CN108566358A - A kind of iOS system network traffic interception method and system under the mobile phone based on iPhone - Google Patents
A kind of iOS system network traffic interception method and system under the mobile phone based on iPhone Download PDFInfo
- Publication number
- CN108566358A CN108566358A CN201711398735.4A CN201711398735A CN108566358A CN 108566358 A CN108566358 A CN 108566358A CN 201711398735 A CN201711398735 A CN 201711398735A CN 108566358 A CN108566358 A CN 108566358A
- Authority
- CN
- China
- Prior art keywords
- data
- microsoft loopback
- loopback adapter
- ios system
- iphone
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
- H04L63/306—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information intercepting packet switched data communications, e.g. Web, Internet or IMS communications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
- H04L63/308—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information retaining data, e.g. retaining successful, unsuccessful communication attempts, internet access, or e-mail, internet telephony, intercept related information or call content
Landscapes
- Engineering & Computer Science (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Telephonic Communication Services (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses the iOS system network traffic interception method and system under a kind of mobile phone based on iPhone, and described method includes following steps:Step 1 receives starting up's request, and a Microsoft Loopback Adapter for being suitable for iOS system is created according to request instruction;Step 2 rewrites and cracks the routing table of injection iOS system, the data that original is normally received, and Microsoft Loopback Adapter is passed through in all drainages;Step 3 intercepts data by Microsoft Loopback Adapter, and implements integration processing;Step 4 carries out selective transmission to integrating treated data.The mechanism of iOS system, all TCP/UDP communication flows of full powers take over iPhone mobile phones can be got around, and can arbitrarily change the Content of Communication of the inside.The messaging channel of the one line APP such as wechat, microblogging, QQ can also be gone to private services device, and the data therefrom communication information.Sensitive wording can also be analyzed, as long as including this communication information can be removed as long as these sensitive wordings.
Description
Technical field
The present invention relates to to-talk internet technical fields, and in particular to the iOS system net under a kind of mobile phone based on iPhone
Network communicates hold-up interception method and system.
Background technology
Current.Based on network traffic interception can not be carried out to iOS system under iPhone mobile phones, and can not get around
The mechanism of iOS system, all TCP/UDP communication flows of full powers take over iPhone mobile phones, and cannot arbitrarily change the inside
Content of Communication.Also the messaging channel of a line APP such as wechat, microblogging, QQ cannot be gone to private services device simultaneously, and
The data therefrom communication information.Also sensitive wording cannot be analyzed, as long as including this cannot be removed as long as these sensitive wordings
The communication information.Realize that network traffic interception modification function is widely used in Android phone system, but iPhone mobile phones
IOS system on currently without this function.
Invention content
In order to overcome the deficiencies of the above existing technologies, purpose of the present invention is to provide one kind based under iPhone mobile phones
IOS system network traffic interception method and system, the mechanism of iOS system, the institute of full powers take over iPhone mobile phones can be got around
There is TCP/UDP communication flows, and can arbitrarily change the Content of Communication of the inside.
In view of the above and other objects, the present invention proposes that the iOS system network communication under a kind of mobile phone based on iPhone is blocked
The method of cutting, specifically comprises the following steps:
S1 receives starting up's request, and a Microsoft Loopback Adapter for being suitable for iOS system is created according to request instruction;
S2 obtains Microsoft Loopback Adapter data packet, rewrites and crack the routing table of injection iOS system, former normal receiving
Data, all drainage pass through Microsoft Loopback Adapter;
S3 intercepts data by Microsoft Loopback Adapter, and implements integration processing;
S4 carries out selective transmission to integrating treated data.
Further, before step S3, data are packaged, and are implemented to the data set packet of transmission or the number of reception
According to unpacking;
In step S3, the Data Integration processing to interception is completed in transfer server, screens and reconfigure parsing
Filtering, includes being intercepted, being captured to the data of reception, or be filtered, change to the data of transmission;
In step S4, to integrating, treated that data are sent to server or client.
Further, it is described reconfigure parsing filtering include regular expression, search replacement and copy modification.
