Compliance guidance
Latest update: 2023-12-08
expand all

Compliance guidance

Upgrade the latest SDK

Please make sure that you have upgraded the Evoque security certification SDK to meet the new regulatory regulations Latest version

SDK Business Function Description

Access description : The Evoque security authentication SDK includes basic business functions and extended business functions.
basic function : Provides one click login function for developers to achieve one click login of end user accounts.
Extended functions : Provide the number verification and user account security verification functions for the development, realize the end user number verification, and verify the user account and behavior security.
Special Reminder : For extended business functions, you can turn off optional personal information collection (such as accurate location information, software list information) to realize the shutdown of extended functions (developers can use Aurora Android:《 SDK API Guide 》、iOS:《 SDK API Guide 》View interface description document).

Configuration description of SDK optional personal information

Access description : For the control of personal information collected by the Evoque security authentication SDK, developers can use the Evoque Android:《 SDK API Guide 》、iOS:《 SDK API Guide 》 。 Due to non collection of relevant information It will seriously affect the realization and effect of some functions of the Aurora security authentication SDK. We strongly recommend that you open , please make reasonable configuration according to the actual business needs.

Description of optional personal information of Evoque security certification SDK:
a. Device hardware information (including device model, device screen resolution, device hardware manufacturer, device product name): used to ensure the compatibility of the products and/or services provided on different devices, and detect the malicious forgery of devices;
b. Operating system information (including operating system version, system name, system language): used to ensure the compatibility of the products and/or services provided on different devices;
c. Precise location information : used to provide login reports by region and calibrate the regional distribution of data; Identification of abnormal equipment and other gang attacks/identification of geographical location forgery, protection of user account security, etc;
d. Software list information (including software list and software running list information): used to identify the user's application environment and determine the installed APP information, help you identify abnormal software and intercept the batch automatic operation of machine programs, protect the security of user accounts, etc.

SDK Personal Information Collection Frequency and Precision Description

Access description : We will collect personal information of users according to the minimum necessity of realizing business functions. In terms of collection frequency, the data collection of the Evoque security certification SDK is only triggered when the app calls the relevant functions. As for the frequency, the app developers cannot configure it by themselves, so we do not provide optional configuration methods and examples for the frequency; In terms of collection accuracy, it mainly involves positioning related functions, which are mainly controlled by permissions. The Aurora security authentication SDK allows App to control whether to apply for precise geographical location permissions or rough geographical location permissions through optional permissions. If you need to configure location permissions, please refer to the following“ Description of SDK application for system permissions ”Configure.

Description of SDK application for system permissions

Access description: For the system permissions that can be optionally applied for by the Evoque Security Certification SDK, you can refer to the relevant table below to learn more about the relationship between the relevant permissions and various business functions and their application timing. Since the relevant permissions will not be applied, their corresponding functions will be affected. You can reasonably configure them according to the actual needs of the business.

Android operating system application permission list
jurisdiction Optional purpose
INTERNET Mandatory Allows applications to network for access to gateways and authentication servers.
ACCESS_NETWORK_STATE Mandatory Allows programs to access WiFi network status information, which is used to detect the security authentication environment, avoid data transmission in abnormal network conditions, and save traffic and power.
ACCESS_WIFI_STATE Mandatory Obtain the network status, determine whether to connect to wifi, and detect the security authentication environment.
CHANGE_NETWORK_STATE Mandatory It is allowed to obtain the permission of the program to change the network connection status, which is used to obtain the user's mobile phone number and realize the security authentication function.
CHANGE_WIFI_STATE Optional The access program is allowed to change the WIFI connection status, which is used to obtain the user's mobile phone number and realize the security authentication function.
ACCESS_COARSE_LOCATION Optional By obtaining rough location information, it provides developers with anti cheating functions and eliminates cheating devices.
ACCESS_FINE_LOCATION Optional By obtaining rough location information, it provides developers with anti cheating functions and eliminates cheating devices.
ACCESS_BACKGROUND_LOCATION Optional Background location permission for Android 10 and above devices. It provides developers with anti cheating functions and eliminates cheating devices.
READ_PHONE_STATE Optional It is used to assist in generating the unique device identifier of Aurora, identify the unique user, ensure the effective identification and quick response of one key authentication, and improve our anti fraud ability.
ACCESS_WIFI_STATE Optional It is used to assist in generating the unique device identifier of Aurora, identify the unique user, ensure the effective identification and quick response of one key authentication, and improve our anti fraud ability.
WRITE_EXTERNAL_STORAGE Optional It is used to assist in generating the unique device identifier of Aurora, identify the unique user, ensure the effective identification and quick response of one key authentication, and improve our anti fraud ability.
READ_EXTERNAL_STORAGE Optional It is used to assist in generating the unique device identifier of Aurora, identify the unique user, ensure the effective identification and quick response of one key authentication, and improve our anti fraud ability.
IOS operating system application permission list
jurisdiction Optional purpose
App Transport Security Settings Mandatory Since Unicom 5G number fetching requires HTTP requests, please add a sub project App Transport Security Settings in the project info.plist file, and then add a key: Allow Arbitrary Loads, whose value is YES. After modification, other operators can use one click login.
NSLocationWhenInUseUsageDescription Optional By obtaining location information, it provides developers with anti cheating functions and eliminates cheating devices.
NSLocationAlwaysAndWhenInUseUsageDescription Optional By obtaining location information, it provides developers with anti cheating functions and eliminates cheating devices.
NSUserTrackingUsageDescription Optional It is used to identify the unique user, ensure the effective identification and quick response of one click authentication, and improve our anti fraud ability.

