read-only memory (ROM, Read Only Memory), random access memory (RAM, Random
Access Memory), disk or CD etc..
Those of ordinary skill in the art will appreciate that realizing that all or part of the steps of above-described embodiment can pass through hardware
It completes, relevant hardware can also be instructed to complete by program, the program can store in a kind of computer-readable
In storage medium, storage medium mentioned above can be read-only memory, disk or CD etc..
The foregoing is merely presently preferred embodiments of the present invention, is not intended to limit the invention, it is all in spirit of the invention and
Within principle, any modification, equivalent replacement, improvement and so on be should all be included in the protection scope of the present invention.
Claims (17)
1. a kind of ancillary service management method, which is characterized in that the described method includes:
When meeting the application demand of permission of ancillary service offer, the empowerment management interface of ancillary service, the authorization are shown
Administration interface includes the mark of destination application, and the destination application is by the corresponding blacklist of the ancillary service
List and/or white list be filtered after application program;
Wherein, the empowerment management interface is used to authorize the power that the ancillary service provides to the destination application for user
The user interface of limit;
The method also includes:
User is received to the authorized order of the destination application by the empowerment management interface;
The permission that the ancillary service provides, the ancillary service are authorized to the destination application according to the authorized order
It is to there is service provided by obstacle crowd;
The method also includes:
Second the application list is obtained, described second the application list includes the mark of at least one the second application program,
Second application program is to have authorized the application program for the permission that the ancillary service provides;
According to the blacklist list and/or the white list to the permission of second application program authorized
Cancelled.
2. the method according to claim 1, wherein the method also includes:
First the application list is obtained, described first the application list includes the mark of at least one the first application program,
First application program is the application program for the permission that the application ancillary service provides;
The mark of first application program is filtered according to the blacklist list and/or the white list, is obtained
To the mark of the destination application.
3. according to the method described in claim 2, it is characterized in that, described apply according to the blacklist list to described first
The mark of program is filtered, and obtains the mark of the destination application, comprising:
That detects first application program identifies whether to belong to the blacklist list;
If the mark of first application program is not belonging to the blacklist list, and the mark of first application program is true
It is set to the mark of the destination application.
4. according to the method described in claim 2, it is characterized in that, described apply according to the white list to described first
The mark of program is filtered, and obtains the mark of the destination application, comprising:
That detects first application program identifies whether to belong to the white list;
If the mark of first application program belongs to the white list, the mark of first application program is determined
For the mark of the destination application.
5. the method according to claim 1, wherein described apply according to the blacklist list to described second
The permission of program authorized is cancelled, comprising:
That detects second application program identifies whether to belong to the blacklist list;
If the mark of second application program belongs to the blacklist list, answered by empowerment management process described second
Cancelled with the permission of program authorized.
6. the method according to claim 1, wherein described apply according to the white list to described second
The permission of program authorized is cancelled, comprising:
That detects second application program identifies whether to belong to the white list;
If the mark of second application program is not belonging to the white list, by empowerment management process to described second
The permission of application program authorized is cancelled.
7. method according to any one of claims 1 to 6, which is characterized in that the method also includes:
It is configured by the destination application that cloud server includes to the empowerment management interface.
8. the method according to the description of claim 7 is characterized in that it is described by cloud server to the empowerment management interface
Including destination application be configured, comprising:
Rule downloads the blacklist list and/or the white list from cloud server to schedule, described black
List list and/or the white list are the lists updated in the cloud server.
9. a kind of ancillary service managing device, which is characterized in that described device includes:
Interface display module, for showing the authorization of ancillary service when meeting the application demand of permission of ancillary service offer
Administration interface, the empowerment management interface include the mark of destination application, and the destination application is by described auxiliary
Application program after helping the corresponding blacklist list of service and/or white list to be filtered;
Wherein, the empowerment management interface is used to authorize the power that the ancillary service provides to the destination application for user
The user interface of limit;
Described device further include:
Command reception module refers to the authorization of the destination application for receiving user by the empowerment management interface
It enables;
Right-granting module, for authorizing what the ancillary service provided to the destination application according to the authorized order
Permission, the ancillary service are to there is service provided by obstacle crowd;
Described device further include:
Second obtains module, for obtaining second the application list, described second the application list include at least one the
The mark of two application programs, second application program are to have authorized the application program for the permission that the ancillary service provides;
Permission cancels module, is used for according to the blacklist list and/or the white list to second application program
The permission authorized cancelled.