Further, for the Microsoft Loopback Adapter by cracking, the mode of decompiling obtains the bottom data structure of system, then right
This bottom data carries out injection modification and creates;
The Microsoft Loopback Adapter has the function of to seize website and behavior record on both sides by the arms;
In order to achieve the above objectives, the present invention also provides the iOS system network traffic interceptions under a kind of mobile phone based on iPhone
System specifically includes:
Microsoft Loopback Adapter creating unit creates one according to request instruction and is suitable for iOS systems for receiving starting up's request
The Microsoft Loopback Adapter of system;
Injection unit is rewritten, the data packet for obtaining Microsoft Loopback Adapter creating unit rewrites and cracks injection iOS systems
Microsoft Loopback Adapter is passed through in the routing table of system, the data that original is normally received, all drainage;
Data Integration processing unit by Microsoft Loopback Adapter and rewrites and cracks the routing table for injecting iOS system, logarithm
According to being intercepted, and implement integration processing;
Transmission unit carries out selective transmission for integrating treated data to Data Integration processing unit.
Further, the system also includes:
Package module for being packaged data, and is implemented to unpack to the data set packet of transmission or the data of reception;
Transfer processing module, for being completed in transfer server to the processing of the Data Integration of interception, screening and group again
Parsing filtering is closed, includes that the data of reception are intercepted, are captured, or the data of transmission are filtered, are changed;
Module is seized on both sides by the arms, for being seized on both sides by the arms to website and data information;
Memory module, for carrying out trace memory to system operatio behavior.
Compared with prior art, the invention has the advantages that:
The present invention carries out network traffic interception under iPhone mobile phones to iOS system, can get around the mechanism of iOS system,
All TCP/UDP communication flows of full powers take over iPhone mobile phones, and can arbitrarily change the Content of Communication of the inside.It can be with
The messaging channel of the one line APP such as wechat, microblogging, QQ is gone to private services device, and the data therefrom communication information.Also
Sensitive wording can be analyzed, as long as including this communication information can be removed as long as these sensitive wordings.It can be according to the reality of enterprise
Rule is arranged in border demand, can be used for secondary encryption, and enterprise's secondary development is suitble to use.
Description of the drawings
To describe the technical solutions in the embodiments of the present invention more clearly, make required in being described below to embodiment
Attached drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for
For those of ordinary skill in the art, without creative efforts, other are can also be obtained according to these attached drawings
Attached drawing.
Fig. 1 is the step flow chart of the iOS system network traffic interception method under a kind of mobile phone based on iPhone of the present invention;
Fig. 2 is one embodiment of the iOS system network traffic interception method under a kind of mobile phone based on iPhone of the present invention
Flow;
Fig. 3 is the system architecture diagram of the iOS system network traffic interception system under a kind of mobile phone based on iPhone of the present invention.
Specific implementation mode
To make the object, technical solutions and advantages of the present invention clearer, it below by specific specific example and combines
Embodiments of the present invention are illustrated, those skilled in the art can understand this hair easily by content disclosed in the present specification
Bright further advantage and effect.The present invention also can be implemented or be applied by other different specific examples, in this specification
Every details also can be based on different viewpoints with application, carry out without departing from the spirit of the present invention it is various modification and change.
Fig. 1 is one embodiment of the iOS system network traffic interception method under a kind of mobile phone based on iPhone of the present invention
Step flow chart.
As shown in Figure 1, the iOS system network traffic interception method under a kind of mobile phone based on iPhone of the present invention, specific to wrap
Include following steps:
S1 receives starting up's request, and a Microsoft Loopback Adapter for being suitable for iOS system is created according to request instruction;
S2 obtains Microsoft Loopback Adapter data packet, rewrites and crack the routing table of injection iOS system, former normal receiving
Data, all drainage pass through Microsoft Loopback Adapter;
S3 intercepts data by Microsoft Loopback Adapter, and implements integration processing;
S4 carries out selective transmission to integrating treated data.
In the specific embodiment of the invention, before step S3, data are packaged, and implement the data set to transmission
Packet or the data received are unpacked;
In step S3, the Data Integration processing to interception is completed in transfer server, screens and reconfigure parsing
Filtering, includes being intercepted, being captured to the data of reception, or be filtered, change to the data of transmission.
