Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Monitoring device and method for protecting user privacy based on iPhone operating system (iOS)

A user privacy and operating system technology, applied in the field of mobile application security monitoring, can solve problems such as insufficient security research, mobile phone data security leakage, and threats to user data security

Inactive Publication Date: 2014-12-10
INST OF INFORMATION ENG CAS
View PDF4 Cites 42 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this way, privacy leakage has become a common phenomenon in the field of mobile applications, which seriously threatens the data security of users.
[0011] (2) Security leakage of mobile phone data: It is very rare for iOS applications to encrypt user privacy data, while location tracking and user private information access are so common
However, since the system information of iOS is rarely disclosed, and the system itself is constantly updated, the difficulty of obtaining evidence is also increasing
[0016] It can be seen from this that the current research on the security of iOS platform software at home and abroad is not sufficient, and there is room for improvement and improvement.
At the same time, domestic research on the security of the iOS platform is basically blank, and no research on the security analysis of iOS software and related products have been seen.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Monitoring device and method for protecting user privacy based on iPhone operating system (iOS)
  • Monitoring device and method for protecting user privacy based on iPhone operating system (iOS)

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0034] refer to figure 1 , introduces the composition and structure of the monitoring device based on the Apple mobile phone operating system iOS to protect user privacy: there are three components: an application collection unit, an application analysis and detection unit, and an information management unit. in:

[0035] (A) Application collection unit: used to automatically download the latest or commonly used application software APP (APPlication) in the iOS software source of the iPhone operating system, or receive the APP to be tested sent by the testing organization or individual, and send it into the software The acquisition module stores the downloaded or received APP in the database, which consists of two modules: a software acquisition module and a data...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a monitoring device and method for protecting user privacy based on an iPhone operating system (iOS). The monitoring device is provided with an application collection unit, an application analysis detection unit and an information management unit. The monitoring device can be used for conducting monitoring and early warning on whether application program software (APP) leaks user privacy (comprising contact information, mobile phone numbers, positions of mobile phones, short messages, user accounts, passwords, call records, photos, favorites, history, email addresses, contents of emails and the like), reminding a user of the potential risk of the software, and storing and analyzing the monitored result, and then conducts software security level evaluation on the application program according to a software security level research algorithm. The mobile phone security monitoring device is simple in structure, ingenious in design, simple in operating steps, easy to learn and master and safe in use, and has application and popularization prospects.

Description

technical field [0001] The present invention relates to a user privacy monitoring device and monitoring method based on an Apple mobile phone operating system, to be more precise, relates to a device and a method for automatically detecting user privacy on an iOS (iPhone Operating System) application program of an Apple mobile phone operating system. It is used for real-time monitoring of iOS application software that may leak user privacy, and belongs to the technical field of mobile application security monitoring. Background technique [0002] With the popularity of mobile smart devices and the continuous improvement of hardware performance, mobile smart terminals are increasingly used to process various important data information. However, what follows is a large number of new security issues that are closely connected with mobile smart terminals. These security issues include privacy leaks, mobile phone Trojan horse viruses, and so on. In 2011, there were smart termin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/50
CPCG06F21/564G06F21/566
Inventor 冯志杰李彬崔苏陈彦舟邓明
Owner INST OF INFORMATION ENG CAS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products