10. device according to claim 9, which is characterized in that described device further include:
First obtains module, for obtaining first the application list, described first the application list include at least one the
The mark of one application program, first application program are the application programs for the permission that the application ancillary service provides;
First filtering module is used for according to the blacklist list and/or the white list to first application program
Mark be filtered, obtain the mark of the destination application.
11. device according to claim 10, which is characterized in that first filtering module, comprising:
First detection unit identifies whether to belong to the blacklist list for detect first application program;
First determination unit, if the mark for first application program is not belonging to the blacklist list, by described
The mark of one application program is determined as the mark of the destination application.
12. device according to claim 10, which is characterized in that first filtering module, comprising:
Second detection unit identifies whether to belong to the white list for detect first application program;
Second determination unit, if the mark for first application program belongs to the white list, by described first
The mark of application program is determined as the mark of the destination application.
13. device according to claim 9, which is characterized in that the permission cancels module, comprising:
Third detection unit identifies whether to belong to the blacklist list for detect second application program;
First cancels unit, if the mark for second application program belongs to the blacklist list, passes through authorization pipe
Reason process cancels the permission of second application program authorized.
14. device according to claim 9, which is characterized in that the permission cancels module, comprising:
4th detection unit identifies whether to belong to the white list for detect second application program;
Second cancellation unit passes through authorization if the mark for second application program is not belonging to the white list
Managing process cancels the permission of second application program authorized.
15. according to any device of claim 9 to 14, which is characterized in that described device further include:
Setup module, the destination application for including to the empowerment management interface by cloud server are configured.
16. device according to claim 15, which is characterized in that the setup module, comprising:
List download unit, for regular from the cloud server downloading blacklist list and/or described to schedule
White list, the blacklist list and/or the white list are the lists updated in the cloud server.
17. a kind of ancillary service managing device characterized by comprising
Processor;
For storing the memory of the executable instruction of the processor;
Wherein, the processor is configured to:
When meeting the application demand of permission of ancillary service offer, the empowerment management interface of ancillary service, the authorization are shown
Administration interface includes the mark of destination application, and the destination application is by the corresponding blacklist of the ancillary service
List and/or white list be filtered after application program;
Wherein, the empowerment management interface is used to authorize the power that the ancillary service provides to the destination application for user
The user interface of limit;
The processor is also configured to
User is received to the authorized order of the destination application by the empowerment management interface;
The permission that the ancillary service provides, the ancillary service are authorized to the destination application according to the authorized order
It is to there is service provided by obstacle crowd;
The processor is also configured to
Second the application list is obtained, described second the application list includes the mark of at least one the second application program,
Second application program is to have authorized the application program for the permission that the ancillary service provides;
According to the blacklist list and/or the white list to the permission of second application program authorized
Cancelled.
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2016/098590 WO2018045564A1 (en) | 2016-09-09 | 2016-09-09 | Auxiliary service management method and apparatus |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106462697A CN106462697A (en) | 2017-02-22 |
CN106462697B true CN106462697B (en) | 2019-11-26 |
Family
ID=58215929
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201680000855.1A Active CN106462697B (en) | 2016-09-09 | 2016-09-09 | Ancillary service management method and device |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN106462697B (en) |
WO (1) | WO2018045564A1 (en) |
Families Citing this family (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018045564A1 (en) * | 2016-09-09 | 2018-03-15 | 北京小米移动软件有限公司 | Auxiliary service management method and apparatus |
CN107908953A (en) * | 2017-11-21 | 2018-04-13 | 广东欧珀移动通信有限公司 | Notifications service control method, device, terminal device and storage medium |