Interception, capture operation in the present invention are by checking the communication bag inside Microsoft Loopback Adapter, carrying out packet analysis.Packet
Content unpacked, after unpacking to byte stream carry out screening, screening to sensitive content is just filtered, or content is forwarded
To given server transfer server.
Described to be forwarded to given server transfer server, as long as there is ip, when forwarding is specified to go to some ip
's.Such as:It is 123.123.123.123 that I has built a server ip in Ali's cloud, and data can be all forwarded to this by I
On the address of platform server.I can build a server 111.33.44.55 in Huawei's cloud again, can also forward 2 simultaneously
Platform.
Such as the server of the original transceiving data of wechat is:Mp.wx.qq.com, the present invention are led to after intercepting all
Mp.wx.qq.com data turn to abc.com servers, are then sent to again again in this complete information of server process
Mp.wx.qq.com, centre have carried out a capture action.
In step S4, to integrating, treated that data are sent to server or client.
Specifically, it is described reconfigure parsing filtering include regular expression, search replacement and copy modification.
Preferably, the Microsoft Loopback Adapter, by cracking, the mode of decompiling obtains the bottom data structure of system, then to this
A bottom data carries out injection modification and creates;Specifically the present invention realizes that request is jumped by the routing table of rewriting iOS system
The method turned, routing table data belong to IOS system low level datas, come out and then be processed modification by decompiling.
In the specific embodiment of the invention, by cracking, the mode of decompiling obtains the bottom data structure of system, then
Injection modification is carried out to this bottom data again, i.e. bottom injects, and establishes and receives data and send two lines road, receiving data is
Communication layers are implemented to intercept to data, capture operation, and transmission data is that communication layers are implemented to filter to data, modification operation.
As shown in Fig. 2, being one embodiment of the present of invention flow, multiple APP can be intercepted simultaneously, or change multiple
The message content of APP.Example:Disabling family wechat hair circle of friends may be implemented, pay the bill with Alipay, QQ hair group's message starts
The APP plug-in units developed of the iPhone mobile phones installation present invention, behind be referred to as this APP.The plug-in unit just exists automatically after starting once
IPhone mobile phone running backgrounds, APP states may be at closing or terminate, but cannot unload this APP.After APP has started,
That is normal operating iphone mobile phones, if iphone mobile phones are using the popular softwares such as wechat APP, QQAPP at this time, this App can be
Backstage captures wechat and corresponds to all communication datas of common APP, including chat word, picture etc..It can be this after capture
Chat message is forwarded to specified transfer server.Before wechat and corresponding common APP receipts connect message, data can also be carried out real-time
It intercepts, administrator can configure on backstage, can add the sensitive wording of deletion.Such as receive " sensitive wording ", this APP can be automatic
This message is filtered, wechat and corresponding common APP would not receive this message.User sends message in wechat by wireless network
Before, such as have sent " sensitive wording ", this APP then carries out intercepting at once allows transmission to fail.The wireless network includes three big fortune
Seek the wireless network of quotient, including wireless WiFi, 4G, 3G and 2G network.
The present invention is applicable in various communications protocols technical intercept, including http protocol:URLSession、AFNetworking
Deng, TCP udp protocol:AsyncSocket, AsyncUdpSocket, GCDAsyncUdpSocket etc., SOCKET agreements:
AsyncSocket, cocoaasyncsocket etc., POP3, FTP, SMTP connection can also realize interception, can also be according to reality
The agreement of situation is customized.
Microsoft Loopback Adapter of the present invention, which also has, seizes web sites function, such as certain listed company on both sides by the arms, and mobile phone, online computing will be installed first
Authentication Client logs in, could normal browsing website.At this time in the integrated present invention of Authentication Client, you can to control employee's mobile phone
Internet behavior, mobile phone browser are accessing www.youku.com video networks, then my Microsoft Loopback Adapter inspection:If he
Youku.com cannot be opened using the network of company, to save corporate networks bandwidth.It simultaneously again can be mobile phone access
Www.163.com goes to www.21cn.com, is configured according to the actual conditions of enterprise, filters some unhealthy webpages, or
Consume flow webpage.
