android应用及游戏获取各项系统权限内容详解(Android applications and games access to the system permissions, detailed content)
android应用及游戏获取各项系统权限内容详解(Android applications and games access to the system permissions, detailed content)
The Android itself is a separate operating system. In such an operating system, each application operates with a unique system identity (Linux, user, ID, and group ID). Each part of the system uses separate identification methods, respectively. Linux is the way to separate applications and applications from the system. More security features of the system are provided by permission mechanism. Permissions can restrict specific operations of a particular process, or restrict access to specific data segments by each URI permission.
The core design concept of the Android security architecture is that, under default settings, all applications have no access to other applications, systems, or users. These include reading and writing user privacy data (contacts or e-mail), reading and writing other application files, accessing the network, or blocking device standby, etc.. When installing the application, the package installer will grant the application authority after checking the permissions referred to by the program signature and confirmed by the user. From a user's point of view, a Android application usually requires the following permissions:
Call, send SMS or MMS, modify / delete the contents of the SD card, read contact information, read the schedule information, writing schedule data, read phone state or identification code (based on GPS), precise location, fuzzy (based on network access) location, create a Bluetooth connection, full access to the Internet, check the network status, check WiFi status, avoid mobile phone standby, modify the system global settings, read the sync settings, boot from the start, restart other applications, to terminate the application and operation in setting preference application, vibration control, pictures etc..
An application should require reasonable permissions based on the functionality provided by itself. Users can also