SDK permission control

Android required permission

  • The following permissions are required. The following permissions must be configured to meet the basic authentication capability
<!-- Network permission, used to access the gateway and authentication server (required) --> <uses-permission android:name="android.permission.INTERNET" /> <!-- Allows programs to access WiFi network status information, which is used to detect the security authentication environment, avoid data transmission in abnormal network conditions, and save traffic and power (required) --> <uses-permission android:name="android.permission.ACCESS_NETWORK_STATE"/> <!-- Get the network status, determine whether to connect to wifi, and detect the security authentication environment (required) --> <uses-permission android:name="android.permission.ACCESS_WIFI_STATE" /> <!-- Allow to obtain the permission of the program to change the network connection status, which is used to obtain the user's mobile phone number and realize the security authentication function (required) --> <uses-permission android:name="android.permission.CHANGE_NETWORK_STATE" />
             <!--  Network permission, used to access the gateway and authentication server (required) -->
 < uses-permission  android:name = "android.permission.INTERNET" />
   <!--  Allows programs to access WiFi network status information, which is used to detect the security authentication environment, avoid data transmission in abnormal network conditions, and save traffic and power (required) -->
 < uses-permission  android:name = "android.permission.ACCESS_NETWORK_STATE" />
   <!--  Get the network status, determine whether to connect to wifi, and detect the security authentication environment (required) -->
 < uses-permission  android:name = "android.permission.ACCESS_WIFI_STATE" />
   <!--  Allow to obtain the permission of the program to change the network connection status, which is used to obtain the user's mobile phone number and realize the security authentication function (required) -->
 < uses-permission  android:name = "android.permission.CHANGE_NETWORK_STATE" />

        
This code block is displayed in the floating window

Android optional permissions

  • By obtaining location information, it provides developers with anti cheating functions and eliminates cheating devices. It is recommended to integrate the following permissions (optional)
<uses-permission android:name="android.permission.ACCESS_COARSE_LOCATION" /> <uses-permission android:name="android.permission.ACCESS_FINE_LOCATION" /> <uses-permission android:name="android.permission.ACCESS_BACKGROUND_LOCATION" />
           < uses-permission  android:name = "android.permission.ACCESS_COARSE_LOCATION" />
 < uses-permission  android:name = "android.permission.ACCESS_FINE_LOCATION" />
 < uses-permission  android:name = "android.permission.ACCESS_BACKGROUND_LOCATION" /> 

        
This code block is displayed in the floating window
  • It is allowed to obtain the permission of the program to change the network connection status, which is used to obtain the user's mobile phone number and realize the security authentication function. (Optional)

  • <uses-permission android:name="android.permission.CHANGE_NETWORK_STATE" />
               < uses-permission  android:name = "android.permission.CHANGE_NETWORK_STATE" />
    
            
    This code block is displayed in the floating window
  • It is used to identify the unique user, ensure the effective identification and quick response of one click authentication, and improve our anti fraud ability. It is recommended to integrate the following permissions (optional)

<uses-permission android:name="android.permission.READ_PHONE_STATE" /> <uses-permission android:name="android.permission.ACCESS_WIFI_STATE" /> <!-- Allow programs to read and write to external storage --> <uses-permission android:name="android.permission.WRITE_EXTERNAL_STORAGE" /> <!-- Allow programs to read from external storage --> <uses-permission android:name="android.permission.READ_EXTERNAL_STORAGE" />
           < uses-permission  android:name = "android.permission.READ_PHONE_STATE" />
 < uses-permission  android:name = "android.permission.ACCESS_WIFI_STATE" />
   <!--  Allow programs to read and write to external storage -->
 < uses-permission  android:name = "android.permission.WRITE_EXTERNAL_STORAGE" />
   <!--  Allow programs to read from external storage -->
 < uses-permission  android:name = "android.permission.READ_EXTERNAL_STORAGE" />