The present invention has the function of behavior record, it is assumed that:The integrated present invention of Taobao APP, all mobile phones equipped with Taobao APP,
As long as operation is primary, do not have to open again later, as long as hereafter mobile phone has network request that can all be recorded by Microsoft Loopback Adapter.
Either any APP, including browser that system is included, can also be recorded.It is just forwarded to after certain amount is recorded specified
Server is used for counting user behavioral data.It can count what website when user have accessed, have input in what
Hold, stopped how long etc..
The present invention is highly suitable for enterprise, and rule can be arranged according to the actual demand of enterprise.Such as some guarantors
Confidential information requires high enterprise, can intercept the communication of any software completely.Such as:The mobile phone that certain express company matches to courier
On be mounted with【Addressee APP】, this software can integrate this technology at this time, as long as dress【Addressee APP】Iphone hands
Machine, since the function of the present invention intercepts network, this TV station Iphone mobile phones can only use【Addressee APP】, other all app
Network connection is can not be used all to block.
It is contemplated that the present invention may be use with secondary encryption, is suitble to enterprise's secondary development to use.Such as:The chat IM of certain OA systems
Content is no encrypted, and it is to formulate exploitation to need encryption function, is carried out after chat content being captured using the present invention
Then encryption retransmits out.As long as server is by the encryption method decryption of agreement.
Fig. 3 is one embodiment of the iOS system network traffic interception system under a kind of mobile phone based on iPhone of the present invention
System architecture diagram.
As shown in figure 3, in order to achieve the above objectives, the present invention also provides the iOS system nets under a kind of mobile phone based on iPhone
Network communicates intercepting system, specifically includes:
Microsoft Loopback Adapter creating unit creates one according to request instruction and is suitable for iOS systems for receiving starting up's request
The Microsoft Loopback Adapter of system;
Injection unit is rewritten, the data packet for obtaining Microsoft Loopback Adapter creating unit rewrites and cracks injection iOS systems
Microsoft Loopback Adapter is passed through in the routing table of system, the data that original is normally received, all drainage;
Data Integration processing unit by Microsoft Loopback Adapter and rewrites and cracks the routing table for injecting iOS system, logarithm
According to being intercepted, and implement integration processing;
Transmission unit carries out selective transmission for integrating treated data to Data Integration processing unit.
Preferably, the system also includes:
Package module for being packaged data, and is implemented to unpack to the data set packet of transmission or the data of reception;
Transfer processing module, for being completed in transfer server to the processing of the Data Integration of interception, screening and group again
Parsing filtering is closed, includes that the data of reception are intercepted, are captured, or the data of transmission are filtered, are changed;
Module is seized on both sides by the arms, for being seized on both sides by the arms to website and data information;
Memory module, for carrying out trace memory to system operatio behavior.
The foregoing is merely presently preferred embodiments of the present invention, is not intended to limit the invention, it is all the present invention spirit and
Within principle, any modification, equivalent replacement, improvement and so on should all be included in the protection scope of the present invention.
Claims (6)
1. a kind of iOS system network traffic interception method under mobile phone based on iPhone, which is characterized in that the method includes such as
Lower step:
S1 receives starting up's request, and a Microsoft Loopback Adapter for being suitable for iOS system is created according to request instruction;
S2 obtains Microsoft Loopback Adapter data packet, rewrites and crack the routing table of injection iOS system, the number that original is normally received
According to Microsoft Loopback Adapter is passed through in all drainages;
S3 intercepts data by Microsoft Loopback Adapter, and implements integration processing;
S4 carries out selective transmission to integrating treated data.
2. the iOS system network traffic interception method under a kind of mobile phone based on iPhone as described in claim 1, feature exist
In:
Before step S3, data are packaged, and implement to unpack to the data set packet of transmission or the data of reception;
In step S3, the Data Integration processing to interception is completed in transfer server, screens and reconfigure parsing filtering,
Include that the data of reception are intercepted, are captured, or the data of transmission are filtered, are changed;
In step S4, to integrating, treated that data are sent to server or client.
3. the iOS system network traffic interception method under a kind of mobile phone based on iPhone as claimed in claim 2, feature exist
In, it is described reconfigure parsing filtering include regular expression, search replacement and copy modification.
