Method for protecting key string data in IOS, storage medium, equipment and system

A keychain and data technology, applied in the direction of platform integrity maintenance, etc., can solve problems such as user loss and high security risks, and achieve the effect of protecting security

Active Publication Date: 2019-04-19
WUHAN DOUYU NETWORK TECH CO LTD
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, once the hacker can read the key data saved in the keychain by injecting the

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for protecting key string data in IOS, storage medium, equipment and system
  • Method for protecting key string data in IOS, storage medium, equipment and system
  • Method for protecting key string data in IOS, storage medium, equipment and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0036]The design idea of ​​the present invention is: write a HOOK (hook interception) function in advance, this HOOK function can add new method in original function, and through the binding of method, when original function is called, it will be intercepted and execute the added new method. method; then, use the written HOOK function to HOOK the reading function of the system to read the keychain data, and add a function to obtain the current function call stack information in the reading function, so as to obtain all the read keychain data function call stack information; and then report the obtained function call stack information to read the keychain data to the server for legality verification, and block the reading operations that do not meet the legal requirements, so as to effectively prevent hackers from reading The purpose o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for protecting key string data in IOS, a storage medium, equipment and a system, and relates to the technical field of IOS data protection. The method comprises the following steps: creating a HOOK function in a current IOS system; Obtaining a reading function for reading key string data; Obtaining a stack information function used for obtaining the current function call stack information; performing HOOK on the obtained reading function by using the created HOOK function, so that the implementation method of the reading function is replaced by a custom implementation method added with a stack information function, wherein when the implementation method of the reading function is called, the reading function is intercepted and a user-defined implementationmethod is executed, so that calling stack information of the current calling reading function is obtained; And reporting the obtained call stack information to a server for legality verification. Themethod can effectively prevent the hacker program from reading the secret data in the key chain, and protects the safety of the key chain data.

Description

technical field [0001] The invention relates to the technical field of IOS data protection, in particular to a method, storage medium, device and system for protecting key chain data in IOS. Background technique [0002] At present, with the increasing popularity of mobile devices, the mobile application industry, especially IOS applications, has developed rapidly, and its development model and code framework have also undergone tremendous changes. For the IOS platform, its program is divided into main program and module file, and the module file is a dylib file (dylib file is a dynamic link library file on the IOS platform, similar to the DLL file on the Windows platform, similar to the Android platform SO file). [0003] Usually, when some functional modules need to be written and injected into the corresponding process, a dylib file is written, and then the dylib file is injected into the corresponding process to run. And for some data that wants to get another IOS appl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/55
CPCG06F21/55
Inventor 周志刚张文明陈少杰
Owner WUHAN DOUYU NETWORK TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products