        
This code block is displayed in the floating window

IOS SDK permission control

IOS optional permissions

NSLocationWhenInUseUsageDescription//Access location information NSLocationAlwaysAndWhenInUseUsageDescription//Access location information NSUserTrackingUsageDescription//idfa Package Usage
           NSLocationWhenInUseUsageDescription   //Access location information
 NSLocationAlwaysAndWhenInUseUsageDescription   //Access location information
 NSUserTrackingUsageDescription   //Use of idfa package

        
This code block is displayed in the floating window

SDK privacy policy disclosure requirements and examples

Access description : After the developers integrate the Evoque security authentication SDK into the app, the normal operation of the Evoque security authentication SDK will collect necessary end-user information for one click login, number verification, and security verification services. According to the actual situation of the integrated Aurora security certification SDK, developers are requested to disclose the name of the Aurora security certification SDK, company name, type and purpose of personal information processing, collection method, privacy policy link and other contents in your App's privacy policy. Suggestion: Confirm the version and functional modules of the Aurora security certification SDK you access, and determine the data content interacting with the Aurora security certification SDK from the privacy policy; In your App's privacy policy, disclose the relevant information of the Evoque security certification SDK to the public in the form of text or list.

Disclosure examples (for reference only, please refer to the actual cooperation):
SDK name : Aurora Security Certification SDK
Third party subject : Shenzhen Hexunhuagu Information Technology Co., Ltd
SDK Usage : Provide APP users with one click login, number verification and security verification services
Process personal information type : device identifier (including IMEI, IDFA, Android ID, GAID, MAC, OAID, IMSI, MEID, UAID, ICCID), device hardware information (including device model, device screen resolution, device hardware manufacturer, device product name), operating system information (including operating system version, system name, system language) Network information (including network type, operator name, base station information, IP address, WiFi information, SSID, BSSID), precise location information, software list information (including software list and software operation list information).
Data processing mode : Through de identification, encrypted transmission and other security methods
Privacy Policy Link :《 AURORA Aurora Privacy Policy
Official website link https://www.jiguang.cn

Description and example of the end user's consent mode

Access description : When the app runs for the first time, there should be a privacy pop-up window, in which the brief version of the privacy policy content should be publicized with a link to the full version of the privacy policy, and the end user should be explicitly prompted to read and choose whether to agree to the privacy policy; The privacy pop-up window shall provide a consent button and a refusal button, which shall be actively selected by the end user. If sensitive personal information is involved, you should obtain your end user's separate authorization consent. You can achieve the end user's authorization through a separate pop-up window, and display sensitive personal information in your Privacy Policy through bold font or other prominent signs.

Pop up window example of privacy policy authorization:


Example of sensitive personal information authorization pop-up window:

Example of disclosure of sensitive personal information privacy policy :“ Precise location information : used to provide login reports by region and calibrate the regional distribution of data; Identification of abnormal equipment and other gang attacks/identification of geographical location forgery, protection of user account security, etc. "

Description of End User's Exercise of Rights

Access description : After developers integrate the Evoque security authentication SDK in their apps, the normal operation of the Evoque security authentication SDK will collect necessary end-user information for one click login or extended function purposes. Developers should provide end users with the path or function to exercise the rights of personal information subject in accordance with relevant laws and regulations. If you need the cooperation of Evoque Security Certification SDK, please contact Evoque in a timely manner, and we will work with developers to properly address the demands of end users.

SDK Initialization and Business Function Call Timing

Access description : Please be sure to initialize the Aurora security authentication SDK after the user agrees to the privacy policy in your app. Before users agree to the privacy policy, avoid dynamically applying for sensitive device permissions involving users' personal information; Before users agree to the privacy policy, you should avoid collecting and reporting personal information privately.

Initialize SDK

Ensure that the initialization function JVerificationInterface. init() is called only after the user has read your Privacy Policy and obtained the user's authorization when the app is launched for the first time. At this time, the SDK will actually collect device information and report it. If the user has not read your Privacy Policy and obtained the user's authorization, or the user does not agree with your Privacy Policy, The initialization method JVerificationInterface. init() cannot be called. Please note that do not call any API methods of the SDK before calling initialization. For the initialization interface, please refer to the call interface documentation Android:《 SDK API Guide 》; iOS:《 SDK API Guide 》。

SDK business function interface call

After initializing the Aurora security authentication SDK, if you call the SDK business function interface (see the call interface documentation for details Android:《 SDK API Guide 》; iOS:《 SDK API Guide 》, it is deemed that you agree to enable the SDK business function, and at this time we will start to collect and report the user's personal information corresponding to the SDK business function of Evoque security certification; If you refuse to call, it may affect the effect of using the relevant business functions of the Aurora security authentication SDK.

Third party privacy policy disclosure reference

The Evoque security certification SDK also integrates third-party SDKs. Please add a description of the privacy policy for third-party SDKs in the Privacy Policy, as shown below:

China Mobile Certification

Type of personal information processed : network type, network address, operator type, local phone number information, SIM card status, mobile phone device type, mobile phone operating system, hardware manufacturer
Purpose and use : Quick login/number verification of the identification phone number of the user, problem query, analysis, risk control
Information processing mode : SDK self collection
Third party subject : China Mobile Internet Co., Ltd
Privacy Policy https://wap.cmpassport.com/resources/html/contract2.html

China Unicom Certification

Type of personal information processed : network type, network address, operator type, local mobile phone number, mobile phone device type, mobile phone operating system, hardware manufacturer
Purpose and use : Quick login/business risk control for identifying the phone number of the user
Information processing mode : SDK self collection
Third party subject : China United Network Communications Co., Ltd
Privacy Policy https://msv6.wosms.cn/html/oauth/protocol2.html

China Telecom Certification

Type of personal information processed : international mobile subscriber identity code, application process information, ANDROID_ID (optional, except for versions above V3.8.10), registered mobile phone number, local phone number, network connection type, network status information, network address, operator type, mobile phone device type, mobile phone device manufacturer, mobile phone operating system type and version
Purpose and use : Quick login/number verification and business risk control of the mobile phone number identifying the user
Information processing mode : SDK self collection
Third party subject : Tianyi Digital Life Technology Co., Ltd
Privacy Policy https://e.189.cn/sdk/agreement/show.do?order=2&type=main&appKey=&hidetop=&isShowPre=&returnUrl=https%3A%2F%2Fe.189.cn

Volcano engine API

Type of personal information processed : Mobile phone number, IP
Purpose and purpose : Provide end-user risk identification service
Third party subject : Beijing Volcano Engine Technology Co., Ltd
Handling method : API interface
Privacy Policy https://www.volcengine.com/docs/6504/166009

Please note that the third-party SDK may change the information processing due to version upgrade and other reasons. The specific information is subject to its official publicity. Please pay attention in time.


Application self starting switch control interface

Supported versions

Start supporting version: JCore v4.2.0

summary

This interface allows developers to control whether the SDK is allowed to self start. SDK self start is mainly used to enable users to complete authentication more timely and effectively, which helps improve application security and user experience. Developers can configure on demand.

Relevant personal information and processing purpose

Software list information (including software list and software operation list information): identify user application environment, improve application security and protect user account security.

Interface definition

public static void enableAutoWakeup(Context context, boolean enable);
           public  static  void  enableAutoWakeup (Context context, boolean enable) ;
        
This code block is displayed in the floating window

Parameter Description

  • Context: application context
  • Enable: Whether to enable auto start

instructions

  • Before SDK initialization, configure the auto start switch through this interface
  • SDK self startup status is enabled by default

For example:

//Authentication SDK initialization JVerificationInterface.init(); //Close SDK self startup JCollectionAuth.enableAutoWakeup(context, false);
           //Authentication SDK initialization JVerificationInterface. init (); //Close SDK self startup JCollectionAuth.enableAutoWakeup(context, false );
        
This code block is displayed in the floating window

Privacy protection mechanism

If you have any questions, comments and suggestions on the permissions of the Aurora security certification SDK, or need the assistance of Aurora to turn off a certain permission collection capability, you can contact us through the following contact information:

  • E-mail: support@jiguang.cn
  • Tel: 400-888-2376
  • Address: No. 6, Keji South 12th Road, High tech Industrial Park, Nanshan District, Shenzhen

You can also access Aurora official website The online customer service system will contact us, and we will provide you with advice and services in a timely manner to ensure the implementation and implementation of the privacy protection mechanism.

Is the document content helpful to you?

Copyright 2011-2022, jiguang.cn, All Rights Reserved. Yue ICP Bei No. 12056275 - 13 Shenzhen Hexun Huagu Information Technology Co., Ltd

Open in Document Center