4. the iOS system network traffic interception method under a kind of mobile phone based on iPhone as described in claim 1, feature exist
In, the Microsoft Loopback Adapter by cracking, the mode of decompiling obtains the bottom data structure of system, then to this bottom data into
Row injection modification creates;
The Microsoft Loopback Adapter has the function of to seize website and behavior record on both sides by the arms.
5. the iOS system network traffic interception system under a kind of mobile phone based on iPhone, which is characterized in that the system comprises:
Microsoft Loopback Adapter creating unit creates one according to request instruction and is suitable for iOS system for receiving starting up's request
Microsoft Loopback Adapter;
Injection unit is rewritten, the data packet for obtaining Microsoft Loopback Adapter creating unit rewrites and cracks injection iOS system
Microsoft Loopback Adapter is passed through in routing table, the data that original is normally received, all drainage;
Data Integration processing unit, by Microsoft Loopback Adapter and rewrite and crack injection iOS system routing table, to data into
Row intercepts, and implements integration processing;
Transmission unit carries out selective transmission for integrating treated data to Data Integration processing unit.
6. the iOS system network traffic interception system under a kind of mobile phone based on iPhone as claimed in claim 5, feature exist
In, the system also includes:
Package module for being packaged data, and is implemented to unpack to the data set packet of transmission or the data of reception;
Transfer processing module, for completing to handle the Data Integration of interception in transfer server, screening and reconfigure solution
Analysis filtering, includes being intercepted, being captured to the data of reception, or be filtered, change to the data of transmission;
Module is seized on both sides by the arms, for being seized on both sides by the arms to website and data information;
Memory module, for carrying out trace memory to system operatio behavior.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711398735.4A CN108566358B (en) | 2017-12-22 | 2017-12-22 | iOS system network communication interception method and system based on iPhone mobile phone |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711398735.4A CN108566358B (en) | 2017-12-22 | 2017-12-22 | iOS system network communication interception method and system based on iPhone mobile phone |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108566358A true CN108566358A (en) | 2018-09-21 |
CN108566358B CN108566358B (en) | 2021-03-26 |
Family
ID=63529442
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711398735.4A Active CN108566358B (en) | 2017-12-22 | 2017-12-22 | iOS system network communication interception method and system based on iPhone mobile phone |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108566358B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109446086A (en) * | 2018-10-29 | 2019-03-08 | 北京酷我科技有限公司 | A kind of method of App inside packet capturing |
CN111490939A (en) * | 2020-03-30 | 2020-08-04 | 苏州瑞立思科技有限公司 | High-performance windows network card driving method supporting advanced strategy configuration |
CN111953595A (en) * | 2019-10-24 | 2020-11-17 | 北京大学 | Data transmission architecture based on virtual host |
CN115499402A (en) * | 2022-08-23 | 2022-12-20 | 北京天空卫士网络安全技术有限公司 | Instant messaging information processing method, terminal and system |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070233857A1 (en) * | 2006-03-30 | 2007-10-04 | Nebuad, Inc. | Network device for monitoring and modifying network traffic between an end user and a content provider |
US7657011B1 (en) * | 2006-03-16 | 2010-02-02 | Juniper Networks, Inc. | Lawful intercept trigger support within service provider networks |
CN103916405A (en) * | 2014-04-25 | 2014-07-09 | 厦门享游网络科技有限公司 | Method for guiding flow of TCP/UDP of App on IOS |
CN104506545A (en) * | 2014-12-30 | 2015-04-08 | 北京奇虎科技有限公司 | Data leakage prevention method and data leakage prevention device |
CN105656943A (en) * | 2016-03-15 | 2016-06-08 | 上海缔安科技股份有限公司 | Application data interception system and method |
CN105721419A (en) * | 2014-12-19 | 2016-06-29 | 卡巴斯基实验室股份制公司 | System and method for selecting means for intercepting network transmissions |