CN108647070B (en) * | 2018-04-18 | 2022-02-22 | Oppo广东移动通信有限公司 | Information reminding method and device, mobile terminal and computer readable medium |
CN110581831B (en) * | 2018-06-11 | 2021-12-03 | 腾讯科技(深圳)有限公司 | Communication method, information acquisition method, electronic device, and storage medium |
CN108920944B (en) * | 2018-06-12 | 2023-05-23 | 腾讯科技(深圳)有限公司 | Method and device for detecting auxiliary click event, computer equipment and storage medium |
CN109710338A (en) * | 2018-12-24 | 2019-05-03 | 努比亚技术有限公司 | A kind of searching method of mobile terminal, mobile terminal and storage medium |
CN110086925A (en) * | 2019-03-28 | 2019-08-02 | 努比亚技术有限公司 | A kind of application processing method and mobile terminal |
CN110008693A (en) * | 2019-04-12 | 2019-07-12 | 深圳市趣创科技有限公司 | Security application encrypts ensuring method and device and system and storage medium |
CN111757024A (en) * | 2020-07-30 | 2020-10-09 | 青岛海信传媒网络技术有限公司 | Method for controlling intelligent image mode switching and display equipment |
CN112764832A (en) * | 2021-01-21 | 2021-05-07 | 青岛海信移动通信技术股份有限公司 | Application program installing and uninstalling method and communication terminal |
CN113792327B (en) * | 2021-08-12 | 2022-09-02 | 荣耀终端有限公司 | Authority management method, user interface and electronic equipment |
CN115859228A (en) * | 2022-12-01 | 2023-03-28 | 湖南于一科技有限公司 | Method, device, equipment and storage medium for preventing information leakage in application program |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1927065A1 (en) * | 2005-09-23 | 2008-06-04 | Intel Corporation | Method for computing platform data protection |
CN103299658A (en) * | 2010-11-19 | 2013-09-11 | 移动熨斗公司 | Management of mobile applications |
CN103686722A (en) * | 2012-09-13 | 2014-03-26 | 中兴通讯股份有限公司 | Access control method and device |
CN104462978A (en) * | 2014-12-24 | 2015-03-25 | 北京奇虎科技有限公司 | Method and device for application program authority management |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101115023A (en) * | 2006-07-25 | 2008-01-30 | 华为技术有限公司 | Method for subscripting, amending, canceling subscription authority and desubscripting CBCS service |
CN103544035A (en) * | 2013-10-21 | 2014-01-29 | 北京奇虎科技有限公司 | Application clearing method and device for mobile terminal |
WO2018045564A1 (en) * | 2016-09-09 | 2018-03-15 | 北京小米移动软件有限公司 | Auxiliary service management method and apparatus |
-
2016
- 2016-09-09 WO PCT/CN2016/098590 patent/WO2018045564A1/en active Application Filing
- 2016-09-09 CN CN201680000855.1A patent/CN106462697B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1927065A1 (en) * | 2005-09-23 | 2008-06-04 | Intel Corporation | Method for computing platform data protection |
CN103299658A (en) * | 2010-11-19 | 2013-09-11 | 移动熨斗公司 | Management of mobile applications |
CN103686722A (en) * | 2012-09-13 | 2014-03-26 | 中兴通讯股份有限公司 | Access control method and device |
CN104462978A (en) * | 2014-12-24 | 2015-03-25 | 北京奇虎科技有限公司 | Method and device for application program authority management |
Also Published As
Publication number | Publication date |
---|---|
CN106462697A (en) | 2017-02-22 |
WO2018045564A1 (en) | 2018-03-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106462697B (en) | Ancillary service management method and device | |
CN104519485B (en) | Communication means, device and system between a kind of terminal | |
CN105278937B (en) | A kind of method and device showing pop-up box message | |
CN105024984B (en) | Authority setting method, apparatus and system | |
CN108280349A (en) | Protect method, mobile terminal and the computer readable storage medium of system kernel layer | |
CN106709347B (en) | Using the method and device of operation | |
CN104123276B (en) | The hold-up interception method of pop-up, device and system in a kind of browser | |
CN106612250A (en) | Resource utilization authority judgment system and method | |
CN105162591B (en) | Equipment login method and device | |
CN105096157A (en) | Virtual article receiving method, sending method, interaction method and device | |
CN106570358A (en) | Method and device for setting application permissions | |
CN105389259B (en) | A kind of method, apparatus and system for carrying out Application testing | |
CN106131930A (en) | A kind of WiFi network connection control method, device and terminal | |
CN104820546B (en) | Function information methods of exhibiting and device | |
CN106951139A (en) | Message notifying frame display methods and device | |
CN107219951A (en) | Touch screen control method, device, storage medium and terminal device | |
CN105808043B (en) | A kind of setting method and mobile terminal of terminal applies | |
CN107104930A (en) | It is a kind of that the methods, devices and systems for checking authority are set | |
CN108762829A (en) | A kind of method, client and terminal for image beautification | |
CN107465646B (en) | A kind of application method for down loading, system and relevant device | |
CN106708501B (en) | Activity monitoring method and device | |
EP2869233B1 (en) | Method, device and terminal for protecting application program | |
CN104135504A (en) | An application-based service providing method, device and system | |
CN109446435A (en) | Information display device, method, system and computer readable storage medium | |
CN110430252B (en) | Resource data processing method and device, equipment and readable storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |