APPLICATION RECOMMENDATION BASED ON PERMISSIONS
First Claim
1. A method, comprising:
- utilizing at least one processor to execute computer code that performs the steps of;
tracking behavior of a user when the user is providing input to a permission request of an application, wherein the permission request comprises at least one application permission requesting access for the application to information accessible by an information handling device;
identifying at least one undesired application permission, wherein the identifying comprises detecting, based upon the behavior of the user, that the user is uncomfortable with the at least one undesired application permission;
determining whether another similar application, having a permission set the user is comfortable with, is available, wherein the determining comprises searching for applications similar to the application and filtering the similar applications by removing applications having a permission similar to the undesired application permission; and
providing a recommendation, if there is another similar application, to the user, wherein the recommendation comprises the another similar application.
1 Assignment
0 Petitions
Accused Products
Abstract
One embodiment provides a method, including: utilizing at least one processor to execute computer code that performs the steps of: tracking behavior of a user when the user is providing input to a permission request of an application, wherein the permission request comprises at least one application permission requesting access for the application to information accessible by an information handling device; identifying at least one undesired application permission, wherein the identifying comprises detecting, based upon the behavior of the user, that the user is uncomfortable with the at least one undesired application permission; determining whether another similar application, having a permission set the user is comfortable with, is available, wherein the determining comprises searching for applications similar to the application and filtering the similar applications by removing applications having a permission similar to the undesired application permission; and providing a recommendation, if there is another similar application, to the user, wherein the recommendation comprises the another similar application. Other aspects are described and claimed.
30 Citations
20 Claims
-
1. A method, comprising:
-
utilizing at least one processor to execute computer code that performs the steps of; tracking behavior of a user when the user is providing input to a permission request of an application, wherein the permission request comprises at least one application permission requesting access for the application to information accessible by an information handling device; identifying at least one undesired application permission, wherein the identifying comprises detecting, based upon the behavior of the user, that the user is uncomfortable with the at least one undesired application permission; determining whether another similar application, having a permission set the user is comfortable with, is available, wherein the determining comprises searching for applications similar to the application and filtering the similar applications by removing applications having a permission similar to the undesired application permission; and providing a recommendation, if there is another similar application, to the user, wherein the recommendation comprises the another similar application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. An apparatus, comprising:
-
at least one processor; and a computer readable storage medium having computer readable program code embodied therewith and executable by the at least one processor, the computer readable program code comprising; computer readable program code that tracks behavior of a user when the user is providing input to a permission request of an application, wherein the permission request comprises at least one application permission requesting access for the application to information accessible by an information handling device; computer readable program code that identifies at least one undesired application permission, wherein the identifying comprises detecting, based upon the behavior of the user, that the user is uncomfortable with the at least one undesired application permission; computer readable program code that determines whether another similar application, having a permission set the user is comfortable with, is available, wherein the determining comprises searching for applications similar to the application and filtering the similar applications by removing applications having a permission similar to the undesired application permission; and computer readable program code that provides a recommendation, if there is another similar application, to the user, wherein the recommendation comprises the another similar application.
-
-
12. A computer program product, comprising:
-
a computer readable storage medium having computer readable program code embodied therewith, the computer readable program code executable by a processor and comprising; computer readable program code that tracks behavior of a user when the user is providing input to a permission request of an application, wherein the permission request comprises at least one application permission requesting access for the application to information accessible by an information handling device; computer readable program code that identifies at least one undesired application permission, wherein the identifying comprises detecting, based upon the behavior of the user, that the user is uncomfortable with the at least one undesired application permission; computer readable program code that determines whether another similar application, having a permission set the user is comfortable with, is available, wherein the determining comprises searching for applications similar to the application and filtering the similar applications by removing applications having a permission similar to the undesired application permission; and computer readable program code that provides a recommendation, if there is another similar application, to the user, wherein the recommendation comprises the another similar application. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
-
-
20. A method, comprising:
-
utilizing at least one processor to execute computer code that performs the steps of; identifying an undesired application permission of an application, wherein the application permission requests access for the application to information accessible by an information handling device and wherein the identifying comprises detecting, based upon behavior of a user, that the user is uncomfortable with the undesired application permission; searching, using a similarity algorithm, for applications having features similar to the application having the undesired application permission and having a permission set that does not include the undesired application permission; determining that no applications are available having similar features and a permission set that does not include the undesired application permission; and providing a recommendation to an application developer, wherein the recommendation recommends that an application be developed without the undesired application permission.
-
Specification