CN106209838A (en) * | 2016-07-08 | 2016-12-07 | 杭州迪普科技有限公司 | The IP cut-in method of SSL VPN and device |
-
2017
- 2017-12-22 CN CN201711398735.4A patent/CN108566358B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7657011B1 (en) * | 2006-03-16 | 2010-02-02 | Juniper Networks, Inc. | Lawful intercept trigger support within service provider networks |
US20070233857A1 (en) * | 2006-03-30 | 2007-10-04 | Nebuad, Inc. | Network device for monitoring and modifying network traffic between an end user and a content provider |
CN103916405A (en) * | 2014-04-25 | 2014-07-09 | 厦门享游网络科技有限公司 | Method for guiding flow of TCP/UDP of App on IOS |
CN105721419A (en) * | 2014-12-19 | 2016-06-29 | 卡巴斯基实验室股份制公司 | System and method for selecting means for intercepting network transmissions |
CN104506545A (en) * | 2014-12-30 | 2015-04-08 | 北京奇虎科技有限公司 | Data leakage prevention method and data leakage prevention device |
CN105656943A (en) * | 2016-03-15 | 2016-06-08 | 上海缔安科技股份有限公司 | Application data interception system and method |
CN106209838A (en) * | 2016-07-08 | 2016-12-07 | 杭州迪普科技有限公司 | The IP cut-in method of SSL VPN and device |
Non-Patent Citations (2)
Title |
---|
MRPEAK: "mitmproxy的使用", 《HTTPS://WWW.JIANSHU.COM/P/29647028989D》 * |
颐和园: "ios charles proxy教程", 《HTTPS://BLOG.CSDN.NET/KMYHY/ARTICLE/DETAILS/74389070》 * |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109446086A (en) * | 2018-10-29 | 2019-03-08 | 北京酷我科技有限公司 | A kind of method of App inside packet capturing |
CN111953595A (en) * | 2019-10-24 | 2020-11-17 | 北京大学 | Data transmission architecture based on virtual host |
CN111490939A (en) * | 2020-03-30 | 2020-08-04 | 苏州瑞立思科技有限公司 | High-performance windows network card driving method supporting advanced strategy configuration |
CN115499402A (en) * | 2022-08-23 | 2022-12-20 | 北京天空卫士网络安全技术有限公司 | Instant messaging information processing method, terminal and system |
Also Published As
Publication number | Publication date |
---|---|
CN108566358B (en) | 2021-03-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11379602B2 (en) | Internal controls engine and reporting of events generated by a network or associated applications | |
CN106789259B (en) | A kind of LoRa core network system and implementation method | |
US9954873B2 (en) | Mobile device-based intrusion prevention system | |
CN108566358A (en) | A kind of iOS system network traffic interception method and system under the mobile phone based on iPhone | |
CN103117906B (en) | A kind of mobile terminal shares flux monitoring method during Wi-Fi hotspot | |
CN104580192B (en) | The treating method and apparatus of the network access request of application program | |
US9794282B1 (en) | Server with queuing layer mechanism for changing treatment of client connections | |
US8234361B2 (en) | Computerized system and method for handling network traffic | |
US20150156183A1 (en) | System and method for filtering network communications | |
US11700239B2 (en) | Split tunneling based on content type to exclude certain network traffic from a tunnel | |
EP3424196A1 (en) | Systems and methods for dynamic firewall policy configuration | |
KR102451237B1 (en) | Security for container networks | |
CN107124402A (en) | A kind of method and apparatus of packet filtering | |
US10601777B2 (en) | Data inspection system and method | |
JP2024020524A (en) | Methods and systems for efficient cyber protections of mobile devices | |
CN102857388A (en) | Cloud detection safety management auditing system | |
US20230353600A1 (en) | Distributed network and security operations platform | |
CN102420837B (en) | NDIS (Network Driver Interface Standard)-based method and system | |
EP3590061A1 (en) | Managing data encrypting application | |
US20190205776A1 (en) | Techniques for policy-controlled analytic data collection in large-scale systems | |
Schulz et al. | Tetherway: a framework for tethering camouflage | |
CN102572814A (en) | Method, system and device for monitoring viruses in mobile terminal | |
CN105991353A (en) | Fault location method and device | |
JP6828818B2 (en) | Traffic optimizer, communication system, traffic optimization method and program | |
Copeland et al. | A managed security environment for enterprise iPhones |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |