Application recommendation based on permissions
First Claim
1. A method, comprising:
- utilizing at least one processor to execute computer code that performs the steps of;
tracking, using at least one sensor of an information handling device, behavior of a user when the user is providing input to a permission request of an application, wherein the permission request comprises at least one application permission requesting access for the application to information accessible by the information handling device, wherein the tracking behavior of the user comprises tracking non-selection input behavior of the user comprising behavior other than user selection inputs provided to the permission request of the application;
identifying at least one undesired application permission, wherein the identifying comprises inferring from the behavior of the user that the user is uncomfortable with the at least one undesired application permission by tracking a gaze of the user to identify an application permission associated with the gesture that exceeds a predetermined time frame;
determining whether another similar application, having a permission set the user is comfortable with, is available, wherein the determining comprises searching for applications similar to the application and filtering the similar applications by removing applications having a permission similar to the undesired application permission;
providing a recommendation, if there is another similar application, to the user, wherein the recommendation comprises the another similar application; and
storing, if there is not another similar application, the undesired application permission as an application development requirement for use in developing new applications not having the undesired application permission.
1 Assignment
0 Petitions
Accused Products
Abstract
One embodiment provides a method, including: tracking behavior of a user when the user is providing input to a permission request of an application, wherein the permission request comprises at least one application permission requesting access for the application to information accessible by an information handling device; identifying at least one undesired application permission, wherein the identifying comprises detecting, based upon the behavior of the user, that the user is uncomfortable with the at least one undesired application permission; determining whether another similar application, having a permission set the user is comfortable with, is available, wherein the determining comprises searching for applications similar to the application and filtering the similar applications by removing applications having a permission similar to the undesired application permission; and providing a recommendation, if there is another similar application, to the user, wherein the recommendation comprises the another similar application.
33 Citations
17 Claims
-
1. A method, comprising:
-
utilizing at least one processor to execute computer code that performs the steps of; tracking, using at least one sensor of an information handling device, behavior of a user when the user is providing input to a permission request of an application, wherein the permission request comprises at least one application permission requesting access for the application to information accessible by the information handling device, wherein the tracking behavior of the user comprises tracking non-selection input behavior of the user comprising behavior other than user selection inputs provided to the permission request of the application; identifying at least one undesired application permission, wherein the identifying comprises inferring from the behavior of the user that the user is uncomfortable with the at least one undesired application permission by tracking a gaze of the user to identify an application permission associated with the gesture that exceeds a predetermined time frame; determining whether another similar application, having a permission set the user is comfortable with, is available, wherein the determining comprises searching for applications similar to the application and filtering the similar applications by removing applications having a permission similar to the undesired application permission; providing a recommendation, if there is another similar application, to the user, wherein the recommendation comprises the another similar application; and storing, if there is not another similar application, the undesired application permission as an application development requirement for use in developing new applications not having the undesired application permission. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. An apparatus, comprising:
-
at least one processor; and a non-transitory computer readable storage medium having computer readable program code embodied therewith and executable by the at least one processor, the computer readable program code comprising; computer readable program code that tracks, using at least one sensor of an information handling device, behavior of a user when the user is providing input to a permission request of an application, wherein the permission request comprises at least one application permission requesting access for the application to information accessible by the information handling device, wherein the tracking behavior of the user comprises tracking non-selection input behavior of the user comprising behavior other than user selection inputs provided to the permission request of the application; computer readable program code that identifies at least one undesired application permission, wherein the identifying comprises inferring from the behavior of the user that the user is uncomfortable with the at least one undesired application permission by tracking a gaze of the user to identify an application permission associated with the gesture that exceeds a predetermined time frame; computer readable program code that determines whether another similar application, having a permission set the user is comfortable with, is available, wherein the determining comprises searching for applications similar to the application and filtering the similar applications by removing applications having a permission similar to the undesired application permission; computer readable program code that provides a recommendation, if there is another similar application, to the user, wherein the recommendation comprises the another similar application; and computer readable program code that stores, if there is not another similar application, the undesired application permission as an application development requirement for use in developing new applications not having the undesired application permission.
-
-
10. A computer program product, comprising:
-
a non-transitory computer readable storage medium having computer readable program code embodied therewith, the computer readable program code executable by a processor and comprising; computer readable program code that tracks, using at least one sensor of an information handling device, behavior of a user when the user is providing input to a permission request of an application, wherein the permission request comprises at least one application permission requesting access for the application to information accessible by the information handling device, wherein the tracking behavior of the user comprises tracking non-selection input behavior of the user comprising behavior other than user selection inputs provided to the permission request of the application; computer readable program code that identifies at least one undesired application permission, wherein the identifying comprises inferring from the behavior of the user that the user is uncomfortable with the at least one undesired application permission by tracking a gaze of the user to identify an application permission associated with the gesture that exceeds a predetermined time frame; computer readable program code that determines whether another similar application, having a permission set the user is comfortable with, is available, wherein the determining comprises searching for applications similar to the application and filtering the similar applications by removing applications having a permission similar to the undesired application permission; computer readable program code that provides a recommendation, if there is another similar application, to the user, wherein the recommendation comprises the another similar application; and computer readable program code that stores, if there is not another similar application, the undesired application permission as an application development requirement for use in developing new applications not having the undesired application permission. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
-
17. A method, comprising:
-
utilizing at least one processor to execute computer code that performs the steps of; identifying an undesired application permission of an application, wherein the application permission requests access for the application to information accessible by an information handling device and wherein the identifying comprises inferring from behavior of a user that the user is uncomfortable with the undesired application permission, wherein the behavior of the user is tracked, using at least one sensor of the information handling device, and comprises tracking non-selection input behavior of the user comprising behavior other than user selection inputs provided to the permission request of the application, wherein the tracking comprises tracking a gaze of the user to identify an application permission associated with the gesture that exceeds a predetermined time frame; searching, using a similarity algorithm, for applications having features similar to the application having the undesired application permission and having a permission set that does not include the undesired application permission; determining that no applications are available having similar features and a permission set that does not include the undesired application permission and storing the undesired application permission as an application development requirement for use in developing new applications not having the undesired application permission; and providing a recommendation to an application developer, wherein the recommendation recommends that an application be developed without the undesired application permission.
-
Specification